mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-04-04T04:00:30.461382+00:00
This commit is contained in:
parent
51fc28a6ad
commit
2d7343d508
@ -2,9 +2,8 @@
|
||||
"id": "CVE-2023-7152",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-12-29T05:15:09.473",
|
||||
"lastModified": "2024-03-21T02:50:56.913",
|
||||
"lastModified": "2024-04-04T02:15:06.203",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -134,6 +133,14 @@
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4E2HYWCZB5R4SHY4SZZZSFDMD64N4SOZ/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEK46QAJOXXDZOWOIE2YACUOCZFWOBCK/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.249158",
|
||||
"source": "cna@vuldb.com",
|
||||
|
@ -2,9 +2,8 @@
|
||||
"id": "CVE-2023-7158",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-12-29T07:15:11.060",
|
||||
"lastModified": "2024-03-21T02:50:57.260",
|
||||
"lastModified": "2024-04-04T02:15:06.400",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -154,6 +153,14 @@
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4E2HYWCZB5R4SHY4SZZZSFDMD64N4SOZ/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEK46QAJOXXDZOWOIE2YACUOCZFWOBCK/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.249180",
|
||||
"source": "cna@vuldb.com",
|
||||
|
51
CVE-2024/CVE-2024-20xx/CVE-2024-2008.json
Normal file
51
CVE-2024/CVE-2024-20xx/CVE-2024-2008.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2024-2008",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-04T03:15:06.053",
|
||||
"lastModified": "2024-04-04T03:15:06.053",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Modal Popup Box \u2013 Popup Builder, Show Offers And News in Popup plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.5.2 via deserialization of untrusted input in the awl_modal_popup_box_shortcode function. This makes it possible for authenticated attackers, with contributor-level access and above, to inject a PHP Object. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/modal-popup-box/trunk/include/modal-popup-box-shortcode.php#L19",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3062572%40modal-popup-box&new=3062572%40modal-popup-box&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fca3d106-49df-49fc-a90d-e0cb26bd34b6?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-26xx/CVE-2024-2692.json
Normal file
59
CVE-2024/CVE-2024-26xx/CVE-2024-2692.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-2692",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2024-04-04T02:15:06.527",
|
||||
"lastModified": "2024-04-04T02:15:06.527",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SiYuan version 3.0.3 allows executing arbitrary commands on the server. This is possible because the application is vulnerable to Server Side XSS.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "help@fluidattacks.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "help@fluidattacks.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fluidattacks.com/advisories/dezco/",
|
||||
"source": "help@fluidattacks.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/siyuan-note/siyuan/",
|
||||
"source": "help@fluidattacks.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-28xx/CVE-2024-2803.json
Normal file
47
CVE-2024/CVE-2024-28xx/CVE-2024-2803.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-2803",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-04T02:15:06.800",
|
||||
"lastModified": "2024-04-04T02:15:06.800",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The ElementsKit Elementor addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the countdown widget in all versions up to, and including, 3.0.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3062463%40elementskit-lite&new=3062463%40elementskit-lite&sfp_email=&sfph_mail=#file12",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b1c44ad9-e61e-4f29-9c0b-7c0a89b0c8da?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-28xx/CVE-2024-2830.json
Normal file
55
CVE-2024/CVE-2024-28xx/CVE-2024-2830.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-2830",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-04T03:15:06.230",
|
||||
"lastModified": "2024-04-04T03:15:06.230",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WordPress Tag and Category Manager \u2013 AI Autotagger plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'st_tag_cloud' shortcode in all versions up to, and including, 3.13.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/simple-tags/trunk/inc/class.client.php#L346",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/simple-tags/trunk/inc/class.client.php#L348",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3060746/simple-tags/trunk/inc/class.client.tagcloud.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0f537479-d5ec-46bb-a04e-2c33a2abc759?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
51
CVE-2024/CVE-2024-28xx/CVE-2024-2868.json
Normal file
51
CVE-2024/CVE-2024-28xx/CVE-2024-2868.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2024-2868",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-04T02:15:07.010",
|
||||
"lastModified": "2024-04-04T02:15:07.010",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The ShopLentor \u2013 WooCommerce Builder for Elementor & Gutenberg +12 Modules \u2013 All in One Solution (formerly WooLentor) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the slitems parameter in the WL Special Day Offer Widget in all versions up to, and including, 2.8.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/woolentor-addons/tags/2.8.2/includes/addons/universal_product.php#L2548",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3061864/woolentor-addons/tags/2.8.4/includes/addons/universal_product.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/27b8e0c0-fb0b-4d36-abc4-3e66ec7b5195?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
51
CVE-2024/CVE-2024-29xx/CVE-2024-2919.json
Normal file
51
CVE-2024/CVE-2024-29xx/CVE-2024-2919.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2024-2919",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-04T03:15:06.413",
|
||||
"lastModified": "2024-04-04T03:15:06.413",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Gutenberg Blocks by Kadence Blocks \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Countdown and CountUp Widget in all versions up to, and including, 3.2.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3062911/kadence-blocks/trunk/includes/assets/js/kb-countdown.min.js",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3062911/kadence-blocks/trunk/includes/assets/js/kb-countup.min.js",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b38a69c7-91d4-43be-8650-eb1f0029bd44?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
51
CVE-2024/CVE-2024-30xx/CVE-2024-3022.json
Normal file
51
CVE-2024/CVE-2024-30xx/CVE-2024-3022.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2024-3022",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-04T02:15:07.230",
|
||||
"lastModified": "2024-04-04T02:15:07.230",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The BookingPress plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient filename validation in the 'bookingpress_process_upload' function in all versions up to, and including 1.0.87. This allows an authenticated attacker with administrator-level capabilities or higher to upload arbitrary files on the affected site's server, enabling remote code execution."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3061435/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_fileupload_class.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://r0ot.notion.site/BookingPress-1-0-84-Authenticated-Administrator-Arbitrary-File-Upload-lead-to-RCE-e2603371c0c14d828144e26f2fdc1d01?pvs=4",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/049ec264-3ed1-4741-937d-8a633ef0a627?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-30xx/CVE-2024-3030.json
Normal file
47
CVE-2024/CVE-2024-30xx/CVE-2024-3030.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-3030",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-04T02:15:07.437",
|
||||
"lastModified": "2024-04-04T02:15:07.437",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Announce from the Dashboard plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3061409%40announce-from-the-dashboard&new=3061409%40announce-from-the-dashboard&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b0d1cf3b-5631-49bd-a7aa-86de2ee4b5b9?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-32xx/CVE-2024-3274.json
Normal file
92
CVE-2024/CVE-2024-32xx/CVE-2024-3274.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3274",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-04T02:15:07.627",
|
||||
"lastModified": "2024-04-04T02:15:07.627",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in D-Link DNS-320L, DNS-320LW and DNS-327L up to 20240403 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/info.cgi of the component HTTP GET Request Handler. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259285 was assigned to this vulnerability. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/netsecfish/info_cgi",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259285",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259285",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.304706",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
30
README.md
30
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-04T02:00:32.397316+00:00
|
||||
2024-04-04T04:00:30.461382+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-04T01:15:50.387000+00:00
|
||||
2024-04-04T03:15:06.413000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,28 +33,30 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
244028
|
||||
244037
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `9`
|
||||
|
||||
- [CVE-2024-25568](CVE-2024/CVE-2024-255xx/CVE-2024-25568.json) (`2024-04-04T00:15:06.990`)
|
||||
- [CVE-2024-26258](CVE-2024/CVE-2024-262xx/CVE-2024-26258.json) (`2024-04-04T00:15:07.047`)
|
||||
- [CVE-2024-29167](CVE-2024/CVE-2024-291xx/CVE-2024-29167.json) (`2024-04-04T00:15:07.103`)
|
||||
- [CVE-2024-29225](CVE-2024/CVE-2024-292xx/CVE-2024-29225.json) (`2024-04-04T00:15:07.200`)
|
||||
- [CVE-2024-3272](CVE-2024/CVE-2024-32xx/CVE-2024-3272.json) (`2024-04-04T01:15:50.123`)
|
||||
- [CVE-2024-3273](CVE-2024/CVE-2024-32xx/CVE-2024-3273.json) (`2024-04-04T01:15:50.387`)
|
||||
- [CVE-2024-2008](CVE-2024/CVE-2024-20xx/CVE-2024-2008.json) (`2024-04-04T03:15:06.053`)
|
||||
- [CVE-2024-2692](CVE-2024/CVE-2024-26xx/CVE-2024-2692.json) (`2024-04-04T02:15:06.527`)
|
||||
- [CVE-2024-2803](CVE-2024/CVE-2024-28xx/CVE-2024-2803.json) (`2024-04-04T02:15:06.800`)
|
||||
- [CVE-2024-2830](CVE-2024/CVE-2024-28xx/CVE-2024-2830.json) (`2024-04-04T03:15:06.230`)
|
||||
- [CVE-2024-2868](CVE-2024/CVE-2024-28xx/CVE-2024-2868.json) (`2024-04-04T02:15:07.010`)
|
||||
- [CVE-2024-2919](CVE-2024/CVE-2024-29xx/CVE-2024-2919.json) (`2024-04-04T03:15:06.413`)
|
||||
- [CVE-2024-3022](CVE-2024/CVE-2024-30xx/CVE-2024-3022.json) (`2024-04-04T02:15:07.230`)
|
||||
- [CVE-2024-3030](CVE-2024/CVE-2024-30xx/CVE-2024-3030.json) (`2024-04-04T02:15:07.437`)
|
||||
- [CVE-2024-3274](CVE-2024/CVE-2024-32xx/CVE-2024-3274.json) (`2024-04-04T02:15:07.627`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `3`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
- [CVE-2024-21798](CVE-2024/CVE-2024-217xx/CVE-2024-21798.json) (`2024-04-04T01:15:49.953`)
|
||||
- [CVE-2024-23910](CVE-2024/CVE-2024-239xx/CVE-2024-23910.json) (`2024-04-04T01:15:50.027`)
|
||||
- [CVE-2024-25579](CVE-2024/CVE-2024-255xx/CVE-2024-25579.json) (`2024-04-04T01:15:50.083`)
|
||||
- [CVE-2023-7152](CVE-2023/CVE-2023-71xx/CVE-2023-7152.json) (`2024-04-04T02:15:06.203`)
|
||||
- [CVE-2023-7158](CVE-2023/CVE-2023-71xx/CVE-2023-7158.json) (`2024-04-04T02:15:06.400`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
31
_state.csv
31
_state.csv
@ -237934,13 +237934,13 @@ CVE-2023-7148,0,0,ad3d7bb45f68a25f28d4a014a05c7f0c0f5eb59b2332f2a36529e951c01cf7
|
||||
CVE-2023-7149,0,0,5274abe94fd7c0ae8d01100c182a0608460162f3b4c0a04ca7ef11eeebe117a1,2024-03-21T02:50:56.743000
|
||||
CVE-2023-7150,0,0,0c87a4b3ec2aaf12c4d9e1fdfb4eb06c5a9800465da5abf8eb5f908f0af74c73,2024-03-21T02:50:56.820000
|
||||
CVE-2023-7151,0,0,bb32bdd519a1a50b8c5ab4a323d30cc39a75571831ac8e58df336f69b7cfff53,2024-01-23T15:40:52.973000
|
||||
CVE-2023-7152,0,0,d63315d5b620520be64208de0c636c036bcf933560aed0687debc92391adb734,2024-03-21T02:50:56.913000
|
||||
CVE-2023-7152,0,1,4204b249f3a43ad13331bc58a5c2cd30cfaf340276ca2426d50c796310e7d72d,2024-04-04T02:15:06.203000
|
||||
CVE-2023-7153,0,0,e011618db3076d02be0d1ef8dfe51744f3234f2e36498aa2346c160b31a75578,2024-01-24T21:43:31.700000
|
||||
CVE-2023-7154,0,0,076d7cbaa09541993347ce9e0a30d4438c72b1ebd3caf4aa248135ca6dfc7806,2024-01-23T15:45:39.513000
|
||||
CVE-2023-7155,0,0,7e7529ab676d8ddb6b782bd27f8d741a82d11bbbbeda4e53a6c0960a51bfc8c0,2024-03-21T02:50:57.017000
|
||||
CVE-2023-7156,0,0,7b5a4efd1b3be53f0ffd429f40f9e3f3f28a760427bbfbde808e2a385728dc30,2024-03-21T02:50:57.100000
|
||||
CVE-2023-7157,0,0,e14f25db01f67df37b8eeb853c155d5497d7d420da1cf903e90c685c473ef4b0,2024-03-21T02:50:57.180000
|
||||
CVE-2023-7158,0,0,1084264640b5cfab07218d254e307ca73441eb13a3347a6cbb1e62a4d9b5cfd7,2024-03-21T02:50:57.260000
|
||||
CVE-2023-7158,0,1,bf88ece70b3ebdb9d0ed2829f62cd053cff19d2bc94e9f3dcc397e04ebfc456c,2024-04-04T02:15:06.400000
|
||||
CVE-2023-7159,0,0,7602619793679c82fd6e4078fefba013d97098ffd01706a034b417ac5762a63e,2024-03-21T02:50:57.347000
|
||||
CVE-2023-7160,0,0,0068dd63e1ae41a9eeb4dd1afabef9df497b4968c8d56ef188f9ba12bb4adcbb,2024-03-21T02:50:57.423000
|
||||
CVE-2023-7161,0,0,081d75b436b1110fb1f86020897a7d713350804dbf28510a4511fb651652e216,2024-03-21T02:50:57.503000
|
||||
@ -239507,6 +239507,7 @@ CVE-2024-20054,0,0,8d3193313cee82666cc7a9a9fc4d8e0bcc3af481a0ce555748460cf02c097
|
||||
CVE-2024-20055,0,0,109d1d9940c1dca8530dc03191274127f8901d271f37fd1cdce803ed70deff34,2024-04-01T12:49:00.877000
|
||||
CVE-2024-2006,0,0,52d776ed20a145230028cfc4b5ce5b374d35ec688b7308ce8a79b923b7ac4a29,2024-03-13T18:15:58.530000
|
||||
CVE-2024-2007,0,0,f47e32ba52cda7faacb8492f7684b94da5833a1e1d397bb70c366c91108ebbd0,2024-03-21T12:58:51.093000
|
||||
CVE-2024-2008,1,1,b9e72dd151c3b6dc237474f44ba3e9dbcc4f38757a56d2566149be6176d2d10f,2024-04-04T03:15:06.053000
|
||||
CVE-2024-2009,0,0,e2a4086afb53fd84b50e105846813eee57282aed3cce0568cc523b8132740b52,2024-03-21T02:52:26.207000
|
||||
CVE-2024-2014,0,0,8d7628b414bbcdd7a6ef27a23ad1e3ec91eb3e6ee0b62ef9489eb400579feaac,2024-03-21T12:58:51.093000
|
||||
CVE-2024-2015,0,0,1c17f5977ed6cdad57e2e0374ea748a50939f7f3d42f37be55afd7aacf9e1e0c,2024-03-21T12:58:51.093000
|
||||
@ -240166,7 +240167,7 @@ CVE-2024-2179,0,0,ae7ec0d777d4f092532ca994d6b0860fc5ecc6f92bb84e39b0499b0a5cdf3b
|
||||
CVE-2024-21794,0,0,5140601c591fc7e01c922f6b4426d49907b4278c42a623419c59c4c96fa7afa6,2024-02-07T17:15:44.653000
|
||||
CVE-2024-21795,0,0,3f97d15b4fad76f44a86834312294b67e000044b0ba6ac0faa07d011642d4d38,2024-04-02T15:15:52.517000
|
||||
CVE-2024-21796,0,0,ad6ea83e4ba68ed8909637d1ef7b65d12f04c56232c1b05d9173891b89591836,2024-01-30T22:14:16.247000
|
||||
CVE-2024-21798,0,1,227cee2b08d95673cdf00007b2e5f0a1a8d34bbf3b115cc9a3e417f90fdb9db1,2024-04-04T01:15:49.953000
|
||||
CVE-2024-21798,0,0,227cee2b08d95673cdf00007b2e5f0a1a8d34bbf3b115cc9a3e417f90fdb9db1,2024-04-04T01:15:49.953000
|
||||
CVE-2024-2180,0,0,f29f310f994bdc1547d14907db3ea5b567d0e701ee0c912abfad5bc40b39a210,2024-03-15T12:53:06.423000
|
||||
CVE-2024-21802,0,0,2a0324ca9760c4b3be107883f84a1ed806e6bad72b3badb393d00982ae57c159,2024-02-26T18:15:07.290000
|
||||
CVE-2024-21803,0,0,412e1fe487e1aa8e1b208c7f0baf850a3bb5b2cd1ac7cabb6ce669e7a4281bbb,2024-02-08T01:57:53.770000
|
||||
@ -241163,7 +241164,7 @@ CVE-2024-23903,0,0,ecb97aacb6f19585aea8671a201e2d7c3813e0b8271429153f27911a6bbb0
|
||||
CVE-2024-23904,0,0,678d9b9e94528dc2befb7afc9e4f3790d1499e848c388388aaa93c118b2a19d3,2024-01-29T19:26:29.770000
|
||||
CVE-2024-23905,0,0,2d8ebad5c05b335845d8a0c6b27832798a9c27087f41f1dd4daf5a7e2afef75a,2024-01-29T19:26:11.517000
|
||||
CVE-2024-2391,0,0,5eb10c991275accc4f0c04c536ff0ab64c132e711d4ba9c8aec48c31334f05e4,2024-03-21T02:52:33.807000
|
||||
CVE-2024-23910,0,1,e6adc416dd7b19484faa305c4e8491b3ff3f8809d94d53eb510d517290865995,2024-04-04T01:15:50.027000
|
||||
CVE-2024-23910,0,0,e6adc416dd7b19484faa305c4e8491b3ff3f8809d94d53eb510d517290865995,2024-04-04T01:15:50.027000
|
||||
CVE-2024-23917,0,0,43acd2786eef775b4e5af3da03e8f628e79a58b917087bea0e9c91638665592f,2024-02-09T01:05:22.180000
|
||||
CVE-2024-2392,0,0,42336a48d6bafcd50dc6522fe24a4d56dee45c4fa6295037e9d4d2226834e64c,2024-03-22T12:45:36.130000
|
||||
CVE-2024-2393,0,0,8cedba0180a7b00def73b6261f8c72d770c30f1bb7624197b9fba956f17cd30c,2024-03-21T02:52:33.897000
|
||||
@ -241864,11 +241865,11 @@ CVE-2024-25554,0,0,a87c08d7479e0670c1de7ac680e974b7c966b7f12d7b309312798a5acd199
|
||||
CVE-2024-25559,0,0,621d2089e4066088e4f2e7151d4c52b797349073e2e5f4d074059dc172fb61d6,2024-02-15T06:23:39.303000
|
||||
CVE-2024-2556,0,0,7dda608d4c973332c242425a23922df86f3028261d216807853df92150e28261,2024-03-21T02:52:37.803000
|
||||
CVE-2024-25567,0,0,bbb8c64eb3dcee3e8e89951734f837d0c3bea66c11459a30529f4c9133593805,2024-03-22T12:45:36.130000
|
||||
CVE-2024-25568,1,1,65656181592ea9bc19c9c46396613fc484931712e79b712d3a779df06bba53fe,2024-04-04T00:15:06.990000
|
||||
CVE-2024-25568,0,0,65656181592ea9bc19c9c46396613fc484931712e79b712d3a779df06bba53fe,2024-04-04T00:15:06.990000
|
||||
CVE-2024-2557,0,0,bd3cbcd6fdd2bc53d05ad0a21dcf76dc9100645c8cd39cc3bfd0cd796821c2ef,2024-03-21T02:52:37.887000
|
||||
CVE-2024-25574,0,0,4bc8d3cd97ad31d3dfd232c462a09dc1924d30756dc7bfcb27690950ff1edfb2,2024-04-02T12:50:42.233000
|
||||
CVE-2024-25578,0,0,ff68f9ee0e3394b3fa83fe8766f2e044325a5fd043b437de063c0cd80654c610,2024-03-01T14:04:26.010000
|
||||
CVE-2024-25579,0,1,838cd17118b030eacfba49a0ada30a1ba4831f0bedbfd768ff2707f55789078e,2024-04-04T01:15:50.083000
|
||||
CVE-2024-25579,0,0,838cd17118b030eacfba49a0ada30a1ba4831f0bedbfd768ff2707f55789078e,2024-04-04T01:15:50.083000
|
||||
CVE-2024-2558,0,0,9b2e64cc1dfa18aa6ab6ed26c2435de053f445557e20541392c5e86001c65488,2024-03-21T02:52:37.973000
|
||||
CVE-2024-25580,0,0,aa78600da8abcfd02ed93a87510a3e3684060f93f36da496d331a2464d925d23,2024-03-27T12:29:30.307000
|
||||
CVE-2024-2559,0,0,e913f295acbf3f21c20619071c5c76f626d7ca39e71d862a4c6e578c87ef0b76,2024-03-21T02:52:38.050000
|
||||
@ -242236,7 +242237,7 @@ CVE-2024-2622,0,0,2faba3761f6560c88eea9c3b0fa6fc4529a548f032a256e1b05f67335e6c11
|
||||
CVE-2024-26246,0,0,6c174a39b8e16966075834fa377a33ef3e5c5829eb1a43647414103e1222a0e5,2024-03-19T17:05:45.193000
|
||||
CVE-2024-26247,0,0,ed304d3168190e2757b85fd85fc0b38856926e8e4ca6b0df56c71d50554fa5bc,2024-03-26T03:18:26.197000
|
||||
CVE-2024-2625,0,0,176202763572967bdd2403d6220b5ef3a0eeae1c4e7f0e46612d30bfb12e4570,2024-04-01T15:32:17.010000
|
||||
CVE-2024-26258,1,1,766e8ee3881910a81a928091bc16ea7cd82e7c62393de16666cf602140b8ed16,2024-04-04T00:15:07.047000
|
||||
CVE-2024-26258,0,0,766e8ee3881910a81a928091bc16ea7cd82e7c62393de16666cf602140b8ed16,2024-04-04T00:15:07.047000
|
||||
CVE-2024-2626,0,0,0f82bfcd678adfe2206a7b49362dbece30aa00242a9c52e3ba26851c15f6dba3,2024-04-01T15:22:37.883000
|
||||
CVE-2024-26260,0,0,e265a50d624e832bed578eaaf671225475ee52a0a641253d8d3fa4cc960d0968,2024-02-15T06:23:39.303000
|
||||
CVE-2024-26261,0,0,0e54368aae0104b528b2c2b10aa27bd070162dbc45df6e809e95785e5efd10d2,2024-02-15T06:23:39.303000
|
||||
@ -242565,6 +242566,7 @@ CVE-2024-2687,0,0,8743e8c4178f9b4c342f85388b698da988fcd5df7a9f830356accbc2c7d603
|
||||
CVE-2024-2688,0,0,2813e3d77c2b2d83f751b34ba79d9b337f290aff8a39ca0bf2b5affbb2644102,2024-03-25T01:51:01.223000
|
||||
CVE-2024-2689,0,0,658993c0403fad94345d3cb8155974fc89f004b988ac6221fcb671e6effc6535,2024-04-03T22:15:07.290000
|
||||
CVE-2024-2690,0,0,b9f1b9556b2658a97b0aa5fed823e2a3f219863f8b3c3eeec7a6e11e4b693950,2024-03-21T02:52:42.713000
|
||||
CVE-2024-2692,1,1,4dff168fae971f35ea778b7b59e72228b39afed9926b88e181ded3a6fd213068,2024-04-04T02:15:06.527000
|
||||
CVE-2024-2702,0,0,865ffb7613b5d4b81a5327fb07c7988ee6b4cd29868791960db416ef49370f10,2024-03-20T13:00:16.367000
|
||||
CVE-2024-2703,0,0,07081de6587d09870ff55039e594f5ce8e9c97e5814ee473417e88613bb5eb37,2024-03-21T02:52:42.793000
|
||||
CVE-2024-2704,0,0,e286b904999417c65c8b69a6059186f449beb8789fde8f7550b2c51d635749f0,2024-03-21T02:52:42.870000
|
||||
@ -242911,6 +242913,7 @@ CVE-2024-28015,0,0,c36a569e47a8cc25a559aa19a480d47088d8456072eb6e8c9e0575d3988b3
|
||||
CVE-2024-28016,0,0,fe85c1f239b1cebe9726ce271c3f5722bfdbb4bcff9b0aba329f58c6fcbf12b8,2024-04-02T06:15:15.603000
|
||||
CVE-2024-2802,0,0,3b7ed9aefbc68681b0633b6ab16c0b3db6db844ee4c655f6c7e6863ac6e1f543,2024-03-26T15:15:49.677000
|
||||
CVE-2024-28029,0,0,9e465d515603ce2b4056e1d4099525822960990d4afbdcda109cb1a09fe772c2,2024-03-25T16:06:44.403000
|
||||
CVE-2024-2803,1,1,ecd366c5a12c458fcf323ff3df753bc025edf8ad4c718558932b72f23ea65c91,2024-04-04T02:15:06.800000
|
||||
CVE-2024-28033,0,0,d380f707343e80ca8a48383d7130e8455ae81fc182e0d67c36374f1eb571652f,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28034,0,0,59f37b2f71aecfc048b35bdfeca5cf2bf5792e3fd57d1b0f3eaa95911ebef442,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28039,0,0,9ef35c96ff38e007b2fd4f37c3f1f5b6d35461c4eaa69f2b36faccd438b26411,2024-03-18T12:38:25.490000
|
||||
@ -243056,6 +243059,7 @@ CVE-2024-28283,0,0,39f85b2f17c0fe895d0bdb32702da6d7a9c62274d2c91228b15f8ef37a4f9
|
||||
CVE-2024-28286,0,0,0c649cd6694a1837fe5561b872f74550eafab1ff52e9c04655d5ad406a1d7e85,2024-03-21T12:58:51.093000
|
||||
CVE-2024-28287,0,0,8355e78e2bcacfd30beedd02a16b8cbb7fa125f666660317b865986783b6c2d0,2024-04-02T18:12:16.283000
|
||||
CVE-2024-28288,0,0,bbf61567f9663b711efc4f198529fd360d88d5a87ddc912234861f379f96afdd,2024-04-01T01:12:59.077000
|
||||
CVE-2024-2830,1,1,96e6c0abaf03aac88aa8c316493da97b9ccd76a5da8769ff2fa398d63b5238f7,2024-04-04T03:15:06.230000
|
||||
CVE-2024-28303,0,0,1e1fe6d5ea3f2a6f114bc62ec7183db4733d3d529e4e5786c421b928ce2f2bf1,2024-03-20T13:00:16.367000
|
||||
CVE-2024-28318,0,0,4464c0d64b943a4f9205011ad1109527e8aa088cb5ff5456cd49e911c2d1f722,2024-03-15T16:26:49.320000
|
||||
CVE-2024-28319,0,0,e376890f5ff8761a0926623e9576a5238806c37f36258b3aec951592cbe60412,2024-03-15T16:26:49.320000
|
||||
@ -243173,6 +243177,7 @@ CVE-2024-28676,0,0,801d735d88a2c38558c90696937a503a364bdc5ac079aab35f708a8cac6bb
|
||||
CVE-2024-28677,0,0,beda9fb5e19c8e32c2bb233bf7e04303e98e61bb2557b7038cbec5829242cafe,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28678,0,0,e9f2e307c9c14d85cdf0d7276dece168215df066834aac177e5e011a7af00ff3,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28679,0,0,0c6e84e914fdaa4e663110efa631e88c6cae34e7955c7cdafa51b2651294cb69,2024-03-13T18:15:58.530000
|
||||
CVE-2024-2868,1,1,a0aac9acdb0ba19371b4cc3ab0db1f3d8b7c6da9590f62af8a8d7e745b381fb3,2024-04-04T02:15:07.010000
|
||||
CVE-2024-28680,0,0,f0cb3475dd2248a613f045cb0e92e770aee1d1d2137270856a92a44b18528f47,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28681,0,0,ed8a4fd064b6b3346412990e6226cbe04bee8a6bd2aaad4671fdcd0478ce5ec1,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28682,0,0,2c53ed716809a76ded005fd10ac6d93891dbf2dd9f02238c66f1445af60cb8e7,2024-03-13T18:15:58.530000
|
||||
@ -243328,7 +243333,7 @@ CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24
|
||||
CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000
|
||||
CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000
|
||||
CVE-2024-2916,0,0,6871ce1ac12c0adda9a1495db174447a7645b0f8622337f63e4d979317d65207,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29167,1,1,9137b4e6c505da150c1135337d6649a6081f1aeb2e87f468a9c85674ffbc5bde,2024-04-04T00:15:07.103000
|
||||
CVE-2024-29167,0,0,9137b4e6c505da150c1135337d6649a6081f1aeb2e87f468a9c85674ffbc5bde,2024-04-04T00:15:07.103000
|
||||
CVE-2024-2917,0,0,cc7c53d7d6aa23ee02922950dbfd98ec950f87014b4781a546614dff66bfbad3,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29179,0,0,f19d4d0a9f8b6dc85e6e021ab22950c73dd30b1b16e940f3cfc8d8b6deab42d4,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29180,0,0,e32bebc90fbd05fe3a3edfae9506df906c8ca56e295fcb3cc3f3f384d12528c8,2024-03-21T19:47:03.943000
|
||||
@ -243338,6 +243343,7 @@ CVE-2024-29186,0,0,4d22f13bcc9a989b4457971fb422d0f63596eb5c598cc015a08c44b1e3975
|
||||
CVE-2024-29187,0,0,b20c442660011aa9a00d748e283e3cff30d410ce48e3d079b901e0f36dcc61f4,2024-03-25T01:51:01.223000
|
||||
CVE-2024-29188,0,0,a88946c34860ffe9844c033cf176d3b0a07d4a26b7808112b8bd0f05131d96e8,2024-03-25T01:51:01.223000
|
||||
CVE-2024-29189,0,0,6878e9b35a058677d2a3fa4fc5bfa3461c367e63050b0e9c52331e170e2ec716,2024-03-26T12:55:05.010000
|
||||
CVE-2024-2919,1,1,6b30411f4300618aef7f8a07053fa275b657e104a3d0434bb2d54c9d4bca3417,2024-04-04T03:15:06.413000
|
||||
CVE-2024-29190,0,0,06fd81282a65c29bad2a807438b949724256368bd8f788b06f116f9ca54b17a0,2024-03-25T01:51:01.223000
|
||||
CVE-2024-29194,0,0,61bcf80dc8c33623e289063809985cd69cc66b52cb236ef7d952a2c24a0c4127,2024-03-25T01:51:01.223000
|
||||
CVE-2024-29195,0,0,12b6fcead703f320c2faaa3dbf933701901e834c51cbd479cd70a3447afc3114,2024-03-26T12:55:05.010000
|
||||
@ -243350,7 +243356,7 @@ CVE-2024-29202,0,0,710d7ee4855d6fe6e591666dc35bf54bd7c26416e7ed34ce9d7c18b13c56e
|
||||
CVE-2024-29203,0,0,85853d1d6c0b7cff8ded9ca779662219e1e7d461c7c9aed96ad32295a032c6f6,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2921,0,0,a7048ceb487f73059844764517da213b04f370019c5cc0c6fe2153431d1dd6cb,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000
|
||||
CVE-2024-29225,1,1,4fb529425e69e4b0cbfa2f9f09303ddc74d023065b1b17522e775f73a75a9e71,2024-04-04T00:15:07.200000
|
||||
CVE-2024-29225,0,0,4fb529425e69e4b0cbfa2f9f09303ddc74d023065b1b17522e775f73a75a9e71,2024-04-04T00:15:07.200000
|
||||
CVE-2024-29227,0,0,eecaff6ef866c6c9ce7329c8719d8151618914bed20188bbeb2cfe204e821322,2024-03-28T12:42:56.150000
|
||||
CVE-2024-29228,0,0,0396b2f19bb32ec6c2e65f58d8f3992a3d27b02bc4a6c851b5d5b4cfa0460540,2024-03-28T12:42:56.150000
|
||||
CVE-2024-29229,0,0,6dd1964f03a465c5b1d78ea2599ed81e5df193b0ca5daa792343c5fca8270ef3,2024-03-28T12:42:56.150000
|
||||
@ -243638,6 +243644,7 @@ CVE-2024-30202,0,0,8f653afa9be834d6068a82d15d250296f87495118f4f1c30c90cbc157fddc
|
||||
CVE-2024-30203,0,0,a1d664e0e9a71620a1b21449b8bc268488489a282580bac90b40062a439c83a7,2024-03-25T16:43:06.137000
|
||||
CVE-2024-30204,0,0,bf1cbd8aaa2b36eb1f7808443cd1dc94c2d123df04230a458090af1180122865,2024-03-25T16:43:06.137000
|
||||
CVE-2024-30205,0,0,d8d475f93d08b2037de38fb56b8f07beb7b6f1c5b446fee65bfc13f5246e2c4e,2024-03-25T16:43:06.137000
|
||||
CVE-2024-3022,1,1,a37d5d560b38f78b564bad8226b6553a4f0987dbeb8270e279a97f23bbbe3d67,2024-04-04T02:15:07.230000
|
||||
CVE-2024-30221,0,0,23f871339b04b26b03b1ae0b592c573034cab277a7f5f76554e69b2658f3686d,2024-03-28T12:42:56.150000
|
||||
CVE-2024-30222,0,0,3f187efc44dcd846c225c38744c60f6e219f2e75a834b7bcc385a175d490ff30,2024-03-28T12:42:56.150000
|
||||
CVE-2024-30223,0,0,f5cdd58c36ca3d81f7cad6e0467c6024652dcf4e8a185fac81b8d0d0618da80d,2024-03-28T12:42:56.150000
|
||||
@ -243668,6 +243675,7 @@ CVE-2024-30246,0,0,491c8e2c4543911d193547ad3a12e1f3a35c8b83c234dd293b662e1fad025
|
||||
CVE-2024-30247,0,0,17cc965a0b029d9272a0f5015c16eff346ab6d0b38ece20a3e3095775d548462,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30248,0,0,25c63ea78319bc00f7f00382fd630bb3eaff4535f4e416eeeceadc0cb646cca2,2024-04-02T18:12:16.283000
|
||||
CVE-2024-30265,0,0,54782d17edd9c907dd6f078e703eac63fd4cdc0b69fbaa76d7a645277b98f464,2024-04-03T23:15:13.423000
|
||||
CVE-2024-3030,1,1,e54b15ec9f6821950f57943cadaa258b3c87135be2e9982368f75c2ce52126fd,2024-04-04T02:15:07.437000
|
||||
CVE-2024-30322,0,0,64e521cd60b942f55f264dd1b34a0063ca35d4db4eef121c1f7bc208aac4f7ab,2024-04-03T17:24:18.150000
|
||||
CVE-2024-30323,0,0,e32fdd05c5f30f68cf1412b7e36fda0cb57a7690cef1889aa844a8506beb3ac4,2024-04-03T17:24:18.150000
|
||||
CVE-2024-30324,0,0,527c6e011dbcb72aeaa94e91760184a03f584736345d9e33e4037380190847ac,2024-04-03T17:24:18.150000
|
||||
@ -244025,5 +244033,6 @@ CVE-2024-3257,0,0,b08a6413edbe423942780a6fe023bc538f97dad558ddbc91a724f215cfc85e
|
||||
CVE-2024-3258,0,0,16d450bc3554c2a319117adc94d8a7dcb1f68b8821fc173e15562a1ba48b306c,2024-04-03T17:24:18.150000
|
||||
CVE-2024-3259,0,0,59128ca045cd2f7fbe88d58e11ffcce19ef1d2f5d6abea61087e98d65d4fd821,2024-04-03T17:24:18.150000
|
||||
CVE-2024-3270,0,0,ee7ab86f7bf43358544c245654b91101b254fc6f7c652d1821c4b3bc289b1731,2024-04-03T23:15:13.650000
|
||||
CVE-2024-3272,1,1,ec957dadeec43e12f55685313ce87fc6f1845369f9e4bed1d35809970a1013da,2024-04-04T01:15:50.123000
|
||||
CVE-2024-3273,1,1,08118f9907decf7bfcc2bfa04d870d8a923a71212110e86a411bc35b45b8e9b9,2024-04-04T01:15:50.387000
|
||||
CVE-2024-3272,0,0,ec957dadeec43e12f55685313ce87fc6f1845369f9e4bed1d35809970a1013da,2024-04-04T01:15:50.123000
|
||||
CVE-2024-3273,0,0,08118f9907decf7bfcc2bfa04d870d8a923a71212110e86a411bc35b45b8e9b9,2024-04-04T01:15:50.387000
|
||||
CVE-2024-3274,1,1,58afdb0d09379d55aa4fd9c97b270d39b7e879773b86e2e5f85b0563bcd1125f,2024-04-04T02:15:07.627000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user