mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-06-30T20:00:44.918095+00:00
This commit is contained in:
parent
0e6f6ad227
commit
d56cd69198
60
CVE-2023/CVE-2023-509xx/CVE-2023-50952.json
Normal file
60
CVE-2023/CVE-2023-509xx/CVE-2023-50952.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2023-50952",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-06-30T18:15:02.733",
|
||||
"lastModified": "2024-06-30T18:15:02.733",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM InfoSphere Information Server 11.7 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 275774."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275774",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7158437",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2023/CVE-2023-509xx/CVE-2023-50953.json
Normal file
60
CVE-2023/CVE-2023-509xx/CVE-2023-50953.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2023-50953",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-06-30T18:15:02.970",
|
||||
"lastModified": "2024-06-30T18:15:02.970",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM InfoSphere Information Server 11.7 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned. This information could be used in further attacks against the system. IBM X-Force ID: 275775."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-209"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275775",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7159057",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2023/CVE-2023-509xx/CVE-2023-50964.json
Normal file
60
CVE-2023/CVE-2023-509xx/CVE-2023-50964.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2023-50964",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-06-30T19:15:02.007",
|
||||
"lastModified": "2024-06-30T19:15:02.007",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 276102."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/276102",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7159060",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-287xx/CVE-2024-28794.json
Normal file
60
CVE-2024/CVE-2024-287xx/CVE-2024-28794.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-28794",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-06-30T19:15:02.233",
|
||||
"lastModified": "2024-06-30T19:15:02.233",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 286831."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/286831",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7158444",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-287xx/CVE-2024-28797.json
Normal file
60
CVE-2024/CVE-2024-287xx/CVE-2024-28797.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-28797",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-06-30T18:15:03.480",
|
||||
"lastModified": "2024-06-30T18:15:03.480",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM InfoSphere Information Server 11.7 is vulnerable stored to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 287136."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287136",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7158431",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-318xx/CVE-2024-31898.json
Normal file
60
CVE-2024/CVE-2024-318xx/CVE-2024-31898.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-31898",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-06-30T18:15:03.693",
|
||||
"lastModified": "2024-06-30T18:15:03.693",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM InfoSphere Information Server 11.7 could allow an authenticated user to read or modify sensitive information by bypassing authentication using insecure direct object references. IBM X-Force ID: 288182."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/288182",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7158425",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
21
README.md
21
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-30T18:00:21.048879+00:00
|
||||
2024-06-30T20:00:44.918095+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-30T17:15:03.153000+00:00
|
||||
2024-06-30T19:15:02.233000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,20 +33,19 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
255507
|
||||
255513
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2023-35022](CVE-2023/CVE-2023-350xx/CVE-2023-35022.json) (`2024-06-30T16:15:02.600`)
|
||||
- [CVE-2023-50954](CVE-2023/CVE-2023-509xx/CVE-2023-50954.json) (`2024-06-30T17:15:02.470`)
|
||||
- [CVE-2024-28795](CVE-2024/CVE-2024-287xx/CVE-2024-28795.json) (`2024-06-30T16:15:02.987`)
|
||||
- [CVE-2024-28798](CVE-2024/CVE-2024-287xx/CVE-2024-28798.json) (`2024-06-30T17:15:02.720`)
|
||||
- [CVE-2024-31902](CVE-2024/CVE-2024-319xx/CVE-2024-31902.json) (`2024-06-30T17:15:02.923`)
|
||||
- [CVE-2024-35119](CVE-2024/CVE-2024-351xx/CVE-2024-35119.json) (`2024-06-30T17:15:03.153`)
|
||||
- [CVE-2024-5062](CVE-2024/CVE-2024-50xx/CVE-2024-5062.json) (`2024-06-30T16:15:03.217`)
|
||||
- [CVE-2023-50952](CVE-2023/CVE-2023-509xx/CVE-2023-50952.json) (`2024-06-30T18:15:02.733`)
|
||||
- [CVE-2023-50953](CVE-2023/CVE-2023-509xx/CVE-2023-50953.json) (`2024-06-30T18:15:02.970`)
|
||||
- [CVE-2023-50964](CVE-2023/CVE-2023-509xx/CVE-2023-50964.json) (`2024-06-30T19:15:02.007`)
|
||||
- [CVE-2024-28794](CVE-2024/CVE-2024-287xx/CVE-2024-28794.json) (`2024-06-30T19:15:02.233`)
|
||||
- [CVE-2024-28797](CVE-2024/CVE-2024-287xx/CVE-2024-28797.json) (`2024-06-30T18:15:03.480`)
|
||||
- [CVE-2024-31898](CVE-2024/CVE-2024-318xx/CVE-2024-31898.json) (`2024-06-30T18:15:03.693`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
20
_state.csv
20
_state.csv
@ -226041,7 +226041,7 @@ CVE-2023-35018,0,0,0740e92751ade7cc18b1f554af4cf823e2aafc087f99c1bc0b052d47163f3
|
||||
CVE-2023-35019,0,0,7a1aebfa7c1d8452ead17bc55aa79dfd7cccc82a067d10ba856bbab6cefd4f37,2023-08-04T17:23:56.413000
|
||||
CVE-2023-3502,0,0,302fb1d5bd5743d734a07b72e0538f873a2636c89266e46579bdeab79529bbc5,2024-05-17T02:27:32.370000
|
||||
CVE-2023-35020,0,0,a56e5414c215dac3cc405b9d4361a2fe76232d53870262091227d01b8aabefa2,2024-01-24T21:38:11.280000
|
||||
CVE-2023-35022,1,1,0541bac70f1933849cb82e440357fcc3491321ee0a3272bfa43196741e36d0ff,2024-06-30T16:15:02.600000
|
||||
CVE-2023-35022,0,0,0541bac70f1933849cb82e440357fcc3491321ee0a3272bfa43196741e36d0ff,2024-06-30T16:15:02.600000
|
||||
CVE-2023-35024,0,0,1ecf47a0b86bc02884af00b7eabcb558d32c4df794f8d7331a088e35c2b97fda,2023-10-18T21:04:02.917000
|
||||
CVE-2023-35029,0,0,65adbe0e4dac0fa608e92fc04d22ecaf7d4b82b325012924bbebcbbc80cbf1c0,2023-06-22T16:51:23.137000
|
||||
CVE-2023-3503,0,0,c6abbd30c8521c47d1ae7cf0398b364788b08345eeb291320098a60d82c9fd2c,2024-05-17T02:27:32.480000
|
||||
@ -237352,7 +237352,9 @@ CVE-2023-50948,0,0,3c02519a72037dff711d5ee48432aa7f2b5638da69466874289b5ec8a9701
|
||||
CVE-2023-50949,0,0,05099c94caa797bc55ec09b8ff46351e2b7dda33262efba30ca113b16d3acf90,2024-04-12T12:44:04.930000
|
||||
CVE-2023-50950,0,0,dfea2c60bf930725232ee8dec76ee1dc7db647db5a23e4d3c95d00ce14c241f2,2024-01-24T19:42:29.450000
|
||||
CVE-2023-50951,0,0,ac9a2ba6b69cc6219b314f88f75f8d16d80977a7838c8861bc4cc4a5a90b32d2,2024-02-20T19:50:53.960000
|
||||
CVE-2023-50954,1,1,cd28b9f2a6eb84f79dffe7b3ed168d5a7dc92dd5eba345b0866635e9f903a3aa,2024-06-30T17:15:02.470000
|
||||
CVE-2023-50952,1,1,214157c0c9dc9e309d6f0a4359b410b3ce0dadd6acd5fd4462de91fe9605c594,2024-06-30T18:15:02.733000
|
||||
CVE-2023-50953,1,1,6f1dd2b712dca3790293e891ea7b3c19d9bc58239f13f04e90aad630ba8c903b,2024-06-30T18:15:02.970000
|
||||
CVE-2023-50954,0,0,cd28b9f2a6eb84f79dffe7b3ed168d5a7dc92dd5eba345b0866635e9f903a3aa,2024-06-30T17:15:02.470000
|
||||
CVE-2023-50955,0,0,2dac25424bb634048955c93e845cd595a5737c34f7a73119031e8a018fd0e20a,2024-02-22T19:07:27.197000
|
||||
CVE-2023-50957,0,0,a38d290def706a6975d8b2902c3d1f58a6074172158e1685b40a6a512f9caf13,2024-02-15T04:37:53.297000
|
||||
CVE-2023-50959,0,0,568717d1c5e9b7aee1be9083e54c56d344f91074f581c8ef3e925eba18620c0a,2024-04-02T17:56:18.897000
|
||||
@ -237360,6 +237362,7 @@ CVE-2023-5096,0,0,1b0896fcd5a16a2bfc5ce288684748ddee835572b804e4af539b42517b79d3
|
||||
CVE-2023-50961,0,0,d711d4a9d8ad627716324633a649c2a8b70ff648c86857e4b94f3b50216da091,2024-03-27T15:49:51.300000
|
||||
CVE-2023-50962,0,0,365daa63183eee3bc8e35da897e2163d0fc458ef66adb39b8eb249f4c8a968ff,2024-02-12T14:31:36.920000
|
||||
CVE-2023-50963,0,0,f8ab53d3916fdeb747721dbad810b91a4d8cca1f3447b9dedd0b7a0a236caf08,2024-01-24T21:22:22.293000
|
||||
CVE-2023-50964,1,1,8e9c38aa40e1bbdd98bdb4dea21478d59ddc547ce681076c9051314b28c5c9af,2024-06-30T19:15:02.007000
|
||||
CVE-2023-50965,0,0,7d1de52a11bce456c4c16ef773b97b5e53898c75617739b3525f486b2a63242b,2023-12-20T20:02:23.497000
|
||||
CVE-2023-50966,0,0,a6b32088d0a5d6ef9a7d587370f326ae2061a7a42b121ce18c85e023136aaec3,2024-03-19T16:33:58.680000
|
||||
CVE-2023-50967,0,0,bb1533384c54817eac919409a9c4a4f7b98f5730662b59bf4ce17ad616d7daee,2024-04-19T23:15:09.330000
|
||||
@ -247980,8 +247983,10 @@ CVE-2024-28784,0,0,c979b0334a0081e1847a4bc955e67dbbc0397aed136c4d3aa1b489c4f3f26
|
||||
CVE-2024-28787,0,0,466884053e2fb97771b0b18e87658d91d7f6894823937327962bdc9b1ecfdc33,2024-04-04T19:24:50.670000
|
||||
CVE-2024-2879,0,0,b3cb63a21efa9503ae3e8fbd2c3fbecce8466a6f50871d6397f8e38479a77e62,2024-04-08T22:49:41.533000
|
||||
CVE-2024-28793,0,0,0971b91b249c500bf4e72fc37951e1fea5132a60c7834326b93f07f92baebfb6,2024-06-10T18:15:29.983000
|
||||
CVE-2024-28795,1,1,cdcc3ce008679975bf496c8bd14b637e1ba080c5295dbaca41aef374af5c9d06,2024-06-30T16:15:02.987000
|
||||
CVE-2024-28798,1,1,3ed41b05d7d28d830091bb6df2fa27e3e32bb2a125c831d0251b397ac1a3e5a2,2024-06-30T17:15:02.720000
|
||||
CVE-2024-28794,1,1,fea3931f90b9f84cf4c733c8b13103f1c0ea3743e99a2912dcf009b5c0fcff09,2024-06-30T19:15:02.233000
|
||||
CVE-2024-28795,0,0,cdcc3ce008679975bf496c8bd14b637e1ba080c5295dbaca41aef374af5c9d06,2024-06-30T16:15:02.987000
|
||||
CVE-2024-28797,1,1,cb656ca0fb48c752719361d8d555f4dcc2a45188759fd6cb1344b5a0a55b05dd,2024-06-30T18:15:03.480000
|
||||
CVE-2024-28798,0,0,3ed41b05d7d28d830091bb6df2fa27e3e32bb2a125c831d0251b397ac1a3e5a2,2024-06-30T17:15:02.720000
|
||||
CVE-2024-28815,0,0,e7bdcd0ac6977f9c059dbb312ad54d9a388fdc8f6a137aa4ed5f32fc20fa20fd,2024-04-30T07:15:48.897000
|
||||
CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000
|
||||
CVE-2024-28818,0,0,d36b119687f46041625483716221e120ac5cbacfed027a7a801d492a6a4c86c8,2024-06-27T16:43:48.633000
|
||||
@ -250013,8 +250018,9 @@ CVE-2024-31890,0,0,eda850bb7869648d895763435641ab97f0cfe4aeba8f677c829b9f47f4e39
|
||||
CVE-2024-31893,0,0,12d01c628fd750c0cbf441575efefbf394d1654280d687a3cb134821594970b6,2024-05-24T01:15:30.977000
|
||||
CVE-2024-31894,0,0,5d58af989adc88e1f21decb4e4b73370061e14ed54479d7579f2f2b5b7332e1e,2024-05-24T01:15:30.977000
|
||||
CVE-2024-31895,0,0,38db7df97417d61bcac3e1b48b52fd0d409c4088497b5231955dcf460bac575b,2024-05-24T01:15:30.977000
|
||||
CVE-2024-31898,1,1,33566edd39449d6937cfe890ae696f9e487e7e051ba641cc870b458befd5ee22,2024-06-30T18:15:03.693000
|
||||
CVE-2024-3190,0,0,c17e9142af04bd9f9561cc561aacffdced5eb94e572636fb91c22838cccaf428,2024-05-30T13:15:41.297000
|
||||
CVE-2024-31902,1,1,1157e96c42fe5e1f6cd50b8a219a0e329afeecd891787c4e2cd01170b9e9df82,2024-06-30T17:15:02.923000
|
||||
CVE-2024-31902,0,0,1157e96c42fe5e1f6cd50b8a219a0e329afeecd891787c4e2cd01170b9e9df82,2024-06-30T17:15:02.923000
|
||||
CVE-2024-31904,0,0,f581f8d898f5db4b0367557c06fa4b666380cc23610e816c03e35138e889ca3c,2024-05-24T01:15:30.977000
|
||||
CVE-2024-31907,0,0,74fc5f408c523c3e380d6171f8d45977925714d441f8877405f43a83b33e5a79,2024-05-31T19:14:47.793000
|
||||
CVE-2024-31908,0,0,4b6f6f2b5b77469838acbfd64e3ebfdfd371146b18e2852e2c5d6403c944f986,2024-05-31T19:14:47.793000
|
||||
@ -251935,7 +251941,7 @@ CVE-2024-35108,0,0,3d160490977cee5bde1d3bbae750736ca9206a5392ad0c8f4f20b1d705d7e
|
||||
CVE-2024-35109,0,0,1723de5edad4801c113dd0d41cbe0df6c36d556c862ef08d4faf7caa71ed9098,2024-05-15T16:40:19.330000
|
||||
CVE-2024-35110,0,0,07f2b4eefabbfedf17e2731cca374c4a367989ecaeb945f63f5af7217d209b46,2024-05-17T18:36:05.263000
|
||||
CVE-2024-35116,0,0,9c697630b0a101a448d7a42c518febe23846d0493633384b46dd2fdc78a4bba9,2024-06-28T19:15:05.677000
|
||||
CVE-2024-35119,1,1,827e197f7acd05a8eda8067dd48d9b971ee81a4cb317e57285911965a3b60a80,2024-06-30T17:15:03.153000
|
||||
CVE-2024-35119,0,0,827e197f7acd05a8eda8067dd48d9b971ee81a4cb317e57285911965a3b60a80,2024-06-30T17:15:03.153000
|
||||
CVE-2024-3512,0,0,7186c9ec3829c2082fd68b5fc8e23caed587fdf0f4e68c2974db5f41b90fb514,2024-04-25T13:15:51.663000
|
||||
CVE-2024-35137,0,0,fb0803e6012b4fe1c1e7923f12a0d146f47015ec3e4dc4d2e243d7f2271e8cf4,2024-06-28T16:15:04.150000
|
||||
CVE-2024-35139,0,0,9c4c3ff1414df1d8f7ba3e1b2fb542029621fea941b65b290ccd71ad73b74b67,2024-06-28T16:15:04.380000
|
||||
@ -254744,7 +254750,7 @@ CVE-2024-5056,0,0,5222bc315bf81dabb7f1134f85e7a3f8505dd3db79a8b19065f69d6579b775
|
||||
CVE-2024-5058,0,0,637bd6f1f70bb3cfae7399c322e9c60e1da8c71180964fd405021291b54a0ed9,2024-06-24T19:18:35.517000
|
||||
CVE-2024-5059,0,0,76adb31a0d874845cc73a32032185732178d0aa5e8e38a32237d0afd9c50a472,2024-06-24T18:49:29.467000
|
||||
CVE-2024-5060,0,0,908e82bd4ef2431179c104b39273fb8e5e968812815f848a9881f7577e0ff35b,2024-05-24T13:03:05.093000
|
||||
CVE-2024-5062,1,1,02205ab45facb8770e9ed7f7b71a2c1f4ce998b339e185923c3c09d1c3e2cf16,2024-06-30T16:15:03.217000
|
||||
CVE-2024-5062,0,0,02205ab45facb8770e9ed7f7b71a2c1f4ce998b339e185923c3c09d1c3e2cf16,2024-06-30T16:15:03.217000
|
||||
CVE-2024-5063,0,0,4f3b2bf7eda673978295341e9126ac2adcd5414f29702cc0cdbc012db466ad60,2024-06-04T19:20:57.760000
|
||||
CVE-2024-5064,0,0,8095cec9a36e031c818592c3e6e560630244970853fe1a2d62ef41815d0461b5,2024-06-04T19:20:57.870000
|
||||
CVE-2024-5065,0,0,854da1df0c358fed714b464bc000dc33fba39a0799286dd037bd479cf98e0180,2024-06-04T19:20:57.977000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user