mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2024-04-04T04:00:30.461382+00:00
This commit is contained in:
parent
51fc28a6ad
commit
2d7343d508
@ -2,9 +2,8 @@
|
|||||||
"id": "CVE-2023-7152",
|
"id": "CVE-2023-7152",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2023-12-29T05:15:09.473",
|
"published": "2023-12-29T05:15:09.473",
|
||||||
"lastModified": "2024-03-21T02:50:56.913",
|
"lastModified": "2024-04-04T02:15:06.203",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -134,6 +133,14 @@
|
|||||||
"Issue Tracking"
|
"Issue Tracking"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4E2HYWCZB5R4SHY4SZZZSFDMD64N4SOZ/",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEK46QAJOXXDZOWOIE2YACUOCZFWOBCK/",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.249158",
|
"url": "https://vuldb.com/?ctiid.249158",
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
|
@ -2,9 +2,8 @@
|
|||||||
"id": "CVE-2023-7158",
|
"id": "CVE-2023-7158",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2023-12-29T07:15:11.060",
|
"published": "2023-12-29T07:15:11.060",
|
||||||
"lastModified": "2024-03-21T02:50:57.260",
|
"lastModified": "2024-04-04T02:15:06.400",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -154,6 +153,14 @@
|
|||||||
"Release Notes"
|
"Release Notes"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4E2HYWCZB5R4SHY4SZZZSFDMD64N4SOZ/",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEK46QAJOXXDZOWOIE2YACUOCZFWOBCK/",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.249180",
|
"url": "https://vuldb.com/?ctiid.249180",
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
|
51
CVE-2024/CVE-2024-20xx/CVE-2024-2008.json
Normal file
51
CVE-2024/CVE-2024-20xx/CVE-2024-2008.json
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2008",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2024-04-04T03:15:06.053",
|
||||||
|
"lastModified": "2024-04-04T03:15:06.053",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The Modal Popup Box \u2013 Popup Builder, Show Offers And News in Popup plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.5.2 via deserialization of untrusted input in the awl_modal_popup_box_shortcode function. This makes it possible for authenticated attackers, with contributor-level access and above, to inject a PHP Object. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/browser/modal-popup-box/trunk/include/modal-popup-box-shortcode.php#L19",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3062572%40modal-popup-box&new=3062572%40modal-popup-box&sfp_email=&sfph_mail=",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fca3d106-49df-49fc-a90d-e0cb26bd34b6?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
59
CVE-2024/CVE-2024-26xx/CVE-2024-2692.json
Normal file
59
CVE-2024/CVE-2024-26xx/CVE-2024-2692.json
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2692",
|
||||||
|
"sourceIdentifier": "help@fluidattacks.com",
|
||||||
|
"published": "2024-04-04T02:15:06.527",
|
||||||
|
"lastModified": "2024-04-04T02:15:06.527",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "SiYuan version 3.0.3 allows executing arbitrary commands on the server. This is possible because the application is vulnerable to Server Side XSS.\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "help@fluidattacks.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.6,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 6.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "help@fluidattacks.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://fluidattacks.com/advisories/dezco/",
|
||||||
|
"source": "help@fluidattacks.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/siyuan-note/siyuan/",
|
||||||
|
"source": "help@fluidattacks.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
47
CVE-2024/CVE-2024-28xx/CVE-2024-2803.json
Normal file
47
CVE-2024/CVE-2024-28xx/CVE-2024-2803.json
Normal file
@ -0,0 +1,47 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2803",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2024-04-04T02:15:06.800",
|
||||||
|
"lastModified": "2024-04-04T02:15:06.800",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The ElementsKit Elementor addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the countdown widget in all versions up to, and including, 3.0.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3062463%40elementskit-lite&new=3062463%40elementskit-lite&sfp_email=&sfph_mail=#file12",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b1c44ad9-e61e-4f29-9c0b-7c0a89b0c8da?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-28xx/CVE-2024-2830.json
Normal file
55
CVE-2024/CVE-2024-28xx/CVE-2024-2830.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2830",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2024-04-04T03:15:06.230",
|
||||||
|
"lastModified": "2024-04-04T03:15:06.230",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The WordPress Tag and Category Manager \u2013 AI Autotagger plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'st_tag_cloud' shortcode in all versions up to, and including, 3.13.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/browser/simple-tags/trunk/inc/class.client.php#L346",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/browser/simple-tags/trunk/inc/class.client.php#L348",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset/3060746/simple-tags/trunk/inc/class.client.tagcloud.php",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0f537479-d5ec-46bb-a04e-2c33a2abc759?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
51
CVE-2024/CVE-2024-28xx/CVE-2024-2868.json
Normal file
51
CVE-2024/CVE-2024-28xx/CVE-2024-2868.json
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2868",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2024-04-04T02:15:07.010",
|
||||||
|
"lastModified": "2024-04-04T02:15:07.010",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The ShopLentor \u2013 WooCommerce Builder for Elementor & Gutenberg +12 Modules \u2013 All in One Solution (formerly WooLentor) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the slitems parameter in the WL Special Day Offer Widget in all versions up to, and including, 2.8.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/browser/woolentor-addons/tags/2.8.2/includes/addons/universal_product.php#L2548",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset/3061864/woolentor-addons/tags/2.8.4/includes/addons/universal_product.php",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/27b8e0c0-fb0b-4d36-abc4-3e66ec7b5195?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
51
CVE-2024/CVE-2024-29xx/CVE-2024-2919.json
Normal file
51
CVE-2024/CVE-2024-29xx/CVE-2024-2919.json
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2919",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2024-04-04T03:15:06.413",
|
||||||
|
"lastModified": "2024-04-04T03:15:06.413",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The Gutenberg Blocks by Kadence Blocks \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Countdown and CountUp Widget in all versions up to, and including, 3.2.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset/3062911/kadence-blocks/trunk/includes/assets/js/kb-countdown.min.js",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset/3062911/kadence-blocks/trunk/includes/assets/js/kb-countup.min.js",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b38a69c7-91d4-43be-8650-eb1f0029bd44?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
51
CVE-2024/CVE-2024-30xx/CVE-2024-3022.json
Normal file
51
CVE-2024/CVE-2024-30xx/CVE-2024-3022.json
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-3022",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2024-04-04T02:15:07.230",
|
||||||
|
"lastModified": "2024-04-04T02:15:07.230",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The BookingPress plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient filename validation in the 'bookingpress_process_upload' function in all versions up to, and including 1.0.87. This allows an authenticated attacker with administrator-level capabilities or higher to upload arbitrary files on the affected site's server, enabling remote code execution."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset/3061435/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_fileupload_class.php",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://r0ot.notion.site/BookingPress-1-0-84-Authenticated-Administrator-Arbitrary-File-Upload-lead-to-RCE-e2603371c0c14d828144e26f2fdc1d01?pvs=4",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/049ec264-3ed1-4741-937d-8a633ef0a627?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
47
CVE-2024/CVE-2024-30xx/CVE-2024-3030.json
Normal file
47
CVE-2024/CVE-2024-30xx/CVE-2024-3030.json
Normal file
@ -0,0 +1,47 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-3030",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2024-04-04T02:15:07.437",
|
||||||
|
"lastModified": "2024-04-04T02:15:07.437",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The Announce from the Dashboard plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3061409%40announce-from-the-dashboard&new=3061409%40announce-from-the-dashboard&sfp_email=&sfph_mail=",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b0d1cf3b-5631-49bd-a7aa-86de2ee4b5b9?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-32xx/CVE-2024-3274.json
Normal file
92
CVE-2024/CVE-2024-32xx/CVE-2024-3274.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-3274",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-04-04T02:15:07.627",
|
||||||
|
"lastModified": "2024-04-04T02:15:07.627",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability has been found in D-Link DNS-320L, DNS-320LW and DNS-327L up to 20240403 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/info.cgi of the component HTTP GET Request Handler. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259285 was assigned to this vulnerability. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 10.0,
|
||||||
|
"impactScore": 2.9,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/netsecfish/info_cgi",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.259285",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.259285",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.304706",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
30
README.md
30
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-04-04T02:00:32.397316+00:00
|
2024-04-04T04:00:30.461382+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-04-04T01:15:50.387000+00:00
|
2024-04-04T03:15:06.413000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,28 +33,30 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
244028
|
244037
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `6`
|
Recently added CVEs: `9`
|
||||||
|
|
||||||
- [CVE-2024-25568](CVE-2024/CVE-2024-255xx/CVE-2024-25568.json) (`2024-04-04T00:15:06.990`)
|
- [CVE-2024-2008](CVE-2024/CVE-2024-20xx/CVE-2024-2008.json) (`2024-04-04T03:15:06.053`)
|
||||||
- [CVE-2024-26258](CVE-2024/CVE-2024-262xx/CVE-2024-26258.json) (`2024-04-04T00:15:07.047`)
|
- [CVE-2024-2692](CVE-2024/CVE-2024-26xx/CVE-2024-2692.json) (`2024-04-04T02:15:06.527`)
|
||||||
- [CVE-2024-29167](CVE-2024/CVE-2024-291xx/CVE-2024-29167.json) (`2024-04-04T00:15:07.103`)
|
- [CVE-2024-2803](CVE-2024/CVE-2024-28xx/CVE-2024-2803.json) (`2024-04-04T02:15:06.800`)
|
||||||
- [CVE-2024-29225](CVE-2024/CVE-2024-292xx/CVE-2024-29225.json) (`2024-04-04T00:15:07.200`)
|
- [CVE-2024-2830](CVE-2024/CVE-2024-28xx/CVE-2024-2830.json) (`2024-04-04T03:15:06.230`)
|
||||||
- [CVE-2024-3272](CVE-2024/CVE-2024-32xx/CVE-2024-3272.json) (`2024-04-04T01:15:50.123`)
|
- [CVE-2024-2868](CVE-2024/CVE-2024-28xx/CVE-2024-2868.json) (`2024-04-04T02:15:07.010`)
|
||||||
- [CVE-2024-3273](CVE-2024/CVE-2024-32xx/CVE-2024-3273.json) (`2024-04-04T01:15:50.387`)
|
- [CVE-2024-2919](CVE-2024/CVE-2024-29xx/CVE-2024-2919.json) (`2024-04-04T03:15:06.413`)
|
||||||
|
- [CVE-2024-3022](CVE-2024/CVE-2024-30xx/CVE-2024-3022.json) (`2024-04-04T02:15:07.230`)
|
||||||
|
- [CVE-2024-3030](CVE-2024/CVE-2024-30xx/CVE-2024-3030.json) (`2024-04-04T02:15:07.437`)
|
||||||
|
- [CVE-2024-3274](CVE-2024/CVE-2024-32xx/CVE-2024-3274.json) (`2024-04-04T02:15:07.627`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `3`
|
Recently modified CVEs: `2`
|
||||||
|
|
||||||
- [CVE-2024-21798](CVE-2024/CVE-2024-217xx/CVE-2024-21798.json) (`2024-04-04T01:15:49.953`)
|
- [CVE-2023-7152](CVE-2023/CVE-2023-71xx/CVE-2023-7152.json) (`2024-04-04T02:15:06.203`)
|
||||||
- [CVE-2024-23910](CVE-2024/CVE-2024-239xx/CVE-2024-23910.json) (`2024-04-04T01:15:50.027`)
|
- [CVE-2023-7158](CVE-2023/CVE-2023-71xx/CVE-2023-7158.json) (`2024-04-04T02:15:06.400`)
|
||||||
- [CVE-2024-25579](CVE-2024/CVE-2024-255xx/CVE-2024-25579.json) (`2024-04-04T01:15:50.083`)
|
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
31
_state.csv
31
_state.csv
@ -237934,13 +237934,13 @@ CVE-2023-7148,0,0,ad3d7bb45f68a25f28d4a014a05c7f0c0f5eb59b2332f2a36529e951c01cf7
|
|||||||
CVE-2023-7149,0,0,5274abe94fd7c0ae8d01100c182a0608460162f3b4c0a04ca7ef11eeebe117a1,2024-03-21T02:50:56.743000
|
CVE-2023-7149,0,0,5274abe94fd7c0ae8d01100c182a0608460162f3b4c0a04ca7ef11eeebe117a1,2024-03-21T02:50:56.743000
|
||||||
CVE-2023-7150,0,0,0c87a4b3ec2aaf12c4d9e1fdfb4eb06c5a9800465da5abf8eb5f908f0af74c73,2024-03-21T02:50:56.820000
|
CVE-2023-7150,0,0,0c87a4b3ec2aaf12c4d9e1fdfb4eb06c5a9800465da5abf8eb5f908f0af74c73,2024-03-21T02:50:56.820000
|
||||||
CVE-2023-7151,0,0,bb32bdd519a1a50b8c5ab4a323d30cc39a75571831ac8e58df336f69b7cfff53,2024-01-23T15:40:52.973000
|
CVE-2023-7151,0,0,bb32bdd519a1a50b8c5ab4a323d30cc39a75571831ac8e58df336f69b7cfff53,2024-01-23T15:40:52.973000
|
||||||
CVE-2023-7152,0,0,d63315d5b620520be64208de0c636c036bcf933560aed0687debc92391adb734,2024-03-21T02:50:56.913000
|
CVE-2023-7152,0,1,4204b249f3a43ad13331bc58a5c2cd30cfaf340276ca2426d50c796310e7d72d,2024-04-04T02:15:06.203000
|
||||||
CVE-2023-7153,0,0,e011618db3076d02be0d1ef8dfe51744f3234f2e36498aa2346c160b31a75578,2024-01-24T21:43:31.700000
|
CVE-2023-7153,0,0,e011618db3076d02be0d1ef8dfe51744f3234f2e36498aa2346c160b31a75578,2024-01-24T21:43:31.700000
|
||||||
CVE-2023-7154,0,0,076d7cbaa09541993347ce9e0a30d4438c72b1ebd3caf4aa248135ca6dfc7806,2024-01-23T15:45:39.513000
|
CVE-2023-7154,0,0,076d7cbaa09541993347ce9e0a30d4438c72b1ebd3caf4aa248135ca6dfc7806,2024-01-23T15:45:39.513000
|
||||||
CVE-2023-7155,0,0,7e7529ab676d8ddb6b782bd27f8d741a82d11bbbbeda4e53a6c0960a51bfc8c0,2024-03-21T02:50:57.017000
|
CVE-2023-7155,0,0,7e7529ab676d8ddb6b782bd27f8d741a82d11bbbbeda4e53a6c0960a51bfc8c0,2024-03-21T02:50:57.017000
|
||||||
CVE-2023-7156,0,0,7b5a4efd1b3be53f0ffd429f40f9e3f3f28a760427bbfbde808e2a385728dc30,2024-03-21T02:50:57.100000
|
CVE-2023-7156,0,0,7b5a4efd1b3be53f0ffd429f40f9e3f3f28a760427bbfbde808e2a385728dc30,2024-03-21T02:50:57.100000
|
||||||
CVE-2023-7157,0,0,e14f25db01f67df37b8eeb853c155d5497d7d420da1cf903e90c685c473ef4b0,2024-03-21T02:50:57.180000
|
CVE-2023-7157,0,0,e14f25db01f67df37b8eeb853c155d5497d7d420da1cf903e90c685c473ef4b0,2024-03-21T02:50:57.180000
|
||||||
CVE-2023-7158,0,0,1084264640b5cfab07218d254e307ca73441eb13a3347a6cbb1e62a4d9b5cfd7,2024-03-21T02:50:57.260000
|
CVE-2023-7158,0,1,bf88ece70b3ebdb9d0ed2829f62cd053cff19d2bc94e9f3dcc397e04ebfc456c,2024-04-04T02:15:06.400000
|
||||||
CVE-2023-7159,0,0,7602619793679c82fd6e4078fefba013d97098ffd01706a034b417ac5762a63e,2024-03-21T02:50:57.347000
|
CVE-2023-7159,0,0,7602619793679c82fd6e4078fefba013d97098ffd01706a034b417ac5762a63e,2024-03-21T02:50:57.347000
|
||||||
CVE-2023-7160,0,0,0068dd63e1ae41a9eeb4dd1afabef9df497b4968c8d56ef188f9ba12bb4adcbb,2024-03-21T02:50:57.423000
|
CVE-2023-7160,0,0,0068dd63e1ae41a9eeb4dd1afabef9df497b4968c8d56ef188f9ba12bb4adcbb,2024-03-21T02:50:57.423000
|
||||||
CVE-2023-7161,0,0,081d75b436b1110fb1f86020897a7d713350804dbf28510a4511fb651652e216,2024-03-21T02:50:57.503000
|
CVE-2023-7161,0,0,081d75b436b1110fb1f86020897a7d713350804dbf28510a4511fb651652e216,2024-03-21T02:50:57.503000
|
||||||
@ -239507,6 +239507,7 @@ CVE-2024-20054,0,0,8d3193313cee82666cc7a9a9fc4d8e0bcc3af481a0ce555748460cf02c097
|
|||||||
CVE-2024-20055,0,0,109d1d9940c1dca8530dc03191274127f8901d271f37fd1cdce803ed70deff34,2024-04-01T12:49:00.877000
|
CVE-2024-20055,0,0,109d1d9940c1dca8530dc03191274127f8901d271f37fd1cdce803ed70deff34,2024-04-01T12:49:00.877000
|
||||||
CVE-2024-2006,0,0,52d776ed20a145230028cfc4b5ce5b374d35ec688b7308ce8a79b923b7ac4a29,2024-03-13T18:15:58.530000
|
CVE-2024-2006,0,0,52d776ed20a145230028cfc4b5ce5b374d35ec688b7308ce8a79b923b7ac4a29,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-2007,0,0,f47e32ba52cda7faacb8492f7684b94da5833a1e1d397bb70c366c91108ebbd0,2024-03-21T12:58:51.093000
|
CVE-2024-2007,0,0,f47e32ba52cda7faacb8492f7684b94da5833a1e1d397bb70c366c91108ebbd0,2024-03-21T12:58:51.093000
|
||||||
|
CVE-2024-2008,1,1,b9e72dd151c3b6dc237474f44ba3e9dbcc4f38757a56d2566149be6176d2d10f,2024-04-04T03:15:06.053000
|
||||||
CVE-2024-2009,0,0,e2a4086afb53fd84b50e105846813eee57282aed3cce0568cc523b8132740b52,2024-03-21T02:52:26.207000
|
CVE-2024-2009,0,0,e2a4086afb53fd84b50e105846813eee57282aed3cce0568cc523b8132740b52,2024-03-21T02:52:26.207000
|
||||||
CVE-2024-2014,0,0,8d7628b414bbcdd7a6ef27a23ad1e3ec91eb3e6ee0b62ef9489eb400579feaac,2024-03-21T12:58:51.093000
|
CVE-2024-2014,0,0,8d7628b414bbcdd7a6ef27a23ad1e3ec91eb3e6ee0b62ef9489eb400579feaac,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-2015,0,0,1c17f5977ed6cdad57e2e0374ea748a50939f7f3d42f37be55afd7aacf9e1e0c,2024-03-21T12:58:51.093000
|
CVE-2024-2015,0,0,1c17f5977ed6cdad57e2e0374ea748a50939f7f3d42f37be55afd7aacf9e1e0c,2024-03-21T12:58:51.093000
|
||||||
@ -240166,7 +240167,7 @@ CVE-2024-2179,0,0,ae7ec0d777d4f092532ca994d6b0860fc5ecc6f92bb84e39b0499b0a5cdf3b
|
|||||||
CVE-2024-21794,0,0,5140601c591fc7e01c922f6b4426d49907b4278c42a623419c59c4c96fa7afa6,2024-02-07T17:15:44.653000
|
CVE-2024-21794,0,0,5140601c591fc7e01c922f6b4426d49907b4278c42a623419c59c4c96fa7afa6,2024-02-07T17:15:44.653000
|
||||||
CVE-2024-21795,0,0,3f97d15b4fad76f44a86834312294b67e000044b0ba6ac0faa07d011642d4d38,2024-04-02T15:15:52.517000
|
CVE-2024-21795,0,0,3f97d15b4fad76f44a86834312294b67e000044b0ba6ac0faa07d011642d4d38,2024-04-02T15:15:52.517000
|
||||||
CVE-2024-21796,0,0,ad6ea83e4ba68ed8909637d1ef7b65d12f04c56232c1b05d9173891b89591836,2024-01-30T22:14:16.247000
|
CVE-2024-21796,0,0,ad6ea83e4ba68ed8909637d1ef7b65d12f04c56232c1b05d9173891b89591836,2024-01-30T22:14:16.247000
|
||||||
CVE-2024-21798,0,1,227cee2b08d95673cdf00007b2e5f0a1a8d34bbf3b115cc9a3e417f90fdb9db1,2024-04-04T01:15:49.953000
|
CVE-2024-21798,0,0,227cee2b08d95673cdf00007b2e5f0a1a8d34bbf3b115cc9a3e417f90fdb9db1,2024-04-04T01:15:49.953000
|
||||||
CVE-2024-2180,0,0,f29f310f994bdc1547d14907db3ea5b567d0e701ee0c912abfad5bc40b39a210,2024-03-15T12:53:06.423000
|
CVE-2024-2180,0,0,f29f310f994bdc1547d14907db3ea5b567d0e701ee0c912abfad5bc40b39a210,2024-03-15T12:53:06.423000
|
||||||
CVE-2024-21802,0,0,2a0324ca9760c4b3be107883f84a1ed806e6bad72b3badb393d00982ae57c159,2024-02-26T18:15:07.290000
|
CVE-2024-21802,0,0,2a0324ca9760c4b3be107883f84a1ed806e6bad72b3badb393d00982ae57c159,2024-02-26T18:15:07.290000
|
||||||
CVE-2024-21803,0,0,412e1fe487e1aa8e1b208c7f0baf850a3bb5b2cd1ac7cabb6ce669e7a4281bbb,2024-02-08T01:57:53.770000
|
CVE-2024-21803,0,0,412e1fe487e1aa8e1b208c7f0baf850a3bb5b2cd1ac7cabb6ce669e7a4281bbb,2024-02-08T01:57:53.770000
|
||||||
@ -241163,7 +241164,7 @@ CVE-2024-23903,0,0,ecb97aacb6f19585aea8671a201e2d7c3813e0b8271429153f27911a6bbb0
|
|||||||
CVE-2024-23904,0,0,678d9b9e94528dc2befb7afc9e4f3790d1499e848c388388aaa93c118b2a19d3,2024-01-29T19:26:29.770000
|
CVE-2024-23904,0,0,678d9b9e94528dc2befb7afc9e4f3790d1499e848c388388aaa93c118b2a19d3,2024-01-29T19:26:29.770000
|
||||||
CVE-2024-23905,0,0,2d8ebad5c05b335845d8a0c6b27832798a9c27087f41f1dd4daf5a7e2afef75a,2024-01-29T19:26:11.517000
|
CVE-2024-23905,0,0,2d8ebad5c05b335845d8a0c6b27832798a9c27087f41f1dd4daf5a7e2afef75a,2024-01-29T19:26:11.517000
|
||||||
CVE-2024-2391,0,0,5eb10c991275accc4f0c04c536ff0ab64c132e711d4ba9c8aec48c31334f05e4,2024-03-21T02:52:33.807000
|
CVE-2024-2391,0,0,5eb10c991275accc4f0c04c536ff0ab64c132e711d4ba9c8aec48c31334f05e4,2024-03-21T02:52:33.807000
|
||||||
CVE-2024-23910,0,1,e6adc416dd7b19484faa305c4e8491b3ff3f8809d94d53eb510d517290865995,2024-04-04T01:15:50.027000
|
CVE-2024-23910,0,0,e6adc416dd7b19484faa305c4e8491b3ff3f8809d94d53eb510d517290865995,2024-04-04T01:15:50.027000
|
||||||
CVE-2024-23917,0,0,43acd2786eef775b4e5af3da03e8f628e79a58b917087bea0e9c91638665592f,2024-02-09T01:05:22.180000
|
CVE-2024-23917,0,0,43acd2786eef775b4e5af3da03e8f628e79a58b917087bea0e9c91638665592f,2024-02-09T01:05:22.180000
|
||||||
CVE-2024-2392,0,0,42336a48d6bafcd50dc6522fe24a4d56dee45c4fa6295037e9d4d2226834e64c,2024-03-22T12:45:36.130000
|
CVE-2024-2392,0,0,42336a48d6bafcd50dc6522fe24a4d56dee45c4fa6295037e9d4d2226834e64c,2024-03-22T12:45:36.130000
|
||||||
CVE-2024-2393,0,0,8cedba0180a7b00def73b6261f8c72d770c30f1bb7624197b9fba956f17cd30c,2024-03-21T02:52:33.897000
|
CVE-2024-2393,0,0,8cedba0180a7b00def73b6261f8c72d770c30f1bb7624197b9fba956f17cd30c,2024-03-21T02:52:33.897000
|
||||||
@ -241864,11 +241865,11 @@ CVE-2024-25554,0,0,a87c08d7479e0670c1de7ac680e974b7c966b7f12d7b309312798a5acd199
|
|||||||
CVE-2024-25559,0,0,621d2089e4066088e4f2e7151d4c52b797349073e2e5f4d074059dc172fb61d6,2024-02-15T06:23:39.303000
|
CVE-2024-25559,0,0,621d2089e4066088e4f2e7151d4c52b797349073e2e5f4d074059dc172fb61d6,2024-02-15T06:23:39.303000
|
||||||
CVE-2024-2556,0,0,7dda608d4c973332c242425a23922df86f3028261d216807853df92150e28261,2024-03-21T02:52:37.803000
|
CVE-2024-2556,0,0,7dda608d4c973332c242425a23922df86f3028261d216807853df92150e28261,2024-03-21T02:52:37.803000
|
||||||
CVE-2024-25567,0,0,bbb8c64eb3dcee3e8e89951734f837d0c3bea66c11459a30529f4c9133593805,2024-03-22T12:45:36.130000
|
CVE-2024-25567,0,0,bbb8c64eb3dcee3e8e89951734f837d0c3bea66c11459a30529f4c9133593805,2024-03-22T12:45:36.130000
|
||||||
CVE-2024-25568,1,1,65656181592ea9bc19c9c46396613fc484931712e79b712d3a779df06bba53fe,2024-04-04T00:15:06.990000
|
CVE-2024-25568,0,0,65656181592ea9bc19c9c46396613fc484931712e79b712d3a779df06bba53fe,2024-04-04T00:15:06.990000
|
||||||
CVE-2024-2557,0,0,bd3cbcd6fdd2bc53d05ad0a21dcf76dc9100645c8cd39cc3bfd0cd796821c2ef,2024-03-21T02:52:37.887000
|
CVE-2024-2557,0,0,bd3cbcd6fdd2bc53d05ad0a21dcf76dc9100645c8cd39cc3bfd0cd796821c2ef,2024-03-21T02:52:37.887000
|
||||||
CVE-2024-25574,0,0,4bc8d3cd97ad31d3dfd232c462a09dc1924d30756dc7bfcb27690950ff1edfb2,2024-04-02T12:50:42.233000
|
CVE-2024-25574,0,0,4bc8d3cd97ad31d3dfd232c462a09dc1924d30756dc7bfcb27690950ff1edfb2,2024-04-02T12:50:42.233000
|
||||||
CVE-2024-25578,0,0,ff68f9ee0e3394b3fa83fe8766f2e044325a5fd043b437de063c0cd80654c610,2024-03-01T14:04:26.010000
|
CVE-2024-25578,0,0,ff68f9ee0e3394b3fa83fe8766f2e044325a5fd043b437de063c0cd80654c610,2024-03-01T14:04:26.010000
|
||||||
CVE-2024-25579,0,1,838cd17118b030eacfba49a0ada30a1ba4831f0bedbfd768ff2707f55789078e,2024-04-04T01:15:50.083000
|
CVE-2024-25579,0,0,838cd17118b030eacfba49a0ada30a1ba4831f0bedbfd768ff2707f55789078e,2024-04-04T01:15:50.083000
|
||||||
CVE-2024-2558,0,0,9b2e64cc1dfa18aa6ab6ed26c2435de053f445557e20541392c5e86001c65488,2024-03-21T02:52:37.973000
|
CVE-2024-2558,0,0,9b2e64cc1dfa18aa6ab6ed26c2435de053f445557e20541392c5e86001c65488,2024-03-21T02:52:37.973000
|
||||||
CVE-2024-25580,0,0,aa78600da8abcfd02ed93a87510a3e3684060f93f36da496d331a2464d925d23,2024-03-27T12:29:30.307000
|
CVE-2024-25580,0,0,aa78600da8abcfd02ed93a87510a3e3684060f93f36da496d331a2464d925d23,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-2559,0,0,e913f295acbf3f21c20619071c5c76f626d7ca39e71d862a4c6e578c87ef0b76,2024-03-21T02:52:38.050000
|
CVE-2024-2559,0,0,e913f295acbf3f21c20619071c5c76f626d7ca39e71d862a4c6e578c87ef0b76,2024-03-21T02:52:38.050000
|
||||||
@ -242236,7 +242237,7 @@ CVE-2024-2622,0,0,2faba3761f6560c88eea9c3b0fa6fc4529a548f032a256e1b05f67335e6c11
|
|||||||
CVE-2024-26246,0,0,6c174a39b8e16966075834fa377a33ef3e5c5829eb1a43647414103e1222a0e5,2024-03-19T17:05:45.193000
|
CVE-2024-26246,0,0,6c174a39b8e16966075834fa377a33ef3e5c5829eb1a43647414103e1222a0e5,2024-03-19T17:05:45.193000
|
||||||
CVE-2024-26247,0,0,ed304d3168190e2757b85fd85fc0b38856926e8e4ca6b0df56c71d50554fa5bc,2024-03-26T03:18:26.197000
|
CVE-2024-26247,0,0,ed304d3168190e2757b85fd85fc0b38856926e8e4ca6b0df56c71d50554fa5bc,2024-03-26T03:18:26.197000
|
||||||
CVE-2024-2625,0,0,176202763572967bdd2403d6220b5ef3a0eeae1c4e7f0e46612d30bfb12e4570,2024-04-01T15:32:17.010000
|
CVE-2024-2625,0,0,176202763572967bdd2403d6220b5ef3a0eeae1c4e7f0e46612d30bfb12e4570,2024-04-01T15:32:17.010000
|
||||||
CVE-2024-26258,1,1,766e8ee3881910a81a928091bc16ea7cd82e7c62393de16666cf602140b8ed16,2024-04-04T00:15:07.047000
|
CVE-2024-26258,0,0,766e8ee3881910a81a928091bc16ea7cd82e7c62393de16666cf602140b8ed16,2024-04-04T00:15:07.047000
|
||||||
CVE-2024-2626,0,0,0f82bfcd678adfe2206a7b49362dbece30aa00242a9c52e3ba26851c15f6dba3,2024-04-01T15:22:37.883000
|
CVE-2024-2626,0,0,0f82bfcd678adfe2206a7b49362dbece30aa00242a9c52e3ba26851c15f6dba3,2024-04-01T15:22:37.883000
|
||||||
CVE-2024-26260,0,0,e265a50d624e832bed578eaaf671225475ee52a0a641253d8d3fa4cc960d0968,2024-02-15T06:23:39.303000
|
CVE-2024-26260,0,0,e265a50d624e832bed578eaaf671225475ee52a0a641253d8d3fa4cc960d0968,2024-02-15T06:23:39.303000
|
||||||
CVE-2024-26261,0,0,0e54368aae0104b528b2c2b10aa27bd070162dbc45df6e809e95785e5efd10d2,2024-02-15T06:23:39.303000
|
CVE-2024-26261,0,0,0e54368aae0104b528b2c2b10aa27bd070162dbc45df6e809e95785e5efd10d2,2024-02-15T06:23:39.303000
|
||||||
@ -242565,6 +242566,7 @@ CVE-2024-2687,0,0,8743e8c4178f9b4c342f85388b698da988fcd5df7a9f830356accbc2c7d603
|
|||||||
CVE-2024-2688,0,0,2813e3d77c2b2d83f751b34ba79d9b337f290aff8a39ca0bf2b5affbb2644102,2024-03-25T01:51:01.223000
|
CVE-2024-2688,0,0,2813e3d77c2b2d83f751b34ba79d9b337f290aff8a39ca0bf2b5affbb2644102,2024-03-25T01:51:01.223000
|
||||||
CVE-2024-2689,0,0,658993c0403fad94345d3cb8155974fc89f004b988ac6221fcb671e6effc6535,2024-04-03T22:15:07.290000
|
CVE-2024-2689,0,0,658993c0403fad94345d3cb8155974fc89f004b988ac6221fcb671e6effc6535,2024-04-03T22:15:07.290000
|
||||||
CVE-2024-2690,0,0,b9f1b9556b2658a97b0aa5fed823e2a3f219863f8b3c3eeec7a6e11e4b693950,2024-03-21T02:52:42.713000
|
CVE-2024-2690,0,0,b9f1b9556b2658a97b0aa5fed823e2a3f219863f8b3c3eeec7a6e11e4b693950,2024-03-21T02:52:42.713000
|
||||||
|
CVE-2024-2692,1,1,4dff168fae971f35ea778b7b59e72228b39afed9926b88e181ded3a6fd213068,2024-04-04T02:15:06.527000
|
||||||
CVE-2024-2702,0,0,865ffb7613b5d4b81a5327fb07c7988ee6b4cd29868791960db416ef49370f10,2024-03-20T13:00:16.367000
|
CVE-2024-2702,0,0,865ffb7613b5d4b81a5327fb07c7988ee6b4cd29868791960db416ef49370f10,2024-03-20T13:00:16.367000
|
||||||
CVE-2024-2703,0,0,07081de6587d09870ff55039e594f5ce8e9c97e5814ee473417e88613bb5eb37,2024-03-21T02:52:42.793000
|
CVE-2024-2703,0,0,07081de6587d09870ff55039e594f5ce8e9c97e5814ee473417e88613bb5eb37,2024-03-21T02:52:42.793000
|
||||||
CVE-2024-2704,0,0,e286b904999417c65c8b69a6059186f449beb8789fde8f7550b2c51d635749f0,2024-03-21T02:52:42.870000
|
CVE-2024-2704,0,0,e286b904999417c65c8b69a6059186f449beb8789fde8f7550b2c51d635749f0,2024-03-21T02:52:42.870000
|
||||||
@ -242911,6 +242913,7 @@ CVE-2024-28015,0,0,c36a569e47a8cc25a559aa19a480d47088d8456072eb6e8c9e0575d3988b3
|
|||||||
CVE-2024-28016,0,0,fe85c1f239b1cebe9726ce271c3f5722bfdbb4bcff9b0aba329f58c6fcbf12b8,2024-04-02T06:15:15.603000
|
CVE-2024-28016,0,0,fe85c1f239b1cebe9726ce271c3f5722bfdbb4bcff9b0aba329f58c6fcbf12b8,2024-04-02T06:15:15.603000
|
||||||
CVE-2024-2802,0,0,3b7ed9aefbc68681b0633b6ab16c0b3db6db844ee4c655f6c7e6863ac6e1f543,2024-03-26T15:15:49.677000
|
CVE-2024-2802,0,0,3b7ed9aefbc68681b0633b6ab16c0b3db6db844ee4c655f6c7e6863ac6e1f543,2024-03-26T15:15:49.677000
|
||||||
CVE-2024-28029,0,0,9e465d515603ce2b4056e1d4099525822960990d4afbdcda109cb1a09fe772c2,2024-03-25T16:06:44.403000
|
CVE-2024-28029,0,0,9e465d515603ce2b4056e1d4099525822960990d4afbdcda109cb1a09fe772c2,2024-03-25T16:06:44.403000
|
||||||
|
CVE-2024-2803,1,1,ecd366c5a12c458fcf323ff3df753bc025edf8ad4c718558932b72f23ea65c91,2024-04-04T02:15:06.800000
|
||||||
CVE-2024-28033,0,0,d380f707343e80ca8a48383d7130e8455ae81fc182e0d67c36374f1eb571652f,2024-03-26T12:55:05.010000
|
CVE-2024-28033,0,0,d380f707343e80ca8a48383d7130e8455ae81fc182e0d67c36374f1eb571652f,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-28034,0,0,59f37b2f71aecfc048b35bdfeca5cf2bf5792e3fd57d1b0f3eaa95911ebef442,2024-03-26T12:55:05.010000
|
CVE-2024-28034,0,0,59f37b2f71aecfc048b35bdfeca5cf2bf5792e3fd57d1b0f3eaa95911ebef442,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-28039,0,0,9ef35c96ff38e007b2fd4f37c3f1f5b6d35461c4eaa69f2b36faccd438b26411,2024-03-18T12:38:25.490000
|
CVE-2024-28039,0,0,9ef35c96ff38e007b2fd4f37c3f1f5b6d35461c4eaa69f2b36faccd438b26411,2024-03-18T12:38:25.490000
|
||||||
@ -243056,6 +243059,7 @@ CVE-2024-28283,0,0,39f85b2f17c0fe895d0bdb32702da6d7a9c62274d2c91228b15f8ef37a4f9
|
|||||||
CVE-2024-28286,0,0,0c649cd6694a1837fe5561b872f74550eafab1ff52e9c04655d5ad406a1d7e85,2024-03-21T12:58:51.093000
|
CVE-2024-28286,0,0,0c649cd6694a1837fe5561b872f74550eafab1ff52e9c04655d5ad406a1d7e85,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-28287,0,0,8355e78e2bcacfd30beedd02a16b8cbb7fa125f666660317b865986783b6c2d0,2024-04-02T18:12:16.283000
|
CVE-2024-28287,0,0,8355e78e2bcacfd30beedd02a16b8cbb7fa125f666660317b865986783b6c2d0,2024-04-02T18:12:16.283000
|
||||||
CVE-2024-28288,0,0,bbf61567f9663b711efc4f198529fd360d88d5a87ddc912234861f379f96afdd,2024-04-01T01:12:59.077000
|
CVE-2024-28288,0,0,bbf61567f9663b711efc4f198529fd360d88d5a87ddc912234861f379f96afdd,2024-04-01T01:12:59.077000
|
||||||
|
CVE-2024-2830,1,1,96e6c0abaf03aac88aa8c316493da97b9ccd76a5da8769ff2fa398d63b5238f7,2024-04-04T03:15:06.230000
|
||||||
CVE-2024-28303,0,0,1e1fe6d5ea3f2a6f114bc62ec7183db4733d3d529e4e5786c421b928ce2f2bf1,2024-03-20T13:00:16.367000
|
CVE-2024-28303,0,0,1e1fe6d5ea3f2a6f114bc62ec7183db4733d3d529e4e5786c421b928ce2f2bf1,2024-03-20T13:00:16.367000
|
||||||
CVE-2024-28318,0,0,4464c0d64b943a4f9205011ad1109527e8aa088cb5ff5456cd49e911c2d1f722,2024-03-15T16:26:49.320000
|
CVE-2024-28318,0,0,4464c0d64b943a4f9205011ad1109527e8aa088cb5ff5456cd49e911c2d1f722,2024-03-15T16:26:49.320000
|
||||||
CVE-2024-28319,0,0,e376890f5ff8761a0926623e9576a5238806c37f36258b3aec951592cbe60412,2024-03-15T16:26:49.320000
|
CVE-2024-28319,0,0,e376890f5ff8761a0926623e9576a5238806c37f36258b3aec951592cbe60412,2024-03-15T16:26:49.320000
|
||||||
@ -243173,6 +243177,7 @@ CVE-2024-28676,0,0,801d735d88a2c38558c90696937a503a364bdc5ac079aab35f708a8cac6bb
|
|||||||
CVE-2024-28677,0,0,beda9fb5e19c8e32c2bb233bf7e04303e98e61bb2557b7038cbec5829242cafe,2024-03-13T18:15:58.530000
|
CVE-2024-28677,0,0,beda9fb5e19c8e32c2bb233bf7e04303e98e61bb2557b7038cbec5829242cafe,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-28678,0,0,e9f2e307c9c14d85cdf0d7276dece168215df066834aac177e5e011a7af00ff3,2024-03-13T18:15:58.530000
|
CVE-2024-28678,0,0,e9f2e307c9c14d85cdf0d7276dece168215df066834aac177e5e011a7af00ff3,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-28679,0,0,0c6e84e914fdaa4e663110efa631e88c6cae34e7955c7cdafa51b2651294cb69,2024-03-13T18:15:58.530000
|
CVE-2024-28679,0,0,0c6e84e914fdaa4e663110efa631e88c6cae34e7955c7cdafa51b2651294cb69,2024-03-13T18:15:58.530000
|
||||||
|
CVE-2024-2868,1,1,a0aac9acdb0ba19371b4cc3ab0db1f3d8b7c6da9590f62af8a8d7e745b381fb3,2024-04-04T02:15:07.010000
|
||||||
CVE-2024-28680,0,0,f0cb3475dd2248a613f045cb0e92e770aee1d1d2137270856a92a44b18528f47,2024-03-13T18:15:58.530000
|
CVE-2024-28680,0,0,f0cb3475dd2248a613f045cb0e92e770aee1d1d2137270856a92a44b18528f47,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-28681,0,0,ed8a4fd064b6b3346412990e6226cbe04bee8a6bd2aaad4671fdcd0478ce5ec1,2024-03-13T18:15:58.530000
|
CVE-2024-28681,0,0,ed8a4fd064b6b3346412990e6226cbe04bee8a6bd2aaad4671fdcd0478ce5ec1,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-28682,0,0,2c53ed716809a76ded005fd10ac6d93891dbf2dd9f02238c66f1445af60cb8e7,2024-03-13T18:15:58.530000
|
CVE-2024-28682,0,0,2c53ed716809a76ded005fd10ac6d93891dbf2dd9f02238c66f1445af60cb8e7,2024-03-13T18:15:58.530000
|
||||||
@ -243328,7 +243333,7 @@ CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24
|
|||||||
CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000
|
CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000
|
||||||
CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000
|
CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000
|
||||||
CVE-2024-2916,0,0,6871ce1ac12c0adda9a1495db174447a7645b0f8622337f63e4d979317d65207,2024-03-27T12:29:30.307000
|
CVE-2024-2916,0,0,6871ce1ac12c0adda9a1495db174447a7645b0f8622337f63e4d979317d65207,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29167,1,1,9137b4e6c505da150c1135337d6649a6081f1aeb2e87f468a9c85674ffbc5bde,2024-04-04T00:15:07.103000
|
CVE-2024-29167,0,0,9137b4e6c505da150c1135337d6649a6081f1aeb2e87f468a9c85674ffbc5bde,2024-04-04T00:15:07.103000
|
||||||
CVE-2024-2917,0,0,cc7c53d7d6aa23ee02922950dbfd98ec950f87014b4781a546614dff66bfbad3,2024-03-27T12:29:30.307000
|
CVE-2024-2917,0,0,cc7c53d7d6aa23ee02922950dbfd98ec950f87014b4781a546614dff66bfbad3,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29179,0,0,f19d4d0a9f8b6dc85e6e021ab22950c73dd30b1b16e940f3cfc8d8b6deab42d4,2024-03-26T12:55:05.010000
|
CVE-2024-29179,0,0,f19d4d0a9f8b6dc85e6e021ab22950c73dd30b1b16e940f3cfc8d8b6deab42d4,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-29180,0,0,e32bebc90fbd05fe3a3edfae9506df906c8ca56e295fcb3cc3f3f384d12528c8,2024-03-21T19:47:03.943000
|
CVE-2024-29180,0,0,e32bebc90fbd05fe3a3edfae9506df906c8ca56e295fcb3cc3f3f384d12528c8,2024-03-21T19:47:03.943000
|
||||||
@ -243338,6 +243343,7 @@ CVE-2024-29186,0,0,4d22f13bcc9a989b4457971fb422d0f63596eb5c598cc015a08c44b1e3975
|
|||||||
CVE-2024-29187,0,0,b20c442660011aa9a00d748e283e3cff30d410ce48e3d079b901e0f36dcc61f4,2024-03-25T01:51:01.223000
|
CVE-2024-29187,0,0,b20c442660011aa9a00d748e283e3cff30d410ce48e3d079b901e0f36dcc61f4,2024-03-25T01:51:01.223000
|
||||||
CVE-2024-29188,0,0,a88946c34860ffe9844c033cf176d3b0a07d4a26b7808112b8bd0f05131d96e8,2024-03-25T01:51:01.223000
|
CVE-2024-29188,0,0,a88946c34860ffe9844c033cf176d3b0a07d4a26b7808112b8bd0f05131d96e8,2024-03-25T01:51:01.223000
|
||||||
CVE-2024-29189,0,0,6878e9b35a058677d2a3fa4fc5bfa3461c367e63050b0e9c52331e170e2ec716,2024-03-26T12:55:05.010000
|
CVE-2024-29189,0,0,6878e9b35a058677d2a3fa4fc5bfa3461c367e63050b0e9c52331e170e2ec716,2024-03-26T12:55:05.010000
|
||||||
|
CVE-2024-2919,1,1,6b30411f4300618aef7f8a07053fa275b657e104a3d0434bb2d54c9d4bca3417,2024-04-04T03:15:06.413000
|
||||||
CVE-2024-29190,0,0,06fd81282a65c29bad2a807438b949724256368bd8f788b06f116f9ca54b17a0,2024-03-25T01:51:01.223000
|
CVE-2024-29190,0,0,06fd81282a65c29bad2a807438b949724256368bd8f788b06f116f9ca54b17a0,2024-03-25T01:51:01.223000
|
||||||
CVE-2024-29194,0,0,61bcf80dc8c33623e289063809985cd69cc66b52cb236ef7d952a2c24a0c4127,2024-03-25T01:51:01.223000
|
CVE-2024-29194,0,0,61bcf80dc8c33623e289063809985cd69cc66b52cb236ef7d952a2c24a0c4127,2024-03-25T01:51:01.223000
|
||||||
CVE-2024-29195,0,0,12b6fcead703f320c2faaa3dbf933701901e834c51cbd479cd70a3447afc3114,2024-03-26T12:55:05.010000
|
CVE-2024-29195,0,0,12b6fcead703f320c2faaa3dbf933701901e834c51cbd479cd70a3447afc3114,2024-03-26T12:55:05.010000
|
||||||
@ -243350,7 +243356,7 @@ CVE-2024-29202,0,0,710d7ee4855d6fe6e591666dc35bf54bd7c26416e7ed34ce9d7c18b13c56e
|
|||||||
CVE-2024-29203,0,0,85853d1d6c0b7cff8ded9ca779662219e1e7d461c7c9aed96ad32295a032c6f6,2024-03-26T17:09:53.043000
|
CVE-2024-29203,0,0,85853d1d6c0b7cff8ded9ca779662219e1e7d461c7c9aed96ad32295a032c6f6,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-2921,0,0,a7048ceb487f73059844764517da213b04f370019c5cc0c6fe2153431d1dd6cb,2024-03-26T17:09:53.043000
|
CVE-2024-2921,0,0,a7048ceb487f73059844764517da213b04f370019c5cc0c6fe2153431d1dd6cb,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000
|
CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000
|
||||||
CVE-2024-29225,1,1,4fb529425e69e4b0cbfa2f9f09303ddc74d023065b1b17522e775f73a75a9e71,2024-04-04T00:15:07.200000
|
CVE-2024-29225,0,0,4fb529425e69e4b0cbfa2f9f09303ddc74d023065b1b17522e775f73a75a9e71,2024-04-04T00:15:07.200000
|
||||||
CVE-2024-29227,0,0,eecaff6ef866c6c9ce7329c8719d8151618914bed20188bbeb2cfe204e821322,2024-03-28T12:42:56.150000
|
CVE-2024-29227,0,0,eecaff6ef866c6c9ce7329c8719d8151618914bed20188bbeb2cfe204e821322,2024-03-28T12:42:56.150000
|
||||||
CVE-2024-29228,0,0,0396b2f19bb32ec6c2e65f58d8f3992a3d27b02bc4a6c851b5d5b4cfa0460540,2024-03-28T12:42:56.150000
|
CVE-2024-29228,0,0,0396b2f19bb32ec6c2e65f58d8f3992a3d27b02bc4a6c851b5d5b4cfa0460540,2024-03-28T12:42:56.150000
|
||||||
CVE-2024-29229,0,0,6dd1964f03a465c5b1d78ea2599ed81e5df193b0ca5daa792343c5fca8270ef3,2024-03-28T12:42:56.150000
|
CVE-2024-29229,0,0,6dd1964f03a465c5b1d78ea2599ed81e5df193b0ca5daa792343c5fca8270ef3,2024-03-28T12:42:56.150000
|
||||||
@ -243638,6 +243644,7 @@ CVE-2024-30202,0,0,8f653afa9be834d6068a82d15d250296f87495118f4f1c30c90cbc157fddc
|
|||||||
CVE-2024-30203,0,0,a1d664e0e9a71620a1b21449b8bc268488489a282580bac90b40062a439c83a7,2024-03-25T16:43:06.137000
|
CVE-2024-30203,0,0,a1d664e0e9a71620a1b21449b8bc268488489a282580bac90b40062a439c83a7,2024-03-25T16:43:06.137000
|
||||||
CVE-2024-30204,0,0,bf1cbd8aaa2b36eb1f7808443cd1dc94c2d123df04230a458090af1180122865,2024-03-25T16:43:06.137000
|
CVE-2024-30204,0,0,bf1cbd8aaa2b36eb1f7808443cd1dc94c2d123df04230a458090af1180122865,2024-03-25T16:43:06.137000
|
||||||
CVE-2024-30205,0,0,d8d475f93d08b2037de38fb56b8f07beb7b6f1c5b446fee65bfc13f5246e2c4e,2024-03-25T16:43:06.137000
|
CVE-2024-30205,0,0,d8d475f93d08b2037de38fb56b8f07beb7b6f1c5b446fee65bfc13f5246e2c4e,2024-03-25T16:43:06.137000
|
||||||
|
CVE-2024-3022,1,1,a37d5d560b38f78b564bad8226b6553a4f0987dbeb8270e279a97f23bbbe3d67,2024-04-04T02:15:07.230000
|
||||||
CVE-2024-30221,0,0,23f871339b04b26b03b1ae0b592c573034cab277a7f5f76554e69b2658f3686d,2024-03-28T12:42:56.150000
|
CVE-2024-30221,0,0,23f871339b04b26b03b1ae0b592c573034cab277a7f5f76554e69b2658f3686d,2024-03-28T12:42:56.150000
|
||||||
CVE-2024-30222,0,0,3f187efc44dcd846c225c38744c60f6e219f2e75a834b7bcc385a175d490ff30,2024-03-28T12:42:56.150000
|
CVE-2024-30222,0,0,3f187efc44dcd846c225c38744c60f6e219f2e75a834b7bcc385a175d490ff30,2024-03-28T12:42:56.150000
|
||||||
CVE-2024-30223,0,0,f5cdd58c36ca3d81f7cad6e0467c6024652dcf4e8a185fac81b8d0d0618da80d,2024-03-28T12:42:56.150000
|
CVE-2024-30223,0,0,f5cdd58c36ca3d81f7cad6e0467c6024652dcf4e8a185fac81b8d0d0618da80d,2024-03-28T12:42:56.150000
|
||||||
@ -243668,6 +243675,7 @@ CVE-2024-30246,0,0,491c8e2c4543911d193547ad3a12e1f3a35c8b83c234dd293b662e1fad025
|
|||||||
CVE-2024-30247,0,0,17cc965a0b029d9272a0f5015c16eff346ab6d0b38ece20a3e3095775d548462,2024-04-01T01:12:59.077000
|
CVE-2024-30247,0,0,17cc965a0b029d9272a0f5015c16eff346ab6d0b38ece20a3e3095775d548462,2024-04-01T01:12:59.077000
|
||||||
CVE-2024-30248,0,0,25c63ea78319bc00f7f00382fd630bb3eaff4535f4e416eeeceadc0cb646cca2,2024-04-02T18:12:16.283000
|
CVE-2024-30248,0,0,25c63ea78319bc00f7f00382fd630bb3eaff4535f4e416eeeceadc0cb646cca2,2024-04-02T18:12:16.283000
|
||||||
CVE-2024-30265,0,0,54782d17edd9c907dd6f078e703eac63fd4cdc0b69fbaa76d7a645277b98f464,2024-04-03T23:15:13.423000
|
CVE-2024-30265,0,0,54782d17edd9c907dd6f078e703eac63fd4cdc0b69fbaa76d7a645277b98f464,2024-04-03T23:15:13.423000
|
||||||
|
CVE-2024-3030,1,1,e54b15ec9f6821950f57943cadaa258b3c87135be2e9982368f75c2ce52126fd,2024-04-04T02:15:07.437000
|
||||||
CVE-2024-30322,0,0,64e521cd60b942f55f264dd1b34a0063ca35d4db4eef121c1f7bc208aac4f7ab,2024-04-03T17:24:18.150000
|
CVE-2024-30322,0,0,64e521cd60b942f55f264dd1b34a0063ca35d4db4eef121c1f7bc208aac4f7ab,2024-04-03T17:24:18.150000
|
||||||
CVE-2024-30323,0,0,e32fdd05c5f30f68cf1412b7e36fda0cb57a7690cef1889aa844a8506beb3ac4,2024-04-03T17:24:18.150000
|
CVE-2024-30323,0,0,e32fdd05c5f30f68cf1412b7e36fda0cb57a7690cef1889aa844a8506beb3ac4,2024-04-03T17:24:18.150000
|
||||||
CVE-2024-30324,0,0,527c6e011dbcb72aeaa94e91760184a03f584736345d9e33e4037380190847ac,2024-04-03T17:24:18.150000
|
CVE-2024-30324,0,0,527c6e011dbcb72aeaa94e91760184a03f584736345d9e33e4037380190847ac,2024-04-03T17:24:18.150000
|
||||||
@ -244025,5 +244033,6 @@ CVE-2024-3257,0,0,b08a6413edbe423942780a6fe023bc538f97dad558ddbc91a724f215cfc85e
|
|||||||
CVE-2024-3258,0,0,16d450bc3554c2a319117adc94d8a7dcb1f68b8821fc173e15562a1ba48b306c,2024-04-03T17:24:18.150000
|
CVE-2024-3258,0,0,16d450bc3554c2a319117adc94d8a7dcb1f68b8821fc173e15562a1ba48b306c,2024-04-03T17:24:18.150000
|
||||||
CVE-2024-3259,0,0,59128ca045cd2f7fbe88d58e11ffcce19ef1d2f5d6abea61087e98d65d4fd821,2024-04-03T17:24:18.150000
|
CVE-2024-3259,0,0,59128ca045cd2f7fbe88d58e11ffcce19ef1d2f5d6abea61087e98d65d4fd821,2024-04-03T17:24:18.150000
|
||||||
CVE-2024-3270,0,0,ee7ab86f7bf43358544c245654b91101b254fc6f7c652d1821c4b3bc289b1731,2024-04-03T23:15:13.650000
|
CVE-2024-3270,0,0,ee7ab86f7bf43358544c245654b91101b254fc6f7c652d1821c4b3bc289b1731,2024-04-03T23:15:13.650000
|
||||||
CVE-2024-3272,1,1,ec957dadeec43e12f55685313ce87fc6f1845369f9e4bed1d35809970a1013da,2024-04-04T01:15:50.123000
|
CVE-2024-3272,0,0,ec957dadeec43e12f55685313ce87fc6f1845369f9e4bed1d35809970a1013da,2024-04-04T01:15:50.123000
|
||||||
CVE-2024-3273,1,1,08118f9907decf7bfcc2bfa04d870d8a923a71212110e86a411bc35b45b8e9b9,2024-04-04T01:15:50.387000
|
CVE-2024-3273,0,0,08118f9907decf7bfcc2bfa04d870d8a923a71212110e86a411bc35b45b8e9b9,2024-04-04T01:15:50.387000
|
||||||
|
CVE-2024-3274,1,1,58afdb0d09379d55aa4fd9c97b270d39b7e879773b86e2e5f85b0563bcd1125f,2024-04-04T02:15:07.627000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user