mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-03-16T00:55:29.895665+00:00
This commit is contained in:
parent
53f93e6ffa
commit
dfb3e1561d
20
CVE-2024/CVE-2024-232xx/CVE-2024-23298.json
Normal file
20
CVE-2024/CVE-2024-232xx/CVE-2024-23298.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-23298",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-15T23:15:07.403",
|
||||
"lastModified": "2024-03-15T23:15:07.403",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logic issue was addressed with improved state management."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214092",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2024/CVE-2024-25xx/CVE-2024-2514.json
Normal file
88
CVE-2024/CVE-2024-25xx/CVE-2024-2514.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-2514",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-15T23:15:08.423",
|
||||
"lastModified": "2024-03-15T23:15:08.423",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in MAGESH-K21 Online-College-Event-Hall-Reservation-System 1.0. Affected by this vulnerability is an unknown functionality of the file /login.php. The manipulation of the argument email leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256951. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 7.5
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20Auth%20bypass%20-%20login.php.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256951",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256951",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-288xx/CVE-2024-28859.json
Normal file
59
CVE-2024/CVE-2024-288xx/CVE-2024-28859.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-28859",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-15T23:15:08.117",
|
||||
"lastModified": "2024-03-15T23:15:08.117",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Symfony1 is a community fork of symfony 1.4 with DIC, form enhancements, latest Swiftmailer, better performance, composer compatible and PHP 8 support. Symfony 1 has a gadget chain due to vulnerable Swift Mailer dependency that would enable an attacker to get remote code execution if a developer unserialize user input in his project. This vulnerability present no direct threat but is a vector that will enable remote code execution if a developper deserialize user untrusted data. Symfony 1 depends on Swift Mailer which is bundled by default in vendor directory in the default installation since 1.3.0. Swift Mailer classes implement some `__destruct()` methods. These methods are called when php destroys the object in memory. However, it is possible to include any object type in `$this->_keys` to make PHP access to another array/object properties than intended by the developer. In particular, it is possible to abuse the array access which is triggered on foreach($this->_keys ...) for any class implementing ArrayAccess interface. This may allow an attacker to execute any PHP command which leads to remote code execution. This issue has been addressed in version 1.5.18. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/FriendsOfSymfony1/symfony1/commit/edb850f94fb4de18ca53d0d1824910d6e8130166",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/FriendsOfSymfony1/symfony1/security/advisories/GHSA-wjv8-pxr6-5f4r",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-288xx/CVE-2024-28862.json
Normal file
55
CVE-2024/CVE-2024-288xx/CVE-2024-28862.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-28862",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-16T00:15:07.570",
|
||||
"lastModified": "2024-03-16T00:15:07.570",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Ruby One Time Password library (ROTP) is an open source library for generating and validating one time passwords. Affected versions had overly permissive default permissions. Users should patch to version 6.3.0. Users unable to patch may correct file permissions after installation."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mdp/rotp/security/advisories/GHSA-x2h8-qmj4-g62f",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
37
README.md
37
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-15T23:00:38.529028+00:00
|
||||
2024-03-16T00:55:29.895665+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-15T21:15:07.823000+00:00
|
||||
2024-03-16T00:15:07.570000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,38 +29,17 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
241662
|
||||
241666
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `27`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
* [CVE-2021-47111](CVE-2021/CVE-2021-471xx/CVE-2021-47111.json) (`2024-03-15T21:15:06.577`)
|
||||
* [CVE-2021-47112](CVE-2021/CVE-2021-471xx/CVE-2021-47112.json) (`2024-03-15T21:15:06.627`)
|
||||
* [CVE-2021-47113](CVE-2021/CVE-2021-471xx/CVE-2021-47113.json) (`2024-03-15T21:15:06.673`)
|
||||
* [CVE-2021-47114](CVE-2021/CVE-2021-471xx/CVE-2021-47114.json) (`2024-03-15T21:15:06.723`)
|
||||
* [CVE-2021-47115](CVE-2021/CVE-2021-471xx/CVE-2021-47115.json) (`2024-03-15T21:15:06.780`)
|
||||
* [CVE-2021-47116](CVE-2021/CVE-2021-471xx/CVE-2021-47116.json) (`2024-03-15T21:15:06.837`)
|
||||
* [CVE-2021-47117](CVE-2021/CVE-2021-471xx/CVE-2021-47117.json) (`2024-03-15T21:15:06.887`)
|
||||
* [CVE-2021-47118](CVE-2021/CVE-2021-471xx/CVE-2021-47118.json) (`2024-03-15T21:15:06.943`)
|
||||
* [CVE-2021-47119](CVE-2021/CVE-2021-471xx/CVE-2021-47119.json) (`2024-03-15T21:15:07.013`)
|
||||
* [CVE-2021-47120](CVE-2021/CVE-2021-471xx/CVE-2021-47120.json) (`2024-03-15T21:15:07.060`)
|
||||
* [CVE-2021-47121](CVE-2021/CVE-2021-471xx/CVE-2021-47121.json) (`2024-03-15T21:15:07.107`)
|
||||
* [CVE-2021-47122](CVE-2021/CVE-2021-471xx/CVE-2021-47122.json) (`2024-03-15T21:15:07.157`)
|
||||
* [CVE-2021-47123](CVE-2021/CVE-2021-471xx/CVE-2021-47123.json) (`2024-03-15T21:15:07.217`)
|
||||
* [CVE-2021-47124](CVE-2021/CVE-2021-471xx/CVE-2021-47124.json) (`2024-03-15T21:15:07.260`)
|
||||
* [CVE-2021-47125](CVE-2021/CVE-2021-471xx/CVE-2021-47125.json) (`2024-03-15T21:15:07.307`)
|
||||
* [CVE-2021-47126](CVE-2021/CVE-2021-471xx/CVE-2021-47126.json) (`2024-03-15T21:15:07.357`)
|
||||
* [CVE-2021-47127](CVE-2021/CVE-2021-471xx/CVE-2021-47127.json) (`2024-03-15T21:15:07.417`)
|
||||
* [CVE-2021-47128](CVE-2021/CVE-2021-471xx/CVE-2021-47128.json) (`2024-03-15T21:15:07.470`)
|
||||
* [CVE-2021-47129](CVE-2021/CVE-2021-471xx/CVE-2021-47129.json) (`2024-03-15T21:15:07.523`)
|
||||
* [CVE-2021-47130](CVE-2021/CVE-2021-471xx/CVE-2021-47130.json) (`2024-03-15T21:15:07.577`)
|
||||
* [CVE-2021-47131](CVE-2021/CVE-2021-471xx/CVE-2021-47131.json) (`2024-03-15T21:15:07.623`)
|
||||
* [CVE-2021-47132](CVE-2021/CVE-2021-471xx/CVE-2021-47132.json) (`2024-03-15T21:15:07.690`)
|
||||
* [CVE-2021-47133](CVE-2021/CVE-2021-471xx/CVE-2021-47133.json) (`2024-03-15T21:15:07.733`)
|
||||
* [CVE-2021-47134](CVE-2021/CVE-2021-471xx/CVE-2021-47134.json) (`2024-03-15T21:15:07.780`)
|
||||
* [CVE-2021-47135](CVE-2021/CVE-2021-471xx/CVE-2021-47135.json) (`2024-03-15T21:15:07.823`)
|
||||
* [CVE-2024-23298](CVE-2024/CVE-2024-232xx/CVE-2024-23298.json) (`2024-03-15T23:15:07.403`)
|
||||
* [CVE-2024-2514](CVE-2024/CVE-2024-25xx/CVE-2024-2514.json) (`2024-03-15T23:15:08.423`)
|
||||
* [CVE-2024-28859](CVE-2024/CVE-2024-288xx/CVE-2024-28859.json) (`2024-03-15T23:15:08.117`)
|
||||
* [CVE-2024-28862](CVE-2024/CVE-2024-288xx/CVE-2024-28862.json) (`2024-03-16T00:15:07.570`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
58
_state.csv
58
_state.csv
@ -186812,33 +186812,33 @@ CVE-2021-47105,0,0,d4a5cdbdc9d16b8bd07aacf8b2e5af6c0d7f770f7cc60272932a76f8735c1
|
||||
CVE-2021-47106,0,0,86ebd1fa61494e895c69513cedb71c684b607737a48f7970c5f1f8bffaa887cd,2024-03-05T13:41:01.900000
|
||||
CVE-2021-47107,0,0,64c4342c4ecd2457fb78be1cc4dc86937da947b29ab872298b4b912db10a0f03,2024-03-05T13:41:01.900000
|
||||
CVE-2021-47108,0,0,c2a5ea47da5e115902ec6c49dc3afa3870f3f12bcdf41a2b2c8201ac60673354,2024-03-05T13:41:01.900000
|
||||
CVE-2021-47109,1,1,ce6b03d903d9f6be905f959476e894779d96ba2770f731c6ea11b7f10720918b,2024-03-15T21:15:06.457000
|
||||
CVE-2021-47110,1,1,7bbc492794564c9effb63e3254fc2b5d6b556a4d2539e032cc65a1891264ee91,2024-03-15T21:15:06.530000
|
||||
CVE-2021-47111,1,1,6ab3e7a1217cc00e79c65fdfbc3e8f13b8d878f84be3361ac5858fae049de6e7,2024-03-15T21:15:06.577000
|
||||
CVE-2021-47112,1,1,767cd084cb517662ef2bba66625f80fac272a5b19f5e27f60a4171b520be56c6,2024-03-15T21:15:06.627000
|
||||
CVE-2021-47113,1,1,7b41c8a87e2677ff476366d8b59bf106d6ca989b8ee0c2d8dec660108eeb074b,2024-03-15T21:15:06.673000
|
||||
CVE-2021-47114,1,1,4b5c00db2d7ab0fc95bc2412d35e867687adc9a9a046c5713f5b035175561ab8,2024-03-15T21:15:06.723000
|
||||
CVE-2021-47115,1,1,5525ab6b437031ede92ff7ffbfd60d2fafd6756bc37c9fc008fca95d7b96f12c,2024-03-15T21:15:06.780000
|
||||
CVE-2021-47116,1,1,d51875e5ee6abca1387442ad957afc1ce7f94fc39b81095b835c0332fcd25100,2024-03-15T21:15:06.837000
|
||||
CVE-2021-47117,1,1,fd1d9523b3e848f7b8845132f0d077386a88b52ee3fbb75bdc5c94f24c38cfbe,2024-03-15T21:15:06.887000
|
||||
CVE-2021-47118,1,1,a56d6167fa410a08c1fa5c11d1c134708bbe4b3df8acd9b0b4348706d93b127a,2024-03-15T21:15:06.943000
|
||||
CVE-2021-47119,1,1,83a589d5e83b72447c0cce40239d3afb7adb2b5cabc1a1a303f5ae18978e8624,2024-03-15T21:15:07.013000
|
||||
CVE-2021-47120,1,1,9a362fa6d870b275c887882815a6a41a28f83f82b50b386aece6bd32f699b2bf,2024-03-15T21:15:07.060000
|
||||
CVE-2021-47121,1,1,b483724bc119a462e3b19e7819141909ddaa00d9a3c4a6ee33ea94d07f1195f9,2024-03-15T21:15:07.107000
|
||||
CVE-2021-47122,1,1,d9cf8e88d58e45f922daf3013c5a33c4460b98effcfa60faaac55c09b00f9cea,2024-03-15T21:15:07.157000
|
||||
CVE-2021-47123,1,1,cc2000197fe279f9e35a024b11f909d25d47e5b6ab43a7c49a9f22df006baab5,2024-03-15T21:15:07.217000
|
||||
CVE-2021-47124,1,1,6b1757ace4aa336f8da8130dcc69a5946028df691f072ac206b16fcc8f62a457,2024-03-15T21:15:07.260000
|
||||
CVE-2021-47125,1,1,952076a43f9a2ec0cb3f1bb66e29ba8a3b0d6d3f6ae7cdf8c8506ed586a0f7e9,2024-03-15T21:15:07.307000
|
||||
CVE-2021-47126,1,1,d359df394da746253881a70f893e24c56c093854e9d9106f5211e8c5e7124226,2024-03-15T21:15:07.357000
|
||||
CVE-2021-47127,1,1,e35d1a3cae6fe375ee038e748244bc119a34cc453d012e7f0c7586f9257a1c86,2024-03-15T21:15:07.417000
|
||||
CVE-2021-47128,1,1,cf75f7dcb165795f2873d67df106fe194809e2588f9012d0bbadfd044cfaacda,2024-03-15T21:15:07.470000
|
||||
CVE-2021-47129,1,1,87bc02b1cd48c4ae58ba0c319bbc88f378de667cd5c35a3fddf3a969973109ee,2024-03-15T21:15:07.523000
|
||||
CVE-2021-47130,1,1,632d583aa98b93ba6e9e06432f8d210a3df385d310eba483e00b8df9a4709a31,2024-03-15T21:15:07.577000
|
||||
CVE-2021-47131,1,1,a7a7ddb390af376acda371af1e62e35462037a5f613402da868852bf017886ab,2024-03-15T21:15:07.623000
|
||||
CVE-2021-47132,1,1,904aad6376cd18b2f4696ca3bca50b2414d8a33696f346cffde3fc2fdbe7d268,2024-03-15T21:15:07.690000
|
||||
CVE-2021-47133,1,1,51ffaaec5b45f2a09158e14ec014d8485896f93192861198cd37de8e1a3cf8f6,2024-03-15T21:15:07.733000
|
||||
CVE-2021-47134,1,1,a5fcc48063e18e29e77f9d09561221e9417032a6392add5d6ab2f933c1f041d5,2024-03-15T21:15:07.780000
|
||||
CVE-2021-47135,1,1,4878fee0f7716b7b386d5d5bc0358217f2eb6ab74fe1c6f8fc3eaabdf207e4b6,2024-03-15T21:15:07.823000
|
||||
CVE-2021-47109,0,0,ce6b03d903d9f6be905f959476e894779d96ba2770f731c6ea11b7f10720918b,2024-03-15T21:15:06.457000
|
||||
CVE-2021-47110,0,0,7bbc492794564c9effb63e3254fc2b5d6b556a4d2539e032cc65a1891264ee91,2024-03-15T21:15:06.530000
|
||||
CVE-2021-47111,0,0,6ab3e7a1217cc00e79c65fdfbc3e8f13b8d878f84be3361ac5858fae049de6e7,2024-03-15T21:15:06.577000
|
||||
CVE-2021-47112,0,0,767cd084cb517662ef2bba66625f80fac272a5b19f5e27f60a4171b520be56c6,2024-03-15T21:15:06.627000
|
||||
CVE-2021-47113,0,0,7b41c8a87e2677ff476366d8b59bf106d6ca989b8ee0c2d8dec660108eeb074b,2024-03-15T21:15:06.673000
|
||||
CVE-2021-47114,0,0,4b5c00db2d7ab0fc95bc2412d35e867687adc9a9a046c5713f5b035175561ab8,2024-03-15T21:15:06.723000
|
||||
CVE-2021-47115,0,0,5525ab6b437031ede92ff7ffbfd60d2fafd6756bc37c9fc008fca95d7b96f12c,2024-03-15T21:15:06.780000
|
||||
CVE-2021-47116,0,0,d51875e5ee6abca1387442ad957afc1ce7f94fc39b81095b835c0332fcd25100,2024-03-15T21:15:06.837000
|
||||
CVE-2021-47117,0,0,fd1d9523b3e848f7b8845132f0d077386a88b52ee3fbb75bdc5c94f24c38cfbe,2024-03-15T21:15:06.887000
|
||||
CVE-2021-47118,0,0,a56d6167fa410a08c1fa5c11d1c134708bbe4b3df8acd9b0b4348706d93b127a,2024-03-15T21:15:06.943000
|
||||
CVE-2021-47119,0,0,83a589d5e83b72447c0cce40239d3afb7adb2b5cabc1a1a303f5ae18978e8624,2024-03-15T21:15:07.013000
|
||||
CVE-2021-47120,0,0,9a362fa6d870b275c887882815a6a41a28f83f82b50b386aece6bd32f699b2bf,2024-03-15T21:15:07.060000
|
||||
CVE-2021-47121,0,0,b483724bc119a462e3b19e7819141909ddaa00d9a3c4a6ee33ea94d07f1195f9,2024-03-15T21:15:07.107000
|
||||
CVE-2021-47122,0,0,d9cf8e88d58e45f922daf3013c5a33c4460b98effcfa60faaac55c09b00f9cea,2024-03-15T21:15:07.157000
|
||||
CVE-2021-47123,0,0,cc2000197fe279f9e35a024b11f909d25d47e5b6ab43a7c49a9f22df006baab5,2024-03-15T21:15:07.217000
|
||||
CVE-2021-47124,0,0,6b1757ace4aa336f8da8130dcc69a5946028df691f072ac206b16fcc8f62a457,2024-03-15T21:15:07.260000
|
||||
CVE-2021-47125,0,0,952076a43f9a2ec0cb3f1bb66e29ba8a3b0d6d3f6ae7cdf8c8506ed586a0f7e9,2024-03-15T21:15:07.307000
|
||||
CVE-2021-47126,0,0,d359df394da746253881a70f893e24c56c093854e9d9106f5211e8c5e7124226,2024-03-15T21:15:07.357000
|
||||
CVE-2021-47127,0,0,e35d1a3cae6fe375ee038e748244bc119a34cc453d012e7f0c7586f9257a1c86,2024-03-15T21:15:07.417000
|
||||
CVE-2021-47128,0,0,cf75f7dcb165795f2873d67df106fe194809e2588f9012d0bbadfd044cfaacda,2024-03-15T21:15:07.470000
|
||||
CVE-2021-47129,0,0,87bc02b1cd48c4ae58ba0c319bbc88f378de667cd5c35a3fddf3a969973109ee,2024-03-15T21:15:07.523000
|
||||
CVE-2021-47130,0,0,632d583aa98b93ba6e9e06432f8d210a3df385d310eba483e00b8df9a4709a31,2024-03-15T21:15:07.577000
|
||||
CVE-2021-47131,0,0,a7a7ddb390af376acda371af1e62e35462037a5f613402da868852bf017886ab,2024-03-15T21:15:07.623000
|
||||
CVE-2021-47132,0,0,904aad6376cd18b2f4696ca3bca50b2414d8a33696f346cffde3fc2fdbe7d268,2024-03-15T21:15:07.690000
|
||||
CVE-2021-47133,0,0,51ffaaec5b45f2a09158e14ec014d8485896f93192861198cd37de8e1a3cf8f6,2024-03-15T21:15:07.733000
|
||||
CVE-2021-47134,0,0,a5fcc48063e18e29e77f9d09561221e9417032a6392add5d6ab2f933c1f041d5,2024-03-15T21:15:07.780000
|
||||
CVE-2021-47135,0,0,4878fee0f7716b7b386d5d5bc0358217f2eb6ab74fe1c6f8fc3eaabdf207e4b6,2024-03-15T21:15:07.823000
|
||||
CVE-2022-0001,0,0,eef83f8ee034200b042b5eda26b679b982266672cf1407daf8d9fbe1ba7937b5,2022-08-19T12:28:32.903000
|
||||
CVE-2022-0002,0,0,4ba989879ca817729e7cddc36d35dc20834fb13fd71d0cce189890fe2defbd53,2022-08-19T12:28:50.667000
|
||||
CVE-2022-0004,0,0,4891f62a2edc2f307dec62ec3f2089232f3fddba4652b7ef635786ed0f8a2286,2022-06-10T20:52:37.810000
|
||||
@ -240138,6 +240138,7 @@ CVE-2024-23294,0,0,c0cdcedc3bcfe664ab02fca520276a0c72a6eafb77125bfc3a4566d618829
|
||||
CVE-2024-23295,0,0,743f5eabb2b6d4f98b7103afe617defce53a2964c31cc5fb435d1e716a86d3b5,2024-03-13T23:15:47.630000
|
||||
CVE-2024-23296,0,0,322a9bff1dffd6e7a438ed16a632e25fb3ad5498f5ba7a6fb585162df6fe0874,2024-03-13T23:15:47.673000
|
||||
CVE-2024-23297,0,0,11090791f72ea9d35b8fb354b91b4b823c54cb3e7511d3c9883ee2b46d74ae89,2024-03-13T22:15:11.520000
|
||||
CVE-2024-23298,1,1,b3c2e2fa55a339e4c681fa4c9e5fdbe16092538bc0074ad8da26c63a64af4332,2024-03-15T23:15:07.403000
|
||||
CVE-2024-2330,0,0,0a9f9e37587f34158a3bf6f7d53eb1a5e641504fa11cf02eb4524614459dfa8a,2024-03-11T01:32:29.610000
|
||||
CVE-2024-23300,0,0,9e732c262847100dbcf579b4c37b4c875c53e2f23045a19a85b558ff38956aa4,2024-03-13T22:15:11.643000
|
||||
CVE-2024-23301,0,0,95f1c4c0d3c3f56beb5ca2f43c481bd416943d89ac106cdf8ea6bddea7fc220a,2024-02-21T03:15:08.950000
|
||||
@ -240862,6 +240863,7 @@ CVE-2024-25128,0,0,172c5f0d62603832e5d7859a4a8be0b3217ee5b1e8ffd030ff8a010d7f347
|
||||
CVE-2024-25129,0,0,94b297a9d28866e9e3344e76c82b40cabac4f54bd9e83f1602ef019da71f96a9,2024-02-23T02:42:54.547000
|
||||
CVE-2024-25130,0,0,9ed6bdd2e0b9e9a9c6f507d6c013b142ff6c3cd551628d5ce4a7cec9082ee81a,2024-02-23T02:42:54.547000
|
||||
CVE-2024-25139,0,0,434a1a8570432b07a345e2d4d94e9a66656e3c23943681acca2835cd987627db,2024-03-14T18:11:35.910000
|
||||
CVE-2024-2514,1,1,ec9cf6ee58ec4a80f29edf0b88868776b3008a09ebf18ec17753b7b2ab7476f3,2024-03-15T23:15:08.423000
|
||||
CVE-2024-25140,0,0,910924059f66fa65d93f5323847e59d03704b67134867a3ac9eb665a02a38fa2,2024-02-14T00:26:27.847000
|
||||
CVE-2024-25141,0,0,29fa0c24f25cecd1df32a87cb8d97e893df4f50e0ef569f7fd7f97de363aa71b,2024-02-20T22:15:08.670000
|
||||
CVE-2024-25143,0,0,ed1d5e0e430dd07199fade8c66d12e89ec5dc7886fca4f2d677be809afcc5ced,2024-02-07T17:04:54.407000
|
||||
@ -241661,3 +241663,5 @@ CVE-2024-28848,0,0,9f8c7225595322059d38724bed1ba04ddee2b018a02cfd745103d16e54c30
|
||||
CVE-2024-28849,0,0,3fd4e14c66f66b904cf6ec0b520762c4afbd3156d6cd6b7fed8cfe38b4a83639,2024-03-14T18:11:35.910000
|
||||
CVE-2024-28851,0,0,798126238be42ab31bcc9bf0f8d435b66bd783f1ed035f2a602c408bbf00f729,2024-03-15T19:15:07.410000
|
||||
CVE-2024-28854,0,0,080f89fa07a13dfa79a052e6e6ea26c27be4f160b372d6bc4c0a2de6bf56ca0c,2024-03-15T19:15:07.627000
|
||||
CVE-2024-28859,1,1,52855aad5be716ba80b4cf84fcf4f2529faafd01cd3f966c6a96eb3a25e30594,2024-03-15T23:15:08.117000
|
||||
CVE-2024-28862,1,1,adf5798b6f3addbb5241f837f203e9f0eed6e8c1190dc5019d8454d4cc34f010,2024-03-16T00:15:07.570000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user