Auto-Update: 2024-03-28T17:00:37.993611+00:00

This commit is contained in:
cad-safe-bot 2024-03-28 17:03:27 +00:00
parent 3861497fb5
commit 57e8a8f911
65 changed files with 1767 additions and 139 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-8822",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-03-20T17:29:00.423",
"lastModified": "2023-11-07T03:01:30.420",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-03-28T16:08:31.410",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -85,8 +85,58 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.15.11",
"matchCriteriaId": "8597EB3B-58A3-4950-9663-BB64895BDE67"
"versionStartIncluding": "2.6.12",
"versionEndExcluding": "3.2.102",
"matchCriteriaId": "9002FDD9-8A8C-4E06-8DE5-7CF6C79B117A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.3",
"versionEndExcluding": "3.16.57",
"matchCriteriaId": "0786B96E-E04C-4D2B-B358-CCE006BAED46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.17",
"versionEndExcluding": "3.18.103",
"matchCriteriaId": "F9906D89-2D98-4380-9A65-798B12332FC9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.19",
"versionEndExcluding": "4.1.52",
"matchCriteriaId": "DC20C495-C297-4CEE-9034-4FE81754FE98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2",
"versionEndExcluding": "4.4.125",
"matchCriteriaId": "BB766B8A-0C15-4949-BC7E-C624A8FB122A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "4.9.91",
"matchCriteriaId": "086C29F5-DF5E-43B2-8E7D-EBA453B571D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.31",
"matchCriteriaId": "9E6E5A35-1967-44F6-9D8F-83A08D60DB2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.15.14",
"matchCriteriaId": "A8ED8E8A-0A8C-4F47-9BFF-69DB613F2C35"
},
{
"vulnerable": true,
@ -281,7 +331,11 @@
},
{
"url": "https://www.mail-archive.com/netdev%40vger.kernel.org/msg223373.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-29162",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-14T14:15:49.777",
"lastModified": "2024-02-14T15:01:51.137",
"lastModified": "2024-03-28T16:15:07.657",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper buffer restrictions in some Intel(R) C++ Compiler Classic before version 2021.8 may allow authenticated user to potentially enable escalation of privilege via local access."
"value": "Improper buffer restrictions the Intel(R) C++ Compiler Classic before version 2021.8 for Intel(R) oneAPI Toolkits before version 2022.3.1 may allow a privileged user to potentially enable escalation of privilege via local access.\n\n"
},
{
"lang": "es",
"value": "Las restricciones inadecuadas del b\u00fafer en algunos compiladores Intel(R) C++ Classic anteriores a la versi\u00f3n 2021.8 pueden permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
}
],
"metrics": {
@ -34,18 +38,6 @@
}
]
},
"weaknesses": [
{
"source": "secure@intel.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-92"
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00988.html",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-35121",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-14T14:16:00.123",
"lastModified": "2024-02-14T15:01:46.050",
"lastModified": "2024-03-28T15:15:45.453",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper access control in some Intel(R) oneAPI DPC++/C++ Compiler software before version 2023.2.1 may allow authenticated user to potentially enable escalation of privilege via local access."
"value": "Improper access control in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.2.1 for some Intel(R) oneAPI Toolkits before version 2022.3.1 may allow authenticated user to potentially enable escalation of privilege via local access.\n\n"
},
{
"lang": "es",
"value": "El control de acceso inadecuado en algunos software del compilador Intel(R) oneAPI DPC++/C++ anterior a la versi\u00f3n 2023.2.1 puede permitir que el usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
}
],
"metrics": {
@ -34,18 +38,6 @@
}
]
},
"weaknesses": [
{
"source": "secure@intel.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00988.html",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-40390",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-28T16:15:07.773",
"lastModified": "2024-03-28T16:15:07.773",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A privacy issue was addressed by moving sensitive data to a protected location. This issue is fixed in macOS Sonoma 14.2. An app may be able to access user-sensitive data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214036",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-42892",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-28T16:15:07.843",
"lastModified": "2024-03-28T16:15:07.843",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.6.3, macOS Sonoma 14.2, macOS Monterey 12.7.2. A local attacker may be able to elevate their privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214036",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214037",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214038",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2023-42893",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-28T16:15:07.903",
"lastModified": "2024-03-28T16:15:07.903",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed by removing vulnerable code and adding additional checks. This issue is fixed in macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.2 and iPadOS 17.2, iOS 16.7.3 and iPadOS 16.7.3, tvOS 17.2, watchOS 10.2, macOS Sonoma 14.2. An app may be able to access protected user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214034",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214035",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214036",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214037",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214038",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214040",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214041",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-42896",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-28T16:15:07.970",
"lastModified": "2024-03-28T16:15:07.970",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was addressed with improved handling of temporary files. This issue is fixed in macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.2 and iPadOS 17.2, iOS 16.7.3 and iPadOS 16.7.3, macOS Sonoma 14.2. An app may be able to modify protected parts of the file system."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214034",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214035",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214036",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214037",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214038",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42913",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-28T16:15:08.023",
"lastModified": "2024-03-28T16:15:08.023",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed through improved state management. This issue is fixed in macOS Sonoma 14.2. Remote Login sessions may be able to obtain full disk access permissions."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214036",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-42930",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-28T16:15:08.090",
"lastModified": "2024-03-28T16:15:08.090",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.6.3, macOS Sonoma 14.2, macOS Monterey 12.7.2. An app may be able to modify protected parts of the file system."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214036",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214037",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214038",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-42931",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-28T16:15:08.153",
"lastModified": "2024-03-28T16:15:08.153",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.6.3, macOS Sonoma 14.2, macOS Monterey 12.7.2. A process may gain admin privileges without proper authentication."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214036",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214037",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214038",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2023-42936",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-28T16:15:08.200",
"lastModified": "2024-03-28T16:15:08.200",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.2 and iPadOS 17.2, tvOS 17.2, watchOS 10.2, macOS Sonoma 14.2. An app may be able to access user-sensitive data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214035",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214036",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214037",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214038",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214040",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214041",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2023-42947",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-28T16:15:08.250",
"lastModified": "2024-03-28T16:15:08.250",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A path handling issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.2 and iPadOS 17.2, tvOS 17.2, watchOS 10.2, macOS Sonoma 14.2. An app may be able to break out of its sandbox."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214035",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214036",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214037",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214038",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214040",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214041",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-42950",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-28T16:15:08.313",
"lastModified": "2024-03-28T16:15:08.313",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A use after free issue was addressed with improved memory management. This issue is fixed in Safari 17.2, iOS 17.2 and iPadOS 17.2, tvOS 17.2, watchOS 10.2, macOS Sonoma 14.2. Processing maliciously crafted web content may lead to arbitrary code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214035",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214036",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214039",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214040",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214041",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-42956",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-28T16:15:08.377",
"lastModified": "2024-03-28T16:15:08.377",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in Safari 17.2, iOS 17.2 and iPadOS 17.2, macOS Sonoma 14.2. Processing web content may lead to a denial-of-service."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214035",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214036",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214039",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-42962",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-28T16:15:08.430",
"lastModified": "2024-03-28T16:15:08.430",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved checks This issue is fixed in iOS 17.2 and iPadOS 17.2, iOS 16.7.3 and iPadOS 16.7.3. A remote attacker may be able to cause a denial-of-service."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214034",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214035",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-42974",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-28T16:15:08.480",
"lastModified": "2024-03-28T16:15:08.480",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A race condition was addressed with improved state handling. This issue is fixed in macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.2 and iPadOS 17.2, iOS 16.7.3 and iPadOS 16.7.3, macOS Sonoma 14.2. An app may be able to execute arbitrary code with kernel privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214034",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214035",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214036",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214037",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214038",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-45705",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-03-28T15:15:45.590",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An administrative user of WebReports may perform a Server Side Request Forgery (SSRF) exploit through SMTP configuration options.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@hcl.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0111972",
"source": "psirt@hcl.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-45706",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-03-28T15:15:45.797",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An administrative user of WebReports may perform a Cross Site Scripting (XSS) and/or Man in the Middle (MITM) exploit through SAML configuration.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@hcl.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.0,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.5,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0111972",
"source": "psirt@hcl.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-45715",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-03-28T15:15:45.983",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The console may experience a service interruption when processing file names with invalid characters.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@hcl.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0111972",
"source": "psirt@hcl.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6437",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-03-28T14:15:13.600",
"lastModified": "2024-03-28T14:15:13.600",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-0259",
"sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
"published": "2024-03-28T15:15:46.180",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Fortra's Robot Schedule Enterprise Agent for Windows prior to version 3.04 is susceptible to privilege escalation. A low-privileged user can overwrite the service executable. When the service is restarted, the replaced binary runs with local system privileges, allowing a low-privileged user to gain elevated privileges.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://hstechdocs.helpsystems.com/releasenotes/Content/_ProductPages/Robot/RobotScheduleEnterprise.htm",
"source": "df4dee71-de3a-4139-9588-11b62fe6c0ff"
},
{
"url": "https://www.fortra.com/security/advisory/fi-2024-005",
"source": "df4dee71-de3a-4139-9588-11b62fe6c0ff"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27775",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2024-03-28T13:15:47.340",
"lastModified": "2024-03-28T13:15:47.340",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28109",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-28T14:15:13.863",
"lastModified": "2024-03-28T14:15:13.863",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29200",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-28T14:15:14.100",
"lastModified": "2024-03-28T14:15:14.100",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29882",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-28T14:15:14.337",
"lastModified": "2024-03-28T14:15:14.337",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29896",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-28T13:15:47.717",
"lastModified": "2024-03-28T13:15:47.717",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29897",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-28T14:15:14.557",
"lastModified": "2024-03-28T14:15:14.557",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29898",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-28T14:15:14.783",
"lastModified": "2024-03-28T14:15:14.783",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30583",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T14:15:14.997",
"lastModified": "2024-03-28T14:15:14.997",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30584",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T14:15:15.047",
"lastModified": "2024-03-28T14:15:15.047",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30585",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T14:15:15.090",
"lastModified": "2024-03-28T14:15:15.090",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30586",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T14:15:15.137",
"lastModified": "2024-03-28T14:15:15.137",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30587",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T14:15:15.183",
"lastModified": "2024-03-28T14:15:15.183",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30588",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T14:15:15.233",
"lastModified": "2024-03-28T14:15:15.233",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30589",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T14:15:15.293",
"lastModified": "2024-03-28T14:15:15.293",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30590",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T14:15:15.347",
"lastModified": "2024-03-28T14:15:15.347",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30591",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T14:15:15.390",
"lastModified": "2024-03-28T14:15:15.390",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30592",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T14:15:15.437",
"lastModified": "2024-03-28T14:15:15.437",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30593",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T13:15:47.950",
"lastModified": "2024-03-28T13:15:47.950",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30594",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T13:15:48.007",
"lastModified": "2024-03-28T13:15:48.007",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30596",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T13:15:48.063",
"lastModified": "2024-03-28T13:15:48.063",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-30597",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T15:15:46.407",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Tenda FH1203 v2.0.1.6 firmware has a stack overflow vulnerability in the security parameter of the formWifiBasicSet function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWifiBasicSet_security.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-30598",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T15:15:46.467",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Tenda FH1203 v2.0.1.6 firmware has a stack overflow vulnerability in the security_5g parameter of the formWifiBasicSet function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWifiBasicSet_security_5g.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-30599",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T15:15:46.527",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the deviceMac parameter of the addWifiMacFilter function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/addWifiMacFilter_deviceMac.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-30600",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T15:15:46.603",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the schedEndTime parameter of the setSchedWifi function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/setSchedWifi_end.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-30601",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T15:15:46.660",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the time parameter of the saveParentControlInfo function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_time.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-30602",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T15:15:46.723",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the schedStartTime parameter of the setSchedWifi function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/setSchedWifi_start.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-30603",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T15:15:46.787",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the urls parameter of the saveParentControlInfo function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_urls.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-30604",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T15:15:46.850",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the list1 parameter of the fromDhcpListClient function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromDhcpListClient_list1.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30606",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T14:15:15.480",
"lastModified": "2024-03-28T14:15:15.480",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30607",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T14:15:15.530",
"lastModified": "2024-03-28T14:15:15.530",
"vulnStatus": "Received",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-30612",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T15:15:46.907",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Tenda AC10U v15.03.06.48 has a stack overflow vulnerability in the deviceId, limitSpeed, limitSpeedUp parameter from formSetClientState function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetClientState.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3039",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-28T15:15:48.473",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Shanghai Brad Technology BladeX 3.4.0. Affected is an unknown function of the file /api/blade-user/export-user of the component API. The manipulation with the input updatexml(1,concat(0x3f,md5(123456),0x3f),1)=1 leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258426 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://spoofer.cn/bladex_sqli/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.258426",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.258426",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.301469",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3040",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-28T15:15:48.773",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in Netentsec NS-ASG Application Security Gateway 6.3. This affects an unknown part of the file /admin/list_crl_conf. The manipulation of the argument CRLId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258429 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-list_crl_conf.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.258429",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.258429",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.302340",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3041",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-28T15:15:49.027",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Netentsec NS-ASG Application Security Gateway 6.3 and classified as critical. This vulnerability affects unknown code of the file /protocol/log/listloginfo.php. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258430 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-listloginfo.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.258430",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.258430",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.302342",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3042",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-28T15:15:49.287",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Simple Subscription Website 1.0 and classified as critical. This issue affects some unknown processing of the file manage_user.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258431."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/maxmvp666/planCve/blob/main/Simple%20Subscription%20Website%20with%20Admin%20System%20manage_user.php%20has%20Sqlinjection.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.258431",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.258431",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.306119",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-31134",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-03-28T15:15:46.973",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2024.03 authenticated users without administrative permissions could register other users when self-registration was disabled"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-31135",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-03-28T15:15:47.200",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2024.03 open redirect was possible on the login page"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-31136",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-03-28T15:15:47.413",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2024.03 2FA could be bypassed by providing a special URL parameter"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1288"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-31137",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-03-28T15:15:47.640",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2024.03 reflected XSS was possible via Space connection configuration"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-31138",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-03-28T15:15:47.853",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2024.03 xSS was possible via Agent Distribution settings"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-31139",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-03-28T15:15:48.060",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2024.03 xXE was possible in the Maven build steps detector"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-31140",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-03-28T15:15:48.273",
"lastModified": "2024-03-28T16:07:30.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2024.03 server administrators could remove arbitrary files from the server by installing tools"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1288"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-28T15:00:38.745608+00:00
2024-03-28T17:00:37.993611+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-28T14:15:15.530000+00:00
2024-03-28T16:15:08.480000+00:00
```
### Last Data Feed Release
@ -33,45 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
243192
243229
```
### CVEs added in the last Commit
Recently added CVEs: `23`
Recently added CVEs: `37`
- [CVE-2023-6437](CVE-2023/CVE-2023-64xx/CVE-2023-6437.json) (`2024-03-28T14:15:13.600`)
- [CVE-2024-27775](CVE-2024/CVE-2024-277xx/CVE-2024-27775.json) (`2024-03-28T13:15:47.340`)
- [CVE-2024-28109](CVE-2024/CVE-2024-281xx/CVE-2024-28109.json) (`2024-03-28T14:15:13.863`)
- [CVE-2024-29200](CVE-2024/CVE-2024-292xx/CVE-2024-29200.json) (`2024-03-28T14:15:14.100`)
- [CVE-2024-29882](CVE-2024/CVE-2024-298xx/CVE-2024-29882.json) (`2024-03-28T14:15:14.337`)
- [CVE-2024-29896](CVE-2024/CVE-2024-298xx/CVE-2024-29896.json) (`2024-03-28T13:15:47.717`)
- [CVE-2024-29897](CVE-2024/CVE-2024-298xx/CVE-2024-29897.json) (`2024-03-28T14:15:14.557`)
- [CVE-2024-29898](CVE-2024/CVE-2024-298xx/CVE-2024-29898.json) (`2024-03-28T14:15:14.783`)
- [CVE-2024-30583](CVE-2024/CVE-2024-305xx/CVE-2024-30583.json) (`2024-03-28T14:15:14.997`)
- [CVE-2024-30584](CVE-2024/CVE-2024-305xx/CVE-2024-30584.json) (`2024-03-28T14:15:15.047`)
- [CVE-2024-30585](CVE-2024/CVE-2024-305xx/CVE-2024-30585.json) (`2024-03-28T14:15:15.090`)
- [CVE-2024-30586](CVE-2024/CVE-2024-305xx/CVE-2024-30586.json) (`2024-03-28T14:15:15.137`)
- [CVE-2024-30587](CVE-2024/CVE-2024-305xx/CVE-2024-30587.json) (`2024-03-28T14:15:15.183`)
- [CVE-2024-30588](CVE-2024/CVE-2024-305xx/CVE-2024-30588.json) (`2024-03-28T14:15:15.233`)
- [CVE-2024-30589](CVE-2024/CVE-2024-305xx/CVE-2024-30589.json) (`2024-03-28T14:15:15.293`)
- [CVE-2024-30590](CVE-2024/CVE-2024-305xx/CVE-2024-30590.json) (`2024-03-28T14:15:15.347`)
- [CVE-2024-30591](CVE-2024/CVE-2024-305xx/CVE-2024-30591.json) (`2024-03-28T14:15:15.390`)
- [CVE-2024-30592](CVE-2024/CVE-2024-305xx/CVE-2024-30592.json) (`2024-03-28T14:15:15.437`)
- [CVE-2024-30593](CVE-2024/CVE-2024-305xx/CVE-2024-30593.json) (`2024-03-28T13:15:47.950`)
- [CVE-2024-30594](CVE-2024/CVE-2024-305xx/CVE-2024-30594.json) (`2024-03-28T13:15:48.007`)
- [CVE-2024-30596](CVE-2024/CVE-2024-305xx/CVE-2024-30596.json) (`2024-03-28T13:15:48.063`)
- [CVE-2024-30606](CVE-2024/CVE-2024-306xx/CVE-2024-30606.json) (`2024-03-28T14:15:15.480`)
- [CVE-2024-30607](CVE-2024/CVE-2024-306xx/CVE-2024-30607.json) (`2024-03-28T14:15:15.530`)
- [CVE-2023-42974](CVE-2023/CVE-2023-429xx/CVE-2023-42974.json) (`2024-03-28T16:15:08.480`)
- [CVE-2023-45705](CVE-2023/CVE-2023-457xx/CVE-2023-45705.json) (`2024-03-28T15:15:45.590`)
- [CVE-2023-45706](CVE-2023/CVE-2023-457xx/CVE-2023-45706.json) (`2024-03-28T15:15:45.797`)
- [CVE-2023-45715](CVE-2023/CVE-2023-457xx/CVE-2023-45715.json) (`2024-03-28T15:15:45.983`)
- [CVE-2024-0259](CVE-2024/CVE-2024-02xx/CVE-2024-0259.json) (`2024-03-28T15:15:46.180`)
- [CVE-2024-3039](CVE-2024/CVE-2024-30xx/CVE-2024-3039.json) (`2024-03-28T15:15:48.473`)
- [CVE-2024-3040](CVE-2024/CVE-2024-30xx/CVE-2024-3040.json) (`2024-03-28T15:15:48.773`)
- [CVE-2024-3041](CVE-2024/CVE-2024-30xx/CVE-2024-3041.json) (`2024-03-28T15:15:49.027`)
- [CVE-2024-3042](CVE-2024/CVE-2024-30xx/CVE-2024-3042.json) (`2024-03-28T15:15:49.287`)
- [CVE-2024-30597](CVE-2024/CVE-2024-305xx/CVE-2024-30597.json) (`2024-03-28T15:15:46.407`)
- [CVE-2024-30598](CVE-2024/CVE-2024-305xx/CVE-2024-30598.json) (`2024-03-28T15:15:46.467`)
- [CVE-2024-30599](CVE-2024/CVE-2024-305xx/CVE-2024-30599.json) (`2024-03-28T15:15:46.527`)
- [CVE-2024-30600](CVE-2024/CVE-2024-306xx/CVE-2024-30600.json) (`2024-03-28T15:15:46.603`)
- [CVE-2024-30601](CVE-2024/CVE-2024-306xx/CVE-2024-30601.json) (`2024-03-28T15:15:46.660`)
- [CVE-2024-30602](CVE-2024/CVE-2024-306xx/CVE-2024-30602.json) (`2024-03-28T15:15:46.723`)
- [CVE-2024-30603](CVE-2024/CVE-2024-306xx/CVE-2024-30603.json) (`2024-03-28T15:15:46.787`)
- [CVE-2024-30604](CVE-2024/CVE-2024-306xx/CVE-2024-30604.json) (`2024-03-28T15:15:46.850`)
- [CVE-2024-30612](CVE-2024/CVE-2024-306xx/CVE-2024-30612.json) (`2024-03-28T15:15:46.907`)
- [CVE-2024-31134](CVE-2024/CVE-2024-311xx/CVE-2024-31134.json) (`2024-03-28T15:15:46.973`)
- [CVE-2024-31135](CVE-2024/CVE-2024-311xx/CVE-2024-31135.json) (`2024-03-28T15:15:47.200`)
- [CVE-2024-31136](CVE-2024/CVE-2024-311xx/CVE-2024-31136.json) (`2024-03-28T15:15:47.413`)
- [CVE-2024-31137](CVE-2024/CVE-2024-311xx/CVE-2024-31137.json) (`2024-03-28T15:15:47.640`)
- [CVE-2024-31138](CVE-2024/CVE-2024-311xx/CVE-2024-31138.json) (`2024-03-28T15:15:47.853`)
- [CVE-2024-31139](CVE-2024/CVE-2024-311xx/CVE-2024-31139.json) (`2024-03-28T15:15:48.060`)
- [CVE-2024-31140](CVE-2024/CVE-2024-311xx/CVE-2024-31140.json) (`2024-03-28T15:15:48.273`)
### CVEs modified in the last Commit
Recently modified CVEs: `3`
Recently modified CVEs: `26`
- [CVE-2013-4558](CVE-2013/CVE-2013-45xx/CVE-2013-4558.json) (`2024-03-28T14:15:13.023`)
- [CVE-2023-47038](CVE-2023/CVE-2023-470xx/CVE-2023-47038.json) (`2024-03-28T14:15:13.310`)
- [CVE-2023-47039](CVE-2023/CVE-2023-470xx/CVE-2023-47039.json) (`2024-03-28T14:15:13.467`)
- [CVE-2023-29162](CVE-2023/CVE-2023-291xx/CVE-2023-29162.json) (`2024-03-28T16:15:07.657`)
- [CVE-2023-35121](CVE-2023/CVE-2023-351xx/CVE-2023-35121.json) (`2024-03-28T15:15:45.453`)
- [CVE-2023-6437](CVE-2023/CVE-2023-64xx/CVE-2023-6437.json) (`2024-03-28T16:07:30.893`)
- [CVE-2024-27775](CVE-2024/CVE-2024-277xx/CVE-2024-27775.json) (`2024-03-28T16:07:30.893`)
- [CVE-2024-28109](CVE-2024/CVE-2024-281xx/CVE-2024-28109.json) (`2024-03-28T16:07:30.893`)
- [CVE-2024-29200](CVE-2024/CVE-2024-292xx/CVE-2024-29200.json) (`2024-03-28T16:07:30.893`)
- [CVE-2024-29882](CVE-2024/CVE-2024-298xx/CVE-2024-29882.json) (`2024-03-28T16:07:30.893`)
- [CVE-2024-29896](CVE-2024/CVE-2024-298xx/CVE-2024-29896.json) (`2024-03-28T16:07:30.893`)
- [CVE-2024-29897](CVE-2024/CVE-2024-298xx/CVE-2024-29897.json) (`2024-03-28T16:07:30.893`)
- [CVE-2024-29898](CVE-2024/CVE-2024-298xx/CVE-2024-29898.json) (`2024-03-28T16:07:30.893`)
- [CVE-2024-30583](CVE-2024/CVE-2024-305xx/CVE-2024-30583.json) (`2024-03-28T16:07:30.893`)
- [CVE-2024-30584](CVE-2024/CVE-2024-305xx/CVE-2024-30584.json) (`2024-03-28T16:07:30.893`)
- [CVE-2024-30585](CVE-2024/CVE-2024-305xx/CVE-2024-30585.json) (`2024-03-28T16:07:30.893`)
- [CVE-2024-30586](CVE-2024/CVE-2024-305xx/CVE-2024-30586.json) (`2024-03-28T16:07:30.893`)
- [CVE-2024-30587](CVE-2024/CVE-2024-305xx/CVE-2024-30587.json) (`2024-03-28T16:07:30.893`)
- [CVE-2024-30588](CVE-2024/CVE-2024-305xx/CVE-2024-30588.json) (`2024-03-28T16:07:30.893`)
- [CVE-2024-30589](CVE-2024/CVE-2024-305xx/CVE-2024-30589.json) (`2024-03-28T16:07:30.893`)
- [CVE-2024-30590](CVE-2024/CVE-2024-305xx/CVE-2024-30590.json) (`2024-03-28T16:07:30.893`)
- [CVE-2024-30591](CVE-2024/CVE-2024-305xx/CVE-2024-30591.json) (`2024-03-28T16:07:30.893`)
- [CVE-2024-30592](CVE-2024/CVE-2024-305xx/CVE-2024-30592.json) (`2024-03-28T16:07:30.893`)
- [CVE-2024-30593](CVE-2024/CVE-2024-305xx/CVE-2024-30593.json) (`2024-03-28T16:07:30.893`)
- [CVE-2024-30594](CVE-2024/CVE-2024-305xx/CVE-2024-30594.json) (`2024-03-28T16:07:30.893`)
- [CVE-2024-30596](CVE-2024/CVE-2024-305xx/CVE-2024-30596.json) (`2024-03-28T16:07:30.893`)
- [CVE-2024-30606](CVE-2024/CVE-2024-306xx/CVE-2024-30606.json) (`2024-03-28T16:07:30.893`)
- [CVE-2024-30607](CVE-2024/CVE-2024-306xx/CVE-2024-30607.json) (`2024-03-28T16:07:30.893`)
## Download and Usage

View File

@ -61932,7 +61932,7 @@ CVE-2013-4554,0,0,bbab516aa5e7a550eebfd7ce02c1c282b2d508192c05dd9298cba536b50101
CVE-2013-4555,0,0,668aef73396036110ec0cef3914cbf29adbbc51c39d71f48854d17e4fe86fb55,2016-12-08T03:03:38.963000
CVE-2013-4556,0,0,204723cb215c9dd4b7db2601ac690a4bd5c30deda407608d977ffdab4ed3330b,2016-12-08T03:03:40.027000
CVE-2013-4557,0,0,bb721ddbe3c4d440ffa76214cdc869398625ad0eac7d7ed666f3d9f00f31e702,2016-12-08T03:03:41.353000
CVE-2013-4558,0,1,10860f542629e29c0dbabd986f5e7bab016977e3d75f0b1042f30be9d7cc2f0d,2024-03-28T14:15:13.023000
CVE-2013-4558,0,0,10860f542629e29c0dbabd986f5e7bab016977e3d75f0b1042f30be9d7cc2f0d,2024-03-28T14:15:13.023000
CVE-2013-4559,0,0,0d6d5c0b62d1252c9734ea49ce47a69e5c683a969324320af84ba514ed6c2706,2021-02-26T15:14:05.913000
CVE-2013-4560,0,0,d5cd2715ab5c4be24d372c66de2dbdf979f6ea6ec3dd2deffd5de26bddb2ba56,2021-03-04T20:12:22.093000
CVE-2013-4561,0,0,57716a9acbe975f52927d1a6e812b2d9d559f7b335849fabbfcb59bff1d4eca1,2022-07-11T17:41:59.077000
@ -126441,7 +126441,7 @@ CVE-2018-8817,0,0,297fddc21d6fa42179bd71e88af4eb44611960639cc3a1de055acd8a7e4b25
CVE-2018-8819,0,0,2971a9bdccb45a4daba3cc05bab4cbfd0f807867779e3d7861b87d5b3f9f550f,2021-07-27T19:25:54.587000
CVE-2018-8820,0,0,5dd8123958ee4479b9544a2695ce0f8ba28aa3f69a29744255a0f532b698677d,2018-04-23T13:03:57.053000
CVE-2018-8821,0,0,22b7847ce7def24a65c494acb9698397f36b421e4cc30204fafdb32b330cba56,2018-10-17T17:12:14.487000
CVE-2018-8822,0,0,fc642e1948a2a71a821a15d37b1bd222567263828408b9ccc5be4e0a2d11a3dc,2023-11-07T03:01:30.420000
CVE-2018-8822,0,1,f0701efffeb3d8341ee93c6a6343411ae5a032a7876def5e5e59efb2587a39d6,2024-03-28T16:08:31.410000
CVE-2018-8823,0,0,cade7e0ab27d18823afc3990f16da976b81081ab95be44c6e4ece0702b9f6564,2018-04-24T12:54:53.840000
CVE-2018-8824,0,0,d2db6a4430a7c7b1a757abc3efb8d8f9e71a49a81699250898b36ee056b554b1,2018-06-13T12:50:31.863000
CVE-2018-8825,0,0,e6ed0fa8ba30fc40fa56ed6a5a8bcd704e7670201148920f2d13a614bc6e4431,2019-04-25T15:05:08.410000
@ -220854,7 +220854,7 @@ CVE-2023-29159,0,0,3530aeb323cc6b274b9fbf00886d84d85a8664196228c99c668412dcb4da2
CVE-2023-2916,0,0,91bb6a6a4feffa7671e9beb6a5a4b79a5e6aab4e671c0677a43f134a14592d7f,2023-11-07T04:13:32.660000
CVE-2023-29160,0,0,8d762a8bda12c63159a8f102e32920c3dafc59836188f2c0c0f98c6370c1f22d,2023-06-21T18:57:51.187000
CVE-2023-29161,0,0,c62935c727903372e1dcc762cd9261a190231ebb89c3972da743594de4efbb59,2023-11-21T01:59:16.600000
CVE-2023-29162,0,0,f57f1fed8154893ee9acd062fd888003ccc81d4f771e20708cc6863971320eae,2024-02-14T15:01:51.137000
CVE-2023-29162,0,1,743ca69a30b7a19aa26a5ded83f1c2fb350d5181b45d75f048e7be4d2d452c68,2024-03-28T16:15:07.657000
CVE-2023-29163,0,0,3d6ed3c9ec134bb0e0a6fa27ad6822836d432cefde306db8b29cc039802a0f95,2023-05-10T18:47:29.897000
CVE-2023-29165,0,0,54258be05c2c70612fce26e841441395eba8358d9896577407b4743b56c7dd47,2023-11-30T02:19:41.003000
CVE-2023-29166,0,0,e0cf60a56c61b0baa05989268e1074ef73353fbe443e5381d6d2a68e7c6e8901,2023-09-08T15:44:32.397000
@ -225064,7 +225064,7 @@ CVE-2023-35110,0,0,6c46b92039a347d6b65042ab739d78be945b3320df2f8079905d3703dca6a
CVE-2023-35116,0,0,f76c81cc5cb5e3c4a74e52501480ae0572c4d7b01e66ada562d4030823c55fd3,2024-03-21T02:47:55.440000
CVE-2023-3512,0,0,46069bca6a2a9235e9558d2eb33faec2498fe8f2dff26081a19acf558edc1def,2023-10-05T17:04:39.053000
CVE-2023-35120,0,0,b5ead04261c0831b10c7100bbfb912d1f4ffac784f89b136f0369f049a9d5485,2023-07-13T22:50:44.740000
CVE-2023-35121,0,0,55dd92f416ad91d5e95cf6179c593af4578bf74794def53546aaf74f70f047ea,2024-02-14T15:01:46.050000
CVE-2023-35121,0,1,658412d32bae0f13ceea6a575a15ba5fb0e139437d99f76b128fe1745a942dd1,2024-03-28T15:15:45.453000
CVE-2023-35124,0,0,9073e57a452fb41225dae20c634f4517700dcc89e0ef010a593ba5e1961f8505,2023-09-08T17:28:28.417000
CVE-2023-35126,0,0,97f0154eb5275146dbfc2ffbbae614c0d14ef1944447f84a1e8624649a99eb12,2023-10-25T14:48:30.890000
CVE-2023-35127,0,0,4e70fc11d19f5b80d804e1144229095caa26940cbb99aa03fa172591d7878ea1,2023-11-30T17:24:26.147000
@ -228721,6 +228721,7 @@ CVE-2023-40385,0,0,d87186e65fbe11c963d9f2ac49a37bea6de8f4a87feb525e072522d577fee
CVE-2023-40386,0,0,98b5b9164e51a67fec2b119151c92fd2d9bb1d8d51de82443b681e79ce2c9a34,2023-10-12T01:59:56.563000
CVE-2023-40388,0,0,0669c38434b1494ed261fd2860ebba321deabd42233fd11611759d0565888e20,2023-10-12T01:59:05.793000
CVE-2023-4039,0,0,0accd3adc8756cc7a927b7c908e91237d32e08c68f471a1067012290c829eea2,2024-02-19T23:15:07.680000
CVE-2023-40390,1,1,e18c91ac234234bac8ee50fda94885373a01c59b413ad7540ec6153df61ac1ff,2024-03-28T16:15:07.773000
CVE-2023-40391,0,0,674710606efc5e20f3b4d034fd6151d2f994f0410f8a773be4faafb0e10f357d,2023-11-07T04:20:12.943000
CVE-2023-40392,0,0,84bd7104c6189c2c6e9b4ab3e6ad9d972f95c392c1e5bd1a44d7d7f201861784,2023-12-22T15:18:01.370000
CVE-2023-40393,0,0,4bc719fe5b2c101665c569bf2c331dc4a53294b75d2f5d545fba8e39b8e680a7,2024-01-17T18:30:39.897000
@ -230346,7 +230347,10 @@ CVE-2023-42889,0,0,42361d7a844de9570556985cb5c26fe399cae2c49e9ac17e150405bc9bd14
CVE-2023-4289,0,0,f449244f705f291b0d7ddbc329d46d68ae72f3f405646fb1709b45473269b907,2023-11-07T04:22:25.410000
CVE-2023-42890,0,0,eacabcc2a4af39632e6d4228761680fb329094370499894080f37a6035d56207,2024-02-02T03:11:18.417000
CVE-2023-42891,0,0,7846fe25f210e0b0608521c50c1b1f15957f2513ef89a3c83e589c7bed8db2b2,2023-12-13T17:46:10.560000
CVE-2023-42892,1,1,b7c4592fa05996f6346f24cbe4a9ca6f36a1f628133e1c4ae7e546ab9f1a758d,2024-03-28T16:15:07.843000
CVE-2023-42893,1,1,94280ad2f20deddf83a75f34e124496389675f68f69eafa676a6dcab0d88c83a,2024-03-28T16:15:07.903000
CVE-2023-42894,0,0,675f93d1b0d4296c714bb851c1c8cebe1d109e20fbe5c2802462dd05c7607dcc,2024-02-02T03:11:25.083000
CVE-2023-42896,1,1,23f534f3866e78796cc0880285efe3bbd83f40fc182d7ca46bb35d6115ba298e,2024-03-28T16:15:07.970000
CVE-2023-42897,0,0,b9f50f6e7bf2b37ee8bcc879a04d31e42b1e46ab101c921014af1dae5762efc0,2023-12-13T20:57:23.147000
CVE-2023-42898,0,0,dcd63d2da25631e7b1de0a508c17683086fe149cd68524397b9248e14b5c0a13,2023-12-13T23:15:29.030000
CVE-2023-42899,0,0,a3799d4a021bbd53e7e95b764e09f7a56ae66d67b39322f34aee128999f61553,2023-12-14T14:07:42.957000
@ -230365,6 +230369,7 @@ CVE-2023-4291,0,0,820c0ef5909fcefa01c2a721d589920b63994852e7a069d42cd163e7b56171
CVE-2023-42910,0,0,71a54e7b7fb5706098fa51027de526083f12c7f45c9c197df68e4ac606502e93,2023-12-13T19:14:00.170000
CVE-2023-42911,0,0,867b92b373d754d783128b4f56f24fc6b647c44603b483046d9505c18745d73b,2023-12-13T19:12:48.780000
CVE-2023-42912,0,0,c098e394dc0a67e07f9df04c549c33226f6d9ce3b3c9000a8422b2e740c1e1ce,2023-12-13T19:20:21.287000
CVE-2023-42913,1,1,1705d34bff4d62f3aa81940b5bd1a2136fc486b2d04239bab25876cdc8426435,2024-03-28T16:15:08.023000
CVE-2023-42914,0,0,d136deea7639edb129a4f43389dd9bd60f947fe20e61b8abbaafea8d30a38f33,2023-12-14T14:54:10.347000
CVE-2023-42915,0,0,1be85ce6fa0cfc0bf8e379977bec0d27fb6c9ccbc4c64c6fe4121e3a8a02c76e,2024-02-14T03:15:13.210000
CVE-2023-42916,0,0,1069f61a27a7fa77970bbb0175ce8643cfc992d30189fcf5adedb4c6bed028c3,2024-01-26T17:15:10.007000
@ -230380,10 +230385,13 @@ CVE-2023-42927,0,0,c9a9ed650bc0549f85d7705bd9d3466edcaeed91950814aa06162a7b15f57
CVE-2023-42928,0,0,4d575fc7bee0ddbdac6cb470d5d7d4a1a9c0adf90a31f047e6f305ee0485dd5a,2024-02-22T19:07:27.197000
CVE-2023-42929,0,0,eb3f00ec709ba2f7760fb72343fbc272118a213ac02cb710d8fda7bd7caee235,2024-01-12T14:42:35.277000
CVE-2023-4293,0,0,1d2ed52d59da409192b197524a27c7d014bb0b1abf5d88d5a31553547b2ae6e6,2023-11-07T04:22:25.750000
CVE-2023-42930,1,1,f9f47861462e626db83bf0dffe814333448c9b9460975b2f5e2c448052191c4f,2024-03-28T16:15:08.090000
CVE-2023-42931,1,1,ff51729569e9de3d56d9f0e3498681bfc941dbb93638a83bacabe47683289553,2024-03-28T16:15:08.153000
CVE-2023-42932,0,0,d72ebc99606ff88b5196fb92ba085a234d9bb36deaf43aae627023bac3f8f5fa,2023-12-13T21:15:31.733000
CVE-2023-42933,0,0,4515d35610e674bb40f9ac6898c27078c01d4ce90705902554e59c696decfa5a,2024-01-12T14:42:31.583000
CVE-2023-42934,0,0,9bbd832bbd99920d5b4e7783d7815e5b4e4bfb6335bc1932425966a175c8c3cb,2024-01-16T23:52:48.783000
CVE-2023-42935,0,0,606ee85ca40462fb734cd978403d80127f0d12edae5212a236ef5fd51294018c,2024-01-29T18:38:29.587000
CVE-2023-42936,1,1,1db32558db6660253e6ae3ca3ea32ceddfd608c7422ab9151211e015e4f21ab5,2024-03-28T16:15:08.200000
CVE-2023-42937,0,0,c2539e1b6a362c132317285010348324c513a5269588c97c8989267a27c3c96b,2024-01-29T18:33:19.387000
CVE-2023-42938,0,0,462788774e20545d65b9d3f478cd23a7f498f5f04c53cff4fca3aa9542319994,2024-03-14T20:15:07.040000
CVE-2023-42939,0,0,4b0304a240b255af54a2d16f83934322490b0bc4310fde824596ed206eb1503c,2024-02-22T19:07:27.197000
@ -230393,13 +230401,18 @@ CVE-2023-42941,0,0,be8c2f55cce80031919c17cdf6118cd30bd6c8016a8d2c844474b450e95b7
CVE-2023-42942,0,0,07ba94131ee2af175813b684a3418fba2b1cb10f8bf4794024c3c777fccf87a6,2024-02-22T19:07:27.197000
CVE-2023-42945,0,0,8965ecb696fbb6d1dfc191b5b241cb2dbad9c4594ab7548615100be2688c334d,2024-02-22T19:07:27.197000
CVE-2023-42946,0,0,6e687d6a54184ed98b48ec9994a691a9f653d38c2a6ab147b69be8a3c35af011,2024-02-22T19:07:27.197000
CVE-2023-42947,1,1,c4bcb78a9a73b67b24adaec721354e27621da16c3a123357503f8aabdc0ada9c,2024-03-28T16:15:08.250000
CVE-2023-4295,0,0,ec56fb9406b5889c47288aaf0ca0b50df9da68e8409e0f183bd2d96adf912d6b,2023-12-28T17:14:36.030000
CVE-2023-42950,1,1,c248f2a713c5108c4c2c084d01bbd8549106842819209c597ee099da10ffc9b4,2024-03-28T16:15:08.313000
CVE-2023-42951,0,0,f47d9d53b96327a99c3cf9d9b6178395ac7e4f6ffb9fc1067e40ded2ecc60fdb,2024-02-22T19:07:27.197000
CVE-2023-42952,0,0,f7dadd56b6a68a714e4e042690efb1e01d718cc903255fad9804058d56088666,2024-02-22T19:07:27.197000
CVE-2023-42953,0,0,0ea855ba33bbd4297f25ae9925400ebda739241895a723a394f07f9bd3e18595,2024-02-22T19:07:27.197000
CVE-2023-42954,0,0,4ff84847c56efbc3f637425a9807eb7b381f4c2cedb6bf16f12c3ca640d4fba3,2024-03-22T12:45:36.130000
CVE-2023-42956,1,1,1338ed64550ccd6adb9923c68f78faf628c18bb60ee8d87e550a1d7e2b2df241,2024-03-28T16:15:08.377000
CVE-2023-4296,0,0,d2ae4b9dc4bd1f62bf026bddbb5b57fabef675b1476686b487fb198d6eb084a6,2023-11-07T04:22:26.050000
CVE-2023-42962,1,1,d388850f0f3319f89ab7f64ff1ff9565fa311d37446e8f374d7ad0cf5b34da0e,2024-03-28T16:15:08.430000
CVE-2023-4297,0,0,2c1c4e8e16b8093dbd67367ad04a33c7dee7987a75a3f105a73f15afb0fc121e,2023-11-30T05:15:24.520000
CVE-2023-42974,1,1,8393c0a703ee2b0e33897e1921a49df59619119d54de7c41b02f17deeb2ee478,2024-03-28T16:15:08.480000
CVE-2023-4298,0,0,8d44cb3045014d8716e0dbcd1489dfd2b845690c0f9918da8a0ecf5aeaadb4f7,2023-11-07T04:22:26.147000
CVE-2023-4299,0,0,d299dee9e9e09a75920752d626eddd98b20a641756e2cb4231c35d64b6040ce2,2023-09-06T20:13:32.917000
CVE-2023-4300,0,0,f62dc368b46b9404d8645d11cb5b2bfc1bd54a409b445b1d76533aa142e1aefa,2023-11-07T04:22:26.350000
@ -231954,7 +231967,10 @@ CVE-2023-45700,0,0,52e392d90576964820ffa552cbf503545fe1df48543ea52f5f404cef046e1
CVE-2023-45701,0,0,4c15012e1d51ec39f5feb89c87578a81573faeafac8042c349d979cdd1101145,2024-01-04T20:25:30.933000
CVE-2023-45702,0,0,82ce4409940218ec08fecc4ed05a8e24983c4d04841dd1b013b28319a780c3b0,2024-01-04T20:14:34.343000
CVE-2023-45703,0,0,dea19aa7d6a8a6afd2ee4037f85223b782d0f4c3a590d34c9d227990e4e23cff,2024-01-02T16:18:39.287000
CVE-2023-45705,1,1,d23d43767e7189e1ef994a1336b8af2f70207dbd8fb0b88c4292061566472e43,2024-03-28T16:07:30.893000
CVE-2023-45706,1,1,0af7bc7c8de7e9189f51b43b9ec4a80f653024128db7b6b665bdbde7eafed6fd,2024-03-28T16:07:30.893000
CVE-2023-4571,0,0,4543f43b5b806b7ab0b407fab2a9976430e8638413c248a7ed786869bace6996,2024-02-16T15:56:59.350000
CVE-2023-45715,1,1,50b8f6532a40dad28413df591023a26e3e5b087932dba29d48cc5a1c57b86496,2024-03-28T16:07:30.893000
CVE-2023-45716,0,0,0a00a1625e10fd10c315dd94d684f341e834c086570f2f1b11bcfdbaa4c3a720,2024-02-26T21:22:54.537000
CVE-2023-45718,0,0,71dc0819c79bc4f634af5fc4a33e73e03a4350f0ee57c5cc8392683d3aee2df0,2024-02-11T22:29:15.837000
CVE-2023-4572,0,0,1f54579490b8fcc0cce08f781af19b969e5114ab6ccc87ec2998be324173b104,2024-01-31T17:15:16.437000
@ -232891,8 +232907,8 @@ CVE-2023-47033,0,0,9f64afaaad6656e35f51a7e5c20ba55e9da6ae915e60dc5ef4045963b8f11
CVE-2023-47034,0,0,5e669df5a7ad32eb8b097886efddff48819f84fb4b955cc5aca9e920a6102637,2024-01-30T16:48:28.163000
CVE-2023-47035,0,0,770b2e98d600ebf26f2028e8928b35898574cd25900dfff88aadc984966168b6,2024-01-30T14:46:19.023000
CVE-2023-47037,0,0,41a8074073da30fee421b63710b020a304c67d01acb6cb001f13ad89df88a01d,2023-11-20T19:31:24.707000
CVE-2023-47038,0,1,c7b4366edd0f1d49522736dc3630add75bced8a997cc470d2143d96df0856b14,2024-03-28T14:15:13.310000
CVE-2023-47039,0,1,437d789d3a627731735caace9623309c9997b0d4bbe85d9712e8d1e5008fe7f0,2024-03-28T14:15:13.467000
CVE-2023-47038,0,0,c7b4366edd0f1d49522736dc3630add75bced8a997cc470d2143d96df0856b14,2024-03-28T14:15:13.310000
CVE-2023-47039,0,0,437d789d3a627731735caace9623309c9997b0d4bbe85d9712e8d1e5008fe7f0,2024-03-28T14:15:13.467000
CVE-2023-4704,0,0,77ebf42b59920524121a8b02a25671c48b0f1350a3a8f8e2939f2392f9e7437a,2023-09-07T17:36:22.737000
CVE-2023-47040,0,0,6322864e829babbb65f45703f53197ba4d7f038dfd8500f6b071b64d87a2c81c,2023-11-22T15:19:16.977000
CVE-2023-47041,0,0,0d98c37438ebfb3a525e52b4e9abb4b52abb56b45e2fe2da422b09a566f0e9a4,2023-11-22T15:19:08.407000
@ -237299,7 +237315,7 @@ CVE-2023-6433,0,0,0242e6d4de0a12c4774282886b58eedeb17d73e3db75f77593dc21ff1bd0a1
CVE-2023-6434,0,0,9f35d2af1c67b934d28d1bc4b998a61a5a5be9bedef49a9a9e04db7f4c260358,2023-12-02T04:37:56.790000
CVE-2023-6435,0,0,4505ba10fcc8aa6b8ff0c0716deec9c72a837bf913de36c614dc0992acd9599a,2023-12-02T04:37:54.727000
CVE-2023-6436,0,0,75eb96dbffde560c8577d4e38af8f94e4d2ad1618e885a11eba0c0c2420c59cc,2024-01-08T19:40:27.743000
CVE-2023-6437,1,1,68604463d26259635a3027bab30da732c4fec13b193e58a7eb4d5a25d03f395e,2024-03-28T14:15:13.600000
CVE-2023-6437,0,1,fc7b7ef120c1cd74068344e1742d8125095e6e5378c129cf5ee180a60aac63f8,2024-03-28T16:07:30.893000
CVE-2023-6438,0,0,6e298808843bf5b7095c9c9c0ac99fa07dda226b820b821799b1942a288243fe,2024-03-21T02:50:36.630000
CVE-2023-6439,0,0,34fec7b01443ba1f65bae9722432800576490571288914b58a6027dfc6998c41,2024-03-21T02:50:36.733000
CVE-2023-6440,0,0,41f9bd837c0c4f9bfac9f0eda9f132ad965a1f73e00124290fda773307f7f5b0,2024-03-21T02:50:36.823000
@ -238060,6 +238076,7 @@ CVE-2024-0254,0,0,e5eae8b11bfbdda0720ecba88e72e29efdd7b42117ba1a4582cfd62b02acbd
CVE-2024-0255,0,0,541867be2e415931a41832092b931a9f6ed85b86ce138a5f77d6aa8f5909e5ad,2024-02-07T23:31:10.567000
CVE-2024-0256,0,0,49de163342e5ba45f12c2cbfe0a11fce418d24b9f8f242901a15605875a38ffa,2024-02-14T19:17:28.387000
CVE-2024-0258,0,0,da926b444685fcbac9be2b2403a8d6738d09992d6c11f2b5b1d93a114519bfef,2024-03-13T22:15:08.970000
CVE-2024-0259,1,1,81c286a300947c75bec1d2c83f224330c6c85d9501b7f6f61b4ee09cf52b92ab,2024-03-28T16:07:30.893000
CVE-2024-0260,0,0,2779dbdedaac297e872da9c4df94fb4f41548ecabca4e84dd2cb7a84b44ae4c4,2024-03-21T02:51:03.110000
CVE-2024-0261,0,0,c7ebebf9ba9dbc5389c04e823357440854b7688f8b5aa275c4c69ab35df44c81,2024-03-21T02:51:03.190000
CVE-2024-0262,0,0,cfeabed15067ff1fb4d3b57dc6829768d130e7f8cef2d663a7958b8c4721a024,2024-03-21T02:51:03.270000
@ -242416,7 +242433,7 @@ CVE-2024-27771,0,0,0aee7dce542e3846fc61fcb0b334acd3d3866184b33df64f8377358b3bfec
CVE-2024-27772,0,0,a17826d9a0874c3f3ffc19dd6a14e32a35c360a62820ef43132537b66b4def32,2024-03-18T19:40:00.173000
CVE-2024-27773,0,0,2024b60af24687a3b3ee666dada367802136074a0282a48cfcb9d5e3649d7c7f,2024-03-18T19:40:00.173000
CVE-2024-27774,0,0,faaf7adce2033b4161afd1d606bbef075c5b779f6cc928fc6a617e115b9369f0,2024-03-18T19:40:00.173000
CVE-2024-27775,1,1,8944a7eae79c04f73db7ba8431c2c0de7fdefc9147e8673700dac0096e36cb6b,2024-03-28T13:15:47.340000
CVE-2024-27775,0,1,51c4d69c962e89cdfef488f862c194d6eae5ffb312024f7f2ebc0cf2d2d00e09,2024-03-28T16:07:30.893000
CVE-2024-2778,0,0,606da7002eecf8b4a69d2bd07186555e4fbaaa2eba41bedbde660e768d517807,2024-03-22T12:45:36.130000
CVE-2024-2779,0,0,a46cbcced54f990ec3ab00dcc310828877345eeeff0a3332adcf6734f8a63516,2024-03-22T12:45:36.130000
CVE-2024-2780,0,0,bdcceeee0c00953c03148d72ca9c4da28e2649db6e5c4d572065a841b8ee9aa9,2024-03-22T12:45:36.130000
@ -242528,7 +242545,7 @@ CVE-2024-28105,0,0,fcc764ac1e5fa24a7cdc91807ca008992de501a32669f46e1eff534ca8e7d
CVE-2024-28106,0,0,a89dc0ca5c060b8348ae8f0c0d823137664e9265682cb4445ed694e0c7db5aff,2024-03-26T12:55:05.010000
CVE-2024-28107,0,0,67b11d5219b0b9f786e274d36c6219cc6a62e589b1f556fced90abc2232753f8,2024-03-26T12:55:05.010000
CVE-2024-28108,0,0,1751fd9e7c1a575d99388404f19dbe254b5bb178f28831b3f691526133af985d,2024-03-26T12:55:05.010000
CVE-2024-28109,1,1,574d5d4fd2d839d54da9223314064889394f80fe42444ea1f5ff94b12b2367b4,2024-03-28T14:15:13.863000
CVE-2024-28109,0,1,d30f3230bb606227658d0f277b6bad62648a2e7e9f7feb695a5057cfb1ffca7e,2024-03-28T16:07:30.893000
CVE-2024-2811,0,0,cd6568d4253dfb36f9b79c1a6cefb0971039231a0ac66a212abf5e2fb6a72887,2024-03-26T03:14:03.240000
CVE-2024-28110,0,0,0aa63c709bee34101fee09332c67840fa8b7d5aea01ed58b7f238cd7f26f2f87,2024-03-07T13:52:27.110000
CVE-2024-28111,0,0,ef109000cb681b8950a504435d888106cd334990070bd9ca1f33bba165c1974a,2024-03-07T13:52:27.110000
@ -242894,7 +242911,7 @@ CVE-2024-29195,0,0,12b6fcead703f320c2faaa3dbf933701901e834c51cbd479cd70a3447afc3
CVE-2024-29196,0,0,e02aa4919ed0d6b8af5e1fbc5257465a64fdae2f23d9b9aaabfbc3da2c0d39fa,2024-03-26T12:55:05.010000
CVE-2024-29197,0,0,48cfe2d0e00e1d6e9f018548b8b920adc8f1c35c8c8d2a08e4bc3b3e003f90af,2024-03-26T17:09:53.043000
CVE-2024-29199,0,0,78313b772930e0d3c119e70c910c05a3509fc574028745b1b9c80a0f992c34f5,2024-03-26T12:55:05.010000
CVE-2024-29200,1,1,64cc3f0d0f34f9302b722a3cebee5577a4cf54e0fe4ac2f4b6db379a488c19d3,2024-03-28T14:15:14.100000
CVE-2024-29200,0,1,ef9326193a74c86371ac9fbb2b6f7f9808127955b4bd7d8d0622423f8b799c06,2024-03-28T16:07:30.893000
CVE-2024-29203,0,0,85853d1d6c0b7cff8ded9ca779662219e1e7d461c7c9aed96ad32295a032c6f6,2024-03-26T17:09:53.043000
CVE-2024-2921,0,0,a7048ceb487f73059844764517da213b04f370019c5cc0c6fe2153431d1dd6cb,2024-03-26T17:09:53.043000
CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000
@ -243049,7 +243066,7 @@ CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e
CVE-2024-2988,0,0,095fa6458e008f6f7d69334248969b0501d37383db72dc8bee93560edc741f88,2024-03-28T02:01:21.693000
CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000
CVE-2024-29881,0,0,7eaff78a6eecd508372203508f2ecab97ebc62cfd94b7af6101b5d7b6ca209b2,2024-03-26T17:09:53.043000
CVE-2024-29882,1,1,dacd1d188eec04753f0fa763740af8ff42bfc4a2b784a620bad0689784c8766a,2024-03-28T14:15:14.337000
CVE-2024-29882,0,1,4165d20253960416cd183b974438d8dac4fe88260bfe5e0d52449ad6b72b673f,2024-03-28T16:07:30.893000
CVE-2024-29883,0,0,2444d321a867d6f4cdf63bf8a1bc6af3b407752f2134c1f64a1d02545242c426,2024-03-26T17:09:53.043000
CVE-2024-29886,0,0,3f88cfdb4cfb88186dd10b00ca51e7380d7eb2a0a458754ea1dfe21c4512300e,2024-03-28T02:01:21.693000
CVE-2024-29887,0,0,f387f1fcc31e0714aa90eb378be59a2d52ee246f68fe9dafd34624693c2abecd,2024-03-28T02:01:13.303000
@ -243057,9 +243074,9 @@ CVE-2024-29888,0,0,e6980a084f851bc0c8ffe0d4edac384e7194ab82af737faf570a62d329543
CVE-2024-2989,0,0,7bf7e9a03ba8c5d37e74d436f6afb4547ab8035499b1c3a92009f461628a8bf5,2024-03-28T02:01:21.693000
CVE-2024-29891,0,0,8db13a694d94d9c0ea356374520c4ec758a3562c2da8a21f831daea1cc8fa44b,2024-03-28T02:01:13.303000
CVE-2024-29892,0,0,59c6b24496fc40dcb3fc7fa651d54d9a835514ae28a8bca0877d6fdd02e37f42,2024-03-28T02:01:13.303000
CVE-2024-29896,1,1,105cbaa5e7650be199e3cc1881d3e9ee68dcfa8baf64f79a7108821cffd17c34,2024-03-28T13:15:47.717000
CVE-2024-29897,1,1,67e8706eb03989eaa5985eba7a3114a19ea44583ca18d1bd6e7b992ec3a3ff41,2024-03-28T14:15:14.557000
CVE-2024-29898,1,1,05bbed3526cdcfc5a9d1af36083d792c8435ff23df04da8e0a0a82f8bd014126,2024-03-28T14:15:14.783000
CVE-2024-29896,0,1,9a48e50ad0f2c459cff25077d20f0d1435afab76d715677e89b40a04e8f727c2,2024-03-28T16:07:30.893000
CVE-2024-29897,0,1,111bc9aedafa055633df3c49dfa610aa7a9dd3a7d49c3bf5a40bedf55347a260,2024-03-28T16:07:30.893000
CVE-2024-29898,0,1,eab054cfc704fab3df338b9c3296e7b0707c4a3ea6ce4f0e8582baf99d69e79f,2024-03-28T16:07:30.893000
CVE-2024-2990,0,0,7b8bc4275f049749984166beead5725a3bf23799e4803482e7e47aaa1bac7e25,2024-03-28T02:01:13.303000
CVE-2024-29906,0,0,5e6afa8dbe77b2ceaee29629c66d8bdf273caddf4f38f955d682aeefe9beab4c,2024-03-27T12:29:30.307000
CVE-2024-29907,0,0,95ebf1e66704307f93559559f18923b10f644f7f3c6486fedede31060b34f004,2024-03-27T12:29:30.307000
@ -243173,21 +243190,41 @@ CVE-2024-30242,0,0,b28005a560b57a7a7ae9969109e7f870b899e43349d9d677c38181c99febc
CVE-2024-30243,0,0,dce2f0605d44bfa3b81cf0e14bdfd0fae98270908d0c04fcccbda1832d2d9684,2024-03-28T12:42:56.150000
CVE-2024-30244,0,0,58cbe82eb6a3315167a8e6bb0cccea64e33ba08dd30670c3060eede01da84f20,2024-03-28T12:42:56.150000
CVE-2024-30245,0,0,69f8d0e8e9820bbde2e6705ffa51df6c4056c193c50f3f74b4878ddc0c1739df,2024-03-28T12:42:56.150000
CVE-2024-3039,1,1,78eee57f82e030cc18475a85cdac1c12567dfe02603d629b2fbdbce1920e64dd,2024-03-28T16:07:30.893000
CVE-2024-3040,1,1,6f474eb89904d3ef26a1f99830c4f7e6fe42c974c3600ac0c482bf259f0da50d,2024-03-28T16:07:30.893000
CVE-2024-3041,1,1,3dadac99e88a79c62df6899f0fad147e3340516f2236f4e3cf8c259f2e06d9f0,2024-03-28T16:07:30.893000
CVE-2024-3042,1,1,bbb201bb8af54b84ea33f47457d61d2db4be63190911d6f2d2de2d7f6ef14959,2024-03-28T16:07:30.893000
CVE-2024-30421,0,0,b8b8cb07a3b21c6533c687c46600fcd77c1dde4165706436ec8a960aad3329a9,2024-03-28T12:42:56.150000
CVE-2024-30422,0,0,4428c80482e6497556bbd0fd5fc18b1b3811a4ae5bf0c8713af97deb1a151ca3,2024-03-28T12:42:56.150000
CVE-2024-30583,1,1,80ec8dac2df697f6d97dce3d414f3f40db802c8a05001d59322248887dd494a3,2024-03-28T14:15:14.997000
CVE-2024-30584,1,1,8f9baee3cb43c9905ec86b9ceafcc9fa1c1744ff634c603f52c4c6f51a696b11,2024-03-28T14:15:15.047000
CVE-2024-30585,1,1,d28878d4514beae5f4a8ab14bb774cd280bd05289eeacb0c71c85485f44bd725,2024-03-28T14:15:15.090000
CVE-2024-30586,1,1,e994d08daae11886e164c06c955244b9508623834040b22157b01f787dbc0950,2024-03-28T14:15:15.137000
CVE-2024-30587,1,1,6274e509df3fa70da36dfdbc664d4ccf17dd7d0e67c39af2dd11068017b323da,2024-03-28T14:15:15.183000
CVE-2024-30588,1,1,01803a8f1753441e295114a835437c23858ff4e45ee9b4f2ae8687fa72d06f88,2024-03-28T14:15:15.233000
CVE-2024-30589,1,1,509d4c85012c03904de4c0dd93b476cdd601d8081e5166323a7c4d0cc68d0bf8,2024-03-28T14:15:15.293000
CVE-2024-30590,1,1,eaa76954b414a6fa9537869c2507880f04b22a0c4738d8ed5fce5ed85a50bc26,2024-03-28T14:15:15.347000
CVE-2024-30591,1,1,3d0921e40ab66acd2d6afca0d71ac066255ff86efc26a848649ab19d4a298c35,2024-03-28T14:15:15.390000
CVE-2024-30592,1,1,56f8d7aa5e3af7129e1c164e2430cfa563ea1b6bcf42ee4f9c8560f78563b56c,2024-03-28T14:15:15.437000
CVE-2024-30593,1,1,1a36095e535cda1e55aecd9fb09089f1887b6aafd29dda7f3d3fee7ec07f4b6f,2024-03-28T13:15:47.950000
CVE-2024-30594,1,1,349d76c77d7160b339e99949df685f81a71499788b00110b42a5b560440a2d4b,2024-03-28T13:15:48.007000
CVE-2024-30583,0,1,90e06b2d765278ac0f3bc4028344fdf483d30ea530d1cc273b94886fa84d52bd,2024-03-28T16:07:30.893000
CVE-2024-30584,0,1,35ddda2305ed50d97f06df7df7b733486405aa80385b935162c6180d1fe62320,2024-03-28T16:07:30.893000
CVE-2024-30585,0,1,7e78a86bcf687f746816842e948af254246fdc173fd94674915f1ec2e6a3c749,2024-03-28T16:07:30.893000
CVE-2024-30586,0,1,37eaa44de9abeff4b259d4ed391e0ff9c819a61001d2eac97ecd8afa2c7273db,2024-03-28T16:07:30.893000
CVE-2024-30587,0,1,36e8b51eabfd3120c57ca2b9ecc6c1c35cdd81a5088a83b8b20788614eb5a7e8,2024-03-28T16:07:30.893000
CVE-2024-30588,0,1,41fbf2b74842eb4c396bb4c1c4040e0694e963250cd064f663ff6032e697716f,2024-03-28T16:07:30.893000
CVE-2024-30589,0,1,e9d9137ef12bc250b28edd5e7aff25a313c5cfed6eedf3dad714362460745e1a,2024-03-28T16:07:30.893000
CVE-2024-30590,0,1,3d0a6627c184857af247d36c652f53828d799379ea6555c5b8736fdc0d082922,2024-03-28T16:07:30.893000
CVE-2024-30591,0,1,7243d7a5ad9c869750e307cf51f223f43ed20090c1bd6ca7e74e1811f2659010,2024-03-28T16:07:30.893000
CVE-2024-30592,0,1,7416c528eb6e2aad55e80c4e8e1aedf8486a9b72141c06c8af2ede72c1f3191f,2024-03-28T16:07:30.893000
CVE-2024-30593,0,1,94ab7a5984b6ddc252d1cdc2f34439ed1580ac9af1936ee93bbba2660c1249a3,2024-03-28T16:07:30.893000
CVE-2024-30594,0,1,e81eac41dc729dcec40ebd4665832f8438a8120b7ca71f2ebf8d0b3df752f1a0,2024-03-28T16:07:30.893000
CVE-2024-30595,0,0,6aa498550452e6e0962fd2990a6e5e6c3fabf1525b07b0c0d8d4a86186d62bd0,2024-03-28T12:42:56.150000
CVE-2024-30596,1,1,43753038bc0c6cb32f8afe83ca38303283af18f31ff0098b72eccf9d4e8ea0c7,2024-03-28T13:15:48.063000
CVE-2024-30606,1,1,dfd803ea1066cf172a4052f2a7c89b2bd278c40a080580e0501fda9a343989b4,2024-03-28T14:15:15.480000
CVE-2024-30607,1,1,87d7e602d72e1b362abff8f8c3bb280cddb9ea39946314134ccd5009ef5f6586,2024-03-28T14:15:15.530000
CVE-2024-30596,0,1,2569c687f2940ac0d88e916cd94674c848765bf3fedcdc711fe23428698d17a4,2024-03-28T16:07:30.893000
CVE-2024-30597,1,1,8e8ddf7d3ddaa265c224af912aad6d13caad6e0c7c88c7526acce543e24b5edb,2024-03-28T16:07:30.893000
CVE-2024-30598,1,1,3a7ea9a3efa8546fd0dec3d3c6b57941058965e3f62fe86c99ed3cb5baf9cc5d,2024-03-28T16:07:30.893000
CVE-2024-30599,1,1,e938c961b1cb862df4fec504278e52c24332661448e062cdde8a90682e3d845d,2024-03-28T16:07:30.893000
CVE-2024-30600,1,1,254f25cec976db4ffcc0fa92ae085c76321dff8ce02554e5e23c55074246d930,2024-03-28T16:07:30.893000
CVE-2024-30601,1,1,8cbcfd4348b64670745c0a04c2b7893df4ec9010f153bdc2a346c7e363af768e,2024-03-28T16:07:30.893000
CVE-2024-30602,1,1,cbf7a67f765f1f53d53a177d50860c17b2506f7d2eff77157b6caf5805b96f3d,2024-03-28T16:07:30.893000
CVE-2024-30603,1,1,805955af0f76a6aff14d4d8657eb4617aa1abebda94861f40184bae76ff156e9,2024-03-28T16:07:30.893000
CVE-2024-30604,1,1,379ff116825a9c982ba26e38c8ebb37d23fed335cc024c085abb3d522f133a07,2024-03-28T16:07:30.893000
CVE-2024-30606,0,1,d30eafb06d1ec022e8e4fe319a9270ad8e86b26be51c841d3c4f1eb77a918df3,2024-03-28T16:07:30.893000
CVE-2024-30607,0,1,19ebdeee2836d102fa7844242f3af516e5bcea9289df539c7f7941939342ded1,2024-03-28T16:07:30.893000
CVE-2024-30612,1,1,36049a6b27beee3de405fd177d0fa174f7a08d58b111f9900a25b925f6e97e9e,2024-03-28T16:07:30.893000
CVE-2024-31134,1,1,f3dcd63eca4514e6339c3ec7aeb83c2b308295cdf8ae154e5d9cd1a9c2c8a369,2024-03-28T16:07:30.893000
CVE-2024-31135,1,1,479d4c1f65df6314842af6b85097457f245568f09c6620b6a18268f61c31c90a,2024-03-28T16:07:30.893000
CVE-2024-31136,1,1,59d127dfb07acd2c4587c1beda8f1deaf424906c9b7034466a77403adfd40752,2024-03-28T16:07:30.893000
CVE-2024-31137,1,1,449ac74d89f8a92f177d1d77ee28ed4c10488cbb05e1f09ccbde9d94a1737274,2024-03-28T16:07:30.893000
CVE-2024-31138,1,1,7951d56a99dbfcb87972373932c19c3399e083ef12fc541bc18f929442b04b18,2024-03-28T16:07:30.893000
CVE-2024-31139,1,1,cf8c25425780f1d36f604f7c3d037b16544eea3ab0908ce694956183986a8d87,2024-03-28T16:07:30.893000
CVE-2024-31140,1,1,a7e2204480cd3644823842970dd746ee5c020bc95b54375f7cfa679b79796cd1,2024-03-28T16:07:30.893000

Can't render this file because it is too large.