mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 03:27:17 +00:00
Auto-Update: 2024-06-21T23:55:18.388837+00:00
This commit is contained in:
parent
3e28d9e04e
commit
aeb4cd5073
24
CVE-2012/CVE-2012-66xx/CVE-2012-6664.json
Normal file
24
CVE-2012/CVE-2012-66xx/CVE-2012-6664.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2012-6664",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-21T22:15:09.767",
|
||||
"lastModified": "2024-06-21T22:15:09.767",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple directory traversal vulnerabilities in the TFTP Server in Distinct Intranet Servers 3.10 and earlier allow remote attackers to read or write arbitrary files via a .. (dot dot) in the (1) get or (2) put commands."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/41714",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.fortiguard.com/encyclopedia/ips/48021",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2014/CVE-2014-54xx/CVE-2014-5470.json
Normal file
24
CVE-2014/CVE-2014-54xx/CVE-2014-5470.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2014-5470",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-21T22:15:10.417",
|
||||
"lastModified": "2024-06-21T22:15:10.417",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Actual Analyzer through 2014-08-29 allows code execution via shell metacharacters because untrusted input is used for part of the input data passed to an eval operation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vulmon.com/exploitdetails?qidtp=exploitdb&qid=35549",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/35549",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-429xx/CVE-2022-42974.json
Normal file
20
CVE-2022/CVE-2022-429xx/CVE-2022-42974.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-42974",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-21T22:15:10.557",
|
||||
"lastModified": "2024-06-21T22:15:10.557",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Kostal PIKO 1.5-1 MP plus HMI OEM p 1.0.1, the web application for the Solar Panel is vulnerable to a Stored Cross-Site Scripting (XSS) attack on /file.bootloader.upload.html. The application fails to sanitize the parameter filename, in a POST request to /file.bootloader.upload.html for a system update, thus allowing one to inject HTML and/or JavaScript on the page that will then be processed and stored by the application. Any subsequent requests to pages that retrieve the malicious content will automatically exploit the vulnerability on the victim's browser. This also happens because the tag is loaded in the function innerHTML in the page HTML."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://medium.com/%40daviddepaulasantos/how-we-got-a-cve-for-a-dom-based-stored-xss-on-a-solar-panel-917b9d7b2545",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-27622",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-05T14:15:49.030",
|
||||
"lastModified": "2024-06-07T16:15:10.387",
|
||||
"lastModified": "2024-06-21T22:15:10.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A remote code execution vulnerability has been identified in the User Defined Tags module of CMS Made Simple version 2.2.19. This vulnerability arises from inadequate sanitization of user-supplied input in the 'Code' section of the module. As a result, authenticated users with administrative privileges can inject and execute arbitrary PHP code."
|
||||
"value": "A remote code execution vulnerability has been identified in the User Defined Tags module of CMS Made Simple version 2.2.19 / 2.2.21. This vulnerability arises from inadequate sanitization of user-supplied input in the 'Code' section of the module. As a result, authenticated users with administrative privileges can inject and execute arbitrary PHP code."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-29025",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-25T20:15:08.797",
|
||||
"lastModified": "2024-03-26T12:55:05.010",
|
||||
"lastModified": "2024-06-21T22:15:10.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -62,6 +62,10 @@
|
||||
{
|
||||
"url": "https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00015.html",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-344xx/CVE-2024-34452.json
Normal file
20
CVE-2024/CVE-2024-344xx/CVE-2024-34452.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-34452",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-21T22:15:10.877",
|
||||
"lastModified": "2024-06-21T22:15:10.877",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CMSimple_XH 1.7.6 allows XSS by uploading a crafted SVG document."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/surajhacx/CVE-2024-34452/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-349xx/CVE-2024-34989.json
Normal file
20
CVE-2024/CVE-2024-349xx/CVE-2024-34989.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-34989",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-21T22:15:10.947",
|
||||
"lastModified": "2024-06-21T22:15:10.947",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the module RSI PDF/HTML catalog evolution (prestapdf) <= 7.0.0 from RSI for PrestaShop, a guest can perform SQL injection via `PrestaPDFProductListModuleFrontController::queryDb().'"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.friendsofpresta.org/modules/2024/06/20/prestapdf.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-365xx/CVE-2024-36532.json
Normal file
20
CVE-2024/CVE-2024-365xx/CVE-2024-36532.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-36532",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-21T22:15:11.020",
|
||||
"lastModified": "2024-06-21T22:15:11.020",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure permissions in kruise v1.6.2 allows attackers to access sensitive data and escalate privileges by obtaining the service account's token."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/HouqiyuA/43488e1d41110a5610146b87b2e88a02",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-376xx/CVE-2024-37654.json
Normal file
20
CVE-2024/CVE-2024-376xx/CVE-2024-37654.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-37654",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-21T22:15:11.087",
|
||||
"lastModified": "2024-06-21T22:15:11.087",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in BAS-IP AV-01D, AV-01MD, AV-01MFD, AV-01ED, AV-01KD, AV-01BD, AV-01KBD, AV-02D, AV-02IDE, AV-02IDR, AV-02IPD, AV-02FDE, AV-02FDR, AV-03D, AV-03BD, AV-04AFD, AV-04ASD, AV-04FD, AV-04SD, AV-05FD, AV-05SD, AA-07BD, AA-07BDI, BA-04BD, BA-04MD, BA-08BD, BA-08MD, BA-12BD, BA-12MD, CR-02BD before 3.9.2 allows a remote attacker to obtain sensitive information via a crafted HTTP GET request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DrieVlad/BAS-IP-vulnerabilities",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-376xx/CVE-2024-37694.json
Normal file
20
CVE-2024/CVE-2024-376xx/CVE-2024-37694.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-37694",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-21T22:15:11.157",
|
||||
"lastModified": "2024-06-21T22:15:11.157",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ArcGIS Enterprise Server 10.8.0 allows a remote attacker to obtain sensitive information because /arcgis/rest/services does not require authentication."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/NSSCYCTFER/SRC-CVE",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
README.md
25
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-21T22:00:18.380091+00:00
|
||||
2024-06-21T23:55:18.388837+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-21T20:15:12.620000+00:00
|
||||
2024-06-21T22:15:11.157000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,24 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
254922
|
||||
254930
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `5`
|
||||
Recently added CVEs: `8`
|
||||
|
||||
- [CVE-2020-27352](CVE-2020/CVE-2020-273xx/CVE-2020-27352.json) (`2024-06-21T20:15:10.630`)
|
||||
- [CVE-2023-37898](CVE-2023/CVE-2023-378xx/CVE-2023-37898.json) (`2024-06-21T20:15:11.583`)
|
||||
- [CVE-2023-38506](CVE-2023/CVE-2023-385xx/CVE-2023-38506.json) (`2024-06-21T20:15:12.003`)
|
||||
- [CVE-2023-39517](CVE-2023/CVE-2023-395xx/CVE-2023-39517.json) (`2024-06-21T20:15:12.307`)
|
||||
- [CVE-2023-45673](CVE-2023/CVE-2023-456xx/CVE-2023-45673.json) (`2024-06-21T20:15:12.620`)
|
||||
- [CVE-2012-6664](CVE-2012/CVE-2012-66xx/CVE-2012-6664.json) (`2024-06-21T22:15:09.767`)
|
||||
- [CVE-2014-5470](CVE-2014/CVE-2014-54xx/CVE-2014-5470.json) (`2024-06-21T22:15:10.417`)
|
||||
- [CVE-2022-42974](CVE-2022/CVE-2022-429xx/CVE-2022-42974.json) (`2024-06-21T22:15:10.557`)
|
||||
- [CVE-2024-34452](CVE-2024/CVE-2024-344xx/CVE-2024-34452.json) (`2024-06-21T22:15:10.877`)
|
||||
- [CVE-2024-34989](CVE-2024/CVE-2024-349xx/CVE-2024-34989.json) (`2024-06-21T22:15:10.947`)
|
||||
- [CVE-2024-36532](CVE-2024/CVE-2024-365xx/CVE-2024-36532.json) (`2024-06-21T22:15:11.020`)
|
||||
- [CVE-2024-37654](CVE-2024/CVE-2024-376xx/CVE-2024-37654.json) (`2024-06-21T22:15:11.087`)
|
||||
- [CVE-2024-37694](CVE-2024/CVE-2024-376xx/CVE-2024-37694.json) (`2024-06-21T22:15:11.157`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
- [CVE-2024-27622](CVE-2024/CVE-2024-276xx/CVE-2024-27622.json) (`2024-06-21T22:15:10.647`)
|
||||
- [CVE-2024-29025](CVE-2024/CVE-2024-290xx/CVE-2024-29025.json) (`2024-06-21T22:15:10.750`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
22
_state.csv
22
_state.csv
@ -57657,6 +57657,7 @@ CVE-2012-6660,0,0,4204af3ea712772dc4d2606f2cf6e50a4341f1ad86d3a699d4638987ff7995
|
||||
CVE-2012-6661,0,0,f39755d71d5dcc549a8db5e512206dba577042eda0dc3867bbe57bd93b2c2a66,2014-11-05T03:32:38.557000
|
||||
CVE-2012-6662,0,0,1e751bc515057f0a0c08389a90d61351cc4d3ce27e4b7bbe699da54113df605c,2018-07-14T01:29:00.267000
|
||||
CVE-2012-6663,0,0,3f87372a88dc5ad47844a9ccc94a467ebb7601db36607697bda1bc45ab17e576,2020-01-28T20:10:46.747000
|
||||
CVE-2012-6664,1,1,4d32d0ecd8f188cf0d9d9bcc0d971ec37c249a31850ecd4f8b74cc0e68f17a7b,2024-06-21T22:15:09.767000
|
||||
CVE-2012-6665,0,0,4c489dc740807bb39593fa609a1515059c128f2ac44b714b33a3cf55b66a3194,2014-11-18T16:54:06.737000
|
||||
CVE-2012-6666,0,0,962b7cb2904b2d0ca796b3fd595fd8726e2100a0e8fd30af14539bc437b2ae26,2020-02-11T17:40:31.837000
|
||||
CVE-2012-6667,0,0,41abfcc68b31ea0d99df1ebdea5c67ae9abb0258c45c1107f8327c663f06ea92,2018-01-29T13:07:10.593000
|
||||
@ -69392,6 +69393,7 @@ CVE-2014-5464,0,0,8deeb0281b9db4f212ca4efdc66134ce9c70ee9145596f228ca92cc47c5e63
|
||||
CVE-2014-5465,0,0,e8b4208809e03f584a6bb3cd21c0f2caf8fc4911bc0406369f6e78ca20d1fd36,2014-09-03T20:15:36.530000
|
||||
CVE-2014-5466,0,0,db9eafbbaf858dce0cad9d969bef5c12f1cdb630be454ce3009b8131d8762879,2014-12-17T19:31:00.807000
|
||||
CVE-2014-5468,0,0,812685be9ec8145ad2039b5d3daf489a0510c1859c48812122bc52998a08515c,2020-02-11T16:02:39.280000
|
||||
CVE-2014-5470,1,1,4d4ee6a8bbf3c1575a3c9a9cd5e71a3b04c2585195cd4920d156c6c260ad74ac,2024-06-21T22:15:10.417000
|
||||
CVE-2014-5471,0,0,511c8895ca38af1a8d65229a32673dc6b2ea2427c860430ddaa267c61dd3f125,2023-11-07T02:20:50.287000
|
||||
CVE-2014-5472,0,0,a2fdef957a40c099c9f524e19471baf211bdbb59c08d4930abb8cfc2e4fbac0d,2023-11-07T02:20:50.383000
|
||||
CVE-2014-5500,0,0,d3411653c84229d5b2a0ee341eae110722fede3a1b2b0df5c988c79a9ce8736e,2020-01-28T21:17:09.127000
|
||||
@ -156052,7 +156054,7 @@ CVE-2020-27349,0,0,ef3b2d3e612e690132545938179929f176a6ba136a61ce8e2ba5a0f22d8d5
|
||||
CVE-2020-2735,0,0,5ed2dcc843c2aa0f70c01b3b04a7d2d4a91ff944b2732397fc6241efa2aaecff,2020-04-16T13:46:11.010000
|
||||
CVE-2020-27350,0,0,af17d465acd51bc162bfc23e932ea96c98e49e911a17cd3c85b21ce58f1c65ff,2022-10-29T02:41:36.810000
|
||||
CVE-2020-27351,0,0,23ce876d0cc9cd7447f4adbd408d27289c1b3011c303be7d699e76c691aa1761,2020-12-14T19:56:18.940000
|
||||
CVE-2020-27352,1,1,737d1cf2ba5fd4b3ec4ca13c6428d955b3075022012da6d5ca5400e19b3668c9,2024-06-21T20:15:10.630000
|
||||
CVE-2020-27352,0,0,737d1cf2ba5fd4b3ec4ca13c6428d955b3075022012da6d5ca5400e19b3668c9,2024-06-21T20:15:10.630000
|
||||
CVE-2020-27353,0,0,dc1a7f42a9a4f966e49a5b6386fd9687eba1eac037e40cb29822574f6ad4b163,2024-06-04T23:15:09.320000
|
||||
CVE-2020-27354,0,0,45dbf196c098dca554d5a1355d73bf4a1e889b5e4842af65035d79e289fb9b14,2024-06-05T00:15:09.547000
|
||||
CVE-2020-27355,0,0,a2f55d973e1e8b65f87c5f3fb63316f566dec73ca1e0dd417dfb723f7fe99ad0,2024-06-05T00:15:09.617000
|
||||
@ -208190,6 +208192,7 @@ CVE-2022-42970,0,0,684351571c726e3643d500eb09cd3f89b360763f0fd695f8bb69c804dc28d
|
||||
CVE-2022-42971,0,0,a1a760e3587785043d9b78a199e09a9c4c8e485ce4f48cc34275b0d788d0cab8,2023-02-08T19:43:51.890000
|
||||
CVE-2022-42972,0,0,5f3b3d9ac192cbb1a45d6a773c5e886c09251dfb9ca13b3ca9cb8c11930ec490,2023-02-08T19:40:51.330000
|
||||
CVE-2022-42973,0,0,0f6e1ea59a6d9a4bb4e66c46715b9ab0d86461aefc26a6b95446083a3d658078,2023-02-08T19:00:42.387000
|
||||
CVE-2022-42974,1,1,49f443c5827a338ddd14ea16dbc2f0da9897a889efbc29752336cec27fa650b5,2024-06-21T22:15:10.557000
|
||||
CVE-2022-42975,0,0,f256f7d52b33ef16660e0ebf6c4ccc6fe1ffaf6c18f82025b01cf1cab52da7cb,2022-10-20T14:12:10.597000
|
||||
CVE-2022-42977,0,0,4fbf7f5ca129c3ea9e7ba51c6d4ee0d909c52d7d9db35f31f31607b56dc98718,2023-08-08T14:22:24.967000
|
||||
CVE-2022-42978,0,0,02efb548f6368a021b2a0aa5395451ba1b2aaa35e6f5787da8fad0ffe5e4b189,2022-11-17T04:59:09.643000
|
||||
@ -228058,7 +228061,7 @@ CVE-2023-37894,0,0,4bbe93630e5c88aaa168650ee7decbbed51e8651e9481ea0b2ab4325f8895
|
||||
CVE-2023-37895,0,0,5ab5b20db4c6e20aeaa134c4d8abd0f013429c0c247d4496bfe1b82a504531b0,2023-08-03T13:46:25.603000
|
||||
CVE-2023-37896,0,0,3ecf40f8cf2f8c0ff36bbe5ea08a7aaad4d226d927fede46bcdab27141cf4141,2023-08-10T14:08:02.640000
|
||||
CVE-2023-37897,0,0,f98dbe8882c7c3ab5f785a21ea28b2787699c34482263dd1eb6040b064c2dcca,2023-07-28T22:24:41.520000
|
||||
CVE-2023-37898,1,1,1f7ca067066dfc6c356212d190352777a826475ebb485791eab72964adc0c903,2024-06-21T20:15:11.583000
|
||||
CVE-2023-37898,0,0,1f7ca067066dfc6c356212d190352777a826475ebb485791eab72964adc0c903,2024-06-21T20:15:11.583000
|
||||
CVE-2023-37899,0,0,2d16854cfbc3fbb36523fc677e4d80b09d5385a633407c4bfa059474a4242848,2023-07-28T15:55:57.443000
|
||||
CVE-2023-3790,0,0,bde00eebc8cc92bd7784fe9a54066bdd4875521aa89050ad28ef8b30072821be,2024-05-17T02:27:47.987000
|
||||
CVE-2023-37900,0,0,af6036ee134d0225b0b50e819295de548cdf6485df3b5b730e0532d421d89a28,2023-08-03T13:34:40.327000
|
||||
@ -228629,7 +228632,7 @@ CVE-2023-38502,0,0,6df62ddd9f9f33ef1b9f1f5e0bdc4dde584092ce2b3aa6e7883e9989bb266
|
||||
CVE-2023-38503,0,0,2bf2f3b94747ae17a77ec0945ee92cb252bd888ca6467cdc7911a685010466c8,2023-08-03T15:33:06.607000
|
||||
CVE-2023-38504,0,0,010bf69aae5659eee63c94c006066569935ea1b14ffd2ea77e84d47d9e1bcdf0,2023-08-03T13:40:02.697000
|
||||
CVE-2023-38505,0,0,b0e4a9fa5f054e49b0ce4f0736498a347dd78e339437c52c30c1050187152a5a,2023-08-03T13:40:43.150000
|
||||
CVE-2023-38506,1,1,52eaa1b9648d616fa5264921fbd9307ffd41f8f60db6edc00f43943e08877394,2024-06-21T20:15:12.003000
|
||||
CVE-2023-38506,0,0,52eaa1b9648d616fa5264921fbd9307ffd41f8f60db6edc00f43943e08877394,2024-06-21T20:15:12.003000
|
||||
CVE-2023-38507,0,0,5426b3165e7bcfd976cf2ecb06425e14dec20450ae76c5f7cda8287528b6ed23,2023-09-21T14:09:16.523000
|
||||
CVE-2023-38508,0,0,f1125d8fc92aeea60580be087aecbfa9f6ec32c3ec4276f93811b99b53f900a5,2023-08-30T18:23:27.400000
|
||||
CVE-2023-38509,0,0,ad4c82e395d5ca4d14371219a4320da10ad4178c3fd494c53f7996576892237c,2024-03-18T18:15:07.627000
|
||||
@ -229450,7 +229453,7 @@ CVE-2023-39513,0,0,b917e874a9c425318aacac3ba1de2982758ec6e3bfe0d6e78ed128c68cdb4
|
||||
CVE-2023-39514,0,0,ca4200318c6c6e7ee1d00ac7ab7b5838c6208550cf3b9c80ec1a449b3a264fb1,2023-11-09T05:15:10.750000
|
||||
CVE-2023-39515,0,0,874ee27a2787d501f8c81f06c3539dd7ae8217292d7f664ec47f7deabdb6d470,2024-03-18T20:15:08.063000
|
||||
CVE-2023-39516,0,0,1570cc9ed07604763b9dce66d141e6d15a2ff9cd45975c7cea319f970a8713b2,2024-03-18T20:15:08.180000
|
||||
CVE-2023-39517,1,1,f0b307b44ea82bd25b6b44a70dc67e22d409e88b6b8932643fd687595463475a,2024-06-21T20:15:12.307000
|
||||
CVE-2023-39517,0,0,f0b307b44ea82bd25b6b44a70dc67e22d409e88b6b8932643fd687595463475a,2024-06-21T20:15:12.307000
|
||||
CVE-2023-39518,0,0,04dff26579f6cf441e85482ab177b9a2bc21b450c5011735e7e33cb208c812c3,2023-08-10T21:10:19.233000
|
||||
CVE-2023-39519,0,0,63e49c3acbdc7c27ec04d3ad4ff5edccebcdde27b0dadb5b0b810c1df1150f49,2023-08-29T16:06:35.303000
|
||||
CVE-2023-39520,0,0,54fbfcf047af2f3782404cf6c772af2ac2b775173979a2c4ddb9050659b269a2,2023-08-11T18:10:39.823000
|
||||
@ -233675,7 +233678,7 @@ CVE-2023-4567,0,0,12b3cac6d4aedf57d3dceb60316c77b1d8e43f24d27cb3caa82a9bbc2d53a8
|
||||
CVE-2023-45670,0,0,0e706639d6c4ba9473ea3bfe4aa6d756d7458b7f9a7cbb83b6ef1ab198ee6d3c,2023-12-13T20:15:49.010000
|
||||
CVE-2023-45671,0,0,06f7c207d9be9d98f8ad421e51d3b7fe88672ca21aae1721e8ac12ff7bd6b5df,2023-12-13T20:15:49.170000
|
||||
CVE-2023-45672,0,0,2f03af43e92281fa5fc8962bdb95e802763bad5da4be324cc0487c106272d300,2023-12-13T20:15:49.260000
|
||||
CVE-2023-45673,1,1,6d462a9afd4963850eef54fac02c6a3a0bfb20d51e4ab5eb6921f4ba79df1023,2024-06-21T20:15:12.620000
|
||||
CVE-2023-45673,0,0,6d462a9afd4963850eef54fac02c6a3a0bfb20d51e4ab5eb6921f4ba79df1023,2024-06-21T20:15:12.620000
|
||||
CVE-2023-45674,0,0,28fcbf9f864cce272f6e270e13233a2cb3f970c8d869fa94156b19d9e0dc7397,2023-10-18T20:55:55.410000
|
||||
CVE-2023-45675,0,0,6676e6c635b6fd8130d99da86e6b65983125743d78bd2bc574c9a6c515a04f8b,2023-11-04T06:15:53.630000
|
||||
CVE-2023-45676,0,0,ead07d4ac2e9dba78ca99fb9b7eb9b48fb0107c5ee188d8b691904fb361113c5,2023-10-26T22:44:03.933000
|
||||
@ -247208,7 +247211,7 @@ CVE-2024-27613,0,0,55e42cf2e4639a6096ea75af39dc974125f1048dbd4b80fc4aa61dc42e00d
|
||||
CVE-2024-27619,0,0,ac27585ed59a6668049d75158e75afc441f45955e396bf2ead784d9f82b5977e,2024-04-01T01:12:59.077000
|
||||
CVE-2024-2762,0,0,c5473e01add4107889b1ba4d796385b867989c7b4247e2eca6fa883ac1d5266d,2024-06-13T18:36:09.010000
|
||||
CVE-2024-27620,0,0,4bfc993d4e14e5106dd7a82c3dc44aa0baefcf2c7d47f57f47fe77723c791abe,2024-04-08T18:48:40.217000
|
||||
CVE-2024-27622,0,0,1adfc2d7f6a7f9f516e2d479e9d3f31d51deca672bf1402aad4768d05a6f7121,2024-06-07T16:15:10.387000
|
||||
CVE-2024-27622,0,1,5fceb86cc079ea325ba370df7656c4a57ff5c2e77dedb7073d4f94d2ce8efc53,2024-06-21T22:15:10.647000
|
||||
CVE-2024-27623,0,0,2fddee8e74e15c6e7895f22777fd9ac33928389d1ff6851e7ceeb0e05ed9e8b4,2024-03-05T14:27:46.090000
|
||||
CVE-2024-27625,0,0,d6b6da55ca3f292d09b4a714bcb504e227f68a5bde518c62e1054c68c65c7b4c,2024-03-05T14:27:46.090000
|
||||
CVE-2024-27626,0,0,03b059cdacd9bd4fdf434fcdc21be78daba5dd8b1b09db34c5aaed65f0885289,2024-03-21T12:58:51.093000
|
||||
@ -248028,7 +248031,7 @@ CVE-2024-29021,0,0,456c09464e4f95665d704dc4e093723601c54deee0b072b36b2d708a61f0e
|
||||
CVE-2024-29022,0,0,4db19a3f2419aaa80a88ebcbb0e457191b072f3fcd418cd9e058914c4af75d81,2024-04-15T13:15:31.997000
|
||||
CVE-2024-29023,0,0,d903e95cdcdb4595e1169062d882080dea4ff3e1a9b90bac61480e111ad31319,2024-04-15T13:15:31.997000
|
||||
CVE-2024-29024,0,0,956c59560b7cf752c83fc101e3db1baf7896ab3619a15c2cec1bf122c43cd6a6,2024-04-01T01:12:59.077000
|
||||
CVE-2024-29025,0,0,2135a02640a8fe43b6f6ca4c5bc68a475f73ee669a9a1a5af697f30fa738d887,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29025,0,1,a6999c16eef8a0b9185ccf5f77c300f46e58b01a13b7e8df5c0cf5ef43816d90,2024-06-21T22:15:10.750000
|
||||
CVE-2024-29026,0,0,7a7fbf8ee06d6c65b29d9a77f81f2fa0ae26dbe8caea4211ae9fe81298d43766,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29027,0,0,19d697e74c890b515278322ccfb5abb998957045cfc2c03ab1afb6aaa02ec45c,2024-03-20T13:00:16.367000
|
||||
CVE-2024-29028,0,0,47d5a2beef5bf6f095867703e1beb5a1973cc12afc4b0ddaac5579d664bd222c,2024-04-19T16:19:49.043000
|
||||
@ -251460,6 +251463,7 @@ CVE-2024-34448,0,0,2ee47d576d9de678e8b37edc8c4fb672f63b76bc5fc5740404718a42f40a4
|
||||
CVE-2024-34449,0,0,97d09fdadfd613905dbfd9871f1d974c32ae8fd0c469e4b64fe2252427eb7288,2024-06-04T19:20:00.563000
|
||||
CVE-2024-3445,0,0,2031eee497e177f244890449ab10d2f196dd08d103f846fc9b20779b1f74d465,2024-05-17T02:39:56.830000
|
||||
CVE-2024-34451,0,0,e70710b537fe2eeb930751f9cb9f8206f6cd9179f5b8e341e64ba4d6bec23b04,2024-06-17T12:42:04.623000
|
||||
CVE-2024-34452,1,1,2334b13963677fe15aa1df4f4d0c3bfced186e52ba6ea069fb1effa59ff65005,2024-06-21T22:15:10.877000
|
||||
CVE-2024-34453,0,0,9363deaf6a5ec68194d671cadb0973a2ba23402d3e2800c4f9eea6dbd677c5cd,2024-05-06T12:44:56.377000
|
||||
CVE-2024-34454,0,0,5a4e256350d1e944e58328b51d73ec47802d2b17d3b93d5d7c62570b2e291430,2024-05-28T12:39:28.377000
|
||||
CVE-2024-34455,0,0,cf6832f7361884f15470d2143d9f538281f7bb0657fc697433a93775fe331b3f,2024-05-07T18:15:08.417000
|
||||
@ -251718,6 +251722,7 @@ CVE-2024-34974,0,0,519613cdbc229706fafa4388ed0de03632496af6e2fd3a5450a4996c9b966
|
||||
CVE-2024-3498,0,0,5a88bde38eadc03f84603569fdec38fe83a6606de78277714e78faa80a5569cc,2024-06-17T12:42:04.623000
|
||||
CVE-2024-34982,0,0,ef460a32eb987949d8c2a373dc7919974bee9f6e2b2a3c53ead2e4138396cd2a,2024-05-17T18:35:35.070000
|
||||
CVE-2024-34987,0,0,262d3ccca2f7e7df7be241d8326c4714ae2b44466572454690af1a110c26db06,2024-06-18T19:15:59.873000
|
||||
CVE-2024-34989,1,1,8b6b6014c5b52a35449706cfa58a6728031aebb0f65d9df003ca411259b06d82,2024-06-21T22:15:10.947000
|
||||
CVE-2024-3499,0,0,38e1f3a6ce5aff826b19a73a4f796b980cc1161eaf58f8fada2f6f87e54573a4,2024-05-02T18:00:37.360000
|
||||
CVE-2024-34990,0,0,954e9cad148d93781e06727d2db5247f2f552d787151dbf2d18611cf67a55aa3,2024-06-20T12:43:25.663000
|
||||
CVE-2024-34993,0,0,88520e58b3968956ee44832ef9bca602378dea4f2524d5113c2eaf5052b0d026,2024-06-20T12:43:25.663000
|
||||
@ -252697,6 +252702,7 @@ CVE-2024-36523,0,0,779ff20f3e54c54b68fa38cf8a73a6874fca821f18024ef38fb974b398395
|
||||
CVE-2024-36527,0,0,78d7584b160535d1351b569ab12493248c714d50ee4dfafee49cf0501ef01071,2024-06-20T12:44:22.977000
|
||||
CVE-2024-36528,0,0,f25edd031c479e2eb08ab34031d71804f3bb9f2a7bd4f1a1d0b25d391d002135,2024-06-10T18:06:22.600000
|
||||
CVE-2024-36531,0,0,991b1a5a568679e84b92f85516ddb5ed86f9e4a97046e45c71aa818ce6df4847,2024-06-10T18:06:22.600000
|
||||
CVE-2024-36532,1,1,59588622f628a9e766e59400afc9655121bcb429e9640a58ed6291563d38616d,2024-06-21T22:15:11.020000
|
||||
CVE-2024-3654,0,0,954800a828ed246c147def14a6599156bd18a3e2cc72072dd62b0ab02b4bbf53,2024-04-19T16:19:49.043000
|
||||
CVE-2024-36543,0,0,96dadbfc1ecb488523e1445b9cca4f88005d70a44d460cd8a195bc76559786cc,2024-06-20T12:44:22.977000
|
||||
CVE-2024-36547,0,0,6660ddee6e567c7988e43d4b24008e0896770307b9894b7b829c762e8a195005,2024-06-06T15:16:11.897000
|
||||
@ -253111,6 +253117,7 @@ CVE-2024-37643,0,0,dd4dd1cf62f3e08f00b2f338cadf964b79fd48d825ed68a41a2bd5d2e825e
|
||||
CVE-2024-37644,0,0,5f7f97e28e218e3fb348230aa8347ee3b0354d72853f4d6c2591e151f0231333,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37645,0,0,1f2d6a8f87fac13d3d11d6cbec3b695ad44ed6f32f14768d5b077122546347a3,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3765,0,0,4fdba2eb80818b350bc57cc64ca06a70a8e5d2cec5cc9e99a6b5fff1df632742,2024-05-17T02:40:06.923000
|
||||
CVE-2024-37654,1,1,bfe186dd8770e8a9781221dcafdd78b7e079c590fc95991e151268f2e9524093,2024-06-21T22:15:11.087000
|
||||
CVE-2024-3766,0,0,332312c4ae938e5b9f3b0590f4ebc42c71b180341fc998112e3b0be5e6d60da1,2024-06-20T16:15:14.380000
|
||||
CVE-2024-37661,0,0,81e23698cd648834aff1e39e66ffecdc62f564b919dc4643e362915df5fa1b2a,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37662,0,0,2581d16ac0c1e64ed9489a4956fd58fc745c5ab4cf8c43694c38d8d5ee60569c,2024-06-20T12:44:22.977000
|
||||
@ -253126,6 +253133,7 @@ CVE-2024-37675,0,0,2d85884f52ce751c1f86857c3080dbca34070b59adfb64d2a979b44418ef3
|
||||
CVE-2024-37676,0,0,271c181410aeef63099cc3810bbe7ece43a1293b5e30299840a89bd5cddc9e2d,2024-06-21T11:22:01.687000
|
||||
CVE-2024-3768,0,0,778d3eea8bf87c1f80239f04628ed71cfd577dabb0ce88459344c4cd4d61bb16,2024-05-17T02:40:07.203000
|
||||
CVE-2024-3769,0,0,a35a1a6580261497cd040b87c6b68395a49a236a06454712c9a126123641e120,2024-05-17T02:40:07.297000
|
||||
CVE-2024-37694,1,1,b5443d606b3fdcb928d14f416949c0c2b3a5fcdf4505d05407ccf938b25cfe71,2024-06-21T22:15:11.157000
|
||||
CVE-2024-37699,0,0,4dbc4cc43381178db8164cc7fab8921d282a1da18f386f777bcca4060de1fdc6,2024-06-21T11:22:01.687000
|
||||
CVE-2024-3770,0,0,8954a3ad0db5fc9b48d9243a1de01e444d03084d0f8b5d5da9ebc562e8f0e6a6,2024-05-17T02:40:07.387000
|
||||
CVE-2024-3771,0,0,1bf22922ed0657906343b6368a2362d22a78a1ff9d5272db064e582b3b0855d4,2024-05-17T02:40:07.477000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user