mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-04-26T16:00:38.687809+00:00
This commit is contained in:
parent
55da6902ca
commit
3c22c0ecea
55
CVE-2022/CVE-2022-409xx/CVE-2022-40975.json
Normal file
55
CVE-2022/CVE-2022-409xx/CVE-2022-40975.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2022-40975",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-26T14:15:07.147",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Aazztech Post Slider.This issue affects Post Slider: from n/a through 1.6.7.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/adl-post-slider/wordpress-post-slider-plugin-1-6-7-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-412xx/CVE-2023-41290.json
Normal file
55
CVE-2023/CVE-2023-412xx/CVE-2023-41290.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-41290",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2024-04-26T15:15:46.473",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A path traversal vulnerability has been reported to affect QuFirewall. If exploited, the vulnerability could allow authenticated administrators to read the contents of unexpected files and expose sensitive data via a network.\n\nWe have already fixed the vulnerability in the following version:\nQuFirewall 2.4.1 ( 2024/02/01 ) and later\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-17",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-412xx/CVE-2023-41291.json
Normal file
55
CVE-2023/CVE-2023-412xx/CVE-2023-41291.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-41291",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2024-04-26T15:15:46.680",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A path traversal vulnerability has been reported to affect QuFirewall. If exploited, the vulnerability could allow authenticated administrators to read the contents of unexpected files and expose sensitive data via a network.\n\nWe have already fixed the vulnerability in the following version:\nQuFirewall 2.4.1 ( 2024/02/01 ) and later\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-17",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2023/CVE-2023-472xx/CVE-2023-47222.json
Normal file
63
CVE-2023/CVE-2023-472xx/CVE-2023-47222.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2023-47222",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2024-04-26T15:15:46.870",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An exposure of sensitive information vulnerability has been reported to affect Media Streaming add-on. If exploited, the vulnerability could allow users to compromise the security of the system via a network.\n\nWe have already fixed the vulnerability in the following version:\nMedia Streaming add-on 500.1.1.5 ( 2024/01/22 ) and later\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-15",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-503xx/CVE-2023-50361.json
Normal file
59
CVE-2023/CVE-2023-503xx/CVE-2023-50361.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-50361",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2024-04-26T15:15:47.080",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to execute code via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.6.2722 build 20240402 and later\nQuTS hero h5.1.6.2734 build 20240414 and later\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-20",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-503xx/CVE-2023-50362.json
Normal file
59
CVE-2023/CVE-2023-503xx/CVE-2023-50362.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-50362",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2024-04-26T15:15:47.277",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to execute code via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.6.2722 build 20240402 and later\nQuTS hero h5.1.6.2734 build 20240414 and later\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-20",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-503xx/CVE-2023-50363.json
Normal file
59
CVE-2023/CVE-2023-503xx/CVE-2023-50363.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-50363",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2024-04-26T15:15:47.460",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An incorrect authorization vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to bypass intended access restrictions via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.6.2722 build 20240402 and later\nQuTS hero h5.1.6.2734 build 20240414 and later\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-20",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-503xx/CVE-2023-50364.json
Normal file
59
CVE-2023/CVE-2023-503xx/CVE-2023-50364.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-50364",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2024-04-26T15:15:47.653",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.6.2722 build 20240402 and later\nQuTS hero h5.1.6.2734 build 20240414 and later\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-20",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-513xx/CVE-2023-51364.json
Normal file
55
CVE-2023/CVE-2023-513xx/CVE-2023-51364.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-51364",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2024-04-26T15:15:47.840",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A path traversal vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to read the contents of unexpected files and expose sensitive data via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.4.2596 build 20231128 and later\nQTS 4.5.4.2627 build 20231225 and later\nQuTS hero h5.1.3.2578 build 20231110 and later\nQuTS hero h4.5.4.2626 build 20231225 and later\nQuTScloud c5.1.5.2651 and later\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-14",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-513xx/CVE-2023-51365.json
Normal file
55
CVE-2023/CVE-2023-513xx/CVE-2023-51365.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-51365",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2024-04-26T15:15:48.030",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A path traversal vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to read the contents of unexpected files and expose sensitive data via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.4.2596 build 20231128 and later\nQTS 4.5.4.2627 build 20231225 and later\nQuTS hero h5.1.3.2578 build 20231110 and later\nQuTS hero h4.5.4.2626 build 20231225 and later\nQuTScloud c5.1.5.2651 and later\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-14",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-517xx/CVE-2023-51794.json
Normal file
20
CVE-2023/CVE-2023-517xx/CVE-2023-51794.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-51794",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-26T15:15:48.240",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via the libavfilter/af_stereowiden.c:120:69."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://trac.ffmpeg.org/ticket/10746",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52646",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-26T13:15:46.453",
|
||||
"lastModified": "2024-04-26T13:15:46.453",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
55
CVE-2024/CVE-2024-219xx/CVE-2024-21905.json
Normal file
55
CVE-2024/CVE-2024-219xx/CVE-2024-21905.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-21905",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2024-04-26T15:15:48.313",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An integer overflow or wraparound vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to compromise the security of the system via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.3.2578 build 20231110 and later\nQuTS hero h5.1.3.2578 build 20231110 and later\nQuTScloud c5.1.5.2651 and later\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-16",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-271xx/CVE-2024-27124.json
Normal file
55
CVE-2024/CVE-2024-271xx/CVE-2024-27124.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-27124",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2024-04-26T15:15:48.500",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.3.2578 build 20231110 and later\nQTS 4.5.4.2627 build 20231225 and later\nQuTS hero h5.1.3.2578 build 20231110 and later\nQuTS hero h4.5.4.2626 build 20231225 and later\nQuTScloud c5.1.5.2651 and later\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-09",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-283xx/CVE-2024-28328.json
Normal file
24
CVE-2024/CVE-2024-283xx/CVE-2024-28328.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-28328",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-26T15:15:48.687",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CSV Injection vulnerability in the Asus RT-N12+ router allows administrator users to inject arbitrary commands or formulas in the client name parameter which can be triggered and executed in a different user session upon exporting to CSV format."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://asus.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/CSV-Injection-CVE%E2%80%902024%E2%80%9028328",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29052",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-04-09T17:15:58.737",
|
||||
"lastModified": "2024-04-10T13:24:00.070",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-04-26T15:59:08.093",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -39,6 +39,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +60,68 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29052",
|
||||
"source": "secure@microsoft.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4291",
|
||||
"matchCriteriaId": "1BE5B3C6-9F18-44A0-95CC-B4CD358794BF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4291",
|
||||
"matchCriteriaId": "23C51F9B-0BF1-414C-BFA5-4F5B81413E9E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.2899",
|
||||
"matchCriteriaId": "39B18FD8-656D-46D2-8BDE-AF030C278E02"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.3447",
|
||||
"matchCriteriaId": "54B49649-55CB-4BFF-BB50-592662435694"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.3447",
|
||||
"matchCriteriaId": "79409538-C0CE-4051-80C3-383220427D0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2402",
|
||||
"matchCriteriaId": "7103C832-A4FB-4373-8A93-291E7A89B4AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.830",
|
||||
"matchCriteriaId": "F2B61B79-FEE5-4041-918D-6FE2C92771DC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29052",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29053",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-04-09T17:15:58.930",
|
||||
"lastModified": "2024-04-10T13:24:00.070",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-04-26T15:58:55.843",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -39,6 +39,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +60,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29053",
|
||||
"source": "secure@microsoft.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:defender_for_iot:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "24.1.3",
|
||||
"matchCriteriaId": "18FA07C5-9039-45DA-B262-AA77359E5AC7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29053",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29054",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-04-09T17:15:59.123",
|
||||
"lastModified": "2024-04-10T13:24:00.070",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-04-26T15:59:00.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -39,6 +39,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +60,33 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29054",
|
||||
"source": "secure@microsoft.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:defender_for_iot:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "22.0.0",
|
||||
"versionEndExcluding": "24.1.3",
|
||||
"matchCriteriaId": "03EB2802-9B99-4895-B396-3A34D92208F3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29054",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29055",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-04-09T17:15:59.320",
|
||||
"lastModified": "2024-04-10T13:24:00.070",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-04-26T15:58:48.473",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -39,6 +39,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +60,33 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29055",
|
||||
"source": "secure@microsoft.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:defender_for_iot:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "22.0.0",
|
||||
"versionEndExcluding": "24.1.3",
|
||||
"matchCriteriaId": "03EB2802-9B99-4895-B396-3A34D92208F3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29055",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29056",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-04-09T17:15:59.510",
|
||||
"lastModified": "2024-04-10T13:24:00.070",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-04-26T15:58:19.617",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -39,6 +39,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-327"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +60,80 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29056",
|
||||
"source": "secure@microsoft.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:r2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "D2CFC05C-282C-4146-AC21-BAE6AB9F1881"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "F73D1308-DB13-4B6C-A66F-5542FDCA749C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:datacenter:*:x64:*",
|
||||
"matchCriteriaId": "41C1875A-99AB-4D3A-B880-CF8D278AFA15"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "8968BAC8-A1DB-4F88-89F8-4BE47919C247"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "10.0.14393.6897",
|
||||
"matchCriteriaId": "550D61DE-276A-4729-9A35-4281F6875E9A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.5696",
|
||||
"matchCriteriaId": "4EAAB276-D0E4-41CA-8A25-4DE9FC90543E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2402",
|
||||
"matchCriteriaId": "7103C832-A4FB-4373-8A93-291E7A89B4AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.830",
|
||||
"matchCriteriaId": "396884D1-95E9-4991-B66E-ADC753977F1F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29056",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29061",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-04-09T17:15:59.720",
|
||||
"lastModified": "2024-04-10T13:24:00.070",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-04-26T15:57:55.730",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -39,6 +39,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +60,120 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29061",
|
||||
"source": "secure@microsoft.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.10240.20596",
|
||||
"matchCriteriaId": "E7BDA51E-51E0-487D-A25F-2477213B563E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.10240.20596",
|
||||
"matchCriteriaId": "A607FDAE-53FE-49DA-806F-0533F5ECC108"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.14393.6897",
|
||||
"matchCriteriaId": "6CA18E04-75AD-4BC1-BCF7-B7C3DD33D9D3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.14393.6897",
|
||||
"matchCriteriaId": "8E68CF86-FB36-4E0E-A919-D7010E1D9CEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.5696",
|
||||
"matchCriteriaId": "7C50F3D5-1329-4563-BB59-9C50E2EEC237"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4291",
|
||||
"matchCriteriaId": "1BE5B3C6-9F18-44A0-95CC-B4CD358794BF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4291",
|
||||
"matchCriteriaId": "23C51F9B-0BF1-414C-BFA5-4F5B81413E9E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.2899",
|
||||
"matchCriteriaId": "39B18FD8-656D-46D2-8BDE-AF030C278E02"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.3447",
|
||||
"matchCriteriaId": "54B49649-55CB-4BFF-BB50-592662435694"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.3447",
|
||||
"matchCriteriaId": "79409538-C0CE-4051-80C3-383220427D0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "F73D1308-DB13-4B6C-A66F-5542FDCA749C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:-:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "C3C00116-417B-4C3B-B4C6-47B30FA499A5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.6897",
|
||||
"matchCriteriaId": "412F0026-BBE6-4F7D-ABC2-56E9F1791122"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.5696",
|
||||
"matchCriteriaId": "4EAAB276-D0E4-41CA-8A25-4DE9FC90543E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2402",
|
||||
"matchCriteriaId": "7103C832-A4FB-4373-8A93-291E7A89B4AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.830",
|
||||
"matchCriteriaId": "396884D1-95E9-4991-B66E-ADC753977F1F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29061",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29062",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-04-09T17:15:59.917",
|
||||
"lastModified": "2024-04-10T13:24:00.070",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-04-26T15:57:33.763",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -39,6 +39,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +60,120 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29062",
|
||||
"source": "secure@microsoft.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.10240.20596",
|
||||
"matchCriteriaId": "E7BDA51E-51E0-487D-A25F-2477213B563E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.10240.20596",
|
||||
"matchCriteriaId": "A607FDAE-53FE-49DA-806F-0533F5ECC108"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.14393.6897",
|
||||
"matchCriteriaId": "6CA18E04-75AD-4BC1-BCF7-B7C3DD33D9D3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.14393.6897",
|
||||
"matchCriteriaId": "8E68CF86-FB36-4E0E-A919-D7010E1D9CEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.5696",
|
||||
"matchCriteriaId": "7C50F3D5-1329-4563-BB59-9C50E2EEC237"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4291",
|
||||
"matchCriteriaId": "1BE5B3C6-9F18-44A0-95CC-B4CD358794BF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4291",
|
||||
"matchCriteriaId": "23C51F9B-0BF1-414C-BFA5-4F5B81413E9E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.2899",
|
||||
"matchCriteriaId": "39B18FD8-656D-46D2-8BDE-AF030C278E02"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.3447",
|
||||
"matchCriteriaId": "54B49649-55CB-4BFF-BB50-592662435694"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.3447",
|
||||
"matchCriteriaId": "79409538-C0CE-4051-80C3-383220427D0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "F73D1308-DB13-4B6C-A66F-5542FDCA749C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "8968BAC8-A1DB-4F88-89F8-4BE47919C247"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.6897",
|
||||
"matchCriteriaId": "412F0026-BBE6-4F7D-ABC2-56E9F1791122"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.5696",
|
||||
"matchCriteriaId": "4EAAB276-D0E4-41CA-8A25-4DE9FC90543E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2402",
|
||||
"matchCriteriaId": "7103C832-A4FB-4373-8A93-291E7A89B4AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.830",
|
||||
"matchCriteriaId": "396884D1-95E9-4991-B66E-ADC753977F1F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29062",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-30xx/CVE-2024-3076.json
Normal file
20
CVE-2024/CVE-2024-30xx/CVE-2024-3076.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-3076",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-04-26T14:15:07.370",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The MM-email2image WordPress plugin through 0.2.5 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/617ec2e9-9058-4a93-8ad4-7ecb85107141/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3097",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-09T19:15:39.553",
|
||||
"lastModified": "2024-04-10T13:23:38.787",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-04-26T15:56:40.820",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -38,22 +58,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/nextgen-gallery/trunk/src/REST/Admin/Block.php#L40",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3063940/nextgen-gallery/trunk/src/REST/Admin/Block.php?old=3003333&old_path=nextgen-gallery%2Ftrunk%2Fsrc%2FREST%2FAdmin%2FBlock.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/75f87f99-9f0d-46c2-a6f1-3c1ea0176303?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://zpbrent.github.io/pocs/8-plugin-nextgen-gallery-InfoDis-20240327.mp4",
|
||||
"source": "security@wordfence.com"
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imagely:nextgen_gallery:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.59.1",
|
||||
"matchCriteriaId": "0FE57FDF-E058-4183-800A-FF8881671E2E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/nextgen-gallery/trunk/src/REST/Admin/Block.php#L40",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3063940/nextgen-gallery/trunk/src/REST/Admin/Block.php?old=3003333&old_path=nextgen-gallery%2Ftrunk%2Fsrc%2FREST%2FAdmin%2FBlock.php",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/75f87f99-9f0d-46c2-a6f1-3c1ea0176303?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://zpbrent.github.io/pocs/8-plugin-nextgen-gallery-InfoDis-20240327.mp4",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31302",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-10T16:15:14.563",
|
||||
"lastModified": "2024-04-10T19:49:51.183",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-04-26T15:55:30.873",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +66,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/contact-form-to-email/wordpress-contact-form-email-plugin-1-3-44-sensitive-data-exposure-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:codepeople:contact_form_email:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.3.44",
|
||||
"matchCriteriaId": "4AEC0FFB-CA7B-4C8A-A28E-7088514D1597"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/contact-form-to-email/wordpress-contact-form-email-plugin-1-3-44-sensitive-data-exposure-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3158",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-04-06T15:15:26.940",
|
||||
"lastModified": "2024-04-19T23:15:11.643",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-04-26T16:00:15.540",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,19 +14,81 @@
|
||||
"value": "Use after free en Bookmarks de Google Chrome anterior a 123.0.6312.105 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/329965696",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "123.0.6312.105",
|
||||
"matchCriteriaId": "F5EA8775-5734-44DA-9F33-DF17AE62D780"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/329965696",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3159",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-04-06T15:15:26.983",
|
||||
"lastModified": "2024-04-19T23:15:11.687",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-04-26T15:59:59.020",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,19 +14,81 @@
|
||||
"value": "El acceso a memoria fuera de los l\u00edmites en V8 en Google Chrome anterior a 123.0.6312.105 permit\u00eda a un atacante remoto realizar lectura/escritura arbitraria a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/330760873",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "123.0.6312.105",
|
||||
"matchCriteriaId": "F5EA8775-5734-44DA-9F33-DF17AE62D780"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/330760873",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3167",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-09T19:15:39.877",
|
||||
"lastModified": "2024-04-10T13:23:38.787",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-04-26T15:55:58.810",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -38,18 +58,57 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ocean-extra/tags/2.2.6/includes/widgets/social-share.php#L269",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3066649/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a292579c-9755-4bd4-996c-23d19ca1c197?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oceanwp:ocean_extra:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.2.7",
|
||||
"matchCriteriaId": "B9A06930-955B-4132-9A79-9920D37DA535"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ocean-extra/tags/2.2.6/includes/widgets/social-share.php#L269",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3066649/",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a292579c-9755-4bd4-996c-23d19ca1c197?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-327xx/CVE-2024-32764.json
Normal file
63
CVE-2024/CVE-2024-327xx/CVE-2024-32764.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-32764",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2024-04-26T15:15:48.743",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A missing authentication for critical function vulnerability has been reported to affect myQNAPcloud Link. If exploited, the vulnerability could allow users with the privilege level of some functionality via a network.\n\nWe have already fixed the vulnerability in the following version:\nmyQNAPcloud Link 2.4.51 and later\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 9.9,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.3
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-346"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-749"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-09",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-327xx/CVE-2024-32766.json
Normal file
59
CVE-2024/CVE-2024-327xx/CVE-2024-32766.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-32766",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2024-04-26T15:15:48.943",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.3.2578 build 20231110 and later\nQTS 4.5.4.2627 build 20231225 and later\nQuTS hero h5.1.3.2578 build 20231110 and later\nQuTS hero h4.5.4.2626 build 20231225 and later\nQuTScloud c5.1.5.2651 and later\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-09",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-332xx/CVE-2024-33255.json
Normal file
20
CVE-2024/CVE-2024-332xx/CVE-2024-33255.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-33255",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-26T15:15:49.130",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jerryscript commit cefd391 was discovered to contain an Assertion Failure via ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p) in ecma_free_string_list."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jerryscript-project/jerryscript/issues/5135",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-332xx/CVE-2024-33258.json
Normal file
20
CVE-2024/CVE-2024-332xx/CVE-2024-33258.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-33258",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-26T15:15:49.180",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jerryscript commit ff9ff8f was discovered to contain a segmentation violation via the component vm_loop at jerry-core/vm/vm.c."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jerryscript-project/jerryscript/issues/5114",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-332xx/CVE-2024-33259.json
Normal file
20
CVE-2024/CVE-2024-332xx/CVE-2024-33259.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-33259",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-26T15:15:49.250",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jerryscript commit cefd391 was discovered to contain a segmentation violation via the component scanner_seek at jerry-core/parser/js/js-scanner-util.c."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jerryscript-project/jerryscript/issues/5132",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-332xx/CVE-2024-33260.json
Normal file
20
CVE-2024/CVE-2024-332xx/CVE-2024-33260.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-33260",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-26T15:15:49.303",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jerryscript commit cefd391 was discovered to contain a segmentation violation via the component parser_parse_class at jerry-core/parser/js/js-parser-expr.c"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jerryscript-project/jerryscript/issues/5133",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33688",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-26T13:15:46.530",
|
||||
"lastModified": "2024-04-26T13:15:46.530",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33689",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-26T13:15:46.727",
|
||||
"lastModified": "2024-04-26T13:15:46.727",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33690",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-26T13:15:46.923",
|
||||
"lastModified": "2024-04-26T13:15:46.923",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33691",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-26T13:15:47.150",
|
||||
"lastModified": "2024-04-26T13:15:47.150",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33692",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-26T13:15:47.367",
|
||||
"lastModified": "2024-04-26T13:15:47.367",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33693",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-26T13:15:47.570",
|
||||
"lastModified": "2024-04-26T13:15:47.570",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33694",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-26T13:15:47.770",
|
||||
"lastModified": "2024-04-26T13:15:47.770",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33695",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-26T13:15:47.957",
|
||||
"lastModified": "2024-04-26T13:15:47.957",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33696",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-26T13:15:48.150",
|
||||
"lastModified": "2024-04-26T13:15:48.150",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33697",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-26T13:15:48.347",
|
||||
"lastModified": "2024-04-26T13:15:48.347",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3371",
|
||||
"sourceIdentifier": "cna@mongodb.com",
|
||||
"published": "2024-04-24T17:15:47.230",
|
||||
"lastModified": "2024-04-24T17:16:50.397",
|
||||
"lastModified": "2024-04-26T15:15:49.357",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "MongoDB Compass may accept and use insufficiently validated input from an untrusted external source. This may cause unintended application behavior, including data disclosure and enabling attackers to impersonate users. This issue affects MongoDB Compass versions 1.35.0 to 1.40.5.\n"
|
||||
"value": "MongoDB Compass may accept and use insufficiently validated input from an untrusted external source. This may cause unintended application behavior, including data disclosure and enabling attackers to impersonate users. This issue affects MongoDB Compass versions 1.35.0 to 1.42.0.\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "MongoDB Compass puede aceptar y utilizar entradas no suficientemente validadas de una fuente externa que no sea de confianza. Esto puede provocar un comportamiento no deseado de la aplicaci\u00f3n, incluida la divulgaci\u00f3n de datos y permitir que los atacantes se hagan pasar por usuarios. Este problema afecta a las versiones 1.35.0 a 1.40.5 de MongoDB Compass."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4040",
|
||||
"sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"published": "2024-04-22T20:15:07.803",
|
||||
"lastModified": "2024-04-26T01:00:01.587",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-04-26T15:25:47.270",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2024-04-24",
|
||||
"cisaActionDue": "2024-05-01",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
@ -20,6 +20,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"type": "Secondary",
|
||||
@ -43,6 +63,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"type": "Secondary",
|
||||
@ -54,34 +84,87 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/airbus-cert/CVE-2024-4040",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.0.0",
|
||||
"versionEndExcluding": "10.7.1",
|
||||
"matchCriteriaId": "1922C854-D367-44B7-AEFB-4AEB07679E16"
|
||||
},
|
||||
{
|
||||
"url": "https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
|
||||
},
|
||||
{
|
||||
"url": "https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
|
||||
},
|
||||
{
|
||||
"url": "https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
|
||||
},
|
||||
{
|
||||
"url": "https://www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
|
||||
},
|
||||
{
|
||||
"url": "https://www.reddit.com/r/crowdstrike/comments/1c88788/situational_awareness_20240419_crushftp_virtual/",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
|
||||
},
|
||||
{
|
||||
"url": "https://www.reddit.com/r/cybersecurity/comments/1c850i2/all_versions_of_crush_ftp_are_vulnerable/",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0.0",
|
||||
"versionEndExcluding": "11.1.0",
|
||||
"matchCriteriaId": "4EF482D8-4F40-454D-9A92-9D6924C582E2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/airbus-cert/CVE-2024-4040",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"tags": [
|
||||
"Press/Media Coverage",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.reddit.com/r/crowdstrike/comments/1c88788/situational_awareness_20240419_crushftp_virtual/",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"tags": [
|
||||
"Press/Media Coverage",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.reddit.com/r/cybersecurity/comments/1c850i2/all_versions_of_crush_ftp_are_vulnerable/",
|
||||
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Press/Media Coverage",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4234",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-26T13:15:48.540",
|
||||
"lastModified": "2024-04-26T13:15:48.540",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
94
README.md
94
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-26T14:00:37.709498+00:00
|
||||
2024-04-26T16:00:38.687809+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-26T13:15:48.540000+00:00
|
||||
2024-04-26T16:00:15.540000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,57 +33,65 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
246889
|
||||
246910
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `13`
|
||||
Recently added CVEs: `21`
|
||||
|
||||
- [CVE-2023-52646](CVE-2023/CVE-2023-526xx/CVE-2023-52646.json) (`2024-04-26T13:15:46.453`)
|
||||
- [CVE-2024-32822](CVE-2024/CVE-2024-328xx/CVE-2024-32822.json) (`2024-04-26T12:15:07.130`)
|
||||
- [CVE-2024-33688](CVE-2024/CVE-2024-336xx/CVE-2024-33688.json) (`2024-04-26T13:15:46.530`)
|
||||
- [CVE-2024-33689](CVE-2024/CVE-2024-336xx/CVE-2024-33689.json) (`2024-04-26T13:15:46.727`)
|
||||
- [CVE-2024-33690](CVE-2024/CVE-2024-336xx/CVE-2024-33690.json) (`2024-04-26T13:15:46.923`)
|
||||
- [CVE-2024-33691](CVE-2024/CVE-2024-336xx/CVE-2024-33691.json) (`2024-04-26T13:15:47.150`)
|
||||
- [CVE-2024-33692](CVE-2024/CVE-2024-336xx/CVE-2024-33692.json) (`2024-04-26T13:15:47.367`)
|
||||
- [CVE-2024-33693](CVE-2024/CVE-2024-336xx/CVE-2024-33693.json) (`2024-04-26T13:15:47.570`)
|
||||
- [CVE-2024-33694](CVE-2024/CVE-2024-336xx/CVE-2024-33694.json) (`2024-04-26T13:15:47.770`)
|
||||
- [CVE-2024-33695](CVE-2024/CVE-2024-336xx/CVE-2024-33695.json) (`2024-04-26T13:15:47.957`)
|
||||
- [CVE-2024-33696](CVE-2024/CVE-2024-336xx/CVE-2024-33696.json) (`2024-04-26T13:15:48.150`)
|
||||
- [CVE-2024-33697](CVE-2024/CVE-2024-336xx/CVE-2024-33697.json) (`2024-04-26T13:15:48.347`)
|
||||
- [CVE-2024-4234](CVE-2024/CVE-2024-42xx/CVE-2024-4234.json) (`2024-04-26T13:15:48.540`)
|
||||
- [CVE-2022-40975](CVE-2022/CVE-2022-409xx/CVE-2022-40975.json) (`2024-04-26T14:15:07.147`)
|
||||
- [CVE-2023-41290](CVE-2023/CVE-2023-412xx/CVE-2023-41290.json) (`2024-04-26T15:15:46.473`)
|
||||
- [CVE-2023-41291](CVE-2023/CVE-2023-412xx/CVE-2023-41291.json) (`2024-04-26T15:15:46.680`)
|
||||
- [CVE-2023-47222](CVE-2023/CVE-2023-472xx/CVE-2023-47222.json) (`2024-04-26T15:15:46.870`)
|
||||
- [CVE-2023-50361](CVE-2023/CVE-2023-503xx/CVE-2023-50361.json) (`2024-04-26T15:15:47.080`)
|
||||
- [CVE-2023-50362](CVE-2023/CVE-2023-503xx/CVE-2023-50362.json) (`2024-04-26T15:15:47.277`)
|
||||
- [CVE-2023-50363](CVE-2023/CVE-2023-503xx/CVE-2023-50363.json) (`2024-04-26T15:15:47.460`)
|
||||
- [CVE-2023-50364](CVE-2023/CVE-2023-503xx/CVE-2023-50364.json) (`2024-04-26T15:15:47.653`)
|
||||
- [CVE-2023-51364](CVE-2023/CVE-2023-513xx/CVE-2023-51364.json) (`2024-04-26T15:15:47.840`)
|
||||
- [CVE-2023-51365](CVE-2023/CVE-2023-513xx/CVE-2023-51365.json) (`2024-04-26T15:15:48.030`)
|
||||
- [CVE-2023-51794](CVE-2023/CVE-2023-517xx/CVE-2023-51794.json) (`2024-04-26T15:15:48.240`)
|
||||
- [CVE-2024-21905](CVE-2024/CVE-2024-219xx/CVE-2024-21905.json) (`2024-04-26T15:15:48.313`)
|
||||
- [CVE-2024-27124](CVE-2024/CVE-2024-271xx/CVE-2024-27124.json) (`2024-04-26T15:15:48.500`)
|
||||
- [CVE-2024-28328](CVE-2024/CVE-2024-283xx/CVE-2024-28328.json) (`2024-04-26T15:15:48.687`)
|
||||
- [CVE-2024-3076](CVE-2024/CVE-2024-30xx/CVE-2024-3076.json) (`2024-04-26T14:15:07.370`)
|
||||
- [CVE-2024-32764](CVE-2024/CVE-2024-327xx/CVE-2024-32764.json) (`2024-04-26T15:15:48.743`)
|
||||
- [CVE-2024-32766](CVE-2024/CVE-2024-327xx/CVE-2024-32766.json) (`2024-04-26T15:15:48.943`)
|
||||
- [CVE-2024-33255](CVE-2024/CVE-2024-332xx/CVE-2024-33255.json) (`2024-04-26T15:15:49.130`)
|
||||
- [CVE-2024-33258](CVE-2024/CVE-2024-332xx/CVE-2024-33258.json) (`2024-04-26T15:15:49.180`)
|
||||
- [CVE-2024-33259](CVE-2024/CVE-2024-332xx/CVE-2024-33259.json) (`2024-04-26T15:15:49.250`)
|
||||
- [CVE-2024-33260](CVE-2024/CVE-2024-332xx/CVE-2024-33260.json) (`2024-04-26T15:15:49.303`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `90`
|
||||
Recently modified CVEs: `28`
|
||||
|
||||
- [CVE-2024-33670](CVE-2024/CVE-2024-336xx/CVE-2024-33670.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-33671](CVE-2024/CVE-2024-336xx/CVE-2024-33671.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-33672](CVE-2024/CVE-2024-336xx/CVE-2024-33672.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-33673](CVE-2024/CVE-2024-336xx/CVE-2024-33673.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-33677](CVE-2024/CVE-2024-336xx/CVE-2024-33677.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-33678](CVE-2024/CVE-2024-336xx/CVE-2024-33678.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-33679](CVE-2024/CVE-2024-336xx/CVE-2024-33679.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-33680](CVE-2024/CVE-2024-336xx/CVE-2024-33680.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-33682](CVE-2024/CVE-2024-336xx/CVE-2024-33682.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-33683](CVE-2024/CVE-2024-336xx/CVE-2024-33683.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-3508](CVE-2024/CVE-2024-35xx/CVE-2024-3508.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-3622](CVE-2024/CVE-2024-36xx/CVE-2024-3622.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-3623](CVE-2024/CVE-2024-36xx/CVE-2024-3623.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-3624](CVE-2024/CVE-2024-36xx/CVE-2024-3624.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-3625](CVE-2024/CVE-2024-36xx/CVE-2024-3625.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-3678](CVE-2024/CVE-2024-36xx/CVE-2024-3678.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-3682](CVE-2024/CVE-2024-36xx/CVE-2024-3682.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-3890](CVE-2024/CVE-2024-38xx/CVE-2024-3890.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-3962](CVE-2024/CVE-2024-39xx/CVE-2024-3962.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-4056](CVE-2024/CVE-2024-40xx/CVE-2024-4056.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-4163](CVE-2024/CVE-2024-41xx/CVE-2024-4163.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-4182](CVE-2024/CVE-2024-41xx/CVE-2024-4182.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-4183](CVE-2024/CVE-2024-41xx/CVE-2024-4183.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-4195](CVE-2024/CVE-2024-41xx/CVE-2024-4195.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-4198](CVE-2024/CVE-2024-41xx/CVE-2024-4198.json) (`2024-04-26T12:58:17.720`)
|
||||
- [CVE-2024-29052](CVE-2024/CVE-2024-290xx/CVE-2024-29052.json) (`2024-04-26T15:59:08.093`)
|
||||
- [CVE-2024-29053](CVE-2024/CVE-2024-290xx/CVE-2024-29053.json) (`2024-04-26T15:58:55.843`)
|
||||
- [CVE-2024-29054](CVE-2024/CVE-2024-290xx/CVE-2024-29054.json) (`2024-04-26T15:59:00.880`)
|
||||
- [CVE-2024-29055](CVE-2024/CVE-2024-290xx/CVE-2024-29055.json) (`2024-04-26T15:58:48.473`)
|
||||
- [CVE-2024-29056](CVE-2024/CVE-2024-290xx/CVE-2024-29056.json) (`2024-04-26T15:58:19.617`)
|
||||
- [CVE-2024-29061](CVE-2024/CVE-2024-290xx/CVE-2024-29061.json) (`2024-04-26T15:57:55.730`)
|
||||
- [CVE-2024-29062](CVE-2024/CVE-2024-290xx/CVE-2024-29062.json) (`2024-04-26T15:57:33.763`)
|
||||
- [CVE-2024-3097](CVE-2024/CVE-2024-30xx/CVE-2024-3097.json) (`2024-04-26T15:56:40.820`)
|
||||
- [CVE-2024-31302](CVE-2024/CVE-2024-313xx/CVE-2024-31302.json) (`2024-04-26T15:55:30.873`)
|
||||
- [CVE-2024-3158](CVE-2024/CVE-2024-31xx/CVE-2024-3158.json) (`2024-04-26T16:00:15.540`)
|
||||
- [CVE-2024-3159](CVE-2024/CVE-2024-31xx/CVE-2024-3159.json) (`2024-04-26T15:59:59.020`)
|
||||
- [CVE-2024-3167](CVE-2024/CVE-2024-31xx/CVE-2024-3167.json) (`2024-04-26T15:55:58.810`)
|
||||
- [CVE-2024-33688](CVE-2024/CVE-2024-336xx/CVE-2024-33688.json) (`2024-04-26T15:32:22.523`)
|
||||
- [CVE-2024-33689](CVE-2024/CVE-2024-336xx/CVE-2024-33689.json) (`2024-04-26T15:32:22.523`)
|
||||
- [CVE-2024-33690](CVE-2024/CVE-2024-336xx/CVE-2024-33690.json) (`2024-04-26T15:32:22.523`)
|
||||
- [CVE-2024-33691](CVE-2024/CVE-2024-336xx/CVE-2024-33691.json) (`2024-04-26T15:32:22.523`)
|
||||
- [CVE-2024-33692](CVE-2024/CVE-2024-336xx/CVE-2024-33692.json) (`2024-04-26T15:32:22.523`)
|
||||
- [CVE-2024-33693](CVE-2024/CVE-2024-336xx/CVE-2024-33693.json) (`2024-04-26T15:32:22.523`)
|
||||
- [CVE-2024-33694](CVE-2024/CVE-2024-336xx/CVE-2024-33694.json) (`2024-04-26T15:32:22.523`)
|
||||
- [CVE-2024-33695](CVE-2024/CVE-2024-336xx/CVE-2024-33695.json) (`2024-04-26T15:32:22.523`)
|
||||
- [CVE-2024-33696](CVE-2024/CVE-2024-336xx/CVE-2024-33696.json) (`2024-04-26T15:32:22.523`)
|
||||
- [CVE-2024-33697](CVE-2024/CVE-2024-336xx/CVE-2024-33697.json) (`2024-04-26T15:32:22.523`)
|
||||
- [CVE-2024-3371](CVE-2024/CVE-2024-33xx/CVE-2024-3371.json) (`2024-04-26T15:15:49.357`)
|
||||
- [CVE-2024-4040](CVE-2024/CVE-2024-40xx/CVE-2024-4040.json) (`2024-04-26T15:25:47.270`)
|
||||
- [CVE-2024-4234](CVE-2024/CVE-2024-42xx/CVE-2024-4234.json) (`2024-04-26T15:32:22.523`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
259
_state.csv
259
_state.csv
@ -202360,8 +202360,8 @@ CVE-2022-36024,0,0,9039e3946d6b9d76ef561cb507b2677b164bce3adf7be37e5854f859e1964
|
||||
CVE-2022-36025,0,0,9ba2373843f8e102d0f2bcb9c4d62420f6dba990f346cf0010cc7c07e632367a,2022-09-28T14:41:56.287000
|
||||
CVE-2022-36026,0,0,58b065c9b47fdcd4f5e4c34dcaf827a0eeec264732e451c2b7440562b3c87629,2022-09-20T14:55:34.977000
|
||||
CVE-2022-36027,0,0,83100c313c4d3c571dc0837f4379252f4b068b2d548533867d896ece54067b8a,2022-09-20T14:38:28.217000
|
||||
CVE-2022-36028,0,1,1421f35d37dd46fb341e50a31c2bae4d61a5f883a007a57f155bc7df761adaa3,2024-04-26T12:58:17.720000
|
||||
CVE-2022-36029,0,1,f06d09d04e1f03c2cfd26ccc8d0b58e4136ab15077185142969bf6ead4ddd53e,2024-04-26T12:58:17.720000
|
||||
CVE-2022-36028,0,0,1421f35d37dd46fb341e50a31c2bae4d61a5f883a007a57f155bc7df761adaa3,2024-04-26T12:58:17.720000
|
||||
CVE-2022-36029,0,0,f06d09d04e1f03c2cfd26ccc8d0b58e4136ab15077185142969bf6ead4ddd53e,2024-04-26T12:58:17.720000
|
||||
CVE-2022-3603,0,0,58e13d239dd91f0b79cc4896825099759747d7d1ac51464782b039affed63b1d,2023-11-07T03:51:30.343000
|
||||
CVE-2022-36030,0,0,9b76a42acc896ec71fb9587faf9fceb3c680dae469c597a9542b0837a9d019f7,2022-08-23T18:49:40.420000
|
||||
CVE-2022-36031,0,0,a6ea456bdee60f1e63193aa8dfc6b0335f408e859c09813a2c2581b8ab6a62a7,2022-08-24T18:57:48.520000
|
||||
@ -206028,6 +206028,7 @@ CVE-2022-4097,0,0,6b060ec6fc71d511ad42a11d50d35f08380425d6885f6a865bd85a82a37587
|
||||
CVE-2022-40971,0,0,f8b0f7da91495db2ae58cc75a0e34ec2bdbe666b7ca31c8ea5bf858a2f4b8d43,2023-11-07T03:52:39.070000
|
||||
CVE-2022-40972,0,0,03219974c50c4eee95d189cbbea7a5bcbd026ae8b2a7bbcff9cdad7e88dc9650,2023-11-07T03:52:39.250000
|
||||
CVE-2022-40974,0,0,bd25c6806277e4cf7f0320d68cfd0502e25a65da685937ad48355dc62e6bd7d9,2023-11-07T03:52:39.430000
|
||||
CVE-2022-40975,1,1,a9acf5db318b74ebc2b489316181984b7716ab90bcc77604c3a29c82fe4c8eb1,2024-04-26T15:32:22.523000
|
||||
CVE-2022-40976,0,0,477533e3e45af40b9f08a9418ae7520cfeae228929f90bd91c71ca75e7f1fb6e,2023-02-03T16:13:06.807000
|
||||
CVE-2022-40977,0,0,119cc82d7ad0f16b8aeb45702e574f30ab5113c2b3afee63b29af733260f3be6,2023-11-07T03:52:39.550000
|
||||
CVE-2022-40978,0,0,331c5d0a6aaa3030d9dc216dc9145fffbdecf8ae390f3cdc7d1a5849c80fc2fa,2022-09-21T22:53:38.983000
|
||||
@ -211495,7 +211496,7 @@ CVE-2022-4865,0,0,ca348115ae41e38a1bc69af0c75dfb35364aad74f0d955859af486be9af486
|
||||
CVE-2022-4866,0,0,64c9ea7b26626d61a99b74354dc5f958961e6d20aa6371d15f635281a82cc0f0,2023-01-06T21:24:01.587000
|
||||
CVE-2022-4867,0,0,df30bf033a8b71c87ccc147259fbbc1d4b447580323b889a3d7676505e257148,2023-01-06T21:26:37.597000
|
||||
CVE-2022-4868,0,0,49bc3762269009af54870f2860cabd5c2f0372571503d002526079fe993a74bc,2023-01-06T21:20:41.477000
|
||||
CVE-2022-48682,0,1,ab79a7884cf84c87a21a00581b3679825469c2af77233a0e49acaa1ff90167b4,2024-04-26T12:58:17.720000
|
||||
CVE-2022-48682,0,0,ab79a7884cf84c87a21a00581b3679825469c2af77233a0e49acaa1ff90167b4,2024-04-26T12:58:17.720000
|
||||
CVE-2022-4869,0,0,8d8764937cca8aa8c728688dab097a07b47820eec099f6720542fc4a3e489b45,2024-04-11T01:17:32.477000
|
||||
CVE-2022-4870,0,0,ffd8aa6f3e45d78db8f0fdd0224eff53e3f88f9afa51308e06056eb1d9d02eeb,2023-05-25T17:41:06.867000
|
||||
CVE-2022-4871,0,0,7da137eba4bc59f17d11a7ab323d7f3109098463f5f3c2c9ae236dde33ebca18,2024-04-11T01:17:32.567000
|
||||
@ -229507,6 +229508,8 @@ CVE-2023-41287,0,0,a62b702514fbd7cba79a7007e950f32b81d3d7e066ed23053dd0e48555763
|
||||
CVE-2023-41288,0,0,6612ebb35c194c472f2b327a1a5cd11359cc5f56fa78014d30c579cec5b942c2,2024-01-10T16:58:29.147000
|
||||
CVE-2023-41289,0,0,fee5b807a31582c299f6bb124c15386637e42df6dca46c890cae694373a7b0f1,2024-01-10T16:58:08.423000
|
||||
CVE-2023-4129,0,0,61b4fad7a506668bd7d10716f9b6ea4393fe60c463de4f3a1ed796185e54c620,2023-10-02T17:05:14.907000
|
||||
CVE-2023-41290,1,1,c6265e7f4f97866802c11a6bea3b6d0dfb4208905b00a1c65a16f2aa404b1bc5,2024-04-26T15:32:22.523000
|
||||
CVE-2023-41291,1,1,1fc0b9845a2e9e504be4e1ce1f5be21837a9ccfaf0afe970ea26970c5f58690d,2024-04-26T15:32:22.523000
|
||||
CVE-2023-41292,0,0,f01e9dbc42ba45ddfb04c5f020466af129da1f5650d41d4db5e1b1e1baa14e9e,2024-02-06T20:05:45.333000
|
||||
CVE-2023-41293,0,0,3a31b0ea5c07b735579e010af1c9b99fa63f027d196f79f621e06a31a7adcd40,2023-09-25T17:10:42.680000
|
||||
CVE-2023-41294,0,0,0c9c13c4b9e12bb1a43471b79764cfc84fde8b28cdd834485609ee01d45eaaa0,2023-09-25T17:59:10.743000
|
||||
@ -233247,6 +233250,7 @@ CVE-2023-47218,0,0,83f8f641f2a43b3801eefd155daa6a42bde9110b4e0363a3c306f27bd77e5
|
||||
CVE-2023-47219,0,0,e8eae84b161278342455d307aea60fa5f5d2ae8ca233b52f68827fe747f9943a,2024-01-10T16:53:51.923000
|
||||
CVE-2023-4722,0,0,eaae0ee3a6a4566639d2b2e02588993aeab32953ee7eebba3440e7a641e87890,2023-09-06T00:15:42.687000
|
||||
CVE-2023-47221,0,0,00752a6b07977d87ab309ddc4962fddddd8536b48b4073fdf4b346d4e4c33120,2024-03-08T21:19:43.127000
|
||||
CVE-2023-47222,1,1,55ad695f510cc8c574fcf1c2fed70ab4c969f640f125fadf3c515b9457ac562b,2024-04-26T15:32:22.523000
|
||||
CVE-2023-47223,0,0,c7133be7f530791bf8f940b059f72ce830c1340409edd7f4402c7f0942a2d39e,2023-11-14T21:10:45.890000
|
||||
CVE-2023-47226,0,0,0ca8bcb1e4e713dbdd4e03ad3351b73fa294028d2e4f7ef87be5778f187413b0,2023-11-14T21:10:29.973000
|
||||
CVE-2023-47227,0,0,96cc73dc99acaac6921b57e7d42c2ec8ec09536afada617ff1aa1fe4d6f43feb,2023-11-14T21:10:01.587000
|
||||
@ -233275,7 +233279,7 @@ CVE-2023-47249,0,0,588609ccc6bec02a404ce20559ef14e4186adae4632c04e95b8afe3f76e9f
|
||||
CVE-2023-4725,0,0,04164ede04550b9698eb48a780e218da3cc662c0ab120fa603ad1bfd469e0c8d,2023-11-07T04:22:54.047000
|
||||
CVE-2023-47250,0,0,797794357be142015cae6ecf62d3ef166201b7faf38b79ac29c86b5211586e03,2023-11-30T20:55:39.480000
|
||||
CVE-2023-47251,0,0,334ed573018069c019e1a512b4215ed53ff35e3afe580c8dea578498d7671511,2023-11-30T20:49:57.593000
|
||||
CVE-2023-47252,0,1,015cdea05c803435ac7ca392b584bf3c7a19db9802aa6603340ea3a0ada10bee,2024-04-26T12:58:17.720000
|
||||
CVE-2023-47252,0,0,015cdea05c803435ac7ca392b584bf3c7a19db9802aa6603340ea3a0ada10bee,2024-04-26T12:58:17.720000
|
||||
CVE-2023-47253,0,0,ba8811cc3b5e7eeab51338b3370421a30d297b58dee68080760ae2c3fe084981,2023-11-14T20:03:09.900000
|
||||
CVE-2023-47254,0,0,2ceaabea8b552c825ee67e0a4275d459a09167965723aa94a10b6aef1023ef84,2023-12-12T22:33:48.820000
|
||||
CVE-2023-47256,0,0,135dc3a37d912e8d13804a14befd28f178538ec0146ffeff245bc9a355e0e147,2024-02-15T07:15:08.250000
|
||||
@ -235278,6 +235282,10 @@ CVE-2023-50357,0,0,10f49bd8aa86380002632a76feb2a3fcbaed63ae57cca674392dfa71e24ef
|
||||
CVE-2023-50358,0,0,dcc69e7de121b62cffbcb3a353b3227e688e9a797c3142338407207eaa647e2c,2024-02-15T06:15:45.960000
|
||||
CVE-2023-50359,0,0,b3a8928135da4b7fa309f9445e3bb7b11db2ae4911130c7688b9e2f087f447b9,2024-02-06T20:18:14.547000
|
||||
CVE-2023-5036,0,0,ea63a988956d1c557cc3d538b2ddc2e01af0700ac5c0e24f7cc6c43a93c702fb,2023-09-19T13:18:54.193000
|
||||
CVE-2023-50361,1,1,d1ed917b8976113e2da833be44dab1af1a24f75f594f60eb877febde50547dfd,2024-04-26T15:32:22.523000
|
||||
CVE-2023-50362,1,1,d91c38baf0f2a662f13c0b33eea848ad3fed0239cb9559e2270a732865cdabea,2024-04-26T15:32:22.523000
|
||||
CVE-2023-50363,1,1,e9a76ae3e3a957dc6118843bb52266c303d883fa7880dab84efa3484a09584ae,2024-04-26T15:32:22.523000
|
||||
CVE-2023-50364,1,1,f39efd0bc373a9ba72c424bb13e0130974cf3bb99552e304919bbc339a769742,2024-04-26T15:32:22.523000
|
||||
CVE-2023-50368,0,0,822f875a462c17b899bc5907af8a90bdf88b03f70fa2a47891ff0cc8e05f7ab1,2023-12-18T18:51:37.847000
|
||||
CVE-2023-50369,0,0,5473010ca0d536c23d0126860849245f23a6b5fb4418917816ad2a87231e17a3,2023-12-18T18:57:46.290000
|
||||
CVE-2023-5037,0,0,d381335c4dd89e7bbab4901da66bd9ad6b80fcdcad234f2de4677ea0ef9d96ac,2023-11-13T08:15:26.107000
|
||||
@ -235733,6 +235741,8 @@ CVE-2023-51358,0,0,991bf413d729d852acfcb22a561d128cc06a2b0e585af808f675e35b49ec7
|
||||
CVE-2023-5136,0,0,542c9990597e005ab5ca65b7a86e27fe0f3f215c1dc42121e44283f07d331415,2023-11-15T18:42:41.643000
|
||||
CVE-2023-51361,0,0,d203221b2b4576465e000a1694621bcdd79b1ef4d46ebfa7152ed021a51efcac,2024-01-05T04:52:30.367000
|
||||
CVE-2023-51363,0,0,9533ff938d825e0198bcc4fff1b73b2a06f9f47f9eff24f7fa87983fbfdb5516,2024-02-20T18:52:19.997000
|
||||
CVE-2023-51364,1,1,44d0da46e1e3b35f67f714feef49744b55305a34131e3bcfebf96357c12af72a,2024-04-26T15:32:22.523000
|
||||
CVE-2023-51365,1,1,5c20e4804846b0a0337ab905347aef7b1131344b31844b6ee3e8d13dd1565ac0,2024-04-26T15:32:22.523000
|
||||
CVE-2023-51369,0,0,1bcedfcc489db71acc470b88f9fed5125417c84b1380418c164d3309b262d47c,2024-03-15T16:26:49.320000
|
||||
CVE-2023-5137,0,0,7f3c0383ef1d05d2eef4009096fce02814b8d397bee277a8b42f9686360cbb03,2023-12-07T20:19:29.557000
|
||||
CVE-2023-51370,0,0,8106ab0212b026cbbc52f5d21281688134bb00bc9854939812e0590e81afda50,2024-02-12T14:20:03.287000
|
||||
@ -236035,6 +236045,7 @@ CVE-2023-51790,0,0,34792c7c9d74f45a3954ab5a202b8afe400253531dd82ed2e2fbf28e9ed3f
|
||||
CVE-2023-51791,0,0,e9b86d731d1fc823b73218a80c21bb18c465154f1d984af9a339d3a0e217a7b8,2024-04-19T18:29:53.040000
|
||||
CVE-2023-51792,0,0,90f2edf677104828d0f9df336b894c35234086ccd646cba4a53fe9d6f33445da,2024-04-19T18:29:53.040000
|
||||
CVE-2023-51793,0,0,10dd80c4c6a07dcaa17541739d9a6c7ce2b74408f00a4a1f01ff0bc2a08eb711,2024-04-19T18:29:53.040000
|
||||
CVE-2023-51794,1,1,5117a3de1224affe2173d7e6ccb9d6b2999737f7cff11f7f58cc564e272a27a1,2024-04-26T15:32:22.523000
|
||||
CVE-2023-51795,0,0,9c99a74706f2c710922f81d84734332d5b24073aeb6d9c93818a5dcf6f578e31,2024-04-19T18:29:53.040000
|
||||
CVE-2023-51796,0,0,5e8c22498d390f4888f6bf22182aa26f40bab3d44d12f23fac47d1749ea3247f,2024-04-19T18:29:53.040000
|
||||
CVE-2023-51797,0,0,dd777780213e79a2ae09b94722da6fc0e6aaa183f603859e518987ef966c5649,2024-04-19T18:29:53.040000
|
||||
@ -236648,7 +236659,7 @@ CVE-2023-52642,0,0,6688b4525d834797e717749dff6d13896ec166f03c220db42965499ec7b45
|
||||
CVE-2023-52643,0,0,5efc9d9f9dec4b2c7c66597dacba29c72ae2d167455c13a17fba02f62b3763aa,2024-04-17T12:48:07.510000
|
||||
CVE-2023-52644,0,0,f7b8794cea71530d0eb4671b69c55d9c38b571b0a3242c79036c9b83a9cff08d,2024-04-17T12:48:07.510000
|
||||
CVE-2023-52645,0,0,f31f81ed6de3ae4fb651df55a0f9afce475c8b7cebb8abda926d63e16cf41cac,2024-04-17T16:51:07.347000
|
||||
CVE-2023-52646,1,1,c2d0896b22d5453be452d09ab79f0cd8df972023c899e8638c54bb9d43910c6a,2024-04-26T13:15:46.453000
|
||||
CVE-2023-52646,0,1,d4773edd891bdf9037e6527cbdd609057ec885ce362711fe11cb92d919886d62,2024-04-26T15:32:22.523000
|
||||
CVE-2023-5265,0,0,2a8378d4c6e1a4043ef9a62bd4c22a5b923a77fb44f4c12af78e362e629e3051,2024-04-11T01:22:56.040000
|
||||
CVE-2023-5266,0,0,832870c6041d22c4531b84dd381b413460d59a972119dc82a2f73fc33512c1a5,2024-04-11T01:22:56.120000
|
||||
CVE-2023-5267,0,0,fc5630613311fa2b84c0cedbcb30a87a0b26116f100a7108256562eb746b9b8c,2024-04-11T01:22:56.223000
|
||||
@ -237415,8 +237426,8 @@ CVE-2023-6091,0,0,c030733ef31619d8d6493175fde6228dc979143695432976718bf70837f7ad
|
||||
CVE-2023-6092,0,0,29d6c12d74742133215ae81895362e8792ffaeaedc68872f3a97584c78958e27,2023-11-14T00:15:09.117000
|
||||
CVE-2023-6093,0,0,cdcbd1e1997de9b83295e1322a460ec7a9df4b733c53160638c79ab78836ce70,2024-01-08T19:09:29.700000
|
||||
CVE-2023-6094,0,0,fe64a29ca809dd77087aaa4828738c31a5bbe16b56c0195785a6e8bedba08bc7,2024-01-09T14:55:23.847000
|
||||
CVE-2023-6095,0,1,b53e0e8285b111367a4ba15f00311dcf5c3bda1403bb3469723feff22841da4e,2024-04-26T12:58:17.720000
|
||||
CVE-2023-6096,0,1,d126070ee5611b2746483542a2cdbd2ab9a37385ee40fb7ce79c62db45debc98,2024-04-26T12:58:17.720000
|
||||
CVE-2023-6095,0,0,b53e0e8285b111367a4ba15f00311dcf5c3bda1403bb3469723feff22841da4e,2024-04-26T12:58:17.720000
|
||||
CVE-2023-6096,0,0,d126070ee5611b2746483542a2cdbd2ab9a37385ee40fb7ce79c62db45debc98,2024-04-26T12:58:17.720000
|
||||
CVE-2023-6097,0,0,8f471927c0db95c9c443d2b569c30a548ccaade10ba424581756adcc75d923fc,2023-11-17T21:50:46.223000
|
||||
CVE-2023-6098,0,0,a884ea5c9cec9a8ae0c24d3946c293e66894754a64e111c1bb7e645080a0c3a7,2023-11-17T21:54:07.117000
|
||||
CVE-2023-6099,0,0,b8fe11324ada285b9d0e78e759658d2387e0ec4bc2c7d7d48f6a6a2955428aab,2024-04-11T01:23:13.680000
|
||||
@ -237434,7 +237445,7 @@ CVE-2023-6112,0,0,af49c4c4bc744bcc2ee1b4c87739ad21bf87ca007d7142e64e08afa25a9756
|
||||
CVE-2023-6113,0,0,5bd7b44ff4099818bdd115cc24760ba9d3747e7a2a042be585601a5c63a2e165,2024-01-08T19:05:26.813000
|
||||
CVE-2023-6114,0,0,3cded372d5c081c5316ad7b631bf158c1f936b766a13d127b36046c252df1206,2024-01-05T15:08:00.537000
|
||||
CVE-2023-6115,0,0,24acacd56f69c2299025b1b25e6bcea11e1bac46384e3a27a5d55fdd10bf6c5c,2023-11-14T00:15:09.233000
|
||||
CVE-2023-6116,0,1,bea110e933d30431c988a60f11963cd8544ab6961276b7f4e13d91ff363f99db,2024-04-26T12:58:17.720000
|
||||
CVE-2023-6116,0,0,bea110e933d30431c988a60f11963cd8544ab6961276b7f4e13d91ff363f99db,2024-04-26T12:58:17.720000
|
||||
CVE-2023-6117,0,0,23ffc5f4c90a279ac244adcf67ed121b77f5bce3b75efa2fc7c1f1221d790e64,2023-11-30T04:57:56.360000
|
||||
CVE-2023-6118,0,0,185b02f0f82d3669ee7d955ce632c2e7e3f4b765df0085b453c9c70d7373b586,2023-11-30T21:03:09.543000
|
||||
CVE-2023-6119,0,0,6fa8c2bdfe58774c0eadb834ea8a4a17c61f17e55241a9e2b26790316447df0e,2023-11-29T19:32:07.657000
|
||||
@ -238943,7 +238954,7 @@ CVE-2024-0736,0,0,a3a7c5c2245df9427901390ce46bcc67c4f903b556b6c799c89d8b548dd42d
|
||||
CVE-2024-0737,0,0,dbea547bd5a029d98b56166fabe8b681cf47831ade68ceb81bfdecd0bfa09f6d,2024-04-11T01:24:08.793000
|
||||
CVE-2024-0738,0,0,801418851f964614b5503bec28be2ba1530c10210ae615d2e0c121fea98dd3a9,2024-04-11T01:24:08.890000
|
||||
CVE-2024-0739,0,0,179d5d4cc82962ed76ce2ec646e02a8cc5f9d19cf4b1fe71b5fe400cc8d8756f,2024-04-11T01:24:08.977000
|
||||
CVE-2024-0740,0,1,acc9582cc458692894aff08cb0d62b4dba2f81781000f8893cd9edb7eb336be8,2024-04-26T12:58:17.720000
|
||||
CVE-2024-0740,0,0,acc9582cc458692894aff08cb0d62b4dba2f81781000f8893cd9edb7eb336be8,2024-04-26T12:58:17.720000
|
||||
CVE-2024-0741,0,0,a9fda7b42aa854b426665305c7828769c163150b209cbb19ab9d616db9041a98,2024-02-02T17:19:30.117000
|
||||
CVE-2024-0742,0,0,1ae741d10e1bed36bf34ad7f16caeaf1531efb403a5a51e45593c25df5bee474,2024-02-02T17:19:23.497000
|
||||
CVE-2024-0743,0,0,dacaa2aeaf68f1371f0b5cca1647090718e67fd338218ae3423f36780ae31307,2024-03-25T17:15:51.580000
|
||||
@ -239074,14 +239085,14 @@ CVE-2024-0900,0,0,0df16b48e073462cef0a451a68261119942789edbcc049ef43c079272fea0e
|
||||
CVE-2024-0901,0,0,8395d055c39a2ded7a6676d9f91e364a6c601b11f066a458c7ff4909044d580a,2024-03-26T12:55:05.010000
|
||||
CVE-2024-0902,0,0,c022af4b73cd366b52a576af13eecfefbd72fc877962e0376aba015f72537ab5,2024-04-15T13:15:31.997000
|
||||
CVE-2024-0903,0,0,4e5a944405938a6def0adf008001af709d311e38e0572265081d65abf85ff9fb,2024-02-22T19:07:27.197000
|
||||
CVE-2024-0905,0,1,5706f3673843c0bafa3decec5abd7ff7931c62e297395c7e75e070db6225ffcf,2024-04-26T12:58:17.720000
|
||||
CVE-2024-0905,0,0,5706f3673843c0bafa3decec5abd7ff7931c62e297395c7e75e070db6225ffcf,2024-04-26T12:58:17.720000
|
||||
CVE-2024-0906,0,0,2cb73c39a2e6fe8ef5222442ed25db55924374576f26540dbc47cb2f830bdc5d,2024-03-12T12:40:13.500000
|
||||
CVE-2024-0907,0,0,736d9a373e93547114922fac343df53c487c280e59648bef9a3cecc6379f908e,2024-02-29T13:49:29.390000
|
||||
CVE-2024-0909,0,0,7864e9d833556eb295eb67e87cebb39c8d9b11d41ed1f5327a80b30fe013438c,2024-02-08T20:07:51.410000
|
||||
CVE-2024-0911,0,0,5f8186e1a077698fb2fa1e99d28cc6e32ac8b7b7afb205a3a02bc10c8ca698f0,2024-02-14T18:15:48.077000
|
||||
CVE-2024-0913,0,0,cc9dbbd0e1eb40baf69d2dc96719798ae1dcba5ab6fc531754d7fd6a8c7e7f1d,2024-03-29T12:45:02.937000
|
||||
CVE-2024-0914,0,0,7f22c9d9b9fd7b20f24efa4809ae53ac72b9c07a501ffa9df44287c5ae5e04b9,2024-04-25T17:15:47.280000
|
||||
CVE-2024-0916,0,1,608a079ac8883fbe78064369d7f468de5b08b2b3e969c02297f8c73cd64de9ca,2024-04-26T12:58:17.720000
|
||||
CVE-2024-0916,0,0,608a079ac8883fbe78064369d7f468de5b08b2b3e969c02297f8c73cd64de9ca,2024-04-26T12:58:17.720000
|
||||
CVE-2024-0917,0,0,1096c18fb8e959955c123559a721fd9eb8bfd390fb54eac5e8167e50a31dc158,2024-03-07T15:15:08.257000
|
||||
CVE-2024-0918,0,0,665fb2ab3d0de8862f8c0f360fe055729484bae6812ecb9bc73647194d5411aa,2024-04-11T01:24:12.193000
|
||||
CVE-2024-0919,0,0,589179645f375446af0d6856749f5d8581b8fa706e54f9dca7ffc4f53fa26164,2024-04-11T01:24:12.283000
|
||||
@ -239796,7 +239807,7 @@ CVE-2024-1785,0,0,876f54e758144e65bdb2dbfed145663c2de508f0271124e6075f587cf87035
|
||||
CVE-2024-1786,0,0,8d272bb934edd6ba22bea71862b8c1a4f9dd955b8b61c076d6b42c937a212ef5,2024-04-11T01:24:30.693000
|
||||
CVE-2024-1787,0,0,4146a54c8ed6fe4a4bd4ac127005b4c82b6cbf8a65b06534af23146a4cc88e7f,2024-03-20T13:00:16.367000
|
||||
CVE-2024-1788,0,0,880181e49a800669246c4d4cd32ccd361560cda70996b821fd2bf7b522fa9d8b,2024-03-04T13:15:44.523000
|
||||
CVE-2024-1789,0,1,2d2e1683876e589067a20ee5d7b2f6945c19eb34c2f952118c28559d246dac7f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-1789,0,0,2d2e1683876e589067a20ee5d7b2f6945c19eb34c2f952118c28559d246dac7f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-1790,0,0,b8412da1a4c3f521dd650e697e4a3d85fe859c9cf5470ebe731f0a2e75023a71,2024-04-10T13:23:38.787000
|
||||
CVE-2024-1791,0,0,94b807664cc318fbe90aaeaea162bfe11604582cb7b653dcbd8bff403308918c,2024-02-28T14:06:45.783000
|
||||
CVE-2024-1792,0,0,a70c1954f887a10d02e564a2dd7108def38a57268e885b26020a4a15e640cbe4,2024-04-10T13:23:38.787000
|
||||
@ -240091,11 +240102,11 @@ CVE-2024-20346,0,0,7cbf0b83f9bb2bdcb086a9566e1d6ccb4ce634322567f78b855a9091783c0
|
||||
CVE-2024-20347,0,0,bbf7dceb15f33c7e89bafb93e5c9caebf128eaab0d28184454366bd8439d3cf0,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20348,0,0,0302f1e9485b44e49fee557bce04f55ca5d1a83abb8a531d325f6a707ff9d836,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20352,0,0,0a21aaf855f5e2dfa6cf8a0de7df15d8d9ce0063ea679dcbc607b17583312064,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20353,0,0,c8f32ec564b3e97587ee363f982b16e8473276a2cc2d371ddfe1db56f5c8c372,2024-04-26T01:00:01.587000
|
||||
CVE-2024-20353,0,1,0ad32ee557f52a7b8ada270f35945efb8e6756e485c22be736fc9eb0d9c4e4e0,2024-04-26T15:22:27.803000
|
||||
CVE-2024-20354,0,0,77dad3524fb09cfda3488dd6cb6801d1cbef489cb4a9c5ad1ce0cd080b146730,2024-03-27T17:48:21.140000
|
||||
CVE-2024-20356,0,0,520a5229b5523a4caebc12a2a13fabbd3ee32baa429880796f24d4f599838cb8,2024-04-25T13:18:20.370000
|
||||
CVE-2024-20358,0,0,c57238abc0f347673b6d433042a2a651d8840634ece342bf9e7baf6a14562be2,2024-04-25T13:18:20.370000
|
||||
CVE-2024-20359,0,0,36217da241c15dac7150f7395fe59b91fc83ff2ec45f7d0a82d55c8ae9c06ad5,2024-04-26T01:00:01.587000
|
||||
CVE-2024-20359,0,1,103c2bc1c6783d5aa055ed80504c27ea24cb5bf5556deb17c85950666ec17e99,2024-04-26T15:25:02.773000
|
||||
CVE-2024-20362,0,0,0e125a5f57daca09b3a31c24c5285918bb46201f033defe636102ce0379b9ecc,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20367,0,0,e44fa9dcd83189ac4bb0284b57ce6be9f7d161e3fd46e74e477fe5fd623ca1b7,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20368,0,0,4814a8127430faf4ae61ecb30b9f4c874f54598057d22bcc8b2ca14f1fefa88a,2024-04-03T17:24:18.150000
|
||||
@ -240748,7 +240759,7 @@ CVE-2024-21584,0,0,d66fedfad76e69bf70f964d573fe608d89f94eedd1312d57b206120486115
|
||||
CVE-2024-21585,0,0,6e8206f1fdf94b37b9dcf7444e5790dcbe04c3a87e39f8bb6c4b0625dfa3058a,2024-01-31T00:15:45.920000
|
||||
CVE-2024-21587,0,0,00caf8e0dd355879f913af1e174cfaccf48910da74261d4402cf2eff2334cffc,2024-01-19T17:44:35.830000
|
||||
CVE-2024-21589,0,0,68b0ee433e5dc2a6e0c5986e659a2299beb8087cc670f80d46b90c5ac3b4a35f,2024-01-19T17:41:50.160000
|
||||
CVE-2024-2159,0,1,66a467a0d832c3ea989e8852d93535b9749d1980ab60c7df346e8f3b74f92b55,2024-04-26T12:58:17.720000
|
||||
CVE-2024-2159,0,0,66a467a0d832c3ea989e8852d93535b9749d1980ab60c7df346e8f3b74f92b55,2024-04-26T12:58:17.720000
|
||||
CVE-2024-21590,0,0,1a5cfa0442f6700627b14500caafe3edf870ae95e41f632c8a8e9b6ad0acd506,2024-04-15T13:15:51.577000
|
||||
CVE-2024-21591,0,0,77ced40d9ea71de7e0f4aa61db192f300bee1246d7e33e78b4e3a0dcf328f916,2024-02-10T00:15:07.937000
|
||||
CVE-2024-21593,0,0,21335c213d77ca1dd069c4b30e9c76b53a2abbe3782fa324a2bf1c217bae5a20,2024-04-15T13:15:51.577000
|
||||
@ -240931,6 +240942,7 @@ CVE-2024-21896,0,0,19b337275b4c80290e30856ac5f19a33170bf79b2972a381de5433010e955
|
||||
CVE-2024-21899,0,0,688bbc85b9f5d15251f75737cd336d68aa458da265ba78cb33907c6eacd4fe61,2024-03-13T14:25:02.043000
|
||||
CVE-2024-21900,0,0,e9e3bacd169a2499fbcf9944a7d36b5aa443f74334f0445e246d0d286dadb841,2024-03-13T14:24:02.157000
|
||||
CVE-2024-21901,0,0,3aacd8cf094e825f7defd79a2cabb5eff6c8edb98f989b9efc7af468ef99342c,2024-03-13T14:23:12.393000
|
||||
CVE-2024-21905,1,1,2d8726c108e2c601e8b598dc1057ed3e57422bcfcab8c4287ab5abf4f454fe08,2024-04-26T15:32:22.523000
|
||||
CVE-2024-21907,0,0,e97acedaa5fff8f35a2639917d8b0e8affd6b5d126dc549f4b2d35936c62833b,2024-01-17T15:24:07.360000
|
||||
CVE-2024-21908,0,0,329abb805b48ea46c40d9625a0e5a18857ae42d6b89a82f5c3cf797095821263,2024-01-08T19:46:41.157000
|
||||
CVE-2024-21909,0,0,1862a33cb8cb7c096543042cface003ed2658c185ec7603674a262510a57f13e,2024-02-08T02:15:40.883000
|
||||
@ -241016,7 +241028,7 @@ CVE-2024-22086,0,0,caac68f21275279653fa2eac0d4515b609803b0b74511cc0ca396756f082c
|
||||
CVE-2024-22087,0,0,3bed8292ec524894fc0b4fe8dc2027c662afaeeff7b4dbd00214d4fc1b7ce8b4,2024-01-11T17:03:51.967000
|
||||
CVE-2024-22088,0,0,754170cc6c96efa135c7c7667ac8c5d4d79d7cd2abcaaf938446792b9a2bc8b8,2024-01-10T20:05:19.737000
|
||||
CVE-2024-2209,0,0,eeaa5baaa32a49eda6878a59f2ebb6696131e5d9ac6771a3c4e8da4f915f93d8,2024-03-27T12:29:30.307000
|
||||
CVE-2024-22091,0,1,52e92dd33b0b184e59dc546942d249d25efe6f7a846f13fc624eefb87cf6e9b3,2024-04-26T12:58:17.720000
|
||||
CVE-2024-22091,0,0,52e92dd33b0b184e59dc546942d249d25efe6f7a846f13fc624eefb87cf6e9b3,2024-04-26T12:58:17.720000
|
||||
CVE-2024-22092,0,0,35cd11c9c07a47737b4e29cb95e656383a3704154bd1a4578e67800eda161eb7,2024-04-02T12:50:42.233000
|
||||
CVE-2024-22093,0,0,b7c449b9319413a66024fe7dcdb8bf0035d00dbeef636282eb761ad13794295d,2024-02-14T18:04:45.380000
|
||||
CVE-2024-22096,0,0,330d7fb3350f034a1e0c8805b47a2db6dbe2ceb88846f9ddfaaa7c652ddde766,2024-02-07T17:33:26.800000
|
||||
@ -241336,8 +241348,8 @@ CVE-2024-22626,0,0,fc707ee8f5c412b901c3f24bd4c3662a5fd9b8a23f261dbe38ea261f2f9fa
|
||||
CVE-2024-22627,0,0,946da3d0fb3c8b21c74e447c6bf66b7afc411456e784a137e7dc02c86f83a2ae,2024-01-19T14:38:53.237000
|
||||
CVE-2024-22628,0,0,788480fa6919f601646c68f9f25325c618d05969ba2c7889243829bc40d9ae3f,2024-01-19T14:33:00.143000
|
||||
CVE-2024-2263,0,0,df8d6f616c06d7efbf230a22645526f71cba2b5d98ac7477968fae54aee3855c,2024-04-01T12:49:00.877000
|
||||
CVE-2024-22632,0,1,e435234fef125836c48f93822447938a71daaaf6c249541ec3918efb1e5738cc,2024-04-26T12:58:17.720000
|
||||
CVE-2024-22633,0,1,d98d7656ae5b4ac928b283678558c7443ddc43711cb4cbe0c2a256c88a2fe08c,2024-04-26T12:58:17.720000
|
||||
CVE-2024-22632,0,0,e435234fef125836c48f93822447938a71daaaf6c249541ec3918efb1e5738cc,2024-04-26T12:58:17.720000
|
||||
CVE-2024-22633,0,0,d98d7656ae5b4ac928b283678558c7443ddc43711cb4cbe0c2a256c88a2fe08c,2024-04-26T12:58:17.720000
|
||||
CVE-2024-22635,0,0,4862506d4e37fbac04654e9c145033c5c19772547553e0905cdb496418310552,2024-01-29T15:57:23.770000
|
||||
CVE-2024-22636,0,0,d2329967243db7b2d90664e4db5aafab2eefb2c63c9125405da2b73ddd46c40f,2024-01-29T15:57:32.540000
|
||||
CVE-2024-22637,0,0,26b297452537f73426f9b1e1c51d8375cdf08e35ab6ae3bee9824c37bc50f94b,2024-02-15T15:19:44.187000
|
||||
@ -241504,7 +241516,7 @@ CVE-2024-23085,0,0,27d0f44875030ba128821d0a5604f24565f110d196fa9a9783c10c633bc8b
|
||||
CVE-2024-23086,0,0,84287977eab241265f69ad39dd1efe49fbc488d3bee216c68604fc835c00c346,2024-04-11T19:15:16.670000
|
||||
CVE-2024-2309,0,0,5e7d16d6f71f2f007544bcbcc47dd8107c18e2714e36b52143e4572bbdc63440,2024-04-17T12:48:07.510000
|
||||
CVE-2024-23094,0,0,8b7fd2c37601b9f636934db44ed8e567ef20eff4d921df465afdbb6ef925a041,2024-02-22T19:07:27.197000
|
||||
CVE-2024-2310,0,1,7e7c0a209f7f9d55bde23b41f82a91f7cb2b29bb97f6a69e89749abe5e6c461c,2024-04-26T12:58:17.720000
|
||||
CVE-2024-2310,0,0,7e7c0a209f7f9d55bde23b41f82a91f7cb2b29bb97f6a69e89749abe5e6c461c,2024-04-26T12:58:17.720000
|
||||
CVE-2024-23108,0,0,4bd66ae4e2150cd9c3073e095bacf489de77af9a273b611e130c3e3fa4edf7ea,2024-02-07T15:02:00.203000
|
||||
CVE-2024-23109,0,0,c2686a38cd2651bfef8ab0e98ee0dbcce98e98fd7c1f1805290cb9df9c03fe78,2024-02-07T15:04:28.237000
|
||||
CVE-2024-2311,0,0,738ffcbe7f411809b0dd04835f3243a6f3350cd455230e0887015d402141b408,2024-04-10T13:23:38.787000
|
||||
@ -242149,7 +242161,7 @@ CVE-2024-24276,0,0,c0b996f05c041cdec9f97004ccc67bd94d1c66cbf22b8df3dba73751978ab
|
||||
CVE-2024-24278,0,0,3f7eb60b847e1971c5f65cb683e6174dee6547147c3195ceb2f7499f12bdbd36,2024-03-06T15:18:08.093000
|
||||
CVE-2024-24279,0,0,d350732cc4ca29b60cc89e1436f10a4364ab08631ecd4190bd1db7c1d3d102d3,2024-04-09T12:48:04.090000
|
||||
CVE-2024-2428,0,0,a12acd196e6489491150ab75ad9922280151d93b658bfb481d4c1c66079cd163,2024-04-10T13:23:38.787000
|
||||
CVE-2024-2429,0,1,142c18c9e198bb95453dcc87f274aaab3a72f27022ad46c2cdc1f2413653c0f3,2024-04-26T12:58:17.720000
|
||||
CVE-2024-2429,0,0,142c18c9e198bb95453dcc87f274aaab3a72f27022ad46c2cdc1f2413653c0f3,2024-04-26T12:58:17.720000
|
||||
CVE-2024-24291,0,0,ed81ca1f7d07ab5682e5dc3e12510be85bd8028a8e8a8fb1a80b96c7b9ae97e4,2024-02-13T20:13:26.593000
|
||||
CVE-2024-24300,0,0,a8dc475a562e17ac269ab87541d5cc3de5e8b25ad6f69c16a9e202ce4fe0a524,2024-02-15T06:23:39.303000
|
||||
CVE-2024-24301,0,0,eea9ef656f8457ca391649537e978f0d3e4722722df26eae84433b0c4b119a98,2024-02-15T06:23:39.303000
|
||||
@ -242191,7 +242203,7 @@ CVE-2024-2438,0,0,c00f0172cf7ab8467da2d5d83a23b794d6f6a7817b3440d3b686b7132bf26b
|
||||
CVE-2024-24386,0,0,7f40633635579a6e57b93f4e362e7ec6b3a2af9b3c5c8050723583bf6d085ce4,2024-02-15T14:28:31.380000
|
||||
CVE-2024-24388,0,0,3f3d5731a0be4e881fd82d2a190d75a64cc3a7cfd8c995358dcecccf32a929bb,2024-02-08T20:04:04.027000
|
||||
CVE-2024-24389,0,0,fc2f959521db6beb1a64904c90b55c43557e2fa9885e5140ef9962701e570aba,2024-03-07T13:52:27.110000
|
||||
CVE-2024-2439,0,1,b7df951afc00046981aedc8c4ecb9e93479c5f0c603ca97577f4daefea1ea434,2024-04-26T12:58:17.720000
|
||||
CVE-2024-2439,0,0,b7df951afc00046981aedc8c4ecb9e93479c5f0c603ca97577f4daefea1ea434,2024-04-26T12:58:17.720000
|
||||
CVE-2024-24393,0,0,90dfcf43d684735b8235a3326fe419899f2f2a761b862d82b04f2c974933d9fe,2024-02-15T18:13:59.327000
|
||||
CVE-2024-24396,0,0,490bf819c482001abd1dcba25c4c319f8da0b154dd54e7da19b5736b32d31753,2024-02-14T17:58:05.850000
|
||||
CVE-2024-24397,0,0,c42f6e3d95ec1079046817a9a19cbab9b7268b0d74721cd48822bbfd3065325f,2024-02-22T03:39:02.803000
|
||||
@ -243080,7 +243092,7 @@ CVE-2024-26018,0,0,f0a23aadd063ff7c7efa65bdfb2fba637cb4053fe19b3da7278a7f893beab
|
||||
CVE-2024-26019,0,0,fbe6a7f77deb15cc085d52bc5fe2b39474b81c363a3a1755ab2818a8be2623e5,2024-04-11T12:47:44.137000
|
||||
CVE-2024-26023,0,0,03df4473c85ab0c8247169f36cdaabb6d0ade251a86d2a476e4dede57424f28c,2024-04-15T13:15:31.997000
|
||||
CVE-2024-26028,0,0,f0eeab6f00388b393e9761660fb13451fd75e54f8248c45c23f5d18cc79809b2,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2603,0,1,84073b4816ec8ca4190eaa92770fd32d4882ec6c4ae601d9741ca89a931c2450,2024-04-26T12:58:17.720000
|
||||
CVE-2024-2603,0,0,84073b4816ec8ca4190eaa92770fd32d4882ec6c4ae601d9741ca89a931c2450,2024-04-26T12:58:17.720000
|
||||
CVE-2024-26030,0,0,6e3023416b037dd092fe7b5e942072e3533649d1b2cfd157142cc39338fedbad,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26031,0,0,ed002faaad586ba4ca84a6198e87a403fdacf5cc79e96297a7527ff0ace203b7,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26032,0,0,d12b1deafb7f503f2da2b6f08ed3ffc2b0c3783c86e2506252b03bfbb01459b8,2024-03-18T19:40:00.173000
|
||||
@ -243795,6 +243807,7 @@ CVE-2024-27105,0,0,84bf4c32acc7a0fff6fc544069197e054d30a1b125bfa741094adc12fcc58
|
||||
CVE-2024-2711,0,0,42e23df3ceff8a9b64baaa048a38f8dad8283183a84ec6983538e05fc6cd72f1,2024-04-11T01:25:33.553000
|
||||
CVE-2024-2712,0,0,5db70c0128073177c21e6d77654209c67d4f90bbdef61ede1f61a6c406dee6e5,2024-04-11T01:25:33.637000
|
||||
CVE-2024-27121,0,0,9ff77f57a33b5e7894f52bbf3c39c57fbfb06ac4fc9de183cada29d2e4e25cb4,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27124,1,1,ea712c263ed10c2025070511d1aac8a2ff0904f343002086d5037b9921c25bc8,2024-04-26T15:32:22.523000
|
||||
CVE-2024-2713,0,0,b476f11187d12a3e05541544336410f12cce0cdbd6e6e1f3158f32f36f97888f,2024-04-11T01:25:33.720000
|
||||
CVE-2024-27132,0,0,0d4a858300081e7b1734f10a34971409f661ea8e5d10f439041910c3efb6a17b,2024-02-26T13:42:22.567000
|
||||
CVE-2024-27133,0,0,1ea41b494ad0a5106ea020fe3275dce436a1bf62da11c275e95a71856ace701b,2024-02-26T13:42:22.567000
|
||||
@ -244368,6 +244381,7 @@ CVE-2024-28318,0,0,ede034690df957e6783d45bfb66a16f12d36f93dac03aab57e77aeedfffbb
|
||||
CVE-2024-28319,0,0,26fe071877c361c1420da78d668cd8bd73e607c2889fe07f596425c3f0efcaf7,2024-03-15T16:26:49.320000
|
||||
CVE-2024-2832,0,0,c24a89a98158bb4e496d6c9324979be50b5d8206e1a887bc4c92d3f4efe6d296,2024-04-11T01:25:38.597000
|
||||
CVE-2024-28323,0,0,16dacab4d536bc79350286123596ce0c92a8e24f546fb8e6e6ccdaf1dc4caa64,2024-04-24T02:15:45.820000
|
||||
CVE-2024-28328,1,1,13ef121020655e50ae4d25ba0161adfa41a8368139ae76b0ca53543e95ae92f4,2024-04-26T15:32:22.523000
|
||||
CVE-2024-2833,0,0,9e113ce28ea85bd7fbbe01a048a1b11092324a333ff2f6e807d8733739209b19,2024-04-18T13:04:28.900000
|
||||
CVE-2024-28335,0,0,a217e219718a353480ebe6dbe5087fa485efbd4ed754c44582430f96bbfa9ecc,2024-03-27T12:29:30.307000
|
||||
CVE-2024-28338,0,0,3ea1d4c3a66b67172d60399e17da8570aa15fd5d4f0e652ed0ed26bd90bdb1be,2024-03-12T17:46:17.273000
|
||||
@ -244379,7 +244393,7 @@ CVE-2024-28345,0,0,9f53096e64fde0bd9e67c2ba1058971494111a4dba7285ed04f98db5747f2
|
||||
CVE-2024-28353,0,0,f5d0b12a1e8a931f5519e51563d18b142745d332ff192847a7afb495f17e2dd3,2024-03-15T12:53:06.423000
|
||||
CVE-2024-28354,0,0,b6680336ce24c3665bbea7456a49c23f2010021d3a256de9fa063452e0cf7d3a,2024-03-15T12:53:06.423000
|
||||
CVE-2024-2836,0,0,9acd34fc60cb65ba9cd271e5ec35a02f0cd82360d653d80e871f78f2c63ee537,2024-04-15T13:15:31.997000
|
||||
CVE-2024-2837,0,1,ede30a076db0490f182649eaa516f525e72ce3474678f75311de4b8e697fa1bd,2024-04-26T12:58:17.720000
|
||||
CVE-2024-2837,0,0,ede30a076db0490f182649eaa516f525e72ce3474678f75311de4b8e697fa1bd,2024-04-26T12:58:17.720000
|
||||
CVE-2024-28383,0,0,4ebb5b688ac785b11132be45898bb9d7934c49dcd0ae78bf745a27cbe4cf3c09,2024-03-14T14:21:20.217000
|
||||
CVE-2024-28386,0,0,babe8ca097e0c09213bc5c6af798d9ab75b1906fe65d8568532f7dfbcdf59f5c,2024-03-25T16:43:06.137000
|
||||
CVE-2024-28387,0,0,50317bd50b8bed7df4714df1431ccc5e21589c7d6b48de3eead147adffba9438,2024-03-25T16:43:06.137000
|
||||
@ -244676,25 +244690,25 @@ CVE-2024-29046,0,0,934c54a354b7983248c1038ad849bfccbb8c13c9b2573a8e1ac4e386edc36
|
||||
CVE-2024-29047,0,0,caa5c4d2d0f1bf304a4ee6216a36e2941161e0820c7a8b8276d73d490e44c6f2,2024-04-10T13:24:00.070000
|
||||
CVE-2024-29048,0,0,95c20ac7de8bc227c17638fc56daca89aa86872041643304379a7c60cc8dac12,2024-04-10T13:24:00.070000
|
||||
CVE-2024-29049,0,0,98b5dd33fb953ac1a2154bc311144d3dc2c9909067218ab4461517f82cf5b6e3,2024-04-09T17:15:58.440000
|
||||
CVE-2024-2905,0,1,6705daa8f7df226fa96f7eeff488636b2b9b3780d443fc811767e3572cd7e083,2024-04-26T12:58:17.720000
|
||||
CVE-2024-2905,0,0,6705daa8f7df226fa96f7eeff488636b2b9b3780d443fc811767e3572cd7e083,2024-04-26T12:58:17.720000
|
||||
CVE-2024-29050,0,0,b81f6cf3efac23ad29fb0ec76c4ddabcbf2924e0345ac83e98aface32c2a7152,2024-04-10T13:24:00.070000
|
||||
CVE-2024-29052,0,0,9420b1ae7e90dd1acfc7cdaac9046557a2de2a3786dd73ca82d15f399613dda9,2024-04-10T13:24:00.070000
|
||||
CVE-2024-29053,0,0,697fbabaf9facdb0a00abec112c7dd524df1d041a7d2e72ce266e3893d05d84e,2024-04-10T13:24:00.070000
|
||||
CVE-2024-29054,0,0,673e208362aaa2bffd770f32f1b71b6f8bd8f1ec9c1d8dd8063b6abecaa01d89,2024-04-10T13:24:00.070000
|
||||
CVE-2024-29055,0,0,e9fe39dc2dd4caba8b085ac9cdcf43528a046debb329feb057fe266fe66547e6,2024-04-10T13:24:00.070000
|
||||
CVE-2024-29056,0,0,8c811c767e3a90a0ea6d3942fee710704b40587d4ed2e82ddf7cf395f0a756fa,2024-04-10T13:24:00.070000
|
||||
CVE-2024-29052,0,1,e237306e79582ca4440c8425ab53173c6ce65d038cb57e487d1b86c95f2a5674,2024-04-26T15:59:08.093000
|
||||
CVE-2024-29053,0,1,05b2ced48c9a73ee3ddfa76fc2da3cb9383fdb4866ec428f8606faa625ca92c6,2024-04-26T15:58:55.843000
|
||||
CVE-2024-29054,0,1,7b9fa4160b35e493f166fbab02079f8b7309b07e480b54a2b83db4c52d24e22f,2024-04-26T15:59:00.880000
|
||||
CVE-2024-29055,0,1,808635aa5b8e36d546a48cffb1a289dd060093a103ade4d8f54d7fc09e4cd121,2024-04-26T15:58:48.473000
|
||||
CVE-2024-29056,0,1,82c4eeb84f591e37e38e666909386b7e618d15d7e5328d971904ca4eca3d8112,2024-04-26T15:58:19.617000
|
||||
CVE-2024-29057,0,0,1a7d236424310c38bf79fff65250ee548fa2fb68d692d6ba086f9244a484a161,2024-03-26T03:18:48.760000
|
||||
CVE-2024-29059,0,0,d93ec606be992e55fa01c28ef1ad5d3cf38a06f675d6b6e016fe3fa040aeab38,2024-04-04T22:15:09.033000
|
||||
CVE-2024-2906,0,0,7907d5a5cd3460f6f133374b708901f61c1d81fd1b49c6a2c33ea92916afc2fe,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29061,0,0,0e26675da5b8b19c960a0b5531d49ab989ad81088e22e9881162327e04855373,2024-04-10T13:24:00.070000
|
||||
CVE-2024-29062,0,0,4039e6b96e75b35756d0ae5e495115fc06020359b7d4ba01efde13442f9b2e67,2024-04-10T13:24:00.070000
|
||||
CVE-2024-29061,0,1,a31dff802cf963e2879fb3cc29c95735e93be72849d5c1e87c5d3416671642f5,2024-04-26T15:57:55.730000
|
||||
CVE-2024-29062,0,1,1d53838ab94a7d925862a1a5153e7725a52f2346542bc98f0648bd0406cc991a,2024-04-26T15:57:33.763000
|
||||
CVE-2024-29063,0,0,9dd92692e86c18107436ef4a5c609dee7af8a065ae51bf02187ee7cc8285048a,2024-04-10T13:24:00.070000
|
||||
CVE-2024-29064,0,0,6a31c4be5cdf5b4136f98ebcdea18ed590cfcb656650a646fb3bcb2e2a9235de,2024-04-10T13:24:00.070000
|
||||
CVE-2024-29066,0,0,b033dec16249c47216f72affbb210c8ed478f17a804b8c831619777a2cc5b7fc,2024-04-10T13:24:00.070000
|
||||
CVE-2024-2907,0,0,0de4eaf582874a4e5ac2ae24af0fa8e609e58802e166fffc037ff11637779bab,2024-04-25T13:18:13.537000
|
||||
CVE-2024-29071,0,0,5ff903755374c23b025a98d3cc2b0f06ea188aa4151e3658c02fd385bc8b4fa8,2024-03-25T13:47:14.087000
|
||||
CVE-2024-29074,0,0,9e8f322269475ed9cf88d107d6401cb08d7756267afe6b14bb883cfb51c03588,2024-04-02T12:50:42.233000
|
||||
CVE-2024-2908,0,1,5b0ce2998a7b93490ed06350cc0cc884e51b8dab95350ea6e0699521494a9386,2024-04-26T12:58:17.720000
|
||||
CVE-2024-2908,0,0,5b0ce2998a7b93490ed06350cc0cc884e51b8dab95350ea6e0699521494a9386,2024-04-26T12:58:17.720000
|
||||
CVE-2024-29086,0,0,1ba59cf7e266064553649d504d13e7bbef5ec69a70b08610439516755a245119,2024-04-02T12:50:42.233000
|
||||
CVE-2024-29089,0,0,d048736b15469f0b39e3b876166869fc2f8a5b0a20328918b1229acf18e4ac1f,2024-03-20T13:00:16.367000
|
||||
CVE-2024-2909,0,0,59396b4bac4e29599b0f55c9fd39d8de81b55a6d460fef5a9da71e54c2be2d49,2024-04-11T01:25:40.947000
|
||||
@ -244780,7 +244794,7 @@ CVE-2024-29195,0,0,12b6fcead703f320c2faaa3dbf933701901e834c51cbd479cd70a3447afc3
|
||||
CVE-2024-29196,0,0,e02aa4919ed0d6b8af5e1fbc5257465a64fdae2f23d9b9aaabfbc3da2c0d39fa,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29197,0,0,858dd1bb84d1ebe6698f05d7dcbe5bf56e67ebea01a2e217e45dddfd661a75cd,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29199,0,0,78313b772930e0d3c119e70c910c05a3509fc574028745b1b9c80a0f992c34f5,2024-03-26T12:55:05.010000
|
||||
CVE-2024-2920,0,1,89cdb63334082e607565e10654e91702b913f25ea7b7225656d2bfa37ed145e1,2024-04-26T12:58:17.720000
|
||||
CVE-2024-2920,0,0,89cdb63334082e607565e10654e91702b913f25ea7b7225656d2bfa37ed145e1,2024-04-26T12:58:17.720000
|
||||
CVE-2024-29200,0,0,2fded465a0d157f739ca7c28831045e810d35e1ed39056bf30a71fa62dc84b9e,2024-03-28T16:07:30.893000
|
||||
CVE-2024-29201,0,0,5033916f5c6e37ebfb2f1925ef22415c52e7214153fce901347173dc9b9eb9c1,2024-04-01T01:12:59.077000
|
||||
CVE-2024-29202,0,0,2407457fd23b926dc515687b0bc64391303eb3a1899c8635138115822d2488d1,2024-04-01T01:12:59.077000
|
||||
@ -245386,7 +245400,7 @@ CVE-2024-30468,0,0,97a9b2808fcc8915cd24bfaf7f54deaceab99abf59bf935a157c8b40f4b70
|
||||
CVE-2024-30469,0,0,27281734a967c544466176225d5b748c65afaa34ac64dbc81f344b0ba4360d31,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30477,0,0,e57a5e6fa510ec9057ebfdd86316546dd94e1dabae4fad5cc81ff907e6cfb50c,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30478,0,0,7d7533c1a9dedc51f4ca6100785aae3de1530d7d091146af0639adfb42b6a065,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3048,0,1,711cbb896790c7be46cfcabde16646e25cad44824688b0101d2b29989c6823d9,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3048,0,0,711cbb896790c7be46cfcabde16646e25cad44824688b0101d2b29989c6823d9,2024-04-26T12:58:17.720000
|
||||
CVE-2024-30482,0,0,570bede6c16b4a7f5e8b36059aeda7f1a299c81f1153ac528a60791c716caf63,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30483,0,0,6c48131c3767e81f61ec34b0bc223a59e072c0c0b055c8c0e04f20b2876077ea,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30486,0,0,3b668ae931cda4b6a387bfa69ea17dffa696817ef5a0dd2b2ba0b8d1d89d01a9,2024-04-01T01:12:59.077000
|
||||
@ -245457,7 +245471,7 @@ CVE-2024-30569,0,0,d548955a85cf80696d15b1d4c46cd6662c11d8d9f149868bdc5b584ae206e
|
||||
CVE-2024-30570,0,0,47165afd2a0337ae9b15921264ed392e129dcb0a5824d82a2839f88c9ccbe5b6,2024-04-03T17:24:18.150000
|
||||
CVE-2024-30571,0,0,c50a42ed59a362d8828984df3d937cebc0fc1cd6656b81bbcd45275d74d7547a,2024-04-03T17:24:18.150000
|
||||
CVE-2024-30572,0,0,57e1fe75a16162fb8db4aa9b45ee46c9d7b33cf4be8983bf1e85c221316c95ba,2024-04-03T17:24:18.150000
|
||||
CVE-2024-3058,0,1,144e61a2086a97f7df1d72be5bab8f0a2d414ac05fa482303d93c1bbd68e50ea,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3058,0,0,144e61a2086a97f7df1d72be5bab8f0a2d414ac05fa482303d93c1bbd68e50ea,2024-04-26T12:58:17.720000
|
||||
CVE-2024-30583,0,0,8d4c098fc02cad68349435331fb2990e298cb57ef90e4427b47a624cfd49c5b8,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30584,0,0,62ee47c2440175729b0276209a6459be7534b11d3abd207c43def002781888ca,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30585,0,0,a40a5c456ca36791f55ae1311c37edecc8f5c126bc2ac7d2154551e2396c6dc1,2024-03-28T16:07:30.893000
|
||||
@ -245465,7 +245479,7 @@ CVE-2024-30586,0,0,a186fb979ed65c88ce62a290e6f855128163c9fa77c5355abfb2bb731e824
|
||||
CVE-2024-30587,0,0,23c200ae4001630b29710efdd8698d85648712273d7372a752920032f4d947e3,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30588,0,0,a78cc1e723dc7738ea3aa122a4b45c10693faddfd2183ab3270fc6b1c4499964,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30589,0,0,7f3bd7ec901fe014af7dcf666935ddd3d39c0fc2ff28ac8eaf8d31eadbb90b80,2024-03-28T16:07:30.893000
|
||||
CVE-2024-3059,0,1,362323756c10aca526c356edb9fcaefb04ea3c783b195e48c85a1bbb85e2a162,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3059,0,0,362323756c10aca526c356edb9fcaefb04ea3c783b195e48c85a1bbb85e2a162,2024-04-26T12:58:17.720000
|
||||
CVE-2024-30590,0,0,b29e37400568bf3ef1858eef7769bf083a47c61a106f27df4b8173fc1d40814d,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30591,0,0,fccd0ace4239a30fa0ef4b9ee775d5e196ef1d9d76c1e5f2b5d345c8f64facf1,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30592,0,0,a707460e8e70159424b4543df18a9eb4f29ee9778a40f23b0bd8a216605d05a0,2024-03-28T16:07:30.893000
|
||||
@ -245476,7 +245490,7 @@ CVE-2024-30596,0,0,7cd0dbe59c07e524347269d6ad600edbf2ce3681f61fcb58b1ea4be53950c
|
||||
CVE-2024-30597,0,0,c2c4d6014cd4a690dc2be3f521581455ed497747d3319329dc997bfbd14251ff,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30598,0,0,3455a65bcba40de15b293f4cbe7609b01a090d4c25ed20ab971f6a106299dc77,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30599,0,0,45a9c2ef0bb4943ce0d3dab897bfaa7a787bb1701760e2b34a4aad8235e0de1c,2024-03-28T16:07:30.893000
|
||||
CVE-2024-3060,0,1,82fb2ffb8d1937fb2c88a5b4e1a8613d11302d37857afde5fc9e11049ed8c923,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3060,0,0,82fb2ffb8d1937fb2c88a5b4e1a8613d11302d37857afde5fc9e11049ed8c923,2024-04-26T12:58:17.720000
|
||||
CVE-2024-30600,0,0,07f8767eef19dd08d9e1cc3d0874edfb6bacf2e635173b62a3bbb7f77a1747c3,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30601,0,0,0a2e428cbc485c5623cbc301ff44e1cd676c3b7c2d6d8ce0571a55030f7e4cf8,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30602,0,0,2727b743b2e56903f7e801a28994556ef283545dd501da199ae6f2fa143c24cf,2024-03-28T16:07:30.893000
|
||||
@ -245568,7 +245582,8 @@ CVE-2024-30733,0,0,c5f2692725b7484d3295bdbcc0eb2f4284901a52625827130c32bc53d3159
|
||||
CVE-2024-30735,0,0,31045ca311cf80431efdddff43e24e114183e9ef2bff5c33a722b80a956aa850,2024-04-17T02:15:12
|
||||
CVE-2024-30736,0,0,c9d1cbf13e640c6d0aad30d5b12c1d8e9eb4c675776ee84065ff7ca937010735,2024-04-17T02:15:12.057000
|
||||
CVE-2024-30737,0,0,1c036a16278ee8ea2e333e89f0d66457a587f7e2e9da86fd57591a8972289c80,2024-04-17T02:15:12.117000
|
||||
CVE-2024-3075,0,1,699d8df8af8d347905232345aabb56018eda731bdc5315ca91a1a33d876991bf,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3075,0,0,699d8df8af8d347905232345aabb56018eda731bdc5315ca91a1a33d876991bf,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3076,1,1,c1d64503274dadd382fc8536291c4ec7d9f91519d67c4e13c36813154a5b76c0,2024-04-26T15:32:22.523000
|
||||
CVE-2024-3077,0,0,df42d4a62ceb1c6a6275b9b1d36ac8da42c0ae3505d0e07beac8238605b5504b,2024-03-29T12:45:02.937000
|
||||
CVE-2024-3078,0,0,de9e294582cbb558bf2417239a323549d99f034f1b581828b43e34b1ad1f5683,2024-04-11T01:25:52.940000
|
||||
CVE-2024-30799,0,0,eae5bca102ad0c1fe3f236f7e51af89eca892740403953a6086f43b81ad7d92b,2024-04-22T13:28:43.747000
|
||||
@ -245629,7 +245644,7 @@ CVE-2024-30928,0,0,caf910b47d65799a57161146e34602829f47360642a8c8fe911c2d8ad140d
|
||||
CVE-2024-30929,0,0,3a4b987ba39620a2fa553421d0680484415e43d1909ca51832f180e76c2d2d0f,2024-04-19T13:10:25.637000
|
||||
CVE-2024-3093,0,0,32bf1c70eab5da7d509a40d74982ac8945909f57d49846c0cf619694e2add382,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30938,0,0,bb3c87898373ca38f4e6504fd7f34baf274fe16334abf7626317b091c9072986,2024-04-19T13:10:25.637000
|
||||
CVE-2024-30939,0,1,11f3c30f8f8403b56824346a62167280c2baff2f0989af0fdce0f07a7705dec2,2024-04-26T12:58:17.720000
|
||||
CVE-2024-30939,0,0,11f3c30f8f8403b56824346a62167280c2baff2f0989af0fdce0f07a7705dec2,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3094,0,0,cba466c06d21b74e1043491724188f63d6d0b9ba1993a884907c833ea9999b43,2024-04-12T07:15:08.740000
|
||||
CVE-2024-30946,0,0,0dff329aaece035fc82f00595012379643bd5a0edb89ee3a7369d6609e13a4d1,2024-04-02T18:12:16.283000
|
||||
CVE-2024-30950,0,0,992550aa16b7b69040c27b7eadb42b4babd9ce9c185610db0008bbada9865896,2024-04-17T20:08:21.887000
|
||||
@ -245637,7 +245652,7 @@ CVE-2024-30951,0,0,64c319e5130efe1148872b6efd54e0b74d19e18724bc83608b600a523ab1d
|
||||
CVE-2024-30952,0,0,45f3818300706503aa11d9788e132ab06eaeaa5db69128a0c2116be2f61adacf,2024-04-17T15:31:50.160000
|
||||
CVE-2024-30953,0,0,b6048a3223dd71969afb665512f3c96be52d96e721358fb67ff9cf9a8128e438,2024-04-17T20:08:21.887000
|
||||
CVE-2024-30965,0,0,0e44dd5d951a25ac3e8873a32678a3145da47d1060cb5312576a9c0471b643ad,2024-04-02T18:12:16.283000
|
||||
CVE-2024-3097,0,0,806f9356cc4622ff9b031006ecb4c94e90929f098cb7a0b907d59fb3d0d09798,2024-04-10T13:23:38.787000
|
||||
CVE-2024-3097,0,1,34b222095b4c58e8686826c73c47f391fd247710053df9aaf322e019da7a6c42,2024-04-26T15:56:40.820000
|
||||
CVE-2024-30974,0,0,fad1ff421513e997a755a646f437b1cf2946e8e72ed4701dccf29e92d3c1baae,2024-04-22T13:28:50.310000
|
||||
CVE-2024-30977,0,0,0a99023cc49f8723c27525ea3fd6d09c0a18e0536fb7ad1e37e70ef0654b9714,2024-04-08T18:49:25.863000
|
||||
CVE-2024-30979,0,0,80ab36bca498e33975593d086ceeeedf107c2c6f87bef059b959bbe8c3731bf4,2024-04-17T16:51:07.347000
|
||||
@ -245803,7 +245818,7 @@ CVE-2024-31298,0,0,75f0543a46ec047f4866e7cbe527aff341f7aebbe53d7e9c6d154aad7568a
|
||||
CVE-2024-31299,0,0,3cd097454f2af8d7dbd4b37b7e30458e12157596eadc5450d37a4ce6cc09ad60,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3130,0,0,f68ffdb025359112b42b29b07959a49895dfaeeef79aecb0f7981acd1536b04b,2024-04-01T12:49:00.877000
|
||||
CVE-2024-31301,0,0,e8b5a65c9bef0175cce9b38c58156669c86eda140a6de06960e3677447078479,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31302,0,0,004d58d9c45d43bae4c81d01c7f44e1bb944c79e30f3822834fc4ba2901de814,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31302,0,1,ce47d276c0e30211735117014df345c3f35f0f231faf4278ec9e7c089d07e35d,2024-04-26T15:55:30.873000
|
||||
CVE-2024-31303,0,0,d19e52c3a72788fe575094c8a039fb48a18dd4ce5551eec3595ac2f9937f5778,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31305,0,0,3d21fe974a7fd87dcf727b7a30275d72689da091f046f5ccadceaab06b2bdb9d,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31306,0,0,8b51fcbcc9a456d52c739540d0a41682a94a82657203d9841ed70dd111575cfa,2024-04-08T18:48:40.217000
|
||||
@ -245909,7 +245924,7 @@ CVE-2024-31503,0,0,a2a7c8d9eaf4775895950c76302a02326a8d6e67bb7d5ec85d9e8a8516e17
|
||||
CVE-2024-31506,0,0,8be7ef5b3e9d65e4bba9dd63e2b7475f0658a4b183369094a98038d4eee40099,2024-04-10T13:24:00.070000
|
||||
CVE-2024-31507,0,0,8a4d05957463fb55563022c4622a2463374ff774a0631f4c63214875a7c78bee,2024-04-10T13:24:00.070000
|
||||
CVE-2024-3151,0,0,2dd1cf236cf7e4dbb7d9720cf950d856f9b652cd7c08d701ecc784bea1322bb1,2024-04-11T01:25:55.410000
|
||||
CVE-2024-3154,0,1,94f04959617daec5031abeef9f74457102d40abbac69b7b181b3f829a94567e8,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3154,0,0,94f04959617daec5031abeef9f74457102d40abbac69b7b181b3f829a94567e8,2024-04-26T12:58:17.720000
|
||||
CVE-2024-31544,0,0,bc835e0f71240df22cec22617fbfab2cab4d97b1f555eabe4ef7c23231d6357c,2024-04-10T13:24:22.187000
|
||||
CVE-2024-31545,0,0,8e5326bf13231003bc10db7b31c44d418956837c538cbd6727e4f72cee368bee,2024-04-22T19:24:06.727000
|
||||
CVE-2024-31546,0,0,a44eabd912524c4138628ddf21812907bc4989788589b1a0788ce24b3eac282c,2024-04-19T18:29:53.040000
|
||||
@ -245920,7 +245935,7 @@ CVE-2024-3157,0,0,efbf5e20eaa98706deef52c26be2e1cba3d67ed28d54a5b0520df90b69e7c6
|
||||
CVE-2024-31574,0,0,9557f9d440c15cad853b3b201ad71c9482a5a0d678031f67eb8305f497f6b516,2024-04-25T17:24:59.967000
|
||||
CVE-2024-31576,0,0,741c8998460302eafaf2dd6cd838e7890c169c726e59c5f45ee51622793abfa6,2024-04-15T16:15:07.270000
|
||||
CVE-2024-31578,0,0,4c90aef50a02aec622bb8c70d230352c3d3dbfba07e0b0b93d71a37f5c581d6d,2024-04-17T15:31:50.160000
|
||||
CVE-2024-3158,0,0,10f7ffa67053f9b78f0dc7e48028626f5209dcb47c62106618b35565e7e9d9f6,2024-04-19T23:15:11.643000
|
||||
CVE-2024-3158,0,1,b6f3eae96db1aebf257009a6259047e5a021bd7f3ae01837a0c02ae4fb2d3f7e,2024-04-26T16:00:15.540000
|
||||
CVE-2024-31580,0,0,e997e3f25c911fc04de779fa9168de4ebef90131449df2b2dfb57ff9ee6e679b,2024-04-17T20:08:21.887000
|
||||
CVE-2024-31581,0,0,d4a48f7cd6a3f11d5bd7242e0dfac3a15852b862f2cf96a614cc33083f70d5cc,2024-04-17T20:08:21.887000
|
||||
CVE-2024-31582,0,0,fe103b3051ee1c8e8159af1dc183525df22a48d013c16c8b28c94f3527365cf7,2024-04-17T20:08:21.887000
|
||||
@ -245928,11 +245943,11 @@ CVE-2024-31583,0,0,eec650b2d1a967bea49e6ce27fbd51a980897e8355103b69036a477d8192c
|
||||
CVE-2024-31584,0,0,7bd8b8c71b3cbc23e6db4c252c0ef145f85399e414092971d73799c932fbe46b,2024-04-22T13:28:50.310000
|
||||
CVE-2024-31585,0,0,ca870b59b85ac9b6cfa4a8fee4976da074575d82dd3c02566198bbf835617bd1,2024-04-17T20:08:21.887000
|
||||
CVE-2024-31587,0,0,6aaa189139b27b06a683c1dac5c91d5124a2971d077e3d9157f284239b68e61a,2024-04-19T16:19:49.043000
|
||||
CVE-2024-3159,0,0,372cd652e2632717ba4bd0c7aadd6df6465a25a12553b2fe9846988ffe1987d3,2024-04-19T23:15:11.687000
|
||||
CVE-2024-3159,0,1,90c5caca0cc5537160e74a2b26ddbcf22bba005cb0a42d8727caf893986c2f2f,2024-04-26T15:59:59.020000
|
||||
CVE-2024-3160,0,0,f58561faca7869291dbd40f98b5207b12f048bddf4323b50e2fa0b0605fe77f4,2024-04-11T01:25:55.513000
|
||||
CVE-2024-31609,0,1,220c67e8d489cb3fe9b4bc543f7647ddfeb5c25b9b19ca8439b4928d10c6d5aa,2024-04-26T12:58:17.720000
|
||||
CVE-2024-31610,0,1,bad125137564ff82d81c08c69745e1e9123b14f73eadb435f64d4af6d83d6827,2024-04-26T12:58:17.720000
|
||||
CVE-2024-31615,0,1,d0e9cb7307b12540caa27ec15d72bbb39fd07c4f4f188a6a635af2cdd881915c,2024-04-26T12:58:17.720000
|
||||
CVE-2024-31609,0,0,220c67e8d489cb3fe9b4bc543f7647ddfeb5c25b9b19ca8439b4928d10c6d5aa,2024-04-26T12:58:17.720000
|
||||
CVE-2024-31610,0,0,bad125137564ff82d81c08c69745e1e9123b14f73eadb435f64d4af6d83d6827,2024-04-26T12:58:17.720000
|
||||
CVE-2024-31615,0,0,d0e9cb7307b12540caa27ec15d72bbb39fd07c4f4f188a6a635af2cdd881915c,2024-04-26T12:58:17.720000
|
||||
CVE-2024-31616,0,0,0d01710e8c157f0d32189692d849b27951e2db80c68fce9b88dd89c45379117e,2024-04-24T13:39:42.883000
|
||||
CVE-2024-3162,0,0,7209bf9b1b4a4f41543ae01bfd19e9aec1dd355164cd1434a8cb5548ea161c65,2024-04-03T12:38:04.840000
|
||||
CVE-2024-31634,0,0,4aa9be86cd809cace2c7d458fd82ce0e6e4c21e7757f642f911286874e9406fe,2024-04-16T13:24:07.103000
|
||||
@ -245944,13 +245959,13 @@ CVE-2024-31650,0,0,93c237f92a0565f29a186681c2be8c18bcc984e57115648f885447500f241
|
||||
CVE-2024-31651,0,0,449580f383ba06b10b890173ddf2d62af7a188eb69db82466ee9152e4b087212,2024-04-16T13:24:07.103000
|
||||
CVE-2024-31652,0,0,208b4f263a9a44614b423f2ea1b775ae64777df67f6e60b98c2159dddb5c4a0b,2024-04-16T13:24:07.103000
|
||||
CVE-2024-31666,0,0,31d90f856345851f66dd503f92b4c8e0d00f556ce99028b034c4027dd7c274fe,2024-04-22T19:24:06.727000
|
||||
CVE-2024-3167,0,0,c19ad392a8875e6cb3d8eb9a976aa540fa751cbd03136dde207326521a23753f,2024-04-10T13:23:38.787000
|
||||
CVE-2024-3167,0,1,d4d0cf5c76ec6cdbb273213113ea664bf90661030b60b58ff4c0d4ae3475608a,2024-04-26T15:55:58.810000
|
||||
CVE-2024-31678,0,0,6d17d4ce9eaa15ebb6367a838566d027b53ddba56e09f333fd8cadacfd1d2447,2024-04-12T12:44:04.930000
|
||||
CVE-2024-31680,0,0,9cd3893ac983fae5e4213584fc439ab2d2b21e3e6bebab8790c0104ed80c76e1,2024-04-17T12:48:07.510000
|
||||
CVE-2024-31744,0,0,7de9e0ac4d1881e8e6a1c9cabea807c4b59ffea44a7ce9a28f0f69a4b5f1eba8,2024-04-19T16:19:49.043000
|
||||
CVE-2024-31745,0,0,a3bdd0cf6c191f4f752a70ac6769fb5b2d5c89636eeffe60e00827ad5ab48d32,2024-04-25T16:15:11.227000
|
||||
CVE-2024-31750,0,0,ef2fe441e5dcedf0cb2da823df8fe57e9b7ada67d4a5ac9a3c649524c0ed2fa2,2024-04-19T13:10:25.637000
|
||||
CVE-2024-31755,0,1,9f123396a9045ee1c6a6877db33608cf210cdac6a9dcfaeff6aa53bb6ed91d41,2024-04-26T12:58:17.720000
|
||||
CVE-2024-31755,0,0,9f123396a9045ee1c6a6877db33608cf210cdac6a9dcfaeff6aa53bb6ed91d41,2024-04-26T12:58:17.720000
|
||||
CVE-2024-31759,0,0,7081cd22df5b9e4148ecc914176fc1f6cc04366073f8b1e4eccd8dfe4f2b7d73,2024-04-17T12:48:07.510000
|
||||
CVE-2024-31760,0,0,7b1e0b53a94a63e7f108110799c5f85524efc23136fc5608e680b8482e690959,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3177,0,0,7ac29b234ae819e7e031e3cd5f5b542db573e269bf19234225624f7ae92277ac,2024-04-25T06:16:00.237000
|
||||
@ -245999,7 +246014,7 @@ CVE-2024-31871,0,0,2e9cb20a8839296f42d6bc6aa4eee6ec286fed065eef42e4971f116c0f81a
|
||||
CVE-2024-31872,0,0,7d09da772d85c1598253bebf81c543077ef995af0f84d1cf088132605a2400f9,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31873,0,0,30397559953deb34a9ae192149473632dc6b2334245e920787a4c5e14fc76375,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31874,0,0,1770e58d0ae5591eb931a8cdfdb054fb4d854f81849d14af250c71db6caf553c,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3188,0,1,e13ff2a89d7a2b3623edc5e2d346b4862f61e742368b9e6faf1373c86c652dce,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3188,0,0,e13ff2a89d7a2b3623edc5e2d346b4862f61e742368b9e6faf1373c86c652dce,2024-04-26T12:58:17.720000
|
||||
CVE-2024-31887,0,0,e951c215b0e12b882bcc7244c98d7631ee4f4b7a3271b5f24e369f1a635cd3e5,2024-04-17T12:48:07.510000
|
||||
CVE-2024-31920,0,0,3c0045dbbecad7d78d5b9eb044589c2fc290e421e2d5accb9391890092efc90f,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31921,0,0,732b3dfcff7f3c38928ece374bd7708cd93eb00a4dc0a7d5ac8e2f115b9d7217,2024-04-15T13:15:31.997000
|
||||
@ -246069,7 +246084,7 @@ CVE-2024-32039,0,0,ad4990c66c843cfb78c18ddf4863c9df097d3c92a62d93c490b95501745f6
|
||||
CVE-2024-3204,0,0,2a2a133d829052d72380a6f7a45e32f6ecd96ec6da65fdbadcbe92a1f79d774f,2024-04-11T01:25:55.933000
|
||||
CVE-2024-32040,0,0,c9e8a9bafebd4e002463be520ee967b3c928ddf4cec6865e7aa23fa1d81b2834,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32041,0,0,e88f61c8c702a5d00724562a1be23c2ca0fc9ec03e84f95db2dfed035982cfb4,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32046,0,1,9df0398b3889f30265a954a80364e831578021e4c89e4f166a40685b75c7229c,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32046,0,0,9df0398b3889f30265a954a80364e831578021e4c89e4f166a40685b75c7229c,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3205,0,0,befb48df2bb5e20af3b4383c1ef82865b9f9fb3145e096ffb7e0098ff096b4f8,2024-04-11T01:25:56.010000
|
||||
CVE-2024-32051,0,0,6b68078466255ceca82525e73c2bf321431fb4aeacd1939a9b40ac3cfa9637f8,2024-04-24T13:39:42.883000
|
||||
CVE-2024-3207,0,0,a57734da301192d6a9381ac71eef9bc84e6acf70886d5628a9c0939255320fc2,2024-04-11T01:25:56.090000
|
||||
@ -246179,7 +246194,7 @@ CVE-2024-32316,0,0,a58c15fa4fd96274056ab104ca6fc1340e053661d8932d745c0fc4b1c09dc
|
||||
CVE-2024-32317,0,0,3b211721c2918106b1f1e7546bda616d889285c7b9549429ce029a2ae9fa7832,2024-04-17T16:51:07.347000
|
||||
CVE-2024-32318,0,0,af0147cc0b951b6320a20f40cec58c15f3c7ae517895de35f7ff02b93007344c,2024-04-17T16:51:07.347000
|
||||
CVE-2024-32320,0,0,37a3616f028696b5fd899f236869a82a73cb2f39b08a79d3a8c229c093bfc5dd,2024-04-17T16:51:07.347000
|
||||
CVE-2024-32324,0,1,5637be8d648feeae737d20c914bc153a00dc6f9f14c25c786480285bcba2016a,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32324,0,0,5637be8d648feeae737d20c914bc153a00dc6f9f14c25c786480285bcba2016a,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32325,0,0,1606b9143cf3f301fb7c5a8ddfe5af1d789ae862e1039d8cdba213b614fe60be,2024-04-18T18:25:55.267000
|
||||
CVE-2024-32326,0,0,8d29072cf9ef63ed8de6e5b3ca6cd2fcf0e1dd16c656ea5ca29e42cf51ce35bc,2024-04-18T18:25:55.267000
|
||||
CVE-2024-32327,0,0,a6e9f7161ee1883fb85d4857caa44c041c8b788ab544bd06a70716304acc6f7a,2024-04-18T18:25:55.267000
|
||||
@ -246203,9 +246218,9 @@ CVE-2024-32391,0,0,b9d2ada2509e9e002fcf7fc50c30e5fa24f6bd077b7f0fab83dbe519d7675
|
||||
CVE-2024-32392,0,0,e9dc77721f231608117a79f151c9f1e6be5cd7530989658bd3dd67ce41889ce5,2024-04-22T13:28:50.310000
|
||||
CVE-2024-32394,0,0,5f3cc70e4b86c8028147d2489cef40fa6c9285878a28bdb0855878990e97443a,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32399,0,0,881ee2dd975bc6f828957c741f38d2e9a20065eb3fba67ea84e4e0b7e3e06627,2024-04-23T12:52:30.940000
|
||||
CVE-2024-32404,0,1,79a6c7942a9f3dcde43616bd36ba873d8478b9d821d7bf155e9c801f8f350e7c,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32404,0,0,79a6c7942a9f3dcde43616bd36ba873d8478b9d821d7bf155e9c801f8f350e7c,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32405,0,0,3981342fdb5111e1ad684c404fe5fa643bf161596abde4f7fd085ddcbb79a5d7,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32406,0,1,8e6d36b8dcd241dcce7d220afafae7996fb58ae46bc5ab008c1d0443a9fffaf0,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32406,0,0,8e6d36b8dcd241dcce7d220afafae7996fb58ae46bc5ab008c1d0443a9fffaf0,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32407,0,0,04bdb1c21d2d45016e5f7565a6490533ba649bcc5c4dc99b7e34c030532cab3a,2024-04-22T19:24:06.727000
|
||||
CVE-2024-32409,0,0,2cc0bf26ecd8938fd89992a98bae2541af2d19072f0bc8cdc919759b6ea980aa,2024-04-19T16:19:49.043000
|
||||
CVE-2024-32418,0,0,95e561b293359ffe96c6d53d8bd7aa5dba172944f2d114b653ec1a760700c5d9,2024-04-22T13:28:43.747000
|
||||
@ -246375,14 +246390,14 @@ CVE-2024-32632,0,0,363f256990a9e0bbc1d5ebda216d881268683761016a5132b054fbdb44080
|
||||
CVE-2024-32633,0,0,8ac8ce6a1ac201ef8dc36e7fab192ecb8b1b583d781df940a83a5707e31555c1,2024-04-16T13:24:07.103000
|
||||
CVE-2024-32634,0,0,399e2bba8e548c1c98770d2f478e96e69a60afbc020788dd69a365e3ae504be6,2024-04-16T13:24:07.103000
|
||||
CVE-2024-32644,0,0,1c6536d9b118a22e007df0508c4274faf4a9f6bb52ca2e5c9b157aa559740e67,2024-04-19T16:19:49.043000
|
||||
CVE-2024-32645,0,1,83adaf5677e55b1a59820c4f0a97b28a4348c652b76a16d6780ad5399dde09df,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32646,0,1,41742e293a5abe489229ebd10463361834c507fdbaf624df23524868e6a2233b,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32647,0,1,490674cec4e10ca9f1fae27e4301337427d20ba08f5717faa88e91bc9978d795,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32648,0,1,51d9a75e10cf28a571f867b7e39f72785ee54221836591dd05a3ce23f516ecc4,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32649,0,1,2606b7bb39cfbd689d78921e5b72df6d6076d6c6389d881e5848c4228e02f160,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3265,0,1,63141ade8896e750392b2ef6d128b04c0029c65124996233f36f5316d719b27f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32645,0,0,83adaf5677e55b1a59820c4f0a97b28a4348c652b76a16d6780ad5399dde09df,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32646,0,0,41742e293a5abe489229ebd10463361834c507fdbaf624df23524868e6a2233b,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32647,0,0,490674cec4e10ca9f1fae27e4301337427d20ba08f5717faa88e91bc9978d795,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32648,0,0,51d9a75e10cf28a571f867b7e39f72785ee54221836591dd05a3ce23f516ecc4,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32649,0,0,2606b7bb39cfbd689d78921e5b72df6d6076d6c6389d881e5848c4228e02f160,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3265,0,0,63141ade8896e750392b2ef6d128b04c0029c65124996233f36f5316d719b27f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32650,0,0,3ec938fa621d2b09851dc7c9c4a0bab9e06500eb12a687bac8f1323156efc6df,2024-04-19T16:19:49.043000
|
||||
CVE-2024-32651,0,1,a08e6519a4a5ed38f1b6015b96dc4f1ec8d571fb21137a5ea160a27c1f931ade,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32651,0,0,a08e6519a4a5ed38f1b6015b96dc4f1ec8d571fb21137a5ea160a27c1f931ade,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32652,0,0,507899e8cc0ef719a4df6a408b43b1aeaf42e8d25b41dcf9a35617406adccb9d,2024-04-22T13:28:50.310000
|
||||
CVE-2024-32653,0,0,96a4de58183f8a4c5475803e77d708dc553ab0aba5c22712929dba4355cb603d,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32656,0,0,507ca72541b43d2bb1e3f8cba739ba39a5095ac212b37ee6cfc977f3944f903a,2024-04-23T12:52:26.253000
|
||||
@ -246438,6 +246453,8 @@ CVE-2024-32743,0,0,edf9e18b1b448dbd637bbc79623f922e816f320285afdff06dfa2f94a76ea
|
||||
CVE-2024-32744,0,0,1b7d2f5284e3100bac5a22aa75dd41934cf75bbb03b5daf27a5bf3a3b911df68,2024-04-18T13:04:28.900000
|
||||
CVE-2024-32745,0,0,7c7ddc449e8c742cc889f2211c73cf5b3fd566001a852588319e29620ec0008a,2024-04-18T13:04:28.900000
|
||||
CVE-2024-32746,0,0,15529f833c25b7b5b5022877593c49d5afec10018bbf65b56334a694e0bc455a,2024-04-18T13:04:28.900000
|
||||
CVE-2024-32764,1,1,52bc63ec901a80e6d9fb523486efda3ccdb0d7dbbe012e747181f0ed3eccb018,2024-04-26T15:32:22.523000
|
||||
CVE-2024-32766,1,1,7124f2f2e76d08c6052dcb1d7be3d5447ca995987b145dc9978c76fca6abd2cd,2024-04-26T15:32:22.523000
|
||||
CVE-2024-32772,0,0,a15589f53fb4b19d6c5fe00e122ee5c1772c9c4b8524a9c799b83bd38f320877,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32773,0,0,78124a0c2ce00ac54db31275bfb811f734258697b22667c14f2f064905a8696c,2024-04-24T17:16:50.397000
|
||||
CVE-2024-32775,0,0,37dedaafb650bebb75327fea5ba2a27c54c577e91b0c51ca0d898dd371b5ccab,2024-04-24T13:39:42.883000
|
||||
@ -246462,12 +246479,12 @@ CVE-2024-32815,0,0,fdfcf6bbe35deb9ef34763a17ff64d385e838875d5c0ab731c71e0463aa8a
|
||||
CVE-2024-32816,0,0,2fa63efd4ad7910d44e8053cdc5b80901495c5148f9f0b492de6d141c5af6f05,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32817,0,0,fb6a8208af9f3f3ba08015afd23338dfbfdb74c4a5ad4586cd32f7aa11622335,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32819,0,0,a76abb5e1cc56a40468c4b4be8e97a0f07832ea680930c394988fc1a87f8b845,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32822,1,1,9e6cae72ace8ed5b937561054f9b3758225e0375c29d12793d3681a6c050112d,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32822,0,0,9e6cae72ace8ed5b937561054f9b3758225e0375c29d12793d3681a6c050112d,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32823,0,0,d41409e4e34000822f2d67aa2aaa2f5b9efdcc5ae85f52fc2a1db47eb27a264d,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32825,0,0,004eee12f4f1b22c4e428c7ab0e0229e0137f723f36fa7ab2cf6c1cdf7bdb1bc,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32826,0,1,873169f8fb63c35330557b3a0ae019228223509c3c38bff41774aa76b371a14c,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32828,0,1,5aa04d68f7fe606a81c7c4ce5875bbb5e8bd0f30b57a856a270742b9e0fb8fd5,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32829,0,1,447fbefc5199b3b9a4cdea76778d2eba1a9892de1d3e281232efc53c23fa159b,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32826,0,0,873169f8fb63c35330557b3a0ae019228223509c3c38bff41774aa76b371a14c,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32828,0,0,5aa04d68f7fe606a81c7c4ce5875bbb5e8bd0f30b57a856a270742b9e0fb8fd5,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32829,0,0,447fbefc5199b3b9a4cdea76778d2eba1a9892de1d3e281232efc53c23fa159b,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3283,0,0,8b1939d21df3d4399a3bf874e70470053c1a0ae20421841ad51c79aca5727c56,2024-04-10T19:49:51.183000
|
||||
CVE-2024-32833,0,0,75a734274df361ea9a3f6b3015d66d3525b2c570f6f2524ded71781e2b6ac99a,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32834,0,0,d2ed9ea40163afd5f111e44be27b5edfb4cb8a8dd0234c49fdc13943a21fbf2d,2024-04-24T13:39:42.883000
|
||||
@ -246475,7 +246492,7 @@ CVE-2024-32835,0,0,a55a936ce932c192bddb52ecc7ef5c50500f7aaee0689f590c1aa942fe932
|
||||
CVE-2024-32836,0,0,b79abde0b1fb00c320171e12e4361e475bc7a0910a68d24b478ff673cfed4676,2024-04-24T13:39:42.883000
|
||||
CVE-2024-3285,0,0,ea17e16acaa3172cbcc052cf9bfb1b3e7ee2b004434b062b8e67c1c1ed8bff14,2024-04-11T12:47:44.137000
|
||||
CVE-2024-32866,0,0,20522d9aebf09a5d43cbab0aa4b3dc9ed937958cfd0ea9d3803e03cb59093366,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32868,0,1,7215b037da2d1626f8aed49271c2e00da47b3888ed7a25fa6fff4d41ed4d615f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32868,0,0,7215b037da2d1626f8aed49271c2e00da47b3888ed7a25fa6fff4d41ed4d615f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32869,0,0,0e473f01ce255dcdc5f11b871766f1c1758b18f6cf26ba19adbc6c7e41a0ee7b,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32872,0,0,59ac24f6acf63d3b4ddeb437211a7661d520fb02f021fd6a951644796eb80a41,2024-04-24T17:16:50.397000
|
||||
CVE-2024-32875,0,0,1d3ae071c5976cb38c56d9063a1b2dc7d3c3dd7317932ef76fe9cbd393a3f40f,2024-04-24T13:39:42.883000
|
||||
@ -246491,7 +246508,7 @@ CVE-2024-32953,0,0,3329ba2326732f07873fea449c4df468407eef1a582a858c8dc24aa04675c
|
||||
CVE-2024-32954,0,0,3a7f4cce8ae306208cf651c097f633aeeb3b531d870032263cd35bb109cce334,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32955,0,0,4110c217be7c8e99337e07561aafd3b44e4ea4a473b206cd84ab63a5159eb462,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32956,0,0,d66d4590ba60a597e1a04a825f1bc4c4665719511bc6e488154ea811617d794b,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32957,0,1,532e015af66b2883a78ca80ab4e745d39f44c5e9fcef24bd49aeaa5a736bf79f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32957,0,0,532e015af66b2883a78ca80ab4e745d39f44c5e9fcef24bd49aeaa5a736bf79f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32958,0,0,cef1b6bbedd4c8c60a926a11138b6464f77bbaf19e9ffb1c03d74bbc158a75b6,2024-04-24T17:16:50.397000
|
||||
CVE-2024-3296,0,0,bcc39314c1e9f6d53aa0ccc8e7e7cac7c279f7f6ee5a27f19287b128ea2ed6c7,2024-04-05T12:15:37.777000
|
||||
CVE-2024-32961,0,0,1b629054b94b5d4eed78b6abd48fbdc0faa224bb769542485a6d06ff46e201b0,2024-04-25T13:18:13.537000
|
||||
@ -246513,6 +246530,10 @@ CVE-2024-33215,0,0,c8be43358325b8e905d28304a9339956d17f1418e85498fcb8a7134416d39
|
||||
CVE-2024-33217,0,0,4e1e2d2adceccdbe12f057aebeef0a19faff919f64d3f29d52997e302777a311,2024-04-24T13:39:42.883000
|
||||
CVE-2024-3323,0,0,5322a19626f9d41fbc85f0f073b4efac313efc9902bda6b2387f115ed4ea09c7,2024-04-17T20:08:21.887000
|
||||
CVE-2024-33247,0,0,5b310633e37be7faec0a67f0909e6604d563200f580bfeebd39a61cfcf005a36,2024-04-25T13:18:02.660000
|
||||
CVE-2024-33255,1,1,06b2ed0682db64edd9550c2a752e0ec40d950361f42c20f13ee8f81fd0a06612,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33258,1,1,9cba5ba4b2b25419975f62d52ca9fe6af0f0a8e9f9f0361b732bbec6fa9106ed,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33259,1,1,7baedb8a8dc783fa88b887fd5c3c1eaf3e0afda0857f326c9372530e2281ba12,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33260,1,1,e8aa0d878f3a05d87e2a04d2b95090816ce2a8144679e05279a245ccba53bc96,2024-04-26T15:32:22.523000
|
||||
CVE-2024-3333,0,0,8caee5b26018a8a7a4f06ec5d64d35dd731cf8d2f43a25885f4e67db044a1bff,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3343,0,0,c7ada54a8973c3f80fc415b1484b0c0d7aeb75e458012c05cd3c69dcc6f0e33f,2024-04-11T12:47:44.137000
|
||||
CVE-2024-3344,0,0,9f0d30bf7471aa86a4cb4a703805df84e7338e4a65408c3f6ac2fd777c6250e1,2024-04-11T12:47:44.137000
|
||||
@ -246532,50 +246553,50 @@ CVE-2024-3357,0,0,4504c33b3bb653378795a255a83c05295c4cb93d37914e6c8a1edf8397686b
|
||||
CVE-2024-3358,0,0,694a0960c89fb254bc37c7c2f594e5cb197e9c3b955cd9433f44c414aff75d2b,2024-04-11T01:25:59.610000
|
||||
CVE-2024-3359,0,0,a779b2e33399e3789113d39f065b1425ad824801b217abc54417c2cce7e7d2db,2024-04-11T01:25:59.687000
|
||||
CVE-2024-33592,0,0,dc3e0d94cd47d0ea73220517b5aaa098a37fe316a3d5e3b0ef33e4a8423b62af,2024-04-25T17:25:05.903000
|
||||
CVE-2024-33598,0,1,e4a4e7e39ad7ca99d63034b88034c1711cb6aadf83200adb29d71df31171a23e,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33598,0,0,e4a4e7e39ad7ca99d63034b88034c1711cb6aadf83200adb29d71df31171a23e,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3360,0,0,2ffbaa301c04a2d62013f221bb69a21a0f4034a97959f93c6ac130d96a9162d3,2024-04-11T01:25:59.770000
|
||||
CVE-2024-3361,0,0,c120caf4947180a69c26140d9354a0af916b072bcc15573944dc923bbf223f7d,2024-04-11T01:25:59.847000
|
||||
CVE-2024-3362,0,0,4f698660b915c64322658e8738d0fb3f09460cf98fd487b3189e8f9d96e2b2c1,2024-04-11T01:25:59.930000
|
||||
CVE-2024-3363,0,0,f5bcc8af5a66d22a73abe7e86b636154362f284983c790b03385b20aa4737ceb,2024-04-11T01:26:00.010000
|
||||
CVE-2024-33638,0,1,0d31eece048e3c9431974f9057ec33478d956a0e2e2ec2ed2728ca98e2a5aff4,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33639,0,1,48329396da841a500fbc4cfab51e90ca4a8e91c9d176a80b23b1c33d027e19c9,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33638,0,0,0d31eece048e3c9431974f9057ec33478d956a0e2e2ec2ed2728ca98e2a5aff4,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33639,0,0,48329396da841a500fbc4cfab51e90ca4a8e91c9d176a80b23b1c33d027e19c9,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3364,0,0,2986dc00429f74e0e2572cb8153933c26e825f7eed092370bca7e4ac84ee4fdf,2024-04-11T01:26:00.090000
|
||||
CVE-2024-33642,0,1,9fdc55ad2dd82ff2a4873d7bcaeeac8f78f646258f62ff56391bd05c9faf244f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33642,0,0,9fdc55ad2dd82ff2a4873d7bcaeeac8f78f646258f62ff56391bd05c9faf244f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3365,0,0,64a2e531185071bb7e6b7a9cf067546b0c6c5f700f703a6639ecd4e081a3dcb7,2024-04-11T01:26:00.170000
|
||||
CVE-2024-33650,0,1,ddb0c638b4b1a19623eb8b0ffcd50139c548f3af6f8bc342482c348698a758c6,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33651,0,1,ad542101fb8c959eb343d29f9fef1a319d344ea86d05309721f1da25ca361dd1,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33650,0,0,ddb0c638b4b1a19623eb8b0ffcd50139c548f3af6f8bc342482c348698a758c6,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33651,0,0,ad542101fb8c959eb343d29f9fef1a319d344ea86d05309721f1da25ca361dd1,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3366,0,0,641beaaa3f9fd7d2de3006c0b03aadadafd130dcdab91419774c604b06cf9b30,2024-04-11T01:26:00.240000
|
||||
CVE-2024-33661,0,1,ef4c23bec93d4fc27fbb5a7d819bab9effb620206db58cfcf69eb2454e666a6f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33663,0,1,82d28f53d25cace95910c337221ba4656b942061938f8e18bbb7b10894243dde,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33664,0,1,88fbb181b485cee8690521e4ebfb8da46000da260233151593cf81f4fd77bc63,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33665,0,1,f1effbda9169752a4ed318c7c51b95fc6311aa190a9933cb9ac35a8c4eacb57b,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33666,0,1,2d8c72a6f35fe9e1394dc41ffef2c32236b0fd134a8fedcf8725d1da6f813dc8,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33667,0,1,4476f3c5aa4aa1188c4aae28028375002c48a6904e23d1e07961c0f0b5579546,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33668,0,1,a514a556f998ffb2fea1e20d41c35349d8ea0e3e1b102abcdc1ea43db1f60f07,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33669,0,1,c253f0609c9c33a742179ae7cd544d2ce9878979622600636d74814e87f224db,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33661,0,0,ef4c23bec93d4fc27fbb5a7d819bab9effb620206db58cfcf69eb2454e666a6f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33663,0,0,82d28f53d25cace95910c337221ba4656b942061938f8e18bbb7b10894243dde,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33664,0,0,88fbb181b485cee8690521e4ebfb8da46000da260233151593cf81f4fd77bc63,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33665,0,0,f1effbda9169752a4ed318c7c51b95fc6311aa190a9933cb9ac35a8c4eacb57b,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33666,0,0,2d8c72a6f35fe9e1394dc41ffef2c32236b0fd134a8fedcf8725d1da6f813dc8,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33667,0,0,4476f3c5aa4aa1188c4aae28028375002c48a6904e23d1e07961c0f0b5579546,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33668,0,0,a514a556f998ffb2fea1e20d41c35349d8ea0e3e1b102abcdc1ea43db1f60f07,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33669,0,0,c253f0609c9c33a742179ae7cd544d2ce9878979622600636d74814e87f224db,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3367,0,0,960603a26ef6b142509321d49e151f94a19b335f6f238fbeac2ae8c02d482fbe,2024-04-24T12:15:07.093000
|
||||
CVE-2024-33670,0,1,b10273d5f872a298b2a1a3ee7437c625a6db9cb6ae5831cdddaa0a3f1ed75667,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33671,0,1,8e4380c2a0213c26c0494036de24925be4ad7f6466e298915014ae7a2c181324,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33672,0,1,df4560c81d575e6b832891637f49b30239e62d2d24a76a4c7c774d5cb62b571d,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33673,0,1,798f00efd7413515cd3fc2ae1c3dac49febcddf3acc5d475a5fff0613c923d7e,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33677,0,1,0ba6eff3f4cb58dd188bc56ddbf55de93e22b8a4d78613762ca6ea5020a8d402,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33678,0,1,3eb3ed54016d603640eee945b1f1aad58c4c688e3f6bbd85f73023aecb7df708,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33679,0,1,70ac1c5c15989328762b68d3ea2e8a8e188d36f85b38c7db7085c221a3ef4365,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33680,0,1,2bd5405b2e3f142573d34801f5bb8cec3408d55f4999301cf6ae36cb8e4dff8b,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33682,0,1,00076a9016ae4f7b39eafbc064460a098b1c31b2f99ad1a91c77cc878b40b9e7,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33683,0,1,e9cc5990fb203e2df4b1da39f1e0b379a1bfc80cf9dee6909b048334b1532d1f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33688,1,1,007c090f6a16b929a7873395a9bf6fc9aef700a46f1566746d2aa6c274b331b1,2024-04-26T13:15:46.530000
|
||||
CVE-2024-33689,1,1,4b4c5b5e25ea422f858ca52b1554dc94ffb20f12ec364d7da5c676421aa6ed32,2024-04-26T13:15:46.727000
|
||||
CVE-2024-33670,0,0,b10273d5f872a298b2a1a3ee7437c625a6db9cb6ae5831cdddaa0a3f1ed75667,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33671,0,0,8e4380c2a0213c26c0494036de24925be4ad7f6466e298915014ae7a2c181324,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33672,0,0,df4560c81d575e6b832891637f49b30239e62d2d24a76a4c7c774d5cb62b571d,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33673,0,0,798f00efd7413515cd3fc2ae1c3dac49febcddf3acc5d475a5fff0613c923d7e,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33677,0,0,0ba6eff3f4cb58dd188bc56ddbf55de93e22b8a4d78613762ca6ea5020a8d402,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33678,0,0,3eb3ed54016d603640eee945b1f1aad58c4c688e3f6bbd85f73023aecb7df708,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33679,0,0,70ac1c5c15989328762b68d3ea2e8a8e188d36f85b38c7db7085c221a3ef4365,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33680,0,0,2bd5405b2e3f142573d34801f5bb8cec3408d55f4999301cf6ae36cb8e4dff8b,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33682,0,0,00076a9016ae4f7b39eafbc064460a098b1c31b2f99ad1a91c77cc878b40b9e7,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33683,0,0,e9cc5990fb203e2df4b1da39f1e0b379a1bfc80cf9dee6909b048334b1532d1f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33688,0,1,0f9215f5b8ed5bc9fb19ca790f5f7377696fc469f970f9a7ee53956de0d3ae1b,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33689,0,1,1d386bf5b5b45281abb8ef3c2b400e4200fecd3eab1d245c92978f0ea4db708b,2024-04-26T15:32:22.523000
|
||||
CVE-2024-3369,0,0,943fbc9826beb11428b980e60e48ec152ecf5fda97b5d1c26bb0e96c030079eb,2024-04-11T01:26:00.317000
|
||||
CVE-2024-33690,1,1,90ae64050ca56ba2f971f6fd8f01bb5f69e9212cd4365392ad1b9b73ee6a9a0a,2024-04-26T13:15:46.923000
|
||||
CVE-2024-33691,1,1,13c979af27ea1eb863b4f5cdf2bffb9b600de728a9b0f1c04ed9f12cb97aa445,2024-04-26T13:15:47.150000
|
||||
CVE-2024-33692,1,1,2e8b01209375fef37e559503e2c6bc27defa5d2096d8990fed97c7855982ad3c,2024-04-26T13:15:47.367000
|
||||
CVE-2024-33693,1,1,5042cf1605923d6ce4bb738d47bd6cb52674c77d4b6cde5fd2f532bb44034ada,2024-04-26T13:15:47.570000
|
||||
CVE-2024-33694,1,1,c0f37c857398d74449c263764830f3ef855f24e2dfc9097a6c9a4a4a67c4b13b,2024-04-26T13:15:47.770000
|
||||
CVE-2024-33695,1,1,5de1fe68150199a04dffc88f3d5cab921c53b6195b4bccac3eca5ee210c667c2,2024-04-26T13:15:47.957000
|
||||
CVE-2024-33696,1,1,7b30212df887b80cb05495633a0b45b92de83eb84fc5d660edd58af5b4d2ea4e,2024-04-26T13:15:48.150000
|
||||
CVE-2024-33697,1,1,dfb89e1e738ab05ec8cd8e226b76d90e76ce463d988ecce52a1987557f776ac3,2024-04-26T13:15:48.347000
|
||||
CVE-2024-3371,0,0,ae16aca12e0ef96a1d50fe21e3e29226b9c681d9170bad90bc7de166f5de9586,2024-04-24T17:16:50.397000
|
||||
CVE-2024-33690,0,1,f895b18287e63a2309a845f243fb7d9749eea7cbdbca61dd2f18b2f0b6cdc1d0,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33691,0,1,7be0ad5e1aa2b0eb34a5cbff5bf1193dbc0e0da45b3f583055aaca3d94afd26c,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33692,0,1,a2933fa9ed729a7087d848e4b0d5b9079b905161a359c2f168f31c5eb6498ff6,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33693,0,1,8a8753de5a18e78e8b405da8fe6ea242d4dcd7464258c11a66d2d74b17602a09,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33694,0,1,2a34f3485ed3114d66a5142b289b75d97d39099aba1082ccfc1ac1a12db3a191,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33695,0,1,ae0e5335cc1800d4ae08a23b58f49b6355d730c3c1c2a4b30db1535e5bf2896f,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33696,0,1,69dd17331928f2f757ad887bb2a4791d850ef3b9741d3308e4f1bdae745d926e,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33697,0,1,c21a097dc63e0209130fde57f8b3b6960119bf8dab8f1159b3e53cbcd1f4bebf,2024-04-26T15:32:22.523000
|
||||
CVE-2024-3371,0,1,a0481e14f6cfcb9b0215a88c87fda086117ad0add8d553a83f1550e7381c3170,2024-04-26T15:15:49.357000
|
||||
CVE-2024-3376,0,0,f944ee3af49afac066405b13bcc14ad1a3aba304f57c015d653c31ce71a21bf1,2024-04-11T01:26:00.397000
|
||||
CVE-2024-3377,0,0,4f5c5a9a0c925d4c25c7e7a8167aad399bf59289271bce69d10c801ec2848ece,2024-04-11T01:26:00.473000
|
||||
CVE-2024-3378,0,0,4f86c276b9b6898b0be7d5e038b0b93861aa9bc2234c5fb397df84486317a3f0,2024-04-14T04:15:56.560000
|
||||
@ -246632,7 +246653,7 @@ CVE-2024-3470,0,0,630f5f35df37b6b978ca7687ce76aaec305cc639bf4ca3fb3b6aed08fe283b
|
||||
CVE-2024-3491,0,0,22475c1a2c147b599aec5499497f20fc9fa37c1dc206a0659b8807ac37f4f324,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3493,0,0,63ead7e160b6b2cbd834dd6075f87d345af3361e8d55520f11e81a53e2086aaa,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3505,0,0,d46d6b7d35449c168e9ff66f3c93f973f2e1e579109b94b88c63ad7baac2b7b8,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3508,0,1,d959d6875ebdf1111c411a127bcf8835b8df75473c8a65cceb78a8cde3a7f51c,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3508,0,0,d959d6875ebdf1111c411a127bcf8835b8df75473c8a65cceb78a8cde3a7f51c,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3512,0,0,7186c9ec3829c2082fd68b5fc8e23caed587fdf0f4e68c2974db5f41b90fb514,2024-04-25T13:15:51.663000
|
||||
CVE-2024-3514,0,0,fd39bbcd0f0890f4d85c4ccfb46694b71dc6efa7f8c56852e1f4fd99d58e20d2,2024-04-24T17:15:47.423000
|
||||
CVE-2024-3515,0,0,5591c01553945d08e143bb397e7b7011721b53594a14b5bacff6fedc69b36f26,2024-04-19T23:15:11.963000
|
||||
@ -246683,10 +246704,10 @@ CVE-2024-3618,0,0,4930954b63fbf1867ea6023e0e85abb5ce3c463a36dea55dc99465af5aaf25
|
||||
CVE-2024-3619,0,0,e46a3b263395cb61cb97e22d10d38e54d57de91c1d7f1832b85e56c338bf09fb,2024-04-11T12:47:44.137000
|
||||
CVE-2024-3620,0,0,a7eeb1bc049879e174341aab349252fb94be8452f8b1f4ee171cd19f6ef0b10d,2024-04-11T12:47:44.137000
|
||||
CVE-2024-3621,0,0,84afe5bfc8ac11b311e81571bedd8fcb4ae60929cf687215eae135d692582687,2024-04-11T12:47:44.137000
|
||||
CVE-2024-3622,0,1,f6f6181040ce05f227a2f4cee6ed8c6825ce1782bda5b4db74629e7764fd106d,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3623,0,1,0b8552b1aa4902678321ef4b7101ba29e549f51a18210bbfcdeb49e13a606b29,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3624,0,1,895c6df2d7d37aded687a42cd606cc8964938d7638b69eb5f2bb7ed7918e3c24,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3625,0,1,bdfc02ea54a24f6881aec84c5f1fc5990e6ef5f00e22fddcde59e8959b67b93b,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3622,0,0,f6f6181040ce05f227a2f4cee6ed8c6825ce1782bda5b4db74629e7764fd106d,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3623,0,0,0b8552b1aa4902678321ef4b7101ba29e549f51a18210bbfcdeb49e13a606b29,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3624,0,0,895c6df2d7d37aded687a42cd606cc8964938d7638b69eb5f2bb7ed7918e3c24,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3625,0,0,bdfc02ea54a24f6881aec84c5f1fc5990e6ef5f00e22fddcde59e8959b67b93b,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3645,0,0,67d98e2e4153ee647deaff1e3df569df07b34dacff73ef5068937bbd33f489da,2024-04-22T19:24:12.920000
|
||||
CVE-2024-3646,0,0,acb9cfc5d5c2523df1f5225ae5c2cd01f196734634fe01108d948b04f61908e2,2024-04-19T16:19:49.043000
|
||||
CVE-2024-3652,0,0,a467de8b64f8147acdef48edc35752a89afb7d5856e17302ea9c57335ed0f61c,2024-04-11T12:47:44.137000
|
||||
@ -246696,8 +246717,8 @@ CVE-2024-3662,0,0,aac492e0cb08799a7f888c46af5bedb595fa2e9ad6dc15c21be50e9dae7006
|
||||
CVE-2024-3664,0,0,afb9452532a9b46276f3e123567931f2d9b14afd62c66b887c9d751f65c725bc,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3665,0,0,22dbbd6c0bec2b9f433688ae97b549cd541e7f2d387c3796dd32246c851476cf,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3672,0,0,b7de207aaf40bb160711ae23312b83bd4f3d950fbf99cf282ee38b1e3854739f,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3678,0,1,e770db3caaf712e414c853aa623965bb327af7a91cad3dd842cebc34b1ec381a,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3682,0,1,ecb0c69cf3ce37eb2dee892546a2b00b564476e1cf64d3c2ddd85dd4f276f51f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3678,0,0,e770db3caaf712e414c853aa623965bb327af7a91cad3dd842cebc34b1ec381a,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3682,0,0,ecb0c69cf3ce37eb2dee892546a2b00b564476e1cf64d3c2ddd85dd4f276f51f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3684,0,0,693360cd268d4b961448865406a570238e347409fa389434d499b6fc0f790dc0,2024-04-19T16:19:49.043000
|
||||
CVE-2024-3685,0,0,2d04d41485feb8a52bd1142022b18bc3f24805efb219d419e0508c4773991260,2024-04-15T13:15:51.577000
|
||||
CVE-2024-3686,0,0,811bcae5db0f32a24e5b10c51fcb2c5c47ac8ca123d5e8befb2d943ee92f7589,2024-04-15T13:15:51.577000
|
||||
@ -246802,7 +246823,7 @@ CVE-2024-3880,0,0,237e3bb93a0b113a1c50538806f68b5377561349bd4f47a9139ec72cd35641
|
||||
CVE-2024-3881,0,0,9055ecf63e1aedc7e2787afc56e67bc831564d5ee15f418ef1b408c81c24bb16,2024-04-17T12:48:31.863000
|
||||
CVE-2024-3882,0,0,846c922d5cf92347db05da515dc041ccc83bdcd548fefc386c188946857d0db7,2024-04-17T12:48:31.863000
|
||||
CVE-2024-3889,0,0,c4039354ee4d81ce5faec2ce618c8f0af30c97c1ad1feeb689836cb585b438a6,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3890,0,1,36b8ca3877f45c22c79d488c2085e6fc56556038eb04e94f8b2e4dcfcb7e1201,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3890,0,0,36b8ca3877f45c22c79d488c2085e6fc56556038eb04e94f8b2e4dcfcb7e1201,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3893,0,0,44a15b07d473e504956c2fc6e9bdbbb981ef84a8f1b69c702ee1ea4228dd1195,2024-04-25T13:18:13.537000
|
||||
CVE-2024-3900,0,0,5bafaa90d65e26f460054cb65a089d31ecb0030e0f85c3f0ee595a0cce123691,2024-04-17T20:08:21.887000
|
||||
CVE-2024-3905,0,0,666ba6ab36ae43f19518f88ffcc3dc3578e7336eef9fa01b067c40b574dea570,2024-04-17T12:48:07.510000
|
||||
@ -246818,7 +246839,7 @@ CVE-2024-3929,0,0,31d0a734bfd88727a2a61deb7a29595ac9c8ac4a930ee35c31639990489d02
|
||||
CVE-2024-3931,0,0,adc8a79b07f48b35a9681a97a568e852ba1ef2cbd3b7271f585750c2d2c4216b,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3932,0,0,bce0f8b09e2fc4acc0cfce5940d57ce5f1e0384ac19f6c68ed218175688d8f12,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3948,0,0,427154a0226db385c08a1dc567a28e238ab290a5825189b73e5e958b25b296e5,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3962,0,1,597515e33fb0e44028b8f0ded20a04507910fbad0e7735b395ea3f5b8d38709e,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3962,0,0,597515e33fb0e44028b8f0ded20a04507910fbad0e7735b395ea3f5b8d38709e,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3979,0,0,9ef752ac5397ef4280bc4d9888fb417cb985331164bf90affafa759f391a2bfe,2024-04-19T18:29:53.040000
|
||||
CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000
|
||||
CVE-2024-3994,0,0,b2b5b0b0c4c4fea2326dd93e55a0fe437a44bb4fcb47799868e54f8400b49891,2024-04-25T13:18:02.660000
|
||||
@ -246834,8 +246855,8 @@ CVE-2024-4024,0,0,2513e42c9761fa628df45a7f36c826de0321b5337fc977a42e2a9577e9688f
|
||||
CVE-2024-4026,0,0,65bff2dba626fde0f88488c1e6df610a37e761e2e041855587a3bbcb3e849c23,2024-04-22T13:28:34.007000
|
||||
CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000
|
||||
CVE-2024-4035,0,0,c5a100809c68e4eb6a9b717e4eec2ebc0eca46983cf9d752b9f7c4bddb880732,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4040,0,0,a0c74dcbb8003f53cf76254ffa1dd71c6614e1d71772e98a05f6c7cb5372cc75,2024-04-26T01:00:01.587000
|
||||
CVE-2024-4056,0,1,4b1ef5924a2e3076d7458e43aa81bde7a7b6698d3083c08ec75e6474e5af7c92,2024-04-26T12:58:17.720000
|
||||
CVE-2024-4040,0,1,aaa64890b494cdcdee2557c76769096315107a08c599010f9c12f5edc2e86037,2024-04-26T15:25:47.270000
|
||||
CVE-2024-4056,0,0,4b1ef5924a2e3076d7458e43aa81bde7a7b6698d3083c08ec75e6474e5af7c92,2024-04-26T12:58:17.720000
|
||||
CVE-2024-4062,0,0,00e701b26925636f4b147891efd3607d8441f5743e72ff31df8ffeb1293615e9,2024-04-24T13:39:42.883000
|
||||
CVE-2024-4063,0,0,45ec0afed63b6cdcc64eb9b7f37753004f82dbe9793a74b35da8bcfe5ff1c982,2024-04-24T13:39:42.883000
|
||||
CVE-2024-4064,0,0,700737c89c3d95dc4345be318b6f65da5b04cbacf0da44f1e91682579e7a15b3,2024-04-24T13:39:42.883000
|
||||
@ -246870,7 +246891,7 @@ CVE-2024-4127,0,0,4364ebf3636399a6b862124e1d4818af14c41cdffb5c73435c8a8f0aa84db1
|
||||
CVE-2024-4141,0,0,cc9e710826c489d0ee22d4c7d9dd610e35e7eaed543a00c568b5470b560db2a2,2024-04-24T19:58:40.710000
|
||||
CVE-2024-4159,0,0,cf0daf8ecd317ce4288e8a4812364c59b3b10d10c0c5945533667d40be8a71fc,2024-04-25T23:15:47.087000
|
||||
CVE-2024-4161,0,0,8c35858b76cabcd8cf78ed758e4c9d58e5dffa2b20a32ec25b41a43a372b2218,2024-04-25T13:18:13.537000
|
||||
CVE-2024-4163,0,1,5596ce8b7fb75e05ba3115c3b4394f39b2d7267dce165452ab5e36d71e7bd76f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-4163,0,0,5596ce8b7fb75e05ba3115c3b4394f39b2d7267dce165452ab5e36d71e7bd76f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-4164,0,0,7b7ecf5ffdac8e07bc810bf656b6cf192bcaa27389ac9c35a4c16da54cd22ade,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4165,0,0,a68d30c2f16ca15cad9feb895c57b9da5fa63a2685b199108e4aaf56d8ac6f56,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4166,0,0,1d36f4647aa764fd2919ea2db750b25d40ec10634804f6daa695a02c9b64475c,2024-04-25T13:18:02.660000
|
||||
@ -246883,8 +246904,8 @@ CVE-2024-4172,0,0,74935923348139a33a5ec86dfba1caf328eac5abe35bcbc7775440df01ee84
|
||||
CVE-2024-4173,0,0,806a08191dc2b624e0ee02a7be11ce6c5ceee33617f7b3eb9464afb5420bb62b,2024-04-25T23:15:47.240000
|
||||
CVE-2024-4174,0,0,8165b92f84043201b67993ccc68eb94f9c51d9c6b32fc95aff490860d26962cf,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4175,0,0,17322bbbd4155ded1e9cb395a3c60d3f922650a6043102cb41ba3b81f581a395,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4182,0,1,34fa0a56fa7e84da670a5b9b9f6d7361bb4e5c759ac0936496d4b50cad52d799,2024-04-26T12:58:17.720000
|
||||
CVE-2024-4183,0,1,eb095bb2a7605255e8a8dc96da73a318d41383dcfc77f51141abcb99c5e23858,2024-04-26T12:58:17.720000
|
||||
CVE-2024-4195,0,1,9e1766e9cc7c084861e373f907f1af4c8e93d2e541b57b7a5442f1b9206736d6,2024-04-26T12:58:17.720000
|
||||
CVE-2024-4198,0,1,860198fc45e50b7d397afb1a381e3699f22b1ade3ab4eae804ccb5eb04f2917f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-4234,1,1,cc64e189eb17d4046d33d72e546078591e6b9aacf3640e914ba1536f751bd769,2024-04-26T13:15:48.540000
|
||||
CVE-2024-4182,0,0,34fa0a56fa7e84da670a5b9b9f6d7361bb4e5c759ac0936496d4b50cad52d799,2024-04-26T12:58:17.720000
|
||||
CVE-2024-4183,0,0,eb095bb2a7605255e8a8dc96da73a318d41383dcfc77f51141abcb99c5e23858,2024-04-26T12:58:17.720000
|
||||
CVE-2024-4195,0,0,9e1766e9cc7c084861e373f907f1af4c8e93d2e541b57b7a5442f1b9206736d6,2024-04-26T12:58:17.720000
|
||||
CVE-2024-4198,0,0,860198fc45e50b7d397afb1a381e3699f22b1ade3ab4eae804ccb5eb04f2917f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-4234,0,1,0a64019690b8e660b74462a78d6464b10b7f38338c77c87e06c656a7f082155f,2024-04-26T15:32:22.523000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user