mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-09 03:57:14 +00:00
Auto-Update: 2024-04-26T23:55:29.175773+00:00
This commit is contained in:
parent
4a9a8d703b
commit
0b5f2d7ec8
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-29622",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-05-16T14:15:08.027",
|
||||
"lastModified": "2023-11-07T03:46:04.303",
|
||||
"lastModified": "2024-04-26T22:15:07.627",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. NOTE: some third parties dispute this issue because the product has common use cases in which uploading arbitrary files is the desired behavior. Also, there are configuration options in all versions that can change the default behavior of how files are handled."
|
||||
"value": "An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. NOTE: some third parties dispute this issue because the product has common use cases in which uploading arbitrary files is the desired behavior. Also, there are configuration options in all versions that can change the default behavior of how files are handled. Strapi does not consider this to be a valid vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -110,6 +110,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/strapi/strapi/issues/20189",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://medium.com/%40zsolt.imre/is-cybersecurity-the-next-supply-chain-vulnerability-9a00de745022",
|
||||
"source": "cve@mitre.org"
|
||||
|
24
CVE-2024/CVE-2024-283xx/CVE-2024-28322.json
Normal file
24
CVE-2024/CVE-2024-283xx/CVE-2024-28322.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-28322",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-26T22:15:07.793",
|
||||
"lastModified": "2024-04-26T22:15:07.793",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability in /event-management-master/backend/register.php in PuneethReddyHC Event Management 1.0 allows attackers to run arbitrary SQL commands via the event_id parameter in a crafted POST request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Sospiro014/zday1/blob/main/event-managment.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/177841/Event-Management-1.0-SQL-Injection.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-29960",
|
||||
"sourceIdentifier": "sirt@brocade.com",
|
||||
"published": "2024-04-19T04:15:10.270",
|
||||
"lastModified": "2024-04-19T13:10:25.637",
|
||||
"lastModified": "2024-04-26T22:15:07.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Brocade SANnav server versions before v2.3.1 and v2.3.0a, the SSH keys inside the OVA image are hardcoded and identical in the VM every time SANnav is installed. Any Brocade SANnav VM based on the official OVA images is vulnerable to MITM over SSH. An attacker can decrypt and compromise the SSH traffic to the SANnav appliance.\n\n"
|
||||
"value": "\nIn Brocade SANnav server before v2.3.1 and v2.3.0a, the SSH keys inside the OVA image are identical in the VM every time SANnav is installed. Any Brocade SAnnav VM based on the official OVA images is vulnerable to MITM over SSH. An attacker can decrypt and compromise the SSH traffic to the SANnav.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -21,20 +21,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-29963",
|
||||
"sourceIdentifier": "sirt@brocade.com",
|
||||
"published": "2024-04-19T04:15:10.793",
|
||||
"lastModified": "2024-04-19T13:10:25.637",
|
||||
"lastModified": "2024-04-26T23:15:05.857",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Brocade SANnav OVA before v2.3.1, and v2.3.0a, contain hardcoded keys used by Docker to reach remote registries over TLS. TLS connections with an exposed key allow an attacker to MITM the traffic. \nNote: Brocade SANnav doesn't have access to remote Docker registries.\n"
|
||||
"value": "\nBrocade SANnav OVA before v2.3.1, and v2.3.0a, contain hardcoded TLS keys used by Docker. Note: Brocade SANnav doesn't have access to remote Docker registries.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -21,20 +21,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH"
|
||||
"baseScore": 1.9,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.0
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
20
CVE-2024/CVE-2024-308xx/CVE-2024-30804.json
Normal file
20
CVE-2024/CVE-2024-308xx/CVE-2024-30804.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-30804",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-26T22:15:08.017",
|
||||
"lastModified": "2024-04-26T22:15:08.017",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue discovered in the DeviceIoControl component in ASUS Fan_Xpert before v.10013 allows an attacker to execute arbitrary code via crafted IOCTL requests."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-30804",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-30xx/CVE-2024-3051.json
Normal file
59
CVE-2024/CVE-2024-30xx/CVE-2024-3051.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-3051",
|
||||
"sourceIdentifier": "product-security@silabs.com",
|
||||
"published": "2024-04-26T22:15:08.263",
|
||||
"lastModified": "2024-04-26T22:15:08.263",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Malformed Device Reset Locally command classes can be sent to temporarily deny service to an end device. Any frames sent by the end device will not be acknowledged by the gateway during this time.\u00a0"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@silabs.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@silabs.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-345"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-754"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.silabs.com/068Vm0000045w2j",
|
||||
"source": "product-security@silabs.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-30xx/CVE-2024-3052.json
Normal file
55
CVE-2024/CVE-2024-30xx/CVE-2024-3052.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-3052",
|
||||
"sourceIdentifier": "product-security@silabs.com",
|
||||
"published": "2024-04-26T22:15:08.460",
|
||||
"lastModified": "2024-04-26T22:15:08.460",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nMalformed S2 Nonce Get command classes can be sent to crash the gateway. A hard reset is required to recover the gateway."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@silabs.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@silabs.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-754"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.silabs.com/068Vm0000045w2j",
|
||||
"source": "product-security@silabs.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-315xx/CVE-2024-31551.json
Normal file
20
CVE-2024/CVE-2024-315xx/CVE-2024-31551.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-31551",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-26T22:15:08.080",
|
||||
"lastModified": "2024-04-26T22:15:08.080",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Directory Traversal vulnerability in lib/admin/image.admin.php in cmseasy v7.7.7.9 20240105 allows attackers to delete arbitrary files via crafted GET request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.yuque.com/sickle-ffnce/awixr8/qu8i0p9y0h277m6u",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-317xx/CVE-2024-31741.json
Normal file
20
CVE-2024/CVE-2024-317xx/CVE-2024-31741.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-31741",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-26T22:15:08.137",
|
||||
"lastModified": "2024-04-26T22:15:08.137",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in MiniCMS v.1.11 allows a remote attacker to run arbitrary code via crafted string in the URL after login."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/bg5sbk/MiniCMS/issues/49",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-318xx/CVE-2024-31828.json
Normal file
20
CVE-2024/CVE-2024-318xx/CVE-2024-31828.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-31828",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-26T22:15:08.200",
|
||||
"lastModified": "2024-04-26T22:15:08.200",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in Lavalite CMS v.10.1.0 allows attackers to execute arbitrary code and obtain sensitive information via a crafted payload to the URL."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jinmu1108.github.io/uncategorized/CVE-2024-31828/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-42xx/CVE-2024-4243.json
Normal file
92
CVE-2024/CVE-2024-42xx/CVE-2024-4243.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4243",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-26T22:15:08.640",
|
||||
"lastModified": "2024-04-26T22:15:08.640",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in Tenda W9 1.0.0.7(4456). Affected is the function formwrlSSIDset of the file /goform/wifiSSIDset. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-262134 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formwrlSSIDset.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.262134",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.262134",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.319825",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-42xx/CVE-2024-4244.json
Normal file
92
CVE-2024/CVE-2024-42xx/CVE-2024-4244.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4244",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-26T22:15:08.867",
|
||||
"lastModified": "2024-04-26T22:15:08.867",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in Tenda W9 1.0.0.7(4456). Affected by this vulnerability is the function fromDhcpSetSer of the file /goform/DhcpSetSer. The manipulation of the argument dhcpStartIp/dhcpEndIp/dhcpGw/dhcpMask/dhcpLeaseTime/dhcpDns1/dhcpDns2 leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-262135. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/fromDhcpSetSer.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.262135",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.262135",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.319826",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
38
README.md
38
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-26T22:00:30.793385+00:00
|
||||
2024-04-26T23:55:29.175773+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-26T21:15:50.727000+00:00
|
||||
2024-04-26T23:15:05.857000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,35 +33,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
246935
|
||||
246944
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `15`
|
||||
Recently added CVEs: `9`
|
||||
|
||||
- [CVE-2022-48611](CVE-2022/CVE-2022-486xx/CVE-2022-48611.json) (`2024-04-26T20:15:07.150`)
|
||||
- [CVE-2023-26603](CVE-2023/CVE-2023-266xx/CVE-2023-26603.json) (`2024-04-26T20:15:07.230`)
|
||||
- [CVE-2024-25343](CVE-2024/CVE-2024-253xx/CVE-2024-25343.json) (`2024-04-26T20:15:07.427`)
|
||||
- [CVE-2024-28326](CVE-2024/CVE-2024-283xx/CVE-2024-28326.json) (`2024-04-26T20:15:07.480`)
|
||||
- [CVE-2024-31502](CVE-2024/CVE-2024-315xx/CVE-2024-31502.json) (`2024-04-26T21:15:49.140`)
|
||||
- [CVE-2024-31601](CVE-2024/CVE-2024-316xx/CVE-2024-31601.json) (`2024-04-26T21:15:49.207`)
|
||||
- [CVE-2024-32878](CVE-2024/CVE-2024-328xx/CVE-2024-32878.json) (`2024-04-26T21:15:49.260`)
|
||||
- [CVE-2024-32881](CVE-2024/CVE-2024-328xx/CVE-2024-32881.json) (`2024-04-26T21:15:49.450`)
|
||||
- [CVE-2024-32883](CVE-2024/CVE-2024-328xx/CVE-2024-32883.json) (`2024-04-26T21:15:49.630`)
|
||||
- [CVE-2024-32887](CVE-2024/CVE-2024-328xx/CVE-2024-32887.json) (`2024-04-26T21:15:49.820`)
|
||||
- [CVE-2024-4238](CVE-2024/CVE-2024-42xx/CVE-2024-4238.json) (`2024-04-26T20:15:07.537`)
|
||||
- [CVE-2024-4239](CVE-2024/CVE-2024-42xx/CVE-2024-4239.json) (`2024-04-26T21:15:50.003`)
|
||||
- [CVE-2024-4240](CVE-2024/CVE-2024-42xx/CVE-2024-4240.json) (`2024-04-26T21:15:50.280`)
|
||||
- [CVE-2024-4241](CVE-2024/CVE-2024-42xx/CVE-2024-4241.json) (`2024-04-26T21:15:50.507`)
|
||||
- [CVE-2024-4242](CVE-2024/CVE-2024-42xx/CVE-2024-4242.json) (`2024-04-26T21:15:50.727`)
|
||||
- [CVE-2024-28322](CVE-2024/CVE-2024-283xx/CVE-2024-28322.json) (`2024-04-26T22:15:07.793`)
|
||||
- [CVE-2024-3051](CVE-2024/CVE-2024-30xx/CVE-2024-3051.json) (`2024-04-26T22:15:08.263`)
|
||||
- [CVE-2024-3052](CVE-2024/CVE-2024-30xx/CVE-2024-3052.json) (`2024-04-26T22:15:08.460`)
|
||||
- [CVE-2024-30804](CVE-2024/CVE-2024-308xx/CVE-2024-30804.json) (`2024-04-26T22:15:08.017`)
|
||||
- [CVE-2024-31551](CVE-2024/CVE-2024-315xx/CVE-2024-31551.json) (`2024-04-26T22:15:08.080`)
|
||||
- [CVE-2024-31741](CVE-2024/CVE-2024-317xx/CVE-2024-31741.json) (`2024-04-26T22:15:08.137`)
|
||||
- [CVE-2024-31828](CVE-2024/CVE-2024-318xx/CVE-2024-31828.json) (`2024-04-26T22:15:08.200`)
|
||||
- [CVE-2024-4243](CVE-2024/CVE-2024-42xx/CVE-2024-4243.json) (`2024-04-26T22:15:08.640`)
|
||||
- [CVE-2024-4244](CVE-2024/CVE-2024-42xx/CVE-2024-4244.json) (`2024-04-26T22:15:08.867`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `3`
|
||||
|
||||
- [CVE-2024-1725](CVE-2024/CVE-2024-17xx/CVE-2024-1725.json) (`2024-04-26T20:15:07.310`)
|
||||
- [CVE-2022-29622](CVE-2022/CVE-2022-296xx/CVE-2022-29622.json) (`2024-04-26T22:15:07.627`)
|
||||
- [CVE-2024-29960](CVE-2024/CVE-2024-299xx/CVE-2024-29960.json) (`2024-04-26T22:15:07.850`)
|
||||
- [CVE-2024-29963](CVE-2024/CVE-2024-299xx/CVE-2024-29963.json) (`2024-04-26T23:15:05.857`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
47
_state.csv
47
_state.csv
@ -197200,7 +197200,7 @@ CVE-2022-29618,0,0,85bffd581df774a112669f14df0da784f907f0d8fc33949d0c933465cb570
|
||||
CVE-2022-29619,0,0,04616838172ccb6373be77762d8edb1438492c280de84e75a450a31e0392055d,2023-07-21T16:55:28.250000
|
||||
CVE-2022-2962,0,0,4bda1dc88413f0ce73dd3eed5ecc11ffeb5485f1edef4bdb55c675f17727b4b3,2023-06-28T20:40:49.643000
|
||||
CVE-2022-29620,0,0,c97f8c07c574a81e91ca2117a1b727d1f59fac5f7febacdd9b9b8e34fd7cf64f,2024-04-11T01:15:18.737000
|
||||
CVE-2022-29622,0,0,c2f7b0cd4e70b9d71a72a4802edc1d24ef42ecfffd808304b4a27b15b06cbc4d,2023-11-07T03:46:04.303000
|
||||
CVE-2022-29622,0,1,abf8568df8f5122b8c5e9b44cf50faededd0b55da7c6508a9d09abbb1f845470,2024-04-26T22:15:07.627000
|
||||
CVE-2022-29623,0,0,f0f61383da3ef16de1f798f3a42e8485b6f0f77293ab82345f867acd3120c559,2022-05-24T20:14:43.230000
|
||||
CVE-2022-29624,0,0,63022d472eefe17122d555ac15c6ed08f13e85324e3dd023fb705b3fcea0bc9a,2022-06-11T02:26:12.640000
|
||||
CVE-2022-29627,0,0,abbdad8a7497f46959f3de961ed1f67cc3075f02885458d7de87213e93cbc0f3,2022-06-12T02:12:18.457000
|
||||
@ -211471,7 +211471,7 @@ CVE-2022-48604,0,0,c234e7576786d55fbfc97efb5dea78adb8f87525c4117c439dc05aac6f4a7
|
||||
CVE-2022-48605,0,0,edade8e24b7350903e180fa6d2d0f85cc0f0e9e7f86f0cde7204d0325848ec12,2023-09-26T18:53:26.107000
|
||||
CVE-2022-48606,0,0,91696018ee1b6cf3d6d536659479fbc305fec14b8c9dcb14d4e0cb406a661ee2,2023-09-28T17:40:49.480000
|
||||
CVE-2022-4861,0,0,ee598ad572b11ac5629816a68e6c59b0263127db350474e730bad7a72a6256a3,2023-01-06T18:58:17.253000
|
||||
CVE-2022-48611,1,1,64d8801396e0ef967077024684d6e858c35ff131a9b8b688fbfdad94bf9ff555,2024-04-26T20:15:07.150000
|
||||
CVE-2022-48611,0,0,64d8801396e0ef967077024684d6e858c35ff131a9b8b688fbfdad94bf9ff555,2024-04-26T20:15:07.150000
|
||||
CVE-2022-48612,0,0,7514b5524ca8dc12858b37e461d556470c1304a5f7ce0502eff60e1cedff76ea,2023-10-19T16:22:05.877000
|
||||
CVE-2022-48613,0,0,933d1b28adc9d144ccefdf3525b003f1aeb5987ce03546278c3e696c33dcbee5,2023-11-14T20:05:24.217000
|
||||
CVE-2022-48614,0,0,75c1e3ea7eaa5931eb17de8ec4a37f67747321aa68e7ad765a36e74d4c0b196b,2023-12-13T15:59:51.227000
|
||||
@ -218971,7 +218971,7 @@ CVE-2023-2660,0,0,4aef7924c399745b3d84f28d5636b72a951cd4369c6e34293edf4643f06dfe
|
||||
CVE-2023-26600,0,0,082a5a40003457cdcb9bc982343b3a43f4debaf37f4262b90b97fef94c96e25d,2023-03-13T17:47:33.683000
|
||||
CVE-2023-26601,0,0,7b674f2a8e2bec159e58ffb9e220bc037e134be1a5263b6a67b4cdd33b3e5bbf,2023-03-13T17:44:45.677000
|
||||
CVE-2023-26602,0,0,6c6999eaefa6818056578b112ce02b6e82b18dba81dc757925a9d9664e372103,2023-03-07T19:07:11.717000
|
||||
CVE-2023-26603,1,1,4ff083684076234b86170d54f1e958c3be75d681c203f04617d000f8b8d41e8a,2024-04-26T20:15:07.230000
|
||||
CVE-2023-26603,0,0,4ff083684076234b86170d54f1e958c3be75d681c203f04617d000f8b8d41e8a,2024-04-26T20:15:07.230000
|
||||
CVE-2023-26604,0,0,2d88cec2d1d9a7d4a604fb7583adb4176010b0268b5fda597e93dfff8baa2e94,2023-11-07T04:09:41.293000
|
||||
CVE-2023-26605,0,0,f1d913142ac1d44bc49e2d7d4cb638ad0dbe7ae96775e3b7bd85f589841ca0ce,2024-03-25T01:15:53.723000
|
||||
CVE-2023-26606,0,0,a1bb89d315dd684fae3bae228622f2bc2356ffe1fa611816e008ca9f62fab2a2,2024-03-25T01:15:53.793000
|
||||
@ -239755,7 +239755,7 @@ CVE-2024-1719,0,0,bd92ffe7c3f4bf124004e532d326d3643bc62f549595f2a7817efea0dc7c18
|
||||
CVE-2024-1720,0,0,5a5ae92be6fac7e3fb5aac9fbad05927fd3add77d067fc4c0b5a11a75c8da7c7,2024-03-07T13:52:27.110000
|
||||
CVE-2024-1722,0,0,44f76876458eb58496685e90ceedacd781a70fa58f68fffc91c47d3fb5ef0258,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1723,0,0,6ede5956ec1f8bc932d476f2c9a22da838daca98409da5821be1a9704022149c,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1725,0,1,2b831655c37805b5d11b8fccbdef32ca54003b5ea78039a012ddccaea3f2f5c4,2024-04-26T20:15:07.310000
|
||||
CVE-2024-1725,0,0,2b831655c37805b5d11b8fccbdef32ca54003b5ea78039a012ddccaea3f2f5c4,2024-04-26T20:15:07.310000
|
||||
CVE-2024-1726,0,0,89dad850dcc0e1a88340678c957b303bc297c72f3495f60c2d2a69bcbd7f390b,2024-04-25T17:24:59.967000
|
||||
CVE-2024-1727,0,0,a7ba950431c841d63e5eda97447121909cf0b94a0e0f2a68d97b3e6ce11f4afe,2024-04-16T12:15:09.843000
|
||||
CVE-2024-1728,0,0,cc77f96c808327822a9f33d38543fe59887a1a70be257d5713ef1082e9fb55b5,2024-04-10T19:49:51.183000
|
||||
@ -242723,7 +242723,7 @@ CVE-2024-25327,0,0,ed53fcf930246e366b75ca3dbc41603185b262291cf82ff3e550f2ed4e97b
|
||||
CVE-2024-2533,0,0,ae9342ba1479059b47493c7a685c849e75edc6d07d3006801469cf62cb6542e2,2024-04-11T01:25:27.040000
|
||||
CVE-2024-25331,0,0,60a22b9e40d224a5f3b5e272a457dd70292f6aef15fb2558c273ff847702ea0c,2024-03-12T12:40:13.500000
|
||||
CVE-2024-2534,0,0,7208594308b68fb6319c69a5ca4d316b95689a2de727bb79e1c50ee053eb0607,2024-04-11T01:25:27.120000
|
||||
CVE-2024-25343,1,1,9812c2138ed26a486c0f50f26db327586c2b0be33c627c7a652779aa05d0036f,2024-04-26T20:15:07.427000
|
||||
CVE-2024-25343,0,0,9812c2138ed26a486c0f50f26db327586c2b0be33c627c7a652779aa05d0036f,2024-04-26T20:15:07.427000
|
||||
CVE-2024-25344,0,0,af08989cf380f6e278fd692845297ea5605f46af513902cda38a18d17b6f3747,2024-02-26T16:32:25.577000
|
||||
CVE-2024-2535,0,0,332571c5f565827ccf76a6bd5bc40568c1d0db043dbac561c7b64a0729db2bd3,2024-04-11T01:25:27.203000
|
||||
CVE-2024-25350,0,0,4025b81199a224e7878ebb894cfce4cd4a7613ab77d81e491781294f349534f6,2024-02-29T13:49:47.277000
|
||||
@ -244383,9 +244383,10 @@ CVE-2024-28303,0,0,32d4865094af329a688db1798283b86ca81a4a5fae30846af22292284fa8c
|
||||
CVE-2024-28318,0,0,ede034690df957e6783d45bfb66a16f12d36f93dac03aab57e77aeedfffbbc90,2024-03-15T16:26:49.320000
|
||||
CVE-2024-28319,0,0,26fe071877c361c1420da78d668cd8bd73e607c2889fe07f596425c3f0efcaf7,2024-03-15T16:26:49.320000
|
||||
CVE-2024-2832,0,0,c24a89a98158bb4e496d6c9324979be50b5d8206e1a887bc4c92d3f4efe6d296,2024-04-11T01:25:38.597000
|
||||
CVE-2024-28322,1,1,b2fa35d24bebaba4372f6adf9b85a0fd0622718c9290e025720c8d178489baf0,2024-04-26T22:15:07.793000
|
||||
CVE-2024-28323,0,0,16dacab4d536bc79350286123596ce0c92a8e24f546fb8e6e6ccdaf1dc4caa64,2024-04-24T02:15:45.820000
|
||||
CVE-2024-28325,0,0,f9d721e932f6d264bc137371c8b0906505973d152c3e0bd4b5e1aa389af73389,2024-04-26T19:59:19.793000
|
||||
CVE-2024-28326,1,1,dbde51442da791ef702d39de9102c355af1752a8791a1a24700bae6168ab23c8,2024-04-26T20:15:07.480000
|
||||
CVE-2024-28326,0,0,dbde51442da791ef702d39de9102c355af1752a8791a1a24700bae6168ab23c8,2024-04-26T20:15:07.480000
|
||||
CVE-2024-28327,0,0,55f0b6af593774ee591595f8fb41fe205ad2244e60ceea6d4eaa32e2cd88c42f,2024-04-26T19:59:19.793000
|
||||
CVE-2024-28328,0,0,13ef121020655e50ae4d25ba0161adfa41a8368139ae76b0ca53543e95ae92f4,2024-04-26T15:32:22.523000
|
||||
CVE-2024-2833,0,0,9e113ce28ea85bd7fbbe01a048a1b11092324a333ff2f6e807d8733739209b19,2024-04-18T13:04:28.900000
|
||||
@ -245140,10 +245141,10 @@ CVE-2024-29957,0,0,fecc998428c3db04062cf2ac371ef979be5cd87fa510b5833cc1b2291494a
|
||||
CVE-2024-29958,0,0,47096cf1a01ed2839ec8c4ff3cea643fc3bc8acea460882f29c91da3a82994de,2024-04-19T13:10:25.637000
|
||||
CVE-2024-29959,0,0,b7bdcba7d408b6308c19e4f4122d62cd78eb6bcbedb6c41bea62f72b940b1707,2024-04-19T13:10:25.637000
|
||||
CVE-2024-2996,0,0,ce0ff76245864ce5ac90a5463bb82f1b7ea8cb5b36b1788a5a81e2b6f1ea29d1,2024-04-11T01:25:44.817000
|
||||
CVE-2024-29960,0,0,a0f5b1872d2b131e479b0d5e60895169eb3d25ee33e2d13952250fc604e76726,2024-04-19T13:10:25.637000
|
||||
CVE-2024-29960,0,1,427535e80f596d42f5c33667c31a088d2ff2b7410336d7310e5e6022470b138a,2024-04-26T22:15:07.850000
|
||||
CVE-2024-29961,0,0,b1f9b8b77f2ab0b212a5b2cb2c84169125bbdbff81d33950af18f3d03c77fe3b,2024-04-19T13:10:25.637000
|
||||
CVE-2024-29962,0,0,19e3e65705ea94612dcd76b867bc64a7d5edd1af95864c7d99ac748d3bb6ed65,2024-04-19T13:10:25.637000
|
||||
CVE-2024-29963,0,0,7aa71b4b33bfcf322b5aea5fec0a61877ae1a46fa2ccb5df6e503f54cd3cd678,2024-04-19T13:10:25.637000
|
||||
CVE-2024-29963,0,1,fb8bdd7313ae3b285e1ea777366d795d5a2990f9a1e1a54483c389e01b7e0e39,2024-04-26T23:15:05.857000
|
||||
CVE-2024-29964,0,0,9d91658d97bae4a495bbfdbc631e5d0dad8c2dd3e2c7866023074e11cdd416c6,2024-04-26T00:15:08.383000
|
||||
CVE-2024-29965,0,0,9a020821eeb9ea2c223277d7cbe31a1c1727e982e39d507d8c6e0c887ea1ef0b,2024-04-19T13:10:25.637000
|
||||
CVE-2024-29966,0,0,aaea55df242a87f8ebd34fa291eefe5c7c433327c42e58eb4454f6a33bc99372,2024-04-19T13:10:25.637000
|
||||
@ -245432,12 +245433,14 @@ CVE-2024-30505,0,0,e3a1623c70480645d7435d235c55cbfe6315e866cb0d6b0f4746946349a6a
|
||||
CVE-2024-30506,0,0,c05e76d2257717876a74bdef23833433be5442543f2708d7016e5393bc439246,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30507,0,0,0be298b6c722996f3c9bca1b274ff1f6b87feb3b0e0c481ae73ee51466f24be1,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30508,0,0,3060ef2ae86660ef47372d56d58005971c1e5f17b0f99fb0115ce3dcce5bb03b,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3051,1,1,18f79e6092a8993313405cbce712a515cb9b3a885db6985ac55da1283e4b2e27,2024-04-26T22:15:08.263000
|
||||
CVE-2024-30510,0,0,5a644950940e50ac60667456ae9d7008d354df976d23b70ea88670750248c7fb,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30511,0,0,d0cc98a9fcd4b29c047f03054ac8aade5a24634c83857c79161193efdb1adfcd,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30513,0,0,b4f3b427b5b9eb55223e544136e76b030c119a2fc3a4b518e0d0f0c48a100c09,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30514,0,0,5b77fe0998b7e11bf79e1b721812a139c6849d1513a8aeeecc1782432ea3302a,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30518,0,0,e8d4dc9d0a7f93d48badb1cbdec9f19934ca7a332fece613ee9749bc07919401,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30519,0,0,3b4b984b21c18b55e830dd1af8315299dc669c0add51934a0cf87347bc021e68,2024-03-29T13:28:22.880000
|
||||
CVE-2024-3052,1,1,cc0727fb8e43a240bff2ca349b40e96a67bc90a49f1b6b07a4d8b3caeab11e10,2024-04-26T22:15:08.460000
|
||||
CVE-2024-30520,0,0,40fe415caf2a4bab823960caa71aef7f92917db961b860a15eda04176938dd5f,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30521,0,0,831f25d28a4eccbee0c9a477ea2d8542d4b6a09da45b2ed1bac270363725b502,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30523,0,0,0cef256089f66b1e0cf2f5994c8e2a08b4afb817483e2b78f98835367339d575,2024-04-01T01:12:59.077000
|
||||
@ -245594,6 +245597,7 @@ CVE-2024-3077,0,0,df42d4a62ceb1c6a6275b9b1d36ac8da42c0ae3505d0e07beac8238605b550
|
||||
CVE-2024-3078,0,0,de9e294582cbb558bf2417239a323549d99f034f1b581828b43e34b1ad1f5683,2024-04-11T01:25:52.940000
|
||||
CVE-2024-30799,0,0,eae5bca102ad0c1fe3f236f7e51af89eca892740403953a6086f43b81ad7d92b,2024-04-22T13:28:43.747000
|
||||
CVE-2024-30800,0,0,f3aa3f6f154cac6ad1c0d84e6831cbd6fca8728e681fceff9d529e8d2a6eec09,2024-04-24T13:39:42.883000
|
||||
CVE-2024-30804,1,1,90c792c9b225d6c30056555d25108c5adffbf56b4f6d6509a8ca0f4221a00d20,2024-04-26T22:15:08.017000
|
||||
CVE-2024-30806,0,0,3c4bbd71defb52c4de24f9ad1626459edef6b60997b976e6d74aead4ee0b3b0f,2024-04-02T20:31:58.463000
|
||||
CVE-2024-30807,0,0,8463e04fd42dedab289dad3fe1621f8f66d69fb63942da8a4e7f4baade23226e,2024-04-02T20:31:58.463000
|
||||
CVE-2024-30808,0,0,3edb296009dfb16a5061a2505986b3903e36250320b7a7a1ea6af0d775f588e5,2024-04-02T20:31:58.463000
|
||||
@ -245926,7 +245930,7 @@ CVE-2024-31487,0,0,ffef7fcdc05bb476a1f2c02c71de4a76075ea7f0301d6a8889db629ce9b19
|
||||
CVE-2024-31492,0,0,a251126d380ad734bdcae40155276c0c8cd0f78c057d6c232814179759c90bf9,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31497,0,0,d90ff9b470753606034a89c278aa6cbdbffa031df39311cca8f7c7aaa4f69cec,2024-04-26T02:15:06.197000
|
||||
CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08
|
||||
CVE-2024-31502,1,1,03896f05d8861b1f9b4ed5010e9d288b37f7173ac1019a68f73740cd343624ad,2024-04-26T21:15:49.140000
|
||||
CVE-2024-31502,0,0,03896f05d8861b1f9b4ed5010e9d288b37f7173ac1019a68f73740cd343624ad,2024-04-26T21:15:49.140000
|
||||
CVE-2024-31503,0,0,a2a7c8d9eaf4775895950c76302a02326a8d6e67bb7d5ec85d9e8a8516e17053,2024-04-17T12:48:07.510000
|
||||
CVE-2024-31506,0,0,8be7ef5b3e9d65e4bba9dd63e2b7475f0658a4b183369094a98038d4eee40099,2024-04-10T13:24:00.070000
|
||||
CVE-2024-31507,0,0,8a4d05957463fb55563022c4622a2463374ff774a0631f4c63214875a7c78bee,2024-04-10T13:24:00.070000
|
||||
@ -245936,6 +245940,7 @@ CVE-2024-31544,0,0,bc835e0f71240df22cec22617fbfab2cab4d97b1f555eabe4ef7c23231d63
|
||||
CVE-2024-31545,0,0,8e5326bf13231003bc10db7b31c44d418956837c538cbd6727e4f72cee368bee,2024-04-22T19:24:06.727000
|
||||
CVE-2024-31546,0,0,a44eabd912524c4138628ddf21812907bc4989788589b1a0788ce24b3eac282c,2024-04-19T18:29:53.040000
|
||||
CVE-2024-31547,0,0,79c088d9519e1ba5d4decbbdb950409a1ff93781e519e023ecbe916ef398d06d,2024-04-19T18:29:53.040000
|
||||
CVE-2024-31551,1,1,62380112ba3c281751c47ed97529268310ffd535492a462ce526bc4c79f4cf71,2024-04-26T22:15:08.080000
|
||||
CVE-2024-31552,0,0,5a9db2be00e7b7077a4a60e9105689c87f7a53feda5b2567edda13b704df8f81,2024-04-19T18:29:53.040000
|
||||
CVE-2024-3156,0,0,f01ef771ed03a9288d0ee4324d1f6cf3e47c9af6d908a880824436519abea0a6,2024-04-26T16:00:34.653000
|
||||
CVE-2024-3157,0,0,efbf5e20eaa98706deef52c26be2e1cba3d67ed28d54a5b0520df90b69e7c692,2024-04-19T23:15:11.593000
|
||||
@ -245952,7 +245957,7 @@ CVE-2024-31585,0,0,ca870b59b85ac9b6cfa4a8fee4976da074575d82dd3c02566198bbf835617
|
||||
CVE-2024-31587,0,0,6aaa189139b27b06a683c1dac5c91d5124a2971d077e3d9157f284239b68e61a,2024-04-19T16:19:49.043000
|
||||
CVE-2024-3159,0,0,90c5caca0cc5537160e74a2b26ddbcf22bba005cb0a42d8727caf893986c2f2f,2024-04-26T15:59:59.020000
|
||||
CVE-2024-3160,0,0,f58561faca7869291dbd40f98b5207b12f048bddf4323b50e2fa0b0605fe77f4,2024-04-11T01:25:55.513000
|
||||
CVE-2024-31601,1,1,35104970989e767beee4d94e5225aad3a3eb393b1cbd7127247688979055f857,2024-04-26T21:15:49.207000
|
||||
CVE-2024-31601,0,0,35104970989e767beee4d94e5225aad3a3eb393b1cbd7127247688979055f857,2024-04-26T21:15:49.207000
|
||||
CVE-2024-31609,0,0,220c67e8d489cb3fe9b4bc543f7647ddfeb5c25b9b19ca8439b4928d10c6d5aa,2024-04-26T12:58:17.720000
|
||||
CVE-2024-31610,0,0,bad125137564ff82d81c08c69745e1e9123b14f73eadb435f64d4af6d83d6827,2024-04-26T12:58:17.720000
|
||||
CVE-2024-31615,0,0,d0e9cb7307b12540caa27ec15d72bbb39fd07c4f4f188a6a635af2cdd881915c,2024-04-26T12:58:17.720000
|
||||
@ -245970,6 +245975,7 @@ CVE-2024-31666,0,0,31d90f856345851f66dd503f92b4c8e0d00f556ce99028b034c4027dd7c27
|
||||
CVE-2024-3167,0,0,d4d0cf5c76ec6cdbb273213113ea664bf90661030b60b58ff4c0d4ae3475608a,2024-04-26T15:55:58.810000
|
||||
CVE-2024-31678,0,0,6d17d4ce9eaa15ebb6367a838566d027b53ddba56e09f333fd8cadacfd1d2447,2024-04-12T12:44:04.930000
|
||||
CVE-2024-31680,0,0,9cd3893ac983fae5e4213584fc439ab2d2b21e3e6bebab8790c0104ed80c76e1,2024-04-17T12:48:07.510000
|
||||
CVE-2024-31741,1,1,f8fe63a3c107b59eff6f6e9a2ea1b30f144350f1ffa560fa60941355e012f14b,2024-04-26T22:15:08.137000
|
||||
CVE-2024-31744,0,0,7de9e0ac4d1881e8e6a1c9cabea807c4b59ffea44a7ce9a28f0f69a4b5f1eba8,2024-04-19T16:19:49.043000
|
||||
CVE-2024-31745,0,0,a3bdd0cf6c191f4f752a70ac6769fb5b2d5c89636eeffe60e00827ad5ab48d32,2024-04-25T16:15:11.227000
|
||||
CVE-2024-31750,0,0,ef2fe441e5dcedf0cb2da823df8fe57e9b7ada67d4a5ac9a3c649524c0ed2fa2,2024-04-19T13:10:25.637000
|
||||
@ -245998,6 +246004,7 @@ CVE-2024-31816,0,0,8b0edd8a38c33b33b513f099b5e67906c887d32cd0308b5fdfadcac29bc21
|
||||
CVE-2024-31817,0,0,440a95dbf8589f9a9953a43f37d15f507abb02f786409b55238dedab4fef773a,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31818,0,0,72cb9554b67c0af94ffbc580efc3a62e49e452a23305845c2a6157eaa69b0f7f,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31819,0,0,1f8122b9110b9c9e379686153d36743829cf8787fef8a8a1bf73fc202035f197,2024-04-11T12:47:44.137000
|
||||
CVE-2024-31828,1,1,4c24edf0458d635a5666829872ee7629c7e269190f0b7a1c03fdda2a6fc6e27e,2024-04-26T22:15:08.200000
|
||||
CVE-2024-31839,0,0,25a7daa33bac03a27a09e1621adb92d9361c02bf4ef6c11d27831735c896c138,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31841,0,0,de5efd40e0d92babbab87030506b1a212fb4afe9f3f9b49fa0c7d8acedda7118,2024-04-19T16:19:49.043000
|
||||
CVE-2024-31846,0,0,4aa9b2c36e227ec317e3797135e2468ef28cbbea439839bcc511c8ec99315bbc,2024-04-19T16:19:49.043000
|
||||
@ -246505,13 +246512,13 @@ CVE-2024-32869,0,0,0e473f01ce255dcdc5f11b871766f1c1758b18f6cf26ba19adbc6c7e41a0e
|
||||
CVE-2024-32872,0,0,59ac24f6acf63d3b4ddeb437211a7661d520fb02f021fd6a951644796eb80a41,2024-04-24T17:16:50.397000
|
||||
CVE-2024-32875,0,0,1d3ae071c5976cb38c56d9063a1b2dc7d3c3dd7317932ef76fe9cbd393a3f40f,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32876,0,0,56fabbd4be6ea210f5198e54b57dc9c995f989bdeb0f4e519fbeff871267be54,2024-04-24T19:58:40.710000
|
||||
CVE-2024-32878,1,1,4539a658b08348df7616e6f2cfd15e234a42ec98787f43793319e964705cddce,2024-04-26T21:15:49.260000
|
||||
CVE-2024-32878,0,0,4539a658b08348df7616e6f2cfd15e234a42ec98787f43793319e964705cddce,2024-04-26T21:15:49.260000
|
||||
CVE-2024-32879,0,0,0b0046e51a12ad5b1f4492d6cff2d6482480cc94626283d2a6f79bd97479ab0a,2024-04-25T13:18:20.370000
|
||||
CVE-2024-32880,0,0,5c7d6aa44fda3ee69a48104785812fedaa6d3ea7fbc26c71102dbf3b2182bded,2024-04-26T19:59:19.793000
|
||||
CVE-2024-32881,1,1,c1aa04cdf4c21001afb18cd817d4683610efbfbe5815d7594939b83ba1944d9a,2024-04-26T21:15:49.450000
|
||||
CVE-2024-32883,1,1,0e7b1a8483eff1f62788fd77dec858a469ab9c80a1e3c4b58f0f601259a7e9f0,2024-04-26T21:15:49.630000
|
||||
CVE-2024-32881,0,0,c1aa04cdf4c21001afb18cd817d4683610efbfbe5815d7594939b83ba1944d9a,2024-04-26T21:15:49.450000
|
||||
CVE-2024-32883,0,0,0e7b1a8483eff1f62788fd77dec858a469ab9c80a1e3c4b58f0f601259a7e9f0,2024-04-26T21:15:49.630000
|
||||
CVE-2024-32884,0,0,feb09aaeaf00882860d9891266c7a76bef3350941384b117a7f5be081c117262,2024-04-26T19:59:19.793000
|
||||
CVE-2024-32887,1,1,50d5ce55880759d1c934f694c22c7f3e332d7c773a13815daa202a325029dce8,2024-04-26T21:15:49.820000
|
||||
CVE-2024-32887,0,0,50d5ce55880759d1c934f694c22c7f3e332d7c773a13815daa202a325029dce8,2024-04-26T21:15:49.820000
|
||||
CVE-2024-3293,0,0,3552485a27a6b6c8b2cadd17fbdb3e630238722099a3e2d8d97b0f239cd2dc1a,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32947,0,0,66b8169f5ed00566ee332733dff77f7ef577706d5c33e7a379a261befe2945f1,2024-04-24T17:16:50.397000
|
||||
CVE-2024-32948,0,0,b7a98470b717d7f23ae7cba102d8685641e5b820f696ab6effba04fa32abb77f,2024-04-24T13:39:42.883000
|
||||
@ -246929,8 +246936,10 @@ CVE-2024-4234,0,0,0a64019690b8e660b74462a78d6464b10b7f38338c77c87e06c656a7f08215
|
||||
CVE-2024-4235,0,0,99093520f9467f6bc9df1e67ba828ed8d5a52b47abe017780b1bbfac822d38bb,2024-04-26T19:59:19.793000
|
||||
CVE-2024-4236,0,0,0ea63c80ef5a1e0a1b7de7daa05065980f1ac12c4af4da3f2aa1c276e47c5740,2024-04-26T19:59:19.793000
|
||||
CVE-2024-4237,0,0,9f54c377f05529360f2b7be6375c6730ba5e0cecefd13112edd7d9b9b3c96447,2024-04-26T19:59:19.793000
|
||||
CVE-2024-4238,1,1,db559af0179e5e361800f0a06c980d8109c8c965c0ec2fc6e58e7161ba58a8c3,2024-04-26T20:15:07.537000
|
||||
CVE-2024-4239,1,1,044e14e8102f28e3f3c48e3c7cdc0f05bc09da93422e58d89ce0ceb1c22daeff,2024-04-26T21:15:50.003000
|
||||
CVE-2024-4240,1,1,b6bd63709c0ba1f923b1df4e0d6c5efd649c0519ed6b8b0ea4aaf88658572963,2024-04-26T21:15:50.280000
|
||||
CVE-2024-4241,1,1,264f84de7f82f667ea602f912ab0c91f08c69cd3bac4488fa7a0558ca22ce9ae,2024-04-26T21:15:50.507000
|
||||
CVE-2024-4242,1,1,7c2c0351cc2274639c0aac327cc3b8d379b23f811f63689c6939401bba640a19,2024-04-26T21:15:50.727000
|
||||
CVE-2024-4238,0,0,db559af0179e5e361800f0a06c980d8109c8c965c0ec2fc6e58e7161ba58a8c3,2024-04-26T20:15:07.537000
|
||||
CVE-2024-4239,0,0,044e14e8102f28e3f3c48e3c7cdc0f05bc09da93422e58d89ce0ceb1c22daeff,2024-04-26T21:15:50.003000
|
||||
CVE-2024-4240,0,0,b6bd63709c0ba1f923b1df4e0d6c5efd649c0519ed6b8b0ea4aaf88658572963,2024-04-26T21:15:50.280000
|
||||
CVE-2024-4241,0,0,264f84de7f82f667ea602f912ab0c91f08c69cd3bac4488fa7a0558ca22ce9ae,2024-04-26T21:15:50.507000
|
||||
CVE-2024-4242,0,0,7c2c0351cc2274639c0aac327cc3b8d379b23f811f63689c6939401bba640a19,2024-04-26T21:15:50.727000
|
||||
CVE-2024-4243,1,1,06f57d13c6577e082919baf02007629a412b6f97f628566ad77e1dce9d52b4b9,2024-04-26T22:15:08.640000
|
||||
CVE-2024-4244,1,1,f8fdbf36befd6856b8ec4b41749ee8c0ad841b9c473492c05800c93e3ac814d8,2024-04-26T22:15:08.867000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user