mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-04-17T22:00:37.604106+00:00
This commit is contained in:
parent
627a5ec667
commit
0a70a56806
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52462",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-23T15:15:08.540",
|
||||
"lastModified": "2024-02-23T16:14:43.447",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-04-17T20:06:29.470",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,31 +14,130 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bpf: revisi\u00f3n de correcci\u00f3n para intentar da\u00f1ar el puntero derramado Cuando el registro se derrama en una pila como un registro de 1/2/4 bytes, configuramos slot_type[BPF_REG_SIZE - 1] (m\u00e1s potencialmente algunos m\u00e1s debajo de \u00e9l, dependiendo del tama\u00f1o real del derrame). Entonces, para verificar si alguna ranura de la pila se ha desbordado, debemos consultar slot_type[7], no slot_type[0]. Para evitar la necesidad de recordar y volver a verificar esto en el futuro, simplemente use el asistente is_spilled_reg()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.10.209",
|
||||
"matchCriteriaId": "384EB2A9-356B-40A1-968F-BCBB50C38134"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11.0",
|
||||
"versionEndExcluding": "5.15.148",
|
||||
"matchCriteriaId": "E25E1389-4B0F-407A-9C94-5908FF3EE88B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16.0",
|
||||
"versionEndExcluding": "6.1.75",
|
||||
"matchCriteriaId": "2C4951FA-80C0-4B4C-9836-6E5035DEB0F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2.0",
|
||||
"versionEndExcluding": "6.6.14",
|
||||
"matchCriteriaId": "BDBBEB0E-D13A-4567-8984-51C5375350B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7.0",
|
||||
"versionEndExcluding": "6.7.2",
|
||||
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2757f17972d87773b3677777f5682510f13c66ef",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/40617d45ea05535105e202a8a819e388a2b1f036",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/67e6707f07354ed1acb4e65552e97c60cf9d69cf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8dc15b0670594543c356567a1a45b0182ec63174",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ab125ed3ec1c10ccc36bc98c7a4256ad114a3dae",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fc3e3c50a0a4cac1463967c110686189e4a59104",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52463",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-23T15:15:08.590",
|
||||
"lastModified": "2024-02-23T16:14:43.447",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-04-17T20:05:08.550",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,31 +14,131 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: efivarfs: fuerza RO al volver a montar si SetVariable no es compatible. Si SetVariable en tiempo de ejecuci\u00f3n no es compatible con el firmware, nunca asignamos una devoluci\u00f3n de llamada para esa funci\u00f3n. Al mismo tiempo, monte los efivarfs como RO para que nadie pueda llamarlo. Sin embargo, nunca verificamos los indicadores de permiso cuando alguien vuelve a montar el sistema de archivos como RW. Como resultado, esto provoca un bloqueo similar al siguiente: $ mount -o remount,rw /sys/firmware/efi/efivars $ efi-updatevar -f PK.auth PK [303.279166] No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000000 [ 303.280482] Informaci\u00f3n de cancelaci\u00f3n de memoria: [ 303.280854] ESR = 0x0000000086000004 [ 303.281338] EC = 0x21: IABT (EL actual), IL = 32 bits [ 303.282016] SET = 0, F nV = 0 [ 303.282414] EA = 0, S1PTW = 0 [ 303.282821] FSC = 0x04: error de traducci\u00f3n de nivel 0 [ 303.283771] tabla de p\u00e1ginas de usuario: p\u00e1ginas 4k, VA de 48 bits, pgdp=000000004258c000 [ 303.284913] [0000000000000000] pgd=00000000 00000000, p4d=00000000000000000 [303.286076] Error interno: Ups: 0000000086000004 [#1] PREEMPT SMP [ 303.286936] M\u00f3dulos vinculados en: qrtr tpm_tis tpm_tis_core crct10dif_ce arm_smccc_trng rng_core drm fuse ip_tables x_tables ipv6 [ 303.288586] CPU: 1 PID: 755 Comm: efi- updatevar No contaminado 6.3.0-rc1-00108-gc7d0c4695c68 #1 [303.289748] Nombre de hardware: Desconocido Producto desconocido/Producto desconocido, BIOS 2023.04-00627-g88336918701d 01/04/2023 [303.291150] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [303.292123] pc: 0x0 [303.292443] lr: efivar_set_variable_locked+0x74/0xec [303.293156] sp: ffff800008673c10 [303.293619] x29: ffff800008673c10 x28: ffff 0000037e8000 x27: 0000000000000000 [ 303.294592] x26: 0000000000000800 x25: ffff000002467400 x24: 0000000000000027 [ 303.295572] x23 : ffffd49ea9832000 x22: ffff0000020c9800 x21: ffff000002467000 [ 303.296566] x20: 00000000000000001 x19: 000000000000007fc x18: 00000000000 00000 [ 303.297531] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaaac807ab54 [ 303.298495] x14: ed37489f673633c0 x13: 71c45c60 6de13f80 x12: 47464259e219acf4 [ 303.299453] x11: ffff000002af7b01 x10: 0000000000000003 x9: 0000000000000002 [303.300431] x8: 0000000000000010 x7: ffffd49ea8973230 x6: 0000000000a85201 [303.301412] x5: 0000000000000000 x4: ffff0000020c9800 x3: 00000000000007fc [303.302370] x2: 00000000000000027 x1: ffff000002467400 x0: ffff0000024670 00 [ 303.303341] Rastreo de llamadas: [ 303.303679 ] 0x0 [ 303.303938] efivar_entry_set_get_size+0x98/0x16c [ 303.304585] efivarfs_file_write+0xd0/0x1a4 [ 303.305148] vfs_write+0xc4/0x2e4 [ 303.305601] ksys_write+ 0x70/0x104 [ 303.306073] __arm64_sys_write+0x1c/0x28 [ 303.306622] invoke_syscall+0x48/0x114 [ 303.307156] el0_svc_common.constprop.0+0x44/0xec [ 303.307803] do_el0_svc+0x38/0x98 [ 303.308268] el0_svc+0x2c/0x84 [ 303.308702] el0t_64_sync_handler+0x f4/0x120 [303.309293] el0t_64_sync+0x190/0x194 [303.309794] C\u00f3digo:? ??????? ??????? ??????? ??????? (??????????) [ 303.310612] ---[ end trace 0000000000000000 ]--- Solucione este problema agregando una funci\u00f3n .reconfigure() a las operaciones fs que podemos usar para verificar los indicadores solicitados y negar cualquier cosa eso no es RO si el firmware no implementa SetVariable en tiempo de ejecuci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.8.0",
|
||||
"versionEndExcluding": "5.10.209",
|
||||
"matchCriteriaId": "7A15A248-31E4-43F5-BBA0-FC90B42A1823"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11.0",
|
||||
"versionEndExcluding": "5.15.148",
|
||||
"matchCriteriaId": "E25E1389-4B0F-407A-9C94-5908FF3EE88B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16.0",
|
||||
"versionEndExcluding": "6.1.75",
|
||||
"matchCriteriaId": "2C4951FA-80C0-4B4C-9836-6E5035DEB0F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2.0",
|
||||
"versionEndExcluding": "6.6.14",
|
||||
"matchCriteriaId": "BDBBEB0E-D13A-4567-8984-51C5375350B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7.0",
|
||||
"versionEndExcluding": "6.7.2",
|
||||
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0049fe7e4a85849bdd778cdb72e51a791ff3d737",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0e8d2444168dd519fea501599d150e62718ed2fe",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2aa141f8bc580f8f9811dfe4e0e6009812b73826",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/94c742324ed7e42c5bd6a9ed22e4ec6d764db4d8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d4a714873db0866cc471521114eeac4a5072d548",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d4a9aa7db574a0da64307729cc031fb68597aa8b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52464",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-23T15:15:08.647",
|
||||
"lastModified": "2024-02-23T16:14:43.447",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-04-17T20:03:39.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,39 +14,159 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: EDAC/thunderx: corrige un posible acceso a cadenas fuera de los l\u00edmites Al habilitar -Wstringop-overflow globalmente se expone una advertencia para un error com\u00fan en el uso de strncat(): drivers/edac/ thunderx_edac.c: En la funci\u00f3n 'thunderx_ocx_com_threaded_isr': drivers/edac/thunderx_edac.c:1136:17: error: 'strncat' el l\u00edmite especificado 1024 es igual al tama\u00f1o de destino [-Werror=stringop-overflow=] 1136 | strncat(msj, otro, OCX_MESSAGE_SIZE); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ... 1145 | strncat(msj, otro, OCX_MESSAGE_SIZE); ... 1150 | strncat(msj, otro, OCX_MESSAGE_SIZE); ... Aparentemente, el autor de este controlador esperaba que strncat() se comportara de la manera que lo hace strlcat(), que utiliza el tama\u00f1o del b\u00fafer de destino como tercer argumento en lugar de la longitud del b\u00fafer de origen. El resultado es que no se comprueba el tama\u00f1o del b\u00fafer asignado. C\u00e1mbielo a strlcat(). [bp: recortar la salida del compilador, mensaje de confirmaci\u00f3n de reparaci\u00f3n. ]"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.12.0",
|
||||
"versionEndExcluding": "4.19.306",
|
||||
"matchCriteriaId": "9505037C-AC94-4E5C-BF56-B3EAE3BEE109"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20.0",
|
||||
"versionEndExcluding": "5.4.268",
|
||||
"matchCriteriaId": "35ADF607-EDCA-45AB-8FB6-9F2D40D47C0C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5.0",
|
||||
"versionEndExcluding": "5.10.209",
|
||||
"matchCriteriaId": "5D2E4F24-2FBB-4434-8598-2B1499E566B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11.0",
|
||||
"versionEndExcluding": "5.15.148",
|
||||
"matchCriteriaId": "E25E1389-4B0F-407A-9C94-5908FF3EE88B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16.0",
|
||||
"versionEndExcluding": "6.1.75",
|
||||
"matchCriteriaId": "2C4951FA-80C0-4B4C-9836-6E5035DEB0F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2.0",
|
||||
"versionEndExcluding": "6.6.14",
|
||||
"matchCriteriaId": "BDBBEB0E-D13A-4567-8984-51C5375350B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7.0",
|
||||
"versionEndExcluding": "6.7.2",
|
||||
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5395",
|
||||
"sourceIdentifier": "psirt@honeywell.com",
|
||||
"published": "2024-04-17T17:15:12.850",
|
||||
"lastModified": "2024-04-17T17:15:12.850",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5396",
|
||||
"sourceIdentifier": "psirt@honeywell.com",
|
||||
"published": "2024-04-17T17:15:13.060",
|
||||
"lastModified": "2024-04-17T17:15:13.060",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5397",
|
||||
"sourceIdentifier": "psirt@honeywell.com",
|
||||
"published": "2024-04-17T17:15:13.240",
|
||||
"lastModified": "2024-04-17T17:15:13.240",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5398",
|
||||
"sourceIdentifier": "psirt@honeywell.com",
|
||||
"published": "2024-04-17T17:15:13.430",
|
||||
"lastModified": "2024-04-17T17:15:13.430",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5400",
|
||||
"sourceIdentifier": "psirt@honeywell.com",
|
||||
"published": "2024-04-17T17:15:13.610",
|
||||
"lastModified": "2024-04-17T17:15:13.610",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5401",
|
||||
"sourceIdentifier": "psirt@honeywell.com",
|
||||
"published": "2024-04-17T17:15:13.790",
|
||||
"lastModified": "2024-04-17T17:15:13.790",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5403",
|
||||
"sourceIdentifier": "psirt@honeywell.com",
|
||||
"published": "2024-04-17T17:15:13.960",
|
||||
"lastModified": "2024-04-17T17:15:13.960",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5404",
|
||||
"sourceIdentifier": "psirt@honeywell.com",
|
||||
"published": "2024-04-17T17:15:14.130",
|
||||
"lastModified": "2024-04-17T17:15:14.130",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5405",
|
||||
"sourceIdentifier": "psirt@honeywell.com",
|
||||
"published": "2024-04-17T17:15:14.300",
|
||||
"lastModified": "2024-04-17T17:15:14.300",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5406",
|
||||
"sourceIdentifier": "psirt@honeywell.com",
|
||||
"published": "2024-04-17T17:15:14.480",
|
||||
"lastModified": "2024-04-17T17:15:14.480",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5407",
|
||||
"sourceIdentifier": "psirt@honeywell.com",
|
||||
"published": "2024-04-17T17:15:14.650",
|
||||
"lastModified": "2024-04-17T17:15:14.650",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2024/CVE-2024-02xx/CVE-2024-0257.json
Normal file
55
CVE-2024/CVE-2024-02xx/CVE-2024-0257.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-0257",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-04-17T20:15:07.407",
|
||||
"lastModified": "2024-04-17T20:15:07.407",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nRoboDK v5.5.4\n\n is vulnerable to heap-based buffer overflow while processing a specific project file. The resulting memory corruption may crash the application.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-107-04",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-219xx/CVE-2024-21989.json
Normal file
55
CVE-2024/CVE-2024-219xx/CVE-2024-21989.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-21989",
|
||||
"sourceIdentifier": "security-alert@netapp.com",
|
||||
"published": "2024-04-17T20:15:07.663",
|
||||
"lastModified": "2024-04-17T20:15:07.663",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ONTAP Select Deploy administration utility versions 9.12.1.x, \n9.13.1.x and 9.14.1.x are susceptible to a vulnerability which when \nsuccessfully exploited could allow a read-only user to escalate their \nprivileges.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@netapp.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-alert@netapp.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240411-0001/",
|
||||
"source": "security-alert@netapp.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-219xx/CVE-2024-21990.json
Normal file
55
CVE-2024/CVE-2024-219xx/CVE-2024-21990.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-21990",
|
||||
"sourceIdentifier": "security-alert@netapp.com",
|
||||
"published": "2024-04-17T20:15:07.863",
|
||||
"lastModified": "2024-04-17T20:15:07.863",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ONTAP Select Deploy administration utility versions 9.12.1.x, \n9.13.1.x and 9.14.1.x contain hard-coded credentials that could allow an\n attacker to view Deploy configuration information and modify the \naccount credentials.\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@netapp.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-alert@netapp.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-259"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240411-0002/",
|
||||
"source": "security-alert@netapp.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-2700",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-04T14:15:09.950",
|
||||
"lastModified": "2024-04-04T16:33:06.610",
|
||||
"lastModified": "2024-04-17T20:15:08.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in the quarkus-core component. Quarkus captures the local environment variables from the Quarkus namespace during the application's build. Thus, running the resulting application inherits the values captured at build time. \r\n\r\nHowever, some local environment variables may have been set by the developer / CI environment for testing purposes, such as dropping the database during the application startup or trusting all TLS certificates to accept self-signed certificates. If these properties are configured using environment variables or the .env facility, they are captured into the built application. It leads to dangerous behavior if the application does not override these values.\r\n\r\nThis behavior only happens for configuration properties from the `quarkus.*` namespace. So, application-specific properties are not captured."
|
||||
"value": "A vulnerability was found in the quarkus-core component. Quarkus captures local environment variables from the Quarkus namespace during the application's build, therefore, running the resulting application inherits the values captured at build time. Some local environment variables may have been set by the developer or CI environment for testing purposes, such as dropping the database during application startup or trusting all TLS certificates to accept self-signed certificates. If these properties are configured using environment variables or the .env facility, they are captured into the built application, which can lead to dangerous behavior if the application does not override these values. This behavior only happens for configuration properties from the `quarkus.*` namespace. Application-specific properties are not captured."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28073",
|
||||
"sourceIdentifier": "psirt@solarwinds.com",
|
||||
"published": "2024-04-17T17:15:14.900",
|
||||
"lastModified": "2024-04-17T17:15:14.900",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29950",
|
||||
"sourceIdentifier": "sirt@brocade.com",
|
||||
"published": "2024-04-17T19:15:07.213",
|
||||
"lastModified": "2024-04-17T19:15:07.213",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2024/CVE-2024-299xx/CVE-2024-29951.json
Normal file
55
CVE-2024/CVE-2024-299xx/CVE-2024-29951.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-29951",
|
||||
"sourceIdentifier": "sirt@brocade.com",
|
||||
"published": "2024-04-17T20:15:08.060",
|
||||
"lastModified": "2024-04-17T20:15:08.060",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Brocade SANnav before v2.3.1 and v2.3.0a uses the SHA-1 hash in internal SSH ports that are not open to remote connection.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "sirt@brocade.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "sirt@brocade.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-326"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23237",
|
||||
"source": "sirt@brocade.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2961",
|
||||
"sourceIdentifier": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
|
||||
"published": "2024-04-17T18:15:15.833",
|
||||
"lastModified": "2024-04-17T18:15:15.833",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30950",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T19:15:07.420",
|
||||
"lastModified": "2024-04-17T19:15:07.420",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30951",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T18:15:15.947",
|
||||
"lastModified": "2024-04-17T18:15:15.947",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30953",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T19:15:07.470",
|
||||
"lastModified": "2024-04-17T19:15:07.470",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30980",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T17:15:15.117",
|
||||
"lastModified": "2024-04-17T17:15:15.117",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30981",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T17:15:15.193",
|
||||
"lastModified": "2024-04-17T17:15:15.193",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30982",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T18:15:16.037",
|
||||
"lastModified": "2024-04-17T18:15:16.037",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30983",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T17:15:15.257",
|
||||
"lastModified": "2024-04-17T17:15:15.257",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30985",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T18:15:16.097",
|
||||
"lastModified": "2024-04-17T18:15:16.097",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30986",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T18:15:16.157",
|
||||
"lastModified": "2024-04-17T18:15:16.157",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30987",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T18:15:16.210",
|
||||
"lastModified": "2024-04-17T18:15:16.210",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30988",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T18:15:16.273",
|
||||
"lastModified": "2024-04-17T18:15:16.273",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30989",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T19:15:07.520",
|
||||
"lastModified": "2024-04-17T19:15:07.520",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30990",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T19:15:07.570",
|
||||
"lastModified": "2024-04-17T19:15:07.570",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31031",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T19:15:07.623",
|
||||
"lastModified": "2024-04-17T19:15:07.623",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31040",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T19:15:07.680",
|
||||
"lastModified": "2024-04-17T19:15:07.680",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31041",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T19:15:07.733",
|
||||
"lastModified": "2024-04-17T19:15:07.733",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31580",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T19:15:07.783",
|
||||
"lastModified": "2024-04-17T19:15:07.783",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31581",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T19:15:07.840",
|
||||
"lastModified": "2024-04-17T19:15:07.840",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31582",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T19:15:07.893",
|
||||
"lastModified": "2024-04-17T19:15:07.893",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31583",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T19:15:07.950",
|
||||
"lastModified": "2024-04-17T19:15:07.950",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31585",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T19:15:08.007",
|
||||
"lastModified": "2024-04-17T19:15:08.007",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-32161",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T18:15:16.337",
|
||||
"lastModified": "2024-04-17T18:15:16.337",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-32162",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T19:15:08.060",
|
||||
"lastModified": "2024-04-17T19:15:08.060",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-32163",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T19:15:08.117",
|
||||
"lastModified": "2024-04-17T19:15:08.117",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
20
CVE-2024/CVE-2024-323xx/CVE-2024-32337.json
Normal file
20
CVE-2024/CVE-2024-323xx/CVE-2024-32337.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-32337",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T21:15:09.267",
|
||||
"lastModified": "2024-04-17T21:15:09.267",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the ADMIN LOGIN URL parameter under the Security module."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/adiapera/xss_security_wondercms_3.4.3",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-323xx/CVE-2024-32338.json
Normal file
20
CVE-2024/CVE-2024-323xx/CVE-2024-32338.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-32338",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T21:15:09.343",
|
||||
"lastModified": "2024-04-17T21:15:09.343",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the PAGE TITLE parameter under the Current Page module."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/adiapera/xss_current_page_wondercms_3.4.3",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-323xx/CVE-2024-32339.json
Normal file
20
CVE-2024/CVE-2024-323xx/CVE-2024-32339.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-32339",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T21:15:09.400",
|
||||
"lastModified": "2024-04-17T21:15:09.400",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple cross-site scripting (XSS) vulnerabilities in the HOW TO page of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into any of the parameters."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/adiapera/xss_how_to_page_wondercms_3.4.3",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-323xx/CVE-2024-32340.json
Normal file
20
CVE-2024/CVE-2024-323xx/CVE-2024-32340.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-32340",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T21:15:09.453",
|
||||
"lastModified": "2024-04-17T21:15:09.453",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the WEBSITE TITLE parameter under the Menu module."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/adiapera/xss_menu_page_wondercms_3.4.3",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-323xx/CVE-2024-32341.json
Normal file
20
CVE-2024/CVE-2024-323xx/CVE-2024-32341.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-32341",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T21:15:09.507",
|
||||
"lastModified": "2024-04-17T21:15:09.507",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple cross-site scripting (XSS) vulnerabilities in the Home page of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into any of the parameters."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/adiapera/xss_home_page_wondercms_3.4.3",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-323xx/CVE-2024-32342.json
Normal file
20
CVE-2024/CVE-2024-323xx/CVE-2024-32342.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-32342",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T21:15:09.560",
|
||||
"lastModified": "2024-04-17T21:15:09.560",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in the Create Page of Boid CMS v2.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Permalink parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/adiapera/xss_create_boidcms_2.1.0",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-323xx/CVE-2024-32343.json
Normal file
20
CVE-2024/CVE-2024-323xx/CVE-2024-32343.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-32343",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T21:15:09.623",
|
||||
"lastModified": "2024-04-17T21:15:09.623",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in the Create Page of Boid CMS v2.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Content parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/adiapera/xss_create2_boidcms_2.1.0",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-323xx/CVE-2024-32344.json
Normal file
20
CVE-2024/CVE-2024-323xx/CVE-2024-32344.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-32344",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T21:15:09.677",
|
||||
"lastModified": "2024-04-17T21:15:09.677",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in the Settings menu of CMSimple v5.15 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Edit parameter under the Language section."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/adiapera/xss_language_cmsimple_5.15/blob/main/README.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-323xx/CVE-2024-32345.json
Normal file
20
CVE-2024/CVE-2024-323xx/CVE-2024-32345.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-32345",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T21:15:09.727",
|
||||
"lastModified": "2024-04-17T21:15:09.727",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in the Settings menu of CMSimple v5.15 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Configuration parameter under the Language section."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/adiapera/xss_language_cmsimple_5.15",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-327xx/CVE-2024-32743.json
Normal file
20
CVE-2024/CVE-2024-327xx/CVE-2024-32743.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-32743",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T21:15:09.783",
|
||||
"lastModified": "2024-04-17T21:15:09.783",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the SITE LANGUAGE CONFIG parameter under the Security module."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/adiapera/xss_security_wondercms_3.4.3",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-327xx/CVE-2024-32744.json
Normal file
20
CVE-2024/CVE-2024-327xx/CVE-2024-32744.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-32744",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T21:15:09.843",
|
||||
"lastModified": "2024-04-17T21:15:09.843",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the PAGE KEYWORDS parameter under the CURRENT PAGE module."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/adiapera/xss_current_page_wondercms_3.4.3",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-327xx/CVE-2024-32745.json
Normal file
20
CVE-2024/CVE-2024-327xx/CVE-2024-32745.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-32745",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T21:15:09.897",
|
||||
"lastModified": "2024-04-17T21:15:09.897",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the PAGE DESCRIPTION parameter under the CURRENT PAGE module."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/adiapera/xss_current_page_wondercms_3.4.3",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-327xx/CVE-2024-32746.json
Normal file
20
CVE-2024/CVE-2024-327xx/CVE-2024-32746.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-32746",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T21:15:09.943",
|
||||
"lastModified": "2024-04-17T21:15:09.943",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the MENU parameter under the Menu module."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/adiapera/xss_menu_page_wondercms_3.4.3",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3323",
|
||||
"sourceIdentifier": "security@tibco.com",
|
||||
"published": "2024-04-17T19:15:08.177",
|
||||
"lastModified": "2024-04-17T19:15:08.177",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2024/CVE-2024-38xx/CVE-2024-3817.json
Normal file
55
CVE-2024/CVE-2024-38xx/CVE-2024-3817.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-3817",
|
||||
"sourceIdentifier": "security@hashicorp.com",
|
||||
"published": "2024-04-17T20:15:08.383",
|
||||
"lastModified": "2024-04-17T20:15:08.383",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HashiCorp\u2019s go-getter library is vulnerable to argument injection when executing Git to discover remote branches. \n\nThis vulnerability does not affect the go-getter/v2 branch and package."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@hashicorp.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@hashicorp.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-88"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://discuss.hashicorp.com/t/hcsec-2024-09-hashicorp-go-getter-vulnerable-to-argument-injection-when-fetching-remote-default-git-branches/66040",
|
||||
"source": "security@hashicorp.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3900",
|
||||
"sourceIdentifier": "xpdf@xpdfreader.com",
|
||||
"published": "2024-04-17T19:15:08.347",
|
||||
"lastModified": "2024-04-17T19:15:08.347",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3914",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-04-17T18:15:16.400",
|
||||
"lastModified": "2024-04-17T18:15:16.400",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
98
README.md
98
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-17T20:00:41.848415+00:00
|
||||
2024-04-17T22:00:37.604106+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-17T19:55:31.323000+00:00
|
||||
2024-04-17T21:15:09.943000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,64 +33,62 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
246164
|
||||
246182
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `26`
|
||||
Recently added CVEs: `18`
|
||||
|
||||
- [CVE-2024-29950](CVE-2024/CVE-2024-299xx/CVE-2024-29950.json) (`2024-04-17T19:15:07.213`)
|
||||
- [CVE-2024-30950](CVE-2024/CVE-2024-309xx/CVE-2024-30950.json) (`2024-04-17T19:15:07.420`)
|
||||
- [CVE-2024-30951](CVE-2024/CVE-2024-309xx/CVE-2024-30951.json) (`2024-04-17T18:15:15.947`)
|
||||
- [CVE-2024-30953](CVE-2024/CVE-2024-309xx/CVE-2024-30953.json) (`2024-04-17T19:15:07.470`)
|
||||
- [CVE-2024-30982](CVE-2024/CVE-2024-309xx/CVE-2024-30982.json) (`2024-04-17T18:15:16.037`)
|
||||
- [CVE-2024-30985](CVE-2024/CVE-2024-309xx/CVE-2024-30985.json) (`2024-04-17T18:15:16.097`)
|
||||
- [CVE-2024-30986](CVE-2024/CVE-2024-309xx/CVE-2024-30986.json) (`2024-04-17T18:15:16.157`)
|
||||
- [CVE-2024-30987](CVE-2024/CVE-2024-309xx/CVE-2024-30987.json) (`2024-04-17T18:15:16.210`)
|
||||
- [CVE-2024-30988](CVE-2024/CVE-2024-309xx/CVE-2024-30988.json) (`2024-04-17T18:15:16.273`)
|
||||
- [CVE-2024-30989](CVE-2024/CVE-2024-309xx/CVE-2024-30989.json) (`2024-04-17T19:15:07.520`)
|
||||
- [CVE-2024-30990](CVE-2024/CVE-2024-309xx/CVE-2024-30990.json) (`2024-04-17T19:15:07.570`)
|
||||
- [CVE-2024-31031](CVE-2024/CVE-2024-310xx/CVE-2024-31031.json) (`2024-04-17T19:15:07.623`)
|
||||
- [CVE-2024-31040](CVE-2024/CVE-2024-310xx/CVE-2024-31040.json) (`2024-04-17T19:15:07.680`)
|
||||
- [CVE-2024-31041](CVE-2024/CVE-2024-310xx/CVE-2024-31041.json) (`2024-04-17T19:15:07.733`)
|
||||
- [CVE-2024-31580](CVE-2024/CVE-2024-315xx/CVE-2024-31580.json) (`2024-04-17T19:15:07.783`)
|
||||
- [CVE-2024-31581](CVE-2024/CVE-2024-315xx/CVE-2024-31581.json) (`2024-04-17T19:15:07.840`)
|
||||
- [CVE-2024-31582](CVE-2024/CVE-2024-315xx/CVE-2024-31582.json) (`2024-04-17T19:15:07.893`)
|
||||
- [CVE-2024-31583](CVE-2024/CVE-2024-315xx/CVE-2024-31583.json) (`2024-04-17T19:15:07.950`)
|
||||
- [CVE-2024-31585](CVE-2024/CVE-2024-315xx/CVE-2024-31585.json) (`2024-04-17T19:15:08.007`)
|
||||
- [CVE-2024-32161](CVE-2024/CVE-2024-321xx/CVE-2024-32161.json) (`2024-04-17T18:15:16.337`)
|
||||
- [CVE-2024-32162](CVE-2024/CVE-2024-321xx/CVE-2024-32162.json) (`2024-04-17T19:15:08.060`)
|
||||
- [CVE-2024-32163](CVE-2024/CVE-2024-321xx/CVE-2024-32163.json) (`2024-04-17T19:15:08.117`)
|
||||
- [CVE-2024-3323](CVE-2024/CVE-2024-33xx/CVE-2024-3323.json) (`2024-04-17T19:15:08.177`)
|
||||
- [CVE-2024-3900](CVE-2024/CVE-2024-39xx/CVE-2024-3900.json) (`2024-04-17T19:15:08.347`)
|
||||
- [CVE-2024-3914](CVE-2024/CVE-2024-39xx/CVE-2024-3914.json) (`2024-04-17T18:15:16.400`)
|
||||
- [CVE-2024-0257](CVE-2024/CVE-2024-02xx/CVE-2024-0257.json) (`2024-04-17T20:15:07.407`)
|
||||
- [CVE-2024-21989](CVE-2024/CVE-2024-219xx/CVE-2024-21989.json) (`2024-04-17T20:15:07.663`)
|
||||
- [CVE-2024-21990](CVE-2024/CVE-2024-219xx/CVE-2024-21990.json) (`2024-04-17T20:15:07.863`)
|
||||
- [CVE-2024-29951](CVE-2024/CVE-2024-299xx/CVE-2024-29951.json) (`2024-04-17T20:15:08.060`)
|
||||
- [CVE-2024-32337](CVE-2024/CVE-2024-323xx/CVE-2024-32337.json) (`2024-04-17T21:15:09.267`)
|
||||
- [CVE-2024-32338](CVE-2024/CVE-2024-323xx/CVE-2024-32338.json) (`2024-04-17T21:15:09.343`)
|
||||
- [CVE-2024-32339](CVE-2024/CVE-2024-323xx/CVE-2024-32339.json) (`2024-04-17T21:15:09.400`)
|
||||
- [CVE-2024-32340](CVE-2024/CVE-2024-323xx/CVE-2024-32340.json) (`2024-04-17T21:15:09.453`)
|
||||
- [CVE-2024-32341](CVE-2024/CVE-2024-323xx/CVE-2024-32341.json) (`2024-04-17T21:15:09.507`)
|
||||
- [CVE-2024-32342](CVE-2024/CVE-2024-323xx/CVE-2024-32342.json) (`2024-04-17T21:15:09.560`)
|
||||
- [CVE-2024-32343](CVE-2024/CVE-2024-323xx/CVE-2024-32343.json) (`2024-04-17T21:15:09.623`)
|
||||
- [CVE-2024-32344](CVE-2024/CVE-2024-323xx/CVE-2024-32344.json) (`2024-04-17T21:15:09.677`)
|
||||
- [CVE-2024-32345](CVE-2024/CVE-2024-323xx/CVE-2024-32345.json) (`2024-04-17T21:15:09.727`)
|
||||
- [CVE-2024-32743](CVE-2024/CVE-2024-327xx/CVE-2024-32743.json) (`2024-04-17T21:15:09.783`)
|
||||
- [CVE-2024-32744](CVE-2024/CVE-2024-327xx/CVE-2024-32744.json) (`2024-04-17T21:15:09.843`)
|
||||
- [CVE-2024-32745](CVE-2024/CVE-2024-327xx/CVE-2024-32745.json) (`2024-04-17T21:15:09.897`)
|
||||
- [CVE-2024-32746](CVE-2024/CVE-2024-327xx/CVE-2024-32746.json) (`2024-04-17T21:15:09.943`)
|
||||
- [CVE-2024-3817](CVE-2024/CVE-2024-38xx/CVE-2024-3817.json) (`2024-04-17T20:15:08.383`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `20`
|
||||
Recently modified CVEs: `45`
|
||||
|
||||
- [CVE-2021-46904](CVE-2021/CVE-2021-469xx/CVE-2021-46904.json) (`2024-04-17T19:33:10.603`)
|
||||
- [CVE-2021-46905](CVE-2021/CVE-2021-469xx/CVE-2021-46905.json) (`2024-04-17T19:30:05.020`)
|
||||
- [CVE-2022-48626](CVE-2022/CVE-2022-486xx/CVE-2022-48626.json) (`2024-04-17T19:28:53.540`)
|
||||
- [CVE-2023-1386](CVE-2023/CVE-2023-13xx/CVE-2023-1386.json) (`2024-04-17T18:15:15.650`)
|
||||
- [CVE-2023-52465](CVE-2023/CVE-2023-524xx/CVE-2023-52465.json) (`2024-04-17T19:16:10.137`)
|
||||
- [CVE-2023-52467](CVE-2023/CVE-2023-524xx/CVE-2023-52467.json) (`2024-04-17T19:14:26.123`)
|
||||
- [CVE-2023-52468](CVE-2023/CVE-2023-524xx/CVE-2023-52468.json) (`2024-04-17T19:00:42.287`)
|
||||
- [CVE-2023-52469](CVE-2023/CVE-2023-524xx/CVE-2023-52469.json) (`2024-04-17T19:00:15.850`)
|
||||
- [CVE-2023-52470](CVE-2023/CVE-2023-524xx/CVE-2023-52470.json) (`2024-04-17T18:46:07.810`)
|
||||
- [CVE-2023-52471](CVE-2023/CVE-2023-524xx/CVE-2023-52471.json) (`2024-04-17T18:59:17.447`)
|
||||
- [CVE-2023-52472](CVE-2023/CVE-2023-524xx/CVE-2023-52472.json) (`2024-04-17T18:47:08.097`)
|
||||
- [CVE-2023-52473](CVE-2023/CVE-2023-524xx/CVE-2023-52473.json) (`2024-04-17T18:30:15.123`)
|
||||
- [CVE-2024-26595](CVE-2024/CVE-2024-265xx/CVE-2024-26595.json) (`2024-04-17T19:55:31.323`)
|
||||
- [CVE-2024-26596](CVE-2024/CVE-2024-265xx/CVE-2024-26596.json) (`2024-04-17T19:54:59.240`)
|
||||
- [CVE-2024-26597](CVE-2024/CVE-2024-265xx/CVE-2024-26597.json) (`2024-04-17T19:46:28.827`)
|
||||
- [CVE-2024-26598](CVE-2024/CVE-2024-265xx/CVE-2024-26598.json) (`2024-04-17T19:40:31.310`)
|
||||
- [CVE-2024-26599](CVE-2024/CVE-2024-265xx/CVE-2024-26599.json) (`2024-04-17T19:34:01.837`)
|
||||
- [CVE-2024-26600](CVE-2024/CVE-2024-266xx/CVE-2024-26600.json) (`2024-04-17T18:29:25.140`)
|
||||
- [CVE-2024-26601](CVE-2024/CVE-2024-266xx/CVE-2024-26601.json) (`2024-04-17T18:03:41.003`)
|
||||
- [CVE-2024-26602](CVE-2024/CVE-2024-266xx/CVE-2024-26602.json) (`2024-04-17T18:01:43.820`)
|
||||
- [CVE-2024-30953](CVE-2024/CVE-2024-309xx/CVE-2024-30953.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-30980](CVE-2024/CVE-2024-309xx/CVE-2024-30980.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-30981](CVE-2024/CVE-2024-309xx/CVE-2024-30981.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-30982](CVE-2024/CVE-2024-309xx/CVE-2024-30982.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-30983](CVE-2024/CVE-2024-309xx/CVE-2024-30983.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-30985](CVE-2024/CVE-2024-309xx/CVE-2024-30985.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-30986](CVE-2024/CVE-2024-309xx/CVE-2024-30986.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-30987](CVE-2024/CVE-2024-309xx/CVE-2024-30987.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-30988](CVE-2024/CVE-2024-309xx/CVE-2024-30988.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-30989](CVE-2024/CVE-2024-309xx/CVE-2024-30989.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-30990](CVE-2024/CVE-2024-309xx/CVE-2024-30990.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-31031](CVE-2024/CVE-2024-310xx/CVE-2024-31031.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-31040](CVE-2024/CVE-2024-310xx/CVE-2024-31040.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-31041](CVE-2024/CVE-2024-310xx/CVE-2024-31041.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-31580](CVE-2024/CVE-2024-315xx/CVE-2024-31580.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-31581](CVE-2024/CVE-2024-315xx/CVE-2024-31581.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-31582](CVE-2024/CVE-2024-315xx/CVE-2024-31582.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-31583](CVE-2024/CVE-2024-315xx/CVE-2024-31583.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-31585](CVE-2024/CVE-2024-315xx/CVE-2024-31585.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-32161](CVE-2024/CVE-2024-321xx/CVE-2024-32161.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-32162](CVE-2024/CVE-2024-321xx/CVE-2024-32162.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-32163](CVE-2024/CVE-2024-321xx/CVE-2024-32163.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-3323](CVE-2024/CVE-2024-33xx/CVE-2024-3323.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-3900](CVE-2024/CVE-2024-39xx/CVE-2024-3900.json) (`2024-04-17T20:08:21.887`)
|
||||
- [CVE-2024-3914](CVE-2024/CVE-2024-39xx/CVE-2024-3914.json) (`2024-04-17T20:08:21.887`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
148
_state.csv
148
_state.csv
@ -186633,8 +186633,8 @@ CVE-2021-46900,0,0,e195cd7cb24b95e31a6122d6f3d56cdcb4ddfc8ff41351544f7397822bc57
|
||||
CVE-2021-46901,0,0,1665cb5ca539440295d8a959d2760d12b56c4be1868c712c96ca3dcd4d3dde1d,2024-01-08T19:09:08.890000
|
||||
CVE-2021-46902,0,0,15d8c1cefd0a39c70036d20031a514b6fb8f249aa94f97dfa235932c5c479f7f,2024-02-13T00:38:32.413000
|
||||
CVE-2021-46903,0,0,59ca1d694c639409297840c930e3dd8d372cadedd1376cf64770674d9911e3bf,2024-02-13T00:38:22.293000
|
||||
CVE-2021-46904,0,1,1e5cdb8111ac3ebc9ff67e07a9414ffe41bea2d21af2ac7f05b215aeaaf55f3c,2024-04-17T19:33:10.603000
|
||||
CVE-2021-46905,0,1,648ee6d7f976c16402e014347f49c2cfe4f4f6402f6e950832beef480b0d8048,2024-04-17T19:30:05.020000
|
||||
CVE-2021-46904,0,0,1e5cdb8111ac3ebc9ff67e07a9414ffe41bea2d21af2ac7f05b215aeaaf55f3c,2024-04-17T19:33:10.603000
|
||||
CVE-2021-46905,0,0,648ee6d7f976c16402e014347f49c2cfe4f4f6402f6e950832beef480b0d8048,2024-04-17T19:30:05.020000
|
||||
CVE-2021-46906,0,0,bf734f670ee9140d82682c788c01f012ad63303e92d0e667406fbbec776fa010,2024-04-17T17:28:34.403000
|
||||
CVE-2021-46907,0,0,1f9b2c2375fa009b016f94aa5d024afa767a5a81d6bdb7bf20e32e33a05d91c6,2024-03-19T13:15:06.713000
|
||||
CVE-2021-46908,0,0,c907e4fb4d3fa9a6ffcaae744e9f1d5229b787cdf737a500f4fe0a442a5992d3,2024-04-17T17:15:29.787000
|
||||
@ -211473,7 +211473,7 @@ CVE-2022-48622,0,0,ec3892c719560f573e15b7aeaf0ff6e1061faa317127aa4fe22d07724deb3
|
||||
CVE-2022-48623,0,0,35796016b2974df38876f788a8262118276143c1be8b81a53a3c19ad985851f1,2024-02-13T14:01:07.747000
|
||||
CVE-2022-48624,0,0,3443005982091900e80529213830120f211c919372f2b4459da27a12e635ec55,2024-02-20T19:50:53.960000
|
||||
CVE-2022-48625,0,0,7bc403b36bf8fdca3e98a9856c6ae990f3da4d13f0f27b5e9dd4164789f34420,2024-02-20T19:50:53.960000
|
||||
CVE-2022-48626,0,1,fe9ecc659da3a3680a7b1ff34d0eba00cc9cf4e4a95ca902684bc881fe5e286f,2024-04-17T19:28:53.540000
|
||||
CVE-2022-48626,0,0,fe9ecc659da3a3680a7b1ff34d0eba00cc9cf4e4a95ca902684bc881fe5e286f,2024-04-17T19:28:53.540000
|
||||
CVE-2022-48627,0,0,22229bbcfc221c1a66d57361893659703193a672850e59d004737cb18434f698,2024-04-13T12:15:10.870000
|
||||
CVE-2022-48628,0,0,53833f4c493a0dc2eadce20e074749d0beda4aee81d045b4d048c848f17d5c49,2024-03-04T13:58:23.447000
|
||||
CVE-2022-48629,0,0,fa048196d2bfc6b10ff3d7f516159c362398b51507f15ab4e218ad5e1ec3c673,2024-03-21T02:44:43.813000
|
||||
@ -212898,7 +212898,7 @@ CVE-2023-1382,0,0,2ff04136b97a82ef95cb0a63637cf8c6e647c72610871a27a03c821c2fdd8b
|
||||
CVE-2023-1383,0,0,16fe9490866699d274f01d207b9e9b0d88278792dd331fd3adc396454ea7b371,2023-05-12T15:23:11.763000
|
||||
CVE-2023-1384,0,0,5fbdf26c58db19c8f849842425cb98174883125efa7455027dff2c16110f7e91,2023-05-12T16:06:10.987000
|
||||
CVE-2023-1385,0,0,57c934c76339b7770ffae52ce954668384f98181f7930dd97526c7381fbe3f53,2023-05-12T16:07:46.433000
|
||||
CVE-2023-1386,0,1,73def10b341d1ede3eebca18d1974201a64612e53db37ee84c79569ce427b21f,2024-04-17T18:15:15.650000
|
||||
CVE-2023-1386,0,0,73def10b341d1ede3eebca18d1974201a64612e53db37ee84c79569ce427b21f,2024-04-17T18:15:15.650000
|
||||
CVE-2023-1387,0,0,22c9008dd886760fbeb8686b275fd7e94e067c4821d7b8a777e75c46a54273c0,2023-06-09T08:15:09.287000
|
||||
CVE-2023-1388,0,0,9b4908cb19e31a63ecffd8f71bb09f3ad5a3d0c27f8352f8a1c355071a42aac5,2023-06-13T18:58:22.700000
|
||||
CVE-2023-1389,0,0,4ca619e9e1f096cded69e25f27e399129a3e22433ce8768f84ff9eca3f6c7bf3,2023-08-11T15:15:09.760000
|
||||
@ -236361,19 +236361,19 @@ CVE-2023-52459,0,0,c11aebe2be21999c43ab80746556120222524712be70c9c8bb4eb5ed37d63
|
||||
CVE-2023-5246,0,0,efc93f05f4d6576c2fefda617ffc50a2cd42a25ecc2a7e9c2794376627e129e7,2023-10-31T11:58:05.363000
|
||||
CVE-2023-52460,0,0,7b5ce003348e2b0c98c11a11dd79b88b3d4e9f665c8574fd29056aa818d9e331,2024-02-23T16:14:43.447000
|
||||
CVE-2023-52461,0,0,0e4def3da0077977c0198465fc1be0f30b9f34acfdf83f12cf0b89000b004b24,2024-02-23T16:14:43.447000
|
||||
CVE-2023-52462,0,0,20ba12f9b584ea9029478bee5d96be5eff52d04472ac0a5dc42253960d917772,2024-02-23T16:14:43.447000
|
||||
CVE-2023-52463,0,0,d2f59f8423a5a06cfc6fffd134596a3946afed945a229e47ce85482973c45abd,2024-02-23T16:14:43.447000
|
||||
CVE-2023-52464,0,0,42a3908c37b4dc5e025800440c043a58b21bbf0e27c9316a1a4fe7451f45d14e,2024-02-23T16:14:43.447000
|
||||
CVE-2023-52465,0,1,6a5dcf0470f7260e5fd224572c4161bebbfa4c6574c6970c9035eff59a929169,2024-04-17T19:16:10.137000
|
||||
CVE-2023-52462,0,1,a6858cfa3be5f63a7738068f3ab5f364e25a3cd7a6d64375ec3da8239879f2ce,2024-04-17T20:06:29.470000
|
||||
CVE-2023-52463,0,1,fd8c09fdc6750081e23478ebe940972345e6f17003751e11523c5f3c82cfd70e,2024-04-17T20:05:08.550000
|
||||
CVE-2023-52464,0,1,408f9e82ceb39cb0693e873fd1b68d757ba0b997a8bd1004cfc7ca65795a29a8,2024-04-17T20:03:39.197000
|
||||
CVE-2023-52465,0,0,6a5dcf0470f7260e5fd224572c4161bebbfa4c6574c6970c9035eff59a929169,2024-04-17T19:16:10.137000
|
||||
CVE-2023-52466,0,0,56f8cc53f82884aedbecde370c65172b4b8e71564d7391aaf8319e40e8aedfea,2024-03-03T08:15:07.860000
|
||||
CVE-2023-52467,0,1,2586e47be7451ec0eb9012c78cafa4c383b571576b9d9ac380cf0041f4e7df56,2024-04-17T19:14:26.123000
|
||||
CVE-2023-52468,0,1,fe3f595a9e32527f64ad43de3bd7face21975d6f52b454b14553492f7129b561,2024-04-17T19:00:42.287000
|
||||
CVE-2023-52469,0,1,d09c48e81938c893cd90e7b645c0b7b2ed2ec8ed534826e863fbe38e70c7064e,2024-04-17T19:00:15.850000
|
||||
CVE-2023-52467,0,0,2586e47be7451ec0eb9012c78cafa4c383b571576b9d9ac380cf0041f4e7df56,2024-04-17T19:14:26.123000
|
||||
CVE-2023-52468,0,0,fe3f595a9e32527f64ad43de3bd7face21975d6f52b454b14553492f7129b561,2024-04-17T19:00:42.287000
|
||||
CVE-2023-52469,0,0,d09c48e81938c893cd90e7b645c0b7b2ed2ec8ed534826e863fbe38e70c7064e,2024-04-17T19:00:15.850000
|
||||
CVE-2023-5247,0,0,1476fd60cd067d05ec1c6bec9fda463c4aea196d092298e87bdb01efe1f6d4ee,2023-12-05T18:28:03.620000
|
||||
CVE-2023-52470,0,1,2563d20c3c7015384c93b958f5879eabf79d5f2d8997fe7964d3964e089afcac,2024-04-17T18:46:07.810000
|
||||
CVE-2023-52471,0,1,e6a09c3263f5ee25f272c7210d9c40fff45789f95839246ac1f5db8c7fdf7f3d,2024-04-17T18:59:17.447000
|
||||
CVE-2023-52472,0,1,edc4f7e5d10bf4a89ae0187405990e8427761603a834ab938210e497cc202d0d,2024-04-17T18:47:08.097000
|
||||
CVE-2023-52473,0,1,d09aff827319bc04f5ef644dc78ee7877cac2a37a8095f47a84a2bc16cbbedcc,2024-04-17T18:30:15.123000
|
||||
CVE-2023-52470,0,0,2563d20c3c7015384c93b958f5879eabf79d5f2d8997fe7964d3964e089afcac,2024-04-17T18:46:07.810000
|
||||
CVE-2023-52471,0,0,e6a09c3263f5ee25f272c7210d9c40fff45789f95839246ac1f5db8c7fdf7f3d,2024-04-17T18:59:17.447000
|
||||
CVE-2023-52472,0,0,edc4f7e5d10bf4a89ae0187405990e8427761603a834ab938210e497cc202d0d,2024-04-17T18:47:08.097000
|
||||
CVE-2023-52473,0,0,d09aff827319bc04f5ef644dc78ee7877cac2a37a8095f47a84a2bc16cbbedcc,2024-04-17T18:30:15.123000
|
||||
CVE-2023-52474,0,0,fa04b769255650c27d39cf302de235016c10d86e6615091a97baeebfcb3f3f19,2024-04-17T17:15:54.283000
|
||||
CVE-2023-52475,0,0,aea1f61605749b823b9030eaa04c6190ad328a4a027c1710dde7c15d17b7e88d,2024-02-29T13:49:29.390000
|
||||
CVE-2023-52476,0,0,9cb1bc3168cdade3d6916d674b6fa120b5a505e7a4001b9aab86132cf27a69a5,2024-02-29T13:49:29.390000
|
||||
@ -236691,19 +236691,19 @@ CVE-2023-5391,0,0,e65a9210280128a68a8a49095d5446b17a62134416876921dbd7f459dcc8b6
|
||||
CVE-2023-5392,0,0,b42034625f9c3fabfc8867568db949560e09d3aacfbd4028ff9bc13a93a69335,2024-04-12T12:44:04.930000
|
||||
CVE-2023-5393,0,0,ae225fdb3ef98523f87759a2241acbc1653c225f05c425367012260bb5f418b1,2024-04-12T12:44:04.930000
|
||||
CVE-2023-5394,0,0,f13455681dc15f525d1bc3145edc9cd38f2f868bb7ce4f99746af5bcf05da4b0,2024-04-12T12:43:57.400000
|
||||
CVE-2023-5395,0,0,e348963069a61f367336cf5dcb975ae7652976bbe983c5e1ad3bd549093c6624,2024-04-17T17:15:12.850000
|
||||
CVE-2023-5396,0,0,7675ae8c98684077b8e5fbe3f54acbb1f9ecb5045046c985e5bd2b7c8a399c25,2024-04-17T17:15:13.060000
|
||||
CVE-2023-5397,0,0,9186e556ff6b1915c5afeecd6305b91af18c937c9dd6526333b4158b75b09bdd,2024-04-17T17:15:13.240000
|
||||
CVE-2023-5398,0,0,a653a75e1fe1e623868332127e56e3b4d2b81b6033720d9e99a549ae08629dca,2024-04-17T17:15:13.430000
|
||||
CVE-2023-5395,0,1,a2da77fb4dcf161c60c1a5bc092bec4f8463d699c76d6d8a836d336771c62e40,2024-04-17T20:08:21.887000
|
||||
CVE-2023-5396,0,1,4979b04e66bf3e42d10ca69f5aecdc2478cb6aa7fabfe250366220d8a4dcc5dd,2024-04-17T20:08:21.887000
|
||||
CVE-2023-5397,0,1,358e75c59ccf48ac869ac2aada2c194b7ba121f4f8593e90a4867a69bd6f1af6,2024-04-17T20:08:21.887000
|
||||
CVE-2023-5398,0,1,b5e2c0e908c21e5a2452ffca3549856019138410bb200d8c394f40b4a6aa7468,2024-04-17T20:08:21.887000
|
||||
CVE-2023-5399,0,0,2d6fd5d7032d3fde2b56bbe17324f865d32db5a9ef5d31298ecfc99142786140,2023-10-29T02:33:20.933000
|
||||
CVE-2023-5400,0,0,f5535fba5368557ef10d1061f0570458543da8e9ab0455a8527957d0a92e59e4,2024-04-17T17:15:13.610000
|
||||
CVE-2023-5401,0,0,2c03ac2be4270bcaeda95260af11230041858de11d8edcb93c0ecbdc91312e8c,2024-04-17T17:15:13.790000
|
||||
CVE-2023-5400,0,1,dadbfb3e8ca277c660ee903ae4fc754e46f36a2c46a5b8f021ff31fe8382f48f,2024-04-17T20:08:21.887000
|
||||
CVE-2023-5401,0,1,b6852b97c80de00906e79bad3b2554401757c8b44e2ded17395ded0afb7bdfbd,2024-04-17T20:08:21.887000
|
||||
CVE-2023-5402,0,0,d6ca0e0d138e7f0e18108bc80eb991912358210793d36b8686051b13c8765059,2023-10-11T19:19:54.037000
|
||||
CVE-2023-5403,0,0,7179ea13d2d47fc05834a0767b58dd0a45e07b295f724f155bf1a9a62f894893,2024-04-17T17:15:13.960000
|
||||
CVE-2023-5404,0,0,3fce55ebbdb5acd5e340d7323a414827e6294a25093c3449c6963c1b93782bba,2024-04-17T17:15:14.130000
|
||||
CVE-2023-5405,0,0,3b8984381979da0f9dc435b6f64a6e2a47332e3cf9ded085c64ba64be78cbbd5,2024-04-17T17:15:14.300000
|
||||
CVE-2023-5406,0,0,02e9f6ee45397dd428bab971a92c1af2308eb7aa9ed6c6445740cac0637a0f9d,2024-04-17T17:15:14.480000
|
||||
CVE-2023-5407,0,0,795cb89e33e6854558d1fda8a1594034a6b4bfa1946b6539823e4b4354b84273,2024-04-17T17:15:14.650000
|
||||
CVE-2023-5403,0,1,fcb688f0813aed33e039e333a34e02b1391a7070d4a9b82502290b5f7c5bd6a4,2024-04-17T20:08:21.887000
|
||||
CVE-2023-5404,0,1,5fff080adff748193bb058c6e01a87713d985f0aef08133fbf79a91dfa7db6c5,2024-04-17T20:08:21.887000
|
||||
CVE-2023-5405,0,1,57e90ffdedad9aaa43afed8417c5ae15d1efbc8ac784816d2bfaa03a0f7d61a2,2024-04-17T20:08:21.887000
|
||||
CVE-2023-5406,0,1,b41292380c53714f5301351ed91bb8695c34d59328354b61886b296a5c138518,2024-04-17T20:08:21.887000
|
||||
CVE-2023-5407,0,1,bb88b7b188333db36e8ea21e5fc56d7748420685c37b807be6241e72d624fac9,2024-04-17T20:08:21.887000
|
||||
CVE-2023-5408,0,0,443628942e473656420f67d7b7b9b3fa498d5d13f709544aa261b0e4696090c6,2024-01-21T01:48:09.767000
|
||||
CVE-2023-5409,0,0,fbd015e1d6485109c973409b573d46ee4742f3527e9f86b450178ea53a356496,2023-10-20T15:42:22.057000
|
||||
CVE-2023-5410,0,0,3afa624573d7dfa13f8b27aa43095672b709f7063dade6dd92133c498fc07d7e,2024-03-13T12:33:51.697000
|
||||
@ -238405,6 +238405,7 @@ CVE-2024-0253,0,0,3129a8e2d9a5828700b1ccdea9c9e089dce30930205a51c85db6174b2d6e02
|
||||
CVE-2024-0254,0,0,e5eae8b11bfbdda0720ecba88e72e29efdd7b42117ba1a4582cfd62b02acbde8,2024-02-12T20:53:02.440000
|
||||
CVE-2024-0255,0,0,541867be2e415931a41832092b931a9f6ed85b86ce138a5f77d6aa8f5909e5ad,2024-02-07T23:31:10.567000
|
||||
CVE-2024-0256,0,0,49de163342e5ba45f12c2cbfe0a11fce418d24b9f8f242901a15605875a38ffa,2024-02-14T19:17:28.387000
|
||||
CVE-2024-0257,1,1,686a99e5c25822bb255f0e0c9e1a7985ddfc1815472d758a1c25dc17463a35f7,2024-04-17T20:15:07.407000
|
||||
CVE-2024-0258,0,0,da926b444685fcbac9be2b2403a8d6738d09992d6c11f2b5b1d93a114519bfef,2024-03-13T22:15:08.970000
|
||||
CVE-2024-0259,0,0,7a566acb922b4256312ecd6b2aa6df420842221f10e688a5524aec4c1e837222,2024-03-28T16:07:30.893000
|
||||
CVE-2024-0260,0,0,18219d01805ad22a192d40452bb63dc2d586054337ab9927c409f05db0cd5b7d,2024-04-11T01:23:45.600000
|
||||
@ -240816,6 +240817,8 @@ CVE-2024-21983,0,0,ded146d4808fc5f83424e373b65cdad37794b676d9611f5162836ce6d86d8
|
||||
CVE-2024-21984,0,0,c4d05388605f2fb7e341aa0197be1de56d0ddb669904fcfa6f2ad451633ba0ba,2024-02-20T19:51:05.510000
|
||||
CVE-2024-21985,0,0,853a82d200092c0582c4290723b53256d943e3aa0955024d181a6e0dc05dbcae,2024-02-05T18:32:52.040000
|
||||
CVE-2024-21987,0,0,a312d19cf1876839a82cf4ab8a29efb39c100512ae446943b26071c9bd69f220,2024-02-16T21:39:50.223000
|
||||
CVE-2024-21989,1,1,a7ad1cf42b6bbd5d309f39c92d044ec1d2fbc193800e8b0d16e692d7b1eacd7f,2024-04-17T20:15:07.663000
|
||||
CVE-2024-21990,1,1,89cc9378f4d2495b8d48ff5432dd9a1c2f8271df3a54c40113747fb154175f09,2024-04-17T20:15:07.863000
|
||||
CVE-2024-2200,0,0,c95251fe62e0a963b7f86da5338bcf7f5fe53157d94fd1e09dd2c48a41fbdf10,2024-04-10T13:23:38.787000
|
||||
CVE-2024-22004,0,0,722cf9801f459066afdd85850c725b2e967fa83ca93b6dee72900667c46a5b4a,2024-04-08T18:49:25.863000
|
||||
CVE-2024-22005,0,0,313b9bc6d7138eced2900a2388d6d58fcc17e9d91231c0517d2cb0e3e82b9d0d,2024-03-15T20:15:07.527000
|
||||
@ -243197,15 +243200,15 @@ CVE-2024-26591,0,0,5929783d5428bb2c14c53508060d365bc2cc03643c73a5c691e380ff07f76
|
||||
CVE-2024-26592,0,0,5ff5d392da394512ac4c5d4bc3e700039f943a7b57abe9c25e65c9574333338f,2024-02-23T09:15:22.877000
|
||||
CVE-2024-26593,0,0,14e89098c4374dceb139b8720f315d2d4d167aa05c7c8c3a8d22cb5f072b2887,2024-03-11T18:15:18.673000
|
||||
CVE-2024-26594,0,0,50c57f8d072c06fc1d758c298fd45e612682bb463c5ced52358cf263ead62b05,2024-02-23T16:14:43.447000
|
||||
CVE-2024-26595,0,1,4aab14a348ba85d767a05d71533f3a3f5d4b6347adf8eb4cca8cbcf592f0a830,2024-04-17T19:55:31.323000
|
||||
CVE-2024-26596,0,1,ec7de6cfd89ff8a670c626a8cfceb80cf8d6a85a0db935f1a22cdd71fbe71243,2024-04-17T19:54:59.240000
|
||||
CVE-2024-26597,0,1,c485f672f2d5b1fb393f658111b877d60c67f5a38eb6ee86a5344b881a0760a2,2024-04-17T19:46:28.827000
|
||||
CVE-2024-26598,0,1,dacf909cf6b348800ffc19d98ca0a28d9d2230d6a0c1647e96b5a8f5428b2a7e,2024-04-17T19:40:31.310000
|
||||
CVE-2024-26599,0,1,dda6c0811ddef448093e42d12d857e594768c4ec8a914fb75b8d540daf2fa62a,2024-04-17T19:34:01.837000
|
||||
CVE-2024-26595,0,0,4aab14a348ba85d767a05d71533f3a3f5d4b6347adf8eb4cca8cbcf592f0a830,2024-04-17T19:55:31.323000
|
||||
CVE-2024-26596,0,0,ec7de6cfd89ff8a670c626a8cfceb80cf8d6a85a0db935f1a22cdd71fbe71243,2024-04-17T19:54:59.240000
|
||||
CVE-2024-26597,0,0,c485f672f2d5b1fb393f658111b877d60c67f5a38eb6ee86a5344b881a0760a2,2024-04-17T19:46:28.827000
|
||||
CVE-2024-26598,0,0,dacf909cf6b348800ffc19d98ca0a28d9d2230d6a0c1647e96b5a8f5428b2a7e,2024-04-17T19:40:31.310000
|
||||
CVE-2024-26599,0,0,dda6c0811ddef448093e42d12d857e594768c4ec8a914fb75b8d540daf2fa62a,2024-04-17T19:34:01.837000
|
||||
CVE-2024-2660,0,0,4c72efaeff53ee65e5810791290c8031a58671a377a7f696900b9cf4cce27193,2024-04-04T19:24:50.670000
|
||||
CVE-2024-26600,0,1,3a2050916bdfa0d08b64662508abb5cee0cdc4a8b81c3b9a4c1199d2d8ee43a0,2024-04-17T18:29:25.140000
|
||||
CVE-2024-26601,0,1,30ccc6d67db0573a68b804997cf6e9843de67fe7ac91aac1c32f4e8d41a6efce,2024-04-17T18:03:41.003000
|
||||
CVE-2024-26602,0,1,74a07df687505b0074c6bd2fd2ef070cc30b5b21b7d32767a6a2de77b8e2bf18,2024-04-17T18:01:43.820000
|
||||
CVE-2024-26600,0,0,3a2050916bdfa0d08b64662508abb5cee0cdc4a8b81c3b9a4c1199d2d8ee43a0,2024-04-17T18:29:25.140000
|
||||
CVE-2024-26601,0,0,30ccc6d67db0573a68b804997cf6e9843de67fe7ac91aac1c32f4e8d41a6efce,2024-04-17T18:03:41.003000
|
||||
CVE-2024-26602,0,0,74a07df687505b0074c6bd2fd2ef070cc30b5b21b7d32767a6a2de77b8e2bf18,2024-04-17T18:01:43.820000
|
||||
CVE-2024-26603,0,0,ea875115abb5a013b43aabc1c8e80523fdf49c8e0a84f2554de163f8ad2e5b2f,2024-04-17T18:00:07.600000
|
||||
CVE-2024-26604,0,0,3af54300b651d19d656a5097d70c7e0dbb5923d92e6dfc43928a15db003f16f1,2024-04-17T17:55:23.003000
|
||||
CVE-2024-26605,0,0,9f5d4199e87471cbde5b1d897189efd0d3f6dda9d44375cbc6d4860e73662dc7,2024-04-17T17:47:46.583000
|
||||
@ -243552,7 +243555,7 @@ CVE-2024-26919,0,0,8ce229e6f304423499a3d2dbc331713eb1fbfa99e3cc0b71da0db8b8b65f0
|
||||
CVE-2024-2692,0,0,aefc05ddca23ffc90de039367cc7fed9a06f50bd32c460cfe2bbf1c8645c8f06,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26920,0,0,8ad9dc4497d0ab325621ba9253d9bafe6f0648f6e0dcc53db528add7b30825c1,2024-04-17T16:51:07.347000
|
||||
CVE-2024-2693,0,0,0523f248585c70810eb494560526f8a16efe419cf7f3014aa23838648b0d3e89,2024-04-10T13:23:38.787000
|
||||
CVE-2024-2700,0,0,2ca42770cf7c7cf86ee4d8d6265dda94df5f872b89d2aa713fb4c7e7054c6177,2024-04-04T16:33:06.610000
|
||||
CVE-2024-2700,0,1,ec51b942504a96d4888f64f81c70906fd44973b0d1ace8e2f862241f82ce29e0,2024-04-17T20:15:08.240000
|
||||
CVE-2024-2702,0,0,d714950951d2438da53d97b453b8470335efdb106b4a3aaafe4c816e98d263df,2024-03-20T13:00:16.367000
|
||||
CVE-2024-2703,0,0,acd3d7979e587f06a1f1c7c632685dcda516645b7d07e09f38809885e199d09c,2024-04-11T01:25:32.890000
|
||||
CVE-2024-2704,0,0,43d93bf8a377455ff126be5e869a3bdde1d4dc3bc3f3ee5e0d19691064669630,2024-04-11T01:25:32.970000
|
||||
@ -243986,7 +243989,7 @@ CVE-2024-28066,0,0,8d264de635ae9c8dc6d41b6ed16f7f85828f585eea298ce9fb065b16c3368
|
||||
CVE-2024-28069,0,0,99a57a9955c5ed5463e7c560b95e0a17dfa2789ec3c024f2825003d476d4b80d,2024-03-17T22:38:29.433000
|
||||
CVE-2024-2807,0,0,389dec77d863d88d0729c3b21a13c4f638dbaad2d7ffdf5a3bec6019fd1a7b1b,2024-04-11T01:25:36.783000
|
||||
CVE-2024-28070,0,0,c8eeec88fa6e3b91036a4eadc63dd921f090ad52309176e7af22a570b911aeac,2024-03-17T22:38:29.433000
|
||||
CVE-2024-28073,0,0,d3470e392b2a981cfa8de7e2c19ca61ffafe1d49309a8294053281b3549cfa7b,2024-04-17T17:15:14.900000
|
||||
CVE-2024-28073,0,1,11595a1e096ea791c7b3c722c3e27da07919e96619a7c3a0a6fbf6f73647b227,2024-04-17T20:08:21.887000
|
||||
CVE-2024-2808,0,0,c3ed3b9e68948cd880b53f1e926f321cf4b47941f31cc49bbad2cbe5e609284b,2024-04-11T01:25:36.883000
|
||||
CVE-2024-28084,0,0,e855eaf3201adbee7f29bca688e63324787cf32844050753a9cd1965f8c4b542,2024-03-23T03:15:11.583000
|
||||
CVE-2024-28085,0,0,50b7c8ccc5599b7ab0a3fb9fa52479a655595623006a86c4fef2d0664fd54633,2024-04-07T12:15:08.903000
|
||||
@ -244639,7 +244642,7 @@ CVE-2024-2954,0,0,297c9bf8798d95f9e2afa5ec16629f7d540183d0c516c52354e99c26b91889
|
||||
CVE-2024-2955,0,0,f5c634c6848e63b860083a99079428b98700f415e99f60bb3f05a1ae3960426b,2024-04-17T03:15:07.030000
|
||||
CVE-2024-2956,0,0,1f998613263914bb93c36fc6850584cdfe450d6dc26811c07d743b16483d0fc7,2024-03-27T12:29:30.307000
|
||||
CVE-2024-2957,0,0,ac8390067e308aa1d0182fc1e6566dfc49293a4efcfdac5c5a2e83565eda21fe,2024-04-10T13:23:38.787000
|
||||
CVE-2024-2961,1,1,210a8df2807ec3196e508036db07434ec0d54d78f1e6963718af4fae835a48d3,2024-04-17T18:15:15.833000
|
||||
CVE-2024-2961,0,1,610b24fd6115411d25cf791a8bcf1b458d114de28e9f0278881625af779bdf35,2024-04-17T20:08:21.887000
|
||||
CVE-2024-2962,0,0,66e1dbbf6553695d3f3b80872691537dfe2ee799c385611e870cc04c150d3a60,2024-03-27T12:29:30.307000
|
||||
CVE-2024-2963,0,0,fd3dfe2484fa8fbcf32b1e1713c092eebd2b546a8fe9a7f583270172bb703a7d,2024-03-29T12:45:02.937000
|
||||
CVE-2024-2964,0,0,491ec5f2811a24301edaa3e4cd378090bf610cd2f1b9a50cd7e0dcb254704174,2024-03-29T12:45:02.937000
|
||||
@ -244843,7 +244846,8 @@ CVE-2024-29947,0,0,404b741ad74b72a5c64b5b398cf3854dad20f87fcc6b108acac73a5b50a2f
|
||||
CVE-2024-29948,0,0,6b1d30acb0dbd07b9c2736b474e04bb8c45091d15b65405d56f353e5b8df50cb,2024-04-02T12:50:42.233000
|
||||
CVE-2024-29949,0,0,2c66313a6c0e08be78f3175b6236e7b43ba69f970bb136fedf0178adbd27c000,2024-04-02T12:50:42.233000
|
||||
CVE-2024-2995,0,0,c87d76122714da8733dd7ff61010b11be1c71aaeaf58b39102c125532e66911b,2024-04-11T01:25:44.730000
|
||||
CVE-2024-29950,1,1,3fa0e14a508f0e2f46c950ed35cb29e55f4b135c71a64a1ac8197980d69b0776,2024-04-17T19:15:07.213000
|
||||
CVE-2024-29950,0,1,4f55f4765dc732e5e5a2daa4589744a2dced20d7b31c8e7e2379aabe94d7be56,2024-04-17T20:08:21.887000
|
||||
CVE-2024-29951,1,1,77ce0884f5270dcd8a3d9ca69626d640acd087f2571ecfb080c37be74cd27b9e,2024-04-17T20:15:08.060000
|
||||
CVE-2024-2996,0,0,ce0ff76245864ce5ac90a5463bb82f1b7ea8cb5b36b1788a5a81e2b6f1ea29d1,2024-04-11T01:25:44.817000
|
||||
CVE-2024-2997,0,0,9898fb7013ec19b0561eed8c77e485f2157863b27165155c8b5ee1597a437181,2024-04-11T01:25:44.910000
|
||||
CVE-2024-2998,0,0,d70ba68eced6e12f3efc70fcd8b1293409b727b749095518ed0181052dee5fce,2024-04-11T01:25:44.997000
|
||||
@ -245319,25 +245323,25 @@ CVE-2024-3092,0,0,cb7f2178928a426a0265657834f9aeb630ccb1ca35a9c66bd22fe30bfcb426
|
||||
CVE-2024-3093,0,0,32bf1c70eab5da7d509a40d74982ac8945909f57d49846c0cf619694e2add382,2024-04-10T13:23:38.787000
|
||||
CVE-2024-3094,0,0,cba466c06d21b74e1043491724188f63d6d0b9ba1993a884907c833ea9999b43,2024-04-12T07:15:08.740000
|
||||
CVE-2024-30946,0,0,0dff329aaece035fc82f00595012379643bd5a0edb89ee3a7369d6609e13a4d1,2024-04-02T18:12:16.283000
|
||||
CVE-2024-30950,1,1,7a29fad884af75ba4c28adf0d41eeb5d17e89c1d30d606e65420188ec66cb6d5,2024-04-17T19:15:07.420000
|
||||
CVE-2024-30951,1,1,b54394060189d82600550be494527c6bdee56d2280244f005abde5b8380a2e64,2024-04-17T18:15:15.947000
|
||||
CVE-2024-30950,0,1,30e94ba74b1c9e764e05183270b9cbf984b1fc3b08e88dd08137339dc8cca5d1,2024-04-17T20:08:21.887000
|
||||
CVE-2024-30951,0,1,89531764b9c26fe5797ccda707596767b920928a0eb4f7604d09dbadeeec1668,2024-04-17T20:08:21.887000
|
||||
CVE-2024-30952,0,0,08d945856bbc49cc361c7cb3912a56d878635492481059b2fd432003c0a2fb40,2024-04-17T15:31:50.160000
|
||||
CVE-2024-30953,1,1,5054bda8e69e751d948845f5d7fbfbdb7f417193788be61bd38113d3953cd92e,2024-04-17T19:15:07.470000
|
||||
CVE-2024-30953,0,1,852cae3382b857c19cb395f48f623871adfde604b2fbdfac3bf020f961e4b985,2024-04-17T20:08:21.887000
|
||||
CVE-2024-30965,0,0,0e44dd5d951a25ac3e8873a32678a3145da47d1060cb5312576a9c0471b643ad,2024-04-02T18:12:16.283000
|
||||
CVE-2024-3097,0,0,d36ff609a9c55f871c6ce5cee1ea4c5f261f1965e5780dc5607289e6057964d8,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30977,0,0,0a99023cc49f8723c27525ea3fd6d09c0a18e0536fb7ad1e37e70ef0654b9714,2024-04-08T18:49:25.863000
|
||||
CVE-2024-30979,0,0,80ab36bca498e33975593d086ceeeedf107c2c6f87bef059b959bbe8c3731bf4,2024-04-17T16:51:07.347000
|
||||
CVE-2024-3098,0,0,6c9612ddcc0eabe1134a3c49c1d4f4b4a8fb99e39689761d9db9b207a4883fdf,2024-04-10T19:49:51.183000
|
||||
CVE-2024-30980,0,0,053956a796f5b9da3667cbae2abc1c1cdd79005ae463967ecd171606fbdae681,2024-04-17T17:15:15.117000
|
||||
CVE-2024-30981,0,0,53525c0ae3949cd315151ca88c3e6b1efae1b92482b51368a1cba05aa91a5863,2024-04-17T17:15:15.193000
|
||||
CVE-2024-30982,1,1,cfa8111cf652f0d39640e1dc33345cb2faba3c4028ca39ccb7d15bdb18841e1c,2024-04-17T18:15:16.037000
|
||||
CVE-2024-30983,0,0,a7bceef96b5bce11c2523c6a87d312ec510c67c08abc42e7d34ac206667bf66d,2024-04-17T17:15:15.257000
|
||||
CVE-2024-30985,1,1,f8bec284d82fd898aa1e8edf611ac99ad1abddfea8135dd73fdf5766f3975fe3,2024-04-17T18:15:16.097000
|
||||
CVE-2024-30986,1,1,691502e7ec1f9ce09c8c59bf32e74468ba01df63039547e93fba72b17906e0f6,2024-04-17T18:15:16.157000
|
||||
CVE-2024-30987,1,1,2c210a9e4e3d2a93d3aa1ecae4f0737b6a021b6d8d6510887cadbef01f26e74b,2024-04-17T18:15:16.210000
|
||||
CVE-2024-30988,1,1,691a0f38feca682cbab8db5678310380f2da574b75233fb151f2f4d726d6e559,2024-04-17T18:15:16.273000
|
||||
CVE-2024-30989,1,1,078d1ff84218313ea7e74a0b5fbb50e83194eadc33a3debd0521ec22e6579bff,2024-04-17T19:15:07.520000
|
||||
CVE-2024-30990,1,1,41277abf90d488850da8bf9c0ef492ae6e8789ecec9d7d3d81510283d1bf25e6,2024-04-17T19:15:07.570000
|
||||
CVE-2024-30980,0,1,b6cf6ccedccdc30aac9bd045f33afef7720a0fb31643362b1bc77595e9e55e09,2024-04-17T20:08:21.887000
|
||||
CVE-2024-30981,0,1,13ac7883f890039d011d9de352e748ae0884ece9e35f8213668b3d57d8e8ee92,2024-04-17T20:08:21.887000
|
||||
CVE-2024-30982,0,1,5e9b20db70b246c8c7bd1811fd8db772245b009a68cec446ceaf47d9829082f0,2024-04-17T20:08:21.887000
|
||||
CVE-2024-30983,0,1,ce4d06089af3124251611d23fb812617e40d2835454fe1bac380d5952da81a98,2024-04-17T20:08:21.887000
|
||||
CVE-2024-30985,0,1,00052514ff118cf10ea4e67d48dbef0a5515163b77f516e138dac418bac000aa,2024-04-17T20:08:21.887000
|
||||
CVE-2024-30986,0,1,f7416693205f3f95a7ba048bd1a70386f3a0dc003f10b48bf4669cf98338f65c,2024-04-17T20:08:21.887000
|
||||
CVE-2024-30987,0,1,df9e40e5f711b54d5de56510ffb9a33ffabf77ceafa889b363d20f1a3adfc264,2024-04-17T20:08:21.887000
|
||||
CVE-2024-30988,0,1,1026220b0084f0c36d417192bc1bbaa670523ffb84a262e35398566ffbcdb884,2024-04-17T20:08:21.887000
|
||||
CVE-2024-30989,0,1,7c642c418d5d3f2ee7de7d143c0abbeac9741519e893e116bc9b1e6b43c2fcd0,2024-04-17T20:08:21.887000
|
||||
CVE-2024-30990,0,1,4ff171a216e49b8a1b98a7610555a00dfe09e3bc3ec80b46c45fbd6f4f83badc,2024-04-17T20:08:21.887000
|
||||
CVE-2024-30998,0,0,179abd0db8095df44a7d1fc224d4f504797395ef6ca242b590dce2e234dbd0de,2024-04-03T12:38:04.840000
|
||||
CVE-2024-31002,0,0,96e076f675a43d72347dc0c980a987d7f8bd37cac2f635917b77c618d7fb5159,2024-04-02T12:50:42.233000
|
||||
CVE-2024-31003,0,0,3f0adfc7393f75768ba5f0ff119d336a00244f196f86b1dcc7f91a86901fc5be,2024-04-02T12:50:42.233000
|
||||
@ -245352,11 +245356,11 @@ CVE-2024-31012,0,0,59265fe10316d43a2acb459ea9de60f6a264c8b6d13bc4dae0d363d3b5d71
|
||||
CVE-2024-31013,0,0,137ba39b03bbaab20823954557195167ac08df3fa32a6782dd4080f1d723f338,2024-04-03T12:38:04.840000
|
||||
CVE-2024-31022,0,0,a14e43455f8667f5b08643f4accc0ded65ef08c98d3d4f6b069b1542bbf69336,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31025,0,0,049c3aee715c9c75f255eea2ba7d71aee620ad97e93ef3b0e0a948ae51dd0b57,2024-04-04T12:48:41.700000
|
||||
CVE-2024-31031,1,1,c96f610fa8ae496083aabf8cbda75eea462f91d4b532048c242be6c0bcd4821d,2024-04-17T19:15:07.623000
|
||||
CVE-2024-31031,0,1,b7880b3be7db11683e3f2fef6956445531209cffc8b410d3b64c7ca81fd90409,2024-04-17T20:08:21.887000
|
||||
CVE-2024-31032,0,0,71dbb2a787f73b1914bf5d51e1b83b5365eb112b3ab9ed4df5d1066682b5223b,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31033,0,0,200340e7b08fbb0d6701818d4b83bef89c21119b7d9fe7f5be450bb2b1edb614,2024-04-11T01:25:48.953000
|
||||
CVE-2024-31040,1,1,b191158d35d332c7eb45e96b1a880757ed0c855d7faebb19d0d3eeeceea8b0de,2024-04-17T19:15:07.680000
|
||||
CVE-2024-31041,1,1,9f282ca3baaf004191f2d8e082f19dff47e0ff2b795ffa40e7b20378f72efaf0,2024-04-17T19:15:07.733000
|
||||
CVE-2024-31040,0,1,ad0c36cbf6fe4e7fa7e88f6d75c08768ff866ab7dc21103ca5bdb483c62304d1,2024-04-17T20:08:21.887000
|
||||
CVE-2024-31041,0,1,65c63dc9d06ac95efa246e784659052f9342d1132b5acec915cbf1071ea1326b,2024-04-17T20:08:21.887000
|
||||
CVE-2024-31047,0,0,ed6b998d2efbbc258ad744f538162378aa1b702ac5e17462e2e5f42d9945fb08,2024-04-09T12:48:04.090000
|
||||
CVE-2024-31061,0,0,020e38014038ba97f692790c06c98735ee7323fcc8614755f16c9c5708fe33f5,2024-03-28T20:53:20.813000
|
||||
CVE-2024-31062,0,0,9a85b45f2ef9be7ff3563a8d396c3a8dd45f237219d28fbf343c7fa8953f9bf5,2024-03-28T20:53:20.813000
|
||||
@ -245594,11 +245598,11 @@ CVE-2024-3157,0,0,5a423f43ed9e43d0f3e67864a2f920e32c6b616d23d4a97009e6a50d354545
|
||||
CVE-2024-31576,0,0,741c8998460302eafaf2dd6cd838e7890c169c726e59c5f45ee51622793abfa6,2024-04-15T16:15:07.270000
|
||||
CVE-2024-31578,0,0,77ddec4d5b6b37ac0f61734499aeff3bda9cb160ccd770fe33ca29c585fd57bc,2024-04-17T15:31:50.160000
|
||||
CVE-2024-3158,0,0,d2414412e299d1c6c6fd5c25934ca9d016ec38ac6210ea884f5d6eabc2220b22,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31580,1,1,4ad8b40968ba9885bebd8c17032b4ca951b28b2224d7e371f0272debafd03e5b,2024-04-17T19:15:07.783000
|
||||
CVE-2024-31581,1,1,3f1e8f542f05a00ff70098cb18ee6eb70b71dd3ef7c2890cef8bace638e8dbe0,2024-04-17T19:15:07.840000
|
||||
CVE-2024-31582,1,1,297745caa1a86774b7b1a2deb15bda53399ac8f338d76f260e624710b4ccdf11,2024-04-17T19:15:07.893000
|
||||
CVE-2024-31583,1,1,3a07a0fcfe9fc4c6dfe2879ef92ea55757cc8c139da4aaf59dde84ec89986ec2,2024-04-17T19:15:07.950000
|
||||
CVE-2024-31585,1,1,9f6b9a5d956e35cc990e779dd53a2a839ec813cadae46458921997ae5ab97e21,2024-04-17T19:15:08.007000
|
||||
CVE-2024-31580,0,1,d7c84c101d780f8652160bab948da8fb0c4dce3c9c7741f9218de70831e9c34e,2024-04-17T20:08:21.887000
|
||||
CVE-2024-31581,0,1,865deff14bc7ef9b36e2bb8e65225902059d208782571d2a360a898684ed0e64,2024-04-17T20:08:21.887000
|
||||
CVE-2024-31582,0,1,86c2a5b1679f83ece114829a0186057f140c91c46b8529b9e5c7a12763d2e25e,2024-04-17T20:08:21.887000
|
||||
CVE-2024-31583,0,1,23d0ff984e0072ed917a552139ff5dba08b151a993349e70e9b8d91d85217832,2024-04-17T20:08:21.887000
|
||||
CVE-2024-31585,0,1,6c0cc5d202694755c3e5e588c7e5525f9c4ad64feb6107844dd228e8ae9483be,2024-04-17T20:08:21.887000
|
||||
CVE-2024-3159,0,0,ab3d3fc3f58ff99c2f10e23574a75e665f3343c344ecfe71138e927973febb6e,2024-04-08T18:48:40.217000
|
||||
CVE-2024-3160,0,0,f58561faca7869291dbd40f98b5207b12f048bddf4323b50e2fa0b0605fe77f4,2024-04-11T01:25:55.513000
|
||||
CVE-2024-3162,0,0,7209bf9b1b4a4f41543ae01bfd19e9aec1dd355164cd1434a8cb5548ea161c65,2024-04-03T12:38:04.840000
|
||||
@ -245772,9 +245776,9 @@ CVE-2024-32145,0,0,46f82be3b79b18ba25f2a9e0fa1663c301fc655d81936963a35db2da93921
|
||||
CVE-2024-32147,0,0,221f8d37c746fb10439627f9391d23954c77e6687fd4a296059e2d8c0758881a,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32149,0,0,12d107e3c0999cbcd27b2d933b885433c81cf0faba3d46ab08b4e66fab365309,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3216,0,0,aac88e798ffbdaddd62ae90ecbece12fc58351de061defd8cac2a138eea1c35f,2024-04-08T18:49:25.863000
|
||||
CVE-2024-32161,1,1,3c0b16e8eabfed5ee02e0d33a40c5490045a318af5cf56a6f3be8585f44740df,2024-04-17T18:15:16.337000
|
||||
CVE-2024-32162,1,1,af6a36fcaebc4e8e6f9b37ba8b5ed922042775cf8d4859a3b999ab33e91b64dd,2024-04-17T19:15:08.060000
|
||||
CVE-2024-32163,1,1,c5a82f9ae4dce2854e4be822254aed5239197ae59638321a2045fa9d4865cb4f,2024-04-17T19:15:08.117000
|
||||
CVE-2024-32161,0,1,baff3d70ce2747d9e5f346cd66bce32126ea12f61c828e5711138e595e3e8ba1,2024-04-17T20:08:21.887000
|
||||
CVE-2024-32162,0,1,18cb543f3bd362f8058d75d170f82ceb4e8cc54fbc6764dbd879a636823e0837,2024-04-17T20:08:21.887000
|
||||
CVE-2024-32163,0,1,d9c67886d51c8540ec61857ff9e9d5e0bf0f61d06ed2ba271473bf6d7d327f9d,2024-04-17T20:08:21.887000
|
||||
CVE-2024-3217,0,0,3ac42247ba2d685c0a6f4de738ef771d2778cce367312f144d0326551965dbb5,2024-04-05T12:40:52.763000
|
||||
CVE-2024-3218,0,0,75e1c84ee83eb1d158244a2182789a8e99b92d3a400a75a7854fff9872030968,2024-04-11T01:25:56.290000
|
||||
CVE-2024-3221,0,0,feefc929b27a3432f5d1352d15fe99f1f6ccd294cecb07c343d15630058ba883,2024-04-11T01:25:56.367000
|
||||
@ -245814,6 +245818,15 @@ CVE-2024-32316,0,0,a58c15fa4fd96274056ab104ca6fc1340e053661d8932d745c0fc4b1c09dc
|
||||
CVE-2024-32317,0,0,3b211721c2918106b1f1e7546bda616d889285c7b9549429ce029a2ae9fa7832,2024-04-17T16:51:07.347000
|
||||
CVE-2024-32318,0,0,af0147cc0b951b6320a20f40cec58c15f3c7ae517895de35f7ff02b93007344c,2024-04-17T16:51:07.347000
|
||||
CVE-2024-32320,0,0,37a3616f028696b5fd899f236869a82a73cb2f39b08a79d3a8c229c093bfc5dd,2024-04-17T16:51:07.347000
|
||||
CVE-2024-32337,1,1,e36432fd5de04e0350998fc3798195076620aeb57d01ade0ec37a80f3dfb5730,2024-04-17T21:15:09.267000
|
||||
CVE-2024-32338,1,1,d2c4c10cda47f9c06c2634cf0d3bf3e42a60b27d927b40e5ea45611430fae30c,2024-04-17T21:15:09.343000
|
||||
CVE-2024-32339,1,1,87acf3e540d587198c3b97149a891614d27b7bf26500099de4c1f6d5608c36ac,2024-04-17T21:15:09.400000
|
||||
CVE-2024-32340,1,1,eed9cbb9f213e0cedfaccc63cf4dc29ebd92af7ff81a0880890506bbc4201ccb,2024-04-17T21:15:09.453000
|
||||
CVE-2024-32341,1,1,427f4e01293da73e4302a1f4142428ba541f31cf82ae1bf7d94f605c5ae33172,2024-04-17T21:15:09.507000
|
||||
CVE-2024-32342,1,1,ffc7e457ae2c85dbc46737fc6b82641c3fbd4690610f5addd204723048ee5af8,2024-04-17T21:15:09.560000
|
||||
CVE-2024-32343,1,1,ea322845e96559469562df80ef6b50fb0faec6b262b3a95796e0a84c49221cba,2024-04-17T21:15:09.623000
|
||||
CVE-2024-32344,1,1,2a3599e8826b0c3b6f84c18b5f11f29ca4237136d96485f16750aabaa3d4dd30,2024-04-17T21:15:09.677000
|
||||
CVE-2024-32345,1,1,f6c8062b536bda6bcda7d638ecd1a4b25c77290867405481db8afab437d6734b,2024-04-17T21:15:09.727000
|
||||
CVE-2024-3235,0,0,87b194ac57d76e3164f790cf262b7f15e5577bfab72d12fd067ebb5070eb75e0,2024-04-10T13:23:38.787000
|
||||
CVE-2024-32428,0,0,87a3edde2c4b0ace5bed90e6337013a3436ae0c663c6eeed3dbaf59e4e702dff,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32429,0,0,eb5275541e0171326bf869e836661a3d04172e6e7d4adfaa9657297147332796,2024-04-15T13:15:31.997000
|
||||
@ -245916,6 +245929,10 @@ CVE-2024-3271,0,0,427448d66ebe59002a93ad233a5fbd2b2253db3687d924fc6f5652a183f66e
|
||||
CVE-2024-3272,0,0,ef44e7e2e0d0ab3ec436a6ccc174b0a90f543a9a2cfa65f7a6d262da6c5446ee,2024-04-15T20:14:55.570000
|
||||
CVE-2024-3273,0,0,2c9bd6b2b67818472adec2002fc02ad46426a066a40e52d2a8dbeb776c880650,2024-04-15T20:13:57.290000
|
||||
CVE-2024-3274,0,0,21270603d98a8b3e4eb735d32ed5791b575a3fe053daf1cd79027e90bad6bb12,2024-04-11T01:25:57.997000
|
||||
CVE-2024-32743,1,1,838f09225aed11028ba3ea4d8c7736044e9c9550d65df700af11ea6c9f02340a,2024-04-17T21:15:09.783000
|
||||
CVE-2024-32744,1,1,574167acf44420644737c18879b005cab586b2203c9327bed0f4f00c3a807406,2024-04-17T21:15:09.843000
|
||||
CVE-2024-32745,1,1,814ba3f3fab851ff0162fc8f6c044affc072d00e16362b5903112583bf1e7575,2024-04-17T21:15:09.897000
|
||||
CVE-2024-32746,1,1,41cf2e76ddbd601b0981094a550ba5636bc6b1d8c4a34e6d189247a02ffa1a9b,2024-04-17T21:15:09.943000
|
||||
CVE-2024-3281,0,0,b3c51db3aca3b371ad4faa3c1c4537d2c54d8323123f7ae9b26414cd9ee432a6,2024-04-10T13:24:22.187000
|
||||
CVE-2024-3283,0,0,8b1939d21df3d4399a3bf874e70470053c1a0ae20421841ad51c79aca5727c56,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3285,0,0,ea17e16acaa3172cbcc052cf9bfb1b3e7ee2b004434b062b8e67c1c1ed8bff14,2024-04-11T12:47:44.137000
|
||||
@ -245930,7 +245947,7 @@ CVE-2024-3315,0,0,b04b498365bf550d192eb8f6355a94ceb3682fd952e63a5ca20359721d079b
|
||||
CVE-2024-3316,0,0,4e6c62f7daa2acc1b09b99a91d6183a3304f5f15a5196b646e7dca95270cc88c,2024-04-11T01:25:58.400000
|
||||
CVE-2024-3320,0,0,ab85871ad052e5f4fcf422dcfe569e228d877013c1827b81abff88790a089460,2024-04-11T01:25:58.477000
|
||||
CVE-2024-3321,0,0,d8a6bcfaefe4af3ab04feeb555f2bafb55cef6e6487d8794d3441d1d17abf104,2024-04-11T01:25:58.560000
|
||||
CVE-2024-3323,1,1,58f0ef328166e16f44be810afeaf7913118e3089582868d3086e780776cd5ddd,2024-04-17T19:15:08.177000
|
||||
CVE-2024-3323,0,1,ee5c28e64b3534ad62b7156293b962f8a026f4befb9ceb443f6f7b4109723fa3,2024-04-17T20:08:21.887000
|
||||
CVE-2024-3333,0,0,41236fb41e8bfaf4e86270572f6bea1f95470a53ec0d897942e32018eedb9937,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3343,0,0,c7ada54a8973c3f80fc415b1484b0c0d7aeb75e458012c05cd3c69dcc6f0e33f,2024-04-11T12:47:44.137000
|
||||
CVE-2024-3344,0,0,9f0d30bf7471aa86a4cb4a703805df84e7338e4a65408c3f6ac2fd777c6250e1,2024-04-11T12:47:44.137000
|
||||
@ -246113,6 +246130,7 @@ CVE-2024-3797,0,0,a49e1c5a734d1a2c1373957f16247491a1198771bf616ee0ff20957d954e73
|
||||
CVE-2024-3802,0,0,5395fe7b87f4e5ca6c4397aa1001686137daab009656e2126daa68d47ebdf7e9,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3803,0,0,5839bf1f5fc97242d8c9adb88b40fa5013a07555baee205c3d9bec592a883085,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3804,0,0,d2c04bcba3b9dcee33d8ad0e898646d48639f7e3e6aed11c413cf03cea6afbe3,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3817,1,1,e146a0f24ef6649d7d907ae65e79927a18f79291f1828287679a049df6a38cf7,2024-04-17T20:15:08.383000
|
||||
CVE-2024-3825,0,0,cf5f4f310b2c59b261c07d67ee6e69189162f7e44f9cdead90080a906b42b533,2024-04-17T15:31:50.160000
|
||||
CVE-2024-3832,0,0,9dd56fad5460e31af71408aef448c2395575e6dee46d55026c2ec166be133ff0,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3833,0,0,dff090d851a013a09ba1359f006f48badc9604823081b1a17b5c5719cae664d1,2024-04-17T12:48:07.510000
|
||||
@ -246155,11 +246173,11 @@ CVE-2024-3879,0,0,9c5ce4d1a3fc01133b3321115c4ccd096980cfe5baa042c4c9bf7b273029d2
|
||||
CVE-2024-3880,0,0,237e3bb93a0b113a1c50538806f68b5377561349bd4f47a9139ec72cd356417d,2024-04-17T12:48:31.863000
|
||||
CVE-2024-3881,0,0,9055ecf63e1aedc7e2787afc56e67bc831564d5ee15f418ef1b408c81c24bb16,2024-04-17T12:48:31.863000
|
||||
CVE-2024-3882,0,0,846c922d5cf92347db05da515dc041ccc83bdcd548fefc386c188946857d0db7,2024-04-17T12:48:31.863000
|
||||
CVE-2024-3900,1,1,4c7b21e1cb69699bffcdf893116b1c1c14804a5942e3d38e2be9e9cc4e95c537,2024-04-17T19:15:08.347000
|
||||
CVE-2024-3900,0,1,4754e29edc405b56435ad106711f084e7622ef91b353d31f88826e0bd93a47ca,2024-04-17T20:08:21.887000
|
||||
CVE-2024-3905,0,0,7be32ce1cebe831dd18c83e9cee35ffcf3ef4d95b177b36857101bc880e13458,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3906,0,0,3d774d0d8e879a2e547ece6581f966b0621f926e176ba86f810130848d808882,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3907,0,0,e9d4f83d03470ade2cadeb4be1ea2503424ca77e73533dcedd08ebc2ecd1caff,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3908,0,0,14819196bd06b3f47df9a72a4748d3af3ea51b51fecc6fc14f6bb0ea5ac20eab,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3909,0,0,88409e12ed6fe478dbedde42ee0b29fb69f3bd755cbe1c9aee9c2d33e78a2db7,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3910,0,0,86d1a96ddd3463e152d9d08dee2f0faab8142fd78de3719a4a22f0df5c358cdf,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3914,1,1,01822c949cfa3d96edee4f8b6d0fa4affe37c999421316935018f1a4e2b2a0f9,2024-04-17T18:15:16.400000
|
||||
CVE-2024-3914,0,1,f93977105202dbc9d06c0cd96ce45891e87c322bf8bb225cb96c3dd248984c2c,2024-04-17T20:08:21.887000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user