mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2024-05-24T10:00:38.221725+00:00
This commit is contained in:
parent
533a259f8f
commit
fb22f36713
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2021-20594",
|
||||
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"published": "2021-08-06T17:15:07.103",
|
||||
"lastModified": "2022-10-14T18:15:12.313",
|
||||
"lastModified": "2024-05-24T08:15:08.543",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Mitsubishi Electric MELSEC iQ-R series Safety CPU modules R08/16/32/120SFCPU firmware versions \"26\" and prior and Mitsubishi Electric MELSEC iQ-R series SIL2 Process CPU modules R08/16/32/120PSFCPU all versions allows a remote unauthenticated attacker to acquire legitimate user names registered in the module via brute-force attack on user names."
|
||||
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Mitsubishi Electric MELSEC iQ-R series Safety CPU modules R08/16/32/120SFCPU firmware versions \"26\" and prior and Mitsubishi Electric MELSEC iQ-R series SIL2 Process CPU modules R08/16/32/120PSFCPU firmware versions \"11\" and prior allows a remote unauthenticated attacker to acquire legitimate user names registered in the module via brute-force attack on user names."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2021-20597",
|
||||
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"published": "2021-08-06T17:15:07.140",
|
||||
"lastModified": "2022-10-14T18:15:14.477",
|
||||
"lastModified": "2024-05-24T08:15:08.760",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficiently Protected Credentials vulnerability in Mitsubishi Electric MELSEC iQ-R series Safety CPU modules R08/16/32/120SFCPU firmware versions \"26\" and prior and Mitsubishi Electric MELSEC iQ-R series SIL2 Process CPU modules R08/16/32/120PSFCPU all versions allows a remote unauthenticated attacker to login to the target unauthorizedly by sniffing network traffic and obtaining credentials when registering user information in the target or changing a password."
|
||||
"value": "Insufficiently Protected Credentials vulnerability in Mitsubishi Electric MELSEC iQ-R series Safety CPU modules R08/16/32/120SFCPU firmware versions \"26\" and prior and Mitsubishi Electric MELSEC iQ-R series SIL2 Process CPU modules R08/16/32/120PSFCPU firmware versions \"11\" and prior allows a remote unauthenticated attacker to login to the target unauthorizedly by sniffing network traffic and obtaining credentials when registering user information in the target or changing a password."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
55
CVE-2024/CVE-2024-40xx/CVE-2024-4037.json
Normal file
55
CVE-2024/CVE-2024-40xx/CVE-2024-4037.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-4037",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-24T09:15:08.873",
|
||||
"lastModified": "2024-05-24T09:15:08.873",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP Photo Album Plus plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 8.7.02.003. This is due to the plugin allowing unauthenticated users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-photo-album-plus/trunk/wppa-ajax.php#L1138",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3078746%40wp-photo-album-plus&new=3078746%40wp-photo-album-plus&sfp_email=&sfph_mail=#file3",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3079831%40wp-photo-album-plus&new=3079831%40wp-photo-album-plus&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3d6b95ee-0a0d-49f7-83b1-4716eec3b863?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-43xx/CVE-2024-4366.json
Normal file
47
CVE-2024/CVE-2024-43xx/CVE-2024-4366.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-4366",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-24T08:15:09.680",
|
||||
"lastModified": "2024-05-24T08:15:09.680",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Spectra \u2013 WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018block_id\u2019 parameter in versions up to, and including, 2.13.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3080971/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/72a74483-e159-4c51-a9e0-4a128cbf72dd?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2024/CVE-2024-53xx/CVE-2024-5310.json
Normal file
88
CVE-2024/CVE-2024-53xx/CVE-2024-5310.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-5310",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-24T09:15:09.337",
|
||||
"lastModified": "2024-05-24T09:15:09.337",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic has been found in JFinalCMS up to 20221020. This affects an unknown part of the file /admin/content. The manipulation of the argument Title leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-266121 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.4,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.3
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/heyewei/JFinalcms/issues/I8VHM2",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.266121",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.266121",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
29
README.md
29
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-05-24T08:00:38.339540+00:00
|
||||
2024-05-24T10:00:38.221725+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-05-24T07:15:10.967000+00:00
|
||||
2024-05-24T09:15:09.337000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,33 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
251655
|
||||
251658
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `14`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2023-1001](CVE-2023/CVE-2023-10xx/CVE-2023-1001.json) (`2024-05-24T06:15:07.797`)
|
||||
- [CVE-2023-1111](CVE-2023/CVE-2023-11xx/CVE-2023-1111.json) (`2024-05-24T07:15:08.213`)
|
||||
- [CVE-2023-7259](CVE-2023/CVE-2023-72xx/CVE-2023-7259.json) (`2024-05-24T07:15:08.930`)
|
||||
- [CVE-2024-0867](CVE-2024/CVE-2024-08xx/CVE-2024-0867.json) (`2024-05-24T06:15:08.380`)
|
||||
- [CVE-2024-0893](CVE-2024/CVE-2024-08xx/CVE-2024-0893.json) (`2024-05-24T07:15:09.387`)
|
||||
- [CVE-2024-1134](CVE-2024/CVE-2024-11xx/CVE-2024-1134.json) (`2024-05-24T06:15:08.667`)
|
||||
- [CVE-2024-1332](CVE-2024/CVE-2024-13xx/CVE-2024-1332.json) (`2024-05-24T07:15:09.733`)
|
||||
- [CVE-2024-1376](CVE-2024/CVE-2024-13xx/CVE-2024-1376.json) (`2024-05-24T07:15:10.057`)
|
||||
- [CVE-2024-36361](CVE-2024/CVE-2024-363xx/CVE-2024-36361.json) (`2024-05-24T06:15:08.947`)
|
||||
- [CVE-2024-3718](CVE-2024/CVE-2024-37xx/CVE-2024-3718.json) (`2024-05-24T06:15:09.100`)
|
||||
- [CVE-2024-4484](CVE-2024/CVE-2024-44xx/CVE-2024-4484.json) (`2024-05-24T07:15:10.397`)
|
||||
- [CVE-2024-4485](CVE-2024/CVE-2024-44xx/CVE-2024-4485.json) (`2024-05-24T07:15:10.700`)
|
||||
- [CVE-2024-5060](CVE-2024/CVE-2024-50xx/CVE-2024-5060.json) (`2024-05-24T07:15:10.967`)
|
||||
- [CVE-2024-5142](CVE-2024/CVE-2024-51xx/CVE-2024-5142.json) (`2024-05-24T06:15:09.360`)
|
||||
- [CVE-2024-4037](CVE-2024/CVE-2024-40xx/CVE-2024-4037.json) (`2024-05-24T09:15:08.873`)
|
||||
- [CVE-2024-4366](CVE-2024/CVE-2024-43xx/CVE-2024-4366.json) (`2024-05-24T08:15:09.680`)
|
||||
- [CVE-2024-5310](CVE-2024/CVE-2024-53xx/CVE-2024-5310.json) (`2024-05-24T09:15:09.337`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
- [CVE-2021-20594](CVE-2021/CVE-2021-205xx/CVE-2021-20594.json) (`2024-05-24T08:15:08.543`)
|
||||
- [CVE-2021-20597](CVE-2021/CVE-2021-205xx/CVE-2021-20597.json) (`2024-05-24T08:15:08.760`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
35
_state.csv
35
_state.csv
@ -166845,10 +166845,10 @@ CVE-2021-20590,0,0,60c40eb63a4531f4383a6e2425a677c21a75217229df58e54a2caeb91dd58
|
||||
CVE-2021-20591,0,0,5154adb955cd3d8618c496ba3218501bc80ce2e996fc477208bccaba018f799d,2021-06-22T20:05:11.090000
|
||||
CVE-2021-20592,0,0,f3f76600f8131b8be93f76219697e1ab99ddc84bf5690e08eb9e51207a326d90,2023-11-07T03:29:08.760000
|
||||
CVE-2021-20593,0,0,58a80255241ade1117592fc3b0cfec0ee518e9559d07acd7d0c5b20dd252a992,2021-08-05T15:17:43.253000
|
||||
CVE-2021-20594,0,0,422422de715eeb3393e228e8b079421f8472336caae38bc86c3c0857b6572784,2022-10-14T18:15:12.313000
|
||||
CVE-2021-20594,0,1,83a06f842c968fb97edc77f4c6658ffbdc06721756b9508dcbf1be89c5273796,2024-05-24T08:15:08.543000
|
||||
CVE-2021-20595,0,0,54091619e9a973b57aaa95e99df009c2c6c78df845b1f1f4269becb97f96ed07,2021-08-04T19:07:32.120000
|
||||
CVE-2021-20596,0,0,a0ff9fa4a237f9a78322aa815369f8873c6b92bf575b4824cca00d26de4f2d97,2021-08-02T14:25:16.287000
|
||||
CVE-2021-20597,0,0,47bb071e2ba107e2cdb7a8730ebd52a20ab8b00118532bb2721e3af8e4e3e92b,2022-10-14T18:15:14.477000
|
||||
CVE-2021-20597,0,1,45b3a8a3c2173ac90686a8be7c48fc36e4eaa93f59fdab7ad875d6ae0f32bfe2,2024-05-24T08:15:08.760000
|
||||
CVE-2021-20598,0,0,8906f45643b6277fa9f592c088e169b719c9855f3a65a41e28e980eeda63213f,2021-08-27T13:10:04.973000
|
||||
CVE-2021-20599,0,0,e5627ca58794178fcd969f7ef02a30018dc48154c890a9b15e17156856bb881c,2024-04-18T06:15:06.627000
|
||||
CVE-2021-2060,0,0,61606dcd34403072c3a5917747b918eb39dbd0b36f6f004b94aa44c2f142691f,2022-01-04T17:08:34.690000
|
||||
@ -212986,7 +212986,7 @@ CVE-2023-0997,0,0,9d867f728bb348fa4696e97c8e4b017968a3b3bb8b47c0b8301db5c6498f4e
|
||||
CVE-2023-0998,0,0,ba5f68f8590fb13504e5e9b2fcbd34380148b745a4b26a6bbaa9c9aacfd35a55,2024-05-17T02:17:43.290000
|
||||
CVE-2023-0999,0,0,b1e7884f1d1818453ea32891517ca75a4f407be2a70ee70a439e634db86a737f,2024-05-17T02:17:43.410000
|
||||
CVE-2023-1000,0,0,4aa58533c5dbb24f12efb55a44fc3e6b226f201aaeb3adf708f655b46d5885d5,2024-05-17T02:17:43.510000
|
||||
CVE-2023-1001,1,1,c503ff5fcef2b722339d35b124404a82040640bc157044fe4326554acd2fde3f,2024-05-24T06:15:07.797000
|
||||
CVE-2023-1001,0,0,c503ff5fcef2b722339d35b124404a82040640bc157044fe4326554acd2fde3f,2024-05-24T06:15:07.797000
|
||||
CVE-2023-1002,0,0,131af00873ba3d719d248a3d55c1c0fedb7d4a756c10d98fe624675155b70314,2024-05-17T02:17:43.627000
|
||||
CVE-2023-1003,0,0,8bf836cf081253b3290c22b088bb9f1d5e02d957313468642ff89c27911f506d,2024-05-17T02:17:43.750000
|
||||
CVE-2023-1004,0,0,058d27fdff044a808f27ea337ecac6b052290a8dbc6d2048e8b9947a523130a1,2024-05-17T02:17:43.863000
|
||||
@ -213091,7 +213091,7 @@ CVE-2023-1107,0,0,9a52bef9a1ca429be140a10c84bc12a629590b53316a867749752072c0b261
|
||||
CVE-2023-1108,0,0,aeacf9d513f2b7dab05d3e517bca24fd3b051615c399a2a076f95c7e59be4ff3,2024-05-03T16:15:10.140000
|
||||
CVE-2023-1109,0,0,2509c662afdb3f0a0ec45035471a3248ff9a739f276b59dc8726839849d40390,2023-04-26T23:00:01.937000
|
||||
CVE-2023-1110,0,0,1f7300cb8eef018806d7e6dafa6e92f63d8af6d27f8e22d3167347856cbbc3a7,2023-11-07T04:02:31.253000
|
||||
CVE-2023-1111,1,1,0aa3127d5099c7e18746393b094731b974e27286ebd8f18b9df86905760ba727,2024-05-24T07:15:08.213000
|
||||
CVE-2023-1111,0,0,0aa3127d5099c7e18746393b094731b974e27286ebd8f18b9df86905760ba727,2024-05-24T07:15:08.213000
|
||||
CVE-2023-1112,0,0,c2c9f1db857cae7a09406557a787eabf2708a23b13791e35059196c8811a0094,2024-05-17T02:17:49.600000
|
||||
CVE-2023-1113,0,0,7f797892ab35c630cc5504c64a0bd7915415118eb8247b006d6445eec8741408,2024-05-17T02:17:49.707000
|
||||
CVE-2023-1114,0,0,4ec36f3280ef61f0749c18afea2bb24b982915597e6f1fee380d9a87d5ca57c4,2024-02-01T16:56:59.573000
|
||||
@ -240041,7 +240041,7 @@ CVE-2023-7251,0,0,73fa31f7b11a2c8f7785ccd98b3beff89a3869cfbe5b74910fb2dd13412671
|
||||
CVE-2023-7252,0,0,2392d7e3f3e585dc7390c0e965b0650ef11fa8ae2796aaf6e5db491d8ab57d29,2024-04-22T13:28:43.747000
|
||||
CVE-2023-7253,0,0,6000cb96a7cdff75b79b770b4fe76bc65674b2e521cea85c3d83d19816bdddbc,2024-04-24T13:39:42.883000
|
||||
CVE-2023-7258,0,0,5ff9fbb18c87cd79eeba5bdac9e20b834be684e2899fd63fb3e107422ede555b,2024-05-15T18:35:11.453000
|
||||
CVE-2023-7259,1,1,430343a1f0907dd4ce6fd174419c90c3307c14955cd3c6e119afc73602557521,2024-05-24T07:15:08.930000
|
||||
CVE-2023-7259,0,0,430343a1f0907dd4ce6fd174419c90c3307c14955cd3c6e119afc73602557521,2024-05-24T07:15:08.930000
|
||||
CVE-2024-0007,0,0,3bebeca11ed66b29340ad5b2f4a6fdda381d640f217ed7214dda7d3a471e9da1,2024-02-15T06:23:39.303000
|
||||
CVE-2024-0008,0,0,db70626ccf03b2491d218a1d6d38cb10870a351e02a617fba1e6e23a0ac8502b,2024-02-15T06:23:39.303000
|
||||
CVE-2024-0009,0,0,a481cbe6336f9e8c7286d10d3efcc3169667e3db231d83fec3fad506beda4652,2024-02-15T06:23:39.303000
|
||||
@ -240752,7 +240752,7 @@ CVE-2024-0861,0,0,896e71725cbfb614341352655e0b66e7def84c2617b58556401d4278cc8b74
|
||||
CVE-2024-0862,0,0,8d5bc8312d1d93cf3fbc9bc4464ee1ea50ba5434e84839c1491be95817a91a77,2024-05-14T19:17:55.627000
|
||||
CVE-2024-0864,0,0,d89dcae43b5200797b81bcd0ad7b3b6e3cba6f54866805aee9a386996fe0fcfc,2024-02-29T13:49:29.390000
|
||||
CVE-2024-0866,0,0,2315ea7233a9f152b45c2f2db1db04866f3fbf8a4d5b6e4bad65f402d240f082,2024-03-26T12:55:05.010000
|
||||
CVE-2024-0867,1,1,1cc00ae0c7c78fd04c13abfc9a88ad7ae845577d6430c70a87f455a0689bcb45,2024-05-24T06:15:08.380000
|
||||
CVE-2024-0867,0,0,1cc00ae0c7c78fd04c13abfc9a88ad7ae845577d6430c70a87f455a0689bcb45,2024-05-24T06:15:08.380000
|
||||
CVE-2024-0868,0,0,50dc470faec27f67202fe3c6b32f6e0e6b35686ae887e56f6aa6e0525b6a38ff,2024-04-17T12:48:07.510000
|
||||
CVE-2024-0869,0,0,39eb12d4def5ace38cccd71318a17cc1945f05a59b2d0897303b6745b871b84d,2024-02-13T19:45:09.783000
|
||||
CVE-2024-0870,0,0,41ded14ab5c6dc5551576c156b8ab1e84832c7db1a7e8550e9e61978443b627a,2024-05-14T19:18:31.490000
|
||||
@ -240773,7 +240773,7 @@ CVE-2024-0888,0,0,1251f1e0b57697e39ab302ac1708a8ac792e88534122258215da50974afe10
|
||||
CVE-2024-0889,0,0,1af68ae8d1cfa13ae0eded53cf456b483512352e891d764583ded6c2ad78addd,2024-05-17T02:35:01.543000
|
||||
CVE-2024-0890,0,0,e67541998dd7949997cc026684667cf6adf88f664c3932cae28e899dee3bafce,2024-05-17T02:35:01.833000
|
||||
CVE-2024-0891,0,0,43d38de51f0536067727703a5bf8557870f5608362301ff29cf47c54bddd3a28,2024-05-17T02:35:02.087000
|
||||
CVE-2024-0893,1,1,ce7ae2f3a462ac35875f9067831135d6cd7e06d31ea47ec53dc412ade7713a14,2024-05-24T07:15:09.387000
|
||||
CVE-2024-0893,0,0,ce7ae2f3a462ac35875f9067831135d6cd7e06d31ea47ec53dc412ade7713a14,2024-05-24T07:15:09.387000
|
||||
CVE-2024-0895,0,0,6a76c7f2f120789a65253031d7521e1f62411bd227b5e6c7a4bb77914289251e,2024-02-12T17:03:38.533000
|
||||
CVE-2024-0896,0,0,5348557c7ea4ddb4fdb7fdcc9e92238aad12e82aa66cf5c51f44520b0ef95acb,2024-03-13T18:16:18.563000
|
||||
CVE-2024-0897,0,0,54d1bf8163931c80ebde85ab8390c0fecedb390a8355fe15103e3a67a3a29cc9,2024-03-13T18:16:18.563000
|
||||
@ -240989,7 +240989,7 @@ CVE-2024-1129,0,0,efcf801aad96aab23ddf4c5c1c7fe067759cd524a5f540fb4b3132cd808f2d
|
||||
CVE-2024-1130,0,0,19b9a2e3e227bc6e3d85f9dd98bd15cfd41c18a2ee1bc79c328385d5148fea32,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1132,0,0,fb94aeb2e33ee06cb38818cec4589dec64951d860b9f9a67435a2701e6505b51,2024-05-21T18:15:08.657000
|
||||
CVE-2024-1133,0,0,85f4bf6d861639f9431d20ab28a51d2af9f3a3ecb32590788260710816d3a125,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1134,1,1,cca4aca7610094a06b75f63f6e516c082b1da3319b5df5c587aebfa467f5ce8a,2024-05-24T06:15:08.667000
|
||||
CVE-2024-1134,0,0,cca4aca7610094a06b75f63f6e516c082b1da3319b5df5c587aebfa467f5ce8a,2024-05-24T06:15:08.667000
|
||||
CVE-2024-1135,0,0,2f6bc90f330f2812b6ceb34e2fa1ad9c1c5eca9415bce0719ca3f92f74cd2497,2024-04-16T13:24:07.103000
|
||||
CVE-2024-1136,0,0,609070256c4defa988e1113275bf8273fe15f50574e00ed3dcfde13143e471cc,2024-02-28T14:06:45.783000
|
||||
CVE-2024-1137,0,0,9f8c1cf74ca4778ab709faeea998997368a7f042480977a7d6535f2dd892d7f7,2024-03-13T12:33:51.697000
|
||||
@ -241159,7 +241159,7 @@ CVE-2024-1327,0,0,1b6e3f0296467e9f6b424925712e479dea0088dc2698e1adadd7f96bd6f1e8
|
||||
CVE-2024-1328,0,0,1e360ec5f794b47c3c1949d058d4dcab1ca058a0302ffe54a63801cf38181f90,2024-03-12T12:40:13.500000
|
||||
CVE-2024-1329,0,0,c251ab89131ed5db620ce7b9371daf5508a26377e3f0f0d0996003e3074e8cd1,2024-02-15T18:27:28.837000
|
||||
CVE-2024-1331,0,0,1deb1e21efa47891bffcfc0f7c5a5a4e56a2cce5d50551f8ec8837f30ffffb10,2024-03-18T19:40:00.173000
|
||||
CVE-2024-1332,1,1,018ced21ef3250a9c45fda9c423096357256d7df8d96cfcde31205ec8c75fa36,2024-05-24T07:15:09.733000
|
||||
CVE-2024-1332,0,0,018ced21ef3250a9c45fda9c423096357256d7df8d96cfcde31205ec8c75fa36,2024-05-24T07:15:09.733000
|
||||
CVE-2024-1333,0,0,258128469d54cc44538629ab13a661542f0353cc3076e7f49f79a63a3b1847c4,2024-03-18T19:40:00.173000
|
||||
CVE-2024-1334,0,0,944ed42170a8df7f2e4c4a2f85c1c273c219b29edac392443c71fda9748dc88d,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1335,0,0,c84b322e1aa2f7dde321fa7adf9db9730c3948c96461d0bba36cb342c6cd701c,2024-02-29T13:49:29.390000
|
||||
@ -241202,7 +241202,7 @@ CVE-2024-1371,0,0,93706cb3903d44813efe65388227c96437c2154d1873db13a512d53a3d1e58
|
||||
CVE-2024-1372,0,0,fd6a0b0bdbecc63f56aef495458a3c5dd8f2e76f436e6cb5f113766b10bba4a3,2024-03-05T17:12:04.487000
|
||||
CVE-2024-1373,0,0,6182eba24b857bc2b56524dd4b982074bd00b00d58fe9873ed20ec6b67a1b251,2024-03-11T10:15:49.383000
|
||||
CVE-2024-1374,0,0,7fe6e2944b2df04d1912da5645567f3da2009d2f734eda817ead1dbb0beca205,2024-03-06T15:26:34.817000
|
||||
CVE-2024-1376,1,1,a4797f01b6f1ccfcf92f9151a1f32d0bbf3d787e041847c4af137e800d478b6a,2024-05-24T07:15:10.057000
|
||||
CVE-2024-1376,0,0,a4797f01b6f1ccfcf92f9151a1f32d0bbf3d787e041847c4af137e800d478b6a,2024-05-24T07:15:10.057000
|
||||
CVE-2024-1377,0,0,89ec0d3cfd7c9e3eb401e7d154a45976b7a536cce1245cff377347594bc84e11,2024-03-07T13:52:27.110000
|
||||
CVE-2024-1378,0,0,861a3323ec8efaeb758681460069e84c3f0f238c20d369cc8b41f972b8f59fb9,2024-03-01T23:02:21.513000
|
||||
CVE-2024-1379,0,0,a5dc4ff194b2081d660b7d1ebd72a79c6bfbea7bdeb0b3322f977151df1ae46c,2024-03-20T13:00:16.367000
|
||||
@ -250694,7 +250694,7 @@ CVE-2024-3629,0,0,ed67d1a2dc82a6f7d8e47e5534a14b4493dd33c5e11e4c564b2ef763c111a4
|
||||
CVE-2024-3630,0,0,1b4d82e848787accdc20ad3d430430e1a1fa399ad678a3e5fbc87f1ba9867411,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3631,0,0,52e896a80c9b063fda6224c04771bbd75f72f78e3d3636ccff4bb724fd16615d,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3634,0,0,940ae4dd6e92f9452379e49ccdcd29aa6fe6e9bda25faf9f7045c78090371ae8,2024-05-15T16:40:19.330000
|
||||
CVE-2024-36361,1,1,d42eb303b2cacb7d0470c3408aff6b176d967b0f036c129e7bcef840cc548caf,2024-05-24T06:15:08.947000
|
||||
CVE-2024-36361,0,0,d42eb303b2cacb7d0470c3408aff6b176d967b0f036c129e7bcef840cc548caf,2024-05-24T06:15:08.947000
|
||||
CVE-2024-3637,0,0,e0d8ef5f7498633f88592f7b832da01e95be5d925cdaa67450761833b0152a3c,2024-05-03T12:48:41.067000
|
||||
CVE-2024-3640,0,0,2c53ddbb0d3c9f63f5ef9575482e63f0bb81ae3ef5b4d53a76dd016e62e8657a,2024-05-17T18:36:31.297000
|
||||
CVE-2024-3641,0,0,c281de95cce057acff2793609e8f843aad579a2f0257c0c2e0b6442733e87b14,2024-05-16T13:03:05.353000
|
||||
@ -250752,7 +250752,7 @@ CVE-2024-3711,0,0,b2ab182a6cd64f6398e71b1acf256dc2d496d129302aa4acbb7a9cb3b9f832
|
||||
CVE-2024-3714,0,0,67d2f256f515fc7fb7a12633af83387395a2a6015e3786015a9a5a4420323bea,2024-05-20T13:00:34.807000
|
||||
CVE-2024-3715,0,0,902861be5261e2c029ed83a5c6920fde180817c53e05bb93208dc31c820658c5,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3717,0,0,f925293668cd733410cea58d8de3d8ac1f08ce4fec8b5812651df64ea2fd428a,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3718,1,1,16168547faa11f93ed45be23709c887a11ecba67c1899866d6c5595e9bc921ce,2024-05-24T06:15:09.100000
|
||||
CVE-2024-3718,0,0,16168547faa11f93ed45be23709c887a11ecba67c1899866d6c5595e9bc921ce,2024-05-24T06:15:09.100000
|
||||
CVE-2024-3719,0,0,98817b00c300460b7ee17e28b90d655bc3286869de6cea5831a06059286a41a5,2024-05-17T02:40:05.100000
|
||||
CVE-2024-3720,0,0,e90b9112f0b556a63557eff3929848b7a3fd36c353e364ec4c7371f42a8b366d,2024-05-17T02:40:05.197000
|
||||
CVE-2024-3721,0,0,ec8dc4b0ad5d1d9ba11acb18015142f7d1715fd653f7ca2987e266e9c9e8ef01,2024-05-17T02:40:05.290000
|
||||
@ -250965,6 +250965,7 @@ CVE-2024-4033,0,0,9c08f15b4d3308634dd41e6afc3001fb3d24483554aaa58982323fa330ce65
|
||||
CVE-2024-4034,0,0,fbbc9986eba42f39f504e14d62a8f5aac7c2749ef90d02af8ad89eb5ef4d1cca,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4035,0,0,02906ca1b496a2e42ac8610e4dfcaad284409da5fa1faeb0fe6ebb26c1e7ae4c,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4036,0,0,a384819513ae72390ab82c2a7b5ea2fdbb1087d8a7f4dfd460e817b5f8f6a48f,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4037,1,1,9bddd01bd4a05928602359cee6ebeaabe577bed22b950be20a34d1328cf8012b,2024-05-24T09:15:08.873000
|
||||
CVE-2024-4038,0,0,bcee2fa5b2489836af4ab9c65caafd6eced0b2bbd0ce06913efc5e02957c745c,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4039,0,0,cfdce9a10bb12a92a3dc5b97194d2925027fafc434caeab17aac25e26b57811c,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4040,0,0,aaa64890b494cdcdee2557c76769096315107a08c599010f9c12f5edc2e86037,2024-04-26T15:25:47.270000
|
||||
@ -251168,6 +251169,7 @@ CVE-2024-4361,0,0,73ddfe2adce7d05432def4f47addf8f84eda9a30fdc3baa140fd6866bc8a2a
|
||||
CVE-2024-4362,0,0,7f41e0c07e69c05f76665c888ba128e44dae52656bfc3d33cd11b51b4c09f3e6,2024-05-22T12:46:53.887000
|
||||
CVE-2024-4363,0,0,d30828b887305e475a68737a9c01556f9e261cb37bd7c595ea12b948125a2ae0,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4365,0,0,1dd74f69169778a99b3d1926254e01bee0638b05a899ef2e1df1f56792d6fd91,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4366,1,1,8af173e2731c6a7f720f3da015a94c394f53b29be115947509dad7b95f84bcdc,2024-05-24T08:15:09.680000
|
||||
CVE-2024-4367,0,0,10c9ba4e2375d81f02eb3145704f99e298b4c446473517eea4810baa65f2c650,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4368,0,0,0ee02ebde276d817508f5495294b3429c463a1f4241660388e0c329992e72be6,2024-05-04T02:15:06.853000
|
||||
CVE-2024-4369,0,0,ab5992320463150d25768d540495632f3cea0e672e96fca10ae18e5fed17e7b3,2024-05-02T03:15:15.027000
|
||||
@ -251229,8 +251231,8 @@ CVE-2024-4471,0,0,6c9bd6420a05ba387ffb41670e602f56b02ca7f7dc377deece8093fdfb2625
|
||||
CVE-2024-4473,0,0,be8deb42c9d1905b301c3bfbae608b1551ce9395ac2fbbb337038c3a7eb347fa,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4478,0,0,31a4a4c48861c0c170c939e3aa0b10661ec97e9653465707919926dbd3595183,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4481,0,0,7ecf88f2a22a659849266bdc0bd40c464d195e3dafdf490c58869a301c87572b,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4484,1,1,0e6d10ae60614bbe98513fc8ca09aa4acd80a1ee39e1ccb1def452f2e785ea28,2024-05-24T07:15:10.397000
|
||||
CVE-2024-4485,1,1,684f04eef081e68d4088066c89d7d1f89bd3d0ab1025bb3d7b0e383ba48cecfb,2024-05-24T07:15:10.700000
|
||||
CVE-2024-4484,0,0,0e6d10ae60614bbe98513fc8ca09aa4acd80a1ee39e1ccb1def452f2e785ea28,2024-05-24T07:15:10.397000
|
||||
CVE-2024-4485,0,0,684f04eef081e68d4088066c89d7d1f89bd3d0ab1025bb3d7b0e383ba48cecfb,2024-05-24T07:15:10.700000
|
||||
CVE-2024-4486,0,0,a73f1b43309f4975525156a3992ab83bea82776aa822ddaaf973001731263834,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4487,0,0,50c826d9a63ca2cf478652fe406866ee1f801cabb050eb8635e58a006f7805c7,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4490,0,0,e9307362c9e30effa78a675ee98be99c8b3d9c66fa0a2fa85d2752ca1d5cbd01,2024-05-14T16:11:39.510000
|
||||
@ -251557,7 +251559,7 @@ CVE-2024-5050,0,0,be8f3852fc1ee0c7c6f3d9ea8e9de609d6b3106a1d1264936ecc028a9ffecb
|
||||
CVE-2024-5051,0,0,05278087a2e45b7f804d2ac5ded899aaa080da1c72c5fd177e38e1c11ec82cf6,2024-05-17T18:35:35.070000
|
||||
CVE-2024-5052,0,0,e91d117e4e1be9076555bb5304fe1acddd9d3634cfedff3f9a612b7def3416c1,2024-05-17T18:35:35.070000
|
||||
CVE-2024-5055,0,0,2c441c6b199abc8bb09d755706b6b6e6a0c1c1abcfa9df3dac57cd2dcc6091d3,2024-05-17T18:35:35.070000
|
||||
CVE-2024-5060,1,1,a684a8b33e246e735d1eac127a5350340720acb8fcdad824f275c19f4a0fe67a,2024-05-24T07:15:10.967000
|
||||
CVE-2024-5060,0,0,a684a8b33e246e735d1eac127a5350340720acb8fcdad824f275c19f4a0fe67a,2024-05-24T07:15:10.967000
|
||||
CVE-2024-5063,0,0,58a3e73736caa423017f4765a458f0556a3988aff53fbc778cde0be207e8f3c0,2024-05-20T13:00:34.807000
|
||||
CVE-2024-5064,0,0,278ab368b63cb29376cafc56d50f76e64a52eec9e724980377f85cc060f2e4ed,2024-05-20T13:00:34.807000
|
||||
CVE-2024-5065,0,0,61cda3c56538a884bedac0a7dbf902fc270042a859c82155c18493f3425ff365,2024-05-20T13:00:34.807000
|
||||
@ -251602,7 +251604,7 @@ CVE-2024-5134,0,0,44a789f42f5a3c13ba63d82e5081c6abc6a3d25c1481cb7c53cfc6c6e78700
|
||||
CVE-2024-5135,0,0,68cf9bdf9dec0a96d7d353e92a3ea23735e4dfab71f12aba03f45faad350b446,2024-05-20T13:00:04.957000
|
||||
CVE-2024-5136,0,0,7e1453b58a6b8cdb889318a17e467bc4887e911147f2bbd5898eefe5c0fc0fa9,2024-05-20T13:00:04.957000
|
||||
CVE-2024-5137,0,0,9ef636c571a0277ac03884ccb19a37de0ac2ceab7c0195ff8a91e587e734c012,2024-05-20T13:00:04.957000
|
||||
CVE-2024-5142,1,1,6cd1c095f50ef180f4b85f460cd1e80771396e1628f588562f607669516a5f66,2024-05-24T06:15:09.360000
|
||||
CVE-2024-5142,0,0,6cd1c095f50ef180f4b85f460cd1e80771396e1628f588562f607669516a5f66,2024-05-24T06:15:09.360000
|
||||
CVE-2024-5143,0,0,6fb867f42f8c3ca7c9111a79dd4a6f4f194bf553f9063ef95dc380f05caaf7ce,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5145,0,0,779a53179978014855de22e41604c12feef2bb6901d36d253a629d55b7b44ab6,2024-05-21T12:37:59.687000
|
||||
CVE-2024-5147,0,0,f786cdd04c7e64ee05dc3a502a4fef5436dd8390bfdc70803ca93e4405d481a0,2024-05-22T12:46:53.887000
|
||||
@ -251654,3 +251656,4 @@ CVE-2024-5296,0,0,80f6223bc1afd3f0e0b60c2e6a9ac760594c32bf81790f9a1c01f1f45efab7
|
||||
CVE-2024-5297,0,0,a5b37125199df8170b6cacac7a53fb7ebe964005f8f04fbed90d5e13f439ef44,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5298,0,0,f725059e3d8a3164232bce0b703a1bd3cdd51babd13996981eafdd135ebec89a,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5299,0,0,1995cf7aaf2c0dc3e17475bd79c48936282524e051c2d7d06f964366204ee47a,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5310,1,1,44d513e726a68832e1717984f136330cb5b053bcc8dc2bf47ab16aae1dd4ab87,2024-05-24T09:15:09.337000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user