mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-05-22T22:00:38.025313+00:00
This commit is contained in:
parent
e9533dd639
commit
d562206766
55
CVE-2023/CVE-2023-516xx/CVE-2023-51636.json
Normal file
55
CVE-2023/CVE-2023-516xx/CVE-2023-51636.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-51636",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-05-22T20:15:08.407",
|
||||
"lastModified": "2024-05-22T20:15:08.407",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Avira Prime Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avira Prime. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Avira Spotlight Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21600."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-469/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-516xx/CVE-2023-51637.json
Normal file
55
CVE-2023/CVE-2023-516xx/CVE-2023-51637.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-51637",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-05-22T20:15:08.713",
|
||||
"lastModified": "2024-05-22T20:15:08.713",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Sante PACS Server PG Patient Query SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante PACS Server PG. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the DICOM service, which listens on TCP port 11122 by default. When parsing the NAME element of the PATIENT record, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of NETWORK SERVICE. Was ZDI-CAN-21579."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-468/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-272xx/CVE-2024-27264.json
Normal file
47
CVE-2024/CVE-2024-272xx/CVE-2024-27264.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-27264",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-05-22T20:15:09.047",
|
||||
"lastModified": "2024-05-22T20:15:09.047",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Performance Tools for i 7.2, 7.3, 7.4, and 7.5 could allow a local user to gain elevated privileges due to an unqualified library call. A malicious actor could cause user-controlled code to run with administrator privilege. IBM X-Force ID: 284563."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.4,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/284563",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7154595",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-318xx/CVE-2024-31894.json
Normal file
59
CVE-2024/CVE-2024-318xx/CVE-2024-31894.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-31894",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-05-22T20:15:09.260",
|
||||
"lastModified": "2024-05-22T20:15:09.260",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM App Connect Enterprise 12.0.1.0 through 12.0.12.1 could allow an authenticated user to obtain sensitive user information using an expired access token. IBM X-Force ID: 288175."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-324"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/288175",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7154606",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-318xx/CVE-2024-31895.json
Normal file
59
CVE-2024/CVE-2024-318xx/CVE-2024-31895.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-31895",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-05-22T20:15:09.480",
|
||||
"lastModified": "2024-05-22T20:15:09.480",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM App Connect Enterprise 12.0.1.0 through 12.0.12.1 could allow an authenticated user to obtain sensitive user information using an expired access token. IBM X-Force ID: 288176."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-324"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/288176",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7154606",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-35204",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-14T15:39:42.917",
|
||||
"lastModified": "2024-05-16T20:15:09.910",
|
||||
"lastModified": "2024-05-22T21:15:08.100",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,10 +16,6 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.veritas.com/content/support/en_US/article.100065391",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.veritas.com/support/en_US/security/VTS24-005",
|
||||
"source": "cve@mitre.org"
|
||||
|
55
CVE-2024/CVE-2024-42xx/CVE-2024-4267.json
Normal file
55
CVE-2024/CVE-2024-42xx/CVE-2024-4267.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-4267",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-05-22T20:15:09.700",
|
||||
"lastModified": "2024-05-22T20:15:09.700",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A remote code execution (RCE) vulnerability exists in the parisneo/lollms-webui, specifically within the 'open_file' module, version 9.5. The vulnerability arises due to improper neutralization of special elements used in a command within the 'open_file' function. An attacker can exploit this vulnerability by crafting a malicious file path that, when processed by the 'open_file' function, executes arbitrary system commands or reads sensitive file content. This issue is present in the code where subprocess.Popen is used unsafely to open files based on user-supplied paths without adequate validation, leading to potential command injection."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://huntr.com/bounties/5a127724-cc13-4ea6-b81f-41546a7fff81",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-44xx/CVE-2024-4453.json
Normal file
59
CVE-2024/CVE-2024-44xx/CVE-2024-4453.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-4453",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-05-22T20:15:09.923",
|
||||
"lastModified": "2024-05-22T20:15:09.923",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GStreamer EXIF Metadata Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.\n\nThe specific flaw exists within the parsing of EXIF metadata. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.\n. Was ZDI-CAN-23896."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.freedesktop.org/tpm/gstreamer/-/commit/e68eccff103ab0e91e6d77a892f57131b33902f5",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-467/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-44xx/CVE-2024-4454.json
Normal file
55
CVE-2024/CVE-2024-44xx/CVE-2024-4454.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-4454",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-05-22T20:15:10.130",
|
||||
"lastModified": "2024-05-22T20:15:10.130",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WithSecure Elements Endpoint Protection Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of WithSecure Elements Endpoint Protection. User interaction on the part of an administrator is required to exploit this vulnerability.\n\nThe specific flaw exists within the WithSecure plugin hosting service. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23035."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-491/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
53
README.md
53
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-05-22T20:00:38.352184+00:00
|
||||
2024-05-22T22:00:38.025313+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-05-22T19:15:09.453000+00:00
|
||||
2024-05-22T21:15:08.100000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,53 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
251499
|
||||
251507
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `9`
|
||||
Recently added CVEs: `8`
|
||||
|
||||
- [CVE-2024-20360](CVE-2024/CVE-2024-203xx/CVE-2024-20360.json) (`2024-05-22T18:15:09.493`)
|
||||
- [CVE-2024-21791](CVE-2024/CVE-2024-217xx/CVE-2024-21791.json) (`2024-05-22T18:15:09.740`)
|
||||
- [CVE-2024-25737](CVE-2024/CVE-2024-257xx/CVE-2024-25737.json) (`2024-05-22T19:15:08.657`)
|
||||
- [CVE-2024-25738](CVE-2024/CVE-2024-257xx/CVE-2024-25738.json) (`2024-05-22T19:15:08.807`)
|
||||
- [CVE-2024-29421](CVE-2024/CVE-2024-294xx/CVE-2024-29421.json) (`2024-05-22T18:15:09.937`)
|
||||
- [CVE-2024-31617](CVE-2024/CVE-2024-316xx/CVE-2024-31617.json) (`2024-05-22T18:15:10.040`)
|
||||
- [CVE-2024-31893](CVE-2024/CVE-2024-318xx/CVE-2024-31893.json) (`2024-05-22T19:15:08.893`)
|
||||
- [CVE-2024-31904](CVE-2024/CVE-2024-319xx/CVE-2024-31904.json) (`2024-05-22T19:15:09.153`)
|
||||
- [CVE-2024-35627](CVE-2024/CVE-2024-356xx/CVE-2024-35627.json) (`2024-05-22T19:15:09.453`)
|
||||
- [CVE-2023-51636](CVE-2023/CVE-2023-516xx/CVE-2023-51636.json) (`2024-05-22T20:15:08.407`)
|
||||
- [CVE-2023-51637](CVE-2023/CVE-2023-516xx/CVE-2023-51637.json) (`2024-05-22T20:15:08.713`)
|
||||
- [CVE-2024-27264](CVE-2024/CVE-2024-272xx/CVE-2024-27264.json) (`2024-05-22T20:15:09.047`)
|
||||
- [CVE-2024-31894](CVE-2024/CVE-2024-318xx/CVE-2024-31894.json) (`2024-05-22T20:15:09.260`)
|
||||
- [CVE-2024-31895](CVE-2024/CVE-2024-318xx/CVE-2024-31895.json) (`2024-05-22T20:15:09.480`)
|
||||
- [CVE-2024-4267](CVE-2024/CVE-2024-42xx/CVE-2024-4267.json) (`2024-05-22T20:15:09.700`)
|
||||
- [CVE-2024-4453](CVE-2024/CVE-2024-44xx/CVE-2024-4453.json) (`2024-05-22T20:15:09.923`)
|
||||
- [CVE-2024-4454](CVE-2024/CVE-2024-44xx/CVE-2024-4454.json) (`2024-05-22T20:15:10.130`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `31`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2024-20363](CVE-2024/CVE-2024-203xx/CVE-2024-20363.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-29392](CVE-2024/CVE-2024-293xx/CVE-2024-29392.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-33218](CVE-2024/CVE-2024-332xx/CVE-2024-33218.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-33219](CVE-2024/CVE-2024-332xx/CVE-2024-33219.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-33220](CVE-2024/CVE-2024-332xx/CVE-2024-33220.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-33221](CVE-2024/CVE-2024-332xx/CVE-2024-33221.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-33222](CVE-2024/CVE-2024-332xx/CVE-2024-33222.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-33223](CVE-2024/CVE-2024-332xx/CVE-2024-33223.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-33224](CVE-2024/CVE-2024-332xx/CVE-2024-33224.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-33225](CVE-2024/CVE-2024-332xx/CVE-2024-33225.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-33226](CVE-2024/CVE-2024-332xx/CVE-2024-33226.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-33227](CVE-2024/CVE-2024-332xx/CVE-2024-33227.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-33228](CVE-2024/CVE-2024-332xx/CVE-2024-33228.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-34448](CVE-2024/CVE-2024-344xx/CVE-2024-34448.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-35061](CVE-2024/CVE-2024-350xx/CVE-2024-35061.json) (`2024-05-22T18:15:10.133`)
|
||||
- [CVE-2024-35362](CVE-2024/CVE-2024-353xx/CVE-2024-35362.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-35475](CVE-2024/CVE-2024-354xx/CVE-2024-35475.json) (`2024-05-22T19:15:09.373`)
|
||||
- [CVE-2024-36077](CVE-2024/CVE-2024-360xx/CVE-2024-36077.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-3926](CVE-2024/CVE-2024-39xx/CVE-2024-3926.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-4563](CVE-2024/CVE-2024-45xx/CVE-2024-4563.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-5157](CVE-2024/CVE-2024-51xx/CVE-2024-5157.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-5158](CVE-2024/CVE-2024-51xx/CVE-2024-5158.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-5159](CVE-2024/CVE-2024-51xx/CVE-2024-5159.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-5160](CVE-2024/CVE-2024-51xx/CVE-2024-5160.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-5166](CVE-2024/CVE-2024-51xx/CVE-2024-5166.json) (`2024-05-22T18:59:20.240`)
|
||||
- [CVE-2024-35204](CVE-2024/CVE-2024-352xx/CVE-2024-35204.json) (`2024-05-22T21:15:08.100`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
90
_state.csv
90
_state.csv
@ -214169,7 +214169,7 @@ CVE-2023-20235,0,0,5dba974f1c210cf2a03787c3d3e9c441feee75819526969b64e2f4a80cd00
|
||||
CVE-2023-20236,0,0,c6a29bb276fa53045a1d5dbdcd5f535a774cb8c2b4a2da6d6d6378ae41d08dd7,2024-01-25T17:15:39.850000
|
||||
CVE-2023-20237,0,0,f975d459d3015a3f408e596ac215a6d75cfb23fa7b1171a2fa054590faa43dfe,2024-01-25T17:15:39.970000
|
||||
CVE-2023-20238,0,0,79a23b4efc590566cd58d4cbff45d13d4f3db09516083d401270e6b9d775efcf,2024-01-25T17:15:40.067000
|
||||
CVE-2023-20239,0,1,826e38211d328eeacf8b74ba34a8ec7e417b358bc8709bf7d61605481ebb92e6,2024-05-22T18:59:20.240000
|
||||
CVE-2023-20239,0,0,826e38211d328eeacf8b74ba34a8ec7e417b358bc8709bf7d61605481ebb92e6,2024-05-22T18:59:20.240000
|
||||
CVE-2023-2024,0,0,a3df09772ebf731a0c1b5b6db5674d9bb51b9794a600088bf32d2d3c6a061d68,2023-05-25T18:10:24.590000
|
||||
CVE-2023-20240,0,0,015a0e0281847d8e48d2582559aafcb4c3d1269bf49b1b0162dcef443724c650,2024-01-25T17:15:40.187000
|
||||
CVE-2023-20241,0,0,96357ec1544a3578befd4c4e9e8f2d0182f6d55009c374e33215ccb07ff2801f,2024-01-25T17:15:40.280000
|
||||
@ -227555,7 +227555,7 @@ CVE-2023-37576,0,0,b3086c097e8f97ccae74b878d2a502ec848400a667c99182b03cba4819265
|
||||
CVE-2023-37577,0,0,3d47904e6714d7a055f1c3c55b7d81ffcc7991c99e251b7d10413eaa6b52422a,2024-04-09T21:15:12.807000
|
||||
CVE-2023-37578,0,0,ba12ca5aa2e270904d2e8b59157d3f65b05f5a4d93e555484e17817f5052ca06,2024-04-09T21:15:12.900000
|
||||
CVE-2023-37579,0,0,162475d9c10c03bb62253b4c06df5b03f8c0200b6108cb5a121856967edaa5b2,2023-07-20T17:37:20.790000
|
||||
CVE-2023-3758,0,1,3e07e863d680b10fa68e2f8537fd472f06496ebbe1e5985cc387edc1131de9e7,2024-05-22T18:15:09.053000
|
||||
CVE-2023-3758,0,0,3e07e863d680b10fa68e2f8537fd472f06496ebbe1e5985cc387edc1131de9e7,2024-05-22T18:15:09.053000
|
||||
CVE-2023-37580,0,0,bae9f92d653d361aeb909d5e42dce31c2da6a6bba3b212aa2530c8274e5b606d,2023-12-22T15:16:27.810000
|
||||
CVE-2023-37581,0,0,98103a9a7ec0c92020dfa9a697e6c5df21ed2d932a7d784c6317de2f609cd32a,2023-11-07T04:17:00.163000
|
||||
CVE-2023-37582,0,0,32e5b7f8ae6b98ea7fa4c9ee1081e939ae14653ee66f31f201bc834b4e2b62d2,2023-07-20T02:11:34.330000
|
||||
@ -237313,6 +237313,8 @@ CVE-2023-5163,0,0,dcb773ab2d6fe9431102c7737c1a9ab1410c0276847172a178a17b93819afb
|
||||
CVE-2023-51630,0,0,e9c56408d552b149daee5fe15432377ab22c6d1afc3ccc27406f3f891f5d5f7f,2024-02-15T17:15:20.487000
|
||||
CVE-2023-51631,0,0,7ca00593c4263cd6a331ad27b48650ba2b0364d4a177ea286bc8bf674e135a9a,2024-05-02T13:27:25.103000
|
||||
CVE-2023-51633,0,0,55125673d01a37395fc498a22f6f19d44160c863d8a90af77443ed2f4b8cde75,2024-05-03T12:48:41.067000
|
||||
CVE-2023-51636,1,1,459ee9f881bc02c599b6caf3d90fe0c26bbc6eb475f5f293e4037219de8bb9d9,2024-05-22T20:15:08.407000
|
||||
CVE-2023-51637,1,1,4c83b2813d25d9f23540a0aeecf204c9c27435721f68aec380c3e3459bb5fb27,2024-05-22T20:15:08.713000
|
||||
CVE-2023-5164,0,0,eb58535c78bf4b607f05ff8e1f903241064df3ad7b0f4d3f1636df61307fb477,2023-11-07T20:09:50.093000
|
||||
CVE-2023-51649,0,0,11e105f951d553e940608590efdc1e572e1718a59f6fe7f415e90e2b5b510151,2024-01-03T20:05:01.863000
|
||||
CVE-2023-5165,0,0,a5831e8b47bcc2e026ef3c692d9374429299bcbb82887bff8c322b1d5bf13c3b,2023-09-26T15:50:49.217000
|
||||
@ -241793,7 +241795,7 @@ CVE-2024-20257,0,0,76ffe9a92c93a06325edca86ddf0d31564fbc213598c5ddb9861c39151597
|
||||
CVE-2024-20258,0,0,86668eb2a14f93ae58cca9d4779b12b7223791a7316a5480eeeb82e1669b4fc2,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20259,0,0,73ab78da8d0a510423d7dde4580b3cd86ea36933046212658a9baf6cc1c10b54,2024-03-27T17:48:21.140000
|
||||
CVE-2024-2026,0,0,5071705b646dd74094af5cbedc0c8f83ed6481f03743c4a8c8e638254d8625b5,2024-04-10T13:23:38.787000
|
||||
CVE-2024-20261,0,1,84ba603bb30f32056cb206d69a0481949924f2891efd22ec363c6ac71f6066a7,2024-05-22T18:59:20.240000
|
||||
CVE-2024-20261,0,0,84ba603bb30f32056cb206d69a0481949924f2891efd22ec363c6ac71f6066a7,2024-05-22T18:59:20.240000
|
||||
CVE-2024-20262,0,0,0f454f18496ee5ef2600ffeec90b1f623047ba774ff76b9352de48c47d8ed167,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20263,0,0,e2b898d887c646815ae9f81fc2d94bb44bf5048bae0bf50a4ca3ec5baeb42436,2024-02-06T19:23:20.600000
|
||||
CVE-2024-20265,0,0,fbaf861e98006a5b6737fd0e8bab7fd09d0628199afba5baf3a37aa186d05d2d,2024-03-27T17:48:21.140000
|
||||
@ -241815,7 +241817,7 @@ CVE-2024-2029,0,0,8373bec1763a4514bbbcb69ac2f237a035a9f03f21660a36f059b41030fd51
|
||||
CVE-2024-20290,0,0,057d5dfa7ca9ea45e2cb423f9faaf6e87f8f428206a3f34ecdd5587406e21147,2024-02-15T15:43:27.240000
|
||||
CVE-2024-20291,0,0,8b3a799684ad77921390bf93ffe13565898bd7b11a64255da0ed7a22936da619,2024-02-29T13:49:29.390000
|
||||
CVE-2024-20292,0,0,487f367f547f807e9f94987f5696131d7f2dbcf85eef97db7117ebc922f8f0a8,2024-03-07T13:52:27.110000
|
||||
CVE-2024-20293,0,1,495a98f3e3e0e3cd31895f684ca2fc37b30d97b2245a74db35ac76d217f3e66e,2024-05-22T18:59:20.240000
|
||||
CVE-2024-20293,0,0,495a98f3e3e0e3cd31895f684ca2fc37b30d97b2245a74db35ac76d217f3e66e,2024-05-22T18:59:20.240000
|
||||
CVE-2024-20294,0,0,4fadb13db160be71a050b8cad86cc6a11a54187dbc8f5c1f128a04f8688febd3,2024-02-29T13:49:29.390000
|
||||
CVE-2024-20295,0,0,15daf48dd7dc82ddbbc6711ac40fe791a25c5cf42c57f7cb10c68c2d97bee3a8,2024-04-25T13:18:20.370000
|
||||
CVE-2024-2030,0,0,d28975d328a4fff677c165e5077b942b01b9ea45f41d0c27e4794a5e9083ea52,2024-03-13T18:15:58.530000
|
||||
@ -241861,16 +241863,16 @@ CVE-2024-20348,0,0,0302f1e9485b44e49fee557bce04f55ca5d1a83abb8a531d325f6a707ff9d
|
||||
CVE-2024-20352,0,0,0a21aaf855f5e2dfa6cf8a0de7df15d8d9ce0063ea679dcbc607b17583312064,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20353,0,0,0ad32ee557f52a7b8ada270f35945efb8e6756e485c22be736fc9eb0d9c4e4e0,2024-04-26T15:22:27.803000
|
||||
CVE-2024-20354,0,0,77dad3524fb09cfda3488dd6cb6801d1cbef489cb4a9c5ad1ce0cd080b146730,2024-03-27T17:48:21.140000
|
||||
CVE-2024-20355,0,1,c4f95324f9b6cdd52e49820505eddf1968bd3351033ec9f4fa0576272fc73a3f,2024-05-22T18:59:20.240000
|
||||
CVE-2024-20355,0,0,c4f95324f9b6cdd52e49820505eddf1968bd3351033ec9f4fa0576272fc73a3f,2024-05-22T18:59:20.240000
|
||||
CVE-2024-20356,0,0,520a5229b5523a4caebc12a2a13fabbd3ee32baa429880796f24d4f599838cb8,2024-04-25T13:18:20.370000
|
||||
CVE-2024-20357,0,0,3a1d2757f67674d091902d27d845115a7046a8d266fe0b3daa6615e60c820655,2024-05-01T19:50:25.633000
|
||||
CVE-2024-20358,0,0,a08433ecd9375b9385be343adba44e1b907ae2f57b9c630ccf362a5c87517062,2024-04-30T14:47:57.753000
|
||||
CVE-2024-20359,0,0,103c2bc1c6783d5aa055ed80504c27ea24cb5bf5556deb17c85950666ec17e99,2024-04-26T15:25:02.773000
|
||||
CVE-2024-2036,0,0,bcfdbdd174510ba0864b0e6171969e1a6500d4f97dc7bcf3ab34f7b2bf61efef,2024-05-22T12:46:53.887000
|
||||
CVE-2024-20360,1,1,8593db5efd7cd7cc0e7d4dda7b815cc5e515029148091d8ec1b70cd602086d0a,2024-05-22T18:59:20.240000
|
||||
CVE-2024-20361,0,1,010573f025bd50b12b661eed80644cddec43cc580c114c562abec7e911fb7432,2024-05-22T18:59:20.240000
|
||||
CVE-2024-20360,0,0,8593db5efd7cd7cc0e7d4dda7b815cc5e515029148091d8ec1b70cd602086d0a,2024-05-22T18:59:20.240000
|
||||
CVE-2024-20361,0,0,010573f025bd50b12b661eed80644cddec43cc580c114c562abec7e911fb7432,2024-05-22T18:59:20.240000
|
||||
CVE-2024-20362,0,0,0e125a5f57daca09b3a31c24c5285918bb46201f033defe636102ce0379b9ecc,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20363,0,1,97f3be2a752993dbc3b74ffb2d3f91bcdf34f1a982632e9bb3c311830dd7d57b,2024-05-22T18:59:20.240000
|
||||
CVE-2024-20363,0,0,97f3be2a752993dbc3b74ffb2d3f91bcdf34f1a982632e9bb3c311830dd7d57b,2024-05-22T18:59:20.240000
|
||||
CVE-2024-20366,0,0,847482c81cd89b351ccec66c9f3c8d8074954a0de68a5d98d408eebff09cee32,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20367,0,0,e44fa9dcd83189ac4bb0284b57ce6be9f7d161e3fd46e74e477fe5fd623ca1b7,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20368,0,0,4814a8127430faf4ae61ecb30b9f4c874f54598057d22bcc8b2ca14f1fefa88a,2024-04-03T17:24:18.150000
|
||||
@ -242702,7 +242704,7 @@ CVE-2024-21782,0,0,a54768f93a9b07a30680122b1877fb41eae0f01a5d667d71a8861ee6fcf71
|
||||
CVE-2024-21788,0,0,011ec43adc40c18dff4c187fc9ede9290a7392209b10791d513a3b1975ca41d3,2024-05-17T18:36:05.263000
|
||||
CVE-2024-21789,0,0,065592bcd8c720a7bd60596f25729aa5b68a77a3a9f40afcc7521d9d3e39931f,2024-02-14T18:04:45.380000
|
||||
CVE-2024-2179,0,0,ae7ec0d777d4f092532ca994d6b0860fc5ecc6f92bb84e39b0499b0a5cdf3be6,2024-03-06T15:18:08.093000
|
||||
CVE-2024-21791,1,1,a201a04287ac020777851f80d18fed7d8766b0534240c9365fcb81ba04a82feb,2024-05-22T18:59:20.240000
|
||||
CVE-2024-21791,0,0,a201a04287ac020777851f80d18fed7d8766b0534240c9365fcb81ba04a82feb,2024-05-22T18:59:20.240000
|
||||
CVE-2024-21792,0,0,4f2e745dad8ee3d557b1b87e6abfc7e76c60e788eeca6c7fa6f04385472fc8b2,2024-05-17T18:36:05.263000
|
||||
CVE-2024-21793,0,0,b55902d470d37a2479e376b66a185ed8b4afdd3b18a61089b937f4c3059f5d26,2024-05-08T17:05:24.083000
|
||||
CVE-2024-21794,0,0,5140601c591fc7e01c922f6b4426d49907b4278c42a623419c59c4c96fa7afa6,2024-02-07T17:15:44.653000
|
||||
@ -244917,8 +244919,8 @@ CVE-2024-25731,0,0,1c6fee5c0654e277c807db3f6bf19838ebb53eed65f09ea7e40b4e9895105
|
||||
CVE-2024-25734,0,0,06c269125a132df3ae043bc4b207969136d4cdb2e71e0ceac2732c8d46a3f2d8,2024-03-27T12:29:30.307000
|
||||
CVE-2024-25735,0,0,b2ec3248064181eabfaf9fbb0d3d8ff31c37e79eaaaaefb0325854c3d0f3829f,2024-03-27T12:29:30.307000
|
||||
CVE-2024-25736,0,0,7371e824af142b51c9574b5ab47b3c1757c3b280bf74f832655082514c5a65ba,2024-03-27T12:29:30.307000
|
||||
CVE-2024-25737,1,1,337f150770f937be1ed9019edce6ea96718a360ca913ea334c5539648332c20c,2024-05-22T19:15:08.657000
|
||||
CVE-2024-25738,1,1,21d639555861c488c595cf74246f77da9e58963bd45531a88726a1b343d0b0c6,2024-05-22T19:15:08.807000
|
||||
CVE-2024-25737,0,0,337f150770f937be1ed9019edce6ea96718a360ca913ea334c5539648332c20c,2024-05-22T19:15:08.657000
|
||||
CVE-2024-25738,0,0,21d639555861c488c595cf74246f77da9e58963bd45531a88726a1b343d0b0c6,2024-05-22T19:15:08.807000
|
||||
CVE-2024-25739,0,0,3f77808e2a48c50aab928b0c96b70686e724f3302ff450f04c0ab77d04e27e26,2024-03-25T01:15:55.230000
|
||||
CVE-2024-2574,0,0,b5441c1b84575547e924314a12527464107de86e7e6ade40cf449ff7ac8309a8,2024-05-17T02:38:20.537000
|
||||
CVE-2024-25740,0,0,e49082457da2ca822066645fd01741e2b46dee6a85b6e915fd169e8229594e99,2024-02-26T21:11:27.837000
|
||||
@ -246079,6 +246081,7 @@ CVE-2024-27255,0,0,1a87ed865e33969bd25e1a85296cce48c9cd6a59a0cfe097079e825c89c05
|
||||
CVE-2024-2726,0,0,86fe8b0d397a8074a2c940021570750a55036cbee3d4d8f0a542dcc682e4af2c,2024-03-22T15:34:43.663000
|
||||
CVE-2024-27260,0,0,35cc3a1e9cc20863b87027e674db993404964801c204d20b0f5a987c39a4b80a,2024-05-17T18:36:31.297000
|
||||
CVE-2024-27261,0,0,bbed66d7d6087a4518d3eea41ca0d4f2f5d3d3e2b2ec24c87084c9ef60c5b4e2,2024-04-15T13:15:51.577000
|
||||
CVE-2024-27264,1,1,0e666d8a771fa2ff39790ac131ea6d651444c828144a06eca82ba04c7cb6ed11,2024-05-22T20:15:09.047000
|
||||
CVE-2024-27265,0,0,a52bbd360a6e47490ba11a2331048d18c2ebad63cb5bd9c43f26e021577a44df,2024-03-19T16:52:02.767000
|
||||
CVE-2024-27266,0,0,f3ab0f27c5fbbc81843b4329fa53134d5b91174cad9bacbbc5dbf01cfacc3864,2024-03-19T16:52:35.400000
|
||||
CVE-2024-27268,0,0,3c687588a19276e5b44431496d7af7239b9640f9b0218bde7d09fb0845bffcbc,2024-05-16T01:15:07.370000
|
||||
@ -247255,7 +247258,7 @@ CVE-2024-29385,0,0,8759a5732499ce248301d7321fb10ac2a0ff45ccfb82ec638dc2ec07b2660
|
||||
CVE-2024-29386,0,0,46150b3636ce7f0c25cb166967d8e2ffb59b578767fa72331e04f23b7ba93e5f,2024-04-05T12:40:52.763000
|
||||
CVE-2024-29387,0,0,64dc77a900c3b36a10f003711c44947a360d31708081f08c65915c82f4e2f15d,2024-04-05T12:40:52.763000
|
||||
CVE-2024-2939,0,0,8d288c5421907c18561d6a467f0e78e7e78afcae942dcb9d7c160f3050babf32,2024-05-17T02:38:38.230000
|
||||
CVE-2024-29392,0,1,72d0a4c145ef9aaa49fe0433036c3df25c882a17843cbfa9ce310dee3d3fa569,2024-05-22T18:59:20.240000
|
||||
CVE-2024-29392,0,0,72d0a4c145ef9aaa49fe0433036c3df25c882a17843cbfa9ce310dee3d3fa569,2024-05-22T18:59:20.240000
|
||||
CVE-2024-29399,0,0,1f0a560642c5bcb6053c3eb35cf9c158aa499897c937eeb4d73efac983ff0857,2024-04-11T12:47:44.137000
|
||||
CVE-2024-2940,0,0,bdac3de755ddba1fc10ba9f0b54c2d288bf5bbaaa5fc7e8b4cdd60093fb3f65d,2024-05-17T02:38:38.323000
|
||||
CVE-2024-29400,0,0,7c7ba10951f85314b8517e4af19bc97a8e02a4fb9c2ebd30adadcdfaed825d5b,2024-04-12T12:43:46.210000
|
||||
@ -247266,7 +247269,7 @@ CVE-2024-29413,0,0,a58c13bdf67afd8b98d238166eefb90262a9870531d3d5f182e9810c30b45
|
||||
CVE-2024-29417,0,0,89d07e3eb8e147d93c431f357bf92973ead1b3854c21888d1e99630fdc9218d4,2024-05-03T15:32:19.637000
|
||||
CVE-2024-29419,0,0,2f1c2a30167616ce2f7264d13a2e39c4e307caf2a0fab8a1d39f77c0f2b7d31b,2024-03-20T17:18:21.343000
|
||||
CVE-2024-2942,0,0,441f0a67703a8db7af5d599581bb10078cc400b1f49682a90a1d996555281551,2024-05-17T02:38:38.500000
|
||||
CVE-2024-29421,1,1,ff3ad7251b21dafb322409c42e64e6ec1c1301abb92556eb2edc51c78671f85b,2024-05-22T18:59:20.240000
|
||||
CVE-2024-29421,0,0,ff3ad7251b21dafb322409c42e64e6ec1c1301abb92556eb2edc51c78671f85b,2024-05-22T18:59:20.240000
|
||||
CVE-2024-2943,0,0,41d4a5ff66d7393263508db872dcddf7cbc0209f3571cc9b14085d559f28aa35,2024-05-17T02:38:38.790000
|
||||
CVE-2024-29432,0,0,935ce59b23319f15478ff1d005b1786853efcea9f20ed5b78b83dcf1879a3c65,2024-04-03T12:38:04.840000
|
||||
CVE-2024-29433,0,0,b10a666a979afbf6ffc25b1ef458e1d0fb9c766493f3b32e8a3cbc2c3e4a9e2b,2024-04-02T12:50:42.233000
|
||||
@ -248566,7 +248569,7 @@ CVE-2024-3161,0,0,fb0275ae00c4597a14b8da67383742a33ef20f00a5c359deab992b83c03fa8
|
||||
CVE-2024-31610,0,0,25f0fe7dce01b290d07505f210ca0196ceaddb3229e43445c402c10f0654acf3,2024-04-26T12:58:17.720000
|
||||
CVE-2024-31615,0,0,fec656de044fff01992f2ac4c2d789e80286f56b4ff6f28fca891fbe026d80d2,2024-04-26T12:58:17.720000
|
||||
CVE-2024-31616,0,0,0d01710e8c157f0d32189692d849b27951e2db80c68fce9b88dd89c45379117e,2024-04-24T13:39:42.883000
|
||||
CVE-2024-31617,1,1,a4e6a3b34f5557cc7d6c502ef325f8ba64e8dc64b1797d06a080919acbbeffe5,2024-05-22T18:59:20.240000
|
||||
CVE-2024-31617,0,0,a4e6a3b34f5557cc7d6c502ef325f8ba64e8dc64b1797d06a080919acbbeffe5,2024-05-22T18:59:20.240000
|
||||
CVE-2024-3162,0,0,7209bf9b1b4a4f41543ae01bfd19e9aec1dd355164cd1434a8cb5548ea161c65,2024-04-03T12:38:04.840000
|
||||
CVE-2024-31621,0,0,5859f84ce615fd32361b282eb85819f2850e262c3652d6c11e3c0f262c84e82a,2024-04-30T13:11:16.690000
|
||||
CVE-2024-31634,0,0,4aa9be86cd809cace2c7d458fd82ce0e6e4c21e7757f642f911286874e9406fe,2024-04-16T13:24:07.103000
|
||||
@ -248661,8 +248664,10 @@ CVE-2024-31879,0,0,d6826c6d26ac58467ab81c8e96dbee0010f578f9857bc48f2d302234b6393
|
||||
CVE-2024-3188,0,0,5d70d4884e37e1862c5503e8662fdd8be316d1df7ecad77f44114699c1426b8a,2024-04-26T12:58:17.720000
|
||||
CVE-2024-31887,0,0,e951c215b0e12b882bcc7244c98d7631ee4f4b7a3271b5f24e369f1a635cd3e5,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3189,0,0,1214acc8d4ffdbc5da1a7913ab352a27b53d04d94b5a178d0c09d285be9bf460,2024-05-15T16:40:19.330000
|
||||
CVE-2024-31893,1,1,38832e07ea9705065b713afbef90a53d598b0ed52a0e87dc548f70516d21e0fd,2024-05-22T19:15:08.893000
|
||||
CVE-2024-31904,1,1,a5c1afc73930c75c0e4f0cca7e598ebd551c1a4c257da0dd95c5279861133025,2024-05-22T19:15:09.153000
|
||||
CVE-2024-31893,0,0,38832e07ea9705065b713afbef90a53d598b0ed52a0e87dc548f70516d21e0fd,2024-05-22T19:15:08.893000
|
||||
CVE-2024-31894,1,1,80b6826b80410f0e513614f16c31b482f4dec10ee253620eee5cb32449d4f744,2024-05-22T20:15:09.260000
|
||||
CVE-2024-31895,1,1,3ca1235030db0f2e699b4e4dab09eb5487de7f0d2b9bfacafb9b9bb6f2aee7cf,2024-05-22T20:15:09.480000
|
||||
CVE-2024-31904,0,0,a5c1afc73930c75c0e4f0cca7e598ebd551c1a4c257da0dd95c5279861133025,2024-05-22T19:15:09.153000
|
||||
CVE-2024-3191,0,0,8cf962bd9b56831bd79ade84a34de9b023bb925809cd58e4b9fc80c44fe6835a,2024-05-17T02:39:45.973000
|
||||
CVE-2024-3192,0,0,e3aebeb6cd86739531dd732871b7a29e3a45f5c2393a43be256648b47f7f7a36,2024-05-17T02:39:46.077000
|
||||
CVE-2024-31920,0,0,3c0045dbbecad7d78d5b9eb044589c2fc290e421e2d5accb9391890092efc90f,2024-04-15T13:15:31.997000
|
||||
@ -249411,17 +249416,17 @@ CVE-2024-33213,0,0,b148497f8be1950a6fa46d58723de7904955cc78b66d2d908246ba324bd2f
|
||||
CVE-2024-33214,0,0,e8bb1a89ed9a6fe57462cf7839328d6243261c99698249abe128719bc3054c5f,2024-04-24T13:39:42.883000
|
||||
CVE-2024-33215,0,0,c8be43358325b8e905d28304a9339956d17f1418e85498fcb8a7134416d3977f,2024-04-24T13:39:42.883000
|
||||
CVE-2024-33217,0,0,4e1e2d2adceccdbe12f057aebeef0a19faff919f64d3f29d52997e302777a311,2024-04-24T13:39:42.883000
|
||||
CVE-2024-33218,0,1,f5f61d355ae007d63ba9b6e336b8d9d37d932507cc676b5850d265d780d3861c,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33219,0,1,2412fa0aa8b2d948daa8a7fcfe3f65e09eacf161c3b540ed0b7f509c419fa64e,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33220,0,1,5b878885ce476729110a5de870db12fce52559f4154c6583f6debfc62f1a29c0,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33221,0,1,55586c2a9a771d94bb89b755dddaede396e73997ea980849f19d91b29868e9f6,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33222,0,1,a20d4c7838a56afb9285d4dddf7f31890b2257db20af4ec16ce732d7b84a8a7d,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33223,0,1,7038d3bd45fd62a5567bf519d79a2563fa66d83f3d6e4dd2846ce342e93d1782,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33224,0,1,d1cdf64e326181335af8c27f1813d093585d18fadc90ffdcca1a5704d9ae201b,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33225,0,1,8204b329ff4e3cc8b847d0466ca6f2a8dfa2f83f445affd44161b46ee9471f23,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33226,0,1,59a7d5eccb70eed84f77b01f6f6e9015231bce2c086988caee288bfbdcef61f0,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33227,0,1,6491ebf8cfa47899856f9019e8f7bdebed77c891be554c5be0930a0e08a054e7,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33228,0,1,fa7b2b70ce70b0cb12be62e8252be309d8b5a48957c1c7cb7090628330dcda4c,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33218,0,0,f5f61d355ae007d63ba9b6e336b8d9d37d932507cc676b5850d265d780d3861c,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33219,0,0,2412fa0aa8b2d948daa8a7fcfe3f65e09eacf161c3b540ed0b7f509c419fa64e,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33220,0,0,5b878885ce476729110a5de870db12fce52559f4154c6583f6debfc62f1a29c0,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33221,0,0,55586c2a9a771d94bb89b755dddaede396e73997ea980849f19d91b29868e9f6,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33222,0,0,a20d4c7838a56afb9285d4dddf7f31890b2257db20af4ec16ce732d7b84a8a7d,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33223,0,0,7038d3bd45fd62a5567bf519d79a2563fa66d83f3d6e4dd2846ce342e93d1782,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33224,0,0,d1cdf64e326181335af8c27f1813d093585d18fadc90ffdcca1a5704d9ae201b,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33225,0,0,8204b329ff4e3cc8b847d0466ca6f2a8dfa2f83f445affd44161b46ee9471f23,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33226,0,0,59a7d5eccb70eed84f77b01f6f6e9015231bce2c086988caee288bfbdcef61f0,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33227,0,0,6491ebf8cfa47899856f9019e8f7bdebed77c891be554c5be0930a0e08a054e7,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33228,0,0,fa7b2b70ce70b0cb12be62e8252be309d8b5a48957c1c7cb7090628330dcda4c,2024-05-22T18:59:20.240000
|
||||
CVE-2024-3323,0,0,5322a19626f9d41fbc85f0f073b4efac313efc9902bda6b2387f115ed4ea09c7,2024-04-17T20:08:21.887000
|
||||
CVE-2024-33247,0,0,66af889d7e6ada10bf314bd53454c582a1455dd661c7cb5b07f6d9cd6d1d400f,2024-04-25T13:18:02.660000
|
||||
CVE-2024-33250,0,0,80f5075a1ccdf0bbe31bc42b408e98f86c2ee0faa43a99a4e3de76f2fa1f2732,2024-05-14T16:12:23.490000
|
||||
@ -250020,7 +250025,7 @@ CVE-2024-34441,0,0,30a4318e62907426b3ab700c3b20e4f834f59441ac7ba3bdfe737a2f99871
|
||||
CVE-2024-34445,0,0,5ae9c8efe1aaf47848c5b15a6687968aa01604c93efb870985c96be2737d2fc7,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34446,0,0,b445bdbcee2357cb0b4db1ab10e64a435c89bc8ae1d2fa2a306f3117c07625d0,2024-05-03T15:32:19.637000
|
||||
CVE-2024-34447,0,0,7d0c1160e9ad74b2f0d138c65d27109e83600e38ed8d60bf74a510fb61e6f980,2024-05-14T15:39:08.297000
|
||||
CVE-2024-34448,0,1,27009ee2a57fc3bbb1d7cdf9f4be1f45ed8a4e2e385420d85256cf0e02c842dc,2024-05-22T18:59:20.240000
|
||||
CVE-2024-34448,0,0,27009ee2a57fc3bbb1d7cdf9f4be1f45ed8a4e2e385420d85256cf0e02c842dc,2024-05-22T18:59:20.240000
|
||||
CVE-2024-34449,0,0,28da5cfb8215143a3847fc37f7163047e3e2e183b8d6abcf511553c3cec5bb16,2024-05-17T02:39:35.457000
|
||||
CVE-2024-3445,0,0,2031eee497e177f244890449ab10d2f196dd08d103f846fc9b20779b1f74d465,2024-05-17T02:39:56.830000
|
||||
CVE-2024-34453,0,0,9363deaf6a5ec68194d671cadb0973a2ba23402d3e2800c4f9eea6dbd677c5cd,2024-05-06T12:44:56.377000
|
||||
@ -250221,7 +250226,7 @@ CVE-2024-35057,0,0,6f8128beecce8bfea31f3c320500042c6cf6bf8be0c0072f7e558b39d7735
|
||||
CVE-2024-35058,0,0,16c869cef11e1d38634183c19e67a6ae1a15991a1b1c852f5e6eb56cc744ffc2,2024-05-22T12:46:53.887000
|
||||
CVE-2024-35059,0,0,bd64074b0906c1c54ef17d2e14ef72d6e07f1a69861632fbcb25eee7085311c4,2024-05-22T12:46:53.887000
|
||||
CVE-2024-35060,0,0,62446a6780b8c8e1187040238ecfc349f6eb1b933015bf43bbb359906b5391dc,2024-05-22T12:46:53.887000
|
||||
CVE-2024-35061,0,1,34e811b322aae61856581c9d11d0a6300ec0d542883626f03b8561ef5119041c,2024-05-22T18:15:10.133000
|
||||
CVE-2024-35061,0,0,34e811b322aae61856581c9d11d0a6300ec0d542883626f03b8561ef5119041c,2024-05-22T18:15:10.133000
|
||||
CVE-2024-3507,0,0,4311efcb171543ec92e46563bc97a34308842d5cb27d2460f854a987393d053f,2024-05-09T09:15:09.623000
|
||||
CVE-2024-3508,0,0,c82390a1238326cf6817e875dca33757792126eb5098bd44b5a908dea5e7149a,2024-04-26T12:58:17.720000
|
||||
CVE-2024-35099,0,0,8c0b69879ab1111cf063e500789278f969d059f38759acadb58167d526b5b96f,2024-05-14T16:11:39.510000
|
||||
@ -250260,7 +250265,7 @@ CVE-2024-35192,0,0,23cd729e19fbc1d14c67ebc44010f4e0066ae84ba866902513e5881072f82
|
||||
CVE-2024-35194,0,0,48af49ad15298b97e4182e649aa9ff3b175135c022e246334d8184050eb47ce3,2024-05-21T12:37:59.687000
|
||||
CVE-2024-35195,0,0,9af34c5ee8ad1c1fa6450f4ca43e0ba18410a0c881b480e1c9b625168aec2e65,2024-05-21T12:37:59.687000
|
||||
CVE-2024-3520,0,0,f6428e86e9ec472cba9c3c5754043cb34202461d79bcb1fa1b6a365d8347f93e,2024-05-02T18:00:37.360000
|
||||
CVE-2024-35204,0,0,e1a61e5fa740b8d773028d5010a8e42a433a924bdea5e26108812aad66d1c249,2024-05-16T20:15:09.910000
|
||||
CVE-2024-35204,0,1,426b422871683d1b16b6e67a7918f8f9959a907fcff966c6f5833a5066df0ead,2024-05-22T21:15:08.100000
|
||||
CVE-2024-35205,0,0,e759b9359595ebaf333ccada053519f187d3d1cfddc6ef72f21bfd74e59fe204,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3521,0,0,6a912375551b2b833dbf10976aa7a2942ee5411f45e7dcbcfe8caeaca7c22d09,2024-05-17T02:39:58.603000
|
||||
CVE-2024-35218,0,0,b14fa11104b3be270b2ec1bc371bb22cdbf5b58f56cbde41365d0ab9a810855b,2024-05-21T16:54:26.047000
|
||||
@ -250286,7 +250291,7 @@ CVE-2024-3534,0,0,3f1920931444a20406a7f610b0b64ebb830986df38b69b0c0bee94b2ffa95f
|
||||
CVE-2024-3535,0,0,f574fcdaa266eb8da2fb53308d734bd66c33a13c49e8b4335f6bdaf83f11e9c6,2024-05-17T02:39:59.803000
|
||||
CVE-2024-3536,0,0,b63dbc7abf49c7babee61877e5b2a8e70e35b7a32ec432c7d29371fbe78ff8a5,2024-05-17T02:39:59.897000
|
||||
CVE-2024-35361,0,0,981fcbfd9f4303bd43de5df85c3e320402b0db2b2b55c36fbcead39aa2c6a55b,2024-05-21T16:54:35.880000
|
||||
CVE-2024-35362,0,1,bc6cc73ae2c385c72fa8e171de6f5e48fe251acb5a307d4b68c4eadfbc25ba42,2024-05-22T18:59:20.240000
|
||||
CVE-2024-35362,0,0,bc6cc73ae2c385c72fa8e171de6f5e48fe251acb5a307d4b68c4eadfbc25ba42,2024-05-22T18:59:20.240000
|
||||
CVE-2024-3537,0,0,a991188dca9ef4640adf7a802695a0fa207bb0c024fcd7aac535d47c4720436f,2024-05-17T02:39:59.987000
|
||||
CVE-2024-3538,0,0,f8cabe6328eaf87ba6d9a024b15cf0edff2e3f1ab108489ec3ba849f1bf7e980,2024-05-17T02:40:00.087000
|
||||
CVE-2024-35384,0,0,d21dcb965b72196df94f0bb7eb7aa18a6c33135d9d1348ad106df5e9cb4ecf63,2024-05-21T16:54:26.047000
|
||||
@ -250302,7 +250307,7 @@ CVE-2024-3544,0,0,9c89c629785658109b56b96c611d48bc2c812cfaf631fdfc3e653cecb7fc80
|
||||
CVE-2024-3545,0,0,5bce2ec2b9cfe5866e6246067691b4f478da11354be249c7fe197f29a14875e8,2024-04-10T13:23:38.787000
|
||||
CVE-2024-3546,0,0,b7d401512e71f405610f26682a516af89f926e43ff4e75a0c9aadb49aa034713,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3547,0,0,fedd03df736ec1706076663d75a5df99f3108b401b2cf8280bfcd344106c9920,2024-05-14T16:11:39.510000
|
||||
CVE-2024-35475,0,1,5816d1afd9b95c043f9282d7a6bef2fcd68d76f771d9c9884120cd3e210b25c9,2024-05-22T19:15:09.373000
|
||||
CVE-2024-35475,0,0,5816d1afd9b95c043f9282d7a6bef2fcd68d76f771d9c9884120cd3e210b25c9,2024-05-22T19:15:09.373000
|
||||
CVE-2024-3548,0,0,e23424ba819983ac2599fe48852cbfc904a10db222c55ccac010f7ec55b39028,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3550,0,0,be0f7ed1cc8c69e2fefc881c953115f1247b844866a37cfd3935f1cbe0fa2b81,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3551,0,0,707951f769b10080ccfb0e7ec01d2b664cd8f0bbbe9c53d60fa858f7750b27d7,2024-05-17T18:36:05.263000
|
||||
@ -250327,7 +250332,7 @@ CVE-2024-35578,0,0,9b6af24900c97b8c8fceb2460e2cf2035a5639481f86d7f4da562c9cc2c39
|
||||
CVE-2024-35579,0,0,35e0d175e0e9e6f14f0d45dddb8c13590c00e75308c5741698784264cbe34649,2024-05-20T19:34:58.277000
|
||||
CVE-2024-35580,0,0,3ff50f60cbbc817960af0184f316d686462c05674ee197a8c685fbbdf03fad16,2024-05-20T19:34:58.277000
|
||||
CVE-2024-3560,0,0,66c1a96b1f1d19ab8c2a91f30bb939a8ccde028ecd6951f27029cb1628de4d35,2024-04-19T13:10:25.637000
|
||||
CVE-2024-35627,1,1,396203157a928e850e02e588c78cfe171fc70964e4e113c9cfc0ea70e0e14606,2024-05-22T19:15:09.453000
|
||||
CVE-2024-35627,0,0,396203157a928e850e02e588c78cfe171fc70964e4e113c9cfc0ea70e0e14606,2024-05-22T19:15:09.453000
|
||||
CVE-2024-3566,0,0,e417ef1ceca67d3a9a8ba800520d4a9974bcf4eba2e3e6325dafdfbfe6af8d6b,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3567,0,0,95d4f85888c7c90830bdb6bbe6ab9e66d33c542ba2d85efb396aaa8b077bff79,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3568,0,0,573133d2a7191a46b0975280ef7162f7787321191e0ad33f2c4c70c7e8d9c3f5,2024-04-10T19:49:51.183000
|
||||
@ -250589,7 +250594,7 @@ CVE-2024-3606,0,0,aad549bdf5ff1831d91b9701456650bb1ccc1938c3f938f0c7eb426394ab83
|
||||
CVE-2024-3607,0,0,af4721086df8378a380a0243b924575fce7196863af6b8319186a0a7c6039e9f,2024-05-02T18:00:37.360000
|
||||
CVE-2024-36070,0,0,19c2fc8fdc41593f53c176f18e743efa8020d50d8ffdbcbf1475257d2bfa8428,2024-05-20T13:00:04.957000
|
||||
CVE-2024-36076,0,0,7bd178b56b4ea91c0d10da16861cc8958caaaa1d0561d3821785629a0cb379df,2024-05-21T20:15:08.970000
|
||||
CVE-2024-36077,0,1,84ea3304d7a7ffaa84d954db4af07a9c774a90c5eb501916ba471dc7e3d1f499,2024-05-22T18:59:20.240000
|
||||
CVE-2024-36077,0,0,84ea3304d7a7ffaa84d954db4af07a9c774a90c5eb501916ba471dc7e3d1f499,2024-05-22T18:59:20.240000
|
||||
CVE-2024-36078,0,0,033f7985523b33a9cd47ae7b39c65b68fc3ef0710dcf434d451eae182ed35127,2024-05-20T13:00:04.957000
|
||||
CVE-2024-36080,0,0,57481f5a54f68f6f7f09dded26dd0588b050980d38ac9c78940318892c2197a1,2024-05-20T13:00:04.957000
|
||||
CVE-2024-36081,0,0,0aabc3d5ec0a35d1482a2ee38b1087a1798092236c6b1a2ef029f3cd7c35526c,2024-05-20T13:00:04.957000
|
||||
@ -250827,7 +250832,7 @@ CVE-2024-3914,0,0,4e5bf7e4bbf357662295118acaf46c6e90e6b4b9830d6a3e29a74e49dd1420
|
||||
CVE-2024-3915,0,0,a29a2abe3549638b7baa29d25d43b9e7f1e9b70435ac870f9f426e12fb2f2812,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3916,0,0,67c028ed5cffa81651cfdb7590d8583ba32a4964953feede869ed8c9f6426eef,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3923,0,0,dcd7a979944a34edd9f4dd960691916feb4f3b194c37e215c41a761a1e13cac2,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3926,0,1,1f0a5648758642b2163cf3c5029c914dfdfa53711699b12f09cb8592d01adc91,2024-05-22T18:59:20.240000
|
||||
CVE-2024-3926,0,0,1f0a5648758642b2163cf3c5029c914dfdfa53711699b12f09cb8592d01adc91,2024-05-22T18:59:20.240000
|
||||
CVE-2024-3927,0,0,7829cb310d77178b7eeb75814db111ab7836f1cd335248ee93c84ada4720d633,2024-05-22T12:46:53.887000
|
||||
CVE-2024-3928,0,0,537f117f8c3572d036e1aa43e9ee1a226723d4a5980268ff58c8876839ea31b2,2024-05-17T02:40:11.687000
|
||||
CVE-2024-3929,0,0,31d0a734bfd88727a2a61deb7a29595ac9c8ac4a930ee35c31639990489d025d,2024-04-25T13:18:13.537000
|
||||
@ -251017,6 +251022,7 @@ CVE-2024-4262,0,0,48de03b038c3a9950f1b2d36329d9f6a6297e28f8023eb3afff323d082fd07
|
||||
CVE-2024-4263,0,0,b1f2b30077721ef2ca6e11fb6bda0f0973b13bae19df9c4c6804c151ec0ef6fb,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4264,0,0,900b6e21a73808decad0bbd9ff6caa01ca608bdbd52b2ff79e0e58d7828f5894,2024-05-20T13:00:34.807000
|
||||
CVE-2024-4265,0,0,91d38fbd7b9c4ea0cd26c0f2028b5e1f8ee8c7d7e1c2c632d6b17cd2b7b69603,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4267,1,1,71e7feae8dfa8dd7f29e580e524e7cdeefc3ea2f2de0a7a38902725afdc0d3f1,2024-05-22T20:15:09.700000
|
||||
CVE-2024-4275,0,0,70e1a00c60419d92634d3a56b566530d560ae59bb86d2c5a8041fd963d9db39d,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4277,0,0,0e2597ca58054c89bbcbec7f866e9744f2b63f46782c4e0a7d31ae57f9529329,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4279,0,0,d3b17e17d1b5650487c2ef2a762ae7d90400bd6e48ec29863d7d603500f64a36,2024-05-16T13:03:05.353000
|
||||
@ -251120,6 +251126,8 @@ CVE-2024-4446,0,0,c1a78a1d4c0d05d17b6cead174a683289ca018fac3b1c104ff2e5b23dbf06e
|
||||
CVE-2024-4448,0,0,c0706d1927abee0ebde095d1bd8c9375ae579980372e3f8e4e4c3b77a255c913,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4449,0,0,5f461a2e161ed0d547590d7983036c434e3239f67f76e9397bc8163418dcb335,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4452,0,0,e48f0cdf03196e20de5e5f5902dc7c7b1a1024a4dcd852e9c13b4253f638fd6a,2024-05-21T16:54:26.047000
|
||||
CVE-2024-4453,1,1,76de60ffe129cc0f8139ecfad6bc0720432aab5d18bbe4920a7b34d4385b0a5f,2024-05-22T20:15:09.923000
|
||||
CVE-2024-4454,1,1,c24879cf57a1c9399548f22aefb71f03f3beb75d43495f040ee325bb1fe20f1f,2024-05-22T20:15:10.130000
|
||||
CVE-2024-4456,0,0,43bdd543de001702ca45614b4a3579c52bfa7b188e5cb3e6b81f25f610f74e45,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4461,0,0,ad05f4e37257e33f27f784f842f8dfa34f685ff06dd273bc6842a04c51c93bf6,2024-05-03T12:48:41.067000
|
||||
CVE-2024-4463,0,0,aaa5b32073fcbc7160927d348961b4790302ca7b8c414e16cdb6cacefbfd98b3,2024-05-14T16:11:39.510000
|
||||
@ -251181,7 +251189,7 @@ CVE-2024-4559,0,0,04253977f1b3aac9c2c8228f67b55a5d97f0f228a3fd1b3fdffeaf9dbbc176
|
||||
CVE-2024-4560,0,0,01330bc30e6abf90cd0e894076fd4822775b90946ecfbbe71c3855f1f2c00212,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4561,0,0,419f075cb470fc0bcbe1e02ad47a96fd3735721568a3ea0b27d92242ea08e526,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4562,0,0,4b41dac3b3dc0160472fa769fd66d4820687adcd6a603b6680aeb5866557430b,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4563,0,1,87e0e5702a0d713b97ba970bb75b91d34e5ca24e40c3c9a05a3d6a9dbf34c79a,2024-05-22T18:59:20.240000
|
||||
CVE-2024-4563,0,0,87e0e5702a0d713b97ba970bb75b91d34e5ca24e40c3c9a05a3d6a9dbf34c79a,2024-05-22T18:59:20.240000
|
||||
CVE-2024-4566,0,0,56d6dff8001ced0ac379df1540d8c705e1cb0415cd6a569faf0604bdd4ed8dc7,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4567,0,0,bff521ec958712c348010a89da0e0aec519b6a717613a798e9a8fee426de5e74,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4568,0,0,79c6e65478e2e86d702896e792fead76bbebdb118f8c0f66e6390a241a22321a,2024-05-07T13:39:32.710000
|
||||
@ -251488,11 +251496,11 @@ CVE-2024-5136,0,0,7e1453b58a6b8cdb889318a17e467bc4887e911147f2bbd5898eefe5c0fc0f
|
||||
CVE-2024-5137,0,0,9ef636c571a0277ac03884ccb19a37de0ac2ceab7c0195ff8a91e587e734c012,2024-05-20T13:00:04.957000
|
||||
CVE-2024-5145,0,0,779a53179978014855de22e41604c12feef2bb6901d36d253a629d55b7b44ab6,2024-05-21T12:37:59.687000
|
||||
CVE-2024-5147,0,0,f786cdd04c7e64ee05dc3a502a4fef5436dd8390bfdc70803ca93e4405d481a0,2024-05-22T12:46:53.887000
|
||||
CVE-2024-5157,0,1,c51a9f5f8f4c7b7f699f53e1f0267c61dca7dd3a3eb507f57f12d9966dbb6911,2024-05-22T18:59:20.240000
|
||||
CVE-2024-5158,0,1,a5d08847b775b0e52c1cc0488a7142e884df847d11032138a63ce6f2e4b97916,2024-05-22T18:59:20.240000
|
||||
CVE-2024-5159,0,1,8d2f157e476fe19d6e0ae9a9a20bdaf98d34094320eaa9b2d05fada23fb03d1f,2024-05-22T18:59:20.240000
|
||||
CVE-2024-5160,0,1,f35f5dea12c05d224f89549914a78b1ed3ed070b5209b38b5826791afe2dabc7,2024-05-22T18:59:20.240000
|
||||
CVE-2024-5166,0,1,b71cdf8c1359ba924d575db8e55e7723138c48dac3c0909946269d16930c9a96,2024-05-22T18:59:20.240000
|
||||
CVE-2024-5157,0,0,c51a9f5f8f4c7b7f699f53e1f0267c61dca7dd3a3eb507f57f12d9966dbb6911,2024-05-22T18:59:20.240000
|
||||
CVE-2024-5158,0,0,a5d08847b775b0e52c1cc0488a7142e884df847d11032138a63ce6f2e4b97916,2024-05-22T18:59:20.240000
|
||||
CVE-2024-5159,0,0,8d2f157e476fe19d6e0ae9a9a20bdaf98d34094320eaa9b2d05fada23fb03d1f,2024-05-22T18:59:20.240000
|
||||
CVE-2024-5160,0,0,f35f5dea12c05d224f89549914a78b1ed3ed070b5209b38b5826791afe2dabc7,2024-05-22T18:59:20.240000
|
||||
CVE-2024-5166,0,0,b71cdf8c1359ba924d575db8e55e7723138c48dac3c0909946269d16930c9a96,2024-05-22T18:59:20.240000
|
||||
CVE-2024-5190,0,0,e11755e15485ad7d65ed59ac9abe5cac7f4b4c3e2591d1a6c69b4386ed9dea65,2024-05-22T03:15:08.273000
|
||||
CVE-2024-5193,0,0,10c68e7444190b04603fe41121d5ca46f60a4a86754539b9aa3d12094e724599,2024-05-22T12:46:53.887000
|
||||
CVE-2024-5194,0,0,449708a9669696a9d45dc12d62d0dd60618e438564c2c2163a0a40f19cb2695e,2024-05-22T12:46:53.887000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user