mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-05-31T12:00:37.998802+00:00
This commit is contained in:
parent
bf40ebb6e5
commit
ea7b6fd2fb
59
CVE-2024/CVE-2024-223xx/CVE-2024-22338.json
Normal file
59
CVE-2024/CVE-2024-223xx/CVE-2024-22338.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-22338",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-05-31T11:15:09.180",
|
||||
"lastModified": "2024-05-31T11:15:09.180",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Security Verify Access OIDC Provider 22.09 through 23.03 could disclose sensitive information to a local user due to hazardous input validation. IBM X-Force ID: 279978."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279978",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7155340",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-236xx/CVE-2024-23692.json
Normal file
59
CVE-2024/CVE-2024-236xx/CVE-2024-23692.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-23692",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2024-05-31T10:15:09.330",
|
||||
"lastModified": "2024-05-31T10:15:09.330",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejetto HTTP File Server, up to and including version 2.3m, is vulnerable to a template injection vulnerability. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request. As of the CVE assignment date, Rejetto HFS 2.3m is no longer supported."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1336"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mohemiv.com/all/rejetto-http-file-server-2-3m-unauthenticated-rce/",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/rejetto-unauth-rce",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-36037",
|
||||
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
|
||||
"published": "2024-05-27T18:15:10.407",
|
||||
"lastModified": "2024-05-28T12:39:28.377",
|
||||
"lastModified": "2024-05-31T11:15:09.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -21,20 +21,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW"
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
63
CVE-2024/CVE-2024-41xx/CVE-2024-4160.json
Normal file
63
CVE-2024/CVE-2024-41xx/CVE-2024-4160.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-4160",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-31T10:15:09.977",
|
||||
"lastModified": "2024-05-31T10:15:09.977",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpdm-all-packages' shortcode in all versions up to, and including, 3.2.90 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/download-manager/trunk/src/Package/views/all-packages-shortcode.php?rev=2996137#L202",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3080781/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/download-manager/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/download-manager/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9f51258a-e228-412f-9d97-28ab679136d7?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wpdownloadmanager.com/doc/short-codes/wpdm_all_packages-list-all-downloads-in-tabular-format-in-a-page/",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
51
CVE-2024/CVE-2024-50xx/CVE-2024-5041.json
Normal file
51
CVE-2024/CVE-2024-50xx/CVE-2024-5041.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2024-5041",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-31T10:15:10.220",
|
||||
"lastModified": "2024-05-31T10:15:10.220",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018ha-ia-content-button\u2019 parameter in all versions up to, and including, 3.10.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/trunk/widgets/image-accordion/widget.php#L1462",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3095128/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fb037c9f-5d20-46f6-b1ff-34b9d192bad2?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-53xx/CVE-2024-5347.json
Normal file
55
CVE-2024/CVE-2024-53xx/CVE-2024-5347.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-5347",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-31T10:15:10.413",
|
||||
"lastModified": "2024-05-31T10:15:10.413",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'arrow' attribute within the plugin's Post Navigation widget in all versions up to, and including, 3.10.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/tags/3.10.9/widgets/post-navigation/widget.php#L588",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3095128/happy-elementor-addons/trunk/widgets/post-navigation/widget.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/happy-elementor-addons/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/415a7201-bdff-4342-9e06-ce0e500cdc7c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
15
CVE-2024/CVE-2024-54xx/CVE-2024-5484.json
Normal file
15
CVE-2024/CVE-2024-54xx/CVE-2024-5484.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2024-5484",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-05-31T11:15:09.783",
|
||||
"lastModified": "2024-05-31T11:15:09.783",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
15
CVE-2024/CVE-2024-55xx/CVE-2024-5538.json
Normal file
15
CVE-2024/CVE-2024-55xx/CVE-2024-5538.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2024-5538",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-05-31T11:15:09.923",
|
||||
"lastModified": "2024-05-31T11:15:09.923",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
21
README.md
21
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-05-31T10:00:38.580556+00:00
|
||||
2024-05-31T12:00:37.998802+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-05-31T09:15:09.780000+00:00
|
||||
2024-05-31T11:15:09.923000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,24 +33,27 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
252281
|
||||
252288
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `7`
|
||||
|
||||
- [CVE-2024-5436](CVE-2024/CVE-2024-54xx/CVE-2024-5436.json) (`2024-05-31T09:15:09.780`)
|
||||
- [CVE-2024-5523](CVE-2024/CVE-2024-55xx/CVE-2024-5523.json) (`2024-05-31T08:15:08.870`)
|
||||
- [CVE-2024-5524](CVE-2024/CVE-2024-55xx/CVE-2024-5524.json) (`2024-05-31T08:15:09.127`)
|
||||
- [CVE-2024-5525](CVE-2024/CVE-2024-55xx/CVE-2024-5525.json) (`2024-05-31T08:15:09.357`)
|
||||
- [CVE-2024-22338](CVE-2024/CVE-2024-223xx/CVE-2024-22338.json) (`2024-05-31T11:15:09.180`)
|
||||
- [CVE-2024-23692](CVE-2024/CVE-2024-236xx/CVE-2024-23692.json) (`2024-05-31T10:15:09.330`)
|
||||
- [CVE-2024-4160](CVE-2024/CVE-2024-41xx/CVE-2024-4160.json) (`2024-05-31T10:15:09.977`)
|
||||
- [CVE-2024-5041](CVE-2024/CVE-2024-50xx/CVE-2024-5041.json) (`2024-05-31T10:15:10.220`)
|
||||
- [CVE-2024-5347](CVE-2024/CVE-2024-53xx/CVE-2024-5347.json) (`2024-05-31T10:15:10.413`)
|
||||
- [CVE-2024-5484](CVE-2024/CVE-2024-54xx/CVE-2024-5484.json) (`2024-05-31T11:15:09.783`)
|
||||
- [CVE-2024-5538](CVE-2024/CVE-2024-55xx/CVE-2024-5538.json) (`2024-05-31T11:15:09.923`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2022-41678](CVE-2022/CVE-2022-416xx/CVE-2022-41678.json) (`2024-05-31T09:15:09.367`)
|
||||
- [CVE-2024-36037](CVE-2024/CVE-2024-360xx/CVE-2024-36037.json) (`2024-05-31T11:15:09.563`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
19
_state.csv
19
_state.csv
@ -207074,7 +207074,7 @@ CVE-2022-41674,0,0,7fddcb7da73c0a96be4a43c013ced65ac91a32b25cf6ee2d0f1097f6052ba
|
||||
CVE-2022-41675,0,0,fa38ec524a80469fa143a01e1364670741f60e2a8be20fdc9a6168877206f5ed,2022-12-01T16:47:55.830000
|
||||
CVE-2022-41676,0,0,6ce6503c29641a706d14bba4abeec57ebe3e3ee749376675b5b49dd933d9333b,2022-12-01T15:15:19.983000
|
||||
CVE-2022-41677,0,0,fb584e4ff9e502def2431b17e01237a80e6cc9a2ebead6cf2d47ad83358a63a1,2023-12-22T20:06:30.313000
|
||||
CVE-2022-41678,0,1,540d29c005ee03044b254bf150c3f6911e6fccecb2b155f588a45a5d7392e54b,2024-05-31T09:15:09.367000
|
||||
CVE-2022-41678,0,0,540d29c005ee03044b254bf150c3f6911e6fccecb2b155f588a45a5d7392e54b,2024-05-31T09:15:09.367000
|
||||
CVE-2022-41679,0,0,579980e7286f2080fdbe9cd35aa2f90696096731c4705f1d688555e08181fc9f,2022-11-01T19:57:52.373000
|
||||
CVE-2022-4168,0,0,962a8cf6a20124f2860cc6a8ad0647c6a278a309ba496e80c45aa72c11ab92ed,2023-11-07T03:57:07.430000
|
||||
CVE-2022-41680,0,0,afa69c855a090a6536c33922c710fb608e5ac1e3ecd34844a4dc67e08ea1cac7,2022-11-01T20:06:05.093000
|
||||
@ -243214,6 +243214,7 @@ CVE-2024-22334,0,0,a38b89fac619e220b3f32a5ed9cb762bdaa0f4626e986bbf119b83360e4c1
|
||||
CVE-2024-22335,0,0,94b1135a0842e43602bc9fceeeec6f6d8338d5d9b6e931e6a3e1f0f5ed52affb,2024-02-20T19:50:53.960000
|
||||
CVE-2024-22336,0,0,92b17f3ddf77b7c8a53a41f903603d0d36207de06fae8bd71fc2469777bc3663,2024-02-20T19:50:53.960000
|
||||
CVE-2024-22337,0,0,9a674fac9bc4716d61a028d3be9473027552f3c1c11335efca4b4ddefd1e14f0,2024-02-20T19:50:53.960000
|
||||
CVE-2024-22338,1,1,9b4b392249331c85d8695bec03585e00cd93e88164ca3cbcd21b0b1cbdbae06f,2024-05-31T11:15:09.180000
|
||||
CVE-2024-22339,0,0,7da5694b93905b7c6d93ed93108dac6dab6202238259984860ef1d6e1bec9ec9,2024-04-15T13:15:31.997000
|
||||
CVE-2024-22343,0,0,98c7840ac2eb50dcfa88f4141a657f976aab7d39f92de1ccb97b49719a76ede0,2024-05-14T16:13:02.773000
|
||||
CVE-2024-22344,0,0,dd931266b7e962044b40a6567c41617f6ff2ceb50100fcd1ed62bcdaadd651ee,2024-05-14T16:13:02.773000
|
||||
@ -243946,6 +243947,7 @@ CVE-2024-23687,0,0,888c703c13765b4aadeca06043a7e3dd693e14ab5fbf0ceb683a371be24cf
|
||||
CVE-2024-23688,0,0,07f47d429f26f5d25558115321368745a1af1492969a475a8855a8882844f455,2024-01-26T15:53:31.397000
|
||||
CVE-2024-23689,0,0,d7d4e018343e45ab929852f091e2e71006911f05a5c0cdd59769a6f5a80fdcee,2024-01-26T14:50:45.023000
|
||||
CVE-2024-2369,0,0,6a36576cd82a0efb1a6cf47fca1f81c4dce9d8f7b0632041d2d5bfbf236b9c0b,2024-04-08T18:15:08.527000
|
||||
CVE-2024-23692,1,1,ec02d7f8fe7cd4a5a5f916a2baddfabc466ebee07cd8bcb02e8fca13e7d4c274,2024-05-31T10:15:09.330000
|
||||
CVE-2024-2370,0,0,d585ae9ac856bf263bbb5fc87411ce61002d06f83e420348ba9623542805dbad,2024-03-20T16:15:08.270000
|
||||
CVE-2024-23704,0,0,b6e98937a05e8e3c54df94790ffc1b76a7a7dbc7d0f374847ce3c9bc63a138f4,2024-05-08T13:15:00.690000
|
||||
CVE-2024-23705,0,0,208f2921dda59fa7b14af1145627e3c7132ea207198825c4a670a9a509059f41,2024-05-08T13:15:00.690000
|
||||
@ -251004,7 +251006,7 @@ CVE-2024-36031,0,0,f1f7732b588d979c4d00ffb8d25c959f8c8bff0081fecca244d58693de70d
|
||||
CVE-2024-36032,0,0,77f61e4eb9b69791255a1749011bbf5bfe101901226204e159aab9fa96fdf06d,2024-05-30T18:19:11.743000
|
||||
CVE-2024-36033,0,0,4595ccbf163ec0bc444a3229a8e7d6e073fa8ea6bfd6b25c7eb2ce3a32399639,2024-05-30T18:19:11.743000
|
||||
CVE-2024-36036,0,0,399529c38d111e737eeb859298f0b12af936846a2a63555a4e1fd24103a1ae63,2024-05-28T12:39:28.377000
|
||||
CVE-2024-36037,0,0,0f6f02ecbfa932c634fa472570a56c7201914f9b8fefa1f5fa9e003f7709a6de,2024-05-28T12:39:28.377000
|
||||
CVE-2024-36037,0,1,e8ddc31f39a62a0d6f93584a2886b907bf85fcebcdd4d47a54b701feefb8d09a,2024-05-31T11:15:09.563000
|
||||
CVE-2024-36039,0,0,a8363180f0299206d54e6558901cb5cddfc68c9874309661faf6b2f8a76377e4,2024-05-21T16:53:56.550000
|
||||
CVE-2024-36043,0,0,a692d077d358c1feb0a509deb9a8e16caf647bf207b7ab7a4cd103038bbab39e,2024-05-20T13:00:04.957000
|
||||
CVE-2024-36048,0,0,e007b0325d407bc8859f041fde0fd19208cc3895dbb6e40867a5a83e255b52f5,2024-05-20T13:00:04.957000
|
||||
@ -251523,6 +251525,7 @@ CVE-2024-4156,0,0,adce86e733c051c288bfe88b689ecb95a01f304de9b2f4b7c4a80ca844fcaf
|
||||
CVE-2024-4157,0,0,d7f17200d1961bf339712e1e1bb3214a7e4d567794b6612602f24588bbec4550,2024-05-22T12:46:53.887000
|
||||
CVE-2024-4158,0,0,e2e18bbc2894b8bc9f7922444db50e4c9e9d54450b012e9427f5b5a6c6168969,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4159,0,0,cf0daf8ecd317ce4288e8a4812364c59b3b10d10c0c5945533667d40be8a71fc,2024-04-25T23:15:47.087000
|
||||
CVE-2024-4160,1,1,94898ec54378c7899c9ee7834ce66fd30656bd7c70fac2c5359b1de9573d71fd,2024-05-31T10:15:09.977000
|
||||
CVE-2024-4161,0,0,8c35858b76cabcd8cf78ed758e4c9d58e5dffa2b20a32ec25b41a43a372b2218,2024-04-25T13:18:13.537000
|
||||
CVE-2024-4162,0,0,3ab30e180def8149fd8494b0a91d0c176ba9184404d532022796a118c67b4ade,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4163,0,0,0abae06321832430d51e94179291aa50a40ff5a5f25f762f5290e51ebf608907,2024-04-26T12:58:17.720000
|
||||
@ -252060,6 +252063,7 @@ CVE-2024-5031,0,0,e598ebc5c9fa457f9bece560d72de6fc8851ac943a5e7908ec776eb9202f17
|
||||
CVE-2024-5035,0,0,04b94f66274e3d3d22c52a6f453c8b285ab22579cfad76ef028d6a110e1aa148,2024-05-29T05:16:08.793000
|
||||
CVE-2024-5039,0,0,b127541466e1e4b8bc6b8f397a7aacd2a75f26f3d1a91377e6b8a8edd312b492,2024-05-29T15:18:26.427000
|
||||
CVE-2024-5040,0,0,0ff887bafdff8fcd61409221ff18cf1da08d6038e0047c0178293c334ec34d62,2024-05-22T12:46:53.887000
|
||||
CVE-2024-5041,1,1,eb2305a4f98c01029366fe1714dd39120c2faf53804227b88e7ab45165cd007f,2024-05-31T10:15:10.220000
|
||||
CVE-2024-5042,0,0,f1d9a9fcfa7383b6226ef8151dfed6201a75da0740b190c8c597da456657abd9,2024-05-20T06:15:08.723000
|
||||
CVE-2024-5043,0,0,2d8ce763fd3fd63cad8518145d585bd4026207a52cef2d0ff57c8a20bc93669f,2024-05-17T18:35:35.070000
|
||||
CVE-2024-5044,0,0,6219fee342540ef7a286bcddf9d98d227f7468ec28bf9c4a7c254b2f76b9d570,2024-05-17T18:35:35.070000
|
||||
@ -252198,6 +252202,7 @@ CVE-2024-5339,0,0,06454cd858966bd04fe11523962adaa26a10dc55f1781c23c279a6bf8e0f11
|
||||
CVE-2024-5340,0,0,c66c0c9e55de3c725084d3080da1dc604d47daf703d95b2c548541ec6a382225,2024-05-28T12:39:42.673000
|
||||
CVE-2024-5341,0,0,2b72dd4ef57e598a2469a1d6786a4762ce0fcb8187c35f2f4bd1ff39b4044b7e,2024-05-30T13:15:41.297000
|
||||
CVE-2024-5345,0,0,ab408465466f89085738a2657691827a8c34288c9c24d6282b532357c2e7aa95,2024-05-31T03:15:08.613000
|
||||
CVE-2024-5347,1,1,1884a03651c7a09ff016c5d307b4503616718e8866ef272ca8ed86c6fc1b8d75,2024-05-31T10:15:10.413000
|
||||
CVE-2024-5350,0,0,60bbd22831ddecb115d40713a9dc768f9983e70563a63aa9f7486c68fbd4f9e1,2024-05-28T12:39:42.673000
|
||||
CVE-2024-5351,0,0,75936f9a30b9b2678d667660507da4226e150a018add31c316ae6f6c8d9a34b8,2024-05-28T12:39:42.673000
|
||||
CVE-2024-5352,0,0,436cc86ab2a56db91a02662bc69df77d88892fce705caf803e28ba33694f3f1c,2024-05-28T12:39:42.673000
|
||||
@ -252259,8 +252264,9 @@ CVE-2024-5427,0,0,4f849b019b7beeb02bfb03ff7ed60d017364c7c9c7607c47eed7de9a4f23d8
|
||||
CVE-2024-5428,0,0,48df461aef64d2744feebfecb3948a4ed7b72d467be8b3109a057cc13cad6e25,2024-05-28T14:59:09.827000
|
||||
CVE-2024-5433,0,0,d0946774ada383b4af0e78f23b9c449d05f83a7124810af4e383f90b0cdbda75,2024-05-29T13:02:09.280000
|
||||
CVE-2024-5434,0,0,dc2716eb218edba725ac85c17a2930de7a00b6563d0ca53040574106ea0b92ed,2024-05-29T13:02:09.280000
|
||||
CVE-2024-5436,1,1,c16c90ed7ed9948e598284837e6c2630f0ce02eadc0aa812d962b1fdca10ed9e,2024-05-31T09:15:09.780000
|
||||
CVE-2024-5436,0,0,c16c90ed7ed9948e598284837e6c2630f0ce02eadc0aa812d962b1fdca10ed9e,2024-05-31T09:15:09.780000
|
||||
CVE-2024-5437,0,0,557d2d92d351d0b9c718cc97d7a9d4fae40afc0a93c4cab84fee8196b51766e4,2024-05-29T13:02:09.280000
|
||||
CVE-2024-5484,1,1,7de35f8eee9232651ed147ec3168f6740617b1737ec3ff6913988b98b84f6ef1,2024-05-31T11:15:09.783000
|
||||
CVE-2024-5493,0,0,11b7af2f62e6d6617c3409ca97866719f8ce54243ff3b1ec625b16c827265657,2024-05-30T23:15:48.283000
|
||||
CVE-2024-5494,0,0,770b334fc231b3ed86ae9b94e3aa5e641833df0b665cac1de3b4be5b91f5348c,2024-05-30T23:15:48.367000
|
||||
CVE-2024-5495,0,0,ba59129b2f25efe96d350aefd57f1c72ec1a1f1a0aaba3ef25408c33b5cf0b75,2024-05-30T23:15:48.433000
|
||||
@ -252276,7 +252282,8 @@ CVE-2024-5518,0,0,c6c5d729da0a7fdb252df13e9278838e657e3d1804b499a08e554d0de2d3ed
|
||||
CVE-2024-5519,0,0,d519626b70411be113b4a81745e5090515ba34ffa73270abb5493ddd8c6cc2f5,2024-05-30T18:18:58.870000
|
||||
CVE-2024-5520,0,0,01643a0812792ebebe752e00036b007afdec14baaae8989ff2384745352cbc26,2024-05-30T13:15:41.297000
|
||||
CVE-2024-5521,0,0,4a2f2a375f9f418bc825efb2ed9dd95828617be6bdda6d395d3c50391732dd4e,2024-05-30T13:15:41.297000
|
||||
CVE-2024-5523,1,1,165c99436126f7404444d93277c5a47eac29e3acdc0abd60745a5fdb7c6f25c7,2024-05-31T08:15:08.870000
|
||||
CVE-2024-5524,1,1,1f4648c59290af45a15ed0b32642c88763bb4399a5b86d8bf7fd00c68b8acea3,2024-05-31T08:15:09.127000
|
||||
CVE-2024-5525,1,1,dd375b350d045f12eb8c756453986ca845a7005cf5e0164acd540fad2e234806,2024-05-31T08:15:09.357000
|
||||
CVE-2024-5523,0,0,165c99436126f7404444d93277c5a47eac29e3acdc0abd60745a5fdb7c6f25c7,2024-05-31T08:15:08.870000
|
||||
CVE-2024-5524,0,0,1f4648c59290af45a15ed0b32642c88763bb4399a5b86d8bf7fd00c68b8acea3,2024-05-31T08:15:09.127000
|
||||
CVE-2024-5525,0,0,dd375b350d045f12eb8c756453986ca845a7005cf5e0164acd540fad2e234806,2024-05-31T08:15:09.357000
|
||||
CVE-2024-5537,0,0,071475eb8c0f92cc8ea9522d658283ad0e8213ba6740ff46ee05e5b24c18c3d8,2024-05-30T17:15:34.583000
|
||||
CVE-2024-5538,1,1,183cea799fa9410e329e72f326a10b8369aedcea9a5b7583a44bf33ecc305070,2024-05-31T11:15:09.923000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user