mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-03-21T23:00:37.275720+00:00
This commit is contained in:
parent
f8f94515cf
commit
24aa31ab21
@ -2,30 +2,57 @@
|
||||
"id": "CVE-2023-36483",
|
||||
"sourceIdentifier": "productsecurity@carrier.com",
|
||||
"published": "2024-03-16T05:15:18.577",
|
||||
"lastModified": "2024-03-21T02:48:02.037",
|
||||
"lastModified": "2024-03-21T22:15:10.573",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "productsecurity@carrier.com",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An authorization bypass was discovered in the Carrier MASmobile Classic application through 1.16.18 for Android, MASmobile Classic app through 1.7.24 for iOS, and MAS ASP.Net Services through 1.9. It can be achieved via session ID prediction, allowing remote attackers to retrieve sensitive data including customer data, security system status, and event history. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. The affected products cannot simply be updated; they must be removed, but can be replaced by other Carrier software as explained in the Carrier advisory."
|
||||
"value": "Authorization bypass can be achieved by session ID prediction in MASmobile Classic Android\u00a0 version 1.16.18 and earlier and \n\nMASmobile Classic iOS version 1.7.24 and earlier\n\nwhich allows remote attackers to retrieve sensitive data\u00a0 including customer data, security system status, and event history.\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 una omisi\u00f3n de autorizaci\u00f3n en la aplicaci\u00f3n Carrier MASmobile Classic hasta la versi\u00f3n 1.16.18 para Android, la aplicaci\u00f3n MASmobile Classic hasta la 1.7.24 para iOS y los servicios MAS ASP.Net hasta la 1.9. Esto se puede lograr mediante la predicci\u00f3n de ID de sesi\u00f3n, lo que permite a atacantes remotos recuperar datos confidenciales, incluidos datos de clientes, estado del sistema de seguridad e historial de eventos. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante. Los productos afectados no pueden simplemente actualizarse; deben eliminarse, pero pueden reemplazarse por otro software de Carrier como se explica en el aviso de Carrier."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "productsecurity@carrier.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "productsecurity@carrier.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.corporate.carrier.com/Images/CARR-PSA-MASMobile%20Classic%20Authorization%20Bypass-012-0623_tcm558-203964.pdf",
|
||||
"url": "https://www.corporate.carrier.com/product-security/advisories-resources/",
|
||||
"source": "productsecurity@carrier.com"
|
||||
}
|
||||
]
|
||||
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-41842",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-03-12T15:15:45.920",
|
||||
"lastModified": "2024-03-12T16:02:33.900",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-21T21:04:13.000",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A use of externally-controlled format string vulnerability [CWE-134] in Fortinet FortiManager version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer-BigData before 7.2.5 and Fortinet FortiPortal version 6.0 all versions and version 5.3 all versions allows a privileged attacker to execute unauthorized code or commands via specially crafted command arguments."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un uso de vulnerabilidad de cadena de formato controlada externamente [CWE-134] en Fortinet FortiManager versi\u00f3n 7.4.0 a 7.4.1, versi\u00f3n 7.2.0 a 7.2.3 y anteriores a 7.0.10, Fortinet FortiAnalyzer versi\u00f3n 7.4.0 a 7.4.1 , versi\u00f3n 7.2.0 a 7.2.3 y anteriores a 7.0.10, Fortinet FortiAnalyzer-BigData anterior a 7.2.5 y Fortinet FortiPortal versi\u00f3n 6.0 todas las versiones y la versi\u00f3n 5.3 todas las versiones permite a un atacante privilegiado ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de argumentos de comando especialmente manipulados."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,100 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2.0",
|
||||
"versionEndExcluding": "7.0.10",
|
||||
"matchCriteriaId": "18205067-639E-4A90-AF8C-DA71FB65AEFA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.0",
|
||||
"versionEndExcluding": "7.2.4",
|
||||
"matchCriteriaId": "8E0D5DF6-69C6-4325-94D3-D7A44862F62C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.0",
|
||||
"versionEndExcluding": "7.4.2",
|
||||
"matchCriteriaId": "CB15106A-8295-4A9E-B5C8-FA9654636B15"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortianalyzer_bigdata:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4.5",
|
||||
"versionEndIncluding": "6.4.7",
|
||||
"matchCriteriaId": "7299FC61-369D-4F07-B0E1-1FD9E2E371A3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortianalyzer_bigdata:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.0.1",
|
||||
"versionEndIncluding": "7.0.6",
|
||||
"matchCriteriaId": "9417A7DF-F260-45C2-A224-D6FB08792C58"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortianalyzer_bigdata:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.0",
|
||||
"versionEndExcluding": "7.2.6",
|
||||
"matchCriteriaId": "A06370D3-3917-4D9E-980D-52621794A671"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortianalyzer_bigdata:6.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "11815CDE-B157-457A-AB0D-DA73A0F4656C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2.0",
|
||||
"versionEndExcluding": "7.0.10",
|
||||
"matchCriteriaId": "BBD0FF48-FC1A-4406-B939-7E83ED65A57E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.0",
|
||||
"versionEndExcluding": "7.2.4",
|
||||
"matchCriteriaId": "5BC35BBC-5F0C-4802-8F00-643D465D43E4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.0",
|
||||
"versionEndExcluding": "7.4.2",
|
||||
"matchCriteriaId": "83316FAF-C5DE-4603-B3B2-6796E2FAF1A8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.3.0",
|
||||
"versionEndIncluding": "6.0.14",
|
||||
"matchCriteriaId": "CC626329-3FCF-45BE-955B-82A495B10FA6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.com/psirt/FG-IR-23-304",
|
||||
"source": "psirt@fortinet.com"
|
||||
"source": "psirt@fortinet.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-46717",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-03-12T15:15:46.487",
|
||||
"lastModified": "2024-03-12T16:02:33.900",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-21T21:04:18.200",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper authentication vulnerability [CWE-287] in FortiOS versions 7.4.1 and below, versions 7.2.6 and below, and versions 7.0.12 and below when configured with FortiAuthenticator in HA may allow a readonly user to gain read-write access via successive login attempts."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de autenticaci\u00f3n incorrecta [CWE-287] en las versiones 7.4.1 y anteriores de FortiOS, las versiones 7.2.6 y siguientes y las versiones 7.0.12 y siguientes cuando se configura con FortiAuthenticator en HA puede permitir que un usuario de solo lectura obtenga acceso de lectura y escritura a trav\u00e9s de intentos sucesivos de inicio de sesi\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.0.0",
|
||||
"versionEndExcluding": "7.0.13",
|
||||
"matchCriteriaId": "D25F9C04-C7FD-4B1F-A194-CA69E5DE903C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.0",
|
||||
"versionEndExcluding": "7.2.7",
|
||||
"matchCriteriaId": "553C4BA9-953B-4017-8498-785BDA7A3006"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.0",
|
||||
"versionEndExcluding": "7.4.2",
|
||||
"matchCriteriaId": "4316C2EA-3D6E-4A0C-B81D-ADCE040E03E0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.com/psirt/FG-IR-23-424",
|
||||
"source": "psirt@fortinet.com"
|
||||
"source": "psirt@fortinet.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-21390",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-03-12T17:15:49.470",
|
||||
"lastModified": "2024-03-12T17:46:17.273",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-21T21:04:32.570",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Authenticator Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Microsoft Authenticator"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -34,10 +38,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:authenticator:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.2401.0617",
|
||||
"matchCriteriaId": "9C73B95C-FBE2-4911-AA5D-59F448D04A2A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21390",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-21407",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-03-12T17:15:49.957",
|
||||
"lastModified": "2024-03-12T17:46:17.273",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-21T21:06:06.530",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Hyper-V Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Windows Hyper-V"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -34,10 +38,120 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.10240.20526",
|
||||
"matchCriteriaId": "FAE3130D-C88C-42C1-89EF-A8F86254E04D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.14393.6796",
|
||||
"matchCriteriaId": "EA2CA05A-8688-45D6-BC96-627DEB1962E4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.5576",
|
||||
"matchCriteriaId": "4C9B0826-AE47-44B1-988F-6B5CEFB45BD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.19044.4170",
|
||||
"matchCriteriaId": "8680C6F7-3E4F-4AE6-914E-D95E571AF70A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.19045.4170",
|
||||
"matchCriteriaId": "C86ACE06-BA02-49BA-B274-441E74F98FB2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.2836",
|
||||
"matchCriteriaId": "D08CEC8B-343C-486E-B6FA-F4D60ACF7E63"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.3296",
|
||||
"matchCriteriaId": "4DBD4A55-729C-4F86-AE29-6067F62FD03A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22631.3296",
|
||||
"matchCriteriaId": "20DF4699-31FA-404B-BDEA-FE418854F538"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.6796",
|
||||
"matchCriteriaId": "2545664A-E87B-40F7-9C19-53AEC8198B81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.5576",
|
||||
"matchCriteriaId": "FFF3EE72-52DE-4CB2-8D42-74809CD7B292"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2333",
|
||||
"matchCriteriaId": "5F08760C-CF31-4507-8CBD-21A2FEAE478C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.763",
|
||||
"matchCriteriaId": "0AD05A2D-BA23-4B63-8B75-1395F74C36CB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21407",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-21408",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-03-12T17:15:50.127",
|
||||
"lastModified": "2024-03-12T17:46:17.273",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-21T21:06:09.543",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Hyper-V Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de denegaci\u00f3n de servicio de Windows Hyper-V"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -34,10 +38,116 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.10240.20526",
|
||||
"matchCriteriaId": "FAE3130D-C88C-42C1-89EF-A8F86254E04D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.14393.6796",
|
||||
"matchCriteriaId": "EA2CA05A-8688-45D6-BC96-627DEB1962E4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.17763.5576",
|
||||
"matchCriteriaId": "54A84FB6-B0C7-437B-B95A-F2B4CF18F853"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.19044.4170",
|
||||
"matchCriteriaId": "26CD5681-7CC7-42C3-AF89-D6A2C2A5591B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.19045.4170",
|
||||
"matchCriteriaId": "68AF6C08-77D6-4786-B476-90D106F02DF0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.19045.4170",
|
||||
"matchCriteriaId": "C86ACE06-BA02-49BA-B274-441E74F98FB2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.2836",
|
||||
"matchCriteriaId": "D08CEC8B-343C-486E-B6FA-F4D60ACF7E63"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.3296",
|
||||
"matchCriteriaId": "4DBD4A55-729C-4F86-AE29-6067F62FD03A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.3296",
|
||||
"matchCriteriaId": "A332CC68-568F-406B-8463-9FEF359BEA4C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.6796",
|
||||
"matchCriteriaId": "2545664A-E87B-40F7-9C19-53AEC8198B81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.5576",
|
||||
"matchCriteriaId": "FFF3EE72-52DE-4CB2-8D42-74809CD7B292"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2333",
|
||||
"matchCriteriaId": "5F08760C-CF31-4507-8CBD-21A2FEAE478C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.763",
|
||||
"matchCriteriaId": "0AD05A2D-BA23-4B63-8B75-1395F74C36CB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21408",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2024-21761",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-03-12T15:15:48.740",
|
||||
"lastModified": "2024-03-12T16:02:33.900",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-21T21:04:27.653",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper authorization vulnerability [CWE-285] in FortiPortal version 7.2.0, and versions 7.0.6 and below reports may allow a user to download other organizations reports via modification in the request payload."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de autorizaci\u00f3n inadecuada [CWE-285] en los informes de FortiPortal versi\u00f3n 7.2.0 y versiones 7.0.6 e inferiores puede permitir a un usuario descargar informes de otras organizaciones mediante modificaciones en el payload de la solicitud."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.0.0",
|
||||
"versionEndExcluding": "7.0.7",
|
||||
"matchCriteriaId": "281311DE-FCED-4AB9-8D54-EBD0C8FE53B4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiportal:7.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2C7F7D4E-DE62-491A-9C00-EAD2595BF2D7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.com/psirt/FG-IR-24-016",
|
||||
"source": "psirt@fortinet.com"
|
||||
"source": "psirt@fortinet.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-242xx/CVE-2024-24272.json
Normal file
20
CVE-2024/CVE-2024-242xx/CVE-2024-24272.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-24272",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-21T22:15:10.850",
|
||||
"lastModified": "2024-03-21T22:15:10.850",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in iTop DualSafe Password Manager & Digital Vault before 1.4.24 allows a local attacker to obtain sensitive information via leaked credentials as plaintext in a log file that can be accessed by the local user without knowledge of the master secret."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://research.hisolutions.com/2024/03/cve-2024-24272-dualsafe-password-manager-leaks-credentials/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24692",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2024-03-13T20:15:07.273",
|
||||
"lastModified": "2024-03-14T12:52:21.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-21T21:06:13.123",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security@zoom.us",
|
||||
"type": "Secondary",
|
||||
@ -39,6 +59,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@zoom.us",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +80,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*",
|
||||
"versionEndExcluding": "5.17.5",
|
||||
"matchCriteriaId": "C55B10D9-2F21-4C29-A71E-0B8757029F16"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24009/",
|
||||
"source": "security@zoom.us"
|
||||
"source": "security@zoom.us",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-259xx/CVE-2024-25937.json
Normal file
55
CVE-2024/CVE-2024-259xx/CVE-2024-25937.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-25937",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-03-21T22:15:10.910",
|
||||
"lastModified": "2024-03-21T22:15:10.910",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nSQL injection vulnerability exists in the script DIAE_tagHandler.ashx.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-12",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-279xx/CVE-2024-27921.json
Normal file
59
CVE-2024/CVE-2024-279xx/CVE-2024-27921.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-27921",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-21T22:15:11.137",
|
||||
"lastModified": "2024-03-21T22:15:11.137",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Grav is an open-source, flat-file content management system. A file upload path traversal vulnerability has been identified in the application prior to version 1.7.45, enabling attackers to replace or create files with extensions like .json, .zip, .css, .gif, etc. This critical security flaw poses severe risks, that can allow attackers to inject arbitrary code on the server, undermine integrity of backup files by overwriting existing files or creating new ones, and exfiltrate sensitive data using CSS exfiltration techniques. Upgrading to patched version 1.7.45 can mitigate the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/getgrav/grav/commit/5928411b86bab05afca2b33db4e7386a44858e99",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/getgrav/grav/security/advisories/GHSA-m7hx-hw6h-mqmc",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2024/CVE-2024-27xx/CVE-2024-2763.json
Normal file
88
CVE-2024/CVE-2024-27xx/CVE-2024-2763.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-2763",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-21T21:15:10.790",
|
||||
"lastModified": "2024-03-21T21:15:10.790",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in Tenda AC10U 15.03.06.48. Affected by this issue is the function formSetCfm of the file goform/setcfm. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257600. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetCfm.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257600",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257600",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2024/CVE-2024-27xx/CVE-2024-2764.json
Normal file
88
CVE-2024/CVE-2024-27xx/CVE-2024-2764.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-2764",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-21T21:15:11.177",
|
||||
"lastModified": "2024-03-21T21:15:11.177",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in Tenda AC10U 15.03.06.48. This affects the function formSetPPTPServer of the file /goform/SetPptpServerCfg. The manipulation of the argument endIP leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257601 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetPPTPServer.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257601",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257601",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2024/CVE-2024-27xx/CVE-2024-2766.json
Normal file
88
CVE-2024/CVE-2024-27xx/CVE-2024-2766.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-2766",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-21T21:15:11.407",
|
||||
"lastModified": "2024-03-21T21:15:11.407",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in Campcodes Complete Online Beauty Parlor Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/index.php. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257602 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Beauty%20Parlor%20Management%20System/Complete%20Online%20Beauty%20Parlor%20Management%20System%20-%20vuln%201.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257602",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257602",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2024/CVE-2024-27xx/CVE-2024-2767.json
Normal file
88
CVE-2024/CVE-2024-27xx/CVE-2024-2767.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-2767",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-21T21:15:11.693",
|
||||
"lastModified": "2024-03-21T21:15:11.693",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Campcodes Complete Online Beauty Parlor Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/forgot-password.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257603."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Beauty%20Parlor%20Management%20System/Complete%20Online%20Beauty%20Parlor%20Management%20System%20-%20vuln%202.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257603",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257603",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2024/CVE-2024-27xx/CVE-2024-2768.json
Normal file
88
CVE-2024/CVE-2024-27xx/CVE-2024-2768.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-2768",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-21T22:15:12.710",
|
||||
"lastModified": "2024-03-21T22:15:12.710",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Campcodes Complete Online Beauty Parlor Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/edit-services.php. The manipulation of the argument editid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257604."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Beauty%20Parlor%20Management%20System/Complete%20Online%20Beauty%20Parlor%20Management%20System%20-%20vuln%203.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257604",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257604",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2024/CVE-2024-27xx/CVE-2024-2769.json
Normal file
88
CVE-2024/CVE-2024-27xx/CVE-2024-2769.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-2769",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-21T22:15:12.943",
|
||||
"lastModified": "2024-03-21T22:15:12.943",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Campcodes Complete Online Beauty Parlor Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/admin-profile.php. The manipulation of the argument adminname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257605 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Beauty%20Parlor%20Management%20System/Complete%20Online%20Beauty%20Parlor%20Management%20System%20-%20vuln%205.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257605",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257605",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-280xx/CVE-2024-28029.json
Normal file
55
CVE-2024/CVE-2024-280xx/CVE-2024-28029.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-28029",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-03-21T22:15:11.353",
|
||||
"lastModified": "2024-03-21T22:15:11.353",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nPrivileges are not fully verified server-side, which can be abused by a user with limited privileges to bypass authorization and access privileged functionality.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-12",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-281xx/CVE-2024-28116.json
Normal file
63
CVE-2024/CVE-2024-281xx/CVE-2024-28116.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-28116",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-21T22:15:11.577",
|
||||
"lastModified": "2024-03-21T22:15:11.577",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Grav is an open-source, flat-file content management system. Grav CMS prior to version 1.7.45 is vulnerable to a Server-Side Template Injection (SSTI), which allows any authenticated user (editor permissions are sufficient) to execute arbitrary code on the remote server bypassing the existing security sandbox. Version 1.7.45 contains a patch for this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1336"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/getgrav/grav/commit/4149c81339274130742831422de2685f298f3a6e",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/getgrav/grav/security/advisories/GHSA-c9gp-64c4-2rrh",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-281xx/CVE-2024-28117.json
Normal file
59
CVE-2024/CVE-2024-281xx/CVE-2024-28117.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-28117",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-21T22:15:11.820",
|
||||
"lastModified": "2024-03-21T22:15:11.820",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Grav is an open-source, flat-file content management system. Prior to version 1.7.45, Grav validates accessible functions through the Utils::isDangerousFunction function, but does not impose restrictions on twig functions like twig_array_map, allowing attackers to bypass the validation and execute arbitrary commands. Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages. As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance. Upgrading to patched version 1.7.45 can mitigate this issue.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/getgrav/grav/commit/de1ccfa12dbcbf526104d68c1a6bc202a98698fe",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/getgrav/grav/security/advisories/GHSA-qfv4-q44r-g7rv",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-281xx/CVE-2024-28118.json
Normal file
59
CVE-2024/CVE-2024-281xx/CVE-2024-28118.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-28118",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-21T22:15:12.037",
|
||||
"lastModified": "2024-03-21T22:15:12.037",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Grav is an open-source, flat-file content management system. Prior to version 1.7.45, due to the unrestricted access to twig extension class from Grav context, an attacker can redefine config variable. As a result, attacker can bypass a previous SSTI mitigation. Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages. As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance. Version 1.7.45 contains a fix for this issue.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/getgrav/grav/commit/de1ccfa12dbcbf526104d68c1a6bc202a98698fe",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/getgrav/grav/security/advisories/GHSA-r6vw-8v8r-pmp4",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-281xx/CVE-2024-28119.json
Normal file
63
CVE-2024/CVE-2024-281xx/CVE-2024-28119.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-28119",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-21T22:15:12.233",
|
||||
"lastModified": "2024-03-21T22:15:12.233",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Grav is an open-source, flat-file content management system. Prior to version 1.7.45, due to the unrestricted access to twig extension class from grav context, an attacker can redefine the escape function and execute arbitrary commands. Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages. As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance. Version 1.7.45 contains a patch for this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/getgrav/grav/commit/de1ccfa12dbcbf526104d68c1a6bc202a98698fe",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/getgrav/grav/security/advisories/GHSA-2m7x-c7px-hp58",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/twigphp/Twig/blob/3.x/src/Extension/EscaperExtension.php#L99",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-285xx/CVE-2024-28521.json
Normal file
20
CVE-2024/CVE-2024-285xx/CVE-2024-28521.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-28521",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-21T22:15:12.457",
|
||||
"lastModified": "2024-03-21T22:15:12.457",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability in Netcome NS-ASG Application Security Gateway v.6.3.1 allows a local attacker to execute arbitrary code and obtain sensitive information via a crafted script to the loginid parameter of the /singlelogin.php component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/aknbg1thub/cve/blob/main/sql.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-287xx/CVE-2024-28756.json
Normal file
47
CVE-2024/CVE-2024-287xx/CVE-2024-28756.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-28756",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-21T21:15:10.550",
|
||||
"lastModified": "2024-03-21T21:15:10.550",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The SolarEdge mySolarEdge application before 2.20.1 for Android has a certificate verification issue that allows a Machine-in-the-middle (MitM) attacker to read and alter all network traffic between the application and the server."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.solaredge.com/coordinated-vulnerability-disclosure-policy/advisories/sedg-2024-1",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-012.txt",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-288xx/CVE-2024-28891.json
Normal file
55
CVE-2024/CVE-2024-288xx/CVE-2024-28891.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-28891",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-03-21T22:15:12.510",
|
||||
"lastModified": "2024-03-21T22:15:12.510",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nSQL injection vulnerability exists in the script Handler_CFG.ashx.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-12",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
60
README.md
60
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-21T21:00:30.860215+00:00
|
||||
2024-03-21T23:00:37.275720+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-21T20:58:52.357000+00:00
|
||||
2024-03-21T22:15:12.943000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,44 +29,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
242364
|
||||
242381
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `17`
|
||||
|
||||
* [CVE-2024-1727](CVE-2024/CVE-2024-17xx/CVE-2024-1727.json) (`2024-03-21T20:15:07.620`)
|
||||
* [CVE-2024-29374](CVE-2024/CVE-2024-293xx/CVE-2024-29374.json) (`2024-03-21T19:15:09.377`)
|
||||
* [CVE-2024-24272](CVE-2024/CVE-2024-242xx/CVE-2024-24272.json) (`2024-03-21T22:15:10.850`)
|
||||
* [CVE-2024-25937](CVE-2024/CVE-2024-259xx/CVE-2024-25937.json) (`2024-03-21T22:15:10.910`)
|
||||
* [CVE-2024-2763](CVE-2024/CVE-2024-27xx/CVE-2024-2763.json) (`2024-03-21T21:15:10.790`)
|
||||
* [CVE-2024-2764](CVE-2024/CVE-2024-27xx/CVE-2024-2764.json) (`2024-03-21T21:15:11.177`)
|
||||
* [CVE-2024-2766](CVE-2024/CVE-2024-27xx/CVE-2024-2766.json) (`2024-03-21T21:15:11.407`)
|
||||
* [CVE-2024-2767](CVE-2024/CVE-2024-27xx/CVE-2024-2767.json) (`2024-03-21T21:15:11.693`)
|
||||
* [CVE-2024-2768](CVE-2024/CVE-2024-27xx/CVE-2024-2768.json) (`2024-03-21T22:15:12.710`)
|
||||
* [CVE-2024-2769](CVE-2024/CVE-2024-27xx/CVE-2024-2769.json) (`2024-03-21T22:15:12.943`)
|
||||
* [CVE-2024-27921](CVE-2024/CVE-2024-279xx/CVE-2024-27921.json) (`2024-03-21T22:15:11.137`)
|
||||
* [CVE-2024-28029](CVE-2024/CVE-2024-280xx/CVE-2024-28029.json) (`2024-03-21T22:15:11.353`)
|
||||
* [CVE-2024-28116](CVE-2024/CVE-2024-281xx/CVE-2024-28116.json) (`2024-03-21T22:15:11.577`)
|
||||
* [CVE-2024-28117](CVE-2024/CVE-2024-281xx/CVE-2024-28117.json) (`2024-03-21T22:15:11.820`)
|
||||
* [CVE-2024-28118](CVE-2024/CVE-2024-281xx/CVE-2024-28118.json) (`2024-03-21T22:15:12.037`)
|
||||
* [CVE-2024-28119](CVE-2024/CVE-2024-281xx/CVE-2024-28119.json) (`2024-03-21T22:15:12.233`)
|
||||
* [CVE-2024-28521](CVE-2024/CVE-2024-285xx/CVE-2024-28521.json) (`2024-03-21T22:15:12.457`)
|
||||
* [CVE-2024-28756](CVE-2024/CVE-2024-287xx/CVE-2024-28756.json) (`2024-03-21T21:15:10.550`)
|
||||
* [CVE-2024-28891](CVE-2024/CVE-2024-288xx/CVE-2024-28891.json) (`2024-03-21T22:15:12.510`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `23`
|
||||
Recently modified CVEs: `8`
|
||||
|
||||
* [CVE-2021-1262](CVE-2021/CVE-2021-12xx/CVE-2021-1262.json) (`2024-03-21T20:02:29.753`)
|
||||
* [CVE-2021-1513](CVE-2021/CVE-2021-15xx/CVE-2021-1513.json) (`2024-03-21T20:02:24.913`)
|
||||
* [CVE-2021-34452](CVE-2021/CVE-2021-344xx/CVE-2021-34452.json) (`2024-03-21T20:02:17.453`)
|
||||
* [CVE-2022-44595](CVE-2022/CVE-2022-445xx/CVE-2022-44595.json) (`2024-03-21T19:47:03.943`)
|
||||
* [CVE-2023-49837](CVE-2023/CVE-2023-498xx/CVE-2023-49837.json) (`2024-03-21T19:47:03.943`)
|
||||
* [CVE-2024-1394](CVE-2024/CVE-2024-13xx/CVE-2024-1394.json) (`2024-03-21T19:15:09.063`)
|
||||
* [CVE-2024-2578](CVE-2024/CVE-2024-25xx/CVE-2024-2578.json) (`2024-03-21T19:47:03.943`)
|
||||
* [CVE-2024-2579](CVE-2024/CVE-2024-25xx/CVE-2024-2579.json) (`2024-03-21T19:47:03.943`)
|
||||
* [CVE-2024-2580](CVE-2024/CVE-2024-25xx/CVE-2024-2580.json) (`2024-03-21T19:47:03.943`)
|
||||
* [CVE-2024-26308](CVE-2024/CVE-2024-263xx/CVE-2024-26308.json) (`2024-03-21T19:54:03.230`)
|
||||
* [CVE-2024-27190](CVE-2024/CVE-2024-271xx/CVE-2024-27190.json) (`2024-03-21T19:47:03.943`)
|
||||
* [CVE-2024-27277](CVE-2024/CVE-2024-272xx/CVE-2024-27277.json) (`2024-03-21T19:47:03.943`)
|
||||
* [CVE-2024-27956](CVE-2024/CVE-2024-279xx/CVE-2024-27956.json) (`2024-03-21T19:47:03.943`)
|
||||
* [CVE-2024-27962](CVE-2024/CVE-2024-279xx/CVE-2024-27962.json) (`2024-03-21T19:47:03.943`)
|
||||
* [CVE-2024-27963](CVE-2024/CVE-2024-279xx/CVE-2024-27963.json) (`2024-03-21T19:47:03.943`)
|
||||
* [CVE-2024-27964](CVE-2024/CVE-2024-279xx/CVE-2024-27964.json) (`2024-03-21T19:47:03.943`)
|
||||
* [CVE-2024-27965](CVE-2024/CVE-2024-279xx/CVE-2024-27965.json) (`2024-03-21T19:47:03.943`)
|
||||
* [CVE-2024-27968](CVE-2024/CVE-2024-279xx/CVE-2024-27968.json) (`2024-03-21T19:47:03.943`)
|
||||
* [CVE-2024-28252](CVE-2024/CVE-2024-282xx/CVE-2024-28252.json) (`2024-03-21T20:15:08.050`)
|
||||
* [CVE-2024-28535](CVE-2024/CVE-2024-285xx/CVE-2024-28535.json) (`2024-03-21T20:58:46.217`)
|
||||
* [CVE-2024-28553](CVE-2024/CVE-2024-285xx/CVE-2024-28553.json) (`2024-03-21T20:58:52.357`)
|
||||
* [CVE-2024-29180](CVE-2024/CVE-2024-291xx/CVE-2024-29180.json) (`2024-03-21T19:47:03.943`)
|
||||
* [CVE-2024-29916](CVE-2024/CVE-2024-299xx/CVE-2024-29916.json) (`2024-03-21T19:47:03.943`)
|
||||
* [CVE-2023-36483](CVE-2023/CVE-2023-364xx/CVE-2023-36483.json) (`2024-03-21T22:15:10.573`)
|
||||
* [CVE-2023-41842](CVE-2023/CVE-2023-418xx/CVE-2023-41842.json) (`2024-03-21T21:04:13.000`)
|
||||
* [CVE-2023-46717](CVE-2023/CVE-2023-467xx/CVE-2023-46717.json) (`2024-03-21T21:04:18.200`)
|
||||
* [CVE-2024-21390](CVE-2024/CVE-2024-213xx/CVE-2024-21390.json) (`2024-03-21T21:04:32.570`)
|
||||
* [CVE-2024-21407](CVE-2024/CVE-2024-214xx/CVE-2024-21407.json) (`2024-03-21T21:06:06.530`)
|
||||
* [CVE-2024-21408](CVE-2024/CVE-2024-214xx/CVE-2024-21408.json) (`2024-03-21T21:06:09.543`)
|
||||
* [CVE-2024-21761](CVE-2024/CVE-2024-217xx/CVE-2024-21761.json) (`2024-03-21T21:04:27.653`)
|
||||
* [CVE-2024-24692](CVE-2024/CVE-2024-246xx/CVE-2024-24692.json) (`2024-03-21T21:06:13.123`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
83
_state.csv
83
_state.csv
@ -165559,7 +165559,7 @@ CVE-2021-1258,0,0,d82f969dd17a5f3e524dde57860640835b4905edecd5741b078ad84534dab3
|
||||
CVE-2021-1259,0,0,86531ec5550e6433a46b99fb6d5bcd5925dbbdba36287f07609b01bda56864ca,2021-01-29T15:15:23.147000
|
||||
CVE-2021-1260,0,0,e0a128c880244e947036b72a88f6608409f654ea2383b7f657439480f4add5e0,2023-10-06T16:24:48.993000
|
||||
CVE-2021-1261,0,0,22c0ca0c0b5235b43b736d4096137afa27d44452ab54e4d1dab67ebb5af5720b,2023-10-06T16:24:48.993000
|
||||
CVE-2021-1262,0,1,2027020efb31a45ccae93610730595f2a2566a853fd41b2f4858f48375d4988c,2024-03-21T20:02:29.753000
|
||||
CVE-2021-1262,0,0,2027020efb31a45ccae93610730595f2a2566a853fd41b2f4858f48375d4988c,2024-03-21T20:02:29.753000
|
||||
CVE-2021-1263,0,0,4d45bea273c6e884177db62427337cdba8f80b38b26845af660d0d1789b1234f,2023-10-06T16:24:48.993000
|
||||
CVE-2021-1264,0,0,81dee8876bb986a4e952a03935bd850b263032e2b547b9deacbe69c2ec8035c7,2023-11-07T03:27:49.183000
|
||||
CVE-2021-1265,0,0,17a5f7ace4ccaca3dcf0661bf9760d365aaec23c6a53804524a3d586a17e43fc,2021-01-27T16:50:57.907000
|
||||
@ -165791,7 +165791,7 @@ CVE-2021-1509,0,0,d7c71f1ff07c1b27324eabc6b9d1a6fbcbda43f97498e911954c3001754a12
|
||||
CVE-2021-1510,0,0,2f58f05cc4ff52f87d306aef8bc3a557aaf35d7a662a15484ffc84e5b6934c1c,2023-11-07T03:28:28.943000
|
||||
CVE-2021-1511,0,0,aeefe7aba6f9c34abab2d952a73403182e551eccc92674708ff7ce2e21c0f45e,2023-11-07T03:28:29.133000
|
||||
CVE-2021-1512,0,0,d1a586e26565035cda4fcdffed8eb0875987f0590191ac617865b1a21c37f3a4,2023-10-16T16:35:25.220000
|
||||
CVE-2021-1513,0,1,a25a72c26181f8fcbf0e33ec57924341e0321a71266ff29164cc87d405dbc811,2024-03-21T20:02:24.913000
|
||||
CVE-2021-1513,0,0,a25a72c26181f8fcbf0e33ec57924341e0321a71266ff29164cc87d405dbc811,2024-03-21T20:02:24.913000
|
||||
CVE-2021-1514,0,0,166408dda482a95a3a4ae776cae748fec8ae0d6b29c3957ccdc7b2a10f62bd96,2023-10-16T16:35:25.220000
|
||||
CVE-2021-1515,0,0,253ce2bc5373e3293a647b374083917e36279af569fd90975a8c1532c1f055e0,2023-11-07T03:28:29.533000
|
||||
CVE-2021-1516,0,0,6cc3a90009fb0506c584e09732edd1f63833843c653985397edf96a1a45e75e0,2023-11-07T03:28:29.697000
|
||||
@ -177528,7 +177528,7 @@ CVE-2021-34449,0,0,06602504c62be8f7c935030bea3d43a76bd231bcc6562014ab1969fb30782
|
||||
CVE-2021-3445,0,0,8326494930b3f9272a5d8cd4b20ff9f890de64bd49463e9c8e25e5f9e2931b60,2023-11-07T03:38:00.453000
|
||||
CVE-2021-34450,0,0,334a2ffa2eaaa26e8560ce439661f9c6b84b7e0ab039d5a580e2fd6e4be420fe,2023-12-28T23:15:28.100000
|
||||
CVE-2021-34451,0,0,5671a1bcbcdeba6d0e8fed6ef4bc65187dc6749bd883cacb387b5a5293e87d22,2023-12-28T23:15:28.327000
|
||||
CVE-2021-34452,0,1,3ac14191585a0bf73f46587a035f3eeaee23a188c7eed305de107944cb616e82,2024-03-21T20:02:17.453000
|
||||
CVE-2021-34452,0,0,3ac14191585a0bf73f46587a035f3eeaee23a188c7eed305de107944cb616e82,2024-03-21T20:02:17.453000
|
||||
CVE-2021-34453,0,0,a1235b920860a9483cd53339ebc839647ae1115c38baa50c187aece5bbbb241b,2023-08-01T23:15:16.173000
|
||||
CVE-2021-34454,0,0,78ff2f699dd5f4805aa53889d7c557dce2028518698297993c91bddae55e2c44,2023-12-28T23:15:28.783000
|
||||
CVE-2021-34455,0,0,e4116877d5ca41f8e5bd3999b1f5c62630dd6589628f6d82e4bd4a7375a4ea19,2023-12-28T23:15:29
|
||||
@ -208693,7 +208693,7 @@ CVE-2022-4459,0,0,841d23cd2517ff134527c70acbac864bd1798efca5741cdb40fc1b914c6b61
|
||||
CVE-2022-44590,0,0,34e1f96684be246af4d115d74d6ad86d1677f25db158e219a386c9a7b2c1f0fd,2022-11-10T19:23:14.800000
|
||||
CVE-2022-44591,0,0,8de73acec656de193157bdf7e48ae245affcf919e7ad24e4c08dfb89e483fd5f,2022-11-18T19:28:56.420000
|
||||
CVE-2022-44594,0,0,b7dc479f0e8562d2f1e10e9b8c859c387aa51f72d918e1c729d08c2404508fbd,2023-04-28T03:44:57.940000
|
||||
CVE-2022-44595,0,1,00f838a23a694da460800d3c10ececb250288d2ecf59a66ab6ab9d3bc830695e,2024-03-21T19:47:03.943000
|
||||
CVE-2022-44595,0,0,00f838a23a694da460800d3c10ececb250288d2ecf59a66ab6ab9d3bc830695e,2024-03-21T19:47:03.943000
|
||||
CVE-2022-4460,0,0,549234db110e5b693f52fad78d6358b8e08ccb9d9c9d7ca9e6118d72a7d6c30e,2023-11-07T03:57:52.710000
|
||||
CVE-2022-44606,0,0,dd9357b8301dbd8c44e690a2844baf8bea2bcc5c8cc5dc8addb6ac09082694a0,2022-12-09T21:18:22.850000
|
||||
CVE-2022-44608,0,0,f6323b139a76646c7c7a6763944abd4b79185adca516d6c4f40e939231a6cbf5,2022-12-09T00:49:39.090000
|
||||
@ -225789,7 +225789,7 @@ CVE-2023-3648,0,0,8bf5cd21bebe1f009df0402614d81a95820d19c16313c13f13bdcb02328016
|
||||
CVE-2023-36480,0,0,f0e3aa211de5a0c3a2168b2a645f7f1ce9f836925dc20f7850d265cdf7a9931f,2023-08-09T17:36:23.510000
|
||||
CVE-2023-36481,0,0,ed19945a7c741bdf97f28bcf17a78a3c0f8cfd9233338beba86126916a433c39,2023-08-31T19:03:24.843000
|
||||
CVE-2023-36482,0,0,bd0e44899481ac6efbee59d652b2b8b189bc1f6d78c19ba81f50dfea1a1c5269,2023-08-15T00:14:42.947000
|
||||
CVE-2023-36483,0,0,622a63b11c7fd34225b7b6128371ed45341c5284c2c200f5335bb5663afb152e,2024-03-21T02:48:02.037000
|
||||
CVE-2023-36483,0,1,ca9b2dc6d298ab63800fddba4a7dc256cf2831b05a618f8514438575bb02006e,2024-03-21T22:15:10.573000
|
||||
CVE-2023-36484,0,0,5479ebcd0542fb121cd7096c70c765143b3bb0c91e4266390a7bded3446284e3,2023-07-07T16:46:54.217000
|
||||
CVE-2023-36485,0,0,2bdacaafe7fb04293b23a19f5c28650551985db5d0c95b626556e9d589f9568a,2024-02-14T00:22:22.397000
|
||||
CVE-2023-36486,0,0,8414dc9b0aaf87e7ce90ac48aa30bf6201949c225518eacfb4b7a55183491347,2024-02-14T00:22:06.447000
|
||||
@ -229588,7 +229588,7 @@ CVE-2023-41838,0,0,3e0f7fbfa7e646d9e6b24c4454d47991fb7a054ff52e26fd2383c30218801
|
||||
CVE-2023-4184,0,0,a743c17ab8cdeaa1e8ab3b1f8348605243a078383c1fc0de2815b38f2022b933,2024-03-21T02:49:42.503000
|
||||
CVE-2023-41840,0,0,058b38dd93d31544026ceac10c3746a380bb4b893ffc4ec7ff6d3fdfced84fd9,2023-11-21T01:38:25.570000
|
||||
CVE-2023-41841,0,0,c396e283e8f417b0327e4e699914f5888ace1adc808bd88f6a80513363ef91d4,2023-11-07T04:21:06.727000
|
||||
CVE-2023-41842,0,0,d902985df39e90e0a870b3fe352f2bc3214aa532e6a2efd7f16fe54be83b07fd,2024-03-12T16:02:33.900000
|
||||
CVE-2023-41842,0,1,847be07d8abd62089f270be62daebc8531ff542cf1d25f8b1c5095516f84e1b3,2024-03-21T21:04:13
|
||||
CVE-2023-41843,0,0,b76e4a753371cb69a8b1f35f87d6e61096da25b6a5129b71ec9d3f9352cd868a,2023-11-07T04:21:06.847000
|
||||
CVE-2023-41844,0,0,6027f1b10751980796006b3e2c00169910ba55a7276f222e3506a44e3f919093,2023-12-15T19:34:33.480000
|
||||
CVE-2023-41846,0,0,305ed2ac81853899e9689d428004fcebea9ca9cfc1cb19e8fcbe87953034cd73,2023-09-14T18:00:49.853000
|
||||
@ -232544,7 +232544,7 @@ CVE-2023-4671,0,0,ad1f968edfe36b5f1d6decd4caedc1c73ef3ae935fd3b1d84fb345aca578c5
|
||||
CVE-2023-46711,0,0,1c36566bf77c88f8f580bee5807cda4cdab1040c046625d658316f3bf04fa201,2024-01-04T02:45:03.603000
|
||||
CVE-2023-46712,0,0,d169d9deb918d86ddb3fd6f8a9da309e3ff3aef24d01eaf742dfc995e5cc9e07,2024-01-17T18:25:21.613000
|
||||
CVE-2023-46713,0,0,651ba252a50beb076dbcd77eed9416207ba8847f69703fbd84a4801e460be956,2023-12-19T18:59:02.837000
|
||||
CVE-2023-46717,0,0,5d886e4d7527822336c2043d5c7b6413373143e08ca6b66775084525e04609bc,2024-03-12T16:02:33.900000
|
||||
CVE-2023-46717,0,1,aa258f839ea40a78ca0a10de84d911caccb021bd36a6a7345f56d9a2b06d9ab0,2024-03-21T21:04:18.200000
|
||||
CVE-2023-4672,0,0,e7f018e5b00d8caa2cd6326fde538c208ac0fc901cdb1bcffceb003eeac57c07,2024-01-04T20:09:31.050000
|
||||
CVE-2023-46722,0,0,ee1e20585c3fd0a1d9c68641566f4a09ec3ae4d7392bafc4c6a7ed95aa18cb3f,2023-11-08T17:53:25.937000
|
||||
CVE-2023-46723,0,0,9c1b68305de266ad60fde647a9c434b64a6cf34ec6368f51178a40235644e6a3,2023-11-08T17:54:38.240000
|
||||
@ -234617,7 +234617,7 @@ CVE-2023-49830,0,0,95c8e8a920bc6a550dd8fced96adfc49615ef3b8f6aec68dfdcf2d26ab1f8
|
||||
CVE-2023-49833,0,0,75834fff665b59f3c4fb0b4b03558d32fc91b3efab25cbdeefafb0192b012059,2023-12-18T19:14:15.050000
|
||||
CVE-2023-49834,0,0,f01e2730dc0b95d1b7f32c812dba24237147f33301308210a31bf1cc47cc7d0b,2023-12-20T04:26:25.007000
|
||||
CVE-2023-49836,0,0,d1eaaf088ac1e6696c52a64c2e3dbfdfe00102afdcfa4bf3951b57aa3483333c,2023-12-18T18:19:51.903000
|
||||
CVE-2023-49837,0,1,efabe1e704e190a47962d97e791147336566f4b472138d57ed70012cd72df24c,2024-03-21T19:47:03.943000
|
||||
CVE-2023-49837,0,0,efabe1e704e190a47962d97e791147336566f4b472138d57ed70012cd72df24c,2024-03-21T19:47:03.943000
|
||||
CVE-2023-4984,0,0,b568e92dbfdfa933d741a561994c5a187fe494f7ce09795a2b3a70d20f02c757,2024-03-21T02:49:56.543000
|
||||
CVE-2023-49840,0,0,3007b22f6bc63fefba1a05b48a48deee17ae057500c4d492f77e27d9c865a34d,2023-12-20T04:28:39.197000
|
||||
CVE-2023-49841,0,0,ad3a17229bd01d0c2bf491b86a58b899c006843c79bea01aae5bd3ff930dd743,2023-12-18T19:03:16.533000
|
||||
@ -238777,7 +238777,7 @@ CVE-2024-1390,0,0,760bcdaac2db269a3249aaa20e58e1659b2977bdb995748ef5e46a1ecb8544
|
||||
CVE-2024-1391,0,0,d263861df201411e95604a0f8dea4a32aa5aa465f14e9d3ee26c7cf1dddcea30,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1392,0,0,854e6aa0a85eb7f6e01984f9f2b39f09c3e464c67a90f670cafc735773e56736,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1393,0,0,139d32a27df25f29abc2bcda3159db69b338e05c68d7680abed80afd815e8ff5,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1394,0,1,7c73506bdd53fd1dc2a1d94144983d2673f2dc3fe5d07e0b6a723a3ea487359f,2024-03-21T19:15:09.063000
|
||||
CVE-2024-1394,0,0,7c73506bdd53fd1dc2a1d94144983d2673f2dc3fe5d07e0b6a723a3ea487359f,2024-03-21T19:15:09.063000
|
||||
CVE-2024-1397,0,0,e6d8c9c2beca75d3fdc5f918cb423cf21913a9c807f46126d5b49c29c7bd60f0,2024-03-13T12:33:51.697000
|
||||
CVE-2024-1398,0,0,7a7783e481aa897afa83bd125da0d53c431d5a5a9d43f1ade8b1e715449f59a0,2024-03-04T13:58:23.447000
|
||||
CVE-2024-1400,0,0,295a10f36c3e13d694d09cafc6872c0c48f9e2b4c87da0889327ecdac7abe4ac,2024-03-12T12:40:13.500000
|
||||
@ -238965,7 +238965,7 @@ CVE-2024-1720,0,0,3f534b1db2e7b75966562da6fb1d468afac7b86b23a312961b1d896997e21d
|
||||
CVE-2024-1722,0,0,bbfa2fe804b85c8f73b8225a9811c290a6a29ddc6e06b05c51fd071f985f9060,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1723,0,0,7e337e59dda9fcfb03cb2d0ee4f7926bbc1a4aeb3afb375b3ac4508c9e5d97e9,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1725,0,0,ee1fb8cd83e91b3cc554ef61ba8506273bf384217121fa2160f3c7c69e57a993,2024-03-08T14:02:57.420000
|
||||
CVE-2024-1727,1,1,a5fa7c92f81c10c1ceddf980b8b24e0215a1f2778b409140ec0db41816e38d59,2024-03-21T20:15:07.620000
|
||||
CVE-2024-1727,0,0,a5fa7c92f81c10c1ceddf980b8b24e0215a1f2778b409140ec0db41816e38d59,2024-03-21T20:15:07.620000
|
||||
CVE-2024-1731,0,0,a54dfdadfcd6666506c62883f073482e904182fadeecad8ff7a349f271e0661b,2024-03-05T13:41:01.900000
|
||||
CVE-2024-1733,0,0,d9cf8004467e67497b484a605a620c0a0db32312b35f534ec3be854a6ce160fc,2024-03-17T22:38:29.433000
|
||||
CVE-2024-1735,0,0,fef99247045161df3b08e17c74949b5db371420b96202703c89efa90d1969060,2024-02-26T16:32:25.577000
|
||||
@ -239543,7 +239543,7 @@ CVE-2024-21386,0,0,903a512cc32d9e4674dc7d86977b04859925aeeaf4bf144d775c4ac6c4cba
|
||||
CVE-2024-21387,0,0,7fed095f12199f3e674e290d01dbfe98907c805a81347bcb7dfa229268485bdc,2024-01-31T20:08:28.943000
|
||||
CVE-2024-21388,0,0,4689f3e5a25df77d38bba630c81581b1866b09926bc1df9fc34e5bb70ce254f6,2024-02-06T18:21:15.953000
|
||||
CVE-2024-21389,0,0,c1dff7495d1f41d9f906c3a6839e9f5bbde84314db35a5d04f2a4417ef658156,2024-02-23T17:39:57.703000
|
||||
CVE-2024-21390,0,0,45ae7e7ebd33d183faf4f836d7c5c503902720ae8038e0d197357034103904aa,2024-03-12T17:46:17.273000
|
||||
CVE-2024-21390,0,1,8219a434145bfe7959ea8e4741bf30daf6b14c92574a93fe04a1803ca76b16a0,2024-03-21T21:04:32.570000
|
||||
CVE-2024-21391,0,0,bf2070d05137e38bbe24d5d76cf0717ede5add506f6e523e54ee2b337b0573d0,2024-03-07T19:27:15.807000
|
||||
CVE-2024-21392,0,0,f8c347c372addecafd969a8402f74415361262f568cd324d75d3354da9caa2f8,2024-03-12T17:46:17.273000
|
||||
CVE-2024-21393,0,0,85e9457ccc636d7e822717ab1f6fd1f3599931eedaff743fcc5a8bcb0835033e,2024-02-23T17:40:29.097000
|
||||
@ -239559,8 +239559,8 @@ CVE-2024-21403,0,0,6f0e70b7784f3aad29df29de72a29f5e8a4bc0827d2b946bbf47745bab084
|
||||
CVE-2024-21404,0,0,8aba03ed666ffd23124b08c87a2acd614c58649f26fe48e08bdfdea134622c02,2024-02-22T18:23:55.787000
|
||||
CVE-2024-21405,0,0,7b2bcd85f8b75e36055a51e8d6e50e620fbb5da00673d7a82956b2dcc3d7e6dd,2024-02-22T17:57:19.810000
|
||||
CVE-2024-21406,0,0,4926f610f67020e143f717a8966dfc594abc79953c895df1691f78cfff880f19,2024-03-01T22:57:15.940000
|
||||
CVE-2024-21407,0,0,30479147bec2a3c21c4aa5dfb1c87fcd9352eaa553440e3e992a0f5812889808,2024-03-12T17:46:17.273000
|
||||
CVE-2024-21408,0,0,0aa1ba0b8e600e9468b94728ede9d63896f951b14bd37d8025fed0b72dca0697,2024-03-12T17:46:17.273000
|
||||
CVE-2024-21407,0,1,13806882df1727e3bbc8e26b8c7dd4da4315e03da171f9dbf0647863a4d47218,2024-03-21T21:06:06.530000
|
||||
CVE-2024-21408,0,1,5325218009ff3c8f10a3b9269e4b1c5ec312eb3ea56b73f6a728479c1bad3635,2024-03-21T21:06:09.543000
|
||||
CVE-2024-21410,0,0,bd862af63cde79d77d3d96c08b20eb8ee12ef6b46d7738e8f98c5d9c8af65aee,2024-02-26T21:10:38.713000
|
||||
CVE-2024-21411,0,0,752b3d730293c266885035a1f030073e3f7456710c29851319bdadbb6794b6d6,2024-03-12T17:46:17.273000
|
||||
CVE-2024-21412,0,0,6df500642ad441e157d67f1fe17b6dc5155211f5565d89e1eed7797770fe5407,2024-03-07T17:48:58.173000
|
||||
@ -239729,7 +239729,7 @@ CVE-2024-21749,0,0,229191a90250f78e7aa746c2ca4de6c3be31a5d2f4672cbc80ebde5848a38
|
||||
CVE-2024-21750,0,0,3e8fbe0cb62c8e56d68418bdaca88bd6a5a9359bd561d57e9822bcdabaea5468,2024-02-03T00:41:15.460000
|
||||
CVE-2024-21752,0,0,80a5a3aff28e680d194d956f222c96b3f36d11392adc2ff7fd485136323ef565,2024-02-29T13:49:29.390000
|
||||
CVE-2024-2176,0,0,d54596f8e5752379438e249000547ff3a83df464c2a08554886046d39f2d50e4,2024-03-06T21:42:48.053000
|
||||
CVE-2024-21761,0,0,744da343deb6ef5cda8d70ea751b4bb02f0ef16aa3befb042547405bbfbdf7f4,2024-03-12T16:02:33.900000
|
||||
CVE-2024-21761,0,1,8ab59e75152f9d6936d0a5e25258149f4630555ed80a24ba673592c858a212ca,2024-03-21T21:04:27.653000
|
||||
CVE-2024-21762,0,0,0b64c1e53b9988082cc4d4d5e4617e40dc5892047d7c058b50bd69b94b2061c8,2024-02-13T18:21:14.607000
|
||||
CVE-2024-21763,0,0,e8a94692e80752e5b1d3ea2f8db6894556c45d4c446bc2036ad4bdc6519e2437,2024-02-14T18:04:45.380000
|
||||
CVE-2024-21764,0,0,6a104de5d97cb4f3a858343729857223fff5cb50c4e9c48631f456ff6696c0b7,2024-02-07T17:15:22.520000
|
||||
@ -240778,6 +240778,7 @@ CVE-2024-24263,0,0,a7faff23323264f34f9c62262fa3f03aa668fa6eb0738632fbcd67b53dcba
|
||||
CVE-2024-24265,0,0,af394545ccd1a804e78a325f17868ed02a0d7133b6c62faa71b15705be7c579e,2024-02-07T23:06:25.303000
|
||||
CVE-2024-24266,0,0,af2222be5080c2bad50dea6cff249c7d07d0b0a9a7e6f3a785220071b883839d,2024-02-07T23:28:17.213000
|
||||
CVE-2024-24267,0,0,95558cbe9d72e85c3d366ac9b6c161da57c7f083ab6736f7e86204c7be33f1c7,2024-02-07T23:28:24.530000
|
||||
CVE-2024-24272,1,1,e575de58bb9e66a994ee5c7d2673bfc5bad02f41a3b3853df57444dfb9c978b3,2024-03-21T22:15:10.850000
|
||||
CVE-2024-24275,0,0,5ee5552d1ccdff1349c63c1ee819e4122e7275d9cd64505362d94567de774ca6,2024-03-06T15:18:08.093000
|
||||
CVE-2024-24276,0,0,c0b996f05c041cdec9f97004ccc67bd94d1c66cbf22b8df3dba73751978abd1f,2024-03-06T15:18:08.093000
|
||||
CVE-2024-24278,0,0,3f7eb60b847e1971c5f65cb683e6174dee6547147c3195ceb2f7499f12bdbd36,2024-03-06T15:18:08.093000
|
||||
@ -240895,7 +240896,7 @@ CVE-2024-24683,0,0,5dcfcb131b936f6ead6cae5418b28b2fe1bb1011c1c921fe73c5d9bd261bf
|
||||
CVE-2024-2469,0,0,bbb4acc770dce2c80eeef638c741188cf4cc5adc1821a89a4b4d8155ca8fe893,2024-03-21T12:58:51.093000
|
||||
CVE-2024-24690,0,0,4249963fcab3f64839ca35be1a62d20e5da7a24ba0a47ce2bf9c0d2ae28ac410,2024-02-14T13:59:35.580000
|
||||
CVE-2024-24691,0,0,87a55408e5efa0a4e3ce695995ae48834f0ce6baa0932acdc26c28bc7459ff4b,2024-02-14T13:59:35.580000
|
||||
CVE-2024-24692,0,0,96b263e11e7ffd264e5e6330a524d4e167d94ed5d670d61f6bb2c4bb8b02f370,2024-03-14T12:52:21.763000
|
||||
CVE-2024-24692,0,1,580d11b018a5e4d4bbd8e658047778e9899568d414cc4a0fa08655ce5029182d,2024-03-21T21:06:13.123000
|
||||
CVE-2024-24693,0,0,5948992e2aa56bf9230af7bcdfd2c9a8d3e9ce95b4c0f6ada002a4f7d2439c11,2024-03-14T12:52:21.763000
|
||||
CVE-2024-24695,0,0,f7b489372675997f3018702f3166f9e3d390c6d5bf9cde9b8e59b33dbe31e943,2024-02-14T13:59:35.580000
|
||||
CVE-2024-24696,0,0,340219d088caaa9660211943b96c2739fe7ed93b849c938b38d29441b9ee779b,2024-02-14T13:59:35.580000
|
||||
@ -241407,9 +241408,9 @@ CVE-2024-25767,0,0,5e5d85efb5a949e2d407dc5470a1026f931741e6d3d19a638a7a6f425b54d
|
||||
CVE-2024-25768,0,0,80ced9e42f994d6a00a0057cb00581829176f61a4dfa1e97abbae3afb8561c8a,2024-02-26T22:10:40.463000
|
||||
CVE-2024-2577,0,0,c843620e43b4656c06ef8ee9254a21713fc5cfa1bda4a16ceabcb16830382f60,2024-03-21T02:52:39.510000
|
||||
CVE-2024-25770,0,0,d105bd95abb6afbf92cef5c1765f81d4416c38d2a6067fe6216eb1ee17388748,2024-02-26T22:10:40.463000
|
||||
CVE-2024-2578,0,1,8067579b1ebf336ee1daf98516c926ae1ffceb32460cd545b41c51aab9076f37,2024-03-21T19:47:03.943000
|
||||
CVE-2024-2579,0,1,82ab7736c7cd2bae37cca14333922f5ac036820dddbd265831a9ea551e48aa62,2024-03-21T19:47:03.943000
|
||||
CVE-2024-2580,0,1,17c770530b9c88c0a0bc27203561d8211df9836f86fe3343fde81a78a162c0d5,2024-03-21T19:47:03.943000
|
||||
CVE-2024-2578,0,0,8067579b1ebf336ee1daf98516c926ae1ffceb32460cd545b41c51aab9076f37,2024-03-21T19:47:03.943000
|
||||
CVE-2024-2579,0,0,82ab7736c7cd2bae37cca14333922f5ac036820dddbd265831a9ea551e48aa62,2024-03-21T19:47:03.943000
|
||||
CVE-2024-2580,0,0,17c770530b9c88c0a0bc27203561d8211df9836f86fe3343fde81a78a162c0d5,2024-03-21T19:47:03.943000
|
||||
CVE-2024-25801,0,0,86d0a2f88d637a38d728e68507deae5ad1ee66b74383784e4b403b33b5149a86,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25802,0,0,cb029cdbf03ee0051152f36415381bb55ee304fcb50819490e22f017c52403c6,2024-02-22T19:07:27.197000
|
||||
CVE-2024-2581,0,0,6eca5564f5891085eb56e7f4cce8a941d50b5c5d945724a4654e0a645ab887e7,2024-03-21T02:52:39.600000
|
||||
@ -241484,6 +241485,7 @@ CVE-2024-25932,0,0,b47ba5ecf2a19427a2d0c7404d84cf9b82c7d738bc913534568255e831392
|
||||
CVE-2024-25933,0,0,093a19179e6e045a94069a9cabb14922ac900e3b53f12387034c6f0b19d4fd7f,2024-03-17T22:38:29.433000
|
||||
CVE-2024-25934,0,0,abf29b2c8bd2941b97b5a50ee19174b7389e9c0ccc1df25f4fdb8e591190b306,2024-03-15T16:26:49.320000
|
||||
CVE-2024-25936,0,0,8effd82663b8db2d960ef33e023d14a22fda9a759a9ee34ebfd84341bfced171,2024-03-15T16:26:49.320000
|
||||
CVE-2024-25937,1,1,c4a907f1a69461947e2422aeb6ed7c212ded96be6d6c8008dd85083f4cdce300,2024-03-21T22:15:10.910000
|
||||
CVE-2024-2594,0,0,62f22797cf1e847607c0f48ec8428fa7570128cbcbde2cadf780cc6697bdf9c5,2024-03-18T19:40:00.173000
|
||||
CVE-2024-25940,0,0,81faf8084be28ad3443bfad1349de788b40c215e318cb61e901b3079aac1c24e,2024-02-15T06:23:39.303000
|
||||
CVE-2024-25941,0,0,ca1cef65d30f17057b47421c2700ecf50e418e7bf4da35eb3fcc2989f17ef1eb,2024-02-15T06:23:39.303000
|
||||
@ -241671,7 +241673,7 @@ CVE-2024-26300,0,0,957ff2fceea083c23710802994700a4cf17bc21a9f298857e1101271f2e4e
|
||||
CVE-2024-26301,0,0,ca5ba4fc82d74473f58bbb8ab53e52870805c492ae0704dcd3113ae9fe8a11a4,2024-02-28T14:06:45.783000
|
||||
CVE-2024-26302,0,0,af4ef1bb4da1c0ac0e7b0a0b03804bb031d31d0e464ca3573002ab0828a12d88,2024-02-28T14:06:45.783000
|
||||
CVE-2024-26307,0,0,9bdd86f1164e19b9b7e171833e6f17ecff380db1e609df57649c593081a62eb2,2024-03-21T12:58:51.093000
|
||||
CVE-2024-26308,0,1,2ba9e28d3969717f6516b4803ddc13ceecd3ad2f69b64fd95ab4756f662bdfa5,2024-03-21T19:54:03.230000
|
||||
CVE-2024-26308,0,0,2ba9e28d3969717f6516b4803ddc13ceecd3ad2f69b64fd95ab4756f662bdfa5,2024-03-21T19:54:03.230000
|
||||
CVE-2024-26309,0,0,f36b82bfd58135529029d2dbb3557eae73d94f3c7d43b34f799072bc28e25580,2024-03-08T14:02:57.420000
|
||||
CVE-2024-2631,0,0,4ce8c252c50d2a4573b6db6829ce390aacb977173215dab753e6b59d6e346a30,2024-03-20T17:18:21.343000
|
||||
CVE-2024-26310,0,0,cdf3231f7a059b92520dd591ab7449fe300f81e89c81c63cb479e44416fa612e,2024-02-22T19:07:27.197000
|
||||
@ -241872,7 +241874,7 @@ CVE-2024-2717,0,0,60956d204776e8fc2f79250d188a534a8f231639d58b0eebc608181972adc9
|
||||
CVE-2024-2718,0,0,69219abfd430b6a0a0008d330dbe89494263528e572419109c92a9fc419b6f63,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27189,0,0,515e61fa1831b3fd92525b0004dfafde618646c72fb29e4527e0a2fb9466806f,2024-03-15T16:26:49.320000
|
||||
CVE-2024-2719,0,0,a4ab17264d9d4de02148162ae470cd2b2fdd972306f561edebd77c0e41dd9d7a,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27190,0,1,1aa0bf9b04d8ad0cd0d83da443ced72d3db96666d7e8636691ac4635aaeee635,2024-03-21T19:47:03.943000
|
||||
CVE-2024-27190,0,0,1aa0bf9b04d8ad0cd0d83da443ced72d3db96666d7e8636691ac4635aaeee635,2024-03-21T19:47:03.943000
|
||||
CVE-2024-27192,0,0,0ff7a489a9c185cda73564233ae30b76c3279bb0d352bc83dbf6b8e10c6212e5,2024-03-15T16:26:49.320000
|
||||
CVE-2024-27193,0,0,1a2f1126258ed9b0f5281770f95fad5056f0f1e4993150f3d871f6ef458a3533,2024-03-15T16:26:49.320000
|
||||
CVE-2024-27194,0,0,b8200fea2f0a79d9b8f1fbf40aca3e6d111a7a732357978a250e1964deaa7251,2024-03-17T22:38:29.433000
|
||||
@ -241915,7 +241917,7 @@ CVE-2024-27237,0,0,952387726c7567ea2371af0e500cab297b027867a108431eaa82a39745a31
|
||||
CVE-2024-27255,0,0,07d4523d50b3b6ceec1ed85c31e8859376bfd63a9732f2f4d2cf6e5b4c34b76b,2024-03-04T13:58:23.447000
|
||||
CVE-2024-27265,0,0,caf2cbef481f9d0206d06f75a38ca052c5291ba0582e91875cea8f52e6d86a34,2024-03-19T16:52:02.767000
|
||||
CVE-2024-27266,0,0,f3ab0f27c5fbbc81843b4329fa53134d5b91174cad9bacbbc5dbf01cfacc3864,2024-03-19T16:52:35.400000
|
||||
CVE-2024-27277,0,1,eb365bab444835328458e82045190ce3a564e0755801fc1f65f8b5d9bbf59bcb,2024-03-21T19:47:03.943000
|
||||
CVE-2024-27277,0,0,eb365bab444835328458e82045190ce3a564e0755801fc1f65f8b5d9bbf59bcb,2024-03-21T19:47:03.943000
|
||||
CVE-2024-27278,0,0,2ef9546b6eb3a76ad70be700186038d995dd630654759ed72b9b3d10968f6d39,2024-03-06T15:18:08.093000
|
||||
CVE-2024-27279,0,0,a0a465925dfcee0f633443a4d3db070f2bf023c10d4135b020d1a0fbe76c5a4b,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27283,0,0,d0d6cc69e38ce7977029c4d3a011dff4f743808fa73bec6f0327124024522ffa,2024-02-22T19:07:27.197000
|
||||
@ -241987,18 +241989,24 @@ CVE-2024-27623,0,0,335934f06c4afd03c24d8ea0f13e9520a06db4e45dc99de31e76f91b777e3
|
||||
CVE-2024-27625,0,0,e1c123c7cbb72c1152f10bec7c5db687cd4b211c6f1247bce688ef0105bc5f48,2024-03-05T14:27:46.090000
|
||||
CVE-2024-27626,0,0,06fb1dce28f844815c1d8334673afd42b5ad67647a67d11a7a830eb63a50770e,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27627,0,0,2adc4718290b7f1d1d408d1d5d79989d398cde78693706b86dff52f1322eb9c4,2024-03-05T14:27:46.090000
|
||||
CVE-2024-2763,1,1,bee65eeea6878adcac23397bc71d98831879058eb4882e87835c22b7e843d724,2024-03-21T21:15:10.790000
|
||||
CVE-2024-2764,1,1,69a14a2a0dd965472714b67d7985952064e30264a89aaecdc982ea5bd5630546,2024-03-21T21:15:11.177000
|
||||
CVE-2024-27655,0,0,65a637f75a188da438b32cc13f4600329f3f424dcd0f437c9989c4c9314e002f,2024-03-01T14:04:26.010000
|
||||
CVE-2024-27656,0,0,2f731c51e226b6152416f771e826d74f69590b91bf713c56222b4fac3d8f2331,2024-03-01T14:04:26.010000
|
||||
CVE-2024-27657,0,0,6c517d302d2c56a9786119bf2465fe9b50134a18e449436c88637119f49f73a6,2024-03-01T14:04:26.010000
|
||||
CVE-2024-27658,0,0,de292d8f17e3b6a4b54092716a03244494548bb536dcb3cbcaab392d9ac50e07,2024-03-01T14:04:26.010000
|
||||
CVE-2024-27659,0,0,490ce783956f55fbb1652cd0208e0f99fff65361983f109fc8e1a66b3e797355,2024-03-01T14:04:26.010000
|
||||
CVE-2024-2766,1,1,2f03b47b16b3a18f059f9f66de634e5f6ef9cec3878390ee1e98999cc5468b98,2024-03-21T21:15:11.407000
|
||||
CVE-2024-27660,0,0,ebc867d9e8ab77866712caf2c77523ce69fe475473038494b2e093ce6c793b8c,2024-03-01T14:04:26.010000
|
||||
CVE-2024-27661,0,0,86da8e187830fd36888e5a846b7303cd63252f868f903b0bf7eaad6fbe1ac85e,2024-03-01T14:04:26.010000
|
||||
CVE-2024-27662,0,0,3251284bf234434361d463758a344d1bc61b65e736c70ed013176b4fc1a3abef,2024-03-01T14:04:26.010000
|
||||
CVE-2024-27668,0,0,255f8ec9db75a1b2656a5d8885c3aab9aaa34449ee65d35c3a707a7e7b8d15ff,2024-03-04T15:35:25.673000
|
||||
CVE-2024-2767,1,1,ffaabea37af308423f4f6840702d67970e3cfd3bcc6ef79f88efa2eb1d7cf735,2024-03-21T21:15:11.693000
|
||||
CVE-2024-2768,1,1,fb02be4ca45dc8f116c47a8d602d92c4e05c6f4d0713bc6b3fe2be20242866bc,2024-03-21T22:15:12.710000
|
||||
CVE-2024-27680,0,0,96c9e2b516bb3c42b6c5a857a748e4b2bf1f8d01976f5c4ab9824d25b192009b,2024-03-04T15:35:25.673000
|
||||
CVE-2024-27684,0,0,265733b871b65fcd052263479536d66d42340f95cd723628ecb5857c3bcfe5a9,2024-03-04T15:35:25.673000
|
||||
CVE-2024-27689,0,0,f4ebc1e59160fdab518bfa3aa9af1f1ba832ce6045359e8a975bb23df8ccddfc,2024-03-01T22:22:25.913000
|
||||
CVE-2024-2769,1,1,95797766df7972b86cd52a83630965b27434dfbd9e9798ad1c8a81ad8866d2c7,2024-03-21T22:15:12.943000
|
||||
CVE-2024-27692,0,0,96cf609944e6476718d8d1c519869d6f251f131a1b19ff614e15f00c454cdd33,2024-03-01T17:15:07.617000
|
||||
CVE-2024-27694,0,0,f3214413fbbba6e4989cb23c7682c51f2973a0b48d2e319f7c34a38e30c11001,2024-03-05T13:41:01.900000
|
||||
CVE-2024-27698,0,0,ac54888b0a03034871f07f7d36cab166990ef3007932a85c3ddd7d9b6a6ab747,2024-03-09T23:15:49.403000
|
||||
@ -242038,6 +242046,7 @@ CVE-2024-27916,0,0,57603b4ae0cd7b53b3d4b7465c5e0da26ce7f8961f1ab6e4b1173461736f1
|
||||
CVE-2024-27917,0,0,af242c2d21e7486c1314f58994d4b13c43efcfe28649da8aeb5e5a5a818348df,2024-03-06T21:42:48.053000
|
||||
CVE-2024-27918,0,0,3664ec04f7d9a719220c7fe5f6ddc241af99de6538768ed6a6d6b43526064a3c,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27920,0,0,f0490af99419d039a483091f0cc2cfbd25508df9b9a1d7fb05a10eecef5acab6,2024-03-17T22:38:29.433000
|
||||
CVE-2024-27921,1,1,9fc575ed87e20a35126bff846e3aa31cccec44ae44f1cb9a7f799d6b974dde7b,2024-03-21T22:15:11.137000
|
||||
CVE-2024-27922,0,0,d5b1b9b28631478cfaa086e0b605c7345d21c041c30a4843fe35c87fffd7f1e1,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27923,0,0,e143436c1fef289cd65d521e6631dc8531653f791ec9727bdb454c80c71c0113,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27926,0,0,437c3e91ee05045eaf3d785b863914fe91cf5cded7548ad0feea1f658c0072c4,2024-03-21T12:58:51.093000
|
||||
@ -242057,17 +242066,17 @@ CVE-2024-27949,0,0,12ee9b935394b527d1677a59b517c94d0df067a0b32bfff31d7cb2be5b4b5
|
||||
CVE-2024-27950,0,0,56d632dad56c45d949d3327de16e5b70b08683cea8ce7876ca8c59cc37ee8062,2024-03-01T14:04:04.827000
|
||||
CVE-2024-27952,0,0,184c933cd3d4f7d9f291de87daadba6c6d2dcb57a0cab449b4798a27658d2d98,2024-03-13T18:15:58.530000
|
||||
CVE-2024-27953,0,0,9606a5ea342585cc8ea605f674c63e8d870327e37e1ba285dba38be6126632a2,2024-03-13T18:15:58.530000
|
||||
CVE-2024-27956,0,1,eeea096f0e7e7487ea049c194ac62702e3efa47a3d999d9e69a572f09e5c15e8,2024-03-21T19:47:03.943000
|
||||
CVE-2024-27956,0,0,eeea096f0e7e7487ea049c194ac62702e3efa47a3d999d9e69a572f09e5c15e8,2024-03-21T19:47:03.943000
|
||||
CVE-2024-27957,0,0,5098f1a90cb829431de95b5de6e60aa2ea5ee4aedd8c9f7d7d4297d6dc37ff37,2024-03-17T22:38:29.433000
|
||||
CVE-2024-27958,0,0,2ee086fb447798c561fd1c831c754d734514f619f6ebb04cf96679cb78dfef40,2024-03-17T22:38:29.433000
|
||||
CVE-2024-27959,0,0,e2d4c3e5066dc506643038067fab6e9f26070ced2f7f327a18ffcd82b243c593,2024-03-17T22:38:29.433000
|
||||
CVE-2024-27960,0,0,6ff911c5617586aebae672070284633e223cb5b14cbbc3b1801f17c292900f46,2024-03-17T22:38:29.433000
|
||||
CVE-2024-27961,0,0,3162bfbc67900a83a9b4114dba265e7189f0bad8c0ddf2d85f6724674d13510a,2024-03-17T22:38:29.433000
|
||||
CVE-2024-27962,0,1,1c94df9110462a34df55d8f671d128860266ccb77dd29f389b2324600ca07680,2024-03-21T19:47:03.943000
|
||||
CVE-2024-27963,0,1,1fe8e45c3046e4191d77b36670840383914d58f1ba31efb184b266de4ae6b144,2024-03-21T19:47:03.943000
|
||||
CVE-2024-27964,0,1,f723b903bea75dee5cd9d094fb735ccf35df44ec2a2fe82d8cd63bd7e33ad323,2024-03-21T19:47:03.943000
|
||||
CVE-2024-27965,0,1,07b2c962b6af72a3fa4d6e0cca49f1bed68d7474aaf9839141a5bebbc2988945,2024-03-21T19:47:03.943000
|
||||
CVE-2024-27968,0,1,62d1484625b8ff1b6da2393031085b35a7b07168c520f9d4ac0420345380cdc9,2024-03-21T19:47:03.943000
|
||||
CVE-2024-27962,0,0,1c94df9110462a34df55d8f671d128860266ccb77dd29f389b2324600ca07680,2024-03-21T19:47:03.943000
|
||||
CVE-2024-27963,0,0,1fe8e45c3046e4191d77b36670840383914d58f1ba31efb184b266de4ae6b144,2024-03-21T19:47:03.943000
|
||||
CVE-2024-27964,0,0,f723b903bea75dee5cd9d094fb735ccf35df44ec2a2fe82d8cd63bd7e33ad323,2024-03-21T19:47:03.943000
|
||||
CVE-2024-27965,0,0,07b2c962b6af72a3fa4d6e0cca49f1bed68d7474aaf9839141a5bebbc2988945,2024-03-21T19:47:03.943000
|
||||
CVE-2024-27968,0,0,62d1484625b8ff1b6da2393031085b35a7b07168c520f9d4ac0420345380cdc9,2024-03-21T19:47:03.943000
|
||||
CVE-2024-27974,0,0,c5d12161a6a294fb4d33a068888d07d2dec693f9073d8d47f06182bf4fe2779a,2024-03-18T12:38:25.490000
|
||||
CVE-2024-27986,0,0,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000
|
||||
CVE-2024-27987,0,0,ce6fd0b1730cd837f285c0aaaa1258cf6aa8505469e7f313401adb363ee7f395,2024-03-15T12:53:06.423000
|
||||
@ -242077,6 +242086,7 @@ CVE-2024-27995,0,0,31db9c3046ef3b6826fd04aab15586376d26e0b529bdf84ce7eba17bac569
|
||||
CVE-2024-27996,0,0,79cff30308b011c07df476cb18acc5ff1830e7bf17b14d1ca5a0d9446fa716b8,2024-03-20T13:00:16.367000
|
||||
CVE-2024-27997,0,0,b42c7cf4751e4a11a6e5eeb90c0df264fce89958ee556b8b06894cd2e68b11ce,2024-03-20T13:00:16.367000
|
||||
CVE-2024-27998,0,0,325b1a8419d02931fcb08c1286afe5c33e53c5bf8527e201a365155e360914cf,2024-03-20T13:00:16.367000
|
||||
CVE-2024-28029,1,1,9e484b8439861147fdb6b933336d3af06d5e28282f7bbd62426d313102246715,2024-03-21T22:15:11.353000
|
||||
CVE-2024-28039,0,0,9ef35c96ff38e007b2fd4f37c3f1f5b6d35461c4eaa69f2b36faccd438b26411,2024-03-18T12:38:25.490000
|
||||
CVE-2024-28053,0,0,e281ed045d826247c32c0ccef204d2c431b80f755e75c928bfd444d7e8497772,2024-03-15T12:53:06.423000
|
||||
CVE-2024-28054,0,0,fd5e34ddafff629285a62ddb2d3b6251633211261857e076506fc9aaf016b6b2,2024-03-18T19:40:00.173000
|
||||
@ -242099,6 +242109,10 @@ CVE-2024-28112,0,0,13394bf321439a7b80b31ae63012fb69faf271f01573bdf4d69e6f1d90267
|
||||
CVE-2024-28113,0,0,4285de229101312bf59190b9237f9b0ffa56ca0930f139097955359a41ebcab5,2024-03-13T12:33:51.697000
|
||||
CVE-2024-28114,0,0,7da8b099613e387d1a8ac16fa6023879524d5796fc9bbb4a91069a4438dcd4dc,2024-03-13T12:33:51.697000
|
||||
CVE-2024-28115,0,0,3e0e705412ec4ecfb9fabefcb95634cd838a6bf7c9c03087d677ba199986f693,2024-03-08T14:02:57.420000
|
||||
CVE-2024-28116,1,1,85286e6845f2beac119052857d56d51860d6038aa133c3b458a86cdf9924834b,2024-03-21T22:15:11.577000
|
||||
CVE-2024-28117,1,1,50af41bcf40f5c97cffed5e4d7915b2e6e4dbf663e644e7a567040eb1c3709c8,2024-03-21T22:15:11.820000
|
||||
CVE-2024-28118,1,1,e61cb89fdfd67653460541c5789b2ee8ade691ef725d261698f974fd285a2753,2024-03-21T22:15:12.037000
|
||||
CVE-2024-28119,1,1,ba119101a2f9a5bd2f2f9133840523bad66cb58d06fb55e6c9c926ee00725610,2024-03-21T22:15:12.233000
|
||||
CVE-2024-28120,0,0,1945ab744b479cd2a55b16e82913f94d84bcc236918a39e22cfe06aca7010c4c,2024-03-12T12:40:13.500000
|
||||
CVE-2024-28121,0,0,6ad3b99e4c8dd1459c44e51d2edc62f08f0aa4d5ffd25ea4a2fe7aa5af2916e8,2024-03-13T21:16:00.460000
|
||||
CVE-2024-28122,0,0,3209f9a611aea4804720e8e5b4eeb3a02772982f302e787ac8040299af464092,2024-03-11T01:32:39.697000
|
||||
@ -242158,7 +242172,7 @@ CVE-2024-28248,0,0,b617812c524b85d27f2a46b3a739648463fa9ffb5a6e46ea47ba0c68bd3fa
|
||||
CVE-2024-28249,0,0,7f01b3731d6ed3594265964b9061da88eb89dfe99b6d59bfec8413859c3ac454,2024-03-19T13:26:46
|
||||
CVE-2024-28250,0,0,dacc68b6e843dc808e1d498d69054a425a6f10e258af235d9a1256f74372900d,2024-03-19T13:26:46
|
||||
CVE-2024-28251,0,0,19fc23d56f5d00fa3c69d993b0deb280b2d4a1df9b73eb3d828c9ec8b6104ec4,2024-03-14T12:52:16.723000
|
||||
CVE-2024-28252,0,1,ef5b49a93a934440796c2d3d79cb29d26eeed77accae4ad9797588db77e6bd30,2024-03-21T20:15:08.050000
|
||||
CVE-2024-28252,0,0,ef5b49a93a934440796c2d3d79cb29d26eeed77accae4ad9797588db77e6bd30,2024-03-21T20:15:08.050000
|
||||
CVE-2024-28253,0,0,b0d1b906324ecf48e7bcfd3c9d0c313a69a8c6ff9baa313b92164ce1f64f0b92,2024-03-17T22:38:29.433000
|
||||
CVE-2024-28254,0,0,ba6384e5d24a90ea0036dcbe7f89cd48d629aea12c2d3808708fa9f619d07a5b,2024-03-21T02:52:24.507000
|
||||
CVE-2024-28255,0,0,abc37b2c1df4d41f872020a3754e2ae86c707a3247848b9d32abc1bd5f67bb13,2024-03-17T22:38:29.433000
|
||||
@ -242196,11 +242210,12 @@ CVE-2024-28431,0,0,148c6be422e12f315897bdd57f5208c74e8137e452c7019eafe29f97f527c
|
||||
CVE-2024-28432,0,0,4bc8c3df18623e8712ef966fb24c80f6754436b2eb6a0c14d5d3c56f5a161090,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28446,0,0,e3b0d814ee24ce9a2740eda808696f714c3071d6722fa7bd76f62923d12a194d,2024-03-19T13:26:46
|
||||
CVE-2024-28447,0,0,729795bf39bd106c71b5b798b10fa8f526cc5d6a6eb2785b0edfa8459a535a4c,2024-03-19T13:26:46
|
||||
CVE-2024-28535,0,1,174c70ce71a26af929a40c7b6a103a5242ac3321f34f35a982d598e918b67152,2024-03-21T20:58:46.217000
|
||||
CVE-2024-28521,1,1,fd105cbcd479edb3fdca1735a5056fe2779ff0a030566d3c18a1d1881e0e5b20,2024-03-21T22:15:12.457000
|
||||
CVE-2024-28535,0,0,174c70ce71a26af929a40c7b6a103a5242ac3321f34f35a982d598e918b67152,2024-03-21T20:58:46.217000
|
||||
CVE-2024-28537,0,0,ff6bf2a37289dca28bccb57e311acb6479e1a577841d298af6b3b484403dfc2c,2024-03-18T19:40:00.173000
|
||||
CVE-2024-28547,0,0,a2de8a258b087cbf7c5442c921d96afce5895db417e9c628fe7656334d2bb7cc,2024-03-18T19:40:00.173000
|
||||
CVE-2024-28550,0,0,55b413fc03c0e6dbaa5c4b6ccf0c8e244ea995bce860e043c8086ce78f470aae,2024-03-18T19:40:00.173000
|
||||
CVE-2024-28553,0,1,f74a5d2edd657e610cfc2b884ed1530d128afd106cc0a285c1f4868830f65cd2,2024-03-21T20:58:52.357000
|
||||
CVE-2024-28553,0,0,f74a5d2edd657e610cfc2b884ed1530d128afd106cc0a285c1f4868830f65cd2,2024-03-21T20:58:52.357000
|
||||
CVE-2024-28562,0,0,91433a4c4f462713402770533ad7f25e56b67cc00fab70587df3692124b0273d,2024-03-20T13:00:16.367000
|
||||
CVE-2024-28563,0,0,a656ef0aa8710291541ea7c711ec135274e970f2c247f821eefbeaee78f8b4d1,2024-03-20T13:00:16.367000
|
||||
CVE-2024-28564,0,0,2abccbe60536fbfc04ad1cc3dd03bdffb43e6097953ebe8e099f5edfe9491595,2024-03-20T13:00:16.367000
|
||||
@ -242257,6 +242272,7 @@ CVE-2024-28746,0,0,4e08f19b517756fb15fbaf966494c1aeec3b9803b4e2b615b4d5a557eb48c
|
||||
CVE-2024-28752,0,0,b6856abb589c0fed02798f341901c4f3025e287fced11706e9fa0c89b392cd6a,2024-03-15T12:53:06.423000
|
||||
CVE-2024-28753,0,0,73ca850c1b6879daba607bc61d7d16457b56173a47004b8bff799b514a526c36,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3b2c,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28756,1,1,72fb373f05075b509bde4da42c8f1b37f875b3bfa2ed5ad286fd8af7cac37faa,2024-03-21T21:15:10.550000
|
||||
CVE-2024-28757,0,0,83cb6aefc1d6f4ccc5441198cdfc19ec27b4e109d2bc2864c936baa137f8e197,2024-03-19T03:15:06.893000
|
||||
CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000
|
||||
CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000
|
||||
@ -242273,6 +242289,7 @@ CVE-2024-28862,0,0,b0dc40150b0e5f15633ecb26c2614b37fe6eefbb423911349887989b36d78
|
||||
CVE-2024-28864,0,0,6556868d08f3b43cf56ee8c0e31629a1275e8137bc2387bf2430488f9854bd36,2024-03-19T13:26:46
|
||||
CVE-2024-28865,0,0,346bb195552b29118071ab302fbe331daaaa3a5da7b31ab976886613f922d084,2024-03-19T13:26:46
|
||||
CVE-2024-28868,0,0,4e3489f3c96f97bc271ff7282115c7f5d25e2aa392efe0c1c5842c72ee9986bf,2024-03-21T12:58:51.093000
|
||||
CVE-2024-28891,1,1,f405320dab5b2a31ad98c52f834cfeea6b90287b02c5ba48d14ebaf161736ecb,2024-03-21T22:15:12.510000
|
||||
CVE-2024-28916,0,0,3588de3801d3f24953276fa6b57f2d684fb38fc8b3ed3ad7d8613e127e6022b7,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29018,0,0,996b521b7d9365d8d41596984cc4ea0a166d70f0fc41d183b4857a8a3632cdd4,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29026,0,0,ae12b0436e3ecdf28001034b69d1ac66de23f0f8b6b646a25aa4e89d5c652db8,2024-03-21T12:58:51.093000
|
||||
@ -242334,10 +242351,10 @@ CVE-2024-29143,0,0,a3f92e2c9ae6aaf4168f841be16c13a544cace199faa049656661980aa53e
|
||||
CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24c8f,2024-03-18T12:38:25.490000
|
||||
CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000
|
||||
CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000
|
||||
CVE-2024-29180,0,1,e32bebc90fbd05fe3a3edfae9506df906c8ca56e295fcb3cc3f3f384d12528c8,2024-03-21T19:47:03.943000
|
||||
CVE-2024-29180,0,0,e32bebc90fbd05fe3a3edfae9506df906c8ca56e295fcb3cc3f3f384d12528c8,2024-03-21T19:47:03.943000
|
||||
CVE-2024-29243,0,0,80b3eab65af2d9fbeb7b6048e074697688a19de63e1138c377d0b826523dd7db,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29244,0,0,ab4dadc4ff7b45a2c285edb922de956bae0828f007627c62339f15145e95a7b7,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29374,1,1,f8a146770d52182e0c10b15b21ebc5da7e22091690385e976078b28de6736be7,2024-03-21T19:47:03.943000
|
||||
CVE-2024-29374,0,0,f8a146770d52182e0c10b15b21ebc5da7e22091690385e976078b28de6736be7,2024-03-21T19:47:03.943000
|
||||
CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000
|
||||
CVE-2024-29469,0,0,acf93e04574e9669a29498319a75720c9b5a03ff4de2c06070b1f52ac9f365b7,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29470,0,0,ec8cc83a60b9ef7edaa49e0605acc097203825f31a2e1ca35494b606ac2473df,2024-03-21T12:58:51.093000
|
||||
@ -242362,4 +242379,4 @@ CVE-2024-29877,0,0,5b6a7271e346dceec62c9141f9ae12b0e5342a31cc26366c653fe20c26c8b
|
||||
CVE-2024-29878,0,0,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dda8d,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29916,0,1,dd300e18b662f862d3dd0881eace85d81be3f3aaeb79c908bcef100a80a89dd1,2024-03-21T19:47:03.943000
|
||||
CVE-2024-29916,0,0,dd300e18b662f862d3dd0881eace85d81be3f3aaeb79c908bcef100a80a89dd1,2024-03-21T19:47:03.943000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user