mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-04-09T14:00:38.020013+00:00
This commit is contained in:
parent
7c4143f56c
commit
468bd3b1e1
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-28656",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-04-09T10:15:07.610",
|
||||
"lastModified": "2024-04-09T10:15:07.610",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-3671",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2022-10-26T17:15:10.080",
|
||||
"lastModified": "2024-04-04T17:15:08.060",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-04-09T13:20:32.987",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -84,6 +84,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -123,19 +133,26 @@
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.212014",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.212014",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.49576",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Technical Description",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-47894",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-04-09T10:15:08.343",
|
||||
"lastModified": "2024-04-09T10:15:08.343",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1082",
|
||||
"sourceIdentifier": "info@cert.vde.com",
|
||||
"published": "2024-04-09T09:15:19.643",
|
||||
"lastModified": "2024-04-09T09:15:19.643",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1083",
|
||||
"sourceIdentifier": "info@cert.vde.com",
|
||||
"published": "2024-04-09T09:15:19.937",
|
||||
"lastModified": "2024-04-09T09:15:19.937",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50821",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-04-09T09:15:21.270",
|
||||
"lastModified": "2024-04-09T09:15:21.270",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-0082",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-04-08T22:15:07.993",
|
||||
"lastModified": "2024-04-08T22:15:07.993",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA ChatRTX for Windows contains a vulnerability in the UI, where an attacker can cause improper privilege management by sending open file requests to the application. A successful exploit of this vulnerability might lead to local escalation of privileges, information disclosure, and data tampering"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "NVIDIA ChatRTX para Windows contiene una vulnerabilidad en la interfaz de usuario, donde un atacante puede provocar una gesti\u00f3n inadecuada de privilegios al enviar solicitudes de apertura de archivos a la aplicaci\u00f3n. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda conducir a una escalada local de privilegios, divulgaci\u00f3n de informaci\u00f3n y manipulaci\u00f3n de datos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-0083",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-04-08T22:15:08.203",
|
||||
"lastModified": "2024-04-08T22:15:08.203",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA ChatRTX for Windows contains a vulnerability in the UI, where an attacker can cause a cross-site scripting error by network by running malicious scripts in users' browsers. A successful exploit of this vulnerability might lead to code execution, denial of service, and information disclosure."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "NVIDIA ChatRTX para Windows contiene una vulnerabilidad en la interfaz de usuario, donde un atacante puede provocar un error de cross site scripting en la red al ejecutar scripts maliciosos en los navegadores de los usuarios. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo, denegaci\u00f3n de servicio y divulgaci\u00f3n de informaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1023",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-03-27T08:15:38.140",
|
||||
"lastModified": "2024-04-04T16:15:08.140",
|
||||
"lastModified": "2024-04-09T12:15:07.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,6 +55,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1662",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1706",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-1023",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-1233",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-09T07:15:08.060",
|
||||
"lastModified": "2024-04-09T07:15:08.060",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in` JwtValidator.resolvePublicKey` in JBoss EAP, where the validator checks jku and sends a HTTP request. During this process, no whitelisting or other filtering behavior is performed on the destination URL address, which may result in a server-side request forgery (SSRF) vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una falla en `JwtValidator.resolvePublicKey` en JBoss EAP, donde el validador verifica jku y env\u00eda una solicitud HTTP. Durante este proceso, no se realiza ninguna lista blanca ni ning\u00fan otro comportamiento de filtrado en la direcci\u00f3n URL de destino, lo que puede provocar una vulnerabilidad Server-Side Request Forgery (SSRF)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1300",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-02T08:15:53.993",
|
||||
"lastModified": "2024-04-04T16:15:08.410",
|
||||
"lastModified": "2024-04-09T12:15:07.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,6 +55,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1662",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1706",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-1300",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-1664",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-04-09T05:15:47.703",
|
||||
"lastModified": "2024-04-09T05:15:47.703",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Responsive Gallery Grid WordPress plugin before 2.3.11 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Responsive Gallery Grid de WordPress anterior a 2.3.11 no sanitiza ni escapa algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de cross-site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en configuraci\u00f3n multisitio)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-22949",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T23:15:07.647",
|
||||
"lastModified": "2024-04-08T23:15:07.647",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "JFreeChart v1.5.4 was discovered to contain a NullPointerException via the component /chart/annotations/CategoryLineAnnotation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que JFreeChart v1.5.4 conten\u00eda una excepci\u00f3n NullPointerException a trav\u00e9s del componente /chart/annotations/CategoryLineAnnotation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
55
CVE-2024/CVE-2024-22xx/CVE-2024-2223.json
Normal file
55
CVE-2024/CVE-2024-22xx/CVE-2024-2223.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-2223",
|
||||
"sourceIdentifier": "cve-requests@bitdefender.com",
|
||||
"published": "2024-04-09T13:15:33.057",
|
||||
"lastModified": "2024-04-09T13:15:33.057",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Incorrect Regular Expression vulnerability in Bitdefender GravityZone Update Server allows an attacker to cause a Server Side Request Forgery and reconfigure the relay. This issue affects the following products that include the vulnerable component:\u00a0\n\nBitdefender Endpoint Security for Linux version 7.0.5.200089\nBitdefender Endpoint Security for\u00a0 Windows version 7.9.9.380\nGravityZone Control Center (On Premises) version 6.36.1\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-requests@bitdefender.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-requests@bitdefender.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-185"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.bitdefender.com/support/security-advisories/incorrect-regular-expression-in-gravityzone-update-server-va-11465/",
|
||||
"source": "cve-requests@bitdefender.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-22xx/CVE-2024-2224.json
Normal file
55
CVE-2024/CVE-2024-22xx/CVE-2024-2224.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-2224",
|
||||
"sourceIdentifier": "cve-requests@bitdefender.com",
|
||||
"published": "2024-04-09T13:15:33.357",
|
||||
"lastModified": "2024-04-09T13:15:33.357",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Limitation of a Pathname to a Restricted Directory (\u2018Path Traversal\u2019) vulnerability in the UpdateServer component of Bitdefender GravityZone allows an attacker to execute arbitrary code on vulnerable instances. This issue affects the following products that include the vulnerable component: \n\nBitdefender Endpoint Security for Linux version 7.0.5.200089\nBitdefender Endpoint Security for Windows version 7.9.9.380\nGravityZone Control Center (On Premises) version 6.36.1\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-requests@bitdefender.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-requests@bitdefender.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.bitdefender.com/support/security-advisories/privilege-escalation-via-the-gravityzone-productmanager-updateserver-kitsmanager-api-va-11466/",
|
||||
"source": "cve-requests@bitdefender.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-23078",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T20:15:08.500",
|
||||
"lastModified": "2024-04-08T20:15:08.500",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "JGraphT Core v1.5.2 was discovered to contain a NullPointerException via the component org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que JGraphT Core v1.5.2 conten\u00eda una NullPointerException a trav\u00e9s del componente org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-23079",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T23:15:07.703",
|
||||
"lastModified": "2024-04-08T23:15:07.703",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "JGraphT Core v1.5.2 was discovered to contain a NullPointerException via the component org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que JGraphT Core v1.5.2 conten\u00eda una NullPointerException a trav\u00e9s del componente org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-23081",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T23:15:07.757",
|
||||
"lastModified": "2024-04-08T23:15:07.757",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ThreeTen Backport v1.6.8 was discovered to contain a NullPointerException via the component org.threeten.bp.LocalDate::compareTo(ChronoLocalDate)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que ThreeTen Backport v1.6.8 conten\u00eda una excepci\u00f3n NullPointerException a trav\u00e9s del componente org.treeten.bp.LocalDate::compareTo(ChronoLocalDate)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-23084",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T23:15:07.803",
|
||||
"lastModified": "2024-04-08T23:15:07.803",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Apfloat v1.10.1 was discovered to contain an ArrayIndexOutOfBoundsException via the component org.apfloat.internal.DoubleCRTMath::add(double[], double[])."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que Apfloat v1.10.1 conten\u00eda una excepci\u00f3n ArrayIndexOutOfBoundsException a trav\u00e9s del componente org.apfloat.internal.DoubleCRTMath::add(double[], double[])."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-23085",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T20:15:08.567",
|
||||
"lastModified": "2024-04-08T20:15:08.567",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Apfloat v1.10.1 was discovered to contain a NullPointerException via the component org.apfloat.internal.DoubleScramble::scramble(double[], int, int[])."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que Apfloat v1.10.1 conten\u00eda una NullPointerException a trav\u00e9s del componente org.apfloat.internal.DoubleScramble::scramble(double[], int, int[])."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-23086",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T20:15:08.620",
|
||||
"lastModified": "2024-04-08T20:15:08.620",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Apfloat v1.10.1 was discovered to contain a stack overflow via the component org.apfloat.internal.DoubleModMath::modPow(double."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que Apfloat v1.10.1 contiene un desbordamiento de pila a trav\u00e9s del componente org.apfloat.internal.DoubleModMath::modPow(double."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-23584",
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2024-04-08T23:15:07.850",
|
||||
"lastModified": "2024-04-08T23:15:07.850",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The NMAP Importer service\u200b may expose data store credentials to authorized users of the Windows Registry.\n"
|
||||
"value": "The NMAP Importer service? may expose data store credentials to authorized users of the Windows Registry.\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El servicio NMAP Importer puede exponer las credenciales del almac\u00e9n de datos a usuarios autorizados del Registro de Windows."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-24279",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T20:15:08.673",
|
||||
"lastModified": "2024-04-08T20:15:08.673",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in secdiskapp 1.5.1 (management program for NewQ Fingerprint Encryption Super Speed Flash Disk) allows attackers to gain escalated privileges via vsVerifyPassword and vsSetFingerPrintPower functions."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en secdiskapp 1.5.1 (programa de administraci\u00f3n para NewQ Fingerprint Encryption Super Speed Flash Disk) permite a los atacantes obtener privilegios elevados a trav\u00e9s de las funciones vsVerifyPassword y vsSetFingerPrintPower."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-25646",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-04-09T01:15:48.343",
|
||||
"lastModified": "2024-04-09T01:15:48.343",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Due to improper validation,\u00a0SAP BusinessObject Business Intelligence Launch Pad allows an authenticated attacker to access operating system information using crafted document. On successful exploitation there could be a considerable impact on confidentiality of the application.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Debido a una validaci\u00f3n incorrecta, SAP BusinessObject Business Intelligence Launch Pad permite que un atacante autenticado acceda a informaci\u00f3n del sistema operativo mediante un documento manipulado. Una explotaci\u00f3n exitosa podr\u00eda tener un impacto considerable en la confidencialidad de la solicitud."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26275",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-04-09T09:15:24.260",
|
||||
"lastModified": "2024-04-09T09:15:24.260",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26276",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-04-09T09:15:24.457",
|
||||
"lastModified": "2024-04-09T09:15:24.457",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26277",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-04-09T09:15:24.670",
|
||||
"lastModified": "2024-04-09T09:15:24.670",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-27630",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T21:15:09.983",
|
||||
"lastModified": "2024-04-08T21:15:09.983",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure Direct Object Reference (IDOR) in GNU Savane v.3.12 and before allows a remote attacker to delete arbitrary files via crafted input to the trackers_data_delete_file function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La referencia directa a objetos inseguros (IDOR) en GNU Savane v.3.12 y anteriores permite a un atacante remoto eliminar archivos arbitrarios mediante una entrada manipulada en la funci\u00f3n trackers_data_delete_file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-27631",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T21:15:10.067",
|
||||
"lastModified": "2024-04-08T21:15:10.067",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Request Forgery vulnerability in GNU Savane v.3.12 and before allows a remote attacker to escalate privileges via siteadmin/usergroup.php"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de Cross Site Request Forgery en GNU Savane v.3.12 y anteriores permite a un atacante remoto escalar privilegios a trav\u00e9s de siteadmin/usergroup.php"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-27632",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T22:15:08.413",
|
||||
"lastModified": "2024-04-08T22:15:08.413",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in GNU Savane v.3.12 and before allows a remote attacker to escalate privileges via the form_id in the form_header() function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en GNU Savane v.3.12 y anteriores permite a un atacante remoto escalar privilegios a trav\u00e9s de form_id en la funci\u00f3n form_header()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-27898",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-04-09T01:15:48.583",
|
||||
"lastModified": "2024-04-09T01:15:48.583",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP NetWeaver application, due to insufficient input validation, allows an attacker to send a crafted request from a vulnerable web application targeting internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a\u00a0Server-Side Request Forgery vulnerability. Thus, having a low impact on confidentiality.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La aplicaci\u00f3n SAP NetWeaver, debido a una validaci\u00f3n de entrada insuficiente, permite a un atacante enviar una solicitud manipulada desde una aplicaci\u00f3n web vulnerable dirigida a sistemas internos detr\u00e1s de firewalls que normalmente son inaccesibles para un atacante desde la red externa, lo que resulta en una vulnerabilidad Server-Side Request Forgery. Teniendo as\u00ed un bajo impacto en la confidencialidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-27899",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-04-09T01:15:48.777",
|
||||
"lastModified": "2024-04-09T01:15:48.777",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Self-Registration\u00a0and Modify your own profile in User Admin Application of NetWeaver AS Java does not enforce proper security requirements for the content of the newly defined security answer. This can be leveraged by an attacker to cause profound impact on confidentiality and low impact on both integrity and availability.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Self-Registration and Modify your own profile en User Admin Application de NetWeaver AS Java no exige requisitos de seguridad adecuados para el contenido de la respuesta de seguridad reci\u00e9n definida. Un atacante puede aprovechar esto para causar un profundo impacto en la confidencialidad y un bajo impacto tanto en la integridad como en la disponibilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-27901",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-04-09T01:15:48.993",
|
||||
"lastModified": "2024-04-09T01:15:48.993",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP Asset Accounting could allow a high privileged attacker to exploit insufficient validation of path information provided by the users and pass it through to the file API's. Thus, causing a considerable impact on confidentiality, integrity and availability of the application.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "SAP Asset Accounting podr\u00eda permitir que un atacante con altos privilegios aproveche la validaci\u00f3n insuficiente de la informaci\u00f3n de ruta proporcionada por los usuarios y la pase a las API de archivos. Provocando as\u00ed un impacto considerable en la confidencialidad, integridad y disponibilidad de la aplicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-27983",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-04-09T01:15:49.197",
|
||||
"lastModified": "2024-04-09T01:15:49.197",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client triggering the Http2Session destructor while header frames are still being processed (and stored in memory) causing a race condition."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un atacante puede hacer que el servidor HTTP/2 de Node.js no est\u00e9 completamente disponible enviando una peque\u00f1a cantidad de paquetes de tramas HTTP/2 con algunas tramas HTTP/2 en su interior. Es posible dejar algunos datos en la memoria nghttp2 despu\u00e9s del reinicio cuando los encabezados con el frame de CONTINUATION HTTP/2 se env\u00edan al servidor y luego el cliente cierra abruptamente una conexi\u00f3n TCP activando el destructor Http2Session mientras los frames de encabezado a\u00fan se est\u00e1n procesando (y almacenando en la memoria) causando una condici\u00f3n de ejecuci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-28167",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-04-09T01:15:49.380",
|
||||
"lastModified": "2024-04-09T01:15:49.380",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP Group Reporting Data Collection\u00a0does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. On successful exploitation, specific data can be changed via the Enter Package Data app although the user does not have sufficient authorization causing high impact on Integrity of the appliction.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "SAP Group Reporting Data Collection no realiza las verificaciones de autorizaci\u00f3n necesarias para un usuario autenticado, lo que resulta en una escalada de privilegios. Tras una explotaci\u00f3n exitosa, se pueden cambiar datos espec\u00edficos a trav\u00e9s de la aplicaci\u00f3n Ingresar datos del paquete, aunque el usuario no tiene autorizaci\u00f3n suficiente, lo que causa un alto impacto en la integridad de la aplicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-28224",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T19:15:07.353",
|
||||
"lastModified": "2024-04-08T19:15:07.353",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Ollama before 0.1.29 has a DNS rebinding vulnerability that can inadvertently allow remote access to the full API, thereby letting an unauthorized user chat with a large language model, delete a model, or cause a denial of service (resource exhaustion)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Ollama anterior a 0.1.29 tiene una vulnerabilidad de vinculaci\u00f3n de DNS que puede permitir inadvertidamente el acceso remoto a la API completa, permitiendo as\u00ed que un usuario no autorizado converse con un modelo de lenguaje grande, elimine un modelo o provoque una denegaci\u00f3n de servicio (agotamiento de recursos)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-28270",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T19:15:07.417",
|
||||
"lastModified": "2024-04-08T19:15:07.417",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue discovered in web-flash v3.0 allows attackers to reset passwords for arbitrary users via crafted POST request to /prod-api/user/resetPassword."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema descubierto en web-flash v3.0 permite a los atacantes restablecer contrase\u00f1as para usuarios arbitrarios mediante una solicitud POST manipulada /prod-api/user/resetPassword."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2975",
|
||||
"sourceIdentifier": "security@octopus.com",
|
||||
"published": "2024-04-09T01:15:49.583",
|
||||
"lastModified": "2024-04-09T01:15:49.583",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A race condition was identified through which privilege escalation was possible in certain configurations."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se identific\u00f3 una condici\u00f3n de ejecuci\u00f3n a trav\u00e9s de la cual era posible la escalada de privilegios en ciertas configuraciones."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30189",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-04-09T09:15:24.873",
|
||||
"lastModified": "2024-04-09T09:15:24.873",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30190",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-04-09T09:15:25.117",
|
||||
"lastModified": "2024-04-09T09:15:25.117",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30191",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-04-09T09:15:25.317",
|
||||
"lastModified": "2024-04-09T09:15:25.317",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30214",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-04-09T01:15:49.750",
|
||||
"lastModified": "2024-04-09T01:15:49.750",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The application allows a high privilege attacker to append a malicious GET query parameter to Service invocations, which are reflected in the server response. Under certain circumstances, if the parameter contains a JavaScript, the script could be processed on client side.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La aplicaci\u00f3n permite que un atacante con privilegios elevados agregue un par\u00e1metro de consulta GET malicioso a las invocaciones del Servicio, que se reflejan en la respuesta del servidor. En determinadas circunstancias, si el par\u00e1metro contiene JavaScript, el script podr\u00eda procesarse en el lado del cliente."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30215",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-04-09T01:15:49.953",
|
||||
"lastModified": "2024-04-09T01:15:49.953",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Resource Settings page allows a high privilege attacker to load exploitable payload to be stored and reflected whenever a User visits the page. In a successful attack, some information could be obtained and/or modified. However,\u00a0the attacker does not have control over what information is obtained, or the amount or kind of loss is limited.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La p\u00e1gina Resource Settings permite a un atacante con altos privilegios cargar un payload explotable para almacenarlo y reflejarlo cada vez que un usuario visita la p\u00e1gina. En un ataque exitoso, se podr\u00eda obtener y/o modificar cierta informaci\u00f3n. Sin embargo, el atacante no tiene control sobre qu\u00e9 informaci\u00f3n obtiene, o la cantidad o tipo de p\u00e9rdida es limitada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30216",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-04-09T01:15:50.140",
|
||||
"lastModified": "2024-04-09T01:15:50.140",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cash Management in SAP S/4 HANA does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. By\u00a0exploiting this vulnerability, attacker can add notes in the review request with 'completed' status affecting the integrity of the application.\u00a0Confidentiality and Availability are not impacted.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Cash Management en SAP S/4 HANA no realiza las verificaciones de autorizaci\u00f3n necesarias para un usuario autenticado, lo que resulta en una escalada de privilegios. Al explotar esta vulnerabilidad, el atacante puede agregar notas en la solicitud de revisi\u00f3n con el estado \"completado\" que afecta la integridad de la aplicaci\u00f3n. La confidencialidad y la disponibilidad no se ven afectadas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30217",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-04-09T01:15:50.353",
|
||||
"lastModified": "2024-04-09T01:15:50.353",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cash Management in SAP S/4 HANA does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. By exploiting this vulnerability, an attacker can approve or reject a bank account application affecting the integrity of the application. Confidentiality and Availability are not impacted.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Cash Management en SAP S/4 HANA no realiza las verificaciones de autorizaci\u00f3n necesarias para un usuario autenticado, lo que resulta en una escalada de privilegios. Al explotar esta vulnerabilidad, un atacante puede aprobar o rechazar una solicitud de cuenta bancaria afectando la integridad de la aplicaci\u00f3n. La confidencialidad y la disponibilidad no se ven afectadas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30218",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-04-09T01:15:50.570",
|
||||
"lastModified": "2024-04-09T01:15:50.570",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The ABAP Application Server of SAP NetWeaver as well as ABAP Platform\u00a0allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service. This leads to a considerable impact on availability.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El servidor de aplicaciones ABAP de SAP NetWeaver, as\u00ed como la plataforma ABAP, permiten a un atacante impedir que usuarios leg\u00edtimos accedan a un servicio, ya sea bloqueando o inundando el servicio. Esto tiene un impacto considerable en la disponibilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30676",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T03:15:07.763",
|
||||
"lastModified": "2024-04-09T03:15:07.763",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Denial-of-Service (DoS) vulnerability exists in ROS2 Iron Irwini versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. A malicious user could potentially exploit this vulnerability remotely to crash the ROS2 nodes, thereby causing a denial of service. The flaw allows an attacker to cause unexpected behavior in the operation of ROS2 nodes, which leads to their failure and interrupts the regular operation of the system, thus making it unavailable for its intended users."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en las versiones de ROS2 Iron Irwini donde ROS_VERSION es 2 y ROS_PYTHON_VERSION es 3. Un usuario malintencionado podr\u00eda explotar esta vulnerabilidad de forma remota para bloquear los nodos ROS2, provocando as\u00ed una denegaci\u00f3n de servicio. La falla permite a un atacante provocar un comportamiento inesperado en el funcionamiento de los nodos ROS2, lo que provoca su falla e interrumpe el funcionamiento normal del sistema, haci\u00e9ndolo no disponible para los usuarios previstos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30678",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T03:15:07.830",
|
||||
"lastModified": "2024-04-09T03:15:07.830",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue has been discovered in ROS2 Iron Irwini ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to intercept and access this data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, donde el sistema transmite mensajes en texto plano. Esta falla expone informaci\u00f3n confidencial, haci\u00e9ndola vulnerable a ataques de intermediario (MitM) y permitiendo a los atacantes interceptar y acceder a estos datos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30679",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T04:15:10.087",
|
||||
"lastModified": "2024-04-09T04:15:10.087",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in the default configurations of ROS2 Iron Irwini ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to authenticate using default credentials."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en las configuraciones predeterminadas de ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes no autenticados autenticarse utilizando credenciales predeterminadas."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30680",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T04:15:10.583",
|
||||
"lastModified": "2024-04-09T04:15:10.583",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Iron Irwini in versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de inyecci\u00f3n de Shell fue descubierta en ROS2 (Robot Operating System 2) Iron Irwini en las versiones ROS_VERSION 2 y ROS_PYTHON_VERSION 3, permite a los atacantes ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial debido a la forma en que ROS2 maneja la ejecuci\u00f3n de comandos de Shell en componentes como int\u00e9rpretes de comandos o interfaces que procesan entradas externas."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30681",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T04:15:10.747",
|
||||
"lastModified": "2024-04-09T04:15:10.747",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An OS command injection vulnerability has been discovered in ROS2 Iron Irwini version ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the command processing or system call components in ROS2."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en ROS2 Iron Irwini versi\u00f3n ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s del procesamiento de comandos o componentes de llamadas al sistema en ROS2."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30683",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T04:15:10.877",
|
||||
"lastModified": "2024-04-09T04:15:10.877",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via improper handling of arrays or strings."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad de desbordamiento de b\u00fafer en los componentes C++ de ROS2 Iron Irwini versiones ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante el manejo inadecuado de matrices o cadenas."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30684",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T05:15:47.807",
|
||||
"lastModified": "2024-04-09T05:15:47.807",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An insecure logging vulnerability has been identified within ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to access sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad de registro inseguro en las versiones ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes acceder a informaci\u00f3n confidencial a trav\u00e9s de medidas de seguridad inadecuadas implementadas dentro de los mecanismos de registro de ROS2."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30686",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T05:15:47.853",
|
||||
"lastModified": "2024-04-09T05:15:47.853",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en las versiones ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes o nodos dentro del sistema ROS2."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30687",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T05:15:47.920",
|
||||
"lastModified": "2024-04-09T05:15:47.920",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An insecure deserialization vulnerability has been identified in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad de deserializaci\u00f3n insegura en las versiones ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de una entrada manipulada para los componentes de serializaci\u00f3n y deserializaci\u00f3n de datos, los mecanismos de comunicaci\u00f3n entre procesos y las interfaces de comunicaci\u00f3n de red."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30688",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T05:15:47.980",
|
||||
"lastModified": "2024-04-09T05:15:47.980",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad de carga de archivos arbitraria en las versiones ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para el mecanismo de carga de archivos del sistema ROS2, incluida la funcionalidad del servidor para manejar la carga de archivos y los procesos de validaci\u00f3n asociados."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30690",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T06:15:08.963",
|
||||
"lastModified": "2024-04-09T06:15:08.963",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthorized node injection vulnerability has been identified in ROS2 Galactic Geochelone versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to escalate privileges."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad de inyecci\u00f3n de nodo no autorizada en las versiones ROS2 Galactic Geochelone donde ROS_VERSION es 2 y ROS_PYTHON_VERSION es 3, lo que permite a atacantes remotos escalar privilegios."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30691",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T07:15:08.467",
|
||||
"lastModified": "2024-04-09T07:15:08.467",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 Galactic Geochelone in version ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS2 nodes."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en ROS2 Galactic Geochelone en la versi\u00f3n ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios, obtener informaci\u00f3n confidencial y obtener acceso no autorizado a m\u00faltiples nodos ROS2."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30692",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T07:15:08.560",
|
||||
"lastModified": "2024-04-09T07:15:08.560",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A issue was discovered in ROS2 Galactic Geochelone versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) in the ROS2 nodes."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en las versiones ROS2 Galactic Geochelone ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (DoS) en los nodos ROS2."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30694",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T08:15:07.420",
|
||||
"lastModified": "2024-04-09T08:15:07.420",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30695",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T08:15:07.530",
|
||||
"lastModified": "2024-04-09T08:15:07.530",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30696",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T08:15:07.587",
|
||||
"lastModified": "2024-04-09T08:15:07.587",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30697",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T08:15:07.663",
|
||||
"lastModified": "2024-04-09T08:15:07.663",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30699",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T08:15:07.717",
|
||||
"lastModified": "2024-04-09T08:15:07.717",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30701",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T08:15:07.770",
|
||||
"lastModified": "2024-04-09T08:15:07.770",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3046",
|
||||
"sourceIdentifier": "emo@eclipse.org",
|
||||
"published": "2024-04-09T10:15:08.600",
|
||||
"lastModified": "2024-04-09T10:15:08.600",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-31047",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T23:15:08.023",
|
||||
"lastModified": "2024-04-08T23:15:08.023",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Academy Software Foundation openexr v.3.2.3 and before allows a local attacker to cause a denial of service (DoS) via the convert function of exrmultipart.cpp."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en Academy Software Foundation openexr v.3.2.3 y anteriores permite que un atacante local provoque una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de la funci\u00f3n de conversi\u00f3n de exrmultipart.cpp."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31365",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-09T08:15:07.827",
|
||||
"lastModified": "2024-04-09T08:15:07.827",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31366",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-09T08:15:08.090",
|
||||
"lastModified": "2024-04-09T08:15:08.090",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31367",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-09T09:15:25.520",
|
||||
"lastModified": "2024-04-09T09:15:25.520",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31368",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-09T09:15:25.710",
|
||||
"lastModified": "2024-04-09T09:15:25.710",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31369",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-09T09:15:25.907",
|
||||
"lastModified": "2024-04-09T09:15:25.907",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31370",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-09T09:15:26.100",
|
||||
"lastModified": "2024-04-09T09:15:26.100",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
20
CVE-2024/CVE-2024-315xx/CVE-2024-31544.json
Normal file
20
CVE-2024/CVE-2024-315xx/CVE-2024-31544.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-31544",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T13:15:33.557",
|
||||
"lastModified": "2024-04-09T13:15:33.557",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stored cross-site scripting (XSS) vulnerability in Computer Laboratory Management System v1.0 allows attackers to execute arbitrary JavaScript code by including malicious payloads into \u201cremarks\u201d, \u201cborrower_name\u201d, \u201cfaculty_department\u201d parameters in /classes/Master.php?f=save_record."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/emirhanmtl/vuln-research/blob/main/Stored-XSS-Computer-Laboratory-Management-System-PoC.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31860",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-04-09T09:15:26.293",
|
||||
"lastModified": "2024-04-09T09:15:26.293",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31862",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-04-09T10:15:08.513",
|
||||
"lastModified": "2024-04-09T10:15:08.513",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31863",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-04-09T11:15:31.713",
|
||||
"lastModified": "2024-04-09T11:15:31.713",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31978",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-04-09T09:15:26.387",
|
||||
"lastModified": "2024-04-09T09:15:26.387",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3463",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-08T20:15:08.723",
|
||||
"lastModified": "2024-04-08T20:15:08.723",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in SourceCodester Laundry Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /karyawan/edit. The manipulation of the argument karyawan leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259744."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en SourceCodester Laundry Management System 1.0 y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo /karyawan/edit. La manipulaci\u00f3n del argumento karyawan conduce a cross site scripting. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-259744."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3464",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-08T20:15:08.990",
|
||||
"lastModified": "2024-04-08T20:15:08.990",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Laundry Management System 1.0 and classified as critical. This issue affects the function laporan_filter of the file /application/controller/Pelanggan.php. The manipulation of the argument jeniskelamin leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259745 was assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en SourceCodester Laundry Management System 1.0 y clasificada como cr\u00edtica. Este problema afecta la funci\u00f3n laporan_filter del archivo /application/controller/Pelanggan.php. La manipulaci\u00f3n del argumento jeniskelamin conduce a la inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-259745."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3465",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-08T21:15:10.163",
|
||||
"lastModified": "2024-04-08T21:15:10.163",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Laundry Management System 1.0. It has been classified as critical. Affected is the function laporan_filter of the file /application/controller/Transaki.php. The manipulation of the argument dari/sampai leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-259746 is the identifier assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Laundry Management System 1.0. Ha sido declarada cr\u00edtica. La funci\u00f3n laporan_filter del archivo /application/controller/Pengeluaran.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento dari/sampai conduce a la inyecci\u00f3n de SQL. El identificador asociado de esta vulnerabilidad es VDB-259747."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3466",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-08T21:15:10.587",
|
||||
"lastModified": "2024-04-08T21:15:10.587",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Laundry Management System 1.0. It has been declared as critical. Affected by this vulnerability is the function laporan_filter of the file /application/controller/Pengeluaran.php. The manipulation of the argument dari/sampai leads to sql injection. The associated identifier of this vulnerability is VDB-259747."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Laundry Management System 1.0. Ha sido declarada cr\u00edtica. La funci\u00f3n laporan_filter del archivo /application/controller/Pengeluaran.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento dari/sampai conduce a la inyecci\u00f3n de SQL. El identificador asociado de esta vulnerabilidad es VDB-259747."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
43
README.md
43
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-09T12:00:30.567954+00:00
|
||||
2024-04-09T14:00:38.020013+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-09T11:15:31.713000+00:00
|
||||
2024-04-09T13:20:32.987000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,24 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
244545
|
||||
244548
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `5`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2021-28656](CVE-2021/CVE-2021-286xx/CVE-2021-28656.json) (`2024-04-09T10:15:07.610`)
|
||||
- [CVE-2022-47894](CVE-2022/CVE-2022-478xx/CVE-2022-47894.json) (`2024-04-09T10:15:08.343`)
|
||||
- [CVE-2024-3046](CVE-2024/CVE-2024-30xx/CVE-2024-3046.json) (`2024-04-09T10:15:08.600`)
|
||||
- [CVE-2024-31862](CVE-2024/CVE-2024-318xx/CVE-2024-31862.json) (`2024-04-09T10:15:08.513`)
|
||||
- [CVE-2024-31863](CVE-2024/CVE-2024-318xx/CVE-2024-31863.json) (`2024-04-09T11:15:31.713`)
|
||||
- [CVE-2024-2223](CVE-2024/CVE-2024-22xx/CVE-2024-2223.json) (`2024-04-09T13:15:33.057`)
|
||||
- [CVE-2024-2224](CVE-2024/CVE-2024-22xx/CVE-2024-2224.json) (`2024-04-09T13:15:33.357`)
|
||||
- [CVE-2024-31544](CVE-2024/CVE-2024-315xx/CVE-2024-31544.json) (`2024-04-09T13:15:33.557`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `79`
|
||||
|
||||
- [CVE-2024-30688](CVE-2024/CVE-2024-306xx/CVE-2024-30688.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-30690](CVE-2024/CVE-2024-306xx/CVE-2024-30690.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-30691](CVE-2024/CVE-2024-306xx/CVE-2024-30691.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-30692](CVE-2024/CVE-2024-306xx/CVE-2024-30692.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-30694](CVE-2024/CVE-2024-306xx/CVE-2024-30694.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-30695](CVE-2024/CVE-2024-306xx/CVE-2024-30695.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-30696](CVE-2024/CVE-2024-306xx/CVE-2024-30696.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-30697](CVE-2024/CVE-2024-306xx/CVE-2024-30697.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-30699](CVE-2024/CVE-2024-306xx/CVE-2024-30699.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-30701](CVE-2024/CVE-2024-307xx/CVE-2024-30701.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-31047](CVE-2024/CVE-2024-310xx/CVE-2024-31047.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-31365](CVE-2024/CVE-2024-313xx/CVE-2024-31365.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-31366](CVE-2024/CVE-2024-313xx/CVE-2024-31366.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-31367](CVE-2024/CVE-2024-313xx/CVE-2024-31367.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-31368](CVE-2024/CVE-2024-313xx/CVE-2024-31368.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-31369](CVE-2024/CVE-2024-313xx/CVE-2024-31369.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-31370](CVE-2024/CVE-2024-313xx/CVE-2024-31370.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-31860](CVE-2024/CVE-2024-318xx/CVE-2024-31860.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-31862](CVE-2024/CVE-2024-318xx/CVE-2024-31862.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-31863](CVE-2024/CVE-2024-318xx/CVE-2024-31863.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-31978](CVE-2024/CVE-2024-319xx/CVE-2024-31978.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-3463](CVE-2024/CVE-2024-34xx/CVE-2024-3463.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-3464](CVE-2024/CVE-2024-34xx/CVE-2024-3464.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-3465](CVE-2024/CVE-2024-34xx/CVE-2024-3465.json) (`2024-04-09T12:48:04.090`)
|
||||
- [CVE-2024-3466](CVE-2024/CVE-2024-34xx/CVE-2024-3466.json) (`2024-04-09T12:48:04.090`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
161
_state.csv
161
_state.csv
@ -173244,7 +173244,7 @@ CVE-2021-28651,0,0,f93d5b14e9edfd0c7d6c1f20d832040462fce8e41449e94e4223abf4af0c4
|
||||
CVE-2021-28652,0,0,3de577cd8b68362d13504ea8b7b94932e7446acae8c4f0c9b8ac01de5be255b4,2023-11-07T03:32:17.730000
|
||||
CVE-2021-28653,0,0,bd516222c2739e55d76b929804ff1b5fe32a605eae16ed548f9480526e7a6107,2021-08-27T14:55:11.860000
|
||||
CVE-2021-28655,0,0,f05025022982248c0aa0286bf9f5ea6d2b2662f6d8f66cb2a7c1478371d0b50e,2023-11-07T03:32:17.810000
|
||||
CVE-2021-28656,1,1,3998ee35a42c8f382056cbf4f173e6ecbd2d2c79955efb97a5daedf4e01fbc4f,2024-04-09T10:15:07.610000
|
||||
CVE-2021-28656,0,1,71da341e943fcbb2ca65abbeda1e2289896bc83652315b75220769e42c306657,2024-04-09T12:48:04.090000
|
||||
CVE-2021-28657,0,0,edc846f7622359305d96151fb90be8e69037698b5a7084b0ba6857b492a35ec1,2023-11-07T03:32:17.897000
|
||||
CVE-2021-28658,0,0,fd380e2c26dc7e10eb20d77575a858579041b141f61b8815462af50a61528fd0,2023-11-07T03:32:17.980000
|
||||
CVE-2021-28660,0,0,3b585e9f34be9d91329d52a640684f2db5b2db983300a3c817e973f466e64e5e,2023-11-09T14:44:33.733000
|
||||
@ -202890,7 +202890,7 @@ CVE-2022-36706,0,0,de7477060184c6cff9abe4772c0125bf31cfc87765eb99a20d7df4da001db
|
||||
CVE-2022-36707,0,0,d3eb38d1feaf5dba4f0def739432283a3e2176588db034b2fcc0b995be314951,2023-11-07T03:49:40.277000
|
||||
CVE-2022-36708,0,0,0ee8d1842750906a7976bf36ebb5bd60789abcd5e1b5240c681d954257433011,2022-09-01T13:18:10.467000
|
||||
CVE-2022-36709,0,0,92fae72d3c833ddad9e9b7b60e9d4567e2afabc9b49dc9cd4f9748d67689c823,2022-09-01T06:50:41.003000
|
||||
CVE-2022-3671,0,0,1097dd73c4003e062a451bb08ad24b3944b5e839cd248e6b956b42ebbe490de4,2024-04-04T17:15:08.060000
|
||||
CVE-2022-3671,0,1,0e606a113cf0ddcfcfe175a68f5d875f8e162baaacd109c3b2794313d558e016,2024-04-09T13:20:32.987000
|
||||
CVE-2022-36711,0,0,dd666c7309d4fb74ddbff83da0478e38903c8c81d015eb898fcb8c722302f377,2022-09-01T06:51:02.083000
|
||||
CVE-2022-36712,0,0,f6ae50d102134447658290fabc690f8f9247c2bcae392cb109bce6cf6729ba9f,2022-09-01T06:54:01.957000
|
||||
CVE-2022-36713,0,0,08280a195165695be47d2e8fbcf5379d9ea71cedafc4633a72176ddeec410351,2022-09-01T06:58:32.880000
|
||||
@ -210921,7 +210921,7 @@ CVE-2022-4789,0,0,f1d77b16a882c065a994d407ae15e8654000fcc23c0521f9bc89bbdc88d3ea
|
||||
CVE-2022-47891,0,0,6dedff18f34cc77291973ebe182b94d8c421b8c96c9ef4b91fe9f7e1c80b5399,2023-10-04T19:57:52.210000
|
||||
CVE-2022-47892,0,0,014317681f4f5fd875b23ba58c6a9232c2ca925a78d6a53582cee8dc82bbb4ee,2023-10-04T19:57:39.830000
|
||||
CVE-2022-47893,0,0,f4592b6a6c8fa73a0d0605e5be420354e5d9826474eb8090f0d7000aea6904f0,2023-10-04T19:57:30.303000
|
||||
CVE-2022-47894,1,1,593c201c592bb8bfc6cba8d413a478be24c5a715960f8d0740bdbdbe07cf6bd3,2024-04-09T10:15:08.343000
|
||||
CVE-2022-47894,0,1,e401d392b583da5e9b36ee551251ee1b3066ca7e899def4f14ac5436e3453044,2024-04-09T12:48:04.090000
|
||||
CVE-2022-47895,0,0,4d2831ee9ad8f11acf52954a3507339b6bec3debec24ea17f62d0a6b882a629c,2022-12-29T16:26:24.367000
|
||||
CVE-2022-47896,0,0,d4993944299a87a0e4bc5169c26adbdcc624a2649cd920d6690b1830154087bc,2022-12-29T17:28:18.063000
|
||||
CVE-2022-4790,0,0,832b4d6df8a6dff865d108a14c28fb7677a8ffbd0bdcde0190157e99b5fef6c2,2023-11-07T03:58:56.803000
|
||||
@ -212557,8 +212557,8 @@ CVE-2023-1078,0,0,511609a0c59908bbbfd669b928235b7512f041dd9bdda4f9d4aa59bc0de4fc
|
||||
CVE-2023-1079,0,0,c957625d6e93673583754b046286151c3cd5fbd016a01d7a69f7d70a7c63b668,2023-05-03T14:15:21.417000
|
||||
CVE-2023-1080,0,0,70bd3fc2fb1692dcf2fc26cf04bb9990210d8f3f5ec66f4981136378db9d3554,2023-11-07T04:02:27.867000
|
||||
CVE-2023-1081,0,0,b273c9bef457fc15606daa02d3a072ec86e12d529c1024b5a0af4c11f428d418,2023-03-04T02:06:16.360000
|
||||
CVE-2023-1082,0,0,bacbdaede1f7d1854710c69a85c220f9a9520fa08806af5806104705d9d79b69,2024-04-09T09:15:19.643000
|
||||
CVE-2023-1083,0,0,ef22926887513db591d148973a6d60b2400d46ac1befd0a9cf1528d2b9aa0fce,2024-04-09T09:15:19.937000
|
||||
CVE-2023-1082,0,1,4345b71e2a00dccdd5682dbfac02460b2f62fd61aeda4f4e0a0937488d0f2bec,2024-04-09T12:48:04.090000
|
||||
CVE-2023-1083,0,1,9985565f9697f9654ec7713992afab1f5ac57e1c5ff8666d0e7287e85f87752f,2024-04-09T12:48:04.090000
|
||||
CVE-2023-1084,0,0,3054e5242d362a68ea08e022b551d34084860b4abaaaa0f45ac4db023b69c389,2023-03-15T14:27:48.850000
|
||||
CVE-2023-1086,0,0,702b24e8f7e0089ff9dc60e6d96d9d1b0b33917c9db0a213d103833ec4288284,2023-11-07T04:02:28.057000
|
||||
CVE-2023-1087,0,0,b90e3b61ee499a3d5cc3c6de6c9f228b5f24fb833cd07f821e23e0c192544906,2023-11-07T04:02:28.193000
|
||||
@ -235272,7 +235272,7 @@ CVE-2023-50808,0,0,8c416c054c26be865b4d8688f52c713fbfd724e8770c5464ef0c943565a6d
|
||||
CVE-2023-5081,0,0,8e24ba17156a8dae7a7282a8cfaf28621f0db12df779ff326aab5dfe7d321c92,2024-01-26T16:02:59.793000
|
||||
CVE-2023-50811,0,0,e11d12fe06d3263d13bd34dc62f9ff2fc3ab15ee416948ff7751555ca8a7212c,2024-03-20T13:00:16.367000
|
||||
CVE-2023-5082,0,0,97172c8fbce61eac9fc72656ad386d4e72feed6ef36293b815eddf08e7cd3cf2,2023-11-14T15:33:18.273000
|
||||
CVE-2023-50821,0,0,ce9a5490e4bd92a4e5735140944ea2fae179ab96eb9556eadc633d2300cec72e,2024-04-09T09:15:21.270000
|
||||
CVE-2023-50821,0,1,44b671c824ee87794c64134a5584c1475710f239b2544f75ec4c23279577ebf1,2024-04-09T12:48:04.090000
|
||||
CVE-2023-50822,0,0,8ee2c68da13959d83e13d29c60b1ba2257ab3db8a3826fb5c84c7b87338d1212,2024-01-02T20:54:13.893000
|
||||
CVE-2023-50823,0,0,40af9a64fda216779fc94da775602fd54727f3bbddbba35015eaf0f9183e1c11,2023-12-29T04:10:31.830000
|
||||
CVE-2023-50824,0,0,58a5beaa87c24d14af04b4cb9f3a0b2aa77e314a67ef35efeda046b2604b58de,2023-12-29T04:10:48.907000
|
||||
@ -238147,8 +238147,8 @@ CVE-2024-0078,0,0,65ef1b62c09f229e677e8506d114a0ad3f4b855306a2baa770a721ed0ba97b
|
||||
CVE-2024-0079,0,0,a48198aa8d1b8e21233ccb1563194a0dce57e3cb1ac8f4c28d49144e25d1a534,2024-03-28T02:01:13.303000
|
||||
CVE-2024-0080,0,0,6c0d206dd91620b9eed7dc804b37cabf92e6b94b99ac768289c8d5abe0e718c9,2024-04-08T18:49:25.863000
|
||||
CVE-2024-0081,0,0,7224cfd553042ae01e2abfd02f661fee4ab9e15edf612773f3a2b6523001079f,2024-04-08T18:49:25.863000
|
||||
CVE-2024-0082,0,0,ae991367e08225121157180c24a5fdbb166425d7192b60b9395f4a4f24a46bf6,2024-04-08T22:15:07.993000
|
||||
CVE-2024-0083,0,0,53d00967f7407453d60abb433b5aefae44d594b137a7afac7fbffae58a630f23,2024-04-08T22:15:08.203000
|
||||
CVE-2024-0082,0,1,2f8bf036b6ccf9a376740e76b27024fe830e6e0ae585ea5b083515d36ff830e7,2024-04-09T12:48:04.090000
|
||||
CVE-2024-0083,0,1,ab832b2e89667613797d661d736b6cac31cc3f4854c5fe470b78e46bd7a9f856,2024-04-09T12:48:04.090000
|
||||
CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf73,2024-03-13T18:15:58.530000
|
||||
CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000
|
||||
CVE-2024-0156,0,0,47a5ee4f12284e0f109441891942aa0eb589b2387e172b6366b6741bcabc51b4,2024-03-04T13:58:23.447000
|
||||
@ -238874,7 +238874,7 @@ CVE-2024-1019,0,0,27c6fed97db80e9684966512d657c2ae1b8d86be0f46f2f894fd714e51d0d5
|
||||
CVE-2024-1020,0,0,4c2c67d1272a1241939200f4f72c9a4b440d9da781cef4eac80461cd259df11b,2024-03-21T02:51:32.967000
|
||||
CVE-2024-1021,0,0,1eaf33062f30028d852272789fbe1f3c95b6597cfa3d193da2a9c2b146b71925,2024-03-21T02:51:33.050000
|
||||
CVE-2024-1022,0,0,bf7c09b8fcc7f97c5a24a4c708297fbca74621e9fdb442e444ef6e47ad6eb0de,2024-03-21T02:51:33.147000
|
||||
CVE-2024-1023,0,0,9ee92eacbb88b3a332d00d2f435c33ab1fd5765d942fefa4d1a8192f971c38ba,2024-04-04T16:15:08.140000
|
||||
CVE-2024-1023,0,1,68bde2f3580eb45ab5d6f3ebb52c2d06f8d25be5075193a68e136d0ef3abff5b,2024-04-09T12:15:07.627000
|
||||
CVE-2024-1024,0,0,7e6c1b50133d41206c0ea240e83269bb1fd6bdba3336e6ba3bdaf2e921f883f4,2024-03-21T02:51:33.253000
|
||||
CVE-2024-1026,0,0,fa3a6e8906b5c145d772b6778f9660482bd1e1779e8012ee6ee53f0f577f7493,2024-03-21T02:51:33.340000
|
||||
CVE-2024-1027,0,0,3c9d16741461ee6b8dbdb696da6c985fd26dd1ea5f6d61c74f8e0497827db059,2024-03-21T02:51:33.427000
|
||||
@ -239045,7 +239045,7 @@ CVE-2024-1226,0,0,14a580d4b3eab4674d6ae40acd0cb53f118cafa2e8004e611e071913cd041f
|
||||
CVE-2024-1227,0,0,94dce1bd607b6903e23d54a7d6b05a85e9dc37b645ba64935d33bd38f11890aa,2024-03-12T16:02:33.900000
|
||||
CVE-2024-1231,0,0,3fff2a2694f3a2890eda32488c438fe0ab80785883b0aefb67199c2eabc0d967,2024-03-25T13:47:14.087000
|
||||
CVE-2024-1232,0,0,81ffaff2fe8cf56a0d46a46e2b9143fea880c36e9a04adedcc45af5366b69d08,2024-03-25T13:47:14.087000
|
||||
CVE-2024-1233,0,0,66e9943f5b5e13d3ef1ae4141f8c5704521c004fb541b327a415bfaeb3b7fc3a,2024-04-09T07:15:08.060000
|
||||
CVE-2024-1233,0,1,71578d7fb30bc4f85d145f45b8ac30dca6f7b0255a469b5ec97436fd2fcdf196,2024-04-09T12:48:04.090000
|
||||
CVE-2024-1234,0,0,10bf76d85736c4b378a9976629da6145bfb7982a9ab0c7c6ab2d12ef2ec14081,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1235,0,0,d2a82644fe0f13d7f102d5a1aae3143ef6375c6fdad53b56b8e4ac09c1d55fdb,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1236,0,0,88f351cdece6c13383e2ef64090741dd27c149d6d5fc4eae9681e06c5b4747c4,2024-02-29T13:49:29.390000
|
||||
@ -239095,7 +239095,7 @@ CVE-2024-1294,0,0,1a6fde55ee17952393d258a28e1938bfe41cafec05fa305cc82057814b7c2b
|
||||
CVE-2024-1296,0,0,ab648d9dba58ca530bb990b50d92c4f5ce9f591faa8fbeeb49385095b8425c33,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1297,0,0,1fc219bb038ab422185a999365115aff94759fe3e5ff94e3dc4180f1d6bc82d0,2024-02-20T19:50:53.960000
|
||||
CVE-2024-1299,0,0,165a6e5bf7396c9871edb84a6ce28d3386b33fd34eb9238065e890fa150a178a,2024-03-07T13:52:27.110000
|
||||
CVE-2024-1300,0,0,719eaee7c93c572fb19b10a479f15b73430ece34c0a0712bc6a25cc9815e6c2b,2024-04-04T16:15:08.410000
|
||||
CVE-2024-1300,0,1,c053226189aff0bb246575256884750e37eeb25be7ab97ceb9ee36674f7e9ade,2024-04-09T12:15:07.853000
|
||||
CVE-2024-1301,0,0,68d5e322fab21220735382791ea9287e8104e954fa5bc7b1f8f02021f25e280b,2024-03-12T17:46:17.273000
|
||||
CVE-2024-1302,0,0,e42b35f7a02693024fada8fec8e812444e0bb721c54c537bf6c1b8db8c60ce66,2024-03-12T17:46:17.273000
|
||||
CVE-2024-1303,0,0,d6386ac67e1b3bd9c657849a1747229ab86034b9c989d20fb5cde0be8bba0359,2024-03-12T17:46:17.273000
|
||||
@ -239332,7 +239332,7 @@ CVE-2024-1653,0,0,875a0ad46333e774de4f895ea6a9ead74cdbdb6ae6c4ddb02a960bfb85513a
|
||||
CVE-2024-1654,0,0,ac0509f6deb6f3ed4a3e95d25ed4dd3bdd67f0f87914e461aded05c6f6644ae7,2024-03-14T12:52:09.877000
|
||||
CVE-2024-1658,0,0,bd2757c2314dc2f8bd52ce15b18a6ca41069d2e3f9ff401d7a725ad82b1db09d,2024-03-18T19:40:00.173000
|
||||
CVE-2024-1661,0,0,f00eb2f2c3ce60fab79d51162055435d68cf3cf34607838bd07b04f2f9625a7f,2024-03-21T02:51:44.103000
|
||||
CVE-2024-1664,0,0,d44b304f4d2e9fb868c37e41062a28e28d439c03500b6ce19eb20ded1c1b3e37,2024-04-09T05:15:47.703000
|
||||
CVE-2024-1664,0,1,c240cf09d136b8ae3766d60b95066ae5935a6052d7cd59ed400a537e65636ac2,2024-04-09T12:48:04.090000
|
||||
CVE-2024-1668,0,0,5ab0efbb5f521102a265a18c62e4efdda2d28d47a9245ca5f6f130ff2a6275be,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1669,0,0,3362eeabf5b6399fda046d3f728ab967509d79cc74a91c5ce260a94031135ec7,2024-02-26T16:27:52.577000
|
||||
CVE-2024-1670,0,0,ae75c94f0b29c0a28e4a7c87bcbb408051ef24e0c713cce4805624b9b431840f,2024-02-26T16:27:52.643000
|
||||
@ -240484,6 +240484,7 @@ CVE-2024-22226,0,0,0d0a641f57bdd270587828a9a2bed46d21e4a42e20578c34da0758c83220e
|
||||
CVE-2024-22227,0,0,da75d9c9489c29f1cc0bee36d7764c9cdfb4cf2b057bac2e908e6263109bed68,2024-02-15T06:25:36.360000
|
||||
CVE-2024-22228,0,0,78d2b6e91237b41440665215c9b4e77ccc8811641b8c3516a01f9391d6778f85,2024-02-15T06:25:45.463000
|
||||
CVE-2024-22229,0,0,942079f7535239209609b5cbc34a85ff0a40c69533135771fdb6410ce1778e0c,2024-01-30T23:01:36.513000
|
||||
CVE-2024-2223,1,1,b9394b41c5ff25167dbdb41b6fa21ce84c4693127e445f9ee3172be3cb406ea8,2024-04-09T13:15:33.057000
|
||||
CVE-2024-22230,0,0,1dba8e437bacd8d1f2a5a22c03d0799f6c41b12fb7346ebf5256856880ee3b1a,2024-02-15T06:25:53.660000
|
||||
CVE-2024-22233,0,0,0fe59b4b663f0c6d5b9043fb5ee923bedfa271d937aabb2465577a5f1e4e3b27,2024-01-29T17:24:16.230000
|
||||
CVE-2024-22234,0,0,ed66ea75d4f91bd4cf760a873ffa711eec74e184d0ed1b507bd27dedbdd28669,2024-03-15T11:15:08.857000
|
||||
@ -240492,6 +240493,7 @@ CVE-2024-22236,0,0,8201be843ca4fddc3e50d61ba00eee488c4be6cba8a9459a0251fd7b88b77
|
||||
CVE-2024-22237,0,0,e71897597855cd1424c518c72383f574819812eafb673db1067e39ca6ce39465,2024-02-10T04:12:42.680000
|
||||
CVE-2024-22238,0,0,7cde94c40824c59018efefacd980beca9642688e0bc3a9b4bd234ac24d76c945,2024-02-10T04:12:32.263000
|
||||
CVE-2024-22239,0,0,bbc3a472e1d6ecc835cd57fa3021e572fa71f1c8c62196314a99a704e393b5ba,2024-02-10T04:12:18.850000
|
||||
CVE-2024-2224,1,1,a5f03c3b51882a76a16e4634523cdb70045bec8e9e82ca12ff3b0d02ee379833,2024-04-09T13:15:33.357000
|
||||
CVE-2024-22240,0,0,9d0b72097aa3b0fcd2ce100bde56bd14382bcab6c31de68e5fe9354868ac9639,2024-02-10T04:11:57.463000
|
||||
CVE-2024-22241,0,0,496f061bf551a3619640a70a8bba0bd7b22a646ffcd7631f69738ec433aa1245,2024-02-10T04:11:46.267000
|
||||
CVE-2024-22243,0,0,cd5131de758a556ae754d98313ecfca987f6ffd9ea403d0f3d0f2e39b0761770,2024-02-23T16:14:43.447000
|
||||
@ -240783,7 +240785,7 @@ CVE-2024-22938,0,0,d14c96ecc84394e0c226b15d653363af8f866fc8a362ffe8912d5673a5fc1
|
||||
CVE-2024-22939,0,0,98ae5450b25ceaff1169d7851ac12cb3d1f8ed4212f5c71a0110eb042c52a6d7,2024-02-29T13:49:29.390000
|
||||
CVE-2024-2294,0,0,7adaa24a33704366500d65a38c52ba5d5887ad22bed1bd0562d7b36efb6d901e,2024-03-17T22:38:29.433000
|
||||
CVE-2024-22942,0,0,27e1b96b16010d66938a1930cd0293d602396f85521af099c802bf269035b527,2024-01-18T15:15:47.273000
|
||||
CVE-2024-22949,0,0,9f50a76ffcc828af29dfdda45bb6ef0b8b7a02fa40b7a257176056a4d5139f2a,2024-04-08T23:15:07.647000
|
||||
CVE-2024-22949,0,1,5a39ec4e6a69cf95914d802d151998eb5762c2e80f80af227e65b64f7b64e313,2024-04-09T12:48:04.090000
|
||||
CVE-2024-22955,0,0,4ae6e1e162ac27be2c1563f300454f76989ec1b9814e0f4be1652f56a6f11be5,2024-01-25T14:54:48.427000
|
||||
CVE-2024-22956,0,0,2da6b272cb072bcb92b74c4c5c3faca0048e5b46583e9ffdd9571398ebecd789,2024-01-25T14:55:01.053000
|
||||
CVE-2024-22957,0,0,045bad9ba8bb739147d8dcd83b4e5a0ded4b848e11c744629a53c265926b4f4e,2024-01-25T14:59:59.737000
|
||||
@ -240808,14 +240810,14 @@ CVE-2024-23059,0,0,1ae620a0d7759193ae34540a4455aa9c0a81f947f508fbecbd634aa926d83
|
||||
CVE-2024-23060,0,0,293f3db63669f513fdf6243d872feab4a40014b3abd2eff3b8edca7a0ed1b3d3,2024-01-18T15:17:35.587000
|
||||
CVE-2024-23061,0,0,d40b225d92d8f0f0d47201622b24e50bc3550ed3e56a2682a133a8aeae5027e3,2024-01-18T15:18:14.357000
|
||||
CVE-2024-2307,0,0,4b089dd0281a455952ab30b1c14e2b1725f875efc3e98fe223b3d9160259d255,2024-03-20T13:00:16.367000
|
||||
CVE-2024-23078,0,0,6ccdfef45001c815b1c8a321f5fdb93824801b7a858b705656dc577c4b59c206,2024-04-08T20:15:08.500000
|
||||
CVE-2024-23079,0,0,0dcc3d3975c6d390e57d0a9e44bbb6bb70a660da60e8f2c822dce166e4beb639,2024-04-08T23:15:07.703000
|
||||
CVE-2024-23078,0,1,9d7aaea68d8acb3538ca428049148f2dac206a89706e35d40108cb3eb8be6ee5,2024-04-09T12:48:04.090000
|
||||
CVE-2024-23079,0,1,c1744d41ef3d7ad1d99296d598f8fcec333fcf26813851f4f429e9678b14abb3,2024-04-09T12:48:04.090000
|
||||
CVE-2024-2308,0,0,e35ab419c5c511708eb8574821633f88a1168237ea61ded1d7aa5b331f06479a,2024-03-17T22:38:29.433000
|
||||
CVE-2024-23081,0,0,f13f502b7e2e1db8066ddc5074d5b80e3cc891b8e742f30ea256fa56155c64d6,2024-04-08T23:15:07.757000
|
||||
CVE-2024-23081,0,1,9fa2a613be75462894d464b8e34e68b6da9b9d59d63e22685e547814dd9a5ab9,2024-04-09T12:48:04.090000
|
||||
CVE-2024-23082,0,0,0a9e38aa01f043532a8be7b3040bd9f24c4cb812cc5c2c38c18325d962369a71,2024-04-08T18:48:40.217000
|
||||
CVE-2024-23084,0,0,cc3fe5e43e6cc3d4fe9878fcdf7855182620a14f9f8ea54d74f3c390c55eec58,2024-04-08T23:15:07.803000
|
||||
CVE-2024-23085,0,0,c8b0d35c4a557d6e919fb6d1242860cc216cbb10b6bb40b4d8c08dbe656610b0,2024-04-08T20:15:08.567000
|
||||
CVE-2024-23086,0,0,65368b69d6d0eef07e38824732b878b0b1f0c0abb48bc5df2794ee9fdf0b94d1,2024-04-08T20:15:08.620000
|
||||
CVE-2024-23084,0,1,82d7094530d5cd6c77dbe215344f65b7328c1ecf1670686e248abcdd712b3b36,2024-04-09T12:48:04.090000
|
||||
CVE-2024-23085,0,1,f435d93167b9f4a31bec2831629dfa7b34bb533a49bb29329c43fee636db5bac,2024-04-09T12:48:04.090000
|
||||
CVE-2024-23086,0,1,d8559a198e6f56b9e1a9a9c93fee6add743a34a70b05d723355a013a78276599,2024-04-09T12:48:04.090000
|
||||
CVE-2024-23094,0,0,8b7fd2c37601b9f636934db44ed8e567ef20eff4d921df465afdbb6ef925a041,2024-02-22T19:07:27.197000
|
||||
CVE-2024-23108,0,0,4bd66ae4e2150cd9c3073e095bacf489de77af9a273b611e130c3e3fa4edf7ea,2024-02-07T15:02:00.203000
|
||||
CVE-2024-23109,0,0,c2686a38cd2651bfef8ab0e98ee0dbcce98e98fd7c1f1805290cb9df9c03fe78,2024-02-07T15:04:28.237000
|
||||
@ -241056,7 +241058,7 @@ CVE-2024-2355,0,0,3245d70a394465f76ff5f05fc26b95bf0c5d50d1856adb39bb340583679667
|
||||
CVE-2024-23550,0,0,233aa541fdda788f0e4e95c8a9a0a8f5d7fa7689dcd559af0cf5e5843a531076,2024-02-13T00:57:33.613000
|
||||
CVE-2024-23553,0,0,51ea2d50cc1ff4dbab518de2a29e9ef6a91bd6b91073c23eb1a7f0cb7c8f1090,2024-02-10T00:59:00.423000
|
||||
CVE-2024-2357,0,0,2af3f167a5f07c033333870e1f5044e9ac66d1548287fd20eff05541e2132cfb,2024-03-23T03:15:12.690000
|
||||
CVE-2024-23584,0,0,7c11631f47a9cd8d18bc29523d2c089eb4e039bce017c0ddd915e33188a191fd,2024-04-08T23:15:07.850000
|
||||
CVE-2024-23584,0,1,8c37acacf967b7c4f5ab4bd2dcef23f1fcd96f524843cdbf02653297c633df30,2024-04-09T12:48:04.090000
|
||||
CVE-2024-23591,0,0,f4c08614f6a162f49ecc99f020c088036b0b565e06b57796e1304b45ae78e59d,2024-02-20T22:15:08.353000
|
||||
CVE-2024-23592,0,0,8410729adf8ea2140a95009744b2dfc023c8f0c5b5843d18404a4118ed1b693b,2024-04-08T18:49:25.863000
|
||||
CVE-2024-23603,0,0,2b536971fe4d260603348583e5e85d59f5debd4cec090f729c87a6dbde3a5ce7,2024-02-14T18:04:45.380000
|
||||
@ -241414,7 +241416,7 @@ CVE-2024-24272,0,0,8f6883745a139dd4938d495410234eff50fc737ee779757f8e18a902dca99
|
||||
CVE-2024-24275,0,0,5ee5552d1ccdff1349c63c1ee819e4122e7275d9cd64505362d94567de774ca6,2024-03-06T15:18:08.093000
|
||||
CVE-2024-24276,0,0,c0b996f05c041cdec9f97004ccc67bd94d1c66cbf22b8df3dba73751978abd1f,2024-03-06T15:18:08.093000
|
||||
CVE-2024-24278,0,0,3f7eb60b847e1971c5f65cb683e6174dee6547147c3195ceb2f7499f12bdbd36,2024-03-06T15:18:08.093000
|
||||
CVE-2024-24279,0,0,72cb9013f2c4652ca9f1c2703573803355b3f3c49810cb9ea2ecf22280c02f6e,2024-04-08T20:15:08.673000
|
||||
CVE-2024-24279,0,1,d350732cc4ca29b60cc89e1436f10a4364ab08631ecd4190bd1db7c1d3d102d3,2024-04-09T12:48:04.090000
|
||||
CVE-2024-24291,0,0,ed81ca1f7d07ab5682e5dc3e12510be85bd8028a8e8a8fb1a80b96c7b9ae97e4,2024-02-13T20:13:26.593000
|
||||
CVE-2024-24300,0,0,a8dc475a562e17ac269ab87541d5cc3de5e8b25ad6f69c16a9e202ce4fe0a524,2024-02-15T06:23:39.303000
|
||||
CVE-2024-24301,0,0,eea9ef656f8457ca391649537e978f0d3e4722722df26eae84433b0c4b119a98,2024-02-15T06:23:39.303000
|
||||
@ -242065,7 +242067,7 @@ CVE-2024-25642,0,0,bf91eeb1502dedca60fe6c035b93d7dfc5a440bc6932322c6ae4d128b4c7c
|
||||
CVE-2024-25643,0,0,08f3e6c0d454841d4e4dc84aae81812246ffbd96bb71cc2e9e4566cd4077e910,2024-02-13T14:01:07.747000
|
||||
CVE-2024-25644,0,0,cad748db94c87605f745ac8efbb54ef36e9bf866e1bcdbdf96bff9a05dfcf738,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25645,0,0,611af6391fb4617a6b65e5d2ff91bac5a4003873b65f133d0cd2495d911bd094,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25646,0,0,c75d00751fed3de8449144392cb0585f29e46e25016c4f17748ae725d45561c2,2024-04-09T01:15:48.343000
|
||||
CVE-2024-25646,0,1,4c3fff51352b6a263ea60efd6f0f793331eb0c3a48316710a84a88b50103400a,2024-04-09T12:48:04.090000
|
||||
CVE-2024-25649,0,0,3e37b8e86c2aaae32174cb72f32869171ec886cd62bb95537557a32583b80d63,2024-03-14T12:52:09.877000
|
||||
CVE-2024-2565,0,0,f29b341373f4135f8349505114db202bd5fab0820f3e8d9e62cea3dd3d097a89,2024-03-21T02:52:38.533000
|
||||
CVE-2024-25650,0,0,dc8b4afe4a9ab50c0ebaf06dbcbf0134b9648b4ff2232925762633c6b3fe0179,2024-03-14T12:52:16.723000
|
||||
@ -242410,9 +242412,9 @@ CVE-2024-26268,0,0,5610a607715d86daa93e5e6c15868d417df615ed9f90516b74424ddbc8ecb
|
||||
CVE-2024-26269,0,0,a4fbc0291a87f253fbb7c7919e7305be398b5ac09a381b89bf9bf742bc0ec462,2024-02-22T19:07:37.840000
|
||||
CVE-2024-2627,0,0,e625366ce2705b71a33576e7d95a513ed311d73cf47b2a264208ec2a1b01e605,2024-04-01T15:22:56.233000
|
||||
CVE-2024-26270,0,0,d6490f7916a3708559119c4b06da9ae5a8dea9c128a10a8333261b0f96cb6dc3,2024-02-20T19:50:53.960000
|
||||
CVE-2024-26275,0,0,bd792bc6eb56b6e7ec3eac2d81482c0283901331aec1fa97e901a186b7a7de28,2024-04-09T09:15:24.260000
|
||||
CVE-2024-26276,0,0,94f5c130ffa7ec1db1ea02a18ad3648d5d206936fe00d856cdfec89b47b00b52,2024-04-09T09:15:24.457000
|
||||
CVE-2024-26277,0,0,2cba4478c6cc96839bc30a32054d0a70bd4f3f1e86aec08cbb43159a6e071a67,2024-04-09T09:15:24.670000
|
||||
CVE-2024-26275,0,1,86b20790c28ff2896463d7fcae3324befb2f565377793267b5441cdb88cff86c,2024-04-09T12:48:04.090000
|
||||
CVE-2024-26276,0,1,9407b59796cd800bb4fc38b36c1daee8f0b16fd5ac030c2517b1462502e4e4e5,2024-04-09T12:48:04.090000
|
||||
CVE-2024-26277,0,1,44875b5da9b930ec08e98ff27cae08f0f68e5cf4284f47d8347964e17c5a06a9,2024-04-09T12:48:04.090000
|
||||
CVE-2024-2628,0,0,74f1b0a8f98a3a2a42e54dd1de06ce591c355dd248224902ad7ba323d1c0caa6,2024-04-01T15:23:07.793000
|
||||
CVE-2024-26280,0,0,a0828ad55cf94cdecb18cb50b16af06fe51be781c3cc28d9a8b8b17c369261d0,2024-03-01T14:04:04.827000
|
||||
CVE-2024-26281,0,0,d398cdbeaa123e10721276d9f64c2d88a8b8d78292a048222ab02485f2a77624,2024-02-22T19:07:27.197000
|
||||
@ -242993,9 +242995,9 @@ CVE-2024-27625,0,0,d6b6da55ca3f292d09b4a714bcb504e227f68a5bde518c62e1054c68c65c7
|
||||
CVE-2024-27626,0,0,03b059cdacd9bd4fdf434fcdc21be78daba5dd8b1b09db34c5aaed65f0885289,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27627,0,0,6b314556f3fa2e7fb50707266f0d07d8792d06426c2d3b5f17382297ce1180be,2024-03-05T14:27:46.090000
|
||||
CVE-2024-2763,0,0,8e9d345d7389664f80611635b46c2cef2ec874e0b9963bec2a0f291297e78b38,2024-03-22T12:45:36.130000
|
||||
CVE-2024-27630,0,0,1af794bd73a1a981369ee11a8d740d74c2d4ddaa2b8325a16bd8d015c271d702,2024-04-08T21:15:09.983000
|
||||
CVE-2024-27631,0,0,06f624de111450e75fa73f39020e095767cb778364bea9eef968fd43c313a3d4,2024-04-08T21:15:10.067000
|
||||
CVE-2024-27632,0,0,77b2fef9184238aa65b7a05f1fcf8e38cdd5d8baed8ae8b674ef90fb91227938,2024-04-08T22:15:08.413000
|
||||
CVE-2024-27630,0,1,195789d2e072cde29ac43f06437e13345453649751e3c98de08e7517dc132999,2024-04-09T12:48:04.090000
|
||||
CVE-2024-27631,0,1,5c7b748f9881499a0aa3a66c7dd109e168e9d5d652d44f11a3ecfbbe6581d87d,2024-04-09T12:48:04.090000
|
||||
CVE-2024-27632,0,1,c643ff3ecb619db3f75dd61e8c48e0ed3f8f47c2f793478e020545116177f32e,2024-04-09T12:48:04.090000
|
||||
CVE-2024-2764,0,0,3ec67dc4c0d54764b942178e18d5d6721bd9017d0e5926b52df0eec1f7386756,2024-03-22T12:45:36.130000
|
||||
CVE-2024-27655,0,0,65a637f75a188da438b32cc13f4600329f3f424dcd0f437c9989c4c9314e002f,2024-03-01T14:04:26.010000
|
||||
CVE-2024-27656,0,0,2f731c51e226b6152416f771e826d74f69590b91bf713c56222b4fac3d8f2331,2024-03-01T14:04:26.010000
|
||||
@ -243059,10 +243061,10 @@ CVE-2024-27894,0,0,249999fc9487c1b63574e09bae3fbcbcdf7b20ef335df69d9151a0f5ea4d7
|
||||
CVE-2024-27895,0,0,e8e082e473ed76dea7e0db1fd0e0603d1d69d1ba5e6a1a82578100cdf406ffed,2024-04-08T18:48:40.217000
|
||||
CVE-2024-27896,0,0,88fc4dc869bbb4cce477334b59754ef261ad68592aa0aa0ff71f89ccdf4b1875,2024-04-08T18:48:40.217000
|
||||
CVE-2024-27897,0,0,6aeb0d28af447513b32ff29a7545806bc788b73261dbf5d52e00ce86aa2905c0,2024-04-08T18:48:40.217000
|
||||
CVE-2024-27898,0,0,29b0a9172a1eebfd24f6675c2ebbbf977083adceed455d2567ab962a2a31f8d6,2024-04-09T01:15:48.583000
|
||||
CVE-2024-27899,0,0,45f5f66a4e3da7332edf34d39ccf63b255c4cb8cac5cb60aac62b9fd2729ddf2,2024-04-09T01:15:48.777000
|
||||
CVE-2024-27898,0,1,6b8e108f960c2d2d873ea6b4d9ada44d0ac2f369e07f3417bafeadd038578ecc,2024-04-09T12:48:04.090000
|
||||
CVE-2024-27899,0,1,1e83e6ab0e8e2a789f3d6639693b1327c35e15b7468565754eff50891b540812,2024-04-09T12:48:04.090000
|
||||
CVE-2024-27900,0,0,00f9885d5a06fec36b56a14fdc3be21ddc255c1561a408e91e09aee1b7ac8b37,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27901,0,0,1f100058faa206f75a8299605708ec984f36533043410845917ace6aec0b805e,2024-04-09T01:15:48.993000
|
||||
CVE-2024-27901,0,1,33f662da706d18e25398216ac4597066ca6291840a4b4a018e8418ada4f9c7bb,2024-04-09T12:48:04.090000
|
||||
CVE-2024-27902,0,0,7aa835c5c3cccf2434107e43a6dd21c3ee48d8e6664a62d49734964bcc016141,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27905,0,0,3e20ed1ee55859457fccacd02ccfd33b203e184f29107e3c93e267df9f8d58a8,2024-03-21T02:52:20.520000
|
||||
CVE-2024-27906,0,0,e279155c32f0030358ce7d189e782f3e54d78a6a202b13937f95f2706818bee5,2024-02-29T13:49:29.390000
|
||||
@ -243117,7 +243119,7 @@ CVE-2024-27968,0,0,81cf818ff4c52a717cdd4ac78ff685291ab11ee5a0785fe2aaaed4be1173d
|
||||
CVE-2024-27972,0,0,e0f7933a8078741e5e2cdbc1c8aaffaa42eca2ccffc4cf4f10a410272b4fcf47,2024-04-03T12:38:04.840000
|
||||
CVE-2024-27974,0,0,c5d12161a6a294fb4d33a068888d07d2dec693f9073d8d47f06182bf4fe2779a,2024-03-18T12:38:25.490000
|
||||
CVE-2024-27981,0,0,bca4d502eb0003b495c2e3eabf4c8b77f995ffb842787b13a54996fb18ec7ff9,2024-04-05T12:40:52.763000
|
||||
CVE-2024-27983,0,0,462e2e83b9f399bcd91568acb26b09d2f5c5418ba921c90db44ae36772ba68d2,2024-04-09T01:15:49.197000
|
||||
CVE-2024-27983,0,1,5d8a6df11a15da2385f41c72a25a785a374e7614ce97421584556107f6abcf28,2024-04-09T12:48:04.090000
|
||||
CVE-2024-27986,0,0,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000
|
||||
CVE-2024-27987,0,0,457341cfe208a4dd4f1ca3a12fe23df96b337000dbd585aed58689be29e5bec4,2024-03-15T12:53:06.423000
|
||||
CVE-2024-27993,0,0,4178545ce3cee5131bcc85417ac208f6615c9c5305016cf5248ec96a71c28f2b,2024-03-21T15:24:35.093000
|
||||
@ -243224,7 +243226,7 @@ CVE-2024-28160,0,0,d3496ce06cdd6165787a1abcbf55db9c0fb2db641796e2cfba31e7190572a
|
||||
CVE-2024-28161,0,0,ac1d3f11953e0c8ea875284019208bd8e81c5e134926913a38bbbd0ca21cd968,2024-03-06T21:42:54.697000
|
||||
CVE-2024-28162,0,0,9bc5df2476915a3318874e35bcdb7d25e1035d05316c0fdc6385663896a911e1,2024-03-06T21:42:54.697000
|
||||
CVE-2024-28163,0,0,04503ad76f6d74637a8e6f8a7d443052dfa73d2acab964dffd0d8da32b69e3b5,2024-03-12T12:40:13.500000
|
||||
CVE-2024-28167,0,0,9a55ab4d6b3ad8b492f0fc017ea43d153c689b6906572f369d8da09ce3625626,2024-04-09T01:15:49.380000
|
||||
CVE-2024-28167,0,1,0d05aeb691ba11cae01e2ab2c399918da8edc50da4b1f7f29cffd4e2facff21d,2024-04-09T12:48:04.090000
|
||||
CVE-2024-2817,0,0,e0fe06a461ef795accd74c0bb92d92dd98cb14b12292f98e359c857cfb17ef6d,2024-03-26T03:15:19.720000
|
||||
CVE-2024-28171,0,0,c1f19d20247dc1e3f04cbf911cc73142848c14a173b812d8f71f312ba63d2b48,2024-03-22T12:45:36.130000
|
||||
CVE-2024-28173,0,0,542df716604f915101d48aeccfd0a59d896ed582a3774f62c0cc2b438bc897c4,2024-03-06T21:42:54.697000
|
||||
@ -243259,7 +243261,7 @@ CVE-2024-28216,0,0,81cb418e285cc210ffc29a8a25f8e508c54e8fe29c1cf038a851918d914b9
|
||||
CVE-2024-28219,0,0,5d1482e6721cb93d62e502f1f8ab261cac73f35af60759ddf9b75d97f371a8d4,2024-04-03T12:38:04.840000
|
||||
CVE-2024-2822,0,0,6ab09d9d7524c6d95c8d1ae5b3671b49edc27757385c7737f509e182267f103a,2024-03-22T19:02:10.300000
|
||||
CVE-2024-28222,0,0,d419d3ada13caae27e6dde281d73cbc44d2f509d635642c67ccba01f063babd6,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28224,0,0,ca6fb7a7c9cbb9514db5b85fb8e3fb3a2abd7539ce2617a6b42b50066d5c6494,2024-04-08T19:15:07.353000
|
||||
CVE-2024-28224,0,1,3152cc64dff1bcf9fde70fb8b36c735f55a1cb82cfb6f7caa3c629344bcaff59,2024-04-09T12:48:04.090000
|
||||
CVE-2024-28226,0,0,60d2b317d558a952126fd2c59e7791a3132f61184750bcc6e4113640853620c0,2024-04-02T12:50:42.233000
|
||||
CVE-2024-28228,0,0,93e315b7dd05da9d4781d208d18dece721536dd50c2af36c895e70dd0b3e07a4,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28229,0,0,b7d8e7d93c2ed37c18bd1a25a871516c477e14595693600c07d3d2bc4a74b7b4,2024-03-07T13:52:27.110000
|
||||
@ -243290,7 +243292,7 @@ CVE-2024-28254,0,0,a9752b9597156f82582ee0901564a914d350dbef56a1d3e2cb37d87202697
|
||||
CVE-2024-28255,0,0,2223e20b88f20882b18c8e2daca66ddc78cf448142396bd3d6e2271daa5feb4a,2024-03-17T22:38:29.433000
|
||||
CVE-2024-2826,0,0,ff0c97031e166398e323c72f1698e5c14d1d12a242f46c546169cb159379bfab,2024-03-25T01:51:01.223000
|
||||
CVE-2024-2827,0,0,9d006cbe113c27e6d6059aaa0fb63202588562fcc2fd921cc358b89a10826fec,2024-03-25T01:51:01.223000
|
||||
CVE-2024-28270,0,0,d017c4a60c6fa3785f96b83454883f1210a6b60ed8d083822e1b67bb8a435e8b,2024-04-08T19:15:07.417000
|
||||
CVE-2024-28270,0,1,f654e93a55aad09ebe8372d915898812c2a1306adefa6bb8aebb87b68cea994c,2024-04-09T12:48:04.090000
|
||||
CVE-2024-28275,0,0,20e2d2e3bfbe8540c4a348bc0e556a1aaebdf48e340e211a9afb11edded84f28,2024-04-03T17:24:18.150000
|
||||
CVE-2024-2828,0,0,b9daa0fecdf94306feb1c91247867bd7201c33280322b94bd8b3a21cf142beb1,2024-03-25T01:51:01.223000
|
||||
CVE-2024-28283,0,0,268ce493b20c7a589a5e50c22f5ba70e4448bc55aa5cacedfa25c50cee9c0813,2024-03-20T13:00:16.367000
|
||||
@ -243722,7 +243724,7 @@ CVE-2024-29746,0,0,29af8006f9fbd7af7095512e80e5bf0ae4c64952a941d41acef3a04849082
|
||||
CVE-2024-29747,0,0,87f4e304e93f8b6f286c656028c07dd1ca332ec61fa47e7ce7d137f30fe66b91,2024-04-08T18:49:25.863000
|
||||
CVE-2024-29748,0,0,521433bbadcb400dfc92897155d667884ae0c1a8d67cb01db78baff427b50b49,2024-04-08T22:52:33.780000
|
||||
CVE-2024-29749,0,0,33b9f39d00d5461e17b7d5a8f346443f168cc7b139342c04719e9f38cd1e308c,2024-04-08T18:49:25.863000
|
||||
CVE-2024-2975,0,0,bc6630236fbea59ea85108099a00f8d460e796c3dd2ded65943ede8bd6baee37,2024-04-09T01:15:49.583000
|
||||
CVE-2024-2975,0,1,6de0856746ca0e83e8c020b0c49b3d12b69bd33621171f2e1dc549a80a926408,2024-04-09T12:48:04.090000
|
||||
CVE-2024-29750,0,0,cd8489f4573c543020a3b6e8b96290737b84849a080d45bc65ef0ff04a2c59f0,2024-04-08T18:49:25.863000
|
||||
CVE-2024-29751,0,0,3bc4aa316cc8565894aaa2a9c412da7054d4f835fd37d50bf2ebd4a04ae9df25,2024-04-08T18:49:25.863000
|
||||
CVE-2024-29752,0,0,8570c8346da874298f8f35ea2088404fb97ccfc316a51781a5f28a7a73ba2064,2024-04-08T18:49:25.863000
|
||||
@ -243915,10 +243917,10 @@ CVE-2024-30184,0,0,9f69bd3ca06ec5c9657f3c215f7efb6829cdd48e1fef7a80c5facbe90dd97
|
||||
CVE-2024-30185,0,0,a781b9014abd19a00a8d62f1c673ab43addf79eb808bed01ac8422942c39fe67,2024-03-27T12:29:30.307000
|
||||
CVE-2024-30186,0,0,fb11f40c5a3e049b4173bd5ffb37b55dd352f80bf009d46c6a7e0ed4bd19ac71,2024-03-27T12:29:30.307000
|
||||
CVE-2024-30187,0,0,f8d37ff5304c8d102184c9586047a497264eab63488a1192b60bf85807ce2976,2024-03-25T13:47:14.087000
|
||||
CVE-2024-30189,0,0,8ab69d447623452a9c752bf4d46af011a09b5ba2fd0e47c4dee86f2e11c363ad,2024-04-09T09:15:24.873000
|
||||
CVE-2024-30189,0,1,3f4990ace311ce3f5f501a6dcf406cbed1780f0c03c898c2001b2eab67f70f47,2024-04-09T12:48:04.090000
|
||||
CVE-2024-3019,0,0,7aa90b3371c248010d1ca2c86ac425a855d65b90f7f2b54c8215ff8d140c2475,2024-03-28T20:53:20.813000
|
||||
CVE-2024-30190,0,0,ab4efd5f3f31cb946f6b912beaf10a973ded8c88e1315cac8f4b04553dadecaf,2024-04-09T09:15:25.117000
|
||||
CVE-2024-30191,0,0,a194e02128d9f38a2120430edbf1f83fe06b1d7feff6edcf6b56e03bf2e1e81b,2024-04-09T09:15:25.317000
|
||||
CVE-2024-30190,0,1,51fa3b61b1a89cc1e5bfc291b48055ea6ae2c46214176899850afb7f6a1c269a,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30191,0,1,ebc6f15da39286087c5d03b22d2078cfcc767238c4f5e6e7ea4485533eac454d,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30192,0,0,c058935b45ae3c1c682d0c8091f1486b6546bc2f278e4ebfa792d597067b45ed,2024-03-27T12:29:30.307000
|
||||
CVE-2024-30193,0,0,33258fe7cf249072798e560677d7e50e03f9db8bbc27d72503f50ecb70812130,2024-03-27T12:29:30.307000
|
||||
CVE-2024-30194,0,0,d5b499129c7beb5f42abcf7b4a34b45d5603a89c60af6322a93392ad7d164018,2024-03-27T12:29:30.307000
|
||||
@ -243933,11 +243935,11 @@ CVE-2024-30202,0,0,31db9c331e53ee7e35e14a4f4da9c9118966173e7dfd1773c267c14439e4d
|
||||
CVE-2024-30203,0,0,444aebb38c12835907cb7a31abaa6167c0351378679f511812ede323236ede80,2024-03-25T16:43:06.137000
|
||||
CVE-2024-30204,0,0,036541cdb0b2547c6a0b159ebcde955e789df823270814d2ecf5a2ea473b3058,2024-03-25T16:43:06.137000
|
||||
CVE-2024-30205,0,0,49c6abb5e041dbd344a1c2878ff4314f11b475ed55487542fa5ade5e7cd812b8,2024-03-25T16:43:06.137000
|
||||
CVE-2024-30214,0,0,9cbb84d5a31cde891755a74be46005a7ae14cc0fe7a81a16294b5e794e71b95b,2024-04-09T01:15:49.750000
|
||||
CVE-2024-30215,0,0,63c0103988a8a22d50b4f5920b1d344f44816b12c4a4bd2838f874c7170c27f7,2024-04-09T01:15:49.953000
|
||||
CVE-2024-30216,0,0,23e6330d5e67b3939a808dea3c48b015ea93ffe0e940d5e3db258ada971a742a,2024-04-09T01:15:50.140000
|
||||
CVE-2024-30217,0,0,dc05ee90d167762240bbfd4770ae1675986fb9f2999d716d3c5750c55a05cbce,2024-04-09T01:15:50.353000
|
||||
CVE-2024-30218,0,0,d0680a6e32010322311576701fff049a2fb3821324253bdcc8e519d58dbb41f6,2024-04-09T01:15:50.570000
|
||||
CVE-2024-30214,0,1,7c4820c684a267b228fa4a4665b794d39804e491dff54bd3f2105fbbb658d34b,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30215,0,1,ab2bb7d1fb5a1429f982c34c6c343c5bdb990b01f1c65a84e0f966e88ca26da6,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30216,0,1,b2a60633096c48481bfba33a475cbb1ec9bd028014eb767b662e1172ca558cda,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30217,0,1,087a63819064c1c33ea0e545c53d87168995546f6e15f5d7be47bfdca70c5f13,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30218,0,1,bbafd02e57188641c828b4e11afc10b08f46d298d16560a41cdffe88fac7fd66,2024-04-09T12:48:04.090000
|
||||
CVE-2024-3022,0,0,f291c8130c561158256d7e5f236acfb4472a78c940a59eb4c1d015abd789d2b5,2024-04-04T12:48:41.700000
|
||||
CVE-2024-30221,0,0,8c33faec8eecbd1bc4775ea7d226df03d8dec1186991b9fb17295c2b460f3a49,2024-03-28T12:42:56.150000
|
||||
CVE-2024-30222,0,0,16d5c6200c88be9ed99126042f393681469af79a0a1fab7e0ddf18cd42a248eb,2024-03-28T12:42:56.150000
|
||||
@ -244077,7 +244079,7 @@ CVE-2024-30455,0,0,115244366736fad049cb2d568fd37bcd1f9387962814ae164a94d7f893776
|
||||
CVE-2024-30456,0,0,58b7f6d9df0133114222c028c59aa68a983be02157b04b25b467f54970276f3b,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30457,0,0,0e1a5411ec4ddd12ef39ffb10d5b7f249bf382292e8158c3b3ccafeb0f7acbcd,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30458,0,0,138b6d21084a1b9981d25ac0a20e6d58c8531b97987312f29ce581613992ae6f,2024-03-29T13:28:22.880000
|
||||
CVE-2024-3046,1,1,6d7ca1977c621f17430aaec9ccc12aa503b8a49003e968ef0cfa49b8e286ea2f,2024-04-09T10:15:08.600000
|
||||
CVE-2024-3046,0,1,f64fd084b3316f52714630b8d9b76d007648387616e5814bf19d8a730782ba88,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30460,0,0,60239bce124e04867e82f31e5cfb960c5f3a93584351525e2543cdd96d5ccb22,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30462,0,0,d59392c9106e622ed8a8be18c11749718bba226bfa2a23231020ec7d96976f3a,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30463,0,0,417553a6f74795aba1e180f9fa11122fb72f60b63e441eca3940c7cd28530a48,2024-04-01T01:12:59.077000
|
||||
@ -244206,25 +244208,25 @@ CVE-2024-30667,0,0,ff284e163d8506ead82a88e1e0195d7345f11e18d3b36d2dad51ac5fe6f1c
|
||||
CVE-2024-30672,0,0,5f03fe7211bd8d45b5928b91a5ac0350abcfb5c5194aa5b0296fc94c9e863bc2,2024-04-08T18:48:40.217000
|
||||
CVE-2024-30674,0,0,6ed6c67e9f9314eaeb2be25e85ad7999c533cc1beb21c8cb467ab7a893f16710,2024-04-08T18:48:40.217000
|
||||
CVE-2024-30675,0,0,8b91a2fb611ecb3c19dd6a14ce9d54a86e8a20f268f642c9f4e164c260b50edd,2024-04-08T18:48:40.217000
|
||||
CVE-2024-30676,0,0,2a073dd564e86e695eb2f919b139d388a2d6007b80e09fcf5430f574293c04d1,2024-04-09T03:15:07.763000
|
||||
CVE-2024-30678,0,0,ef2be53ace00dddfb9477c2105eab4a719d2b1864b4c7a0736a5393b059f1a2f,2024-04-09T03:15:07.830000
|
||||
CVE-2024-30679,0,0,6f05a7fd5aff6056f1cd0ac249bbcd7614976a073740a795bbdcf43e4db0951d,2024-04-09T04:15:10.087000
|
||||
CVE-2024-30680,0,0,0db6be591c415718737384ee863de3874b3c91f1f1f8d6ff4a25940f4a6fadbe,2024-04-09T04:15:10.583000
|
||||
CVE-2024-30681,0,0,8cce67f169b8935564837b759c0252e1d62dcd48e7bcfe48dfbbecb14ddf135e,2024-04-09T04:15:10.747000
|
||||
CVE-2024-30683,0,0,b7621d84f614230c0df5165592f4f5b9dfd62300b10a45fd3e9810b90ac95d0f,2024-04-09T04:15:10.877000
|
||||
CVE-2024-30684,0,0,9be1f5115249bab85819d159de79365c3e4b80b2ec8ce819e9edf872119e3ac8,2024-04-09T05:15:47.807000
|
||||
CVE-2024-30686,0,0,541ea82cba3076dc93b4cf3d209232d5820c095c8704cbaf1cc6fac7df5cb046,2024-04-09T05:15:47.853000
|
||||
CVE-2024-30687,0,0,d41d39118a6364deb76328cc8c97b0d3e4e72fc3b9af23bace5281a4fd92503f,2024-04-09T05:15:47.920000
|
||||
CVE-2024-30688,0,0,e87ed7a45faf17208575ce7e369e08e5fc2c6646724b14c3d5b68e746ee07a95,2024-04-09T05:15:47.980000
|
||||
CVE-2024-30690,0,0,0222a6f435cd9fb505f55b765c382ed4aec444e568410449029d68b1773bbda6,2024-04-09T06:15:08.963000
|
||||
CVE-2024-30691,0,0,f13d250264f36bef3c8a95114656bfe64d9507f8789a26c487d45d49087945de,2024-04-09T07:15:08.467000
|
||||
CVE-2024-30692,0,0,c6905b73ae908de6592f9715ae4c7f9220b4f9d69b13d5e3672318f490534072,2024-04-09T07:15:08.560000
|
||||
CVE-2024-30694,0,0,87e1e568f906c3259c4311246f7c7ebe93a858c6e8f9a9e735f5d0a51dc9e8fb,2024-04-09T08:15:07.420000
|
||||
CVE-2024-30695,0,0,ddcf4ca472b554b646b53740b242ba136463be85f78e6c2877882bbd5172d5c9,2024-04-09T08:15:07.530000
|
||||
CVE-2024-30696,0,0,54a5cff2071955408dfaf2a6059dc98713163ec675db342b730d4d4fed56e3b2,2024-04-09T08:15:07.587000
|
||||
CVE-2024-30697,0,0,584bacee4bbf15e3909c526c7e893ad2ccf0bf26a2ea73cbcc220faba83ace96,2024-04-09T08:15:07.663000
|
||||
CVE-2024-30699,0,0,bf016f0de32f7cb69bfb6c8fdc5d92c6c36d4e5c955c6e78080fe0f7706caad9,2024-04-09T08:15:07.717000
|
||||
CVE-2024-30701,0,0,0e5335693d286262e2a5cf9e2a6c9ca11c86e648dbf1aba9748ad53026829393,2024-04-09T08:15:07.770000
|
||||
CVE-2024-30676,0,1,af724672b3075823cc7ac023ff0bd01b6766fd74313e164540f52e1f670069a5,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30678,0,1,28c2c42c15a87c8576562744982b7e6592c723e041b1251a726dc2914f0f31c2,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30679,0,1,1652ad2d7f751aa883b92dadc3db45d6131582879ab3f0ce2ce9b68ca301473c,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30680,0,1,07cf4672c6cb5c0d37b128ff6292cf9dcf1d064a6b724bb71fb28d8b540ff210,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30681,0,1,ddbe0c69f9ab035c7a353186f3b3cfb547957dc7577d22a08e0cab4ca1d951a2,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30683,0,1,95978317b9ff4fe100aa7b5187ca91600381e6090aadd857a6554499fc4fc767,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30684,0,1,93873bb3f77c6d6c1129e83df71a0c5dab8044941f95a0a1a2446d06a1a663f9,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30686,0,1,cecb3b359a2c306a651201a597cd44f73ed8fc5e2479bc1e16493cf1b000f3d9,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30687,0,1,627c6f49d0e8696456211f5aadec2afbfb7309884605ed881f3f310eff8a28e0,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30688,0,1,be62ee228899213efd589c12a1c4722b462ed6c7cea897018d539f4060eeaef6,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30690,0,1,758c0e580a22afa6415e22d45eb180157d5e27c3f7c136b941a2ccea1a631afb,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30691,0,1,23334283bdbb80ece84004a07a2d4f2fb30a9114f4de8009b41ca287700f7f5c,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30692,0,1,ff1ce2f91a7b26c24b130e2b00e06d5a248a15e5d50cd434ef04e50387645828,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30694,0,1,7755c230805c1909d0e94175233f36be70321ff270a75af58c50d43db7f1ff2d,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30695,0,1,520c313ebed8e7aa062ef70d824f022571c815c409401bb881ea7203f9352df6,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30696,0,1,f669e76cecff581f311ed5900046ffb74094191bccea9325de2ff009a7b30889,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30697,0,1,2bd165ee3b3f68656e20994b8433b623199f76c40a9ca0dc0dfa3acfa9da7f64,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30699,0,1,9d56c28cee5445b90e131fb18f6cf806afce6628a108cb0836bb98a2b8089d77,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30701,0,1,8e03ccf6659f5a4e378ff7d93a21c845259f9ec9ec9403dcafcfbc3a4ce924ba,2024-04-09T12:48:04.090000
|
||||
CVE-2024-3077,0,0,df42d4a62ceb1c6a6275b9b1d36ac8da42c0ae3505d0e07beac8238605b5504b,2024-03-29T12:45:02.937000
|
||||
CVE-2024-3078,0,0,cde724dd3faba12829b2b6702d06fc6a91a021819aa4d3333d39ab34ce48e248,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30806,0,0,3c4bbd71defb52c4de24f9ad1626459edef6b60997b976e6d74aead4ee0b3b0f,2024-04-02T20:31:58.463000
|
||||
@ -244275,7 +244277,7 @@ CVE-2024-31022,0,0,a14e43455f8667f5b08643f4accc0ded65ef08c98d3d4f6b069b1542bbf69
|
||||
CVE-2024-31025,0,0,049c3aee715c9c75f255eea2ba7d71aee620ad97e93ef3b0e0a948ae51dd0b57,2024-04-04T12:48:41.700000
|
||||
CVE-2024-31032,0,0,71dbb2a787f73b1914bf5d51e1b83b5365eb112b3ab9ed4df5d1066682b5223b,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31033,0,0,897cdecff344b121550f3f8e1b3cb821fdde5689eabf8f2834a81266f3e9da87,2024-04-03T03:15:10.670000
|
||||
CVE-2024-31047,0,0,c175d27ed17d4bf949120d8409b6dbaecb9c46ddadf7527ed65cef283f88c52d,2024-04-08T23:15:08.023000
|
||||
CVE-2024-31047,0,1,ed6b998d2efbbc258ad744f538162378aa1b702ac5e17462e2e5f42d9945fb08,2024-04-09T12:48:04.090000
|
||||
CVE-2024-31061,0,0,020e38014038ba97f692790c06c98735ee7323fcc8614755f16c9c5708fe33f5,2024-03-28T20:53:20.813000
|
||||
CVE-2024-31062,0,0,9a85b45f2ef9be7ff3563a8d396c3a8dd45f237219d28fbf343c7fa8953f9bf5,2024-03-28T20:53:20.813000
|
||||
CVE-2024-31063,0,0,8c5e031664c3b218697e91183f663111a47f52e7fd5496cafc4f238d7a0c4ce8,2024-03-28T20:53:20.813000
|
||||
@ -244372,13 +244374,13 @@ CVE-2024-31348,0,0,cfc095c1fc0e4b141af08e05231276cb08ae09886eb38442cb07d948f68e6
|
||||
CVE-2024-31349,0,0,8d1bd13d7c4f34f460e790c462e1e7791a20313dfd6a20b06dc021131d4e0db2,2024-04-08T18:48:40.217000
|
||||
CVE-2024-3135,0,0,91954ab6e8bf3cb2f93a640035369c46334c6e185515d1b835de2161b0fd8f69,2024-04-02T12:50:42.233000
|
||||
CVE-2024-31357,0,0,6d1a7933989bbcdba28fa02b8be4705197f66c46746bd7fe377d13c6e2cc0304,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31365,0,0,fc6aa8a24f23c740987c3fb601f4d456d9d6cf819e248fd81f799c77ac72a671,2024-04-09T08:15:07.827000
|
||||
CVE-2024-31366,0,0,1af347fc8335406c907b3336b6d3a66c50b1e09309b87f82640d67931a4ad266,2024-04-09T08:15:08.090000
|
||||
CVE-2024-31367,0,0,f6f2a97ff3535c04779b4bbb5a660e3fec19f5874beb28ba57c65f95f6e7012f,2024-04-09T09:15:25.520000
|
||||
CVE-2024-31368,0,0,4768a6001b4157c13653e9e0c71fe74fd93d15447b50501403be5541d51f94cf,2024-04-09T09:15:25.710000
|
||||
CVE-2024-31369,0,0,3faf152bc141d887aeee588c78ce4ead16543f70cb1f6090ad9e82e7d4b5a75c,2024-04-09T09:15:25.907000
|
||||
CVE-2024-31365,0,1,c940557b1d8090d7c4b40b91442276e3021286d8a5d5418b8ff9252921cde6e4,2024-04-09T12:48:04.090000
|
||||
CVE-2024-31366,0,1,75b2b689edca4c4fe2cdb7df1b8ed82e64c11b89b9b73cbce127601f1ecfacae,2024-04-09T12:48:04.090000
|
||||
CVE-2024-31367,0,1,81120db09e405ceec023426aa5eb20efd22769d9230dda89ff3bacac48f33f54,2024-04-09T12:48:04.090000
|
||||
CVE-2024-31368,0,1,2075bbe380281b0997c3990fa2ac90c9c87c399d3ddf4c8c8d5afff7621d8b06,2024-04-09T12:48:04.090000
|
||||
CVE-2024-31369,0,1,d082a9ab615cec7280a5691a7d44e9570c42e7b3288086312b3cbea4bdb1dc8b,2024-04-09T12:48:04.090000
|
||||
CVE-2024-3137,0,0,85619be4f983f97db1d6302bec8264dd546f884b93dfcad5f6be85034ffe5dcb,2024-04-02T12:50:42.233000
|
||||
CVE-2024-31370,0,0,31f745ddc020a1528c8f50fd91f1f415c182c8d12a6a2cd6331fd89dd72a9c49,2024-04-09T09:15:26.100000
|
||||
CVE-2024-31370,0,1,6f6e1dfc72d0841ebaadb7bdc4bbf124cf6313a520f59380c092d9365f2d4194,2024-04-09T12:48:04.090000
|
||||
CVE-2024-31375,0,0,b0ef1f22f63ca31cfb2164ca0bddec7fc53a5ee9672cb520fcd2e704c7c6fdab,2024-04-08T18:48:40.217000
|
||||
CVE-2024-3138,0,0,b2250a42d544b358de2555f1c668a77223939f10414766861d02ac21eac35bc6,2024-04-02T12:50:42.233000
|
||||
CVE-2024-31380,0,0,d044c4c41af2f67b9e10a84372a0da5aeb36e8aa53f4901f4d0660af26a33358,2024-04-05T14:15:10.487000
|
||||
@ -244401,6 +244403,7 @@ CVE-2024-3147,0,0,02625b405a9656dc1928c253c58a24946e5b9cb50ef47acb30b3a3a470e8ef
|
||||
CVE-2024-3148,0,0,da83dea91bd5fed523ca15df13db4100d62650319dcc492fed6d52171a819a8a,2024-04-02T12:50:42.233000
|
||||
CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08
|
||||
CVE-2024-3151,0,0,dbc1fd34b22356e776c12a200bc45c40de5eea60ac1974d151d7c1d279b32bb4,2024-04-02T18:12:16.283000
|
||||
CVE-2024-31544,1,1,88902b53c0f1eeb21e877882efe39d4af9f10efecf052310f4a64d08429f9d76,2024-04-09T13:15:33.557000
|
||||
CVE-2024-3156,0,0,672d7786ba8482c7e78ab9597c9f5a6e717f264787edb700157c849ff3c9f687,2024-04-08T18:48:40.217000
|
||||
CVE-2024-3158,0,0,d2414412e299d1c6c6fd5c25934ca9d016ec38ac6210ea884f5d6eabc2220b22,2024-04-08T18:48:40.217000
|
||||
CVE-2024-3159,0,0,ab3d3fc3f58ff99c2f10e23574a75e665f3343c344ecfe71138e927973febb6e,2024-04-08T18:48:40.217000
|
||||
@ -244429,14 +244432,14 @@ CVE-2024-31849,0,0,f45798bfe1f17890c1c9f615c3d632efe82fbe29dd84fe4753d6d6beae3b4
|
||||
CVE-2024-31850,0,0,4dfa9605a049a09744618be099ad889f274ff40fc42a18e168685588a6a44b6d,2024-04-08T18:49:25.863000
|
||||
CVE-2024-31851,0,0,0e8250a21123e214b1f09f2b325f0d0e22e98cb6715480d7ac13d673f761eb46,2024-04-08T18:49:25.863000
|
||||
CVE-2024-31852,0,0,7a968282e2d23775fda0d6edce03c38caf21ca868b2fca3251339d962c2ec4c6,2024-04-08T18:49:25.863000
|
||||
CVE-2024-31860,0,0,ccd55956f4b2085b6553adb9cab020d31d8243fded66ae1d53f39c274384f80b,2024-04-09T09:15:26.293000
|
||||
CVE-2024-31862,1,1,4585fe38c9c66a994786b1f605848fbf027d976add2e3b3ae014df8201a2eb70,2024-04-09T10:15:08.513000
|
||||
CVE-2024-31863,1,1,a0ed816379b99b301622b0a6ae840b8424f20e203b1335dda0f550bba90babf3,2024-04-09T11:15:31.713000
|
||||
CVE-2024-31860,0,1,55dd12597bf39ae8e0517c5d55b7ea30406697589bf4efd38a9030f7ffb75da9,2024-04-09T12:48:04.090000
|
||||
CVE-2024-31862,0,1,9f707e95c44d810f3a15296bc63963399801058986b2544d08155d8eb18bc340,2024-04-09T12:48:04.090000
|
||||
CVE-2024-31863,0,1,c0205d004a02751e8ee7ccf780094034f2d276095c68cc3f87551a74133406a8,2024-04-09T12:48:04.090000
|
||||
CVE-2024-31948,0,0,b8fd3eda997fc89b9e55a498d2068e6465c743165b4060fd79003e8bed0e6076,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31949,0,0,e7ba39ada062d71e6dcc57a3b21fdc31258fde0372c873d76cfd22b57d87a6fc,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31950,0,0,6cefb0ca8246a802eee33ecaeabf30a3794c53c92173f69e19945e3bf38104d7,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31951,0,0,a02cb6e83819b8aefe87f14fcbaf10a3986c9b6174676e08f67eb54fe256f190,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31978,0,0,d17ae3d50dbec3a18d72f4e719a353448c63c0888bf1d5847ef9832d4e66874b,2024-04-09T09:15:26.387000
|
||||
CVE-2024-31978,0,1,905fe24a9cf546b211ed3cfae7258dc772856eb0550beb1f55c95bc3799601d2,2024-04-09T12:48:04.090000
|
||||
CVE-2024-3202,0,0,c740eb561a7c1440cb5a8dd5eb2f94f0cce226529c05056c2f841e5a9fe9ca73,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3203,0,0,50d63f401f7659abc3d4fe6662d0f1a519a0e385e123db03b5f1830a5a75ec57,2024-04-06T16:15:08.350000
|
||||
CVE-2024-3204,0,0,f0ecaa4cd894fa75e44a48d7dd9614c107f33ee3ea503e315d2394814a086ab4,2024-04-06T16:15:08.530000
|
||||
@ -244540,7 +244543,7 @@ CVE-2024-3455,0,0,2a79458511cc023c776f69dd26438ba48a54ecc3ce4715cf5a2dbcf735d2bf
|
||||
CVE-2024-3456,0,0,1163b826cb31daaf8e489647ff09bfd19b3fb113321ed6ccdf58236f2b7e5e1b,2024-04-08T18:48:40.217000
|
||||
CVE-2024-3457,0,0,11a1e136160c0247fcf615183184cef87c2f9a8ed0a4cc454a1baf664c38c18a,2024-04-08T18:48:40.217000
|
||||
CVE-2024-3458,0,0,0dd3899ad6b0b4c44e22d6564bbd58a94d8615e4c6beb4dd695b6c049f1a5d9a,2024-04-08T18:48:40.217000
|
||||
CVE-2024-3463,0,0,eb5a7ce8cc9385684b6a9fd68b230a744dbb78bcc6779ff6338879cfe3292035,2024-04-08T20:15:08.723000
|
||||
CVE-2024-3464,0,0,2d1379cf9c8d2eb9f4330537cd1775de3998dec4b0ed303f13bb105970303bed,2024-04-08T20:15:08.990000
|
||||
CVE-2024-3465,0,0,ede59d298a2b744f6135f6cf5c4f90cf0f26e2b3aaaaf08836afca2893ea9114,2024-04-08T21:15:10.163000
|
||||
CVE-2024-3466,0,0,bcbc92c75c6ab2d66c5b61014acd484a84e91272d04e34af6de153eb326125f4,2024-04-08T21:15:10.587000
|
||||
CVE-2024-3463,0,1,b9a4be2f26f78b332674d83ef625297790907d08496665abbf73f7be270cf292,2024-04-09T12:48:04.090000
|
||||
CVE-2024-3464,0,1,9fc42ee7d400c682b0cca155c2130251f069e21de8abbf2c9cdbf132d840c5a9,2024-04-09T12:48:04.090000
|
||||
CVE-2024-3465,0,1,2c147ebdab1a9c2f236be45a5e3f17abf5dd87162f7d74a530cad5ba9d863bda,2024-04-09T12:48:04.090000
|
||||
CVE-2024-3466,0,1,4cdee9397ccb0cc6b86df3dd4a626bfe2bd945ea650bd37ea0096866891b044c,2024-04-09T12:48:04.090000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user