mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2024-07-08T12:01:24.765109+00:00
This commit is contained in:
parent
dc1c51933a
commit
c8721453a8
@ -2,12 +2,13 @@
|
||||
"id": "CVE-2022-47420",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-06T08:15:21.757",
|
||||
"lastModified": "2023-11-14T15:35:47.717",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-07-08T10:15:02.050",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Online ADA Accessibility Suite by Online ADA allows SQL Injection.This issue affects Accessibility Suite by Online ADA: from n/a through 4.11.\n\n"
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Online ADA Accessibility Suite by Online ADA allows SQL Injection.This issue affects Accessibility Suite by Online ADA: from n/a through 4.12."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,13 @@
|
||||
"id": "CVE-2023-28696",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-12T22:15:29.560",
|
||||
"lastModified": "2023-11-16T17:41:01.973",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-07-08T11:15:09.923",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Harish Chouhan, Themeist I Recommend Tplugin <=\u00a03.9.0 versions."
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Harish Chouhan, Themeist I Recommend This allows Cross Site Request Forgery.This issue affects I Recommend This: from n/a through 3.9.0."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,13 @@
|
||||
"id": "CVE-2023-45830",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-06T09:15:08.790",
|
||||
"lastModified": "2023-11-14T15:28:18.677",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-07-08T10:15:02.867",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Online ADA Accessibility Suite by Online ADA allows SQL Injection.This issue affects Accessibility Suite by Online ADA: from n/a through 4.11.\n\n"
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Online ADA Accessibility Suite by Online ADA allows SQL Injection.This issue affects Accessibility Suite by Online ADA: from n/a through 4.12."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -35,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,12 +2,13 @@
|
||||
"id": "CVE-2024-23519",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-02-29T01:44:09.110",
|
||||
"lastModified": "2024-02-29T13:49:29.390",
|
||||
"lastModified": "2024-07-08T10:15:03.310",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in M&S Consulting Email Before Download.This issue affects Email Before Download: from n/a through 6.9.7.\n\n"
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in M&S Consulting Email Before Download.This issue affects Email Before Download: from n/a through 6.9.7."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
41
CVE-2024/CVE-2024-249xx/CVE-2024-24974.json
Normal file
41
CVE-2024/CVE-2024-249xx/CVE-2024-24974.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2024-24974",
|
||||
"sourceIdentifier": "security@openvpn.net",
|
||||
"published": "2024-07-08T11:15:10.103",
|
||||
"lastModified": "2024-07-08T11:15:10.103",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@openvpn.net",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-923"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-24974",
|
||||
"source": "security@openvpn.net"
|
||||
},
|
||||
{
|
||||
"url": "https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/",
|
||||
"source": "security@openvpn.net"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html",
|
||||
"source": "security@openvpn.net"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,13 @@
|
||||
"id": "CVE-2024-25928",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-02-23T12:15:46.467",
|
||||
"lastModified": "2024-02-23T16:14:43.447",
|
||||
"lastModified": "2024-07-08T10:15:03.440",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Sitepact.This issue affects Sitepact: from n/a through 1.0.5.\n\n"
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Sitepact.This issue affects Sitepact: from n/a through 1.0.5."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
41
CVE-2024/CVE-2024-274xx/CVE-2024-27459.json
Normal file
41
CVE-2024/CVE-2024-274xx/CVE-2024-27459.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2024-27459",
|
||||
"sourceIdentifier": "security@openvpn.net",
|
||||
"published": "2024-07-08T11:15:10.303",
|
||||
"lastModified": "2024-07-08T11:15:10.303",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@openvpn.net",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-27459",
|
||||
"source": "security@openvpn.net"
|
||||
},
|
||||
{
|
||||
"url": "https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/",
|
||||
"source": "security@openvpn.net"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html",
|
||||
"source": "security@openvpn.net"
|
||||
}
|
||||
]
|
||||
}
|
41
CVE-2024/CVE-2024-279xx/CVE-2024-27903.json
Normal file
41
CVE-2024/CVE-2024-279xx/CVE-2024-27903.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2024-27903",
|
||||
"sourceIdentifier": "security@openvpn.net",
|
||||
"published": "2024-07-08T11:15:10.390",
|
||||
"lastModified": "2024-07-08T11:15:10.390",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OpenVPN plug-ins on Windows with OpenVPN 2.6.9 and earlier could be loaded from any directory, which allows an attacker to load an arbitrary plug-in which can be used to interact with the privileged OpenVPN interactive service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@openvpn.net",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-283"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-27903",
|
||||
"source": "security@openvpn.net"
|
||||
},
|
||||
{
|
||||
"url": "https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/",
|
||||
"source": "security@openvpn.net"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html",
|
||||
"source": "security@openvpn.net"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,13 @@
|
||||
"id": "CVE-2024-35778",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-21T16:15:11.910",
|
||||
"lastModified": "2024-06-24T19:15:07.360",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-07-08T10:15:03.573",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in John West Slideshow SE allows PHP Local File Inclusion.This issue affects Slideshow SE: from n/a through 2.5.17."
|
||||
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in John West Slideshow SE PHP Local File Inclusion.This issue affects Slideshow SE: from n/a through 2.5.17."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
100
CVE-2024/CVE-2024-379xx/CVE-2024-37999.json
Normal file
100
CVE-2024/CVE-2024-379xx/CVE-2024-37999.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-37999",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-07-08T11:15:10.487",
|
||||
"lastModified": "2024-07-08T11:15:10.487",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been identified in Medicalis Workflow Orchestrator (All versions). The affected application executes as a trusted account with high privileges and network access. This could allow an authenticated local attacker to escalate privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-282"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-501799",
|
||||
"source": "productcert@siemens.com"
|
||||
}
|
||||
]
|
||||
}
|
25
README.md
25
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-08T10:01:12.197410+00:00
|
||||
2024-07-08T12:01:24.765109+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-08T09:15:02.867000+00:00
|
||||
2024-07-08T11:15:10.487000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,24 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
255988
|
||||
255992
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2024-37389](CVE-2024/CVE-2024-373xx/CVE-2024-37389.json) (`2024-07-08T08:15:10.847`)
|
||||
- [CVE-2024-24974](CVE-2024/CVE-2024-249xx/CVE-2024-24974.json) (`2024-07-08T11:15:10.103`)
|
||||
- [CVE-2024-27459](CVE-2024/CVE-2024-274xx/CVE-2024-27459.json) (`2024-07-08T11:15:10.303`)
|
||||
- [CVE-2024-27903](CVE-2024/CVE-2024-279xx/CVE-2024-27903.json) (`2024-07-08T11:15:10.390`)
|
||||
- [CVE-2024-37999](CVE-2024/CVE-2024-379xx/CVE-2024-37999.json) (`2024-07-08T11:15:10.487`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `4`
|
||||
Recently modified CVEs: `6`
|
||||
|
||||
- [CVE-2023-26531](CVE-2023/CVE-2023-265xx/CVE-2023-26531.json) (`2024-07-08T09:15:02.397`)
|
||||
- [CVE-2023-49188](CVE-2023/CVE-2023-491xx/CVE-2023-49188.json) (`2024-07-08T09:15:02.663`)
|
||||
- [CVE-2024-34603](CVE-2024/CVE-2024-346xx/CVE-2024-34603.json) (`2024-07-08T07:15:04.100`)
|
||||
- [CVE-2024-34804](CVE-2024/CVE-2024-348xx/CVE-2024-34804.json) (`2024-07-08T09:15:02.867`)
|
||||
- [CVE-2022-47420](CVE-2022/CVE-2022-474xx/CVE-2022-47420.json) (`2024-07-08T10:15:02.050`)
|
||||
- [CVE-2023-28696](CVE-2023/CVE-2023-286xx/CVE-2023-28696.json) (`2024-07-08T11:15:09.923`)
|
||||
- [CVE-2023-45830](CVE-2023/CVE-2023-458xx/CVE-2023-45830.json) (`2024-07-08T10:15:02.867`)
|
||||
- [CVE-2024-23519](CVE-2024/CVE-2024-235xx/CVE-2024-23519.json) (`2024-07-08T10:15:03.310`)
|
||||
- [CVE-2024-25928](CVE-2024/CVE-2024-259xx/CVE-2024-25928.json) (`2024-07-08T10:15:03.440`)
|
||||
- [CVE-2024-35778](CVE-2024/CVE-2024-357xx/CVE-2024-35778.json) (`2024-07-08T10:15:03.573`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
26
_state.csv
26
_state.csv
@ -211271,7 +211271,7 @@ CVE-2022-47417,0,0,635a9cd4333581eb34c546266ff712f0437854cda7b239eb47e7ce40c113c
|
||||
CVE-2022-47418,0,0,034e0f4ab2ba37ecdc5664d0671de0dad6ce472962d588acb057903742cb0db1,2023-02-16T17:50:55.420000
|
||||
CVE-2022-47419,0,0,969bdc63d491a4ab9aeb03cd6c1074824a3a10ed29e459d655b32f46b7c07909,2023-03-16T17:15:09.247000
|
||||
CVE-2022-4742,0,0,ac683660b843012effc49ed771e7e3a0d41714f914609e7c435a26d18616ef2f,2024-05-17T02:16:54.913000
|
||||
CVE-2022-47420,0,0,31b555b0dfe2456c9cbc09c49c6a692e49ef04564e055298377aa79e45d9b1e0,2023-11-14T15:35:47.717000
|
||||
CVE-2022-47420,0,1,880106f38441c8fddd71b5d1efae01c6a4ed7be15fa99aa6ec33a3d4a0547d1f,2024-07-08T10:15:02.050000
|
||||
CVE-2022-47421,0,0,909a31b732f66c3e8fc0e70af24ab96bd602aef69df50553cf3e4a18b52e301c,2023-07-27T13:51:48.583000
|
||||
CVE-2022-47422,0,0,cfa404de4cf789d7955a86205735e769b78327b3cc416f4085f3eafd76065e44,2023-11-07T03:56:14.373000
|
||||
CVE-2022-47423,0,0,1910e3bd817b35427f5ca4aedfe0bf985e3aa4e10830059d963f12b37e182042,2023-05-16T22:08:09.307000
|
||||
@ -219640,7 +219640,7 @@ CVE-2023-26528,0,0,de53b1b2365d082b16b3e52476599015c39991bd236b22656587fd68c2487
|
||||
CVE-2023-26529,0,0,9c86f8a783ccfd1f1e41d892b0db8dd3fe1abff5ea8ae669029a676e57a1754f,2023-11-07T04:09:37.600000
|
||||
CVE-2023-2653,0,0,0e0a3a49c4bec46a7cceaf51372840b53f07b29fb0f57002bda7f4b682a6e70b,2024-05-17T02:23:07.510000
|
||||
CVE-2023-26530,0,0,fb64b33e1966b9ed3009e9d92488933c1e46806691006672d22a22d9ebd4bc0e,2023-08-22T00:56:35.657000
|
||||
CVE-2023-26531,0,1,fe01822521ff89bdb05fb8289d9cecffa6980a7671aabe2077aa791e958071ab,2024-07-08T09:15:02.397000
|
||||
CVE-2023-26531,0,0,fe01822521ff89bdb05fb8289d9cecffa6980a7671aabe2077aa791e958071ab,2024-07-08T09:15:02.397000
|
||||
CVE-2023-26532,0,0,7f0b35ad1cf0fcbd24dc9f1216197cb177b6520f4478684c2c08cca69f327b17,2023-11-27T22:08:32.057000
|
||||
CVE-2023-26533,0,0,8d39412f80f99869d331564890ce6e042d03ea07290c69b81e1612dd5faab023,2023-12-06T17:43:35.347000
|
||||
CVE-2023-26534,0,0,15c4231e630b7398008d9551a749fa9246bb7f2677305d8d75759252628df3c6,2023-06-28T07:14:06.263000
|
||||
@ -221360,7 +221360,7 @@ CVE-2023-28692,0,0,9eeeb31b9be4c6221c6981aa9d1382357797c409afb0b545f19b12a1930e4
|
||||
CVE-2023-28693,0,0,64907546fbaf9b5fa936aa1a85b50be5389af397bfb2a16035f5a1047c9a7e4c,2023-08-22T00:57:12.023000
|
||||
CVE-2023-28694,0,0,5d75a53cf595b009101740c0546d514500e613112c9c77f8e4e8a5622d9aca6e,2023-11-16T17:42:33.970000
|
||||
CVE-2023-28695,0,0,3c4a88778d94ca3148dfe924dcf21981aa68fbfa7edb43157864dac77cf9e02b,2023-06-28T07:09:40.910000
|
||||
CVE-2023-28696,0,0,b779231ef810df2f0156efc6c85b8155ddd54afaed9c042ce5ea15106cea094c,2023-11-16T17:41:01.973000
|
||||
CVE-2023-28696,0,1,e49880fa6d255b02ff6645d543520b978124efa9035a4f0863cb3c7c3042ad9d,2024-07-08T11:15:09.923000
|
||||
CVE-2023-28697,0,0,89a3ca92d94ed91c3e20593cc4ac52ecda3fdfed4ed0d6d310f1bb57ec468ea0,2023-05-05T20:47:35.427000
|
||||
CVE-2023-28698,0,0,260adf9749b48bc3b6df9b562f43004c450adf42dcd4f642208008d4dcae6670,2023-06-09T17:25:28.657000
|
||||
CVE-2023-28699,0,0,2627978ca24cc13877a7f1f52874bf25b97cf287afe22c7920d04d9bcf10c0d7,2023-06-09T18:14:12.563000
|
||||
@ -233852,7 +233852,7 @@ CVE-2023-45826,0,0,fb4fdde2234a33997d031bde8bd96295768aa3cdeb0dcb1add36c3acf5e6b
|
||||
CVE-2023-45827,0,0,590a647d29b19685fbfbe01785d9adf29e729c96d9c4a8d18d11575e526cfd85,2023-11-14T17:10:21.330000
|
||||
CVE-2023-45829,0,0,db9ba82ffe5d1f5fff85be3763ba24364418a37f0f40cc8151741c9237329dc3,2023-10-28T03:27:33.903000
|
||||
CVE-2023-4583,0,0,85ab38c041a18fe4db57795cdd74632fbc7117248d6b6649b4b77180e2aefd32,2023-09-14T03:52:30.463000
|
||||
CVE-2023-45830,0,0,39cce3f5faeabcb484ac80bfc93a03058df22042cf4528d2804b36f43e0b5a82,2023-11-14T15:28:18.677000
|
||||
CVE-2023-45830,0,1,e93c56ded03c8deb613479cc3ad121b8f246009db67f735a112274b94d28e1d1,2024-07-08T10:15:02.867000
|
||||
CVE-2023-45831,0,0,84e9d1ab1480dc235dc2ea17be9ed8751be45e4582ba809608522a674460db6e,2023-10-19T18:35:15.887000
|
||||
CVE-2023-45832,0,0,8975d161566acb2b4bf8b65aa328c03dede2ad45247cdaf8335849c5b3ecfdf5,2023-11-01T16:02:09.867000
|
||||
CVE-2023-45833,0,0,b7bbdad9727a29315d7f4b6c0df4f950baf4990b7ef84e51ede97765d08188c3,2023-11-01T15:37:22.227000
|
||||
@ -236302,7 +236302,7 @@ CVE-2023-49183,0,0,2e675f6060b1d0f3f34c75175ec2e7ad4f737511b8336158dd45bef3681ae
|
||||
CVE-2023-49184,0,0,d5000ae1b227810f39b2b9b0da886c37cda56c5bb7329d1ed93f858de6759550,2023-12-19T20:43:19.030000
|
||||
CVE-2023-49185,0,0,b6277b639298401f8399c0dce995cbfcf5d945a31862630dbc2cba961ff9cdf0,2023-12-19T20:45:06.317000
|
||||
CVE-2023-49187,0,0,81995564cd401d0d066a0dc7261569a5ffb0837b171050d33a27c61c90483de6,2023-12-19T20:22:11.963000
|
||||
CVE-2023-49188,0,1,67bc196c55897bbe5e6e5ae2196a0067888a23ca1fc2090533d10c1feb63c692,2024-07-08T09:15:02.663000
|
||||
CVE-2023-49188,0,0,67bc196c55897bbe5e6e5ae2196a0067888a23ca1fc2090533d10c1feb63c692,2024-07-08T09:15:02.663000
|
||||
CVE-2023-49189,0,0,95bbd96e9ec7f5da63c94c1e5827b56177be7ed187de737936c906acd31f4dd5,2023-12-21T16:48:17.663000
|
||||
CVE-2023-4919,0,0,3b93cda20a1b77a48164e0c6d3027eba6d2bfcc93f418435f4ad08d5d42e790b,2023-11-07T04:23:10.030000
|
||||
CVE-2023-49190,0,0,7d830fa095412d91a51036c9e09f47da8a17ce8103c61b31e671df98dfb4780e,2023-12-21T16:49:34.847000
|
||||
@ -244546,7 +244546,7 @@ CVE-2024-23515,0,0,9b3019b1da03057d41a7c6e89ecb38b2748c5a51cdf0834f8b10325e87cbc
|
||||
CVE-2024-23516,0,0,f908beaf0aef3ecf8a8819fae23d2c4559de7dc9d2df85df41316958d107a5e0,2024-02-16T13:41:48.350000
|
||||
CVE-2024-23517,0,0,e4bbedbc00468997609a0c9179822a4e7c082017c830cbf85558e35c31daa8f6,2024-02-16T13:41:33.563000
|
||||
CVE-2024-23518,0,0,e82205aa1cd91c76680d095c7c704b5dcdfd5a3a67bbbd441a2e9e6b50fd4983,2024-06-13T18:36:45.417000
|
||||
CVE-2024-23519,0,0,4d28ec0c6447c5e765bfd28438ace7e6750c3a1e16dfeea04dd8418971fdb577,2024-02-29T13:49:29.390000
|
||||
CVE-2024-23519,0,1,8b42ee58afd4a3aa0b353806dfdefab0d93a59a36e591524df295fb60d282c81,2024-07-08T10:15:03.310000
|
||||
CVE-2024-2352,0,0,57630273c197eaed8b3c3f6d93ff32d48d806b15015e610cf5486ce468752335,2024-05-17T02:38:11.410000
|
||||
CVE-2024-23520,0,0,6231203085a20b2d4cba5048549458f88829476b5e6533d86ed85baf0d8a6576,2024-03-26T12:55:05.010000
|
||||
CVE-2024-23521,0,0,730570d3fab4981f342ddac4e5e20062a977b742ff2bfc0200348b686b695481,2024-06-13T18:36:45.417000
|
||||
@ -245451,6 +245451,7 @@ CVE-2024-24963,0,0,f7ac6d9beae69472289af258cfa7df94f3fb587efc26344b96102b05f5639
|
||||
CVE-2024-24964,0,0,6aeb3e68bcce4e30c320efc8bbc0ba8ea40b022ead3c928aca7667e8626ff2cf,2024-03-12T12:40:13.500000
|
||||
CVE-2024-24966,0,0,a6e715310d1619966fe5747d39679f64ae1b61eb46bb4d8fceaf05df6847efb8,2024-02-14T18:04:45.380000
|
||||
CVE-2024-2497,0,0,a2f60841ac4494781cdcd08b43982a34617e8b0f51f90f443479a810b923dd8b,2024-05-17T02:38:15.830000
|
||||
CVE-2024-24974,1,1,f43a480522cbc61c35b9a75bdd6c9532ee59e8cdae93bb2aa498d949ececb731,2024-07-08T11:15:10.103000
|
||||
CVE-2024-24975,0,0,375565038c24fc327fc2c0a3c714946ca9e1c626fbb524a69b78744e6d3eab6c,2024-03-15T12:53:06.423000
|
||||
CVE-2024-24976,0,0,c9c1564bfde752c9f650b4df6eb66a2a9d3a9d0c2cc93ccf26aa30039f28a3d8,2024-04-03T17:24:18.150000
|
||||
CVE-2024-24978,0,0,c5ed5bc9ba8c7757cb570e2c66a5838ec85d55ef0ed0e79605098288eb1bfdda,2024-05-01T19:50:25.633000
|
||||
@ -246021,7 +246022,7 @@ CVE-2024-25924,0,0,a0edb21bf6d2717b16ef31e3c4d1e7b08239622f70f8352aa46b8f51f82ec
|
||||
CVE-2024-25925,0,0,82d957b757a9a6d1fdcc74598b42ef2704a1b9fe963dd50d48ef8264fc879a6b,2024-02-26T16:32:25.577000
|
||||
CVE-2024-25926,0,0,a204994523df9b30b0668bf02b40e244c5082d74f1a5f398b1221a8cff9b190e,2024-03-27T12:29:30.307000
|
||||
CVE-2024-25927,0,0,70ec221cb23fdd951e839b39a19a816e5c7a4881399308a30cbec9cd2c6f2d65,2024-02-28T14:06:45.783000
|
||||
CVE-2024-25928,0,0,a6060327df403c3c616b275f710271564f7f2534d45ed96b3571c5b2e5121575,2024-02-23T16:14:43.447000
|
||||
CVE-2024-25928,0,1,fd24c28c5a2106d771e03de6727087950c7f1273f0c987997f5bb867af2abd16,2024-07-08T10:15:03.440000
|
||||
CVE-2024-25929,0,0,91b91221033a2dc3b1a568aed929b693e98283cc5f7998cc2e9542bf6d839284,2024-06-10T02:52:08.267000
|
||||
CVE-2024-2593,0,0,01b65e909e6089e83d99d5b5b680ad312732071d94371d890adbb9973ac995e4,2024-03-18T19:40:00.173000
|
||||
CVE-2024-25930,0,0,2b173292b99bf990b44991f1b3d0d5093a9f41028ae431c81e582b61a91befc8,2024-02-29T13:49:29.390000
|
||||
@ -247352,6 +247353,7 @@ CVE-2024-27453,0,0,4fa62fb0431b68f90533abee1343406b0149f9efe637bd75fc3a77179a8be
|
||||
CVE-2024-27454,0,0,6d3a09532b89ef204254e66da503964dcbafd450b5bdda0990f449d144c8e54b,2024-02-26T16:32:25.577000
|
||||
CVE-2024-27455,0,0,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000
|
||||
CVE-2024-27456,0,0,3292722b93148b4ab52923fa8e4498babe5b306f79794afb1b6b9f9d803c4911,2024-02-26T16:32:25.577000
|
||||
CVE-2024-27459,1,1,68d9baa047ec8829992cd91c7aa9539644df9d2f9a98e79ebd79c967be77040f,2024-07-08T11:15:10.303000
|
||||
CVE-2024-2746,0,0,1b5368899c557a576ffe86c7e7b79d4b6baeb106e8e490e5cd11b765b982c384,2024-05-08T13:15:00.690000
|
||||
CVE-2024-27460,0,0,df535e4d58c862090dbd04ef172ea8290b582d97a5936fdd9d6a3f9c58e5f496,2024-05-14T16:13:02.773000
|
||||
CVE-2024-27462,0,0,ffc1613a8162349f9e85ee9ce86cbdc5073a2092a76bc9fd14c2d891290e403c,2024-04-14T23:15:45.830000
|
||||
@ -247573,6 +247575,7 @@ CVE-2024-2790,0,0,beedd0090f34846cee86bfcc16559ecd216425fdfa14e63be8297a23ca53ac
|
||||
CVE-2024-27900,0,0,00f9885d5a06fec36b56a14fdc3be21ddc255c1561a408e91e09aee1b7ac8b37,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27901,0,0,33f662da706d18e25398216ac4597066ca6291840a4b4a018e8418ada4f9c7bb,2024-04-09T12:48:04.090000
|
||||
CVE-2024-27902,0,0,7aa835c5c3cccf2434107e43a6dd21c3ee48d8e6664a62d49734964bcc016141,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27903,1,1,d11a0b2c96f23704bf63864c34d48a5cf70337102c518f45009f46af63078823,2024-07-08T11:15:10.390000
|
||||
CVE-2024-27905,0,0,11f71bd2f04a983e03ffa738540da2ab3b19fd866be937104a685343c8bfc7f6,2024-05-17T02:37:34.130000
|
||||
CVE-2024-27906,0,0,e279155c32f0030358ce7d189e782f3e54d78a6a202b13937f95f2706818bee5,2024-02-29T13:49:29.390000
|
||||
CVE-2024-27907,0,0,aac379adb09823074865cdaa760b5a9ed07a3326e17caf800106b9008671180a,2024-03-12T12:40:13.500000
|
||||
@ -251890,7 +251893,7 @@ CVE-2024-3460,0,0,5d753d09cd0688d7cf59cbd53a149eb7d45b8f22859b402f63de2cfaab8174
|
||||
CVE-2024-34600,0,0,35051d817085423dbdeb6ae129690762237334bf5ea735f991f5984e5199c534,2024-07-02T18:05:54.487000
|
||||
CVE-2024-34601,0,0,ba64108f851deae844e8486d0d241f7b45e96c9b76d20a149cd00653a5152768,2024-07-02T18:07:05.737000
|
||||
CVE-2024-34602,0,0,a092ec376b20b5bae003e3af1b412b2662656f4989316a07694f2689d75bbbb4,2024-07-08T07:15:02.663000
|
||||
CVE-2024-34603,0,1,09eef9607bb516b8f931b0fb1ca16807a9027d1191d223bb4f866dff768ab3be,2024-07-08T07:15:04.100000
|
||||
CVE-2024-34603,0,0,09eef9607bb516b8f931b0fb1ca16807a9027d1191d223bb4f866dff768ab3be,2024-07-08T07:15:04.100000
|
||||
CVE-2024-3461,0,0,2a4b7c0e1a8d6b06d86abf0c486b3a9f2d1fa6266081d4aec9284221b4574ee3,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3462,0,0,42d76b75905cddaca7c4512a98c3e5490f6eba6d1a37db8a52d4bde8c84e9ded,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3463,0,0,ec14f43c3b7b14f535006ee59b80bf351769520d95be8808071caf75bd274960,2024-05-17T02:39:57.447000
|
||||
@ -251980,7 +251983,7 @@ CVE-2024-34800,0,0,86c2747c3a96d291be880702f2f8a1bb4679cc66d13fbbf0cf4c80b6c3772
|
||||
CVE-2024-34801,0,0,0b1a4ab0468bb98a950b8edf087ff2c536030eeba11e5be47337600f37c39c40,2024-06-03T14:46:24.250000
|
||||
CVE-2024-34802,0,0,0e49233d84194178a4d9b1b84c4ef45995110e8bbf1416904c517ba7839fb5e2,2024-06-12T13:32:45.327000
|
||||
CVE-2024-34803,0,0,3bacd90aafced0596a908c7bddcf15434c904fd7688d7a7dfb5d78f5281cf184,2024-06-03T14:46:24.250000
|
||||
CVE-2024-34804,0,1,47720cdf6115b63aa02c7f403e22a073628f6ce441cc468fab5e642dd29d8865,2024-07-08T09:15:02.867000
|
||||
CVE-2024-34804,0,0,47720cdf6115b63aa02c7f403e22a073628f6ce441cc468fab5e642dd29d8865,2024-07-08T09:15:02.867000
|
||||
CVE-2024-34805,0,0,4db06c40a60d0ea9fc68ae0b74b3d16b7df09b33205e3b40409d2383df796279,2024-05-17T18:36:31.297000
|
||||
CVE-2024-34806,0,0,3b1b6563ba887546de6e8afcda84fbe0c4e88d6cd4a9afa2164171d94fd3a99a,2024-05-17T18:35:35.070000
|
||||
CVE-2024-34807,0,0,1b210e8fbd98db6886fdf7153f61122f9d59a5653f7e82ad43004bb026f58b60,2024-05-17T18:35:35.070000
|
||||
@ -252510,7 +252513,7 @@ CVE-2024-35771,0,0,528377e8b245533dbff20e4b0dd7328468397780793d88ed8bf6cc52e2f75
|
||||
CVE-2024-35772,0,0,2d0d9c98f803d200fae5d0e084d548bff2c25e4891c370629239ed163d3750c6,2024-06-24T19:26:14.460000
|
||||
CVE-2024-35774,0,0,b04163e5e3aed962a8bb022fff4f15fd9953a3840984351341e879118df53ab8,2024-06-24T18:43:57.633000
|
||||
CVE-2024-35776,0,0,843520135517b374d77f0b73e5d208e8aee82b3db16cc26ae6b37a47d0e96e08,2024-06-24T18:49:09.500000
|
||||
CVE-2024-35778,0,0,5682b632dfc51cfacdddf5bb47d14c3256bcf6bd9ead6064f4b1ae3ebc67c8b1,2024-06-24T19:15:07.360000
|
||||
CVE-2024-35778,0,1,a2dbf9dff5fc4d667e192112da54beac103433f06409a60ab480bcea7a5ac138,2024-07-08T10:15:03.573000
|
||||
CVE-2024-35779,0,0,08d2aa367351b69a649cc12f9302f4c59f9bed6fe925bf37e513bed83cbc3764,2024-06-24T18:40:26.157000
|
||||
CVE-2024-35780,0,0,0cb83863c03783254bdbb259245f43349fceaa55402150e68b96501fc1a18c7e,2024-06-20T12:44:01.637000
|
||||
CVE-2024-35781,0,0,8ad2da87cca362f8f311ac7da3875897822d38c021b6c490689c42a05fe866f5,2024-06-24T19:15:58.517000
|
||||
@ -253526,7 +253529,7 @@ CVE-2024-37384,0,0,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67
|
||||
CVE-2024-37385,0,0,ab67b8a0f073ce7f5c28ca11584627dbf70b59e11b1337a1068ce1887aeb0943,2024-06-07T14:56:05.647000
|
||||
CVE-2024-37387,0,0,fe2e0e702592a3b950e5c7ffa6cd887e6a1ea8123fb6a269a45db83eafdcfbbc,2024-07-03T02:04:17.790000
|
||||
CVE-2024-37388,0,0,78091082c96da1cca6d1b3a881a45160af8428a4ada3a4ba554597b78ade9a76,2024-06-07T19:24:09.243000
|
||||
CVE-2024-37389,1,1,eb49ab026d347a0f0672e015074c79d1b9639f4e450caaa9b01e59a990b09593,2024-07-08T08:15:10.847000
|
||||
CVE-2024-37389,0,0,eb49ab026d347a0f0672e015074c79d1b9639f4e450caaa9b01e59a990b09593,2024-07-08T08:15:10.847000
|
||||
CVE-2024-3739,0,0,18ca969c974b63c6d16494fbcc2d63756747cacc5947332fefb20d9c592537e4,2024-05-17T02:40:06.067000
|
||||
CVE-2024-37393,0,0,b93d796f3c4283b87dfd22c20f36a8116f582a381c44650f39c5ea43e6b806f2,2024-07-03T02:04:18.707000
|
||||
CVE-2024-3740,0,0,1025f598f3437296a5a18526d2723c88eb3b5b46ea06c50b765dc694c6a0bd1a,2024-05-17T02:40:06.170000
|
||||
@ -253702,6 +253705,7 @@ CVE-2024-3794,0,0,153385e096cd7f2ece15b2458b2e9fc3a616d4e8c794288f506409f055c027
|
||||
CVE-2024-3795,0,0,394c789f966243db6d7a4bfee356db0989703de57fa4252b7833b38d6036f026,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3796,0,0,8b56f1ae3498f70c780deb392dd70e4b0e2eb55d8dc491cebdead02f06bb596a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3797,0,0,ee6a5db4c86b7a1cb7dddd0f923d514d4da716af84fa2cbea88db014d700ce37,2024-05-17T02:40:08.123000
|
||||
CVE-2024-37999,1,1,97f06bd07832c67fa474c988dae9f15fb92130b11c561bcd5a9960264b2750f3,2024-07-08T11:15:10.487000
|
||||
CVE-2024-3800,0,0,f8f57ef4bdedf9e336bba69e6db949ed7a578f3b2a10988d7c69ed3685de0000,2024-07-03T14:36:22.273000
|
||||
CVE-2024-3801,0,0,59de265ce1af1c02a0bfcf9801db717e0400c3bfeeedabcf1fa6b682733a5570,2024-07-03T14:36:52.797000
|
||||
CVE-2024-3802,0,0,aaa997a68afe711762ac8536c5d0fad15740edaa6785e851a1495f0cf1f43e75,2024-06-04T02:15:49.290000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user