mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-03-29T00:55:30.511190+00:00
This commit is contained in:
parent
9ff0ed2320
commit
9503cf5c13
28
CVE-2021/CVE-2021-311xx/CVE-2021-31156.json
Normal file
28
CVE-2021/CVE-2021-311xx/CVE-2021-31156.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2021-31156",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T23:15:45.987",
|
||||
"lastModified": "2024-03-28T23:15:45.987",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Allied Telesis AT-S115 1.2.0 devices before 1.00.024 with Boot Loader 1.00.006 allow Directory Traversal to achieve partial access to data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/NitescuLucian/69cf22d17bf190325118304be04828e8",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.alliedtelesis.com/en/documents/software-release-notes-s115-v120",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.alliedtelesis.com/sites/default/files/documents/release-notes/ats115v120srna.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-335xx/CVE-2023-33528.json
Normal file
24
CVE-2023/CVE-2023-335xx/CVE-2023-33528.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-33528",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T23:15:46.070",
|
||||
"lastModified": "2024-03-28T23:15:46.070",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "halo v1.6.0 is vulnerable to Cross Site Scripting (XSS)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/alert-moyan/be0bd087d85c1416829b8e9659e8b66c",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/halo-dev/halo/releases/tag/v1.6.0",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-509xx/CVE-2023-50969.json
Normal file
24
CVE-2023/CVE-2023-509xx/CVE-2023-50969.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-50969",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T23:15:46.137",
|
||||
"lastModified": "2024-03-28T23:15:46.137",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Thales Imperva SecureSphere WAF 14.7.0.40 allows remote attackers to bypass WAF rules via a crafted POST request, a different vulnerability than CVE-2021-45468."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.imperva.com/bundle/v14.7-waf-administration-guide/page/9282.htm",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.hoyahaxa.com/2024/03/imperva-waf-bypass-cve-2023-50969.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24399",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-25T21:15:09.563",
|
||||
"lastModified": "2024-01-29T15:57:59.413",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-28T23:15:46.200",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -68,12 +68,20 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/capture0x/leptoncms",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/capture0x/leptoncms/blob/main/README.md",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/176647/Lepton-CMS-7.0.0-Remote-Code-Execution.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-244xx/CVE-2024-24407.json
Normal file
24
CVE-2024/CVE-2024-244xx/CVE-2024-24407.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-24407",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T23:15:46.283",
|
||||
"lastModified": "2024-03-28T23:15:46.283",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability in Best Courier management system v.1.0 allows a remote attacker to obtain sensitive information via print_pdets.php component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/modian-un/CVE/blob/main/Barangay%20Population%20Monitoring%20System.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/modian-un/CVE/blob/main/Best%20courier%20management%20system.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-284xx/CVE-2024-28456.json
Normal file
28
CVE-2024/CVE-2024-284xx/CVE-2024-28456.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-28456",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T23:15:46.340",
|
||||
"lastModified": "2024-03-28T23:15:46.340",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in Campcodes Online Marriage Registration System v.1.0 allows a remote attacker to execute arbitrary code via the text fields in the marriage registration request form."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1J3-mKlXpHYqOwlUyffRT-ibWa0joB3xC/view?usp=sharing",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://pastebin.com/CYMDR4ss",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.campcodes.com/projects/php/online-marriage-registration-system/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2024/CVE-2024-287xx/CVE-2024-28714.json
Normal file
32
CVE-2024/CVE-2024-287xx/CVE-2024-28714.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2024-28714",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T23:15:46.410",
|
||||
"lastModified": "2024-03-28T23:15:46.410",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability in CRMEB_Java e-commerce system v.1.3.4 allows an attacker to execute arbitrary code via the groupid parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://crmebjava.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitee.com/ZhongBangKeJi/crmeb_java",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/JiangXiaoBaiJia/cve2/blob/main/1.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/JiangXiaoBaiJia/cve2/blob/main/a.png",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-293xx/CVE-2024-29316.json
Normal file
24
CVE-2024/CVE-2024-293xx/CVE-2024-29316.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-29316",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T23:15:46.470",
|
||||
"lastModified": "2024-03-28T23:15:46.470",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NodeBB 3.6.7 is vulnerable to Incorrect Access Control."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://medium.com/%40krityamkarma858041/broken-access-control-nodebb-v3-6-7-eebc59c24deb",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://nodebb.org/bounty/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2024/CVE-2024-294xx/CVE-2024-29489.json
Normal file
32
CVE-2024/CVE-2024-294xx/CVE-2024-29489.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2024-29489",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T23:15:46.527",
|
||||
"lastModified": "2024-03-28T23:15:46.527",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jerryscript 2.4.0 has SEGV at ./jerry-core/ecma/base/ecma-helpers.c:238:58 in ecma_get_object_type."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/gandalf4a/9826a897ae1e3c8d1c7e71a1ec71d415",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jerryscript-project/jerryscript/commit/cefd391772529c8a9531d7b3c244d78d38be47c6",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jerryscript-project/jerryscript/issues/5101",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jerryscript-project/jerryscript/pull/5129",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
README.md
21
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-28T23:00:38.762142+00:00
|
||||
2024-03-29T00:55:30.511190+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-28T22:15:09.170000+00:00
|
||||
2024-03-28T23:15:46.527000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,21 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
243253
|
||||
243261
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `8`
|
||||
|
||||
- [CVE-2023-25341](CVE-2023/CVE-2023-253xx/CVE-2023-25341.json) (`2024-03-28T22:15:09.170`)
|
||||
- [CVE-2024-23727](CVE-2024/CVE-2024-237xx/CVE-2024-23727.json) (`2024-03-28T21:16:01.413`)
|
||||
- [CVE-2021-31156](CVE-2021/CVE-2021-311xx/CVE-2021-31156.json) (`2024-03-28T23:15:45.987`)
|
||||
- [CVE-2023-33528](CVE-2023/CVE-2023-335xx/CVE-2023-33528.json) (`2024-03-28T23:15:46.070`)
|
||||
- [CVE-2023-50969](CVE-2023/CVE-2023-509xx/CVE-2023-50969.json) (`2024-03-28T23:15:46.137`)
|
||||
- [CVE-2024-24407](CVE-2024/CVE-2024-244xx/CVE-2024-24407.json) (`2024-03-28T23:15:46.283`)
|
||||
- [CVE-2024-28456](CVE-2024/CVE-2024-284xx/CVE-2024-28456.json) (`2024-03-28T23:15:46.340`)
|
||||
- [CVE-2024-28714](CVE-2024/CVE-2024-287xx/CVE-2024-28714.json) (`2024-03-28T23:15:46.410`)
|
||||
- [CVE-2024-29316](CVE-2024/CVE-2024-293xx/CVE-2024-29316.json) (`2024-03-28T23:15:46.470`)
|
||||
- [CVE-2024-29489](CVE-2024/CVE-2024-294xx/CVE-2024-29489.json) (`2024-03-28T23:15:46.527`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2024-24399](CVE-2024/CVE-2024-243xx/CVE-2024-24399.json) (`2024-03-28T23:15:46.200`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
14
_state.csv
14
_state.csv
@ -175125,6 +175125,7 @@ CVE-2021-31152,0,0,f9f969e2f21821ff2cd531a2917c79010580fdf7cbf4b08f070593333ccb1
|
||||
CVE-2021-31153,0,0,7785500ba48a2dc7262292a7b799668c2f6defcf39c3c203a1dfadea9d60d5f7,2022-07-12T17:42:04.277000
|
||||
CVE-2021-31154,0,0,cb899f74c2949bf579f6c460967cea91a3e63ab552650da46a81434378ee45bb,2022-07-12T17:42:04.277000
|
||||
CVE-2021-31155,0,0,81c69b6114ddb1e01fa86b4fb3b5e7eb2234117f912395b273e8f19af8ad7a4f,2022-07-12T17:42:04.277000
|
||||
CVE-2021-31156,1,1,3e2b8705617f89b43be57ef7b7e5fce9613e0ae6432cad1f67f4da42329d3409,2024-03-28T23:15:45.987000
|
||||
CVE-2021-31158,0,0,984fa7451b2f15dba3db5533b348fee1c44214455775671e8523d328308f3dc2,2021-05-25T18:58:43.340000
|
||||
CVE-2021-31159,0,0,18961609795bb1965beee7dd2b9b095aa22b3c4e02bb0fb0a8d5a3ef42c5a136,2021-07-09T12:49:54.783000
|
||||
CVE-2021-3116,0,0,9eb2d46ae82da106efedea30c9ad153b0088435acac7925372ca658c9c24e69c,2024-02-15T21:40:16.967000
|
||||
@ -217779,7 +217780,7 @@ CVE-2023-25314,0,0,3743d0c9e50521d70cf11419f7682afb137701fa142843839545a4d06772b
|
||||
CVE-2023-2533,0,0,5b291b5a4da0ce270a0998cf7579a2d92bb41802c75dee372670f3b39c86c5b6,2023-07-06T06:15:09.187000
|
||||
CVE-2023-25330,0,0,1d34ded8efb09882ecc94bc0c54c6642c8c9f90bcd6256e4c0c4145959e7d360,2023-04-14T15:56:58.037000
|
||||
CVE-2023-2534,0,0,cbf2235e236a9fecbc915b515384698385bb8cee3f0db459609fb77cb994f702,2023-05-16T14:13:26.960000
|
||||
CVE-2023-25341,1,1,0abe620af0f8b024e91887ec3af7d0bfea231ea62df217fbd88e4add78f4a278,2024-03-28T22:15:09.170000
|
||||
CVE-2023-25341,0,0,0abe620af0f8b024e91887ec3af7d0bfea231ea62df217fbd88e4add78f4a278,2024-03-28T22:15:09.170000
|
||||
CVE-2023-25344,0,0,70930816741e589876da5cc17dad38d72bdcf8c6364a31653eeeff2e7e5aab9f,2023-03-18T03:50:33.213000
|
||||
CVE-2023-25345,0,0,0819b86a10c46dfc6b4916cd9d6a84fb1146abfef39eb367102fc26ff1f157a2,2023-03-18T03:50:49.197000
|
||||
CVE-2023-25346,0,0,d1a72e111f750bdf492093672cf4c1ba05fa5d73c6414753b6e1e7d516b59eaa,2023-04-28T02:58:53.080000
|
||||
@ -224016,6 +224017,7 @@ CVE-2023-33515,0,0,e9d5e815b9fa0bd8e76c16f8a6b04d077c2f8e142f4fd45070284dd4d5af7
|
||||
CVE-2023-33517,0,0,55322461299b007ea98b09a3e665cf2b2a9bd20512224dfe92e08d8c8782880b,2023-10-31T13:05:39.123000
|
||||
CVE-2023-33518,0,0,9dfce43bc9bb597c2fba73cb32f7e523d0d830245a1cc5a183ae354bb6ab5ea2,2023-06-12T13:39:52.733000
|
||||
CVE-2023-33524,0,0,f6e278f1aeb2f4aeabae6c940486b3d31a90da00c9018b3b37a888e77c64feae,2023-06-09T22:54:48.677000
|
||||
CVE-2023-33528,1,1,a7efa10b18943b638c4fdeb8df3ca2e64040f01f913bf8c613e9bd40b8b6e3e3,2024-03-28T23:15:46.070000
|
||||
CVE-2023-33530,0,0,49a8dd9117dd19e85174f34531a1e5c2f07e0743d0165513391d7aab9c7a0bea,2023-06-15T12:09:13.407000
|
||||
CVE-2023-33532,0,0,6f993c58fac28e5ef9a6507c0e12040a1494cf7cfc8203b0e24a6bd931a6d035,2023-06-12T16:39:14.450000
|
||||
CVE-2023-33533,0,0,fe9ae303f2ad2f29c2843c442a610d15370358039022a2dac97620b00cb9ffca,2023-06-14T20:41:17.157000
|
||||
@ -235327,6 +235329,7 @@ CVE-2023-50965,0,0,7d1de52a11bce456c4c16ef773b97b5e53898c75617739b3525f486b2a632
|
||||
CVE-2023-50966,0,0,61bd184de2d822d9519b7baae2f5c3be8eb08057419c607e96f3ad3280f29e46,2024-03-19T16:33:58.680000
|
||||
CVE-2023-50967,0,0,58bdc54872aaf156099111ca39c0a0bf2aa57001b3ff71edbbd2bfea66f2ac17,2024-03-20T17:18:21.343000
|
||||
CVE-2023-50968,0,0,1be7697af13b25532d69588f5ad5851b1702b3a38866422424919ca1d182ecbc,2024-01-04T03:01:53.323000
|
||||
CVE-2023-50969,1,1,491c0c7cec6ea3984215d829cb791fcce274e6396b20674f6b892e4ceec9a606,2024-03-28T23:15:46.137000
|
||||
CVE-2023-5097,0,0,0f86cc372d2c26b6541ac3ec5ba289a39a168bf65c355711efa9e745857fe3d2,2024-01-23T19:29:08.583000
|
||||
CVE-2023-50974,0,0,64121c933f739d8b35ccb2b018adc49dbc3ecd37fb638c0ca9261e8aa268c1c8,2024-01-12T20:25:04.120000
|
||||
CVE-2023-50975,0,0,a3c387351b5cb3112ae57eb6decd6048c7e5563bc70bcc034afc09ab81c61e0e,2024-02-22T19:07:27.197000
|
||||
@ -240824,7 +240827,7 @@ CVE-2024-23722,0,0,38e4afcdeed536b1189b96cd2e826d0a0039b5151073f4df55924a643f5fb
|
||||
CVE-2024-23724,0,0,47401decfa65f84dd047eaa15adb1a17aa44914fc15b5198b908ecf69c381f70,2024-03-21T02:52:08.230000
|
||||
CVE-2024-23725,0,0,e7109aa5ed154918326c3254d584acf7e8190c7c6acd985ea1145474ef362350,2024-01-29T15:25:48.110000
|
||||
CVE-2024-23726,0,0,1e6b5838c3bbe1bdea4cff85e0dab09275e17fdbeddbc74981e476f308132713,2024-01-29T15:25:36.090000
|
||||
CVE-2024-23727,1,1,a31c704cc9465a2529706ba7ad3c49a4dfe5ff0994e007c3dcb3700eaac32ea8,2024-03-28T21:16:01.413000
|
||||
CVE-2024-23727,0,0,a31c704cc9465a2529706ba7ad3c49a4dfe5ff0994e007c3dcb3700eaac32ea8,2024-03-28T21:16:01.413000
|
||||
CVE-2024-23730,0,0,d92f048ce6391682e60079e47ad5c6180f200f01a67f3ef72f3e5b2c01bc2cc3,2024-01-29T15:22:56.753000
|
||||
CVE-2024-23731,0,0,204152b9ab32090d3f201504afd34c062c39bfd578f661ea797bbd83dd0dc3fb,2024-01-26T21:11:25.430000
|
||||
CVE-2024-23732,0,0,042666c99b3635fb407c7af7c818760f4159a23a8e9e6c2822d5ba07aae8999c,2024-01-26T21:11:51.840000
|
||||
@ -241133,9 +241136,10 @@ CVE-2024-24393,0,0,90dfcf43d684735b8235a3326fe419899f2f2a761b862d82b04f2c974933d
|
||||
CVE-2024-24396,0,0,490bf819c482001abd1dcba25c4c319f8da0b154dd54e7da19b5736b32d31753,2024-02-14T17:58:05.850000
|
||||
CVE-2024-24397,0,0,c42f6e3d95ec1079046817a9a19cbab9b7268b0d74721cd48822bbfd3065325f,2024-02-22T03:39:02.803000
|
||||
CVE-2024-24398,0,0,f4bfb9d92cdfc220b232a85deeb8216b709f2d184cff7e693fbf714bca45d499,2024-02-13T16:06:17.117000
|
||||
CVE-2024-24399,0,0,353ec2da6e48e6292145d6b75abe75b7e4722004c5ee075b39e05af1ecc581a2,2024-01-29T15:57:59.413000
|
||||
CVE-2024-24399,0,1,2e7582d8cf05fc5cc0390390d8153875357f61ad246771dec4b700cc1f20bef3,2024-03-28T23:15:46.200000
|
||||
CVE-2024-24401,0,0,ec06c8cf90df05f5e4115d49f7ce6be6908f7d5473423eaeaae838929ca6fe04,2024-02-26T22:10:40.463000
|
||||
CVE-2024-24402,0,0,97bd4ff0a8ca6538f4d318e89076733036a976638fa55c2c6b338003bd50f01d,2024-02-26T22:10:40.463000
|
||||
CVE-2024-24407,1,1,dfd166a0396fad142fa1842ddf89ba32c2d37e0cbc42b7b3bb5d41e8fcd6dfe2,2024-03-28T23:15:46.283000
|
||||
CVE-2024-2442,0,0,0d54231b215523b626c71b7463aad779d480c5846b076b4b0c6a1642731e806f,2024-03-20T13:00:16.367000
|
||||
CVE-2024-2443,0,0,87198108d503c5a711df7bfcf0fb226ea0f7baf969bd1bb248e1ffaed5765227,2024-03-21T12:58:51.093000
|
||||
CVE-2024-2445,0,0,3aece2c7d99f4f988e852fe4d4830ce49e1f7b44f3ea5261c934033985be71a4,2024-03-15T12:53:06.423000
|
||||
@ -242706,6 +242710,7 @@ CVE-2024-28441,0,0,5f38f329aa34d3551b4435a62b00ae0d72806d981cac257e26fcd8895c19c
|
||||
CVE-2024-28442,0,0,9ea96c60b8ff6baa7d1ad057217e5f7850dd6ddd87730a2235900122a8b6a92d,2024-03-27T12:29:30.307000
|
||||
CVE-2024-28446,0,0,e3b0d814ee24ce9a2740eda808696f714c3071d6722fa7bd76f62923d12a194d,2024-03-19T13:26:46
|
||||
CVE-2024-28447,0,0,729795bf39bd106c71b5b798b10fa8f526cc5d6a6eb2785b0edfa8459a535a4c,2024-03-19T13:26:46
|
||||
CVE-2024-28456,1,1,fcb5ac20687af886221b35c86b831614d98d5a19b95318ec9a5956bebad1a619,2024-03-28T23:15:46.340000
|
||||
CVE-2024-2849,0,0,689f01009061efff1ee0cd29db14c96053c4b561f68402f2590b4aaf791eded8,2024-03-26T09:15:11.360000
|
||||
CVE-2024-2850,0,0,18a7df7924646d54c8018dc44d3ceaaa7b16c75f99276cbe6ac98b765122f744,2024-03-26T03:15:24.927000
|
||||
CVE-2024-2851,0,0,9a668cf4331e419a65111b1e6f8abf3e27bc0fce212b623cd8a47fdd549e170b,2024-03-26T03:15:36.833000
|
||||
@ -242778,6 +242783,7 @@ CVE-2024-28682,0,0,2c53ed716809a76ded005fd10ac6d93891dbf2dd9f02238c66f1445af60cb
|
||||
CVE-2024-28683,0,0,14fce1fb8fe5dd3fb68153125dd387047f48de59cd587ce41acfe8b0e8fa04c2,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28684,0,0,df89c702874c46527da5dc5bf33ec252c05a69f53466623f5ca04f0566a6cd25,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28713,0,0,e08dea2bd6ea41c86adfd6db0e66602ac0ddbc5b76865cfa0864771acc3659ff,2024-03-28T20:53:20.813000
|
||||
CVE-2024-28714,1,1,f9aefa5087de23ca950905efa5a769afbdc8d742b5645553e7deb42ec7068ba8,2024-03-28T23:15:46.410000
|
||||
CVE-2024-28715,0,0,af77246106a78842a7b294f3e28f52ff784cab47ce869925f80951f17109d52a,2024-03-20T13:00:16.367000
|
||||
CVE-2024-2873,0,0,38b44d61d3230fcaba1c551f8073fe8dda4eadd0cd50d8705b668e3c4529f628,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28734,0,0,bb594e0a4ca8bb02d549585c26850af992a8eb906f708b8c0205bd91934fdfb1,2024-03-19T14:31:27.883000
|
||||
@ -242959,6 +242965,7 @@ CVE-2024-2930,0,0,1ad9e8da3d9e338360bae5cfe06f7f2b34c53691a77fd9b2835daafc635760
|
||||
CVE-2024-29301,0,0,154c6ea8f36ae553114269a1e880d159b7e9b09b869cc177af921f11e043c79a,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29302,0,0,befca4baa09da55c6ccc652e95ace012df1b1e2aab7ec33ac183ae5971911acf,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29303,0,0,9fc5b63681179dd34090ab25180fdf1128a0a8fe7fe2b044acdbb780ed8094f7,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29316,1,1,7430b05bb9d4cd55731b99cb12775ef348bbfb98b60b36da56fae8e2133afe98,2024-03-28T23:15:46.470000
|
||||
CVE-2024-2932,0,0,e7442b733184a1b9f22f25ceb3ef49f5e962fea29dd14cc27b02db5eca7f4996,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29338,0,0,17a24f10f7d0496e7fcb2400fc6c6af48717728349b99b9f4dc4f19499bc4c6d,2024-03-22T19:02:10.300000
|
||||
CVE-2024-2934,0,0,d43e58921fa4cabbd65c934aabbf626f359e24517d20dda47718ff1baa406784,2024-03-27T12:29:30.307000
|
||||
@ -242985,6 +242992,7 @@ CVE-2024-29471,0,0,82d45a5ffd79414ce139218b143945b76a967fb1502a8005b616153a32c45
|
||||
CVE-2024-29472,0,0,8914457096a81cfec257e1932986907f8b2f25a966f10c0d7629905ec24b0f86,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29473,0,0,2dcbe7e94767e08f46a9353b62d8f30da500a221f5affb32fc9ef958cfff985b,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29474,0,0,cd74b93fedbacc13ab911c0f2a2b89e07d9e578953f3b262ce40503b72930e98,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29489,1,1,3833025e78154f4f04395834034f983f21bf7cdae3f494f72963cb33c51fef56,2024-03-28T23:15:46.527000
|
||||
CVE-2024-29499,0,0,bc8db29a97bf5517e5213278d0d5f5ecdec4b51f00adea3262848d25f6e735bc,2024-03-22T19:02:10.300000
|
||||
CVE-2024-2951,0,0,7025f71f619ebfb5f00b29e3d72fe62bb5f0ea0dbfe92a58b33e63352aa0779c,2024-03-27T12:29:41.530000
|
||||
CVE-2024-29515,0,0,79c9f65757e49bdb19c4dcff88d6ba2d524b1951e790ac90d5ffb4f302abcf45,2024-03-26T12:55:05.010000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user