mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-30 10:10:41 +00:00
Auto-Update: 2024-11-27T15:07:05.179255+00:00
This commit is contained in:
parent
3d47fb941d
commit
8af24746a1
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6190",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2023-12-27T15:15:45.900",
|
||||
"lastModified": "2024-09-26T13:15:03.870",
|
||||
"lastModified": "2024-11-27T13:15:16.383",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -18,11 +18,13 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -30,39 +32,37 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -106,6 +106,13 @@
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-23-0736",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-364xx/CVE-2024-36464.json
Normal file
56
CVE-2024/CVE-2024-364xx/CVE-2024-36464.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-36464",
|
||||
"sourceIdentifier": "security@zabbix.com",
|
||||
"published": "2024-11-27T14:15:17.830",
|
||||
"lastModified": "2024-11-27T14:15:17.830",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be expected to have access to these passwords."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@zabbix.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 2.7,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@zabbix.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-256"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.zabbix.com/browse/ZBX-25630",
|
||||
"source": "security@zabbix.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-536xx/CVE-2024-53603.json
Normal file
21
CVE-2024/CVE-2024-536xx/CVE-2024-53603.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-53603",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-27T14:15:18.943",
|
||||
"lastModified": "2024-11-27T14:15:18.943",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL Injection vulnerability was found in /covid-tms/password-recovery.php in PHPGurukul COVID 19 Testing Management System v1.0, which allows remote attackers to execute arbitrary code via the contactno POST request parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/COVID19/SQL%20Injection%20vulnerability.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-536xx/CVE-2024-53604.json
Normal file
21
CVE-2024/CVE-2024-536xx/CVE-2024-53604.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-53604",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-27T14:15:19.093",
|
||||
"lastModified": "2024-11-27T14:15:19.093",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL Injection vulnerability was found in /covid-tms/check_availability.php in PHPGurukul COVID 19 Testing Management System v1.0, which allows remote attackers to execute arbitrary code via the mobnumber POST request parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/COVID19/SQL%20Injection%20vulnerability%20mo.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-536xx/CVE-2024-53635.json
Normal file
21
CVE-2024/CVE-2024-536xx/CVE-2024-53635.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-53635",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-27T14:15:19.210",
|
||||
"lastModified": "2024-11-27T14:15:19.210",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in /covid-tms/patient-search-report.php in PHPGurukul COVID 19 Testing Management System v1.0, which allows remote attackers to execute arbitrary code via the searchdata POST request parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/COVID19/Reflected%20Cross%20Site%20Scripting.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
27
README.md
27
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-11-27T13:04:38.154623+00:00
|
||||
2024-11-27T15:07:05.179255+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-11-27T12:15:21.350000+00:00
|
||||
2024-11-27T14:15:19.210000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,31 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
271494
|
||||
271498
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `12`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2024-10521](CVE-2024/CVE-2024-105xx/CVE-2024-10521.json) (`2024-11-27T11:15:16.377`)
|
||||
- [CVE-2024-11009](CVE-2024/CVE-2024-110xx/CVE-2024-11009.json) (`2024-11-27T12:15:19.383`)
|
||||
- [CVE-2024-11025](CVE-2024/CVE-2024-110xx/CVE-2024-11025.json) (`2024-11-27T11:17:41.740`)
|
||||
- [CVE-2024-36468](CVE-2024/CVE-2024-364xx/CVE-2024-36468.json) (`2024-11-27T12:15:20.383`)
|
||||
- [CVE-2024-42326](CVE-2024/CVE-2024-423xx/CVE-2024-42326.json) (`2024-11-27T12:15:20.520`)
|
||||
- [CVE-2024-42327](CVE-2024/CVE-2024-423xx/CVE-2024-42327.json) (`2024-11-27T12:15:20.640`)
|
||||
- [CVE-2024-42328](CVE-2024/CVE-2024-423xx/CVE-2024-42328.json) (`2024-11-27T12:15:20.757`)
|
||||
- [CVE-2024-42329](CVE-2024/CVE-2024-423xx/CVE-2024-42329.json) (`2024-11-27T12:15:20.883`)
|
||||
- [CVE-2024-42330](CVE-2024/CVE-2024-423xx/CVE-2024-42330.json) (`2024-11-27T12:15:21.007`)
|
||||
- [CVE-2024-42331](CVE-2024/CVE-2024-423xx/CVE-2024-42331.json) (`2024-11-27T12:15:21.133`)
|
||||
- [CVE-2024-42332](CVE-2024/CVE-2024-423xx/CVE-2024-42332.json) (`2024-11-27T12:15:21.240`)
|
||||
- [CVE-2024-42333](CVE-2024/CVE-2024-423xx/CVE-2024-42333.json) (`2024-11-27T12:15:21.350`)
|
||||
- [CVE-2024-36464](CVE-2024/CVE-2024-364xx/CVE-2024-36464.json) (`2024-11-27T14:15:17.830`)
|
||||
- [CVE-2024-53603](CVE-2024/CVE-2024-536xx/CVE-2024-53603.json) (`2024-11-27T14:15:18.943`)
|
||||
- [CVE-2024-53604](CVE-2024/CVE-2024-536xx/CVE-2024-53604.json) (`2024-11-27T14:15:19.093`)
|
||||
- [CVE-2024-53635](CVE-2024/CVE-2024-536xx/CVE-2024-53635.json) (`2024-11-27T14:15:19.210`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2023-6190](CVE-2023/CVE-2023-61xx/CVE-2023-6190.json) (`2024-11-27T13:15:16.383`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
30
_state.csv
30
_state.csv
@ -240779,7 +240779,7 @@ CVE-2023-6186,0,0,d68614e5e480bde3c119699078915790643773d39c9b86d77588addbc5ce98
|
||||
CVE-2023-6187,0,0,d9eb138ea8023334144c49cbf6eb836ec6df4b898efa6e653646565603691375,2023-11-24T23:02:44.967000
|
||||
CVE-2023-6188,0,0,e250e19320c109f588fc9c76d50c1e2bfb56ceb457f3b783c3ac1604daea32a5,2024-05-17T02:33:34.023000
|
||||
CVE-2023-6189,0,0,2da8575dab162b62bd0b6b15c8647d1a4bc80efaef21417e00cdd630ba59fb69,2024-08-28T09:15:10.283000
|
||||
CVE-2023-6190,0,0,7c56b5cbf4761968b2f4f2896351582f08e445198de538604daefc45d0e40f64,2024-09-26T13:15:03.870000
|
||||
CVE-2023-6190,0,1,6ebe153522cdd9a5b7cce0859203eda37db87e42270038ed20c7a4d667dbbb26,2024-11-27T13:15:16.383000
|
||||
CVE-2023-6191,0,0,2fd86bf12f767768bf44bce1f98c2aa7dd8f1128c1b9261443debc15184933fb,2024-03-29T12:45:02.937000
|
||||
CVE-2023-6193,0,0,d42fb17567af4d0afc488a5cd966b8f824e3214747af964e4dc27e355c7f7325,2023-12-14T20:19:39.233000
|
||||
CVE-2023-6194,0,0,0e8ffacc29e7736ab3e1b4c30539ee59c11d0a0b7616a6227776d55a81f62753,2023-12-13T22:02:56.613000
|
||||
@ -243034,7 +243034,7 @@ CVE-2024-10515,0,0,907400a34dad51b072b2c37123f6c966421eb7a65eb80907a16cb7d23ffaf
|
||||
CVE-2024-10519,0,0,764e527fb6f6b94c2143fe0825f329c8a5cf4ea95dfe91426d264d50631dfd38,2024-11-23T10:15:03.600000
|
||||
CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef0f,2024-02-15T18:49:40.180000
|
||||
CVE-2024-10520,0,0,5acdd0c5659959d9ac18fb296c8b0ca775c2f72b2836f5d69fce1935ac3f49b0,2024-11-20T12:15:18.390000
|
||||
CVE-2024-10521,1,1,c9da060d6595e4ec2c8c1bc9dc2f23373c5f4ef4a22cfe263590df92664cafb5,2024-11-27T11:15:16.377000
|
||||
CVE-2024-10521,0,0,c9da060d6595e4ec2c8c1bc9dc2f23373c5f4ef4a22cfe263590df92664cafb5,2024-11-27T11:15:16.377000
|
||||
CVE-2024-10523,0,0,a761a52195ca091ecc100fefe31fd4eadda4d831fe94860e2a159923b6d0d68d,2024-11-08T15:14:30.070000
|
||||
CVE-2024-10524,0,0,d6a77c8f99978db429152e8948353f8166b552c9c91594d95f4a0f83de9c3b77,2024-11-19T21:57:32.967000
|
||||
CVE-2024-10525,0,0,cfad79154f466fe96736eabfa65cac8f6409e21deb7f07d79c02c68ee3f19eb2,2024-11-01T12:57:03.417000
|
||||
@ -243354,7 +243354,7 @@ CVE-2024-11004,0,0,ae81cd254161ae2b32edcbdeb3c8b9257e0a408bd5a5695d4038ccc9e5ada
|
||||
CVE-2024-11005,0,0,11c6f0332fc033e5f19567e3b4704591ec391ce7bb38c717fd45eebf4e8bd80e,2024-11-22T17:15:06.803000
|
||||
CVE-2024-11006,0,0,94626099ce68e5d3e4adfe80a73960f4ad7b764747da2022a8d4006ce81886f0,2024-11-22T17:15:06.913000
|
||||
CVE-2024-11007,0,0,1b7cb423a44a1b52eace4d0dd49c5a2595b64560938ff2e6db5720c2cacde7e4,2024-11-22T17:15:07.010000
|
||||
CVE-2024-11009,1,1,115302054b496d5330000abb5b2ae7ca4e42b96af6060e0afa759c2b42da2cba,2024-11-27T12:15:19.383000
|
||||
CVE-2024-11009,0,0,115302054b496d5330000abb5b2ae7ca4e42b96af6060e0afa759c2b42da2cba,2024-11-27T12:15:19.383000
|
||||
CVE-2024-11016,0,0,d24a4ef547b8db93612dd948add59f18f08d5f729dd643b0e0ee56cabc76c4d5,2024-11-14T21:53:49.530000
|
||||
CVE-2024-11017,0,0,ab5b812ba875ac414948341726ed7477cbf933e4e3125c9e1588639952afa8fb,2024-11-18T18:47:19.347000
|
||||
CVE-2024-11018,0,0,d8e9fe6756681329230c9b8926201f074068758f36b1a3228317fe149366f559,2024-11-18T18:59:01.513000
|
||||
@ -243364,7 +243364,7 @@ CVE-2024-11020,0,0,d8da56d08b04c1b6283579c38861d54ff29b7503469ff5458753549fabf50
|
||||
CVE-2024-11021,0,0,5330750d11b3fde718ec5c3eb7f0a1e1a342a8ecd281acc88c611cccbde0d765,2024-11-18T19:00:03.487000
|
||||
CVE-2024-11023,0,0,2473f75aeae9518b2cbff4e6006b6c4d1b296463725df83234e5d555adc056df,2024-11-18T17:11:17.393000
|
||||
CVE-2024-11024,0,0,fdd235bc026a01ae98bcf6f4aacaacc2569951a9e4c3435d41b8fce72f321275,2024-11-26T11:21:58.660000
|
||||
CVE-2024-11025,1,1,51ef2781824cbb1e5ad5a3093b4ee510c5b9ab10b930b0d0a4e2edd5971f47cb,2024-11-27T11:17:41.740000
|
||||
CVE-2024-11025,0,0,51ef2781824cbb1e5ad5a3093b4ee510c5b9ab10b930b0d0a4e2edd5971f47cb,2024-11-27T11:17:41.740000
|
||||
CVE-2024-11026,0,0,3376b35079ed775d06158f58b13b5386f7c428e65da575e6798ec45cd45989af,2024-11-23T01:44:05.947000
|
||||
CVE-2024-11028,0,0,048d97dceb7a67eae16e2a68b764bd9aa80522dc4afab479a09ba11fca5d2735,2024-11-19T15:38:19.023000
|
||||
CVE-2024-1103,0,0,7224a9abc8ad2624b19754063e5e3f1dd278d487bc1541d6b3a3ae6b5907a9fc,2024-05-17T02:35:14.273000
|
||||
@ -256947,8 +256947,9 @@ CVE-2024-36460,0,0,bbabfb77ed13665b2f83da6b0ffc7e381ebea4b3775c3fd0f432285e89fa8
|
||||
CVE-2024-36461,0,0,1492820ff91f8a0ca552f77a0cc3204473eca2ddebdc07ea864ab1d5ead243e6,2024-08-12T13:41:36.517000
|
||||
CVE-2024-36462,0,0,001a30dd1b16f7c59c0f76df5bb3efac865a294dd0797ea3f46bab58db0a946d,2024-08-12T13:41:36.517000
|
||||
CVE-2024-36463,0,0,8978fef68553bf1e6ce880013b6b190eb1f68cf43eb103bdcce883e0058ad239,2024-11-26T15:15:31.827000
|
||||
CVE-2024-36464,1,1,4468fd79d16e7d8211b260a93edc04e24fb911f84e0315710485e7f7b0f5d524,2024-11-27T14:15:17.830000
|
||||
CVE-2024-36467,0,0,03651fe407f287b4f31d04330d78d3d0df58b2090b61d141abad7651b60f6bef,2024-11-27T07:15:09.080000
|
||||
CVE-2024-36468,1,1,a1a69f17f127b9997e48c8eae8d787ef452ca48bf96357a7155896c9b8880e6a,2024-11-27T12:15:20.383000
|
||||
CVE-2024-36468,0,0,a1a69f17f127b9997e48c8eae8d787ef452ca48bf96357a7155896c9b8880e6a,2024-11-27T12:15:20.383000
|
||||
CVE-2024-3647,0,0,e692fc1fd5d3cf9f103fd75a1aca6bf5cd926bde53ed2fb4c9f367b74741ee51,2024-05-02T18:00:37.360000
|
||||
CVE-2024-36470,0,0,05049c8242b38f083734214f212efa24bf0b8e7684b3d943061a8cbb7c06a55b,2024-05-31T14:15:10.607000
|
||||
CVE-2024-36471,0,0,6e10c8a6f7211dd42a1163cc28818f3c443a2860a609ca58841954b595f68033,2024-07-03T02:03:13.647000
|
||||
@ -261027,15 +261028,15 @@ CVE-2024-42320,0,0,9ab2cff26285853f85d66a38705f8fa32d92402cfa798a6b747cef97addd9
|
||||
CVE-2024-42321,0,0,1716db5db6c984bf2ebbd691b80440a9181fa253c6bc8c5d00954d830484e312,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42322,0,0,2accb2a45b605eba549de2a0c83236102f9dab689f1b61dc800f0c45a0f92db4,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42323,0,0,53a82aa56b3376607f69ef6442a0c95be14356f4dffb06936b0b758d7aae490a,2024-09-26T13:32:55.343000
|
||||
CVE-2024-42326,1,1,246808a114ef171dee20a7ef8105d8f4ca4ff859892292a135d1ecfcadbde605,2024-11-27T12:15:20.520000
|
||||
CVE-2024-42327,1,1,3e95e06f302a7dab0d09f35a54e118d5df3b80fef701330842067150a1a0db5a,2024-11-27T12:15:20.640000
|
||||
CVE-2024-42328,1,1,5d4168c2f60f67f57b57655fc13e528935902700046cedde04e56138d4c9be42,2024-11-27T12:15:20.757000
|
||||
CVE-2024-42329,1,1,a5b49fb6e5174f093b77e9976b87ee7bc63ca05d21adc1c5586d0811960ae761,2024-11-27T12:15:20.883000
|
||||
CVE-2024-42326,0,0,246808a114ef171dee20a7ef8105d8f4ca4ff859892292a135d1ecfcadbde605,2024-11-27T12:15:20.520000
|
||||
CVE-2024-42327,0,0,3e95e06f302a7dab0d09f35a54e118d5df3b80fef701330842067150a1a0db5a,2024-11-27T12:15:20.640000
|
||||
CVE-2024-42328,0,0,5d4168c2f60f67f57b57655fc13e528935902700046cedde04e56138d4c9be42,2024-11-27T12:15:20.757000
|
||||
CVE-2024-42329,0,0,a5b49fb6e5174f093b77e9976b87ee7bc63ca05d21adc1c5586d0811960ae761,2024-11-27T12:15:20.883000
|
||||
CVE-2024-4233,0,0,e3336c43dd885f8db6271cd8e49f7796169d1b724e733d53d39e8dcd56cab238,2024-05-08T17:05:24.083000
|
||||
CVE-2024-42330,1,1,86fb4651088a7b32f318b9f5d7d5633456f65948689d6437a7c7cec921cc5d8a,2024-11-27T12:15:21.007000
|
||||
CVE-2024-42331,1,1,7f0278d899d815d21c508b19c4d5fb38665a50e831c209109d30035ab0b63530,2024-11-27T12:15:21.133000
|
||||
CVE-2024-42332,1,1,87bba2b8056e4485c89d5e6137c18b43b8af2928fd4428c6b17b96c5ca65da6e,2024-11-27T12:15:21.240000
|
||||
CVE-2024-42333,1,1,20d7088665229dc8dc2949c8818ace021a73357ba9c05d4e948ee18f72c94022,2024-11-27T12:15:21.350000
|
||||
CVE-2024-42330,0,0,86fb4651088a7b32f318b9f5d7d5633456f65948689d6437a7c7cec921cc5d8a,2024-11-27T12:15:21.007000
|
||||
CVE-2024-42331,0,0,7f0278d899d815d21c508b19c4d5fb38665a50e831c209109d30035ab0b63530,2024-11-27T12:15:21.133000
|
||||
CVE-2024-42332,0,0,87bba2b8056e4485c89d5e6137c18b43b8af2928fd4428c6b17b96c5ca65da6e,2024-11-27T12:15:21.240000
|
||||
CVE-2024-42333,0,0,20d7088665229dc8dc2949c8818ace021a73357ba9c05d4e948ee18f72c94022,2024-11-27T12:15:21.350000
|
||||
CVE-2024-42334,0,0,bde83a8b3e1fda08d590302dc4b567a00367ef315528bceb61555d7d23e4876c,2024-09-08T12:15:09.880000
|
||||
CVE-2024-42335,0,0,2b9b97973dd654c6eb68cc221bad7788b92938b457385b73625ca969f07db996,2024-08-21T13:49:19.863000
|
||||
CVE-2024-42336,0,0,74e57bfa6ceb0764665eac825d78f0a67cb52357a0fbd794d7fcb504d5103724,2024-08-27T14:59:38.100000
|
||||
@ -267630,11 +267631,14 @@ CVE-2024-5359,0,0,0dc709734361df5232c8a75ae2b832e7f1398579fd9d2edbd5174e887cf59e
|
||||
CVE-2024-53597,0,0,9a4c545b5865d03e7d82c6ef3ae0f046b57734eab4f58e2724c4e5178d1b9adb,2024-11-25T22:15:19.340000
|
||||
CVE-2024-53599,0,0,fd3383bf56de062fbdbeb229ef5252493e3482e4bcfabf0584010575f7387ef2,2024-11-25T21:15:21.993000
|
||||
CVE-2024-5360,0,0,9a09bdfd8f70d621de992279dbf64a12a444818faeedf82bbd859ed192a0d3f0,2024-05-28T12:39:42.673000
|
||||
CVE-2024-53603,1,1,d57f4c60f86f1577dccfdaf7c8a5f39eb0759e1e9d3fb803b03859a5eb961b5d,2024-11-27T14:15:18.943000
|
||||
CVE-2024-53604,1,1,47936311e2d1f5cc406b15d873639f8f4b058cff6af769b5c54ad5fe621ee21e,2024-11-27T14:15:19.093000
|
||||
CVE-2024-5361,0,0,5486d2207143454b44a9225276732f9ee62f5258ee0c41c9fa5501a1b55451e4,2024-05-28T12:39:42.673000
|
||||
CVE-2024-53619,0,0,7d24d177db4282b10dd583a800553384958865a9c2b032eab35d21cf889272f3,2024-11-26T20:15:33.880000
|
||||
CVE-2024-5362,0,0,5b47523dd74fc943fbc0021df1551e4d13ec69c02c41616d4b2935f18460ef93,2024-06-04T19:21:06.287000
|
||||
CVE-2024-53620,0,0,9d59f48eff7094eebabf16396953b43066a8c0a92b748f43ae8922b5e2bf6319,2024-11-26T20:15:34.050000
|
||||
CVE-2024-5363,0,0,bb04284a4e58fb2effb3b9c467567f3bbd6015eb64c220429872004dc6821b06,2024-06-04T19:21:06.390000
|
||||
CVE-2024-53635,1,1,49b4054e38e70319300cf37323e732b469b9fb45e2df27cf28379c7859a0f5bf,2024-11-27T14:15:19.210000
|
||||
CVE-2024-5364,0,0,96afe929167b2de1681dda607a064227a5b629af3adb1987caaf0917b62b92a8,2024-06-04T19:21:06.490000
|
||||
CVE-2024-5365,0,0,4b68a39efcc7d1fdd266d085800e02f841a36aae12ede01463956a125c285501,2024-06-04T19:21:06.587000
|
||||
CVE-2024-5366,0,0,ebdb50e85f32d3970264d5045d82ce95c8965c12926ca2c779990bb15b24ffc0,2024-06-04T19:21:06.690000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user