mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-06-11T06:00:18.606007+00:00
This commit is contained in:
parent
10f039c33a
commit
d3f4c0bba7
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41913",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-07T05:15:09.173",
|
||||
"lastModified": "2023-12-12T17:07:01.363",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-06-11T04:15:10.863",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -77,6 +77,10 @@
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPJZPYHBCRXUQGGKQE6TYH4J4RIJH6HO/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.strongswan.org/blog/2023/11/20/strongswan-vulnerability-%28cve-2023-41913%29.html",
|
||||
"source": "cve@mitre.org",
|
||||
|
51
CVE-2023/CVE-2023-72xx/CVE-2023-7264.json
Normal file
51
CVE-2023/CVE-2023-72xx/CVE-2023-7264.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2023-7264",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-11T04:15:11.987",
|
||||
"lastModified": "2024-06-11T04:15:11.987",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Build App Online plugin for WordPress is vulnerable to account takeover due to a weak password reset mechanism in all versions up to, and including, 1.0.21. This makes it possible for unauthenticated attackers to reset the password of arbitrary users by guessing an 4-digit numeric reset code."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/build-app-online/tags/1.0.21/public/class-build-app-online-public.php#L3688",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/build-app-online/tags/1.0.21/public/class-build-app-online-public.php#L3757",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f6047ae6-b1b4-4b31-aa12-560927e1040b?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1298",
|
||||
"sourceIdentifier": "infosec@edk2.groups.io",
|
||||
"published": "2024-05-30T21:15:09.213",
|
||||
"lastModified": "2024-05-31T13:01:46.727",
|
||||
"lastModified": "2024-06-11T04:15:12.513",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -54,6 +54,14 @@
|
||||
{
|
||||
"url": "https://github.com/tianocore/edk2/security/advisories/GHSA-chfw-xj8f-6m53",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7NUL7NSZQ76A5OKDUCODQNY7WSX4SST/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VIMEZWDKEIQKU7NMHKL57DOCITPGEXYN/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2024/CVE-2024-298xx/CVE-2024-29855.json
Normal file
43
CVE-2024/CVE-2024-298xx/CVE-2024-29855.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2024-29855",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-06-11T04:15:12.953",
|
||||
"lastModified": "2024-06-11T04:15:12.953",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Hard-coded JWT secret allows authentication bypass in Veeam Recovery Orchestrator"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "support@hackerone.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.veeam.com/kb4585",
|
||||
"source": "support@hackerone.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-314xx/CVE-2024-31400.json
Normal file
24
CVE-2024/CVE-2024-314xx/CVE-2024-31400.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-31400",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-06-11T05:15:53.130",
|
||||
"lastModified": "2024-06-11T05:15:53.130",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insertion of sensitive information into sent data issue exists in Cybozu Garoon 5.0.0 to 5.15.0. If this vulnerability is exploited, unintended data may be left in forwarded mail."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cs.cybozu.co.jp/2024/007901.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN28869536/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-314xx/CVE-2024-31401.json
Normal file
24
CVE-2024/CVE-2024-314xx/CVE-2024-31401.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-31401",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-06-11T05:15:53.320",
|
||||
"lastModified": "2024-06-11T05:15:53.320",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-site scripting vulnerability in Cybozu Garoon 5.0.0 to 5.15.2 allows a remote authenticated attacker with an administrative privilege to inject an arbitrary script on the web browser of the user who is logging in to the product."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cs.cybozu.co.jp/2024/007901.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN28869536/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-314xx/CVE-2024-31403.json
Normal file
24
CVE-2024/CVE-2024-314xx/CVE-2024-31403.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-31403",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-06-11T05:15:53.397",
|
||||
"lastModified": "2024-06-11T05:15:53.397",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect authorization vulnerability in Cybozu Garoon 5.0.0 to 6.0.0 allows a remote authenticated attacker to alter and/or obtain the data of Memo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cs.cybozu.co.jp/2024/007901.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN28869536/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-314xx/CVE-2024-31404.json
Normal file
24
CVE-2024/CVE-2024-314xx/CVE-2024-31404.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-31404",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-06-11T05:15:53.463",
|
||||
"lastModified": "2024-06-11T05:15:53.463",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insertion of sensitive information into sent data issue exists in Cybozu Garoon 5.5.0 to 6.0.0, which may allow a user who can log in to the product to view the data of Scheduler."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cs.cybozu.co.jp/2024/007901.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN28869536/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-353xx/CVE-2024-35329.json
Normal file
24
CVE-2024/CVE-2024-353xx/CVE-2024-35329.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-35329",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-11T05:15:53.533",
|
||||
"lastModified": "2024-06-11T05:15:53.533",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "libyaml 0.2.5 is vulnerable to a heap-based Buffer Overflow in yaml_document_add_sequence in api.c."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1xgQ9hJ7Sn5RVEsdMGvIy0s3b_bg3Wyk-/view?usp=sharing",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yaml/libyaml/releases/tag/0.2.5",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-363xx/CVE-2024-36360.json
Normal file
24
CVE-2024/CVE-2024-363xx/CVE-2024-36360.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-36360",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-06-11T05:15:53.610",
|
||||
"lastModified": "2024-06-11T05:15:53.610",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OS command injection vulnerability exists in awkblog v0.0.1 (commit hash:7b761b192d0e0dc3eef0f30630e00ece01c8d552) and earlier. If a remote unauthenticated attacker sends a specially crafted HTTP request, an arbitrary OS command may be executed with the privileges of the affected product on the machine running the product."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yammerjp/awkblog/issues/1",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN80506242/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-3727",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-05-14T15:42:07.060",
|
||||
"lastModified": "2024-06-10T18:15:36.160",
|
||||
"lastModified": "2024-06-11T04:15:13.247",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -75,9 +75,21 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLND3YDQQRWVRIUPL2G5UKXP5L3VSBBT/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DTOMYERG5ND4QFDHC4ZSGCED3T3ESRSC/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FBZQ2ZRMFEUQ35235B2HWPSXGDCBZHFV/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QFXMF3VVKIZN7ZMB7PKZCSWV6MOMTGMQ/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFVSMR7TNLO2KPWJSW4CF64C2QMQXCIN/",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-4418",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-05-08T03:15:07.203",
|
||||
"lastModified": "2024-05-08T13:15:00.690",
|
||||
"lastModified": "2024-06-11T04:15:13.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -58,6 +58,10 @@
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278616",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4IE44UIIC3QWBFRB4EUSFNLJBU6JLNSD/",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
51
CVE-2024/CVE-2024-55xx/CVE-2024-5530.json
Normal file
51
CVE-2024/CVE-2024-55xx/CVE-2024-5530.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2024-5530",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-11T05:15:53.680",
|
||||
"lastModified": "2024-06-11T05:15:53.680",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The ShopLentor \u2013 WooCommerce Builder for Elementor & Gutenberg +12 Modules \u2013 All in One Solution (formerly WooLentor) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's WL: Product Horizontal Filter widget in all versions up to, and including, 2.9.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/woolentor-addons/tags/2.8.9/includes/addons/wl_product_horizontal_filter.php#L1091",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3100260/woolentor-addons/trunk/includes/addons/wl_product_horizontal_filter.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3fc2c2df-b590-413f-ba07-5aa645d069b8?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
41
README.md
41
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-11T04:00:18.881608+00:00
|
||||
2024-06-11T06:00:18.606007+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-11T03:15:12.253000+00:00
|
||||
2024-06-11T05:15:53.680000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,37 +33,32 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
253369
|
||||
253378
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `18`
|
||||
Recently added CVEs: `9`
|
||||
|
||||
- [CVE-2023-6745](CVE-2023/CVE-2023-67xx/CVE-2023-6745.json) (`2024-06-11T03:15:09.087`)
|
||||
- [CVE-2023-6748](CVE-2023/CVE-2023-67xx/CVE-2023-6748.json) (`2024-06-11T03:15:09.310`)
|
||||
- [CVE-2024-0627](CVE-2024/CVE-2024-06xx/CVE-2024-0627.json) (`2024-06-11T03:15:09.520`)
|
||||
- [CVE-2024-0653](CVE-2024/CVE-2024-06xx/CVE-2024-0653.json) (`2024-06-11T03:15:09.723`)
|
||||
- [CVE-2024-2473](CVE-2024/CVE-2024-24xx/CVE-2024-2473.json) (`2024-06-11T03:15:10.183`)
|
||||
- [CVE-2024-28164](CVE-2024/CVE-2024-281xx/CVE-2024-28164.json) (`2024-06-11T03:15:09.953`)
|
||||
- [CVE-2024-33001](CVE-2024/CVE-2024-330xx/CVE-2024-33001.json) (`2024-06-11T03:15:10.393`)
|
||||
- [CVE-2024-34683](CVE-2024/CVE-2024-346xx/CVE-2024-34683.json) (`2024-06-11T03:15:10.623`)
|
||||
- [CVE-2024-34684](CVE-2024/CVE-2024-346xx/CVE-2024-34684.json) (`2024-06-11T03:15:10.863`)
|
||||
- [CVE-2024-34686](CVE-2024/CVE-2024-346xx/CVE-2024-34686.json) (`2024-06-11T03:15:11.080`)
|
||||
- [CVE-2024-34688](CVE-2024/CVE-2024-346xx/CVE-2024-34688.json) (`2024-06-11T03:15:11.310`)
|
||||
- [CVE-2024-34690](CVE-2024/CVE-2024-346xx/CVE-2024-34690.json) (`2024-06-11T03:15:11.547`)
|
||||
- [CVE-2024-34691](CVE-2024/CVE-2024-346xx/CVE-2024-34691.json) (`2024-06-11T03:15:11.780`)
|
||||
- [CVE-2024-37130](CVE-2024/CVE-2024-371xx/CVE-2024-37130.json) (`2024-06-11T02:15:08.943`)
|
||||
- [CVE-2024-37176](CVE-2024/CVE-2024-371xx/CVE-2024-37176.json) (`2024-06-11T03:15:12.020`)
|
||||
- [CVE-2024-37177](CVE-2024/CVE-2024-371xx/CVE-2024-37177.json) (`2024-06-11T02:15:09.243`)
|
||||
- [CVE-2024-37178](CVE-2024/CVE-2024-371xx/CVE-2024-37178.json) (`2024-06-11T02:15:09.487`)
|
||||
- [CVE-2024-5090](CVE-2024/CVE-2024-50xx/CVE-2024-5090.json) (`2024-06-11T03:15:12.253`)
|
||||
- [CVE-2023-7264](CVE-2023/CVE-2023-72xx/CVE-2023-7264.json) (`2024-06-11T04:15:11.987`)
|
||||
- [CVE-2024-29855](CVE-2024/CVE-2024-298xx/CVE-2024-29855.json) (`2024-06-11T04:15:12.953`)
|
||||
- [CVE-2024-31400](CVE-2024/CVE-2024-314xx/CVE-2024-31400.json) (`2024-06-11T05:15:53.130`)
|
||||
- [CVE-2024-31401](CVE-2024/CVE-2024-314xx/CVE-2024-31401.json) (`2024-06-11T05:15:53.320`)
|
||||
- [CVE-2024-31403](CVE-2024/CVE-2024-314xx/CVE-2024-31403.json) (`2024-06-11T05:15:53.397`)
|
||||
- [CVE-2024-31404](CVE-2024/CVE-2024-314xx/CVE-2024-31404.json) (`2024-06-11T05:15:53.463`)
|
||||
- [CVE-2024-35329](CVE-2024/CVE-2024-353xx/CVE-2024-35329.json) (`2024-06-11T05:15:53.533`)
|
||||
- [CVE-2024-36360](CVE-2024/CVE-2024-363xx/CVE-2024-36360.json) (`2024-06-11T05:15:53.610`)
|
||||
- [CVE-2024-5530](CVE-2024/CVE-2024-55xx/CVE-2024-5530.json) (`2024-06-11T05:15:53.680`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `4`
|
||||
|
||||
- [CVE-2023-41913](CVE-2023/CVE-2023-419xx/CVE-2023-41913.json) (`2024-06-11T04:15:10.863`)
|
||||
- [CVE-2024-1298](CVE-2024/CVE-2024-12xx/CVE-2024-1298.json) (`2024-06-11T04:15:12.513`)
|
||||
- [CVE-2024-3727](CVE-2024/CVE-2024-37xx/CVE-2024-3727.json) (`2024-06-11T04:15:13.247`)
|
||||
- [CVE-2024-4418](CVE-2024/CVE-2024-44xx/CVE-2024-4418.json) (`2024-06-11T04:15:13.947`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
53
_state.csv
53
_state.csv
@ -231056,7 +231056,7 @@ CVE-2023-41909,0,0,9d721a7787eed097b8afc5a8b093210cda92946cc467d295bac695aa5c5e3
|
||||
CVE-2023-4191,0,0,1f537b5b157bbbbe56b2b4e990c34fe05bafbb89a2c79fe380aa1ac37172b571,2024-05-17T02:31:25.480000
|
||||
CVE-2023-41910,0,0,ddadb74f9e50737d21120f0b88022d8c15ee68cc56eb3c4577229fb7986d33f1,2023-09-27T15:19:31.200000
|
||||
CVE-2023-41911,0,0,c370f1652ab4a7704bdb8c1c18b508b07e9446ea3a6134c45133ba3207c3be67,2023-10-02T19:02:19.277000
|
||||
CVE-2023-41913,0,0,1ef712611d8ada91ec3b8a2083ecc6deb61433202a26f11a1d8a2e87490e758d,2023-12-12T17:07:01.363000
|
||||
CVE-2023-41913,0,1,ac6a5dec8a2ef981599760c1bd584c0a3e1984d30935032e705f83162150cb05,2024-06-11T04:15:10.863000
|
||||
CVE-2023-41914,0,0,27c5c2c3c84cd968ddce119075b7bda7c87709505c9fb5104442489dec8eacba,2023-11-09T22:11:29.870000
|
||||
CVE-2023-41915,0,0,6f98a3967a35a3981301df9522094adc983487e955c89af8c2ce098770114116,2024-01-09T03:14:55.743000
|
||||
CVE-2023-4192,0,0,8f2f20cfbddfb9517a03eb2b1684aa1e1baae715b28b8e6aa49f25d0f9a3982a,2024-05-17T02:31:25.590000
|
||||
@ -239849,10 +239849,10 @@ CVE-2023-6741,0,0,f3cfa6a296f1bf591f660cce7219d255270ea32760833cce9baf8d0502b5e2
|
||||
CVE-2023-6742,0,0,2900d5e0aa2d1c06635c4fffaee0ae1fdedcaaf400dcd73fc0f3de3312990d2e,2024-01-17T20:39:17.207000
|
||||
CVE-2023-6743,0,0,8a725344903a0f8be94e282d64e3887d716f8724061c271e685a3306a5529d76,2024-05-29T13:02:09.280000
|
||||
CVE-2023-6744,0,0,cafe581d93d588e81a40996c38c7b4f050782ddaaee60ffcfa254816bf0938ee,2023-12-29T06:22:35.867000
|
||||
CVE-2023-6745,1,1,4103cf55d859c082d115341900c2dd9b8fe746d7fd76dab4edefd36d0056f830,2024-06-11T03:15:09.087000
|
||||
CVE-2023-6745,0,0,4103cf55d859c082d115341900c2dd9b8fe746d7fd76dab4edefd36d0056f830,2024-06-11T03:15:09.087000
|
||||
CVE-2023-6746,0,0,e4ec5eee6cefe9c4b3d874e5626fb5cd1b37e4b2d10a3d871da98e72afe14158,2024-01-10T16:15:50.060000
|
||||
CVE-2023-6747,0,0,4f443d7064232a500fc6ebb25b721d7e601e212563d327a344ddcb8161d70557,2024-01-30T14:15:47.380000
|
||||
CVE-2023-6748,1,1,6be30877aeb59c85e589b11c56da2b1f46a14e37a634db0671b09b0589029316,2024-06-11T03:15:09.310000
|
||||
CVE-2023-6748,0,0,6be30877aeb59c85e589b11c56da2b1f46a14e37a634db0671b09b0589029316,2024-06-11T03:15:09.310000
|
||||
CVE-2023-6749,0,0,41dee049bc38a4e1846c6504ff568027ac0bf6dccdca0ff09ead1397b56654b8,2024-02-20T19:50:53.960000
|
||||
CVE-2023-6750,0,0,cfc8624b738626ca31d5ff0a22e68ee3a72d63eb1ed968c98174fc7313a1edb3,2024-01-11T20:01:30.297000
|
||||
CVE-2023-6751,0,0,e8247e54b165a6c12110948d98c7597dd9d95407efb80f34da128605fcc96d9c,2024-01-18T17:46:25.627000
|
||||
@ -240300,6 +240300,7 @@ CVE-2023-7253,0,0,6a907485fdee60605139b38f9229fa03da0ccfe5b94dcf86ca3826725a280a
|
||||
CVE-2023-7258,0,0,5ff9fbb18c87cd79eeba5bdac9e20b834be684e2899fd63fb3e107422ede555b,2024-05-15T18:35:11.453000
|
||||
CVE-2023-7259,0,0,291fdf96791c66804d1f0d3fb86a244e544f8112f70bc253658c7b47edf99960,2024-06-04T19:18:14.193000
|
||||
CVE-2023-7261,0,0,b08661661f1bfa07d4ab77e9bfd0502f6d5d47a18d1db1be6ea651d3e3e30c50,2024-06-10T02:52:08.267000
|
||||
CVE-2023-7264,1,1,dccb93d0648e587ceedbdf388ce7ef8562337765b0f4d097c758f31d3e00ce86,2024-06-11T04:15:11.987000
|
||||
CVE-2024-0007,0,0,3bebeca11ed66b29340ad5b2f4a6fdda381d640f217ed7214dda7d3a471e9da1,2024-02-15T06:23:39.303000
|
||||
CVE-2024-0008,0,0,db70626ccf03b2491d218a1d6d38cb10870a351e02a617fba1e6e23a0ac8502b,2024-02-15T06:23:39.303000
|
||||
CVE-2024-0009,0,0,a481cbe6336f9e8c7286d10d3efcc3169667e3db231d83fec3fad506beda4652,2024-02-15T06:23:39.303000
|
||||
@ -240803,7 +240804,7 @@ CVE-2024-0623,0,0,435a12ca9bf560f92a091a8adc9fed70987d56024bbadeb6cd09719f8de0c9
|
||||
CVE-2024-0624,0,0,193a94c59e6aef2611f3b709bfcfdfe730e53076589746822f137984322f4a3a,2024-01-31T19:03:53.193000
|
||||
CVE-2024-0625,0,0,e6db3236f3f3d4946f9c7470ea75c8f4fd101b44f963c82c90bc3a0f21b31db9,2024-02-02T05:08:07.047000
|
||||
CVE-2024-0626,0,0,99f69af94a80c3ff521223c10206b5e62d73f526e3736bdf7c339e8efe1faca9,2024-04-10T13:24:00.070000
|
||||
CVE-2024-0627,1,1,bf4d305cf87fdefeb69e422cb9693fb8c4e1540556f5e6cee59c27719ebbcc7c,2024-06-11T03:15:09.520000
|
||||
CVE-2024-0627,0,0,bf4d305cf87fdefeb69e422cb9693fb8c4e1540556f5e6cee59c27719ebbcc7c,2024-06-11T03:15:09.520000
|
||||
CVE-2024-0628,0,0,6929f2a7a44b9bc6b3b457ec8d478ddb1d9368f01ad7383ad0399a751f886828,2024-02-13T19:18:46.020000
|
||||
CVE-2024-0629,0,0,f56201e6826667fe713f864f6ba3053fc186d9ef801a5f82ecef869bbb380e44,2024-05-02T18:00:37.360000
|
||||
CVE-2024-0630,0,0,49e9d42e1e8004a90a8d62b54ea8a5d5f6ebecab9fac26e6e82dc914d2e02636,2024-02-13T15:42:35.563000
|
||||
@ -240823,7 +240824,7 @@ CVE-2024-0649,0,0,98c87adfd3ec3e509476dd2daf7d28506639295b791b27cafeafbee41a9bb7
|
||||
CVE-2024-0650,0,0,5d6cdc041d1c25f843bde711e250a47a7c3a9acd7d7c32e1f1aad64372dfa767,2024-05-17T02:34:50.433000
|
||||
CVE-2024-0651,0,0,ff09cb592d9768a0b4b240f95e42b969a412d9f74b01f1ebfde4fd7e07ef2e68,2024-05-17T02:34:50.597000
|
||||
CVE-2024-0652,0,0,edef2011d20187e2fe97070f13bdbfaba189c8d8103e7093b82b2bf436de4d23,2024-05-17T02:34:50.700000
|
||||
CVE-2024-0653,1,1,cc76f3e8b608b7215b79336450b15ae1ef23fec43df86a29e4fd073979e49ab8,2024-06-11T03:15:09.723000
|
||||
CVE-2024-0653,0,0,cc76f3e8b608b7215b79336450b15ae1ef23fec43df86a29e4fd073979e49ab8,2024-06-11T03:15:09.723000
|
||||
CVE-2024-0654,0,0,a75d1f886393fe65bd498394d4a9cfa1edb8556159763825f130d309f83e3ffd,2024-05-17T02:34:50.803000
|
||||
CVE-2024-0655,0,0,d1e299d826837ddfcd0fcb08552681da893c030239d29f72a43c1e900f27e224,2024-05-17T02:34:50.910000
|
||||
CVE-2024-0656,0,0,76b426be0ea0722d4a4bedfbe392319a1af8c0a094b2ffa74a3d311d7d767733,2024-02-29T13:49:29.390000
|
||||
@ -241407,7 +241408,7 @@ CVE-2024-1293,0,0,51959b2d10b4ca1210a0917015b6e0ba4809214d01553289260d6a92beabc6
|
||||
CVE-2024-1294,0,0,1a6fde55ee17952393d258a28e1938bfe41cafec05fa305cc82057814b7c2b7d,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1296,0,0,ab648d9dba58ca530bb990b50d92c4f5ce9f591faa8fbeeb49385095b8425c33,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1297,0,0,1fc219bb038ab422185a999365115aff94759fe3e5ff94e3dc4180f1d6bc82d0,2024-02-20T19:50:53.960000
|
||||
CVE-2024-1298,0,0,75a4fa1eb18310157890adbabce98ba9f45143abc7cc42ec3665b07cc67f59f3,2024-05-31T13:01:46.727000
|
||||
CVE-2024-1298,0,1,b14e73b9f89ef2bb5f90efe91191494dc122a0d6eae045ea12354e4504b4ff5a,2024-06-11T04:15:12.513000
|
||||
CVE-2024-1299,0,0,165a6e5bf7396c9871edb84a6ce28d3386b33fd34eb9238065e890fa150a178a,2024-03-07T13:52:27.110000
|
||||
CVE-2024-1300,0,0,843d0cf47128991e9d7cbff1831c7ad94a9bd78e5cc7dab19b0a5a8848cb7f51,2024-05-31T01:15:53.967000
|
||||
CVE-2024-1301,0,0,68d5e322fab21220735382791ea9287e8104e954fa5bc7b1f8f02021f25e280b,2024-03-12T17:46:17.273000
|
||||
@ -244705,7 +244706,7 @@ CVE-2024-24721,0,0,f811f7b97630e39f8e09dfe35ae447277604cf213cb4d45448493cc8fa15f
|
||||
CVE-2024-24722,0,0,952e66641f17a0fb9dfe3803e528e36e48f057663a4934472c4c7db463b9f3c7,2024-02-20T19:50:53.960000
|
||||
CVE-2024-24724,0,0,e42eaee1eef35b64cf72e5bbda0c5779a84559031ee2ff005968828ccd5bd355,2024-04-03T12:38:04.840000
|
||||
CVE-2024-24725,0,0,847989010b93725525e690ac5c8bea0d7ea2827b26bf9cb1ecebf4f319d3e989,2024-03-25T01:51:01.223000
|
||||
CVE-2024-2473,1,1,6569fd5ed0a7017bab49cbd2e84412e2812459aa3081644cb1e10704da4c7019,2024-06-11T03:15:10.183000
|
||||
CVE-2024-2473,0,0,6569fd5ed0a7017bab49cbd2e84412e2812459aa3081644cb1e10704da4c7019,2024-06-11T03:15:10.183000
|
||||
CVE-2024-24736,0,0,608c2f3e65ddbb1c2eb07c75b404de7eb78db210e5f752bbc8c9942f5e722b68,2024-02-02T02:08:23.417000
|
||||
CVE-2024-24739,0,0,0429371c5cb9ecc13abbb3d02a9a54fdca7eb3accb432d640f9262793fd2a716,2024-02-13T14:01:40.577000
|
||||
CVE-2024-2474,0,0,a6869e151e4e2e3d633a979c3bef2970246a6be980c242b46002754bb0136d56,2024-03-20T13:00:16.367000
|
||||
@ -247144,7 +247145,7 @@ CVE-2024-28160,0,0,23f770675294c04a43f495820e4c5fdc452a7dd81cf7eee4a83fcb5b398cf
|
||||
CVE-2024-28161,0,0,86748c4691866964f8e57f4f7d00c680f8676b105c533880bae7ac7f14ee37a7,2024-05-01T18:15:17.180000
|
||||
CVE-2024-28162,0,0,b7be834b370f066dd502d3e2eb138145374b8a6f3fffd7c594a51d4f8e7dd882,2024-05-01T18:15:17.223000
|
||||
CVE-2024-28163,0,0,04503ad76f6d74637a8e6f8a7d443052dfa73d2acab964dffd0d8da32b69e3b5,2024-03-12T12:40:13.500000
|
||||
CVE-2024-28164,1,1,5ea51e20a9a72a019968b8aebc5c7654eb0c655c853de3a96d7b4f3ed60f5d49,2024-06-11T03:15:09.953000
|
||||
CVE-2024-28164,0,0,5ea51e20a9a72a019968b8aebc5c7654eb0c655c853de3a96d7b4f3ed60f5d49,2024-06-11T03:15:09.953000
|
||||
CVE-2024-28165,0,0,9d7262340b598174afa112673cc6ec6579b17c155d631a1daa1609c5814ec985,2024-05-14T19:18:31.490000
|
||||
CVE-2024-28167,0,0,0d05aeb691ba11cae01e2ab2c399918da8edc50da4b1f7f29cffd4e2facff21d,2024-04-09T12:48:04.090000
|
||||
CVE-2024-2817,0,0,588f647576c5ffb469bd86a5ecaf553a5c2dcef2568730202f1a9ad3030bf8cf,2024-05-17T02:38:32.210000
|
||||
@ -248010,6 +248011,7 @@ CVE-2024-29850,0,0,312685b23dbad4c8f8e6bd1bd0266c24c6e302be8a27839473fa75007f2ac
|
||||
CVE-2024-29851,0,0,218edcf6feb0effa72e3a8c5b814479d3c2c35c93f48749732d1e5886bf0b9db,2024-05-24T01:15:30.977000
|
||||
CVE-2024-29852,0,0,ca2ab03d52a8ecc9be34c09f2ce895e1acb480d7a13320d670e056e88b347616,2024-05-24T01:15:30.977000
|
||||
CVE-2024-29853,0,0,aa05b8b855ccb2c04433e87284eb4c79c04809a52f521f75709ccc473b6143f1,2024-05-24T01:15:30.977000
|
||||
CVE-2024-29855,1,1,620460c6fc9157f8c61976df6753ab55ff3e1c1ab82c24d0cc40690248c8fd1f,2024-06-11T04:15:12.953000
|
||||
CVE-2024-29857,0,0,9325f9fdc1f4e8265930eb53922aae24948d06e15ce403473a616a945c01d1ad,2024-05-14T16:13:02.773000
|
||||
CVE-2024-29858,0,0,ec21ad079a83cd076ada45f6eaa6cdca3318bb07ab260d892702dff1f9c09fde,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29859,0,0,1a3bc8759fdc8c10e013f96dddd14f2ff64d6c749aade8e9054f9e130df1726e,2024-03-21T12:58:51.093000
|
||||
@ -249092,6 +249094,10 @@ CVE-2024-31394,0,0,37a6c6ef2bd7d41356078f2b3597ee7803c3d40e7ebe2f84759f8ace62500
|
||||
CVE-2024-31395,0,0,b30f8ee229d1f4f2f6537c380ff54efa3e461a52badeb419e6445201c1a3b054,2024-05-22T12:46:53.887000
|
||||
CVE-2024-31396,0,0,b9f3c7c1150f9fb33024855b15874b092964398220773ed5b63437613ca6402c,2024-05-22T12:46:53.887000
|
||||
CVE-2024-3140,0,0,8b1da86666a037f64c40af1ea9ecd283309aabcaa13d249aa0e2a07593cba475,2024-05-17T02:39:44.507000
|
||||
CVE-2024-31400,1,1,571e90c89c324436c61bfdc535dd35c740568bde75455a6e686590a23b323549,2024-06-11T05:15:53.130000
|
||||
CVE-2024-31401,1,1,3439f58a4c3513eb4eeaf76a66cc8317220b63b0282fd7e7c3c063bc877be93f,2024-06-11T05:15:53.320000
|
||||
CVE-2024-31403,1,1,92c5bd46e4ffc852724f2939861650a337e969f86fd5d8df93cf756dd6500f2f,2024-06-11T05:15:53.397000
|
||||
CVE-2024-31404,1,1,146d7af636a9d18ee51e0529992d414c931054e16425a0f9134f7d7bbef93cce,2024-06-11T05:15:53.463000
|
||||
CVE-2024-31406,0,0,21585692d302884cf3150faa716f097a2673ce3764bdf3b78bdfd36f438a0484,2024-04-24T13:39:42.883000
|
||||
CVE-2024-31409,0,0,2c3474e7adf2dfd4ffe107e0f21a962b12ec9583a2a32f1b573e427bba6ce25c,2024-05-16T13:03:05.353000
|
||||
CVE-2024-3141,0,0,dfabbf3d0507d341626b2bd4d6e1dada0feb9b8a54e2d19fc7727779054508ab,2024-05-17T02:39:44.593000
|
||||
@ -250090,7 +250096,7 @@ CVE-2024-32998,0,0,ff16e761f78627e7a77ad8c8b5be313dc4ef2271e0ac3f8e475011b7ea7da
|
||||
CVE-2024-32999,0,0,abf8b25720fef12ee34ea586757cea20f2b44caebf9814e3eef90c002656e80c,2024-05-14T16:12:23.490000
|
||||
CVE-2024-3300,0,0,1a6109c8bd1508593cc8e2af285bc52264cb760861dae976ffae5c6edde38173,2024-05-30T18:18:58.870000
|
||||
CVE-2024-33000,0,0,f7c3878da3443e0af1f9be9089c259d82c336c00736d57f8315ffc60cf2a4cb2,2024-05-14T19:17:55.627000
|
||||
CVE-2024-33001,1,1,566514e94e73aef66822df42fad78ceb46a91882de33de071fddd64b858fb0f0,2024-06-11T03:15:10.393000
|
||||
CVE-2024-33001,0,0,566514e94e73aef66822df42fad78ceb46a91882de33de071fddd64b858fb0f0,2024-06-11T03:15:10.393000
|
||||
CVE-2024-33002,0,0,0a262bd708eaa5ab273c1c7f9a9a8a5a7eb11d008d67ffa1b16928e33aeb1977,2024-05-14T19:17:55.627000
|
||||
CVE-2024-33004,0,0,e215b1e86cf9a7a74a4edd2089d53fd92990757783506e6df8b869a1dbdd318e,2024-05-14T19:17:55.627000
|
||||
CVE-2024-33006,0,0,3de8db02467d1c66da918aa215665a9f6424098c0742ce05aa96a3aaae6ee0bc,2024-05-14T19:17:55.627000
|
||||
@ -250917,14 +250923,14 @@ CVE-2024-3463,0,0,ec14f43c3b7b14f535006ee59b80bf351769520d95be8808071caf75bd2749
|
||||
CVE-2024-3464,0,0,e1a6a35891c3c38cf23929aa88b7dd55b7b7561b2b012478c752dccfb0271743,2024-05-17T02:39:57.540000
|
||||
CVE-2024-3465,0,0,cc7142bc1559aee30fd4240971422ac4fbc49f323b8e88820a6b582cede6d695,2024-05-17T02:39:57.623000
|
||||
CVE-2024-3466,0,0,f437d504c2a4423db5fc4e7046f91c0c20332b67987c55770e18cacdf9497a6d,2024-05-17T02:39:57.717000
|
||||
CVE-2024-34683,1,1,8942c27c1f619c896dcd2ce25c7b143ba9ff483e9c922bb5b661829a4913ce4c,2024-06-11T03:15:10.623000
|
||||
CVE-2024-34684,1,1,00c5734e6f4c49d820db9f9a4dbc3c4b2d3d44f1503eb8be359a4a4b652a10fd,2024-06-11T03:15:10.863000
|
||||
CVE-2024-34686,1,1,ea6073452b068a9fd5cc317d18e558d5b4c244a642cb718ee3671a76902f0596,2024-06-11T03:15:11.080000
|
||||
CVE-2024-34683,0,0,8942c27c1f619c896dcd2ce25c7b143ba9ff483e9c922bb5b661829a4913ce4c,2024-06-11T03:15:10.623000
|
||||
CVE-2024-34684,0,0,00c5734e6f4c49d820db9f9a4dbc3c4b2d3d44f1503eb8be359a4a4b652a10fd,2024-06-11T03:15:10.863000
|
||||
CVE-2024-34686,0,0,ea6073452b068a9fd5cc317d18e558d5b4c244a642cb718ee3671a76902f0596,2024-06-11T03:15:11.080000
|
||||
CVE-2024-34687,0,0,4ff76c42affc0861ee718b9e208e6eefdbf0a3ab639bfa3166f3943bc94075ba,2024-05-14T19:17:55.627000
|
||||
CVE-2024-34688,1,1,33420119945ac2bb2d071f0655cf31881653a333a4317bc150be777f40f897ec,2024-06-11T03:15:11.310000
|
||||
CVE-2024-34688,0,0,33420119945ac2bb2d071f0655cf31881653a333a4317bc150be777f40f897ec,2024-06-11T03:15:11.310000
|
||||
CVE-2024-3469,0,0,d1288c39f8f011625990493f472d2caae53932004068c7cd0aeac85640cf553f,2024-06-06T14:17:35.017000
|
||||
CVE-2024-34690,1,1,61534bae217b0f4485750583339ff17f4ea58689e5d4e94da70264fc11380bf3,2024-06-11T03:15:11.547000
|
||||
CVE-2024-34691,1,1,2f3b5879819ed6c25796b50ebab3a263f2bb263bd5aa92d2ab378a1d033f2730,2024-06-11T03:15:11.780000
|
||||
CVE-2024-34690,0,0,61534bae217b0f4485750583339ff17f4ea58689e5d4e94da70264fc11380bf3,2024-06-11T03:15:11.547000
|
||||
CVE-2024-34691,0,0,2f3b5879819ed6c25796b50ebab3a263f2bb263bd5aa92d2ab378a1d033f2730,2024-06-11T03:15:11.780000
|
||||
CVE-2024-34695,0,0,d5ed5d99c8f0d08b73ea3cb249327295e787f14594542dd2f27279ab9312830c,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34697,0,0,95295a45851b4a50f600527e364638272a5d24a08a1ec02edb19abea712755b2,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34698,0,0,10e59d69dc4df1155204551f8483405755bab4be109bdea52b3a75e369d53b1b,2024-05-14T16:12:23.490000
|
||||
@ -251183,6 +251189,7 @@ CVE-2024-35312,0,0,ac028a927255a2b78c6eca92fb1900973cce08720f7ff1925122b902d9271
|
||||
CVE-2024-35313,0,0,7f5c01341081d45403a16289434e7c2c104fb92ba31fa54006c8bb4958ba7476,2024-05-20T13:00:34.807000
|
||||
CVE-2024-3532,0,0,d2f2a0ef1925b7bbaad85e2d8821e2e8cf660ac377bc2b08bf060255298cce7f,2024-05-17T02:39:59.520000
|
||||
CVE-2024-35324,0,0,6c6120da9be79d2547feeba4f88f5129640a634d2a0161e8fcb0eb70edd0a1be,2024-05-28T17:11:47.007000
|
||||
CVE-2024-35329,1,1,34c2efa0e920c13c8bbb180c32f1cef8090786d304f9cb08fa9a80f86965525c,2024-06-11T05:15:53.533000
|
||||
CVE-2024-3533,0,0,b5d4c48184abe8eef9a34f03991499e6f587b80436d4a5162dc6d5ad2628b6b4,2024-05-17T02:39:59.617000
|
||||
CVE-2024-35333,0,0,75e5bdf5daedfa8238a75e474dbd41f26ca9e370107bedc4b8e20368f5f51602,2024-05-29T19:50:25.303000
|
||||
CVE-2024-35339,0,0,c68e6071ca56f8afde8c58b42bacce710c6733d65ac37ea3d5772bdfbe3ffb9c,2024-05-24T18:09:20.027000
|
||||
@ -251762,6 +251769,7 @@ CVE-2024-3631,0,0,52e896a80c9b063fda6224c04771bbd75f72f78e3d3636ccff4bb724fd1661
|
||||
CVE-2024-3634,0,0,940ae4dd6e92f9452379e49ccdcd29aa6fe6e9bda25faf9f7045c78090371ae8,2024-05-15T16:40:19.330000
|
||||
CVE-2024-36358,0,0,7aa6480be70bf3c4a7c068512c9f0ea223a8906c53296c8c4390c69803847276,2024-06-10T22:15:11.230000
|
||||
CVE-2024-36359,0,0,4d0813d5f921dab7e2125921081b8b41da61ecb82e7a896cec4f0c4bd3d6b959,2024-06-10T22:15:11.413000
|
||||
CVE-2024-36360,1,1,846684a4c73f3677cbd79edfdcf0c654a3e0b678f7819c6061f42f0db1d654ff,2024-06-11T05:15:53.610000
|
||||
CVE-2024-36361,0,0,e6bb6c383c1666ed2ebd76c2860daf874be766774cb8ee3c270f4225933d1164,2024-06-06T16:15:12.457000
|
||||
CVE-2024-36362,0,0,8fe53587d01d75cf05d382c4cdc9dd5acba96213b931891c8617ccaeb71fb210,2024-05-31T14:15:09.370000
|
||||
CVE-2024-36363,0,0,5dd5d563c190558c74ba8e221bb4206b3001359840c2c456abec432adc87e684,2024-05-31T14:15:09.563000
|
||||
@ -252037,7 +252045,7 @@ CVE-2024-37065,0,0,77b183f2030b7bd581e452e09e55b74dee78fc06c1bd0201bb553e7d45698
|
||||
CVE-2024-3707,0,0,cb892298714e8d1628bf09ece0bc00ef0a1a1429034ce83bb3286f4d822c160d,2024-04-15T13:15:51.577000
|
||||
CVE-2024-3708,0,0,09132fb1644ebf0c808002aa8ac15b19f13ae71d0beb378f7a9664a5ae685f9a,2024-05-24T01:15:30.977000
|
||||
CVE-2024-3711,0,0,00ee502ae0ae8bdc802cd38eb1ec1e1356c10e1c18d766a4effd20297a066f55,2024-05-24T01:15:30.977000
|
||||
CVE-2024-37130,1,1,4730332ff038a602c3edf0a47e54486b493ca9c344cd49779e76f787151f6bad,2024-06-11T02:15:08.943000
|
||||
CVE-2024-37130,0,0,4730332ff038a602c3edf0a47e54486b493ca9c344cd49779e76f787151f6bad,2024-06-11T02:15:08.943000
|
||||
CVE-2024-3714,0,0,29d3de80cc1f6e0ff07b09e17d8d58f6e17e5f0164ed94da7b2235ed17131c18,2024-05-20T13:00:34.807000
|
||||
CVE-2024-3715,0,0,902861be5261e2c029ed83a5c6920fde180817c53e05bb93208dc31c820658c5,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37150,0,0,97cf533630a2e81b430f11fe12ccc7be397791e2299035e9f7d7a243e494791c,2024-06-07T14:56:05.647000
|
||||
@ -252053,9 +252061,9 @@ CVE-2024-37166,0,0,1d4e507d0bfe71bf846c708709fca16659354baf40fea347a3a456fde8974
|
||||
CVE-2024-37168,0,0,a19a53fdf016f6cd29feb9ba89034763a39d78b3a2874c9e8c67df9370b8afd0,2024-06-10T22:15:12.433000
|
||||
CVE-2024-37169,0,0,35c40eea8be191f1b9c0de3eb03ecf7298eb0fc0631a76e8fb04816a03c10d31,2024-06-10T22:15:12.663000
|
||||
CVE-2024-3717,0,0,f925293668cd733410cea58d8de3d8ac1f08ce4fec8b5812651df64ea2fd428a,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37176,1,1,d5d1237b8472b74a991951382a802d0a694ec0cf076aae952c75091cebf3ba63,2024-06-11T03:15:12.020000
|
||||
CVE-2024-37177,1,1,d7353354ef8b99e345b99fe0600a226962631dfbf5e7a97fb626f4e63a307a92,2024-06-11T02:15:09.243000
|
||||
CVE-2024-37178,1,1,cc27ca9a2ea1197ae67aee109d655b8802e2d003109585743c9787e9aa4daffa,2024-06-11T02:15:09.487000
|
||||
CVE-2024-37176,0,0,d5d1237b8472b74a991951382a802d0a694ec0cf076aae952c75091cebf3ba63,2024-06-11T03:15:12.020000
|
||||
CVE-2024-37177,0,0,d7353354ef8b99e345b99fe0600a226962631dfbf5e7a97fb626f4e63a307a92,2024-06-11T02:15:09.243000
|
||||
CVE-2024-37178,0,0,cc27ca9a2ea1197ae67aee109d655b8802e2d003109585743c9787e9aa4daffa,2024-06-11T02:15:09.487000
|
||||
CVE-2024-3718,0,0,a740a1633905d284711162c33f52150d8f35c5a9e41e141a82d07851d64c55d1,2024-05-24T13:03:05.093000
|
||||
CVE-2024-3719,0,0,d2320674d04cefde56a0b36b463f74328d6f18494803030bdfe9b0b1b4374afd,2024-06-04T19:20:23.553000
|
||||
CVE-2024-3720,0,0,f4e69514093cc630aeda39d0a41fe705e0d9916a1077cef429b7dcf05a404308,2024-06-04T19:20:23.660000
|
||||
@ -252064,7 +252072,7 @@ CVE-2024-3722,0,0,7c1b4fae7e86bf4c1bc76a0d39819ffc592a7b598c7675ac0628daa278671c
|
||||
CVE-2024-3724,0,0,a2f08bb0a2e36a5c374b862fb3e4beff315b3d6672953c5eeabe10290b435e2c,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3725,0,0,dd194c190207038aca40dcc17eaac7bd7c6f9f34e04d00c016e0de6cd9837da0,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3726,0,0,5d13f10d5b73efb7ab7c6448eee56ee5b7f1a739226807fb6eef2a4ab850d2f7,2024-05-30T13:15:41.297000
|
||||
CVE-2024-3727,0,0,1afd415f1f5f3d35d1b26bd4ab4ef1adc13dbd4e7fe0f6be2316a2ec720c2e85,2024-06-10T18:15:36.160000
|
||||
CVE-2024-3727,0,1,6edac4103d7932b3951e03146eae4bf096e2d18a2b4f814f8f7920458398b953,2024-06-11T04:15:13.247000
|
||||
CVE-2024-37273,0,0,ef0a090766ee920b155f0d890f38d30f2afeeaa3951e1d885273f3523f46b520,2024-06-05T12:53:50.240000
|
||||
CVE-2024-3728,0,0,43844043222c66b8f700e8c46db9fa69a4e80d2868161363811005c77777bc69,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37289,0,0,093d810733bfa72eb95b37d788176272f6cb5d590ae184e99ad505e428213fbf,2024-06-10T22:15:12.893000
|
||||
@ -252574,7 +252582,7 @@ CVE-2024-4409,0,0,7dd623ac9467a0484d209647a6b8fb064b225334d3e5c23c1ee095e63ba208
|
||||
CVE-2024-4411,0,0,c7fa179581fd2f838a938c9431cc636dd9fa2af2bec9103de58ade770f105c65,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4413,0,0,cca9f27cd31d87a0c2b601e673b97ef7118798e076ad06575846010a4eaaeef8,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4417,0,0,56d1a7db112c78a6a4f4098b6b92b23b4d7cd4e314ee26ae65a28dbbe4d8642e,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4418,0,0,b75df24fbcd879bc4a65285c93bd33dc1c31ae502a7b108d2ac08220fcbe0dd6,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4418,0,1,4296a95dce6482052757c534b4848186d866430fd4459b7c0727dc6f4d0bbff6,2024-06-11T04:15:13.947000
|
||||
CVE-2024-4419,0,0,e2d8f545d71f8d9558ae0290474349668dafdd9730a778cdbbf911c6b4cf5157,2024-05-29T13:02:09.280000
|
||||
CVE-2024-4420,0,0,9b75921df8e16106b48e4c0d4f1fc07ba699b6ee751657d557cf95a2815ddc11,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4422,0,0,033ffa151e9f7c26ec50c74ca266b6c48fb375132593b1334657790301503e16,2024-05-30T13:15:41.297000
|
||||
@ -253029,7 +253037,7 @@ CVE-2024-5086,0,0,931e0bac2fddd1d3017185ad2896bc6a71c950877469373fd8fb74c0da6b67
|
||||
CVE-2024-5087,0,0,631056bc77ed0f782411ed02a26e215c20067f7c6fc13aceb93f243c71303abd,2024-06-10T02:52:08.267000
|
||||
CVE-2024-5088,0,0,670ed03c49211ecb2fb7d707640c3762718821887df98f6c48b414573abc37eb,2024-05-20T13:00:34.807000
|
||||
CVE-2024-5089,0,0,1b747912b9ca78f56cee36088b5d02d248b45a5a454d24110a362b62386eddf1,2024-06-06T09:15:14.897000
|
||||
CVE-2024-5090,1,1,9d5b2f16c0ca2ab602474830c2b31e2cc934f2932a1becc4275b0851b2bbffac,2024-06-11T03:15:12.253000
|
||||
CVE-2024-5090,0,0,9d5b2f16c0ca2ab602474830c2b31e2cc934f2932a1becc4275b0851b2bbffac,2024-06-11T03:15:12.253000
|
||||
CVE-2024-5091,0,0,5d1bf35f507407f45a5d533e81444a5d7c8eb4174ca3b49ac0f53b0fcf93ec4a,2024-06-10T02:52:08.267000
|
||||
CVE-2024-5092,0,0,42d960073f235db3a1d896466f3bea026be5b117dc5effbb8a82da60874fb373,2024-05-22T12:46:53.887000
|
||||
CVE-2024-5093,0,0,d2d6eaa6c80785824276c0a81dd265ac7bb3ca056730de7cd7f1d7d5170a9109,2024-06-04T19:20:58.343000
|
||||
@ -253315,6 +253323,7 @@ CVE-2024-5523,0,0,047cc71fb1f4320881d428c79c80679ee2da549498da604407797261c69d06
|
||||
CVE-2024-5524,0,0,e7e0fe13822be5d672aca31e1ee31e0f364bc62cac379db56dfa86e4e6649c5d,2024-05-31T13:01:46.727000
|
||||
CVE-2024-5525,0,0,27d51e0f90117d5f6e29d565f6efd293c83de249201cb9426e9c70697dbb918d,2024-05-31T13:01:46.727000
|
||||
CVE-2024-5526,0,0,ff5b1387d351b0ba676942fad975bab52e39b4bce1932efe40f06f69ab4492f7,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5530,1,1,c88c71d0fc4a469ec001167841485a2cedfa66755e447a724b42beedce8d6868,2024-06-11T05:15:53.680000
|
||||
CVE-2024-5536,0,0,68edb52432771856b464d791aa7fccb8518cf1ab9cd2d253ae0bbced65da7ce5,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5537,0,0,071475eb8c0f92cc8ea9522d658283ad0e8213ba6740ff46ee05e5b24c18c3d8,2024-05-30T17:15:34.583000
|
||||
CVE-2024-5538,0,0,183cea799fa9410e329e72f326a10b8369aedcea9a5b7583a44bf33ecc305070,2024-05-31T11:15:09.923000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user