mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 11:07:05 +00:00
Auto-Update: 2024-07-18T02:00:19.301584+00:00
This commit is contained in:
parent
547d4570d3
commit
b0ba70702c
@ -2,9 +2,13 @@
|
||||
"id": "CVE-2022-22948",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2022-03-29T18:15:08.040",
|
||||
"lastModified": "2022-04-08T12:58:23.517",
|
||||
"lastModified": "2024-07-18T01:00:03.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-07-17",
|
||||
"cisaActionDue": "2024-08-07",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "VMware vCenter Server Incorrect Default File Permissions Vulnerability ",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24806",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-02-07T22:15:10.173",
|
||||
"lastModified": "2024-06-10T17:16:20.457",
|
||||
"lastModified": "2024-07-18T01:15:13.310",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -147,6 +147,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.kitware.com/cmake/cmake/-/issues/26112",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00005.html",
|
||||
"source": "security-advisories@github.com"
|
||||
|
@ -2,9 +2,13 @@
|
||||
"id": "CVE-2024-28995",
|
||||
"sourceIdentifier": "psirt@solarwinds.com",
|
||||
"published": "2024-06-06T09:15:14.167",
|
||||
"lastModified": "2024-06-11T17:47:22.867",
|
||||
"lastModified": "2024-07-18T01:00:03.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-07-17",
|
||||
"cisaActionDue": "2024-08-07",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "SolarWinds Serv-U Path Traversal Vulnerability ",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,9 +2,13 @@
|
||||
"id": "CVE-2024-34102",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T09:15:10.380",
|
||||
"lastModified": "2024-07-09T16:00:38.170",
|
||||
"lastModified": "2024-07-18T01:00:03.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-07-17",
|
||||
"cisaActionDue": "2024-08-07",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Adobe Commerce and Magento Open Source Improper Restriction of XML External Entity Reference (XXE) Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
56
CVE-2024/CVE-2024-396xx/CVE-2024-39678.json
Normal file
56
CVE-2024/CVE-2024-396xx/CVE-2024-39678.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-39678",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-18T01:15:14.197",
|
||||
"lastModified": "2024-07-18T01:15:14.197",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cooked is a recipe plugin for WordPress. The Cooked plugin is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to, and including, 1.7.15.4 due to missing or incorrect nonce validation on the AJAX action handler. This vulnerability could allow an attacker to trick users into performing an action they didn't intend to perform under their current authentication. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/XjSv/Cooked/security/advisories/GHSA-pp3h-ghxf-r9pc",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-396xx/CVE-2024-39679.json
Normal file
56
CVE-2024/CVE-2024-396xx/CVE-2024-39679.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-39679",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-18T01:15:14.450",
|
||||
"lastModified": "2024-07-18T01:15:14.450",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to, and including, 1.7.15.4 due to missing or incorrect nonce validation on the AJAX action handler. This vulnerability could allow an attacker to trick users into performing an action they didn't intend to perform under their current authentication. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/XjSv/Cooked/security/advisories/GHSA-2jh3-9939-c4rc",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-396xx/CVE-2024-39680.json
Normal file
56
CVE-2024/CVE-2024-396xx/CVE-2024-39680.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-39680",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-18T01:15:14.647",
|
||||
"lastModified": "2024-07-18T01:15:14.647",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to, and including, 1.7.15.4 due to missing or incorrect nonce validation on the AJAX action handler. This vulnerability could allow an attacker to trick users into performing an action they didn't intend to perform under their current authentication. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/XjSv/Cooked/security/advisories/GHSA-f2mc-hcp9-6xgr",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-396xx/CVE-2024-39681.json
Normal file
56
CVE-2024/CVE-2024-396xx/CVE-2024-39681.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-39681",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-18T01:15:14.850",
|
||||
"lastModified": "2024-07-18T01:15:14.850",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to, and including, 1.7.15.4 due to missing or incorrect nonce validation on the AJAX action handler. This vulnerability could allow an attacker to trick users into performing an action they didn't intend to perform under their current authentication. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/XjSv/Cooked/security/advisories/GHSA-q7p9-2x5h-vxm7",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-396xx/CVE-2024-39682.json
Normal file
56
CVE-2024/CVE-2024-396xx/CVE-2024-39682.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-39682",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-18T01:15:15.043",
|
||||
"lastModified": "2024-07-18T01:15:15.043",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to HTML Injection in versions up to, and including, 1.7.15.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level access and above to inject arbitrary HTML in pages that will be shown whenever a user accesses a compromised page. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-116"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/XjSv/Cooked/security/advisories/GHSA-fx69-f77x-84gr",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-411xx/CVE-2024-41184.json
Normal file
28
CVE-2024/CVE-2024-411xx/CVE-2024-41184.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-41184",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-18T01:15:15.253",
|
||||
"lastModified": "2024-07-18T01:15:15.253",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the vrrp_ipsets_handler handler (fglobal_parser.c) of keepalived through 2.3.1, an integer overflow can occur. NOTE: this CVE Record might not be worthwhile because an empty ipset name must be configured by the user."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/acassen/keepalived/issues/2447#issuecomment-2231329734",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
26
README.md
26
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-17T23:55:17.916470+00:00
|
||||
2024-07-18T02:00:19.301584+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-17T22:15:03.923000+00:00
|
||||
2024-07-18T01:15:15.253000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,31 +27,35 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2024-07-17T00:00:08.649355+00:00
|
||||
2024-07-18T00:00:08.654145+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
257413
|
||||
257419
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2023-43971](CVE-2023/CVE-2023-439xx/CVE-2023-43971.json) (`2024-07-17T22:15:03.627`)
|
||||
- [CVE-2024-40492](CVE-2024/CVE-2024-404xx/CVE-2024-40492.json) (`2024-07-17T22:15:03.923`)
|
||||
- [CVE-2024-39678](CVE-2024/CVE-2024-396xx/CVE-2024-39678.json) (`2024-07-18T01:15:14.197`)
|
||||
- [CVE-2024-39679](CVE-2024/CVE-2024-396xx/CVE-2024-39679.json) (`2024-07-18T01:15:14.450`)
|
||||
- [CVE-2024-39680](CVE-2024/CVE-2024-396xx/CVE-2024-39680.json) (`2024-07-18T01:15:14.647`)
|
||||
- [CVE-2024-39681](CVE-2024/CVE-2024-396xx/CVE-2024-39681.json) (`2024-07-18T01:15:14.850`)
|
||||
- [CVE-2024-39682](CVE-2024/CVE-2024-396xx/CVE-2024-39682.json) (`2024-07-18T01:15:15.043`)
|
||||
- [CVE-2024-41184](CVE-2024/CVE-2024-411xx/CVE-2024-41184.json) (`2024-07-18T01:15:15.253`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `4`
|
||||
|
||||
- [CVE-2018-25031](CVE-2018/CVE-2018-250xx/CVE-2018-25031.json) (`2024-07-17T22:15:02.130`)
|
||||
- [CVE-2019-7321](CVE-2019/CVE-2019-73xx/CVE-2019-7321.json) (`2024-07-17T22:15:02.780`)
|
||||
- [CVE-2021-3407](CVE-2021/CVE-2021-34xx/CVE-2021-3407.json) (`2024-07-17T22:15:03.267`)
|
||||
- [CVE-2024-3735](CVE-2024/CVE-2024-37xx/CVE-2024-3735.json) (`2024-07-17T22:15:03.767`)
|
||||
- [CVE-2022-22948](CVE-2022/CVE-2022-229xx/CVE-2022-22948.json) (`2024-07-18T01:00:03.190`)
|
||||
- [CVE-2024-24806](CVE-2024/CVE-2024-248xx/CVE-2024-24806.json) (`2024-07-18T01:15:13.310`)
|
||||
- [CVE-2024-28995](CVE-2024/CVE-2024-289xx/CVE-2024-28995.json) (`2024-07-18T01:00:03.197`)
|
||||
- [CVE-2024-34102](CVE-2024/CVE-2024-341xx/CVE-2024-34102.json) (`2024-07-18T01:00:03.197`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
26
_state.csv
26
_state.csv
@ -121310,7 +121310,7 @@ CVE-2018-25028,0,0,f8d63491deeceb41c450ce7c162bc94d0fb413c8d161119b1512c342b0865
|
||||
CVE-2018-25029,0,0,7ccab6ea2195b5dd76c36bd6ed569ce887f6f05b36621177f20eebf813cdbf51,2022-02-09T15:45:48.157000
|
||||
CVE-2018-2503,0,0,9d55343570c109a43add370d783b903ac0623bf175f051499f55aca47eacbde0,2021-09-09T17:17:24.160000
|
||||
CVE-2018-25030,0,0,02a9358d201382a704d7f138a3119bd7ee0e360fc4e5a40b1eee38c35559e1b9,2022-04-04T19:13:21.520000
|
||||
CVE-2018-25031,0,1,56b5c39642e66e28458e6230fe48a4a43fea94a41f4c78621d3a983bf632abd5,2024-07-17T22:15:02.130000
|
||||
CVE-2018-25031,0,0,56b5c39642e66e28458e6230fe48a4a43fea94a41f4c78621d3a983bf632abd5,2024-07-17T22:15:02.130000
|
||||
CVE-2018-25032,0,0,3012a2b19a039592d330912db6df82bf4697afa3b316ff1ce8a29e7eafe5a03d,2023-11-07T02:56:26.393000
|
||||
CVE-2018-25033,0,0,f0629aee2eebec42636f555818f70093ddc02b3111bf52c252c0cab48b37702c,2022-10-06T17:50:38.090000
|
||||
CVE-2018-25034,0,0,2a8e3f404ad2ceab1cf87b8301be191bb8486d945ca7af8c9e79480c3e1bfdf4,2024-05-17T01:27:25.100000
|
||||
@ -141894,7 +141894,7 @@ CVE-2019-7315,0,0,655babeca8c8699ebe56def6d52ff3c4b5fbcee0d182a155d3e1a91e48b210
|
||||
CVE-2019-7316,0,0,22e4f7dc81144e2f39b945be48c90c90554c014ce135857c8859d70d0fe2a95f,2020-10-07T08:15:11.913000
|
||||
CVE-2019-7317,0,0,e3ac777710ff4108a7e59a3307fb05f90498d96734fa188ef7979b224d8a565d,2022-05-23T15:02:40.667000
|
||||
CVE-2019-7319,0,0,ff03b6e890c756d023fcb6ea16e98e9b0a55bbdac32849e3402df42d3c97907c,2020-08-24T17:37:01.140000
|
||||
CVE-2019-7321,0,1,1d6b4993fae010ef0105848e03183914a19e00a1b2660bc7ad64c145cfe06bde,2024-07-17T22:15:02.780000
|
||||
CVE-2019-7321,0,0,1d6b4993fae010ef0105848e03183914a19e00a1b2660bc7ad64c145cfe06bde,2024-07-17T22:15:02.780000
|
||||
CVE-2019-7323,0,0,d44784f70f4d24610b0d52acad664b5c526cfbb90381285299d127aa60c8eb76,2020-08-24T17:37:01.140000
|
||||
CVE-2019-7324,0,0,66e1fc0708200fe70c650fed6c8ccf3507f0ad4b917597a4f02c24924038664e,2019-05-30T04:29:02.260000
|
||||
CVE-2019-7325,0,0,162a3d8901e60b0c954b54fdf54634a60920b838e996dcdd8f23ac89a4ca4a01,2019-02-04T20:13:58.267000
|
||||
@ -177328,7 +177328,7 @@ CVE-2021-34066,0,0,5126193e9c71443b4a22f0935088fa7ee82f64eda0c2e1df14adc32887a0c
|
||||
CVE-2021-34067,0,0,5a0a61b0c0d0fc042b1c83eea1073d85b4330e36961e3ff3b94e800d392c3b4b,2021-06-28T19:28:44.813000
|
||||
CVE-2021-34068,0,0,e8d6b8018740e03c17e69dafb24f61ac0f7df5e531dcd9c94ca32e3517286dc9,2021-06-28T19:29:26.300000
|
||||
CVE-2021-34069,0,0,e7ad0b523697bec4aab65c5ddce8d4c5ab89991372a77313f0b10b216b14192d,2021-06-28T19:31:38.967000
|
||||
CVE-2021-3407,0,1,9ec547d9916a8df0fd80f06512c6626cd94433c9980bd1ba6593fcd09b446511,2024-07-17T22:15:03.267000
|
||||
CVE-2021-3407,0,0,9ec547d9916a8df0fd80f06512c6626cd94433c9980bd1ba6593fcd09b446511,2024-07-17T22:15:03.267000
|
||||
CVE-2021-34070,0,0,104b59404eff79ab9d17bb47922cec730764feabe226adb513d4f02b90a5274d,2021-06-28T19:47:06.480000
|
||||
CVE-2021-34071,0,0,1d01218a96968960fb6b41dc5ea96329b5d0429e0dfec032a981cd29856b82f2,2021-06-28T19:28:22.080000
|
||||
CVE-2021-34073,0,0,6673cbd9119103710430438dc8240a1499ffc7e7ed800b0a61b4e18eb60755fc,2022-02-02T18:57:52.867000
|
||||
@ -192121,7 +192121,7 @@ CVE-2022-22944,0,0,676327d4717b5599b517d5b9312003bcf76a812f9682a770d499e471fe26d
|
||||
CVE-2022-22945,0,0,bdfdc441e34f91eac1742b462e9c0a34fe3ccbc2ba19b6adc6510fa95bca2424,2022-02-24T19:34:56.947000
|
||||
CVE-2022-22946,0,0,73897096059cc424e53bda43ae5450b515058d43231cccbf62c5a84242160584,2023-02-22T17:46:02.053000
|
||||
CVE-2022-22947,0,0,738b6d7713474e3640f15bcd0d152fc4f07008ff7eed844c4608516845220bea,2023-07-24T13:47:34.933000
|
||||
CVE-2022-22948,0,0,a43fbcbb1fce95a7750267b08cf594d82d68cc322b284678dd17a81da734613c,2022-04-08T12:58:23.517000
|
||||
CVE-2022-22948,0,1,ce21bf3961b0ce4d12a0e857c996b766bc1e28e4173002304b3c80c3d6835a13,2024-07-18T01:00:03.190000
|
||||
CVE-2022-2295,0,0,e4b52112ad8f99baa7a29a7f5984129d950df22bc437645727743c1c8383cf88,2023-11-07T03:46:26.940000
|
||||
CVE-2022-22950,0,0,bc50cb5b67d3eab9006ffdc7603f3dd6c3d4b852de6313ed43aa1f6a3b01b571,2022-06-22T13:53:48.523000
|
||||
CVE-2022-22951,0,0,15080fd6724635e5906f80ec4801576fa6eb657b857d86f9f47fc7611d4882fa,2022-03-29T18:07:19.457000
|
||||
@ -232814,7 +232814,7 @@ CVE-2023-43959,0,0,3e0508b282ce13b7ab31b65b36da1089fb9bc1c29185cb09f3c4226ee594b
|
||||
CVE-2023-43960,0,0,9436258b0be27800fafff316b46719607100f02382a5925bda03f182056bac68,2023-11-07T04:21:32.280000
|
||||
CVE-2023-43961,0,0,d022a1326b47938450ca513431def271a90d142825dd394edf75f3be724de0cc,2023-11-01T16:16:14.943000
|
||||
CVE-2023-4397,0,0,806c05c57b1f10660e4c63dcf9d9a34cfadf8928a75c42c7a5c8fcfbece74dfc,2023-12-04T18:05:04.100000
|
||||
CVE-2023-43971,1,1,d37f04505d6675450d12a28946952c7ea0f6f258eeb49605afad64439970130f,2024-07-17T22:15:03.627000
|
||||
CVE-2023-43971,0,0,d37f04505d6675450d12a28946952c7ea0f6f258eeb49605afad64439970130f,2024-07-17T22:15:03.627000
|
||||
CVE-2023-43976,0,0,02187eddeb3770a7f1febec00624360ee5250e93dc31f3e8b51b3ba1d9bb4442,2023-10-05T15:17:11.293000
|
||||
CVE-2023-43979,0,0,b42ecb5c3472ee75481a81f4bcc721f9df20b88fcd306940b556920c1fd7490b,2023-11-21T14:07:31.363000
|
||||
CVE-2023-4398,0,0,941805a464290ceda704bc08a9de74a80348460471c7271929b1e2e9a230208e,2023-12-04T18:04:39.363000
|
||||
@ -245637,7 +245637,7 @@ CVE-2024-24802,0,0,a3054874cea3e4ddec20762d87678c546be7a7cac44d0c43b4a45ea605093
|
||||
CVE-2024-24803,0,0,74e92479f62cd0411139e8b183d7dd3bc446eea167bcdbacd6856d4b7e385883,2024-02-16T16:19:58.613000
|
||||
CVE-2024-24804,0,0,e6025e87c4f7965ab7255f018b77982a520eae47324b8f9c7078be3b4a7f8f69,2024-02-16T16:21:45.077000
|
||||
CVE-2024-24805,0,0,7e421e9c4abbd7f7f2c7445a2833db520e5bed2f438e49450ca7d917d4321daa,2024-03-26T12:55:05.010000
|
||||
CVE-2024-24806,0,0,ce954d27b3923b0affac08bf1505b879c1560fb122f1573ebd6e239d04c8fc1a,2024-06-10T17:16:20.457000
|
||||
CVE-2024-24806,0,1,1688aa2dcd3688974086948b2067d49d2894195562807705bbdc1ffc220c3c57,2024-07-18T01:15:13.310000
|
||||
CVE-2024-24807,0,0,41060939121a77a6243ea5618e33da445c7c71ec0e8a937d01b8188d0ed19963,2024-02-12T21:41:24.647000
|
||||
CVE-2024-24808,0,0,cb4631cbca81298fbc763dc04fda77ba611e821808a71c52cd98e8c732ece1cf,2024-02-13T22:48:57.290000
|
||||
CVE-2024-24809,0,0,f93dd64bdf57f87913d977db705a10f553354641c48f0bbfc502a4b0d9bc66d3,2024-04-10T19:49:51.183000
|
||||
@ -248620,7 +248620,7 @@ CVE-2024-28984,0,0,276bc8c54cf8ee7419930c3e9177a9acf5146d6167c989ef6d1387fafadac
|
||||
CVE-2024-2899,0,0,0be0fb50fdcc13228c9b49554460e4a306be4c6e83ee7f9bfb94b945f4f9e595,2024-05-17T02:38:36.220000
|
||||
CVE-2024-28992,0,0,19a63c4052cdaff0d7746db7eeae97f54e5681bf9669cce818ddbbe24f83c37f,2024-07-17T15:15:13.623000
|
||||
CVE-2024-28993,0,0,eb2584493870b2cc973f87466125031a7ce8888dd862a361e8286f2ec84e3c54,2024-07-17T15:15:13.860000
|
||||
CVE-2024-28995,0,0,676b16f660765af69774a2536c884c955247c2299098c9e12021fd7eab69b47f,2024-06-11T17:47:22.867000
|
||||
CVE-2024-28995,0,1,23c52fbffb3e9fb74833a00e094548a239a07eefa8716c4e259000599c6e6a05,2024-07-18T01:00:03.197000
|
||||
CVE-2024-28996,0,0,09468fc42886d2b9d5b470ae44f5a5cbca16443960a600683fb24e9570dc922c,2024-06-06T16:23:24.377000
|
||||
CVE-2024-28999,0,0,768d1b3fe866566c9082c710789c8fcaa529e82f91bdfdec236693dabe93837d,2024-06-06T19:06:50.923000
|
||||
CVE-2024-2900,0,0,9bd5558f52cf3da4bca76efc39f079db00859b82397c98864e9f0561a07bb703,2024-05-17T02:38:36.333000
|
||||
@ -252023,7 +252023,7 @@ CVE-2024-34099,0,0,348209bc0dad2be9d67513a23a3e024e95a59b4c00a0cf1f3dbd4d6fed8a4
|
||||
CVE-2024-3410,0,0,533c3c87802e0074c9d8405f1348fe90ff7e170f7331b0fceecfe41f39301921,2024-07-11T15:06:16.780000
|
||||
CVE-2024-34100,0,0,16a99aff4b4caad000c1a0ba35879f8d0022c815a7936897694c2a34486071ff,2024-05-15T16:40:19.330000
|
||||
CVE-2024-34101,0,0,d241a941311347a3e02d5d35bda706d1089d6d6f767584d8dcfa622e3001e4e4,2024-05-15T16:40:19.330000
|
||||
CVE-2024-34102,0,0,8b1e6e557dce53483243926c2b72d923bdfc128d2c064f0699990d66fcdbe8e2,2024-07-09T16:00:38.170000
|
||||
CVE-2024-34102,0,1,f536eb73d9ffa51de1c60d0da7cdbc91c1a0278d2ed255da17cedda31f00687f,2024-07-18T01:00:03.197000
|
||||
CVE-2024-34103,0,0,8e858e6deebf3dd74486b084ebc01e723dadd4c1741289465f9eef03525519ca,2024-07-09T15:36:11.363000
|
||||
CVE-2024-34104,0,0,0c3b9794948346667daf712c1fa8aea7e59869808e596eca4e201c3b2e06e87d,2024-07-09T15:36:40.730000
|
||||
CVE-2024-34105,0,0,279c20cbee5e4f9fb4c4f5bc11b2ac4f0b15f01288e2ef51f37efbef66bcba62,2024-07-09T15:34:26.507000
|
||||
@ -254065,7 +254065,7 @@ CVE-2024-37346,0,0,a4475e8bc16526d4a2cd923965b515305302813fd73edbfa3f18575d405f6
|
||||
CVE-2024-37347,0,0,6e7baea952ef385b67b23083cebbb129c77e5630de3ec6d82658c88bc410c4ea,2024-06-21T11:22:01.687000
|
||||
CVE-2024-37348,0,0,49b92234970ec422b020245ff1e6f7259c16f36e8db6b7b874fd77e08ed0a6ef,2024-06-21T11:22:01.687000
|
||||
CVE-2024-37349,0,0,d5bdd857cd8357de07400ace5da8b29cdb394b047c72e22b130727701a2be1cc,2024-06-21T11:22:01.687000
|
||||
CVE-2024-3735,0,1,867967ad258d810aceaf10910dcdbb6596bc335686c253a30799183e4a1efe20,2024-07-17T22:15:03.767000
|
||||
CVE-2024-3735,0,0,867967ad258d810aceaf10910dcdbb6596bc335686c253a30799183e4a1efe20,2024-07-17T22:15:03.767000
|
||||
CVE-2024-37350,0,0,db322a02568c197ff2f4cce28d07f13a6d84645dcf6fb2d6d98030bff57992f6,2024-06-21T11:22:01.687000
|
||||
CVE-2024-37351,0,0,5d28c3ae9e671d4e970680119129fdfd5cef4f93d0af956f6a6aef99cac6535d,2024-06-21T11:22:01.687000
|
||||
CVE-2024-37352,0,0,8cb2d15b6cc19b492a4019e2458fe1e37bdb4a8988d34a37da730385b336d322,2024-06-21T11:22:01.687000
|
||||
@ -255061,7 +255061,12 @@ CVE-2024-39669,0,0,56d6b274e749be30b1ff4d12ff6c858882279f47b773d710e8ac61d1e37bc
|
||||
CVE-2024-3967,0,0,5862f1bd72fcf48f7d564d5c642edefacf28c5dccb3d99f9648feaeaf3e033bf,2024-05-15T18:35:11.453000
|
||||
CVE-2024-39675,0,0,324904789d577f8da38a1b1d1fcdf082a86fba9fd2cc1697c3fb80289cc5120e,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39677,0,0,c1a0d9a5a9ccbb7df09329c8ee16f641c4f9bc5f42ed88da1c64c5051e623648,2024-07-08T15:49:22.437000
|
||||
CVE-2024-39678,1,1,6cdbe347637ab1f23c22720cd52e57f8d5b0d304694d574abaf524872a3d022e,2024-07-18T01:15:14.197000
|
||||
CVE-2024-39679,1,1,451cf8c9372f3467583a53494466ff2200c12b9b363278fa9735a9966bcc0d36,2024-07-18T01:15:14.450000
|
||||
CVE-2024-3968,0,0,6e8a3540463fef006a115080523279717acfbbd27b5f9241de34d6d7c04d7716,2024-05-15T18:35:11.453000
|
||||
CVE-2024-39680,1,1,cc48024f75d5a6dc740e660c22180d9e8abb171be4f57b5e5972ea8bf4382779,2024-07-18T01:15:14.647000
|
||||
CVE-2024-39681,1,1,b7143624a5a8d96f70453d6634cf263e3163cbc000f3776d0f69b99e4c796e21,2024-07-18T01:15:14.850000
|
||||
CVE-2024-39682,1,1,e7fa5b5fc85367eeb4ddc275c92cf92d9007fe076293bbd6142028cda6308b64,2024-07-18T01:15:15.043000
|
||||
CVE-2024-39683,0,0,50045bf714bd4fe128b5e5cfcc599ff1064b3297e6cc6d531afb9c370803dce0,2024-07-05T12:55:51.367000
|
||||
CVE-2024-39684,0,0,9d26c3e7317b12372df75a7602ccce6b06916da9f4cacf1feb034e7c487c35cc,2024-07-11T13:06:13.187000
|
||||
CVE-2024-39687,0,0,1f0dde45c697bd142eb547e4c25395e40bc6f58804b4b24f10fa4126a251ad78,2024-07-08T15:49:22.437000
|
||||
@ -255254,7 +255259,7 @@ CVE-2024-4045,0,0,2ae0d8f233b2cc7f6d27d9d81b74b74fd6cc2876f88a425dbeb60d35e4802b
|
||||
CVE-2024-40455,0,0,31e25278556a7a569f6d48ca8afce7491b76507f09027ad01ea2eacbbf9dde95,2024-07-17T13:34:20.520000
|
||||
CVE-2024-40456,0,0,b69676c819bae5d36b3537137bd74debeb1a273fb95e8271fb39d39294f7a466,2024-07-17T13:34:20.520000
|
||||
CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcdb1,2024-05-14T16:11:39.510000
|
||||
CVE-2024-40492,1,1,dcf98c4743de8f845862878ba9266e6187a1618cf1ef468007fbfaafcf221ffc,2024-07-17T22:15:03.923000
|
||||
CVE-2024-40492,0,0,dcf98c4743de8f845862878ba9266e6187a1618cf1ef468007fbfaafcf221ffc,2024-07-17T22:15:03.923000
|
||||
CVE-2024-40503,0,0,b7b74c3ecc2e3dadce6e3ea76ca2bffcfa4a5e02454bb102e0ec56df0b252cc5,2024-07-17T13:34:20.520000
|
||||
CVE-2024-40505,0,0,a786b0d0057f0bbe60b81b592bc5adaae8e017b897b7a005a6c8b1ead930e40f,2024-07-17T13:34:20.520000
|
||||
CVE-2024-40515,0,0,aa3af036b6952485bf51fdea15dd678b9b42e4cd0dbbfc73284a7100fad8108a,2024-07-17T13:34:20.520000
|
||||
@ -255492,6 +255497,7 @@ CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994
|
||||
CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000
|
||||
CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000
|
||||
CVE-2024-4118,0,0,261b7c2db2db4c5bd0863007ba022afd6141eeb3c40d43094e801a457a5edb93,2024-06-04T19:20:30.147000
|
||||
CVE-2024-41184,1,1,8f999a9f4e2a7f8e9dfc5120773102efb66c2c004a73207b947644ab9ec949c0,2024-07-18T01:15:15.253000
|
||||
CVE-2024-4119,0,0,1787463dab796293e9249fc34f7a40843b12d1d129a7d5ccdb513e5ec2672067,2024-06-04T19:20:30.247000
|
||||
CVE-2024-4120,0,0,820754c86895fc4e7f3a6d10baae3c2abd537610acf37474f492c12f46cc8b59,2024-06-04T19:20:30.353000
|
||||
CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd920,2024-06-04T19:20:30.460000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user