mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2024-04-06T08:00:38.637272+00:00
This commit is contained in:
parent
83555fc2ff
commit
5196231c3e
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-23672",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-03-13T16:15:29.287",
|
||||
"lastModified": "2024-04-02T23:15:54.273",
|
||||
"lastModified": "2024-04-06T06:15:07.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,10 @@
|
||||
"url": "https://lists.apache.org/thread/cmpswfx6tj4s7x0nxxosvfqs11lvdx2f",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00001.html",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240402-0002/",
|
||||
"source": "security@apache.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24549",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-03-13T16:15:29.373",
|
||||
"lastModified": "2024-04-02T23:15:54.360",
|
||||
"lastModified": "2024-04-06T06:15:08.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,10 @@
|
||||
"url": "https://lists.apache.org/thread/4c50rmomhbbsdgfjsgwlb51xdwfjdcvg",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00001.html",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240402-0002/",
|
||||
"source": "security@apache.org"
|
||||
|
47
CVE-2024/CVE-2024-24xx/CVE-2024-2471.json
Normal file
47
CVE-2024/CVE-2024-24xx/CVE-2024-2471.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-2471",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-06T06:15:08.470",
|
||||
"lastModified": "2024-04-06T06:15:08.470",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The FooGallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image attachment fields (such as 'Title', 'Alt Text', 'Custom URL', 'Custom Class', and 'Override Type') in all versions up to, and including, 2.4.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3061049%40foogallery&old=3039399%40foogallery&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d5d4aeb1-0a4f-49f1-b5a9-b582e271eae1?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-29xx/CVE-2024-2949.json
Normal file
47
CVE-2024/CVE-2024-29xx/CVE-2024-2949.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-2949",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-06T07:15:06.973",
|
||||
"lastModified": "2024-04-06T07:15:06.973",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Carousel, Slider, Gallery by WP Carousel \u2013 Image Carousel & Photo Gallery, Post Carousel & Post Grid, Product Carousel & Product Grid for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the carousel widget in all versions up to, and including, 2.6.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3065296%40wp-carousel-free&new=3065296%40wp-carousel-free&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9349208c-3e86-4ec6-9e10-5ecaa4923922?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-33xx/CVE-2024-3361.json
Normal file
92
CVE-2024/CVE-2024-33xx/CVE-2024-3361.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3361",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-06T06:15:08.757",
|
||||
"lastModified": "2024-04-06T06:15:08.757",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in SourceCodester Online Library System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file admin/books/deweydecimal.php. The manipulation of the argument category leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259465 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 7.5
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/thisissuperann/Vul/blob/main/Online-Library-System-03",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259465",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259465",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.310425",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-33xx/CVE-2024-3362.json
Normal file
92
CVE-2024/CVE-2024-33xx/CVE-2024-3362.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3362",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-06T07:15:07.333",
|
||||
"lastModified": "2024-04-06T07:15:07.333",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Online Library System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file admin/books/controller.php. The manipulation of the argument IBSN leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-259466 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 7.5
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/thisissuperann/Vul/blob/main/Online-Library-System-04",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259466",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259466",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.310426",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
25
README.md
25
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-06T06:00:37.742939+00:00
|
||||
2024-04-06T08:00:38.637272+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-06T05:15:07.550000+00:00
|
||||
2024-04-06T07:15:07.333000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,28 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
244269
|
||||
244273
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `9`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2024-1385](CVE-2024/CVE-2024-13xx/CVE-2024-1385.json) (`2024-04-06T04:15:10.747`)
|
||||
- [CVE-2024-21506](CVE-2024/CVE-2024-215xx/CVE-2024-21506.json) (`2024-04-06T05:15:07.210`)
|
||||
- [CVE-2024-2444](CVE-2024/CVE-2024-24xx/CVE-2024-2444.json) (`2024-04-06T05:15:07.500`)
|
||||
- [CVE-2024-2656](CVE-2024/CVE-2024-26xx/CVE-2024-2656.json) (`2024-04-06T04:15:11.030`)
|
||||
- [CVE-2024-2950](CVE-2024/CVE-2024-29xx/CVE-2024-2950.json) (`2024-04-06T04:15:11.463`)
|
||||
- [CVE-2024-3216](CVE-2024/CVE-2024-32xx/CVE-2024-3216.json) (`2024-04-06T04:15:11.813`)
|
||||
- [CVE-2024-3358](CVE-2024/CVE-2024-33xx/CVE-2024-3358.json) (`2024-04-06T04:15:12.070`)
|
||||
- [CVE-2024-3359](CVE-2024/CVE-2024-33xx/CVE-2024-3359.json) (`2024-04-06T04:15:12.503`)
|
||||
- [CVE-2024-3360](CVE-2024/CVE-2024-33xx/CVE-2024-3360.json) (`2024-04-06T05:15:07.550`)
|
||||
- [CVE-2024-2471](CVE-2024/CVE-2024-24xx/CVE-2024-2471.json) (`2024-04-06T06:15:08.470`)
|
||||
- [CVE-2024-2949](CVE-2024/CVE-2024-29xx/CVE-2024-2949.json) (`2024-04-06T07:15:06.973`)
|
||||
- [CVE-2024-3361](CVE-2024/CVE-2024-33xx/CVE-2024-3361.json) (`2024-04-06T06:15:08.757`)
|
||||
- [CVE-2024-3362](CVE-2024/CVE-2024-33xx/CVE-2024-3362.json) (`2024-04-06T07:15:07.333`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
- [CVE-2024-23672](CVE-2024/CVE-2024-236xx/CVE-2024-23672.json) (`2024-04-06T06:15:07.717`)
|
||||
- [CVE-2024-24549](CVE-2024/CVE-2024-245xx/CVE-2024-24549.json) (`2024-04-06T06:15:08.030`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
26
_state.csv
26
_state.csv
@ -239099,7 +239099,7 @@ CVE-2024-1380,0,0,a6643d22691040d519e55989c30cc282c581b968e343a9ffa704d3b3b4093b
|
||||
CVE-2024-1381,0,0,d91e8a30b8be52d3f20fae315772163054b248740b5446a92a5d7400055357f3,2024-03-05T13:41:01.900000
|
||||
CVE-2024-1382,0,0,2a91cda82e6eccbb12479004f1cab52cf9c7a68d5341c41e9ea2a1161aafd11d,2024-03-07T13:52:27.110000
|
||||
CVE-2024-1383,0,0,9b7f3b63a5060d2ec2114b4c1750cf327ef7ed2270b46ed8e25ed7e6ce34b642,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1385,1,1,d24637b7ae6ec561f36894345a5c912abcd74360897163ee3f5c43f5b644ee21,2024-04-06T04:15:10.747000
|
||||
CVE-2024-1385,0,0,d24637b7ae6ec561f36894345a5c912abcd74360897163ee3f5c43f5b644ee21,2024-04-06T04:15:10.747000
|
||||
CVE-2024-1388,0,0,a64ad787329a1a90b9d619f8ebf265bcdd5478117890b0948e19434b66711749,2024-02-28T14:06:45.783000
|
||||
CVE-2024-1389,0,0,226d878edb33aaeccb843dfb02fa51c12df5fa099ed0c545a3e0cbe9644a211e,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1390,0,0,71eb0c49e1915160a890c9df4d2040fa529dd6e699ca4bdcf3f6829a9c0e60ea,2024-02-29T13:49:29.390000
|
||||
@ -240070,7 +240070,7 @@ CVE-2024-21502,0,0,4303e1ae1b6dcbd72e1c376c19ab8a2359e92d842fa95b6d253e62be71a35
|
||||
CVE-2024-21503,0,0,dbde89ae4e130de7b3da2486efecec01760e430d7d72c91a7a50092dd8618341,2024-03-19T13:26:46
|
||||
CVE-2024-21504,0,0,49e3dd2437933564763de1c9017a71fc9b864133b3b4959dcdb8b06a9a352074,2024-03-19T13:26:46
|
||||
CVE-2024-21505,0,0,790ab171c9e46ac93718d1bb5680fe990f4ed1edc4d489f5e4dab09077e05267,2024-03-25T13:47:14.087000
|
||||
CVE-2024-21506,1,1,49464276e60fcd34c863a66da1cf82d37758d497d1e222e815718c162a2f958d,2024-04-06T05:15:07.210000
|
||||
CVE-2024-21506,0,0,49464276e60fcd34c863a66da1cf82d37758d497d1e222e815718c162a2f958d,2024-04-06T05:15:07.210000
|
||||
CVE-2024-2151,0,0,18a6fcad8683189bc1efb506f6c521736ba6197d27ab556e14dde08640970095,2024-03-21T02:52:29.870000
|
||||
CVE-2024-2152,0,0,310025f5ea8ce44d7a0a0b2b3eebc18ed40ff16bb94c0d195ab98727b21e2e8b,2024-03-21T02:52:29.957000
|
||||
CVE-2024-2153,0,0,4fc2c1bd0729a4b4b5924182d6367224ebd43d77d2c89d30aad10d987c6cdb2a,2024-03-21T02:52:30.037000
|
||||
@ -241029,7 +241029,7 @@ CVE-2024-23655,0,0,b4fe4299d47f9606e4fc07c80e04bb15761ba2650f126678feb918b4172cc
|
||||
CVE-2024-23656,0,0,695cb145f7353545c42b021c49ddb6b311a4d25b9fa1e7632b8b33e1235c65fb,2024-01-31T23:26:14.650000
|
||||
CVE-2024-23659,0,0,236290b059375e8b7040b3505591889202adcca1fe58c9cff8e0844cbcf32583,2024-01-25T14:58:22.470000
|
||||
CVE-2024-23660,0,0,1b2c29c1f9877409e81cc31263cb621728177876460bb697b8348507998614a6,2024-02-15T16:01:29.370000
|
||||
CVE-2024-23672,0,0,3e30b4071c9b6300f3445a2a8e5bf6ce2d8151000c12401ed1c0dc6184734b52,2024-04-02T23:15:54.273000
|
||||
CVE-2024-23672,0,1,54bf1407d160f0bf02a84f88f834a69410f295a08745f6fc791198a038b82c2c,2024-04-06T06:15:07.717000
|
||||
CVE-2024-23673,0,0,11a42dc617628e4138314e2a3d8d0f02b60cec9315a80bc3284ec5f1547fd09f,2024-02-14T00:26:41.517000
|
||||
CVE-2024-23674,0,0,6ff4eec4bc6bf37404ee9cc16207f5af57bda7bc987c56668d0793a7a9ea14ad,2024-02-16T13:37:55.033000
|
||||
CVE-2024-23675,0,0,9efb5b028640b8fde323c67b79c038267e86921347cc160dc2b8176c1daa7239,2024-01-29T18:04:13.527000
|
||||
@ -241376,7 +241376,7 @@ CVE-2024-24402,0,0,05bde6c2c908d6bd00d03e2f32a00232b16c7e0716c59c44c87ccc77dc0ed
|
||||
CVE-2024-24407,0,0,4193bde31373fba07b9911bdf83cf058d1a88c50f8e538ed6dc5165a28a70be3,2024-03-29T12:45:02.937000
|
||||
CVE-2024-2442,0,0,4a0108630272c9d1ae8cbd16d021c5a020f9f82cadb01d3a92c49cf60c8b3b5a,2024-03-20T13:00:16.367000
|
||||
CVE-2024-2443,0,0,72183cadd70f38595a21379efb2f0e00cd3d95dbe7e44da788d1807f622cd6cc,2024-03-21T12:58:51.093000
|
||||
CVE-2024-2444,1,1,90108671d071ce282a97c310520d66b331b06b9d9989a34b8d673b57fe7fca97,2024-04-06T05:15:07.500000
|
||||
CVE-2024-2444,0,0,90108671d071ce282a97c310520d66b331b06b9d9989a34b8d673b57fe7fca97,2024-04-06T05:15:07.500000
|
||||
CVE-2024-2445,0,0,2f855bbcb84a342093922fd73320bfe19138d60313d23c629da4de19e559d727,2024-03-15T12:53:06.423000
|
||||
CVE-2024-2446,0,0,42e5c66ebcf58bc3242675333cd3d5679a04b8d2c648c26027e5a47b9ff8b42a,2024-03-15T12:53:06.423000
|
||||
CVE-2024-24468,0,0,2ffe0e787add87754da9d28139dd49fe0df5af62f9576796ac86e102fb215c8b,2024-02-07T22:03:09.897000
|
||||
@ -241411,7 +241411,7 @@ CVE-2024-2453,0,0,3516619c9d1ad877533ff47d2854d77f923dcb6e13d6b386a451fa313ccb4d
|
||||
CVE-2024-24539,0,0,f93dd0b0f28d93142ebc045d2b13c802b69814cdafc34403acf2ae3cd69400ec,2024-03-18T12:38:25.490000
|
||||
CVE-2024-24543,0,0,f516e88d85199344e1e2c4ae69468b4de7248951f71da4710fc97171a286ff1a,2024-02-14T17:13:32.827000
|
||||
CVE-2024-24548,0,0,9dbe1af5af4a9b865bf88b2a305b739ac231a7ce95c9c8ed04344b3144708c91,2024-02-08T18:53:14.107000
|
||||
CVE-2024-24549,0,0,9eb3db00525102907084123b420abdc439f9548dffe26caec4bda7c4c40545a5,2024-04-02T23:15:54.360000
|
||||
CVE-2024-24549,0,1,41f01a6ce0acab1e663a33240960755cce5d7348c8154f4ae0884170d1f21b3b,2024-04-06T06:15:08.030000
|
||||
CVE-2024-24556,0,0,5eadc80f5e2b4d40f2247a29eb7c2aa8b2d9f2f191f8cfe4f491f2d184a6cbe7,2024-02-06T19:24:46.810000
|
||||
CVE-2024-24557,0,0,803986686a1d77830cb33582e01547bf1b4ed013f71e8dbf2a84322efe6db933,2024-02-09T20:21:32.970000
|
||||
CVE-2024-24558,0,0,e1e4d32f901535a55c2f6412106d8d6d972ab259b4d2d031ab0a6368463e0518,2024-02-06T19:35:24.230000
|
||||
@ -241469,6 +241469,7 @@ CVE-2024-24705,0,0,fa7603570485ff5e2532a1aa05b32e5c0f5434f5146edb6c736525118ca76
|
||||
CVE-2024-24706,0,0,4d433b03a4c26ebc6bd4b9712c01509648b3f2cecc7341b14e252b0e38dfa793,2024-02-15T02:09:50.480000
|
||||
CVE-2024-24707,0,0,e9eaf11ec6d77d6d63fe4c4f7a4c514f1071c80be95f64729ea7f3c4592d1bf8,2024-04-03T17:24:18.150000
|
||||
CVE-2024-24708,0,0,f693d4f4acd95516c93eac11f2cab76ea0d55ea86fcf1b386fdcecddbfc9bf86,2024-02-29T13:49:29.390000
|
||||
CVE-2024-2471,1,1,6a63e74687f1ff94982182ddafcafe063937f5e52bc8847795dd092ded316a04,2024-04-06T06:15:08.470000
|
||||
CVE-2024-24711,0,0,0d048c3822039d008612960507a20bcb0af4972abb0e8757f981885d0a5986fc,2024-03-26T12:55:05.010000
|
||||
CVE-2024-24712,0,0,3eb883409ceb5cd8ab7cfb2c23165937e7138a0fdba93206148a8d8c39991d81,2024-02-16T14:48:04.207000
|
||||
CVE-2024-24713,0,0,016796105eec4ced1aaab79578ed2b6dc8b6c4a64b21f9341804bb78b76a15f2,2024-02-16T15:48:04.237000
|
||||
@ -242409,7 +242410,7 @@ CVE-2024-26542,0,0,84bcc676050237f7706e936cd8d9d490aa0a127cdccddbe7afe739c073267
|
||||
CVE-2024-26548,0,0,7b31129407d10e539a4174451b23a0f83a48cdb246d6dd13af61036fdc95df1c,2024-03-01T14:04:26.010000
|
||||
CVE-2024-26557,0,0,413b34482d1eed582f272b955524fa71f7b68414d25ad46ae764ef2e2b3412f9,2024-03-22T12:45:36.130000
|
||||
CVE-2024-26559,0,0,32dd037e107446e11601c6ddb83598fc34f3ebdb48b667f29294eba708b9e4c1,2024-02-29T13:49:47.277000
|
||||
CVE-2024-2656,1,1,6b1e617671c5db4410a66b02a7ae4562c59aef6d1d72bcdc3b2418b06c13ceed,2024-04-06T04:15:11.030000
|
||||
CVE-2024-2656,0,0,6b1e617671c5db4410a66b02a7ae4562c59aef6d1d72bcdc3b2418b06c13ceed,2024-04-06T04:15:11.030000
|
||||
CVE-2024-26566,0,0,e082212a38f258b5c22bdd7daa5a29191a5e851b4c959cb2f66848d27d20d8bb,2024-03-07T13:52:27.110000
|
||||
CVE-2024-26577,0,0,eb994672bf510d158b4978f43b0d7e0594f22405d228a7c909ba4da4498cc451,2024-03-27T12:29:30.307000
|
||||
CVE-2024-26578,0,0,631d617cd0985d9923eed32b0cb4b9e9025809830b6a3ca2ef1a468d4f2a7124,2024-02-22T19:07:27.197000
|
||||
@ -243564,8 +243565,9 @@ CVE-2024-29474,0,0,2aadcb81ffb1d351041d20929f964ee8063ff37b32acc5a730656efc04de5
|
||||
CVE-2024-29477,0,0,5231aab2983543fdf491ab629db6bbcb71a18478e7074594e3d1100549f6a211,2024-04-03T12:38:04.840000
|
||||
CVE-2024-2948,0,0,3594bbd430dd5444695ca044dc4efc4195ce92c17c43c967ca88fadf4c9f5e69,2024-04-01T01:12:59.077000
|
||||
CVE-2024-29489,0,0,281c97da696e2014734e05639dd64d47354e5c2b4bcf9f1b7827a4a4899ee03d,2024-03-29T12:45:02.937000
|
||||
CVE-2024-2949,1,1,5ad125022bc8aed0ddd1ffad23bdf8604b82f4097130ea250fd3f1347f2dc708,2024-04-06T07:15:06.973000
|
||||
CVE-2024-29499,0,0,6d5bcd6ddf0ffffbb229032818f99219d3a96f2f060fbc36a33564f3ae345d5e,2024-03-22T19:02:10.300000
|
||||
CVE-2024-2950,1,1,4490b094193c27c7b50356493c173985060b11fe58eb1177815e1eb668a30b5f,2024-04-06T04:15:11.463000
|
||||
CVE-2024-2950,0,0,4490b094193c27c7b50356493c173985060b11fe58eb1177815e1eb668a30b5f,2024-04-06T04:15:11.463000
|
||||
CVE-2024-2951,0,0,7025f71f619ebfb5f00b29e3d72fe62bb5f0ea0dbfe92a58b33e63352aa0779c,2024-03-27T12:29:41.530000
|
||||
CVE-2024-29514,0,0,2d6d3d0a4ae4b5ae40dadfbf4537d707f35bed7e85002b6d4e3d8180d6408f0b,2024-04-02T18:12:16.283000
|
||||
CVE-2024-29515,0,0,79c9f65757e49bdb19c4dcff88d6ba2d524b1951e790ac90d5ffb4f302abcf45,2024-03-26T12:55:05.010000
|
||||
@ -244216,7 +244218,7 @@ CVE-2024-3204,0,0,a9dea1ca01b499632a34af3ee57c461ecd8a21787537da790c2ae8f833a611
|
||||
CVE-2024-3205,0,0,b2f3ceb1bf38a09a954460b526a18eba5a5a22a0c7181b9f1de158755c6153d4,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3207,0,0,5c9ae7819818cf69391317769652edafe7eb5058db1623e7c6299d6d13471791,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3209,0,0,cbfab2641f7deaa26fa0bc09801c52aa5b55dcac193d132dc1556c423a22c65d,2024-04-06T03:15:07.983000
|
||||
CVE-2024-3216,1,1,2dc4fb4b2bb02dfb9b4c69bd5e9febd5fa358539ce9d22b80adb6f50c85f1961,2024-04-06T04:15:11.813000
|
||||
CVE-2024-3216,0,0,2dc4fb4b2bb02dfb9b4c69bd5e9febd5fa358539ce9d22b80adb6f50c85f1961,2024-04-06T04:15:11.813000
|
||||
CVE-2024-3217,0,0,4de075781ed27d9af99ed393e165df2d285dc08a6ed9934e378886c989fa51ff,2024-04-05T12:40:52.763000
|
||||
CVE-2024-3218,0,0,2efa792f2f422ae3d499fd8bd729cdb1e057c75ae9cfbaccf7a66bc466210399,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3221,0,0,265e838721fb682684198a7086d104f84e57519a8c4d6ef772db38592eb6bf44,2024-04-03T12:38:04.840000
|
||||
@ -244265,6 +244267,8 @@ CVE-2024-3354,0,0,d035bebbbe4ba20bd3a170fae23b0047b357c9ccbebf4d91c0e7d2d35e44b1
|
||||
CVE-2024-3355,0,0,ca68600fd0628cb5ae79a1a70be90a2c45f3bd0e143e4bf60e7a607aceefa438,2024-04-05T21:15:09.800000
|
||||
CVE-2024-3356,0,0,ba2a4323d3ef545405bc3e57d4d8fd5b2db7ed6b3db10c68e5aaa772d5c08f2c,2024-04-05T21:15:10.033000
|
||||
CVE-2024-3357,0,0,b2df18286a35ae9917365c7ebbd57657afc4476a2e1c86e29f32309e79b4d063,2024-04-05T22:15:07.563000
|
||||
CVE-2024-3358,1,1,ab01dabc23656440b3622c5007937546b313923d6095d4c2551b2566ba26e9b1,2024-04-06T04:15:12.070000
|
||||
CVE-2024-3359,1,1,5a660a9bb906bcbec699f4b9a6978728fbbe08a520c355f924362a3191722f40,2024-04-06T04:15:12.503000
|
||||
CVE-2024-3360,1,1,d06c422a19de6ea1e839ee38dfed0f550d0d98475308f312095f1fd62a5b8dfb,2024-04-06T05:15:07.550000
|
||||
CVE-2024-3358,0,0,ab01dabc23656440b3622c5007937546b313923d6095d4c2551b2566ba26e9b1,2024-04-06T04:15:12.070000
|
||||
CVE-2024-3359,0,0,5a660a9bb906bcbec699f4b9a6978728fbbe08a520c355f924362a3191722f40,2024-04-06T04:15:12.503000
|
||||
CVE-2024-3360,0,0,d06c422a19de6ea1e839ee38dfed0f550d0d98475308f312095f1fd62a5b8dfb,2024-04-06T05:15:07.550000
|
||||
CVE-2024-3361,1,1,0b4a20ae0c264f2121167d14163e860ded5203ec438c30cd4b1059530ab37978,2024-04-06T06:15:08.757000
|
||||
CVE-2024-3362,1,1,4a6e972c869341c43eef145b0dd1f1f353b666f15ed4ebfc07d25dd5954a8a23,2024-04-06T07:15:07.333000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user