mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-06-27T06:00:18.677764+00:00
This commit is contained in:
parent
c72272bfb1
commit
d544c52318
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1394",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-03-21T13:00:08.037",
|
||||
"lastModified": "2024-06-26T11:15:51.163",
|
||||
"lastModified": "2024-06-27T05:15:50.317",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -143,6 +143,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3352",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:4146",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-1394",
|
||||
"source": "secalert@redhat.com"
|
||||
|
51
CVE-2024/CVE-2024-45xx/CVE-2024-4569.json
Normal file
51
CVE-2024/CVE-2024-45xx/CVE-2024-4569.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2024-4569",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-27T04:15:11.537",
|
||||
"lastModified": "2024-06-27T04:15:11.537",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Elementor Addon Elements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018url\u2019 parameter in versions up to, and including, 1.13.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/trunk/modules/modal-popup/widgets/modal-popup.php#L1060",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3107074/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/63ef7383-d684-473b-aa0f-45027ef245f6?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
51
CVE-2024/CVE-2024-45xx/CVE-2024-4570.json
Normal file
51
CVE-2024/CVE-2024-45xx/CVE-2024-4570.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2024-4570",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-27T04:15:12.553",
|
||||
"lastModified": "2024-06-27T04:15:12.553",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Elementor Addon Elements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018url\u2019 parameter in versions up to, and including, 1.13.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/tags/1.13.4/classes/helper.php#L232",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3107074/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ab5f43c0-83d3-4d09-becd-a3552bebd609?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-5154",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-06-12T09:15:19.973",
|
||||
"lastModified": "2024-06-18T10:15:10.640",
|
||||
"lastModified": "2024-06-27T05:15:51.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3700",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:4008",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-5154",
|
||||
"source": "secalert@redhat.com"
|
||||
|
51
CVE-2024/CVE-2024-62xx/CVE-2024-6283.json
Normal file
51
CVE-2024/CVE-2024-62xx/CVE-2024-6283.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2024-6283",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-27T05:15:51.700",
|
||||
"lastModified": "2024-06-27T05:15:51.700",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The DethemeKit For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the URL parameter of the De Gallery widget in all versions up to and including 2.1.5 due to insufficient input sanitization and output escaping on user-supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user clicks on the injected link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/dethemekit-for-elementor/trunk/widgets/dethemekit-grid.php#L2565",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/dethemekit-for-elementor/trunk/widgets/dethemekit-grid.php#L2900",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9b2083f9-79d0-43f6-b7ae-a5817dc561b0?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
27
README.md
27
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-27T04:00:18.525784+00:00
|
||||
2024-06-27T06:00:18.677764+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-27T03:15:51.293000+00:00
|
||||
2024-06-27T05:15:51.700000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,31 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
255291
|
||||
255294
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2024-5289](CVE-2024/CVE-2024-52xx/CVE-2024-5289.json) (`2024-06-27T03:15:50.593`)
|
||||
- [CVE-2024-6054](CVE-2024/CVE-2024-60xx/CVE-2024-6054.json) (`2024-06-27T03:15:50.890`)
|
||||
- [CVE-2024-4569](CVE-2024/CVE-2024-45xx/CVE-2024-4569.json) (`2024-06-27T04:15:11.537`)
|
||||
- [CVE-2024-4570](CVE-2024/CVE-2024-45xx/CVE-2024-4570.json) (`2024-06-27T04:15:12.553`)
|
||||
- [CVE-2024-6283](CVE-2024/CVE-2024-62xx/CVE-2024-6283.json) (`2024-06-27T05:15:51.700`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `10`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
- [CVE-2024-2698](CVE-2024/CVE-2024-26xx/CVE-2024-2698.json) (`2024-06-27T03:15:49.860`)
|
||||
- [CVE-2024-3183](CVE-2024/CVE-2024-31xx/CVE-2024-3183.json) (`2024-06-27T03:15:50.447`)
|
||||
- [CVE-2024-38273](CVE-2024/CVE-2024-382xx/CVE-2024-38273.json) (`2024-06-27T03:15:50.130`)
|
||||
- [CVE-2024-38274](CVE-2024/CVE-2024-382xx/CVE-2024-38274.json) (`2024-06-27T03:15:50.233`)
|
||||
- [CVE-2024-38276](CVE-2024/CVE-2024-382xx/CVE-2024-38276.json) (`2024-06-27T03:15:50.300`)
|
||||
- [CVE-2024-38277](CVE-2024/CVE-2024-382xx/CVE-2024-38277.json) (`2024-06-27T03:15:50.370`)
|
||||
- [CVE-2024-6290](CVE-2024/CVE-2024-62xx/CVE-2024-6290.json) (`2024-06-27T03:15:51.093`)
|
||||
- [CVE-2024-6291](CVE-2024/CVE-2024-62xx/CVE-2024-6291.json) (`2024-06-27T03:15:51.167`)
|
||||
- [CVE-2024-6292](CVE-2024/CVE-2024-62xx/CVE-2024-6292.json) (`2024-06-27T03:15:51.230`)
|
||||
- [CVE-2024-6293](CVE-2024/CVE-2024-62xx/CVE-2024-6293.json) (`2024-06-27T03:15:51.293`)
|
||||
- [CVE-2024-1394](CVE-2024/CVE-2024-13xx/CVE-2024-1394.json) (`2024-06-27T05:15:50.317`)
|
||||
- [CVE-2024-5154](CVE-2024/CVE-2024-51xx/CVE-2024-5154.json) (`2024-06-27T05:15:51.567`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
31
_state.csv
31
_state.csv
@ -241798,7 +241798,7 @@ CVE-2024-1390,0,0,71eb0c49e1915160a890c9df4d2040fa529dd6e699ca4bdcf3f6829a9c0e60
|
||||
CVE-2024-1391,0,0,95159e2513e9127a66f6050cbc2679326245e87281e8aee9653919649cc97f74,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1392,0,0,0948736f211221c32ddb432668205bccae67223b950d877ef11c76bff68a1c8f,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1393,0,0,d7662d0cf4655f5dc37cac1727274e85c0d695350e85be99fa06d400366cbddc,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1394,0,0,de36a3874a91298af40c37a23c5b85077a771f527ed1bc543f700ac43aeb4260,2024-06-26T11:15:51.163000
|
||||
CVE-2024-1394,0,1,165f33562f18e63e8a619116a51b597c395907033340f10ab7f53d479f543479,2024-06-27T05:15:50.317000
|
||||
CVE-2024-1395,0,0,bc906c24f3b97a1f76fb28d9eb27a1438a7ca78483d0c0a7452e9b7efa2da958,2024-05-03T14:17:53.690000
|
||||
CVE-2024-1396,0,0,c2c7f8124754e0c20b02f3a3637cca1d95a3c2b253208efd7a2814f2d0550bd5,2024-05-02T18:00:37.360000
|
||||
CVE-2024-1397,0,0,e6d8c9c2beca75d3fdc5f918cb423cf21913a9c807f46126d5b49c29c7bd60f0,2024-03-13T12:33:51.697000
|
||||
@ -246777,7 +246777,7 @@ CVE-2024-26976,0,0,3564f0b86102838839a737d1f0344714a7a8900de576e3403525b79ca9d97
|
||||
CVE-2024-26977,0,0,7f4303ba7265fe68f47a9d9801d011f3d78c2b9c80b2b80c869116171921f0d6,2024-05-01T13:02:20.750000
|
||||
CVE-2024-26978,0,0,483466422e03f75e7df98f91f4f0a342a075a28cd1a2811bba9ac8a642b730a7,2024-06-25T22:15:27.490000
|
||||
CVE-2024-26979,0,0,54694270d008c20297a5341208d33ae44a9e8eec55dc5d4e396d03aaba5d47ac,2024-06-12T16:15:11.147000
|
||||
CVE-2024-2698,0,1,758579b568a4887d746dcbadeb9e5d5dbe9c948ed21f398b8dd22a95a4fd3e38,2024-06-27T03:15:49.860000
|
||||
CVE-2024-2698,0,0,758579b568a4887d746dcbadeb9e5d5dbe9c948ed21f398b8dd22a95a4fd3e38,2024-06-27T03:15:49.860000
|
||||
CVE-2024-26980,0,0,ec5b812a8dbedf3c6e27cceb9a929403fd6e62291ad747f9f2a67748a6189d95,2024-05-17T11:15:08.357000
|
||||
CVE-2024-26981,0,0,fd2370eb398b9951be846f5bd4d33db1940adc0feb1e93f3595af8bb4f6f645e,2024-06-25T23:15:28.517000
|
||||
CVE-2024-26982,0,0,71a4b88e652ac72451ef2b1c06677d2a8721eacfd6194887bc3cbe1ed1aa0fda,2024-05-03T06:15:10.953000
|
||||
@ -249913,7 +249913,7 @@ CVE-2024-31821,0,0,c569fd754a13100f99a004a097455b073140e65e59c749e53df718879b6f9
|
||||
CVE-2024-31822,0,0,39f03d3ff200c72017a27779b734a3b0a55aa46362d194ac94877ae191a015e0,2024-04-30T13:11:16.690000
|
||||
CVE-2024-31823,0,0,c330dcd036dc01e5b50868bf19e8e1c60dcc1aae213890cc9951428752d20d51,2024-04-30T13:11:16.690000
|
||||
CVE-2024-31828,0,0,858561f1b03d252c7f0a8bed644602b810853f61f3442c470c2afa0cb506bbc9,2024-04-29T12:42:03.667000
|
||||
CVE-2024-3183,0,1,f0a6251088cfd845783fa83089c4f66e5c1b4119e3b7eebeacea72fa8d6daced,2024-06-27T03:15:50.447000
|
||||
CVE-2024-3183,0,0,f0a6251088cfd845783fa83089c4f66e5c1b4119e3b7eebeacea72fa8d6daced,2024-06-27T03:15:50.447000
|
||||
CVE-2024-31837,0,0,9051d48b22c0cd39a45116204b9c51e9a92d936bee66589e1aa86bb8c892b824,2024-04-30T13:11:16.690000
|
||||
CVE-2024-31839,0,0,25a7daa33bac03a27a09e1621adb92d9361c02bf4ef6c11d27831735c896c138,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31840,0,0,c5fc04e6fe2d5125db2057551f9a02458bb6ea8f5da45a1b3c46ba278c1be8c1,2024-05-21T16:53:56.550000
|
||||
@ -253401,11 +253401,11 @@ CVE-2024-3824,0,0,8545575d3e734e1433cd4d7c91c77cd29907e6f5ee87d4739239efdf13c20f
|
||||
CVE-2024-3825,0,0,f398f78dcc905612b8b1fff020bcc62d405b80ffdf3a9053d9f90f163c40baa7,2024-04-17T15:31:50.160000
|
||||
CVE-2024-38271,0,0,561e887a3abd1d6a0f8f42436d2bac2bdd24c0bd990f8adeea2333457a288cbf,2024-06-26T16:15:11.560000
|
||||
CVE-2024-38272,0,0,b79630b366ceb2532114bf5d54bebf0a6a561c63d2c22e0232bf10b528609045,2024-06-26T16:15:11.733000
|
||||
CVE-2024-38273,0,1,aa930ae8c440a2647a011bf0695d4747b271b56264e48ff4863a5149d1b66b6e,2024-06-27T03:15:50.130000
|
||||
CVE-2024-38274,0,1,695f4776bc9da0b749f4bd4e8e8830e4a621add514e667c392deb2445ea25c90,2024-06-27T03:15:50.233000
|
||||
CVE-2024-38273,0,0,aa930ae8c440a2647a011bf0695d4747b271b56264e48ff4863a5149d1b66b6e,2024-06-27T03:15:50.130000
|
||||
CVE-2024-38274,0,0,695f4776bc9da0b749f4bd4e8e8830e4a621add514e667c392deb2445ea25c90,2024-06-27T03:15:50.233000
|
||||
CVE-2024-38275,0,0,474fed95f690c9f90f55ff4b7ea783e35914740c4a353e11aabbb10d602de3d4,2024-06-20T12:44:01.637000
|
||||
CVE-2024-38276,0,1,8f400bdb3990cf115c7036c2753d2a6feedd3604e2b534641c0664514cce6946,2024-06-27T03:15:50.300000
|
||||
CVE-2024-38277,0,1,9605cead31ae22d303e958d368dca6ec79ee41629f04ca89a87e1b14962ed517,2024-06-27T03:15:50.370000
|
||||
CVE-2024-38276,0,0,8f400bdb3990cf115c7036c2753d2a6feedd3604e2b534641c0664514cce6946,2024-06-27T03:15:50.300000
|
||||
CVE-2024-38277,0,0,9605cead31ae22d303e958d368dca6ec79ee41629f04ca89a87e1b14962ed517,2024-06-27T03:15:50.370000
|
||||
CVE-2024-38279,0,0,8e0d752edd2b7f1cef81ab1eeb42304ca3458652fd02e5f15b8a704f935f8c5e,2024-06-13T18:35:19.777000
|
||||
CVE-2024-3828,0,0,57a9b409ca1cac39bc20af9eb7a4e7dcc3bae1882e9b3a8ca25cdf22dad097ef,2024-05-14T16:11:39.510000
|
||||
CVE-2024-38280,0,0,bcbf7defab925fd2529b59f3634dae6b192845ba506dcf676efe40b15061269c,2024-06-13T18:35:19.777000
|
||||
@ -254220,6 +254220,8 @@ CVE-2024-4565,0,0,67d994d050778f99ebea00dffeedd75aa1729789c9eb9581753d556845ec5e
|
||||
CVE-2024-4566,0,0,5bf64390fca62ba0e88600d1f0954e23dea48d7610695fd2ef891697361d3217,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4567,0,0,bff521ec958712c348010a89da0e0aec519b6a717613a798e9a8fee426de5e74,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4568,0,0,79c6e65478e2e86d702896e792fead76bbebdb118f8c0f66e6390a241a22321a,2024-05-07T13:39:32.710000
|
||||
CVE-2024-4569,1,1,4d374bf4aa0a998cd8805faa062f30a5a01f5894ac3a808b5fdab21e616d67d4,2024-06-27T04:15:11.537000
|
||||
CVE-2024-4570,1,1,53d92a300b6097fbe44eced6ba98930a3d6ad73ffe866e69ac621c24e3b085fc,2024-06-27T04:15:12.553000
|
||||
CVE-2024-4571,0,0,b379f15291a8a65b330c223bc6a31fd0a21b183a906c0a4077ca3cf5d38b8ad0,2024-05-14T15:44:05.750000
|
||||
CVE-2024-4572,0,0,f5ca5c1acec751c453949e3111f6be45773ff402d3c1d2b8e88127a059aa7b1b,2024-05-14T15:44:06.153000
|
||||
CVE-2024-4574,0,0,313ec0d117ac92e67c29da349740abe9395db1d3208f8156cb88d417271721b1,2024-05-14T16:11:39.510000
|
||||
@ -254676,7 +254678,7 @@ CVE-2024-5149,0,0,e167f321a43176bbe51b79fcd0ea912cf6c260f7c91862b43f4c0c9d62cbbb
|
||||
CVE-2024-5150,0,0,b6666c6d6ac9830dd3015f5fc02fd79f0a3b63d41ee2e14f8cd76da933186cb1,2024-05-29T13:02:09.280000
|
||||
CVE-2024-5152,0,0,897a950e1a56cf66b3762a0b7d02348f108b131c1556072d1a2c46cab20012e4,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5153,0,0,828bf0d922f71aaeb9a620d2a28fca02e54e4a39590cf3792a194a4a5970d881,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5154,0,0,82d1e95029eac2df4860f47fd1c212761a30dff3def51a0032e4827082a89098,2024-06-18T10:15:10.640000
|
||||
CVE-2024-5154,0,1,0900f3ffde48a737774e31da15c4bd85a62398198c843c819abf1f8f6c6973c9,2024-06-27T05:15:51.567000
|
||||
CVE-2024-5155,0,0,2a20a869c58a8b80fd2bd862f76df12b43c40fbeec518ecb9ca464561a78cd98,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5156,0,0,04d3b26745087cecbd2208e3ae2166c72777f223725a2a397110c6609350eb95,2024-06-20T16:07:50.417000
|
||||
CVE-2024-5157,0,0,968c06835e3febdba747d4dd49e60507daf1a01e5377b117ee6e566931506abf,2024-06-10T18:15:37.893000
|
||||
@ -254776,7 +254778,7 @@ CVE-2024-5276,0,0,d26b15babe17aac13cc613675e4c4ad8d9ecb0a2798444e0b74aa892858078
|
||||
CVE-2024-5277,0,0,08c2f56d5f9c6263336a67bd47c4fa52288bb09bcb2d8aeff245d6d39899edcf,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5278,0,0,ba4b6329b00a48ecb03cef9d2f0cd09adc7cfa79e9cd9e8eb891a1136335fb69,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5279,0,0,1f630d4d53c39cf2174e2a1edce8e1a5ead56a314739580d23644f8e4fedef07,2024-06-04T19:21:04.240000
|
||||
CVE-2024-5289,1,1,7df138904761c6b36c57517d0d3959585e48a93752cee47ea8cb64aafd7807b4,2024-06-27T03:15:50.593000
|
||||
CVE-2024-5289,0,0,7df138904761c6b36c57517d0d3959585e48a93752cee47ea8cb64aafd7807b4,2024-06-27T03:15:50.593000
|
||||
CVE-2024-5291,0,0,e2fc6f2196c0b027b818fde218df99cf43b38b5676cf49b77deeb1aa303d7e78,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5292,0,0,07f972c0f93c6f07c6e8e023cab22706ed8252620d55ba7ae2411117029231e5,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5293,0,0,16376ebd06367710256550351fe628f35dc79a25571582fd2686e7d66472cf44,2024-05-24T01:15:30.977000
|
||||
@ -255171,7 +255173,7 @@ CVE-2024-6045,0,0,2dcda6a0cbff8cd9e195f4d3ab65f0210762794017ec56ef72ed3655d46b17
|
||||
CVE-2024-6046,0,0,91371f2b9afd0a654dc4dc6a88ac5fb04a186cb82713804dda3cac2d7733c344,2024-06-18T11:15:52.513000
|
||||
CVE-2024-6047,0,0,4cdf0f1acff12373f8f857c8d442b9de2221d44745323cc3f60bf66bccd7a239,2024-06-17T14:15:13.040000
|
||||
CVE-2024-6048,0,0,03e9485ef23720c113f11fed6c539200d9a1624e025ca24798cddf9d0c1a9e3b,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6054,1,1,99a0ac10de1313b6cf1feb6202998d8b2fe6e900cc2080d42212b58cfd297d57,2024-06-27T03:15:50.890000
|
||||
CVE-2024-6054,0,0,99a0ac10de1313b6cf1feb6202998d8b2fe6e900cc2080d42212b58cfd297d57,2024-06-27T03:15:50.890000
|
||||
CVE-2024-6055,0,0,7490ef4c1367b62a13fc44ec964fb12263f9fa479e5bd4bbc3820296c19002e0,2024-06-20T12:44:22.977000
|
||||
CVE-2024-6056,0,0,9210a6d5e69cda44c36495fe4964320c8f6a47f4e723a559827fc7a6d2ee595f,2024-06-20T12:44:22.977000
|
||||
CVE-2024-6057,0,0,3fe0cc3f033e9735165b225d202aca1a708a694e0fe3a8863e85d03de2c16d7c,2024-06-20T12:44:22.977000
|
||||
@ -255267,12 +255269,13 @@ CVE-2024-6277,0,0,82a7caef84f140d39367b293ce24c3b1ac7d5afca66e1b97bc6dda0940bca5
|
||||
CVE-2024-6278,0,0,b7497a594f7128876befcfd03ef67851e16926a50d842e021e87a9cd67006c16,2024-06-24T14:15:13.293000
|
||||
CVE-2024-6279,0,0,aff2444fd4ca8a3e713d1d2803a8314b319d4a725e3aef2a87ea3d2f62dd68bf,2024-06-26T20:15:17.003000
|
||||
CVE-2024-6280,0,0,4e5bdd720fdc6d68a51312dcfd366ac88ed5daebd5ed348aefe6d5aa74c57712,2024-06-24T12:57:36.513000
|
||||
CVE-2024-6283,1,1,e5b8d9dcf06a6207ab42c26b08314df7b71607719a3c7d1c545ae2b0026a6c6b,2024-06-27T05:15:51.700000
|
||||
CVE-2024-6285,0,0,e2996efda4e983a3551e96b4c79fe85947d0c5facb8b6e94cf5ae2183076f6f4,2024-06-26T14:24:38.113000
|
||||
CVE-2024-6287,0,0,91ea920d50ec75aef59aca2b29908a9542c1a59d5111a1068e10d538d24873e6,2024-06-26T14:36:08.507000
|
||||
CVE-2024-6290,0,1,67d71c6eecc55d47dcb9d49fef6cb3eb904eb85c23231aa8b50f7ec84f4eca31,2024-06-27T03:15:51.093000
|
||||
CVE-2024-6291,0,1,98316ec8c30ef04c26783c1255f68e3afa2f2d15a087f64e5f63af0c4c0b5b0c,2024-06-27T03:15:51.167000
|
||||
CVE-2024-6292,0,1,e1c33fd19725688298e8cda180f12fd23244dcb77aa2334c1dbb13297cecfcc5,2024-06-27T03:15:51.230000
|
||||
CVE-2024-6293,0,1,852bbc0bbb768d29d4d4dd718fa490ff1047406faeedc791fdc0eec18c787ee7,2024-06-27T03:15:51.293000
|
||||
CVE-2024-6290,0,0,67d71c6eecc55d47dcb9d49fef6cb3eb904eb85c23231aa8b50f7ec84f4eca31,2024-06-27T03:15:51.093000
|
||||
CVE-2024-6291,0,0,98316ec8c30ef04c26783c1255f68e3afa2f2d15a087f64e5f63af0c4c0b5b0c,2024-06-27T03:15:51.167000
|
||||
CVE-2024-6292,0,0,e1c33fd19725688298e8cda180f12fd23244dcb77aa2334c1dbb13297cecfcc5,2024-06-27T03:15:51.230000
|
||||
CVE-2024-6293,0,0,852bbc0bbb768d29d4d4dd718fa490ff1047406faeedc791fdc0eec18c787ee7,2024-06-27T03:15:51.293000
|
||||
CVE-2024-6294,0,0,6e157447a380471b4e672432441b0d5dbba0fc67bea6ec1145ba68325fae735e,2024-06-25T12:24:17.873000
|
||||
CVE-2024-6295,0,0,34be56c45a4536c17926fc9c9d678ef84cff2fe2a1e2b1e6898c4c1a47aa2e9c,2024-06-25T12:24:17.873000
|
||||
CVE-2024-6297,0,0,4335adc3c6f03845409551a993bf84e337f4db092e95dafe9b538168f2fdbc65,2024-06-25T12:24:17.873000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user