Auto-Update: 2024-03-19T13:00:38.498523+00:00

This commit is contained in:
cad-safe-bot 2024-03-19 13:03:25 +00:00
parent 497a89a06b
commit 5cb342ecb7
26 changed files with 892 additions and 10 deletions

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40278",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-19T12:15:07.473",
"lastModified": "2024-03-19T12:15:07.473",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in OpenClinic GA 5.247.01. An Information Disclosure vulnerability has been identified in the printAppointmentPdf.jsp component of OpenClinic GA. By changing the AppointmentUid parameter, an attacker can determine whether a specific appointment exists based on the error message."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/BugBountyHunterCVE/CVE-2023-40278/blob/main/CVE-2023-40278_Information-Disclosure_OpenClinic-GA_5.247.01_Report.md",
"source": "cve@mitre.org"
},
{
"url": "https://sourceforge.net/projects/open-clinic/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-5388",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:07.537",
"lastModified": "2024-03-19T12:15:07.537",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1780432",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-0743",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-01-23T14:15:38.280",
"lastModified": "2024-03-11T06:15:06.283",
"lastModified": "2024-03-19T12:15:07.607",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "An unchecked return value in TLS handshake code could have caused a potentially exploitable crash. This vulnerability affects Firefox < 122."
"value": "An unchecked return value in TLS handshake code could have caused a potentially exploitable crash. This vulnerability affects Firefox < 122, Firefox ESR < 115.9, and Thunderbird < 115.9."
},
{
"lang": "es",
@ -87,6 +87,14 @@
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-1144",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-19T12:15:07.910",
"lastModified": "2024-03-19T12:15:07.910",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper access control vulnerability in Devklan's Alma Blog that affects versions 2.1.10 and earlier. This vulnerability could allow an unauthenticated user to access the application's functionalities without the need for credentials."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-alma-devklan-blog",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-1145",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-19T12:15:08.177",
"lastModified": "2024-03-19T12:15:08.177",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "User enumeration vulnerability in Devklan's Alma Blog that affects versions 2.1.10 and earlier. This vulnerability could allow a remote user to retrieve all valid users registered in the application just by looking at the request response."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-204"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-alma-devklan-blog",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-1146",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-19T12:15:08.443",
"lastModified": "2024-03-19T12:15:08.443",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Scripting vulnerability in Devklan's Alma Blog that affects versions 2.1.10 and earlier. This vulnerability could allow an attacker to store a malicious JavaScript payload within the application by adding the payload to 'Community Description' or 'Community Rules'."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-alma-devklan-blog",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "Improper Input Validation vulnerability in Apache Hop Engine.This issue affects Apache Hop Engine: before 2.8.0.\n\nUsers are recommended to upgrade to version 2.8.0, which fixes the issue.\n\nWhen Hop Server writes links to the\u00a0PrepareExecutionPipelineServlet page one of the parameters provided to the user was not properly escaped.\nThe variable not properly escaped is the \"id\", which is not directly accessible by users creating pipelines making the risk of exploiting this low.\n\nThis issue only affects users using the Hop Server component and does not directly affect the client."
},
{
"lang": "es",
"value": "Vulnerabilidad de validaci\u00f3n de entrada incorrecta en Apache Hop Engine. Este problema afecta a Apache Hop Engine: anterior a 2.8.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.8.0, que soluciona el problema. Cuando Hop Server escribe enlaces a la p\u00e1gina PrepareExecutionPipelineServlet, uno de los par\u00e1metros proporcionados al usuario no se escap\u00f3 correctamente. La variable que no se escap\u00f3 correctamente es la \"id\", a la que los usuarios que crean canalizaciones no pueden acceder directamente, lo que hace que el riesgo de explotaci\u00f3n sea bajo. Este problema solo afecta a los usuarios que utilizan el componente Hop Server y no afecta directamente al cliente."
}
],
"metrics": {},

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-2605",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:08.690",
"lastModified": "2024-03-19T12:15:08.690",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An attacker could have leveraged the Windows Error Reporter to run arbitrary code on the system escaping the sandbox. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1872920",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-2606",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:08.740",
"lastModified": "2024-03-19T12:15:08.740",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Passing invalid data could have led to invalid wasm values being created, such as arbitrary integers turning into pointer values. This vulnerability affects Firefox < 124."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1879237",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-2607",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:08.790",
"lastModified": "2024-03-19T12:15:08.790",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Return registers were overwritten which could have allowed an attacker to execute arbitrary code. *Note:* This issue only affected Armv7-A systems. Other operating systems are unaffected. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1879939",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-2608",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:08.843",
"lastModified": "2024-03-19T12:15:08.843",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "`AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding()` and `AppendEncodedCharacters()` could have experienced integer overflows, causing underallocation of an output buffer leading to an out of bounds write. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1880692",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-2609",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:08.910",
"lastModified": "2024-03-19T12:15:08.910",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The permission prompt input delay could have expired while the window is not in focus, which made the prompt vulnerable to clickjacking by malicious websites. This vulnerability affects Firefox < 124."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1866100",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-2610",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:08.957",
"lastModified": "2024-03-19T12:15:08.957",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Using a markup injection an attacker could have stolen nonce values. This could have been used to bypass strict content security policies. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871112",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-2611",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:09.007",
"lastModified": "2024-03-19T12:15:09.007",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A missing delay on when pointer lock was used could have allowed a malicious page to trick a user into granting permissions. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1876675",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-2612",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:09.063",
"lastModified": "2024-03-19T12:15:09.063",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "If an attacker could find a way to trigger a particular code path in `SafeRefPtr`, it could have triggered a crash or potentially be leveraged to achieve code execution. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1879444",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-2613",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:09.113",
"lastModified": "2024-03-19T12:15:09.113",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Data was not properly sanitized when decoding a QUIC ACK frame; this could have led to unrestricted memory consumption and a crash. This vulnerability affects Firefox < 124."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1875701",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-2614",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:09.160",
"lastModified": "2024-03-19T12:15:09.160",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Memory safety bugs present in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1685358%2C1861016%2C1880405%2C1881093",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-2615",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:09.210",
"lastModified": "2024-03-19T12:15:09.210",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Memory safety bugs present in Firefox 123. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 124."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1881074%2C1882438",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-2616",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:09.260",
"lastModified": "2024-03-19T12:15:09.260",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "To harden ICU against exploitation, the behavior for out-of-memory conditions was changed to crash instead of attempt to continue. This vulnerability affects Firefox ESR < 115.9 and Thunderbird < 115.9."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846197",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2632",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-19T12:15:09.307",
"lastModified": "2024-03-19T12:15:09.307",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A Information Exposure Vulnerability has been found on Meta4 HR. This vulnerability allows an attacker to obtain a lot of information about the application such as the variables set in the process, the Tomcat versions, library versions and underlying operation system via HTTP GET '/sitetest/english/dumpenv.jsp'."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-meta4-hr-cegid",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2633",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-19T12:15:09.530",
"lastModified": "2024-03-19T12:15:09.530",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Scripting Vulnerability has been found on Meta4 HR affecting version 819.001.022 and earlier. The endpoint '/sitetest/english/dumpenv.jsp' is vulnerable to XSS attack by 'lang' query, i.e. '/sitetest/english/dumpenv.jsp?snoop=yes&lang=%27%3Cimg%20src/onerror=alert(1)%3E&params'."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-meta4-hr-cegid",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2634",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-19T12:15:09.773",
"lastModified": "2024-03-19T12:15:09.773",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Scripting Vulnerability has been found on Meta4 HR affecting version 819.001.022 and earlier. The endpoint '/sse_generico/generico_login.jsp' is vulnerable to XSS attack via 'lang' query, i.e. '/sse_generico/generico_login.jsp?lang=%27%3balert(%27BLEUSS%27)%2f%2f&params='."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-meta4-hr-cegid",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2635",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-19T12:15:09.993",
"lastModified": "2024-03-19T12:15:09.993",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been discovered in Cegid Meta4 HR that consists of execution after redirect. This vulnerability could allow an attacker to bypass the security measures of the applications by accessing the webappconfig.jsp file directly and canceling the redirect request, leading to the configuration file inside the application, in which an attacker could modify different parameters. "
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-698"
}
]
}
],
"references": [
{
"url": "https://www.cegid.com/global/meta4-es-joins-cegid/",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2024-27439",
"sourceIdentifier": "security@apache.org",
"published": "2024-03-19T11:15:06.537",
"lastModified": "2024-03-19T11:15:06.537",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An error in the evaluation of the fetch metadata headers could allow a bypass of the CSRF protection in Apache Wicket.\nThis issue affects Apache Wicket: from 9.1.0 through 9.16.0, and the milestone releases for the 10.0 series.\nApache Wicket 8.x does not support CSRF protection via the fetch metadata headers and as such is not affected.\n\nUsers are recommended to upgrade to version 9.17.0 or 10.0.0, which fixes the issue.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-444"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/o825rvjjtmz3qv21ps5k7m2w9193g1lo",
"source": "security@apache.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-19T11:00:38.574098+00:00
2024-03-19T13:00:38.498523+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-19T09:15:06.630000+00:00
2024-03-19T12:15:09.993000+00:00
```
### Last Data Feed Release
@ -29,20 +29,43 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
241963
241985
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `22`
* [CVE-2024-24683](CVE-2024/CVE-2024-246xx/CVE-2024-24683.json) (`2024-03-19T09:15:06.630`)
* [CVE-2023-40278](CVE-2023/CVE-2023-402xx/CVE-2023-40278.json) (`2024-03-19T12:15:07.473`)
* [CVE-2023-5388](CVE-2023/CVE-2023-53xx/CVE-2023-5388.json) (`2024-03-19T12:15:07.537`)
* [CVE-2024-1144](CVE-2024/CVE-2024-11xx/CVE-2024-1144.json) (`2024-03-19T12:15:07.910`)
* [CVE-2024-1145](CVE-2024/CVE-2024-11xx/CVE-2024-1145.json) (`2024-03-19T12:15:08.177`)
* [CVE-2024-1146](CVE-2024/CVE-2024-11xx/CVE-2024-1146.json) (`2024-03-19T12:15:08.443`)
* [CVE-2024-2605](CVE-2024/CVE-2024-26xx/CVE-2024-2605.json) (`2024-03-19T12:15:08.690`)
* [CVE-2024-2606](CVE-2024/CVE-2024-26xx/CVE-2024-2606.json) (`2024-03-19T12:15:08.740`)
* [CVE-2024-2607](CVE-2024/CVE-2024-26xx/CVE-2024-2607.json) (`2024-03-19T12:15:08.790`)
* [CVE-2024-2608](CVE-2024/CVE-2024-26xx/CVE-2024-2608.json) (`2024-03-19T12:15:08.843`)
* [CVE-2024-2609](CVE-2024/CVE-2024-26xx/CVE-2024-2609.json) (`2024-03-19T12:15:08.910`)
* [CVE-2024-2610](CVE-2024/CVE-2024-26xx/CVE-2024-2610.json) (`2024-03-19T12:15:08.957`)
* [CVE-2024-2611](CVE-2024/CVE-2024-26xx/CVE-2024-2611.json) (`2024-03-19T12:15:09.007`)
* [CVE-2024-2612](CVE-2024/CVE-2024-26xx/CVE-2024-2612.json) (`2024-03-19T12:15:09.063`)
* [CVE-2024-2613](CVE-2024/CVE-2024-26xx/CVE-2024-2613.json) (`2024-03-19T12:15:09.113`)
* [CVE-2024-2614](CVE-2024/CVE-2024-26xx/CVE-2024-2614.json) (`2024-03-19T12:15:09.160`)
* [CVE-2024-2615](CVE-2024/CVE-2024-26xx/CVE-2024-2615.json) (`2024-03-19T12:15:09.210`)
* [CVE-2024-2616](CVE-2024/CVE-2024-26xx/CVE-2024-2616.json) (`2024-03-19T12:15:09.260`)
* [CVE-2024-2632](CVE-2024/CVE-2024-26xx/CVE-2024-2632.json) (`2024-03-19T12:15:09.307`)
* [CVE-2024-2633](CVE-2024/CVE-2024-26xx/CVE-2024-2633.json) (`2024-03-19T12:15:09.530`)
* [CVE-2024-2634](CVE-2024/CVE-2024-26xx/CVE-2024-2634.json) (`2024-03-19T12:15:09.773`)
* [CVE-2024-2635](CVE-2024/CVE-2024-26xx/CVE-2024-2635.json) (`2024-03-19T12:15:09.993`)
* [CVE-2024-27439](CVE-2024/CVE-2024-274xx/CVE-2024-27439.json) (`2024-03-19T11:15:06.537`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `2`
* [CVE-2024-0743](CVE-2024/CVE-2024-07xx/CVE-2024-0743.json) (`2024-03-19T12:15:07.607`)
* [CVE-2024-24683](CVE-2024/CVE-2024-246xx/CVE-2024-24683.json) (`2024-03-19T09:15:06.630`)
## Download and Usage

View File

@ -228523,6 +228523,7 @@ CVE-2023-40274,0,0,a87703ce0cec9b2f71f145b4ad6930a4558be41188f81bc5cadeaf5b92764
CVE-2023-40275,0,0,6355574985198dc6e7f85aa6c98fde8df05fe38075e6e6447f453afea16b7034,2024-03-19T01:15:44.743000
CVE-2023-40276,0,0,81528dffb63509adc0a167e771fb055fcc7b8625a14356190751a6ed7fde0eb7,2024-03-19T01:15:44.807000
CVE-2023-40277,0,0,1649d36ee5744da7853e6f63a529e8568ec9bb7f13c5f96607f0f1dacda93a70,2024-03-19T01:15:44.850000
CVE-2023-40278,1,1,7fc796a9c8a4b86b281e82f24dbfcfc7f15ce8d00cd7c187936bcb2d2f119d44,2024-03-19T12:15:07.473000
CVE-2023-4028,0,0,3df4ea134e3bc2993759c7fd73fca43c7cce7bc86509f2d520d8c4274d249028,2023-08-24T17:53:34.333000
CVE-2023-40280,0,0,0a6158d8927adeba96545304d54666c1db28ebdd9babb20c813ed6077a34edb8,2024-03-19T01:15:44.900000
CVE-2023-40281,0,0,9151ee58e4e34a5d0e50b7a1455975136c3b0ec7392bd5aeea0e6461170746f4,2023-08-23T15:27:41.540000
@ -236194,6 +236195,7 @@ CVE-2023-5384,0,0,441f1b8a30756cc9b5f3117d86e72f400495bdf444d07abaff550854597f23
CVE-2023-5385,0,0,9ae213cb30ffb83a1a2cc696047d7aba4caab30c852d1ef2dcb64596a9208adb,2023-11-27T20:13:07.160000
CVE-2023-5386,0,0,bfe87044f02046ad817ff7d54d504256b17a835afbb668f0ba9ab1d54dcdd82f,2023-11-27T20:14:47.710000
CVE-2023-5387,0,0,45867b8235da7c9a90990530159b5190e5bd4e4eb429c6ce43ac3327afc64eac,2023-11-27T20:15:21.673000
CVE-2023-5388,1,1,697e009ac3688cb2f69b444c49a93c510d3e6aa1329ac0f96fc092bbce7b3e17,2024-03-19T12:15:07.537000
CVE-2023-5389,0,0,07d2db5823402611439109f7f34a4853364795f9958639185189e21209a9cfea,2024-02-08T15:20:04.057000
CVE-2023-5390,0,0,7ebaee5947d3e1f1edd0aa63aeb1bb5e132bc79873105ca039e3fefbf61f0d4e,2024-02-08T17:18:46.787000
CVE-2023-5391,0,0,e65a9210280128a68a8a49095d5446b17a62134416876921dbd7f459dcc8b6e5,2024-02-01T00:49:46.897000
@ -238239,7 +238241,7 @@ CVE-2024-0738,0,0,e180008c6191582af8846975460523b38bf746526c1330b21eec59d5ba0663
CVE-2024-0739,0,0,92b1abf635667968fc6fc797839e0df67043fa3679af54f39fb17a879e4f027e,2024-02-29T01:43:27.693000
CVE-2024-0741,0,0,a9fda7b42aa854b426665305c7828769c163150b209cbb19ab9d616db9041a98,2024-02-02T17:19:30.117000
CVE-2024-0742,0,0,1ae741d10e1bed36bf34ad7f16caeaf1531efb403a5a51e45593c25df5bee474,2024-02-02T17:19:23.497000
CVE-2024-0743,0,0,1e3106514b83a3ec85879ce51d0a8504c81591e73c89d2da5c893f5c6b902372,2024-03-11T06:15:06.283000
CVE-2024-0743,0,1,10e6de3ff74d2fe6d808f7772622f8bf9b8141c31ffaa09133123be56fedc9c1,2024-03-19T12:15:07.607000
CVE-2024-0744,0,0,e96805dde96bfb723552d652089a0f0d2e0f936866d1fca2d8bc36dda88ad35c,2024-01-29T22:47:40.353000
CVE-2024-0745,0,0,e95f46af45f166ba44148aad2d02421e51785e292696d491c32d77e99976a28a,2024-01-30T16:08:53.497000
CVE-2024-0746,0,0,86e154f7304b77b0253dd3ebca2a1985a3fb1b8ae7973ed11288f18ffe31e532,2024-02-02T17:19:10.737000
@ -238543,6 +238545,9 @@ CVE-2024-1138,0,0,0bb26866b03e9dd351d8284004467140fe2cfdfbd72af071fda864e5a2dc9e
CVE-2024-1140,0,0,113ab98fbbd3f38fc36026b5aef44eb4b38cd7d347ba07fcabb6b9d9a69118a5,2024-02-27T19:17:32.253000
CVE-2024-1141,0,0,48ded67d016daf0f3b16719f5ccedb465e548a958cef24ce4f350672f3d23e36,2024-02-09T20:22:03.893000
CVE-2024-1143,0,0,0e1cc50dc6fadb90e5e9f42ce552c5269c71acc03717875a86d6ea10d7db2994,2024-02-09T19:08:27.423000
CVE-2024-1144,1,1,46ba07079959d0bc5a1bd80131fbc31b6ec1add882bbb171f0d9910b026f00f7,2024-03-19T12:15:07.910000
CVE-2024-1145,1,1,f0d0e965634c237c0bfc88fd7f3d047f78ebffe6c269b0c22cd127ca447dd95f,2024-03-19T12:15:08.177000
CVE-2024-1146,1,1,0e5bfb2c890fa993042df6fb1eeb1edf7e276838e73c72f55376d2188650bb35,2024-03-19T12:15:08.443000
CVE-2024-1149,0,0,e12aca11c49edcecd68e875fe82a5687fd0ed0bd531ab2619a9a9843b555ddd2,2024-02-15T17:52:08.970000
CVE-2024-1150,0,0,254c78737835be39b8538afdba98acb889151a71de178f55236b85ab77801784,2024-02-15T17:42:08.113000
CVE-2024-1151,0,0,9228ed7d5915ff157a1f719259771d692c1e75b64670d2aac60410feae41cc91,2024-02-22T04:15:08.477000
@ -240751,7 +240756,7 @@ CVE-2024-24594,0,0,2d1d6ef3edb6eea27d760a77187cf0f21d8b0e3aa5e2b1e9eb45515b37617
CVE-2024-24595,0,0,53aa45116d4573f7c0b646b17e4787137c5ab03b6e722457f3ddd917489c99e4,2024-02-13T14:08:55.650000
CVE-2024-24680,0,0,00c6b06cbd399fac9a1cb69a45fdeee991ea9572aae73c195704c3555b436eb7,2024-02-15T18:46:48.693000
CVE-2024-24681,0,0,705110c1a0575ef95794934b23101ccc4a6f384f7c61c4db9f4dbf9a8c528dd4,2024-02-26T13:42:22.567000
CVE-2024-24683,1,1,14d1db8c42c1af073346b05caabd28a87136e12e5c900ba32df4dea78d909acf,2024-03-19T09:15:06.630000
CVE-2024-24683,0,1,83867e1d338460bbfdf92b236075e9d9bb5ed3b017b9bdb0c57d93bffd7eb55d,2024-03-19T09:15:06.630000
CVE-2024-24690,0,0,4249963fcab3f64839ca35be1a62d20e5da7a24ba0a47ce2bf9c0d2ae28ac410,2024-02-14T13:59:35.580000
CVE-2024-24691,0,0,87a55408e5efa0a4e3ce695995ae48834f0ce6baa0932acdc26c28bc7459ff4b,2024-02-14T13:59:35.580000
CVE-2024-24692,0,0,96b263e11e7ffd264e5e6330a524d4e167d94ed5d670d61f6bb2c4bb8b02f370,2024-03-14T12:52:21.763000
@ -241386,11 +241391,13 @@ CVE-2024-26042,0,0,927f70a352d7c944271929f8711b34e89bf0c26c9040985cbf997f7bb85f1
CVE-2024-26043,0,0,77ce18daefee0fb24763d2de04c9f4ff1f3fc9c499267ef23cade7defef226a1,2024-03-18T19:40:00.173000
CVE-2024-26044,0,0,f556d4225ae31cf4a75b95323be404b6e96c152dafd030c24bdb1036f337da08,2024-03-18T19:40:00.173000
CVE-2024-26045,0,0,12a76916f2e3fabe11f0da4acd8c315d84502c254bb0159c5076b8a08d2bf1f8,2024-03-18T19:40:00.173000
CVE-2024-2605,1,1,5811c2b58ce546bf0c49dc0fbf1dce8b3c4eb5f9e17aaef658dcdcdc4734323e,2024-03-19T12:15:08.690000
CVE-2024-26050,0,0,aef0a31966034fb7cad23737b141d0ec896d58774ba8eff9ccccd20d65bf9701,2024-03-18T19:40:00.173000
CVE-2024-26051,0,0,27f4a4cc55152422e98812c372f02a9a52ea0edc20866d873d003a2f46e2c392,2024-03-18T19:40:00.173000
CVE-2024-26052,0,0,4afe062ef50e3846cb25cfceaebb6f1cb55d0294a22d349f7d6dc8aa00db6a18,2024-03-18T19:40:00.173000
CVE-2024-26056,0,0,60712556392fbef8788174cb4444764b1e98f110de0c08a36a1c6d35b38a27f4,2024-03-18T19:40:00.173000
CVE-2024-26059,0,0,4c713ebfa874c9051e3b2fefbe42e45a5f50df79fbce0963b1f0497ba00efe5b,2024-03-18T19:40:00.173000
CVE-2024-2606,1,1,9ff42d2fc52c3bc81bc08c599167d0a35be9768ac3e3188167457c840c15b7c0,2024-03-19T12:15:08.740000
CVE-2024-26061,0,0,e5d349ee86366a82d94cc4ffc66dadaca867fab96cb64cbab8974800307976f5,2024-03-18T19:40:00.173000
CVE-2024-26062,0,0,87ec57cf947d718a02d0ed767da86d3295cd5451b81149c31cd2bbba6395c4cb,2024-03-18T19:40:00.173000
CVE-2024-26063,0,0,1ba9efc90459d106edfffaf83d96a3b240f0673b88e00cd157d3f6e90cfb5a06,2024-03-18T19:40:00.173000
@ -241398,10 +241405,14 @@ CVE-2024-26064,0,0,ff144dd493cab1ed761f56b7eed61318aa93a620b7f1f749119957a2f49a9
CVE-2024-26065,0,0,f05434d986097dd89c414a15c420cdddc61d6433e66c11de1a1a2441f62c78a5,2024-03-18T19:40:00.173000
CVE-2024-26067,0,0,771feae423c61b47115f901b11f3c3dcf0abf651e532228608443b53ddaf898b,2024-03-18T19:40:00.173000
CVE-2024-26069,0,0,816c3bf702e981a32d8f2cbc8f4ffc747fd5bb2fd9e85087b9348ecbb0d6a22b,2024-03-18T19:40:00.173000
CVE-2024-2607,1,1,2a51d58380efb4b0abbeb30113b40ef6253ceca1431c6e4fa157343902b1fccd,2024-03-19T12:15:08.790000
CVE-2024-26073,0,0,6888cf6593fb4013d9ac96b5e0e04253a32891793ba0fc6b5d0f9bb6acf56fbf,2024-03-18T19:40:00.173000
CVE-2024-2608,1,1,265015116837e37458e64280395c041002aedf2a19b7256cf1fbfbcf6084e197,2024-03-19T12:15:08.843000
CVE-2024-26080,0,0,4c7f5e68dedcd9fba242c25344b93a9a82fec0775eb26628d32eb9d1bc78f44c,2024-03-18T19:40:00.173000
CVE-2024-2609,1,1,ab9ccaacfd11661e2827774717e08fca08dd1f13b7681e453ae2280448511152,2024-03-19T12:15:08.910000
CVE-2024-26094,0,0,85e3ce7a818102789382308d4aee284348d003fd2b7cf5cdd2a80c2099ce4bab,2024-03-18T19:40:00.173000
CVE-2024-26096,0,0,7149acbb034794a59086aa3fa6e989a4571021a73871d6ede0203941e15d68d8,2024-03-18T19:40:00.173000
CVE-2024-2610,1,1,c2824264a0b7fa729f2018b8d31f48f12673d361a8beae7110486d68ec2187e4,2024-03-19T12:15:08.957000
CVE-2024-26101,0,0,a99024df1b18b54a773096b0beb63b24fd79a9e9974023773ae59f2a37feed95,2024-03-18T19:40:00.173000
CVE-2024-26102,0,0,238e693f3e2d466bc8d2c153335d74273ddf22aee27378fc2288011848995267,2024-03-18T19:40:00.173000
CVE-2024-26103,0,0,d8456b4083613d4d8db27a085dde20a49ef73abb0168ef69a30fce12bb31e1c6,2024-03-18T19:40:00.173000
@ -241409,13 +241420,16 @@ CVE-2024-26104,0,0,26fa5e620c52b2c3f13956dc7ddff142e7a4604a5ec9b5dd0aa8139e69f91
CVE-2024-26105,0,0,11537b15eb4cc2020a0de2c2950a0ccff35f84e7097158552d59dda934784eba,2024-03-18T19:40:00.173000
CVE-2024-26106,0,0,1bcf517c10e9d03e04f36309423fea2ee998c751ee4d56005c66807def8df1c2,2024-03-18T19:40:00.173000
CVE-2024-26107,0,0,08a7d4a713d69f5e9264f33bf201cb0a984991aa907bf9c03d1e9d80640879b3,2024-03-18T19:40:00.173000
CVE-2024-2611,1,1,161fc729524d5c4c7e1cea9579661e2b0572b8abf0724e013fb128173f26f902,2024-03-19T12:15:09.007000
CVE-2024-26118,0,0,7c64ac890dd2a49d6d942d5500b1240c8fe85648327d773fcda60ffa1a5badd7,2024-03-18T19:40:00.173000
CVE-2024-26119,0,0,d15b90520fefb7812fc1dd26c7161c951db5fa8c9a1a7a8a2878ce59a176d881,2024-03-18T19:40:00.173000
CVE-2024-2612,1,1,5436126de8edea12a1ddfdb3c820de0b5da83895b0cac3aa1025993b67aecb80,2024-03-19T12:15:09.063000
CVE-2024-26120,0,0,1657b6d18890514d9af3eeebc8c2352500124f93d0e64bb8ac66ddfc251885ca,2024-03-18T19:40:00.173000
CVE-2024-26124,0,0,82c27b96a9dc28b3e1fb2de7ffef79a19fe8428577dd4db99bfdfe3e5dd7dcb3,2024-03-18T19:40:00.173000
CVE-2024-26125,0,0,b8e9f2510a0a2d65e00221b700c4ebf67290c396472beeb55853dce893354627,2024-03-18T19:40:00.173000
CVE-2024-26128,0,0,487fd4a47ca7d01d688a4160da954eb7676a1080733cdfedc265ac6cf53a8666,2024-02-23T02:42:54.547000
CVE-2024-26129,0,0,968e60f64e57be6f8f2df784210f5788e81353ced4a4f4353953a10484d71d0a,2024-02-20T19:50:53.960000
CVE-2024-2613,1,1,09a2410e4a908ae17a48f75b6026fd314ec15c2f5a707e707d45947f3caac53e,2024-03-19T12:15:09.113000
CVE-2024-26130,0,0,a100f31d14662694d3f6ac3371aa0aa02486ee73cfbe5beddc735c4f540ce1d4,2024-02-22T19:07:27.197000
CVE-2024-26131,0,0,1fe68deeaaca58bb492ce63c50849cc8b6db7b3677668061d7c8d3bfdc8a7612,2024-02-29T13:49:29.390000
CVE-2024-26132,0,0,efcbc1c03bc7ecd913f4cad008d19857c5246eca6426cc18f4f717c65825e8a0,2024-02-29T13:49:29.390000
@ -241424,6 +241438,7 @@ CVE-2024-26134,0,0,c48fec61bdbea71825089d60ba10afed6847a83574a5b8775f63985c4fd7b
CVE-2024-26135,0,0,59fe0ab8843c555cfe91a706ee16a0503bc6707525e2af12cfc8995ef8319782,2024-02-20T21:52:55.187000
CVE-2024-26136,0,0,bc3bbfc3e7ddd7f5422807ceb3e66f18b225baf2ed7e74657a084b480c15c1ff,2024-02-22T19:07:37.840000
CVE-2024-26138,0,0,4d4da9f47e13e4c424c52e5eff6306f34e02033e2d2c801866f22decefe9c2c2,2024-02-22T19:07:27.197000
CVE-2024-2614,1,1,d6a3ef07a512fa4deeabdae9e4baad12c27d9b864bda179f5d8eeff8439a6acc,2024-03-19T12:15:09.160000
CVE-2024-26140,0,0,6de2d0c9ebf70d5d176c18f61310d4c12ab2f9c1ae885cf141ebe9307850ffc6,2024-02-22T19:07:37.840000
CVE-2024-26141,0,0,9df246c55a4395e8557802daf50823ee55f3169dd101c749aaebaef21dae00c2,2024-02-29T13:49:47.277000
CVE-2024-26142,0,0,edb6243c44774fbfc22b55927ba153d435243b85e5fd0fb08002baf86f2fdeda,2024-02-28T14:07:00.563000
@ -241434,10 +241449,12 @@ CVE-2024-26146,0,0,bd024c90d4aeed8e0a6d50c3aa07c3200c9424641413cfb8168503eefdab2
CVE-2024-26147,0,0,13addf1c8834f3ea67c55cec0f4c0eb059c8c47b1e8094df62594b8de41f2fde,2024-02-22T19:07:27.197000
CVE-2024-26148,0,0,05337c7b03b0d1ad121194c9ea9b96c7e58591b109aa2163af845b513f2c72fe,2024-02-22T19:07:27.197000
CVE-2024-26149,0,0,518a6e749fa42da9b701c9605e92313b609e16a6573a8caa383f380b0cdfc77a,2024-02-26T22:10:40.463000
CVE-2024-2615,1,1,06ff763470f86e8717af3f3d8547f9cc00284b1673a49d507c12215ad9268687,2024-03-19T12:15:09.210000
CVE-2024-26150,0,0,8ea3c18b0fb78100fc3632066a5c3403e90a7daa780b43e6f9240c2ed9fee7b2,2024-02-23T19:31:25.817000
CVE-2024-26151,0,0,23d71c73b4a2821ea019a978d698b1910ca82d8c9eb2d93a0500cf52583cbf84,2024-02-23T02:42:54.547000
CVE-2024-26152,0,0,7e68ad422883506103ec46c3174c4872da8a983d075ae50a3e01c580804f4253,2024-02-23T02:42:54.547000
CVE-2024-26159,0,0,8db8f42d5662b161251586cebfdfad3ac7119bf59dcefc0ce4412d5330cc45ab,2024-03-12T17:46:17.273000
CVE-2024-2616,1,1,8126975d85b4cb7a7a7fb49ad4920bfe7c96700c000dd06a81157986baefc930,2024-03-19T12:15:09.260000
CVE-2024-26160,0,0,fa9ab77966a6520f6fd48a75b259529e6a68bdc5f72bc11ac282a7c57a6be71f,2024-03-12T17:46:17.273000
CVE-2024-26161,0,0,179c500caa38708835a1de408543085e57586fd097d7453a1bf1888d48f494e3,2024-03-12T17:46:17.273000
CVE-2024-26162,0,0,abe9736aa1712017432f5ac3cb4f9e06d55b8e6b2899e4fcc1a691ec906deb0c,2024-03-12T17:46:17.273000
@ -241502,15 +241519,19 @@ CVE-2024-26310,0,0,cdf3231f7a059b92520dd591ab7449fe300f81e89c81c63cb479e44416fa6
CVE-2024-26311,0,0,c10525456294b75c6b4919ba396921719972a7cc08a82934dcff79f6c0deabee,2024-02-22T19:07:27.197000
CVE-2024-26313,0,0,307927a31aa9525f579ecee601093796b34c0481bc031cf5fc7cd7d3e73f1218,2024-03-08T14:02:57.420000
CVE-2024-26318,0,0,5a8434e81e693bc0f90a66d9a6d8655df17a4e5f3f1f4a63075d970f5e64fed9,2024-02-20T19:50:53.960000
CVE-2024-2632,1,1,e58563df22e3d97655720bc6889c7505eb99503ec7bfd5ec4b415994d426fd60,2024-03-19T12:15:09.307000
CVE-2024-26327,0,0,ed8d19077e03f59789fd57e15d79ebd6fa2e85738782585f472f97265da3d970,2024-02-20T19:50:53.960000
CVE-2024-26328,0,0,483204e568c37ddd385ae6419587f3cba8922820a5f3e4626565041a8ff87314,2024-02-20T19:50:53.960000
CVE-2024-2633,1,1,6434744162cbeb882ce57c72de5c0b3cd92363ae9edc6a42446efe9c5667361e,2024-03-19T12:15:09.530000
CVE-2024-26333,0,0,694ee07e9a9eebd54e976b1efdfcd9c1e5579c307624f1b176728a9b5ec66620,2024-03-05T13:41:01.900000
CVE-2024-26334,0,0,a2c81f8955be04bed36d435c0180176ac51a579e96e04b4d72eb87b607366d07,2024-03-05T13:41:01.900000
CVE-2024-26335,0,0,b13dcfefb7d44684fbd7bca27c28b61eaa6fdca68532cea06942a84065f07fea,2024-03-05T13:41:01.900000
CVE-2024-26337,0,0,3a4c73678ac95a037d1d40acba24ef87be9086770b788876de82a51522b533c6,2024-03-05T13:41:01.900000
CVE-2024-26339,0,0,7eb4f269852f486a1ab2b0d193aa159613957884ae1cd1b107a1c58ebf743408,2024-03-05T13:41:01.900000
CVE-2024-2634,1,1,44624de763c6269a817a3b532a5bc58740e20dcc28154e4e1394f06b4cb8da17,2024-03-19T12:15:09.773000
CVE-2024-26342,0,0,872e5b33eb7a5e55045de887e3aa3885f68eb96ab7b6c872c9c6b04465e64391,2024-02-29T13:49:47.277000
CVE-2024-26349,0,0,01186c28ef719dd0149527c4abd8d67b60279349307693d6719ba1d7ab32ddce,2024-02-22T19:07:27.197000
CVE-2024-2635,1,1,75845e77e5ff781129814c7f5910ce2b4cbe828aa358218b6ea6f6fd62509504,2024-03-19T12:15:09.993000
CVE-2024-26350,0,0,1f62ec8cd425e84b1282a5e55493461489796820c50a425af585677fa2bae43e,2024-02-22T19:07:27.197000
CVE-2024-26351,0,0,61b98d66760f09ba8a0757ca890b9ad836349a62d566c880c0eb8336d14dbb04,2024-02-22T19:07:27.197000
CVE-2024-26352,0,0,ed876b320273da7c752d57a08640f2d98ce80b026324bdf46d0712ec0097ce54,2024-02-22T19:07:27.197000
@ -241709,6 +241730,7 @@ CVE-2024-27354,0,0,3316a11ae03e51007e09710a76a22632e619f5d31d833e6569bcace78ce3c
CVE-2024-27355,0,0,0b9031e2eb548ad12d2d9e0065d270364951139eb9b910f1e5678f52ec43857a,2024-03-04T13:58:23.447000
CVE-2024-27356,0,0,2464f4bdc7cd759969915038df7055199f0bd02c6d9b1a8ceb85c7588507e9ba,2024-02-27T14:20:06.637000
CVE-2024-27359,0,0,45c452c4a5013555c154282328f794ae0e5bd9c68f52a53f3747792eec7b2661,2024-02-26T16:32:25.577000
CVE-2024-27439,1,1,e6f57a14fb97cb51d4de95859548ccf9f7adfd2c4d52695146e9929ca36f2fc9,2024-03-19T11:15:06.537000
CVE-2024-27440,0,0,f656cf3f867b554b4acbc17eee670f16835e4e41b3c8da203b1b487ef7d6f2b3,2024-03-13T12:33:51.697000
CVE-2024-27441,0,0,e840685b8600bbca2bd5265ffc2375dd0e1834727afca845fa72402578217a21,2024-03-13T15:15:52.083000
CVE-2024-27444,0,0,a237f36c45a82911cb697384887c7b89bc1c2ea038ffd45f33470a0acaad42ea,2024-02-26T16:32:25.577000

Can't render this file because it is too large.