mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-03-28T17:00:37.993611+00:00
This commit is contained in:
parent
3861497fb5
commit
57e8a8f911
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-8822",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-03-20T17:29:00.423",
|
||||
"lastModified": "2023-11-07T03:01:30.420",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-03-28T16:08:31.410",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -85,8 +85,58 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.15.11",
|
||||
"matchCriteriaId": "8597EB3B-58A3-4950-9663-BB64895BDE67"
|
||||
"versionStartIncluding": "2.6.12",
|
||||
"versionEndExcluding": "3.2.102",
|
||||
"matchCriteriaId": "9002FDD9-8A8C-4E06-8DE5-7CF6C79B117A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.3",
|
||||
"versionEndExcluding": "3.16.57",
|
||||
"matchCriteriaId": "0786B96E-E04C-4D2B-B358-CCE006BAED46"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.17",
|
||||
"versionEndExcluding": "3.18.103",
|
||||
"matchCriteriaId": "F9906D89-2D98-4380-9A65-798B12332FC9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.19",
|
||||
"versionEndExcluding": "4.1.52",
|
||||
"matchCriteriaId": "DC20C495-C297-4CEE-9034-4FE81754FE98"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.2",
|
||||
"versionEndExcluding": "4.4.125",
|
||||
"matchCriteriaId": "BB766B8A-0C15-4949-BC7E-C624A8FB122A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5",
|
||||
"versionEndExcluding": "4.9.91",
|
||||
"matchCriteriaId": "086C29F5-DF5E-43B2-8E7D-EBA453B571D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.14.31",
|
||||
"matchCriteriaId": "9E6E5A35-1967-44F6-9D8F-83A08D60DB2F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.15.14",
|
||||
"matchCriteriaId": "A8ED8E8A-0A8C-4F47-9BFF-69DB613F2C35"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -281,7 +331,11 @@
|
||||
},
|
||||
{
|
||||
"url": "https://www.mail-archive.com/netdev%40vger.kernel.org/msg223373.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-29162",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-02-14T14:15:49.777",
|
||||
"lastModified": "2024-02-14T15:01:51.137",
|
||||
"lastModified": "2024-03-28T16:15:07.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper buffer restrictions in some Intel(R) C++ Compiler Classic before version 2021.8 may allow authenticated user to potentially enable escalation of privilege via local access."
|
||||
"value": "Improper buffer restrictions the Intel(R) C++ Compiler Classic before version 2021.8 for Intel(R) oneAPI Toolkits before version 2022.3.1 may allow a privileged user to potentially enable escalation of privilege via local access.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las restricciones inadecuadas del b\u00fafer en algunos compiladores Intel(R) C++ Classic anteriores a la versi\u00f3n 2021.8 pueden permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -34,18 +38,6 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@intel.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-92"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00988.html",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-35121",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-02-14T14:16:00.123",
|
||||
"lastModified": "2024-02-14T15:01:46.050",
|
||||
"lastModified": "2024-03-28T15:15:45.453",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper access control in some Intel(R) oneAPI DPC++/C++ Compiler software before version 2023.2.1 may allow authenticated user to potentially enable escalation of privilege via local access."
|
||||
"value": "Improper access control in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.2.1 for some Intel(R) oneAPI Toolkits before version 2022.3.1 may allow authenticated user to potentially enable escalation of privilege via local access.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El control de acceso inadecuado en algunos software del compilador Intel(R) oneAPI DPC++/C++ anterior a la versi\u00f3n 2023.2.1 puede permitir que el usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -34,18 +38,6 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@intel.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00988.html",
|
||||
|
20
CVE-2023/CVE-2023-403xx/CVE-2023-40390.json
Normal file
20
CVE-2023/CVE-2023-403xx/CVE-2023-40390.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40390",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-28T16:15:07.773",
|
||||
"lastModified": "2024-03-28T16:15:07.773",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A privacy issue was addressed by moving sensitive data to a protected location. This issue is fixed in macOS Sonoma 14.2. An app may be able to access user-sensitive data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214036",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-428xx/CVE-2023-42892.json
Normal file
28
CVE-2023/CVE-2023-428xx/CVE-2023-42892.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-42892",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-28T16:15:07.843",
|
||||
"lastModified": "2024-03-28T16:15:07.843",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.6.3, macOS Sonoma 14.2, macOS Monterey 12.7.2. A local attacker may be able to elevate their privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214036",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214037",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214038",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2023/CVE-2023-428xx/CVE-2023-42893.json
Normal file
44
CVE-2023/CVE-2023-428xx/CVE-2023-42893.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2023-42893",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-28T16:15:07.903",
|
||||
"lastModified": "2024-03-28T16:15:07.903",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A permissions issue was addressed by removing vulnerable code and adding additional checks. This issue is fixed in macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.2 and iPadOS 17.2, iOS 16.7.3 and iPadOS 16.7.3, tvOS 17.2, watchOS 10.2, macOS Sonoma 14.2. An app may be able to access protected user data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214034",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214035",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214036",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214037",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214038",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214040",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214041",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2023/CVE-2023-428xx/CVE-2023-42896.json
Normal file
36
CVE-2023/CVE-2023-428xx/CVE-2023-42896.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-42896",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-28T16:15:07.970",
|
||||
"lastModified": "2024-03-28T16:15:07.970",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was addressed with improved handling of temporary files. This issue is fixed in macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.2 and iPadOS 17.2, iOS 16.7.3 and iPadOS 16.7.3, macOS Sonoma 14.2. An app may be able to modify protected parts of the file system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214034",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214035",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214036",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214037",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214038",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-429xx/CVE-2023-42913.json
Normal file
20
CVE-2023/CVE-2023-429xx/CVE-2023-42913.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42913",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-28T16:15:08.023",
|
||||
"lastModified": "2024-03-28T16:15:08.023",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed through improved state management. This issue is fixed in macOS Sonoma 14.2. Remote Login sessions may be able to obtain full disk access permissions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214036",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-429xx/CVE-2023-42930.json
Normal file
28
CVE-2023/CVE-2023-429xx/CVE-2023-42930.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-42930",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-28T16:15:08.090",
|
||||
"lastModified": "2024-03-28T16:15:08.090",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.6.3, macOS Sonoma 14.2, macOS Monterey 12.7.2. An app may be able to modify protected parts of the file system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214036",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214037",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214038",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-429xx/CVE-2023-42931.json
Normal file
28
CVE-2023/CVE-2023-429xx/CVE-2023-42931.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-42931",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-28T16:15:08.153",
|
||||
"lastModified": "2024-03-28T16:15:08.153",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.6.3, macOS Sonoma 14.2, macOS Monterey 12.7.2. A process may gain admin privileges without proper authentication."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214036",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214037",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214038",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
40
CVE-2023/CVE-2023-429xx/CVE-2023-42936.json
Normal file
40
CVE-2023/CVE-2023-429xx/CVE-2023-42936.json
Normal file
@ -0,0 +1,40 @@
|
||||
{
|
||||
"id": "CVE-2023-42936",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-28T16:15:08.200",
|
||||
"lastModified": "2024-03-28T16:15:08.200",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.2 and iPadOS 17.2, tvOS 17.2, watchOS 10.2, macOS Sonoma 14.2. An app may be able to access user-sensitive data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214035",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214036",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214037",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214038",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214040",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214041",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
40
CVE-2023/CVE-2023-429xx/CVE-2023-42947.json
Normal file
40
CVE-2023/CVE-2023-429xx/CVE-2023-42947.json
Normal file
@ -0,0 +1,40 @@
|
||||
{
|
||||
"id": "CVE-2023-42947",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-28T16:15:08.250",
|
||||
"lastModified": "2024-03-28T16:15:08.250",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A path handling issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.2 and iPadOS 17.2, tvOS 17.2, watchOS 10.2, macOS Sonoma 14.2. An app may be able to break out of its sandbox."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214035",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214036",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214037",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214038",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214040",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214041",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2023/CVE-2023-429xx/CVE-2023-42950.json
Normal file
36
CVE-2023/CVE-2023-429xx/CVE-2023-42950.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-42950",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-28T16:15:08.313",
|
||||
"lastModified": "2024-03-28T16:15:08.313",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A use after free issue was addressed with improved memory management. This issue is fixed in Safari 17.2, iOS 17.2 and iPadOS 17.2, tvOS 17.2, watchOS 10.2, macOS Sonoma 14.2. Processing maliciously crafted web content may lead to arbitrary code execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214035",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214036",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214039",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214040",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214041",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-429xx/CVE-2023-42956.json
Normal file
28
CVE-2023/CVE-2023-429xx/CVE-2023-42956.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-42956",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-28T16:15:08.377",
|
||||
"lastModified": "2024-03-28T16:15:08.377",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved memory handling. This issue is fixed in Safari 17.2, iOS 17.2 and iPadOS 17.2, macOS Sonoma 14.2. Processing web content may lead to a denial-of-service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214035",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214036",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214039",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-429xx/CVE-2023-42962.json
Normal file
24
CVE-2023/CVE-2023-429xx/CVE-2023-42962.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-42962",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-28T16:15:08.430",
|
||||
"lastModified": "2024-03-28T16:15:08.430",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved checks This issue is fixed in iOS 17.2 and iPadOS 17.2, iOS 16.7.3 and iPadOS 16.7.3. A remote attacker may be able to cause a denial-of-service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214034",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214035",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2023/CVE-2023-429xx/CVE-2023-42974.json
Normal file
36
CVE-2023/CVE-2023-429xx/CVE-2023-42974.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-42974",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-28T16:15:08.480",
|
||||
"lastModified": "2024-03-28T16:15:08.480",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A race condition was addressed with improved state handling. This issue is fixed in macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.2 and iPadOS 17.2, iOS 16.7.3 and iPadOS 16.7.3, macOS Sonoma 14.2. An app may be able to execute arbitrary code with kernel privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214034",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214035",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214036",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214037",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214038",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-457xx/CVE-2023-45705.json
Normal file
43
CVE-2023/CVE-2023-457xx/CVE-2023-45705.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-45705",
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2024-03-28T15:15:45.590",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An administrative user of WebReports may perform a Server Side Request Forgery (SSRF) exploit through SMTP configuration options.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@hcl.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0111972",
|
||||
"source": "psirt@hcl.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-457xx/CVE-2023-45706.json
Normal file
43
CVE-2023/CVE-2023-457xx/CVE-2023-45706.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-45706",
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2024-03-28T15:15:45.797",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An administrative user of WebReports may perform a Cross Site Scripting (XSS) and/or Man in the Middle (MITM) exploit through SAML configuration.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@hcl.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.0,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0111972",
|
||||
"source": "psirt@hcl.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-457xx/CVE-2023-45715.json
Normal file
43
CVE-2023/CVE-2023-457xx/CVE-2023-45715.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-45715",
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2024-03-28T15:15:45.983",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The console may experience a service interruption when processing file names with invalid characters.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@hcl.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0111972",
|
||||
"source": "psirt@hcl.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6437",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-03-28T14:15:13.600",
|
||||
"lastModified": "2024-03-28T14:15:13.600",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
59
CVE-2024/CVE-2024-02xx/CVE-2024-0259.json
Normal file
59
CVE-2024/CVE-2024-02xx/CVE-2024-0259.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-0259",
|
||||
"sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
|
||||
"published": "2024-03-28T15:15:46.180",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Fortra's Robot Schedule Enterprise Agent for Windows prior to version 3.04 is susceptible to privilege escalation. A low-privileged user can overwrite the service executable. When the service is restarted, the replaced binary runs with local system privileges, allowing a low-privileged user to gain elevated privileges.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hstechdocs.helpsystems.com/releasenotes/Content/_ProductPages/Robot/RobotScheduleEnterprise.htm",
|
||||
"source": "df4dee71-de3a-4139-9588-11b62fe6c0ff"
|
||||
},
|
||||
{
|
||||
"url": "https://www.fortra.com/security/advisory/fi-2024-005",
|
||||
"source": "df4dee71-de3a-4139-9588-11b62fe6c0ff"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27775",
|
||||
"sourceIdentifier": "cna@cyber.gov.il",
|
||||
"published": "2024-03-28T13:15:47.340",
|
||||
"lastModified": "2024-03-28T13:15:47.340",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28109",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-28T14:15:13.863",
|
||||
"lastModified": "2024-03-28T14:15:13.863",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29200",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-28T14:15:14.100",
|
||||
"lastModified": "2024-03-28T14:15:14.100",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29882",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-28T14:15:14.337",
|
||||
"lastModified": "2024-03-28T14:15:14.337",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29896",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-28T13:15:47.717",
|
||||
"lastModified": "2024-03-28T13:15:47.717",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29897",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-28T14:15:14.557",
|
||||
"lastModified": "2024-03-28T14:15:14.557",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29898",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-28T14:15:14.783",
|
||||
"lastModified": "2024-03-28T14:15:14.783",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30583",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T14:15:14.997",
|
||||
"lastModified": "2024-03-28T14:15:14.997",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30584",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T14:15:15.047",
|
||||
"lastModified": "2024-03-28T14:15:15.047",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30585",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T14:15:15.090",
|
||||
"lastModified": "2024-03-28T14:15:15.090",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30586",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T14:15:15.137",
|
||||
"lastModified": "2024-03-28T14:15:15.137",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30587",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T14:15:15.183",
|
||||
"lastModified": "2024-03-28T14:15:15.183",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30588",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T14:15:15.233",
|
||||
"lastModified": "2024-03-28T14:15:15.233",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30589",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T14:15:15.293",
|
||||
"lastModified": "2024-03-28T14:15:15.293",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30590",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T14:15:15.347",
|
||||
"lastModified": "2024-03-28T14:15:15.347",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30591",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T14:15:15.390",
|
||||
"lastModified": "2024-03-28T14:15:15.390",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30592",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T14:15:15.437",
|
||||
"lastModified": "2024-03-28T14:15:15.437",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30593",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T13:15:47.950",
|
||||
"lastModified": "2024-03-28T13:15:47.950",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30594",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T13:15:48.007",
|
||||
"lastModified": "2024-03-28T13:15:48.007",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30596",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T13:15:48.063",
|
||||
"lastModified": "2024-03-28T13:15:48.063",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
20
CVE-2024/CVE-2024-305xx/CVE-2024-30597.json
Normal file
20
CVE-2024/CVE-2024-305xx/CVE-2024-30597.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-30597",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T15:15:46.407",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda FH1203 v2.0.1.6 firmware has a stack overflow vulnerability in the security parameter of the formWifiBasicSet function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWifiBasicSet_security.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-305xx/CVE-2024-30598.json
Normal file
20
CVE-2024/CVE-2024-305xx/CVE-2024-30598.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-30598",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T15:15:46.467",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda FH1203 v2.0.1.6 firmware has a stack overflow vulnerability in the security_5g parameter of the formWifiBasicSet function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWifiBasicSet_security_5g.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-305xx/CVE-2024-30599.json
Normal file
20
CVE-2024/CVE-2024-305xx/CVE-2024-30599.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-30599",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T15:15:46.527",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the deviceMac parameter of the addWifiMacFilter function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/addWifiMacFilter_deviceMac.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-306xx/CVE-2024-30600.json
Normal file
20
CVE-2024/CVE-2024-306xx/CVE-2024-30600.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-30600",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T15:15:46.603",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the schedEndTime parameter of the setSchedWifi function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/setSchedWifi_end.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-306xx/CVE-2024-30601.json
Normal file
20
CVE-2024/CVE-2024-306xx/CVE-2024-30601.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-30601",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T15:15:46.660",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the time parameter of the saveParentControlInfo function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_time.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-306xx/CVE-2024-30602.json
Normal file
20
CVE-2024/CVE-2024-306xx/CVE-2024-30602.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-30602",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T15:15:46.723",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the schedStartTime parameter of the setSchedWifi function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/setSchedWifi_start.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-306xx/CVE-2024-30603.json
Normal file
20
CVE-2024/CVE-2024-306xx/CVE-2024-30603.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-30603",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T15:15:46.787",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the urls parameter of the saveParentControlInfo function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_urls.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-306xx/CVE-2024-30604.json
Normal file
20
CVE-2024/CVE-2024-306xx/CVE-2024-30604.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-30604",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T15:15:46.850",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the list1 parameter of the fromDhcpListClient function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromDhcpListClient_list1.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30606",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T14:15:15.480",
|
||||
"lastModified": "2024-03-28T14:15:15.480",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30607",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T14:15:15.530",
|
||||
"lastModified": "2024-03-28T14:15:15.530",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
20
CVE-2024/CVE-2024-306xx/CVE-2024-30612.json
Normal file
20
CVE-2024/CVE-2024-306xx/CVE-2024-30612.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-30612",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T15:15:46.907",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda AC10U v15.03.06.48 has a stack overflow vulnerability in the deviceId, limitSpeed, limitSpeedUp parameter from formSetClientState function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetClientState.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-30xx/CVE-2024-3039.json
Normal file
92
CVE-2024/CVE-2024-30xx/CVE-2024-3039.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3039",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-28T15:15:48.473",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in Shanghai Brad Technology BladeX 3.4.0. Affected is an unknown function of the file /api/blade-user/export-user of the component API. The manipulation with the input updatexml(1,concat(0x3f,md5(123456),0x3f),1)=1 leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258426 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://spoofer.cn/bladex_sqli/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.258426",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.258426",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.301469",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-30xx/CVE-2024-3040.json
Normal file
92
CVE-2024/CVE-2024-30xx/CVE-2024-3040.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3040",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-28T15:15:48.773",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in Netentsec NS-ASG Application Security Gateway 6.3. This affects an unknown part of the file /admin/list_crl_conf. The manipulation of the argument CRLId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258429 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-list_crl_conf.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.258429",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.258429",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.302340",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-30xx/CVE-2024-3041.json
Normal file
92
CVE-2024/CVE-2024-30xx/CVE-2024-3041.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3041",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-28T15:15:49.027",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in Netentsec NS-ASG Application Security Gateway 6.3 and classified as critical. This vulnerability affects unknown code of the file /protocol/log/listloginfo.php. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258430 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-listloginfo.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.258430",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.258430",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.302342",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-30xx/CVE-2024-3042.json
Normal file
92
CVE-2024/CVE-2024-30xx/CVE-2024-3042.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3042",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-28T15:15:49.287",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Simple Subscription Website 1.0 and classified as critical. This issue affects some unknown processing of the file manage_user.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258431."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/maxmvp666/planCve/blob/main/Simple%20Subscription%20Website%20with%20Admin%20System%20manage_user.php%20has%20Sqlinjection.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.258431",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.258431",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.306119",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-311xx/CVE-2024-31134.json
Normal file
55
CVE-2024/CVE-2024-311xx/CVE-2024-31134.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31134",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-03-28T15:15:46.973",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2024.03 authenticated users without administrative permissions could register other users when self-registration was disabled"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-311xx/CVE-2024-31135.json
Normal file
55
CVE-2024/CVE-2024-311xx/CVE-2024-31135.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31135",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-03-28T15:15:47.200",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2024.03 open redirect was possible on the login page"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-311xx/CVE-2024-31136.json
Normal file
55
CVE-2024/CVE-2024-311xx/CVE-2024-31136.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31136",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-03-28T15:15:47.413",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2024.03 2FA could be bypassed by providing a special URL parameter"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1288"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-311xx/CVE-2024-31137.json
Normal file
55
CVE-2024/CVE-2024-311xx/CVE-2024-31137.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31137",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-03-28T15:15:47.640",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2024.03 reflected XSS was possible via Space connection configuration"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-311xx/CVE-2024-31138.json
Normal file
55
CVE-2024/CVE-2024-311xx/CVE-2024-31138.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31138",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-03-28T15:15:47.853",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2024.03 xSS was possible via Agent Distribution settings"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-311xx/CVE-2024-31139.json
Normal file
55
CVE-2024/CVE-2024-311xx/CVE-2024-31139.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31139",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-03-28T15:15:48.060",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2024.03 xXE was possible in the Maven build steps detector"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-311xx/CVE-2024-31140.json
Normal file
55
CVE-2024/CVE-2024-311xx/CVE-2024-31140.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31140",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-03-28T15:15:48.273",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2024.03 server administrators could remove arbitrary files from the server by installing tools"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1288"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
86
README.md
86
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-28T15:00:38.745608+00:00
|
||||
2024-03-28T17:00:37.993611+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-28T14:15:15.530000+00:00
|
||||
2024-03-28T16:15:08.480000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,45 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
243192
|
||||
243229
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `23`
|
||||
Recently added CVEs: `37`
|
||||
|
||||
- [CVE-2023-6437](CVE-2023/CVE-2023-64xx/CVE-2023-6437.json) (`2024-03-28T14:15:13.600`)
|
||||
- [CVE-2024-27775](CVE-2024/CVE-2024-277xx/CVE-2024-27775.json) (`2024-03-28T13:15:47.340`)
|
||||
- [CVE-2024-28109](CVE-2024/CVE-2024-281xx/CVE-2024-28109.json) (`2024-03-28T14:15:13.863`)
|
||||
- [CVE-2024-29200](CVE-2024/CVE-2024-292xx/CVE-2024-29200.json) (`2024-03-28T14:15:14.100`)
|
||||
- [CVE-2024-29882](CVE-2024/CVE-2024-298xx/CVE-2024-29882.json) (`2024-03-28T14:15:14.337`)
|
||||
- [CVE-2024-29896](CVE-2024/CVE-2024-298xx/CVE-2024-29896.json) (`2024-03-28T13:15:47.717`)
|
||||
- [CVE-2024-29897](CVE-2024/CVE-2024-298xx/CVE-2024-29897.json) (`2024-03-28T14:15:14.557`)
|
||||
- [CVE-2024-29898](CVE-2024/CVE-2024-298xx/CVE-2024-29898.json) (`2024-03-28T14:15:14.783`)
|
||||
- [CVE-2024-30583](CVE-2024/CVE-2024-305xx/CVE-2024-30583.json) (`2024-03-28T14:15:14.997`)
|
||||
- [CVE-2024-30584](CVE-2024/CVE-2024-305xx/CVE-2024-30584.json) (`2024-03-28T14:15:15.047`)
|
||||
- [CVE-2024-30585](CVE-2024/CVE-2024-305xx/CVE-2024-30585.json) (`2024-03-28T14:15:15.090`)
|
||||
- [CVE-2024-30586](CVE-2024/CVE-2024-305xx/CVE-2024-30586.json) (`2024-03-28T14:15:15.137`)
|
||||
- [CVE-2024-30587](CVE-2024/CVE-2024-305xx/CVE-2024-30587.json) (`2024-03-28T14:15:15.183`)
|
||||
- [CVE-2024-30588](CVE-2024/CVE-2024-305xx/CVE-2024-30588.json) (`2024-03-28T14:15:15.233`)
|
||||
- [CVE-2024-30589](CVE-2024/CVE-2024-305xx/CVE-2024-30589.json) (`2024-03-28T14:15:15.293`)
|
||||
- [CVE-2024-30590](CVE-2024/CVE-2024-305xx/CVE-2024-30590.json) (`2024-03-28T14:15:15.347`)
|
||||
- [CVE-2024-30591](CVE-2024/CVE-2024-305xx/CVE-2024-30591.json) (`2024-03-28T14:15:15.390`)
|
||||
- [CVE-2024-30592](CVE-2024/CVE-2024-305xx/CVE-2024-30592.json) (`2024-03-28T14:15:15.437`)
|
||||
- [CVE-2024-30593](CVE-2024/CVE-2024-305xx/CVE-2024-30593.json) (`2024-03-28T13:15:47.950`)
|
||||
- [CVE-2024-30594](CVE-2024/CVE-2024-305xx/CVE-2024-30594.json) (`2024-03-28T13:15:48.007`)
|
||||
- [CVE-2024-30596](CVE-2024/CVE-2024-305xx/CVE-2024-30596.json) (`2024-03-28T13:15:48.063`)
|
||||
- [CVE-2024-30606](CVE-2024/CVE-2024-306xx/CVE-2024-30606.json) (`2024-03-28T14:15:15.480`)
|
||||
- [CVE-2024-30607](CVE-2024/CVE-2024-306xx/CVE-2024-30607.json) (`2024-03-28T14:15:15.530`)
|
||||
- [CVE-2023-42974](CVE-2023/CVE-2023-429xx/CVE-2023-42974.json) (`2024-03-28T16:15:08.480`)
|
||||
- [CVE-2023-45705](CVE-2023/CVE-2023-457xx/CVE-2023-45705.json) (`2024-03-28T15:15:45.590`)
|
||||
- [CVE-2023-45706](CVE-2023/CVE-2023-457xx/CVE-2023-45706.json) (`2024-03-28T15:15:45.797`)
|
||||
- [CVE-2023-45715](CVE-2023/CVE-2023-457xx/CVE-2023-45715.json) (`2024-03-28T15:15:45.983`)
|
||||
- [CVE-2024-0259](CVE-2024/CVE-2024-02xx/CVE-2024-0259.json) (`2024-03-28T15:15:46.180`)
|
||||
- [CVE-2024-3039](CVE-2024/CVE-2024-30xx/CVE-2024-3039.json) (`2024-03-28T15:15:48.473`)
|
||||
- [CVE-2024-3040](CVE-2024/CVE-2024-30xx/CVE-2024-3040.json) (`2024-03-28T15:15:48.773`)
|
||||
- [CVE-2024-3041](CVE-2024/CVE-2024-30xx/CVE-2024-3041.json) (`2024-03-28T15:15:49.027`)
|
||||
- [CVE-2024-3042](CVE-2024/CVE-2024-30xx/CVE-2024-3042.json) (`2024-03-28T15:15:49.287`)
|
||||
- [CVE-2024-30597](CVE-2024/CVE-2024-305xx/CVE-2024-30597.json) (`2024-03-28T15:15:46.407`)
|
||||
- [CVE-2024-30598](CVE-2024/CVE-2024-305xx/CVE-2024-30598.json) (`2024-03-28T15:15:46.467`)
|
||||
- [CVE-2024-30599](CVE-2024/CVE-2024-305xx/CVE-2024-30599.json) (`2024-03-28T15:15:46.527`)
|
||||
- [CVE-2024-30600](CVE-2024/CVE-2024-306xx/CVE-2024-30600.json) (`2024-03-28T15:15:46.603`)
|
||||
- [CVE-2024-30601](CVE-2024/CVE-2024-306xx/CVE-2024-30601.json) (`2024-03-28T15:15:46.660`)
|
||||
- [CVE-2024-30602](CVE-2024/CVE-2024-306xx/CVE-2024-30602.json) (`2024-03-28T15:15:46.723`)
|
||||
- [CVE-2024-30603](CVE-2024/CVE-2024-306xx/CVE-2024-30603.json) (`2024-03-28T15:15:46.787`)
|
||||
- [CVE-2024-30604](CVE-2024/CVE-2024-306xx/CVE-2024-30604.json) (`2024-03-28T15:15:46.850`)
|
||||
- [CVE-2024-30612](CVE-2024/CVE-2024-306xx/CVE-2024-30612.json) (`2024-03-28T15:15:46.907`)
|
||||
- [CVE-2024-31134](CVE-2024/CVE-2024-311xx/CVE-2024-31134.json) (`2024-03-28T15:15:46.973`)
|
||||
- [CVE-2024-31135](CVE-2024/CVE-2024-311xx/CVE-2024-31135.json) (`2024-03-28T15:15:47.200`)
|
||||
- [CVE-2024-31136](CVE-2024/CVE-2024-311xx/CVE-2024-31136.json) (`2024-03-28T15:15:47.413`)
|
||||
- [CVE-2024-31137](CVE-2024/CVE-2024-311xx/CVE-2024-31137.json) (`2024-03-28T15:15:47.640`)
|
||||
- [CVE-2024-31138](CVE-2024/CVE-2024-311xx/CVE-2024-31138.json) (`2024-03-28T15:15:47.853`)
|
||||
- [CVE-2024-31139](CVE-2024/CVE-2024-311xx/CVE-2024-31139.json) (`2024-03-28T15:15:48.060`)
|
||||
- [CVE-2024-31140](CVE-2024/CVE-2024-311xx/CVE-2024-31140.json) (`2024-03-28T15:15:48.273`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `3`
|
||||
Recently modified CVEs: `26`
|
||||
|
||||
- [CVE-2013-4558](CVE-2013/CVE-2013-45xx/CVE-2013-4558.json) (`2024-03-28T14:15:13.023`)
|
||||
- [CVE-2023-47038](CVE-2023/CVE-2023-470xx/CVE-2023-47038.json) (`2024-03-28T14:15:13.310`)
|
||||
- [CVE-2023-47039](CVE-2023/CVE-2023-470xx/CVE-2023-47039.json) (`2024-03-28T14:15:13.467`)
|
||||
- [CVE-2023-29162](CVE-2023/CVE-2023-291xx/CVE-2023-29162.json) (`2024-03-28T16:15:07.657`)
|
||||
- [CVE-2023-35121](CVE-2023/CVE-2023-351xx/CVE-2023-35121.json) (`2024-03-28T15:15:45.453`)
|
||||
- [CVE-2023-6437](CVE-2023/CVE-2023-64xx/CVE-2023-6437.json) (`2024-03-28T16:07:30.893`)
|
||||
- [CVE-2024-27775](CVE-2024/CVE-2024-277xx/CVE-2024-27775.json) (`2024-03-28T16:07:30.893`)
|
||||
- [CVE-2024-28109](CVE-2024/CVE-2024-281xx/CVE-2024-28109.json) (`2024-03-28T16:07:30.893`)
|
||||
- [CVE-2024-29200](CVE-2024/CVE-2024-292xx/CVE-2024-29200.json) (`2024-03-28T16:07:30.893`)
|
||||
- [CVE-2024-29882](CVE-2024/CVE-2024-298xx/CVE-2024-29882.json) (`2024-03-28T16:07:30.893`)
|
||||
- [CVE-2024-29896](CVE-2024/CVE-2024-298xx/CVE-2024-29896.json) (`2024-03-28T16:07:30.893`)
|
||||
- [CVE-2024-29897](CVE-2024/CVE-2024-298xx/CVE-2024-29897.json) (`2024-03-28T16:07:30.893`)
|
||||
- [CVE-2024-29898](CVE-2024/CVE-2024-298xx/CVE-2024-29898.json) (`2024-03-28T16:07:30.893`)
|
||||
- [CVE-2024-30583](CVE-2024/CVE-2024-305xx/CVE-2024-30583.json) (`2024-03-28T16:07:30.893`)
|
||||
- [CVE-2024-30584](CVE-2024/CVE-2024-305xx/CVE-2024-30584.json) (`2024-03-28T16:07:30.893`)
|
||||
- [CVE-2024-30585](CVE-2024/CVE-2024-305xx/CVE-2024-30585.json) (`2024-03-28T16:07:30.893`)
|
||||
- [CVE-2024-30586](CVE-2024/CVE-2024-305xx/CVE-2024-30586.json) (`2024-03-28T16:07:30.893`)
|
||||
- [CVE-2024-30587](CVE-2024/CVE-2024-305xx/CVE-2024-30587.json) (`2024-03-28T16:07:30.893`)
|
||||
- [CVE-2024-30588](CVE-2024/CVE-2024-305xx/CVE-2024-30588.json) (`2024-03-28T16:07:30.893`)
|
||||
- [CVE-2024-30589](CVE-2024/CVE-2024-305xx/CVE-2024-30589.json) (`2024-03-28T16:07:30.893`)
|
||||
- [CVE-2024-30590](CVE-2024/CVE-2024-305xx/CVE-2024-30590.json) (`2024-03-28T16:07:30.893`)
|
||||
- [CVE-2024-30591](CVE-2024/CVE-2024-305xx/CVE-2024-30591.json) (`2024-03-28T16:07:30.893`)
|
||||
- [CVE-2024-30592](CVE-2024/CVE-2024-305xx/CVE-2024-30592.json) (`2024-03-28T16:07:30.893`)
|
||||
- [CVE-2024-30593](CVE-2024/CVE-2024-305xx/CVE-2024-30593.json) (`2024-03-28T16:07:30.893`)
|
||||
- [CVE-2024-30594](CVE-2024/CVE-2024-305xx/CVE-2024-30594.json) (`2024-03-28T16:07:30.893`)
|
||||
- [CVE-2024-30596](CVE-2024/CVE-2024-305xx/CVE-2024-30596.json) (`2024-03-28T16:07:30.893`)
|
||||
- [CVE-2024-30606](CVE-2024/CVE-2024-306xx/CVE-2024-30606.json) (`2024-03-28T16:07:30.893`)
|
||||
- [CVE-2024-30607](CVE-2024/CVE-2024-306xx/CVE-2024-30607.json) (`2024-03-28T16:07:30.893`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
95
_state.csv
95
_state.csv
@ -61932,7 +61932,7 @@ CVE-2013-4554,0,0,bbab516aa5e7a550eebfd7ce02c1c282b2d508192c05dd9298cba536b50101
|
||||
CVE-2013-4555,0,0,668aef73396036110ec0cef3914cbf29adbbc51c39d71f48854d17e4fe86fb55,2016-12-08T03:03:38.963000
|
||||
CVE-2013-4556,0,0,204723cb215c9dd4b7db2601ac690a4bd5c30deda407608d977ffdab4ed3330b,2016-12-08T03:03:40.027000
|
||||
CVE-2013-4557,0,0,bb721ddbe3c4d440ffa76214cdc869398625ad0eac7d7ed666f3d9f00f31e702,2016-12-08T03:03:41.353000
|
||||
CVE-2013-4558,0,1,10860f542629e29c0dbabd986f5e7bab016977e3d75f0b1042f30be9d7cc2f0d,2024-03-28T14:15:13.023000
|
||||
CVE-2013-4558,0,0,10860f542629e29c0dbabd986f5e7bab016977e3d75f0b1042f30be9d7cc2f0d,2024-03-28T14:15:13.023000
|
||||
CVE-2013-4559,0,0,0d6d5c0b62d1252c9734ea49ce47a69e5c683a969324320af84ba514ed6c2706,2021-02-26T15:14:05.913000
|
||||
CVE-2013-4560,0,0,d5cd2715ab5c4be24d372c66de2dbdf979f6ea6ec3dd2deffd5de26bddb2ba56,2021-03-04T20:12:22.093000
|
||||
CVE-2013-4561,0,0,57716a9acbe975f52927d1a6e812b2d9d559f7b335849fabbfcb59bff1d4eca1,2022-07-11T17:41:59.077000
|
||||
@ -126441,7 +126441,7 @@ CVE-2018-8817,0,0,297fddc21d6fa42179bd71e88af4eb44611960639cc3a1de055acd8a7e4b25
|
||||
CVE-2018-8819,0,0,2971a9bdccb45a4daba3cc05bab4cbfd0f807867779e3d7861b87d5b3f9f550f,2021-07-27T19:25:54.587000
|
||||
CVE-2018-8820,0,0,5dd8123958ee4479b9544a2695ce0f8ba28aa3f69a29744255a0f532b698677d,2018-04-23T13:03:57.053000
|
||||
CVE-2018-8821,0,0,22b7847ce7def24a65c494acb9698397f36b421e4cc30204fafdb32b330cba56,2018-10-17T17:12:14.487000
|
||||
CVE-2018-8822,0,0,fc642e1948a2a71a821a15d37b1bd222567263828408b9ccc5be4e0a2d11a3dc,2023-11-07T03:01:30.420000
|
||||
CVE-2018-8822,0,1,f0701efffeb3d8341ee93c6a6343411ae5a032a7876def5e5e59efb2587a39d6,2024-03-28T16:08:31.410000
|
||||
CVE-2018-8823,0,0,cade7e0ab27d18823afc3990f16da976b81081ab95be44c6e4ece0702b9f6564,2018-04-24T12:54:53.840000
|
||||
CVE-2018-8824,0,0,d2db6a4430a7c7b1a757abc3efb8d8f9e71a49a81699250898b36ee056b554b1,2018-06-13T12:50:31.863000
|
||||
CVE-2018-8825,0,0,e6ed0fa8ba30fc40fa56ed6a5a8bcd704e7670201148920f2d13a614bc6e4431,2019-04-25T15:05:08.410000
|
||||
@ -220854,7 +220854,7 @@ CVE-2023-29159,0,0,3530aeb323cc6b274b9fbf00886d84d85a8664196228c99c668412dcb4da2
|
||||
CVE-2023-2916,0,0,91bb6a6a4feffa7671e9beb6a5a4b79a5e6aab4e671c0677a43f134a14592d7f,2023-11-07T04:13:32.660000
|
||||
CVE-2023-29160,0,0,8d762a8bda12c63159a8f102e32920c3dafc59836188f2c0c0f98c6370c1f22d,2023-06-21T18:57:51.187000
|
||||
CVE-2023-29161,0,0,c62935c727903372e1dcc762cd9261a190231ebb89c3972da743594de4efbb59,2023-11-21T01:59:16.600000
|
||||
CVE-2023-29162,0,0,f57f1fed8154893ee9acd062fd888003ccc81d4f771e20708cc6863971320eae,2024-02-14T15:01:51.137000
|
||||
CVE-2023-29162,0,1,743ca69a30b7a19aa26a5ded83f1c2fb350d5181b45d75f048e7be4d2d452c68,2024-03-28T16:15:07.657000
|
||||
CVE-2023-29163,0,0,3d6ed3c9ec134bb0e0a6fa27ad6822836d432cefde306db8b29cc039802a0f95,2023-05-10T18:47:29.897000
|
||||
CVE-2023-29165,0,0,54258be05c2c70612fce26e841441395eba8358d9896577407b4743b56c7dd47,2023-11-30T02:19:41.003000
|
||||
CVE-2023-29166,0,0,e0cf60a56c61b0baa05989268e1074ef73353fbe443e5381d6d2a68e7c6e8901,2023-09-08T15:44:32.397000
|
||||
@ -225064,7 +225064,7 @@ CVE-2023-35110,0,0,6c46b92039a347d6b65042ab739d78be945b3320df2f8079905d3703dca6a
|
||||
CVE-2023-35116,0,0,f76c81cc5cb5e3c4a74e52501480ae0572c4d7b01e66ada562d4030823c55fd3,2024-03-21T02:47:55.440000
|
||||
CVE-2023-3512,0,0,46069bca6a2a9235e9558d2eb33faec2498fe8f2dff26081a19acf558edc1def,2023-10-05T17:04:39.053000
|
||||
CVE-2023-35120,0,0,b5ead04261c0831b10c7100bbfb912d1f4ffac784f89b136f0369f049a9d5485,2023-07-13T22:50:44.740000
|
||||
CVE-2023-35121,0,0,55dd92f416ad91d5e95cf6179c593af4578bf74794def53546aaf74f70f047ea,2024-02-14T15:01:46.050000
|
||||
CVE-2023-35121,0,1,658412d32bae0f13ceea6a575a15ba5fb0e139437d99f76b128fe1745a942dd1,2024-03-28T15:15:45.453000
|
||||
CVE-2023-35124,0,0,9073e57a452fb41225dae20c634f4517700dcc89e0ef010a593ba5e1961f8505,2023-09-08T17:28:28.417000
|
||||
CVE-2023-35126,0,0,97f0154eb5275146dbfc2ffbbae614c0d14ef1944447f84a1e8624649a99eb12,2023-10-25T14:48:30.890000
|
||||
CVE-2023-35127,0,0,4e70fc11d19f5b80d804e1144229095caa26940cbb99aa03fa172591d7878ea1,2023-11-30T17:24:26.147000
|
||||
@ -228721,6 +228721,7 @@ CVE-2023-40385,0,0,d87186e65fbe11c963d9f2ac49a37bea6de8f4a87feb525e072522d577fee
|
||||
CVE-2023-40386,0,0,98b5b9164e51a67fec2b119151c92fd2d9bb1d8d51de82443b681e79ce2c9a34,2023-10-12T01:59:56.563000
|
||||
CVE-2023-40388,0,0,0669c38434b1494ed261fd2860ebba321deabd42233fd11611759d0565888e20,2023-10-12T01:59:05.793000
|
||||
CVE-2023-4039,0,0,0accd3adc8756cc7a927b7c908e91237d32e08c68f471a1067012290c829eea2,2024-02-19T23:15:07.680000
|
||||
CVE-2023-40390,1,1,e18c91ac234234bac8ee50fda94885373a01c59b413ad7540ec6153df61ac1ff,2024-03-28T16:15:07.773000
|
||||
CVE-2023-40391,0,0,674710606efc5e20f3b4d034fd6151d2f994f0410f8a773be4faafb0e10f357d,2023-11-07T04:20:12.943000
|
||||
CVE-2023-40392,0,0,84bd7104c6189c2c6e9b4ab3e6ad9d972f95c392c1e5bd1a44d7d7f201861784,2023-12-22T15:18:01.370000
|
||||
CVE-2023-40393,0,0,4bc719fe5b2c101665c569bf2c331dc4a53294b75d2f5d545fba8e39b8e680a7,2024-01-17T18:30:39.897000
|
||||
@ -230346,7 +230347,10 @@ CVE-2023-42889,0,0,42361d7a844de9570556985cb5c26fe399cae2c49e9ac17e150405bc9bd14
|
||||
CVE-2023-4289,0,0,f449244f705f291b0d7ddbc329d46d68ae72f3f405646fb1709b45473269b907,2023-11-07T04:22:25.410000
|
||||
CVE-2023-42890,0,0,eacabcc2a4af39632e6d4228761680fb329094370499894080f37a6035d56207,2024-02-02T03:11:18.417000
|
||||
CVE-2023-42891,0,0,7846fe25f210e0b0608521c50c1b1f15957f2513ef89a3c83e589c7bed8db2b2,2023-12-13T17:46:10.560000
|
||||
CVE-2023-42892,1,1,b7c4592fa05996f6346f24cbe4a9ca6f36a1f628133e1c4ae7e546ab9f1a758d,2024-03-28T16:15:07.843000
|
||||
CVE-2023-42893,1,1,94280ad2f20deddf83a75f34e124496389675f68f69eafa676a6dcab0d88c83a,2024-03-28T16:15:07.903000
|
||||
CVE-2023-42894,0,0,675f93d1b0d4296c714bb851c1c8cebe1d109e20fbe5c2802462dd05c7607dcc,2024-02-02T03:11:25.083000
|
||||
CVE-2023-42896,1,1,23f534f3866e78796cc0880285efe3bbd83f40fc182d7ca46bb35d6115ba298e,2024-03-28T16:15:07.970000
|
||||
CVE-2023-42897,0,0,b9f50f6e7bf2b37ee8bcc879a04d31e42b1e46ab101c921014af1dae5762efc0,2023-12-13T20:57:23.147000
|
||||
CVE-2023-42898,0,0,dcd63d2da25631e7b1de0a508c17683086fe149cd68524397b9248e14b5c0a13,2023-12-13T23:15:29.030000
|
||||
CVE-2023-42899,0,0,a3799d4a021bbd53e7e95b764e09f7a56ae66d67b39322f34aee128999f61553,2023-12-14T14:07:42.957000
|
||||
@ -230365,6 +230369,7 @@ CVE-2023-4291,0,0,820c0ef5909fcefa01c2a721d589920b63994852e7a069d42cd163e7b56171
|
||||
CVE-2023-42910,0,0,71a54e7b7fb5706098fa51027de526083f12c7f45c9c197df68e4ac606502e93,2023-12-13T19:14:00.170000
|
||||
CVE-2023-42911,0,0,867b92b373d754d783128b4f56f24fc6b647c44603b483046d9505c18745d73b,2023-12-13T19:12:48.780000
|
||||
CVE-2023-42912,0,0,c098e394dc0a67e07f9df04c549c33226f6d9ce3b3c9000a8422b2e740c1e1ce,2023-12-13T19:20:21.287000
|
||||
CVE-2023-42913,1,1,1705d34bff4d62f3aa81940b5bd1a2136fc486b2d04239bab25876cdc8426435,2024-03-28T16:15:08.023000
|
||||
CVE-2023-42914,0,0,d136deea7639edb129a4f43389dd9bd60f947fe20e61b8abbaafea8d30a38f33,2023-12-14T14:54:10.347000
|
||||
CVE-2023-42915,0,0,1be85ce6fa0cfc0bf8e379977bec0d27fb6c9ccbc4c64c6fe4121e3a8a02c76e,2024-02-14T03:15:13.210000
|
||||
CVE-2023-42916,0,0,1069f61a27a7fa77970bbb0175ce8643cfc992d30189fcf5adedb4c6bed028c3,2024-01-26T17:15:10.007000
|
||||
@ -230380,10 +230385,13 @@ CVE-2023-42927,0,0,c9a9ed650bc0549f85d7705bd9d3466edcaeed91950814aa06162a7b15f57
|
||||
CVE-2023-42928,0,0,4d575fc7bee0ddbdac6cb470d5d7d4a1a9c0adf90a31f047e6f305ee0485dd5a,2024-02-22T19:07:27.197000
|
||||
CVE-2023-42929,0,0,eb3f00ec709ba2f7760fb72343fbc272118a213ac02cb710d8fda7bd7caee235,2024-01-12T14:42:35.277000
|
||||
CVE-2023-4293,0,0,1d2ed52d59da409192b197524a27c7d014bb0b1abf5d88d5a31553547b2ae6e6,2023-11-07T04:22:25.750000
|
||||
CVE-2023-42930,1,1,f9f47861462e626db83bf0dffe814333448c9b9460975b2f5e2c448052191c4f,2024-03-28T16:15:08.090000
|
||||
CVE-2023-42931,1,1,ff51729569e9de3d56d9f0e3498681bfc941dbb93638a83bacabe47683289553,2024-03-28T16:15:08.153000
|
||||
CVE-2023-42932,0,0,d72ebc99606ff88b5196fb92ba085a234d9bb36deaf43aae627023bac3f8f5fa,2023-12-13T21:15:31.733000
|
||||
CVE-2023-42933,0,0,4515d35610e674bb40f9ac6898c27078c01d4ce90705902554e59c696decfa5a,2024-01-12T14:42:31.583000
|
||||
CVE-2023-42934,0,0,9bbd832bbd99920d5b4e7783d7815e5b4e4bfb6335bc1932425966a175c8c3cb,2024-01-16T23:52:48.783000
|
||||
CVE-2023-42935,0,0,606ee85ca40462fb734cd978403d80127f0d12edae5212a236ef5fd51294018c,2024-01-29T18:38:29.587000
|
||||
CVE-2023-42936,1,1,1db32558db6660253e6ae3ca3ea32ceddfd608c7422ab9151211e015e4f21ab5,2024-03-28T16:15:08.200000
|
||||
CVE-2023-42937,0,0,c2539e1b6a362c132317285010348324c513a5269588c97c8989267a27c3c96b,2024-01-29T18:33:19.387000
|
||||
CVE-2023-42938,0,0,462788774e20545d65b9d3f478cd23a7f498f5f04c53cff4fca3aa9542319994,2024-03-14T20:15:07.040000
|
||||
CVE-2023-42939,0,0,4b0304a240b255af54a2d16f83934322490b0bc4310fde824596ed206eb1503c,2024-02-22T19:07:27.197000
|
||||
@ -230393,13 +230401,18 @@ CVE-2023-42941,0,0,be8c2f55cce80031919c17cdf6118cd30bd6c8016a8d2c844474b450e95b7
|
||||
CVE-2023-42942,0,0,07ba94131ee2af175813b684a3418fba2b1cb10f8bf4794024c3c777fccf87a6,2024-02-22T19:07:27.197000
|
||||
CVE-2023-42945,0,0,8965ecb696fbb6d1dfc191b5b241cb2dbad9c4594ab7548615100be2688c334d,2024-02-22T19:07:27.197000
|
||||
CVE-2023-42946,0,0,6e687d6a54184ed98b48ec9994a691a9f653d38c2a6ab147b69be8a3c35af011,2024-02-22T19:07:27.197000
|
||||
CVE-2023-42947,1,1,c4bcb78a9a73b67b24adaec721354e27621da16c3a123357503f8aabdc0ada9c,2024-03-28T16:15:08.250000
|
||||
CVE-2023-4295,0,0,ec56fb9406b5889c47288aaf0ca0b50df9da68e8409e0f183bd2d96adf912d6b,2023-12-28T17:14:36.030000
|
||||
CVE-2023-42950,1,1,c248f2a713c5108c4c2c084d01bbd8549106842819209c597ee099da10ffc9b4,2024-03-28T16:15:08.313000
|
||||
CVE-2023-42951,0,0,f47d9d53b96327a99c3cf9d9b6178395ac7e4f6ffb9fc1067e40ded2ecc60fdb,2024-02-22T19:07:27.197000
|
||||
CVE-2023-42952,0,0,f7dadd56b6a68a714e4e042690efb1e01d718cc903255fad9804058d56088666,2024-02-22T19:07:27.197000
|
||||
CVE-2023-42953,0,0,0ea855ba33bbd4297f25ae9925400ebda739241895a723a394f07f9bd3e18595,2024-02-22T19:07:27.197000
|
||||
CVE-2023-42954,0,0,4ff84847c56efbc3f637425a9807eb7b381f4c2cedb6bf16f12c3ca640d4fba3,2024-03-22T12:45:36.130000
|
||||
CVE-2023-42956,1,1,1338ed64550ccd6adb9923c68f78faf628c18bb60ee8d87e550a1d7e2b2df241,2024-03-28T16:15:08.377000
|
||||
CVE-2023-4296,0,0,d2ae4b9dc4bd1f62bf026bddbb5b57fabef675b1476686b487fb198d6eb084a6,2023-11-07T04:22:26.050000
|
||||
CVE-2023-42962,1,1,d388850f0f3319f89ab7f64ff1ff9565fa311d37446e8f374d7ad0cf5b34da0e,2024-03-28T16:15:08.430000
|
||||
CVE-2023-4297,0,0,2c1c4e8e16b8093dbd67367ad04a33c7dee7987a75a3f105a73f15afb0fc121e,2023-11-30T05:15:24.520000
|
||||
CVE-2023-42974,1,1,8393c0a703ee2b0e33897e1921a49df59619119d54de7c41b02f17deeb2ee478,2024-03-28T16:15:08.480000
|
||||
CVE-2023-4298,0,0,8d44cb3045014d8716e0dbcd1489dfd2b845690c0f9918da8a0ecf5aeaadb4f7,2023-11-07T04:22:26.147000
|
||||
CVE-2023-4299,0,0,d299dee9e9e09a75920752d626eddd98b20a641756e2cb4231c35d64b6040ce2,2023-09-06T20:13:32.917000
|
||||
CVE-2023-4300,0,0,f62dc368b46b9404d8645d11cb5b2bfc1bd54a409b445b1d76533aa142e1aefa,2023-11-07T04:22:26.350000
|
||||
@ -231954,7 +231967,10 @@ CVE-2023-45700,0,0,52e392d90576964820ffa552cbf503545fe1df48543ea52f5f404cef046e1
|
||||
CVE-2023-45701,0,0,4c15012e1d51ec39f5feb89c87578a81573faeafac8042c349d979cdd1101145,2024-01-04T20:25:30.933000
|
||||
CVE-2023-45702,0,0,82ce4409940218ec08fecc4ed05a8e24983c4d04841dd1b013b28319a780c3b0,2024-01-04T20:14:34.343000
|
||||
CVE-2023-45703,0,0,dea19aa7d6a8a6afd2ee4037f85223b782d0f4c3a590d34c9d227990e4e23cff,2024-01-02T16:18:39.287000
|
||||
CVE-2023-45705,1,1,d23d43767e7189e1ef994a1336b8af2f70207dbd8fb0b88c4292061566472e43,2024-03-28T16:07:30.893000
|
||||
CVE-2023-45706,1,1,0af7bc7c8de7e9189f51b43b9ec4a80f653024128db7b6b665bdbde7eafed6fd,2024-03-28T16:07:30.893000
|
||||
CVE-2023-4571,0,0,4543f43b5b806b7ab0b407fab2a9976430e8638413c248a7ed786869bace6996,2024-02-16T15:56:59.350000
|
||||
CVE-2023-45715,1,1,50b8f6532a40dad28413df591023a26e3e5b087932dba29d48cc5a1c57b86496,2024-03-28T16:07:30.893000
|
||||
CVE-2023-45716,0,0,0a00a1625e10fd10c315dd94d684f341e834c086570f2f1b11bcfdbaa4c3a720,2024-02-26T21:22:54.537000
|
||||
CVE-2023-45718,0,0,71dc0819c79bc4f634af5fc4a33e73e03a4350f0ee57c5cc8392683d3aee2df0,2024-02-11T22:29:15.837000
|
||||
CVE-2023-4572,0,0,1f54579490b8fcc0cce08f781af19b969e5114ab6ccc87ec2998be324173b104,2024-01-31T17:15:16.437000
|
||||
@ -232891,8 +232907,8 @@ CVE-2023-47033,0,0,9f64afaaad6656e35f51a7e5c20ba55e9da6ae915e60dc5ef4045963b8f11
|
||||
CVE-2023-47034,0,0,5e669df5a7ad32eb8b097886efddff48819f84fb4b955cc5aca9e920a6102637,2024-01-30T16:48:28.163000
|
||||
CVE-2023-47035,0,0,770b2e98d600ebf26f2028e8928b35898574cd25900dfff88aadc984966168b6,2024-01-30T14:46:19.023000
|
||||
CVE-2023-47037,0,0,41a8074073da30fee421b63710b020a304c67d01acb6cb001f13ad89df88a01d,2023-11-20T19:31:24.707000
|
||||
CVE-2023-47038,0,1,c7b4366edd0f1d49522736dc3630add75bced8a997cc470d2143d96df0856b14,2024-03-28T14:15:13.310000
|
||||
CVE-2023-47039,0,1,437d789d3a627731735caace9623309c9997b0d4bbe85d9712e8d1e5008fe7f0,2024-03-28T14:15:13.467000
|
||||
CVE-2023-47038,0,0,c7b4366edd0f1d49522736dc3630add75bced8a997cc470d2143d96df0856b14,2024-03-28T14:15:13.310000
|
||||
CVE-2023-47039,0,0,437d789d3a627731735caace9623309c9997b0d4bbe85d9712e8d1e5008fe7f0,2024-03-28T14:15:13.467000
|
||||
CVE-2023-4704,0,0,77ebf42b59920524121a8b02a25671c48b0f1350a3a8f8e2939f2392f9e7437a,2023-09-07T17:36:22.737000
|
||||
CVE-2023-47040,0,0,6322864e829babbb65f45703f53197ba4d7f038dfd8500f6b071b64d87a2c81c,2023-11-22T15:19:16.977000
|
||||
CVE-2023-47041,0,0,0d98c37438ebfb3a525e52b4e9abb4b52abb56b45e2fe2da422b09a566f0e9a4,2023-11-22T15:19:08.407000
|
||||
@ -237299,7 +237315,7 @@ CVE-2023-6433,0,0,0242e6d4de0a12c4774282886b58eedeb17d73e3db75f77593dc21ff1bd0a1
|
||||
CVE-2023-6434,0,0,9f35d2af1c67b934d28d1bc4b998a61a5a5be9bedef49a9a9e04db7f4c260358,2023-12-02T04:37:56.790000
|
||||
CVE-2023-6435,0,0,4505ba10fcc8aa6b8ff0c0716deec9c72a837bf913de36c614dc0992acd9599a,2023-12-02T04:37:54.727000
|
||||
CVE-2023-6436,0,0,75eb96dbffde560c8577d4e38af8f94e4d2ad1618e885a11eba0c0c2420c59cc,2024-01-08T19:40:27.743000
|
||||
CVE-2023-6437,1,1,68604463d26259635a3027bab30da732c4fec13b193e58a7eb4d5a25d03f395e,2024-03-28T14:15:13.600000
|
||||
CVE-2023-6437,0,1,fc7b7ef120c1cd74068344e1742d8125095e6e5378c129cf5ee180a60aac63f8,2024-03-28T16:07:30.893000
|
||||
CVE-2023-6438,0,0,6e298808843bf5b7095c9c9c0ac99fa07dda226b820b821799b1942a288243fe,2024-03-21T02:50:36.630000
|
||||
CVE-2023-6439,0,0,34fec7b01443ba1f65bae9722432800576490571288914b58a6027dfc6998c41,2024-03-21T02:50:36.733000
|
||||
CVE-2023-6440,0,0,41f9bd837c0c4f9bfac9f0eda9f132ad965a1f73e00124290fda773307f7f5b0,2024-03-21T02:50:36.823000
|
||||
@ -238060,6 +238076,7 @@ CVE-2024-0254,0,0,e5eae8b11bfbdda0720ecba88e72e29efdd7b42117ba1a4582cfd62b02acbd
|
||||
CVE-2024-0255,0,0,541867be2e415931a41832092b931a9f6ed85b86ce138a5f77d6aa8f5909e5ad,2024-02-07T23:31:10.567000
|
||||
CVE-2024-0256,0,0,49de163342e5ba45f12c2cbfe0a11fce418d24b9f8f242901a15605875a38ffa,2024-02-14T19:17:28.387000
|
||||
CVE-2024-0258,0,0,da926b444685fcbac9be2b2403a8d6738d09992d6c11f2b5b1d93a114519bfef,2024-03-13T22:15:08.970000
|
||||
CVE-2024-0259,1,1,81c286a300947c75bec1d2c83f224330c6c85d9501b7f6f61b4ee09cf52b92ab,2024-03-28T16:07:30.893000
|
||||
CVE-2024-0260,0,0,2779dbdedaac297e872da9c4df94fb4f41548ecabca4e84dd2cb7a84b44ae4c4,2024-03-21T02:51:03.110000
|
||||
CVE-2024-0261,0,0,c7ebebf9ba9dbc5389c04e823357440854b7688f8b5aa275c4c69ab35df44c81,2024-03-21T02:51:03.190000
|
||||
CVE-2024-0262,0,0,cfeabed15067ff1fb4d3b57dc6829768d130e7f8cef2d663a7958b8c4721a024,2024-03-21T02:51:03.270000
|
||||
@ -242416,7 +242433,7 @@ CVE-2024-27771,0,0,0aee7dce542e3846fc61fcb0b334acd3d3866184b33df64f8377358b3bfec
|
||||
CVE-2024-27772,0,0,a17826d9a0874c3f3ffc19dd6a14e32a35c360a62820ef43132537b66b4def32,2024-03-18T19:40:00.173000
|
||||
CVE-2024-27773,0,0,2024b60af24687a3b3ee666dada367802136074a0282a48cfcb9d5e3649d7c7f,2024-03-18T19:40:00.173000
|
||||
CVE-2024-27774,0,0,faaf7adce2033b4161afd1d606bbef075c5b779f6cc928fc6a617e115b9369f0,2024-03-18T19:40:00.173000
|
||||
CVE-2024-27775,1,1,8944a7eae79c04f73db7ba8431c2c0de7fdefc9147e8673700dac0096e36cb6b,2024-03-28T13:15:47.340000
|
||||
CVE-2024-27775,0,1,51c4d69c962e89cdfef488f862c194d6eae5ffb312024f7f2ebc0cf2d2d00e09,2024-03-28T16:07:30.893000
|
||||
CVE-2024-2778,0,0,606da7002eecf8b4a69d2bd07186555e4fbaaa2eba41bedbde660e768d517807,2024-03-22T12:45:36.130000
|
||||
CVE-2024-2779,0,0,a46cbcced54f990ec3ab00dcc310828877345eeeff0a3332adcf6734f8a63516,2024-03-22T12:45:36.130000
|
||||
CVE-2024-2780,0,0,bdcceeee0c00953c03148d72ca9c4da28e2649db6e5c4d572065a841b8ee9aa9,2024-03-22T12:45:36.130000
|
||||
@ -242528,7 +242545,7 @@ CVE-2024-28105,0,0,fcc764ac1e5fa24a7cdc91807ca008992de501a32669f46e1eff534ca8e7d
|
||||
CVE-2024-28106,0,0,a89dc0ca5c060b8348ae8f0c0d823137664e9265682cb4445ed694e0c7db5aff,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28107,0,0,67b11d5219b0b9f786e274d36c6219cc6a62e589b1f556fced90abc2232753f8,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28108,0,0,1751fd9e7c1a575d99388404f19dbe254b5bb178f28831b3f691526133af985d,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28109,1,1,574d5d4fd2d839d54da9223314064889394f80fe42444ea1f5ff94b12b2367b4,2024-03-28T14:15:13.863000
|
||||
CVE-2024-28109,0,1,d30f3230bb606227658d0f277b6bad62648a2e7e9f7feb695a5057cfb1ffca7e,2024-03-28T16:07:30.893000
|
||||
CVE-2024-2811,0,0,cd6568d4253dfb36f9b79c1a6cefb0971039231a0ac66a212abf5e2fb6a72887,2024-03-26T03:14:03.240000
|
||||
CVE-2024-28110,0,0,0aa63c709bee34101fee09332c67840fa8b7d5aea01ed58b7f238cd7f26f2f87,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28111,0,0,ef109000cb681b8950a504435d888106cd334990070bd9ca1f33bba165c1974a,2024-03-07T13:52:27.110000
|
||||
@ -242894,7 +242911,7 @@ CVE-2024-29195,0,0,12b6fcead703f320c2faaa3dbf933701901e834c51cbd479cd70a3447afc3
|
||||
CVE-2024-29196,0,0,e02aa4919ed0d6b8af5e1fbc5257465a64fdae2f23d9b9aaabfbc3da2c0d39fa,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29197,0,0,48cfe2d0e00e1d6e9f018548b8b920adc8f1c35c8c8d2a08e4bc3b3e003f90af,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29199,0,0,78313b772930e0d3c119e70c910c05a3509fc574028745b1b9c80a0f992c34f5,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29200,1,1,64cc3f0d0f34f9302b722a3cebee5577a4cf54e0fe4ac2f4b6db379a488c19d3,2024-03-28T14:15:14.100000
|
||||
CVE-2024-29200,0,1,ef9326193a74c86371ac9fbb2b6f7f9808127955b4bd7d8d0622423f8b799c06,2024-03-28T16:07:30.893000
|
||||
CVE-2024-29203,0,0,85853d1d6c0b7cff8ded9ca779662219e1e7d461c7c9aed96ad32295a032c6f6,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2921,0,0,a7048ceb487f73059844764517da213b04f370019c5cc0c6fe2153431d1dd6cb,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000
|
||||
@ -243049,7 +243066,7 @@ CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e
|
||||
CVE-2024-2988,0,0,095fa6458e008f6f7d69334248969b0501d37383db72dc8bee93560edc741f88,2024-03-28T02:01:21.693000
|
||||
CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29881,0,0,7eaff78a6eecd508372203508f2ecab97ebc62cfd94b7af6101b5d7b6ca209b2,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29882,1,1,dacd1d188eec04753f0fa763740af8ff42bfc4a2b784a620bad0689784c8766a,2024-03-28T14:15:14.337000
|
||||
CVE-2024-29882,0,1,4165d20253960416cd183b974438d8dac4fe88260bfe5e0d52449ad6b72b673f,2024-03-28T16:07:30.893000
|
||||
CVE-2024-29883,0,0,2444d321a867d6f4cdf63bf8a1bc6af3b407752f2134c1f64a1d02545242c426,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29886,0,0,3f88cfdb4cfb88186dd10b00ca51e7380d7eb2a0a458754ea1dfe21c4512300e,2024-03-28T02:01:21.693000
|
||||
CVE-2024-29887,0,0,f387f1fcc31e0714aa90eb378be59a2d52ee246f68fe9dafd34624693c2abecd,2024-03-28T02:01:13.303000
|
||||
@ -243057,9 +243074,9 @@ CVE-2024-29888,0,0,e6980a084f851bc0c8ffe0d4edac384e7194ab82af737faf570a62d329543
|
||||
CVE-2024-2989,0,0,7bf7e9a03ba8c5d37e74d436f6afb4547ab8035499b1c3a92009f461628a8bf5,2024-03-28T02:01:21.693000
|
||||
CVE-2024-29891,0,0,8db13a694d94d9c0ea356374520c4ec758a3562c2da8a21f831daea1cc8fa44b,2024-03-28T02:01:13.303000
|
||||
CVE-2024-29892,0,0,59c6b24496fc40dcb3fc7fa651d54d9a835514ae28a8bca0877d6fdd02e37f42,2024-03-28T02:01:13.303000
|
||||
CVE-2024-29896,1,1,105cbaa5e7650be199e3cc1881d3e9ee68dcfa8baf64f79a7108821cffd17c34,2024-03-28T13:15:47.717000
|
||||
CVE-2024-29897,1,1,67e8706eb03989eaa5985eba7a3114a19ea44583ca18d1bd6e7b992ec3a3ff41,2024-03-28T14:15:14.557000
|
||||
CVE-2024-29898,1,1,05bbed3526cdcfc5a9d1af36083d792c8435ff23df04da8e0a0a82f8bd014126,2024-03-28T14:15:14.783000
|
||||
CVE-2024-29896,0,1,9a48e50ad0f2c459cff25077d20f0d1435afab76d715677e89b40a04e8f727c2,2024-03-28T16:07:30.893000
|
||||
CVE-2024-29897,0,1,111bc9aedafa055633df3c49dfa610aa7a9dd3a7d49c3bf5a40bedf55347a260,2024-03-28T16:07:30.893000
|
||||
CVE-2024-29898,0,1,eab054cfc704fab3df338b9c3296e7b0707c4a3ea6ce4f0e8582baf99d69e79f,2024-03-28T16:07:30.893000
|
||||
CVE-2024-2990,0,0,7b8bc4275f049749984166beead5725a3bf23799e4803482e7e47aaa1bac7e25,2024-03-28T02:01:13.303000
|
||||
CVE-2024-29906,0,0,5e6afa8dbe77b2ceaee29629c66d8bdf273caddf4f38f955d682aeefe9beab4c,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29907,0,0,95ebf1e66704307f93559559f18923b10f644f7f3c6486fedede31060b34f004,2024-03-27T12:29:30.307000
|
||||
@ -243173,21 +243190,41 @@ CVE-2024-30242,0,0,b28005a560b57a7a7ae9969109e7f870b899e43349d9d677c38181c99febc
|
||||
CVE-2024-30243,0,0,dce2f0605d44bfa3b81cf0e14bdfd0fae98270908d0c04fcccbda1832d2d9684,2024-03-28T12:42:56.150000
|
||||
CVE-2024-30244,0,0,58cbe82eb6a3315167a8e6bb0cccea64e33ba08dd30670c3060eede01da84f20,2024-03-28T12:42:56.150000
|
||||
CVE-2024-30245,0,0,69f8d0e8e9820bbde2e6705ffa51df6c4056c193c50f3f74b4878ddc0c1739df,2024-03-28T12:42:56.150000
|
||||
CVE-2024-3039,1,1,78eee57f82e030cc18475a85cdac1c12567dfe02603d629b2fbdbce1920e64dd,2024-03-28T16:07:30.893000
|
||||
CVE-2024-3040,1,1,6f474eb89904d3ef26a1f99830c4f7e6fe42c974c3600ac0c482bf259f0da50d,2024-03-28T16:07:30.893000
|
||||
CVE-2024-3041,1,1,3dadac99e88a79c62df6899f0fad147e3340516f2236f4e3cf8c259f2e06d9f0,2024-03-28T16:07:30.893000
|
||||
CVE-2024-3042,1,1,bbb201bb8af54b84ea33f47457d61d2db4be63190911d6f2d2de2d7f6ef14959,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30421,0,0,b8b8cb07a3b21c6533c687c46600fcd77c1dde4165706436ec8a960aad3329a9,2024-03-28T12:42:56.150000
|
||||
CVE-2024-30422,0,0,4428c80482e6497556bbd0fd5fc18b1b3811a4ae5bf0c8713af97deb1a151ca3,2024-03-28T12:42:56.150000
|
||||
CVE-2024-30583,1,1,80ec8dac2df697f6d97dce3d414f3f40db802c8a05001d59322248887dd494a3,2024-03-28T14:15:14.997000
|
||||
CVE-2024-30584,1,1,8f9baee3cb43c9905ec86b9ceafcc9fa1c1744ff634c603f52c4c6f51a696b11,2024-03-28T14:15:15.047000
|
||||
CVE-2024-30585,1,1,d28878d4514beae5f4a8ab14bb774cd280bd05289eeacb0c71c85485f44bd725,2024-03-28T14:15:15.090000
|
||||
CVE-2024-30586,1,1,e994d08daae11886e164c06c955244b9508623834040b22157b01f787dbc0950,2024-03-28T14:15:15.137000
|
||||
CVE-2024-30587,1,1,6274e509df3fa70da36dfdbc664d4ccf17dd7d0e67c39af2dd11068017b323da,2024-03-28T14:15:15.183000
|
||||
CVE-2024-30588,1,1,01803a8f1753441e295114a835437c23858ff4e45ee9b4f2ae8687fa72d06f88,2024-03-28T14:15:15.233000
|
||||
CVE-2024-30589,1,1,509d4c85012c03904de4c0dd93b476cdd601d8081e5166323a7c4d0cc68d0bf8,2024-03-28T14:15:15.293000
|
||||
CVE-2024-30590,1,1,eaa76954b414a6fa9537869c2507880f04b22a0c4738d8ed5fce5ed85a50bc26,2024-03-28T14:15:15.347000
|
||||
CVE-2024-30591,1,1,3d0921e40ab66acd2d6afca0d71ac066255ff86efc26a848649ab19d4a298c35,2024-03-28T14:15:15.390000
|
||||
CVE-2024-30592,1,1,56f8d7aa5e3af7129e1c164e2430cfa563ea1b6bcf42ee4f9c8560f78563b56c,2024-03-28T14:15:15.437000
|
||||
CVE-2024-30593,1,1,1a36095e535cda1e55aecd9fb09089f1887b6aafd29dda7f3d3fee7ec07f4b6f,2024-03-28T13:15:47.950000
|
||||
CVE-2024-30594,1,1,349d76c77d7160b339e99949df685f81a71499788b00110b42a5b560440a2d4b,2024-03-28T13:15:48.007000
|
||||
CVE-2024-30583,0,1,90e06b2d765278ac0f3bc4028344fdf483d30ea530d1cc273b94886fa84d52bd,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30584,0,1,35ddda2305ed50d97f06df7df7b733486405aa80385b935162c6180d1fe62320,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30585,0,1,7e78a86bcf687f746816842e948af254246fdc173fd94674915f1ec2e6a3c749,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30586,0,1,37eaa44de9abeff4b259d4ed391e0ff9c819a61001d2eac97ecd8afa2c7273db,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30587,0,1,36e8b51eabfd3120c57ca2b9ecc6c1c35cdd81a5088a83b8b20788614eb5a7e8,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30588,0,1,41fbf2b74842eb4c396bb4c1c4040e0694e963250cd064f663ff6032e697716f,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30589,0,1,e9d9137ef12bc250b28edd5e7aff25a313c5cfed6eedf3dad714362460745e1a,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30590,0,1,3d0a6627c184857af247d36c652f53828d799379ea6555c5b8736fdc0d082922,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30591,0,1,7243d7a5ad9c869750e307cf51f223f43ed20090c1bd6ca7e74e1811f2659010,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30592,0,1,7416c528eb6e2aad55e80c4e8e1aedf8486a9b72141c06c8af2ede72c1f3191f,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30593,0,1,94ab7a5984b6ddc252d1cdc2f34439ed1580ac9af1936ee93bbba2660c1249a3,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30594,0,1,e81eac41dc729dcec40ebd4665832f8438a8120b7ca71f2ebf8d0b3df752f1a0,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30595,0,0,6aa498550452e6e0962fd2990a6e5e6c3fabf1525b07b0c0d8d4a86186d62bd0,2024-03-28T12:42:56.150000
|
||||
CVE-2024-30596,1,1,43753038bc0c6cb32f8afe83ca38303283af18f31ff0098b72eccf9d4e8ea0c7,2024-03-28T13:15:48.063000
|
||||
CVE-2024-30606,1,1,dfd803ea1066cf172a4052f2a7c89b2bd278c40a080580e0501fda9a343989b4,2024-03-28T14:15:15.480000
|
||||
CVE-2024-30607,1,1,87d7e602d72e1b362abff8f8c3bb280cddb9ea39946314134ccd5009ef5f6586,2024-03-28T14:15:15.530000
|
||||
CVE-2024-30596,0,1,2569c687f2940ac0d88e916cd94674c848765bf3fedcdc711fe23428698d17a4,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30597,1,1,8e8ddf7d3ddaa265c224af912aad6d13caad6e0c7c88c7526acce543e24b5edb,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30598,1,1,3a7ea9a3efa8546fd0dec3d3c6b57941058965e3f62fe86c99ed3cb5baf9cc5d,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30599,1,1,e938c961b1cb862df4fec504278e52c24332661448e062cdde8a90682e3d845d,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30600,1,1,254f25cec976db4ffcc0fa92ae085c76321dff8ce02554e5e23c55074246d930,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30601,1,1,8cbcfd4348b64670745c0a04c2b7893df4ec9010f153bdc2a346c7e363af768e,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30602,1,1,cbf7a67f765f1f53d53a177d50860c17b2506f7d2eff77157b6caf5805b96f3d,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30603,1,1,805955af0f76a6aff14d4d8657eb4617aa1abebda94861f40184bae76ff156e9,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30604,1,1,379ff116825a9c982ba26e38c8ebb37d23fed335cc024c085abb3d522f133a07,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30606,0,1,d30eafb06d1ec022e8e4fe319a9270ad8e86b26be51c841d3c4f1eb77a918df3,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30607,0,1,19ebdeee2836d102fa7844242f3af516e5bcea9289df539c7f7941939342ded1,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30612,1,1,36049a6b27beee3de405fd177d0fa174f7a08d58b111f9900a25b925f6e97e9e,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31134,1,1,f3dcd63eca4514e6339c3ec7aeb83c2b308295cdf8ae154e5d9cd1a9c2c8a369,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31135,1,1,479d4c1f65df6314842af6b85097457f245568f09c6620b6a18268f61c31c90a,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31136,1,1,59d127dfb07acd2c4587c1beda8f1deaf424906c9b7034466a77403adfd40752,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31137,1,1,449ac74d89f8a92f177d1d77ee28ed4c10488cbb05e1f09ccbde9d94a1737274,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31138,1,1,7951d56a99dbfcb87972373932c19c3399e083ef12fc541bc18f929442b04b18,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31139,1,1,cf8c25425780f1d36f604f7c3d037b16544eea3ab0908ce694956183986a8d87,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31140,1,1,a7e2204480cd3644823842970dd746ee5c020bc95b54375f7cfa679b79796cd1,2024-03-28T16:07:30.893000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user