mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2024-04-30T20:00:37.911341+00:00
This commit is contained in:
parent
2f8f225fab
commit
48aea1f21b
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-19750",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-12-12T18:15:13.930",
|
||||
"lastModified": "2019-12-30T14:42:42.273",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-04-30T18:15:19.217",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -101,6 +101,10 @@
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://rsaxvc.net/blog/2020/4/10/Widespread_re-use_of_SSH_Host_Keys_in_Ethereum_Mining_Rig_Operating_Systems.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2019/CVE-2019-197xx/CVE-2019-19751.json
Normal file
24
CVE-2019/CVE-2019-197xx/CVE-2019-19751.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2019-19751",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-30T18:15:19.323",
|
||||
"lastModified": "2024-04-30T19:35:36.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "easyMINE before 2019-12-05 ships with SSH host keys baked into the installation image, which allows man-in-the-middle attacks and makes identification of all public IPv4 nodes trivial with Shodan.io."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.easymine.io",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://rsaxvc.net/blog/2020/4/10/Widespread_re-use_of_SSH_Host_Keys_in_Ethereum_Mining_Rig_Operating_Systems.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2019/CVE-2019-197xx/CVE-2019-19752.json
Normal file
24
CVE-2019/CVE-2019-197xx/CVE-2019-19752.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2019-19752",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-30T18:15:19.380",
|
||||
"lastModified": "2024-04-30T19:35:36.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "nvOC through 3.2 ships with SSH host keys baked into the installation image, which allows man-in-the-middle attacks and makes identification of all public IPv4 nodes trivial with Shodan.io. NOTE: as of 2019-12-01, the vendor indicated plans to fix this in the next image build."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/papampi/nvOC_by_fullzero_Community_Release/commits/release",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://rsaxvc.net/blog/2020/4/10/Widespread_re-use_of_SSH_Host_Keys_in_Ethereum_Mining_Rig_Operating_Systems.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2019/CVE-2019-197xx/CVE-2019-19753.json
Normal file
24
CVE-2019/CVE-2019-197xx/CVE-2019-19753.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2019-19753",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-30T18:15:19.437",
|
||||
"lastModified": "2024-04-30T19:35:36.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SimpleMiningOS through v1259 ships with SSH host keys baked into the installation image, which allows man-in-the-middle attacks and makes identification of all public IPv4 nodes trivial with Shodan.io. NOTE: the vendor indicated that they have no plans to fix this, and discourage deployment using public IPv4."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://rsaxvc.net/blog/2020/4/10/Widespread_re-use_of_SSH_Host_Keys_in_Ethereum_Mining_Rig_Operating_Systems.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://simplemining.net/page/changelog",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2019/CVE-2019-197xx/CVE-2019-19754.json
Normal file
24
CVE-2019/CVE-2019-197xx/CVE-2019-19754.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2019-19754",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-30T18:15:19.507",
|
||||
"lastModified": "2024-04-30T19:35:36.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HiveOS through 0.6-102@191212 ships with SSH host keys baked into the installation image, which allows man-in-the-middle attacks and makes identification of all public IPv4 nodes trivial with Shodan.io. NOTE: as of 2019-09-26, the vendor indicated that they would consider fixing this."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hiveos.farm/changelog/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://rsaxvc.net/blog/2020/4/10/Widespread_re-use_of_SSH_Host_Keys_in_Ethereum_Mining_Rig_Operating_Systems.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2019/CVE-2019-197xx/CVE-2019-19755.json
Normal file
24
CVE-2019/CVE-2019-197xx/CVE-2019-19755.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2019-19755",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-30T18:15:19.557",
|
||||
"lastModified": "2024-04-30T19:35:36.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ethOS through 1.3.3 ships with SSH host keys baked into the installation image, which allows man-in-the-middle attacks and makes identification of all public IPv4 nodes trivial with Shodan.io. NOTE: as of 2019-12-01, the vendor indicated that they plan to fix this."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://ethosdistro.com/changelog/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://rsaxvc.net/blog/2020/4/10/Widespread_re-use_of_SSH_Host_Keys_in_Ethereum_Mining_Rig_Operating_Systems.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-274xx/CVE-2020-27478.json
Normal file
20
CVE-2020/CVE-2020-274xx/CVE-2020-27478.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-27478",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-30T19:15:22.773",
|
||||
"lastModified": "2024-04-30T19:35:36.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability found in Simplcommerce v.40734964b0811f3cbaf64b6dac261683d256f961 thru 3103357200c70b4767986544e01b19dbf11505a7 allows a remote attacker to execute arbitrary code via a crafted script to the search bar feature."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/simplcommerce/SimplCommerce/issues/943",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2020/CVE-2020-52xx/CVE-2020-5200.json
Normal file
24
CVE-2020/CVE-2020-52xx/CVE-2020-5200.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2020-5200",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-30T18:15:19.650",
|
||||
"lastModified": "2024-04-30T19:35:36.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Minerbabe through V4.16 ships with SSH host keys baked into the installation image, which allows man-in-the-middle attacks and makes identification of all public IPv4 nodes trivial with Shodan.io."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://en.minerbabe.com/pc.html/#/helps/updateLog",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://rsaxvc.net/blog/2020/4/10/Widespread_re-use_of_SSH_Host_Keys_in_Ethereum_Mining_Rig_Operating_Systems.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28863",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-18T14:15:07.383",
|
||||
"lastModified": "2023-04-27T19:50:21.307",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-04-30T19:15:22.867",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -82,6 +82,10 @@
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.kb.cert.org/vuls/id/163057",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-362xx/CVE-2023-36268.json
Normal file
20
CVE-2023/CVE-2023-362xx/CVE-2023-36268.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-36268",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-30T18:15:19.730",
|
||||
"lastModified": "2024-04-30T19:35:36.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in The Document Foundation Libreoffice v.7.4.7 allows a remote attacker to cause a denial of service via a crafted .ppt file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kfx-N/test1",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-494xx/CVE-2023-49473.json
Normal file
20
CVE-2023/CVE-2023-494xx/CVE-2023-49473.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-49473",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-30T19:15:22.980",
|
||||
"lastModified": "2024-04-30T19:35:36.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Shenzhen JF6000 Cloud Media Collaboration Processing Platform firmware version V1.2.0 and software version V2.0.0 build 6245 is vulnerable to Incorrect Access Control."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Hack404-007/cves-info/blob/main/JF6000-exp",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-500xx/CVE-2023-50053.json
Normal file
20
CVE-2023/CVE-2023-500xx/CVE-2023-50053.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-50053",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-30T19:15:23.037",
|
||||
"lastModified": "2024-04-30T19:35:36.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Foundation.app Foundation platform 1.0 allows a remote attacker to obtain sensitive information via the Web3 authentication process of Foundation, the signed message lacks a nonce (random number)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/d0scoo1/Web3AuthRA",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-500xx/CVE-2023-50059.json
Normal file
20
CVE-2023/CVE-2023-500xx/CVE-2023-50059.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-50059",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-30T19:15:23.097",
|
||||
"lastModified": "2024-04-30T19:35:36.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue ingalxe.com Galxe platform 1.0 allows a remote attacker to obtain sensitive information via the Web3 authentication process of Galxe, the signed message lacks a nonce (random number)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://galxe.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52455",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-23T15:15:08.193",
|
||||
"lastModified": "2024-02-23T16:14:43.447",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-04-30T19:34:34.080",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,19 +14,89 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iommu: no reservar regi\u00f3n IOVA de longitud 0 Cuando el gestor de arranque/firmware no configura los framebuffers, su direcci\u00f3n y tama\u00f1o son 0 en la propiedad \"iommu-addresses\". Si la regi\u00f3n IOVA est\u00e1 reservada con una longitud de 0, termina corrompiendo el rbtree de IOVA con una entrada que tiene pfn_hi < pfn_lo. Si pretendemos utilizar el controlador de pantalla en el kernel sin framebuffer, entonces las asignaciones IOMMU de pantalla fallar\u00e1n ya que se reserva todo el espacio IOVA v\u00e1lido cuando la direcci\u00f3n y la longitud se pasan como 0. Una soluci\u00f3n ideal ser\u00eda que el firmware elimine la propiedad \"iommu-addresses\". y la \"regi\u00f3n de memoria\" correspondiente si la pantalla no est\u00e1 presente. Pero el kernel deber\u00eda poder manejar esto verificando el tama\u00f1o de la regi\u00f3n IOVA y omitiendo la reserva de IOVA si el tama\u00f1o es 0. Adem\u00e1s, agregue una advertencia si el firmware solicita una reserva de regi\u00f3n IOVA de longitud 0."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.3.0",
|
||||
"versionEndExcluding": "6.6.14",
|
||||
"matchCriteriaId": "723F5211-5C37-4F95-A4D3-FA6C2E6F914C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7.0",
|
||||
"versionEndExcluding": "6.7.2",
|
||||
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5e23e283910c9f30248732ae0770bcb0c9438abf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/98b8a550da83cc392a14298c4b3eaaf0332ae6ad",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bb57f6705960bebeb832142ce9abf43220c3eab1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52456",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-23T15:15:08.237",
|
||||
"lastModified": "2024-02-23T16:14:43.447",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-04-30T19:34:11.347",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,31 +14,131 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: serial: imx: corrige el punto muerto de la m\u00e1quina de estado tx Cuando se usa el puerto serie como puerto RS485, la m\u00e1quina de estado tx se usa para controlar el pin RTS para controlar el pin TX_EN del transceptor RS485. Cuando el puerto TTY se cierra en medio de una transmisi\u00f3n (por ejemplo, durante una falla de la aplicaci\u00f3n en el \u00e1rea de usuario), imx_uart_shutdown deshabilita la interfaz y deshabilita la interrupci\u00f3n de transmisi\u00f3n completa. Despu\u00e9s de eso, imx_uart_stop_tx abandona una transmisi\u00f3n incompleta, para ser reactivada por la interrupci\u00f3n de TC. Esta interrupci\u00f3n est\u00e1 deshabilitada y, por lo tanto, la m\u00e1quina de estados tx nunca sale de ENVIAR. La m\u00e1quina de estados ahora est\u00e1 en punto muerto y TX_EN permanece bajo, lo que hace que la interfaz sea in\u00fatil. imx_uart_stop_tx ahora verifica si hay transmisiones incompletas Y si las interrupciones TC est\u00e1n habilitadas antes de volver a activar el rescate. Esto garantiza que se alcance el estado de manejo de la m\u00e1quina y que est\u00e9 configurado correctamente en WAIT_AFTER_SEND."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.9.0",
|
||||
"versionEndExcluding": "5.10.209",
|
||||
"matchCriteriaId": "CDB2CF71-A47E-4390-B675-6597A78D6ADE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11.0",
|
||||
"versionEndExcluding": "5.15.148",
|
||||
"matchCriteriaId": "E25E1389-4B0F-407A-9C94-5908FF3EE88B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16.0",
|
||||
"versionEndExcluding": "6.1.75",
|
||||
"matchCriteriaId": "2C4951FA-80C0-4B4C-9836-6E5035DEB0F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2.0",
|
||||
"versionEndExcluding": "6.6.14",
|
||||
"matchCriteriaId": "BDBBEB0E-D13A-4567-8984-51C5375350B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7.0",
|
||||
"versionEndExcluding": "6.7.2",
|
||||
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/63ee7be01a3f7d28b1ea8b8d7944f12bb7b0ed06",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6e04a9d30509fb53ba6df5d655ed61d607a7cfda",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/763cd68746317b5d746dc2649a3295c1efb41181",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/78d60dae9a0c9f09aa3d6477c94047df2fe6f7b0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9a662d06c22ddfa371958c2071dc350436be802b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ff168d4fdb0e1ba35fb413a749b3d6cce918ec19",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52457",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-23T15:15:08.290",
|
||||
"lastModified": "2024-02-23T16:14:43.447",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-04-30T19:28:17.500",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,35 +14,144 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: serial: 8250: omap: no omita la liberaci\u00f3n de recursos si pm_runtime_resume_and_get() falla. Devolver un c\u00f3digo de error desde .remove() hace que el n\u00facleo del controlador emita el peque\u00f1o y \u00fatil mensaje de error: eliminar la devoluci\u00f3n de llamada devolvi\u00f3 un valor distinto de cero. Esto ser\u00e1 ignorado. y luego retire el dispositivo de todos modos. Entonces, en este caso, todos los recursos que no fueron liberados se filtran. Omitir serial8250_unregister_port() tiene el potencial de mantener suficiente UART disponible para desencadenar un use-after-free. As\u00ed que reemplace el retorno de error (y con \u00e9l el peque\u00f1o mensaje de error \u00fatil) por un mensaje de error m\u00e1s \u00fatil y contin\u00fae con la limpieza."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.4.268",
|
||||
"matchCriteriaId": "F13F5EED-121D-4AB6-BB34-59D3F9D7A2F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5.0",
|
||||
"versionEndExcluding": "5.10.209",
|
||||
"matchCriteriaId": "5D2E4F24-2FBB-4434-8598-2B1499E566B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11.0",
|
||||
"versionEndExcluding": "5.15.148",
|
||||
"matchCriteriaId": "E25E1389-4B0F-407A-9C94-5908FF3EE88B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.75",
|
||||
"matchCriteriaId": "070D0ED3-90D0-4F95-B1FF-57D7F46F332D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2.0",
|
||||
"versionEndExcluding": "6.6.14",
|
||||
"matchCriteriaId": "BDBBEB0E-D13A-4567-8984-51C5375350B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7.0",
|
||||
"versionEndExcluding": "6.7.2",
|
||||
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/828cd829483f0cda920710997aed79130b0af690",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/887a558d0298d36297daea039954c39940228d9b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/95e4e0031effad9837af557ecbfd4294a4d8aeee",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ad90d0358bd3b4554f243a425168fc7cebe7d04e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b502fb43f7fb55aaf07f6092ab44657595214b93",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bc57f3ef8a9eb0180606696f586a6dcfaa175ed0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d74173bda29aba58f822175d983d07c8ed335494",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52460",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-23T15:15:08.440",
|
||||
"lastModified": "2024-02-23T16:14:43.447",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-04-30T19:16:12.493",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,15 +14,75 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: corrige la desreferencia del puntero NULL en hibernaci\u00f3n. Durante la secuencia de hibernaci\u00f3n, es posible que el contexto de origen no tenga clk_mgr. As\u00ed que no lo utilices para buscar compatibilidad con DML2."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7.0",
|
||||
"versionEndExcluding": "6.7.2",
|
||||
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6b80326efff093d037e0971831dca6ebddba9b45",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b719a9c15d52d4f56bdea8241a5d90fd9197ce99",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-225xx/CVE-2024-22546.json
Normal file
24
CVE-2024/CVE-2024-225xx/CVE-2024-22546.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-22546",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-30T19:15:23.147",
|
||||
"lastModified": "2024-04-30T19:35:36.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "TRENDnet TEW-815DAP 1.0.2.0 is vulnerable to Command Injection via the do_setNTP function. An authenticated attacker with administrator privileges can leverage this vulnerability over the network via a malicious POST request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://warp-desk-89d.notion.site/TEW-815DAP-94a631c20dee4f399268dbcc880f1f4c",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.trendnet.com/support/support-detail.asp?prod=105_TEW-815DAP",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-263xx/CVE-2024-26331.json
Normal file
24
CVE-2024/CVE-2024-263xx/CVE-2024-26331.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-26331",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-30T19:15:23.200",
|
||||
"lastModified": "2024-04-30T19:35:36.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ReCrystallize Server 5.10.0.0 uses a authorization mechanism that relies on the value of a cookie, but it does not bind the cookie value to a session ID. Attackers can easily modify the cookie value, within a browser or by implementing client-side code outside of a browser. Attackers can bypass the authentication mechanism by modifying the cookie to contain an expected value."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sensepost.com/blog/2024/from-discovery-to-disclosure-recrystallize-server-vulnerabilities/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.recrystallize.com/merchant/ReCrystallize-Server-for-Crystal-Reports.htm",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26584",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-21T15:15:09.420",
|
||||
"lastModified": "2024-04-03T14:15:15.613",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-04-30T19:35:07.273",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,23 +14,103 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: tls: manejar el retraso de solicitudes criptogr\u00e1ficas Dado que estamos configurando el indicador CRYPTO_TFM_REQ_MAY_BACKLOG en nuestras solicitudes a la API criptogr\u00e1fica, crypto_aead_{encrypt,decrypt} puede devolver -EBUSY en lugar de - EINPROGRESS en situaciones v\u00e1lidas. Por ejemplo, cuando la cola cryptd para AESNI est\u00e1 llena (f\u00e1cil de activar con un cryptd.cryptd_max_cpu_qlen artificialmente bajo), las solicitudes se pondr\u00e1n en cola en el trabajo pendiente, pero a\u00fan as\u00ed se procesar\u00e1n. En ese caso, la devoluci\u00f3n de llamada as\u00edncrona tambi\u00e9n se llamar\u00e1 dos veces: primero con err == -EINPROGRESS, que parece que podemos ignorar, luego con err == 0. En comparaci\u00f3n con el parche original de Sabrina, esta versi\u00f3n usa el nuevo tls_*crypt_async_wait( ) ayuda y convierte EBUSY a EINPROGRESS para evitar tener que modificar todas las rutas de manejo de errores. El manejo es id\u00e9ntico."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-755"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.16.0",
|
||||
"versionEndExcluding": "6.1.84",
|
||||
"matchCriteriaId": "6F1F2625-29D5-4FED-B7F5-6087227ABCB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2.0",
|
||||
"versionEndExcluding": "6.6.18",
|
||||
"matchCriteriaId": "A5CC150E-F35C-4CF7-ADF5-422D32C511C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7.0",
|
||||
"versionEndExcluding": "6.7.6",
|
||||
"matchCriteriaId": "0C8D1FAD-4D5D-4A25-B058-2AD15082710E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-282xx/CVE-2024-28269.json
Normal file
24
CVE-2024/CVE-2024-282xx/CVE-2024-28269.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-28269",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-30T19:15:23.257",
|
||||
"lastModified": "2024-04-30T19:35:36.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ReCrystallize Server 5.10.0.0 allows administrators to upload files to the server. The file upload is not restricted, leading to the ability to upload of malicious files. This could result in a Remote Code Execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sensepost.com/blog/2024/from-discovery-to-disclosure-recrystallize-server-vulnerabilities/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.recrystallize.com/merchant/ReCrystallize-Server-for-Crysta",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-331xx/CVE-2024-33101.json
Normal file
20
CVE-2024/CVE-2024-331xx/CVE-2024-33101.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-33101",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-30T18:15:19.797",
|
||||
"lastModified": "2024-04-30T19:35:36.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stored cross-site scripting (XSS) vulnerability in the component /action/anti.php of ThinkSAAS v3.7.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the word parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/thinksaas/ThinkSAAS/issues/34",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-331xx/CVE-2024-33102.json
Normal file
20
CVE-2024/CVE-2024-331xx/CVE-2024-33102.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-33102",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-30T18:15:19.853",
|
||||
"lastModified": "2024-04-30T19:35:36.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stored cross-site scripting (XSS) vulnerability in the component /pubs/counter.php of ThinkSAAS v3.7.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the code parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/thinksaas/ThinkSAAS/issues/35",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-331xx/CVE-2024-33103.json
Normal file
20
CVE-2024/CVE-2024-331xx/CVE-2024-33103.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-33103",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-30T18:15:19.923",
|
||||
"lastModified": "2024-04-30T19:35:36.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability in the Media Manager component of DokuWiki 2024-02-06a allows attackers to execute arbitrary code via uploading a crafted SVG file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/dokuwiki/dokuwiki/issues/4267",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-338xx/CVE-2024-33831.json
Normal file
20
CVE-2024/CVE-2024-338xx/CVE-2024-33831.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-33831",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-30T18:15:19.973",
|
||||
"lastModified": "2024-04-30T19:35:36.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stored cross-site scripting (XSS) vulnerability in the Advanced Expectation - Response module of yapi v1.10.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the body field."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/YMFE/yapi/issues/2745",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-338xx/CVE-2024-33832.json
Normal file
20
CVE-2024/CVE-2024-338xx/CVE-2024-33832.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-33832",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-30T18:15:20.027",
|
||||
"lastModified": "2024-04-30T19:35:36.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OneNav v0.9.35-20240318 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /index.php?c=api&method=get_link_info."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/helloxz/onenav/issues/186",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-340xx/CVE-2024-34088.json
Normal file
20
CVE-2024/CVE-2024-340xx/CVE-2024-34088.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-34088",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-30T19:15:23.307",
|
||||
"lastModified": "2024-04-30T19:35:36.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In FRRouting (FRR) through 9.1, it is possible for the get_edge() function in ospf_te.c in the OSPF daemon to return a NULL pointer. In cases where calling functions do not handle the returned NULL value, the OSPF daemon crashes, leading to denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/FRRouting/frr/pull/15674/commits/34d704fb0ea60dc5063af477a2c11d4884984d4f",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-34xx/CVE-2024-3411.json
Normal file
28
CVE-2024/CVE-2024-34xx/CVE-2024-3411.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-3411",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2024-04-30T19:15:23.353",
|
||||
"lastModified": "2024-04-30T19:35:36.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Implementations of IPMI Authenticated sessions does not provide enough randomness to protect from session hijacking, allowing an attacker to use either predictable IPMI Session ID or weak BMC Random Number to bypass security controls using spoofed IPMI packets to manage BMC device."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://kb.cert.org/vuls/id/163057",
|
||||
"source": "cret@cert.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.intel.la/content/dam/www/public/us/en/documents/specification-updates/ipmi-intelligent-platform-mgt-interface-spec-2nd-gen-v2-0-spec-update.pdf",
|
||||
"source": "cret@cert.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.kb.cert.org/vuls/id/163057",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
65
README.md
65
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-30T18:00:40.323139+00:00
|
||||
2024-04-30T20:00:37.911341+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-30T17:52:35.057000+00:00
|
||||
2024-04-30T19:35:36.960000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,46 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
247207
|
||||
247228
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `21`
|
||||
|
||||
- [CVE-2024-23463](CVE-2024/CVE-2024-234xx/CVE-2024-23463.json) (`2024-04-30T17:15:46.383`)
|
||||
- [CVE-2024-29320](CVE-2024/CVE-2024-293xx/CVE-2024-29320.json) (`2024-04-30T16:15:07.290`)
|
||||
- [CVE-2019-19751](CVE-2019/CVE-2019-197xx/CVE-2019-19751.json) (`2024-04-30T18:15:19.323`)
|
||||
- [CVE-2019-19752](CVE-2019/CVE-2019-197xx/CVE-2019-19752.json) (`2024-04-30T18:15:19.380`)
|
||||
- [CVE-2019-19753](CVE-2019/CVE-2019-197xx/CVE-2019-19753.json) (`2024-04-30T18:15:19.437`)
|
||||
- [CVE-2019-19754](CVE-2019/CVE-2019-197xx/CVE-2019-19754.json) (`2024-04-30T18:15:19.507`)
|
||||
- [CVE-2019-19755](CVE-2019/CVE-2019-197xx/CVE-2019-19755.json) (`2024-04-30T18:15:19.557`)
|
||||
- [CVE-2020-27478](CVE-2020/CVE-2020-274xx/CVE-2020-27478.json) (`2024-04-30T19:15:22.773`)
|
||||
- [CVE-2020-5200](CVE-2020/CVE-2020-52xx/CVE-2020-5200.json) (`2024-04-30T18:15:19.650`)
|
||||
- [CVE-2023-36268](CVE-2023/CVE-2023-362xx/CVE-2023-36268.json) (`2024-04-30T18:15:19.730`)
|
||||
- [CVE-2023-49473](CVE-2023/CVE-2023-494xx/CVE-2023-49473.json) (`2024-04-30T19:15:22.980`)
|
||||
- [CVE-2023-50053](CVE-2023/CVE-2023-500xx/CVE-2023-50053.json) (`2024-04-30T19:15:23.037`)
|
||||
- [CVE-2023-50059](CVE-2023/CVE-2023-500xx/CVE-2023-50059.json) (`2024-04-30T19:15:23.097`)
|
||||
- [CVE-2024-22546](CVE-2024/CVE-2024-225xx/CVE-2024-22546.json) (`2024-04-30T19:15:23.147`)
|
||||
- [CVE-2024-26331](CVE-2024/CVE-2024-263xx/CVE-2024-26331.json) (`2024-04-30T19:15:23.200`)
|
||||
- [CVE-2024-28269](CVE-2024/CVE-2024-282xx/CVE-2024-28269.json) (`2024-04-30T19:15:23.257`)
|
||||
- [CVE-2024-33101](CVE-2024/CVE-2024-331xx/CVE-2024-33101.json) (`2024-04-30T18:15:19.797`)
|
||||
- [CVE-2024-33102](CVE-2024/CVE-2024-331xx/CVE-2024-33102.json) (`2024-04-30T18:15:19.853`)
|
||||
- [CVE-2024-33103](CVE-2024/CVE-2024-331xx/CVE-2024-33103.json) (`2024-04-30T18:15:19.923`)
|
||||
- [CVE-2024-33831](CVE-2024/CVE-2024-338xx/CVE-2024-33831.json) (`2024-04-30T18:15:19.973`)
|
||||
- [CVE-2024-33832](CVE-2024/CVE-2024-338xx/CVE-2024-33832.json) (`2024-04-30T18:15:20.027`)
|
||||
- [CVE-2024-34088](CVE-2024/CVE-2024-340xx/CVE-2024-34088.json) (`2024-04-30T19:15:23.307`)
|
||||
- [CVE-2024-3411](CVE-2024/CVE-2024-34xx/CVE-2024-3411.json) (`2024-04-30T19:15:23.353`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `25`
|
||||
Recently modified CVEs: `7`
|
||||
|
||||
- [CVE-2023-38002](CVE-2023/CVE-2023-380xx/CVE-2023-38002.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2023-45385](CVE-2023/CVE-2023-453xx/CVE-2023-45385.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2023-46304](CVE-2023/CVE-2023-463xx/CVE-2023-46304.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2023-50914](CVE-2023/CVE-2023-509xx/CVE-2023-50914.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2023-50915](CVE-2023/CVE-2023-509xx/CVE-2023-50915.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2024-2377](CVE-2024/CVE-2024-23xx/CVE-2024-2377.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2024-23772](CVE-2024/CVE-2024-237xx/CVE-2024-23772.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2024-23773](CVE-2024/CVE-2024-237xx/CVE-2024-23773.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2024-23774](CVE-2024/CVE-2024-237xx/CVE-2024-23774.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2024-2378](CVE-2024/CVE-2024-23xx/CVE-2024-2378.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2024-25575](CVE-2024/CVE-2024-255xx/CVE-2024-25575.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2024-25648](CVE-2024/CVE-2024-256xx/CVE-2024-25648.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2024-25938](CVE-2024/CVE-2024-259xx/CVE-2024-25938.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2024-2617](CVE-2024/CVE-2024-26xx/CVE-2024-2617.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2024-28716](CVE-2024/CVE-2024-287xx/CVE-2024-28716.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2024-2877](CVE-2024/CVE-2024-28xx/CVE-2024-2877.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2024-33267](CVE-2024/CVE-2024-332xx/CVE-2024-33267.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2024-33270](CVE-2024/CVE-2024-332xx/CVE-2024-33270.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2024-33273](CVE-2024/CVE-2024-332xx/CVE-2024-33273.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2024-33274](CVE-2024/CVE-2024-332xx/CVE-2024-33274.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2024-33275](CVE-2024/CVE-2024-332xx/CVE-2024-33275.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2024-33308](CVE-2024/CVE-2024-333xx/CVE-2024-33308.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2024-33309](CVE-2024/CVE-2024-333xx/CVE-2024-33309.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2024-33465](CVE-2024/CVE-2024-334xx/CVE-2024-33465.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2024-4340](CVE-2024/CVE-2024-43xx/CVE-2024-4340.json) (`2024-04-30T17:52:35.057`)
|
||||
- [CVE-2019-19750](CVE-2019/CVE-2019-197xx/CVE-2019-19750.json) (`2024-04-30T18:15:19.217`)
|
||||
- [CVE-2023-28863](CVE-2023/CVE-2023-288xx/CVE-2023-28863.json) (`2024-04-30T19:15:22.867`)
|
||||
- [CVE-2023-52455](CVE-2023/CVE-2023-524xx/CVE-2023-52455.json) (`2024-04-30T19:34:34.080`)
|
||||
- [CVE-2023-52456](CVE-2023/CVE-2023-524xx/CVE-2023-52456.json) (`2024-04-30T19:34:11.347`)
|
||||
- [CVE-2023-52457](CVE-2023/CVE-2023-524xx/CVE-2023-52457.json) (`2024-04-30T19:28:17.500`)
|
||||
- [CVE-2023-52460](CVE-2023/CVE-2023-524xx/CVE-2023-52460.json) (`2024-04-30T19:16:12.493`)
|
||||
- [CVE-2024-26584](CVE-2024/CVE-2024-265xx/CVE-2024-26584.json) (`2024-04-30T19:35:07.273`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
89
_state.csv
89
_state.csv
@ -136705,7 +136705,12 @@ CVE-2019-19746,0,0,7496dbb7701f079fb861542a8268868f4ce34c0bcaa82c3f8ce824c47836b
|
||||
CVE-2019-19747,0,0,e4d055d4e13a340b85243a2e1ebc118c37ba99de09a620117e3d033feedaa2ac,2020-01-03T16:21:05.267000
|
||||
CVE-2019-19748,0,0,e70c2bdc7244c49603d02a6d1b7d6c46ceed54dd81a456dfefd903920efd3dfd,2019-12-13T13:34:04.483000
|
||||
CVE-2019-1975,0,0,ea0e899879d31806bbdb3166a7414a9da89b9aa9e03c2b687de391ff714bf638,2021-11-02T20:03:38.680000
|
||||
CVE-2019-19750,0,0,406a5ed41e4b50755cddf94ea41299e229531502d9b94d79ab191ea871f0446f,2019-12-30T14:42:42.273000
|
||||
CVE-2019-19750,0,1,12fd2e34791119d45f95f74a18cc718a7a4e78ccb40a7cde11381cadb33be9a7,2024-04-30T18:15:19.217000
|
||||
CVE-2019-19751,1,1,8d43ef7e096c60b432eaa7564d52e55f063adef1fa154963e0b1505d7f5515db,2024-04-30T19:35:36.960000
|
||||
CVE-2019-19752,1,1,4cc5a0a21ab3acca3b272e06d871009a94fe6e341ca5415340341bc5959583fa,2024-04-30T19:35:36.960000
|
||||
CVE-2019-19753,1,1,eb58cb231d84a291b0313400e353e765a8cd7728ca7ab8e565992a9f09957b78,2024-04-30T19:35:36.960000
|
||||
CVE-2019-19754,1,1,b5b8086a2fdd14089a0741dc05e04e743abdef124bf65b766d2ef41deed908cf,2024-04-30T19:35:36.960000
|
||||
CVE-2019-19755,1,1,a17ab579c46d226ef91fd2d5115127d0f23e0949f004a519a460a813ef738ea1,2024-04-30T19:35:36.960000
|
||||
CVE-2019-19756,0,0,7f008bf0df7cd341019a0ca12092f2bebc077861b764b1f2e41153e961e981ef,2021-11-02T19:16:30.403000
|
||||
CVE-2019-19757,0,0,3fb6636c3c4c4520c83d7d95a0bd50df6cb961a31e5298a5b5c721d326e59bde,2020-02-24T17:53:03.400000
|
||||
CVE-2019-19758,0,0,7eb6b8fd35fa809ac23ac5414793e86d916dbc670894a774622f48dd799a0e53,2020-02-27T14:16:50.720000
|
||||
@ -156091,6 +156096,7 @@ CVE-2020-27464,0,0,8b2bb0d206e434d4811c2e8c936c7484383ac89dd06800266f95b5de15f37
|
||||
CVE-2020-27466,0,0,edd2ac918edafd47da415784f371c23807a996288aa6985e18beac4ac217ea90,2021-08-24T15:15:33.280000
|
||||
CVE-2020-27467,0,0,8e07e2e6383ea7e09c0756773bc61b160602a6d54c787d2ddaffc982e7f8bc52,2022-03-02T18:58:07.053000
|
||||
CVE-2020-2747,0,0,eca1ddd275f522ec5c0e70890130ef875952fa88caca16a24be79a60df8ceb60,2020-04-15T18:35:17.767000
|
||||
CVE-2020-27478,1,1,be14ea0959e1fcc5919298d8a8a892f788e54090c6b5953bd63bdc937613939b,2024-04-30T19:35:36.960000
|
||||
CVE-2020-2748,0,0,5673bc859ef75bae1fe6fba4561fd6216493c23982af60fb5a08f4ee0daa6e35,2021-02-25T15:06:43.823000
|
||||
CVE-2020-27481,0,0,22568596131fc0a0e33251fe7de24b942afc0c7eecf1aaefcc2eaf45db2664e0,2020-11-23T17:14:49.733000
|
||||
CVE-2020-27483,0,0,c4ae42e63f1241eaa6d87453728fcc9ec4806488c853f0f86f7113e44f08840c,2020-12-02T14:55:09.437000
|
||||
@ -160415,6 +160421,7 @@ CVE-2020-5194,0,0,eaa255428020fe2b2bb366b6b3281c7e897ca5e27592365d1dbf3620c64771
|
||||
CVE-2020-5195,0,0,c07f25e6186c5a1ea8ff9344e4f034f86d567a617c39186402e5b269f54f396e,2020-01-22T16:05:31.283000
|
||||
CVE-2020-5196,0,0,d2f6a58632b5906a64894b9ecbdb0953b99588def9098840655847f25f819009,2020-01-17T03:02:04.857000
|
||||
CVE-2020-5197,0,0,262d53a029b0570f7acb0add91eb0db48d29d83c92ec3b3a8daa5568981bb134,2021-07-21T11:39:23.747000
|
||||
CVE-2020-5200,1,1,46d44bc67a5526e7518260ca51b604181e4e0ee98fa2e742d1cd27ffcb257d64,2024-04-30T19:35:36.960000
|
||||
CVE-2020-5202,0,0,3047269005db8e703d21c45da0dbbcb10acc8d6e296b6ab16056b4e8115791de,2022-01-01T20:03:08.133000
|
||||
CVE-2020-5203,0,0,2ce775a660ddf6436bc940de3e67c50cc20fb44ebb1024f653c73bfefb893f06,2021-07-21T11:39:23.747000
|
||||
CVE-2020-5204,0,0,64f55ca455226a18e04afdae2cd5dc2617b62f45ad3aad4f63d2a3a58b099606,2020-01-18T19:15:10.947000
|
||||
@ -220765,7 +220772,7 @@ CVE-2023-28858,0,0,011df0bac04bc87df95994c1b3e55ca3cc5b885a4113b222fc3b46e56f821
|
||||
CVE-2023-28859,0,0,dd925f6241e4a2be83ea00a786ba6fc5299cfcc8d994f716e443cf718cd5da8b,2023-05-17T17:08:20.883000
|
||||
CVE-2023-2886,0,0,3aaac5483bfb19901fa58891c6e5a468993f3db4f1bf125792f15c949845c790,2023-11-02T01:46:01.450000
|
||||
CVE-2023-28862,0,0,170dd9ccbe35ded0e1ff5303e569e23ec7bc3359084c857e1571367bc52605fb,2023-07-14T13:15:09.167000
|
||||
CVE-2023-28863,0,0,b14c07b169a373dafaeb51fb3c2d9e65d262bce80c92647ef4ad0d40dbd9706b,2023-04-27T19:50:21.307000
|
||||
CVE-2023-28863,0,1,5b9f6fbc49f2f72646c4fcd6c4f998c30afe581009e0a2d13f18b190180ee464,2024-04-30T19:15:22.867000
|
||||
CVE-2023-28864,0,0,b53b9a31e04a18ab26a92d23614ce8825a553be82d95a49cad787677dc09aa8b,2023-07-27T03:47:50.647000
|
||||
CVE-2023-28866,0,0,7b5ab9a9fd3d718e917316e0046a608e2f5cdf5b502da99441c79802e834fd00,2023-11-07T04:10:55.740000
|
||||
CVE-2023-28867,0,0,11ed3f93d6faa0d51c3a1b27a8fdcb70e828388dc5f52ca5e989f587124ec7bf,2023-04-03T14:01:07.433000
|
||||
@ -225887,6 +225894,7 @@ CVE-2023-36260,0,0,05806f809cb2e5349700fe208a79faefe81f3635eb8f9d36d12ddd1ef8584
|
||||
CVE-2023-36262,0,0,0329ac7656644a7553d710ca8782f80b6527e8ade23f535dbdfe1383401c9bcd,2023-11-07T04:16:25.310000
|
||||
CVE-2023-36263,0,0,4649624e62df1f3c72417442caed269512009de2869b36a656dd3f389025818b,2023-11-08T16:48:00.990000
|
||||
CVE-2023-36266,0,0,dc3ccae4b9de23b341ed49cc1177dd605d64731ca6efae7d69742fec754b7ed1,2024-04-11T01:20:38.540000
|
||||
CVE-2023-36268,1,1,01b149515d8f33a640fd0e780806ac25e9e4c9cb9defd84e5ace4ded59fe3eff,2024-04-30T19:35:36.960000
|
||||
CVE-2023-3627,0,0,34eb25ece400e692d01118e91cdb54357e138708553e491dd2e85d00353848ee,2023-07-18T19:58:32.613000
|
||||
CVE-2023-36271,0,0,ed782faec3fc64ed9c5c1d539673fb2cac501e252bddbf55d0751af403a70480,2023-06-27T12:18:30.333000
|
||||
CVE-2023-36272,0,0,0a127fb20debfd02d6d9a91e4212d106baf67f3f214966d88f98ab750ccd33ca,2023-06-27T12:18:19.927000
|
||||
@ -227146,7 +227154,7 @@ CVE-2023-37997,0,0,634a8f00a3a7cefaea8286574903fd4dd9cef7262779039b9494ebb47f14c
|
||||
CVE-2023-37998,0,0,1747e4f0f6ddf4d50fd6cbdf2ef7e31b2a7283ba267cf7dde73ae9cd8c8e621a,2024-04-29T09:15:07.163000
|
||||
CVE-2023-3800,0,0,774d32c7b5fb881d1d40e6872ba5eec3309f4fee64d58b63dc188b5cb5069530,2024-04-11T01:21:23.090000
|
||||
CVE-2023-38000,0,0,0e0c6bbc8458c85090972cb27733399c7be344be574c892a61848bb47624d50a,2023-10-16T17:04:06.637000
|
||||
CVE-2023-38002,0,1,7029b9fea2ebd1520d174727082186c38ee4da26a3d2a7d7dc41f80bfaaddfa0,2024-04-30T17:52:35.057000
|
||||
CVE-2023-38002,0,0,7029b9fea2ebd1520d174727082186c38ee4da26a3d2a7d7dc41f80bfaaddfa0,2024-04-30T17:52:35.057000
|
||||
CVE-2023-38003,0,0,1818608b52e574766674a96fd387dab05b406afb5af9478c08cafc61d6b9b561,2024-01-19T16:15:09.013000
|
||||
CVE-2023-3801,0,0,268e8456e25e2ec7ee29641981d97416c6644edb4f95f9df3d23b6d38ef865ae,2024-04-11T01:21:23.180000
|
||||
CVE-2023-38019,0,0,7375f0cde564228d4a502ec0225fd8e16818e040bded4f61f291e77bd96d4623,2024-02-09T19:13:52.923000
|
||||
@ -232019,7 +232027,7 @@ CVE-2023-45381,0,0,636ca78eac443cb4f637348d8ee4fee7573f821206a15e9b4f252bf045e55
|
||||
CVE-2023-45382,0,0,e749ad67c4426048984c6f05c233a1830e3b02d47768e2a2990488263070e4a2,2023-11-25T02:16:09.063000
|
||||
CVE-2023-45383,0,0,6c000ddfd6441a1c3da2c29134b230f4ee0b5b99ea849d6a70757063a564d1cb,2023-10-25T01:24:51.267000
|
||||
CVE-2023-45384,0,0,68ffd294aedd1a768c3567558e16eccd5913adcff18912fc360412fcfa9f0f6a,2023-10-25T15:26:34.353000
|
||||
CVE-2023-45385,0,1,f8250516ad00fda94849ae4cafb5d1682b4f4d2e29acac35153e60699e8e7389,2024-04-30T17:52:35.057000
|
||||
CVE-2023-45385,0,0,f8250516ad00fda94849ae4cafb5d1682b4f4d2e29acac35153e60699e8e7389,2024-04-30T17:52:35.057000
|
||||
CVE-2023-45386,0,0,374130a71b25dc67a6870f15ed35a03693b486ed6a765768cf670f637ae4325c,2023-10-23T14:15:43.003000
|
||||
CVE-2023-45387,0,0,45194877e2f2c310ab8a3e47aa92255ab544f487fbe86f4f4335fc4ee36c6e08,2023-11-25T02:15:57.857000
|
||||
CVE-2023-4539,0,0,3f1ef5a4dce974f3bd7b99806bac78a9be3898dc33b90833d649bc46cca7bd92,2024-02-15T14:28:31.380000
|
||||
@ -232642,7 +232650,7 @@ CVE-2023-46300,0,0,0717e33737bc41686c733bf7e7fb3f4e87670f94456a3f5f908d9ad680b0f
|
||||
CVE-2023-46301,0,0,4bc065fc0550d760de641e0a5426cb26061bacffa84b2c5d6c474914f7b6e8be,2023-10-31T17:08:30.707000
|
||||
CVE-2023-46302,0,0,4657366a67d8e79775047138127619bb65dfc4001addca3f3c68fdbe69d1172b,2023-11-30T15:15:48.393000
|
||||
CVE-2023-46303,0,0,f588576f0391c22f76c1458b98d4818f3afd8a52b7c57a797fbd89390f6e96fd,2023-10-28T03:29:56.570000
|
||||
CVE-2023-46304,0,1,3ee4732682a58d4602ab6d83178ccdeba84aa1746321cd78037247da0bab57fd,2024-04-30T17:52:35.057000
|
||||
CVE-2023-46304,0,0,3ee4732682a58d4602ab6d83178ccdeba84aa1746321cd78037247da0bab57fd,2024-04-30T17:52:35.057000
|
||||
CVE-2023-46306,0,0,29a3abc2a63328c5f4956660bb22b4ad7805ec90ecab1b1719f891f2e6d03b29,2023-11-02T15:47:02.097000
|
||||
CVE-2023-46307,0,0,70b1e7b39477592163424a81cdcac5736b174b2b3ef677dc9db177c5b5ec12cc,2023-12-12T17:06:02.260000
|
||||
CVE-2023-46308,0,0,93fc954f3a128690a25cd4b8d8fc47afecd3303f2e318c0a2f0696550f2b4f76,2024-01-09T17:47:09.937000
|
||||
@ -234841,6 +234849,7 @@ CVE-2023-49468,0,0,57d5ec3ccc918036b475b9f54b2e396366451915366ece25a89704668e428
|
||||
CVE-2023-49469,0,0,cf895a2dc3add24e416ac7bcb0530a971aa2975c73743a17956ace666f5a97e4,2024-01-04T17:14:07.600000
|
||||
CVE-2023-4947,0,0,22b6b14e8c839e20c9429d0ba7697cdb9ac98a0cca963ad631bd6ecd6354934f,2023-11-07T04:23:12.703000
|
||||
CVE-2023-49471,0,0,9786a9b85e2a2cfc8ac5810f9b5329581bf752664798422bca39fbc4f46bebdd,2024-01-17T13:41:42.813000
|
||||
CVE-2023-49473,1,1,e36dc3b21d9303d828702fc30e38ffb08613649ca147a78c643fe0767d7a1eb8,2024-04-30T19:35:36.960000
|
||||
CVE-2023-4948,0,0,fe74618322894acd9d5c196407c8ee7a7b8a3cfef58094beba352735ceb5a1e6,2023-11-07T04:23:12.883000
|
||||
CVE-2023-49484,0,0,b3bb47b9d3bebe9b919a712e385039470f90ec9024bd9f7aa1a5d970a61e5cfd,2023-12-11T19:11:05.637000
|
||||
CVE-2023-49485,0,0,48aa9077d57b1d2e7ae05300b0cb802f30139b627a9d2c23d0e1071b24d3a4ae,2023-12-12T17:19:56.587000
|
||||
@ -235190,6 +235199,8 @@ CVE-2023-50038,0,0,b5f7008e5b6120c4657d3dc4caf357a7ddaa4144addc80a0698468521481b
|
||||
CVE-2023-5004,0,0,4a11256e6c8dcae389b383382be0121998d78e06c2c9c366ae2d3b27a55cd347,2023-10-02T18:08:26.417000
|
||||
CVE-2023-50044,0,0,b6e61defbfae8849a3dd13f3498094b76d439a921dfdbb6b251036018fca43cd,2023-12-29T00:15:50.170000
|
||||
CVE-2023-5005,0,0,fb87b32624390f20ce301a5fab4cd65a92d25105a5f353624ad9dc063528e764,2023-12-21T19:25:31.277000
|
||||
CVE-2023-50053,1,1,03610634c0ed45dee80e0d60a8349b8bc7011a5cf5dc1b70970b334c5dfcbaac,2024-04-30T19:35:36.960000
|
||||
CVE-2023-50059,1,1,d63110550e63265e27d37f837ce3e69a794fdebc01bff65df69e6bba25b40b06,2024-04-30T19:35:36.960000
|
||||
CVE-2023-5006,0,0,67cf9fc28c9ec32cb6e344356ef2d73cd893146bd66fe581f7eb4b165d8287d2,2024-01-24T17:16:48.267000
|
||||
CVE-2023-50061,0,0,1db52c2d46546815d1a2adba68eb1fc7946c8a816ad26f8c8cfef122215bc52d,2024-02-15T05:02:52.427000
|
||||
CVE-2023-50069,0,0,02cd4a1f95882e422d635d7af46ad8c134be9260b44cdbfed17df992a492e802,2024-01-05T23:08:29.450000
|
||||
@ -235599,8 +235610,8 @@ CVE-2023-50901,0,0,fa1245dfad58609576f971f16b5ea532f1ca81c051130c99f667ea1205d37
|
||||
CVE-2023-50902,0,0,1513c647ffec3bccc364b057fe7be8ad3f21264b604f6b5475cb44c0c9074864,2024-01-05T16:21:34.563000
|
||||
CVE-2023-50905,0,0,c0b30a24d3473e2350b628f1856fc1c117d2f8592d3dde08d565e83b22838670,2024-02-29T13:49:29.390000
|
||||
CVE-2023-5091,0,0,742357f5a217cf462519eaf750c88817634b0babb2a1ac8228f117003e40bd4b,2024-01-12T13:39:11.443000
|
||||
CVE-2023-50914,0,1,91eac3b5a93312d1499b6e8f44c96c8eba6b2e8098c0c0dd5b83885d0d15ce8f,2024-04-30T17:52:35.057000
|
||||
CVE-2023-50915,0,1,9750cd619c9e3b297ae2c02f3e59803ef4b49d5ae574da3d68f17216252adcb7,2024-04-30T17:52:35.057000
|
||||
CVE-2023-50914,0,0,91eac3b5a93312d1499b6e8f44c96c8eba6b2e8098c0c0dd5b83885d0d15ce8f,2024-04-30T17:52:35.057000
|
||||
CVE-2023-50915,0,0,9750cd619c9e3b297ae2c02f3e59803ef4b49d5ae574da3d68f17216252adcb7,2024-04-30T17:52:35.057000
|
||||
CVE-2023-50916,0,0,8389bab58e732355670227e157a42be931a6ad30ed375a5de2bdca2e8f73b50f,2024-01-19T17:49:52.770000
|
||||
CVE-2023-50917,0,0,ae02854392d1c9add428acaf26494bf33c678553d73518cd872ace972206aa21,2024-01-22T17:15:09.207000
|
||||
CVE-2023-50918,0,0,84c5eb6df0deb5d7c5d3c51cf99a8f6fdd461afc97576ca67536170b8d368e90,2023-12-19T17:18:38.713000
|
||||
@ -236513,13 +236524,13 @@ CVE-2023-52451,0,0,65a739f6d581805ce2cf2b36d79848a56d63f5f7e896bfc143f00d66a3183
|
||||
CVE-2023-52452,0,0,7baace8ccf50e6e949146023fb757b323cf12c7750b0fc5df8cd239e671f9bac,2024-03-18T18:24:33.550000
|
||||
CVE-2023-52453,0,0,69ba07cbae189e1e3a60d3872d700f556de0e7e337d505dd8820b63e89f74b76,2024-02-23T16:14:43.447000
|
||||
CVE-2023-52454,0,0,f7725c56a2046001ea42b0a4b162beaa146052738b58f85b4d39839a05325aef,2024-04-19T18:40:14.427000
|
||||
CVE-2023-52455,0,0,76a6bcb530205d4971a4b440b50dd84bc697337c3fb3171373045411403058f1,2024-02-23T16:14:43.447000
|
||||
CVE-2023-52456,0,0,10a5abe34cd481166ef5bd0c8f2721aa67c0c3b426198c8f94ac38f160f96c83,2024-02-23T16:14:43.447000
|
||||
CVE-2023-52457,0,0,6f0cb6a137d10bff51f7fd0ceb008040ac18c4c0c65b0db7128924c45f02580c,2024-02-23T16:14:43.447000
|
||||
CVE-2023-52455,0,1,dc2463f08418783db51235c700e54b8444f1205e94daedf8420d4f83a06ab523,2024-04-30T19:34:34.080000
|
||||
CVE-2023-52456,0,1,80f1f1335e214943f5f94143e9b6d594096fda76d77405c756d2450bd6844582,2024-04-30T19:34:11.347000
|
||||
CVE-2023-52457,0,1,e329ea9b49070c15cbde1327096f3b3f54c3f5dbfe9170483ef4bd1c30c15a3c,2024-04-30T19:28:17.500000
|
||||
CVE-2023-52458,0,0,00390989bdedc445e1b514729f22c211b3746b0ba7246d2e9aa982604355b206,2024-04-19T18:49:28.773000
|
||||
CVE-2023-52459,0,0,e9cf232377caf1f202d67d723d7e16b271506d66f49335fc63418b030a3f09a4,2024-04-19T18:49:47.087000
|
||||
CVE-2023-5246,0,0,efc93f05f4d6576c2fefda617ffc50a2cd42a25ecc2a7e9c2794376627e129e7,2023-10-31T11:58:05.363000
|
||||
CVE-2023-52460,0,0,7b5ce003348e2b0c98c11a11dd79b88b3d4e9f665c8574fd29056aa818d9e331,2024-02-23T16:14:43.447000
|
||||
CVE-2023-52460,0,1,9a9871abd62065b1bc8617900676e231f93474bdcf509de618a4f0a8c85c33e9,2024-04-30T19:16:12.493000
|
||||
CVE-2023-52461,0,0,719a65925f951c681f50c05e9ce85d8b5d8fa1d42253944e773762e89d82d323,2024-02-23T16:14:43.447000
|
||||
CVE-2023-52462,0,0,a6858cfa3be5f63a7738068f3ab5f364e25a3cd7a6d64375ec3da8239879f2ce,2024-04-17T20:06:29.470000
|
||||
CVE-2023-52463,0,0,fd8c09fdc6750081e23478ebe940972345e6f17003751e11523c5f3c82cfd70e,2024-04-17T20:05:08.550000
|
||||
@ -241398,6 +241409,7 @@ CVE-2024-22533,0,0,84ada03ee37935d281b6ef02f8758f6d805bf66c7cac8fad1d52934fdf1b6
|
||||
CVE-2024-22543,0,0,4bbc43f5b3e2685d1c9696fcc6499264d266d040456549b4c4eb8710fde430af,2024-02-27T14:20:06.637000
|
||||
CVE-2024-22544,0,0,d4860d160590ae20dbc5d6de1bfe49fdfc11d59a0cfbde30c670036465a08e6a,2024-02-27T14:20:06.637000
|
||||
CVE-2024-22545,0,0,21a44afa77ff3bc1528d0f92d9dbe45aaebe8c2d773e6d661e586abe7a9ac385,2024-03-05T18:15:48.443000
|
||||
CVE-2024-22546,1,1,a52487dc831d552725dae6fdd972311cb7ff2abe8345f4107cd1a76861ab3911,2024-04-30T19:35:36.960000
|
||||
CVE-2024-22547,0,0,435aee4ac29e540430ed8124a6d3ce7be57829e1b8ca6167335ef3bc4b085e52,2024-02-23T02:42:58.253000
|
||||
CVE-2024-22548,0,0,7d281051e3f1672a0e8c6ae82119054f50e0c0cf80064dc21e880381f007b189,2024-01-20T18:51:21.163000
|
||||
CVE-2024-22549,0,0,9d125f13584b8e9a98c7ba04ebcdd0c32883b8ff51ce2ca12c4e35cf1c2f09cf,2024-01-20T18:51:14.307000
|
||||
@ -241807,7 +241819,7 @@ CVE-2024-23450,0,0,6fbd14dba7c079ef13d798ab57ec4ea5a51f9ba377b47e78eb5f421772561
|
||||
CVE-2024-23451,0,0,1527b911dea291b0766ddb3062c19eeaba982e875c4189924798b47289a058fe,2024-03-28T02:01:21.693000
|
||||
CVE-2024-23452,0,0,aaa529ca6e03eefd16006bb57cfd95647fc8b44bb3a3176fd8a83e06021cb7e9,2024-02-29T01:44:08.877000
|
||||
CVE-2024-23453,0,0,ab3a22284e10fea1933712f86026a2e7792304e1f83321557a4d02140679b266,2024-01-29T22:58:07.777000
|
||||
CVE-2024-23463,1,1,3070d116c7eebce5ad718e81d73788ac1f4a2d237e9b828c393b0270c134b332,2024-04-30T17:52:35.057000
|
||||
CVE-2024-23463,0,0,3070d116c7eebce5ad718e81d73788ac1f4a2d237e9b828c393b0270c134b332,2024-04-30T17:52:35.057000
|
||||
CVE-2024-2347,0,0,72273356ef668e46bc249f1161d9e793d562ab02a3d6eaa18d7e41a99c45f641,2024-04-10T13:23:38.787000
|
||||
CVE-2024-23476,0,0,e3d84cdb88c20fc5ad4183c7e154fd4eb94d6574a64f56328103056889f0fc9e,2024-02-20T20:39:10.033000
|
||||
CVE-2024-23477,0,0,87ea55eb7f1d47398644b7f37685a8d0eb8352c36d1b14165a017d7f9ea764c8,2024-02-20T20:38:43.587000
|
||||
@ -241988,14 +242000,14 @@ CVE-2024-23763,0,0,94cc309a27a6f19d801354e2361325aae58be01ed476b8fc22a2371a8d35f
|
||||
CVE-2024-23764,0,0,b3135c7b86d92abe0ba829866971e25bead6def6664dd24257c259d94b7c1186,2024-02-15T17:57:25.633000
|
||||
CVE-2024-23768,0,0,926e611d1088d9f1f309e3cf68eaddf916ef7d0caac52f28b5ab1d1ea7b5269d,2024-01-26T19:15:05.400000
|
||||
CVE-2024-23769,0,0,8006533b03738d14f12e88159dd00f6815ea0cfbfbe8531d0a76387b0244675f,2024-02-15T15:40:20.690000
|
||||
CVE-2024-2377,0,1,367d7e9780393c935b14a4cfba4ca77c567a3b83e113912613f9f036cad9926e,2024-04-30T17:52:35.057000
|
||||
CVE-2024-2377,0,0,367d7e9780393c935b14a4cfba4ca77c567a3b83e113912613f9f036cad9926e,2024-04-30T17:52:35.057000
|
||||
CVE-2024-23770,0,0,d308ea235638520048aecb2f126af743a6f79f00cf88059a602cfd74145feab5,2024-01-26T19:18:29.190000
|
||||
CVE-2024-23771,0,0,ffb1ffb392a719f610312001c323ebc0b81b01439264d54a4e46f4afbb11b184,2024-01-26T19:24:40.873000
|
||||
CVE-2024-23772,0,1,812660de7849b027dd3ad9da31ecbe7ad7d0da895a32633f61e1b92b7baaeb88,2024-04-30T17:52:35.057000
|
||||
CVE-2024-23773,0,1,a166d7951819032e7afcc54a699b5335ec4d3f439b7fd4538a593004b7906727,2024-04-30T17:52:35.057000
|
||||
CVE-2024-23774,0,1,bd6f06737704b97e622450c0c0ba6d7cab2853fc0a16fafb0b59bbf30efa2a37,2024-04-30T17:52:35.057000
|
||||
CVE-2024-23772,0,0,812660de7849b027dd3ad9da31ecbe7ad7d0da895a32633f61e1b92b7baaeb88,2024-04-30T17:52:35.057000
|
||||
CVE-2024-23773,0,0,a166d7951819032e7afcc54a699b5335ec4d3f439b7fd4538a593004b7906727,2024-04-30T17:52:35.057000
|
||||
CVE-2024-23774,0,0,bd6f06737704b97e622450c0c0ba6d7cab2853fc0a16fafb0b59bbf30efa2a37,2024-04-30T17:52:35.057000
|
||||
CVE-2024-23775,0,0,3f14e612f21bf3a005c618e710dfc25be4ed3fed6dcd32f828b01526aab3cc14,2024-02-22T03:15:08.370000
|
||||
CVE-2024-2378,0,1,f03f8f4eb0585a7f2763dfb490c2e6b12f22793f2992bb4f3f1022c53ae20c4c,2024-04-30T17:52:35.057000
|
||||
CVE-2024-2378,0,0,f03f8f4eb0585a7f2763dfb490c2e6b12f22793f2992bb4f3f1022c53ae20c4c,2024-04-30T17:52:35.057000
|
||||
CVE-2024-23782,0,0,6f45eb4b7ce48f87446d0358843a09e5a8ec20837c83d13c1a3b26ddd36a0376,2024-02-02T15:38:55.017000
|
||||
CVE-2024-23783,0,0,9143d28a07faac7544ed4041d27f04fd4e69b2b3f6f29ec06f4ffa36598bac71,2024-02-14T13:59:35.580000
|
||||
CVE-2024-23784,0,0,b4aa02d723c734167dec1b51d1ed7965cf85ac8613e083ddc624ccae18846888,2024-02-14T13:59:35.580000
|
||||
@ -242895,7 +242907,7 @@ CVE-2024-25569,0,0,620e614f397f546a0e71f397e76d4367fc8df127ac09f0555445ed8798df7
|
||||
CVE-2024-2557,0,0,a617119e7aec654c68da3fc71fccd99356ed7ca0eba1b1243e2bc71d72e1c32e,2024-04-11T01:25:27.817000
|
||||
CVE-2024-25572,0,0,6916ce68d4646365d0578802b2b08ffd76a62b8c07df1314570c90fc1d876f93,2024-04-11T12:47:44.137000
|
||||
CVE-2024-25574,0,0,4bc8d3cd97ad31d3dfd232c462a09dc1924d30756dc7bfcb27690950ff1edfb2,2024-04-02T12:50:42.233000
|
||||
CVE-2024-25575,0,1,e644f553b991600030313ff6e6532d72da253b2db4703dd8cab48da6b8093f41,2024-04-30T17:52:35.057000
|
||||
CVE-2024-25575,0,0,e644f553b991600030313ff6e6532d72da253b2db4703dd8cab48da6b8093f41,2024-04-30T17:52:35.057000
|
||||
CVE-2024-25578,0,0,ff68f9ee0e3394b3fa83fe8766f2e044325a5fd043b437de063c0cd80654c610,2024-03-01T14:04:26.010000
|
||||
CVE-2024-25579,0,0,838cd17118b030eacfba49a0ada30a1ba4831f0bedbfd768ff2707f55789078e,2024-04-04T01:15:50.083000
|
||||
CVE-2024-2558,0,0,05ecdd587f34cceb1493c24040a39ce304ec6f718c555097cfbd0b512bd51f16,2024-04-11T01:25:27.900000
|
||||
@ -242953,7 +242965,7 @@ CVE-2024-25643,0,0,08f3e6c0d454841d4e4dc84aae81812246ffbd96bb71cc2e9e4566cd4077e
|
||||
CVE-2024-25644,0,0,cad748db94c87605f745ac8efbb54ef36e9bf866e1bcdbdf96bff9a05dfcf738,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25645,0,0,611af6391fb4617a6b65e5d2ff91bac5a4003873b65f133d0cd2495d911bd094,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25646,0,0,4c3fff51352b6a263ea60efd6f0f793331eb0c3a48316710a84a88b50103400a,2024-04-09T12:48:04.090000
|
||||
CVE-2024-25648,0,1,e0ca444e7bd12a947a07bc008a0f9053edbd7dc7d74d3b14d152a982e1911288,2024-04-30T17:52:35.057000
|
||||
CVE-2024-25648,0,0,e0ca444e7bd12a947a07bc008a0f9053edbd7dc7d74d3b14d152a982e1911288,2024-04-30T17:52:35.057000
|
||||
CVE-2024-25649,0,0,3e37b8e86c2aaae32174cb72f32869171ec886cd62bb95537557a32583b80d63,2024-03-14T12:52:09.877000
|
||||
CVE-2024-2565,0,0,2b60c90f757e5c1a7488bee021fd0a1be74409cf621deaa98f8eb1cc5b574a77,2024-04-11T01:25:28.423000
|
||||
CVE-2024-25650,0,0,dc8b4afe4a9ab50c0ebaf06dbcbf0134b9648b4ff2232925762633c6b3fe0179,2024-03-14T12:52:16.723000
|
||||
@ -243121,7 +243133,7 @@ CVE-2024-25934,0,0,f6b4a559198ff9a023c244c882aa2a4b2d94891158d20ce325478b009b608
|
||||
CVE-2024-25935,0,0,e7d71dc1e3ab78ef328cc65c85ed6474997812a912ee072e84e40976c1f22c38,2024-04-11T12:47:44.137000
|
||||
CVE-2024-25936,0,0,03df91d96e11ecd94def6ed7ba45d62f75e77270ce10b697dca0561dee5d16de,2024-03-15T16:26:49.320000
|
||||
CVE-2024-25937,0,0,861391f909e6331477f1822a01b1052fd19aa1c31ce333bc472971a7392abbdb,2024-03-22T12:45:36.130000
|
||||
CVE-2024-25938,0,1,724cf82588dcd69d201735c44cfdbce13b24754694fef4988747d0487cd1a7dd,2024-04-30T17:52:35.057000
|
||||
CVE-2024-25938,0,0,724cf82588dcd69d201735c44cfdbce13b24754694fef4988747d0487cd1a7dd,2024-04-30T17:52:35.057000
|
||||
CVE-2024-2594,0,0,bde31fdaab09a079b8da0d26da3ff2fd7469b156a031f2e67457f19c614e87f5,2024-03-18T19:40:00.173000
|
||||
CVE-2024-25940,0,0,0f284eb6797ffd015c122aeeb19f68755aac0aac9d9f404601b2b09d1a1b9b82,2024-04-19T07:15:09.657000
|
||||
CVE-2024-25941,0,0,086c1e2f95d3358b026edde826ecdc3aba251e5db88ce3b75a6d9fa4fcc246f1,2024-02-15T06:23:39.303000
|
||||
@ -243283,7 +243295,7 @@ CVE-2024-26166,0,0,f391c4b0db733d40148db48047d4241707d804226a4057e01c2cdc7ed3c4a
|
||||
CVE-2024-26167,0,0,c7ef30deac9cc168daf190a6134ba584248b8a1ef0f1584bf395b9e88fcd8841,2024-03-08T14:02:57.420000
|
||||
CVE-2024-26168,0,0,949af59ee3b8c1baa60afaabce6faf5f018a8b72d7b8397412fa4ad69b2f274a,2024-04-10T13:24:00.070000
|
||||
CVE-2024-26169,0,0,2d1119475d439c4b121ffec0de24c31b9e211863770703474be28295dbeee3e3,2024-04-11T20:15:34.100000
|
||||
CVE-2024-2617,0,1,1d9d9de541960834c20c821a56536b46afd6bd019f4c1d7fd86c4660c44d70c3,2024-04-30T17:52:35.057000
|
||||
CVE-2024-2617,0,0,1d9d9de541960834c20c821a56536b46afd6bd019f4c1d7fd86c4660c44d70c3,2024-04-30T17:52:35.057000
|
||||
CVE-2024-26170,0,0,b923c0fa6e4f0b77c0dadd8ee680132ca97043b58671f05f987b51d479a0edc4,2024-04-11T20:15:34.203000
|
||||
CVE-2024-26171,0,0,9585df40c5f7289258f98464992d6f7b36d924236a4b679b88371a3376d72c9d,2024-04-10T13:24:00.070000
|
||||
CVE-2024-26172,0,0,c6f278d7e7fafad9e920f5166d13c7edaac3efa6dc535e1f3334920cb3dd37e9,2024-04-10T13:24:00.070000
|
||||
@ -243419,6 +243431,7 @@ CVE-2024-26327,0,0,cdb018804c204ef80ecdc8daa637463eea9f06e211b3135332b7863d1171c
|
||||
CVE-2024-26328,0,0,70bb62dee22bd65978afbda4aa44a7dcc2acba975045b0300cec412005d5eda5,2024-04-19T07:15:09.770000
|
||||
CVE-2024-26329,0,0,6eec7b644c4867f186846a122998b4350a4dc0459882c3ea663ee6d77c6e1117,2024-04-05T12:40:52.763000
|
||||
CVE-2024-2633,0,0,d6d619ede14eb7136c8ee12cb2cd0efea8cc18b4fa44aa46ef5af23251d75954,2024-03-19T13:26:46
|
||||
CVE-2024-26331,1,1,b79d5a5166e7aa24461d9430a5f2c842933062e771e66485a56ad11dc471f28d,2024-04-30T19:35:36.960000
|
||||
CVE-2024-26333,0,0,72ddcf1e5079d4095fb63f71d350456e693bb97135c81208eeffa24430bb0b2f,2024-03-05T13:41:01.900000
|
||||
CVE-2024-26334,0,0,561e27fe6d2eae55228bd8cfd4e061bf762c84a8f4fc571dc41629b9250a54d4,2024-03-05T13:41:01.900000
|
||||
CVE-2024-26335,0,0,bfb3ee132d2b0c91b2c24322170ba225610a210d30f34e6f9e49b6acdf8c1001,2024-03-05T13:41:01.900000
|
||||
@ -243492,7 +243505,7 @@ CVE-2024-26580,0,0,495279035de581ec6008f44dc7438add36c8c374f59c2ede086a388e56fdb
|
||||
CVE-2024-26581,0,0,6313645f513de26967acd9d6721419082a344ce45ec1a0cf923d928a6491861a,2024-04-19T17:41:29.470000
|
||||
CVE-2024-26582,0,0,3ff5c496d753899c1fc1e8062e53c8f61453498de38167daf1346ce24125ba81,2024-03-15T13:56:41.843000
|
||||
CVE-2024-26583,0,0,469df0658e18197ed0356dd7a5240250603137d767287de06ec0167d1ae18c2a,2024-03-15T13:05:03.220000
|
||||
CVE-2024-26584,0,0,b2b48302c00eaeeb768b321c147a1b7d666d3960cce1d3c0055da0c0aaefe43b,2024-04-03T14:15:15.613000
|
||||
CVE-2024-26584,0,1,66b388a0a910522be9a0047ed118af49c4e847fe6cb3d187782320bcf2a1a2fe,2024-04-30T19:35:07.273000
|
||||
CVE-2024-26585,0,0,f63f838d2bcdd8ae6d99da2fdbc37c9df617bc6a41e88fe22fa920d7915c1497,2024-04-03T14:15:15.853000
|
||||
CVE-2024-26586,0,0,d050b6a287d721bbbe29b94ce0748dfe771bab6092597ff9abd41f70e3acfd0b,2024-04-26T16:10:22.843000
|
||||
CVE-2024-26587,0,0,9404613a5d22d59f7b9830950f6da0789d954efb37d6d668289d4948436f8def,2024-03-18T18:09:54.027000
|
||||
@ -244466,6 +244479,7 @@ CVE-2024-28253,0,0,f5326dd97701553671f20b198d6b4e3bbd7507e645cfcbbef2e0eb0bd68e4
|
||||
CVE-2024-28254,0,0,a9752b9597156f82582ee0901564a914d350dbef56a1d3e2cb37d87202697963,2024-03-21T02:52:24.507000
|
||||
CVE-2024-28255,0,0,2223e20b88f20882b18c8e2daca66ddc78cf448142396bd3d6e2271daa5feb4a,2024-03-17T22:38:29.433000
|
||||
CVE-2024-2826,0,0,ebd6a4ed863f0132bd5514410d250deb1ecb7037f5a1a019ef2b07cd9ad2cc71,2024-04-11T01:25:38.343000
|
||||
CVE-2024-28269,1,1,5c74156db2589a6a6bb4803bc7b40b2e3f5cb3b5ffc16456d31307ff26f28596,2024-04-30T19:35:36.960000
|
||||
CVE-2024-2827,0,0,534d657d8a445a02b8e7db493cf1c67da13b12f5fd2ba445315dc3931709a0ad,2024-04-11T01:25:38.423000
|
||||
CVE-2024-28270,0,0,f654e93a55aad09ebe8372d915898812c2a1306adefa6bb8aebb87b68cea994c,2024-04-09T12:48:04.090000
|
||||
CVE-2024-28275,0,0,20e2d2e3bfbe8540c4a348bc0e556a1aaebdf48e340e211a9afb11edded84f28,2024-04-03T17:24:18.150000
|
||||
@ -244633,7 +244647,7 @@ CVE-2024-2871,0,0,e9558decb3cc4c54584df3eb06fe6d1bb0c12954fd3dc0d6fb0a6933455338
|
||||
CVE-2024-28713,0,0,beab16cae2dae6cd08028a095390b29624a6437ed474d84784c32091c71ece60,2024-03-28T20:53:20.813000
|
||||
CVE-2024-28714,0,0,05d12d8ac80645ded00d1ead25c51baa98cf4af4d5a078fc724fffec6f7925ec,2024-03-29T12:45:02.937000
|
||||
CVE-2024-28715,0,0,054dc6dc725c244acb835446cab8d82270f7d8ffd8311eb9aca1ba238d62a38d,2024-03-20T13:00:16.367000
|
||||
CVE-2024-28716,0,1,60672beee00d45f0b5bebfb352efd083815ff4d3f0bbecc40b770a59d679e3b5,2024-04-30T17:52:35.057000
|
||||
CVE-2024-28716,0,0,60672beee00d45f0b5bebfb352efd083815ff4d3f0bbecc40b770a59d679e3b5,2024-04-30T17:52:35.057000
|
||||
CVE-2024-28717,0,0,f3e85174e10e6b2a875251d258bba0061735240c3fbf9f5c26ab3fb13ae8132b,2024-04-22T13:28:34.007000
|
||||
CVE-2024-28718,0,0,5f0a839ac4250fecd45af64be191fc810afd4c63b89d4fc0f63a8d6841ad970e,2024-04-15T13:15:51.577000
|
||||
CVE-2024-28722,0,0,9f3d9610dcb3a88962a775c4bceb1adf34898d2ad0bcbbf8f024b9f550b378b8,2024-04-22T13:28:43.747000
|
||||
@ -244651,7 +244665,7 @@ CVE-2024-28754,0,0,5dbc765f1d498ac39b0aa2a583d691b531f5eca3e556d44de526ef3d46786
|
||||
CVE-2024-28755,0,0,1b8336cb8aec54928e95e2838923ef63de390c1d6a172c9e230fb0e16707e4c5,2024-04-03T12:38:04.840000
|
||||
CVE-2024-28756,0,0,25c89ab9b64cbd69060fc1b1f68e4f1c76ee574185097dbf9146fc8b2b315bf5,2024-03-22T12:45:36.130000
|
||||
CVE-2024-28757,0,0,6f674e74da8b1d303f1997061736a8f7699c424c20f0aba68e441f140f441071,2024-03-23T03:15:11.920000
|
||||
CVE-2024-2877,0,1,ed73bf6343f6fce95fe4bdf359b10e578e032bb0abc52341af5e7f61557c21d4,2024-04-30T17:52:35.057000
|
||||
CVE-2024-2877,0,0,ed73bf6343f6fce95fe4bdf359b10e578e032bb0abc52341af5e7f61557c21d4,2024-04-30T17:52:35.057000
|
||||
CVE-2024-28782,0,0,2c346a16649d57b4cd6688055d888a86d12f94177200ab9afb6a4e0c69d4e875,2024-04-03T12:38:04.840000
|
||||
CVE-2024-28784,0,0,c979b0334a0081e1847a4bc955e67dbbc0397aed136c4d3aa1b489c4f3f267b2,2024-03-27T15:49:51.300000
|
||||
CVE-2024-28787,0,0,466884053e2fb97771b0b18e87658d91d7f6894823937327962bdc9b1ecfdc33,2024-04-04T19:24:50.670000
|
||||
@ -244957,7 +244971,7 @@ CVE-2024-29303,0,0,9fc5b63681179dd34090ab25180fdf1128a0a8fe7fe2b044acdbb780ed809
|
||||
CVE-2024-2931,0,0,a6d520754016bbdab2d7efa74efc39e3254a7b8cd183192dc94878921c91c9ca,2024-04-02T12:50:42.233000
|
||||
CVE-2024-29316,0,0,a77a66080b82cffb666cc5dc96a72ca9eacad7eb3c1a78f29a15ae578e7a1db4,2024-03-29T12:45:02.937000
|
||||
CVE-2024-2932,0,0,e61d82b0d87208ef5f42a7f411603262acef25f1192163d01f7ff401e886dc69,2024-04-11T01:25:41.673000
|
||||
CVE-2024-29320,1,1,034c3b91b44dab152de78dc39969c7bfc1ca46c2ebce1cddc44df5b1f49cf2ce,2024-04-30T17:52:35.057000
|
||||
CVE-2024-29320,0,0,034c3b91b44dab152de78dc39969c7bfc1ca46c2ebce1cddc44df5b1f49cf2ce,2024-04-30T17:52:35.057000
|
||||
CVE-2024-29338,0,0,e2411b46399ccf809f7042628f5dc80681cab752a4fc33bfa69d55d7b188c619,2024-03-22T19:02:10.300000
|
||||
CVE-2024-2934,0,0,0a91524619de13afaff0e82d7a21ecc81f28b80f897e74dbcf5f2c4795f84a8f,2024-04-11T01:25:41.763000
|
||||
CVE-2024-2935,0,0,03b2e13118238c25a371886663ff5ca99f3babe087c5e23aed7873fb02fb806f,2024-04-11T01:25:41.850000
|
||||
@ -246665,6 +246679,9 @@ CVE-2024-3298,0,0,35145d829af4d19541380a93e6723503e514b69e11aa4b007b05099610c37f
|
||||
CVE-2024-3299,0,0,f60f2a80accdd6f345a6a9cd66637eda180121596f90c2e7d75707c9fce20eb6,2024-04-04T16:33:06.610000
|
||||
CVE-2024-3302,0,0,125cce6ead91da0349b4d4d5e52af6eb4c2a0511fb870ab9451e4f4746c28bb4,2024-04-24T10:15:07.417000
|
||||
CVE-2024-3309,0,0,f40a3a05e06b21c233f218489e35a926b19106a35690c55b3fda3a1c3bcc0e8a,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33101,1,1,e62348321dd4b337f52aa54b7a6ef70cc135f3be90368c0925accfca837e8ab2,2024-04-30T19:35:36.960000
|
||||
CVE-2024-33102,1,1,f81ed0f2d31fae54b63ab1458a4be713e16646016777c1450c134000425506d1,2024-04-30T19:35:36.960000
|
||||
CVE-2024-33103,1,1,088319517330be56b7d5c86f918e193baa9839f4e357e6ebefe92beb8796ad5f,2024-04-30T19:35:36.960000
|
||||
CVE-2024-3311,0,0,cc24f0e110212be66e02c71f4e3192ea09f47ae5e9090cac74e341e472a33c23,2024-04-11T01:25:58.140000
|
||||
CVE-2024-3313,0,0,a1f61d968ea3c59507e97f1859e014460ea34c753cfc0814a5308608cf321984,2024-04-10T13:23:38.787000
|
||||
CVE-2024-3314,0,0,78c785cb5b32bdf0baed853861c5d6771b22fff72a031a5ec21a411cf5a4d670,2024-04-11T01:25:58.237000
|
||||
@ -246685,18 +246702,18 @@ CVE-2024-33258,0,0,9cba5ba4b2b25419975f62d52ca9fe6af0f0a8e9f9f0361b732bbec6fa910
|
||||
CVE-2024-33259,0,0,7baedb8a8dc783fa88b887fd5c3c1eaf3e0afda0857f326c9372530e2281ba12,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33260,0,0,e8aa0d878f3a05d87e2a04d2b95090816ce2a8144679e05279a245ccba53bc96,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33266,0,0,927dd095a2b6a54b614bf8c1e0e750cdc0ca58b614e43dfc8d5d13b46fba9a18,2024-04-30T13:11:16.690000
|
||||
CVE-2024-33267,0,1,a78b2286b24749ed225e7efc5173502f33f6b811c6dcc615e641f99756488ea6,2024-04-30T17:52:35.057000
|
||||
CVE-2024-33267,0,0,a78b2286b24749ed225e7efc5173502f33f6b811c6dcc615e641f99756488ea6,2024-04-30T17:52:35.057000
|
||||
CVE-2024-33268,0,0,d51848430596b86828cdea1b1456bd72b9ab7100480eebe45ecde8059fcf4d8a,2024-04-30T13:11:16.690000
|
||||
CVE-2024-33269,0,0,f057cb5f62254a0c9fa57f4b96ff09dcdb5873d667380646331ed433e10fb406,2024-04-30T13:11:16.690000
|
||||
CVE-2024-33270,0,1,63e674f11b71ba838ed51e5d6ad0058830d561193b64efcb9087b0946c1fa257,2024-04-30T17:52:35.057000
|
||||
CVE-2024-33270,0,0,63e674f11b71ba838ed51e5d6ad0058830d561193b64efcb9087b0946c1fa257,2024-04-30T17:52:35.057000
|
||||
CVE-2024-33271,0,0,f480c1ee12c1c41835a7ef2fb81ce75423b8e169b16bec7ba1f8c5fe0d709508,2024-04-30T13:11:16.690000
|
||||
CVE-2024-33272,0,0,cca4c1224a3ae4ab7422dde204301c34209cfdb4cb65d6f9826094911d62dbb6,2024-04-30T13:11:16.690000
|
||||
CVE-2024-33273,0,1,c7f7a2494259846b0d82fb5695d816ec3395f3b7f6d5f31aee78e17799f30ac5,2024-04-30T17:52:35.057000
|
||||
CVE-2024-33274,0,1,7b8416b9d04d4e5af53a2f4dc30ff3cf4a6a03c51a9f990a2d738e2a0c3eae7d,2024-04-30T17:52:35.057000
|
||||
CVE-2024-33275,0,1,aaae7f9a6f386bc209393974e7a83bf83e06e19d58231b1af18c8544bd959fc6,2024-04-30T17:52:35.057000
|
||||
CVE-2024-33273,0,0,c7f7a2494259846b0d82fb5695d816ec3395f3b7f6d5f31aee78e17799f30ac5,2024-04-30T17:52:35.057000
|
||||
CVE-2024-33274,0,0,7b8416b9d04d4e5af53a2f4dc30ff3cf4a6a03c51a9f990a2d738e2a0c3eae7d,2024-04-30T17:52:35.057000
|
||||
CVE-2024-33275,0,0,aaae7f9a6f386bc209393974e7a83bf83e06e19d58231b1af18c8544bd959fc6,2024-04-30T17:52:35.057000
|
||||
CVE-2024-33276,0,0,e40c3e22a282bef2a772b0e5f45a645b1fd132b128d015830c0d51073e57266e,2024-04-30T13:11:16.690000
|
||||
CVE-2024-33308,0,1,c7a96f814c2d5cc70229a8e21ec556c626542afdc137f20682b753e0d11d5580,2024-04-30T17:52:35.057000
|
||||
CVE-2024-33309,0,1,bc213cb8c1d9aef27edd281310b54c36cbe3c640e12ed51efcef8f301e533289,2024-04-30T17:52:35.057000
|
||||
CVE-2024-33308,0,0,c7a96f814c2d5cc70229a8e21ec556c626542afdc137f20682b753e0d11d5580,2024-04-30T17:52:35.057000
|
||||
CVE-2024-33309,0,0,bc213cb8c1d9aef27edd281310b54c36cbe3c640e12ed51efcef8f301e533289,2024-04-30T17:52:35.057000
|
||||
CVE-2024-3333,0,0,8caee5b26018a8a7a4f06ec5d64d35dd731cf8d2f43a25885f4e67db044a1bff,2024-04-17T12:48:07.510000
|
||||
CVE-2024-33331,0,0,d376453cc8c649ab7a3cb33fa711c6bde798d37e4f57b1f2e9caeddda1eec751,2024-04-28T23:15:07.120000
|
||||
CVE-2024-33338,0,0,bc2e0086bf2c48a9038877027b241659108a96f5574842a86f97d96236d8f8f9,2024-04-30T13:11:16.690000
|
||||
@ -246717,7 +246734,7 @@ CVE-2024-33444,0,0,51dd7aab7b3ddadce09df801fad02678beaad514ea2f8f210656bf37b88f7
|
||||
CVE-2024-33445,0,0,f9ae9a9bde21aa65a6cac50dfbb815b11cc09544c6481f56832d02aaa7ca7aee,2024-04-30T13:11:16.690000
|
||||
CVE-2024-33449,0,0,4c7579121060686858d52c789b41b99c382088df7d0f73a51efc5b9f6b878606,2024-04-30T13:11:16.690000
|
||||
CVE-2024-3346,0,0,e1501efbca46250b1b984725e11942bb9306686e2cffb2edd3d8dd5b4c4ccc5c,2024-04-11T01:25:58.637000
|
||||
CVE-2024-33465,0,1,c60e1fa46c4ea2b265000aa415652f8ac29efeb77e15e71db3aa6f12b1709ce5,2024-04-30T17:52:35.057000
|
||||
CVE-2024-33465,0,0,c60e1fa46c4ea2b265000aa415652f8ac29efeb77e15e71db3aa6f12b1709ce5,2024-04-30T17:52:35.057000
|
||||
CVE-2024-3347,0,0,f531aca6ac2c0d8c742afa906f1c675ed72b73f770b0dc5b59ea1d37af1ecdde,2024-04-11T01:25:58.723000
|
||||
CVE-2024-3348,0,0,25c5a153d1148795607a2b1c3bff5dd76b89c464d7f7630dde394d2c2f4d4efd,2024-04-11T01:25:58.807000
|
||||
CVE-2024-3349,0,0,4ef37a58debeef63689165f4817dd2829d7f93c9c3bb30f1eaf20c7d8fa448ab,2024-04-11T01:25:58.880000
|
||||
@ -246835,6 +246852,8 @@ CVE-2024-3377,0,0,4f5c5a9a0c925d4c25c7e7a8167aad399bf59289271bce69d10c801ec2848e
|
||||
CVE-2024-3378,0,0,4f86c276b9b6898b0be7d5e038b0b93861aa9bc2234c5fb397df84486317a3f0,2024-04-14T04:15:56.560000
|
||||
CVE-2024-3382,0,0,359ee56c09e0a2a64315ebc823efc4b55ab60390ccbf48a0550f896cf550e0d4,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3383,0,0,23294a2c02d282067f57807e610d19ad62151e7737eff1a2dbce91b2ce33a939,2024-04-10T19:49:51.183000
|
||||
CVE-2024-33831,1,1,cd22fc61525a4ea4ae630bd724d0ad611164241cd067b1ecaf211be0b3b1b119,2024-04-30T19:35:36.960000
|
||||
CVE-2024-33832,1,1,8824ca786af7c603b8838adaee846ea449880374cc0d764fd0d15fe5558158f3,2024-04-30T19:35:36.960000
|
||||
CVE-2024-3384,0,0,f1db02aa38b819888be52a421a922174001b5f3c9e0abe3ab9082a168503f129,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3385,0,0,dafd55987e5738b5d6ec37d523526a7e0269d60d96cd780933abafbc800645a8,2024-04-10T19:49:51.183000
|
||||
CVE-2024-33851,0,0,68bc6675018b087590ad7bf933ee95fc6f4d8eccffe763d3a294dadfd8285383,2024-04-29T12:42:03.667000
|
||||
@ -246859,6 +246878,8 @@ CVE-2024-34047,0,0,19d2ca9cf9de141961e3e23c7a49cbd763974d82ea83289d560310b1c202c
|
||||
CVE-2024-34048,0,0,e6d9ff471f531552b989ab0670c8eba7287d8741cecbce9b0cbb9a4d53fb0c2e,2024-04-30T13:11:16.690000
|
||||
CVE-2024-34049,0,0,9aa3f131f75fc45cd4bc8429cac44eaca2da5b2edc029e7ac3fe3439cdf03695,2024-04-30T13:11:16.690000
|
||||
CVE-2024-34050,0,0,9a2c282d83ab4ad91eb1f6c4ddeacad349b06e44af38b78f3e2f6ef4239dbf10,2024-04-30T13:11:16.690000
|
||||
CVE-2024-34088,1,1,636fbe5b1a1e19e1af9ede6b8164c4740f450d66b2d6624f11a2b266568f819e,2024-04-30T19:35:36.960000
|
||||
CVE-2024-3411,1,1,96154d16b686810c762f6aaf3528d3da5f7f3979059b90a737e06407f7a9307a,2024-04-30T19:35:36.960000
|
||||
CVE-2024-3413,0,0,7c0263f5aa26015f580f259b17ac76e3fb232807ce6eb6b3e0fa4a42d34def58,2024-04-11T01:26:00.727000
|
||||
CVE-2024-3414,0,0,fcf8b2012e3dcab7048965e9d40e8c26f25a86217cc70e6c24a2ae712b119943,2024-04-11T01:26:00.803000
|
||||
CVE-2024-3415,0,0,80d83d8ba89e3620cb20eb7a8b2b10e1c5fbd8b76c068e7c00b4af6deadd81dd,2024-04-11T01:26:00.900000
|
||||
@ -247205,4 +247226,4 @@ CVE-2024-4310,0,0,d7fbac27755c7133d1c2e0a6447c2fce3b245992298460e093f57ea997a724
|
||||
CVE-2024-4327,0,0,3d14955fd25b48e70347bc21b9cf8e4172732a4fac4f624dc37f9e58a61e1bb9,2024-04-30T13:11:16.690000
|
||||
CVE-2024-4336,0,0,3217d54bd306c3320285772343c381eeb916064434adbe6d8dee38e0f49c378f,2024-04-30T13:11:16.690000
|
||||
CVE-2024-4337,0,0,8a1cfd2947a23a6e06428062fb85a86a0de43435d27cebf7533e44b2da7feda3,2024-04-30T13:11:16.690000
|
||||
CVE-2024-4340,0,1,0fa7c6bfc883a29aea545d51036f6541f96be5c069cd1c4a978687e541eb6f36,2024-04-30T17:52:35.057000
|
||||
CVE-2024-4340,0,0,0fa7c6bfc883a29aea545d51036f6541f96be5c069cd1c4a978687e541eb6f36,2024-04-30T17:52:35.057000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user