mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 03:27:17 +00:00
Auto-Update: 2024-10-09T06:00:16.746614+00:00
This commit is contained in:
parent
a6c2d39065
commit
b32607593b
@ -2,89 +2,15 @@
|
||||
"id": "CVE-2022-3857",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-03-06T23:15:11.087",
|
||||
"lastModified": "2023-04-06T13:15:08.467",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-10-09T04:15:06.567",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in libpng 1.6.38. A crafted PNG image can lead to a segmentation fault and denial of service in png_setup_paeth_row() function."
|
||||
"value": "Rejected reason: Maintainer contacted. This is a false-positive. The flaw does not actually exist and was erroneously tested."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:libpng:libpng:1.6.38:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "45C37638-8FB7-43EF-9997-29F25A3D5453"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230406-0004/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://sourceforge.net/p/libpng/bugs/300/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
25
CVE-2024/CVE-2024-252xx/CVE-2024-25282.json
Normal file
25
CVE-2024/CVE-2024-252xx/CVE-2024-25282.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-25282",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-09T04:15:07.287",
|
||||
"lastModified": "2024-10-09T04:15:07.287",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "3DSecure 2.0 allows XSS in its 3DSMethod Authentication via a modified params parameter in a /rest/online request with a /redirect?action=challenge&txn= substring."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://pagosonline.redsys.es/funcionalidades-autenticacion3DS.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2024/Sep/27",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-252xx/CVE-2024-25283.json
Normal file
25
CVE-2024/CVE-2024-252xx/CVE-2024-25283.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-25283",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-09T04:15:07.483",
|
||||
"lastModified": "2024-10-09T04:15:07.483",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "3DSecure 2.0 allows reflected XSS in the 3DS Authorization Challenge via a modified params parameter in a /rest/online request with a /redirect?action=challenge&txn= substring."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://pagosonline.redsys.es/funcionalidades-autenticacion3DS.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2024/Sep/28",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-252xx/CVE-2024-25284.json
Normal file
25
CVE-2024/CVE-2024-252xx/CVE-2024-25284.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-25284",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-09T04:15:07.597",
|
||||
"lastModified": "2024-10-09T04:15:07.597",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "3DSecure 2.0 allows reflected XSS in the 3DS Authorization Method via the threeDsMethod.jsp threeDSMethodData parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://pagosonline.redsys.es/funcionalidades-autenticacion3DS.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2024/Sep/29",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-252xx/CVE-2024-25285.json
Normal file
25
CVE-2024/CVE-2024-252xx/CVE-2024-25285.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-25285",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-09T04:15:07.700",
|
||||
"lastModified": "2024-10-09T04:15:07.700",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "3DSecure 2.0 allows form action hijacking via threeDsMethod.jsp?threeDSMethodData= or the threeDSMethodNotificationURL parameter. The destination web site for a form submission can be modified."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://pagosonline.redsys.es/funcionalidades-autenticacion3DS.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2024/Sep/30",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-252xx/CVE-2024-25286.json
Normal file
21
CVE-2024/CVE-2024-252xx/CVE-2024-25286.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-25286",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-09T04:15:07.880",
|
||||
"lastModified": "2024-10-09T04:15:07.880",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "3DSecure 2.0 allows CSRF in the Authorization Method via modified Origin and Referer HTTP headers."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2024/Sep/31",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-326xx/CVE-2024-32608.json
Normal file
21
CVE-2024/CVE-2024-326xx/CVE-2024-32608.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-32608",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-09T05:15:13.110",
|
||||
"lastModified": "2024-10-09T05:15:13.110",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HDF5 library through 1.14.3 has memory corruption in H5A__close resulting in the corruption of the instruction pointer and causing denial of service or potential code execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-352xx/CVE-2024-35288.json
Normal file
29
CVE-2024/CVE-2024-352xx/CVE-2024-35288.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-35288",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-09T04:15:08.233",
|
||||
"lastModified": "2024-10-09T04:15:08.233",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nitro PDF Pro before 13.70.8.82 and 14.x before 14.26.1.0 allows Local Privilege Escalation in the MSI Installer because custom actions occur unsafely in repair mode. CertUtil is run in a conhost.exe window, and there is a mechanism allowing CTRL+o to launch cmd.exe as NT AUTHORITY\\SYSTEM."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec-consult.com/vulnerability-lab/advisory/local-privilege-escalation-via-msi-installer-in-nitro-pdf-pro/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2024/Sep/59",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.gonitro.com/support/downloads#securityUpdates",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-429xx/CVE-2024-42934.json
Normal file
29
CVE-2024/CVE-2024-429xx/CVE-2024-42934.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-42934",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-09T05:15:13.270",
|
||||
"lastModified": "2024-10-09T05:15:13.270",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OpenIPMI before 2.0.36 has an out-of-bounds array access (for authentication type) in the ipmi_sim simulator, resulting in denial of service or (with very low probability) authentication bypass or code execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308375",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://sourceforge.net/p/openipmi/code/ci/4c129d0540f3578ecc078d8612bbf84b6cd24c87",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://sourceforge.net/p/openipmi/code/ci/b52e8e2538b2b48ef6b63bff12b5cc9e2d52eff1/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-451xx/CVE-2024-45160.json
Normal file
37
CVE-2024/CVE-2024-451xx/CVE-2024-45160.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-45160",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-09T05:15:13.343",
|
||||
"lastModified": "2024-10-09T05:15:13.343",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect credential validation in LemonLDAP::NG 2.18.x and 2.19.x before 2.19.2 allows attackers to bypass OAuth2 client authentication via an empty client_password parameter (client secret)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/06d771cbc2d5c752354c50f83e4912e5879f9aa2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/236cdfe42c1dc04a15a4a40c5e6a8c2e858d71d7",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/696f49a0855faeb271096dccb8381e2129687c3d",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/3223",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/tags",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-451xx/CVE-2024-45179.json
Normal file
21
CVE-2024/CVE-2024-451xx/CVE-2024-45179.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-45179",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-09T04:15:09.487",
|
||||
"lastModified": "2024-10-09T04:15:09.487",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in za-internet C-MOR Video Surveillance 5.2401 and 6.00PL01. Due to insufficient input validation, the C-MOR web interface is vulnerable to OS command injection attacks. It was found out that different functionality is vulnerable to OS command injection attacks, for example for generating new X.509 certificates, or setting the time zone. These OS command injection vulnerabilities in the script generatesslreq.pml can be exploited as a low-privileged authenticated user to execute commands in the context of the Linux user www-data via shell metacharacters in HTTP POST data (e.g., the city parameter). The OS command injection vulnerability in the script settimezone.pml or setdatetime.pml (e.g., via the year parameter) requires an administrative user for the C-MOR web interface. By also exploiting a privilege-escalation vulnerability, it is possible to execute commands on the C-MOR system with root privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-030.txt",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
49
CVE-2024/CVE-2024-471xx/CVE-2024-47191.json
Normal file
49
CVE-2024/CVE-2024-471xx/CVE-2024-47191.json
Normal file
@ -0,0 +1,49 @@
|
||||
{
|
||||
"id": "CVE-2024-47191",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-09T05:15:13.420",
|
||||
"lastModified": "2024-10-09T05:15:13.420",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "pam_oath.so in oath-toolkit 2.6.7 through 2.6.11 before 2.6.12 allows root privilege escalation because, in the context of PAM code running as root, it mishandles usersfile access, such as by calling fchown in the presence of a symlink."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/3235a52f6b87cd1c5da6508f421ac261f5e33a70",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/3271139989fde35ab0163b558fc29e80c3a280e5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/60d9902b5c20f27e70f8e9c816bfdc0467567e1a",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/95ef255e6a401949ce3f67609bf8aac2029db418",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/oath-toolkit/oath-toolkit/-/issues/43",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.opensuse.org/2024/10/04/oath-toolkit-vulnerability.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.nongnu.org/oath-toolkit/security/CVE-2024-47191",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2024/10/04/2",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
26
README.md
26
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-10-09T04:00:16.948659+00:00
|
||||
2024-10-09T06:00:16.746614+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-10-09T02:15:33.870000+00:00
|
||||
2024-10-09T05:15:13.420000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,23 +33,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
265035
|
||||
265046
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `11`
|
||||
|
||||
- [CVE-2024-7963](CVE-2024/CVE-2024-79xx/CVE-2024-7963.json) (`2024-10-09T02:15:33.870`)
|
||||
- [CVE-2024-25282](CVE-2024/CVE-2024-252xx/CVE-2024-25282.json) (`2024-10-09T04:15:07.287`)
|
||||
- [CVE-2024-25283](CVE-2024/CVE-2024-252xx/CVE-2024-25283.json) (`2024-10-09T04:15:07.483`)
|
||||
- [CVE-2024-25284](CVE-2024/CVE-2024-252xx/CVE-2024-25284.json) (`2024-10-09T04:15:07.597`)
|
||||
- [CVE-2024-25285](CVE-2024/CVE-2024-252xx/CVE-2024-25285.json) (`2024-10-09T04:15:07.700`)
|
||||
- [CVE-2024-25286](CVE-2024/CVE-2024-252xx/CVE-2024-25286.json) (`2024-10-09T04:15:07.880`)
|
||||
- [CVE-2024-32608](CVE-2024/CVE-2024-326xx/CVE-2024-32608.json) (`2024-10-09T05:15:13.110`)
|
||||
- [CVE-2024-35288](CVE-2024/CVE-2024-352xx/CVE-2024-35288.json) (`2024-10-09T04:15:08.233`)
|
||||
- [CVE-2024-42934](CVE-2024/CVE-2024-429xx/CVE-2024-42934.json) (`2024-10-09T05:15:13.270`)
|
||||
- [CVE-2024-45160](CVE-2024/CVE-2024-451xx/CVE-2024-45160.json) (`2024-10-09T05:15:13.343`)
|
||||
- [CVE-2024-45179](CVE-2024/CVE-2024-451xx/CVE-2024-45179.json) (`2024-10-09T04:15:09.487`)
|
||||
- [CVE-2024-47191](CVE-2024/CVE-2024-471xx/CVE-2024-47191.json) (`2024-10-09T05:15:13.420`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `3`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2024-21338](CVE-2024/CVE-2024-213xx/CVE-2024-21338.json) (`2024-10-09T02:15:15.920`)
|
||||
- [CVE-2024-21413](CVE-2024/CVE-2024-214xx/CVE-2024-21413.json) (`2024-10-09T02:15:22.417`)
|
||||
- [CVE-2024-26256](CVE-2024/CVE-2024-262xx/CVE-2024-26256.json) (`2024-10-09T02:15:27.847`)
|
||||
- [CVE-2022-3857](CVE-2022/CVE-2022-38xx/CVE-2022-3857.json) (`2024-10-09T04:15:06.567`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
21
_state.csv
21
_state.csv
@ -204941,7 +204941,7 @@ CVE-2022-38566,0,0,14467589f235771bd764d591ab2e9c5095dbfaf92cb92ebeb054bb38a3c7a
|
||||
CVE-2022-38567,0,0,7271a699cfb016e5e3cbb46d04caa8a117b36c9d179fb78444cf2322f8de12f7,2022-09-01T14:29:56.363000
|
||||
CVE-2022-38568,0,0,e229a9ed87183134622b2f01827196776d32acfed3f472d36c294d23ce0787d0,2022-09-01T14:30:15.377000
|
||||
CVE-2022-38569,0,0,14769d59bafef3515add0bc88039d6067ed421e05ca1a7fa180e5a8b2dcaaa83,2022-09-01T14:20:06.227000
|
||||
CVE-2022-3857,0,0,e7b5241bcbaf4a6de046bfa9bc4f99ba763b22b4a71d3a8d172d21434014f22c,2023-04-06T13:15:08.467000
|
||||
CVE-2022-3857,0,1,6ab9271d39c393f96f6990c7f09a1c165dfbe60d5443ce4aef141d7be7771dbd,2024-10-09T04:15:06.567000
|
||||
CVE-2022-38570,0,0,2e28318466274291937aec6f8b39a5109aa026041abda9c04cdb5a59effb71f6,2022-09-01T14:21:21.287000
|
||||
CVE-2022-38571,0,0,a578b47e6cfa84664dad5ce4e2ffe6777951f1dd88b927778bf66de0080be3b1,2022-09-01T14:22:51.440000
|
||||
CVE-2022-38573,0,0,96ed6762c2ca261e542c39bb76ef24453b222d63f22bae93539549e1a72d49c1,2022-09-24T02:05:24.637000
|
||||
@ -244028,7 +244028,7 @@ CVE-2024-21334,0,0,bb98735e0397eef282b3bf0c8a7f17fd1a894c0580516f67c50b6ae552edb
|
||||
CVE-2024-21335,0,0,d3be0da75c93e40dc74ef43532ac464e7457c464e235cbe682e70d325b6a979e,2024-07-09T18:18:38.713000
|
||||
CVE-2024-21336,0,0,4632192569ed60af4d57d1dd58a5b140d682aa1d82fc677d5ec51bcb39be3541,2024-06-11T15:15:59.553000
|
||||
CVE-2024-21337,0,0,1ed4e9ec6936be258d1de771e0acb5830541ca48fb0a246032f3c3930147d134,2024-05-29T00:15:20.793000
|
||||
CVE-2024-21338,0,1,d38e773ba98c42ebacc4689be186920dfbc7e8b70e880497eafe3190365889c0,2024-10-09T02:15:15.920000
|
||||
CVE-2024-21338,0,0,d38e773ba98c42ebacc4689be186920dfbc7e8b70e880497eafe3190365889c0,2024-10-09T02:15:15.920000
|
||||
CVE-2024-21339,0,0,3b2246ef5e1d88b753a2538b4b172fb8ad25db9ef5e4dae729823984d67c0483,2024-05-29T00:15:21.830000
|
||||
CVE-2024-2134,0,0,32f7b6769a3de1e870eb862cfbcf578418aa858e7cc01f11b7b77f4ab31882e5,2024-05-17T02:38:03.667000
|
||||
CVE-2024-21340,0,0,54f8fce81fb3f01b0990ebeb93fb4090923de6185bd8f6ef3135f577fe07fabe,2024-05-29T00:15:22.083000
|
||||
@ -244111,7 +244111,7 @@ CVE-2024-2141,0,0,7c4bf37cd4081c2cd46a042815f9ce375b39a3545b48e0b5b91eba9a22eb0f
|
||||
CVE-2024-21410,0,0,c8e90612f8b38e6b1f13375d68516f4b4a5a3386c3f385305f0005a7f45de49a,2024-06-10T16:05:10.343000
|
||||
CVE-2024-21411,0,0,e4762a6b8c68f949f9dbcca9e77f1e8e5511c352d40e6306cffb620bae6ab489,2024-06-11T16:15:17.890000
|
||||
CVE-2024-21412,0,0,19f94d89a29568d47135b4b672838e496edc30a72400f126ad5b6bf639eb739b,2024-08-14T19:47:44.623000
|
||||
CVE-2024-21413,0,1,9ff3f40aef94a5855a3aa31dca1b2a383efeb4c413a3d395684e572375312500,2024-10-09T02:15:22.417000
|
||||
CVE-2024-21413,0,0,9ff3f40aef94a5855a3aa31dca1b2a383efeb4c413a3d395684e572375312500,2024-10-09T02:15:22.417000
|
||||
CVE-2024-21414,0,0,cb5be5a0298e388117cb17fb4e38b11bac4cf16d9158b5abf408d82cf361dfc1,2024-07-09T18:18:38.713000
|
||||
CVE-2024-21415,0,0,42bcd1202ef0ba594d559bd9441152ac5ae9644c270ba50531381a1aa41e9e3f,2024-07-09T18:18:38.713000
|
||||
CVE-2024-21416,0,0,7cc6fd4c84942ce1dc818417cef771869802afebc6e3c7d7b19ed19e00198c83,2024-09-20T18:55:14.573000
|
||||
@ -246748,6 +246748,11 @@ CVE-2024-2527,0,0,3595089dfbf7c838cd10907d9475b6f382b61f5d4f125e4851b3ab5c70cb2f
|
||||
CVE-2024-25270,0,0,5f30998f0581b52564ffa879dfe70f343d5031848a9545cbe5dd55b89d561500,2024-09-13T16:01:01.810000
|
||||
CVE-2024-25274,0,0,6d61d530dc49a931412656c8f607fd75a29229348fb483cac927de396452465f,2024-08-29T20:36:19.120000
|
||||
CVE-2024-2528,0,0,f3ce2742845e3c962e76fc1fc8b85fe99361dde771fc18d0886792da646965aa,2024-05-17T02:38:17.403000
|
||||
CVE-2024-25282,1,1,a74bcf88e32e168fcbe9f6279e9919c2ce832f13b6148dbf9529253fe699553b,2024-10-09T04:15:07.287000
|
||||
CVE-2024-25283,1,1,01898390a81051e8f443c91fe35aeb2e4428e9f5440ae6a4b2ff84a7dad2fc32,2024-10-09T04:15:07.483000
|
||||
CVE-2024-25284,1,1,2d6ba5f1816a5ff32c73bc2aecdbdfeb190fa787cb288f6f9a8a099392c79665,2024-10-09T04:15:07.597000
|
||||
CVE-2024-25285,1,1,f59e41792d6726a49ae8f7914401e25d4579ec8fde9d9953f6dda24c4ca3f7d5,2024-10-09T04:15:07.700000
|
||||
CVE-2024-25286,1,1,7ec6d382426a687f99df1a3b36198f7abe4bedafd52090e0bc2739050c7a2f3b,2024-10-09T04:15:07.880000
|
||||
CVE-2024-25288,0,0,5073c2c356c31f0a28f991dd78ab646fa56ee0bfa67ba129f7aa2ad1aa6c7f01,2024-08-16T17:35:05.360000
|
||||
CVE-2024-2529,0,0,3dcfb18c753ec485cf6ba2b140882ea30783b45e3ebf36f2c06c6d0afef8cf3b,2024-05-17T02:38:17.490000
|
||||
CVE-2024-25290,0,0,1ec48026c39efee418c42c9ca18840885fee8443e93218944bef4bd724ec09b7,2024-08-01T13:47:39.797000
|
||||
@ -247486,7 +247491,7 @@ CVE-2024-26252,0,0,a16ea7a04b440699076d4a90d57b94e69adc561ff365215a47bfe0edfb85f
|
||||
CVE-2024-26253,0,0,d32f97c711762e973fb1b01c37de60abd45cff8ea3bfc2e555e3e6824fc4b9b7,2024-04-10T13:24:00.070000
|
||||
CVE-2024-26254,0,0,024245ede1fede2394fca1e326cc18c265676be3657652d8066482f274ba6b72,2024-04-10T13:24:00.070000
|
||||
CVE-2024-26255,0,0,def0d1975fa503fc52bece1a738d7a3d0ac65fd2582e7e57928a6ef65a03e34e,2024-04-10T13:24:00.070000
|
||||
CVE-2024-26256,0,1,3807901f6ac90b4732561ba3ffb11bfe90ae3ad76f283571e61bd6293795a413,2024-10-09T02:15:27.847000
|
||||
CVE-2024-26256,0,0,3807901f6ac90b4732561ba3ffb11bfe90ae3ad76f283571e61bd6293795a413,2024-10-09T02:15:27.847000
|
||||
CVE-2024-26257,0,0,066b4f8e21f6da31e18bfde8bcbd77b29d1c931685dc4eb216f9777000563c57,2024-04-10T13:24:00.070000
|
||||
CVE-2024-26258,0,0,2a9672d6ed0fd06f71f147874c9f6533f22085e94e3e959706ad13fe0557526a,2024-09-09T07:15:16.343000
|
||||
CVE-2024-2626,0,0,5a6c338629bbaaf7065165299ae412c08d9197fb3cad2770c12e07d226bcbe56,2024-04-01T15:22:37.883000
|
||||
@ -252114,6 +252119,7 @@ CVE-2024-32604,0,0,476210d0ebaa2034f48a17e0b0fe33262ad582a7b7ecd7d8aa31989dbd17e
|
||||
CVE-2024-32605,0,0,de9c05a78c9964678d3bb18ce0c8aa64d771273179cdd76262e7bc3689e14034,2024-07-03T01:56:44.803000
|
||||
CVE-2024-32606,0,0,a3bb52a9f7db8524bc0f64398e8a4bbdbe62f2aa330bc775d2b1822f7f4c3268,2024-05-14T16:12:23.490000
|
||||
CVE-2024-32607,0,0,01051eb3e082c3438d23481476f9a985d555e9a0f80b0e1feb0cf3db1ee2a690,2024-05-14T16:12:23.490000
|
||||
CVE-2024-32608,1,1,f61b1ecd9e349ea4d9f810177cd2158930661d343cfa90a4aafaf3ba7c5237f0,2024-10-09T05:15:13.110000
|
||||
CVE-2024-32609,0,0,779fda0ffa1999f70549dd5bc26454852aa5b69a0ba347533f9e01b4e592fe2e,2024-08-16T16:35:10.610000
|
||||
CVE-2024-3261,0,0,5a564cf24105216fca1fdc9c03d186979decb6a34306dfcf795295396bd14e90,2024-08-01T13:56:29.727000
|
||||
CVE-2024-32610,0,0,5100dd5cbf5b46cbb7cc886ebc012d3ebb66cde81cb5143cf02dc17bf6f8b899,2024-05-14T16:12:23.490000
|
||||
@ -254022,6 +254028,7 @@ CVE-2024-3528,0,0,c96e1e132295c243d4fa4a90d8abf77e41d771305ddbcf81d644bca2cdde7d
|
||||
CVE-2024-35282,0,0,fe23f4116601299cd085746b33d91adab4014743ea1af63d79bf69af6ebb68e0,2024-09-20T19:44:17.557000
|
||||
CVE-2024-35283,0,0,517940d61eca1185fcc5d68a59f62111cbe8fdc81301b4e7c0610afefcc22645,2024-05-29T19:50:25.303000
|
||||
CVE-2024-35284,0,0,3a94c448d00dd5059f3fd361118e6cd65d80e9412861f2d6774f390c6aa71d9d,2024-05-29T19:50:25.303000
|
||||
CVE-2024-35288,1,1,75dab3ace5d9f9d35c01f8260f8e28e0bc43dedf35083b7e8752ff313e844084,2024-10-09T04:15:08.233000
|
||||
CVE-2024-3529,0,0,b7433b023ce9172d03becfe0cc0d18595c43e3d8737e87c779d288c2827cf3e8,2024-05-17T02:39:59.247000
|
||||
CVE-2024-35291,0,0,5225c2a0abe81b64c53a235e59e3157e49cd9481d5912145de7f4fa19255770a,2024-05-28T12:39:28.377000
|
||||
CVE-2024-35292,0,0,e3b3d736ef0c9425797f6a5a9790b2cb56e0a53578005725786d8a247ceee1f2,2024-06-11T13:54:12.057000
|
||||
@ -259068,6 +259075,7 @@ CVE-2024-42918,0,0,657578840f633e762a27e4a0853fb47eccdc1027e81e0975d029fe8916be4
|
||||
CVE-2024-42919,0,0,9d550152ff2dbb619a2352d654d17d8b55fb6100bbcd2b5aebd58ed74198ad98,2024-09-06T17:35:15.190000
|
||||
CVE-2024-4292,0,0,3da8afef6eac3f0e74c17cae2760dab77b8f6d77627214b0783fc9bf5f2f59b0,2024-06-04T19:20:35.097000
|
||||
CVE-2024-4293,0,0,32ea35cbc5ba91cf83ff71be9c2b19347dd1b3b0949ec88573415a66fabe3aec,2024-06-04T19:20:35.203000
|
||||
CVE-2024-42934,1,1,6257c4dbf9db4adbffe7af024926ac3c73ee92d2d85502feb0fc8781baee2e23,2024-10-09T05:15:13.270000
|
||||
CVE-2024-42939,0,0,de039fed771097613977a1859b988b285b10e3afaa2ac25fdead7645e1c3a33c,2024-08-31T02:58:34.660000
|
||||
CVE-2024-4294,0,0,0a6adde2b8f93d4c8d3c3070f48f62e5ef1709fd02553117d08b35488342d14f,2024-06-04T19:20:35.300000
|
||||
CVE-2024-42940,0,0,460809cfcb551dcde52417163d4e7b810c2b7db0714b9f924b6035176c36051d,2024-09-03T19:35:15.163000
|
||||
@ -260293,6 +260301,7 @@ CVE-2024-45157,0,0,63dadaa4025af01917ecdee4f3056de9070f640b6e5412ee381e40dd74f61
|
||||
CVE-2024-45158,0,0,f4aff4de2d03b3142e6ab8f036af352cca5d7617879cb7e89e1ecc71620fc908,2024-09-06T19:35:26.390000
|
||||
CVE-2024-45159,0,0,315bbe3853593d217ddbcd9fba2e9d9003cbd4c00b52b441be6179268e6c4816,2024-09-19T18:26:24.687000
|
||||
CVE-2024-4516,0,0,7413b58d03a0a8938a8f9c3b85a26b19cfb41e2c50a00216b0df80496b4b87e3,2024-06-04T19:20:40.930000
|
||||
CVE-2024-45160,1,1,227deca0a6209108dd6dc75e6c906ce56cdaa2189ac0a0b6803593e9821b18e7,2024-10-09T05:15:13.343000
|
||||
CVE-2024-45163,0,0,d1b8d71b55c9c05a6535a6d473b973daf564bdfb091297232be0a5c5759d6390,2024-08-22T15:35:12.750000
|
||||
CVE-2024-45165,0,0,b001eacfea75d370a82a50b82205930e70aa975a85c81e49480bf2cbd2fdd05a,2024-08-22T12:48:02.790000
|
||||
CVE-2024-45166,0,0,a776bd2559e4bed9a84a577a682c1ac93ea07fab716da8fcb660f8b43cc91ea2,2024-08-22T14:35:13.183000
|
||||
@ -260309,6 +260318,7 @@ CVE-2024-45175,0,0,4ada181a2aa083d471c5722f19453f1bfb3dcb4512c65292efacb2e8f687f
|
||||
CVE-2024-45176,0,0,db59498dbbbd1220886c359bd2c67c79d060ad645451aba913ef23c50057d344,2024-09-19T17:56:15.603000
|
||||
CVE-2024-45177,0,0,e16e0cc027b9a1ab0f5d9f5e0b79a7c42660772108242f226798fd93c099bafc,2024-09-05T12:53:21.110000
|
||||
CVE-2024-45178,0,0,2894143084503cc7bb4d728541a98225973d7da963e85745983ffa8b8255b936,2024-09-05T17:44:56.007000
|
||||
CVE-2024-45179,1,1,4fd9b079f55849947191987b781453e5e45e33888a0e8c9ad237e9bad85b60da,2024-10-09T04:15:09.487000
|
||||
CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af1355,2024-05-17T02:40:27.187000
|
||||
CVE-2024-45180,0,0,08348c7b1382a66372a71879585bc4b470bbbe0e7bc2a628091dcf790778caba,2024-09-13T19:55:54.477000
|
||||
CVE-2024-45181,0,0,c1b3f50892c5ad2964a42f2f7c4bb1e591fc78d268d80e02244df3b7c3d3d502,2024-09-18T20:26:26.873000
|
||||
@ -261242,6 +261252,7 @@ CVE-2024-47183,0,0,0b76031324ee2fb120db4824ba5dbb2c20e3fad1aa53ab61ba1485112276d
|
||||
CVE-2024-47184,0,0,ec4f2d4aa381d6be3b04a5d96e034e76004fe037b3abeb496a459d57a9fce134,2024-10-04T18:19:26.240000
|
||||
CVE-2024-47186,0,0,039f38f277124d2a0772e43f534fb151851ccf4c65185f4966f7e81d742991ce,2024-10-07T13:30:55.640000
|
||||
CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000
|
||||
CVE-2024-47191,1,1,70dd928787c224404880c352d0538d3741ac66c213bb7cc1fdbcb007dcb46343,2024-10-09T05:15:13.420000
|
||||
CVE-2024-47194,0,0,316103eb084ec6217054a1fc514821ac3bc94a538674f22dc5653132cf19654c,2024-10-08T09:15:17.047000
|
||||
CVE-2024-47195,0,0,d795e93240c6c6fd0784c6074f3fd46e6fef6bc125756d49adbae58c747d0b95,2024-10-08T09:15:17.300000
|
||||
CVE-2024-47196,0,0,c92c48de2b3433b7a77f962c96686b397eabda030bf3e0714ea8f48a71e5e773,2024-10-08T09:15:17.563000
|
||||
@ -264154,7 +264165,7 @@ CVE-2024-7955,0,0,b6d58093d52dbc1693883781c79b3abb54211ad50ad9e0127c4cb8b72bd51a
|
||||
CVE-2024-7958,0,0,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000
|
||||
CVE-2024-7960,0,0,6a2bab47d6fb588f4b238853d16e03fdaf4248afb98afbb54a62ccac2359c7cf,2024-09-19T01:52:55.193000
|
||||
CVE-2024-7961,0,0,54fcb6c11cb4fffe551975ea2c4e2b806861e5ed35f30fcbecfeddbc47fcfbb8,2024-09-19T01:52:24.530000
|
||||
CVE-2024-7963,1,1,286f726c648a627f7d68c90d704ebb470a6961491de7e9aa929f36bfd75962b5,2024-10-09T02:15:33.870000
|
||||
CVE-2024-7963,0,0,286f726c648a627f7d68c90d704ebb470a6961491de7e9aa929f36bfd75962b5,2024-10-09T02:15:33.870000
|
||||
CVE-2024-7964,0,0,c58a832be87177a31dd0ab059ea0a6d25f3e2935f7b0bca0ed2607ff4388d425,2024-08-27T13:35:00.823000
|
||||
CVE-2024-7965,0,0,97b62e193bdcda79c7557e9a31668077fb71dcc6db54dee06fbdef6c26c1aa29,2024-09-18T12:40:05.597000
|
||||
CVE-2024-7966,0,0,f366846d49db9477cb2ea061c491dcdaebf29f4e555fa7612b32a771fd61b7a0,2024-08-27T13:35:02.630000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user