mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-05-06T06:00:37.812801+00:00
This commit is contained in:
parent
bfe0bc0cd0
commit
ea849515ef
92
CVE-2024/CVE-2024-45xx/CVE-2024-4518.json
Normal file
92
CVE-2024/CVE-2024-45xx/CVE-2024-4518.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4518",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-06T04:15:07.487",
|
||||
"lastModified": "2024-05-06T04:15:07.487",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /view/teacher_salary_invoice.php. The manipulation of the argument desc leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-263122 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20xss/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%206.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263122",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263122",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.329699",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-45xx/CVE-2024-4519.json
Normal file
92
CVE-2024/CVE-2024-45xx/CVE-2024-4519.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4519",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-06T04:15:07.997",
|
||||
"lastModified": "2024-05-06T04:15:07.997",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /view/teacher_salary_details3.php. The manipulation of the argument month leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263123."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20xss/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%207.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263123",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263123",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.329700",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-45xx/CVE-2024-4521.json
Normal file
92
CVE-2024/CVE-2024-45xx/CVE-2024-4521.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4521",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-06T05:15:06.447",
|
||||
"lastModified": "2024-05-06T05:15:06.447",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic has been found in Campcodes Complete Web-Based School Management System 1.0. Affected is an unknown function of the file /view/teacher_salary_details2.php. The manipulation of the argument index leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263124."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20xss/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%208.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263124",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263124",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.329767",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-45xx/CVE-2024-4522.json
Normal file
92
CVE-2024/CVE-2024-45xx/CVE-2024-4522.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4522",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-06T05:15:06.807",
|
||||
"lastModified": "2024-05-06T05:15:06.807",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in Campcodes Complete Web-Based School Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /view/teacher_salary_details.php. The manipulation of the argument index leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263125 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20xss/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%209.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263125",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263125",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.329768",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-45xx/CVE-2024-4523.json
Normal file
92
CVE-2024/CVE-2024-45xx/CVE-2024-4523.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4523",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-06T05:15:07.083",
|
||||
"lastModified": "2024-05-06T05:15:07.083",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in Campcodes Complete Web-Based School Management System 1.0. Affected by this issue is some unknown functionality of the file /view/teacher_attendance_history1.php. The manipulation of the argument year leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-263126 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20xss/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2010.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263126",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263126",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.329769",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
29
README.md
29
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-05-06T04:00:38.171705+00:00
|
||||
2024-05-06T06:00:37.812801+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-05-06T03:15:10.347000+00:00
|
||||
2024-05-06T05:15:07.083000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,29 +33,18 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
248661
|
||||
248666
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `16`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
- [CVE-2023-32871](CVE-2023/CVE-2023-328xx/CVE-2023-32871.json) (`2024-05-06T03:15:09.273`)
|
||||
- [CVE-2023-32873](CVE-2023/CVE-2023-328xx/CVE-2023-32873.json) (`2024-05-06T03:15:09.387`)
|
||||
- [CVE-2024-20021](CVE-2024/CVE-2024-200xx/CVE-2024-20021.json) (`2024-05-06T03:15:09.477`)
|
||||
- [CVE-2024-20056](CVE-2024/CVE-2024-200xx/CVE-2024-20056.json) (`2024-05-06T03:15:09.563`)
|
||||
- [CVE-2024-20057](CVE-2024/CVE-2024-200xx/CVE-2024-20057.json) (`2024-05-06T03:15:09.640`)
|
||||
- [CVE-2024-20058](CVE-2024/CVE-2024-200xx/CVE-2024-20058.json) (`2024-05-06T03:15:09.710`)
|
||||
- [CVE-2024-20059](CVE-2024/CVE-2024-200xx/CVE-2024-20059.json) (`2024-05-06T03:15:09.787`)
|
||||
- [CVE-2024-20060](CVE-2024/CVE-2024-200xx/CVE-2024-20060.json) (`2024-05-06T03:15:09.870`)
|
||||
- [CVE-2024-20064](CVE-2024/CVE-2024-200xx/CVE-2024-20064.json) (`2024-05-06T03:15:09.940`)
|
||||
- [CVE-2024-34538](CVE-2024/CVE-2024-345xx/CVE-2024-34538.json) (`2024-05-06T03:15:10.010`)
|
||||
- [CVE-2024-4512](CVE-2024/CVE-2024-45xx/CVE-2024-4512.json) (`2024-05-06T02:15:06.707`)
|
||||
- [CVE-2024-4513](CVE-2024/CVE-2024-45xx/CVE-2024-4513.json) (`2024-05-06T02:15:07.043`)
|
||||
- [CVE-2024-4514](CVE-2024/CVE-2024-45xx/CVE-2024-4514.json) (`2024-05-06T02:15:07.327`)
|
||||
- [CVE-2024-4515](CVE-2024/CVE-2024-45xx/CVE-2024-4515.json) (`2024-05-06T02:15:07.633`)
|
||||
- [CVE-2024-4516](CVE-2024/CVE-2024-45xx/CVE-2024-4516.json) (`2024-05-06T03:15:10.063`)
|
||||
- [CVE-2024-4517](CVE-2024/CVE-2024-45xx/CVE-2024-4517.json) (`2024-05-06T03:15:10.347`)
|
||||
- [CVE-2024-4518](CVE-2024/CVE-2024-45xx/CVE-2024-4518.json) (`2024-05-06T04:15:07.487`)
|
||||
- [CVE-2024-4519](CVE-2024/CVE-2024-45xx/CVE-2024-4519.json) (`2024-05-06T04:15:07.997`)
|
||||
- [CVE-2024-4521](CVE-2024/CVE-2024-45xx/CVE-2024-4521.json) (`2024-05-06T05:15:06.447`)
|
||||
- [CVE-2024-4522](CVE-2024/CVE-2024-45xx/CVE-2024-4522.json) (`2024-05-06T05:15:06.807`)
|
||||
- [CVE-2024-4523](CVE-2024/CVE-2024-45xx/CVE-2024-4523.json) (`2024-05-06T05:15:07.083`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
37
_state.csv
37
_state.csv
@ -223831,9 +223831,9 @@ CVE-2023-32867,0,0,7405f13eac7f439d495a55e0c0ad6496b886a13ff75c507fecbdcd39b46b9
|
||||
CVE-2023-32868,0,0,514fd172114077d7fbccaed97fc6516ae108d5df384055a9a616255aeb3eec35,2023-12-07T17:58:17.833000
|
||||
CVE-2023-32869,0,0,5d4b1db0a3cca6e6a3c1d722187e9f0fe0ffa050cb843037ff26b343241bb682,2023-12-07T17:57:51.860000
|
||||
CVE-2023-32870,0,0,6f654473f7802507e7152ddaf8f2fbe53e09fa9504c836cadd72f989d7757638,2023-12-07T17:57:16.337000
|
||||
CVE-2023-32871,1,1,6a668e2da8e750248ddb7c8c2fd8784fa3bc152f569f93897d4039fb95414b08,2024-05-06T03:15:09.273000
|
||||
CVE-2023-32871,0,0,6a668e2da8e750248ddb7c8c2fd8784fa3bc152f569f93897d4039fb95414b08,2024-05-06T03:15:09.273000
|
||||
CVE-2023-32872,0,0,e9d307d9999e4f102950b167f2760b92fc91db21d3383a460efd9f2da1559366,2024-01-05T12:11:25.160000
|
||||
CVE-2023-32873,1,1,1d23e476eeb88f31abc9e27078d39a29fbd28f3a32faaeec8a4ff1cc9530cbe6,2024-05-06T03:15:09.387000
|
||||
CVE-2023-32873,0,0,1d23e476eeb88f31abc9e27078d39a29fbd28f3a32faaeec8a4ff1cc9530cbe6,2024-05-06T03:15:09.387000
|
||||
CVE-2023-32874,0,0,3de679188df02316f66368a64b3372868f4c7b4dbfab6dbd742ba86e9a2201b6,2024-01-05T12:11:38.880000
|
||||
CVE-2023-32875,0,0,988dab95b16956e25d61fbd5355f68766d3e7e19d6af52f9b67d8da007ae8fb6,2024-01-05T12:11:49.037000
|
||||
CVE-2023-32876,0,0,6c98e96b7897627ca3107e0b99a9a1a4f48b7a1e1569317ba2352b0bd7b2fe95,2024-01-05T12:11:59.360000
|
||||
@ -240916,7 +240916,7 @@ CVE-2024-20018,0,0,a9b64a9435b5bc63345cae4ecd28b39a61d7f82c3a2ac625a302e9d9c9f1b
|
||||
CVE-2024-20019,0,0,39a6c56b7e5ee43e38177652e3585ce43be13db3cc946fe944d7eb64d20c92e4,2024-03-04T13:58:23.447000
|
||||
CVE-2024-2002,0,0,f9538af5e2272cbd0aa160ba82bdd06f169b250031f3e62bc00bccc2e10da541,2024-04-19T23:15:10.720000
|
||||
CVE-2024-20020,0,0,54f21da7d859fe56eef653e88280a7576539f77f17050a17a46c0dc69cb94b04,2024-03-04T13:58:23.447000
|
||||
CVE-2024-20021,1,1,df2c520b604fcdd4b4d6c561890096e242f5497d2f4d0044a1f4bcc3da826182,2024-05-06T03:15:09.477000
|
||||
CVE-2024-20021,0,0,df2c520b604fcdd4b4d6c561890096e242f5497d2f4d0044a1f4bcc3da826182,2024-05-06T03:15:09.477000
|
||||
CVE-2024-20022,0,0,5fea28aa9694d95fb69b0ecbf4c1968d72487f38dd57069f7814e0738000f9a9,2024-03-04T13:58:23.447000
|
||||
CVE-2024-20023,0,0,3a102728acb4ac1cc7bd3c8526ef188fc726b2d6df358b3c4749c39431589641,2024-03-04T13:58:23.447000
|
||||
CVE-2024-20024,0,0,dba0899610d7b1e815affd8b3fbc91d6d9cd6255cf998dd42484e5d58d135521,2024-03-04T13:58:23.447000
|
||||
@ -240952,13 +240952,13 @@ CVE-2024-20052,0,0,b608de291ef41c7d946e08bcab7170bcded9ac66eae6e962c374ac118bb34
|
||||
CVE-2024-20053,0,0,23e0ee14142e8de66fb072a389717342c576ae0faa1fcdb0c00c138427077a91,2024-04-01T12:49:00.877000
|
||||
CVE-2024-20054,0,0,196ffd82a2bc4114c93d285cf3c39cab5b18744f37d8ff374529d50119278779,2024-04-01T12:49:00.877000
|
||||
CVE-2024-20055,0,0,4dd704c095e53d7cf4a2fe7965dfdb1d6d64132f42f0670efc379daf78b59d78,2024-04-01T12:49:00.877000
|
||||
CVE-2024-20056,1,1,9e70b83ede746bef66b79b6999c991d7da4d216d8ebc54b047ddc86ec5ea9d58,2024-05-06T03:15:09.563000
|
||||
CVE-2024-20057,1,1,0962ec038ab18ee22732258d7a2f6d7413d6804aabde69b4441d7970251b1d38,2024-05-06T03:15:09.640000
|
||||
CVE-2024-20058,1,1,44431f22ef2119560f980304a7fc6f72f96395f173a2b17f4f5ecf695daabd58,2024-05-06T03:15:09.710000
|
||||
CVE-2024-20059,1,1,df1b860efdfea5b36766cbec7116fca77ff9b5c3959facae29d78a86f637bf64,2024-05-06T03:15:09.787000
|
||||
CVE-2024-20056,0,0,9e70b83ede746bef66b79b6999c991d7da4d216d8ebc54b047ddc86ec5ea9d58,2024-05-06T03:15:09.563000
|
||||
CVE-2024-20057,0,0,0962ec038ab18ee22732258d7a2f6d7413d6804aabde69b4441d7970251b1d38,2024-05-06T03:15:09.640000
|
||||
CVE-2024-20058,0,0,44431f22ef2119560f980304a7fc6f72f96395f173a2b17f4f5ecf695daabd58,2024-05-06T03:15:09.710000
|
||||
CVE-2024-20059,0,0,df1b860efdfea5b36766cbec7116fca77ff9b5c3959facae29d78a86f637bf64,2024-05-06T03:15:09.787000
|
||||
CVE-2024-2006,0,0,df4bc94ba9e1d1c638a16eca7ef98c4896fe8b4e7cd4dfad87563fdb108addf7,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20060,1,1,d3c2c17995d9a7c81d918ffb550e08ac47f223421fa338f095272b4dbdbf0830,2024-05-06T03:15:09.870000
|
||||
CVE-2024-20064,1,1,2437176afa95462d702a7ce63a5a9a3e17639001166d48b47dfda067e5836c28,2024-05-06T03:15:09.940000
|
||||
CVE-2024-20060,0,0,d3c2c17995d9a7c81d918ffb550e08ac47f223421fa338f095272b4dbdbf0830,2024-05-06T03:15:09.870000
|
||||
CVE-2024-20064,0,0,2437176afa95462d702a7ce63a5a9a3e17639001166d48b47dfda067e5836c28,2024-05-06T03:15:09.940000
|
||||
CVE-2024-2007,0,0,b412167c151f404cbdc5b006d99fc99a145645f25f9d89efd0db91b6d5b898fe,2024-04-11T01:25:15.500000
|
||||
CVE-2024-2008,0,0,89351e3b3909d90b71f2b464baa5c1531110f0fc183853e9b068b202a6597011,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2009,0,0,9b55342ffec10615d0b8c459ade62fe8830f5a48032854bfae3395294e52eaac,2024-04-11T01:25:15.590000
|
||||
@ -248216,7 +248216,7 @@ CVE-2024-34525,0,0,7a2a3960e7fb056dc4ee24385f8da723ad5f4722b55d5d503e20c5e721f02
|
||||
CVE-2024-34527,0,0,233ce244623e758c8a2a41d86e12ad7b7917f1e61355124595316fba0fb2dff9,2024-05-06T00:15:10.207000
|
||||
CVE-2024-34528,0,0,85844f4e301aa48e36dac7455ba8ffb633e75b91da27d6c61177d3ddd34fc81a,2024-05-06T00:15:10.263000
|
||||
CVE-2024-34529,0,0,24813c101f8f4e4784573065570db3ab64ef3a50b95e6e4568340ad437f5f38c,2024-05-06T00:15:10.320000
|
||||
CVE-2024-34538,1,1,9c41fdc9c3414b5622c762a086532c109acf44b80708c4521f3053841a7291d1,2024-05-06T03:15:10.010000
|
||||
CVE-2024-34538,0,0,9c41fdc9c3414b5622c762a086532c109acf44b80708c4521f3053841a7291d1,2024-05-06T03:15:10.010000
|
||||
CVE-2024-3455,0,0,18e948f1ff2182718852b2ba697f0fa9a8598811bb1c2e87509c3bd543b90a57,2024-04-11T01:26:03.233000
|
||||
CVE-2024-3456,0,0,944b33373fddc7621692e3fce6708723c7abc962139d88da65ad0c4ce610f104,2024-04-11T01:26:03.310000
|
||||
CVE-2024-3457,0,0,eda30bdfb17395ab91987b75a43f4990cc086dc3cfa77a90fc0cb388efd5e793,2024-04-11T01:26:03.387000
|
||||
@ -248654,9 +248654,14 @@ CVE-2024-4508,0,0,a16352f43bb1c05613e650d355256adce31de71ad69bfdde52fb2f51f53b67
|
||||
CVE-2024-4509,0,0,ac078b9c4d73a8fac444f70d9872c5ac45fcd501a78cc0e4b13317d6a0341cae,2024-05-06T01:15:48.353000
|
||||
CVE-2024-4510,0,0,181227f06a102aa0a19b4f3de8426a191fa4d65b15ad5d5e90ba15cdbab92f1e,2024-05-06T01:15:48.643000
|
||||
CVE-2024-4511,0,0,1f4b35a0d5ce5c5f15b32a51c1d626c5577abf1a3c35a116f1a7ba7cc5725841,2024-05-06T01:15:48.940000
|
||||
CVE-2024-4512,1,1,e185fa57475fd382b26d47ffc8cff2cd47e57bf77381d7cbbafea48127147965,2024-05-06T02:15:06.707000
|
||||
CVE-2024-4513,1,1,5d53a09975c65c84f6d6537cec2ce1fc3e31786f2a84ce1461538845d6bbe685,2024-05-06T02:15:07.043000
|
||||
CVE-2024-4514,1,1,522446172f3e83c661a56623f55e450ca3ff2610acf1a3661fab994672e158a8,2024-05-06T02:15:07.327000
|
||||
CVE-2024-4515,1,1,cb1bc49ea16630c7e503e775ec35e0d9cb10a3be51d75a0dfe5736378dc75c25,2024-05-06T02:15:07.633000
|
||||
CVE-2024-4516,1,1,6ab30f6ba571cf289c105cc23dd47eb794b77e91a4e8781e2238f1d97b117a0c,2024-05-06T03:15:10.063000
|
||||
CVE-2024-4517,1,1,77ca2b5ac579746ef96a6eb405440d4d9600375b3d91a8b8e91e385d9199272b,2024-05-06T03:15:10.347000
|
||||
CVE-2024-4512,0,0,e185fa57475fd382b26d47ffc8cff2cd47e57bf77381d7cbbafea48127147965,2024-05-06T02:15:06.707000
|
||||
CVE-2024-4513,0,0,5d53a09975c65c84f6d6537cec2ce1fc3e31786f2a84ce1461538845d6bbe685,2024-05-06T02:15:07.043000
|
||||
CVE-2024-4514,0,0,522446172f3e83c661a56623f55e450ca3ff2610acf1a3661fab994672e158a8,2024-05-06T02:15:07.327000
|
||||
CVE-2024-4515,0,0,cb1bc49ea16630c7e503e775ec35e0d9cb10a3be51d75a0dfe5736378dc75c25,2024-05-06T02:15:07.633000
|
||||
CVE-2024-4516,0,0,6ab30f6ba571cf289c105cc23dd47eb794b77e91a4e8781e2238f1d97b117a0c,2024-05-06T03:15:10.063000
|
||||
CVE-2024-4517,0,0,77ca2b5ac579746ef96a6eb405440d4d9600375b3d91a8b8e91e385d9199272b,2024-05-06T03:15:10.347000
|
||||
CVE-2024-4518,1,1,560593b63b163371401bb7602a5e3fbed496cd72cc97d4f3d14609af6817728c,2024-05-06T04:15:07.487000
|
||||
CVE-2024-4519,1,1,2a79b3eb95e2c3a2767de7388481f1453382c2f0796b6cb7f352417448f0808c,2024-05-06T04:15:07.997000
|
||||
CVE-2024-4521,1,1,9658e5cf99e04dd5586315713e05e3d850ce098c57178665ca4ba6d6b2e58a64,2024-05-06T05:15:06.447000
|
||||
CVE-2024-4522,1,1,7bdcd36b7695661d67670f012f4c81bf65f3c46e18707bbd3e7e86e8f99867aa,2024-05-06T05:15:06.807000
|
||||
CVE-2024-4523,1,1,fc6543bd7eda088751563f03d4bbaaae00e21ae29ea1371740691a49debb4f18,2024-05-06T05:15:07.083000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user