mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-04-29T08:00:38.345826+00:00
This commit is contained in:
parent
c80b3d270c
commit
2f6f999fcb
28
CVE-2023/CVE-2023-527xx/CVE-2023-52723.json
Normal file
28
CVE-2023/CVE-2023-527xx/CVE-2023-52723.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-52723",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-29T06:15:06.983",
|
||||
"lastModified": "2024-04-29T06:15:06.983",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In KDE libksieve before 23.03.80, kmanagesieve/session.cpp places a cleartext password in server logs because a username variable is accidentally given a password value."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://invent.kde.org/pim/libksieve/-/commit/6b460ba93ac4ac503ba039d0b788ac7595120db1",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://invent.kde.org/pim/libksieve/-/tags/v23.03.80",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2024/04/25/1",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1023",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-03-27T08:15:38.140",
|
||||
"lastModified": "2024-04-09T12:15:07.627",
|
||||
"lastModified": "2024-04-29T07:15:06.233",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1706",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2088",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-1023",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1300",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-02T08:15:53.993",
|
||||
"lastModified": "2024-04-18T17:15:48.453",
|
||||
"lastModified": "2024-04-29T07:15:06.423",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,6 +63,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1923",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2088",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-1300",
|
||||
"source": "secalert@redhat.com"
|
||||
|
20
CVE-2024/CVE-2024-19xx/CVE-2024-1905.json
Normal file
20
CVE-2024/CVE-2024-19xx/CVE-2024-1905.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-1905",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-04-29T06:15:07.650",
|
||||
"lastModified": "2024-04-29T06:15:07.650",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Smart Forms WordPress plugin before 2.6.96 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/b9a448d2-4bc2-4933-8743-58c8768a619f/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-25xx/CVE-2024-2505.json
Normal file
20
CVE-2024/CVE-2024-25xx/CVE-2024-2505.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-2505",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-04-29T06:15:07.937",
|
||||
"lastModified": "2024-04-29T06:15:07.937",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The GamiPress WordPress plugin before 6.8.9's access control mechanism fails to properly restrict access to its settings, permitting Authors to manipulate requests and extend access to lower privileged users, like Subscribers, despite initial settings prohibiting such access. This vulnerability resembles broken access control, enabling unauthorized users to modify critical GamiPress WordPress plugin before 6.8.9 configurations."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/9b3d6148-ecee-4e59-84a4-3b3e9898473b/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
96
CVE-2024/CVE-2024-31xx/CVE-2024-3191.json
Normal file
96
CVE-2024/CVE-2024-31xx/CVE-2024-3191.json
Normal file
@ -0,0 +1,96 @@
|
||||
{
|
||||
"id": "CVE-2024-3191",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-29T07:15:07.080",
|
||||
"lastModified": "2024-04-29T07:15:07.080",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in MailCleaner up to 2023.03.14. This issue affects some unknown processing of the component Email Handler. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-262307."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 10.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/MailCleaner/MailCleaner/pull/601",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.262307",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.262307",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
96
CVE-2024/CVE-2024-31xx/CVE-2024-3192.json
Normal file
96
CVE-2024/CVE-2024-31xx/CVE-2024-3192.json
Normal file
@ -0,0 +1,96 @@
|
||||
{
|
||||
"id": "CVE-2024-3192",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-29T07:15:07.480",
|
||||
"lastModified": "2024-04-29T07:15:07.480",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, was found in MailCleaner up to 2023.03.14. Affected is an unknown function of the component Admin Interface. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-262308."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/MailCleaner/MailCleaner/pull/601",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.262308",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.262308",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
96
CVE-2024/CVE-2024-31xx/CVE-2024-3193.json
Normal file
96
CVE-2024/CVE-2024-31xx/CVE-2024-3193.json
Normal file
@ -0,0 +1,96 @@
|
||||
{
|
||||
"id": "CVE-2024-3193",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-29T07:15:07.773",
|
||||
"lastModified": "2024-04-29T07:15:07.773",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in MailCleaner up to 2023.03.14 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Admin Endpoints. The manipulation leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-262309 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 10.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/MailCleaner/MailCleaner/pull/601",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.262309",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.262309",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
96
CVE-2024/CVE-2024-31xx/CVE-2024-3194.json
Normal file
96
CVE-2024/CVE-2024-31xx/CVE-2024-3194.json
Normal file
@ -0,0 +1,96 @@
|
||||
{
|
||||
"id": "CVE-2024-3194",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-29T07:15:08.070",
|
||||
"lastModified": "2024-04-29T07:15:08.070",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in MailCleaner up to 2023.03.14 and classified as problematic. Affected by this issue is some unknown functionality of the component Log File Endpoint. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-262310 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/MailCleaner/MailCleaner/pull/601",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.262310",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.262310",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
96
CVE-2024/CVE-2024-31xx/CVE-2024-3195.json
Normal file
96
CVE-2024/CVE-2024-31xx/CVE-2024-3195.json
Normal file
@ -0,0 +1,96 @@
|
||||
{
|
||||
"id": "CVE-2024-3195",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-29T07:15:08.400",
|
||||
"lastModified": "2024-04-29T07:15:08.400",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in MailCleaner up to 2023.03.14. It has been classified as critical. This affects an unknown part of the component Admin Endpoints. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-262311."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 5.8
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/MailCleaner/MailCleaner/pull/601",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.262311",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.262311",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
96
CVE-2024/CVE-2024-31xx/CVE-2024-3196.json
Normal file
96
CVE-2024/CVE-2024-31xx/CVE-2024-3196.json
Normal file
@ -0,0 +1,96 @@
|
||||
{
|
||||
"id": "CVE-2024-3196",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-29T07:15:08.740",
|
||||
"lastModified": "2024-04-29T07:15:08.740",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in MailCleaner up to 2023.03.14. It has been declared as critical. This vulnerability affects unknown code of the file /mailcleaner.php/getStats of the component SOAP Service. The manipulation leads to os command injection. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-262312."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:L/AC:L/Au:M/C:C/I:C/A:C",
|
||||
"accessVector": "LOCAL",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/MailCleaner/MailCleaner/pull/601",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.262312",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.262312",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33537.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33537.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33537",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T06:15:08.083",
|
||||
"lastModified": "2024-04-29T06:15:08.083",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Theme Horse WP Portfolio allows Stored XSS.This issue affects WP Portfolio: from n/a through 2.4.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-portfolio/wordpress-wp-portfolio-theme-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33539.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33539.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33539",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T06:15:08.930",
|
||||
"lastModified": "2024-04-29T06:15:08.930",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPZOOM WPZOOM Addons for Elementor (Templates, Widgets) allows Stored XSS.This issue affects WPZOOM Addons for Elementor (Templates, Widgets): from n/a through 1.1.35.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wpzoom-elementor-addons/wordpress-wpzoom-addons-for-elementor-plugin-1-1-35-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33540.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33540.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33540",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T06:15:09.637",
|
||||
"lastModified": "2024-04-29T06:15:09.637",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeGrill ColorNews allows Stored XSS.This issue affects ColorNews: from n/a through 1.2.6.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/colornews/wordpress-colornews-theme-1-2-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33542.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33542.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33542",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T06:15:10.220",
|
||||
"lastModified": "2024-04-29T06:15:10.220",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authorization Bypass Through User-Controlled Key vulnerability in Fabio Rinaldi Crelly Slider.This issue affects Crelly Slider: from n/a through 1.4.5.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/crelly-slider/wordpress-crelly-slider-plugin-1-4-5-insecure-direct-object-references-idor-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33544.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33544.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33544",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T07:15:06.543",
|
||||
"lastModified": "2024-04-29T07:15:06.543",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AA-Team WZone allows SQL Injection.This issue affects WZone: from n/a through 14.0.10.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/woozone/wordpress-wzone-plugin-14-0-10-unauthenticated-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33546.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33546.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33546",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T07:15:06.810",
|
||||
"lastModified": "2024-04-29T07:15:06.810",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AA-Team WZone allows SQL Injection.This issue affects WZone: from n/a through 14.0.10.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/woozone/wordpress-wzone-plugin-14-0-10-arbitrary-sql-update-execution-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33548.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33548.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33548",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T06:15:10.937",
|
||||
"lastModified": "2024-04-29T06:15:10.937",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AA-Team WZone allows Reflected XSS.This issue affects WZone: from n/a through 14.0.10.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/woozone/wordpress-wzone-plugin-14-0-10-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33551.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33551.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33551",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T06:15:11.487",
|
||||
"lastModified": "2024-04-29T06:15:11.487",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in 8theme XStore Core allows SQL Injection.This issue affects XStore Core: from n/a through 5.3.5.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/et-core-plugin/wordpress-xstore-core-plugin-5-3-5-unauthenticated-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33554.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33554.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33554",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T06:15:12.090",
|
||||
"lastModified": "2024-04-29T06:15:12.090",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 8theme XStore Core allows Reflected XSS.This issue affects XStore Core: from n/a through 5.3.5.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/et-core-plugin/wordpress-xstore-core-plugin-5-3-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33559.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33559.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33559",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T06:15:12.607",
|
||||
"lastModified": "2024-04-29T06:15:12.607",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in 8theme XStore allows SQL Injection.This issue affects XStore: from n/a through 9.3.5.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/xstore/wordpress-xstore-theme-9-3-5-unauthenticated-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33562.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33562.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33562",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T06:15:13.163",
|
||||
"lastModified": "2024-04-29T06:15:13.163",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 8theme XStore allows Reflected XSS.This issue affects XStore: from n/a through 9.3.5.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/xstore/wordpress-xstore-theme-9-3-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33571.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33571.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33571",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T06:15:13.667",
|
||||
"lastModified": "2024-04-29T06:15:13.667",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Infomaniak Staff VOD Infomaniak allows Reflected XSS.This issue affects VOD Infomaniak: from n/a through 1.5.6.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/vod-infomaniak/wordpress-vod-infomaniak-plugin-1-5-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-336xx/CVE-2024-33630.json
Normal file
55
CVE-2024/CVE-2024-336xx/CVE-2024-33630.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33630",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T06:15:14.450",
|
||||
"lastModified": "2024-04-29T06:15:14.450",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Piotnet Piotnet Addons For Elementor allows Stored XSS.This issue affects Piotnet Addons For Elementor: from n/a through 2.4.26.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/piotnet-addons-for-elementor/wordpress-piotnet-addons-for-elementor-plugin-2-4-26-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-336xx/CVE-2024-33631.json
Normal file
55
CVE-2024/CVE-2024-336xx/CVE-2024-33631.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33631",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T06:15:14.940",
|
||||
"lastModified": "2024-04-29T06:15:14.940",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Piotnet Piotnet Addons For Elementor Pro allows Stored XSS.This issue affects Piotnet Addons For Elementor Pro: from n/a through 7.1.17.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/piotnet-addons-for-elementor-pro/wordpress-piotnet-addons-for-elementor-pro-plugin-7-1-17-authenticated-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-336xx/CVE-2024-33632.json
Normal file
55
CVE-2024/CVE-2024-336xx/CVE-2024-33632.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33632",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T06:15:15.537",
|
||||
"lastModified": "2024-04-29T06:15:15.537",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Piotnet Piotnet Addons For Elementor Pro.This issue affects Piotnet Addons For Elementor Pro: from n/a through 7.1.17.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/piotnet-addons-for-elementor-pro/wordpress-piotnet-addons-for-elementor-pro-plugin-7-1-17-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-336xx/CVE-2024-33681.json
Normal file
55
CVE-2024/CVE-2024-336xx/CVE-2024-33681.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33681",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T06:15:16.057",
|
||||
"lastModified": "2024-04-29T06:15:16.057",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Sandor Kovacs Regenerate post permalink allows Cross-Site Scripting (XSS).This issue affects Regenerate post permalink: from n/a through 1.0.3.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/regenerate-post-permalinks/wordpress-regenerate-post-permalink-plugin-1-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
79
CVE-2024/CVE-2024-336xx/CVE-2024-33686.json
Normal file
79
CVE-2024/CVE-2024-336xx/CVE-2024-33686.json
Normal file
@ -0,0 +1,79 @@
|
||||
{
|
||||
"id": "CVE-2024-33686",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T06:15:16.623",
|
||||
"lastModified": "2024-04-29T06:15:16.623",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Extend Themes Pathway, Extend Themes Hugo WP, Extend Themes Althea WP, Extend Themes Elevate WP, Extend Themes Brite, Extend Themes Colibri WP, Extend Themes Vertice.This issue affects Pathway: from n/a through 1.0.15; Hugo WP: from n/a through 1.0.8; Althea WP: from n/a through 1.0.13; Elevate WP: from n/a through 1.0.15; Brite: from n/a through 1.0.11; Colibri WP: from n/a through 1.0.94; Vertice: from n/a through 1.0.7.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/althea-wp/wordpress-althea-wp-theme-1-0-13-broken-access-control-vulnerability",
|
||||
"source": "audit@patchstack.com"
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/brite/wordpress-brite-theme-1-0-11-broken-access-control-vulnerability",
|
||||
"source": "audit@patchstack.com"
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/colibri-wp/wordpress-colibri-wp-theme-1-0-94-broken-access-control-vulnerability",
|
||||
"source": "audit@patchstack.com"
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/elevate-wp/wordpress-elevate-wp-theme-1-0-15-broken-access-control-vulnerability",
|
||||
"source": "audit@patchstack.com"
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/hugo-wp/wordpress-hugo-wp-theme-1-0-8-broken-access-control-vulnerability",
|
||||
"source": "audit@patchstack.com"
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/pathway/wordpress-pathway-theme-1-0-15-cross-site-request-forgery-csrf-vulnerability",
|
||||
"source": "audit@patchstack.com"
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/vertice/wordpress-vertice-theme-1-0-7-broken-access-control-vulnerability",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-339xx/CVE-2024-33904.json
Normal file
28
CVE-2024/CVE-2024-339xx/CVE-2024-33904.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-33904",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-29T06:15:17.320",
|
||||
"lastModified": "2024-04-29T06:15:17.320",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In plugins/HookSystem.cpp in Hyprland through 0.39.1 (before 28c8561), through a race condition, a local attacker can cause execution of arbitrary assembly code by writing to a predictable temporary file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/hyprwm/Hyprland/commit/28c85619243e6320e75d7abcfe8244fa99d054dd",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/hyprwm/Hyprland/issues/5787",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2024/04/28/3",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-339xx/CVE-2024-33905.json
Normal file
28
CVE-2024/CVE-2024-339xx/CVE-2024-33905.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-33905",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-29T06:15:17.667",
|
||||
"lastModified": "2024-04-29T06:15:17.667",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Telegram WebK before 2.0.0 (488), a crafted Mini Web App allows XSS via the postMessage web_app_open_link event type."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/morethanwords/tweb/commit/2153ea9878668769faac8dd5931b7e0b96a9f129/src/components/popups/webApp.ts",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://medium.com/%40pedbap/telegram-web-app-xss-session-hijacking-1-click-95acccdc8d90",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2024/04/28/4",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-43xx/CVE-2024-4302.json
Normal file
55
CVE-2024/CVE-2024-43xx/CVE-2024-4302.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-4302",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-04-29T06:15:17.803",
|
||||
"lastModified": "2024-04-29T06:15:17.803",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Super 8 Live Chat online customer service platform fails to properly filter user input, allowing unauthenticated remote attackers to insert JavaScript code into the chat box. When the message recipient views the message, they become susceptible to Cross-site Scripting (XSS) attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-7779-35562-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-43xx/CVE-2024-4303.json
Normal file
55
CVE-2024/CVE-2024-43xx/CVE-2024-4303.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-4303",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-04-29T06:15:18.457",
|
||||
"lastModified": "2024-04-29T06:15:18.457",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ArmorX Android APP's multi-factor authentication (MFA) for the login function is not properly implemented. Remote attackers who obtain user credentials can bypass MFA, allowing them to successfully log into the APP."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-7781-ef309-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
52
README.md
52
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-29T06:00:30.784700+00:00
|
||||
2024-04-29T08:00:38.345826+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-29T05:15:07.787000+00:00
|
||||
2024-04-29T07:15:08.740000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,34 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
247035
|
||||
247065
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `15`
|
||||
Recently added CVEs: `30`
|
||||
|
||||
- [CVE-2024-1874](CVE-2024/CVE-2024-18xx/CVE-2024-1874.json) (`2024-04-29T04:15:07.580`)
|
||||
- [CVE-2024-2756](CVE-2024/CVE-2024-27xx/CVE-2024-2756.json) (`2024-04-29T04:15:07.890`)
|
||||
- [CVE-2024-2757](CVE-2024/CVE-2024-27xx/CVE-2024-2757.json) (`2024-04-29T04:15:08.113`)
|
||||
- [CVE-2024-3096](CVE-2024/CVE-2024-30xx/CVE-2024-3096.json) (`2024-04-29T04:15:08.350`)
|
||||
- [CVE-2024-33339](CVE-2024/CVE-2024-333xx/CVE-2024-33339.json) (`2024-04-29T05:15:06.340`)
|
||||
- [CVE-2024-33633](CVE-2024/CVE-2024-336xx/CVE-2024-33633.json) (`2024-04-29T05:15:06.507`)
|
||||
- [CVE-2024-33640](CVE-2024/CVE-2024-336xx/CVE-2024-33640.json) (`2024-04-29T05:15:06.757`)
|
||||
- [CVE-2024-33643](CVE-2024/CVE-2024-336xx/CVE-2024-33643.json) (`2024-04-29T05:15:06.960`)
|
||||
- [CVE-2024-33645](CVE-2024/CVE-2024-336xx/CVE-2024-33645.json) (`2024-04-29T05:15:07.153`)
|
||||
- [CVE-2024-33646](CVE-2024/CVE-2024-336xx/CVE-2024-33646.json) (`2024-04-29T05:15:07.350`)
|
||||
- [CVE-2024-33648](CVE-2024/CVE-2024-336xx/CVE-2024-33648.json) (`2024-04-29T05:15:07.580`)
|
||||
- [CVE-2024-33649](CVE-2024/CVE-2024-336xx/CVE-2024-33649.json) (`2024-04-29T05:15:07.787`)
|
||||
- [CVE-2024-4299](CVE-2024/CVE-2024-42xx/CVE-2024-4299.json) (`2024-04-29T04:15:08.623`)
|
||||
- [CVE-2024-4300](CVE-2024/CVE-2024-43xx/CVE-2024-4300.json) (`2024-04-29T04:15:08.887`)
|
||||
- [CVE-2024-4301](CVE-2024/CVE-2024-43xx/CVE-2024-4301.json) (`2024-04-29T04:15:09.110`)
|
||||
- [CVE-2024-3193](CVE-2024/CVE-2024-31xx/CVE-2024-3193.json) (`2024-04-29T07:15:07.773`)
|
||||
- [CVE-2024-3194](CVE-2024/CVE-2024-31xx/CVE-2024-3194.json) (`2024-04-29T07:15:08.070`)
|
||||
- [CVE-2024-3195](CVE-2024/CVE-2024-31xx/CVE-2024-3195.json) (`2024-04-29T07:15:08.400`)
|
||||
- [CVE-2024-3196](CVE-2024/CVE-2024-31xx/CVE-2024-3196.json) (`2024-04-29T07:15:08.740`)
|
||||
- [CVE-2024-33537](CVE-2024/CVE-2024-335xx/CVE-2024-33537.json) (`2024-04-29T06:15:08.083`)
|
||||
- [CVE-2024-33539](CVE-2024/CVE-2024-335xx/CVE-2024-33539.json) (`2024-04-29T06:15:08.930`)
|
||||
- [CVE-2024-33540](CVE-2024/CVE-2024-335xx/CVE-2024-33540.json) (`2024-04-29T06:15:09.637`)
|
||||
- [CVE-2024-33542](CVE-2024/CVE-2024-335xx/CVE-2024-33542.json) (`2024-04-29T06:15:10.220`)
|
||||
- [CVE-2024-33544](CVE-2024/CVE-2024-335xx/CVE-2024-33544.json) (`2024-04-29T07:15:06.543`)
|
||||
- [CVE-2024-33546](CVE-2024/CVE-2024-335xx/CVE-2024-33546.json) (`2024-04-29T07:15:06.810`)
|
||||
- [CVE-2024-33548](CVE-2024/CVE-2024-335xx/CVE-2024-33548.json) (`2024-04-29T06:15:10.937`)
|
||||
- [CVE-2024-33551](CVE-2024/CVE-2024-335xx/CVE-2024-33551.json) (`2024-04-29T06:15:11.487`)
|
||||
- [CVE-2024-33554](CVE-2024/CVE-2024-335xx/CVE-2024-33554.json) (`2024-04-29T06:15:12.090`)
|
||||
- [CVE-2024-33559](CVE-2024/CVE-2024-335xx/CVE-2024-33559.json) (`2024-04-29T06:15:12.607`)
|
||||
- [CVE-2024-33562](CVE-2024/CVE-2024-335xx/CVE-2024-33562.json) (`2024-04-29T06:15:13.163`)
|
||||
- [CVE-2024-33571](CVE-2024/CVE-2024-335xx/CVE-2024-33571.json) (`2024-04-29T06:15:13.667`)
|
||||
- [CVE-2024-33630](CVE-2024/CVE-2024-336xx/CVE-2024-33630.json) (`2024-04-29T06:15:14.450`)
|
||||
- [CVE-2024-33631](CVE-2024/CVE-2024-336xx/CVE-2024-33631.json) (`2024-04-29T06:15:14.940`)
|
||||
- [CVE-2024-33632](CVE-2024/CVE-2024-336xx/CVE-2024-33632.json) (`2024-04-29T06:15:15.537`)
|
||||
- [CVE-2024-33681](CVE-2024/CVE-2024-336xx/CVE-2024-33681.json) (`2024-04-29T06:15:16.057`)
|
||||
- [CVE-2024-33686](CVE-2024/CVE-2024-336xx/CVE-2024-33686.json) (`2024-04-29T06:15:16.623`)
|
||||
- [CVE-2024-33904](CVE-2024/CVE-2024-339xx/CVE-2024-33904.json) (`2024-04-29T06:15:17.320`)
|
||||
- [CVE-2024-33905](CVE-2024/CVE-2024-339xx/CVE-2024-33905.json) (`2024-04-29T06:15:17.667`)
|
||||
- [CVE-2024-4302](CVE-2024/CVE-2024-43xx/CVE-2024-4302.json) (`2024-04-29T06:15:17.803`)
|
||||
- [CVE-2024-4303](CVE-2024/CVE-2024-43xx/CVE-2024-4303.json) (`2024-04-29T06:15:18.457`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
- [CVE-2024-1023](CVE-2024/CVE-2024-10xx/CVE-2024-1023.json) (`2024-04-29T07:15:06.233`)
|
||||
- [CVE-2024-1300](CVE-2024/CVE-2024-13xx/CVE-2024-1300.json) (`2024-04-29T07:15:06.423`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
64
_state.csv
64
_state.csv
@ -236717,6 +236717,7 @@ CVE-2023-52716,0,0,fac095701883d01d5f92e56c70701dc066b3ae8f92d0c5921c5cf0aa2fbb0
|
||||
CVE-2023-52717,0,0,e713315d9fcc50e6cbb98e0dd380e2c86ba52b63a35d352b23f2645ee0f83a24,2024-04-08T18:48:40.217000
|
||||
CVE-2023-5272,0,0,e188ff056a72e73c412c109b97d5eb37c41b2dbce71d285e9dfeb205fc3a7064,2024-04-11T01:22:56.733000
|
||||
CVE-2023-52722,0,0,58a4dacfed06269af66d591e2c90392281dec137a91dd3653eb193059da1f3b7,2024-04-28T00:15:07.270000
|
||||
CVE-2023-52723,1,1,d4be2feca33226ddfe4838f7958d61e46f837250fa1c183dc1e9ed285ea7ec65,2024-04-29T06:15:06.983000
|
||||
CVE-2023-5273,0,0,6f05c674078315237abe3d7b2ebcc88fea13416a5c7e4aafdfcff23a1ae8a322,2024-04-11T01:22:56.817000
|
||||
CVE-2023-5274,0,0,230ef4c0e160801f289163632d814f7177c2b1395a715b72f33c8d0b5d876249,2023-12-05T18:20:39.937000
|
||||
CVE-2023-5275,0,0,9a81436027e8dad0b67eefc484a675cc6dfdf47ffb7247993749a2124145a13c,2023-12-05T18:18:37.050000
|
||||
@ -239232,7 +239233,7 @@ CVE-2024-1019,0,0,27c6fed97db80e9684966512d657c2ae1b8d86be0f46f2f894fd714e51d0d5
|
||||
CVE-2024-1020,0,0,adc5ab5f2da8e36fe7b7aa7c315c830611f48798a94b22d42b050e3e9e630362,2024-04-11T01:24:18.170000
|
||||
CVE-2024-1021,0,0,7bcf34eb76307cde4ae64d588874bf57854c5c64505f94e3349469a346a9c6cb,2024-04-11T01:24:18.257000
|
||||
CVE-2024-1022,0,0,357efb4939784b3bedb659f15a28d0e47d08529e441db0e0be00cbc23a0198b9,2024-04-11T01:24:18.350000
|
||||
CVE-2024-1023,0,0,68bde2f3580eb45ab5d6f3ebb52c2d06f8d25be5075193a68e136d0ef3abff5b,2024-04-09T12:15:07.627000
|
||||
CVE-2024-1023,0,1,f385656c92a71370efff252bd7c129136dc520292043427aaca7a2375a03c816,2024-04-29T07:15:06.233000
|
||||
CVE-2024-1024,0,0,85149b221a8921f7ffbd9c6aa85a2dfcc208fc0fbfab7fd4f41d63975d68c1d5,2024-04-11T01:24:18.463000
|
||||
CVE-2024-1026,0,0,ce9d6ecfc0c397ada0ff1130145169bc08739645437cccf4be1ae651761bfb1b,2024-04-11T01:24:18.550000
|
||||
CVE-2024-1027,0,0,ee916bdd4519e7da0384e34a5415b2bb4d3bac5a3382b229877ac74923e86538,2024-04-11T01:24:18.637000
|
||||
@ -239467,7 +239468,7 @@ CVE-2024-1294,0,0,1a6fde55ee17952393d258a28e1938bfe41cafec05fa305cc82057814b7c2b
|
||||
CVE-2024-1296,0,0,ab648d9dba58ca530bb990b50d92c4f5ce9f591faa8fbeeb49385095b8425c33,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1297,0,0,1fc219bb038ab422185a999365115aff94759fe3e5ff94e3dc4180f1d6bc82d0,2024-02-20T19:50:53.960000
|
||||
CVE-2024-1299,0,0,165a6e5bf7396c9871edb84a6ce28d3386b33fd34eb9238065e890fa150a178a,2024-03-07T13:52:27.110000
|
||||
CVE-2024-1300,0,0,aa2a037719c40df60b2d9bb001f22a8670a4e72a55eb304c0d1c9297e35e3cf2,2024-04-18T17:15:48.453000
|
||||
CVE-2024-1300,0,1,0d670db12603e944dcc15b5481ece919335822514a418179c496d8822134bd6f,2024-04-29T07:15:06.423000
|
||||
CVE-2024-1301,0,0,68d5e322fab21220735382791ea9287e8104e954fa5bc7b1f8f02021f25e280b,2024-03-12T17:46:17.273000
|
||||
CVE-2024-1302,0,0,e42b35f7a02693024fada8fec8e812444e0bb721c54c537bf6c1b8db8c60ce66,2024-03-12T17:46:17.273000
|
||||
CVE-2024-1303,0,0,d6386ac67e1b3bd9c657849a1747229ab86034b9c989d20fb5cde0be8bba0359,2024-03-12T17:46:17.273000
|
||||
@ -239914,7 +239915,7 @@ CVE-2024-1869,0,0,ac853c90604d921515fb75a7a9d547bf372e5cec01a80f310b2670cc5a1922
|
||||
CVE-2024-1870,0,0,f4fb5b22985880167f6ef7e58ca026ed8b40cb096cd98407286dd4dcc1e6fab1,2024-03-11T01:32:29.610000
|
||||
CVE-2024-1871,0,0,6877313e5f635cc9e371a87a23e72e35f6ea815c7cde96f594cb922c016078f3,2024-04-11T01:24:32.670000
|
||||
CVE-2024-1872,0,0,0e36724fd278d3b5ba1bf1780a959b96e873b9d84e6ffb5da1fec563cf60ff60,2024-03-29T12:45:02.937000
|
||||
CVE-2024-1874,1,1,c541480f66d6871bd0e93a0dd6d4352ded246839add06e9279e08848b18bd851,2024-04-29T04:15:07.580000
|
||||
CVE-2024-1874,0,0,c541480f66d6871bd0e93a0dd6d4352ded246839add06e9279e08848b18bd851,2024-04-29T04:15:07.580000
|
||||
CVE-2024-1875,0,0,9510fe1472f0e028cce1eebf549e2390cdd0035aa50e364b7cc2151cc18bf7f8,2024-04-11T01:24:32.760000
|
||||
CVE-2024-1876,0,0,7c1afc4b20753dec3d27b0c65fd66be5316aaad306a5323949b6752cbc5cfcdc,2024-04-11T01:24:32.843000
|
||||
CVE-2024-1877,0,0,21c85e8ce951a56623918f35f9c0cbb9b3582dedf7e76a569b3f5e520d1d0387,2024-04-11T01:24:32.927000
|
||||
@ -239937,6 +239938,7 @@ CVE-2024-1900,0,0,df3a7e0d7f662e0642af797e67801f5b993e667e914107fd3f604cd2322f2a
|
||||
CVE-2024-1901,0,0,e852d825cede13009c4c827235fab136069de3983ba4df012d62632a4fcd1d38,2024-03-06T15:18:08.093000
|
||||
CVE-2024-1902,0,0,012f8c6561b23779499ee60e1b0701a7ed975d80b89eade3a28f94f4708254ec,2024-04-15T18:15:10.070000
|
||||
CVE-2024-1904,0,0,894e214d09f8efe1b9b69452204531788406056d1489422306bbd393d57cb47d,2024-04-10T13:23:38.787000
|
||||
CVE-2024-1905,1,1,99fc2a264209d40d17540b1f82384a2b60d6e4fdfef05f9a479a7d2dc908eb8d,2024-04-29T06:15:07.650000
|
||||
CVE-2024-1906,0,0,4a0389164694374915846934d3ecd021a9b146d80ff266286dcad5a6eeb2c849,2024-02-27T14:19:41.650000
|
||||
CVE-2024-1907,0,0,674a8f990612fbd789e8b29e4f4db555efa2966321d7535d44b4ff9d82432ec5,2024-02-27T14:19:41.650000
|
||||
CVE-2024-1908,0,0,92bf17210112d2d60d7d442f37608315d845944e26306753d826ae8aa1a4dd43,2024-03-21T12:58:51.093000
|
||||
@ -242599,6 +242601,7 @@ CVE-2024-25030,0,0,fc3de3fd573e21787e1c0bdd960fb3a4c590b360d40ba7c7d9e34380b9c90
|
||||
CVE-2024-2504,0,0,b952b345d554f248180cfc37dd33de3d29aef92bb40f82f2454b4ee2e2c1523d,2024-04-10T13:23:38.787000
|
||||
CVE-2024-25046,0,0,64b67efbc5b2947bdef146aee983b6003b7daa23659b2bfe93519b90947330ac,2024-04-03T17:24:18.150000
|
||||
CVE-2024-25048,0,0,f98b5f829311c9c9a726d02cd66b8a93a4755ae4aa235bf4cd2af7701d9667d0,2024-04-27T12:15:10.517000
|
||||
CVE-2024-2505,1,1,52f7b4fb73939784ef566f22fc7864f65f01228d17a754b7b6510c54c8095deb,2024-04-29T06:15:07.937000
|
||||
CVE-2024-25050,0,0,1ff20d693c75735252bb078c1b9df844137fdb7eca3fe844e495a58addd9c2a1,2024-04-28T13:15:08.257000
|
||||
CVE-2024-25062,0,0,9596ed5cf07a8bc8469d4afc28fc727a431af7cff3b6b8e84435c301d9955756,2024-02-13T00:40:40.503000
|
||||
CVE-2024-25063,0,0,ada8a3e76748f7f6ba8d6378c081423ac8f962f095964d00e876ad6b7009736e,2024-03-04T22:45:02.117000
|
||||
@ -244046,7 +244049,7 @@ CVE-2024-27537,0,0,19c23a8ace2b9fa0f5b0c7f5ae887d2217327b1705c43697ebd005f0fa005
|
||||
CVE-2024-2754,0,0,1fcd4415dd3a76ae4bfdcbebc23b2eb9c440a110a989dd99eeab14538d1df9f4,2024-04-11T01:25:35.173000
|
||||
CVE-2024-27558,0,0,7153680518d63c7932305620ccfbd7ee5fef9d259b5e0f563f6375bef36d085e,2024-03-01T22:22:25.913000
|
||||
CVE-2024-27559,0,0,df9ea8940256beed3a439c54dc14f3a2ff3269b9257ecf55b0d7cb1c085a0238,2024-03-01T22:22:25.913000
|
||||
CVE-2024-2756,1,1,5463ce6d0e21b44338dcc1e991e0d0bd20cc1ad2f08e590845375bd092842af6,2024-04-29T04:15:07.890000
|
||||
CVE-2024-2756,0,0,5463ce6d0e21b44338dcc1e991e0d0bd20cc1ad2f08e590845375bd092842af6,2024-04-29T04:15:07.890000
|
||||
CVE-2024-27561,0,0,6eefe1444b42138366028087602d71a400d94cfb2285aea30a4a52e3e99f8491,2024-03-05T18:50:18.333000
|
||||
CVE-2024-27563,0,0,c70b4ac1004b8f01005bd67665b89f1a49dcd8b48b0e020f5d345a7e89fd281c,2024-03-05T18:50:18.333000
|
||||
CVE-2024-27564,0,0,cfbb7ee5af0b2da089da0b8003ae338a360a5aa7de72516445a54c273e06a2cc,2024-03-05T18:50:18.333000
|
||||
@ -244054,7 +244057,7 @@ CVE-2024-27565,0,0,96e6f13815f4c6a293b19a63ca7a0089b2c54f0432c50f30c4cd3de5a637e
|
||||
CVE-2024-27567,0,0,4368e6c3c29630571d47ba92cf82bb82637985666e0ed1ee7f11385613c02512,2024-03-01T15:23:36.177000
|
||||
CVE-2024-27568,0,0,323797eb146837ccc897ceddbc9a717a6133487b17fde4d619016ddccf714199,2024-03-01T15:23:36.177000
|
||||
CVE-2024-27569,0,0,000ff88e8ff4678a3790d0ee96674581a9a53afd1b5f0d49033b717c5dd656d1,2024-03-01T15:23:36.177000
|
||||
CVE-2024-2757,1,1,1fc026d8280c4289387fb466b206daaa73f3535e36a232a419e0350231b29c46,2024-04-29T04:15:08.113000
|
||||
CVE-2024-2757,0,0,1fc026d8280c4289387fb466b206daaa73f3535e36a232a419e0350231b29c46,2024-04-29T04:15:08.113000
|
||||
CVE-2024-27570,0,0,30e1bdadd931878127199d0565523cd94923921178695ba62d569ae38e48386b,2024-03-01T15:23:36.177000
|
||||
CVE-2024-27571,0,0,2fcce61cb867ec2a650e4bd74e7018e990625a473882c12953648f5c8c2545b3,2024-03-01T15:23:36.177000
|
||||
CVE-2024-27572,0,0,6169a6a6221da5c6dbb1556f7b45e6b45c4deebae5e21607b1e3cfa478f1fe5b,2024-03-01T15:23:36.177000
|
||||
@ -245714,7 +245717,7 @@ CVE-2024-30950,0,0,992550aa16b7b69040c27b7eadb42b4babd9ce9c185610db0008bbada9865
|
||||
CVE-2024-30951,0,0,64c319e5130efe1148872b6efd54e0b74d19e18724bc83608b600a523ab1d0cb,2024-04-17T20:08:21.887000
|
||||
CVE-2024-30952,0,0,45f3818300706503aa11d9788e132ab06eaeaa5db69128a0c2116be2f61adacf,2024-04-17T15:31:50.160000
|
||||
CVE-2024-30953,0,0,b6048a3223dd71969afb665512f3c96be52d96e721358fb67ff9cf9a8128e438,2024-04-17T20:08:21.887000
|
||||
CVE-2024-3096,1,1,c93255ea67adad2bffdf60492111e523c8c547b098778e9ed06d95762d14d3bb,2024-04-29T04:15:08.350000
|
||||
CVE-2024-3096,0,0,c93255ea67adad2bffdf60492111e523c8c547b098778e9ed06d95762d14d3bb,2024-04-29T04:15:08.350000
|
||||
CVE-2024-30965,0,0,0e44dd5d951a25ac3e8873a32678a3145da47d1060cb5312576a9c0471b643ad,2024-04-02T18:12:16.283000
|
||||
CVE-2024-3097,0,0,34b222095b4c58e8686826c73c47f391fd247710053df9aaf322e019da7a6c42,2024-04-26T15:56:40.820000
|
||||
CVE-2024-30974,0,0,fad1ff421513e997a755a646f437b1cf2946e8e72ed4701dccf29e92d3c1baae,2024-04-22T13:28:50.310000
|
||||
@ -246085,6 +246088,8 @@ CVE-2024-31873,0,0,30397559953deb34a9ae192149473632dc6b2334245e920787a4c5e14fc76
|
||||
CVE-2024-31874,0,0,1770e58d0ae5591eb931a8cdfdb054fb4d854f81849d14af250c71db6caf553c,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3188,0,0,5d70d4884e37e1862c5503e8662fdd8be316d1df7ecad77f44114699c1426b8a,2024-04-26T12:58:17.720000
|
||||
CVE-2024-31887,0,0,e951c215b0e12b882bcc7244c98d7631ee4f4b7a3271b5f24e369f1a635cd3e5,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3191,1,1,909de57a0e1134c017815b99f5374905a7cebaa6da948da4a489799e7c96ecfa,2024-04-29T07:15:07.080000
|
||||
CVE-2024-3192,1,1,725dda67edbc96beb58e8c0c2444a458c6950abc195edff7ad4f85d511813766,2024-04-29T07:15:07.480000
|
||||
CVE-2024-31920,0,0,3c0045dbbecad7d78d5b9eb044589c2fc290e421e2d5accb9391890092efc90f,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31921,0,0,732b3dfcff7f3c38928ece374bd7708cd93eb00a4dc0a7d5ac8e2f115b9d7217,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31922,0,0,ab7058b1ab970c1607707e3b516fb20a2b1bb9e11ac7a3e1d4bef18b1ec4d6b7,2024-04-15T13:15:31.997000
|
||||
@ -246095,6 +246100,7 @@ CVE-2024-31926,0,0,5ea07bd781aaf165e7c249d84898bbaee298d70cc8e541e3b74d17ae8e2ec
|
||||
CVE-2024-31927,0,0,6cd17f97d47f2415c03c97ad66e9324a16977292b8eb97b821aae9ba7a0f2833,2024-04-11T13:30:38
|
||||
CVE-2024-31928,0,0,e6cc120c3629d81f3db9dcadc93c459e7b269490e6128fcc8be3997c3ef595e9,2024-04-11T13:30:38
|
||||
CVE-2024-31929,0,0,5359df4522faa8d2c46f605d48868a6939d06d35e038e5f3287851d0461688a3,2024-04-11T13:30:38
|
||||
CVE-2024-3193,1,1,ea73d12bc10265a58216dce72c432ee965205457c358de1f1b4800cf51e18cca,2024-04-29T07:15:07.773000
|
||||
CVE-2024-31930,0,0,628cb0e5103582aeccc9f3e33331b9dbe7dba70b3951389bc2f9327ad3b8f5ee,2024-04-11T13:30:38
|
||||
CVE-2024-31931,0,0,31bc6de522002d5fbdfc52e575ea088ef3d3fde1fc3f2ee4856692982b9dc2cf,2024-04-11T13:30:38
|
||||
CVE-2024-31932,0,0,cbdc79dc2f64dd5bef9877c31b5d39549faf66977f5313958012ec22e616327c,2024-04-11T13:30:38
|
||||
@ -246105,6 +246111,7 @@ CVE-2024-31936,0,0,41ae8d4679677e086c385533d0a63055153ebb271d32fb7547401292a6a57
|
||||
CVE-2024-31937,0,0,24fb14fc8c636ca322e17128cc4ef69cbdba60a9f579b74e55aed300a2f73ed6,2024-04-11T13:30:38
|
||||
CVE-2024-31938,0,0,5f3f05f61d1ef2cd5bad53d9f5667002cb10342b194111eed40f5ded72653f03,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31939,0,0,dc9cc0dfd8ae0f6c4caa1a4775b1cc86559b00f81c6408b5f2a51c57007b5d9e,2024-04-11T12:47:44.137000
|
||||
CVE-2024-3194,1,1,d329211d83b0115ad0b19eeb5be2a89ccbb6bafb933feb45b5e8a49d955922d1,2024-04-29T07:15:08.070000
|
||||
CVE-2024-31940,0,0,1ddf48c04277bac2492208785102f32503356b7d59b7891c524b2c22b8846edb,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31941,0,0,b8dc065fda42126e32d28a44ef547549a83996a827e764074359d3e3ec8c1e09,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31942,0,0,ceae4b513a0b6e905236b05cb5dd98d07a79c0420729857e9c51c87c35b65b17,2024-04-15T13:15:31.997000
|
||||
@ -246112,8 +246119,10 @@ CVE-2024-31943,0,0,d050ed16bd2fd56e0b74cc5712c1eb7ef94538d6cfa9c00022a6cfa048bd2
|
||||
CVE-2024-31944,0,0,d1cf01bee95ac2d1b4f198f30f665ce7f3dae041b6378dd5d37f86b95341e18f,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31948,0,0,61f6d35222c1e3f11e25e4eb10990c24f6ea2b07724ec51b46fb0ba4b709b0cc,2024-04-28T07:15:08.843000
|
||||
CVE-2024-31949,0,0,d55253e38f8bc425df8f875d525d4d6b96cb3180b7d665ec7de9778e227e2105,2024-04-28T07:15:08.917000
|
||||
CVE-2024-3195,1,1,6d60776e21ae5e9a12630c8927b26ba77fa690068c68c10ca942d3c06a3f5897,2024-04-29T07:15:08.400000
|
||||
CVE-2024-31950,0,0,6cefb0ca8246a802eee33ecaeabf30a3794c53c92173f69e19945e3bf38104d7,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31951,0,0,a02cb6e83819b8aefe87f14fcbaf10a3986c9b6174676e08f67eb54fe256f190,2024-04-08T18:48:40.217000
|
||||
CVE-2024-3196,1,1,ddedfe5cfa69a5a0e563bb0daac4e7b058b56096294d5609b3943dc244d20005,2024-04-29T07:15:08.740000
|
||||
CVE-2024-31978,0,0,905fe24a9cf546b211ed3cfae7258dc772856eb0550beb1f55c95bc3799601d2,2024-04-09T12:48:04.090000
|
||||
CVE-2024-31981,0,0,6b90fc014c719d42bc6275e095b2e18dc9d544859b6ab5a3b554ecb5ab03a845,2024-04-11T12:47:44.137000
|
||||
CVE-2024-31982,0,0,8e15c1dad7e15762a1fbb5bb26c4de9afb40b54c1e4ad12ab123edd90435cd54,2024-04-11T12:47:44.137000
|
||||
@ -246612,7 +246621,7 @@ CVE-2024-33259,0,0,7baedb8a8dc783fa88b887fd5c3c1eaf3e0afda0857f326c9372530e2281b
|
||||
CVE-2024-33260,0,0,e8aa0d878f3a05d87e2a04d2b95090816ce2a8144679e05279a245ccba53bc96,2024-04-26T15:32:22.523000
|
||||
CVE-2024-3333,0,0,8caee5b26018a8a7a4f06ec5d64d35dd731cf8d2f43a25885f4e67db044a1bff,2024-04-17T12:48:07.510000
|
||||
CVE-2024-33331,0,0,d376453cc8c649ab7a3cb33fa711c6bde798d37e4f57b1f2e9caeddda1eec751,2024-04-28T23:15:07.120000
|
||||
CVE-2024-33339,1,1,1af2e0249bed8750531b95be13d2086bbc874a9cb43e2918f6202dbfdd9b1a67,2024-04-29T05:15:06.340000
|
||||
CVE-2024-33339,0,0,1af2e0249bed8750531b95be13d2086bbc874a9cb43e2918f6202dbfdd9b1a67,2024-04-29T05:15:06.340000
|
||||
CVE-2024-33342,0,0,4ff11c7e369d836ce7a1244b0b48afc72b8090af879823bb663cc593e2824dbc,2024-04-26T19:59:19.793000
|
||||
CVE-2024-33343,0,0,17e1971be9c2ae8ba52a2cc25de4ae4286a5a8f05a2fb81a46885d3dfd33cb1b,2024-04-26T19:59:19.793000
|
||||
CVE-2024-33344,0,0,f74e33f11e6670462bc5b65f54260ae5e05e3409e05b053682376a20da3d6d34,2024-04-26T19:59:19.793000
|
||||
@ -246628,10 +246637,22 @@ CVE-2024-3351,0,0,4e83ab506e7228a3886d0c35bd4699b3cc13e079b52b9390280e70733aeb1d
|
||||
CVE-2024-3352,0,0,2bb858a13268847c6f0639e9c58251e5b0608c0fcc2f637338ed79183e654688,2024-04-11T01:25:59.117000
|
||||
CVE-2024-3353,0,0,a43304c0c957cee30ec6a0fe5705b568475f27f66d5199c2166f449cd8eb908f,2024-04-11T01:25:59.200000
|
||||
CVE-2024-33531,0,0,71e7e7c369e07333ae7410b9238493e0b8e5a70255296aafd8bfae114b6e76d5,2024-04-24T13:39:42.883000
|
||||
CVE-2024-33537,1,1,1abcca94500cff61689bc299259daf6c77965db351f4065549770837c6336670,2024-04-29T06:15:08.083000
|
||||
CVE-2024-33539,1,1,8f41542e5f77851d2f4faa8d70582127978bd07484561d364c44db3eb5ca61fd,2024-04-29T06:15:08.930000
|
||||
CVE-2024-3354,0,0,4a4ea1b685e77f1329c6119be3c557bd8627ab8e6e7bcdf524dde072c4485f2b,2024-04-11T01:25:59.280000
|
||||
CVE-2024-33540,1,1,747a115e4ae2ca6e4d30057a4f7d7e64e2b02e1bc21f016e186f3ec5a7c4cbee,2024-04-29T06:15:09.637000
|
||||
CVE-2024-33542,1,1,c46844096e18c90d4389e00877bdc86b55250f44e249077d028e212eff872075,2024-04-29T06:15:10.220000
|
||||
CVE-2024-33544,1,1,1466a86d502d8d54ff1b9a60222a92956c868d95a390bd0d2b95b1d73fa6edf0,2024-04-29T07:15:06.543000
|
||||
CVE-2024-33546,1,1,3ef102e69d02cbc32fbb5297ea63418695ffc6bd67887340158d2086fadabd61,2024-04-29T07:15:06.810000
|
||||
CVE-2024-33548,1,1,f1884ac10132cc8231eb6aaac64ad6b1e7a3129e60b9c76432db676e6c17cc0b,2024-04-29T06:15:10.937000
|
||||
CVE-2024-3355,0,0,1992313db0de37cd343f2e0c4d60ca5be53ec7c18d85010c791b43a1a0033536,2024-04-11T01:25:59.360000
|
||||
CVE-2024-33551,1,1,48cbe7358b0d6b0348a8420e63ce1222decf42609ef0aa9cdee85f45dc0831b8,2024-04-29T06:15:11.487000
|
||||
CVE-2024-33554,1,1,44f60587812c323490409e830f796cfbd35a235319f7237d253181849d9ed8df,2024-04-29T06:15:12.090000
|
||||
CVE-2024-33559,1,1,948fdd92ac3165b98a9a3e7d7bdf15d3f487bac4b7adfad2a4fb49bd7435a7e9,2024-04-29T06:15:12.607000
|
||||
CVE-2024-3356,0,0,087254ad27ba51e796f585bd19b7860bdf92d5d8812be46839c2000c6ff7ec4e,2024-04-11T01:25:59.443000
|
||||
CVE-2024-33562,1,1,ba9f8f690ca4d53bf11bc838f8b9a916ae70cc6d375248da36a8a28d84f314fd,2024-04-29T06:15:13.163000
|
||||
CVE-2024-3357,0,0,4504c33b3bb653378795a255a83c05295c4cb93d37914e6c8a1edf8397686b85,2024-04-11T01:25:59.530000
|
||||
CVE-2024-33571,1,1,32fa1280ecb5787c1681505d41e97480c3bdfd2dc281b5a45dc4061c57561d00,2024-04-29T06:15:13.667000
|
||||
CVE-2024-3358,0,0,694a0960c89fb254bc37c7c2f594e5cb197e9c3b955cd9433f44c414aff75d2b,2024-04-11T01:25:59.610000
|
||||
CVE-2024-3359,0,0,a779b2e33399e3789113d39f065b1425ad824801b217abc54417c2cce7e7d2db,2024-04-11T01:25:59.687000
|
||||
CVE-2024-33592,0,0,db5c0b056d9b2b7db6cca903286bba2d07a26aaa9035eb96ef4301de432670e3,2024-04-25T17:25:05.903000
|
||||
@ -246640,17 +246661,20 @@ CVE-2024-3360,0,0,2ffbaa301c04a2d62013f221bb69a21a0f4034a97959f93c6ac130d96a9162
|
||||
CVE-2024-3361,0,0,c120caf4947180a69c26140d9354a0af916b072bcc15573944dc923bbf223f7d,2024-04-11T01:25:59.847000
|
||||
CVE-2024-3362,0,0,4f698660b915c64322658e8738d0fb3f09460cf98fd487b3189e8f9d96e2b2c1,2024-04-11T01:25:59.930000
|
||||
CVE-2024-3363,0,0,f5bcc8af5a66d22a73abe7e86b636154362f284983c790b03385b20aa4737ceb,2024-04-11T01:26:00.010000
|
||||
CVE-2024-33633,1,1,14ae8b34b1aba55606c0bcadc7809f885230f727e35d21246f86a6c94ca95b9f,2024-04-29T05:15:06.507000
|
||||
CVE-2024-33630,1,1,d429997353148ad4f03de5fcc4c3beaa034ad03ad4bb2b1118cf25cea4d32b29,2024-04-29T06:15:14.450000
|
||||
CVE-2024-33631,1,1,c9134f1e88711f8a04a135872712a121867f709063e57f4fb1d965c1ed67f734,2024-04-29T06:15:14.940000
|
||||
CVE-2024-33632,1,1,f4f40947da0388a7ccb639f255eb9d8f044af737b4c70d0121643974544be28d,2024-04-29T06:15:15.537000
|
||||
CVE-2024-33633,0,0,14ae8b34b1aba55606c0bcadc7809f885230f727e35d21246f86a6c94ca95b9f,2024-04-29T05:15:06.507000
|
||||
CVE-2024-33638,0,0,3427361ab991422b101cc37f7607a376f6587ef09d6fc7a47e3613da65e0631b,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33639,0,0,c46b4523c8f0d554545e91766a68c1aa539c722a582823f8a257dc980bedbf11,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3364,0,0,2986dc00429f74e0e2572cb8153933c26e825f7eed092370bca7e4ac84ee4fdf,2024-04-11T01:26:00.090000
|
||||
CVE-2024-33640,1,1,569f42cf53adfed99d6bea04072e40faa2e5188d736f2609872b6d759c9e31ac,2024-04-29T05:15:06.757000
|
||||
CVE-2024-33640,0,0,569f42cf53adfed99d6bea04072e40faa2e5188d736f2609872b6d759c9e31ac,2024-04-29T05:15:06.757000
|
||||
CVE-2024-33642,0,0,7569707402e488c170fb19233ca774daa51c8f856e1cd5f3428c5b203d123531,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33643,1,1,0ff6c747729a96b60f6ad504f202ccec54992f8c5c6e4d4ffb32ec39b77ce94a,2024-04-29T05:15:06.960000
|
||||
CVE-2024-33645,1,1,85d2eafbf303b88d1d1d02964653d2fa337d6e4277b033b67c0b7e23c7278b7a,2024-04-29T05:15:07.153000
|
||||
CVE-2024-33646,1,1,ea7d4b106bf97e4a36f40d68153e29cb44df509ec470f0b72a5b82ef6fccb9e8,2024-04-29T05:15:07.350000
|
||||
CVE-2024-33648,1,1,73a31fda23738297aada9438e1f4a0d12d8e695d95a654278ed854d08f287a70,2024-04-29T05:15:07.580000
|
||||
CVE-2024-33649,1,1,76be47f9e9623693c2dc4f7dbd7700f237602a11cf08c5a162589622dee41d45,2024-04-29T05:15:07.787000
|
||||
CVE-2024-33643,0,0,0ff6c747729a96b60f6ad504f202ccec54992f8c5c6e4d4ffb32ec39b77ce94a,2024-04-29T05:15:06.960000
|
||||
CVE-2024-33645,0,0,85d2eafbf303b88d1d1d02964653d2fa337d6e4277b033b67c0b7e23c7278b7a,2024-04-29T05:15:07.153000
|
||||
CVE-2024-33646,0,0,ea7d4b106bf97e4a36f40d68153e29cb44df509ec470f0b72a5b82ef6fccb9e8,2024-04-29T05:15:07.350000
|
||||
CVE-2024-33648,0,0,73a31fda23738297aada9438e1f4a0d12d8e695d95a654278ed854d08f287a70,2024-04-29T05:15:07.580000
|
||||
CVE-2024-33649,0,0,76be47f9e9623693c2dc4f7dbd7700f237602a11cf08c5a162589622dee41d45,2024-04-29T05:15:07.787000
|
||||
CVE-2024-3365,0,0,64a2e531185071bb7e6b7a9cf067546b0c6c5f700f703a6639ecd4e081a3dcb7,2024-04-11T01:26:00.170000
|
||||
CVE-2024-33650,0,0,19d8d8a0b27cf4dde85e5f92d8bf04c572aaff417d777c3294978343c2e4f677,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33651,0,0,1cefad65f2bec7e29ec0f3af20b45cba9167a66152171d6da2043875d9e6dcf1,2024-04-26T12:58:17.720000
|
||||
@ -246672,8 +246696,10 @@ CVE-2024-33677,0,0,923eddda39cd03a5bb517e05a480a9596b3c6c82a0ed2f89c09750c19ea74
|
||||
CVE-2024-33678,0,0,e29c82afa965b755a6e3188aace0a357ae40d5fe9b52b7f7177043f7792e9dd7,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33679,0,0,f84e540fe859a7afe5f4ff76589343075f3d0bdf8c9cff62c28aa7a3f40455e2,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33680,0,0,0b464bc2ce373b95fed587888415ba32213dd9ce01298ab4cd8f52af9d530aea,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33681,1,1,548950ce0064cdd92a907d7ce32bf554f4a3c02c1609223f9d1197b4fd07d45c,2024-04-29T06:15:16.057000
|
||||
CVE-2024-33682,0,0,2077d9f86dbcd7afb58135718cb00b93d9684082b8213c0215eee7a02c222543,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33683,0,0,d7c4bf8bbdd8bd3ca6f26bbf7a4bf0688b7570f813369db65ed2d59e99a11ae9,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33686,1,1,cb11bce9d4222859e78a22a350bf0fbd12a312d0c6cee087f3196d5cf87e6c79,2024-04-29T06:15:16.623000
|
||||
CVE-2024-33688,0,0,15c623ea6d0e85e99afd20753787faa07eb45674316852700f3732b9713c4938,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33689,0,0,9a3d372175f3eea45d33e57473572a2b8c9a57d63f47cd918b323f42ce5db301,2024-04-26T15:32:22.523000
|
||||
CVE-2024-3369,0,0,943fbc9826beb11428b980e60e48ec152ecf5fda97b5d1c26bb0e96c030079eb,2024-04-11T01:26:00.317000
|
||||
@ -246701,6 +246727,8 @@ CVE-2024-33883,0,0,3b17b48394bf62744fbd468bf457ba6f01138ca86f08a667646ea9846d188
|
||||
CVE-2024-33891,0,0,4d067bbdb453306352bedaf699cdd4319a93f8f140e1ffcfce72980a6fa91b2e,2024-04-28T23:15:07.200000
|
||||
CVE-2024-33899,0,0,83c5c675381e020685b43fd536d5112506568fc46560c71323f3b12b51ed8097,2024-04-29T00:15:07.773000
|
||||
CVE-2024-33903,0,0,d96c3db96f0e438997e300c2112a3a0d050aa12880229d964d5b557d89ba9aa1,2024-04-29T01:15:09.600000
|
||||
CVE-2024-33904,1,1,f1065144aff1f3a07dac950b2bff4e0d7bebc724ec8bb15e6e11e7eef4705f37,2024-04-29T06:15:17.320000
|
||||
CVE-2024-33905,1,1,5f8214ca78ea0daa3bd7aaf864c15a416c36c5d929bc1d8c2eeecabcee92677e,2024-04-29T06:15:17.667000
|
||||
CVE-2024-3400,0,0,5bb68c1f741d7492d6e3e08b6f1711eb6e28a4a827bd2f3f354ccd1b7a47a1fe,2024-04-23T19:57:25.207000
|
||||
CVE-2024-3413,0,0,7c0263f5aa26015f580f259b17ac76e3fb232807ce6eb6b3e0fa4a42d34def58,2024-04-11T01:26:00.727000
|
||||
CVE-2024-3414,0,0,fcf8b2012e3dcab7048965e9d40e8c26f25a86217cc70e6c24a2ae712b119943,2024-04-11T01:26:00.803000
|
||||
@ -247031,6 +247059,8 @@ CVE-2024-4294,0,0,acd8c525c0dbd05d938d9cfd91b4f84bb2cd9884ab996901732c285a16449a
|
||||
CVE-2024-4296,0,0,c1d96940ea7b43530c90e361026a1465dd23d6cea465eae6b4e8fab350dd5200,2024-04-29T02:15:06.153000
|
||||
CVE-2024-4297,0,0,beec816d4a0b36417a8c7e4d11aae9631f4c8663ea5a064622665d3b052214e9,2024-04-29T03:15:09.613000
|
||||
CVE-2024-4298,0,0,f9266dd2ad13ca247a2df7083a82f45a12f2423c014a4332f080e78d4a30747d,2024-04-29T03:15:09.810000
|
||||
CVE-2024-4299,1,1,6dce476fcec521482054b6b4839e21007c148c2a950959748caa8366570861ec,2024-04-29T04:15:08.623000
|
||||
CVE-2024-4300,1,1,7a5406d5809ec914ba2d29d702f12271779019152ddc347a0ac4109f28246321,2024-04-29T04:15:08.887000
|
||||
CVE-2024-4301,1,1,ac824d829df059c2e56cb3512d1d60cfb48e2f3b0d50bb1c7774c0330baa7e64,2024-04-29T04:15:09.110000
|
||||
CVE-2024-4299,0,0,6dce476fcec521482054b6b4839e21007c148c2a950959748caa8366570861ec,2024-04-29T04:15:08.623000
|
||||
CVE-2024-4300,0,0,7a5406d5809ec914ba2d29d702f12271779019152ddc347a0ac4109f28246321,2024-04-29T04:15:08.887000
|
||||
CVE-2024-4301,0,0,ac824d829df059c2e56cb3512d1d60cfb48e2f3b0d50bb1c7774c0330baa7e64,2024-04-29T04:15:09.110000
|
||||
CVE-2024-4302,1,1,974068c107cd4e505ac6377f0f4fb62ae26afdc69c450f8704f68a7f42518f2c,2024-04-29T06:15:17.803000
|
||||
CVE-2024-4303,1,1,269dace03dedf0bc843109dbe92c35792422f71f9659b58da62f3fe6d0141fa9,2024-04-29T06:15:18.457000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user