mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-06-11T08:00:25.665847+00:00
This commit is contained in:
parent
d3f4c0bba7
commit
a4a4575fd7
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2014-0808",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2014-01-22T21:55:03.717",
|
||||
"lastModified": "2014-01-23T18:03:07.020",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-06-11T06:15:08.923",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The lfCheckError function in data/class/pages/shopping/LC_Page_Shopping_Multiple.php in LOCKON EC-CUBE 2.11.0 through 2.12.2 allows remote attackers to obtain sensitive shipping information via unspecified vectors."
|
||||
"value": "Authorization bypass through user-controlled key issue exists in EC-CUBE 2.11.0 through 2.12.2 and EC-Orange systems deployed before June 29th, 2015. If this vulnerability is exploited, a user of the affected shopping website may obtain other users' information by sending a crafted HTTP request."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -122,7 +122,7 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN51770585/index.html",
|
||||
"url": "http://jvn.jp/en/jp/JVN51770585/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
@ -135,6 +135,18 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://ec-orange.jp/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN15637138/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvndb.jvn.jp/jvndb/JVNDB-2024-000054",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-313xx/CVE-2024-31397.json
Normal file
24
CVE-2024/CVE-2024-313xx/CVE-2024-31397.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-31397",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-06-11T06:15:10.057",
|
||||
"lastModified": "2024-06-11T06:15:10.057",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper handling of extra values issue exists in Cybozu Garoon 5.0.0 to 5.15.2. If this vulnerability is exploited, a user who can log in to the product with the administrative privilege may be able to cause a denial-of-service (DoS) condition."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cs.cybozu.co.jp/2024/007901.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN28869536/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-313xx/CVE-2024-31398.json
Normal file
24
CVE-2024/CVE-2024-313xx/CVE-2024-31398.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-31398",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-06-11T06:15:10.347",
|
||||
"lastModified": "2024-06-11T06:15:10.347",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insertion of sensitive information into sent data issue exists in Cybozu Garoon 5.0.0 to 5.15.2. If this vulnerability is exploited, a user who can log in to the product may obtain information on the list of users."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cs.cybozu.co.jp/2024/007901.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN28869536/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-313xx/CVE-2024-31399.json
Normal file
24
CVE-2024/CVE-2024-313xx/CVE-2024-31399.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-31399",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-06-11T06:15:10.490",
|
||||
"lastModified": "2024-06-11T06:15:10.490",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Excessive platform resource consumption within a loop issue exists in Cybozu Garoon 5.0.0 to 5.15.2. If this vulnerability is exploited, processing a crafted mail may cause a denial-of-service (DoS) condition."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cs.cybozu.co.jp/2024/007901.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN28869536/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-314xx/CVE-2024-31402.json
Normal file
24
CVE-2024/CVE-2024-314xx/CVE-2024-31402.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-31402",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-06-11T06:15:10.650",
|
||||
"lastModified": "2024-06-11T06:15:10.650",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect authorization vulnerability in Cybozu Garoon 5.0.0 to 5.15.2 allows a remote authenticated attacker to delete the data of Shared To-Dos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cs.cybozu.co.jp/2024/007901.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN28869536/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-35xx/CVE-2024-3549.json
Normal file
47
CVE-2024/CVE-2024-35xx/CVE-2024-3549.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-3549",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-11T07:15:41.017",
|
||||
"lastModified": "2024-06-11T07:15:41.017",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to SQL Injection via the 'b2sSortPostType' parameter in all versions up to, and including, 7.4.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.9,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3069574/blog2social/trunk/includes/B2S/Post/Item.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3b472eb8-9808-4a50-b2b4-0b0b3256053f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-37xx/CVE-2024-3723.json
Normal file
47
CVE-2024/CVE-2024-37xx/CVE-2024-3723.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-3723",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-11T06:15:10.793",
|
||||
"lastModified": "2024-06-11T06:15:10.793",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Advanced Contact form 7 DB plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.0.2 via the wp-content/uploads/advanced-cf7-upload directory. This makes it possible for unauthenticated attackers to extract sensitive data uploaded via this plugin through a form."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/advanced-cf7-db/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9a1f1a1-4f0a-48b5-80c8-525b69006863?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-43xx/CVE-2024-4319.json
Normal file
47
CVE-2024/CVE-2024-43xx/CVE-2024-4319.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-4319",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-11T06:15:11.407",
|
||||
"lastModified": "2024-06-11T06:15:11.407",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Advanced Contact form 7 DB plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'vsz_cf7_export_to_excel' function in versions up to, and including, 2.0.2. This makes it possible for unauthenticated attackers to download the entry data for submitted forms."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/advanced-cf7-db/trunk/admin/class-advanced-cf7-db-admin.php#L1459",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2c66b185-fd4b-452d-890b-0f1850d8a7be?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
31
README.md
31
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-11T06:00:18.606007+00:00
|
||||
2024-06-11T08:00:25.665847+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-11T05:15:53.680000+00:00
|
||||
2024-06-11T07:15:41.017000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,32 +33,27 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
253378
|
||||
253385
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `9`
|
||||
Recently added CVEs: `7`
|
||||
|
||||
- [CVE-2023-7264](CVE-2023/CVE-2023-72xx/CVE-2023-7264.json) (`2024-06-11T04:15:11.987`)
|
||||
- [CVE-2024-29855](CVE-2024/CVE-2024-298xx/CVE-2024-29855.json) (`2024-06-11T04:15:12.953`)
|
||||
- [CVE-2024-31400](CVE-2024/CVE-2024-314xx/CVE-2024-31400.json) (`2024-06-11T05:15:53.130`)
|
||||
- [CVE-2024-31401](CVE-2024/CVE-2024-314xx/CVE-2024-31401.json) (`2024-06-11T05:15:53.320`)
|
||||
- [CVE-2024-31403](CVE-2024/CVE-2024-314xx/CVE-2024-31403.json) (`2024-06-11T05:15:53.397`)
|
||||
- [CVE-2024-31404](CVE-2024/CVE-2024-314xx/CVE-2024-31404.json) (`2024-06-11T05:15:53.463`)
|
||||
- [CVE-2024-35329](CVE-2024/CVE-2024-353xx/CVE-2024-35329.json) (`2024-06-11T05:15:53.533`)
|
||||
- [CVE-2024-36360](CVE-2024/CVE-2024-363xx/CVE-2024-36360.json) (`2024-06-11T05:15:53.610`)
|
||||
- [CVE-2024-5530](CVE-2024/CVE-2024-55xx/CVE-2024-5530.json) (`2024-06-11T05:15:53.680`)
|
||||
- [CVE-2024-31397](CVE-2024/CVE-2024-313xx/CVE-2024-31397.json) (`2024-06-11T06:15:10.057`)
|
||||
- [CVE-2024-31398](CVE-2024/CVE-2024-313xx/CVE-2024-31398.json) (`2024-06-11T06:15:10.347`)
|
||||
- [CVE-2024-31399](CVE-2024/CVE-2024-313xx/CVE-2024-31399.json) (`2024-06-11T06:15:10.490`)
|
||||
- [CVE-2024-31402](CVE-2024/CVE-2024-314xx/CVE-2024-31402.json) (`2024-06-11T06:15:10.650`)
|
||||
- [CVE-2024-3549](CVE-2024/CVE-2024-35xx/CVE-2024-3549.json) (`2024-06-11T07:15:41.017`)
|
||||
- [CVE-2024-3723](CVE-2024/CVE-2024-37xx/CVE-2024-3723.json) (`2024-06-11T06:15:10.793`)
|
||||
- [CVE-2024-4319](CVE-2024/CVE-2024-43xx/CVE-2024-4319.json) (`2024-06-11T06:15:11.407`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `4`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2023-41913](CVE-2023/CVE-2023-419xx/CVE-2023-41913.json) (`2024-06-11T04:15:10.863`)
|
||||
- [CVE-2024-1298](CVE-2024/CVE-2024-12xx/CVE-2024-1298.json) (`2024-06-11T04:15:12.513`)
|
||||
- [CVE-2024-3727](CVE-2024/CVE-2024-37xx/CVE-2024-3727.json) (`2024-06-11T04:15:13.247`)
|
||||
- [CVE-2024-4418](CVE-2024/CVE-2024-44xx/CVE-2024-4418.json) (`2024-06-11T04:15:13.947`)
|
||||
- [CVE-2014-0808](CVE-2014/CVE-2014-08xx/CVE-2014-0808.json) (`2024-06-11T06:15:08.923`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
35
_state.csv
35
_state.csv
@ -65251,7 +65251,7 @@ CVE-2014-0804,0,0,64f7bcd62c09feae210ed04317dd3c363bf64429ff0d6cc82e25aa05b441d8
|
||||
CVE-2014-0805,0,0,64ffdc7602e5834fa9b3519c18d42dd7b07d229d431db1ea7d9952fad9ee621e,2014-01-14T04:49:19.543000
|
||||
CVE-2014-0806,0,0,0f5d623ba97d2afe2377f45b01521ed33883dbba85dc359bb516719da4f3d8f9,2014-08-11T15:04:43.700000
|
||||
CVE-2014-0807,0,0,f009d972ec55433ad7f1cd0b29e7cbdba3753adab49339cad8b728a428899860,2014-01-23T18:10:13.500000
|
||||
CVE-2014-0808,0,0,833cc1c74bbf038a72caa65ae3e078900fd4b54df88435013bf67f5fd4f9525f,2014-01-23T18:03:07.020000
|
||||
CVE-2014-0808,0,1,ec99d11a59fc6ca90e8d2cfd9ce2503b6ff4dde6ec03b45442c931798a2a1bed,2024-06-11T06:15:08.923000
|
||||
CVE-2014-0809,0,0,ea31d36adc72e3733e28eeb6bfacf81b8f998d70f553d482caf7c863538e6e07,2017-08-29T01:34:15.467000
|
||||
CVE-2014-0810,0,0,45fb5c84f4f5cfdebd55044c843a5258a6f94a800107fdc85390866929ef99a4,2014-01-29T18:39:45.720000
|
||||
CVE-2014-0811,0,0,c0c381561c327e70759153bf230a2a174504949fe49060ef9f4430788889edad,2015-08-13T17:50:46.333000
|
||||
@ -231056,7 +231056,7 @@ CVE-2023-41909,0,0,9d721a7787eed097b8afc5a8b093210cda92946cc467d295bac695aa5c5e3
|
||||
CVE-2023-4191,0,0,1f537b5b157bbbbe56b2b4e990c34fe05bafbb89a2c79fe380aa1ac37172b571,2024-05-17T02:31:25.480000
|
||||
CVE-2023-41910,0,0,ddadb74f9e50737d21120f0b88022d8c15ee68cc56eb3c4577229fb7986d33f1,2023-09-27T15:19:31.200000
|
||||
CVE-2023-41911,0,0,c370f1652ab4a7704bdb8c1c18b508b07e9446ea3a6134c45133ba3207c3be67,2023-10-02T19:02:19.277000
|
||||
CVE-2023-41913,0,1,ac6a5dec8a2ef981599760c1bd584c0a3e1984d30935032e705f83162150cb05,2024-06-11T04:15:10.863000
|
||||
CVE-2023-41913,0,0,ac6a5dec8a2ef981599760c1bd584c0a3e1984d30935032e705f83162150cb05,2024-06-11T04:15:10.863000
|
||||
CVE-2023-41914,0,0,27c5c2c3c84cd968ddce119075b7bda7c87709505c9fb5104442489dec8eacba,2023-11-09T22:11:29.870000
|
||||
CVE-2023-41915,0,0,6f98a3967a35a3981301df9522094adc983487e955c89af8c2ce098770114116,2024-01-09T03:14:55.743000
|
||||
CVE-2023-4192,0,0,8f2f20cfbddfb9517a03eb2b1684aa1e1baae715b28b8e6aa49f25d0f9a3982a,2024-05-17T02:31:25.590000
|
||||
@ -240300,7 +240300,7 @@ CVE-2023-7253,0,0,6a907485fdee60605139b38f9229fa03da0ccfe5b94dcf86ca3826725a280a
|
||||
CVE-2023-7258,0,0,5ff9fbb18c87cd79eeba5bdac9e20b834be684e2899fd63fb3e107422ede555b,2024-05-15T18:35:11.453000
|
||||
CVE-2023-7259,0,0,291fdf96791c66804d1f0d3fb86a244e544f8112f70bc253658c7b47edf99960,2024-06-04T19:18:14.193000
|
||||
CVE-2023-7261,0,0,b08661661f1bfa07d4ab77e9bfd0502f6d5d47a18d1db1be6ea651d3e3e30c50,2024-06-10T02:52:08.267000
|
||||
CVE-2023-7264,1,1,dccb93d0648e587ceedbdf388ce7ef8562337765b0f4d097c758f31d3e00ce86,2024-06-11T04:15:11.987000
|
||||
CVE-2023-7264,0,0,dccb93d0648e587ceedbdf388ce7ef8562337765b0f4d097c758f31d3e00ce86,2024-06-11T04:15:11.987000
|
||||
CVE-2024-0007,0,0,3bebeca11ed66b29340ad5b2f4a6fdda381d640f217ed7214dda7d3a471e9da1,2024-02-15T06:23:39.303000
|
||||
CVE-2024-0008,0,0,db70626ccf03b2491d218a1d6d38cb10870a351e02a617fba1e6e23a0ac8502b,2024-02-15T06:23:39.303000
|
||||
CVE-2024-0009,0,0,a481cbe6336f9e8c7286d10d3efcc3169667e3db231d83fec3fad506beda4652,2024-02-15T06:23:39.303000
|
||||
@ -241408,7 +241408,7 @@ CVE-2024-1293,0,0,51959b2d10b4ca1210a0917015b6e0ba4809214d01553289260d6a92beabc6
|
||||
CVE-2024-1294,0,0,1a6fde55ee17952393d258a28e1938bfe41cafec05fa305cc82057814b7c2b7d,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1296,0,0,ab648d9dba58ca530bb990b50d92c4f5ce9f591faa8fbeeb49385095b8425c33,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1297,0,0,1fc219bb038ab422185a999365115aff94759fe3e5ff94e3dc4180f1d6bc82d0,2024-02-20T19:50:53.960000
|
||||
CVE-2024-1298,0,1,b14e73b9f89ef2bb5f90efe91191494dc122a0d6eae045ea12354e4504b4ff5a,2024-06-11T04:15:12.513000
|
||||
CVE-2024-1298,0,0,b14e73b9f89ef2bb5f90efe91191494dc122a0d6eae045ea12354e4504b4ff5a,2024-06-11T04:15:12.513000
|
||||
CVE-2024-1299,0,0,165a6e5bf7396c9871edb84a6ce28d3386b33fd34eb9238065e890fa150a178a,2024-03-07T13:52:27.110000
|
||||
CVE-2024-1300,0,0,843d0cf47128991e9d7cbff1831c7ad94a9bd78e5cc7dab19b0a5a8848cb7f51,2024-05-31T01:15:53.967000
|
||||
CVE-2024-1301,0,0,68d5e322fab21220735382791ea9287e8104e954fa5bc7b1f8f02021f25e280b,2024-03-12T17:46:17.273000
|
||||
@ -248011,7 +248011,7 @@ CVE-2024-29850,0,0,312685b23dbad4c8f8e6bd1bd0266c24c6e302be8a27839473fa75007f2ac
|
||||
CVE-2024-29851,0,0,218edcf6feb0effa72e3a8c5b814479d3c2c35c93f48749732d1e5886bf0b9db,2024-05-24T01:15:30.977000
|
||||
CVE-2024-29852,0,0,ca2ab03d52a8ecc9be34c09f2ce895e1acb480d7a13320d670e056e88b347616,2024-05-24T01:15:30.977000
|
||||
CVE-2024-29853,0,0,aa05b8b855ccb2c04433e87284eb4c79c04809a52f521f75709ccc473b6143f1,2024-05-24T01:15:30.977000
|
||||
CVE-2024-29855,1,1,620460c6fc9157f8c61976df6753ab55ff3e1c1ab82c24d0cc40690248c8fd1f,2024-06-11T04:15:12.953000
|
||||
CVE-2024-29855,0,0,620460c6fc9157f8c61976df6753ab55ff3e1c1ab82c24d0cc40690248c8fd1f,2024-06-11T04:15:12.953000
|
||||
CVE-2024-29857,0,0,9325f9fdc1f4e8265930eb53922aae24948d06e15ce403473a616a945c01d1ad,2024-05-14T16:13:02.773000
|
||||
CVE-2024-29858,0,0,ec21ad079a83cd076ada45f6eaa6cdca3318bb07ab260d892702dff1f9c09fde,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29859,0,0,1a3bc8759fdc8c10e013f96dddd14f2ff64d6c749aade8e9054f9e130df1726e,2024-03-21T12:58:51.093000
|
||||
@ -249093,11 +249093,15 @@ CVE-2024-31393,0,0,37f7a5992221d6bde3095665f91d96a5b3c012db649e1c1c87f1a16619b63
|
||||
CVE-2024-31394,0,0,37a6c6ef2bd7d41356078f2b3597ee7803c3d40e7ebe2f84759f8ace62500d88,2024-05-22T12:46:53.887000
|
||||
CVE-2024-31395,0,0,b30f8ee229d1f4f2f6537c380ff54efa3e461a52badeb419e6445201c1a3b054,2024-05-22T12:46:53.887000
|
||||
CVE-2024-31396,0,0,b9f3c7c1150f9fb33024855b15874b092964398220773ed5b63437613ca6402c,2024-05-22T12:46:53.887000
|
||||
CVE-2024-31397,1,1,fd410cefeafb68aee70c768f9a0fda48768a5c67d520d80a234ae6e9bcae192a,2024-06-11T06:15:10.057000
|
||||
CVE-2024-31398,1,1,0b7bcc6eac5b3d442ea96d7fbc07e94d4d970fa86b6bd5545a4f7457e770e669,2024-06-11T06:15:10.347000
|
||||
CVE-2024-31399,1,1,9676addf2a8b62136dd145546201de91c486a33b0acfad9893446c5d5b26efbe,2024-06-11T06:15:10.490000
|
||||
CVE-2024-3140,0,0,8b1da86666a037f64c40af1ea9ecd283309aabcaa13d249aa0e2a07593cba475,2024-05-17T02:39:44.507000
|
||||
CVE-2024-31400,1,1,571e90c89c324436c61bfdc535dd35c740568bde75455a6e686590a23b323549,2024-06-11T05:15:53.130000
|
||||
CVE-2024-31401,1,1,3439f58a4c3513eb4eeaf76a66cc8317220b63b0282fd7e7c3c063bc877be93f,2024-06-11T05:15:53.320000
|
||||
CVE-2024-31403,1,1,92c5bd46e4ffc852724f2939861650a337e969f86fd5d8df93cf756dd6500f2f,2024-06-11T05:15:53.397000
|
||||
CVE-2024-31404,1,1,146d7af636a9d18ee51e0529992d414c931054e16425a0f9134f7d7bbef93cce,2024-06-11T05:15:53.463000
|
||||
CVE-2024-31400,0,0,571e90c89c324436c61bfdc535dd35c740568bde75455a6e686590a23b323549,2024-06-11T05:15:53.130000
|
||||
CVE-2024-31401,0,0,3439f58a4c3513eb4eeaf76a66cc8317220b63b0282fd7e7c3c063bc877be93f,2024-06-11T05:15:53.320000
|
||||
CVE-2024-31402,1,1,df70ad92e4bf5b7acecb90dc4cc7f9c125f36816b1e13caf761f8e730e132965,2024-06-11T06:15:10.650000
|
||||
CVE-2024-31403,0,0,92c5bd46e4ffc852724f2939861650a337e969f86fd5d8df93cf756dd6500f2f,2024-06-11T05:15:53.397000
|
||||
CVE-2024-31404,0,0,146d7af636a9d18ee51e0529992d414c931054e16425a0f9134f7d7bbef93cce,2024-06-11T05:15:53.463000
|
||||
CVE-2024-31406,0,0,21585692d302884cf3150faa716f097a2673ce3764bdf3b78bdfd36f438a0484,2024-04-24T13:39:42.883000
|
||||
CVE-2024-31409,0,0,2c3474e7adf2dfd4ffe107e0f21a962b12ec9583a2a32f1b573e427bba6ce25c,2024-05-16T13:03:05.353000
|
||||
CVE-2024-3141,0,0,dfabbf3d0507d341626b2bd4d6e1dada0feb9b8a54e2d19fc7727779054508ab,2024-05-17T02:39:44.593000
|
||||
@ -251189,7 +251193,7 @@ CVE-2024-35312,0,0,ac028a927255a2b78c6eca92fb1900973cce08720f7ff1925122b902d9271
|
||||
CVE-2024-35313,0,0,7f5c01341081d45403a16289434e7c2c104fb92ba31fa54006c8bb4958ba7476,2024-05-20T13:00:34.807000
|
||||
CVE-2024-3532,0,0,d2f2a0ef1925b7bbaad85e2d8821e2e8cf660ac377bc2b08bf060255298cce7f,2024-05-17T02:39:59.520000
|
||||
CVE-2024-35324,0,0,6c6120da9be79d2547feeba4f88f5129640a634d2a0161e8fcb0eb70edd0a1be,2024-05-28T17:11:47.007000
|
||||
CVE-2024-35329,1,1,34c2efa0e920c13c8bbb180c32f1cef8090786d304f9cb08fa9a80f86965525c,2024-06-11T05:15:53.533000
|
||||
CVE-2024-35329,0,0,34c2efa0e920c13c8bbb180c32f1cef8090786d304f9cb08fa9a80f86965525c,2024-06-11T05:15:53.533000
|
||||
CVE-2024-3533,0,0,b5d4c48184abe8eef9a34f03991499e6f587b80436d4a5162dc6d5ad2628b6b4,2024-05-17T02:39:59.617000
|
||||
CVE-2024-35333,0,0,75e5bdf5daedfa8238a75e474dbd41f26ca9e370107bedc4b8e20368f5f51602,2024-05-29T19:50:25.303000
|
||||
CVE-2024-35339,0,0,c68e6071ca56f8afde8c58b42bacce710c6733d65ac37ea3d5772bdfbe3ffb9c,2024-05-24T18:09:20.027000
|
||||
@ -251255,6 +251259,7 @@ CVE-2024-3547,0,0,fedd03df736ec1706076663d75a5df99f3108b401b2cf8280bfcd344106c99
|
||||
CVE-2024-35474,0,0,7337b8e2371c2dae27b970b8112f0f83bae7631b3b28e88457636e9df18bc231,2024-06-10T18:06:22.600000
|
||||
CVE-2024-35475,0,0,53effa9dc5e8213551bbdbda32e2dfa4c153fd878258c89c9e91bb711c7a017e,2024-05-22T19:15:09.373000
|
||||
CVE-2024-3548,0,0,e23424ba819983ac2599fe48852cbfc904a10db222c55ccac010f7ec55b39028,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3549,1,1,9185676ce3b637fef9ff67fa9b3169f6a08a3458d42508cd676ea69204080879,2024-06-11T07:15:41.017000
|
||||
CVE-2024-35492,0,0,a02d0a80cf6795bdd8349f855d15db1b17890353f3564619ef911d889417eed6,2024-05-30T13:15:41.297000
|
||||
CVE-2024-3550,0,0,be0f7ed1cc8c69e2fefc881c953115f1247b844866a37cfd3935f1cbe0fa2b81,2024-05-02T18:00:37.360000
|
||||
CVE-2024-35504,0,0,0960d865c9f0a37450856438a4637b3494eda5adde12ce8eee871eda221f0ce9,2024-05-30T18:19:11.743000
|
||||
@ -251769,7 +251774,7 @@ CVE-2024-3631,0,0,52e896a80c9b063fda6224c04771bbd75f72f78e3d3636ccff4bb724fd1661
|
||||
CVE-2024-3634,0,0,940ae4dd6e92f9452379e49ccdcd29aa6fe6e9bda25faf9f7045c78090371ae8,2024-05-15T16:40:19.330000
|
||||
CVE-2024-36358,0,0,7aa6480be70bf3c4a7c068512c9f0ea223a8906c53296c8c4390c69803847276,2024-06-10T22:15:11.230000
|
||||
CVE-2024-36359,0,0,4d0813d5f921dab7e2125921081b8b41da61ecb82e7a896cec4f0c4bd3d6b959,2024-06-10T22:15:11.413000
|
||||
CVE-2024-36360,1,1,846684a4c73f3677cbd79edfdcf0c654a3e0b678f7819c6061f42f0db1d654ff,2024-06-11T05:15:53.610000
|
||||
CVE-2024-36360,0,0,846684a4c73f3677cbd79edfdcf0c654a3e0b678f7819c6061f42f0db1d654ff,2024-06-11T05:15:53.610000
|
||||
CVE-2024-36361,0,0,e6bb6c383c1666ed2ebd76c2860daf874be766774cb8ee3c270f4225933d1164,2024-06-06T16:15:12.457000
|
||||
CVE-2024-36362,0,0,8fe53587d01d75cf05d382c4cdc9dd5acba96213b931891c8617ccaeb71fb210,2024-05-31T14:15:09.370000
|
||||
CVE-2024-36363,0,0,5dd5d563c190558c74ba8e221bb4206b3001359840c2c456abec432adc87e684,2024-05-31T14:15:09.563000
|
||||
@ -252069,10 +252074,11 @@ CVE-2024-3719,0,0,d2320674d04cefde56a0b36b463f74328d6f18494803030bdfe9b0b1b4374a
|
||||
CVE-2024-3720,0,0,f4e69514093cc630aeda39d0a41fe705e0d9916a1077cef429b7dcf05a404308,2024-06-04T19:20:23.660000
|
||||
CVE-2024-3721,0,0,ec8dc4b0ad5d1d9ba11acb18015142f7d1715fd653f7ca2987e266e9c9e8ef01,2024-05-17T02:40:05.290000
|
||||
CVE-2024-3722,0,0,7c1b4fae7e86bf4c1bc76a0d39819ffc592a7b598c7675ac0628daa278671c4c,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3723,1,1,ed62ac93f26978a1b6bc84a25049cd22e212eaa7409abbff64eb926817290616,2024-06-11T06:15:10.793000
|
||||
CVE-2024-3724,0,0,a2f08bb0a2e36a5c374b862fb3e4beff315b3d6672953c5eeabe10290b435e2c,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3725,0,0,dd194c190207038aca40dcc17eaac7bd7c6f9f34e04d00c016e0de6cd9837da0,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3726,0,0,5d13f10d5b73efb7ab7c6448eee56ee5b7f1a739226807fb6eef2a4ab850d2f7,2024-05-30T13:15:41.297000
|
||||
CVE-2024-3727,0,1,6edac4103d7932b3951e03146eae4bf096e2d18a2b4f814f8f7920458398b953,2024-06-11T04:15:13.247000
|
||||
CVE-2024-3727,0,0,6edac4103d7932b3951e03146eae4bf096e2d18a2b4f814f8f7920458398b953,2024-06-11T04:15:13.247000
|
||||
CVE-2024-37273,0,0,ef0a090766ee920b155f0d890f38d30f2afeeaa3951e1d885273f3523f46b520,2024-06-05T12:53:50.240000
|
||||
CVE-2024-3728,0,0,43844043222c66b8f700e8c46db9fa69a4e80d2868161363811005c77777bc69,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37289,0,0,093d810733bfa72eb95b37d788176272f6cb5d590ae184e99ad505e428213fbf,2024-06-10T22:15:12.893000
|
||||
@ -252514,6 +252520,7 @@ CVE-2024-4314,0,0,917e44d69c76fb7381314145ce5012ff94d63258309b3ec3d14bdf6a76c85d
|
||||
CVE-2024-4316,0,0,5a945ac0a4e5139fc35505b0ad29ed6f4f78dc21cf82c5a713e2fc10353001af,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4317,0,0,1cfa82abc1d175e3780dda1cd435053fb9f133c668ec60968879d020da51382a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4318,0,0,239860e6603bb5bfa00e4ee1537bbc84372d89871f96aaff86d4c34891350e3a,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4319,1,1,9e22a0eda79272a3e241790bf9bf980072ff35cf4cebe45f406786f622d30fc5,2024-06-11T06:15:11.407000
|
||||
CVE-2024-4320,0,0,e47f6067fb0d170ab8dbc0733b163211a60f027ef1254b440e10fe81fe453718,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4321,0,0,52291df02a369d9bb947287933b2cb70cdba5b6bd48fddb1c2e0073aed4231c4,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4322,0,0,26c76f88e5d4d6383f99407dee54ae56585f3dcb15c99e63b32362e726df8b5e,2024-05-16T13:03:05.353000
|
||||
@ -252582,7 +252589,7 @@ CVE-2024-4409,0,0,7dd623ac9467a0484d209647a6b8fb064b225334d3e5c23c1ee095e63ba208
|
||||
CVE-2024-4411,0,0,c7fa179581fd2f838a938c9431cc636dd9fa2af2bec9103de58ade770f105c65,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4413,0,0,cca9f27cd31d87a0c2b601e673b97ef7118798e076ad06575846010a4eaaeef8,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4417,0,0,56d1a7db112c78a6a4f4098b6b92b23b4d7cd4e314ee26ae65a28dbbe4d8642e,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4418,0,1,4296a95dce6482052757c534b4848186d866430fd4459b7c0727dc6f4d0bbff6,2024-06-11T04:15:13.947000
|
||||
CVE-2024-4418,0,0,4296a95dce6482052757c534b4848186d866430fd4459b7c0727dc6f4d0bbff6,2024-06-11T04:15:13.947000
|
||||
CVE-2024-4419,0,0,e2d8f545d71f8d9558ae0290474349668dafdd9730a778cdbbf911c6b4cf5157,2024-05-29T13:02:09.280000
|
||||
CVE-2024-4420,0,0,9b75921df8e16106b48e4c0d4f1fc07ba699b6ee751657d557cf95a2815ddc11,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4422,0,0,033ffa151e9f7c26ec50c74ca266b6c48fb375132593b1334657790301503e16,2024-05-30T13:15:41.297000
|
||||
@ -253323,7 +253330,7 @@ CVE-2024-5523,0,0,047cc71fb1f4320881d428c79c80679ee2da549498da604407797261c69d06
|
||||
CVE-2024-5524,0,0,e7e0fe13822be5d672aca31e1ee31e0f364bc62cac379db56dfa86e4e6649c5d,2024-05-31T13:01:46.727000
|
||||
CVE-2024-5525,0,0,27d51e0f90117d5f6e29d565f6efd293c83de249201cb9426e9c70697dbb918d,2024-05-31T13:01:46.727000
|
||||
CVE-2024-5526,0,0,ff5b1387d351b0ba676942fad975bab52e39b4bce1932efe40f06f69ab4492f7,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5530,1,1,c88c71d0fc4a469ec001167841485a2cedfa66755e447a724b42beedce8d6868,2024-06-11T05:15:53.680000
|
||||
CVE-2024-5530,0,0,c88c71d0fc4a469ec001167841485a2cedfa66755e447a724b42beedce8d6868,2024-06-11T05:15:53.680000
|
||||
CVE-2024-5536,0,0,68edb52432771856b464d791aa7fccb8518cf1ab9cd2d253ae0bbced65da7ce5,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5537,0,0,071475eb8c0f92cc8ea9522d658283ad0e8213ba6740ff46ee05e5b24c18c3d8,2024-05-30T17:15:34.583000
|
||||
CVE-2024-5538,0,0,183cea799fa9410e329e72f326a10b8369aedcea9a5b7583a44bf33ecc305070,2024-05-31T11:15:09.923000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user