mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-08-30T10:00:18.738778+00:00
This commit is contained in:
parent
4f74e9910e
commit
8ac49b4f13
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-3345",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-07-31T10:15:10.653",
|
||||
"lastModified": "2023-11-07T04:18:34.260",
|
||||
"lastModified": "2024-08-30T09:15:04.030",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The LMS by Masteriyo WordPress plugin before 1.6.8 does not properly safeguards sensitive user information, like other user's email addresses, making it possible for any students to leak them via some of the plugin's REST API endpoints."
|
||||
"value": "The LMS by Masteriyo WordPress plugin before 1.6.8 does not have proper authorization in one some of its REST API endpoints, making it possible for any students to retrieve email addresses of other students"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-6257",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-04-11T05:15:47.090",
|
||||
"lastModified": "2024-04-11T12:47:44.137",
|
||||
"lastModified": "2024-08-30T08:15:04.443",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Inline Related Posts WordPress plugin before 3.6.0 does not ensure that post content displayed via an AJAX action are accessible to the user, allowing any authenticated user, such as subscriber to retrieve the content of password protected posts"
|
||||
"value": "The Inline Related Posts WordPress plugin before 3.6.0 is missing authorization in an AJAX action to ensure that users are allowed to see the content of the posts displayed, allowing any authenticated user, such as subscriber to retrieve the content of password protected posts"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-6821",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-03-18T19:15:06.097",
|
||||
"lastModified": "2024-03-18T19:40:00.173",
|
||||
"lastModified": "2024-08-30T08:15:04.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Error Log Viewer by BestWebSoft WordPress plugin before 1.1.3 contains a vulnerability that allows you to read and download PHP logs without authorization"
|
||||
"value": "The Error Log Viewer by BestWebSoft WordPress plugin before 1.1.3 is affected by a Directory Listing issue, allowing users to read and download PHP logs without authorization"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
49
CVE-2024/CVE-2024-449xx/CVE-2024-44944.json
Normal file
49
CVE-2024/CVE-2024-449xx/CVE-2024-44944.json
Normal file
@ -0,0 +1,49 @@
|
||||
{
|
||||
"id": "CVE-2024-44944",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-30T08:15:04.580",
|
||||
"lastModified": "2024-08-30T08:15:04.580",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ctnetlink: use helper function to calculate expect ID\n\nDelete expectation path is missing a call to the nf_expect_get_id()\nhelper function to calculate the expectation ID, otherwise LSB of the\nexpectation object address is leaked to userspace."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/24f407042cf90b0872de667460230d8d50c06c39",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/27662b46f2adaa52c1665a82af4b21c42c4337fd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5e2c24f7b0911b15c29aefce760bcf770542fb61",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/64c0b8e64be8368617ef08dfc59a3160563a1435",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/66e7650dbbb8e236e781c670b167edc81e771450",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/74de442b8e12a207c07953ee068009a7701aff8f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/782161895eb4ac45cf7cfa8db375bd4766cb8299",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/eb4ca1a97e08ff5b920664ba292e576257e2d184",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-83xx/CVE-2024-8319.json
Normal file
60
CVE-2024/CVE-2024-83xx/CVE-2024-8319.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-8319",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-30T08:15:04.653",
|
||||
"lastModified": "2024-08-30T08:15:04.653",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Tourfic plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.11.20. This is due to missing or incorrect nonce validation on the tf_order_status_email_resend_function, tf_visitor_details_edit_function, tf_checkinout_details_edit_function, tf_order_status_edit_function, tf_order_bulk_action_edit_function, tf_remove_room_order_ids, and tf_delete_old_review_fields functions. This makes it possible for unauthenticated attackers to resend order status emails, update visitor/order details, edit check-in/out details, edit order status, perform bulk order status updates, remove room order IDs, and delete old review fields, respectively, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3054266/tourfic",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/07fa7b1a-9137-4049-a20a-8eb6df7ca578?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
21
README.md
21
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-30T08:00:16.830478+00:00
|
||||
2024-08-30T10:00:18.738778+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-30T07:15:12.140000+00:00
|
||||
2024-08-30T09:15:04.030000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,25 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
261567
|
||||
261569
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
- [CVE-2024-34577](CVE-2024/CVE-2024-345xx/CVE-2024-34577.json) (`2024-08-30T07:15:11.660`)
|
||||
- [CVE-2024-3673](CVE-2024/CVE-2024-36xx/CVE-2024-3673.json) (`2024-08-30T06:15:05.400`)
|
||||
- [CVE-2024-39300](CVE-2024/CVE-2024-393xx/CVE-2024-39300.json) (`2024-08-30T07:15:11.837`)
|
||||
- [CVE-2024-42412](CVE-2024/CVE-2024-424xx/CVE-2024-42412.json) (`2024-08-30T07:15:12.070`)
|
||||
- [CVE-2024-8016](CVE-2024/CVE-2024-80xx/CVE-2024-8016.json) (`2024-08-30T07:15:12.140`)
|
||||
- [CVE-2024-8333](CVE-2024/CVE-2024-83xx/CVE-2024-8333.json) (`2024-08-30T06:15:05.577`)
|
||||
- [CVE-2024-44944](CVE-2024/CVE-2024-449xx/CVE-2024-44944.json) (`2024-08-30T08:15:04.580`)
|
||||
- [CVE-2024-8319](CVE-2024/CVE-2024-83xx/CVE-2024-8319.json) (`2024-08-30T08:15:04.653`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `3`
|
||||
|
||||
- [CVE-2023-3345](CVE-2023/CVE-2023-33xx/CVE-2023-3345.json) (`2024-08-30T09:15:04.030`)
|
||||
- [CVE-2023-6257](CVE-2023/CVE-2023-62xx/CVE-2023-6257.json) (`2024-08-30T08:15:04.443`)
|
||||
- [CVE-2023-6821](CVE-2023/CVE-2023-68xx/CVE-2023-6821.json) (`2024-08-30T08:15:04.520`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
20
_state.csv
20
_state.csv
@ -225286,7 +225286,7 @@ CVE-2023-33439,0,0,a1ed559c68a76bba2ad761fd2abe747e531eea1568636ca492f0914e7beaf
|
||||
CVE-2023-3344,0,0,eb4ee284fdb2fb3e13683dd6815c4f1c1cab94ffc15d0a92c62215eb523cfe9c,2023-11-07T04:18:33.963000
|
||||
CVE-2023-33440,0,0,e3c649732d7e5935e00c610e84767b37ce2884399ecd38f7be1a01564bae72ff,2023-06-01T17:15:10.743000
|
||||
CVE-2023-33443,0,0,db7e13bdcf4b7e84078677ba38cb85ea171264699a45b4254af41e02082dba50,2023-06-14T19:13:04.663000
|
||||
CVE-2023-3345,0,0,96bff37570b3d5e823267b7ae6d155c6c6c69e8ac7f98fdaec070da16c69f2e8,2023-11-07T04:18:34.260000
|
||||
CVE-2023-3345,0,1,74b3de5fcc4b064c3b90bd5846c1deaefb45ca5151c6cd0264b4cc0ae3634737,2024-08-30T09:15:04.030000
|
||||
CVE-2023-33457,0,0,1384ae3af2ae126b976a8a49d245e4d9d630594ec67ec1a0c83e25e59db3b525,2023-06-12T15:57:18.677000
|
||||
CVE-2023-3346,0,0,33bddee86a4fcb6f7d399db916548680973608a860f8539444f55b9ca22edd3a,2023-08-11T21:01:53.977000
|
||||
CVE-2023-33460,0,0,dec1279f75b613ee523baf40af12e9841457a1045d55e63c789323f254e76f54,2023-11-07T04:14:54.257000
|
||||
@ -240223,7 +240223,7 @@ CVE-2023-6252,0,0,ca2b2c2b984f544e82c6d8509f46a27f6849d2326ae97ae5832ce1f0c1989c
|
||||
CVE-2023-6253,0,0,368f2abf54558ec6b258adb3e354908442b0dd5d935aa9cdef55675937e61219,2023-11-30T05:40:53.983000
|
||||
CVE-2023-6254,0,0,a764314e42da7cbdc88c9e544acbd7a34195729c96357e282cdf6f9bbd5c833d,2023-12-01T02:31:24.583000
|
||||
CVE-2023-6255,0,0,3a906c3d0051a5d3c161cee80e9a9a9dfd501ec31d42d1ef60e7e78bc5357632,2024-02-15T19:55:09.230000
|
||||
CVE-2023-6257,0,0,8919883231ec2cee5d198eb20eef2d1a588f565a122fbd977be9892a65a6963a,2024-04-11T12:47:44.137000
|
||||
CVE-2023-6257,0,1,09d47a4e6854f82f57085fcf3b94d2f3cd9d9a198bf29f163cc6f02b00454fdb,2024-08-30T08:15:04.443000
|
||||
CVE-2023-6258,0,0,6993bb3b80e1fbdd1e324d1a3fdda54930ef92d2589d1502b3997685b04621a1,2024-02-08T17:29:26.097000
|
||||
CVE-2023-6259,0,0,b78b9a2afac00b53f4eb0c3d1c82f70bfd5413116754c88067596401845f1b97,2024-02-21T15:15:08.987000
|
||||
CVE-2023-6260,0,0,e5614100ac77cbcd22f1c329438199d040c51e2fa377b14055e4ba3bda88ae79,2024-02-21T15:15:09.187000
|
||||
@ -240697,7 +240697,7 @@ CVE-2023-6814,0,0,f2dfd991f3eb478537c48f5d3ac3087d9f7a580ef58638c7d38447968c2e40
|
||||
CVE-2023-6815,0,0,c9628ac421880e315b97a06c351a60f3525f481ceae5d652af8fc0152141d9cd,2024-02-14T04:15:08.497000
|
||||
CVE-2023-6816,0,0,7325750dd0731d11c056af32d0623f65306532c99aea359f3789fd6f02f4e7b2,2024-05-22T17:16:09.970000
|
||||
CVE-2023-6817,0,0,cc201b8683c94f706ae74ea5adc28642e020b44ac49d90e4b25ea49578f8bc79,2024-02-08T16:15:47.270000
|
||||
CVE-2023-6821,0,0,2680eacc2d03e89a81c4f4da393854116bb2b119cfdf689d41f3c939f5890be9,2024-03-18T19:40:00.173000
|
||||
CVE-2023-6821,0,1,1ecc3c576162236f32f9f64a56f7295ad830704c5fedf9bc87d6ba759b1f7e3e,2024-08-30T08:15:04.520000
|
||||
CVE-2023-6824,0,0,317fcb7097041988b3396911807cb287d8657125154b4a375fa0829093889531,2024-01-23T15:35:27.123000
|
||||
CVE-2023-6825,0,0,5f2a6b8900d2ecb14567d0b430ce60a11b72adf0d920af3176450139cc927b08,2024-03-13T18:16:18.563000
|
||||
CVE-2023-6826,0,0,0b04535adf04b35ffa25089a607bb4494dc5795922b9225750066cd0ade8775d,2023-12-21T04:49:03.117000
|
||||
@ -253040,7 +253040,7 @@ CVE-2024-34572,0,0,da6acb8cd40dcbf6d2323bd9254a7bc18f8453b6d03d8a57301b37dd8d671
|
||||
CVE-2024-34573,0,0,82ca0b9b260238fc8193bf82f5bea85dcdeb8c8fd722769c69f6849636d7fcda,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34574,0,0,3e74c1beadff3fd890d2b5da4de2565dbad760d56326afd390946b5e96fda210,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34575,0,0,393b99ab99d08853751fd9680d36e14a49cd8e34f0aeacbb783a82d97ec9bda1,2024-05-17T18:36:05.263000
|
||||
CVE-2024-34577,1,1,e31068571a52b23a832e3e8217c56828975f126a4e20928aecfc08a4796cfc61,2024-08-30T07:15:11.660000
|
||||
CVE-2024-34577,0,0,e31068571a52b23a832e3e8217c56828975f126a4e20928aecfc08a4796cfc61,2024-08-30T07:15:11.660000
|
||||
CVE-2024-3458,0,0,87e528d305caa39d9a35bfd4c8efb11949cfac496f77400f61f34f91d68ca048,2024-05-17T02:39:57.243000
|
||||
CVE-2024-34580,0,0,b13d0d10186fa8ce8e24199cc1dc2d80b13694b6d8eff194e8908c96c81a6c72,2024-08-08T18:15:10.157000
|
||||
CVE-2024-34581,0,0,0413ed27e2fcdfc3f06c8169658e624099f91a9321af4014b7ce969f11436f7e,2024-07-03T02:00:40.357000
|
||||
@ -254488,7 +254488,7 @@ CVE-2024-3671,0,0,721f7e6a346cf74d875b2c4c41e32228fcdbc5d546ba420f9052982bd9032d
|
||||
CVE-2024-3672,0,0,3f4375d3f925965eedd3021149cf89991af4643d3a1e99168ddd0533ac28ffa8,2024-04-16T13:24:07.103000
|
||||
CVE-2024-36728,0,0,685c6307c04e58fb91aa1cd3d8196094b317c76e0e4421d5d65d9f3c42021678,2024-07-03T02:03:33.547000
|
||||
CVE-2024-36729,0,0,d45877829f45f72a36efe808f4ab30639504f5ee409a1f4bbca4482bbbc7cd52,2024-07-03T02:03:34.353000
|
||||
CVE-2024-3673,1,1,cc9895c4e0e8a9f91575facdb6ccdf4757b5ea1c38cd0c1fdfbdda4973faba4c,2024-08-30T06:15:05.400000
|
||||
CVE-2024-3673,0,0,cc9895c4e0e8a9f91575facdb6ccdf4757b5ea1c38cd0c1fdfbdda4973faba4c,2024-08-30T06:15:05.400000
|
||||
CVE-2024-36730,0,0,64a3dffa7bbe9fe7e69b7699e79bca595a078505b7c29c8334f44bb856a96c39,2024-06-07T14:56:05.647000
|
||||
CVE-2024-36732,0,0,89ef79acf914e7fa79f0997bbb77dd27a533cae855c7319e0da9cc89d060d11c,2024-08-01T13:53:14.287000
|
||||
CVE-2024-36734,0,0,37607296c2114d18eb9371884ac39d9c7abe072eefba87ba6dd89607d9b61cc6,2024-08-20T14:35:24.830000
|
||||
@ -256108,7 +256108,7 @@ CVE-2024-39293,0,0,1fec2940f1bd80b7fcd0ef6093774070c9cb79d5cc06d154bd66dc488c943
|
||||
CVE-2024-39296,0,0,1505e8dd09a63330ec5436e9f86022e9b63137e3bb41d294e6c4ca091f2e08ed,2024-06-25T18:50:42.040000
|
||||
CVE-2024-39298,0,0,ebc8c1ac57b6c8432c32f877ad1093e868a3d2381cb98ee4d7cf51055258ad60,2024-06-25T18:50:42.040000
|
||||
CVE-2024-3930,0,0,54b8e4aa07087aa149fa9bad599c7a18dec56c1b93dd2d2499327bc3c7940bbd,2024-07-31T12:57:02.300000
|
||||
CVE-2024-39300,1,1,4f8232620a681c36f4b5bce483afe0ae64bc18df8083ac115cfff8990dddafe5,2024-08-30T07:15:11.837000
|
||||
CVE-2024-39300,0,0,4f8232620a681c36f4b5bce483afe0ae64bc18df8083ac115cfff8990dddafe5,2024-08-30T07:15:11.837000
|
||||
CVE-2024-39301,0,0,72934b8f63bc52924fc16a3afe1a18dbebdfa8998d51203c594a2fbcffcac42e,2024-06-25T18:50:42.040000
|
||||
CVE-2024-39302,0,0,946c3f23cfe199dda1010c0ea47b1d5e32454ef20b5307dfd8e2dc92485c1baa,2024-07-01T12:37:24.220000
|
||||
CVE-2024-39303,0,0,e1d113aa825245b6d1e52862ebbf0ca8379af72327c1818fa556c736e7b07e25,2024-08-21T15:54:35.650000
|
||||
@ -257860,7 +257860,7 @@ CVE-2024-42400,0,0,bada445f5210525c2b124a846736c128f6bdefeabff1b80f8c8c07a166ac6
|
||||
CVE-2024-42408,0,0,4d58de4373d6b44540fc0d8799a258082f4b72e8c10ed3de4134395815aaf808,2024-08-29T14:22:45.603000
|
||||
CVE-2024-4241,0,0,1e8cfaace7e8ae3194846b1351a77e14aef6cd3a07b429e780198fa55ccad7c3,2024-05-17T02:40:19.957000
|
||||
CVE-2024-42411,0,0,3fcf900cd705b45045cb94d8edb3d48eeb6b58809490fd9c74760d8ca62aa9ff,2024-08-23T16:04:26.227000
|
||||
CVE-2024-42412,1,1,f1939953704b71865494dc61fca48c0d4f8122cc54bc9ba3f8d2a00cd7b2e075,2024-08-30T07:15:12.070000
|
||||
CVE-2024-42412,0,0,f1939953704b71865494dc61fca48c0d4f8122cc54bc9ba3f8d2a00cd7b2e075,2024-08-30T07:15:12.070000
|
||||
CVE-2024-42418,0,0,cd8cebc8a20c18f0027a896396b37c57ee369fd63657ca2801f50759cb9c420b,2024-08-23T16:18:28.547000
|
||||
CVE-2024-4242,0,0,9c58e9b9e77452c845f3c5179c3be4415982efd0430d3da14ab0345d444eccfb,2024-06-04T19:20:33.363000
|
||||
CVE-2024-4243,0,0,d19512e4db8434daba47c490442c83df13ecbcadaf4fb9c501fe6a2c921256d5,2024-06-04T19:20:33.497000
|
||||
@ -258745,6 +258745,7 @@ CVE-2024-44940,0,0,6d3559648bdfa621b46434f9855de2178fa1de08defe3fd31c71176641a2c
|
||||
CVE-2024-44941,0,0,15a1c7001949731e4df03f4a864ae7a9e64adc22c4c644da2de0836d77651385,2024-08-26T12:47:20.187000
|
||||
CVE-2024-44942,0,0,17b37362bd3ba24b1a5ce481b72105519e3d684fbcb26bdd0327529225c432f3,2024-08-27T16:09:10.010000
|
||||
CVE-2024-44943,0,0,5bf597bf2fa044f6eb0ba2afa66eeb4ae405658ddc3b2a597c7fedca3c5f2035,2024-08-28T12:57:17.117000
|
||||
CVE-2024-44944,1,1,44a2bb7751a9b3a40b91b3aa16853b1f12a7e148cfcf7fa54527c6deb34cf78b,2024-08-30T08:15:04.580000
|
||||
CVE-2024-4495,0,0,cb1d8bc801c43f7ab8180176a646c9e39a56603c1305eac804522af3adac0fa8,2024-05-17T02:40:25.167000
|
||||
CVE-2024-4496,0,0,6e858d3d5b48b877aff577f900a80fd10c799bd74cdf4188d346fa0d13641a80,2024-06-04T19:20:39.340000
|
||||
CVE-2024-4497,0,0,6a1d6365c146727895628930cc6e441179a183396cbc0224f0d3e640240772d3,2024-06-04T19:20:39.437000
|
||||
@ -261446,7 +261447,7 @@ CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8
|
||||
CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba96675,2024-08-21T15:49:59.470000
|
||||
CVE-2024-8007,0,0,52ca9c0e82e8a1b579386af92379a7290d3dc66a84196be21e42591213ed68f8,2024-08-23T17:06:04.643000
|
||||
CVE-2024-8011,0,0,b9eccdb873cdee0aa4aaf727a8d55e87a8f1a6dcd35fe88e6cae24de39ee4994,2024-08-26T12:47:20.187000
|
||||
CVE-2024-8016,1,1,04b6d82d870dda81cd99099c7980d168d7f6e5ae898d8f8f978a101e890eeb9b,2024-08-30T07:15:12.140000
|
||||
CVE-2024-8016,0,0,04b6d82d870dda81cd99099c7980d168d7f6e5ae898d8f8f978a101e890eeb9b,2024-08-30T07:15:12.140000
|
||||
CVE-2024-8022,0,0,469d074c70ed4d6e1b7ca7023005d3bb3e3f23419b5a39b3540fd69e34fadcaa,2024-08-21T12:30:33.697000
|
||||
CVE-2024-8023,0,0,7f1c10536d9d4e1a728f09b10c1ff35f77d0bba503a7c61c411fbfd5f6584d46,2024-08-21T12:30:33.697000
|
||||
CVE-2024-8030,0,0,b6f55198da4c8a890918e236b9cb91502d6b60f60aed340690526a7aff836eb3,2024-08-28T12:57:27.610000
|
||||
@ -261561,8 +261562,9 @@ CVE-2024-8301,0,0,a320b86a1c6d3602618f46f60fc09d8dff020322bb7a7b0e43fc9a496aef7f
|
||||
CVE-2024-8302,0,0,6aa1d8b6c4a0f124c66574ced2f9e480e232ca912559bf0084d593981c6213c1,2024-08-29T14:15:09.530000
|
||||
CVE-2024-8303,0,0,df216f6ed6991ebfcd8d04a527576b3dbc34dfc62eb0afc850512e7710171894,2024-08-29T15:15:34.783000
|
||||
CVE-2024-8304,0,0,0b11e3bd31707139d665525dc7f3be4c5c9aa682a3f15d2ded6c49c9b5d9a51b,2024-08-29T15:15:35.070000
|
||||
CVE-2024-8319,1,1,21440f1e80aabc203dfff6f5eb223560fc365a9cd6068459507b958339466757,2024-08-30T08:15:04.653000
|
||||
CVE-2024-8327,0,0,b3f1d55df9565148f9d1e1c8a655cde008cdfa7e182f7f35e153adec04e41b9f,2024-08-30T03:15:04.020000
|
||||
CVE-2024-8328,0,0,0eb65cb2bcbd94bffb10237fcb7b3578eb984f706ec3178c6a33aac4e483cc9d,2024-08-30T03:15:04.247000
|
||||
CVE-2024-8329,0,0,068d1da5d1f1460669ff4f0ddfb5ea97052d6609fbd555280053755d29a78999,2024-08-30T03:15:04.463000
|
||||
CVE-2024-8330,0,0,1d2f05a979d6309da597cf83ec43a159e1f5852252ed8cb59dfc8d12f376ce8c,2024-08-30T03:15:04.660000
|
||||
CVE-2024-8333,1,1,6f1ea39c4f9d2633b88ba89972fd9ac57009b75876255dbdb47a9abfdb00a2be,2024-08-30T06:15:05.577000
|
||||
CVE-2024-8333,0,0,6f1ea39c4f9d2633b88ba89972fd9ac57009b75876255dbdb47a9abfdb00a2be,2024-08-30T06:15:05.577000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user