Auto-Update: 2024-04-09T14:00:38.020013+00:00

This commit is contained in:
cad-safe-bot 2024-04-09 14:03:28 +00:00
parent 7c4143f56c
commit 468bd3b1e1
84 changed files with 622 additions and 249 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-28656",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-09T10:15:07.610",
"lastModified": "2024-04-09T10:15:07.610",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-3671",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-10-26T17:15:10.080",
"lastModified": "2024-04-04T17:15:08.060",
"vulnStatus": "Modified",
"lastModified": "2024-04-09T13:20:32.987",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -84,6 +84,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -123,19 +133,26 @@
},
{
"url": "https://vuldb.com/?ctiid.212014",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.212014",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.49576",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Technical Description",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47894",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-09T10:15:08.343",
"lastModified": "2024-04-09T10:15:08.343",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1082",
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-04-09T09:15:19.643",
"lastModified": "2024-04-09T09:15:19.643",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1083",
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-04-09T09:15:19.937",
"lastModified": "2024-04-09T09:15:19.937",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50821",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-04-09T09:15:21.270",
"lastModified": "2024-04-09T09:15:21.270",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-0082",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-04-08T22:15:07.993",
"lastModified": "2024-04-08T22:15:07.993",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "NVIDIA ChatRTX for Windows contains a vulnerability in the UI, where an attacker can cause improper privilege management by sending open file requests to the application. A successful exploit of this vulnerability might lead to local escalation of privileges, information disclosure, and data tampering"
},
{
"lang": "es",
"value": "NVIDIA ChatRTX para Windows contiene una vulnerabilidad en la interfaz de usuario, donde un atacante puede provocar una gesti\u00f3n inadecuada de privilegios al enviar solicitudes de apertura de archivos a la aplicaci\u00f3n. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda conducir a una escalada local de privilegios, divulgaci\u00f3n de informaci\u00f3n y manipulaci\u00f3n de datos."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-0083",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-04-08T22:15:08.203",
"lastModified": "2024-04-08T22:15:08.203",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "NVIDIA ChatRTX for Windows contains a vulnerability in the UI, where an attacker can cause a cross-site scripting error by network by running malicious scripts in users' browsers. A successful exploit of this vulnerability might lead to code execution, denial of service, and information disclosure."
},
{
"lang": "es",
"value": "NVIDIA ChatRTX para Windows contiene una vulnerabilidad en la interfaz de usuario, donde un atacante puede provocar un error de cross site scripting en la red al ejecutar scripts maliciosos en los navegadores de los usuarios. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo, denegaci\u00f3n de servicio y divulgaci\u00f3n de informaci\u00f3n."
}
],
"metrics": {

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1023",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-03-27T08:15:38.140",
"lastModified": "2024-04-04T16:15:08.140",
"lastModified": "2024-04-09T12:15:07.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -55,6 +55,10 @@
"url": "https://access.redhat.com/errata/RHSA-2024:1662",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1706",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-1023",
"source": "secalert@redhat.com"

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-1233",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-09T07:15:08.060",
"lastModified": "2024-04-09T07:15:08.060",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in` JwtValidator.resolvePublicKey` in JBoss EAP, where the validator checks jku and sends a HTTP request. During this process, no whitelisting or other filtering behavior is performed on the destination URL address, which may result in a server-side request forgery (SSRF) vulnerability."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una falla en `JwtValidator.resolvePublicKey` en JBoss EAP, donde el validador verifica jku y env\u00eda una solicitud HTTP. Durante este proceso, no se realiza ninguna lista blanca ni ning\u00fan otro comportamiento de filtrado en la direcci\u00f3n URL de destino, lo que puede provocar una vulnerabilidad Server-Side Request Forgery (SSRF)."
}
],
"metrics": {

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1300",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-02T08:15:53.993",
"lastModified": "2024-04-04T16:15:08.410",
"lastModified": "2024-04-09T12:15:07.853",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -55,6 +55,10 @@
"url": "https://access.redhat.com/errata/RHSA-2024:1662",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1706",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-1300",
"source": "secalert@redhat.com"

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-1664",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-04-09T05:15:47.703",
"lastModified": "2024-04-09T05:15:47.703",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Responsive Gallery Grid WordPress plugin before 2.3.11 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
},
{
"lang": "es",
"value": "El complemento Responsive Gallery Grid de WordPress anterior a 2.3.11 no sanitiza ni escapa algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de cross-site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en configuraci\u00f3n multisitio)."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-22949",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T23:15:07.647",
"lastModified": "2024-04-08T23:15:07.647",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "JFreeChart v1.5.4 was discovered to contain a NullPointerException via the component /chart/annotations/CategoryLineAnnotation."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que JFreeChart v1.5.4 conten\u00eda una excepci\u00f3n NullPointerException a trav\u00e9s del componente /chart/annotations/CategoryLineAnnotation."
}
],
"metrics": {},

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2223",
"sourceIdentifier": "cve-requests@bitdefender.com",
"published": "2024-04-09T13:15:33.057",
"lastModified": "2024-04-09T13:15:33.057",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An Incorrect Regular Expression vulnerability in Bitdefender GravityZone Update Server allows an attacker to cause a Server Side Request Forgery and reconfigure the relay. This issue affects the following products that include the vulnerable component:\u00a0\n\nBitdefender Endpoint Security for Linux version 7.0.5.200089\nBitdefender Endpoint Security for\u00a0 Windows version 7.9.9.380\nGravityZone Control Center (On Premises) version 6.36.1\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-requests@bitdefender.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-requests@bitdefender.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-185"
}
]
}
],
"references": [
{
"url": "https://www.bitdefender.com/support/security-advisories/incorrect-regular-expression-in-gravityzone-update-server-va-11465/",
"source": "cve-requests@bitdefender.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2224",
"sourceIdentifier": "cve-requests@bitdefender.com",
"published": "2024-04-09T13:15:33.357",
"lastModified": "2024-04-09T13:15:33.357",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory (\u2018Path Traversal\u2019) vulnerability in the UpdateServer component of Bitdefender GravityZone allows an attacker to execute arbitrary code on vulnerable instances. This issue affects the following products that include the vulnerable component: \n\nBitdefender Endpoint Security for Linux version 7.0.5.200089\nBitdefender Endpoint Security for Windows version 7.9.9.380\nGravityZone Control Center (On Premises) version 6.36.1\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-requests@bitdefender.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-requests@bitdefender.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://www.bitdefender.com/support/security-advisories/privilege-escalation-via-the-gravityzone-productmanager-updateserver-kitsmanager-api-va-11466/",
"source": "cve-requests@bitdefender.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23078",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T20:15:08.500",
"lastModified": "2024-04-08T20:15:08.500",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "JGraphT Core v1.5.2 was discovered to contain a NullPointerException via the component org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double)."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que JGraphT Core v1.5.2 conten\u00eda una NullPointerException a trav\u00e9s del componente org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double)."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23079",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T23:15:07.703",
"lastModified": "2024-04-08T23:15:07.703",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "JGraphT Core v1.5.2 was discovered to contain a NullPointerException via the component org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double)."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que JGraphT Core v1.5.2 conten\u00eda una NullPointerException a trav\u00e9s del componente org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double)."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23081",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T23:15:07.757",
"lastModified": "2024-04-08T23:15:07.757",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "ThreeTen Backport v1.6.8 was discovered to contain a NullPointerException via the component org.threeten.bp.LocalDate::compareTo(ChronoLocalDate)."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que ThreeTen Backport v1.6.8 conten\u00eda una excepci\u00f3n NullPointerException a trav\u00e9s del componente org.treeten.bp.LocalDate::compareTo(ChronoLocalDate)."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23084",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T23:15:07.803",
"lastModified": "2024-04-08T23:15:07.803",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Apfloat v1.10.1 was discovered to contain an ArrayIndexOutOfBoundsException via the component org.apfloat.internal.DoubleCRTMath::add(double[], double[])."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Apfloat v1.10.1 conten\u00eda una excepci\u00f3n ArrayIndexOutOfBoundsException a trav\u00e9s del componente org.apfloat.internal.DoubleCRTMath::add(double[], double[])."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23085",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T20:15:08.567",
"lastModified": "2024-04-08T20:15:08.567",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Apfloat v1.10.1 was discovered to contain a NullPointerException via the component org.apfloat.internal.DoubleScramble::scramble(double[], int, int[])."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Apfloat v1.10.1 conten\u00eda una NullPointerException a trav\u00e9s del componente org.apfloat.internal.DoubleScramble::scramble(double[], int, int[])."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23086",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T20:15:08.620",
"lastModified": "2024-04-08T20:15:08.620",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Apfloat v1.10.1 was discovered to contain a stack overflow via the component org.apfloat.internal.DoubleModMath::modPow(double."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Apfloat v1.10.1 contiene un desbordamiento de pila a trav\u00e9s del componente org.apfloat.internal.DoubleModMath::modPow(double."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23584",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-04-08T23:15:07.850",
"lastModified": "2024-04-08T23:15:07.850",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The NMAP Importer service\u200b may expose data store credentials to authorized users of the Windows Registry.\n"
"value": "The NMAP Importer service? may expose data store credentials to authorized users of the Windows Registry.\n"
},
{
"lang": "es",
"value": "El servicio NMAP Importer puede exponer las credenciales del almac\u00e9n de datos a usuarios autorizados del Registro de Windows."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-24279",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T20:15:08.673",
"lastModified": "2024-04-08T20:15:08.673",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue in secdiskapp 1.5.1 (management program for NewQ Fingerprint Encryption Super Speed Flash Disk) allows attackers to gain escalated privileges via vsVerifyPassword and vsSetFingerPrintPower functions."
},
{
"lang": "es",
"value": "Un problema en secdiskapp 1.5.1 (programa de administraci\u00f3n para NewQ Fingerprint Encryption Super Speed Flash Disk) permite a los atacantes obtener privilegios elevados a trav\u00e9s de las funciones vsVerifyPassword y vsSetFingerPrintPower."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-25646",
"sourceIdentifier": "cna@sap.com",
"published": "2024-04-09T01:15:48.343",
"lastModified": "2024-04-09T01:15:48.343",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Due to improper validation,\u00a0SAP BusinessObject Business Intelligence Launch Pad allows an authenticated attacker to access operating system information using crafted document. On successful exploitation there could be a considerable impact on confidentiality of the application.\n\n"
},
{
"lang": "es",
"value": "Debido a una validaci\u00f3n incorrecta, SAP BusinessObject Business Intelligence Launch Pad permite que un atacante autenticado acceda a informaci\u00f3n del sistema operativo mediante un documento manipulado. Una explotaci\u00f3n exitosa podr\u00eda tener un impacto considerable en la confidencialidad de la solicitud."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26275",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-04-09T09:15:24.260",
"lastModified": "2024-04-09T09:15:24.260",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26276",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-04-09T09:15:24.457",
"lastModified": "2024-04-09T09:15:24.457",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26277",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-04-09T09:15:24.670",
"lastModified": "2024-04-09T09:15:24.670",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-27630",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T21:15:09.983",
"lastModified": "2024-04-08T21:15:09.983",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Insecure Direct Object Reference (IDOR) in GNU Savane v.3.12 and before allows a remote attacker to delete arbitrary files via crafted input to the trackers_data_delete_file function."
},
{
"lang": "es",
"value": "La referencia directa a objetos inseguros (IDOR) en GNU Savane v.3.12 y anteriores permite a un atacante remoto eliminar archivos arbitrarios mediante una entrada manipulada en la funci\u00f3n trackers_data_delete_file."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-27631",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T21:15:10.067",
"lastModified": "2024-04-08T21:15:10.067",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Request Forgery vulnerability in GNU Savane v.3.12 and before allows a remote attacker to escalate privileges via siteadmin/usergroup.php"
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross Site Request Forgery en GNU Savane v.3.12 y anteriores permite a un atacante remoto escalar privilegios a trav\u00e9s de siteadmin/usergroup.php"
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-27632",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T22:15:08.413",
"lastModified": "2024-04-08T22:15:08.413",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue in GNU Savane v.3.12 and before allows a remote attacker to escalate privileges via the form_id in the form_header() function."
},
{
"lang": "es",
"value": "Un problema en GNU Savane v.3.12 y anteriores permite a un atacante remoto escalar privilegios a trav\u00e9s de form_id en la funci\u00f3n form_header()."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-27898",
"sourceIdentifier": "cna@sap.com",
"published": "2024-04-09T01:15:48.583",
"lastModified": "2024-04-09T01:15:48.583",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SAP NetWeaver application, due to insufficient input validation, allows an attacker to send a crafted request from a vulnerable web application targeting internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a\u00a0Server-Side Request Forgery vulnerability. Thus, having a low impact on confidentiality.\n\n"
},
{
"lang": "es",
"value": "La aplicaci\u00f3n SAP NetWeaver, debido a una validaci\u00f3n de entrada insuficiente, permite a un atacante enviar una solicitud manipulada desde una aplicaci\u00f3n web vulnerable dirigida a sistemas internos detr\u00e1s de firewalls que normalmente son inaccesibles para un atacante desde la red externa, lo que resulta en una vulnerabilidad Server-Side Request Forgery. Teniendo as\u00ed un bajo impacto en la confidencialidad."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-27899",
"sourceIdentifier": "cna@sap.com",
"published": "2024-04-09T01:15:48.777",
"lastModified": "2024-04-09T01:15:48.777",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Self-Registration\u00a0and Modify your own profile in User Admin Application of NetWeaver AS Java does not enforce proper security requirements for the content of the newly defined security answer. This can be leveraged by an attacker to cause profound impact on confidentiality and low impact on both integrity and availability.\n\n"
},
{
"lang": "es",
"value": "Self-Registration and Modify your own profile en User Admin Application de NetWeaver AS Java no exige requisitos de seguridad adecuados para el contenido de la respuesta de seguridad reci\u00e9n definida. Un atacante puede aprovechar esto para causar un profundo impacto en la confidencialidad y un bajo impacto tanto en la integridad como en la disponibilidad."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-27901",
"sourceIdentifier": "cna@sap.com",
"published": "2024-04-09T01:15:48.993",
"lastModified": "2024-04-09T01:15:48.993",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SAP Asset Accounting could allow a high privileged attacker to exploit insufficient validation of path information provided by the users and pass it through to the file API's. Thus, causing a considerable impact on confidentiality, integrity and availability of the application.\n\n"
},
{
"lang": "es",
"value": "SAP Asset Accounting podr\u00eda permitir que un atacante con altos privilegios aproveche la validaci\u00f3n insuficiente de la informaci\u00f3n de ruta proporcionada por los usuarios y la pase a las API de archivos. Provocando as\u00ed un impacto considerable en la confidencialidad, integridad y disponibilidad de la aplicaci\u00f3n."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-27983",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-04-09T01:15:49.197",
"lastModified": "2024-04-09T01:15:49.197",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client triggering the Http2Session destructor while header frames are still being processed (and stored in memory) causing a race condition."
},
{
"lang": "es",
"value": "Un atacante puede hacer que el servidor HTTP/2 de Node.js no est\u00e9 completamente disponible enviando una peque\u00f1a cantidad de paquetes de tramas HTTP/2 con algunas tramas HTTP/2 en su interior. Es posible dejar algunos datos en la memoria nghttp2 despu\u00e9s del reinicio cuando los encabezados con el frame de CONTINUATION HTTP/2 se env\u00edan al servidor y luego el cliente cierra abruptamente una conexi\u00f3n TCP activando el destructor Http2Session mientras los frames de encabezado a\u00fan se est\u00e1n procesando (y almacenando en la memoria) causando una condici\u00f3n de ejecuci\u00f3n."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-28167",
"sourceIdentifier": "cna@sap.com",
"published": "2024-04-09T01:15:49.380",
"lastModified": "2024-04-09T01:15:49.380",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SAP Group Reporting Data Collection\u00a0does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. On successful exploitation, specific data can be changed via the Enter Package Data app although the user does not have sufficient authorization causing high impact on Integrity of the appliction.\n\n"
},
{
"lang": "es",
"value": "SAP Group Reporting Data Collection no realiza las verificaciones de autorizaci\u00f3n necesarias para un usuario autenticado, lo que resulta en una escalada de privilegios. Tras una explotaci\u00f3n exitosa, se pueden cambiar datos espec\u00edficos a trav\u00e9s de la aplicaci\u00f3n Ingresar datos del paquete, aunque el usuario no tiene autorizaci\u00f3n suficiente, lo que causa un alto impacto en la integridad de la aplicaci\u00f3n."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-28224",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T19:15:07.353",
"lastModified": "2024-04-08T19:15:07.353",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Ollama before 0.1.29 has a DNS rebinding vulnerability that can inadvertently allow remote access to the full API, thereby letting an unauthorized user chat with a large language model, delete a model, or cause a denial of service (resource exhaustion)."
},
{
"lang": "es",
"value": "Ollama anterior a 0.1.29 tiene una vulnerabilidad de vinculaci\u00f3n de DNS que puede permitir inadvertidamente el acceso remoto a la API completa, permitiendo as\u00ed que un usuario no autorizado converse con un modelo de lenguaje grande, elimine un modelo o provoque una denegaci\u00f3n de servicio (agotamiento de recursos)."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-28270",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T19:15:07.417",
"lastModified": "2024-04-08T19:15:07.417",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue discovered in web-flash v3.0 allows attackers to reset passwords for arbitrary users via crafted POST request to /prod-api/user/resetPassword."
},
{
"lang": "es",
"value": "Un problema descubierto en web-flash v3.0 permite a los atacantes restablecer contrase\u00f1as para usuarios arbitrarios mediante una solicitud POST manipulada /prod-api/user/resetPassword."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-2975",
"sourceIdentifier": "security@octopus.com",
"published": "2024-04-09T01:15:49.583",
"lastModified": "2024-04-09T01:15:49.583",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A race condition was identified through which privilege escalation was possible in certain configurations."
},
{
"lang": "es",
"value": "Se identific\u00f3 una condici\u00f3n de ejecuci\u00f3n a trav\u00e9s de la cual era posible la escalada de privilegios en ciertas configuraciones."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30189",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-04-09T09:15:24.873",
"lastModified": "2024-04-09T09:15:24.873",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30190",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-04-09T09:15:25.117",
"lastModified": "2024-04-09T09:15:25.117",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30191",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-04-09T09:15:25.317",
"lastModified": "2024-04-09T09:15:25.317",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30214",
"sourceIdentifier": "cna@sap.com",
"published": "2024-04-09T01:15:49.750",
"lastModified": "2024-04-09T01:15:49.750",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The application allows a high privilege attacker to append a malicious GET query parameter to Service invocations, which are reflected in the server response. Under certain circumstances, if the parameter contains a JavaScript, the script could be processed on client side.\n\n"
},
{
"lang": "es",
"value": "La aplicaci\u00f3n permite que un atacante con privilegios elevados agregue un par\u00e1metro de consulta GET malicioso a las invocaciones del Servicio, que se reflejan en la respuesta del servidor. En determinadas circunstancias, si el par\u00e1metro contiene JavaScript, el script podr\u00eda procesarse en el lado del cliente."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30215",
"sourceIdentifier": "cna@sap.com",
"published": "2024-04-09T01:15:49.953",
"lastModified": "2024-04-09T01:15:49.953",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Resource Settings page allows a high privilege attacker to load exploitable payload to be stored and reflected whenever a User visits the page. In a successful attack, some information could be obtained and/or modified. However,\u00a0the attacker does not have control over what information is obtained, or the amount or kind of loss is limited.\n\n"
},
{
"lang": "es",
"value": "La p\u00e1gina Resource Settings permite a un atacante con altos privilegios cargar un payload explotable para almacenarlo y reflejarlo cada vez que un usuario visita la p\u00e1gina. En un ataque exitoso, se podr\u00eda obtener y/o modificar cierta informaci\u00f3n. Sin embargo, el atacante no tiene control sobre qu\u00e9 informaci\u00f3n obtiene, o la cantidad o tipo de p\u00e9rdida es limitada."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30216",
"sourceIdentifier": "cna@sap.com",
"published": "2024-04-09T01:15:50.140",
"lastModified": "2024-04-09T01:15:50.140",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cash Management in SAP S/4 HANA does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. By\u00a0exploiting this vulnerability, attacker can add notes in the review request with 'completed' status affecting the integrity of the application.\u00a0Confidentiality and Availability are not impacted.\n\n"
},
{
"lang": "es",
"value": "Cash Management en SAP S/4 HANA no realiza las verificaciones de autorizaci\u00f3n necesarias para un usuario autenticado, lo que resulta en una escalada de privilegios. Al explotar esta vulnerabilidad, el atacante puede agregar notas en la solicitud de revisi\u00f3n con el estado \"completado\" que afecta la integridad de la aplicaci\u00f3n. La confidencialidad y la disponibilidad no se ven afectadas."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30217",
"sourceIdentifier": "cna@sap.com",
"published": "2024-04-09T01:15:50.353",
"lastModified": "2024-04-09T01:15:50.353",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cash Management in SAP S/4 HANA does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. By exploiting this vulnerability, an attacker can approve or reject a bank account application affecting the integrity of the application. Confidentiality and Availability are not impacted.\n\n"
},
{
"lang": "es",
"value": "Cash Management en SAP S/4 HANA no realiza las verificaciones de autorizaci\u00f3n necesarias para un usuario autenticado, lo que resulta en una escalada de privilegios. Al explotar esta vulnerabilidad, un atacante puede aprobar o rechazar una solicitud de cuenta bancaria afectando la integridad de la aplicaci\u00f3n. La confidencialidad y la disponibilidad no se ven afectadas."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30218",
"sourceIdentifier": "cna@sap.com",
"published": "2024-04-09T01:15:50.570",
"lastModified": "2024-04-09T01:15:50.570",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The ABAP Application Server of SAP NetWeaver as well as ABAP Platform\u00a0allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service. This leads to a considerable impact on availability.\n\n"
},
{
"lang": "es",
"value": "El servidor de aplicaciones ABAP de SAP NetWeaver, as\u00ed como la plataforma ABAP, permiten a un atacante impedir que usuarios leg\u00edtimos accedan a un servicio, ya sea bloqueando o inundando el servicio. Esto tiene un impacto considerable en la disponibilidad."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30676",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T03:15:07.763",
"lastModified": "2024-04-09T03:15:07.763",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A Denial-of-Service (DoS) vulnerability exists in ROS2 Iron Irwini versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. A malicious user could potentially exploit this vulnerability remotely to crash the ROS2 nodes, thereby causing a denial of service. The flaw allows an attacker to cause unexpected behavior in the operation of ROS2 nodes, which leads to their failure and interrupts the regular operation of the system, thus making it unavailable for its intended users."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en las versiones de ROS2 Iron Irwini donde ROS_VERSION es 2 y ROS_PYTHON_VERSION es 3. Un usuario malintencionado podr\u00eda explotar esta vulnerabilidad de forma remota para bloquear los nodos ROS2, provocando as\u00ed una denegaci\u00f3n de servicio. La falla permite a un atacante provocar un comportamiento inesperado en el funcionamiento de los nodos ROS2, lo que provoca su falla e interrumpe el funcionamiento normal del sistema, haci\u00e9ndolo no disponible para los usuarios previstos."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30678",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T03:15:07.830",
"lastModified": "2024-04-09T03:15:07.830",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue has been discovered in ROS2 Iron Irwini ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to intercept and access this data."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, donde el sistema transmite mensajes en texto plano. Esta falla expone informaci\u00f3n confidencial, haci\u00e9ndola vulnerable a ataques de intermediario (MitM) y permitiendo a los atacantes interceptar y acceder a estos datos."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30679",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T04:15:10.087",
"lastModified": "2024-04-09T04:15:10.087",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the default configurations of ROS2 Iron Irwini ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to authenticate using default credentials."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en las configuraciones predeterminadas de ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes no autenticados autenticarse utilizando credenciales predeterminadas."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30680",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T04:15:10.583",
"lastModified": "2024-04-09T04:15:10.583",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Iron Irwini in versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs."
},
{
"lang": "es",
"value": "La vulnerabilidad de inyecci\u00f3n de Shell fue descubierta en ROS2 (Robot Operating System 2) Iron Irwini en las versiones ROS_VERSION 2 y ROS_PYTHON_VERSION 3, permite a los atacantes ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial debido a la forma en que ROS2 maneja la ejecuci\u00f3n de comandos de Shell en componentes como int\u00e9rpretes de comandos o interfaces que procesan entradas externas."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30681",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T04:15:10.747",
"lastModified": "2024-04-09T04:15:10.747",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability has been discovered in ROS2 Iron Irwini version ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the command processing or system call components in ROS2."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en ROS2 Iron Irwini versi\u00f3n ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s del procesamiento de comandos o componentes de llamadas al sistema en ROS2."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30683",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T04:15:10.877",
"lastModified": "2024-04-09T04:15:10.877",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via improper handling of arrays or strings."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad de desbordamiento de b\u00fafer en los componentes C++ de ROS2 Iron Irwini versiones ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante el manejo inadecuado de matrices o cadenas."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30684",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T05:15:47.807",
"lastModified": "2024-04-09T05:15:47.807",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An insecure logging vulnerability has been identified within ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to access sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de registro inseguro en las versiones ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes acceder a informaci\u00f3n confidencial a trav\u00e9s de medidas de seguridad inadecuadas implementadas dentro de los mecanismos de registro de ROS2."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30686",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T05:15:47.853",
"lastModified": "2024-04-09T05:15:47.853",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en las versiones ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes o nodos dentro del sistema ROS2."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30687",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T05:15:47.920",
"lastModified": "2024-04-09T05:15:47.920",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An insecure deserialization vulnerability has been identified in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de deserializaci\u00f3n insegura en las versiones ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de una entrada manipulada para los componentes de serializaci\u00f3n y deserializaci\u00f3n de datos, los mecanismos de comunicaci\u00f3n entre procesos y las interfaces de comunicaci\u00f3n de red."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30688",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T05:15:47.980",
"lastModified": "2024-04-09T05:15:47.980",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad de carga de archivos arbitraria en las versiones ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para el mecanismo de carga de archivos del sistema ROS2, incluida la funcionalidad del servidor para manejar la carga de archivos y los procesos de validaci\u00f3n asociados."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30690",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T06:15:08.963",
"lastModified": "2024-04-09T06:15:08.963",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An unauthorized node injection vulnerability has been identified in ROS2 Galactic Geochelone versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to escalate privileges."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de inyecci\u00f3n de nodo no autorizada en las versiones ROS2 Galactic Geochelone donde ROS_VERSION es 2 y ROS_PYTHON_VERSION es 3, lo que permite a atacantes remotos escalar privilegios."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30691",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T07:15:08.467",
"lastModified": "2024-04-09T07:15:08.467",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 Galactic Geochelone in version ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS2 nodes."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ROS2 Galactic Geochelone en la versi\u00f3n ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios, obtener informaci\u00f3n confidencial y obtener acceso no autorizado a m\u00faltiples nodos ROS2."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30692",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T07:15:08.560",
"lastModified": "2024-04-09T07:15:08.560",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A issue was discovered in ROS2 Galactic Geochelone versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) in the ROS2 nodes."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en las versiones ROS2 Galactic Geochelone ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (DoS) en los nodos ROS2."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30694",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.420",
"lastModified": "2024-04-09T08:15:07.420",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30695",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.530",
"lastModified": "2024-04-09T08:15:07.530",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30696",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.587",
"lastModified": "2024-04-09T08:15:07.587",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30697",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.663",
"lastModified": "2024-04-09T08:15:07.663",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30699",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.717",
"lastModified": "2024-04-09T08:15:07.717",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30701",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.770",
"lastModified": "2024-04-09T08:15:07.770",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3046",
"sourceIdentifier": "emo@eclipse.org",
"published": "2024-04-09T10:15:08.600",
"lastModified": "2024-04-09T10:15:08.600",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-31047",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T23:15:08.023",
"lastModified": "2024-04-08T23:15:08.023",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue in Academy Software Foundation openexr v.3.2.3 and before allows a local attacker to cause a denial of service (DoS) via the convert function of exrmultipart.cpp."
},
{
"lang": "es",
"value": "Un problema en Academy Software Foundation openexr v.3.2.3 y anteriores permite que un atacante local provoque una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de la funci\u00f3n de conversi\u00f3n de exrmultipart.cpp."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31365",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-09T08:15:07.827",
"lastModified": "2024-04-09T08:15:07.827",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31366",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-09T08:15:08.090",
"lastModified": "2024-04-09T08:15:08.090",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31367",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-09T09:15:25.520",
"lastModified": "2024-04-09T09:15:25.520",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31368",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-09T09:15:25.710",
"lastModified": "2024-04-09T09:15:25.710",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31369",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-09T09:15:25.907",
"lastModified": "2024-04-09T09:15:25.907",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31370",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-09T09:15:26.100",
"lastModified": "2024-04-09T09:15:26.100",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-31544",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T13:15:33.557",
"lastModified": "2024-04-09T13:15:33.557",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in Computer Laboratory Management System v1.0 allows attackers to execute arbitrary JavaScript code by including malicious payloads into \u201cremarks\u201d, \u201cborrower_name\u201d, \u201cfaculty_department\u201d parameters in /classes/Master.php?f=save_record."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/emirhanmtl/vuln-research/blob/main/Stored-XSS-Computer-Laboratory-Management-System-PoC.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31860",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-09T09:15:26.293",
"lastModified": "2024-04-09T09:15:26.293",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31862",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-09T10:15:08.513",
"lastModified": "2024-04-09T10:15:08.513",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31863",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-09T11:15:31.713",
"lastModified": "2024-04-09T11:15:31.713",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31978",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-04-09T09:15:26.387",
"lastModified": "2024-04-09T09:15:26.387",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-3463",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-08T20:15:08.723",
"lastModified": "2024-04-08T20:15:08.723",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in SourceCodester Laundry Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /karyawan/edit. The manipulation of the argument karyawan leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259744."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en SourceCodester Laundry Management System 1.0 y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo /karyawan/edit. La manipulaci\u00f3n del argumento karyawan conduce a cross site scripting. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-259744."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-3464",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-08T20:15:08.990",
"lastModified": "2024-04-08T20:15:08.990",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Laundry Management System 1.0 and classified as critical. This issue affects the function laporan_filter of the file /application/controller/Pelanggan.php. The manipulation of the argument jeniskelamin leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259745 was assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en SourceCodester Laundry Management System 1.0 y clasificada como cr\u00edtica. Este problema afecta la funci\u00f3n laporan_filter del archivo /application/controller/Pelanggan.php. La manipulaci\u00f3n del argumento jeniskelamin conduce a la inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-259745."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-3465",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-08T21:15:10.163",
"lastModified": "2024-04-08T21:15:10.163",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Laundry Management System 1.0. It has been classified as critical. Affected is the function laporan_filter of the file /application/controller/Transaki.php. The manipulation of the argument dari/sampai leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-259746 is the identifier assigned to this vulnerability."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Laundry Management System 1.0. Ha sido declarada cr\u00edtica. La funci\u00f3n laporan_filter del archivo /application/controller/Pengeluaran.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento dari/sampai conduce a la inyecci\u00f3n de SQL. El identificador asociado de esta vulnerabilidad es VDB-259747."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-3466",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-08T21:15:10.587",
"lastModified": "2024-04-08T21:15:10.587",
"vulnStatus": "Received",
"lastModified": "2024-04-09T12:48:04.090",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Laundry Management System 1.0. It has been declared as critical. Affected by this vulnerability is the function laporan_filter of the file /application/controller/Pengeluaran.php. The manipulation of the argument dari/sampai leads to sql injection. The associated identifier of this vulnerability is VDB-259747."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Laundry Management System 1.0. Ha sido declarada cr\u00edtica. La funci\u00f3n laporan_filter del archivo /application/controller/Pengeluaran.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento dari/sampai conduce a la inyecci\u00f3n de SQL. El identificador asociado de esta vulnerabilidad es VDB-259747."
}
],
"metrics": {

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-09T12:00:30.567954+00:00
2024-04-09T14:00:38.020013+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-09T11:15:31.713000+00:00
2024-04-09T13:20:32.987000+00:00
```
### Last Data Feed Release
@ -33,24 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
244545
244548
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `3`
- [CVE-2021-28656](CVE-2021/CVE-2021-286xx/CVE-2021-28656.json) (`2024-04-09T10:15:07.610`)
- [CVE-2022-47894](CVE-2022/CVE-2022-478xx/CVE-2022-47894.json) (`2024-04-09T10:15:08.343`)
- [CVE-2024-3046](CVE-2024/CVE-2024-30xx/CVE-2024-3046.json) (`2024-04-09T10:15:08.600`)
- [CVE-2024-31862](CVE-2024/CVE-2024-318xx/CVE-2024-31862.json) (`2024-04-09T10:15:08.513`)
- [CVE-2024-31863](CVE-2024/CVE-2024-318xx/CVE-2024-31863.json) (`2024-04-09T11:15:31.713`)
- [CVE-2024-2223](CVE-2024/CVE-2024-22xx/CVE-2024-2223.json) (`2024-04-09T13:15:33.057`)
- [CVE-2024-2224](CVE-2024/CVE-2024-22xx/CVE-2024-2224.json) (`2024-04-09T13:15:33.357`)
- [CVE-2024-31544](CVE-2024/CVE-2024-315xx/CVE-2024-31544.json) (`2024-04-09T13:15:33.557`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `79`
- [CVE-2024-30688](CVE-2024/CVE-2024-306xx/CVE-2024-30688.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-30690](CVE-2024/CVE-2024-306xx/CVE-2024-30690.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-30691](CVE-2024/CVE-2024-306xx/CVE-2024-30691.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-30692](CVE-2024/CVE-2024-306xx/CVE-2024-30692.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-30694](CVE-2024/CVE-2024-306xx/CVE-2024-30694.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-30695](CVE-2024/CVE-2024-306xx/CVE-2024-30695.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-30696](CVE-2024/CVE-2024-306xx/CVE-2024-30696.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-30697](CVE-2024/CVE-2024-306xx/CVE-2024-30697.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-30699](CVE-2024/CVE-2024-306xx/CVE-2024-30699.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-30701](CVE-2024/CVE-2024-307xx/CVE-2024-30701.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-31047](CVE-2024/CVE-2024-310xx/CVE-2024-31047.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-31365](CVE-2024/CVE-2024-313xx/CVE-2024-31365.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-31366](CVE-2024/CVE-2024-313xx/CVE-2024-31366.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-31367](CVE-2024/CVE-2024-313xx/CVE-2024-31367.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-31368](CVE-2024/CVE-2024-313xx/CVE-2024-31368.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-31369](CVE-2024/CVE-2024-313xx/CVE-2024-31369.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-31370](CVE-2024/CVE-2024-313xx/CVE-2024-31370.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-31860](CVE-2024/CVE-2024-318xx/CVE-2024-31860.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-31862](CVE-2024/CVE-2024-318xx/CVE-2024-31862.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-31863](CVE-2024/CVE-2024-318xx/CVE-2024-31863.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-31978](CVE-2024/CVE-2024-319xx/CVE-2024-31978.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-3463](CVE-2024/CVE-2024-34xx/CVE-2024-3463.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-3464](CVE-2024/CVE-2024-34xx/CVE-2024-3464.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-3465](CVE-2024/CVE-2024-34xx/CVE-2024-3465.json) (`2024-04-09T12:48:04.090`)
- [CVE-2024-3466](CVE-2024/CVE-2024-34xx/CVE-2024-3466.json) (`2024-04-09T12:48:04.090`)
## Download and Usage

View File

@ -173244,7 +173244,7 @@ CVE-2021-28651,0,0,f93d5b14e9edfd0c7d6c1f20d832040462fce8e41449e94e4223abf4af0c4
CVE-2021-28652,0,0,3de577cd8b68362d13504ea8b7b94932e7446acae8c4f0c9b8ac01de5be255b4,2023-11-07T03:32:17.730000
CVE-2021-28653,0,0,bd516222c2739e55d76b929804ff1b5fe32a605eae16ed548f9480526e7a6107,2021-08-27T14:55:11.860000
CVE-2021-28655,0,0,f05025022982248c0aa0286bf9f5ea6d2b2662f6d8f66cb2a7c1478371d0b50e,2023-11-07T03:32:17.810000
CVE-2021-28656,1,1,3998ee35a42c8f382056cbf4f173e6ecbd2d2c79955efb97a5daedf4e01fbc4f,2024-04-09T10:15:07.610000
CVE-2021-28656,0,1,71da341e943fcbb2ca65abbeda1e2289896bc83652315b75220769e42c306657,2024-04-09T12:48:04.090000
CVE-2021-28657,0,0,edc846f7622359305d96151fb90be8e69037698b5a7084b0ba6857b492a35ec1,2023-11-07T03:32:17.897000
CVE-2021-28658,0,0,fd380e2c26dc7e10eb20d77575a858579041b141f61b8815462af50a61528fd0,2023-11-07T03:32:17.980000
CVE-2021-28660,0,0,3b585e9f34be9d91329d52a640684f2db5b2db983300a3c817e973f466e64e5e,2023-11-09T14:44:33.733000
@ -202890,7 +202890,7 @@ CVE-2022-36706,0,0,de7477060184c6cff9abe4772c0125bf31cfc87765eb99a20d7df4da001db
CVE-2022-36707,0,0,d3eb38d1feaf5dba4f0def739432283a3e2176588db034b2fcc0b995be314951,2023-11-07T03:49:40.277000
CVE-2022-36708,0,0,0ee8d1842750906a7976bf36ebb5bd60789abcd5e1b5240c681d954257433011,2022-09-01T13:18:10.467000
CVE-2022-36709,0,0,92fae72d3c833ddad9e9b7b60e9d4567e2afabc9b49dc9cd4f9748d67689c823,2022-09-01T06:50:41.003000
CVE-2022-3671,0,0,1097dd73c4003e062a451bb08ad24b3944b5e839cd248e6b956b42ebbe490de4,2024-04-04T17:15:08.060000
CVE-2022-3671,0,1,0e606a113cf0ddcfcfe175a68f5d875f8e162baaacd109c3b2794313d558e016,2024-04-09T13:20:32.987000
CVE-2022-36711,0,0,dd666c7309d4fb74ddbff83da0478e38903c8c81d015eb898fcb8c722302f377,2022-09-01T06:51:02.083000
CVE-2022-36712,0,0,f6ae50d102134447658290fabc690f8f9247c2bcae392cb109bce6cf6729ba9f,2022-09-01T06:54:01.957000
CVE-2022-36713,0,0,08280a195165695be47d2e8fbcf5379d9ea71cedafc4633a72176ddeec410351,2022-09-01T06:58:32.880000
@ -210921,7 +210921,7 @@ CVE-2022-4789,0,0,f1d77b16a882c065a994d407ae15e8654000fcc23c0521f9bc89bbdc88d3ea
CVE-2022-47891,0,0,6dedff18f34cc77291973ebe182b94d8c421b8c96c9ef4b91fe9f7e1c80b5399,2023-10-04T19:57:52.210000
CVE-2022-47892,0,0,014317681f4f5fd875b23ba58c6a9232c2ca925a78d6a53582cee8dc82bbb4ee,2023-10-04T19:57:39.830000
CVE-2022-47893,0,0,f4592b6a6c8fa73a0d0605e5be420354e5d9826474eb8090f0d7000aea6904f0,2023-10-04T19:57:30.303000
CVE-2022-47894,1,1,593c201c592bb8bfc6cba8d413a478be24c5a715960f8d0740bdbdbe07cf6bd3,2024-04-09T10:15:08.343000
CVE-2022-47894,0,1,e401d392b583da5e9b36ee551251ee1b3066ca7e899def4f14ac5436e3453044,2024-04-09T12:48:04.090000
CVE-2022-47895,0,0,4d2831ee9ad8f11acf52954a3507339b6bec3debec24ea17f62d0a6b882a629c,2022-12-29T16:26:24.367000
CVE-2022-47896,0,0,d4993944299a87a0e4bc5169c26adbdcc624a2649cd920d6690b1830154087bc,2022-12-29T17:28:18.063000
CVE-2022-4790,0,0,832b4d6df8a6dff865d108a14c28fb7677a8ffbd0bdcde0190157e99b5fef6c2,2023-11-07T03:58:56.803000
@ -212557,8 +212557,8 @@ CVE-2023-1078,0,0,511609a0c59908bbbfd669b928235b7512f041dd9bdda4f9d4aa59bc0de4fc
CVE-2023-1079,0,0,c957625d6e93673583754b046286151c3cd5fbd016a01d7a69f7d70a7c63b668,2023-05-03T14:15:21.417000
CVE-2023-1080,0,0,70bd3fc2fb1692dcf2fc26cf04bb9990210d8f3f5ec66f4981136378db9d3554,2023-11-07T04:02:27.867000
CVE-2023-1081,0,0,b273c9bef457fc15606daa02d3a072ec86e12d529c1024b5a0af4c11f428d418,2023-03-04T02:06:16.360000
CVE-2023-1082,0,0,bacbdaede1f7d1854710c69a85c220f9a9520fa08806af5806104705d9d79b69,2024-04-09T09:15:19.643000
CVE-2023-1083,0,0,ef22926887513db591d148973a6d60b2400d46ac1befd0a9cf1528d2b9aa0fce,2024-04-09T09:15:19.937000
CVE-2023-1082,0,1,4345b71e2a00dccdd5682dbfac02460b2f62fd61aeda4f4e0a0937488d0f2bec,2024-04-09T12:48:04.090000
CVE-2023-1083,0,1,9985565f9697f9654ec7713992afab1f5ac57e1c5ff8666d0e7287e85f87752f,2024-04-09T12:48:04.090000
CVE-2023-1084,0,0,3054e5242d362a68ea08e022b551d34084860b4abaaaa0f45ac4db023b69c389,2023-03-15T14:27:48.850000
CVE-2023-1086,0,0,702b24e8f7e0089ff9dc60e6d96d9d1b0b33917c9db0a213d103833ec4288284,2023-11-07T04:02:28.057000
CVE-2023-1087,0,0,b90e3b61ee499a3d5cc3c6de6c9f228b5f24fb833cd07f821e23e0c192544906,2023-11-07T04:02:28.193000
@ -235272,7 +235272,7 @@ CVE-2023-50808,0,0,8c416c054c26be865b4d8688f52c713fbfd724e8770c5464ef0c943565a6d
CVE-2023-5081,0,0,8e24ba17156a8dae7a7282a8cfaf28621f0db12df779ff326aab5dfe7d321c92,2024-01-26T16:02:59.793000
CVE-2023-50811,0,0,e11d12fe06d3263d13bd34dc62f9ff2fc3ab15ee416948ff7751555ca8a7212c,2024-03-20T13:00:16.367000
CVE-2023-5082,0,0,97172c8fbce61eac9fc72656ad386d4e72feed6ef36293b815eddf08e7cd3cf2,2023-11-14T15:33:18.273000
CVE-2023-50821,0,0,ce9a5490e4bd92a4e5735140944ea2fae179ab96eb9556eadc633d2300cec72e,2024-04-09T09:15:21.270000
CVE-2023-50821,0,1,44b671c824ee87794c64134a5584c1475710f239b2544f75ec4c23279577ebf1,2024-04-09T12:48:04.090000
CVE-2023-50822,0,0,8ee2c68da13959d83e13d29c60b1ba2257ab3db8a3826fb5c84c7b87338d1212,2024-01-02T20:54:13.893000
CVE-2023-50823,0,0,40af9a64fda216779fc94da775602fd54727f3bbddbba35015eaf0f9183e1c11,2023-12-29T04:10:31.830000
CVE-2023-50824,0,0,58a5beaa87c24d14af04b4cb9f3a0b2aa77e314a67ef35efeda046b2604b58de,2023-12-29T04:10:48.907000
@ -238147,8 +238147,8 @@ CVE-2024-0078,0,0,65ef1b62c09f229e677e8506d114a0ad3f4b855306a2baa770a721ed0ba97b
CVE-2024-0079,0,0,a48198aa8d1b8e21233ccb1563194a0dce57e3cb1ac8f4c28d49144e25d1a534,2024-03-28T02:01:13.303000
CVE-2024-0080,0,0,6c0d206dd91620b9eed7dc804b37cabf92e6b94b99ac768289c8d5abe0e718c9,2024-04-08T18:49:25.863000
CVE-2024-0081,0,0,7224cfd553042ae01e2abfd02f661fee4ab9e15edf612773f3a2b6523001079f,2024-04-08T18:49:25.863000
CVE-2024-0082,0,0,ae991367e08225121157180c24a5fdbb166425d7192b60b9395f4a4f24a46bf6,2024-04-08T22:15:07.993000
CVE-2024-0083,0,0,53d00967f7407453d60abb433b5aefae44d594b137a7afac7fbffae58a630f23,2024-04-08T22:15:08.203000
CVE-2024-0082,0,1,2f8bf036b6ccf9a376740e76b27024fe830e6e0ae585ea5b083515d36ff830e7,2024-04-09T12:48:04.090000
CVE-2024-0083,0,1,ab832b2e89667613797d661d736b6cac31cc3f4854c5fe470b78e46bd7a9f856,2024-04-09T12:48:04.090000
CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf73,2024-03-13T18:15:58.530000
CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000
CVE-2024-0156,0,0,47a5ee4f12284e0f109441891942aa0eb589b2387e172b6366b6741bcabc51b4,2024-03-04T13:58:23.447000
@ -238874,7 +238874,7 @@ CVE-2024-1019,0,0,27c6fed97db80e9684966512d657c2ae1b8d86be0f46f2f894fd714e51d0d5
CVE-2024-1020,0,0,4c2c67d1272a1241939200f4f72c9a4b440d9da781cef4eac80461cd259df11b,2024-03-21T02:51:32.967000
CVE-2024-1021,0,0,1eaf33062f30028d852272789fbe1f3c95b6597cfa3d193da2a9c2b146b71925,2024-03-21T02:51:33.050000
CVE-2024-1022,0,0,bf7c09b8fcc7f97c5a24a4c708297fbca74621e9fdb442e444ef6e47ad6eb0de,2024-03-21T02:51:33.147000
CVE-2024-1023,0,0,9ee92eacbb88b3a332d00d2f435c33ab1fd5765d942fefa4d1a8192f971c38ba,2024-04-04T16:15:08.140000
CVE-2024-1023,0,1,68bde2f3580eb45ab5d6f3ebb52c2d06f8d25be5075193a68e136d0ef3abff5b,2024-04-09T12:15:07.627000
CVE-2024-1024,0,0,7e6c1b50133d41206c0ea240e83269bb1fd6bdba3336e6ba3bdaf2e921f883f4,2024-03-21T02:51:33.253000
CVE-2024-1026,0,0,fa3a6e8906b5c145d772b6778f9660482bd1e1779e8012ee6ee53f0f577f7493,2024-03-21T02:51:33.340000
CVE-2024-1027,0,0,3c9d16741461ee6b8dbdb696da6c985fd26dd1ea5f6d61c74f8e0497827db059,2024-03-21T02:51:33.427000
@ -239045,7 +239045,7 @@ CVE-2024-1226,0,0,14a580d4b3eab4674d6ae40acd0cb53f118cafa2e8004e611e071913cd041f
CVE-2024-1227,0,0,94dce1bd607b6903e23d54a7d6b05a85e9dc37b645ba64935d33bd38f11890aa,2024-03-12T16:02:33.900000
CVE-2024-1231,0,0,3fff2a2694f3a2890eda32488c438fe0ab80785883b0aefb67199c2eabc0d967,2024-03-25T13:47:14.087000
CVE-2024-1232,0,0,81ffaff2fe8cf56a0d46a46e2b9143fea880c36e9a04adedcc45af5366b69d08,2024-03-25T13:47:14.087000
CVE-2024-1233,0,0,66e9943f5b5e13d3ef1ae4141f8c5704521c004fb541b327a415bfaeb3b7fc3a,2024-04-09T07:15:08.060000
CVE-2024-1233,0,1,71578d7fb30bc4f85d145f45b8ac30dca6f7b0255a469b5ec97436fd2fcdf196,2024-04-09T12:48:04.090000
CVE-2024-1234,0,0,10bf76d85736c4b378a9976629da6145bfb7982a9ab0c7c6ab2d12ef2ec14081,2024-03-13T18:16:18.563000
CVE-2024-1235,0,0,d2a82644fe0f13d7f102d5a1aae3143ef6375c6fdad53b56b8e4ac09c1d55fdb,2024-02-29T13:49:29.390000
CVE-2024-1236,0,0,88f351cdece6c13383e2ef64090741dd27c149d6d5fc4eae9681e06c5b4747c4,2024-02-29T13:49:29.390000
@ -239095,7 +239095,7 @@ CVE-2024-1294,0,0,1a6fde55ee17952393d258a28e1938bfe41cafec05fa305cc82057814b7c2b
CVE-2024-1296,0,0,ab648d9dba58ca530bb990b50d92c4f5ce9f591faa8fbeeb49385095b8425c33,2024-03-13T18:16:18.563000
CVE-2024-1297,0,0,1fc219bb038ab422185a999365115aff94759fe3e5ff94e3dc4180f1d6bc82d0,2024-02-20T19:50:53.960000
CVE-2024-1299,0,0,165a6e5bf7396c9871edb84a6ce28d3386b33fd34eb9238065e890fa150a178a,2024-03-07T13:52:27.110000
CVE-2024-1300,0,0,719eaee7c93c572fb19b10a479f15b73430ece34c0a0712bc6a25cc9815e6c2b,2024-04-04T16:15:08.410000
CVE-2024-1300,0,1,c053226189aff0bb246575256884750e37eeb25be7ab97ceb9ee36674f7e9ade,2024-04-09T12:15:07.853000
CVE-2024-1301,0,0,68d5e322fab21220735382791ea9287e8104e954fa5bc7b1f8f02021f25e280b,2024-03-12T17:46:17.273000
CVE-2024-1302,0,0,e42b35f7a02693024fada8fec8e812444e0bb721c54c537bf6c1b8db8c60ce66,2024-03-12T17:46:17.273000
CVE-2024-1303,0,0,d6386ac67e1b3bd9c657849a1747229ab86034b9c989d20fb5cde0be8bba0359,2024-03-12T17:46:17.273000
@ -239332,7 +239332,7 @@ CVE-2024-1653,0,0,875a0ad46333e774de4f895ea6a9ead74cdbdb6ae6c4ddb02a960bfb85513a
CVE-2024-1654,0,0,ac0509f6deb6f3ed4a3e95d25ed4dd3bdd67f0f87914e461aded05c6f6644ae7,2024-03-14T12:52:09.877000
CVE-2024-1658,0,0,bd2757c2314dc2f8bd52ce15b18a6ca41069d2e3f9ff401d7a725ad82b1db09d,2024-03-18T19:40:00.173000
CVE-2024-1661,0,0,f00eb2f2c3ce60fab79d51162055435d68cf3cf34607838bd07b04f2f9625a7f,2024-03-21T02:51:44.103000
CVE-2024-1664,0,0,d44b304f4d2e9fb868c37e41062a28e28d439c03500b6ce19eb20ded1c1b3e37,2024-04-09T05:15:47.703000
CVE-2024-1664,0,1,c240cf09d136b8ae3766d60b95066ae5935a6052d7cd59ed400a537e65636ac2,2024-04-09T12:48:04.090000
CVE-2024-1668,0,0,5ab0efbb5f521102a265a18c62e4efdda2d28d47a9245ca5f6f130ff2a6275be,2024-03-13T18:15:58.530000
CVE-2024-1669,0,0,3362eeabf5b6399fda046d3f728ab967509d79cc74a91c5ce260a94031135ec7,2024-02-26T16:27:52.577000
CVE-2024-1670,0,0,ae75c94f0b29c0a28e4a7c87bcbb408051ef24e0c713cce4805624b9b431840f,2024-02-26T16:27:52.643000
@ -240484,6 +240484,7 @@ CVE-2024-22226,0,0,0d0a641f57bdd270587828a9a2bed46d21e4a42e20578c34da0758c83220e
CVE-2024-22227,0,0,da75d9c9489c29f1cc0bee36d7764c9cdfb4cf2b057bac2e908e6263109bed68,2024-02-15T06:25:36.360000
CVE-2024-22228,0,0,78d2b6e91237b41440665215c9b4e77ccc8811641b8c3516a01f9391d6778f85,2024-02-15T06:25:45.463000
CVE-2024-22229,0,0,942079f7535239209609b5cbc34a85ff0a40c69533135771fdb6410ce1778e0c,2024-01-30T23:01:36.513000
CVE-2024-2223,1,1,b9394b41c5ff25167dbdb41b6fa21ce84c4693127e445f9ee3172be3cb406ea8,2024-04-09T13:15:33.057000
CVE-2024-22230,0,0,1dba8e437bacd8d1f2a5a22c03d0799f6c41b12fb7346ebf5256856880ee3b1a,2024-02-15T06:25:53.660000
CVE-2024-22233,0,0,0fe59b4b663f0c6d5b9043fb5ee923bedfa271d937aabb2465577a5f1e4e3b27,2024-01-29T17:24:16.230000
CVE-2024-22234,0,0,ed66ea75d4f91bd4cf760a873ffa711eec74e184d0ed1b507bd27dedbdd28669,2024-03-15T11:15:08.857000
@ -240492,6 +240493,7 @@ CVE-2024-22236,0,0,8201be843ca4fddc3e50d61ba00eee488c4be6cba8a9459a0251fd7b88b77
CVE-2024-22237,0,0,e71897597855cd1424c518c72383f574819812eafb673db1067e39ca6ce39465,2024-02-10T04:12:42.680000
CVE-2024-22238,0,0,7cde94c40824c59018efefacd980beca9642688e0bc3a9b4bd234ac24d76c945,2024-02-10T04:12:32.263000
CVE-2024-22239,0,0,bbc3a472e1d6ecc835cd57fa3021e572fa71f1c8c62196314a99a704e393b5ba,2024-02-10T04:12:18.850000
CVE-2024-2224,1,1,a5f03c3b51882a76a16e4634523cdb70045bec8e9e82ca12ff3b0d02ee379833,2024-04-09T13:15:33.357000
CVE-2024-22240,0,0,9d0b72097aa3b0fcd2ce100bde56bd14382bcab6c31de68e5fe9354868ac9639,2024-02-10T04:11:57.463000
CVE-2024-22241,0,0,496f061bf551a3619640a70a8bba0bd7b22a646ffcd7631f69738ec433aa1245,2024-02-10T04:11:46.267000
CVE-2024-22243,0,0,cd5131de758a556ae754d98313ecfca987f6ffd9ea403d0f3d0f2e39b0761770,2024-02-23T16:14:43.447000
@ -240783,7 +240785,7 @@ CVE-2024-22938,0,0,d14c96ecc84394e0c226b15d653363af8f866fc8a362ffe8912d5673a5fc1
CVE-2024-22939,0,0,98ae5450b25ceaff1169d7851ac12cb3d1f8ed4212f5c71a0110eb042c52a6d7,2024-02-29T13:49:29.390000
CVE-2024-2294,0,0,7adaa24a33704366500d65a38c52ba5d5887ad22bed1bd0562d7b36efb6d901e,2024-03-17T22:38:29.433000
CVE-2024-22942,0,0,27e1b96b16010d66938a1930cd0293d602396f85521af099c802bf269035b527,2024-01-18T15:15:47.273000
CVE-2024-22949,0,0,9f50a76ffcc828af29dfdda45bb6ef0b8b7a02fa40b7a257176056a4d5139f2a,2024-04-08T23:15:07.647000
CVE-2024-22949,0,1,5a39ec4e6a69cf95914d802d151998eb5762c2e80f80af227e65b64f7b64e313,2024-04-09T12:48:04.090000
CVE-2024-22955,0,0,4ae6e1e162ac27be2c1563f300454f76989ec1b9814e0f4be1652f56a6f11be5,2024-01-25T14:54:48.427000
CVE-2024-22956,0,0,2da6b272cb072bcb92b74c4c5c3faca0048e5b46583e9ffdd9571398ebecd789,2024-01-25T14:55:01.053000
CVE-2024-22957,0,0,045bad9ba8bb739147d8dcd83b4e5a0ded4b848e11c744629a53c265926b4f4e,2024-01-25T14:59:59.737000
@ -240808,14 +240810,14 @@ CVE-2024-23059,0,0,1ae620a0d7759193ae34540a4455aa9c0a81f947f508fbecbd634aa926d83
CVE-2024-23060,0,0,293f3db63669f513fdf6243d872feab4a40014b3abd2eff3b8edca7a0ed1b3d3,2024-01-18T15:17:35.587000
CVE-2024-23061,0,0,d40b225d92d8f0f0d47201622b24e50bc3550ed3e56a2682a133a8aeae5027e3,2024-01-18T15:18:14.357000
CVE-2024-2307,0,0,4b089dd0281a455952ab30b1c14e2b1725f875efc3e98fe223b3d9160259d255,2024-03-20T13:00:16.367000
CVE-2024-23078,0,0,6ccdfef45001c815b1c8a321f5fdb93824801b7a858b705656dc577c4b59c206,2024-04-08T20:15:08.500000
CVE-2024-23079,0,0,0dcc3d3975c6d390e57d0a9e44bbb6bb70a660da60e8f2c822dce166e4beb639,2024-04-08T23:15:07.703000
CVE-2024-23078,0,1,9d7aaea68d8acb3538ca428049148f2dac206a89706e35d40108cb3eb8be6ee5,2024-04-09T12:48:04.090000
CVE-2024-23079,0,1,c1744d41ef3d7ad1d99296d598f8fcec333fcf26813851f4f429e9678b14abb3,2024-04-09T12:48:04.090000
CVE-2024-2308,0,0,e35ab419c5c511708eb8574821633f88a1168237ea61ded1d7aa5b331f06479a,2024-03-17T22:38:29.433000
CVE-2024-23081,0,0,f13f502b7e2e1db8066ddc5074d5b80e3cc891b8e742f30ea256fa56155c64d6,2024-04-08T23:15:07.757000
CVE-2024-23081,0,1,9fa2a613be75462894d464b8e34e68b6da9b9d59d63e22685e547814dd9a5ab9,2024-04-09T12:48:04.090000
CVE-2024-23082,0,0,0a9e38aa01f043532a8be7b3040bd9f24c4cb812cc5c2c38c18325d962369a71,2024-04-08T18:48:40.217000
CVE-2024-23084,0,0,cc3fe5e43e6cc3d4fe9878fcdf7855182620a14f9f8ea54d74f3c390c55eec58,2024-04-08T23:15:07.803000
CVE-2024-23085,0,0,c8b0d35c4a557d6e919fb6d1242860cc216cbb10b6bb40b4d8c08dbe656610b0,2024-04-08T20:15:08.567000
CVE-2024-23086,0,0,65368b69d6d0eef07e38824732b878b0b1f0c0abb48bc5df2794ee9fdf0b94d1,2024-04-08T20:15:08.620000
CVE-2024-23084,0,1,82d7094530d5cd6c77dbe215344f65b7328c1ecf1670686e248abcdd712b3b36,2024-04-09T12:48:04.090000
CVE-2024-23085,0,1,f435d93167b9f4a31bec2831629dfa7b34bb533a49bb29329c43fee636db5bac,2024-04-09T12:48:04.090000
CVE-2024-23086,0,1,d8559a198e6f56b9e1a9a9c93fee6add743a34a70b05d723355a013a78276599,2024-04-09T12:48:04.090000
CVE-2024-23094,0,0,8b7fd2c37601b9f636934db44ed8e567ef20eff4d921df465afdbb6ef925a041,2024-02-22T19:07:27.197000
CVE-2024-23108,0,0,4bd66ae4e2150cd9c3073e095bacf489de77af9a273b611e130c3e3fa4edf7ea,2024-02-07T15:02:00.203000
CVE-2024-23109,0,0,c2686a38cd2651bfef8ab0e98ee0dbcce98e98fd7c1f1805290cb9df9c03fe78,2024-02-07T15:04:28.237000
@ -241056,7 +241058,7 @@ CVE-2024-2355,0,0,3245d70a394465f76ff5f05fc26b95bf0c5d50d1856adb39bb340583679667
CVE-2024-23550,0,0,233aa541fdda788f0e4e95c8a9a0a8f5d7fa7689dcd559af0cf5e5843a531076,2024-02-13T00:57:33.613000
CVE-2024-23553,0,0,51ea2d50cc1ff4dbab518de2a29e9ef6a91bd6b91073c23eb1a7f0cb7c8f1090,2024-02-10T00:59:00.423000
CVE-2024-2357,0,0,2af3f167a5f07c033333870e1f5044e9ac66d1548287fd20eff05541e2132cfb,2024-03-23T03:15:12.690000
CVE-2024-23584,0,0,7c11631f47a9cd8d18bc29523d2c089eb4e039bce017c0ddd915e33188a191fd,2024-04-08T23:15:07.850000
CVE-2024-23584,0,1,8c37acacf967b7c4f5ab4bd2dcef23f1fcd96f524843cdbf02653297c633df30,2024-04-09T12:48:04.090000
CVE-2024-23591,0,0,f4c08614f6a162f49ecc99f020c088036b0b565e06b57796e1304b45ae78e59d,2024-02-20T22:15:08.353000
CVE-2024-23592,0,0,8410729adf8ea2140a95009744b2dfc023c8f0c5b5843d18404a4118ed1b693b,2024-04-08T18:49:25.863000
CVE-2024-23603,0,0,2b536971fe4d260603348583e5e85d59f5debd4cec090f729c87a6dbde3a5ce7,2024-02-14T18:04:45.380000
@ -241414,7 +241416,7 @@ CVE-2024-24272,0,0,8f6883745a139dd4938d495410234eff50fc737ee779757f8e18a902dca99
CVE-2024-24275,0,0,5ee5552d1ccdff1349c63c1ee819e4122e7275d9cd64505362d94567de774ca6,2024-03-06T15:18:08.093000
CVE-2024-24276,0,0,c0b996f05c041cdec9f97004ccc67bd94d1c66cbf22b8df3dba73751978abd1f,2024-03-06T15:18:08.093000
CVE-2024-24278,0,0,3f7eb60b847e1971c5f65cb683e6174dee6547147c3195ceb2f7499f12bdbd36,2024-03-06T15:18:08.093000
CVE-2024-24279,0,0,72cb9013f2c4652ca9f1c2703573803355b3f3c49810cb9ea2ecf22280c02f6e,2024-04-08T20:15:08.673000
CVE-2024-24279,0,1,d350732cc4ca29b60cc89e1436f10a4364ab08631ecd4190bd1db7c1d3d102d3,2024-04-09T12:48:04.090000
CVE-2024-24291,0,0,ed81ca1f7d07ab5682e5dc3e12510be85bd8028a8e8a8fb1a80b96c7b9ae97e4,2024-02-13T20:13:26.593000
CVE-2024-24300,0,0,a8dc475a562e17ac269ab87541d5cc3de5e8b25ad6f69c16a9e202ce4fe0a524,2024-02-15T06:23:39.303000
CVE-2024-24301,0,0,eea9ef656f8457ca391649537e978f0d3e4722722df26eae84433b0c4b119a98,2024-02-15T06:23:39.303000
@ -242065,7 +242067,7 @@ CVE-2024-25642,0,0,bf91eeb1502dedca60fe6c035b93d7dfc5a440bc6932322c6ae4d128b4c7c
CVE-2024-25643,0,0,08f3e6c0d454841d4e4dc84aae81812246ffbd96bb71cc2e9e4566cd4077e910,2024-02-13T14:01:07.747000
CVE-2024-25644,0,0,cad748db94c87605f745ac8efbb54ef36e9bf866e1bcdbdf96bff9a05dfcf738,2024-03-12T12:40:13.500000
CVE-2024-25645,0,0,611af6391fb4617a6b65e5d2ff91bac5a4003873b65f133d0cd2495d911bd094,2024-03-12T12:40:13.500000
CVE-2024-25646,0,0,c75d00751fed3de8449144392cb0585f29e46e25016c4f17748ae725d45561c2,2024-04-09T01:15:48.343000
CVE-2024-25646,0,1,4c3fff51352b6a263ea60efd6f0f793331eb0c3a48316710a84a88b50103400a,2024-04-09T12:48:04.090000
CVE-2024-25649,0,0,3e37b8e86c2aaae32174cb72f32869171ec886cd62bb95537557a32583b80d63,2024-03-14T12:52:09.877000
CVE-2024-2565,0,0,f29b341373f4135f8349505114db202bd5fab0820f3e8d9e62cea3dd3d097a89,2024-03-21T02:52:38.533000
CVE-2024-25650,0,0,dc8b4afe4a9ab50c0ebaf06dbcbf0134b9648b4ff2232925762633c6b3fe0179,2024-03-14T12:52:16.723000
@ -242410,9 +242412,9 @@ CVE-2024-26268,0,0,5610a607715d86daa93e5e6c15868d417df615ed9f90516b74424ddbc8ecb
CVE-2024-26269,0,0,a4fbc0291a87f253fbb7c7919e7305be398b5ac09a381b89bf9bf742bc0ec462,2024-02-22T19:07:37.840000
CVE-2024-2627,0,0,e625366ce2705b71a33576e7d95a513ed311d73cf47b2a264208ec2a1b01e605,2024-04-01T15:22:56.233000
CVE-2024-26270,0,0,d6490f7916a3708559119c4b06da9ae5a8dea9c128a10a8333261b0f96cb6dc3,2024-02-20T19:50:53.960000
CVE-2024-26275,0,0,bd792bc6eb56b6e7ec3eac2d81482c0283901331aec1fa97e901a186b7a7de28,2024-04-09T09:15:24.260000
CVE-2024-26276,0,0,94f5c130ffa7ec1db1ea02a18ad3648d5d206936fe00d856cdfec89b47b00b52,2024-04-09T09:15:24.457000
CVE-2024-26277,0,0,2cba4478c6cc96839bc30a32054d0a70bd4f3f1e86aec08cbb43159a6e071a67,2024-04-09T09:15:24.670000
CVE-2024-26275,0,1,86b20790c28ff2896463d7fcae3324befb2f565377793267b5441cdb88cff86c,2024-04-09T12:48:04.090000
CVE-2024-26276,0,1,9407b59796cd800bb4fc38b36c1daee8f0b16fd5ac030c2517b1462502e4e4e5,2024-04-09T12:48:04.090000
CVE-2024-26277,0,1,44875b5da9b930ec08e98ff27cae08f0f68e5cf4284f47d8347964e17c5a06a9,2024-04-09T12:48:04.090000
CVE-2024-2628,0,0,74f1b0a8f98a3a2a42e54dd1de06ce591c355dd248224902ad7ba323d1c0caa6,2024-04-01T15:23:07.793000
CVE-2024-26280,0,0,a0828ad55cf94cdecb18cb50b16af06fe51be781c3cc28d9a8b8b17c369261d0,2024-03-01T14:04:04.827000
CVE-2024-26281,0,0,d398cdbeaa123e10721276d9f64c2d88a8b8d78292a048222ab02485f2a77624,2024-02-22T19:07:27.197000
@ -242993,9 +242995,9 @@ CVE-2024-27625,0,0,d6b6da55ca3f292d09b4a714bcb504e227f68a5bde518c62e1054c68c65c7
CVE-2024-27626,0,0,03b059cdacd9bd4fdf434fcdc21be78daba5dd8b1b09db34c5aaed65f0885289,2024-03-21T12:58:51.093000
CVE-2024-27627,0,0,6b314556f3fa2e7fb50707266f0d07d8792d06426c2d3b5f17382297ce1180be,2024-03-05T14:27:46.090000
CVE-2024-2763,0,0,8e9d345d7389664f80611635b46c2cef2ec874e0b9963bec2a0f291297e78b38,2024-03-22T12:45:36.130000
CVE-2024-27630,0,0,1af794bd73a1a981369ee11a8d740d74c2d4ddaa2b8325a16bd8d015c271d702,2024-04-08T21:15:09.983000
CVE-2024-27631,0,0,06f624de111450e75fa73f39020e095767cb778364bea9eef968fd43c313a3d4,2024-04-08T21:15:10.067000
CVE-2024-27632,0,0,77b2fef9184238aa65b7a05f1fcf8e38cdd5d8baed8ae8b674ef90fb91227938,2024-04-08T22:15:08.413000
CVE-2024-27630,0,1,195789d2e072cde29ac43f06437e13345453649751e3c98de08e7517dc132999,2024-04-09T12:48:04.090000
CVE-2024-27631,0,1,5c7b748f9881499a0aa3a66c7dd109e168e9d5d652d44f11a3ecfbbe6581d87d,2024-04-09T12:48:04.090000
CVE-2024-27632,0,1,c643ff3ecb619db3f75dd61e8c48e0ed3f8f47c2f793478e020545116177f32e,2024-04-09T12:48:04.090000
CVE-2024-2764,0,0,3ec67dc4c0d54764b942178e18d5d6721bd9017d0e5926b52df0eec1f7386756,2024-03-22T12:45:36.130000
CVE-2024-27655,0,0,65a637f75a188da438b32cc13f4600329f3f424dcd0f437c9989c4c9314e002f,2024-03-01T14:04:26.010000
CVE-2024-27656,0,0,2f731c51e226b6152416f771e826d74f69590b91bf713c56222b4fac3d8f2331,2024-03-01T14:04:26.010000
@ -243059,10 +243061,10 @@ CVE-2024-27894,0,0,249999fc9487c1b63574e09bae3fbcbcdf7b20ef335df69d9151a0f5ea4d7
CVE-2024-27895,0,0,e8e082e473ed76dea7e0db1fd0e0603d1d69d1ba5e6a1a82578100cdf406ffed,2024-04-08T18:48:40.217000
CVE-2024-27896,0,0,88fc4dc869bbb4cce477334b59754ef261ad68592aa0aa0ff71f89ccdf4b1875,2024-04-08T18:48:40.217000
CVE-2024-27897,0,0,6aeb0d28af447513b32ff29a7545806bc788b73261dbf5d52e00ce86aa2905c0,2024-04-08T18:48:40.217000
CVE-2024-27898,0,0,29b0a9172a1eebfd24f6675c2ebbbf977083adceed455d2567ab962a2a31f8d6,2024-04-09T01:15:48.583000
CVE-2024-27899,0,0,45f5f66a4e3da7332edf34d39ccf63b255c4cb8cac5cb60aac62b9fd2729ddf2,2024-04-09T01:15:48.777000
CVE-2024-27898,0,1,6b8e108f960c2d2d873ea6b4d9ada44d0ac2f369e07f3417bafeadd038578ecc,2024-04-09T12:48:04.090000
CVE-2024-27899,0,1,1e83e6ab0e8e2a789f3d6639693b1327c35e15b7468565754eff50891b540812,2024-04-09T12:48:04.090000
CVE-2024-27900,0,0,00f9885d5a06fec36b56a14fdc3be21ddc255c1561a408e91e09aee1b7ac8b37,2024-03-12T12:40:13.500000
CVE-2024-27901,0,0,1f100058faa206f75a8299605708ec984f36533043410845917ace6aec0b805e,2024-04-09T01:15:48.993000
CVE-2024-27901,0,1,33f662da706d18e25398216ac4597066ca6291840a4b4a018e8418ada4f9c7bb,2024-04-09T12:48:04.090000
CVE-2024-27902,0,0,7aa835c5c3cccf2434107e43a6dd21c3ee48d8e6664a62d49734964bcc016141,2024-03-12T12:40:13.500000
CVE-2024-27905,0,0,3e20ed1ee55859457fccacd02ccfd33b203e184f29107e3c93e267df9f8d58a8,2024-03-21T02:52:20.520000
CVE-2024-27906,0,0,e279155c32f0030358ce7d189e782f3e54d78a6a202b13937f95f2706818bee5,2024-02-29T13:49:29.390000
@ -243117,7 +243119,7 @@ CVE-2024-27968,0,0,81cf818ff4c52a717cdd4ac78ff685291ab11ee5a0785fe2aaaed4be1173d
CVE-2024-27972,0,0,e0f7933a8078741e5e2cdbc1c8aaffaa42eca2ccffc4cf4f10a410272b4fcf47,2024-04-03T12:38:04.840000
CVE-2024-27974,0,0,c5d12161a6a294fb4d33a068888d07d2dec693f9073d8d47f06182bf4fe2779a,2024-03-18T12:38:25.490000
CVE-2024-27981,0,0,bca4d502eb0003b495c2e3eabf4c8b77f995ffb842787b13a54996fb18ec7ff9,2024-04-05T12:40:52.763000
CVE-2024-27983,0,0,462e2e83b9f399bcd91568acb26b09d2f5c5418ba921c90db44ae36772ba68d2,2024-04-09T01:15:49.197000
CVE-2024-27983,0,1,5d8a6df11a15da2385f41c72a25a785a374e7614ce97421584556107f6abcf28,2024-04-09T12:48:04.090000
CVE-2024-27986,0,0,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000
CVE-2024-27987,0,0,457341cfe208a4dd4f1ca3a12fe23df96b337000dbd585aed58689be29e5bec4,2024-03-15T12:53:06.423000
CVE-2024-27993,0,0,4178545ce3cee5131bcc85417ac208f6615c9c5305016cf5248ec96a71c28f2b,2024-03-21T15:24:35.093000
@ -243224,7 +243226,7 @@ CVE-2024-28160,0,0,d3496ce06cdd6165787a1abcbf55db9c0fb2db641796e2cfba31e7190572a
CVE-2024-28161,0,0,ac1d3f11953e0c8ea875284019208bd8e81c5e134926913a38bbbd0ca21cd968,2024-03-06T21:42:54.697000
CVE-2024-28162,0,0,9bc5df2476915a3318874e35bcdb7d25e1035d05316c0fdc6385663896a911e1,2024-03-06T21:42:54.697000
CVE-2024-28163,0,0,04503ad76f6d74637a8e6f8a7d443052dfa73d2acab964dffd0d8da32b69e3b5,2024-03-12T12:40:13.500000
CVE-2024-28167,0,0,9a55ab4d6b3ad8b492f0fc017ea43d153c689b6906572f369d8da09ce3625626,2024-04-09T01:15:49.380000
CVE-2024-28167,0,1,0d05aeb691ba11cae01e2ab2c399918da8edc50da4b1f7f29cffd4e2facff21d,2024-04-09T12:48:04.090000
CVE-2024-2817,0,0,e0fe06a461ef795accd74c0bb92d92dd98cb14b12292f98e359c857cfb17ef6d,2024-03-26T03:15:19.720000
CVE-2024-28171,0,0,c1f19d20247dc1e3f04cbf911cc73142848c14a173b812d8f71f312ba63d2b48,2024-03-22T12:45:36.130000
CVE-2024-28173,0,0,542df716604f915101d48aeccfd0a59d896ed582a3774f62c0cc2b438bc897c4,2024-03-06T21:42:54.697000
@ -243259,7 +243261,7 @@ CVE-2024-28216,0,0,81cb418e285cc210ffc29a8a25f8e508c54e8fe29c1cf038a851918d914b9
CVE-2024-28219,0,0,5d1482e6721cb93d62e502f1f8ab261cac73f35af60759ddf9b75d97f371a8d4,2024-04-03T12:38:04.840000
CVE-2024-2822,0,0,6ab09d9d7524c6d95c8d1ae5b3671b49edc27757385c7737f509e182267f103a,2024-03-22T19:02:10.300000
CVE-2024-28222,0,0,d419d3ada13caae27e6dde281d73cbc44d2f509d635642c67ccba01f063babd6,2024-03-07T13:52:27.110000
CVE-2024-28224,0,0,ca6fb7a7c9cbb9514db5b85fb8e3fb3a2abd7539ce2617a6b42b50066d5c6494,2024-04-08T19:15:07.353000
CVE-2024-28224,0,1,3152cc64dff1bcf9fde70fb8b36c735f55a1cb82cfb6f7caa3c629344bcaff59,2024-04-09T12:48:04.090000
CVE-2024-28226,0,0,60d2b317d558a952126fd2c59e7791a3132f61184750bcc6e4113640853620c0,2024-04-02T12:50:42.233000
CVE-2024-28228,0,0,93e315b7dd05da9d4781d208d18dece721536dd50c2af36c895e70dd0b3e07a4,2024-03-07T13:52:27.110000
CVE-2024-28229,0,0,b7d8e7d93c2ed37c18bd1a25a871516c477e14595693600c07d3d2bc4a74b7b4,2024-03-07T13:52:27.110000
@ -243290,7 +243292,7 @@ CVE-2024-28254,0,0,a9752b9597156f82582ee0901564a914d350dbef56a1d3e2cb37d87202697
CVE-2024-28255,0,0,2223e20b88f20882b18c8e2daca66ddc78cf448142396bd3d6e2271daa5feb4a,2024-03-17T22:38:29.433000
CVE-2024-2826,0,0,ff0c97031e166398e323c72f1698e5c14d1d12a242f46c546169cb159379bfab,2024-03-25T01:51:01.223000
CVE-2024-2827,0,0,9d006cbe113c27e6d6059aaa0fb63202588562fcc2fd921cc358b89a10826fec,2024-03-25T01:51:01.223000
CVE-2024-28270,0,0,d017c4a60c6fa3785f96b83454883f1210a6b60ed8d083822e1b67bb8a435e8b,2024-04-08T19:15:07.417000
CVE-2024-28270,0,1,f654e93a55aad09ebe8372d915898812c2a1306adefa6bb8aebb87b68cea994c,2024-04-09T12:48:04.090000
CVE-2024-28275,0,0,20e2d2e3bfbe8540c4a348bc0e556a1aaebdf48e340e211a9afb11edded84f28,2024-04-03T17:24:18.150000
CVE-2024-2828,0,0,b9daa0fecdf94306feb1c91247867bd7201c33280322b94bd8b3a21cf142beb1,2024-03-25T01:51:01.223000
CVE-2024-28283,0,0,268ce493b20c7a589a5e50c22f5ba70e4448bc55aa5cacedfa25c50cee9c0813,2024-03-20T13:00:16.367000
@ -243722,7 +243724,7 @@ CVE-2024-29746,0,0,29af8006f9fbd7af7095512e80e5bf0ae4c64952a941d41acef3a04849082
CVE-2024-29747,0,0,87f4e304e93f8b6f286c656028c07dd1ca332ec61fa47e7ce7d137f30fe66b91,2024-04-08T18:49:25.863000
CVE-2024-29748,0,0,521433bbadcb400dfc92897155d667884ae0c1a8d67cb01db78baff427b50b49,2024-04-08T22:52:33.780000
CVE-2024-29749,0,0,33b9f39d00d5461e17b7d5a8f346443f168cc7b139342c04719e9f38cd1e308c,2024-04-08T18:49:25.863000
CVE-2024-2975,0,0,bc6630236fbea59ea85108099a00f8d460e796c3dd2ded65943ede8bd6baee37,2024-04-09T01:15:49.583000
CVE-2024-2975,0,1,6de0856746ca0e83e8c020b0c49b3d12b69bd33621171f2e1dc549a80a926408,2024-04-09T12:48:04.090000
CVE-2024-29750,0,0,cd8489f4573c543020a3b6e8b96290737b84849a080d45bc65ef0ff04a2c59f0,2024-04-08T18:49:25.863000
CVE-2024-29751,0,0,3bc4aa316cc8565894aaa2a9c412da7054d4f835fd37d50bf2ebd4a04ae9df25,2024-04-08T18:49:25.863000
CVE-2024-29752,0,0,8570c8346da874298f8f35ea2088404fb97ccfc316a51781a5f28a7a73ba2064,2024-04-08T18:49:25.863000
@ -243915,10 +243917,10 @@ CVE-2024-30184,0,0,9f69bd3ca06ec5c9657f3c215f7efb6829cdd48e1fef7a80c5facbe90dd97
CVE-2024-30185,0,0,a781b9014abd19a00a8d62f1c673ab43addf79eb808bed01ac8422942c39fe67,2024-03-27T12:29:30.307000
CVE-2024-30186,0,0,fb11f40c5a3e049b4173bd5ffb37b55dd352f80bf009d46c6a7e0ed4bd19ac71,2024-03-27T12:29:30.307000
CVE-2024-30187,0,0,f8d37ff5304c8d102184c9586047a497264eab63488a1192b60bf85807ce2976,2024-03-25T13:47:14.087000
CVE-2024-30189,0,0,8ab69d447623452a9c752bf4d46af011a09b5ba2fd0e47c4dee86f2e11c363ad,2024-04-09T09:15:24.873000
CVE-2024-30189,0,1,3f4990ace311ce3f5f501a6dcf406cbed1780f0c03c898c2001b2eab67f70f47,2024-04-09T12:48:04.090000
CVE-2024-3019,0,0,7aa90b3371c248010d1ca2c86ac425a855d65b90f7f2b54c8215ff8d140c2475,2024-03-28T20:53:20.813000
CVE-2024-30190,0,0,ab4efd5f3f31cb946f6b912beaf10a973ded8c88e1315cac8f4b04553dadecaf,2024-04-09T09:15:25.117000
CVE-2024-30191,0,0,a194e02128d9f38a2120430edbf1f83fe06b1d7feff6edcf6b56e03bf2e1e81b,2024-04-09T09:15:25.317000
CVE-2024-30190,0,1,51fa3b61b1a89cc1e5bfc291b48055ea6ae2c46214176899850afb7f6a1c269a,2024-04-09T12:48:04.090000
CVE-2024-30191,0,1,ebc6f15da39286087c5d03b22d2078cfcc767238c4f5e6e7ea4485533eac454d,2024-04-09T12:48:04.090000
CVE-2024-30192,0,0,c058935b45ae3c1c682d0c8091f1486b6546bc2f278e4ebfa792d597067b45ed,2024-03-27T12:29:30.307000
CVE-2024-30193,0,0,33258fe7cf249072798e560677d7e50e03f9db8bbc27d72503f50ecb70812130,2024-03-27T12:29:30.307000
CVE-2024-30194,0,0,d5b499129c7beb5f42abcf7b4a34b45d5603a89c60af6322a93392ad7d164018,2024-03-27T12:29:30.307000
@ -243933,11 +243935,11 @@ CVE-2024-30202,0,0,31db9c331e53ee7e35e14a4f4da9c9118966173e7dfd1773c267c14439e4d
CVE-2024-30203,0,0,444aebb38c12835907cb7a31abaa6167c0351378679f511812ede323236ede80,2024-03-25T16:43:06.137000
CVE-2024-30204,0,0,036541cdb0b2547c6a0b159ebcde955e789df823270814d2ecf5a2ea473b3058,2024-03-25T16:43:06.137000
CVE-2024-30205,0,0,49c6abb5e041dbd344a1c2878ff4314f11b475ed55487542fa5ade5e7cd812b8,2024-03-25T16:43:06.137000
CVE-2024-30214,0,0,9cbb84d5a31cde891755a74be46005a7ae14cc0fe7a81a16294b5e794e71b95b,2024-04-09T01:15:49.750000
CVE-2024-30215,0,0,63c0103988a8a22d50b4f5920b1d344f44816b12c4a4bd2838f874c7170c27f7,2024-04-09T01:15:49.953000
CVE-2024-30216,0,0,23e6330d5e67b3939a808dea3c48b015ea93ffe0e940d5e3db258ada971a742a,2024-04-09T01:15:50.140000
CVE-2024-30217,0,0,dc05ee90d167762240bbfd4770ae1675986fb9f2999d716d3c5750c55a05cbce,2024-04-09T01:15:50.353000
CVE-2024-30218,0,0,d0680a6e32010322311576701fff049a2fb3821324253bdcc8e519d58dbb41f6,2024-04-09T01:15:50.570000
CVE-2024-30214,0,1,7c4820c684a267b228fa4a4665b794d39804e491dff54bd3f2105fbbb658d34b,2024-04-09T12:48:04.090000
CVE-2024-30215,0,1,ab2bb7d1fb5a1429f982c34c6c343c5bdb990b01f1c65a84e0f966e88ca26da6,2024-04-09T12:48:04.090000
CVE-2024-30216,0,1,b2a60633096c48481bfba33a475cbb1ec9bd028014eb767b662e1172ca558cda,2024-04-09T12:48:04.090000
CVE-2024-30217,0,1,087a63819064c1c33ea0e545c53d87168995546f6e15f5d7be47bfdca70c5f13,2024-04-09T12:48:04.090000
CVE-2024-30218,0,1,bbafd02e57188641c828b4e11afc10b08f46d298d16560a41cdffe88fac7fd66,2024-04-09T12:48:04.090000
CVE-2024-3022,0,0,f291c8130c561158256d7e5f236acfb4472a78c940a59eb4c1d015abd789d2b5,2024-04-04T12:48:41.700000
CVE-2024-30221,0,0,8c33faec8eecbd1bc4775ea7d226df03d8dec1186991b9fb17295c2b460f3a49,2024-03-28T12:42:56.150000
CVE-2024-30222,0,0,16d5c6200c88be9ed99126042f393681469af79a0a1fab7e0ddf18cd42a248eb,2024-03-28T12:42:56.150000
@ -244077,7 +244079,7 @@ CVE-2024-30455,0,0,115244366736fad049cb2d568fd37bcd1f9387962814ae164a94d7f893776
CVE-2024-30456,0,0,58b7f6d9df0133114222c028c59aa68a983be02157b04b25b467f54970276f3b,2024-03-29T13:28:22.880000
CVE-2024-30457,0,0,0e1a5411ec4ddd12ef39ffb10d5b7f249bf382292e8158c3b3ccafeb0f7acbcd,2024-03-29T13:28:22.880000
CVE-2024-30458,0,0,138b6d21084a1b9981d25ac0a20e6d58c8531b97987312f29ce581613992ae6f,2024-03-29T13:28:22.880000
CVE-2024-3046,1,1,6d7ca1977c621f17430aaec9ccc12aa503b8a49003e968ef0cfa49b8e286ea2f,2024-04-09T10:15:08.600000
CVE-2024-3046,0,1,f64fd084b3316f52714630b8d9b76d007648387616e5814bf19d8a730782ba88,2024-04-09T12:48:04.090000
CVE-2024-30460,0,0,60239bce124e04867e82f31e5cfb960c5f3a93584351525e2543cdd96d5ccb22,2024-04-01T01:12:59.077000
CVE-2024-30462,0,0,d59392c9106e622ed8a8be18c11749718bba226bfa2a23231020ec7d96976f3a,2024-04-01T01:12:59.077000
CVE-2024-30463,0,0,417553a6f74795aba1e180f9fa11122fb72f60b63e441eca3940c7cd28530a48,2024-04-01T01:12:59.077000
@ -244206,25 +244208,25 @@ CVE-2024-30667,0,0,ff284e163d8506ead82a88e1e0195d7345f11e18d3b36d2dad51ac5fe6f1c
CVE-2024-30672,0,0,5f03fe7211bd8d45b5928b91a5ac0350abcfb5c5194aa5b0296fc94c9e863bc2,2024-04-08T18:48:40.217000
CVE-2024-30674,0,0,6ed6c67e9f9314eaeb2be25e85ad7999c533cc1beb21c8cb467ab7a893f16710,2024-04-08T18:48:40.217000
CVE-2024-30675,0,0,8b91a2fb611ecb3c19dd6a14ce9d54a86e8a20f268f642c9f4e164c260b50edd,2024-04-08T18:48:40.217000
CVE-2024-30676,0,0,2a073dd564e86e695eb2f919b139d388a2d6007b80e09fcf5430f574293c04d1,2024-04-09T03:15:07.763000
CVE-2024-30678,0,0,ef2be53ace00dddfb9477c2105eab4a719d2b1864b4c7a0736a5393b059f1a2f,2024-04-09T03:15:07.830000
CVE-2024-30679,0,0,6f05a7fd5aff6056f1cd0ac249bbcd7614976a073740a795bbdcf43e4db0951d,2024-04-09T04:15:10.087000
CVE-2024-30680,0,0,0db6be591c415718737384ee863de3874b3c91f1f1f8d6ff4a25940f4a6fadbe,2024-04-09T04:15:10.583000
CVE-2024-30681,0,0,8cce67f169b8935564837b759c0252e1d62dcd48e7bcfe48dfbbecb14ddf135e,2024-04-09T04:15:10.747000
CVE-2024-30683,0,0,b7621d84f614230c0df5165592f4f5b9dfd62300b10a45fd3e9810b90ac95d0f,2024-04-09T04:15:10.877000
CVE-2024-30684,0,0,9be1f5115249bab85819d159de79365c3e4b80b2ec8ce819e9edf872119e3ac8,2024-04-09T05:15:47.807000
CVE-2024-30686,0,0,541ea82cba3076dc93b4cf3d209232d5820c095c8704cbaf1cc6fac7df5cb046,2024-04-09T05:15:47.853000
CVE-2024-30687,0,0,d41d39118a6364deb76328cc8c97b0d3e4e72fc3b9af23bace5281a4fd92503f,2024-04-09T05:15:47.920000
CVE-2024-30688,0,0,e87ed7a45faf17208575ce7e369e08e5fc2c6646724b14c3d5b68e746ee07a95,2024-04-09T05:15:47.980000
CVE-2024-30690,0,0,0222a6f435cd9fb505f55b765c382ed4aec444e568410449029d68b1773bbda6,2024-04-09T06:15:08.963000
CVE-2024-30691,0,0,f13d250264f36bef3c8a95114656bfe64d9507f8789a26c487d45d49087945de,2024-04-09T07:15:08.467000
CVE-2024-30692,0,0,c6905b73ae908de6592f9715ae4c7f9220b4f9d69b13d5e3672318f490534072,2024-04-09T07:15:08.560000
CVE-2024-30694,0,0,87e1e568f906c3259c4311246f7c7ebe93a858c6e8f9a9e735f5d0a51dc9e8fb,2024-04-09T08:15:07.420000
CVE-2024-30695,0,0,ddcf4ca472b554b646b53740b242ba136463be85f78e6c2877882bbd5172d5c9,2024-04-09T08:15:07.530000
CVE-2024-30696,0,0,54a5cff2071955408dfaf2a6059dc98713163ec675db342b730d4d4fed56e3b2,2024-04-09T08:15:07.587000
CVE-2024-30697,0,0,584bacee4bbf15e3909c526c7e893ad2ccf0bf26a2ea73cbcc220faba83ace96,2024-04-09T08:15:07.663000
CVE-2024-30699,0,0,bf016f0de32f7cb69bfb6c8fdc5d92c6c36d4e5c955c6e78080fe0f7706caad9,2024-04-09T08:15:07.717000
CVE-2024-30701,0,0,0e5335693d286262e2a5cf9e2a6c9ca11c86e648dbf1aba9748ad53026829393,2024-04-09T08:15:07.770000
CVE-2024-30676,0,1,af724672b3075823cc7ac023ff0bd01b6766fd74313e164540f52e1f670069a5,2024-04-09T12:48:04.090000
CVE-2024-30678,0,1,28c2c42c15a87c8576562744982b7e6592c723e041b1251a726dc2914f0f31c2,2024-04-09T12:48:04.090000
CVE-2024-30679,0,1,1652ad2d7f751aa883b92dadc3db45d6131582879ab3f0ce2ce9b68ca301473c,2024-04-09T12:48:04.090000
CVE-2024-30680,0,1,07cf4672c6cb5c0d37b128ff6292cf9dcf1d064a6b724bb71fb28d8b540ff210,2024-04-09T12:48:04.090000
CVE-2024-30681,0,1,ddbe0c69f9ab035c7a353186f3b3cfb547957dc7577d22a08e0cab4ca1d951a2,2024-04-09T12:48:04.090000
CVE-2024-30683,0,1,95978317b9ff4fe100aa7b5187ca91600381e6090aadd857a6554499fc4fc767,2024-04-09T12:48:04.090000
CVE-2024-30684,0,1,93873bb3f77c6d6c1129e83df71a0c5dab8044941f95a0a1a2446d06a1a663f9,2024-04-09T12:48:04.090000
CVE-2024-30686,0,1,cecb3b359a2c306a651201a597cd44f73ed8fc5e2479bc1e16493cf1b000f3d9,2024-04-09T12:48:04.090000
CVE-2024-30687,0,1,627c6f49d0e8696456211f5aadec2afbfb7309884605ed881f3f310eff8a28e0,2024-04-09T12:48:04.090000
CVE-2024-30688,0,1,be62ee228899213efd589c12a1c4722b462ed6c7cea897018d539f4060eeaef6,2024-04-09T12:48:04.090000
CVE-2024-30690,0,1,758c0e580a22afa6415e22d45eb180157d5e27c3f7c136b941a2ccea1a631afb,2024-04-09T12:48:04.090000
CVE-2024-30691,0,1,23334283bdbb80ece84004a07a2d4f2fb30a9114f4de8009b41ca287700f7f5c,2024-04-09T12:48:04.090000
CVE-2024-30692,0,1,ff1ce2f91a7b26c24b130e2b00e06d5a248a15e5d50cd434ef04e50387645828,2024-04-09T12:48:04.090000
CVE-2024-30694,0,1,7755c230805c1909d0e94175233f36be70321ff270a75af58c50d43db7f1ff2d,2024-04-09T12:48:04.090000
CVE-2024-30695,0,1,520c313ebed8e7aa062ef70d824f022571c815c409401bb881ea7203f9352df6,2024-04-09T12:48:04.090000
CVE-2024-30696,0,1,f669e76cecff581f311ed5900046ffb74094191bccea9325de2ff009a7b30889,2024-04-09T12:48:04.090000
CVE-2024-30697,0,1,2bd165ee3b3f68656e20994b8433b623199f76c40a9ca0dc0dfa3acfa9da7f64,2024-04-09T12:48:04.090000
CVE-2024-30699,0,1,9d56c28cee5445b90e131fb18f6cf806afce6628a108cb0836bb98a2b8089d77,2024-04-09T12:48:04.090000
CVE-2024-30701,0,1,8e03ccf6659f5a4e378ff7d93a21c845259f9ec9ec9403dcafcfbc3a4ce924ba,2024-04-09T12:48:04.090000
CVE-2024-3077,0,0,df42d4a62ceb1c6a6275b9b1d36ac8da42c0ae3505d0e07beac8238605b5504b,2024-03-29T12:45:02.937000
CVE-2024-3078,0,0,cde724dd3faba12829b2b6702d06fc6a91a021819aa4d3333d39ab34ce48e248,2024-03-29T13:28:22.880000
CVE-2024-30806,0,0,3c4bbd71defb52c4de24f9ad1626459edef6b60997b976e6d74aead4ee0b3b0f,2024-04-02T20:31:58.463000
@ -244275,7 +244277,7 @@ CVE-2024-31022,0,0,a14e43455f8667f5b08643f4accc0ded65ef08c98d3d4f6b069b1542bbf69
CVE-2024-31025,0,0,049c3aee715c9c75f255eea2ba7d71aee620ad97e93ef3b0e0a948ae51dd0b57,2024-04-04T12:48:41.700000
CVE-2024-31032,0,0,71dbb2a787f73b1914bf5d51e1b83b5365eb112b3ab9ed4df5d1066682b5223b,2024-04-01T01:12:59.077000
CVE-2024-31033,0,0,897cdecff344b121550f3f8e1b3cb821fdde5689eabf8f2834a81266f3e9da87,2024-04-03T03:15:10.670000
CVE-2024-31047,0,0,c175d27ed17d4bf949120d8409b6dbaecb9c46ddadf7527ed65cef283f88c52d,2024-04-08T23:15:08.023000
CVE-2024-31047,0,1,ed6b998d2efbbc258ad744f538162378aa1b702ac5e17462e2e5f42d9945fb08,2024-04-09T12:48:04.090000
CVE-2024-31061,0,0,020e38014038ba97f692790c06c98735ee7323fcc8614755f16c9c5708fe33f5,2024-03-28T20:53:20.813000
CVE-2024-31062,0,0,9a85b45f2ef9be7ff3563a8d396c3a8dd45f237219d28fbf343c7fa8953f9bf5,2024-03-28T20:53:20.813000
CVE-2024-31063,0,0,8c5e031664c3b218697e91183f663111a47f52e7fd5496cafc4f238d7a0c4ce8,2024-03-28T20:53:20.813000
@ -244372,13 +244374,13 @@ CVE-2024-31348,0,0,cfc095c1fc0e4b141af08e05231276cb08ae09886eb38442cb07d948f68e6
CVE-2024-31349,0,0,8d1bd13d7c4f34f460e790c462e1e7791a20313dfd6a20b06dc021131d4e0db2,2024-04-08T18:48:40.217000
CVE-2024-3135,0,0,91954ab6e8bf3cb2f93a640035369c46334c6e185515d1b835de2161b0fd8f69,2024-04-02T12:50:42.233000
CVE-2024-31357,0,0,6d1a7933989bbcdba28fa02b8be4705197f66c46746bd7fe377d13c6e2cc0304,2024-04-08T18:48:40.217000
CVE-2024-31365,0,0,fc6aa8a24f23c740987c3fb601f4d456d9d6cf819e248fd81f799c77ac72a671,2024-04-09T08:15:07.827000
CVE-2024-31366,0,0,1af347fc8335406c907b3336b6d3a66c50b1e09309b87f82640d67931a4ad266,2024-04-09T08:15:08.090000
CVE-2024-31367,0,0,f6f2a97ff3535c04779b4bbb5a660e3fec19f5874beb28ba57c65f95f6e7012f,2024-04-09T09:15:25.520000
CVE-2024-31368,0,0,4768a6001b4157c13653e9e0c71fe74fd93d15447b50501403be5541d51f94cf,2024-04-09T09:15:25.710000
CVE-2024-31369,0,0,3faf152bc141d887aeee588c78ce4ead16543f70cb1f6090ad9e82e7d4b5a75c,2024-04-09T09:15:25.907000
CVE-2024-31365,0,1,c940557b1d8090d7c4b40b91442276e3021286d8a5d5418b8ff9252921cde6e4,2024-04-09T12:48:04.090000
CVE-2024-31366,0,1,75b2b689edca4c4fe2cdb7df1b8ed82e64c11b89b9b73cbce127601f1ecfacae,2024-04-09T12:48:04.090000
CVE-2024-31367,0,1,81120db09e405ceec023426aa5eb20efd22769d9230dda89ff3bacac48f33f54,2024-04-09T12:48:04.090000
CVE-2024-31368,0,1,2075bbe380281b0997c3990fa2ac90c9c87c399d3ddf4c8c8d5afff7621d8b06,2024-04-09T12:48:04.090000
CVE-2024-31369,0,1,d082a9ab615cec7280a5691a7d44e9570c42e7b3288086312b3cbea4bdb1dc8b,2024-04-09T12:48:04.090000
CVE-2024-3137,0,0,85619be4f983f97db1d6302bec8264dd546f884b93dfcad5f6be85034ffe5dcb,2024-04-02T12:50:42.233000
CVE-2024-31370,0,0,31f745ddc020a1528c8f50fd91f1f415c182c8d12a6a2cd6331fd89dd72a9c49,2024-04-09T09:15:26.100000
CVE-2024-31370,0,1,6f6e1dfc72d0841ebaadb7bdc4bbf124cf6313a520f59380c092d9365f2d4194,2024-04-09T12:48:04.090000
CVE-2024-31375,0,0,b0ef1f22f63ca31cfb2164ca0bddec7fc53a5ee9672cb520fcd2e704c7c6fdab,2024-04-08T18:48:40.217000
CVE-2024-3138,0,0,b2250a42d544b358de2555f1c668a77223939f10414766861d02ac21eac35bc6,2024-04-02T12:50:42.233000
CVE-2024-31380,0,0,d044c4c41af2f67b9e10a84372a0da5aeb36e8aa53f4901f4d0660af26a33358,2024-04-05T14:15:10.487000
@ -244401,6 +244403,7 @@ CVE-2024-3147,0,0,02625b405a9656dc1928c253c58a24946e5b9cb50ef47acb30b3a3a470e8ef
CVE-2024-3148,0,0,da83dea91bd5fed523ca15df13db4100d62650319dcc492fed6d52171a819a8a,2024-04-02T12:50:42.233000
CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08
CVE-2024-3151,0,0,dbc1fd34b22356e776c12a200bc45c40de5eea60ac1974d151d7c1d279b32bb4,2024-04-02T18:12:16.283000
CVE-2024-31544,1,1,88902b53c0f1eeb21e877882efe39d4af9f10efecf052310f4a64d08429f9d76,2024-04-09T13:15:33.557000
CVE-2024-3156,0,0,672d7786ba8482c7e78ab9597c9f5a6e717f264787edb700157c849ff3c9f687,2024-04-08T18:48:40.217000
CVE-2024-3158,0,0,d2414412e299d1c6c6fd5c25934ca9d016ec38ac6210ea884f5d6eabc2220b22,2024-04-08T18:48:40.217000
CVE-2024-3159,0,0,ab3d3fc3f58ff99c2f10e23574a75e665f3343c344ecfe71138e927973febb6e,2024-04-08T18:48:40.217000
@ -244429,14 +244432,14 @@ CVE-2024-31849,0,0,f45798bfe1f17890c1c9f615c3d632efe82fbe29dd84fe4753d6d6beae3b4
CVE-2024-31850,0,0,4dfa9605a049a09744618be099ad889f274ff40fc42a18e168685588a6a44b6d,2024-04-08T18:49:25.863000
CVE-2024-31851,0,0,0e8250a21123e214b1f09f2b325f0d0e22e98cb6715480d7ac13d673f761eb46,2024-04-08T18:49:25.863000
CVE-2024-31852,0,0,7a968282e2d23775fda0d6edce03c38caf21ca868b2fca3251339d962c2ec4c6,2024-04-08T18:49:25.863000
CVE-2024-31860,0,0,ccd55956f4b2085b6553adb9cab020d31d8243fded66ae1d53f39c274384f80b,2024-04-09T09:15:26.293000
CVE-2024-31862,1,1,4585fe38c9c66a994786b1f605848fbf027d976add2e3b3ae014df8201a2eb70,2024-04-09T10:15:08.513000
CVE-2024-31863,1,1,a0ed816379b99b301622b0a6ae840b8424f20e203b1335dda0f550bba90babf3,2024-04-09T11:15:31.713000
CVE-2024-31860,0,1,55dd12597bf39ae8e0517c5d55b7ea30406697589bf4efd38a9030f7ffb75da9,2024-04-09T12:48:04.090000
CVE-2024-31862,0,1,9f707e95c44d810f3a15296bc63963399801058986b2544d08155d8eb18bc340,2024-04-09T12:48:04.090000
CVE-2024-31863,0,1,c0205d004a02751e8ee7ccf780094034f2d276095c68cc3f87551a74133406a8,2024-04-09T12:48:04.090000
CVE-2024-31948,0,0,b8fd3eda997fc89b9e55a498d2068e6465c743165b4060fd79003e8bed0e6076,2024-04-08T18:48:40.217000
CVE-2024-31949,0,0,e7ba39ada062d71e6dcc57a3b21fdc31258fde0372c873d76cfd22b57d87a6fc,2024-04-08T18:48:40.217000
CVE-2024-31950,0,0,6cefb0ca8246a802eee33ecaeabf30a3794c53c92173f69e19945e3bf38104d7,2024-04-08T18:48:40.217000
CVE-2024-31951,0,0,a02cb6e83819b8aefe87f14fcbaf10a3986c9b6174676e08f67eb54fe256f190,2024-04-08T18:48:40.217000
CVE-2024-31978,0,0,d17ae3d50dbec3a18d72f4e719a353448c63c0888bf1d5847ef9832d4e66874b,2024-04-09T09:15:26.387000
CVE-2024-31978,0,1,905fe24a9cf546b211ed3cfae7258dc772856eb0550beb1f55c95bc3799601d2,2024-04-09T12:48:04.090000
CVE-2024-3202,0,0,c740eb561a7c1440cb5a8dd5eb2f94f0cce226529c05056c2f841e5a9fe9ca73,2024-04-03T12:38:04.840000
CVE-2024-3203,0,0,50d63f401f7659abc3d4fe6662d0f1a519a0e385e123db03b5f1830a5a75ec57,2024-04-06T16:15:08.350000
CVE-2024-3204,0,0,f0ecaa4cd894fa75e44a48d7dd9614c107f33ee3ea503e315d2394814a086ab4,2024-04-06T16:15:08.530000
@ -244540,7 +244543,7 @@ CVE-2024-3455,0,0,2a79458511cc023c776f69dd26438ba48a54ecc3ce4715cf5a2dbcf735d2bf
CVE-2024-3456,0,0,1163b826cb31daaf8e489647ff09bfd19b3fb113321ed6ccdf58236f2b7e5e1b,2024-04-08T18:48:40.217000
CVE-2024-3457,0,0,11a1e136160c0247fcf615183184cef87c2f9a8ed0a4cc454a1baf664c38c18a,2024-04-08T18:48:40.217000
CVE-2024-3458,0,0,0dd3899ad6b0b4c44e22d6564bbd58a94d8615e4c6beb4dd695b6c049f1a5d9a,2024-04-08T18:48:40.217000
CVE-2024-3463,0,0,eb5a7ce8cc9385684b6a9fd68b230a744dbb78bcc6779ff6338879cfe3292035,2024-04-08T20:15:08.723000
CVE-2024-3464,0,0,2d1379cf9c8d2eb9f4330537cd1775de3998dec4b0ed303f13bb105970303bed,2024-04-08T20:15:08.990000
CVE-2024-3465,0,0,ede59d298a2b744f6135f6cf5c4f90cf0f26e2b3aaaaf08836afca2893ea9114,2024-04-08T21:15:10.163000
CVE-2024-3466,0,0,bcbc92c75c6ab2d66c5b61014acd484a84e91272d04e34af6de153eb326125f4,2024-04-08T21:15:10.587000
CVE-2024-3463,0,1,b9a4be2f26f78b332674d83ef625297790907d08496665abbf73f7be270cf292,2024-04-09T12:48:04.090000
CVE-2024-3464,0,1,9fc42ee7d400c682b0cca155c2130251f069e21de8abbf2c9cdbf132d840c5a9,2024-04-09T12:48:04.090000
CVE-2024-3465,0,1,2c147ebdab1a9c2f236be45a5e3f17abf5dd87162f7d74a530cad5ba9d863bda,2024-04-09T12:48:04.090000
CVE-2024-3466,0,1,4cdee9397ccb0cc6b86df3dd4a626bfe2bd945ea650bd37ea0096866891b044c,2024-04-09T12:48:04.090000

Can't render this file because it is too large.