mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-05-20T22:00:30.187293+00:00
This commit is contained in:
parent
dfdae7a355
commit
e212910b36
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2019-20180",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-01-09T21:15:11.933",
|
||||
"lastModified": "2023-11-07T03:08:40.207",
|
||||
"lastModified": "2024-05-20T21:15:08.827",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The TablePress plugin 1.9.2 for WordPress allows tablepress[data] CSV injection by Editor users."
|
||||
"value": "The TablePress plugin 1.9.2 for WordPress allows tablepress[data] CSV injection by Editor users. Note: The vendor disputes this issue and argues that this responsibility lies with the application that opens the CSV file and not TablePress."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
24
CVE-2024/CVE-2024-339xx/CVE-2024-33900.json
Normal file
24
CVE-2024/CVE-2024-339xx/CVE-2024-33900.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-33900",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-20T21:15:09.177",
|
||||
"lastModified": "2024-05-20T21:15:09.177",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "KeePassXC 2.7.7 allows attackers to recover cleartext credentials."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://keepassxc.org/blog/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-339xx/CVE-2024-33901.json
Normal file
24
CVE-2024/CVE-2024-339xx/CVE-2024-33901.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-33901",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-20T21:15:09.243",
|
||||
"lastModified": "2024-05-20T21:15:09.243",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Issue in KeePassXC 2.7.7 allows an attacker to recover some passwords stored in the .kdbx database."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://keepassxc.org/blog/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-351xx/CVE-2024-35191.json
Normal file
59
CVE-2024/CVE-2024-351xx/CVE-2024-35191.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-35191",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-05-20T21:15:09.307",
|
||||
"lastModified": "2024-05-20T21:15:09.307",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Formie is a Craft CMS plugin for creating forms. Prior to 2.1.6, users with access to a form's settings can include malicious Twig code into fields that support Twig. These might be the Submission Title or the Success Message. This code will then be executed upon creating a submission, or rendering the text. This has been fixed in Formie 2.1.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1336"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/verbb/formie/commit/90296edf7e707f117e760aa57e70dbd43a854420",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/verbb/formie/security/advisories/GHSA-v45m-hxqp-fwf5",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-351xx/CVE-2024-35192.json
Normal file
59
CVE-2024/CVE-2024-351xx/CVE-2024-35192.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-35192",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-05-20T21:15:09.550",
|
||||
"lastModified": "2024-05-20T21:15:09.550",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Trivy is a security scanner. Prior to 0.51.2, if a malicious actor is able to trigger Trivy to scan container images from a crafted malicious registry, it could result in the leakage of credentials for legitimate registries such as AWS Elastic Container Registry (ECR), Google Cloud Artifact/Container Registry, or Azure Container Registry (ACR). These tokens can then be used to push/pull images from those registries to which the identity/user running Trivy has access. Systems are not affected if the default credential provider chain is unable to obtain valid credentials. This vulnerability only applies when scanning container images directly from a registry. This vulnerability is fixed in 0.51.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-522"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/aquasecurity/trivy/commit/e7f14f729de259551203f313e57d2d9d3aa2ff87",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/aquasecurity/trivy/security/advisories/GHSA-xcq4-m2r3-cmrj",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-351xx/CVE-2024-35194.json
Normal file
59
CVE-2024/CVE-2024-351xx/CVE-2024-35194.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-35194",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-05-20T21:15:09.773",
|
||||
"lastModified": "2024-05-20T21:15:09.773",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Minder is a software supply chain security platform. Prior to version 0.0.50, Minder engine is susceptible to a denial of service from memory exhaustion that can be triggered from maliciously created templates. Minder engine uses templating to generate strings for various use cases such as URLs, messages for pull requests, descriptions for advisories. In some cases can the user control both the template and the params for it, and in a subset of these cases, Minder reads the generated template entirely into memory. When Minders templating meets both of these conditions, an attacker is able to generate large enough templates that Minder will exhaust memory and crash. This vulnerability is fixed in 0.0.50."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/stacklok/minder/commit/fe321d345b4f738de6a06b13207addc72b59f892",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/stacklok/minder/security/advisories/GHSA-crgc-2583-rw27",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-351xx/CVE-2024-35195.json
Normal file
63
CVE-2024/CVE-2024-351xx/CVE-2024-35195.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-35195",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-05-20T21:15:09.990",
|
||||
"lastModified": "2024-05-20T21:15:09.990",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Requests is a HTTP library. Prior to 2.32.0, when making requests through a Requests `Session`, if the first request is made with `verify=False` to disable cert verification, all subsequent requests to the same host will continue to ignore cert verification regardless of changes to the value of `verify`. This behavior will continue for the lifecycle of the connection in the connection pool. This vulnerability is fixed in 2.32.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.3,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-670"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/psf/requests/commit/a58d7f2ffb4d00b46dca2d70a3932a0b37e22fac",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/psf/requests/pull/6655",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/psf/requests/security/advisories/GHSA-9wx4-h78v-vm56",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
39
README.md
39
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-05-20T20:00:37.603204+00:00
|
||||
2024-05-20T22:00:30.187293+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-05-20T19:34:58.277000+00:00
|
||||
2024-05-20T21:15:09.990000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,41 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
250870
|
||||
250876
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `16`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2023-49331](CVE-2023/CVE-2023-493xx/CVE-2023-49331.json) (`2024-05-20T18:15:09.237`)
|
||||
- [CVE-2023-49332](CVE-2023/CVE-2023-493xx/CVE-2023-49332.json) (`2024-05-20T18:15:09.440`)
|
||||
- [CVE-2023-49333](CVE-2023/CVE-2023-493xx/CVE-2023-49333.json) (`2024-05-20T18:15:09.630`)
|
||||
- [CVE-2023-49334](CVE-2023/CVE-2023-493xx/CVE-2023-49334.json) (`2024-05-20T18:15:09.827`)
|
||||
- [CVE-2023-49335](CVE-2023/CVE-2023-493xx/CVE-2023-49335.json) (`2024-05-20T18:15:10.017`)
|
||||
- [CVE-2024-24293](CVE-2024/CVE-2024-242xx/CVE-2024-24293.json) (`2024-05-20T18:15:10.193`)
|
||||
- [CVE-2024-29000](CVE-2024/CVE-2024-290xx/CVE-2024-29000.json) (`2024-05-20T19:15:08.430`)
|
||||
- [CVE-2024-29651](CVE-2024/CVE-2024-296xx/CVE-2024-29651.json) (`2024-05-20T18:15:10.270`)
|
||||
- [CVE-2024-31714](CVE-2024/CVE-2024-317xx/CVE-2024-31714.json) (`2024-05-20T18:15:10.330`)
|
||||
- [CVE-2024-34193](CVE-2024/CVE-2024-341xx/CVE-2024-34193.json) (`2024-05-20T18:15:10.400`)
|
||||
- [CVE-2024-34949](CVE-2024/CVE-2024-349xx/CVE-2024-34949.json) (`2024-05-20T18:15:10.463`)
|
||||
- [CVE-2024-35571](CVE-2024/CVE-2024-355xx/CVE-2024-35571.json) (`2024-05-20T18:15:10.527`)
|
||||
- [CVE-2024-35576](CVE-2024/CVE-2024-355xx/CVE-2024-35576.json) (`2024-05-20T18:15:10.590`)
|
||||
- [CVE-2024-35578](CVE-2024/CVE-2024-355xx/CVE-2024-35578.json) (`2024-05-20T18:15:10.650`)
|
||||
- [CVE-2024-35579](CVE-2024/CVE-2024-355xx/CVE-2024-35579.json) (`2024-05-20T18:15:10.713`)
|
||||
- [CVE-2024-35580](CVE-2024/CVE-2024-355xx/CVE-2024-35580.json) (`2024-05-20T18:15:10.777`)
|
||||
- [CVE-2024-33900](CVE-2024/CVE-2024-339xx/CVE-2024-33900.json) (`2024-05-20T21:15:09.177`)
|
||||
- [CVE-2024-33901](CVE-2024/CVE-2024-339xx/CVE-2024-33901.json) (`2024-05-20T21:15:09.243`)
|
||||
- [CVE-2024-35191](CVE-2024/CVE-2024-351xx/CVE-2024-35191.json) (`2024-05-20T21:15:09.307`)
|
||||
- [CVE-2024-35192](CVE-2024/CVE-2024-351xx/CVE-2024-35192.json) (`2024-05-20T21:15:09.550`)
|
||||
- [CVE-2024-35194](CVE-2024/CVE-2024-351xx/CVE-2024-35194.json) (`2024-05-20T21:15:09.773`)
|
||||
- [CVE-2024-35195](CVE-2024/CVE-2024-351xx/CVE-2024-35195.json) (`2024-05-20T21:15:09.990`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `6`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2023-49330](CVE-2023/CVE-2023-493xx/CVE-2023-49330.json) (`2024-05-20T18:15:09.137`)
|
||||
- [CVE-2024-0401](CVE-2024/CVE-2024-04xx/CVE-2024-0401.json) (`2024-05-20T19:34:58.277`)
|
||||
- [CVE-2024-24294](CVE-2024/CVE-2024-242xx/CVE-2024-24294.json) (`2024-05-20T19:34:58.277`)
|
||||
- [CVE-2024-34338](CVE-2024/CVE-2024-343xx/CVE-2024-34338.json) (`2024-05-20T19:15:08.670`)
|
||||
- [CVE-2024-34947](CVE-2024/CVE-2024-349xx/CVE-2024-34947.json) (`2024-05-20T19:34:58.277`)
|
||||
- [CVE-2024-34948](CVE-2024/CVE-2024-349xx/CVE-2024-34948.json) (`2024-05-20T19:34:58.277`)
|
||||
- [CVE-2019-20180](CVE-2019/CVE-2019-201xx/CVE-2019-20180.json) (`2024-05-20T21:15:08.827`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
52
_state.csv
52
_state.csv
@ -137076,7 +137076,7 @@ CVE-2019-20176,0,0,119d4e137d19b3147bebb5f12cacdd3df688d102b05711091e1d0fdf4b011
|
||||
CVE-2019-20178,0,0,f0742cf19222f81d609a3b4802cdb734b7ad73f74080d2124e95754262fa6a86,2023-11-07T03:08:40.090000
|
||||
CVE-2019-20179,0,0,d184903ff51d6af8532bb7eedbe1337b6792d7fb2b734649090d1ff7cb4600bd,2023-11-07T03:08:40.150000
|
||||
CVE-2019-2018,0,0,8e7de94004ce5aeb65fcd755bdea96ed2fbaf715a253f2bd9a9a49dc72d55f26,2020-08-24T17:37:01.140000
|
||||
CVE-2019-20180,0,0,55d1b135c8757b110e515571f13cb8d7fc08c353e964373505206641e6d47fd8,2023-11-07T03:08:40.207000
|
||||
CVE-2019-20180,0,1,46f84788396671dffc6f82fb348b1eb821b79caf25a751cce7d1e43c127e2ce7,2024-05-20T21:15:08.827000
|
||||
CVE-2019-20181,0,0,a962294bc94f45d4e7ced6d052a4960ff2a2c5ff7fbe324f918a57d49ce907d1,2023-11-07T03:08:40.277000
|
||||
CVE-2019-20182,0,0,4b992830ce564e13dd461d8e339ca0c172e1d6e68d4d6e47c6d5ea934ee33639,2023-11-07T03:08:40.340000
|
||||
CVE-2019-20183,0,0,41006a2836624d7a622c75f65686509fa9798ce30621a14f7fcb66ab1254c43e,2023-11-07T03:08:40.397000
|
||||
@ -235633,12 +235633,12 @@ CVE-2023-49322,0,0,ec573216ebb589a7bde5f243513713e9483d1daf2c07741422a11e58b2466
|
||||
CVE-2023-49328,0,0,2663afaf0fdc14fbd61676b6a0c189ccd927763de1881d5d7d0168b413a2f270,2024-01-03T20:43:29.493000
|
||||
CVE-2023-49329,0,0,c639631ea0b01f58ba85dbaa7f0a475b505fb4a877133b9c4e228894b22af3d9,2024-01-26T19:01:44.507000
|
||||
CVE-2023-4933,0,0,53cb5ff21b4e9bf5c75b3188e0de1a02ee33e8cba99d0c1ae0f005f47daf1a34,2024-02-16T18:57:14.973000
|
||||
CVE-2023-49330,0,1,01a6cfccb831dafa331f15c34c45863b22538f76a8bddec6e39d50770f6a7246,2024-05-20T18:15:09.137000
|
||||
CVE-2023-49331,1,1,71cf7d5f3b7b12430f01ace4557302f531da30cdf45e9a4879412e42471bda9e,2024-05-20T19:34:58.277000
|
||||
CVE-2023-49332,1,1,7832deea28b8f4bc4a4a88022d87925dea093fe5c7ffdf398712583e14a3e799,2024-05-20T19:34:58.277000
|
||||
CVE-2023-49333,1,1,560725c2e25dde9784694d933158833ad5aa73eb41b383df8a8ed689c35d290d,2024-05-20T19:34:58.277000
|
||||
CVE-2023-49334,1,1,447e2e727395666093c88bbd07129eddaa1f4242da71de2dd6d1f553ce94c417,2024-05-20T19:34:58.277000
|
||||
CVE-2023-49335,1,1,5077c383bb455df22ab033ff660986daa579d990ee14628c7267c0f099514102,2024-05-20T19:34:58.277000
|
||||
CVE-2023-49330,0,0,01a6cfccb831dafa331f15c34c45863b22538f76a8bddec6e39d50770f6a7246,2024-05-20T18:15:09.137000
|
||||
CVE-2023-49331,0,0,71cf7d5f3b7b12430f01ace4557302f531da30cdf45e9a4879412e42471bda9e,2024-05-20T19:34:58.277000
|
||||
CVE-2023-49332,0,0,7832deea28b8f4bc4a4a88022d87925dea093fe5c7ffdf398712583e14a3e799,2024-05-20T19:34:58.277000
|
||||
CVE-2023-49333,0,0,560725c2e25dde9784694d933158833ad5aa73eb41b383df8a8ed689c35d290d,2024-05-20T19:34:58.277000
|
||||
CVE-2023-49334,0,0,447e2e727395666093c88bbd07129eddaa1f4242da71de2dd6d1f553ce94c417,2024-05-20T19:34:58.277000
|
||||
CVE-2023-49335,0,0,5077c383bb455df22ab033ff660986daa579d990ee14628c7267c0f099514102,2024-05-20T19:34:58.277000
|
||||
CVE-2023-49337,0,0,86718fbf647addc1ffa7afba66842634946d6f14a10a1ba39713b41194fe1fa1,2024-02-29T13:49:47.277000
|
||||
CVE-2023-49338,0,0,2e7514f1a1d95d8adbcb4af72640d5c4afe066a5541734fa443bd47771d4ba41,2024-02-29T13:49:47.277000
|
||||
CVE-2023-49339,0,0,5e0b0c12f27e752a168c99793f0c0ee1088d5fc0e77c7aa77b0e94e5e50795d6,2024-02-13T14:01:40.577000
|
||||
@ -239860,7 +239860,7 @@ CVE-2024-0395,0,0,9697a8ac3bbf759d0c2ea19b7ab0aa903676619b1d5a607c85b8d090a4e44e
|
||||
CVE-2024-0396,0,0,106628bcb832aae2e274e4e91fdb5add809827efe4c459066d3102ffe0249334,2024-01-29T15:22:40.317000
|
||||
CVE-2024-0399,0,0,f9efd00d0c28d2f5fd7844014ccf20e6de83c83ab3d0467105e159f94efa805f,2024-04-15T13:15:31.997000
|
||||
CVE-2024-0400,0,0,18035b4484267a537c15645ebee53285fc55ae5559f980b5f9795ec2795f24dd,2024-03-27T12:29:30.307000
|
||||
CVE-2024-0401,0,1,e305392ce002f105ba074f99554faa6f23010b185e47b8c3c95fd06ee8ad99cb,2024-05-20T19:34:58.277000
|
||||
CVE-2024-0401,0,0,e305392ce002f105ba074f99554faa6f23010b185e47b8c3c95fd06ee8ad99cb,2024-05-20T19:34:58.277000
|
||||
CVE-2024-0402,0,0,2fe1b596353be20e61cfde75d3fd6588203ea2d19b7c21e2ce1c5a9ecc57cc90,2024-01-31T18:34:47.867000
|
||||
CVE-2024-0403,0,0,ba0983060e2034b216b25cd26ed2bb024a7850bc1fcd95abc9a090d5040f7805,2024-03-01T14:04:26.010000
|
||||
CVE-2024-0404,0,0,f66e4aae55250898f4ea41fe8e33c7b9d8158214afcab6aefc212b1ddf85c6ae,2024-04-16T13:24:07.103000
|
||||
@ -243615,8 +243615,8 @@ CVE-2024-24279,0,0,d350732cc4ca29b60cc89e1436f10a4364ab08631ecd4190bd1db7c1d3d10
|
||||
CVE-2024-2428,0,0,a12acd196e6489491150ab75ad9922280151d93b658bfb481d4c1c66079cd163,2024-04-10T13:23:38.787000
|
||||
CVE-2024-2429,0,0,6f82bfe12677abd0ded60841d7ddd794d901d8b55be20f02cefabe3e057f8434,2024-04-26T12:58:17.720000
|
||||
CVE-2024-24291,0,0,ed81ca1f7d07ab5682e5dc3e12510be85bd8028a8e8a8fb1a80b96c7b9ae97e4,2024-02-13T20:13:26.593000
|
||||
CVE-2024-24293,1,1,6598513cd3c4ba6997bbf0aa7a786a6ceb7ec9adf73348e95e7fe704d309aaf3,2024-05-20T19:34:58.277000
|
||||
CVE-2024-24294,0,1,b0279e587f39806a5aee97e6b33f12cbd386ec4b69b5b14fc1f7f43be0443e05,2024-05-20T19:34:58.277000
|
||||
CVE-2024-24293,0,0,6598513cd3c4ba6997bbf0aa7a786a6ceb7ec9adf73348e95e7fe704d309aaf3,2024-05-20T19:34:58.277000
|
||||
CVE-2024-24294,0,0,b0279e587f39806a5aee97e6b33f12cbd386ec4b69b5b14fc1f7f43be0443e05,2024-05-20T19:34:58.277000
|
||||
CVE-2024-24300,0,0,a8dc475a562e17ac269ab87541d5cc3de5e8b25ad6f69c16a9e202ce4fe0a524,2024-02-15T06:23:39.303000
|
||||
CVE-2024-24301,0,0,eea9ef656f8457ca391649537e978f0d3e4722722df26eae84433b0c4b119a98,2024-02-15T06:23:39.303000
|
||||
CVE-2024-24302,0,0,449b9cf4e02c6c056b845a3613a24a6a7c3cc41bbd8662ade9cfd67dd2332ad7,2024-03-04T13:58:23.447000
|
||||
@ -246534,7 +246534,7 @@ CVE-2024-28979,0,0,a6ddd4aec5743fbd91a59a0fe39fe91b4d38aa1c5c2023bce8dca8281e8b5
|
||||
CVE-2024-2898,0,0,76a38588eeca70ecb25472849eb8998ee4d4f74eb5e3aa36fdb6d66de01eda42,2024-05-17T02:38:36.130000
|
||||
CVE-2024-2899,0,0,4aa5ec01ca1d3b835467a231d9836714c4e4cef27dea7210f2a97d49ae8b91f5,2024-05-17T02:38:36.220000
|
||||
CVE-2024-2900,0,0,a407b1858236d84c8f3b34f7314a68104abd6fc43c858c1e78b5ff160bd6a726,2024-05-17T02:38:36.333000
|
||||
CVE-2024-29000,1,1,625ec6a41a6ac56adb8fb3dcbb0b78bef2e9a904ba429157599a85670b4ebea6,2024-05-20T19:34:58.277000
|
||||
CVE-2024-29000,0,0,625ec6a41a6ac56adb8fb3dcbb0b78bef2e9a904ba429157599a85670b4ebea6,2024-05-20T19:34:58.277000
|
||||
CVE-2024-29001,0,0,9ae5f7a1a6b3f72d017c6a5d76a325f6773e864b93715611a69855bc74400970,2024-04-18T13:04:28.900000
|
||||
CVE-2024-29003,0,0,3ff27ee94ba9e3b7b02d7ebdc804fca6c10d62e52a42b28e17981175d0cd3629,2024-04-23T15:15:49.640000
|
||||
CVE-2024-29006,0,0,372dae7e0517fadec7afbebb95bb2f6ce85fed46918b994309163c310eb23334,2024-04-04T12:48:41.700000
|
||||
@ -246839,7 +246839,7 @@ CVE-2024-2964,0,0,491ec5f2811a24301edaa3e4cd378090bf610cd2f1b9a50cd7e0dcb2547041
|
||||
CVE-2024-29640,0,0,87923c5f8022466da2d8ef6f4760770a9b5d77108f7ca786dd890e142c1a64f2,2024-04-01T01:12:59.077000
|
||||
CVE-2024-29644,0,0,39829980cc0c3cec42e83f1a7d1e74f651bed504f90005be4e46042a91527a65,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29650,0,0,8ad374bfabee755625e57dff59b85656db535734df280985070b11f8f0b8c3b6,2024-03-25T16:43:06.137000
|
||||
CVE-2024-29651,1,1,2aa87cf0959cf53b56c8ce32dab849ade6a02ae2646fd82f4896d25f5fb341e8,2024-05-20T19:34:58.277000
|
||||
CVE-2024-29651,0,0,2aa87cf0959cf53b56c8ce32dab849ade6a02ae2646fd82f4896d25f5fb341e8,2024-05-20T19:34:58.277000
|
||||
CVE-2024-2966,0,0,474ae2e5b1d6c6447ca9bee38c5e4dafcb7b2c2503070dea1f4351179cfe9798,2024-04-11T12:47:44.137000
|
||||
CVE-2024-29660,0,0,cb0158a2426209c1fb8f208ea06a0fca40402892acda514103396dc461115741,2024-04-25T17:24:59.967000
|
||||
CVE-2024-29661,0,0,261575e37794cafe64ffc39d8e8abae89bdc1f0dce273791f821aa281be54825,2024-04-22T13:28:34.007000
|
||||
@ -248086,7 +248086,7 @@ CVE-2024-31673,0,0,0b8916c5145f64233db03bbf2ba3efc75200b697a1803c84382b31b9c3949
|
||||
CVE-2024-31678,0,0,6d17d4ce9eaa15ebb6367a838566d027b53ddba56e09f333fd8cadacfd1d2447,2024-04-12T12:44:04.930000
|
||||
CVE-2024-31680,0,0,9cd3893ac983fae5e4213584fc439ab2d2b21e3e6bebab8790c0104ed80c76e1,2024-04-17T12:48:07.510000
|
||||
CVE-2024-31705,0,0,8033fd37659a2da1fb0e7633bf6cd8849a478258d0204dab5311593f3afffaff,2024-04-30T13:11:16.690000
|
||||
CVE-2024-31714,1,1,9dfda90ad25f59ddbc089ec152911f11e59c46016b94564ecfcb42b2bf233592,2024-05-20T19:34:58.277000
|
||||
CVE-2024-31714,0,0,9dfda90ad25f59ddbc089ec152911f11e59c46016b94564ecfcb42b2bf233592,2024-05-20T19:34:58.277000
|
||||
CVE-2024-31741,0,0,7f7fe0680083852848d9489e7bfde2c974dd88476e32f02fc76986c5d4f4ace6,2024-04-29T12:42:03.667000
|
||||
CVE-2024-31744,0,0,2683100a95af5c52d0a1d38f815dd1f12090341766e4f7725aacfd2ec2cd65dd,2024-04-19T16:19:49.043000
|
||||
CVE-2024-31745,0,0,a3bdd0cf6c191f4f752a70ac6769fb5b2d5c89636eeffe60e00827ad5ab48d32,2024-04-25T16:15:11.227000
|
||||
@ -249210,6 +249210,8 @@ CVE-2024-3388,0,0,9a13547aa29d2171bfe252870fb3dde44261a463a11a31d9062dc130e0f3c4
|
||||
CVE-2024-33883,0,0,d21d8ca934661e52f0e44367a0fd9ba1bffeaf9f6f5050d38db197cfeb832973,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33891,0,0,dbfd0a46c344c55dc0dc7b94e4bd09b3968a700bb28b10a9c34051909c1cf008,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33899,0,0,3953877290e7ea59299fc2e6fd3641cdc5f0dd0a60947ca4a9fd862e9c59d70e,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33900,1,1,8cbc6afee3f3bf0be10864103df9daa85f7657fddf3822bcf0ba2459d05ee94b,2024-05-20T21:15:09.177000
|
||||
CVE-2024-33901,1,1,b14d67142bf430998d05d13984477b69852654e5ebfd2667061f027427e474fd,2024-05-20T21:15:09.243000
|
||||
CVE-2024-33903,0,0,d2659cb95032f4bf4e82ec7ebb3e3a955a9eb80acf170b021644b79abb230380,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33904,0,0,4e23880abf5747270fb682428cdb1c8d9da3ad9f2ae0530104035f429e5a2c50,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33905,0,0,4f2af541fd9603df50f92dd094e460dd4dcee3f568c1f2af9533e6ef2f5fb1b0,2024-05-01T18:15:24.390000
|
||||
@ -249333,7 +249335,7 @@ CVE-2024-3417,0,0,3f49bbe41c99ed046acbdc4725681aba971da366489d19dd21d63a9f706d65
|
||||
CVE-2024-3418,0,0,6fe11edf510894c44abfa3e9b21978e1ec886281690eea4a4d51ab980c487616,2024-05-17T02:39:54.520000
|
||||
CVE-2024-3419,0,0,aeca19960cd1f95bdadc5c30b5b727390552e333abdda78cd3d5486ef78495c2,2024-05-17T02:39:54.607000
|
||||
CVE-2024-34191,0,0,27b1c620282570c87b9d36cf383a2ab3527ffa825ce9edfd9e46e92b141fd915,2024-05-14T19:17:55.627000
|
||||
CVE-2024-34193,1,1,5de61c89f8e11c82bdcf8cc1372363701c6079fc031ce8e689a6500b6dd8c67d,2024-05-20T19:34:58.277000
|
||||
CVE-2024-34193,0,0,5de61c89f8e11c82bdcf8cc1372363701c6079fc031ce8e689a6500b6dd8c67d,2024-05-20T19:34:58.277000
|
||||
CVE-2024-34196,0,0,4e80cd162a6469d87fbc5160248bcd148f17d7e9ff6e8d925ea5afbae398c96d,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34199,0,0,c4a5d1d1715931fb9852a66c79bbb3d851f28204f6828f81c97a43695e03fbea,2024-05-14T16:12:23.490000
|
||||
CVE-2024-3420,0,0,b23336ce8c63df177a870ef266a5c8c6a1f5d11f9f70c90daa106ac2bb4085f4,2024-05-17T02:39:54.717000
|
||||
@ -249392,7 +249394,7 @@ CVE-2024-34314,0,0,0107b5ea4eb283c867d7bcf45b9a1b1b8c09b93e02d17eb326a855e2eae22
|
||||
CVE-2024-34315,0,0,36ad48654c2445849405bf408af6abf3947e9c641efabc13ad4dfd6e6d40c74e,2024-05-07T20:07:58.737000
|
||||
CVE-2024-3432,0,0,c54577582bdbc3937c3144599074e1b9739b0a7ed62b33767d62fe9e77c22e2b,2024-05-17T02:39:55.693000
|
||||
CVE-2024-3433,0,0,d8fe0ffd32e9fb3f3bfbfe278a5e952300a650397e5632010fbf07827a8c84d4,2024-05-17T02:39:55.780000
|
||||
CVE-2024-34338,0,1,debf5da9fbe0a8760d82e62e72676be1d81646899f08ee08cbe3ffd4f298e443,2024-05-20T19:15:08.670000
|
||||
CVE-2024-34338,0,0,debf5da9fbe0a8760d82e62e72676be1d81646899f08ee08cbe3ffd4f298e443,2024-05-20T19:15:08.670000
|
||||
CVE-2024-3434,0,0,e5e1f6c3f83a330c95098e301aa118cb27dcfcb5f7977633532da07dcd9b5499,2024-05-17T02:39:55.870000
|
||||
CVE-2024-34340,0,0,6c1ffbf1a659d4f4f292c1ae302d3aa34f13db998fa54adf2df8d3cb89c4ab55,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34341,0,0,f37d69cf5bf50561e35500a7e90f2b7d080eebb75e274e57cc9fba16796bd69b,2024-05-07T20:07:58.737000
|
||||
@ -249656,9 +249658,9 @@ CVE-2024-34943,0,0,44d98cd58aa649e622669b5d139eb3c721c497a3ed9e2f38cf0a924b84b63
|
||||
CVE-2024-34944,0,0,dc412fb3e6a3cf1ffd7e85fafb66ffaabb7c1be0e9b9ac9e3158aeb74b4d5f0e,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34945,0,0,575023130609b734f4893425fcd731e9a9935102b4df26247d6e0eb6ba48bebd,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34946,0,0,18a70d63ec6de478ac3f73160a9c6a4992ce9174fd5476f10d8e6c79e1f65d0e,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34947,0,1,539e1e6aad54a1db35de8e003bc4484f29bb93f5bc4ea8fcf0c5048cd3598a66,2024-05-20T19:34:58.277000
|
||||
CVE-2024-34948,0,1,9f4b33618188e695ae5a97c685ee42c7e28984a87f8d30cfc34b75bd08747bda,2024-05-20T19:34:58.277000
|
||||
CVE-2024-34949,1,1,98d2cd90351320a9e499ffed1dbb51bb9754fd949b5d75b4822e9bddeb178de8,2024-05-20T19:34:58.277000
|
||||
CVE-2024-34947,0,0,539e1e6aad54a1db35de8e003bc4484f29bb93f5bc4ea8fcf0c5048cd3598a66,2024-05-20T19:34:58.277000
|
||||
CVE-2024-34948,0,0,9f4b33618188e695ae5a97c685ee42c7e28984a87f8d30cfc34b75bd08747bda,2024-05-20T19:34:58.277000
|
||||
CVE-2024-34949,0,0,98d2cd90351320a9e499ffed1dbb51bb9754fd949b5d75b4822e9bddeb178de8,2024-05-20T19:34:58.277000
|
||||
CVE-2024-34950,0,0,bce08889c675e02cdedb7c7d716140ca0269187b86ee9ecf74ec425b66e2c63c,2024-05-15T16:15:10.333000
|
||||
CVE-2024-34952,0,0,3c9d295a87597633142e6b921e5c34eec0393b990162ed3cf2ebade30f8ed0fc,2024-05-20T15:17:54.513000
|
||||
CVE-2024-34953,0,0,b659d1f4bcdd460996762ad0137fd32e65b833f81a4c5bfad87bc349e72c126c,2024-05-20T15:17:54.513000
|
||||
@ -249710,6 +249712,10 @@ CVE-2024-35184,0,0,b9e43a79a8d3cf5f3dc97bfbc13e9d1e865d4c1cbd767526b45c719d87ddd
|
||||
CVE-2024-35185,0,0,9566de12a112578d6f544cd49512e0fec5a478c1209019c8a894392a85ee7161,2024-05-17T18:36:31.297000
|
||||
CVE-2024-35187,0,0,e540e1bc620ba80ad5fa80f7d3263a6e3207bc8224e5eb747cca071b3bd90ce6,2024-05-17T18:36:31.297000
|
||||
CVE-2024-35190,0,0,df7331f94dde17b6fe9caf5aceb08176ef5d062bd31daf4fd79d8cfe540794ae,2024-05-17T18:35:35.070000
|
||||
CVE-2024-35191,1,1,3fea625f0f16665d25f87c7c16f9d8cab824ad7cfe77d4057d035c38f2b00424,2024-05-20T21:15:09.307000
|
||||
CVE-2024-35192,1,1,afc551a53865ea35750cf87859d26c473f70804fe12f089bd78ff2c0b31a95a2,2024-05-20T21:15:09.550000
|
||||
CVE-2024-35194,1,1,b7f6bdf6baf26167ef80f1f1aa25b6ca57578dbc17f9023e78bb78772baa20b9,2024-05-20T21:15:09.773000
|
||||
CVE-2024-35195,1,1,cc1ea11b9334e63a9a93d27b1f4942a9ae7fafcc7165816bd0ec3c38eaa5d2e6,2024-05-20T21:15:09.990000
|
||||
CVE-2024-3520,0,0,f6428e86e9ec472cba9c3c5754043cb34202461d79bcb1fa1b6a365d8347f93e,2024-05-02T18:00:37.360000
|
||||
CVE-2024-35204,0,0,e1a61e5fa740b8d773028d5010a8e42a433a924bdea5e26108812aad66d1c249,2024-05-16T20:15:09.910000
|
||||
CVE-2024-35205,0,0,e759b9359595ebaf333ccada053519f187d3d1cfddc6ef72f21bfd74e59fe204,2024-05-14T16:11:39.510000
|
||||
@ -249751,11 +249757,11 @@ CVE-2024-3551,0,0,707951f769b10080ccfb0e7ec01d2b664cd8f0bbbe9c53d60fa858f7750b27
|
||||
CVE-2024-3553,0,0,35fab26edb78f51246dfea40a1da2d2c641df3766aad72a071763d4720020731,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3554,0,0,b4c32859301bcc314e2dd2301d5e454826bca59cac4e6957d0f808d223349460,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3556,0,0,3585ee5c92a9c3d529b040dd670fbfee3d6182484f87bd29638348adaae5ce9a,2024-04-09T22:15:07.470000
|
||||
CVE-2024-35571,1,1,67f76ae9f90c9f57899e4b508cc3f136e4d8caf290ab8a02ecec3dd8d722ed10,2024-05-20T19:34:58.277000
|
||||
CVE-2024-35576,1,1,6cb958bfbb2aa8f28dc30b2057abfc4520624058806f8d23062e42f766a7e31c,2024-05-20T19:34:58.277000
|
||||
CVE-2024-35578,1,1,9b6af24900c97b8c8fceb2460e2cf2035a5639481f86d7f4da562c9cc2c3932d,2024-05-20T19:34:58.277000
|
||||
CVE-2024-35579,1,1,35e0d175e0e9e6f14f0d45dddb8c13590c00e75308c5741698784264cbe34649,2024-05-20T19:34:58.277000
|
||||
CVE-2024-35580,1,1,3ff50f60cbbc817960af0184f316d686462c05674ee197a8c685fbbdf03fad16,2024-05-20T19:34:58.277000
|
||||
CVE-2024-35571,0,0,67f76ae9f90c9f57899e4b508cc3f136e4d8caf290ab8a02ecec3dd8d722ed10,2024-05-20T19:34:58.277000
|
||||
CVE-2024-35576,0,0,6cb958bfbb2aa8f28dc30b2057abfc4520624058806f8d23062e42f766a7e31c,2024-05-20T19:34:58.277000
|
||||
CVE-2024-35578,0,0,9b6af24900c97b8c8fceb2460e2cf2035a5639481f86d7f4da562c9cc2c3932d,2024-05-20T19:34:58.277000
|
||||
CVE-2024-35579,0,0,35e0d175e0e9e6f14f0d45dddb8c13590c00e75308c5741698784264cbe34649,2024-05-20T19:34:58.277000
|
||||
CVE-2024-35580,0,0,3ff50f60cbbc817960af0184f316d686462c05674ee197a8c685fbbdf03fad16,2024-05-20T19:34:58.277000
|
||||
CVE-2024-3560,0,0,66c1a96b1f1d19ab8c2a91f30bb939a8ccde028ecd6951f27029cb1628de4d35,2024-04-19T13:10:25.637000
|
||||
CVE-2024-3566,0,0,e417ef1ceca67d3a9a8ba800520d4a9974bcf4eba2e3e6325dafdfbfe6af8d6b,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3567,0,0,95d4f85888c7c90830bdb6bbe6ab9e66d33c542ba2d85efb396aaa8b077bff79,2024-04-10T19:49:51.183000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user