mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-30 02:00:53 +00:00
Auto-Update: 2024-04-25T12:00:42.658693+00:00
This commit is contained in:
parent
662f731483
commit
363c09f102
55
CVE-2023/CVE-2023-522xx/CVE-2023-52220.json
Normal file
55
CVE-2023/CVE-2023-522xx/CVE-2023-52220.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-52220",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-25T10:15:08.260",
|
||||
"lastModified": "2024-04-25T10:15:08.260",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in MonsterInsights Google Analytics by Monster Insights.This issue affects Google Analytics by Monster Insights: from n/a through 8.21.0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/google-analytics-for-wordpress/wordpress-monsterinsights-plugin-8-21-0-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-13xx/CVE-2024-1347.json
Normal file
59
CVE-2024/CVE-2024-13xx/CVE-2024-1347.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-1347",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-04-25T11:15:45.637",
|
||||
"lastModified": "2024-04-25T11:15:45.637",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue has been discovered in GitLab CE/EE affecting all versions before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. Under certain conditions, an attacker through a crafted email address may be able to bypass domain based restrictions on an instance or a group."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/441093",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2355565",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-24xx/CVE-2024-2434.json
Normal file
59
CVE-2024/CVE-2024-24xx/CVE-2024-2434.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-2434",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-04-25T11:15:45.870",
|
||||
"lastModified": "2024-04-25T11:15:45.870",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue has been discovered in GitLab affecting all versions of GitLab CE/EE 16.9 prior to 16.9.6, 16.10 prior to 16.10.4, and 16.11 prior to 16.11.1 where path traversal could lead to DoS and restricted file read."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/450303",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2401952",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-255xx/CVE-2024-25583.json
Normal file
55
CVE-2024/CVE-2024-255xx/CVE-2024-25583.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-25583",
|
||||
"sourceIdentifier": "security@open-xchange.com",
|
||||
"published": "2024-04-25T10:15:08.867",
|
||||
"lastModified": "2024-04-25T10:15:08.867",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A crafted response from an upstream server the recursor has been configured to forward-recurse to can cause a Denial of Service in the Recursor. The default configuration of the Recursor does not use recursive forwarding and is not affected.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@open-xchange.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@open-xchange.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-02.html",
|
||||
"source": "security@open-xchange.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-28xx/CVE-2024-2829.json
Normal file
59
CVE-2024/CVE-2024-28xx/CVE-2024-2829.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-2829",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-04-25T11:15:46.057",
|
||||
"lastModified": "2024-04-25T11:15:46.057",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.5 before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. A crafted wildcard filter in FileFinder may lead to a denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/451456",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2416728",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-326xx/CVE-2024-32676.json
Normal file
55
CVE-2024/CVE-2024-326xx/CVE-2024-32676.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32676",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-25T11:15:46.243",
|
||||
"lastModified": "2024-04-25T11:15:46.243",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Restriction of Excessive Authentication Attempts vulnerability in LoginPress LoginPress Pro.This issue affects LoginPress Pro: from n/a before 3.0.0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/loginpress-pro/wordpress-loginpress-pro-plugin-2-5-3-captcha-bypass-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32677",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-24T16:15:09.710",
|
||||
"lastModified": "2024-04-24T17:16:50.397",
|
||||
"lastModified": "2024-04-25T11:15:46.440",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in LoginPress LoginPress Pro.This issue affects LoginPress Pro: from n/a through 2.5.3.\n\n"
|
||||
"value": "Missing Authorization vulnerability in LoginPress LoginPress Pro.This issue affects LoginPress Pro: from n/a before 3.0.0.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en LoginPress LoginPress Pro. Este problema afecta a LoginPress Pro: desde n/a hasta 2.5.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
55
CVE-2024/CVE-2024-329xx/CVE-2024-32961.json
Normal file
55
CVE-2024/CVE-2024-329xx/CVE-2024-32961.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32961",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-25T10:15:09.067",
|
||||
"lastModified": "2024-04-25T10:15:09.067",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Creative Themes HQ Blocksy allows Stored XSS.This issue affects Blocksy: from n/a through 2.0.33.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/blocksy/wordpress-blocksy-theme-2-0-33-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-37xx/CVE-2024-3730.json
Normal file
47
CVE-2024/CVE-2024-37xx/CVE-2024-3730.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-3730",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-25T11:15:46.603",
|
||||
"lastModified": "2024-04-25T11:15:46.603",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Simple Membership plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'swpm_paypal_subscription_cancel_link' shortcode in all versions up to, and including, 4.4.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3076221%40simple-membership&new=3076221%40simple-membership&sfp_email=&sfph_mail=#file31",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/63779ab7-ba8b-459d-beb3-a32faf8f4394?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-39xx/CVE-2024-3994.json
Normal file
47
CVE-2024/CVE-2024-39xx/CVE-2024-3994.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-3994",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-25T10:15:09.263",
|
||||
"lastModified": "2024-04-25T10:15:09.263",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Tutor LMS \u2013 eLearning and online course solution plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tutor_instructor_list' shortcode in all versions up to, and including, 2.6.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3076302/tutor/tags/2.7.0/templates/shortcode/instructor-filter.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/324fc401-04ca-4707-8727-b8c3a66f7fd6?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-40xx/CVE-2024-4035.json
Normal file
47
CVE-2024/CVE-2024-40xx/CVE-2024-4035.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-4035",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-25T10:15:09.427",
|
||||
"lastModified": "2024-04-25T10:15:09.427",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Photo Gallery \u2013 GT3 Image Gallery & Gutenberg Block Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image alt text in all versions up to, and including, 2.7.7.21 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3076342/gt3-photo-video-gallery/trunk/core/actions/gt3pg_gallery_shortcode.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/06ef1f0c-fdcc-4aaf-9e48-19b5be52351d?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-40xx/CVE-2024-4077.json
Normal file
55
CVE-2024/CVE-2024-40xx/CVE-2024-4077.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-4077",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-25T10:15:09.590",
|
||||
"lastModified": "2024-04-25T10:15:09.590",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AndonDesign UDesign allows Reflected XSS.This issue affects UDesign: from n/a through 4.7.3.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/u-design/wordpress-udesign-theme-4-7-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-41xx/CVE-2024-4164.json
Normal file
92
CVE-2024/CVE-2024-41xx/CVE-2024-4164.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4164",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-25T11:15:46.777",
|
||||
"lastModified": "2024-04-25T11:15:46.777",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in Tenda G3 15.11.0.17(9502). This issue affects the function formModifyPppAuthWhiteMac of the file /goform/ModifyPppAuthWhiteMac. The manipulation of the argument pppoeServerWhiteMacIndex leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-261983. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/G3V15/formModifyPppAuthWhiteMac.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.261983",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.261983",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.318588",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
36
README.md
36
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-25T10:00:39.344246+00:00
|
||||
2024-04-25T12:00:42.658693+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-25T09:15:08.237000+00:00
|
||||
2024-04-25T11:15:46.777000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,34 +33,32 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
246733
|
||||
246745
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `12`
|
||||
|
||||
- [CVE-2023-51478](CVE-2023/CVE-2023-514xx/CVE-2023-51478.json) (`2024-04-25T08:15:07.160`)
|
||||
- [CVE-2023-51482](CVE-2023/CVE-2023-514xx/CVE-2023-51482.json) (`2024-04-25T09:15:06.880`)
|
||||
- [CVE-2023-51484](CVE-2023/CVE-2023-514xx/CVE-2023-51484.json) (`2024-04-25T09:15:07.143`)
|
||||
- [CVE-2024-22144](CVE-2024/CVE-2024-221xx/CVE-2024-22144.json) (`2024-04-25T09:15:07.360`)
|
||||
- [CVE-2024-25917](CVE-2024/CVE-2024-259xx/CVE-2024-25917.json) (`2024-04-25T09:15:07.550`)
|
||||
- [CVE-2024-30560](CVE-2024/CVE-2024-305xx/CVE-2024-30560.json) (`2024-04-25T09:15:07.740`)
|
||||
- [CVE-2024-31266](CVE-2024/CVE-2024-312xx/CVE-2024-31266.json) (`2024-04-25T09:15:07.927`)
|
||||
- [CVE-2024-3733](CVE-2024/CVE-2024-37xx/CVE-2024-3733.json) (`2024-04-25T09:15:08.237`)
|
||||
- [CVE-2024-3893](CVE-2024/CVE-2024-38xx/CVE-2024-3893.json) (`2024-04-25T08:15:07.490`)
|
||||
- [CVE-2024-3929](CVE-2024/CVE-2024-39xx/CVE-2024-3929.json) (`2024-04-25T08:15:07.657`)
|
||||
- [CVE-2024-3988](CVE-2024/CVE-2024-39xx/CVE-2024-3988.json) (`2024-04-25T08:15:07.813`)
|
||||
- [CVE-2024-4173](CVE-2024/CVE-2024-41xx/CVE-2024-4173.json) (`2024-04-25T08:15:07.977`)
|
||||
- [CVE-2023-52220](CVE-2023/CVE-2023-522xx/CVE-2023-52220.json) (`2024-04-25T10:15:08.260`)
|
||||
- [CVE-2024-1347](CVE-2024/CVE-2024-13xx/CVE-2024-1347.json) (`2024-04-25T11:15:45.637`)
|
||||
- [CVE-2024-2434](CVE-2024/CVE-2024-24xx/CVE-2024-2434.json) (`2024-04-25T11:15:45.870`)
|
||||
- [CVE-2024-25583](CVE-2024/CVE-2024-255xx/CVE-2024-25583.json) (`2024-04-25T10:15:08.867`)
|
||||
- [CVE-2024-2829](CVE-2024/CVE-2024-28xx/CVE-2024-2829.json) (`2024-04-25T11:15:46.057`)
|
||||
- [CVE-2024-32676](CVE-2024/CVE-2024-326xx/CVE-2024-32676.json) (`2024-04-25T11:15:46.243`)
|
||||
- [CVE-2024-32961](CVE-2024/CVE-2024-329xx/CVE-2024-32961.json) (`2024-04-25T10:15:09.067`)
|
||||
- [CVE-2024-3730](CVE-2024/CVE-2024-37xx/CVE-2024-3730.json) (`2024-04-25T11:15:46.603`)
|
||||
- [CVE-2024-3994](CVE-2024/CVE-2024-39xx/CVE-2024-3994.json) (`2024-04-25T10:15:09.263`)
|
||||
- [CVE-2024-4035](CVE-2024/CVE-2024-40xx/CVE-2024-4035.json) (`2024-04-25T10:15:09.427`)
|
||||
- [CVE-2024-4077](CVE-2024/CVE-2024-40xx/CVE-2024-4077.json) (`2024-04-25T10:15:09.590`)
|
||||
- [CVE-2024-4164](CVE-2024/CVE-2024-41xx/CVE-2024-4164.json) (`2024-04-25T11:15:46.777`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `3`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2023-6237](CVE-2023/CVE-2023-62xx/CVE-2023-6237.json) (`2024-04-25T07:15:45.270`)
|
||||
- [CVE-2024-0151](CVE-2024/CVE-2024-01xx/CVE-2024-0151.json) (`2024-04-25T08:15:07.420`)
|
||||
- [CVE-2024-31380](CVE-2024/CVE-2024-313xx/CVE-2024-31380.json) (`2024-04-25T09:15:08.127`)
|
||||
- [CVE-2024-32677](CVE-2024/CVE-2024-326xx/CVE-2024-32677.json) (`2024-04-25T11:15:46.440`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
44
_state.csv
44
_state.csv
@ -235834,11 +235834,11 @@ CVE-2023-51473,0,0,c717b541715384069e4e1f234809a3353cecd65454fe611c8ad98ac99f14b
|
||||
CVE-2023-51474,0,0,f6ae408c3a922cfdfc785e0a99ab0da323d66aa2473d9214f464f168abaf8486,2024-03-17T22:38:29.433000
|
||||
CVE-2023-51475,0,0,3b22b7562ec7c62760bcb36076150336b816419fb1f4781f9eda477c8bacc5ab,2024-01-08T17:09:53.473000
|
||||
CVE-2023-51477,0,0,4f67f178a6452a49208e4b34c27938dce123af4b2194e32c4684df74c0e3ddfc,2024-04-24T17:16:50.397000
|
||||
CVE-2023-51478,1,1,d95bd80c2189309451ce0328f4070da16ebe8aa874e07e024cedc5c96915ced7,2024-04-25T08:15:07.160000
|
||||
CVE-2023-51478,0,0,d95bd80c2189309451ce0328f4070da16ebe8aa874e07e024cedc5c96915ced7,2024-04-25T08:15:07.160000
|
||||
CVE-2023-5148,0,0,b9cccef0db87619d4d8a66efab7c8a65309c4d041d7c92a0d212f6da340fb299,2024-04-11T01:22:53.670000
|
||||
CVE-2023-51480,0,0,f8823f539951e34f7db1aecf23364bc135467d8a0c59ff2384ab35a6a58cc37b,2024-02-15T21:06:20.197000
|
||||
CVE-2023-51482,1,1,88f7dac76b71eb806f6bb357dc905c8dfb9823e04c69aa6647fe35a5b7a190a6,2024-04-25T09:15:06.880000
|
||||
CVE-2023-51484,1,1,0bd652f8cafc530bbdd0cf00956ec32b9fce8fd128b051dbaf378ace36ea3beb,2024-04-25T09:15:07.143000
|
||||
CVE-2023-51482,0,0,88f7dac76b71eb806f6bb357dc905c8dfb9823e04c69aa6647fe35a5b7a190a6,2024-04-25T09:15:06.880000
|
||||
CVE-2023-51484,0,0,0bd652f8cafc530bbdd0cf00956ec32b9fce8fd128b051dbaf378ace36ea3beb,2024-04-25T09:15:07.143000
|
||||
CVE-2023-51485,0,0,b45b2ac9de0fefa98f7d5095938cdcfb38d785140d230b3d93a0e5b7be6e9281,2024-02-15T06:26:27.350000
|
||||
CVE-2023-51486,0,0,9229ace1c5a78534c4a29354f69eed7eb15a32aa9ba93f26a4ff614b16fec211,2024-03-17T22:38:29.433000
|
||||
CVE-2023-51487,0,0,847a2f263199d3d0b7e3580ccc5065b94cfbf72d7c5fef0109251fbebd97904b,2024-03-17T22:38:29.433000
|
||||
@ -236275,6 +236275,7 @@ CVE-2023-52216,0,0,0abddcd9cec3889c982561204259a4fbd6d1dbd4b2cc9d289f548ce07e0b2
|
||||
CVE-2023-52218,0,0,7b665670ae49b9a55269793dbdbcff40e383cda41d548bb50d0820fbba3ce68a,2024-01-11T18:43:19.067000
|
||||
CVE-2023-52219,0,0,725e019d2fc10de270113e602317a73de8b7fdc7857e05e8af3c8ee08f8ddb31,2024-01-11T18:43:08.093000
|
||||
CVE-2023-5222,0,0,c1e341045c0f11dc51130ddd6c55bbdb6c5b59e7e51042c31060eb80c77b1e20,2024-04-11T01:22:54.960000
|
||||
CVE-2023-52220,1,1,effd6e7e63c3fb32c2c4bcc7b485d35224afea40f41329ef33223e593036407c,2024-04-25T10:15:08.260000
|
||||
CVE-2023-52221,0,0,6c853580c221f82c51262bc0fe815c852a280cf9888ed2875fd663a1fd304e49,2024-01-30T17:01:51.733000
|
||||
CVE-2023-52222,0,0,1142f590e1a21aeacceaabe68ed8ad5f9063502f197fc05ff7c0c8e41c0a95cb,2024-01-11T19:01:03.343000
|
||||
CVE-2023-52223,0,0,3daf999840f1c944c0431f78081f2c2548ca4a0fcff350348e23cd8c51c83648,2024-02-29T13:49:47.277000
|
||||
@ -237526,7 +237527,7 @@ CVE-2023-6233,0,0,219eace3a1a0153d9e9c47c5f968398c12850df06483ce044fb78774d98c68
|
||||
CVE-2023-6234,0,0,c300a8904deed01fc5477fc97fa27627c8d1f6d71059c668e1fb941f32fdf7e2,2024-02-13T19:51:46.740000
|
||||
CVE-2023-6235,0,0,a6ac280c87945b3531740d074fb7f02bafe0fd764523c0dc65a87b2c28ffc24b,2023-11-29T16:59:51.970000
|
||||
CVE-2023-6236,0,0,c746200290431ebe52c336c97f229880dd537f5eeffbab0aaed59ac6b0e48cbf,2024-04-10T13:23:38.787000
|
||||
CVE-2023-6237,0,1,3fd833d8df196076b15248237a7e6cb9d5598d7d6e10626d77ae121cb0a3fbae,2024-04-25T07:15:45.270000
|
||||
CVE-2023-6237,0,0,3fd833d8df196076b15248237a7e6cb9d5598d7d6e10626d77ae121cb0a3fbae,2024-04-25T07:15:45.270000
|
||||
CVE-2023-6238,0,0,7332193d1454e7405dd3270d745aa7f762b874d0f84c51906784a637ceb0212d,2024-02-07T00:15:55.240000
|
||||
CVE-2023-6239,0,0,6ce1b576ddd7c9169d0997e75fde3efd606153edbf61fba1116d733c98bbf90d,2023-12-04T19:06:20.213000
|
||||
CVE-2023-6240,0,0,9f82f7462b3110d2d963e8af8e7c4ae7d74cf243233e0832a0fe614b539f6ea4,2024-04-18T04:15:09.903000
|
||||
@ -238409,7 +238410,7 @@ CVE-2024-0080,0,0,6c0d206dd91620b9eed7dc804b37cabf92e6b94b99ac768289c8d5abe0e718
|
||||
CVE-2024-0081,0,0,7224cfd553042ae01e2abfd02f661fee4ab9e15edf612773f3a2b6523001079f,2024-04-08T18:49:25.863000
|
||||
CVE-2024-0082,0,0,2f8bf036b6ccf9a376740e76b27024fe830e6e0ae585ea5b083515d36ff830e7,2024-04-09T12:48:04.090000
|
||||
CVE-2024-0083,0,0,ab832b2e89667613797d661d736b6cac31cc3f4854c5fe470b78e46bd7a9f856,2024-04-09T12:48:04.090000
|
||||
CVE-2024-0151,0,1,aafc841cfb528b9ef4d150e11c8565679b9331c9ad5bf3569e38f74d72962c86,2024-04-25T08:15:07.420000
|
||||
CVE-2024-0151,0,0,aafc841cfb528b9ef4d150e11c8565679b9331c9ad5bf3569e38f74d72962c86,2024-04-25T08:15:07.420000
|
||||
CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf73,2024-03-13T18:15:58.530000
|
||||
CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000
|
||||
CVE-2024-0156,0,0,47a5ee4f12284e0f109441891942aa0eb589b2387e172b6366b6741bcabc51b4,2024-03-04T13:58:23.447000
|
||||
@ -239432,6 +239433,7 @@ CVE-2024-1343,0,0,7985dc5630dbf743d174adfd5bcbbeffba7f6f107c154562a0a1291a9163d2
|
||||
CVE-2024-1344,0,0,6e9ea80e9b1906095e19ebbcfe72bb26c4abf1a00053a32e3b2ac9d853412ece,2024-02-20T19:50:53.960000
|
||||
CVE-2024-1345,0,0,edc14e21821ef700ebe0363d9d625110658b2ac84664f2109ac9f28db37f2b84,2024-02-20T19:50:53.960000
|
||||
CVE-2024-1346,0,0,f9b1cf937db0cca6baf401ddf2b76ede34aff7f78d164647460f90ba78591111,2024-02-20T19:50:53.960000
|
||||
CVE-2024-1347,1,1,d59a7fe81057cda9528d10602538be86d933607cac829b14d8fff6670c10ea86,2024-04-25T11:15:45.637000
|
||||
CVE-2024-1349,0,0,b279200dbd0caf4e8952d9c37c4c16e81897b7eb26d17adae101e27da89cab26,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1350,0,0,f5a86475fc1dc34b3dba1cdb58ce8a034cff8f306bdf175488f056a4cdebab37,2024-04-17T12:48:07.510000
|
||||
CVE-2024-1351,0,0,ccfc6382e78432a14bc2d9bf0a36d4e4d8658043dc7dae2de5101e9686831717,2024-03-08T14:02:57.420000
|
||||
@ -241023,7 +241025,7 @@ CVE-2024-22140,0,0,7531d09a0f968b5d2b1e4e11b41757eb318c7a2cf822561fb39f6b355e958
|
||||
CVE-2024-22141,0,0,82c169c1dd57a019cf6b1fa659a8204ad1d91b953c7a71671ed9e1905b8d4a0f,2024-01-30T20:18:38.460000
|
||||
CVE-2024-22142,0,0,8637a6c60024e32494bb4696b4c838486f6176e902ea0c9e3d4b4fb3a1805b63,2024-01-19T19:59:49.717000
|
||||
CVE-2024-22143,0,0,adccc14524111072286cffd424e6560dcad4b1e2e3b7161d3a46107433633930,2024-02-03T00:24:07.510000
|
||||
CVE-2024-22144,1,1,252b4f2b7d870ce8636523e623089fc030194c61f182b05f207035c7bf5113c8,2024-04-25T09:15:07.360000
|
||||
CVE-2024-22144,0,0,252b4f2b7d870ce8636523e623089fc030194c61f182b05f207035c7bf5113c8,2024-04-25T09:15:07.360000
|
||||
CVE-2024-22146,0,0,8a44d2f783f8546b1d5e9fc855a9089455ad2fafc8ab97139269e47d5d414f01,2024-02-06T15:51:01.533000
|
||||
CVE-2024-22147,0,0,0b0e8745bfea72bbfa1b747625dc2bbdeefcf97593cd8b6f4d26d36641e1e2b9,2024-02-01T04:13:36.740000
|
||||
CVE-2024-22148,0,0,eb4d4a193f2153f5fe3df79c79a6ba27f52e6d1edc409f8c9f4419f061b12f8c,2024-02-03T00:30:56.520000
|
||||
@ -242146,6 +242148,7 @@ CVE-2024-24334,0,0,da06e1e254e82aef6a8ae8700111f26a6ca009a50ffc571e730349ef73e52
|
||||
CVE-2024-24335,0,0,5e7519464b215df4f7724f66c24af45a646a0a7e87ae840c74db5854f34f48da,2024-03-27T12:29:30.307000
|
||||
CVE-2024-24336,0,0,f4912e863fa74b8ab422c3568a4f277c89a6d7944484768fcb0717c5b37fc600,2024-03-20T13:00:16.367000
|
||||
CVE-2024-24337,0,0,aea724cce42152cfbca31af56ebea4b4144a07dac6916cd215f4a89a5f259b76,2024-02-13T14:01:49.147000
|
||||
CVE-2024-2434,1,1,04c152a98feb21794f0b43e3b94b64417b1f21316c4c0cfb69b32a54efa153f8,2024-04-25T11:15:45.870000
|
||||
CVE-2024-2435,0,0,a82b6b668d8e82e4d367c64006f2c2586551c9f49283b8f01e55602069760d54,2024-04-02T18:12:16.283000
|
||||
CVE-2024-24350,0,0,9134767962641c17d78d439bf5ad6b0040b309c747242ef118ff001480ea18e9,2024-02-14T21:53:21.057000
|
||||
CVE-2024-2436,0,0,0058451184de01ace2b295600d83c490983eb7c72ad2716d828043436e9ab2c7,2024-04-10T13:23:38.787000
|
||||
@ -242759,6 +242762,7 @@ CVE-2024-25578,0,0,ff68f9ee0e3394b3fa83fe8766f2e044325a5fd043b437de063c0cd80654c
|
||||
CVE-2024-25579,0,0,838cd17118b030eacfba49a0ada30a1ba4831f0bedbfd768ff2707f55789078e,2024-04-04T01:15:50.083000
|
||||
CVE-2024-2558,0,0,05ecdd587f34cceb1493c24040a39ce304ec6f718c555097cfbd0b512bd51f16,2024-04-11T01:25:27.900000
|
||||
CVE-2024-25580,0,0,aa78600da8abcfd02ed93a87510a3e3684060f93f36da496d331a2464d925d23,2024-03-27T12:29:30.307000
|
||||
CVE-2024-25583,1,1,2b54e7f24be9d3570e6a548fc802dcc59ae929ac07b6602cc1dfe4ed86350999,2024-04-25T10:15:08.867000
|
||||
CVE-2024-2559,0,0,0df14d2b8b0850aef83be7e2591ffb20aabcbafcf048e059668c41d2f3aea928,2024-04-11T01:25:27.973000
|
||||
CVE-2024-25591,0,0,c65f01ca63ad0801e05905a469f348aac6155e03a8ca96328b00fe29f06ee168,2024-03-17T22:38:29.433000
|
||||
CVE-2024-25592,0,0,3bf77ce6c0d5ce69c3b2d29d57784babd24dff1d07ed5b59dadd6cc7feeb66a0,2024-03-15T16:26:49.320000
|
||||
@ -242955,7 +242959,7 @@ CVE-2024-25913,0,0,f836a846f4079f05601564732cb9a5408cfd48a38708177104907308615f9
|
||||
CVE-2024-25914,0,0,6c21c235c508fdd4e37939a7918e64e3dd4e50979a576bdc305d842a25f11a05,2024-02-13T14:01:07.747000
|
||||
CVE-2024-25915,0,0,2b3eb3b61519c3cc7ec9c696d86f766a5ba91455b2def2592d7df0099d9b76fa,2024-02-23T16:14:43.447000
|
||||
CVE-2024-25916,0,0,9a157d9e9f7c2a47535d6fe7b72d4b8297c899743fb7757d707e251d0e0cee3c,2024-03-15T16:26:49.320000
|
||||
CVE-2024-25917,1,1,8bfc3970fc7ef8f76b99ffb0454019d0824e0f1bba8d867fa50e33f8e5788128,2024-04-25T09:15:07.550000
|
||||
CVE-2024-25917,0,0,8bfc3970fc7ef8f76b99ffb0454019d0824e0f1bba8d867fa50e33f8e5788128,2024-04-25T09:15:07.550000
|
||||
CVE-2024-25918,0,0,94384e507f0050673085096762ed49a5498803fb71358620832f7751f166af55,2024-04-03T12:38:04.840000
|
||||
CVE-2024-25919,0,0,10e90b733b4139783c8edab5a7be80b4a6a1310bbbe6bd2d191c5b664c04198b,2024-03-15T16:26:49.320000
|
||||
CVE-2024-2592,0,0,234860397f53316d0fc14e6428f643653c1a443db32886f209582c59f6a746af,2024-03-18T19:40:00.173000
|
||||
@ -244317,6 +244321,7 @@ CVE-2024-28283,0,0,268ce493b20c7a589a5e50c22f5ba70e4448bc55aa5cacedfa25c50cee9c0
|
||||
CVE-2024-28286,0,0,7b760a4769f45c40990c61b4c6dca958dc26708f19d30b01bb3a34dbec61c15d,2024-03-21T12:58:51.093000
|
||||
CVE-2024-28287,0,0,f3e972680aaba746036e0c18fb52d806a7d00f059e355ec696b64bf775ceea80,2024-04-02T18:12:16.283000
|
||||
CVE-2024-28288,0,0,a02e3d9826d4212dd14a4181934d81e2a653b8135d5e48cc021c9f921b853477,2024-04-01T01:12:59.077000
|
||||
CVE-2024-2829,1,1,a3397755340cc107bcbf3baf36ebef46488327d274491f88b8ab5140fb526050,2024-04-25T11:15:46.057000
|
||||
CVE-2024-2830,0,0,d5b60d4e864f39f624f9c75c8c5ccee07e6c5fbd8045c5529f94cb5bf65e5175,2024-04-04T12:48:41.700000
|
||||
CVE-2024-28303,0,0,32d4865094af329a688db1798283b86ca81a4a5fae30846af22292284fa8cb98,2024-03-20T13:00:16.367000
|
||||
CVE-2024-28318,0,0,ede034690df957e6783d45bfb66a16f12d36f93dac03aab57e77aeedfffbbc90,2024-03-15T16:26:49.320000
|
||||
@ -245396,7 +245401,7 @@ CVE-2024-30556,0,0,f1da61d39a2aaf955621919b0301fa9315dc388c72c47a5c5e3e3f6db8419
|
||||
CVE-2024-30557,0,0,7e51550c5d84adae681c592a59742ffb76e054dc707c58b718a0779baf95a502,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30558,0,0,c487b7e520828364fad2b07b74e7c881d68876bac73b13b5c83e0dfd99fede24,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30559,0,0,30881b502a00e1f0b4af436d9e17ecd66ddff7c4f60889245892c374e2f0a5b2,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30560,1,1,bba19f1a227fac96bb2a35e6b98384a021b2e05fd187d58b8e0da53bd32c3cd7,2024-04-25T09:15:07.740000
|
||||
CVE-2024-30560,0,0,bba19f1a227fac96bb2a35e6b98384a021b2e05fd187d58b8e0da53bd32c3cd7,2024-04-25T09:15:07.740000
|
||||
CVE-2024-30561,0,0,03bc43de8aff9caae9f72d908884b596acdfb45cf5a607bf3a61d00b78d408af,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30564,0,0,5f976284dee8adc6f867c668cd15b1659935b33cf9e4e2c130b09997500e7317,2024-04-18T18:25:55.267000
|
||||
CVE-2024-30565,0,0,3c10663ebaef8c263e29a3b4fcd5ce9f26a98e5c4788e4f23a40d6624f566f6b,2024-04-04T12:48:41.700000
|
||||
@ -245720,7 +245725,7 @@ CVE-2024-31262,0,0,2a9bcea0985fcaddd83893245a1b9fdc06643313b9df1f9c0a4fa4b5530f3
|
||||
CVE-2024-31263,0,0,8f2890afedcc5d88494c2f6c1c034154cfb17cbd4a58e7b9478e628be5899862,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31264,0,0,c428617dd4afe9db95ef9b76c24f075b8caced8c4ee5d37fbc0432619eab40a5,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31265,0,0,73b53303ea2aa4510d95cf2e30536090282921bee1e4ddf1a7938462135cb9c0,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31266,1,1,572aff496d14246f188a5def7d09d331b6670ef56cc3dfa020b78be489d23e33,2024-04-25T09:15:07.927000
|
||||
CVE-2024-31266,0,0,572aff496d14246f188a5def7d09d331b6670ef56cc3dfa020b78be489d23e33,2024-04-25T09:15:07.927000
|
||||
CVE-2024-31268,0,0,c260b292f4a0557333471e9a298a56aee0f8adfc83aea133a9470b069de5a2b5,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31269,0,0,d795c0acb6cd496e9d563a25767f3786288bcffe37844eb18ef033fe012b3b5a,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31271,0,0,d8228662c1440f14ee742f57032f82398c2055e3f352f6a0fc3cc42050b1d28d,2024-04-15T13:15:51.577000
|
||||
@ -245789,7 +245794,7 @@ CVE-2024-31376,0,0,a5cd7decb3aa77b7c9dfe04828eefa3f789d2a15ced405db0122622e67c0d
|
||||
CVE-2024-31378,0,0,46b9b8732b642d44c5d384306dfbdf69a9115d6098ab0a36faa3f26c08690e37,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31379,0,0,24f2bdeb0f1fb4bdf974899fe3fab2725f6d89406a545ae15090a05eaf09429a,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3138,0,0,952bef3e912c81d77b1f4b71c423532beae8fc55963465bb23e6cf3f92e09bdf,2024-04-11T01:25:54.493000
|
||||
CVE-2024-31380,0,1,8c491764a24eea5e95145b5c62b11d20bc6b7216a5ecf959aad591fd2cab2e94,2024-04-25T09:15:08.127000
|
||||
CVE-2024-31380,0,0,8c491764a24eea5e95145b5c62b11d20bc6b7216a5ecf959aad591fd2cab2e94,2024-04-25T09:15:08.127000
|
||||
CVE-2024-31381,0,0,c9f8b2a8bb43383a6d2b44f4c2bce621630063d464575918f98bc752cd934627,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31382,0,0,fdb9f25138a089e37ff91a85435d838e4c79e5961d1d783d123309eb6b480c40,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31383,0,0,969012fe96b80e550a1eee7edc6c8a1c541c828926b828c1a67fc199b91a261d,2024-04-15T13:15:31.997000
|
||||
@ -246316,7 +246321,8 @@ CVE-2024-32661,0,0,0b4f6f6bf08605ad36c3697d5c10f022921cc6cf1c11c6d2a8c37ca647145
|
||||
CVE-2024-32662,0,0,cc82e255660f76e8294a012a16568aaf2fb6ae82fd6edb9a95574f4ae5e4ec18,2024-04-24T13:39:42.883000
|
||||
CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000
|
||||
CVE-2024-32675,0,0,597168f82a15ece6f0d4e4d1f7460a085e409a51dae9c8ea8f8173b85f0b866d,2024-04-24T17:16:50.397000
|
||||
CVE-2024-32677,0,0,3ebbb3828922e8418f63ca2fe97588ef6ea586f81b213ed0ff8eaf06ecf39afc,2024-04-24T17:16:50.397000
|
||||
CVE-2024-32676,1,1,716fac011b9dcb9e330192470cb562714bdb90b0b7a9f7776017360b478eb0bc,2024-04-25T11:15:46.243000
|
||||
CVE-2024-32677,0,1,b2d5b21c6c0b64a6ef3d2bb5d4a7fb394174b9e010ebfad39ee101d085a71d44,2024-04-25T11:15:46.440000
|
||||
CVE-2024-32678,0,0,e1cc34cfef6fbca3bc4c61530e9653503dc08aed7ddf2a53024c1679bd074407,2024-04-24T17:16:50.397000
|
||||
CVE-2024-32679,0,0,47f25b53322dabb6e1a721a9caf70ab58f695c8ffaee75067972f951cb497019,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32681,0,0,30385cf8415af0417b19f52d5eb22ace0b875cd333ead985847624dbf28043cd,2024-04-22T13:28:34.007000
|
||||
@ -246408,6 +246414,7 @@ CVE-2024-32955,0,0,4110c217be7c8e99337e07561aafd3b44e4ea4a473b206cd84ab63a5159eb
|
||||
CVE-2024-32956,0,0,d66d4590ba60a597e1a04a825f1bc4c4665719511bc6e488154ea811617d794b,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32958,0,0,cef1b6bbedd4c8c60a926a11138b6464f77bbaf19e9ffb1c03d74bbc158a75b6,2024-04-24T17:16:50.397000
|
||||
CVE-2024-3296,0,0,bcc39314c1e9f6d53aa0ccc8e7e7cac7c279f7f6ee5a27f19287b128ea2ed6c7,2024-04-05T12:15:37.777000
|
||||
CVE-2024-32961,1,1,eb18021c37a6cf34a128f1dc588c08b91507e01991dff3711f150703abc858e1,2024-04-25T10:15:09.067000
|
||||
CVE-2024-3298,0,0,35145d829af4d19541380a93e6723503e514b69e11aa4b007b05099610c37f21,2024-04-04T16:33:06.610000
|
||||
CVE-2024-3299,0,0,f60f2a80accdd6f345a6a9cd66637eda180121596f90c2e7d75707c9fce20eb6,2024-04-04T16:33:06.610000
|
||||
CVE-2024-3302,0,0,125cce6ead91da0349b4d4d5e52af6eb4c2a0511fb870ab9451e4f4746c28bb4,2024-04-24T10:15:07.417000
|
||||
@ -246588,9 +246595,10 @@ CVE-2024-3707,0,0,cb892298714e8d1628bf09ece0bc00ef0a1a1429034ce83bb3286f4d822c16
|
||||
CVE-2024-3719,0,0,f291ba68ba6e93978bc9c39b527e377db4603f9cf0b58326694ce4a62db06977,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3720,0,0,548129ada226460eeed0bbe63afac7cb948fd16d011c5ffd900fa7625265466b,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3721,0,0,e2cd22ce24461bd25c9ec7cb92e927b75c559a9256137266b8480ef946c8e320,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3730,1,1,62c92a9474f499bf2009c922debbb3f61228803890b0890ea7cc5e5fb9abfd35,2024-04-25T11:15:46.603000
|
||||
CVE-2024-3731,0,0,bdcc8f677627b7b108ec8e839a01e7cc6ba34354d6004394dff79046d7838f40,2024-04-19T13:10:25.637000
|
||||
CVE-2024-3732,0,0,47b10b9e83ea0bac70990c3295c25b56cc73657af82bc6f5c1f4fd37930f5edb,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3733,1,1,7048fa2a6d6ace3c1b4095e840494448f8f41b7bf603ced5e4516b0d4a0f8872,2024-04-25T09:15:08.237000
|
||||
CVE-2024-3733,0,0,7048fa2a6d6ace3c1b4095e840494448f8f41b7bf603ced5e4516b0d4a0f8872,2024-04-25T09:15:08.237000
|
||||
CVE-2024-3735,0,0,9300dd852c0feb2e50ee641119a226f214818e2f2843b357387d0b439146ec2c,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3736,0,0,8e1e49a70c099a42d25fc2ef350c0eb9767073e2fa96b7ffe6bc4d265c3f8c23,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3737,0,0,1990edd10a050a438850658c5a42b3f737afd31a7356a3decab691dfe1bc7cad,2024-04-15T13:15:31.997000
|
||||
@ -246671,7 +246679,7 @@ CVE-2024-3880,0,0,237e3bb93a0b113a1c50538806f68b5377561349bd4f47a9139ec72cd35641
|
||||
CVE-2024-3881,0,0,9055ecf63e1aedc7e2787afc56e67bc831564d5ee15f418ef1b408c81c24bb16,2024-04-17T12:48:31.863000
|
||||
CVE-2024-3882,0,0,846c922d5cf92347db05da515dc041ccc83bdcd548fefc386c188946857d0db7,2024-04-17T12:48:31.863000
|
||||
CVE-2024-3889,0,0,c4039354ee4d81ce5faec2ce618c8f0af30c97c1ad1feeb689836cb585b438a6,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3893,1,1,d69befe4b9c26bab47130e2550d58417589158f460839d5dddb71000af5513de,2024-04-25T08:15:07.490000
|
||||
CVE-2024-3893,0,0,d69befe4b9c26bab47130e2550d58417589158f460839d5dddb71000af5513de,2024-04-25T08:15:07.490000
|
||||
CVE-2024-3900,0,0,5bafaa90d65e26f460054cb65a089d31ecb0030e0f85c3f0ee595a0cce123691,2024-04-17T20:08:21.887000
|
||||
CVE-2024-3905,0,0,666ba6ab36ae43f19518f88ffcc3dc3578e7336eef9fa01b067c40b574dea570,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3906,0,0,dd9841bce880aeaa28c9d51ba9e314b7fd3abe4741e8e805c9e3a8477cebd832,2024-04-17T12:48:07.510000
|
||||
@ -246682,12 +246690,13 @@ CVE-2024-3910,0,0,7d8aafa4b35964a72cdc3d08dd6c7b1615ef522d553c6c78d413b0e25fdc71
|
||||
CVE-2024-3911,0,0,421a4146dc8ebd653de189c62bd791d7d943c2a07a6c17029678795c1bffde3d,2024-04-24T13:39:42.883000
|
||||
CVE-2024-3914,0,0,97e3c2a1ceda5baa1eed65646997d7cab2203eabae8e05a9bf7340c2163a5004,2024-04-23T18:15:15.823000
|
||||
CVE-2024-3928,0,0,114c97f372c53f33fe3b26cd091686f1eb78a3749714814b77901a77b62a0107,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3929,1,1,ec0312638fce606a6fa058aa3faff9ab28473bc202fdcc2f993c4e28ca45b633,2024-04-25T08:15:07.657000
|
||||
CVE-2024-3929,0,0,ec0312638fce606a6fa058aa3faff9ab28473bc202fdcc2f993c4e28ca45b633,2024-04-25T08:15:07.657000
|
||||
CVE-2024-3931,0,0,adc8a79b07f48b35a9681a97a568e852ba1ef2cbd3b7271f585750c2d2c4216b,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3932,0,0,bce0f8b09e2fc4acc0cfce5940d57ce5f1e0384ac19f6c68ed218175688d8f12,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3948,0,0,427154a0226db385c08a1dc567a28e238ab290a5825189b73e5e958b25b296e5,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3979,0,0,9ef752ac5397ef4280bc4d9888fb417cb985331164bf90affafa759f391a2bfe,2024-04-19T18:29:53.040000
|
||||
CVE-2024-3988,1,1,b29ac0147c5e6d0c49359de13f52e1f6a660eeb53737b8c0e3def81fd96a0f78,2024-04-25T08:15:07.813000
|
||||
CVE-2024-3988,0,0,b29ac0147c5e6d0c49359de13f52e1f6a660eeb53737b8c0e3def81fd96a0f78,2024-04-25T08:15:07.813000
|
||||
CVE-2024-3994,1,1,a14ba4054706f5b0f33c62595d06e70efeab5d431147ba5cdbfa7a0e731a83bf,2024-04-25T10:15:09.263000
|
||||
CVE-2024-4014,0,0,321273114f78ac117c4f7a805b62a62926b23a5461c74b2705504b7b2e21d158,2024-04-22T13:28:43.747000
|
||||
CVE-2024-4017,0,0,9cc899b07e49c20d1d42511c9c41a533c695fd74b1701843b26490566c6e33e3,2024-04-22T13:28:50.310000
|
||||
CVE-2024-4018,0,0,b534838241485b84911a40a305fab0f06a9a1281f09d3d1140d27d7f52b1a84d,2024-04-22T13:28:50.310000
|
||||
@ -246697,6 +246706,7 @@ CVE-2024-4021,0,0,21ca31bf18d88881f7a6cc1002b89ea9bbd51b89715a0adf7c08b2eb5ac210
|
||||
CVE-2024-4022,0,0,ebd323c8f90bdf29bd6ff35ea1eff449874a3d962dc85b687039f47f7b416e73,2024-04-22T13:28:43.747000
|
||||
CVE-2024-4026,0,0,65bff2dba626fde0f88488c1e6df610a37e761e2e041855587a3bbcb3e849c23,2024-04-22T13:28:34.007000
|
||||
CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000
|
||||
CVE-2024-4035,1,1,3c97dbc459f27fd6f27a5fad16013f4954effbdf185f19a0463e9ca471ba5099,2024-04-25T10:15:09.427000
|
||||
CVE-2024-4040,0,0,a8c13c2ea93261639ce0bb9b0a36d4120d837055b81d6b1ea3d5d9f015206ec9,2024-04-23T23:15:48.790000
|
||||
CVE-2024-4062,0,0,00e701b26925636f4b147891efd3607d8441f5743e72ff31df8ffeb1293615e9,2024-04-24T13:39:42.883000
|
||||
CVE-2024-4063,0,0,45ec0afed63b6cdcc64eb9b7f37753004f82dbe9793a74b35da8bcfe5ff1c982,2024-04-24T13:39:42.883000
|
||||
@ -246710,6 +246720,7 @@ CVE-2024-4072,0,0,23b253a931e3508f3a1005d6a8e36875356ae44a1423e0377599374bef4bd3
|
||||
CVE-2024-4073,0,0,cd6b9a0b4041273b39eacc88accab4b27eed8bb21a661b97a552fff795cecb9e,2024-04-24T13:39:42.883000
|
||||
CVE-2024-4074,0,0,54ee17fd7f393f43bd085cf0dad52e1098d3a86070f7c8e5db37e41aca4270c3,2024-04-24T13:39:42.883000
|
||||
CVE-2024-4075,0,0,b337ce732e80d61a7a94e7d1b24517f369d5a9145712a3118619de41efc762cf,2024-04-24T13:39:42.883000
|
||||
CVE-2024-4077,1,1,d497ce731770f9703997c9ef34f40360e0899c1dee6e84d6d4006806e04dbf8b,2024-04-25T10:15:09.590000
|
||||
CVE-2024-4093,0,0,9d77513f5fb5e3e452600e46458fe98bb5da01bc49d6b9079762b82e5ad01fa6,2024-04-24T13:39:42.883000
|
||||
CVE-2024-4111,0,0,f20c320bd5ca80655eb3563ab31ffb2b0ea8139e24b198ea11373682803605fc,2024-04-24T17:16:50.397000
|
||||
CVE-2024-4112,0,0,51e6f8af3a203245bfdc6a063306377d7ade6d49f743078c73d6466628a7bdb0,2024-04-24T17:16:50.397000
|
||||
@ -246731,4 +246742,5 @@ CVE-2024-4127,0,0,9f3daf88f98aa9a5b11198255f78ca942b2ab5518927e04fb0a738be86bc8e
|
||||
CVE-2024-4141,0,0,cc9e710826c489d0ee22d4c7d9dd610e35e7eaed543a00c568b5470b560db2a2,2024-04-24T19:58:40.710000
|
||||
CVE-2024-4159,0,0,83c5328a03798238305f310f084078d3cad1fb6c98d5d54e9a84a0987f74cd3f,2024-04-25T06:16:00.560000
|
||||
CVE-2024-4161,0,0,2f77617960a9a5075b552af086040f8ad3ba69e67003299944e166633358fbf1,2024-04-25T06:16:01.427000
|
||||
CVE-2024-4173,1,1,4cf3c2b76ec47f8931ff62c340004180d5832fb2961611b4c2709afe37444bdc,2024-04-25T08:15:07.977000
|
||||
CVE-2024-4164,1,1,b636b4eac35d4002e496b996af715f3120aedfdd9d228b18553c2b02cc675f24,2024-04-25T11:15:46.777000
|
||||
CVE-2024-4173,0,0,4cf3c2b76ec47f8931ff62c340004180d5832fb2961611b4c2709afe37444bdc,2024-04-25T08:15:07.977000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user