mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-07-04T12:02:45.505838+00:00
This commit is contained in:
parent
df12d1e2c0
commit
ce8f6c3b31
@ -2,12 +2,13 @@
|
|||||||
"id": "CVE-2022-33324",
|
"id": "CVE-2022-33324",
|
||||||
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||||
"published": "2022-12-23T03:15:08.723",
|
"published": "2022-12-23T03:15:08.723",
|
||||||
"lastModified": "2024-05-30T10:15:08.703",
|
"lastModified": "2024-07-04T10:15:02.407",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU Firmware versions \"32\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions \"65\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120SFCPU Firmware versions \"29\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R12CCPU-V Firmware versions \"17\" and prior, Mitsubishi Electric Corporation MELSEC iQ-L Series L04/08/16/32HCPU all versions and Mitsubishi Electric Corporation MELIPC Series MI5122-VW Firmware versions \"07\" and prior allows a remote unauthenticated attacker to cause a Denial of Service condition in Ethernet communication on the module by sending specially crafted packets. A system reset of the module is required for recovery."
|
"value": "Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU Firmware versions \"32\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions \"65\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120SFCPU Firmware versions \"29\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R12CCPU-V Firmware versions \"17\" and prior, Mitsubishi Electric Corporation MELSEC iQ-L Series L04/08/16/32HCPU Firmware versions \"05\" and prior and Mitsubishi Electric Corporation MELIPC Series MI5122-VW Firmware versions \"07\" and prior allows a remote unauthenticated attacker to cause a Denial of Service condition in Ethernet communication on the module by sending specially crafted packets. A system reset of the module is required for recovery."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -89,9 +90,10 @@
|
|||||||
"negate": false,
|
"negate": false,
|
||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r00_cpu:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:mitsubishi:melsec_iq-r_r00_cpu_firmware:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "FC6B7E9C-C56C-4452-9A8A-3E8BF51ED354"
|
"versionEndExcluding": "33.0",
|
||||||
|
"matchCriteriaId": "EFC979CD-10C3-400C-A7EA-9E9B3637E1D7"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -100,10 +102,9 @@
|
|||||||
"negate": false,
|
"negate": false,
|
||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:mitsubishi:melsec_iq-r_r00_cpu_firmware:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r00_cpu:-:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "33.0",
|
"matchCriteriaId": "FC6B7E9C-C56C-4452-9A8A-3E8BF51ED354"
|
||||||
"matchCriteriaId": "EFC979CD-10C3-400C-A7EA-9E9B3637E1D7"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -112,17 +113,6 @@
|
|||||||
{
|
{
|
||||||
"operator": "AND",
|
"operator": "AND",
|
||||||
"nodes": [
|
"nodes": [
|
||||||
{
|
|
||||||
"operator": "OR",
|
|
||||||
"negate": false,
|
|
||||||
"cpeMatch": [
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r01_cpu:-:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "560D6AFE-4CDC-40D0-8C35-6749375B9B3C"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"operator": "OR",
|
"operator": "OR",
|
||||||
"negate": false,
|
"negate": false,
|
||||||
@ -134,23 +124,23 @@
|
|||||||
"matchCriteriaId": "7E13BF4F-3D5A-4FAD-BCD8-7261920AE06F"
|
"matchCriteriaId": "7E13BF4F-3D5A-4FAD-BCD8-7261920AE06F"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"operator": "AND",
|
|
||||||
"nodes": [
|
|
||||||
{
|
{
|
||||||
"operator": "OR",
|
"operator": "OR",
|
||||||
"negate": false,
|
"negate": false,
|
||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r02_cpu:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r01_cpu:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "E4D5746A-B9BC-4A4C-AF09-D2B16D54BF4D"
|
"matchCriteriaId": "560D6AFE-4CDC-40D0-8C35-6749375B9B3C"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
{
|
{
|
||||||
"operator": "OR",
|
"operator": "OR",
|
||||||
"negate": false,
|
"negate": false,
|
||||||
@ -162,23 +152,23 @@
|
|||||||
"matchCriteriaId": "60BEF351-E337-4302-8D82-E90B2834370F"
|
"matchCriteriaId": "60BEF351-E337-4302-8D82-E90B2834370F"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"operator": "AND",
|
|
||||||
"nodes": [
|
|
||||||
{
|
{
|
||||||
"operator": "OR",
|
"operator": "OR",
|
||||||
"negate": false,
|
"negate": false,
|
||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r04_cpu:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r02_cpu:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "DA6B52DA-0EF4-46BF-A36D-92F717F70987"
|
"matchCriteriaId": "E4D5746A-B9BC-4A4C-AF09-D2B16D54BF4D"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
{
|
{
|
||||||
"operator": "OR",
|
"operator": "OR",
|
||||||
"negate": false,
|
"negate": false,
|
||||||
@ -190,23 +180,23 @@
|
|||||||
"matchCriteriaId": "0B733AD2-E857-47F4-89D5-A8F8B45F4A52"
|
"matchCriteriaId": "0B733AD2-E857-47F4-89D5-A8F8B45F4A52"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"operator": "AND",
|
|
||||||
"nodes": [
|
|
||||||
{
|
{
|
||||||
"operator": "OR",
|
"operator": "OR",
|
||||||
"negate": false,
|
"negate": false,
|
||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r08_cpu:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r04_cpu:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "CF4496AD-1EFC-4B1D-8122-799FA34B40CB"
|
"matchCriteriaId": "DA6B52DA-0EF4-46BF-A36D-92F717F70987"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
{
|
{
|
||||||
"operator": "OR",
|
"operator": "OR",
|
||||||
"negate": false,
|
"negate": false,
|
||||||
@ -218,23 +208,23 @@
|
|||||||
"matchCriteriaId": "94D88549-B35E-4E27-84D1-3A828604BAED"
|
"matchCriteriaId": "94D88549-B35E-4E27-84D1-3A828604BAED"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"operator": "AND",
|
|
||||||
"nodes": [
|
|
||||||
{
|
{
|
||||||
"operator": "OR",
|
"operator": "OR",
|
||||||
"negate": false,
|
"negate": false,
|
||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r16_cpu:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r08_cpu:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "CA42D2F8-7856-4983-8FA9-0421E039AE8C"
|
"matchCriteriaId": "CF4496AD-1EFC-4B1D-8122-799FA34B40CB"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
{
|
{
|
||||||
"operator": "OR",
|
"operator": "OR",
|
||||||
"negate": false,
|
"negate": false,
|
||||||
@ -246,23 +236,23 @@
|
|||||||
"matchCriteriaId": "64A9C5A6-401D-4E28-A0DB-0BCD84B4E62B"
|
"matchCriteriaId": "64A9C5A6-401D-4E28-A0DB-0BCD84B4E62B"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"operator": "AND",
|
|
||||||
"nodes": [
|
|
||||||
{
|
{
|
||||||
"operator": "OR",
|
"operator": "OR",
|
||||||
"negate": false,
|
"negate": false,
|
||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r32_cpu:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r16_cpu:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "46D73C1A-3B81-4E81-A56D-0A75CEA4F92C"
|
"matchCriteriaId": "CA42D2F8-7856-4983-8FA9-0421E039AE8C"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
{
|
{
|
||||||
"operator": "OR",
|
"operator": "OR",
|
||||||
"negate": false,
|
"negate": false,
|
||||||
@ -274,6 +264,17 @@
|
|||||||
"matchCriteriaId": "3F397671-FF15-45B0-8CEE-BC807B402019"
|
"matchCriteriaId": "3F397671-FF15-45B0-8CEE-BC807B402019"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r32_cpu:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "46D73C1A-3B81-4E81-A56D-0A75CEA4F92C"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -285,9 +286,10 @@
|
|||||||
"negate": false,
|
"negate": false,
|
||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r120_cpu:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:mitsubishi:melsec_iq-r_r120_cpu_firmware:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "3EB4326B-B4F4-40DD-8220-204D490FFB38"
|
"versionEndExcluding": "66.0",
|
||||||
|
"matchCriteriaId": "4F2250E2-BDB4-4D12-BE4A-9BFBE83736D6"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -296,10 +298,9 @@
|
|||||||
"negate": false,
|
"negate": false,
|
||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:mitsubishi:melsec_iq-r_r120_cpu_firmware:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r120_cpu:-:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "66.0",
|
"matchCriteriaId": "3EB4326B-B4F4-40DD-8220-204D490FFB38"
|
||||||
"matchCriteriaId": "4F2250E2-BDB4-4D12-BE4A-9BFBE83736D6"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,12 +2,13 @@
|
|||||||
"id": "CVE-2023-4088",
|
"id": "CVE-2023-4088",
|
||||||
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||||
"published": "2023-09-20T03:15:13.687",
|
"published": "2023-09-20T03:15:13.687",
|
||||||
"lastModified": "2023-09-28T00:15:09.553",
|
"lastModified": "2024-07-04T10:15:03.133",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Incorrect Default Permissions vulnerability due to incomplete fix to address CVE-2020-14496 in Mitsubishi Electric Corporation FA engineering software products allows a malicious local attacker to execute a malicious code, which could result in information disclosure, tampering with and deletion, or a denial-of-service (DoS) condition. However, if the mitigated version described in the advisory for CVE-2020-14496 is used and installed in the default installation folder, this vulnerability does not affect the products."
|
"value": "Incorrect Default Permissions vulnerability in Mitsubishi Electric Corporation multiple FA engineering software products allows a malicious local attacker to execute a malicious code, resulting in information disclosure, tampering with and deletion, or a denial-of-service (DoS) condition, if the product is installed in a folder other than the default installation folder."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
|
60
CVE-2024/CVE-2024-327xx/CVE-2024-32754.json
Normal file
60
CVE-2024/CVE-2024-327xx/CVE-2024-32754.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-32754",
|
||||||
|
"sourceIdentifier": "productsecurity@jci.com",
|
||||||
|
"published": "2024-07-04T11:15:10.400",
|
||||||
|
"lastModified": "2024-07-04T11:15:10.400",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Under certain circumstances, when the controller is in factory reset mode waiting for initial setup, it will broadcast its MAC address, serial number, and firmware version. Once configured, the controller will no longer broadcast this information."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "productsecurity@jci.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "ADJACENT_NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 3.1,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.6,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "productsecurity@jci.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-01",
|
||||||
|
"source": "productsecurity@jci.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories",
|
||||||
|
"source": "productsecurity@jci.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -9,6 +9,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "The Premium Addons for Elementor plugin for WordPress is vulnerable to Regular Expression Denial of Service (ReDoS) in all versions up to, and including, 4.10.35. This is due to processing user-supplied input as a regular expression. This makes it possible for authenticated attackers, with Author-level access and above, to create and query a malicious post title, resulting in slowing server resources."
|
"value": "The Premium Addons for Elementor plugin for WordPress is vulnerable to Regular Expression Denial of Service (ReDoS) in all versions up to, and including, 4.10.35. This is due to processing user-supplied input as a regular expression. This makes it possible for authenticated attackers, with Author-level access and above, to create and query a malicious post title, resulting in slowing server resources."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "El complemento Premium Addons for Elementor para WordPress es vulnerable a la denegaci\u00f3n de servicio de expresi\u00f3n regular (ReDoS) en todas las versiones hasta la 4.10.35 incluida. Esto se debe al procesamiento de la entrada proporcionada por el usuario como una expresi\u00f3n regular. Esto hace posible que atacantes autenticados, con acceso de nivel de autor y superior, creen y consulten un t\u00edtulo de publicaci\u00f3n malicioso, lo que ralentiza los recursos del servidor."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
24
README.md
24
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-07-04T10:03:38.103043+00:00
|
2024-07-04T12:02:45.505838+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-07-04T09:15:05.410000+00:00
|
2024-07-04T11:15:10.400000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,29 +33,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
255865
|
255866
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `9`
|
Recently added CVEs: `1`
|
||||||
|
|
||||||
- [CVE-2024-1182](CVE-2024/CVE-2024-11xx/CVE-2024-1182.json) (`2024-07-04T09:15:02.743`)
|
- [CVE-2024-32754](CVE-2024/CVE-2024-327xx/CVE-2024-32754.json) (`2024-07-04T11:15:10.400`)
|
||||||
- [CVE-2024-1573](CVE-2024/CVE-2024-15xx/CVE-2024-1573.json) (`2024-07-04T09:15:03.260`)
|
|
||||||
- [CVE-2024-1574](CVE-2024/CVE-2024-15xx/CVE-2024-1574.json) (`2024-07-04T09:15:03.720`)
|
|
||||||
- [CVE-2024-3904](CVE-2024/CVE-2024-39xx/CVE-2024-3904.json) (`2024-07-04T09:15:04.317`)
|
|
||||||
- [CVE-2024-39884](CVE-2024/CVE-2024-398xx/CVE-2024-39884.json) (`2024-07-04T09:15:04.237`)
|
|
||||||
- [CVE-2024-5641](CVE-2024/CVE-2024-56xx/CVE-2024-5641.json) (`2024-07-04T08:15:01.980`)
|
|
||||||
- [CVE-2024-6318](CVE-2024/CVE-2024-63xx/CVE-2024-6318.json) (`2024-07-04T09:15:04.653`)
|
|
||||||
- [CVE-2024-6319](CVE-2024/CVE-2024-63xx/CVE-2024-6319.json) (`2024-07-04T09:15:05.087`)
|
|
||||||
- [CVE-2024-6434](CVE-2024/CVE-2024-64xx/CVE-2024-6434.json) (`2024-07-04T09:15:05.410`)
|
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `1`
|
Recently modified CVEs: `3`
|
||||||
|
|
||||||
- [CVE-2024-34584](CVE-2024/CVE-2024-345xx/CVE-2024-34584.json) (`2024-07-04T09:15:04.093`)
|
- [CVE-2022-33324](CVE-2022/CVE-2022-333xx/CVE-2022-33324.json) (`2024-07-04T10:15:02.407`)
|
||||||
|
- [CVE-2023-4088](CVE-2023/CVE-2023-40xx/CVE-2023-4088.json) (`2024-07-04T10:15:03.133`)
|
||||||
|
- [CVE-2024-6434](CVE-2024/CVE-2024-64xx/CVE-2024-6434.json) (`2024-07-04T09:15:05.410`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
25
_state.csv
25
_state.csv
@ -200824,7 +200824,7 @@ CVE-2022-33320,0,0,499d71c29fcbb1dac93bce0266b9a510f343ff995df72ef6f04466f578337
|
|||||||
CVE-2022-33321,0,0,28ded79bb837eabe6c9c9ff3c9367147e43b5edcf3e8d006a45278113ad8d9ea,2023-10-26T06:15:07.963000
|
CVE-2022-33321,0,0,28ded79bb837eabe6c9c9ff3c9367147e43b5edcf3e8d006a45278113ad8d9ea,2023-10-26T06:15:07.963000
|
||||||
CVE-2022-33322,0,0,1ffe7c5a4e541fb2cab5481ebf644de030cb88e02a602fb18674a12630d749e2,2023-10-26T06:15:09.297000
|
CVE-2022-33322,0,0,1ffe7c5a4e541fb2cab5481ebf644de030cb88e02a602fb18674a12630d749e2,2023-10-26T06:15:09.297000
|
||||||
CVE-2022-33323,0,0,111449fd702099ac464ad28ad331b874fb3fd63b6b2fb7c864fdcc6f51ca1b11,2023-07-21T19:22:23.673000
|
CVE-2022-33323,0,0,111449fd702099ac464ad28ad331b874fb3fd63b6b2fb7c864fdcc6f51ca1b11,2023-07-21T19:22:23.673000
|
||||||
CVE-2022-33324,0,0,19a203fa2ea8850bb0c46cc638382e638f2609764a6d808a58bb1eda26e86f7d,2024-05-30T10:15:08.703000
|
CVE-2022-33324,0,1,229a9a46e95cce1e0611b9294927c5b4cf127aa722479fe7b49057dad2349f3c,2024-07-04T10:15:02.407000
|
||||||
CVE-2022-33325,0,0,254a6e510adf83bba23c99082d51ab17324c91f3b818947bff593316a6a19c04,2022-07-12T20:01:30.937000
|
CVE-2022-33325,0,0,254a6e510adf83bba23c99082d51ab17324c91f3b818947bff593316a6a19c04,2022-07-12T20:01:30.937000
|
||||||
CVE-2022-33326,0,0,ae4f390450a32f40e28e2996d0e5c3dd06238a1acc63627e6fca82012f548b75,2022-07-12T20:02:29.537000
|
CVE-2022-33326,0,0,ae4f390450a32f40e28e2996d0e5c3dd06238a1acc63627e6fca82012f548b75,2022-07-12T20:02:29.537000
|
||||||
CVE-2022-33327,0,0,2c7981e88e6bfda8de92bead49c92762ed970ac6c2474c1c957188173d84e437,2022-07-12T20:03:25.853000
|
CVE-2022-33327,0,0,2c7981e88e6bfda8de92bead49c92762ed970ac6c2474c1c957188173d84e437,2022-07-12T20:03:25.853000
|
||||||
@ -230519,7 +230519,7 @@ CVE-2023-40874,0,0,d36162bc1d56e86f45744c6f94678ef58d4f44c06f9cc103e6cee13b948a3
|
|||||||
CVE-2023-40875,0,0,819a436fc7b8257cb92f787cf2e0e7a5afedef27f192d55644d6103c57cf9ec7,2023-08-25T13:20:02.233000
|
CVE-2023-40875,0,0,819a436fc7b8257cb92f787cf2e0e7a5afedef27f192d55644d6103c57cf9ec7,2023-08-25T13:20:02.233000
|
||||||
CVE-2023-40876,0,0,b1700cd4ec87ebbd2b76bccbb563df93a231c4da2c77e1bd6ad9cef62184a017,2023-08-25T13:20:10.643000
|
CVE-2023-40876,0,0,b1700cd4ec87ebbd2b76bccbb563df93a231c4da2c77e1bd6ad9cef62184a017,2023-08-25T13:20:10.643000
|
||||||
CVE-2023-40877,0,0,59e069a010224f7d41abc8ac514330f39e9d77eac92d20d7e2a325667698ee9d,2023-08-25T13:20:20.920000
|
CVE-2023-40877,0,0,59e069a010224f7d41abc8ac514330f39e9d77eac92d20d7e2a325667698ee9d,2023-08-25T13:20:20.920000
|
||||||
CVE-2023-4088,0,0,ca0fb236dab3e4f51b841e30b62920542d8f9c5bd9ab06059f9d2eff97ac6969,2023-09-28T00:15:09.553000
|
CVE-2023-4088,0,1,b26aa5c5427a43a70b61f38f3cc1a8948b95d07b0aad1fe9263c1dd9430a5879,2024-07-04T10:15:03.133000
|
||||||
CVE-2023-40889,0,0,21bcc2e2796095bf3c9cbdf5f1cea833bd8684b82d0df6f03e0a8ba9a934352d,2024-01-18T03:15:56.877000
|
CVE-2023-40889,0,0,21bcc2e2796095bf3c9cbdf5f1cea833bd8684b82d0df6f03e0a8ba9a934352d,2024-01-18T03:15:56.877000
|
||||||
CVE-2023-4089,0,0,bf57bc917d60ea200749e2d8f9236ceb8aedfc36b7b295ecc468bede17ef36c5,2023-10-24T18:00:38.507000
|
CVE-2023-4089,0,0,bf57bc917d60ea200749e2d8f9236ceb8aedfc36b7b295ecc468bede17ef36c5,2023-10-24T18:00:38.507000
|
||||||
CVE-2023-40890,0,0,49944e09355494c56c970b2d89cdba085322f6c1ab0e17d3680165031c0c5532,2024-01-18T03:15:56.987000
|
CVE-2023-40890,0,0,49944e09355494c56c970b2d89cdba085322f6c1ab0e17d3680165031c0c5532,2024-01-18T03:15:56.987000
|
||||||
@ -241662,7 +241662,7 @@ CVE-2024-1178,0,0,1d79d2baf0c52babf00a18f14ce6291cb7fba70afba005e5722ced55b2d8af
|
|||||||
CVE-2024-1179,0,0,021c629d3779737b7d82b050f297fa166d2dce17da45eec990d84ef3164da439,2024-04-02T12:50:42.233000
|
CVE-2024-1179,0,0,021c629d3779737b7d82b050f297fa166d2dce17da45eec990d84ef3164da439,2024-04-02T12:50:42.233000
|
||||||
CVE-2024-1180,0,0,67cc918e7b225376383a234e7a182443eae07c7dc034d299d9771cc94c55c9b6,2024-04-03T17:24:18.150000
|
CVE-2024-1180,0,0,67cc918e7b225376383a234e7a182443eae07c7dc034d299d9771cc94c55c9b6,2024-04-03T17:24:18.150000
|
||||||
CVE-2024-1181,0,0,3878a855f0577e7ef140d59905a2ce6431a946183d23ae64dcb6feffc50f80bc,2024-03-20T13:00:16.367000
|
CVE-2024-1181,0,0,3878a855f0577e7ef140d59905a2ce6431a946183d23ae64dcb6feffc50f80bc,2024-03-20T13:00:16.367000
|
||||||
CVE-2024-1182,1,1,97dd760accba3f9619b5db747b46c1d99d415aa78de66c6e87be5742637c5d6c,2024-07-04T09:15:02.743000
|
CVE-2024-1182,0,0,97dd760accba3f9619b5db747b46c1d99d415aa78de66c6e87be5742637c5d6c,2024-07-04T09:15:02.743000
|
||||||
CVE-2024-1183,0,0,ad3d5dd53b834e77fe27d619baf926c439310129c1f2f0d669e6120516ae79a3,2024-04-16T13:24:07.103000
|
CVE-2024-1183,0,0,ad3d5dd53b834e77fe27d619baf926c439310129c1f2f0d669e6120516ae79a3,2024-04-16T13:24:07.103000
|
||||||
CVE-2024-1184,0,0,023de5aadf78be1bb550c307602914123c4a319819f238db99009f5ee03b6925,2024-05-17T02:35:16.900000
|
CVE-2024-1184,0,0,023de5aadf78be1bb550c307602914123c4a319819f238db99009f5ee03b6925,2024-05-17T02:35:16.900000
|
||||||
CVE-2024-1185,0,0,0bdb213dbdb0433604bf4f6f8c159144762d1971d8fe18244dfa60142ddf3fc4,2024-06-26T15:15:19.220000
|
CVE-2024-1185,0,0,0bdb213dbdb0433604bf4f6f8c159144762d1971d8fe18244dfa60142ddf3fc4,2024-06-26T15:15:19.220000
|
||||||
@ -242024,8 +242024,8 @@ CVE-2024-1569,0,0,4b71bedec4a1528fa42ec60009db4665ea96567ec249e5864edd831fa0bb98
|
|||||||
CVE-2024-1570,0,0,1629a1493afa93044df9f22af1e83d093e3e06db82a23b409138b92d94c2f5f4,2024-02-29T13:49:29.390000
|
CVE-2024-1570,0,0,1629a1493afa93044df9f22af1e83d093e3e06db82a23b409138b92d94c2f5f4,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-1571,0,0,b1806e0b2d46f5d2ef86ed95b11ec13eeefb63bf2736347df987f91692e6e418,2024-04-10T13:24:00.070000
|
CVE-2024-1571,0,0,b1806e0b2d46f5d2ef86ed95b11ec13eeefb63bf2736347df987f91692e6e418,2024-04-10T13:24:00.070000
|
||||||
CVE-2024-1572,0,0,4deddd16a8e62290b13f0cdb450608c505fd6cdf76365f1d944ed8337c4c95f6,2024-05-02T18:00:37.360000
|
CVE-2024-1572,0,0,4deddd16a8e62290b13f0cdb450608c505fd6cdf76365f1d944ed8337c4c95f6,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-1573,1,1,525026c1a1d2dc269cdc0824f8b93c4407a053b0a85eff2fec0031cccd4f9e9d,2024-07-04T09:15:03.260000
|
CVE-2024-1573,0,0,525026c1a1d2dc269cdc0824f8b93c4407a053b0a85eff2fec0031cccd4f9e9d,2024-07-04T09:15:03.260000
|
||||||
CVE-2024-1574,1,1,56d863daf3f49f005e1f6b5e3bd1cc334888364aca430a39a69808f44d9b50a1,2024-07-04T09:15:03.720000
|
CVE-2024-1574,0,0,56d863daf3f49f005e1f6b5e3bd1cc334888364aca430a39a69808f44d9b50a1,2024-07-04T09:15:03.720000
|
||||||
CVE-2024-1576,0,0,6db392527516528e14eb0ea0191722707d0a406a5c4d32feed7275ee783f8c4b,2024-06-13T18:36:09.010000
|
CVE-2024-1576,0,0,6db392527516528e14eb0ea0191722707d0a406a5c4d32feed7275ee783f8c4b,2024-06-13T18:36:09.010000
|
||||||
CVE-2024-1577,0,0,ba33ce0c17d7a340b987ce63ee030c6e2edbd0f04d791d826fcf4cc55f2d4eae,2024-06-18T13:15:51.627000
|
CVE-2024-1577,0,0,ba33ce0c17d7a340b987ce63ee030c6e2edbd0f04d791d826fcf4cc55f2d4eae,2024-06-18T13:15:51.627000
|
||||||
CVE-2024-1579,0,0,b19774dd42578330a3da1ea9eac4803944dc51b8f7e2cc4d4d08fb40df600dc0,2024-04-30T13:11:16.690000
|
CVE-2024-1579,0,0,b19774dd42578330a3da1ea9eac4803944dc51b8f7e2cc4d4d08fb40df600dc0,2024-04-30T13:11:16.690000
|
||||||
@ -250747,6 +250747,7 @@ CVE-2024-32745,0,0,d87072ecdb1e4f8a0773ba4e4f91279addf64348f8d708e8345ba18186060
|
|||||||
CVE-2024-32746,0,0,bf3d346f8591a3b2bf316b9b8132a2dfea1babc4dfa2642c153510eaf27fbfda,2024-07-03T01:57:04.453000
|
CVE-2024-32746,0,0,bf3d346f8591a3b2bf316b9b8132a2dfea1babc4dfa2642c153510eaf27fbfda,2024-07-03T01:57:04.453000
|
||||||
CVE-2024-3275,0,0,911ea91aef7f88befc82f4227a09867c3c1d7c5e1f1eaf9e7dcf15d1eb26a443,2024-05-02T18:00:37.360000
|
CVE-2024-3275,0,0,911ea91aef7f88befc82f4227a09867c3c1d7c5e1f1eaf9e7dcf15d1eb26a443,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-32752,0,0,6d13d08f37a2ca402822db1d06cec7dff10a8c26a5cf1f44d193d0e9a10e4087,2024-07-03T01:57:05.223000
|
CVE-2024-32752,0,0,6d13d08f37a2ca402822db1d06cec7dff10a8c26a5cf1f44d193d0e9a10e4087,2024-07-03T01:57:05.223000
|
||||||
|
CVE-2024-32754,1,1,1ffadc47324147174069de59da93c07acb13900a5982ce6a6fa8bd6a29967e5d,2024-07-04T11:15:10.400000
|
||||||
CVE-2024-32755,0,0,b3528b194ab6699a4c0497b49f6b23d52c2b5f75510289aa8a21b02eac9ad3f2,2024-07-02T17:44:45.700000
|
CVE-2024-32755,0,0,b3528b194ab6699a4c0497b49f6b23d52c2b5f75510289aa8a21b02eac9ad3f2,2024-07-02T17:44:45.700000
|
||||||
CVE-2024-32756,0,0,7fa05cf39c6d3a5e903ec1a0f9f35b8a778ea0981647bd11b5e6e512e0af0b8a,2024-07-02T17:44:45.700000
|
CVE-2024-32756,0,0,7fa05cf39c6d3a5e903ec1a0f9f35b8a778ea0981647bd11b5e6e512e0af0b8a,2024-07-02T17:44:45.700000
|
||||||
CVE-2024-32757,0,0,324c62945352fac9f5590a80aa452fac7e1848c97df1fe1af0c1554b075a0f46,2024-07-02T17:44:45.700000
|
CVE-2024-32757,0,0,324c62945352fac9f5590a80aa452fac7e1848c97df1fe1af0c1554b075a0f46,2024-07-02T17:44:45.700000
|
||||||
@ -251849,7 +251850,7 @@ CVE-2024-34580,0,0,19940bb2c544766cd6c53ffdca8fb9e214f270c8b9158a8629c2ecdb51324
|
|||||||
CVE-2024-34581,0,0,0413ed27e2fcdfc3f06c8169658e624099f91a9321af4014b7ce969f11436f7e,2024-07-03T02:00:40.357000
|
CVE-2024-34581,0,0,0413ed27e2fcdfc3f06c8169658e624099f91a9321af4014b7ce969f11436f7e,2024-07-03T02:00:40.357000
|
||||||
CVE-2024-34582,0,0,589200e4299098a43f17589b3359a4252ec2c8c3c5fc845d002a18066ab71c11,2024-07-03T02:00:41.190000
|
CVE-2024-34582,0,0,589200e4299098a43f17589b3359a4252ec2c8c3c5fc845d002a18066ab71c11,2024-07-03T02:00:41.190000
|
||||||
CVE-2024-34583,0,0,d92099cb2aacb9940a376e2e0c9537aa23ff3e9bc91c630cc7027a285ebda73d,2024-07-02T12:09:16.907000
|
CVE-2024-34583,0,0,d92099cb2aacb9940a376e2e0c9537aa23ff3e9bc91c630cc7027a285ebda73d,2024-07-02T12:09:16.907000
|
||||||
CVE-2024-34584,0,1,8e6f74275c7d42c51cc63abbe20a1a32c65348536b87a8575709018bb0cfcfc2,2024-07-04T09:15:04.093000
|
CVE-2024-34584,0,0,8e6f74275c7d42c51cc63abbe20a1a32c65348536b87a8575709018bb0cfcfc2,2024-07-04T09:15:04.093000
|
||||||
CVE-2024-34585,0,0,ee8a251702fee14d8824e610a55296979d395fc30ca6242ef0d771950dd8a16c,2024-07-02T12:09:16.907000
|
CVE-2024-34585,0,0,ee8a251702fee14d8824e610a55296979d395fc30ca6242ef0d771950dd8a16c,2024-07-02T12:09:16.907000
|
||||||
CVE-2024-34586,0,0,85ea0e1776d595c70d1b77b7c2a6e5386b5196b05d554fbb5d36eb03a3aca46d,2024-07-02T12:09:16.907000
|
CVE-2024-34586,0,0,85ea0e1776d595c70d1b77b7c2a6e5386b5196b05d554fbb5d36eb03a3aca46d,2024-07-02T12:09:16.907000
|
||||||
CVE-2024-34587,0,0,12a6bb49f8fa1d3da9fa63d0f36b9f078a4757ebe15d04c02460d0cd53601e2b,2024-07-02T12:09:16.907000
|
CVE-2024-34587,0,0,12a6bb49f8fa1d3da9fa63d0f36b9f078a4757ebe15d04c02460d0cd53601e2b,2024-07-02T12:09:16.907000
|
||||||
@ -253999,7 +254000,7 @@ CVE-2024-39016,0,0,44b10b31c2dcb3d5902acc74499e6688219a0202af7dbd3ffd5adca56db39
|
|||||||
CVE-2024-39017,0,0,cad5c73885b78ec41e9e1236a7a0070e7449eef74b63e32b190c59476e544a2f,2024-07-03T02:05:37.560000
|
CVE-2024-39017,0,0,cad5c73885b78ec41e9e1236a7a0070e7449eef74b63e32b190c59476e544a2f,2024-07-03T02:05:37.560000
|
||||||
CVE-2024-39018,0,0,16dc342eb9c9ddff4509558cd4678a205ae33f272029e49d96df9e8a311347f8,2024-07-01T16:37:39.040000
|
CVE-2024-39018,0,0,16dc342eb9c9ddff4509558cd4678a205ae33f272029e49d96df9e8a311347f8,2024-07-01T16:37:39.040000
|
||||||
CVE-2024-3903,0,0,b17bb4ec6e0e391a38b8cd510c422de68900922cf0bf4c2e4e48aa68680d6339,2024-05-14T16:11:39.510000
|
CVE-2024-3903,0,0,b17bb4ec6e0e391a38b8cd510c422de68900922cf0bf4c2e4e48aa68680d6339,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-3904,1,1,c5765cf5b9d9395a166e5f9497abbc0c75afd17eef49668e50ad189eeca3d838,2024-07-04T09:15:04.317000
|
CVE-2024-3904,0,0,c5765cf5b9d9395a166e5f9497abbc0c75afd17eef49668e50ad189eeca3d838,2024-07-04T09:15:04.317000
|
||||||
CVE-2024-3905,0,0,a951c486be8869bf12976255205bd7b845c8a04b7efadd3f2b0fe1349880c5bb,2024-06-04T19:20:26.357000
|
CVE-2024-3905,0,0,a951c486be8869bf12976255205bd7b845c8a04b7efadd3f2b0fe1349880c5bb,2024-06-04T19:20:26.357000
|
||||||
CVE-2024-3906,0,0,2118bc9913869ee4f34c8416c221c77b744d5529f8376fd726e306c6d571b72a,2024-06-04T19:20:26.463000
|
CVE-2024-3906,0,0,2118bc9913869ee4f34c8416c221c77b744d5529f8376fd726e306c6d571b72a,2024-06-04T19:20:26.463000
|
||||||
CVE-2024-3907,0,0,d80cb7d26fcc43e0af9a1a179a5017f98da402633ba2a83ba5df778a0fb65662,2024-06-04T19:20:26.563000
|
CVE-2024-3907,0,0,d80cb7d26fcc43e0af9a1a179a5017f98da402633ba2a83ba5df778a0fb65662,2024-06-04T19:20:26.563000
|
||||||
@ -254162,7 +254163,7 @@ CVE-2024-3987,0,0,05499205f937534ee026fd5a41dcafd44deae059117eea743b5e3e3c53eaee
|
|||||||
CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b79d4,2024-07-02T12:09:16.907000
|
CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b79d4,2024-07-02T12:09:16.907000
|
||||||
CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000
|
CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000
|
||||||
CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000
|
CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000
|
||||||
CVE-2024-39884,1,1,91cbd8ded2e4683c39dfef6707444bdb9aba0a44a7e9eae96339027dc4b99d07,2024-07-04T09:15:04.237000
|
CVE-2024-39884,0,0,91cbd8ded2e4683c39dfef6707444bdb9aba0a44a7e9eae96339027dc4b99d07,2024-07-04T09:15:04.237000
|
||||||
CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000
|
CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-39891,0,0,f05a058a4cf741da51f47b19ea162b25ce262cdb61fb36618eb53dc7411c00e3,2024-07-03T22:15:02.923000
|
CVE-2024-39891,0,0,f05a058a4cf741da51f47b19ea162b25ce262cdb61fb36618eb53dc7411c00e3,2024-07-03T22:15:02.923000
|
||||||
CVE-2024-39894,0,0,c61bb2661100853548279e349e76a635cba102e2f9a2c3076410b71ec944a6f0,2024-07-03T13:15:02.890000
|
CVE-2024-39894,0,0,c61bb2661100853548279e349e76a635cba102e2f9a2c3076410b71ec944a6f0,2024-07-03T13:15:02.890000
|
||||||
@ -255453,7 +255454,7 @@ CVE-2024-5637,0,0,96c491286509bbcdcc2ade7ab7cd058d8e2fb8f26719ef46502e504a5a75b3
|
|||||||
CVE-2024-5638,0,0,ecd29107ace2c39372f8ad7d26b6d92a031cf986dc4e07d96162e8140ebd097d,2024-06-10T02:52:08.267000
|
CVE-2024-5638,0,0,ecd29107ace2c39372f8ad7d26b6d92a031cf986dc4e07d96162e8140ebd097d,2024-06-10T02:52:08.267000
|
||||||
CVE-2024-5639,0,0,2322b8156dee01dfdab7b2069be6e0698e3a8613a841329b71822c874a14aeb7,2024-06-24T19:24:23.883000
|
CVE-2024-5639,0,0,2322b8156dee01dfdab7b2069be6e0698e3a8613a841329b71822c874a14aeb7,2024-06-24T19:24:23.883000
|
||||||
CVE-2024-5640,0,0,86163b3d741cee0a4e50ef8553f0c82f1f0c15bd48d022d2d250ef0f55c23f10,2024-06-07T14:56:05.647000
|
CVE-2024-5640,0,0,86163b3d741cee0a4e50ef8553f0c82f1f0c15bd48d022d2d250ef0f55c23f10,2024-06-07T14:56:05.647000
|
||||||
CVE-2024-5641,1,1,302257d539c3a4fe0e3331a2a68b0052238d89c20df69a4f9616726a8c28637c,2024-07-04T08:15:01.980000
|
CVE-2024-5641,0,0,302257d539c3a4fe0e3331a2a68b0052238d89c20df69a4f9616726a8c28637c,2024-07-04T08:15:01.980000
|
||||||
CVE-2024-5642,0,0,473e29d44a01c1bd9d78a11628480be9d88df99635e7b451adc74e5ff8ecb62e,2024-07-01T14:15:05.807000
|
CVE-2024-5642,0,0,473e29d44a01c1bd9d78a11628480be9d88df99635e7b451adc74e5ff8ecb62e,2024-07-01T14:15:05.807000
|
||||||
CVE-2024-5645,0,0,1faba0fd6e05694e3fff7011c206b3ecee3c45fddb7e6c575993af231224a181,2024-06-11T17:57:47.197000
|
CVE-2024-5645,0,0,1faba0fd6e05694e3fff7011c206b3ecee3c45fddb7e6c575993af231224a181,2024-06-11T17:57:47.197000
|
||||||
CVE-2024-5646,0,0,23240aeec5f40e46e6951e19eff4b72273567c29932f06ca0851d3144bb5ebaa,2024-06-13T18:36:09.013000
|
CVE-2024-5646,0,0,23240aeec5f40e46e6951e19eff4b72273567c29932f06ca0851d3144bb5ebaa,2024-06-13T18:36:09.013000
|
||||||
@ -255811,8 +255812,8 @@ CVE-2024-6305,0,0,f99f0e2fe8305a118a77228b9078f8dc9ee1845d0c6e4aa828aaf18dadf372
|
|||||||
CVE-2024-6306,0,0,711bff153bb36aca97259b9a58665f79686710d592de1aed3b99962d3c3067a2,2024-06-25T17:15:11.107000
|
CVE-2024-6306,0,0,711bff153bb36aca97259b9a58665f79686710d592de1aed3b99962d3c3067a2,2024-06-25T17:15:11.107000
|
||||||
CVE-2024-6307,0,0,a6037df0fa8617c9aaeffdc703000fa7423e885d439338f30eb38eb0279e87b9,2024-06-28T13:15:03.453000
|
CVE-2024-6307,0,0,a6037df0fa8617c9aaeffdc703000fa7423e885d439338f30eb38eb0279e87b9,2024-06-28T13:15:03.453000
|
||||||
CVE-2024-6308,0,0,483bab7c0040f40965fba497a0be9e45fef6974a263c54d39149185a218f4b43,2024-06-25T21:16:02.087000
|
CVE-2024-6308,0,0,483bab7c0040f40965fba497a0be9e45fef6974a263c54d39149185a218f4b43,2024-06-25T21:16:02.087000
|
||||||
CVE-2024-6318,1,1,e033378ac4544687400474837a8b9fb1fb7ef6cbc1b4ab7f07f0cd63fde00254,2024-07-04T09:15:04.653000
|
CVE-2024-6318,0,0,e033378ac4544687400474837a8b9fb1fb7ef6cbc1b4ab7f07f0cd63fde00254,2024-07-04T09:15:04.653000
|
||||||
CVE-2024-6319,1,1,1c94f040c5cd0de82491b8e7d77e2e4bd7efa09bf92ae831fabe7dcf4f48e7be,2024-07-04T09:15:05.087000
|
CVE-2024-6319,0,0,1c94f040c5cd0de82491b8e7d77e2e4bd7efa09bf92ae831fabe7dcf4f48e7be,2024-07-04T09:15:05.087000
|
||||||
CVE-2024-6323,0,0,16f93962f537d8478d96317e8b0d9cad0e3aee225ed0ebdb8d6f6bf214bb804e,2024-06-28T13:15:19.317000
|
CVE-2024-6323,0,0,16f93962f537d8478d96317e8b0d9cad0e3aee225ed0ebdb8d6f6bf214bb804e,2024-06-28T13:15:19.317000
|
||||||
CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec10a,2024-07-03T18:27:40.903000
|
CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec10a,2024-07-03T18:27:40.903000
|
||||||
CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000
|
CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000
|
||||||
@ -255850,7 +255851,7 @@ CVE-2024-6425,0,0,adbfecb8c3cc947ec785870957655621e37e6a4ecfa332482b1b765f471fc8
|
|||||||
CVE-2024-6426,0,0,743cead7bfbb6d52b9a38edd8f28e270cc396ea75af77fc494cdf15f853aedb8,2024-07-03T12:53:24.977000
|
CVE-2024-6426,0,0,743cead7bfbb6d52b9a38edd8f28e270cc396ea75af77fc494cdf15f853aedb8,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-6427,0,0,57065ff923a64c20753385de741e3156cf426d3558cd727998195d1e669fe19f,2024-07-03T12:53:24.977000
|
CVE-2024-6427,0,0,57065ff923a64c20753385de741e3156cf426d3558cd727998195d1e669fe19f,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-6428,0,0,31d69642490b0b5c14fae0235cb6cc8aea9d2d4868dab2c3323c281656122a48,2024-07-03T12:53:24.977000
|
CVE-2024-6428,0,0,31d69642490b0b5c14fae0235cb6cc8aea9d2d4868dab2c3323c281656122a48,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-6434,1,1,159c06c28af995898176b2d52f1d50311b3051bc0d4d4281e9110d212e9abad5,2024-07-04T09:15:05.410000
|
CVE-2024-6434,0,1,d14275f75a0fe927b52fc71c63796f773d90555ba13b7d1eee800825aa65d4b4,2024-07-04T09:15:05.410000
|
||||||
CVE-2024-6438,0,0,c89c4e3ccf031fb42672508ffc0236a74fd652409f3f814c1aa7277296a22143,2024-07-02T17:54:02.370000
|
CVE-2024-6438,0,0,c89c4e3ccf031fb42672508ffc0236a74fd652409f3f814c1aa7277296a22143,2024-07-02T17:54:02.370000
|
||||||
CVE-2024-6439,0,0,1bd5e2a149e15b87b2ec1d9e23e870c4f5a97c502c5089c3f0a60fbd028209c7,2024-07-02T17:58:39.773000
|
CVE-2024-6439,0,0,1bd5e2a149e15b87b2ec1d9e23e870c4f5a97c502c5089c3f0a60fbd028209c7,2024-07-02T17:58:39.773000
|
||||||
CVE-2024-6440,0,0,4db20ef0878ff896f7a92a0fb63819a7fd586b5cd61940caee4cf26cda6cf8f9,2024-07-02T17:58:15.410000
|
CVE-2024-6440,0,0,4db20ef0878ff896f7a92a0fb63819a7fd586b5cd61940caee4cf26cda6cf8f9,2024-07-02T17:58:15.410000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user