mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2024-04-09T02:00:30.495496+00:00
This commit is contained in:
parent
e105b4011a
commit
539335e734
59
CVE-2024/CVE-2024-256xx/CVE-2024-25646.json
Normal file
59
CVE-2024/CVE-2024-256xx/CVE-2024-25646.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-25646",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-04-09T01:15:48.343",
|
||||
"lastModified": "2024-04-09T01:15:48.343",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Due to improper validation,\u00a0SAP BusinessObject Business Intelligence Launch Pad allows an authenticated attacker to access operating system information using crafted document. On successful exploitation there could be a considerable impact on confidentiality of the application.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3421384",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-278xx/CVE-2024-27898.json
Normal file
59
CVE-2024/CVE-2024-278xx/CVE-2024-27898.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-27898",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-04-09T01:15:48.583",
|
||||
"lastModified": "2024-04-09T01:15:48.583",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP NetWeaver application, due to insufficient input validation, allows an attacker to send a crafted request from a vulnerable web application targeting internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a\u00a0Server-Side Request Forgery vulnerability. Thus, having a low impact on confidentiality.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3425188",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-278xx/CVE-2024-27899.json
Normal file
59
CVE-2024/CVE-2024-278xx/CVE-2024-27899.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-27899",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-04-09T01:15:48.777",
|
||||
"lastModified": "2024-04-09T01:15:48.777",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Self-Registration\u00a0and Modify your own profile in User Admin Application of NetWeaver AS Java does not enforce proper security requirements for the content of the newly defined security answer. This can be leveraged by an attacker to cause profound impact on confidentiality and low impact on both integrity and availability.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.3
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-640"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3434839",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-279xx/CVE-2024-27901.json
Normal file
59
CVE-2024/CVE-2024-279xx/CVE-2024-27901.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-27901",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-04-09T01:15:48.993",
|
||||
"lastModified": "2024-04-09T01:15:48.993",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP Asset Accounting could allow a high privileged attacker to exploit insufficient validation of path information provided by the users and pass it through to the file API's. Thus, causing a considerable impact on confidentiality, integrity and availability of the application.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-35"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3438234",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2024/CVE-2024-279xx/CVE-2024-27983.json
Normal file
43
CVE-2024/CVE-2024-279xx/CVE-2024-27983.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2024-27983",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-04-09T01:15:49.197",
|
||||
"lastModified": "2024-04-09T01:15:49.197",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client triggering the Http2Session destructor while header frames are still being processed (and stored in memory) causing a race condition."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "support@hackerone.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2319584",
|
||||
"source": "support@hackerone.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-281xx/CVE-2024-28167.json
Normal file
59
CVE-2024/CVE-2024-281xx/CVE-2024-28167.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-28167",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-04-09T01:15:49.380",
|
||||
"lastModified": "2024-04-09T01:15:49.380",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP Group Reporting Data Collection\u00a0does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. On successful exploitation, specific data can be changed via the Enter Package Data app although the user does not have sufficient authorization causing high impact on Integrity of the appliction.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3442378",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2024/CVE-2024-29xx/CVE-2024-2975.json
Normal file
43
CVE-2024/CVE-2024-29xx/CVE-2024-2975.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2024-2975",
|
||||
"sourceIdentifier": "security@octopus.com",
|
||||
"published": "2024-04-09T01:15:49.583",
|
||||
"lastModified": "2024-04-09T01:15:49.583",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A race condition was identified through which privilege escalation was possible in certain configurations."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@octopus.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisories.octopus.com/post/2024/sa2024-01/",
|
||||
"source": "security@octopus.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-302xx/CVE-2024-30214.json
Normal file
59
CVE-2024/CVE-2024-302xx/CVE-2024-30214.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-30214",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-04-09T01:15:49.750",
|
||||
"lastModified": "2024-04-09T01:15:49.750",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The application allows a high privilege attacker to append a malicious GET query parameter to Service invocations, which are reflected in the server response. Under certain circumstances, if the parameter contains a JavaScript, the script could be processed on client side.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3421453",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-302xx/CVE-2024-30215.json
Normal file
59
CVE-2024/CVE-2024-302xx/CVE-2024-30215.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-30215",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-04-09T01:15:49.953",
|
||||
"lastModified": "2024-04-09T01:15:49.953",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Resource Settings page allows a high privilege attacker to load exploitable payload to be stored and reflected whenever a User visits the page. In a successful attack, some information could be obtained and/or modified. However,\u00a0the attacker does not have control over what information is obtained, or the amount or kind of loss is limited.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3421453",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-302xx/CVE-2024-30216.json
Normal file
59
CVE-2024/CVE-2024-302xx/CVE-2024-30216.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-30216",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-04-09T01:15:50.140",
|
||||
"lastModified": "2024-04-09T01:15:50.140",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cash Management in SAP S/4 HANA does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. By\u00a0exploiting this vulnerability, attacker can add notes in the review request with 'completed' status affecting the integrity of the application.\u00a0Confidentiality and Availability are not impacted.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3427178",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-302xx/CVE-2024-30217.json
Normal file
59
CVE-2024/CVE-2024-302xx/CVE-2024-30217.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-30217",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-04-09T01:15:50.353",
|
||||
"lastModified": "2024-04-09T01:15:50.353",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cash Management in SAP S/4 HANA does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. By exploiting this vulnerability, an attacker can approve or reject a bank account application affecting the integrity of the application. Confidentiality and Availability are not impacted.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3430173",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-302xx/CVE-2024-30218.json
Normal file
59
CVE-2024/CVE-2024-302xx/CVE-2024-30218.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-30218",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-04-09T01:15:50.570",
|
||||
"lastModified": "2024-04-09T01:15:50.570",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The ABAP Application Server of SAP NetWeaver as well as ABAP Platform\u00a0allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service. This leads to a considerable impact on availability.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3359778",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
58
README.md
58
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-08T23:55:30.992103+00:00
|
||||
2024-04-09T02:00:30.495496+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-08T23:15:08.023000+00:00
|
||||
2024-04-09T01:15:50.570000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,59 +27,37 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2024-04-08T00:00:20.246444+00:00
|
||||
2024-04-09T00:00:20.239596+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
244490
|
||||
244502
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `9`
|
||||
Recently added CVEs: `12`
|
||||
|
||||
- [CVE-2024-0082](CVE-2024/CVE-2024-00xx/CVE-2024-0082.json) (`2024-04-08T22:15:07.993`)
|
||||
- [CVE-2024-0083](CVE-2024/CVE-2024-00xx/CVE-2024-0083.json) (`2024-04-08T22:15:08.203`)
|
||||
- [CVE-2024-22949](CVE-2024/CVE-2024-229xx/CVE-2024-22949.json) (`2024-04-08T23:15:07.647`)
|
||||
- [CVE-2024-23079](CVE-2024/CVE-2024-230xx/CVE-2024-23079.json) (`2024-04-08T23:15:07.703`)
|
||||
- [CVE-2024-23081](CVE-2024/CVE-2024-230xx/CVE-2024-23081.json) (`2024-04-08T23:15:07.757`)
|
||||
- [CVE-2024-23084](CVE-2024/CVE-2024-230xx/CVE-2024-23084.json) (`2024-04-08T23:15:07.803`)
|
||||
- [CVE-2024-23584](CVE-2024/CVE-2024-235xx/CVE-2024-23584.json) (`2024-04-08T23:15:07.850`)
|
||||
- [CVE-2024-27632](CVE-2024/CVE-2024-276xx/CVE-2024-27632.json) (`2024-04-08T22:15:08.413`)
|
||||
- [CVE-2024-31047](CVE-2024/CVE-2024-310xx/CVE-2024-31047.json) (`2024-04-08T23:15:08.023`)
|
||||
- [CVE-2024-25646](CVE-2024/CVE-2024-256xx/CVE-2024-25646.json) (`2024-04-09T01:15:48.343`)
|
||||
- [CVE-2024-27898](CVE-2024/CVE-2024-278xx/CVE-2024-27898.json) (`2024-04-09T01:15:48.583`)
|
||||
- [CVE-2024-27899](CVE-2024/CVE-2024-278xx/CVE-2024-27899.json) (`2024-04-09T01:15:48.777`)
|
||||
- [CVE-2024-27901](CVE-2024/CVE-2024-279xx/CVE-2024-27901.json) (`2024-04-09T01:15:48.993`)
|
||||
- [CVE-2024-27983](CVE-2024/CVE-2024-279xx/CVE-2024-27983.json) (`2024-04-09T01:15:49.197`)
|
||||
- [CVE-2024-28167](CVE-2024/CVE-2024-281xx/CVE-2024-28167.json) (`2024-04-09T01:15:49.380`)
|
||||
- [CVE-2024-2975](CVE-2024/CVE-2024-29xx/CVE-2024-2975.json) (`2024-04-09T01:15:49.583`)
|
||||
- [CVE-2024-30214](CVE-2024/CVE-2024-302xx/CVE-2024-30214.json) (`2024-04-09T01:15:49.750`)
|
||||
- [CVE-2024-30215](CVE-2024/CVE-2024-302xx/CVE-2024-30215.json) (`2024-04-09T01:15:49.953`)
|
||||
- [CVE-2024-30216](CVE-2024/CVE-2024-302xx/CVE-2024-30216.json) (`2024-04-09T01:15:50.140`)
|
||||
- [CVE-2024-30217](CVE-2024/CVE-2024-302xx/CVE-2024-30217.json) (`2024-04-09T01:15:50.353`)
|
||||
- [CVE-2024-30218](CVE-2024/CVE-2024-302xx/CVE-2024-30218.json) (`2024-04-09T01:15:50.570`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `29`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2023-40551](CVE-2023/CVE-2023-405xx/CVE-2023-40551.json) (`2024-04-08T22:50:42.587`)
|
||||
- [CVE-2023-42892](CVE-2023/CVE-2023-428xx/CVE-2023-42892.json) (`2024-04-08T22:43:44.103`)
|
||||
- [CVE-2023-42893](CVE-2023/CVE-2023-428xx/CVE-2023-42893.json) (`2024-04-08T22:45:24.987`)
|
||||
- [CVE-2023-42896](CVE-2023/CVE-2023-428xx/CVE-2023-42896.json) (`2024-04-08T22:45:48.987`)
|
||||
- [CVE-2023-42913](CVE-2023/CVE-2023-429xx/CVE-2023-42913.json) (`2024-04-08T22:46:44.747`)
|
||||
- [CVE-2023-42930](CVE-2023/CVE-2023-429xx/CVE-2023-42930.json) (`2024-04-08T22:46:51.907`)
|
||||
- [CVE-2023-42931](CVE-2023/CVE-2023-429xx/CVE-2023-42931.json) (`2024-04-08T22:47:13.533`)
|
||||
- [CVE-2023-42936](CVE-2023/CVE-2023-429xx/CVE-2023-42936.json) (`2024-04-08T22:47:26.453`)
|
||||
- [CVE-2023-42947](CVE-2023/CVE-2023-429xx/CVE-2023-42947.json) (`2024-04-08T22:47:21.010`)
|
||||
- [CVE-2023-42950](CVE-2023/CVE-2023-429xx/CVE-2023-42950.json) (`2024-04-08T22:48:38.313`)
|
||||
- [CVE-2023-42956](CVE-2023/CVE-2023-429xx/CVE-2023-42956.json) (`2024-04-08T22:47:31.973`)
|
||||
- [CVE-2023-42962](CVE-2023/CVE-2023-429xx/CVE-2023-42962.json) (`2024-04-08T22:47:42.510`)
|
||||
- [CVE-2023-50313](CVE-2023/CVE-2023-503xx/CVE-2023-50313.json) (`2024-04-08T22:48:41.757`)
|
||||
- [CVE-2024-21894](CVE-2024/CVE-2024-218xx/CVE-2024-21894.json) (`2024-04-08T22:53:09.773`)
|
||||
- [CVE-2024-22023](CVE-2024/CVE-2024-220xx/CVE-2024-22023.json) (`2024-04-08T22:51:43.003`)
|
||||
- [CVE-2024-22052](CVE-2024/CVE-2024-220xx/CVE-2024-22052.json) (`2024-04-08T22:52:44.573`)
|
||||
- [CVE-2024-22053](CVE-2024/CVE-2024-220xx/CVE-2024-22053.json) (`2024-04-08T22:53:03.443`)
|
||||
- [CVE-2024-2879](CVE-2024/CVE-2024-28xx/CVE-2024-2879.json) (`2024-04-08T22:49:41.533`)
|
||||
- [CVE-2024-29745](CVE-2024/CVE-2024-297xx/CVE-2024-29745.json) (`2024-04-08T22:53:32.127`)
|
||||
- [CVE-2024-29748](CVE-2024/CVE-2024-297xx/CVE-2024-29748.json) (`2024-04-08T22:52:33.780`)
|
||||
- [CVE-2024-30620](CVE-2024/CVE-2024-306xx/CVE-2024-30620.json) (`2024-04-08T22:48:50.340`)
|
||||
- [CVE-2024-30621](CVE-2024/CVE-2024-306xx/CVE-2024-30621.json) (`2024-04-08T22:48:53.950`)
|
||||
- [CVE-2024-31135](CVE-2024/CVE-2024-311xx/CVE-2024-31135.json) (`2024-04-08T22:39:48.067`)
|
||||
- [CVE-2024-31137](CVE-2024/CVE-2024-311xx/CVE-2024-31137.json) (`2024-04-08T22:41:02.117`)
|
||||
- [CVE-2024-31138](CVE-2024/CVE-2024-311xx/CVE-2024-31138.json) (`2024-04-08T22:41:43.087`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
88
_state.csv
88
_state.csv
@ -147512,7 +147512,7 @@ CVE-2020-12690,0,0,932f4d7352f90088a9f578504c44be8847a8bb9135ca27abbf0e6e9d6a59e
|
||||
CVE-2020-12691,0,0,8e936d1c5cdffd146bc278c066d9a70e4266ee85ac8cfee1fdbe044ecb53c204,2023-11-07T03:15:43.400000
|
||||
CVE-2020-12692,0,0,68377434c9925280af48ed2235b3dc41c869c6a9f459c87d28fb05843aec4e7f,2022-04-27T14:49:33.780000
|
||||
CVE-2020-12693,0,0,96537bdd992b256867c7de87efad9d3b709514936eac906d253364893935ad16,2023-11-07T03:15:43.473000
|
||||
CVE-2020-12695,0,1,27ffbee5e8b267c5d2856bd4c9cb8539ea3cd4cfbba836b70a20ba11c7e1cbd9,2024-04-08T22:50:14.587000
|
||||
CVE-2020-12695,0,0,27ffbee5e8b267c5d2856bd4c9cb8539ea3cd4cfbba836b70a20ba11c7e1cbd9,2024-04-08T22:50:14.587000
|
||||
CVE-2020-12696,0,0,bb4ea2f1e1708b0e3cc6a5ab6bd21378414f1c6b5ffe75eea16235249dbe1939,2020-05-11T19:54:27.610000
|
||||
CVE-2020-12697,0,0,a04ceec1a5a5d9cfbca6c82b567d18470df3de295c50bb73c0dacef793186720,2020-05-14T17:51:41.210000
|
||||
CVE-2020-12698,0,0,1ebabd06d333214adb866f1670bd59dc5c75c554562d6021bcac5548ce495d8b,2021-07-21T11:39:23.747000
|
||||
@ -163082,7 +163082,7 @@ CVE-2020-8280,0,0,8d5f0a3c05bd32b92e1a858a83594675a405cccfedeb61c86c6b0f4a117866
|
||||
CVE-2020-8281,0,0,7b0fbce8746c448976b5242155b86de40c6c79f6aef5f735ac25b73023022b1a,2021-01-11T17:39:01.227000
|
||||
CVE-2020-8282,0,0,8222c1643818edd8f6af8739cd00802cafdf09f4420f884c84232b750c7a9ce4,2020-12-16T15:41:49.850000
|
||||
CVE-2020-8283,0,0,27005cdc68403e5c13995e8fdafcca44a2c6dc4c7d8c8e52cb9054d9aec06275,2020-12-17T18:45:00.930000
|
||||
CVE-2020-8284,0,1,8f463048503fbc3cbce375860cc388cb8411db5e169b891f858300da68e7f56c,2024-04-08T22:50:54.947000
|
||||
CVE-2020-8284,0,0,8f463048503fbc3cbce375860cc388cb8411db5e169b891f858300da68e7f56c,2024-04-08T22:50:54.947000
|
||||
CVE-2020-8285,0,0,c3522f16bed2fee4b17164c0cd5d5a93552cd535d4c4756a633db3011ffa406c,2024-03-27T15:47:57.647000
|
||||
CVE-2020-8286,0,0,a02fcb8742fe23470beab7341e4d5bc8102e3b0e9656dfa9fa789b059c0b5ddf,2024-03-27T15:47:53.600000
|
||||
CVE-2020-8287,0,0,51b26482339c04c71bda7d277ce4f0314f019302250bc19c704cb13bd4f6cda8,2023-11-07T03:26:19.870000
|
||||
@ -210410,7 +210410,7 @@ CVE-2022-4703,0,0,a54efefe8f1bf43e81ffe6f0534eb7c7fef19c4eb56abbe0b1a9751740bf34
|
||||
CVE-2022-47034,0,0,5ac67aa163553be867a866364afa18b92dc4bc7f840a7a175875590efa8c950d,2023-02-22T20:14:11.913000
|
||||
CVE-2022-47035,0,0,6de38aa6dd343d75bbc639415c58256731fecf518f1c4aca9134799b3f4e37ab,2023-02-07T21:48:39.107000
|
||||
CVE-2022-47036,0,0,53d34e8273024b8eeecffd8025a771d55583aff98ad4183453458594b15cc520,2024-03-18T12:38:25.490000
|
||||
CVE-2022-47037,0,1,0d6bd5f96c570b765eb198268550695e105531699ad7c34fd3538d2384d09934,2024-04-08T22:38:15.457000
|
||||
CVE-2022-47037,0,0,0d6bd5f96c570b765eb198268550695e105531699ad7c34fd3538d2384d09934,2024-04-08T22:38:15.457000
|
||||
CVE-2022-4704,0,0,289f00bc2c7bddd2e8580a0d5456fb999a00d90d29455463d675c0eb0cf82dc4,2023-11-07T03:58:38.160000
|
||||
CVE-2022-47040,0,0,139162540c4b4f6403c0b78cf9d63ce91541a6ef58b5946a43c02d0acb4b26c4,2023-02-06T16:23:30.867000
|
||||
CVE-2022-47042,0,0,bc5b023d3951c7f331334ddd5fd77dc6d9e09c482ec9699d1fff190864e73066,2023-02-01T15:55:27.787000
|
||||
@ -228761,7 +228761,7 @@ CVE-2023-40385,0,0,d87186e65fbe11c963d9f2ac49a37bea6de8f4a87feb525e072522d577fee
|
||||
CVE-2023-40386,0,0,98b5b9164e51a67fec2b119151c92fd2d9bb1d8d51de82443b681e79ce2c9a34,2023-10-12T01:59:56.563000
|
||||
CVE-2023-40388,0,0,0669c38434b1494ed261fd2860ebba321deabd42233fd11611759d0565888e20,2023-10-12T01:59:05.793000
|
||||
CVE-2023-4039,0,0,0accd3adc8756cc7a927b7c908e91237d32e08c68f471a1067012290c829eea2,2024-02-19T23:15:07.680000
|
||||
CVE-2023-40390,0,1,dcc08f1579a2804bdfa75d3a1e4b64bbe4a6a3affb5757b1219cc9eb8124a134,2024-04-08T22:42:58.650000
|
||||
CVE-2023-40390,0,0,dcc08f1579a2804bdfa75d3a1e4b64bbe4a6a3affb5757b1219cc9eb8124a134,2024-04-08T22:42:58.650000
|
||||
CVE-2023-40391,0,0,674710606efc5e20f3b4d034fd6151d2f994f0410f8a773be4faafb0e10f357d,2023-11-07T04:20:12.943000
|
||||
CVE-2023-40392,0,0,84bd7104c6189c2c6e9b4ab3e6ad9d972f95c392c1e5bd1a44d7d7f201861784,2023-12-22T15:18:01.370000
|
||||
CVE-2023-40393,0,0,4bc719fe5b2c101665c569bf2c331dc4a53294b75d2f5d545fba8e39b8e680a7,2024-01-17T18:30:39.897000
|
||||
@ -228869,7 +228869,7 @@ CVE-2023-40548,0,0,d740a2b8a13e8813735dd2afef30cd8df83a004b64be9266b3a33c9494c9c
|
||||
CVE-2023-40549,0,0,f3e5db151ee531b27b6ccdd941e8af2105e35d0f53958595d6c0bc80cce5e542,2024-02-05T21:33:24.707000
|
||||
CVE-2023-4055,0,0,a76fc1fa0e45973f400a49513a2db89a2627bd4fbf5c01947ac1c4f676cd8aeb,2023-08-09T21:15:11.820000
|
||||
CVE-2023-40550,0,0,9f289352f5b3ef8fe58f1e2bc083f0230602eb136dcc409311dd01025296c62a,2024-02-05T21:38:37.280000
|
||||
CVE-2023-40551,0,1,7e23f8c15d6d96ebab3b02e1cbac027592cfe60840a84e1ef36066ee55339baa,2024-04-08T22:50:42.587000
|
||||
CVE-2023-40551,0,0,7e23f8c15d6d96ebab3b02e1cbac027592cfe60840a84e1ef36066ee55339baa,2024-04-08T22:50:42.587000
|
||||
CVE-2023-40552,0,0,c2622408aa36bd78f5e5430d30ee7193e6af4e034508bc1f26ac2385010c374f,2023-09-08T21:27:56.877000
|
||||
CVE-2023-40553,0,0,f75c02cf1e791ac55e3a969e16572991fc3e66a0701028da1fb8fc02a85ffa08,2023-09-08T21:22:31.697000
|
||||
CVE-2023-40554,0,0,a92d3a47fe3c14157d269f90a7243f921fd8d94afe574f04f0e5826a46692480,2023-09-08T21:22:23.213000
|
||||
@ -230388,10 +230388,10 @@ CVE-2023-42889,0,0,42361d7a844de9570556985cb5c26fe399cae2c49e9ac17e150405bc9bd14
|
||||
CVE-2023-4289,0,0,f449244f705f291b0d7ddbc329d46d68ae72f3f405646fb1709b45473269b907,2023-11-07T04:22:25.410000
|
||||
CVE-2023-42890,0,0,eacabcc2a4af39632e6d4228761680fb329094370499894080f37a6035d56207,2024-02-02T03:11:18.417000
|
||||
CVE-2023-42891,0,0,7846fe25f210e0b0608521c50c1b1f15957f2513ef89a3c83e589c7bed8db2b2,2023-12-13T17:46:10.560000
|
||||
CVE-2023-42892,0,1,d656999f27fd959b2d8aad578b89fba3bd151847b52057bf20ddc66a5929d7ae,2024-04-08T22:43:44.103000
|
||||
CVE-2023-42893,0,1,3b5c902b52b645d9aede0f9fe80c044f3f2e5d4cab56f3f386485fbba15922ae,2024-04-08T22:45:24.987000
|
||||
CVE-2023-42892,0,0,d656999f27fd959b2d8aad578b89fba3bd151847b52057bf20ddc66a5929d7ae,2024-04-08T22:43:44.103000
|
||||
CVE-2023-42893,0,0,3b5c902b52b645d9aede0f9fe80c044f3f2e5d4cab56f3f386485fbba15922ae,2024-04-08T22:45:24.987000
|
||||
CVE-2023-42894,0,0,675f93d1b0d4296c714bb851c1c8cebe1d109e20fbe5c2802462dd05c7607dcc,2024-02-02T03:11:25.083000
|
||||
CVE-2023-42896,0,1,90349bc552afff68a55bebf13df422103ebf33a47922db40606280b46ab44421,2024-04-08T22:45:48.987000
|
||||
CVE-2023-42896,0,0,90349bc552afff68a55bebf13df422103ebf33a47922db40606280b46ab44421,2024-04-08T22:45:48.987000
|
||||
CVE-2023-42897,0,0,b9f50f6e7bf2b37ee8bcc879a04d31e42b1e46ab101c921014af1dae5762efc0,2023-12-13T20:57:23.147000
|
||||
CVE-2023-42898,0,0,dcd63d2da25631e7b1de0a508c17683086fe149cd68524397b9248e14b5c0a13,2023-12-13T23:15:29.030000
|
||||
CVE-2023-42899,0,0,a3799d4a021bbd53e7e95b764e09f7a56ae66d67b39322f34aee128999f61553,2023-12-14T14:07:42.957000
|
||||
@ -230410,7 +230410,7 @@ CVE-2023-4291,0,0,820c0ef5909fcefa01c2a721d589920b63994852e7a069d42cd163e7b56171
|
||||
CVE-2023-42910,0,0,71a54e7b7fb5706098fa51027de526083f12c7f45c9c197df68e4ac606502e93,2023-12-13T19:14:00.170000
|
||||
CVE-2023-42911,0,0,867b92b373d754d783128b4f56f24fc6b647c44603b483046d9505c18745d73b,2023-12-13T19:12:48.780000
|
||||
CVE-2023-42912,0,0,c098e394dc0a67e07f9df04c549c33226f6d9ce3b3c9000a8422b2e740c1e1ce,2023-12-13T19:20:21.287000
|
||||
CVE-2023-42913,0,1,fca9e6b4a7bebf8cd0dd440c67f0319697b048295dd7ed33ccca693aa95bb9ee,2024-04-08T22:46:44.747000
|
||||
CVE-2023-42913,0,0,fca9e6b4a7bebf8cd0dd440c67f0319697b048295dd7ed33ccca693aa95bb9ee,2024-04-08T22:46:44.747000
|
||||
CVE-2023-42914,0,0,d136deea7639edb129a4f43389dd9bd60f947fe20e61b8abbaafea8d30a38f33,2023-12-14T14:54:10.347000
|
||||
CVE-2023-42915,0,0,1be85ce6fa0cfc0bf8e379977bec0d27fb6c9ccbc4c64c6fe4121e3a8a02c76e,2024-02-14T03:15:13.210000
|
||||
CVE-2023-42916,0,0,1069f61a27a7fa77970bbb0175ce8643cfc992d30189fcf5adedb4c6bed028c3,2024-01-26T17:15:10.007000
|
||||
@ -230426,13 +230426,13 @@ CVE-2023-42927,0,0,c9a9ed650bc0549f85d7705bd9d3466edcaeed91950814aa06162a7b15f57
|
||||
CVE-2023-42928,0,0,4d575fc7bee0ddbdac6cb470d5d7d4a1a9c0adf90a31f047e6f305ee0485dd5a,2024-02-22T19:07:27.197000
|
||||
CVE-2023-42929,0,0,eb3f00ec709ba2f7760fb72343fbc272118a213ac02cb710d8fda7bd7caee235,2024-01-12T14:42:35.277000
|
||||
CVE-2023-4293,0,0,8c3d33cc7fec3d9fd4477f1dbb51347bcd3c3988430a3515a2e389b8d5e05eab,2023-11-07T04:22:25.750000
|
||||
CVE-2023-42930,0,1,00ba480d92534d8bf16eb0b9b509da978474e6eeba0de572b854069e83b9fb08,2024-04-08T22:46:51.907000
|
||||
CVE-2023-42931,0,1,cc135f3a406bba6acce03c3ed1d75052b880c12d21ae369126b45d24a980e70c,2024-04-08T22:47:13.533000
|
||||
CVE-2023-42930,0,0,00ba480d92534d8bf16eb0b9b509da978474e6eeba0de572b854069e83b9fb08,2024-04-08T22:46:51.907000
|
||||
CVE-2023-42931,0,0,cc135f3a406bba6acce03c3ed1d75052b880c12d21ae369126b45d24a980e70c,2024-04-08T22:47:13.533000
|
||||
CVE-2023-42932,0,0,d72ebc99606ff88b5196fb92ba085a234d9bb36deaf43aae627023bac3f8f5fa,2023-12-13T21:15:31.733000
|
||||
CVE-2023-42933,0,0,4515d35610e674bb40f9ac6898c27078c01d4ce90705902554e59c696decfa5a,2024-01-12T14:42:31.583000
|
||||
CVE-2023-42934,0,0,9bbd832bbd99920d5b4e7783d7815e5b4e4bfb6335bc1932425966a175c8c3cb,2024-01-16T23:52:48.783000
|
||||
CVE-2023-42935,0,0,606ee85ca40462fb734cd978403d80127f0d12edae5212a236ef5fd51294018c,2024-01-29T18:38:29.587000
|
||||
CVE-2023-42936,0,1,c8b134e22a8c4a8345a7b4db2f9af72d76f27c183f9956a66c5482843e8260b5,2024-04-08T22:47:26.453000
|
||||
CVE-2023-42936,0,0,c8b134e22a8c4a8345a7b4db2f9af72d76f27c183f9956a66c5482843e8260b5,2024-04-08T22:47:26.453000
|
||||
CVE-2023-42937,0,0,c2539e1b6a362c132317285010348324c513a5269588c97c8989267a27c3c96b,2024-01-29T18:33:19.387000
|
||||
CVE-2023-42938,0,0,5131d8f087536d0606d5c40f40ef895ada5b56a263e5aa85faf17635383e1f67,2024-03-14T20:15:07.040000
|
||||
CVE-2023-42939,0,0,4b0304a240b255af54a2d16f83934322490b0bc4310fde824596ed206eb1503c,2024-02-22T19:07:27.197000
|
||||
@ -230442,16 +230442,16 @@ CVE-2023-42941,0,0,be8c2f55cce80031919c17cdf6118cd30bd6c8016a8d2c844474b450e95b7
|
||||
CVE-2023-42942,0,0,07ba94131ee2af175813b684a3418fba2b1cb10f8bf4794024c3c777fccf87a6,2024-02-22T19:07:27.197000
|
||||
CVE-2023-42945,0,0,8965ecb696fbb6d1dfc191b5b241cb2dbad9c4594ab7548615100be2688c334d,2024-02-22T19:07:27.197000
|
||||
CVE-2023-42946,0,0,6e687d6a54184ed98b48ec9994a691a9f653d38c2a6ab147b69be8a3c35af011,2024-02-22T19:07:27.197000
|
||||
CVE-2023-42947,0,1,8ed3ffbfb2c476e513c40129d12606cb9e4b3f19c299a40cb654f0978040bc2f,2024-04-08T22:47:21.010000
|
||||
CVE-2023-42947,0,0,8ed3ffbfb2c476e513c40129d12606cb9e4b3f19c299a40cb654f0978040bc2f,2024-04-08T22:47:21.010000
|
||||
CVE-2023-4295,0,0,ec56fb9406b5889c47288aaf0ca0b50df9da68e8409e0f183bd2d96adf912d6b,2023-12-28T17:14:36.030000
|
||||
CVE-2023-42950,0,1,69fdb2f7278376195a309d6861cd9efe0fcd83287a3286201b3fafe8d544b4a5,2024-04-08T22:48:38.313000
|
||||
CVE-2023-42950,0,0,69fdb2f7278376195a309d6861cd9efe0fcd83287a3286201b3fafe8d544b4a5,2024-04-08T22:48:38.313000
|
||||
CVE-2023-42951,0,0,f47d9d53b96327a99c3cf9d9b6178395ac7e4f6ffb9fc1067e40ded2ecc60fdb,2024-02-22T19:07:27.197000
|
||||
CVE-2023-42952,0,0,f7dadd56b6a68a714e4e042690efb1e01d718cc903255fad9804058d56088666,2024-02-22T19:07:27.197000
|
||||
CVE-2023-42953,0,0,0ea855ba33bbd4297f25ae9925400ebda739241895a723a394f07f9bd3e18595,2024-02-22T19:07:27.197000
|
||||
CVE-2023-42954,0,0,4ff84847c56efbc3f637425a9807eb7b381f4c2cedb6bf16f12c3ca640d4fba3,2024-03-22T12:45:36.130000
|
||||
CVE-2023-42956,0,1,b6cb15aaacf9cd1c49dfc87b9d9e85d92de1e1949bdbc37d4a6ff7c3bf01b24a,2024-04-08T22:47:31.973000
|
||||
CVE-2023-42956,0,0,b6cb15aaacf9cd1c49dfc87b9d9e85d92de1e1949bdbc37d4a6ff7c3bf01b24a,2024-04-08T22:47:31.973000
|
||||
CVE-2023-4296,0,0,e4697418375e16ece070d7b80c1fefdaf488931fca9a321d519649e0d7ae4f3c,2023-11-07T04:22:26.050000
|
||||
CVE-2023-42962,0,1,44095971da853f64edd0a62395835f1f770cc82d53ee4c8cc6c9470bceeed50c,2024-04-08T22:47:42.510000
|
||||
CVE-2023-42962,0,0,44095971da853f64edd0a62395835f1f770cc82d53ee4c8cc6c9470bceeed50c,2024-04-08T22:47:42.510000
|
||||
CVE-2023-4297,0,0,2c1c4e8e16b8093dbd67367ad04a33c7dee7987a75a3f105a73f15afb0fc121e,2023-11-30T05:15:24.520000
|
||||
CVE-2023-42974,0,0,f146a4f93cbfe69b799e2f0b8a1594194e9694ff38b91b063e3f51d0eca3fccb,2024-03-28T20:53:20.813000
|
||||
CVE-2023-4298,0,0,8d44cb3045014d8716e0dbcd1489dfd2b845690c0f9918da8a0ecf5aeaadb4f7,2023-11-07T04:22:26.147000
|
||||
@ -235058,7 +235058,7 @@ CVE-2023-50308,0,0,4c428dc4aa8f2a5b0595b4c0d28f670c006a7eb1ab0b493ed318005adf398
|
||||
CVE-2023-5031,0,0,79cd5d09927dfcf847955b250bcbbd2a9a8e20582d6018a897df3d7fe6670a8a,2024-03-21T02:50:08.083000
|
||||
CVE-2023-50311,0,0,fdb48a0a2b26345ab9b530ecccf392cc33fb00ee77f863d560b06ecbc8d12bd6,2024-04-02T17:55:47.107000
|
||||
CVE-2023-50312,0,0,6148af5f69534aed77dae184fe2b672b68a4148611b3e761eddeb346c4e8ac63,2024-03-01T14:04:26.010000
|
||||
CVE-2023-50313,0,1,1e42ef8d73b8a8de0cdb4cb5b79d41f2d2be7c1030ef82f855207f9a58a45845,2024-04-08T22:48:41.757000
|
||||
CVE-2023-50313,0,0,1e42ef8d73b8a8de0cdb4cb5b79d41f2d2be7c1030ef82f855207f9a58a45845,2024-04-08T22:48:41.757000
|
||||
CVE-2023-5032,0,0,5645c09e42964a85ef14012bf6f8dc670f8f03482c9dc44d9ee40fd39c2128f3,2024-03-21T02:50:08.167000
|
||||
CVE-2023-50324,0,0,cc0221acaafa968ac132d85e25d9b8e598f80dbac724406dbac7c798123ec049,2024-03-01T14:04:26.010000
|
||||
CVE-2023-50326,0,0,1e0d0de6f14a74874e8f72cd7a0d4b5fddea211baaeba38b2981a5eecdd22e64,2024-02-02T16:14:50.620000
|
||||
@ -238142,8 +238142,8 @@ CVE-2024-0078,0,0,65ef1b62c09f229e677e8506d114a0ad3f4b855306a2baa770a721ed0ba97b
|
||||
CVE-2024-0079,0,0,a48198aa8d1b8e21233ccb1563194a0dce57e3cb1ac8f4c28d49144e25d1a534,2024-03-28T02:01:13.303000
|
||||
CVE-2024-0080,0,0,6c0d206dd91620b9eed7dc804b37cabf92e6b94b99ac768289c8d5abe0e718c9,2024-04-08T18:49:25.863000
|
||||
CVE-2024-0081,0,0,7224cfd553042ae01e2abfd02f661fee4ab9e15edf612773f3a2b6523001079f,2024-04-08T18:49:25.863000
|
||||
CVE-2024-0082,1,1,ae991367e08225121157180c24a5fdbb166425d7192b60b9395f4a4f24a46bf6,2024-04-08T22:15:07.993000
|
||||
CVE-2024-0083,1,1,53d00967f7407453d60abb433b5aefae44d594b137a7afac7fbffae58a630f23,2024-04-08T22:15:08.203000
|
||||
CVE-2024-0082,0,0,ae991367e08225121157180c24a5fdbb166425d7192b60b9395f4a4f24a46bf6,2024-04-08T22:15:07.993000
|
||||
CVE-2024-0083,0,0,53d00967f7407453d60abb433b5aefae44d594b137a7afac7fbffae58a630f23,2024-04-08T22:15:08.203000
|
||||
CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf73,2024-03-13T18:15:58.530000
|
||||
CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000
|
||||
CVE-2024-0156,0,0,47a5ee4f12284e0f109441891942aa0eb589b2387e172b6366b6741bcabc51b4,2024-03-04T13:58:23.447000
|
||||
@ -240302,7 +240302,7 @@ CVE-2024-21890,0,0,d0d6d1a152080740d6ba84ad392a919d70445665b25a7f6969e602652f189
|
||||
CVE-2024-21891,0,0,e424ef0f7a416dd53e40d650cdce75de43c958a1f5dba4ec358496f75617d5f2,2024-03-15T11:15:08.753000
|
||||
CVE-2024-21892,0,0,20e5acefe40d87bdcf0ddd06c773a67f885e875636f69c9336b01748da654b1a,2024-03-22T19:15:08.477000
|
||||
CVE-2024-21893,0,0,8e30826f2f638f6b28dccfb70150ad8a33cc616c290d8b76095e5ee871803b64,2024-02-01T02:00:01.187000
|
||||
CVE-2024-21894,0,1,78e81b5d057018993badd2be6cc56fe1fecba9799406c1904ab0b415aa943275,2024-04-08T22:53:09.773000
|
||||
CVE-2024-21894,0,0,78e81b5d057018993badd2be6cc56fe1fecba9799406c1904ab0b415aa943275,2024-04-08T22:53:09.773000
|
||||
CVE-2024-21896,0,0,19b337275b4c80290e30856ac5f19a33170bf79b2972a381de5433010e95582d,2024-03-29T13:15:14
|
||||
CVE-2024-21899,0,0,688bbc85b9f5d15251f75737cd336d68aa458da265ba78cb33907c6eacd4fe61,2024-03-13T14:25:02.043000
|
||||
CVE-2024-21900,0,0,e9e3bacd169a2499fbcf9944a7d36b5aa443f74334f0445e246d0d286dadb841,2024-03-13T14:24:02.157000
|
||||
@ -240344,7 +240344,7 @@ CVE-2024-22019,0,0,f2437e68c6ddb8f7177f54a0e9f52e5ca8426b13996c7a8a6cfcbbb0d671c
|
||||
CVE-2024-2202,0,0,830996a3e5b6be902d6f2e65d3759482285591493d041fcbf74113f66926d781,2024-03-25T01:51:01.223000
|
||||
CVE-2024-22021,0,0,ba38d4b86a2c5af951f989c7a28594b6207f0b19739ba3d580be6e4d49001bfb,2024-02-29T01:44:04.690000
|
||||
CVE-2024-22022,0,0,925c0d46bbd39b5d0f2644b5e26e0cd82488a20b7de7cccfa4639e9bb8f60d9e,2024-02-15T18:45:30.887000
|
||||
CVE-2024-22023,0,1,7e8e0e905a60ffd4a97223bf6516f7cf037ccc58c54cec4a4d059a3dd8a4e247,2024-04-08T22:51:43.003000
|
||||
CVE-2024-22023,0,0,7e8e0e905a60ffd4a97223bf6516f7cf037ccc58c54cec4a4d059a3dd8a4e247,2024-04-08T22:51:43.003000
|
||||
CVE-2024-22024,0,0,980d44adebdc63cfe4985efd7aa2ee2044d33423093fc7c9f165c43f20a43115,2024-02-13T15:15:32.193000
|
||||
CVE-2024-22025,0,0,61459addde8d883e2fba52001930c3fdd5c1e72e223ae9ae0e9157b1bc2b1032,2024-03-27T03:15:11.187000
|
||||
CVE-2024-22027,0,0,0822e6ca4a0197c830c667319442a46ae27f8152642de8d7f05f1858eada021b,2024-01-18T20:02:46.993000
|
||||
@ -240363,8 +240363,8 @@ CVE-2024-22048,0,0,ccec92a3265daf717c2bbbed7f0a34c57c44b3241b68cc37edd5bca0fad67
|
||||
CVE-2024-22049,0,0,9b7359ed630e382551d4570c9533818edaca377c6778b42eef7546c62195794e,2024-01-23T19:15:08.283000
|
||||
CVE-2024-22050,0,0,6cc1f5932c87c1ee4d5f0c22a81597d6852da9226b500ed6c316fab1f5f2b61b,2024-01-10T15:10:36.697000
|
||||
CVE-2024-22051,0,0,351db93d6ca76e0dc0a7975efc553f9724406030c8337d111a27ec7033241658,2024-01-11T17:07:05.660000
|
||||
CVE-2024-22052,0,1,0227f99d44e89893938b4544ca95dcc1c41e798d05744c94fdce48542d951019,2024-04-08T22:52:44.573000
|
||||
CVE-2024-22053,0,1,8caa4e40ec88ec96bdfc5af942e0f8feb54eb37f45d5fc1c8cea6c8e5bc74f38,2024-04-08T22:53:03.443000
|
||||
CVE-2024-22052,0,0,0227f99d44e89893938b4544ca95dcc1c41e798d05744c94fdce48542d951019,2024-04-08T22:52:44.573000
|
||||
CVE-2024-22053,0,0,8caa4e40ec88ec96bdfc5af942e0f8feb54eb37f45d5fc1c8cea6c8e5bc74f38,2024-04-08T22:53:03.443000
|
||||
CVE-2024-22054,0,0,ea7f90611fdd0de53fc019330b39d133a7eda202c929c51b6ca495fd39ad0bf5,2024-03-04T02:15:16.820000
|
||||
CVE-2024-2206,0,0,d5a4112d81b12c296cee2d4a4427b7935f710f4d11684daab2b2fb84c48f6bc9,2024-03-27T12:29:30.307000
|
||||
CVE-2024-22075,0,0,e134c94ca50cfff14da7c6327f518dbd409e37e86810fc1b2a583012e3bdb9ef,2024-01-10T15:06:42.563000
|
||||
@ -240776,7 +240776,7 @@ CVE-2024-22938,0,0,d14c96ecc84394e0c226b15d653363af8f866fc8a362ffe8912d5673a5fc1
|
||||
CVE-2024-22939,0,0,98ae5450b25ceaff1169d7851ac12cb3d1f8ed4212f5c71a0110eb042c52a6d7,2024-02-29T13:49:29.390000
|
||||
CVE-2024-2294,0,0,7adaa24a33704366500d65a38c52ba5d5887ad22bed1bd0562d7b36efb6d901e,2024-03-17T22:38:29.433000
|
||||
CVE-2024-22942,0,0,27e1b96b16010d66938a1930cd0293d602396f85521af099c802bf269035b527,2024-01-18T15:15:47.273000
|
||||
CVE-2024-22949,1,1,9f50a76ffcc828af29dfdda45bb6ef0b8b7a02fa40b7a257176056a4d5139f2a,2024-04-08T23:15:07.647000
|
||||
CVE-2024-22949,0,0,9f50a76ffcc828af29dfdda45bb6ef0b8b7a02fa40b7a257176056a4d5139f2a,2024-04-08T23:15:07.647000
|
||||
CVE-2024-22955,0,0,4ae6e1e162ac27be2c1563f300454f76989ec1b9814e0f4be1652f56a6f11be5,2024-01-25T14:54:48.427000
|
||||
CVE-2024-22956,0,0,2da6b272cb072bcb92b74c4c5c3faca0048e5b46583e9ffdd9571398ebecd789,2024-01-25T14:55:01.053000
|
||||
CVE-2024-22957,0,0,045bad9ba8bb739147d8dcd83b4e5a0ded4b848e11c744629a53c265926b4f4e,2024-01-25T14:59:59.737000
|
||||
@ -240802,11 +240802,11 @@ CVE-2024-23060,0,0,293f3db63669f513fdf6243d872feab4a40014b3abd2eff3b8edca7a0ed1b
|
||||
CVE-2024-23061,0,0,d40b225d92d8f0f0d47201622b24e50bc3550ed3e56a2682a133a8aeae5027e3,2024-01-18T15:18:14.357000
|
||||
CVE-2024-2307,0,0,4b089dd0281a455952ab30b1c14e2b1725f875efc3e98fe223b3d9160259d255,2024-03-20T13:00:16.367000
|
||||
CVE-2024-23078,0,0,6ccdfef45001c815b1c8a321f5fdb93824801b7a858b705656dc577c4b59c206,2024-04-08T20:15:08.500000
|
||||
CVE-2024-23079,1,1,0dcc3d3975c6d390e57d0a9e44bbb6bb70a660da60e8f2c822dce166e4beb639,2024-04-08T23:15:07.703000
|
||||
CVE-2024-23079,0,0,0dcc3d3975c6d390e57d0a9e44bbb6bb70a660da60e8f2c822dce166e4beb639,2024-04-08T23:15:07.703000
|
||||
CVE-2024-2308,0,0,e35ab419c5c511708eb8574821633f88a1168237ea61ded1d7aa5b331f06479a,2024-03-17T22:38:29.433000
|
||||
CVE-2024-23081,1,1,f13f502b7e2e1db8066ddc5074d5b80e3cc891b8e742f30ea256fa56155c64d6,2024-04-08T23:15:07.757000
|
||||
CVE-2024-23081,0,0,f13f502b7e2e1db8066ddc5074d5b80e3cc891b8e742f30ea256fa56155c64d6,2024-04-08T23:15:07.757000
|
||||
CVE-2024-23082,0,0,0a9e38aa01f043532a8be7b3040bd9f24c4cb812cc5c2c38c18325d962369a71,2024-04-08T18:48:40.217000
|
||||
CVE-2024-23084,1,1,cc3fe5e43e6cc3d4fe9878fcdf7855182620a14f9f8ea54d74f3c390c55eec58,2024-04-08T23:15:07.803000
|
||||
CVE-2024-23084,0,0,cc3fe5e43e6cc3d4fe9878fcdf7855182620a14f9f8ea54d74f3c390c55eec58,2024-04-08T23:15:07.803000
|
||||
CVE-2024-23085,0,0,c8b0d35c4a557d6e919fb6d1242860cc216cbb10b6bb40b4d8c08dbe656610b0,2024-04-08T20:15:08.567000
|
||||
CVE-2024-23086,0,0,65368b69d6d0eef07e38824732b878b0b1f0c0abb48bc5df2794ee9fdf0b94d1,2024-04-08T20:15:08.620000
|
||||
CVE-2024-23094,0,0,8b7fd2c37601b9f636934db44ed8e567ef20eff4d921df465afdbb6ef925a041,2024-02-22T19:07:27.197000
|
||||
@ -241049,7 +241049,7 @@ CVE-2024-2355,0,0,3245d70a394465f76ff5f05fc26b95bf0c5d50d1856adb39bb340583679667
|
||||
CVE-2024-23550,0,0,233aa541fdda788f0e4e95c8a9a0a8f5d7fa7689dcd559af0cf5e5843a531076,2024-02-13T00:57:33.613000
|
||||
CVE-2024-23553,0,0,51ea2d50cc1ff4dbab518de2a29e9ef6a91bd6b91073c23eb1a7f0cb7c8f1090,2024-02-10T00:59:00.423000
|
||||
CVE-2024-2357,0,0,2af3f167a5f07c033333870e1f5044e9ac66d1548287fd20eff05541e2132cfb,2024-03-23T03:15:12.690000
|
||||
CVE-2024-23584,1,1,7c11631f47a9cd8d18bc29523d2c089eb4e039bce017c0ddd915e33188a191fd,2024-04-08T23:15:07.850000
|
||||
CVE-2024-23584,0,0,7c11631f47a9cd8d18bc29523d2c089eb4e039bce017c0ddd915e33188a191fd,2024-04-08T23:15:07.850000
|
||||
CVE-2024-23591,0,0,f4c08614f6a162f49ecc99f020c088036b0b565e06b57796e1304b45ae78e59d,2024-02-20T22:15:08.353000
|
||||
CVE-2024-23592,0,0,8410729adf8ea2140a95009744b2dfc023c8f0c5b5843d18404a4118ed1b693b,2024-04-08T18:49:25.863000
|
||||
CVE-2024-23603,0,0,2b536971fe4d260603348583e5e85d59f5debd4cec090f729c87a6dbde3a5ce7,2024-02-14T18:04:45.380000
|
||||
@ -242058,6 +242058,7 @@ CVE-2024-25642,0,0,bf91eeb1502dedca60fe6c035b93d7dfc5a440bc6932322c6ae4d128b4c7c
|
||||
CVE-2024-25643,0,0,08f3e6c0d454841d4e4dc84aae81812246ffbd96bb71cc2e9e4566cd4077e910,2024-02-13T14:01:07.747000
|
||||
CVE-2024-25644,0,0,cad748db94c87605f745ac8efbb54ef36e9bf866e1bcdbdf96bff9a05dfcf738,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25645,0,0,611af6391fb4617a6b65e5d2ff91bac5a4003873b65f133d0cd2495d911bd094,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25646,1,1,c75d00751fed3de8449144392cb0585f29e46e25016c4f17748ae725d45561c2,2024-04-09T01:15:48.343000
|
||||
CVE-2024-25649,0,0,3e37b8e86c2aaae32174cb72f32869171ec886cd62bb95537557a32583b80d63,2024-03-14T12:52:09.877000
|
||||
CVE-2024-2565,0,0,f29b341373f4135f8349505114db202bd5fab0820f3e8d9e62cea3dd3d097a89,2024-03-21T02:52:38.533000
|
||||
CVE-2024-25650,0,0,dc8b4afe4a9ab50c0ebaf06dbcbf0134b9648b4ff2232925762633c6b3fe0179,2024-03-14T12:52:16.723000
|
||||
@ -242984,7 +242985,7 @@ CVE-2024-27627,0,0,6b314556f3fa2e7fb50707266f0d07d8792d06426c2d3b5f17382297ce118
|
||||
CVE-2024-2763,0,0,8e9d345d7389664f80611635b46c2cef2ec874e0b9963bec2a0f291297e78b38,2024-03-22T12:45:36.130000
|
||||
CVE-2024-27630,0,0,1af794bd73a1a981369ee11a8d740d74c2d4ddaa2b8325a16bd8d015c271d702,2024-04-08T21:15:09.983000
|
||||
CVE-2024-27631,0,0,06f624de111450e75fa73f39020e095767cb778364bea9eef968fd43c313a3d4,2024-04-08T21:15:10.067000
|
||||
CVE-2024-27632,1,1,77b2fef9184238aa65b7a05f1fcf8e38cdd5d8baed8ae8b674ef90fb91227938,2024-04-08T22:15:08.413000
|
||||
CVE-2024-27632,0,0,77b2fef9184238aa65b7a05f1fcf8e38cdd5d8baed8ae8b674ef90fb91227938,2024-04-08T22:15:08.413000
|
||||
CVE-2024-2764,0,0,3ec67dc4c0d54764b942178e18d5d6721bd9017d0e5926b52df0eec1f7386756,2024-03-22T12:45:36.130000
|
||||
CVE-2024-27655,0,0,65a637f75a188da438b32cc13f4600329f3f424dcd0f437c9989c4c9314e002f,2024-03-01T14:04:26.010000
|
||||
CVE-2024-27656,0,0,2f731c51e226b6152416f771e826d74f69590b91bf713c56222b4fac3d8f2331,2024-03-01T14:04:26.010000
|
||||
@ -243048,7 +243049,10 @@ CVE-2024-27894,0,0,249999fc9487c1b63574e09bae3fbcbcdf7b20ef335df69d9151a0f5ea4d7
|
||||
CVE-2024-27895,0,0,e8e082e473ed76dea7e0db1fd0e0603d1d69d1ba5e6a1a82578100cdf406ffed,2024-04-08T18:48:40.217000
|
||||
CVE-2024-27896,0,0,88fc4dc869bbb4cce477334b59754ef261ad68592aa0aa0ff71f89ccdf4b1875,2024-04-08T18:48:40.217000
|
||||
CVE-2024-27897,0,0,6aeb0d28af447513b32ff29a7545806bc788b73261dbf5d52e00ce86aa2905c0,2024-04-08T18:48:40.217000
|
||||
CVE-2024-27898,1,1,29b0a9172a1eebfd24f6675c2ebbbf977083adceed455d2567ab962a2a31f8d6,2024-04-09T01:15:48.583000
|
||||
CVE-2024-27899,1,1,45f5f66a4e3da7332edf34d39ccf63b255c4cb8cac5cb60aac62b9fd2729ddf2,2024-04-09T01:15:48.777000
|
||||
CVE-2024-27900,0,0,00f9885d5a06fec36b56a14fdc3be21ddc255c1561a408e91e09aee1b7ac8b37,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27901,1,1,1f100058faa206f75a8299605708ec984f36533043410845917ace6aec0b805e,2024-04-09T01:15:48.993000
|
||||
CVE-2024-27902,0,0,7aa835c5c3cccf2434107e43a6dd21c3ee48d8e6664a62d49734964bcc016141,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27905,0,0,3e20ed1ee55859457fccacd02ccfd33b203e184f29107e3c93e267df9f8d58a8,2024-03-21T02:52:20.520000
|
||||
CVE-2024-27906,0,0,e279155c32f0030358ce7d189e782f3e54d78a6a202b13937f95f2706818bee5,2024-02-29T13:49:29.390000
|
||||
@ -243103,6 +243107,7 @@ CVE-2024-27968,0,0,81cf818ff4c52a717cdd4ac78ff685291ab11ee5a0785fe2aaaed4be1173d
|
||||
CVE-2024-27972,0,0,e0f7933a8078741e5e2cdbc1c8aaffaa42eca2ccffc4cf4f10a410272b4fcf47,2024-04-03T12:38:04.840000
|
||||
CVE-2024-27974,0,0,c5d12161a6a294fb4d33a068888d07d2dec693f9073d8d47f06182bf4fe2779a,2024-03-18T12:38:25.490000
|
||||
CVE-2024-27981,0,0,bca4d502eb0003b495c2e3eabf4c8b77f995ffb842787b13a54996fb18ec7ff9,2024-04-05T12:40:52.763000
|
||||
CVE-2024-27983,1,1,462e2e83b9f399bcd91568acb26b09d2f5c5418ba921c90db44ae36772ba68d2,2024-04-09T01:15:49.197000
|
||||
CVE-2024-27986,0,0,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000
|
||||
CVE-2024-27987,0,0,457341cfe208a4dd4f1ca3a12fe23df96b337000dbd585aed58689be29e5bec4,2024-03-15T12:53:06.423000
|
||||
CVE-2024-27993,0,0,4178545ce3cee5131bcc85417ac208f6615c9c5305016cf5248ec96a71c28f2b,2024-03-21T15:24:35.093000
|
||||
@ -243209,6 +243214,7 @@ CVE-2024-28160,0,0,d3496ce06cdd6165787a1abcbf55db9c0fb2db641796e2cfba31e7190572a
|
||||
CVE-2024-28161,0,0,ac1d3f11953e0c8ea875284019208bd8e81c5e134926913a38bbbd0ca21cd968,2024-03-06T21:42:54.697000
|
||||
CVE-2024-28162,0,0,9bc5df2476915a3318874e35bcdb7d25e1035d05316c0fdc6385663896a911e1,2024-03-06T21:42:54.697000
|
||||
CVE-2024-28163,0,0,04503ad76f6d74637a8e6f8a7d443052dfa73d2acab964dffd0d8da32b69e3b5,2024-03-12T12:40:13.500000
|
||||
CVE-2024-28167,1,1,9a55ab4d6b3ad8b492f0fc017ea43d153c689b6906572f369d8da09ce3625626,2024-04-09T01:15:49.380000
|
||||
CVE-2024-2817,0,0,e0fe06a461ef795accd74c0bb92d92dd98cb14b12292f98e359c857cfb17ef6d,2024-03-26T03:15:19.720000
|
||||
CVE-2024-28171,0,0,c1f19d20247dc1e3f04cbf911cc73142848c14a173b812d8f71f312ba63d2b48,2024-03-22T12:45:36.130000
|
||||
CVE-2024-28173,0,0,542df716604f915101d48aeccfd0a59d896ed582a3774f62c0cc2b438bc897c4,2024-03-06T21:42:54.697000
|
||||
@ -243427,7 +243433,7 @@ CVE-2024-28757,0,0,6f674e74da8b1d303f1997061736a8f7699c424c20f0aba68e441f140f441
|
||||
CVE-2024-28782,0,0,2c346a16649d57b4cd6688055d888a86d12f94177200ab9afb6a4e0c69d4e875,2024-04-03T12:38:04.840000
|
||||
CVE-2024-28784,0,0,c979b0334a0081e1847a4bc955e67dbbc0397aed136c4d3aa1b489c4f3f267b2,2024-03-27T15:49:51.300000
|
||||
CVE-2024-28787,0,0,466884053e2fb97771b0b18e87658d91d7f6894823937327962bdc9b1ecfdc33,2024-04-04T19:24:50.670000
|
||||
CVE-2024-2879,0,1,b3cb63a21efa9503ae3e8fbd2c3fbecce8466a6f50871d6397f8e38479a77e62,2024-04-08T22:49:41.533000
|
||||
CVE-2024-2879,0,0,b3cb63a21efa9503ae3e8fbd2c3fbecce8466a6f50871d6397f8e38479a77e62,2024-04-08T22:49:41.533000
|
||||
CVE-2024-28815,0,0,f9ba7e38674697b7d17d51e7b24c9c896d5b8cd72333d8b6833bda1b0cb49c74,2024-03-27T12:29:30.307000
|
||||
CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000
|
||||
CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000
|
||||
@ -243701,11 +243707,12 @@ CVE-2024-29741,0,0,58a208fae70919819896a10b0ac69af17481c90fbaf33f6b074138668c845
|
||||
CVE-2024-29742,0,0,013e0935d87738e02ad985787df8e1bdb20608d450a31e334d4001bfd987aadc,2024-04-08T18:49:25.863000
|
||||
CVE-2024-29743,0,0,2d88b2eb4af432fcf658c698c6f44520850b6e65f42e4f9d8e435f0857ed03f4,2024-04-08T18:49:25.863000
|
||||
CVE-2024-29744,0,0,ca9c34220842db20c040958869ee7619d2f9abf8c801f17b5df2ee3c7b5aa48c,2024-04-08T18:49:25.863000
|
||||
CVE-2024-29745,0,1,360b3e0cef9ad697b4849e4b6c4e59a864e3d365e1324c003422150c1ef1dda2,2024-04-08T22:53:32.127000
|
||||
CVE-2024-29745,0,0,360b3e0cef9ad697b4849e4b6c4e59a864e3d365e1324c003422150c1ef1dda2,2024-04-08T22:53:32.127000
|
||||
CVE-2024-29746,0,0,29af8006f9fbd7af7095512e80e5bf0ae4c64952a941d41acef3a04849082a4e,2024-04-08T18:49:25.863000
|
||||
CVE-2024-29747,0,0,87f4e304e93f8b6f286c656028c07dd1ca332ec61fa47e7ce7d137f30fe66b91,2024-04-08T18:49:25.863000
|
||||
CVE-2024-29748,0,1,521433bbadcb400dfc92897155d667884ae0c1a8d67cb01db78baff427b50b49,2024-04-08T22:52:33.780000
|
||||
CVE-2024-29748,0,0,521433bbadcb400dfc92897155d667884ae0c1a8d67cb01db78baff427b50b49,2024-04-08T22:52:33.780000
|
||||
CVE-2024-29749,0,0,33b9f39d00d5461e17b7d5a8f346443f168cc7b139342c04719e9f38cd1e308c,2024-04-08T18:49:25.863000
|
||||
CVE-2024-2975,1,1,bc6630236fbea59ea85108099a00f8d460e796c3dd2ded65943ede8bd6baee37,2024-04-09T01:15:49.583000
|
||||
CVE-2024-29750,0,0,cd8489f4573c543020a3b6e8b96290737b84849a080d45bc65ef0ff04a2c59f0,2024-04-08T18:49:25.863000
|
||||
CVE-2024-29751,0,0,3bc4aa316cc8565894aaa2a9c412da7054d4f835fd37d50bf2ebd4a04ae9df25,2024-04-08T18:49:25.863000
|
||||
CVE-2024-29752,0,0,8570c8346da874298f8f35ea2088404fb97ccfc316a51781a5f28a7a73ba2064,2024-04-08T18:49:25.863000
|
||||
@ -243913,6 +243920,11 @@ CVE-2024-30202,0,0,31db9c331e53ee7e35e14a4f4da9c9118966173e7dfd1773c267c14439e4d
|
||||
CVE-2024-30203,0,0,444aebb38c12835907cb7a31abaa6167c0351378679f511812ede323236ede80,2024-03-25T16:43:06.137000
|
||||
CVE-2024-30204,0,0,036541cdb0b2547c6a0b159ebcde955e789df823270814d2ecf5a2ea473b3058,2024-03-25T16:43:06.137000
|
||||
CVE-2024-30205,0,0,49c6abb5e041dbd344a1c2878ff4314f11b475ed55487542fa5ade5e7cd812b8,2024-03-25T16:43:06.137000
|
||||
CVE-2024-30214,1,1,9cbb84d5a31cde891755a74be46005a7ae14cc0fe7a81a16294b5e794e71b95b,2024-04-09T01:15:49.750000
|
||||
CVE-2024-30215,1,1,63c0103988a8a22d50b4f5920b1d344f44816b12c4a4bd2838f874c7170c27f7,2024-04-09T01:15:49.953000
|
||||
CVE-2024-30216,1,1,23e6330d5e67b3939a808dea3c48b015ea93ffe0e940d5e3db258ada971a742a,2024-04-09T01:15:50.140000
|
||||
CVE-2024-30217,1,1,dc05ee90d167762240bbfd4770ae1675986fb9f2999d716d3c5750c55a05cbce,2024-04-09T01:15:50.353000
|
||||
CVE-2024-30218,1,1,d0680a6e32010322311576701fff049a2fb3821324253bdcc8e519d58dbb41f6,2024-04-09T01:15:50.570000
|
||||
CVE-2024-3022,0,0,f291c8130c561158256d7e5f236acfb4472a78c940a59eb4c1d015abd789d2b5,2024-04-04T12:48:41.700000
|
||||
CVE-2024-30221,0,0,8c33faec8eecbd1bc4775ea7d226df03d8dec1186991b9fb17295c2b460f3a49,2024-03-28T12:42:56.150000
|
||||
CVE-2024-30222,0,0,16d5c6200c88be9ed99126042f393681469af79a0a1fab7e0ddf18cd42a248eb,2024-03-28T12:42:56.150000
|
||||
@ -244149,8 +244161,8 @@ CVE-2024-30607,0,0,e51d37ea841a6aa5a58d29c2fd2f369dad1d9ac4d04df2e45c313680f9d80
|
||||
CVE-2024-3061,0,0,054a64adadf829199461c8947e83d82d0bfbaf37f9787cbdfa16d3c5c41cdbff,2024-03-29T12:45:02.937000
|
||||
CVE-2024-30612,0,0,d3e38b0b52b131f63a2436162f6169b4c7f41927a463362731d27c02d3dc5490,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30613,0,0,85edf4dcba25f48e47bd3fb552d267b1bc1ba9edabbb038873d2002086974cfb,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30620,0,1,f9b642c1a8666a3b209896f3d8c00f6cf482b0f3ba6d96dea1aa48dc74a998f4,2024-04-08T22:48:50.340000
|
||||
CVE-2024-30621,0,1,9fba13a7080ae15640edcf3cb18d8dd79481c10bb3102533f267ff3982d5b57e,2024-04-08T22:48:53.950000
|
||||
CVE-2024-30620,0,0,f9b642c1a8666a3b209896f3d8c00f6cf482b0f3ba6d96dea1aa48dc74a998f4,2024-04-08T22:48:50.340000
|
||||
CVE-2024-30621,0,0,9fba13a7080ae15640edcf3cb18d8dd79481c10bb3102533f267ff3982d5b57e,2024-04-08T22:48:53.950000
|
||||
CVE-2024-30622,0,0,0da5246ef4e8510b5fbd6bec86e149da05d8dfe76b52aa744b083196821dd6ad,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30623,0,0,6ede78fde134768f49ef746b2af5d5df00d246247702695d5ba85541fd1d9066,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30624,0,0,66d3e2d7e06cec16684c816196f2a69004a5a14026cf6f1d337c7e127ed9e3f6,2024-03-29T13:28:22.880000
|
||||
@ -244230,7 +244242,7 @@ CVE-2024-31022,0,0,a14e43455f8667f5b08643f4accc0ded65ef08c98d3d4f6b069b1542bbf69
|
||||
CVE-2024-31025,0,0,049c3aee715c9c75f255eea2ba7d71aee620ad97e93ef3b0e0a948ae51dd0b57,2024-04-04T12:48:41.700000
|
||||
CVE-2024-31032,0,0,71dbb2a787f73b1914bf5d51e1b83b5365eb112b3ab9ed4df5d1066682b5223b,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31033,0,0,897cdecff344b121550f3f8e1b3cb821fdde5689eabf8f2834a81266f3e9da87,2024-04-03T03:15:10.670000
|
||||
CVE-2024-31047,1,1,c175d27ed17d4bf949120d8409b6dbaecb9c46ddadf7527ed65cef283f88c52d,2024-04-08T23:15:08.023000
|
||||
CVE-2024-31047,0,0,c175d27ed17d4bf949120d8409b6dbaecb9c46ddadf7527ed65cef283f88c52d,2024-04-08T23:15:08.023000
|
||||
CVE-2024-31061,0,0,020e38014038ba97f692790c06c98735ee7323fcc8614755f16c9c5708fe33f5,2024-03-28T20:53:20.813000
|
||||
CVE-2024-31062,0,0,9a85b45f2ef9be7ff3563a8d396c3a8dd45f237219d28fbf343c7fa8953f9bf5,2024-03-28T20:53:20.813000
|
||||
CVE-2024-31063,0,0,8c5e031664c3b218697e91183f663111a47f52e7fd5496cafc4f238d7a0c4ce8,2024-03-28T20:53:20.813000
|
||||
@ -244273,10 +244285,10 @@ CVE-2024-31121,0,0,4fe9a2eff5a4d2ff266e2e268b50578938b85c71b50b3bd948fd3ec69947d
|
||||
CVE-2024-31122,0,0,745a899ec0013d7867b6d15accca135c5ce3d8a09d809883e11eb140dbea32b8,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31123,0,0,db6c777a75b99cd3d3fe96b0cba09aef21f155fa00f588627dc337a7a44a5e61,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31134,0,0,307f324939c3734fa79d1f0dddedc9adb8cc7847f094168b4a1c49e1a46ababb,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31135,0,1,e1f83c93dca169dafe8886f98e7099ebeb7b296e29c7758b3d99556d317a623e,2024-04-08T22:39:48.067000
|
||||
CVE-2024-31135,0,0,e1f83c93dca169dafe8886f98e7099ebeb7b296e29c7758b3d99556d317a623e,2024-04-08T22:39:48.067000
|
||||
CVE-2024-31136,0,0,9a1669032126d15d4a0add55ca0ae3fcacf2fba1c78134597f80eeb59ca3294e,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31137,0,1,d8c60b512e3cd344cbe0e7070d591f251aa086e93689a00f3d05728c7eb4bc7e,2024-04-08T22:41:02.117000
|
||||
CVE-2024-31138,0,1,80619d8b23ffb923a4bb521ee1877f29e2a086a5161850672cdc2424af6c6396,2024-04-08T22:41:43.087000
|
||||
CVE-2024-31137,0,0,d8c60b512e3cd344cbe0e7070d591f251aa086e93689a00f3d05728c7eb4bc7e,2024-04-08T22:41:02.117000
|
||||
CVE-2024-31138,0,0,80619d8b23ffb923a4bb521ee1877f29e2a086a5161850672cdc2424af6c6396,2024-04-08T22:41:43.087000
|
||||
CVE-2024-31139,0,0,6254efb24474a93bf19fb224a952376f20b94666e671b313ffb9fb5d6ba4e123,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31140,0,0,8ac72cdd6b5f7f56e71e87459ff46ad8714fcc8b963def523c845a786f9f62ca,2024-03-28T16:07:30.893000
|
||||
CVE-2024-3116,0,0,442c5653c6cfe9feb902808d7a86b402a42b6c98e54ac39c11d1d128b28eb1d2,2024-04-04T16:33:06.610000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user