mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-04-25T20:00:38.051859+00:00
This commit is contained in:
parent
0a8e9fdbbf
commit
5f12c43026
@ -2,58 +2,14 @@
|
||||
"id": "CVE-2024-25700",
|
||||
"sourceIdentifier": "psirt@esri.com",
|
||||
"published": "2024-04-04T18:15:11.837",
|
||||
"lastModified": "2024-04-04T19:24:50.670",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-04-25T18:15:07.817",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Web App Builder versions <= 11.1 that may allow a remote, authenticated attacker to create a crafted link that is stored in a web map link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high.\u00a0"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de Cross-Site Scripting almacenada en Esri Portal for ArcGIS Enterprise Web App Builder versiones <= 11.1 que puede permitir a un atacante remoto y autenticado crear un v\u00ednculo manipulado que se almacena en un v\u00ednculo de un mapa web y que, al hacer clic, podr\u00eda ejecutarse de forma arbitraria. C\u00f3digo JavaScript en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son elevados."
|
||||
"value": "Rejected reason: \nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@esri.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@esri.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/",
|
||||
"source": "psirt@esri.com"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,58 +2,14 @@
|
||||
"id": "CVE-2024-25703",
|
||||
"sourceIdentifier": "psirt@esri.com",
|
||||
"published": "2024-04-04T18:15:12.090",
|
||||
"lastModified": "2024-04-04T19:24:50.670",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-04-25T19:15:49.520",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is a reflected cross site scripting vulnerability in the home application in Esri Portal for ArcGIS 11.1 and below on Windows and Linux that allows a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Hay una vulnerabilidad de Cross-Site Scripting reflejada en la aplicaci\u00f3n dom\u00e9stica en Esri Portal para ArcGIS 11.1 y versiones anteriores en Windows y Linux que permite a un atacante remoto y no autenticado crear un enlace manipulado que, al hacer clic, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima."
|
||||
"value": "Rejected reason: \nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@esri.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@esri.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/",
|
||||
"source": "psirt@esri.com"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,58 +2,14 @@
|
||||
"id": "CVE-2024-25704",
|
||||
"sourceIdentifier": "psirt@esri.com",
|
||||
"published": "2024-04-04T18:15:12.343",
|
||||
"lastModified": "2024-04-04T19:24:50.670",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-04-25T19:15:49.597",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Experience Builder versions <= 11.1 that may allow a remote, authenticated attacker to create a crafted link that is stored in the Experience Builder Embed widget which when loaded could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high.\u00a0"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de Cross-Site Scripting almacenada en Esri Portal for ArcGIS Enterprise Experience Builder versiones <= 11.1 que puede permitir que un atacante remoto y autenticado cree un enlace manipulado que se almacena en el widget de inserci\u00f3n de Experience Builder que, cuando se carga, podr\u00eda ejecutarse de forma arbitraria. C\u00f3digo JavaScript en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son elevados."
|
||||
"value": "Rejected reason: \nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@esri.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@esri.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/",
|
||||
"source": "psirt@esri.com"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,58 +2,14 @@
|
||||
"id": "CVE-2024-25705",
|
||||
"sourceIdentifier": "psirt@esri.com",
|
||||
"published": "2024-04-04T18:15:12.603",
|
||||
"lastModified": "2024-04-04T19:24:50.670",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-04-25T19:15:49.660",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is a cross site scripting vulnerability in the Esri Portal for ArcGIS Experience Builder 11.1 and below on Windows and Linux that allows a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are low.\u00a0"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de Cross-Site Scripting en Esri Portal para ArcGIS Experience Builder 11.1 y versiones anteriores en Windows y Linux que permite a un atacante remoto no autenticado crear un enlace manipulado que, al hacer clic, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son bajos."
|
||||
"value": "Rejected reason: \nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@esri.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@esri.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/",
|
||||
"source": "psirt@esri.com"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,58 +2,14 @@
|
||||
"id": "CVE-2024-25706",
|
||||
"sourceIdentifier": "psirt@esri.com",
|
||||
"published": "2024-04-04T18:15:12.830",
|
||||
"lastModified": "2024-04-04T19:24:50.670",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-04-25T19:15:49.720",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is an HTML injection vulnerability in Esri Portal for ArcGIS <=11.0 that may allow a remote, unauthenticated attacker to craft a URL which, when clicked, could potentially generate a message that may entice an unsuspecting victim to visit an arbitrary website. This could simplify phishing attacks. "
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de inyecci\u00f3n de HTML en Esri Portal for ArcGIS <=11.0 que puede permitir que un atacante remoto y no autenticado cree una URL que, al hacer clic, podr\u00eda generar un mensaje que podr\u00eda atraer a una v\u00edctima desprevenida a visitar un sitio web arbitrario. Esto podr\u00eda simplificar los ataques de phishing."
|
||||
"value": "Rejected reason: \nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@esri.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@esri.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/",
|
||||
"source": "psirt@esri.com"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,58 +2,14 @@
|
||||
"id": "CVE-2024-25709",
|
||||
"sourceIdentifier": "psirt@esri.com",
|
||||
"published": "2024-04-04T18:15:13.340",
|
||||
"lastModified": "2024-04-19T23:15:10.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-04-25T19:15:49.777",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS versions 10.8.1 \u2013 1121 that may allow a remote, authenticated attacker to create a crafted link that can be saved as a new location when moving an existing item which will potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high.\u00a0"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de Cross-Site Scripting almacenado en Esri Portal for ArcGIS versiones 10.8.1 \u2013 1121 que puede permitir que un atacante remoto y autenticado cree un enlace manipulado que se puede guardar como una nueva ubicaci\u00f3n al mover un elemento existente que potencialmente se ejecutar\u00e1. c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son elevados."
|
||||
"value": "Rejected reason: \nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@esri.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@esri.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/",
|
||||
"source": "psirt@esri.com"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28734",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-19T14:15:07.687",
|
||||
"lastModified": "2024-04-01T21:15:33.200",
|
||||
"lastModified": "2024-04-25T19:15:49.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,6 +19,14 @@
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/177619/Financials-By-Coda-Cross-Site-Scripting.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.unit4.com/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.unit4.com/products/financial-management-software",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28735",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-20T15:15:07.920",
|
||||
"lastModified": "2024-04-01T21:15:37.360",
|
||||
"lastModified": "2024-04-25T19:15:49.910",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -27,6 +27,14 @@
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/177620/Financials-By-Coda-Authorization-Bypass.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.unit4.com/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.unit4.com/products/financial-management-software",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28834",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-03-21T14:15:07.547",
|
||||
"lastModified": "2024-04-18T05:15:48.167",
|
||||
"lastModified": "2024-04-25T18:15:07.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1879",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1997",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2044",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-28834",
|
||||
"source": "secalert@redhat.com"
|
||||
|
63
CVE-2024/CVE-2024-29xx/CVE-2024-2905.json
Normal file
63
CVE-2024/CVE-2024-29xx/CVE-2024-2905.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-2905",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-25T18:15:08.037",
|
||||
"lastModified": "2024-04-25T18:15:08.037",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A security vulnerability has been discovered within rpm-ostree, pertaining to the /etc/shadow file in default builds having the world-readable bit enabled. This issue arises from the default permissions being set at a higher level than recommended, potentially exposing sensitive authentication data to unauthorized access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-2905",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271585",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/coreos/rpm-ostree/security/advisories/GHSA-2m76-cwhg-7wv6",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-309xx/CVE-2024-30939.json
Normal file
20
CVE-2024/CVE-2024-309xx/CVE-2024-30939.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-30939",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-25T19:15:49.970",
|
||||
"lastModified": "2024-04-25T19:15:49.970",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue discovered in Yealink VP59 Teams Editions with firmware version 91.15.0.118 allows a physically proximate attacker to gain control of an account via a flaw in the factory reset procedure."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://medium.com/%40deepsahu1/yealink-ip-phone-account-take-over-9bf9e7b847c0?source=friends_link&sk=b0d664dd5b3aad5b758e4934aca997ad",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-31080",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-04T14:15:10.330",
|
||||
"lastModified": "2024-04-24T02:15:45.987",
|
||||
"lastModified": "2024-04-25T18:15:08.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,6 +55,34 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1785",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2036",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2037",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2038",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2039",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2040",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2041",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2042",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-31080",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-31081",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-04T14:15:10.593",
|
||||
"lastModified": "2024-04-24T02:15:46.110",
|
||||
"lastModified": "2024-04-25T18:15:08.367",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,6 +55,34 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1785",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2036",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2037",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2038",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2039",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2040",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2041",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2042",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-31081",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-31083",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-05T12:15:37.577",
|
||||
"lastModified": "2024-04-24T02:15:46.203",
|
||||
"lastModified": "2024-04-25T18:15:08.470",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,6 +55,34 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1785",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2036",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2037",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2038",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2039",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2040",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2041",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2042",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-31083",
|
||||
"source": "secalert@redhat.com"
|
||||
|
55
CVE-2024/CVE-2024-326xx/CVE-2024-32645.json
Normal file
55
CVE-2024/CVE-2024-326xx/CVE-2024-32645.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32645",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-25T18:15:08.593",
|
||||
"lastModified": "2024-04-25T18:15:08.593",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, incorrect values can be logged when `raw_log` builtin is called with memory or storage arguments to be used as topics. A contract search was performed and no vulnerable contracts were found in production. The `build_IR` function of the `RawLog` class fails to properly unwrap the variables provided as topics. Consequently, incorrect values are logged as topics. As of time of publication, no fixed version is available."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-xchq-w5r3-4wg3",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-326xx/CVE-2024-32646.json
Normal file
55
CVE-2024/CVE-2024-326xx/CVE-2024-32646.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32646",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-25T18:15:08.780",
|
||||
"lastModified": "2024-04-25T18:15:08.780",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `slice` builtin can result in a double eval vulnerability when the buffer argument is either `msg.data`, `self.code` or `<address>.code` and either the `start` or `length` arguments have side-effects. It can be easily triggered only with the versions `<0.3.4` as `0.3.4` introduced the unique symbol fence. No vulnerable production contracts were found. Additionally, double evaluation of side-effects should be easily discoverable in client tests. As such, the impact is low. As of time of publication, no fixed versions are available.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-r56x-j438-vw5m",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-326xx/CVE-2024-32647.json
Normal file
59
CVE-2024/CVE-2024-326xx/CVE-2024-32647.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-32647",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-25T18:15:08.963",
|
||||
"lastModified": "2024-04-25T18:15:08.963",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `create_from_blueprint` builtin can result in a double eval vulnerability when `raw_args=True` and the `args` argument has side-effects. It can be seen that the `_build_create_IR` function of the `create_from_blueprint` builtin doesn't cache the mentioned `args` argument to the stack. As such, it can be evaluated multiple times (instead of retrieving the value from the stack). No vulnerable production contracts were found. Additionally, double evaluation of side-effects should be easily discoverable in client tests. As such, the impact is low. As of time of publication, no fixed versions exist.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-95"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/vyperlang/vyper/blob/cedf7087e68e67c7bfbd47ae95dcb16b81ad2e02/vyper/builtins/functions.py#L1847",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-3whq-64q2-qfj6",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-326xx/CVE-2024-32648.json
Normal file
63
CVE-2024/CVE-2024-326xx/CVE-2024-32648.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-32648",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-25T18:15:09.157",
|
||||
"lastModified": "2024-04-25T18:15:09.157",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Prior to version 0.3.0, default functions don't respect nonreentrancy keys and the lock isn't emitted. No vulnerable production contracts were found. Additionally, using a lock on a `default` function is a very sparsely used pattern. As such, the impact is low. Version 0.3.0 contains a patch for the issue.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/vyperlang/vyper/commit/93287e5ac184b53b395c907d40701f721daf8177",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vyperlang/vyper/issues/2455",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-m2v9-w374-5hj9",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-326xx/CVE-2024-32649.json
Normal file
55
CVE-2024/CVE-2024-326xx/CVE-2024-32649.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32649",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-25T18:15:09.350",
|
||||
"lastModified": "2024-04-25T18:15:09.350",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `sqrt` builtin can result in double eval vulnerability when the argument has side-effects. It can be seen that the `build_IR` function of the `sqrt` builtin doesn't cache the argument to the stack. As such, it can be evaluated multiple times (instead of retrieving the value from the stack). No vulnerable production contracts were found. Additionally, double evaluation of side-effects should be easily discoverable in client tests. As such, the impact is low. As of time of publication, no fixed versions are available.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-95"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-5jrj-52x8-m64h",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-35xx/CVE-2024-3508.json
Normal file
47
CVE-2024/CVE-2024-35xx/CVE-2024-3508.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-3508",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-25T18:15:09.567",
|
||||
"lastModified": "2024-04-25T18:15:09.567",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in Bombastic, which allows authenticated users to upload compressed (bzip2 or zstd) SBOMs. The API endpoint verifies the presence of some fields and values in the JSON. To perform this verification, the uploaded file must first be decompressed."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-3508",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274109",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-36xx/CVE-2024-3622.json
Normal file
59
CVE-2024/CVE-2024-36xx/CVE-2024-3622.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-3622",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-25T18:15:09.747",
|
||||
"lastModified": "2024-04-25T18:15:09.747",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-256"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-3622",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274400",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-36xx/CVE-2024-3623.json
Normal file
59
CVE-2024/CVE-2024-36xx/CVE-2024-3623.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-3623",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-25T18:15:09.980",
|
||||
"lastModified": "2024-04-25T18:15:09.980",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found when using mirror-registry to install Quay. It uses a default database secret key, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same database secret key. This flaw allows a malicious actor to access sensitive information from Quay's database."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-256"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-3623",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274404",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-36xx/CVE-2024-3624.json
Normal file
59
CVE-2024/CVE-2024-36xx/CVE-2024-3624.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-3624",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-25T18:15:10.170",
|
||||
"lastModified": "2024-04-25T18:15:10.170",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in how Quay's database is stored in plain-text in mirror-registry on the jinja's config.yaml file. This flaw allows a malicious actor with access to this file to gain access to Quay's database."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-256"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-3624",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274407",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-36xx/CVE-2024-3625.json
Normal file
59
CVE-2024/CVE-2024-36xx/CVE-2024-3625.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-3625",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-25T18:15:10.360",
|
||||
"lastModified": "2024-04-25T18:15:10.360",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in Quay, where Quay's database is stored in plain text in mirror-registry on Jinja's config.yaml file. This issue leaves the possibility of a malicious actor with access to this file to gain access to Quay's Redis instance."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-256"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-3625",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274408",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
73
README.md
73
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-25T18:00:39.836334+00:00
|
||||
2024-04-25T20:00:38.051859+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-25T17:25:05.903000+00:00
|
||||
2024-04-25T19:15:49.970000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,58 +33,43 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
246786
|
||||
246798
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `22`
|
||||
Recently added CVEs: `12`
|
||||
|
||||
- [CVE-2023-5675](CVE-2023/CVE-2023-56xx/CVE-2023-5675.json) (`2024-04-25T16:15:08.570`)
|
||||
- [CVE-2023-6484](CVE-2023/CVE-2023-64xx/CVE-2023-6484.json) (`2024-04-25T16:15:09.743`)
|
||||
- [CVE-2023-6544](CVE-2023/CVE-2023-65xx/CVE-2023-6544.json) (`2024-04-25T16:15:10.097`)
|
||||
- [CVE-2023-6596](CVE-2023/CVE-2023-65xx/CVE-2023-6596.json) (`2024-04-25T16:15:10.353`)
|
||||
- [CVE-2023-6717](CVE-2023/CVE-2023-67xx/CVE-2023-6717.json) (`2024-04-25T16:15:10.653`)
|
||||
- [CVE-2023-6787](CVE-2023/CVE-2023-67xx/CVE-2023-6787.json) (`2024-04-25T16:15:10.867`)
|
||||
- [CVE-2024-0874](CVE-2024/CVE-2024-08xx/CVE-2024-0874.json) (`2024-04-25T17:15:47.083`)
|
||||
- [CVE-2024-1102](CVE-2024/CVE-2024-11xx/CVE-2024-1102.json) (`2024-04-25T17:15:47.457`)
|
||||
- [CVE-2024-1139](CVE-2024/CVE-2024-11xx/CVE-2024-1139.json) (`2024-04-25T17:15:47.650`)
|
||||
- [CVE-2024-1657](CVE-2024/CVE-2024-16xx/CVE-2024-1657.json) (`2024-04-25T17:15:48.013`)
|
||||
- [CVE-2024-1726](CVE-2024/CVE-2024-17xx/CVE-2024-1726.json) (`2024-04-25T17:15:48.257`)
|
||||
- [CVE-2024-2467](CVE-2024/CVE-2024-24xx/CVE-2024-2467.json) (`2024-04-25T17:15:49.580`)
|
||||
- [CVE-2024-25624](CVE-2024/CVE-2024-256xx/CVE-2024-25624.json) (`2024-04-25T17:15:48.813`)
|
||||
- [CVE-2024-28240](CVE-2024/CVE-2024-282xx/CVE-2024-28240.json) (`2024-04-25T17:15:49.010`)
|
||||
- [CVE-2024-28241](CVE-2024/CVE-2024-282xx/CVE-2024-28241.json) (`2024-04-25T17:15:49.200`)
|
||||
- [CVE-2024-29660](CVE-2024/CVE-2024-296xx/CVE-2024-29660.json) (`2024-04-25T17:15:49.377`)
|
||||
- [CVE-2024-30890](CVE-2024/CVE-2024-308xx/CVE-2024-30890.json) (`2024-04-25T17:15:49.797`)
|
||||
- [CVE-2024-31574](CVE-2024/CVE-2024-315xx/CVE-2024-31574.json) (`2024-04-25T17:15:49.853`)
|
||||
- [CVE-2024-32236](CVE-2024/CVE-2024-322xx/CVE-2024-32236.json) (`2024-04-25T17:15:49.957`)
|
||||
- [CVE-2024-32358](CVE-2024/CVE-2024-323xx/CVE-2024-32358.json) (`2024-04-25T17:15:50.020`)
|
||||
- [CVE-2024-32467](CVE-2024/CVE-2024-324xx/CVE-2024-32467.json) (`2024-04-25T17:15:50.080`)
|
||||
- [CVE-2024-32481](CVE-2024/CVE-2024-324xx/CVE-2024-32481.json) (`2024-04-25T17:15:50.273`)
|
||||
- [CVE-2024-2905](CVE-2024/CVE-2024-29xx/CVE-2024-2905.json) (`2024-04-25T18:15:08.037`)
|
||||
- [CVE-2024-30939](CVE-2024/CVE-2024-309xx/CVE-2024-30939.json) (`2024-04-25T19:15:49.970`)
|
||||
- [CVE-2024-32645](CVE-2024/CVE-2024-326xx/CVE-2024-32645.json) (`2024-04-25T18:15:08.593`)
|
||||
- [CVE-2024-32646](CVE-2024/CVE-2024-326xx/CVE-2024-32646.json) (`2024-04-25T18:15:08.780`)
|
||||
- [CVE-2024-32647](CVE-2024/CVE-2024-326xx/CVE-2024-32647.json) (`2024-04-25T18:15:08.963`)
|
||||
- [CVE-2024-32648](CVE-2024/CVE-2024-326xx/CVE-2024-32648.json) (`2024-04-25T18:15:09.157`)
|
||||
- [CVE-2024-32649](CVE-2024/CVE-2024-326xx/CVE-2024-32649.json) (`2024-04-25T18:15:09.350`)
|
||||
- [CVE-2024-3508](CVE-2024/CVE-2024-35xx/CVE-2024-3508.json) (`2024-04-25T18:15:09.567`)
|
||||
- [CVE-2024-3622](CVE-2024/CVE-2024-36xx/CVE-2024-3622.json) (`2024-04-25T18:15:09.747`)
|
||||
- [CVE-2024-3623](CVE-2024/CVE-2024-36xx/CVE-2024-3623.json) (`2024-04-25T18:15:09.980`)
|
||||
- [CVE-2024-3624](CVE-2024/CVE-2024-36xx/CVE-2024-3624.json) (`2024-04-25T18:15:10.170`)
|
||||
- [CVE-2024-3625](CVE-2024/CVE-2024-36xx/CVE-2024-3625.json) (`2024-04-25T18:15:10.360`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `17`
|
||||
Recently modified CVEs: `12`
|
||||
|
||||
- [CVE-2023-5685](CVE-2023/CVE-2023-56xx/CVE-2023-5685.json) (`2024-04-25T16:15:08.777`)
|
||||
- [CVE-2023-5764](CVE-2023/CVE-2023-57xx/CVE-2023-5764.json) (`2024-04-25T16:15:08.903`)
|
||||
- [CVE-2023-5824](CVE-2023/CVE-2023-58xx/CVE-2023-5824.json) (`2024-04-25T16:15:09.027`)
|
||||
- [CVE-2023-6356](CVE-2023/CVE-2023-63xx/CVE-2023-6356.json) (`2024-04-25T16:15:09.513`)
|
||||
- [CVE-2023-6535](CVE-2023/CVE-2023-65xx/CVE-2023-6535.json) (`2024-04-25T16:15:09.970`)
|
||||
- [CVE-2023-7192](CVE-2023/CVE-2023-71xx/CVE-2023-7192.json) (`2024-04-25T17:15:46.553`)
|
||||
- [CVE-2024-0914](CVE-2024/CVE-2024-09xx/CVE-2024-0914.json) (`2024-04-25T17:15:47.280`)
|
||||
- [CVE-2024-2236](CVE-2024/CVE-2024-22xx/CVE-2024-2236.json) (`2024-04-25T17:15:49.467`)
|
||||
- [CVE-2024-22373](CVE-2024/CVE-2024-223xx/CVE-2024-22373.json) (`2024-04-25T17:25:05.903`)
|
||||
- [CVE-2024-22391](CVE-2024/CVE-2024-223xx/CVE-2024-22391.json) (`2024-04-25T17:25:05.903`)
|
||||
- [CVE-2024-25569](CVE-2024/CVE-2024-255xx/CVE-2024-25569.json) (`2024-04-25T17:25:05.903`)
|
||||
- [CVE-2024-31745](CVE-2024/CVE-2024-317xx/CVE-2024-31745.json) (`2024-04-25T16:15:11.227`)
|
||||
- [CVE-2024-33592](CVE-2024/CVE-2024-335xx/CVE-2024-33592.json) (`2024-04-25T17:25:05.903`)
|
||||
- [CVE-2024-4006](CVE-2024/CVE-2024-40xx/CVE-2024-4006.json) (`2024-04-25T17:25:05.903`)
|
||||
- [CVE-2024-4024](CVE-2024/CVE-2024-40xx/CVE-2024-4024.json) (`2024-04-25T17:25:05.903`)
|
||||
- [CVE-2024-4171](CVE-2024/CVE-2024-41xx/CVE-2024-4171.json) (`2024-04-25T17:25:05.903`)
|
||||
- [CVE-2024-4172](CVE-2024/CVE-2024-41xx/CVE-2024-4172.json) (`2024-04-25T17:25:05.903`)
|
||||
- [CVE-2024-25700](CVE-2024/CVE-2024-257xx/CVE-2024-25700.json) (`2024-04-25T18:15:07.817`)
|
||||
- [CVE-2024-25703](CVE-2024/CVE-2024-257xx/CVE-2024-25703.json) (`2024-04-25T19:15:49.520`)
|
||||
- [CVE-2024-25704](CVE-2024/CVE-2024-257xx/CVE-2024-25704.json) (`2024-04-25T19:15:49.597`)
|
||||
- [CVE-2024-25705](CVE-2024/CVE-2024-257xx/CVE-2024-25705.json) (`2024-04-25T19:15:49.660`)
|
||||
- [CVE-2024-25706](CVE-2024/CVE-2024-257xx/CVE-2024-25706.json) (`2024-04-25T19:15:49.720`)
|
||||
- [CVE-2024-25709](CVE-2024/CVE-2024-257xx/CVE-2024-25709.json) (`2024-04-25T19:15:49.777`)
|
||||
- [CVE-2024-28734](CVE-2024/CVE-2024-287xx/CVE-2024-28734.json) (`2024-04-25T19:15:49.850`)
|
||||
- [CVE-2024-28735](CVE-2024/CVE-2024-287xx/CVE-2024-28735.json) (`2024-04-25T19:15:49.910`)
|
||||
- [CVE-2024-28834](CVE-2024/CVE-2024-288xx/CVE-2024-28834.json) (`2024-04-25T18:15:07.903`)
|
||||
- [CVE-2024-31080](CVE-2024/CVE-2024-310xx/CVE-2024-31080.json) (`2024-04-25T18:15:08.253`)
|
||||
- [CVE-2024-31081](CVE-2024/CVE-2024-310xx/CVE-2024-31081.json) (`2024-04-25T18:15:08.367`)
|
||||
- [CVE-2024-31083](CVE-2024/CVE-2024-310xx/CVE-2024-31083.json) (`2024-04-25T18:15:08.470`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
114
_state.csv
114
_state.csv
@ -237025,7 +237025,7 @@ CVE-2023-5671,0,0,3cc2b9c1deb62dceb8ed00c2d8762fe59a768998f615d5585f03bd3dd8ce13
|
||||
CVE-2023-5672,0,0,b606b655dc2985c3ef150964e49693e9c24950f987c8d71991ac4c23768844b2,2024-01-04T17:08:45.617000
|
||||
CVE-2023-5673,0,0,70e5322ee14dd36a1fef1c30959d5e0c92016645b510b75cfd68b74728b861b6,2024-01-04T17:09:37.303000
|
||||
CVE-2023-5674,0,0,d18ab2900ed7e529311b11ab81d26d18c239ed8c3d95a148f12ff9fdb604f6d6,2024-01-04T18:49:34.613000
|
||||
CVE-2023-5675,1,1,2afc649da9f718a03c8832aa97b201cab4db6707ad961f549c65ca40d5f0491b,2024-04-25T17:25:05.903000
|
||||
CVE-2023-5675,0,0,2afc649da9f718a03c8832aa97b201cab4db6707ad961f549c65ca40d5f0491b,2024-04-25T17:25:05.903000
|
||||
CVE-2023-5676,0,0,c192e1317c9dd9e6e795afdc87fde3c831c86613079a468411f986e2046923eb,2023-11-22T22:39:25.137000
|
||||
CVE-2023-5677,0,0,bf0403fa11a7a963d15423f4bb38a7680c1d99fd326f3defc8c62611e429b9f6,2024-02-13T00:38:00.893000
|
||||
CVE-2023-5678,0,0,10ee8f19cb0834ae8a34613205f620c83611435a6974173b992451221b4bf83e,2023-11-30T22:15:09.723000
|
||||
@ -237035,7 +237035,7 @@ CVE-2023-5681,0,0,c8515c91e7de329908b78ff5da5c4b7570295fc0bfb78f4f5768b1289e9cf5
|
||||
CVE-2023-5682,0,0,f6333687ab0645a1fd8953eb4ecc238bde4805dd1880c1dd8846d7fce2a7def8,2024-04-11T01:23:04.923000
|
||||
CVE-2023-5683,0,0,cb0f33b1d08b1ce9cc57c71e5c40d5b9f1d2607c9aa1a5ffa32c5fd0a2a17ee1,2024-04-11T01:23:05.010000
|
||||
CVE-2023-5684,0,0,880c97a624c250bf87e546dfac2388f6a5459910d66d603bc0971081b810b8e1,2024-04-11T01:23:05.100000
|
||||
CVE-2023-5685,0,1,c003834f963e781af89ebdad00b9567c0a77e3aa6f42eea0e12da658f72c250c,2024-04-25T16:15:08.777000
|
||||
CVE-2023-5685,0,0,c003834f963e781af89ebdad00b9567c0a77e3aa6f42eea0e12da658f72c250c,2024-04-25T16:15:08.777000
|
||||
CVE-2023-5686,0,0,14e9a4f551dedb4d867ff16706440a6a3cb2d418db4a34eccb414d1c48955525,2024-01-21T03:20:51.297000
|
||||
CVE-2023-5687,0,0,163c067ad4e8b872c5abffc6eb0e33e3ec476cd671e69e540f448f37eb4f9636,2023-10-27T18:51:42.730000
|
||||
CVE-2023-5688,0,0,06a783b4a174a26699fc289ad2f278ef95fec4ff44eb7fd150fc30bbf083b5a6,2023-10-27T18:51:36
|
||||
@ -237109,7 +237109,7 @@ CVE-2023-5760,0,0,b26c322f998e6825a09e7c5127ec0e45a89874e1999d9532ece8cb05bf015c
|
||||
CVE-2023-5761,0,0,2da90484712dc730b83c569fce9e74f344e1096a8227445e34e8b1b3bda148f4,2023-12-12T15:50:05.353000
|
||||
CVE-2023-5762,0,0,995fc5f6a706edf8dbe1791dcc11a016a4bb9d17014abdfb2902d3f921ab2baa,2023-12-08T15:02:37.390000
|
||||
CVE-2023-5763,0,0,4ff2accd99d449a0742854b854d08d639fb4972bda32ba25f042cd82d146e614,2023-11-13T19:55:13.637000
|
||||
CVE-2023-5764,0,1,5f85602bb7701613217a37a59d74c36afc9670c24213af655bc54e0c8dc2d5b4,2024-04-25T16:15:08.903000
|
||||
CVE-2023-5764,0,0,5f85602bb7701613217a37a59d74c36afc9670c24213af655bc54e0c8dc2d5b4,2024-04-25T16:15:08.903000
|
||||
CVE-2023-5765,0,0,e9be9ac85c17528e84195bedf3d2830fc278ff555389e845d31a431003373392,2023-11-09T01:26:48.773000
|
||||
CVE-2023-5766,0,0,78f2d9d8ac7b95b8a4e5dc0e8997029ac798051d62cff83a1d9b45e59b35751f,2023-11-09T01:24:32.057000
|
||||
CVE-2023-5767,0,0,ad794c53a0f217448e62fe696cd061911833f672e0cea2f495554452a7466841,2023-12-07T17:54:21.037000
|
||||
@ -237166,7 +237166,7 @@ CVE-2023-5820,0,0,58b1f50113fd55505ed149f5b7bb49dbfd0a0f6f9f535a05335349c658343b
|
||||
CVE-2023-5821,0,0,cd4303955b9a7b3fe4b37581e654f24a81586d7580cc2ef9208ebb1641da3356,2023-11-07T04:24:27.417000
|
||||
CVE-2023-5822,0,0,b67ceab18bbb1fb0f9fb81217782253fb2873c03b0c31906a9c6b3b9849c939f,2023-11-29T19:15:14.147000
|
||||
CVE-2023-5823,0,0,d7f788774a2604af95c673fde3d28e3d353cbc4a5a4bfbe3d382e943ed035843,2023-11-14T16:18:57.250000
|
||||
CVE-2023-5824,0,1,cdab4b76ac240ba49e3863e4d4f68cbb853364f4a1b487ece0111a5626020c5d,2024-04-25T16:15:09.027000
|
||||
CVE-2023-5824,0,0,cdab4b76ac240ba49e3863e4d4f68cbb853364f4a1b487ece0111a5626020c5d,2024-04-25T16:15:09.027000
|
||||
CVE-2023-5825,0,0,0399606a6ebebea85a4c7dc21bd0805603b974624a6b245cb9ef9839d4896e32,2023-11-14T17:00:25.433000
|
||||
CVE-2023-5826,0,0,dfa886a374966eb99bebb692d38b2d2da634c5e6ea16dec23011361fe53252dc,2024-04-11T01:23:08.860000
|
||||
CVE-2023-5827,0,0,91233a7921eea4d64db8679e624be8b385b9e9cdbdd67eba5d3fa15262c38b1b,2024-04-11T01:23:08.953000
|
||||
@ -237628,7 +237628,7 @@ CVE-2023-6352,0,0,a7c9f6deee309d44509b6c9208a201145230316f41723e551e729328a3c70e
|
||||
CVE-2023-6353,0,0,24c2382fdf0767add5b7141089ec0613fc1eb47c1182ffa2cb7b84f6aeb0444b,2023-12-06T18:18:09.320000
|
||||
CVE-2023-6354,0,0,2bf459d55b21a066ff498992abe18be99d182acea7ca336905eeed3616a89b88,2023-12-06T18:18:01.950000
|
||||
CVE-2023-6355,0,0,6fdeecd4f0ee699805371cfc1ea0606b87b44ad25b2626176d3ef32b51ed450e,2024-01-02T15:26:45.317000
|
||||
CVE-2023-6356,0,1,bde87d9abed8a4bf595c9622ff2deeecfc04a9b4d596b6d93211e8c79cb3a6b5,2024-04-25T16:15:09.513000
|
||||
CVE-2023-6356,0,0,bde87d9abed8a4bf595c9622ff2deeecfc04a9b4d596b6d93211e8c79cb3a6b5,2024-04-25T16:15:09.513000
|
||||
CVE-2023-6357,0,0,bbd74398a0b444bacefe820e1535d1409864c58ab45fa3a132d88d21bbd97f01,2023-12-11T20:49:14.117000
|
||||
CVE-2023-6359,0,0,eec65d1d46b6f4ae76547d3688eca6bb28b35f6576162bb0891e35895c51f4af,2023-11-30T20:36:00.537000
|
||||
CVE-2023-6360,0,0,9012dbc9de46bbd36921c61a8fd2b617642d26aa0bcbe12d97c341719ee01d79,2023-12-06T00:38:20.297000
|
||||
@ -237730,7 +237730,7 @@ CVE-2023-6478,0,0,a2204e2f69cdc6c882d51d5123b56b5f88413c8782871b6a0414da718fbf03
|
||||
CVE-2023-6481,0,0,7bf3f957b787a6827701226e0ca3372c64cd44f2ab0cfcaeb6091c2fdc472edd,2023-12-07T19:57:46.020000
|
||||
CVE-2023-6482,0,0,4d9c5a1788fe7dfbaf4eca53c69fe7a1ffbc45cd5b295a4cce9c5f95cb7c7755,2024-02-01T04:14:20.480000
|
||||
CVE-2023-6483,0,0,4d97a6b64ab24b94d49daa44a79554fbeead9ae7d46cd7c731ffa4efefc4885f,2023-12-22T20:23:00.340000
|
||||
CVE-2023-6484,1,1,70fda0457d3cf00f2d12882d228af9219459c18b0be3209649da6bf3bb62a852,2024-04-25T17:25:05.903000
|
||||
CVE-2023-6484,0,0,70fda0457d3cf00f2d12882d228af9219459c18b0be3209649da6bf3bb62a852,2024-04-25T17:25:05.903000
|
||||
CVE-2023-6485,0,0,d84b1f2fa339ee3fbe00211d49269bf9012e27d7ef753ce7f80b70bff072340c,2024-01-08T19:31:52.377000
|
||||
CVE-2023-6486,0,0,c81210cab8dc9e396502360bc8e7405406f09e8235326da2aa05788514a5507a,2024-04-10T13:24:00.070000
|
||||
CVE-2023-6488,0,0,a2d2155218f4cd12cbd7cf86a1d373ca9d8739c736f0c67e222296ebea42699d,2023-12-22T19:30:36.993000
|
||||
@ -237773,12 +237773,12 @@ CVE-2023-6531,0,0,72b65d47f2191f5c2b848fd880cd1cdca9d89e892c5d11530a6913981eda25
|
||||
CVE-2023-6532,0,0,f738506a21aaa4b97e1d01a3f1b1b963270b7eece9c06e5ade2e7f91cd03ea0f,2024-01-11T20:04:00.773000
|
||||
CVE-2023-6533,0,0,dcd64452143eb3dc7b1d81d028067d07f5ed73ffb53920de9ac74711589702ac,2024-02-22T19:07:27.197000
|
||||
CVE-2023-6534,0,0,d1014e93c47cb4df91754765b442aa44e330a073857ff83c407b8638b2e2b237,2024-01-12T14:15:49
|
||||
CVE-2023-6535,0,1,5da9b8bdeaf50d3c67aabb006b5b9591fa308aa13793c7c151f558b8df852c3a,2024-04-25T16:15:09.970000
|
||||
CVE-2023-6535,0,0,5da9b8bdeaf50d3c67aabb006b5b9591fa308aa13793c7c151f558b8df852c3a,2024-04-25T16:15:09.970000
|
||||
CVE-2023-6536,0,0,306d35a4d2e64b27f32ba44d255c645fda283c56655a4025154895afc9a4229d,2024-04-15T14:15:07.447000
|
||||
CVE-2023-6538,0,0,3a39b4ad035054d825d9bc8e0c8cc78afbd8a886d818da82d3bd686b80edb3a0,2023-12-14T17:02:15.203000
|
||||
CVE-2023-6540,0,0,e8a4000d3c1c7c36a8e07e1b70f09f28354d68ee96913653b539560cbc6666cf,2024-01-10T20:23:28.493000
|
||||
CVE-2023-6542,0,0,3003b22c56226936503fcbd3e01db5b83c31e11bacc81c5b330ec2a4d5df4705,2023-12-18T20:00:10.587000
|
||||
CVE-2023-6544,1,1,0eadf8b680848dcd7ff77536b2c7cd18c9612c5693540daf3e9c0fe2b58589bb,2024-04-25T17:24:59.967000
|
||||
CVE-2023-6544,0,0,0eadf8b680848dcd7ff77536b2c7cd18c9612c5693540daf3e9c0fe2b58589bb,2024-04-25T17:24:59.967000
|
||||
CVE-2023-6545,0,0,e8fad407643f309508d7beca42d5ec4316241428ccdf0ffe16ab6d5de81adac9,2024-02-15T11:15:10.127000
|
||||
CVE-2023-6546,0,0,8a0376636dd2953004c2fc1d2f0124a770d41464e2479ea6b9c7bf8e32b774cc,2024-04-03T00:15:07.823000
|
||||
CVE-2023-6547,0,0,2916ee27da61a814e8994bd469cb1aad4b6a948d5260e9e94d921cc96ef53cf1,2023-12-14T19:31:10.497000
|
||||
@ -237825,7 +237825,7 @@ CVE-2023-6592,0,0,64cc414903b2337cb0bd8a5539f823df2fd800285d9deb31df562c295ab75b
|
||||
CVE-2023-6593,0,0,e3b3e08c9100a5e7cf14c217c401234f02853669dddb630e64650e50aa403cb9,2023-12-15T14:38:03.057000
|
||||
CVE-2023-6594,0,0,d3868296aafc64b6514f2cb5804c13a0687b79a1bf9d5ede2da8f4a451319021,2024-01-11T23:32:17.207000
|
||||
CVE-2023-6595,0,0,36c4a8ec5f87bb2afaaafb9bf8ff027d48fb76423d85051bd988412db95a161f,2023-12-19T17:51:54.827000
|
||||
CVE-2023-6596,1,1,34525b234858a21b8458c73368b56e0305ab54584c7c4568eb20ecffa728db59,2024-04-25T17:24:59.967000
|
||||
CVE-2023-6596,0,0,34525b234858a21b8458c73368b56e0305ab54584c7c4568eb20ecffa728db59,2024-04-25T17:24:59.967000
|
||||
CVE-2023-6597,0,0,0ad4260f4e12f5442e67ca98f3e26ae0d54d4cd318021b60e0b78bb11088338f,2024-04-03T15:15:51.783000
|
||||
CVE-2023-6598,0,0,8b8f7f87f85d85987c85ed76cf906c53121cfbe34e11294d4d2ee1e26a9f8779,2024-01-17T21:24:33.233000
|
||||
CVE-2023-6599,0,0,a782437846e35b14cfc1bab743463edcd34abeb3c74717f8ec091163e3cb6d86,2023-12-12T17:22:17.503000
|
||||
@ -237912,7 +237912,7 @@ CVE-2023-6709,0,0,91ad521595673e9f900cc67b519ceef81e072d2cde6bd61134ff43d941e150
|
||||
CVE-2023-6710,0,0,17eeccecd49bbe640dfb13fe6d0fb81b3a464ea4613067e730e03201a3ec6b86,2024-03-18T22:15:07.537000
|
||||
CVE-2023-6711,0,0,1272050003612eeabf483df167c872619b5a7a718f82d7efc2ef0df52bffe676,2023-12-28T19:03:00.580000
|
||||
CVE-2023-6716,0,0,c5de23f942df1b587dad5bba434231319fdb9bc5ad23f5fda3137bdc12dd0a5f,2024-02-09T09:15:07.733000
|
||||
CVE-2023-6717,1,1,10759856e7a5b7e196b87fe491b866dea0353174d2a321e579a5e4361a4df30e,2024-04-25T17:24:59.967000
|
||||
CVE-2023-6717,0,0,10759856e7a5b7e196b87fe491b866dea0353174d2a321e579a5e4361a4df30e,2024-04-25T17:24:59.967000
|
||||
CVE-2023-6718,0,0,800326da020c67b5d16628e725304c35ffe57eb2871b679e54fec620b82938a2,2023-12-18T17:39:26.267000
|
||||
CVE-2023-6719,0,0,9d5dfad7b583b5ed71fda0877cd09b5d62ce26e2849f2a049357d7ee8d8ecdd4,2023-12-18T17:47:32.683000
|
||||
CVE-2023-6720,0,0,f92ecd0810e967fb2e290113359252cc0605767095d771035373bf698cc8ef63,2023-12-18T17:45:01.760000
|
||||
@ -237968,7 +237968,7 @@ CVE-2023-6781,0,0,606133b53d71d301d434687c95e9541c45256035c97457e3cef427e3e2fa86
|
||||
CVE-2023-6782,0,0,9d49a53aeef1daeb1b880b1c10125bd540373eabc0b6ef10f8f3d1b558ba4034,2024-01-18T16:11:09.587000
|
||||
CVE-2023-6784,0,0,8a2dc120c2f7c09cd65b30de205a120bba14591ed7954e6b475e7a765c9d6768,2023-12-28T20:16:01.087000
|
||||
CVE-2023-6785,0,0,6032c6c6494d8ab6426166c8858fe7b4f5d0ea17027dec5e421fd5772b1b9f25,2024-03-13T18:16:18.563000
|
||||
CVE-2023-6787,1,1,c65105665eaaa00b82a29fe351c93a5103802f058c32e8e730ca7368fbab3721,2024-04-25T17:24:59.967000
|
||||
CVE-2023-6787,0,0,c65105665eaaa00b82a29fe351c93a5103802f058c32e8e730ca7368fbab3721,2024-04-25T17:24:59.967000
|
||||
CVE-2023-6788,0,0,50e116b22f39b4eda80be0e0174e50805515a5317ae162b416827d632334043b,2024-01-11T23:33:05.333000
|
||||
CVE-2023-6789,0,0,58210ee945774473d3672ef0a5317f3e9fd1821a6536ceabc670f03a82b8c1b1,2023-12-18T18:54:39.670000
|
||||
CVE-2023-6790,0,0,59d4d6839301f4b4ea57b622791c925b2ceacc81b1978d57ea06e29921fd8384,2023-12-18T18:53:56.697000
|
||||
@ -238311,7 +238311,7 @@ CVE-2023-7188,0,0,fe4d9025095df26d959f210a69a2760922fc73505e5cf1d109482aea8caca3
|
||||
CVE-2023-7189,0,0,394104872b51d52e5ce0bb342811c2b39833af1574be7a8d59e381bebf6567bd,2024-04-11T01:23:40.690000
|
||||
CVE-2023-7190,0,0,5c76dd156689a2e2d27938b6355694f91152f571e94286587d1916ae6b86bff9,2024-04-11T01:23:40.777000
|
||||
CVE-2023-7191,0,0,3e2b5f18b7a3605368089faf4ff0a655a5b20299e41a1b56587fcd587f16bd8e,2024-04-11T01:23:40.893000
|
||||
CVE-2023-7192,0,1,9048ecb6f580e5c8408fa2e3bdb1db47d0d0e6013dcf9892b4743ddb1e8561ab,2024-04-25T17:15:46.553000
|
||||
CVE-2023-7192,0,0,9048ecb6f580e5c8408fa2e3bdb1db47d0d0e6013dcf9892b4743ddb1e8561ab,2024-04-25T17:15:46.553000
|
||||
CVE-2023-7193,0,0,03ba6fbb5e1a4552fc2b6b0fc14931ff65c633a2370d29bddfddb1c21ee90140,2024-04-11T01:23:41.023000
|
||||
CVE-2023-7194,0,0,c12012004827cd0bc34ce11f51f4d80b4388d10ba3ae2687522e188646b70ac8,2024-01-25T02:02:01.610000
|
||||
CVE-2023-7198,0,0,5606627204fd1346b6fe26c836439a1783648ce0b7fc4e92446c427eb2e96f6a,2024-02-27T14:20:06.637000
|
||||
@ -239042,7 +239042,7 @@ CVE-2024-0869,0,0,39eb12d4def5ace38cccd71318a17cc1945f05a59b2d0897303b6745b871b8
|
||||
CVE-2024-0871,0,0,9f662ac78f6b1a329c54044768cbd47d14bc8d8fd129fd78afaf32634a3ad01c,2024-03-13T18:16:18.563000
|
||||
CVE-2024-0872,0,0,0924bc55b3c6385ba217ce4e13ea2506dd75654857395c8dd6e4d9ff36d14ecf,2024-04-10T13:24:00.070000
|
||||
CVE-2024-0873,0,0,ae04380d23748d0f0a688c94a994d5ec2180cdc927be703e44a79b3aa33c7fb2,2024-04-10T13:24:00.070000
|
||||
CVE-2024-0874,1,1,f02ef6c1d4bafcba7b95ff91c5736ee3f1719d5d1b6b3f6eba65645f7e5d39ca,2024-04-25T17:24:59.967000
|
||||
CVE-2024-0874,0,0,f02ef6c1d4bafcba7b95ff91c5736ee3f1719d5d1b6b3f6eba65645f7e5d39ca,2024-04-25T17:24:59.967000
|
||||
CVE-2024-0879,0,0,71dbf86688bbf3d39fdd16f3840204e31946256b985438bb8d263e8d387364ad,2024-01-31T19:16:07.630000
|
||||
CVE-2024-0880,0,0,12dd80add99b4278efc505ba644272f57307bd9169ca281bf7019fd00c56c698,2024-04-11T01:24:11.007000
|
||||
CVE-2024-0881,0,0,f5a1e6e9b750ec678efb854ce078d7ad08217191215f6280dc39f8ef88d758b6,2024-04-12T12:44:04.930000
|
||||
@ -239070,7 +239070,7 @@ CVE-2024-0907,0,0,736d9a373e93547114922fac343df53c487c280e59648bef9a3cecc6379f90
|
||||
CVE-2024-0909,0,0,7864e9d833556eb295eb67e87cebb39c8d9b11d41ed1f5327a80b30fe013438c,2024-02-08T20:07:51.410000
|
||||
CVE-2024-0911,0,0,5f8186e1a077698fb2fa1e99d28cc6e32ac8b7b7afb205a3a02bc10c8ca698f0,2024-02-14T18:15:48.077000
|
||||
CVE-2024-0913,0,0,cc9dbbd0e1eb40baf69d2dc96719798ae1dcba5ab6fc531754d7fd6a8c7e7f1d,2024-03-29T12:45:02.937000
|
||||
CVE-2024-0914,0,1,7f22c9d9b9fd7b20f24efa4809ae53ac72b9c07a501ffa9df44287c5ae5e04b9,2024-04-25T17:15:47.280000
|
||||
CVE-2024-0914,0,0,7f22c9d9b9fd7b20f24efa4809ae53ac72b9c07a501ffa9df44287c5ae5e04b9,2024-04-25T17:15:47.280000
|
||||
CVE-2024-0917,0,0,1096c18fb8e959955c123559a721fd9eb8bfd390fb54eac5e8167e50a31dc158,2024-03-07T15:15:08.257000
|
||||
CVE-2024-0918,0,0,665fb2ab3d0de8862f8c0f360fe055729484bae6812ecb9bc73647194d5411aa,2024-04-11T01:24:12.193000
|
||||
CVE-2024-0919,0,0,589179645f375446af0d6856749f5d8581b8fa706e54f9dca7ffc4f53fa26164,2024-04-11T01:24:12.283000
|
||||
@ -239235,7 +239235,7 @@ CVE-2024-1095,0,0,df3c9b754a366dd4bae7a412155dd92109950a1d3409f2396655e3fd5c46a9
|
||||
CVE-2024-1096,0,0,0511628751a4d3c33dfebd06790b048648e8a66a1c69f04faa3a9a5040d5bc55,2024-03-21T02:51:34.720000
|
||||
CVE-2024-1098,0,0,415ccc1f81ef8bc8a03b5ae28bbcf6873771bb680fbb58097e107325c51cced7,2024-04-11T01:24:20.073000
|
||||
CVE-2024-1099,0,0,b9d17eb989efcb9f86624a5ec60bed0af4b6dc448bf02db321a08bc2b96355af,2024-04-11T01:24:20.157000
|
||||
CVE-2024-1102,1,1,50296c9908c91c2b4d0df0fdc5a6a983204e3c309c572a536009f9bc8b8f7a0e,2024-04-25T17:24:59.967000
|
||||
CVE-2024-1102,0,0,50296c9908c91c2b4d0df0fdc5a6a983204e3c309c572a536009f9bc8b8f7a0e,2024-04-25T17:24:59.967000
|
||||
CVE-2024-1103,0,0,9ae95595599b6db591a9274da0d5a85146610521126dbe5776496052566f38a4,2024-04-11T01:24:20.247000
|
||||
CVE-2024-1104,0,0,4986f7d9d93ce17dfdb3c18d1dbdea210136d53ee2c0a156b2b261fba310efd6,2024-02-22T19:07:27.197000
|
||||
CVE-2024-1106,0,0,704e011d119ecc0a0a6c94048139401779c5b0cce30a694f65f63b54706d619d,2024-02-27T14:20:06.637000
|
||||
@ -239268,7 +239268,7 @@ CVE-2024-1135,0,0,2f6bc90f330f2812b6ceb34e2fa1ad9c1c5eca9415bce0719ca3f92f74cd24
|
||||
CVE-2024-1136,0,0,609070256c4defa988e1113275bf8273fe15f50574e00ed3dcfde13143e471cc,2024-02-28T14:06:45.783000
|
||||
CVE-2024-1137,0,0,9f8c1cf74ca4778ab709faeea998997368a7f042480977a7d6535f2dd892d7f7,2024-03-13T12:33:51.697000
|
||||
CVE-2024-1138,0,0,0bb26866b03e9dd351d8284004467140fe2cfdfbd72af071fda864e5a2dc9e58,2024-03-13T12:33:51.697000
|
||||
CVE-2024-1139,1,1,fcb53b016a89db0029717168444fac33ac9c8268f043f5b1ef53bbb358230373,2024-04-25T17:24:59.967000
|
||||
CVE-2024-1139,0,0,fcb53b016a89db0029717168444fac33ac9c8268f043f5b1ef53bbb358230373,2024-04-25T17:24:59.967000
|
||||
CVE-2024-1140,0,0,113ab98fbbd3f38fc36026b5aef44eb4b38cd7d347ba07fcabb6b9d9a69118a5,2024-02-27T19:17:32.253000
|
||||
CVE-2024-1141,0,0,2d32c65ed599159df83e8a47a1f55987e8e9877658103a494dc3a1f00162db73,2024-04-01T15:52:06.640000
|
||||
CVE-2024-1142,0,0,00d2baa79f6b61708bb1dbc0a1a3ef8f1bea10f64fa60e391934eddcb51481c3,2024-03-21T12:58:51.093000
|
||||
@ -239683,7 +239683,7 @@ CVE-2024-1652,0,0,713b08425ff0d91e3a1f6c5fcc742628e562c3c90970b08c1ec718d504f2db
|
||||
CVE-2024-1653,0,0,875a0ad46333e774de4f895ea6a9ead74cdbdb6ae6c4ddb02a960bfb85513ae4,2024-02-27T14:19:41.650000
|
||||
CVE-2024-1654,0,0,ac0509f6deb6f3ed4a3e95d25ed4dd3bdd67f0f87914e461aded05c6f6644ae7,2024-03-14T12:52:09.877000
|
||||
CVE-2024-1655,0,0,4b77006431ba07ecbc46dae3c8a08b9d1a8f7126e8ade7abcd81e5f88d783104,2024-04-15T13:15:31.997000
|
||||
CVE-2024-1657,1,1,d79f2f0b3f60eb4c02b99df35a253ec114d3722d77bf73e0ecf5a2388e076951,2024-04-25T17:24:59.967000
|
||||
CVE-2024-1657,0,0,d79f2f0b3f60eb4c02b99df35a253ec114d3722d77bf73e0ecf5a2388e076951,2024-04-25T17:24:59.967000
|
||||
CVE-2024-1658,0,0,bd2757c2314dc2f8bd52ce15b18a6ca41069d2e3f9ff401d7a725ad82b1db09d,2024-03-18T19:40:00.173000
|
||||
CVE-2024-1660,0,0,068c83f9afc694d855bcbb99610bd3ca5f918af7baf81b6ceb2a3be3520f6bf7,2024-04-15T13:15:31.997000
|
||||
CVE-2024-1661,0,0,45603ab3f5ace946374d33296115c15ac156a13c133622c70b4b519036cfa292,2024-04-11T01:24:28.913000
|
||||
@ -239732,7 +239732,7 @@ CVE-2024-1720,0,0,5a5ae92be6fac7e3fb5aac9fbad05927fd3add77d067fc4c0b5a11a75c8da7
|
||||
CVE-2024-1722,0,0,44f76876458eb58496685e90ceedacd781a70fa58f68fffc91c47d3fb5ef0258,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1723,0,0,6ede5956ec1f8bc932d476f2c9a22da838daca98409da5821be1a9704022149c,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1725,0,0,d50733b72e0a7510fad89b9c9b7bf0d2638e14767cb02af892440874a7d9300e,2024-04-03T00:15:08.563000
|
||||
CVE-2024-1726,1,1,89dad850dcc0e1a88340678c957b303bc297c72f3495f60c2d2a69bcbd7f390b,2024-04-25T17:24:59.967000
|
||||
CVE-2024-1726,0,0,89dad850dcc0e1a88340678c957b303bc297c72f3495f60c2d2a69bcbd7f390b,2024-04-25T17:24:59.967000
|
||||
CVE-2024-1727,0,0,a7ba950431c841d63e5eda97447121909cf0b94a0e0f2a68d97b3e6ce11f4afe,2024-04-16T12:15:09.843000
|
||||
CVE-2024-1728,0,0,cc77f96c808327822a9f33d38543fe59887a1a70be257d5713ef1082e9fb55b5,2024-04-10T19:49:51.183000
|
||||
CVE-2024-1729,0,0,e89faa43e2aac352951c59ebd22691fbb83ea1dce43d3c94d1423497ec4f419a,2024-04-16T12:15:09.930000
|
||||
@ -241187,7 +241187,7 @@ CVE-2024-22356,0,0,d81d64e63fe9b642cced3e4c94acc5e30f0113b5fdf3bed9ebc6028d04aab
|
||||
CVE-2024-22357,0,0,7cc996f78175ddc6bc31990b99ad084fcec784716961a600ab611825166f830e,2024-04-12T12:43:57.400000
|
||||
CVE-2024-22358,0,0,bedc70eb5204faddc4ac58f3a3f1fe91ad78c0a0e3e3e71d749223ef4e09fea5,2024-04-15T13:15:31.997000
|
||||
CVE-2024-22359,0,0,a78ef4de6d794c3736fa556f8e489df7f77fbc569555c9098f3af17456ad2680,2024-04-15T13:15:31.997000
|
||||
CVE-2024-2236,0,1,80952342d7ffef3a7dc379705ae844588b9eba4a6660760e9c15f1d1ea642b37,2024-04-25T17:15:49.467000
|
||||
CVE-2024-2236,0,0,80952342d7ffef3a7dc379705ae844588b9eba4a6660760e9c15f1d1ea642b37,2024-04-25T17:15:49.467000
|
||||
CVE-2024-22360,0,0,b51802432bc04c6d8daeffb43226824cdd8f27647664bb8d35541e7d6a53f5a2,2024-04-03T17:24:18.150000
|
||||
CVE-2024-22361,0,0,2cb34447b61b8680c66e6f142987700b31f9f16d4e9b8d748c59e5b8ad5a9a29,2024-02-16T21:35:31.953000
|
||||
CVE-2024-22362,0,0,4494985f455ed96204ebe979f8c6258ea6c0e638d2824040e5afe72aebdf02d6,2024-04-11T01:24:44.947000
|
||||
@ -241200,7 +241200,7 @@ CVE-2024-2237,0,0,95217e309830b6a01494ecd2c39d8ef034463910771c1bc92cd3bee697f61f
|
||||
CVE-2024-22370,0,0,13df6251176042b21f4cc7eccb2248918a53b76e3179e3ca6bd1e1e82fbd0a45,2024-01-12T19:29:18.790000
|
||||
CVE-2024-22371,0,0,4bde0f360e03417565b1053dc8e4d6f3c0a609d9b4bebdd79ac08f66edab383f,2024-02-26T16:32:25.577000
|
||||
CVE-2024-22372,0,0,b1b41923d4d5e3a62f9aafb5eb6f291d0486263d2806b04c051fd8c8c54bfad1,2024-01-30T22:17:49.987000
|
||||
CVE-2024-22373,0,1,d1f4f666dc187ae0b555d619241ab2f3d3391d848ae198bb44bf62de2ef7063b,2024-04-25T17:25:05.903000
|
||||
CVE-2024-22373,0,0,d1f4f666dc187ae0b555d619241ab2f3d3391d848ae198bb44bf62de2ef7063b,2024-04-25T17:25:05.903000
|
||||
CVE-2024-2238,0,0,afd0d461b63ffbf0cdec79f63894ae69a7d59a0b22846a34ff25432e2a9728b9,2024-03-13T18:15:58.530000
|
||||
CVE-2024-22380,0,0,fbb17e03b7392116b029e62cf5fc227ae3083f2acc9171774ca51468933ea1b7,2024-01-30T22:14:24.967000
|
||||
CVE-2024-22383,0,0,810a6e86f28ef493260b232f9a886a5828bc2cb5687e22ad7a4e8bfc9a3765be,2024-03-05T13:41:01.900000
|
||||
@ -241208,7 +241208,7 @@ CVE-2024-22386,0,0,9bb868760c88683007f1f54485a980666afe5aeeb8bc008d8d811fea3dbfe
|
||||
CVE-2024-22388,0,0,da7359316abb172866812a3012c9f9fa4c74a86ab41d23e55880cf90ab42d985,2024-02-14T20:59:09.660000
|
||||
CVE-2024-22389,0,0,96781b551653662b24bed6c6167841567f0e5e4776b3fb44064036280367773a,2024-02-14T18:04:45.380000
|
||||
CVE-2024-2239,0,0,39e7f275af33a75dc9ccc5324d6f8398d75467c16638ade753370c3004c45df2,2024-03-13T18:15:58.530000
|
||||
CVE-2024-22391,0,1,5b72b38a377d92d077458f0f85cda136688026b001632237d550d93caba42343,2024-04-25T17:25:05.903000
|
||||
CVE-2024-22391,0,0,5b72b38a377d92d077458f0f85cda136688026b001632237d550d93caba42343,2024-04-25T17:25:05.903000
|
||||
CVE-2024-22393,0,0,baae8029e1587725a02d8ccb1fb298e540bb69b478da7728d31a9731926e8718,2024-02-22T19:07:27.197000
|
||||
CVE-2024-22394,0,0,fdf2846817bf0321d479c4aa67f29d797db24255733cd4d946cc68e44bfccdc7,2024-02-14T21:46:40.537000
|
||||
CVE-2024-22395,0,0,6711e106c8c4c38c682ec5a4d729c0e15c9677b5ef0302671313a8f4838fafc1,2024-02-26T13:42:22.567000
|
||||
@ -242263,7 +242263,7 @@ CVE-2024-2463,0,0,1000d1bb0e067b3946ef610a261a2a460c1b4a25dacc3b01af2944abb9dde9
|
||||
CVE-2024-2464,0,0,258119b056e9fce5dd31506f1eb25477966980981d44726c57b4011817bcc3d6,2024-03-21T15:24:35.093000
|
||||
CVE-2024-2465,0,0,8a7263ec4d3d7ab7fb04bd888fa4508d9ece49d5518f3ba48a9225f207c19c22,2024-03-21T15:24:35.093000
|
||||
CVE-2024-2466,0,0,9b693c57905d5c9df2784625e99d8311f4169bf72ecd0a55d11b3cf49c2f3f64,2024-03-27T12:29:30.307000
|
||||
CVE-2024-2467,1,1,ac29470c2382b30093397872ff618ca67c4cc38c0d78ff75347f91bb673bc37f,2024-04-25T17:24:59.967000
|
||||
CVE-2024-2467,0,0,ac29470c2382b30093397872ff618ca67c4cc38c0d78ff75347f91bb673bc37f,2024-04-25T17:24:59.967000
|
||||
CVE-2024-2468,0,0,acae2326336f2322a6baa0f217a4c4dd168ec20ba1dcea9f5e39d94f312a5562,2024-03-25T01:51:01.223000
|
||||
CVE-2024-24680,0,0,b7924ab65b210d54927b5f43c8c8edcd2081b2a565260632ae3116c1f0f333c4,2024-04-20T03:15:06.820000
|
||||
CVE-2024-24681,0,0,09faa6afb97dca8c5a40342ef46ed8da48a59db97ae4367588d4084f35b12a3b,2024-03-28T08:15:26.453000
|
||||
@ -242771,7 +242771,7 @@ CVE-2024-25559,0,0,b710ef2f87d2510e81b25ebbc4243b848284fc64bfa4b8a44d47d25b0e965
|
||||
CVE-2024-2556,0,0,5a3397ecc5fdef519ab75d3f33842b25dc006ffb41e1f908e35adb09560e9ffb,2024-04-11T01:25:27.740000
|
||||
CVE-2024-25567,0,0,bbb8c64eb3dcee3e8e89951734f837d0c3bea66c11459a30529f4c9133593805,2024-03-22T12:45:36.130000
|
||||
CVE-2024-25568,0,0,64eb53482937f270c14cf377745a1f7d8d5cbc3555eb58e76e7de7c26a9505c7,2024-04-04T12:48:41.700000
|
||||
CVE-2024-25569,0,1,7e329346c74743fe06c117f53b8fdb008c631202523e222e8c2da738974e94d3,2024-04-25T17:25:05.903000
|
||||
CVE-2024-25569,0,0,7e329346c74743fe06c117f53b8fdb008c631202523e222e8c2da738974e94d3,2024-04-25T17:25:05.903000
|
||||
CVE-2024-2557,0,0,a617119e7aec654c68da3fc71fccd99356ed7ca0eba1b1243e2bc71d72e1c32e,2024-04-11T01:25:27.817000
|
||||
CVE-2024-25572,0,0,6916ce68d4646365d0578802b2b08ffd76a62b8c07df1314570c90fc1d876f93,2024-04-11T12:47:44.137000
|
||||
CVE-2024-25574,0,0,4bc8d3cd97ad31d3dfd232c462a09dc1924d30756dc7bfcb27690950ff1edfb2,2024-04-02T12:50:42.233000
|
||||
@ -242813,7 +242813,7 @@ CVE-2024-25619,0,0,4148d7c6b7f88f108c739f8691091e275d5db2676638c192202b001773f23
|
||||
CVE-2024-2562,0,0,76cb38836dd4db9040793dbc75c2065bb0d9939dc57a1d6dae1f176138006dc6,2024-04-11T01:25:28.190000
|
||||
CVE-2024-25620,0,0,4dc0e7d0481efa671a76b60244b96320a6f1d8c82285e89393bb5facdd3f14f5,2024-02-15T06:23:39.303000
|
||||
CVE-2024-25623,0,0,d7097ca06a605433eb8efcfef9343f15725de6d8ed69964da29f4e86bee1b907,2024-02-20T19:50:53.960000
|
||||
CVE-2024-25624,1,1,27af2648f04e67f34aacbfd50ce5c5d1a651701dae1fed6d021a684275a028dd,2024-04-25T17:24:59.967000
|
||||
CVE-2024-25624,0,0,27af2648f04e67f34aacbfd50ce5c5d1a651701dae1fed6d021a684275a028dd,2024-04-25T17:24:59.967000
|
||||
CVE-2024-25625,0,0,aa9fbe54dd7bd2282f80b78321777ab8fac3f81631cae43246d091ee25cf0360,2024-02-20T19:50:53.960000
|
||||
CVE-2024-25626,0,0,d9f83485f5fb6b4cc55a1d4f971342f8155aa2e72270d86c4d53f59fca85dc97,2024-02-20T19:50:53.960000
|
||||
CVE-2024-25627,0,0,2bcab79d49f96281ac7197c55bb9f9a5171d7b9aac31488886e6d6a908f6c3e8,2024-02-16T21:39:50.223000
|
||||
@ -242860,13 +242860,13 @@ CVE-2024-25697,0,0,87f097c1f7ed0e82757d82e95e600dd576ef9cb40b319980c27885e1d41ee
|
||||
CVE-2024-25698,0,0,687369323a3676b43d9872f13157867194abcaff3ec0cdf77866c10431d641b4,2024-04-19T23:15:10.093000
|
||||
CVE-2024-25699,0,0,0b51cd5f7cb608299fc6784b7d5d83ebe087ecc52f001d7940916b47a92ea6fe,2024-04-19T23:15:10.163000
|
||||
CVE-2024-2570,0,0,199a0810957750fcfbf310e1d0f94d86c1b191cc17207657e7505077f649570c,2024-04-11T01:25:28.850000
|
||||
CVE-2024-25700,0,0,3d94db70fa164c751f6e2475defd42da6dbfc547c79e4c6f5696896567164462,2024-04-04T19:24:50.670000
|
||||
CVE-2024-25703,0,0,da3733614cb1834b853799f98d1a3c92723ef1c7e2a35fde52a7b8d068d8b937,2024-04-04T19:24:50.670000
|
||||
CVE-2024-25704,0,0,114594fcf216f4ad1cb9e193c395eaaff638bd00d0aaf049b84a152844cb7be5,2024-04-04T19:24:50.670000
|
||||
CVE-2024-25705,0,0,34227715cb43f6e3640da9309be016863749bf56287f9ea1ec6440cc52ef53bb,2024-04-04T19:24:50.670000
|
||||
CVE-2024-25706,0,0,e5e0a0b76629b916f2eea4da7873e240433ae0abb1182c5974860d658c6ec205,2024-04-04T19:24:50.670000
|
||||
CVE-2024-25700,0,1,7af0107778f703960327721c61c9f88d292d8c7d8136f4aa2adf68e6ecb154dc,2024-04-25T18:15:07.817000
|
||||
CVE-2024-25703,0,1,c9ba42c9165d3ed0d256a2ca2c76dc0d53caec9ed526f17ff441553f5ef875e5,2024-04-25T19:15:49.520000
|
||||
CVE-2024-25704,0,1,b31f59b3da36cd1ad4c21679bf4d5448c9ac6d042a5537c086e62b3446556f78,2024-04-25T19:15:49.597000
|
||||
CVE-2024-25705,0,1,da77fbd71e9cb9b93d31c57182ddbf8287305337f132cbcb286327b5364a7fe3,2024-04-25T19:15:49.660000
|
||||
CVE-2024-25706,0,1,943a20bd0f8efbd2cfe7b5bcd9e8b908c23b72c243de966b9fdb32cea68fe18b,2024-04-25T19:15:49.720000
|
||||
CVE-2024-25708,0,0,0bfa26cc48edbaebdb07961ffdc2f6a8ef4ae650648bc898f6a9eb710ca124d4,2024-04-19T23:15:10.237000
|
||||
CVE-2024-25709,0,0,dba8b4e7b06d8c4e90faaec4cb5d580f8f93a1f5afdcb145881f17c7773cd824,2024-04-19T23:15:10.307000
|
||||
CVE-2024-25709,0,1,c32a39188765515d0d644e2bbacedfa742d420e65c2db16f3996d6038ac83402,2024-04-25T19:15:49.777000
|
||||
CVE-2024-2571,0,0,3d67d6a1c9f99bb6624a38a13eb1d666f1012c18415504b92f8b3ceaa94bd45b,2024-04-11T01:25:28.927000
|
||||
CVE-2024-25710,0,0,ab520189ef240d987a199d6e814c3161f9be705f75e79c9ab42865a168e0f18f,2024-03-07T17:15:12.940000
|
||||
CVE-2024-25711,0,0,d3f8257017dbfc5bdd6c4e4b8e295b2d28e0327c4086b62797abd4226251f28d,2024-02-27T14:20:06.637000
|
||||
@ -244315,8 +244315,8 @@ CVE-2024-28237,0,0,e54564ebce9f53fbf47a1a617d4c2539d1d06a16522000543afac14f934cf
|
||||
CVE-2024-28238,0,0,38219e010007b7fe5426826144cd2eabd2e22d36d31c50aa8471901674b524b3,2024-03-13T12:33:51.697000
|
||||
CVE-2024-28239,0,0,faccbe471f1ae24e1ff85c8426d7d0f8447bb8e496567a24af19b5962ca5e940,2024-03-13T12:33:51.697000
|
||||
CVE-2024-2824,0,0,328fa7a1e6a80e6ca42082af4cfcb421fc04b2d053b7da9ed9a17fe14e601656,2024-04-11T01:25:38.183000
|
||||
CVE-2024-28240,1,1,5389312313d44ebc811e803d5f7e8514a59b26f72ab652d5adae6ff990991df1,2024-04-25T17:24:59.967000
|
||||
CVE-2024-28241,1,1,020eccadcd5f1029a3f6ba6e9de74874d125183be5078ee4150066646db9c4fe,2024-04-25T17:24:59.967000
|
||||
CVE-2024-28240,0,0,5389312313d44ebc811e803d5f7e8514a59b26f72ab652d5adae6ff990991df1,2024-04-25T17:24:59.967000
|
||||
CVE-2024-28241,0,0,020eccadcd5f1029a3f6ba6e9de74874d125183be5078ee4150066646db9c4fe,2024-04-25T17:24:59.967000
|
||||
CVE-2024-28242,0,0,8ab07e1269ba6fcb3729d56ebd38e0bb27a072562eae3d4f40fee250d49e0664,2024-03-17T22:38:29.433000
|
||||
CVE-2024-28243,0,0,b62121443f467a21df9a72e6de805a7094f659c79fc9b69ca113c6cd74783b8e,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28244,0,0,8a0b0822374c9608b1ee3be4ddc31140538b510b0fd28061fd05bdbdf794fae2,2024-03-26T12:55:05.010000
|
||||
@ -244495,8 +244495,8 @@ CVE-2024-28718,0,0,5f0a839ac4250fecd45af64be191fc810afd4c63b89d4fc0f63a8d6841ad9
|
||||
CVE-2024-28722,0,0,9f3d9610dcb3a88962a775c4bceb1adf34898d2ad0bcbbf8f024b9f550b378b8,2024-04-22T13:28:43.747000
|
||||
CVE-2024-2873,0,0,38b44d61d3230fcaba1c551f8073fe8dda4eadd0cd50d8705b668e3c4529f628,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28732,0,0,ec5e6c9882e97cf45b4c95c1c5ffa7b0d32a1a92ed89d346b2a432d5adcd9a14,2024-04-08T18:48:40.217000
|
||||
CVE-2024-28734,0,0,f4687488b267ac163f3e0d4b9d3eb38f6f5a041c19b985a560624c627a7f4e16,2024-04-01T21:15:33.200000
|
||||
CVE-2024-28735,0,0,27a3fb731c930af76bd97477e46fd57873e1d90373135fa3e190a08c95c9db47,2024-04-01T21:15:37.360000
|
||||
CVE-2024-28734,0,1,ab89139fe8499f37581a857758b5dd911586d271cde02f4e4d8e7c034753a72e,2024-04-25T19:15:49.850000
|
||||
CVE-2024-28735,0,1,96e109e8715188f76ee57d058460375db0bc7cb9155343dbdf53039c574fd622,2024-04-25T19:15:49.910000
|
||||
CVE-2024-28741,0,0,ba024af92e852f8cb07287ef01e36bda32f00b417065062fcdaec7d68cbce596,2024-04-08T18:48:40.217000
|
||||
CVE-2024-28744,0,0,9056a307a9a71984eefaac6c50b454d137864982a45296e74420e75a1c59bcd1,2024-04-08T18:48:40.217000
|
||||
CVE-2024-28745,0,0,15394cfaddabd1c5537f1c3a0b8bc4d088d58358d421e9d9475a38fad6a5e44f,2024-03-18T12:38:25.490000
|
||||
@ -244517,7 +244517,7 @@ CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e
|
||||
CVE-2024-28824,0,0,5a9476ae0fdb0520e3a986c832f5f9e27a50da5cb3aa11e06910544296f0e530,2024-03-22T12:45:36.130000
|
||||
CVE-2024-28825,0,0,55c040424ce53f1f08bb6f64aa855e81724a1114bed9afdcdd061680c74c099b,2024-04-24T13:39:42.883000
|
||||
CVE-2024-2883,0,0,e66be81816608580e2e81ffcb02cca4ae9a2aa5cbea60907cc2e1d80cffbaf4a,2024-03-29T04:15:08.743000
|
||||
CVE-2024-28834,0,0,91386e6fe68de98132419bae7f584fb89f08a35334fda5f1baf244927114cd0b,2024-04-18T05:15:48.167000
|
||||
CVE-2024-28834,0,1,43f00cbc6e1d7c004d417f596d771ec499a1f9391765678308f80bf7021bddc2,2024-04-25T18:15:07.903000
|
||||
CVE-2024-28835,0,0,ed179ff9c8ac6c0a49a4fa6aca5aabe007945dc4c4ad20ab7dd2491ca4f02b05,2024-04-18T05:15:48.263000
|
||||
CVE-2024-28836,0,0,ef9665bb9a0895616f82c07b3b8f93ecbb9dcd318a88906096e3fd29af01d6df,2024-04-03T12:38:04.840000
|
||||
CVE-2024-28847,0,0,91e84a48bf06058e30212c2ac01ab493cb3959d3b6bfc21c8760687b856baf08,2024-03-17T22:38:29.433000
|
||||
@ -244655,6 +244655,7 @@ CVE-2024-29046,0,0,934c54a354b7983248c1038ad849bfccbb8c13c9b2573a8e1ac4e386edc36
|
||||
CVE-2024-29047,0,0,caa5c4d2d0f1bf304a4ee6216a36e2941161e0820c7a8b8276d73d490e44c6f2,2024-04-10T13:24:00.070000
|
||||
CVE-2024-29048,0,0,95c20ac7de8bc227c17638fc56daca89aa86872041643304379a7c60cc8dac12,2024-04-10T13:24:00.070000
|
||||
CVE-2024-29049,0,0,98b5dd33fb953ac1a2154bc311144d3dc2c9909067218ab4461517f82cf5b6e3,2024-04-09T17:15:58.440000
|
||||
CVE-2024-2905,1,1,9435a5b5df71b7d5734b0be3755611f5be0fda4fc626759f28e89823bb5ce3c3,2024-04-25T18:15:08.037000
|
||||
CVE-2024-29050,0,0,b81f6cf3efac23ad29fb0ec76c4ddabcbf2924e0345ac83e98aface32c2a7152,2024-04-10T13:24:00.070000
|
||||
CVE-2024-29052,0,0,9420b1ae7e90dd1acfc7cdaac9046557a2de2a3786dd73ca82d15f399613dda9,2024-04-10T13:24:00.070000
|
||||
CVE-2024-29053,0,0,697fbabaf9facdb0a00abec112c7dd524df1d041a7d2e72ce266e3893d05d84e,2024-04-10T13:24:00.070000
|
||||
@ -244887,7 +244888,7 @@ CVE-2024-29640,0,0,87923c5f8022466da2d8ef6f4760770a9b5d77108f7ca786dd890e142c1a6
|
||||
CVE-2024-29644,0,0,39829980cc0c3cec42e83f1a7d1e74f651bed504f90005be4e46042a91527a65,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29650,0,0,8ad374bfabee755625e57dff59b85656db535734df280985070b11f8f0b8c3b6,2024-03-25T16:43:06.137000
|
||||
CVE-2024-2966,0,0,474ae2e5b1d6c6447ca9bee38c5e4dafcb7b2c2503070dea1f4351179cfe9798,2024-04-11T12:47:44.137000
|
||||
CVE-2024-29660,1,1,5cadce48d0d5ee00a49b61fd1e0081663846d39310fbd0877926aeae99bb4e7f,2024-04-25T17:24:59.967000
|
||||
CVE-2024-29660,0,0,5cadce48d0d5ee00a49b61fd1e0081663846d39310fbd0877926aeae99bb4e7f,2024-04-25T17:24:59.967000
|
||||
CVE-2024-29661,0,0,0af56c9e6c3f4789c6952b6fc2267b505cb820e8c95b985131711686eeb372e4,2024-04-22T13:28:34.007000
|
||||
CVE-2024-29666,0,0,a8926fce030310567330d9b7c126003f732556a2ce979a6a3fd232707f8bbd99,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29667,0,0,1425649af0fe5303ac647a61948436bd641374e6a3c12789edb4485c777699d5,2024-04-01T01:12:59.077000
|
||||
@ -245580,7 +245581,7 @@ CVE-2024-30884,0,0,f3a012fdbee7dcdfbc54fb994726741009310b51eecb5e393a9f37c21fbc6
|
||||
CVE-2024-30885,0,0,053b43f723add848d769270cc9eabce98f2bef07551ec399121d9cd8c29459b9,2024-04-11T12:47:44.137000
|
||||
CVE-2024-30886,0,0,78e1ecd0ca2250189e977131b68a166fe34cee6c425475aee62ecd362250a877,2024-04-24T13:39:42.883000
|
||||
CVE-2024-3089,0,0,3fabfa41353ef448324a78880efdc147758ef8ec187a9149e265df8463410caf,2024-04-11T01:25:53.493000
|
||||
CVE-2024-30890,1,1,501d5887b268b52d808df81626bc53713f4cadec32b76ecd6d2f5d22282fde8d,2024-04-25T17:24:59.967000
|
||||
CVE-2024-30890,0,0,501d5887b268b52d808df81626bc53713f4cadec32b76ecd6d2f5d22282fde8d,2024-04-25T17:24:59.967000
|
||||
CVE-2024-30891,0,0,eaa8b86280359f3d73f2f1d8a4256591b68799e019aa5c9624f2214d6f01088e,2024-04-05T12:40:52.763000
|
||||
CVE-2024-3090,0,0,1ed40e7cb1e30a4ce92e2079672b0e468d7f34e176dec853f1d60bd19ebc8837,2024-04-11T01:25:53.580000
|
||||
CVE-2024-3091,0,0,2ae7c1b43ade453e63e12426e1c2a8ce72ad964ac1b86e004dbb22f9a3bc2a75,2024-04-11T01:25:53.663000
|
||||
@ -245600,6 +245601,7 @@ CVE-2024-30928,0,0,caf910b47d65799a57161146e34602829f47360642a8c8fe911c2d8ad140d
|
||||
CVE-2024-30929,0,0,3a4b987ba39620a2fa553421d0680484415e43d1909ca51832f180e76c2d2d0f,2024-04-19T13:10:25.637000
|
||||
CVE-2024-3093,0,0,32bf1c70eab5da7d509a40d74982ac8945909f57d49846c0cf619694e2add382,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30938,0,0,bb3c87898373ca38f4e6504fd7f34baf274fe16334abf7626317b091c9072986,2024-04-19T13:10:25.637000
|
||||
CVE-2024-30939,1,1,3896cec5bfcf879f2ba87214556d281d12e0dcb87609b837870acc446a8df3d4,2024-04-25T19:15:49.970000
|
||||
CVE-2024-3094,0,0,cba466c06d21b74e1043491724188f63d6d0b9ba1993a884907c833ea9999b43,2024-04-12T07:15:08.740000
|
||||
CVE-2024-30946,0,0,0dff329aaece035fc82f00595012379643bd5a0edb89ee3a7369d6609e13a4d1,2024-04-02T18:12:16.283000
|
||||
CVE-2024-30950,0,0,992550aa16b7b69040c27b7eadb42b4babd9ce9c185610db0008bbada9865896,2024-04-17T20:08:21.887000
|
||||
@ -245650,10 +245652,10 @@ CVE-2024-31064,0,0,f87fea954d6623f92ad98dc571744769b0a41ba2a8ecac509cf34a5bc1aaa
|
||||
CVE-2024-31065,0,0,36c2c4ddfef551b3df9316a574430562ba7ec0ea51f9e5ecbfa0af993c7946d3,2024-03-28T20:53:20.813000
|
||||
CVE-2024-31069,0,0,d29f1e01bd410bc9e289e23142033a3c4695bcaf7cee5af8670edc7046e0bf75,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31077,0,0,cf1dae6bdc673263e7fd88f3fafa76996295a3cc4f001c878e21a09e0714f3a7,2024-04-23T12:52:09.397000
|
||||
CVE-2024-31080,0,0,629b02d1f8559238cad068acffb68f622aa7e385525cc57d4a06cac698d1aae0,2024-04-24T02:15:45.987000
|
||||
CVE-2024-31081,0,0,aaae90b3640767676e5e4ba074b3b6ae7552e9f1f8de74b5351b5d6ebc5aa288,2024-04-24T02:15:46.110000
|
||||
CVE-2024-31080,0,1,5513024a0b3f248fb69c15af5a5e265c6ed8b37e103e0163404d53665b0e4bde,2024-04-25T18:15:08.253000
|
||||
CVE-2024-31081,0,1,7bd29e5a7580bbe901288959c9a09eca84e7bfa9965dec91b5dd5a43032127ca,2024-04-25T18:15:08.367000
|
||||
CVE-2024-31082,0,0,5bd47d789b65017aa198a3c2ac34b0aa429ab490a4fcd5200779dbcd7d5b3ef9,2024-04-04T16:33:06.610000
|
||||
CVE-2024-31083,0,0,6b8fa0ee3f2b9492b7e03ecb2c6e7897f08eca8287d3790467ca98011cdd0b0a,2024-04-24T02:15:46.203000
|
||||
CVE-2024-31083,0,1,01c531cf6a8b2d6580f2b3a1f4d74508b0cde7e769c1aac3d86ccf7e3a0382b7,2024-04-25T18:15:08.470000
|
||||
CVE-2024-31084,0,0,7e7f6ad60462c421140a8806edcef098f25e94de0014c2ff06256ca8e21d3894,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31085,0,0,159d63f28600902a854d5dada2c0b5fba89225c71015785af44f46e211303b47,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31086,0,0,3a59132be6de96612b5e7dbc7323f59f175814cf3bfa0c8c82639a22898b6c14,2024-04-15T13:15:31.997000
|
||||
@ -245886,7 +245888,7 @@ CVE-2024-31547,0,0,79c088d9519e1ba5d4decbbdb950409a1ff93781e519e023ecbe916ef398d
|
||||
CVE-2024-31552,0,0,5a9db2be00e7b7077a4a60e9105689c87f7a53feda5b2567edda13b704df8f81,2024-04-19T18:29:53.040000
|
||||
CVE-2024-3156,0,0,4f0be00c0207aeed7fb186de5775d865483597f176357d0ad848ff41024a288c,2024-04-19T23:15:11.537000
|
||||
CVE-2024-3157,0,0,efbf5e20eaa98706deef52c26be2e1cba3d67ed28d54a5b0520df90b69e7c692,2024-04-19T23:15:11.593000
|
||||
CVE-2024-31574,1,1,9557f9d440c15cad853b3b201ad71c9482a5a0d678031f67eb8305f497f6b516,2024-04-25T17:24:59.967000
|
||||
CVE-2024-31574,0,0,9557f9d440c15cad853b3b201ad71c9482a5a0d678031f67eb8305f497f6b516,2024-04-25T17:24:59.967000
|
||||
CVE-2024-31576,0,0,741c8998460302eafaf2dd6cd838e7890c169c726e59c5f45ee51622793abfa6,2024-04-15T16:15:07.270000
|
||||
CVE-2024-31578,0,0,4c90aef50a02aec622bb8c70d230352c3d3dbfba07e0b0b93d71a37f5c581d6d,2024-04-17T15:31:50.160000
|
||||
CVE-2024-3158,0,0,10f7ffa67053f9b78f0dc7e48028626f5209dcb47c62106618b35565e7e9d9f6,2024-04-19T23:15:11.643000
|
||||
@ -245914,7 +245916,7 @@ CVE-2024-3167,0,0,c19ad392a8875e6cb3d8eb9a976aa540fa751cbd03136dde207326521a2375
|
||||
CVE-2024-31678,0,0,6d17d4ce9eaa15ebb6367a838566d027b53ddba56e09f333fd8cadacfd1d2447,2024-04-12T12:44:04.930000
|
||||
CVE-2024-31680,0,0,9cd3893ac983fae5e4213584fc439ab2d2b21e3e6bebab8790c0104ed80c76e1,2024-04-17T12:48:07.510000
|
||||
CVE-2024-31744,0,0,7de9e0ac4d1881e8e6a1c9cabea807c4b59ffea44a7ce9a28f0f69a4b5f1eba8,2024-04-19T16:19:49.043000
|
||||
CVE-2024-31745,0,1,a3bdd0cf6c191f4f752a70ac6769fb5b2d5c89636eeffe60e00827ad5ab48d32,2024-04-25T16:15:11.227000
|
||||
CVE-2024-31745,0,0,a3bdd0cf6c191f4f752a70ac6769fb5b2d5c89636eeffe60e00827ad5ab48d32,2024-04-25T16:15:11.227000
|
||||
CVE-2024-31750,0,0,ef2fe441e5dcedf0cb2da823df8fe57e9b7ada67d4a5ac9a3c649524c0ed2fa2,2024-04-19T13:10:25.637000
|
||||
CVE-2024-31759,0,0,7081cd22df5b9e4148ecc914176fc1f6cc04366073f8b1e4eccd8dfe4f2b7d73,2024-04-17T12:48:07.510000
|
||||
CVE-2024-31760,0,0,7b1e0b53a94a63e7f108110799c5f85524efc23136fc5608e680b8482e690959,2024-04-17T12:48:07.510000
|
||||
@ -246105,7 +246107,7 @@ CVE-2024-32206,0,0,75e2f6344ef11995a7b224164fb98cef520a3da698959b3897e594f3d6e35
|
||||
CVE-2024-3221,0,0,feefc929b27a3432f5d1352d15fe99f1f6ccd294cecb07c343d15630058ba883,2024-04-11T01:25:56.367000
|
||||
CVE-2024-3222,0,0,66f6b4b9196c6c0a91ef8acd4cd0373a609da64e89b651a11374a40389e0fbce,2024-04-11T01:25:56.443000
|
||||
CVE-2024-3223,0,0,9ffc982a7efad24c324809c3c91bef1f04ff8280442a22bc3b8b997888a9a5ba,2024-04-11T01:25:56.520000
|
||||
CVE-2024-32236,1,1,ba25489404910901f00e1fe403cd34c61ee6685a689103bb387cc7f62005501b,2024-04-25T17:24:59.967000
|
||||
CVE-2024-32236,0,0,ba25489404910901f00e1fe403cd34c61ee6685a689103bb387cc7f62005501b,2024-04-25T17:24:59.967000
|
||||
CVE-2024-32238,0,0,0e920ec9ded0c0837401c703af1964a27843eb631a1c2ab20523a0b29f896ad3,2024-04-23T12:52:30.940000
|
||||
CVE-2024-3224,0,0,c02e228ce7415d482e2413c615262ec703d9597aa6708474ae81bc765129424f,2024-04-11T01:25:56.600000
|
||||
CVE-2024-3225,0,0,756f5e08f46ab3796e26d62cd11cd06a14dd07d1ee049ee62586436225e04f96,2024-04-11T01:25:56.680000
|
||||
@ -246159,7 +246161,7 @@ CVE-2024-32343,0,0,862e8e3fbd92547c244c5be90d83e1339d7a18685f98ec207b76da84ef301
|
||||
CVE-2024-32344,0,0,47eb1a8da70bc975fdd4934340a6940373147153bf19749b3895ed5e2ae65a6e,2024-04-18T13:04:28.900000
|
||||
CVE-2024-32345,0,0,3c4abcf95580a888529432fa6af7f966006546429f30889ca33584d7f7f45c9a,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3235,0,0,87b194ac57d76e3164f790cf262b7f15e5577bfab72d12fd067ebb5070eb75e0,2024-04-10T13:23:38.787000
|
||||
CVE-2024-32358,1,1,cdb61032371c79946b8c7d981792c16ed538eb5f566d174bf95696130a8a1c73,2024-04-25T17:24:59.967000
|
||||
CVE-2024-32358,0,0,cdb61032371c79946b8c7d981792c16ed538eb5f566d174bf95696130a8a1c73,2024-04-25T17:24:59.967000
|
||||
CVE-2024-32368,0,0,9c8576a3d1f1b62a70cacd6450f34a9ed8bf7b0c58e8707835f5fedae490db3f,2024-04-22T19:24:12.920000
|
||||
CVE-2024-32391,0,0,b9d2ada2509e9e002fcf7fc50c30e5fa24f6bd077b7f0fab83dbe519d76755ce,2024-04-22T13:28:50.310000
|
||||
CVE-2024-32392,0,0,e9dc77721f231608117a79f151c9f1e6be5cd7530989658bd3dd67ce41889ce5,2024-04-22T13:28:50.310000
|
||||
@ -246208,7 +246210,7 @@ CVE-2024-32461,0,0,3941d8bd271b020582637450c6381a991de4b9ffa39f4db030841834b9e2a
|
||||
CVE-2024-32462,0,0,f73d0de6041f829663fddce09f88dca46cdcc3d89024cfa5abf2ed880863f550,2024-04-25T06:15:59.887000
|
||||
CVE-2024-32463,0,0,1671e195c4973ac11a31a2856358d6fb78fc6f39ffe0d1d851cfbba7a397b723,2024-04-17T16:51:07.347000
|
||||
CVE-2024-32466,0,0,0986c266c64cc5e4b364446dfb796a6c4980d483c5a2beb3f21f15de4cb49c0b,2024-04-18T18:25:55.267000
|
||||
CVE-2024-32467,1,1,8b7115676ad5530fb305796e715605248ddf0a20f4006b35bdfb1dc5f8a8fb59,2024-04-25T17:24:59.967000
|
||||
CVE-2024-32467,0,0,8b7115676ad5530fb305796e715605248ddf0a20f4006b35bdfb1dc5f8a8fb59,2024-04-25T17:24:59.967000
|
||||
CVE-2024-3247,0,0,095afc187e8f976bc1a2eaa79a4c0328aa3c3e2487a10203585d8616775f8a4d,2024-04-03T12:38:04.840000
|
||||
CVE-2024-32470,0,0,d7909429b510db3e426dc3bd0d7cd9294d139aa1133b013525c796626cb985fe,2024-04-18T18:25:55.267000
|
||||
CVE-2024-32472,0,0,975c522c6d17c4f52e07ac47d9093d86335976bcc8a63a5556dc578cb868f760,2024-04-18T13:04:28.900000
|
||||
@ -246220,7 +246222,7 @@ CVE-2024-32478,0,0,767d0906439929f5e4e53d4d2396aabddb8a0de51e7967f13464fca079c70
|
||||
CVE-2024-32479,0,0,9f233b992ed22cd02276821942e34be3b1cd724f5562f573e840e7a10cf66aba,2024-04-23T12:52:26.253000
|
||||
CVE-2024-3248,0,0,65f6d4ddfc43ae235edf2e59fc9daa1f1d020439a4fa197a41a6ddd58e106004,2024-04-03T12:38:04.840000
|
||||
CVE-2024-32480,0,0,f740881091f1f05e0445ba97b5de61d4d063547c57ff7478943e1cd018db3728,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32481,1,1,a8bfb7bc0fb550f9e44cc492c9444b0f2c5fa44b7b42d1ca20e707b9e15aa980,2024-04-25T17:24:59.967000
|
||||
CVE-2024-32481,0,0,a8bfb7bc0fb550f9e44cc492c9444b0f2c5fa44b7b42d1ca20e707b9e15aa980,2024-04-25T17:24:59.967000
|
||||
CVE-2024-32482,0,0,e0309808bf3b2543b39750b9d9b0b794ac723e1476b62ac8f4870801d35fc928,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32487,0,0,746d95a6c3889a9e0164763739aef81432a5222f159aa33a064a3132dbd4a7ad,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32488,0,0,6ce6bcee8af0a677e98d2bf7a3efd66cf8a3e580423515387116f39d710ba974,2024-04-15T13:15:31.997000
|
||||
@ -246335,6 +246337,11 @@ CVE-2024-32632,0,0,363f256990a9e0bbc1d5ebda216d881268683761016a5132b054fbdb44080
|
||||
CVE-2024-32633,0,0,8ac8ce6a1ac201ef8dc36e7fab192ecb8b1b583d781df940a83a5707e31555c1,2024-04-16T13:24:07.103000
|
||||
CVE-2024-32634,0,0,399e2bba8e548c1c98770d2f478e96e69a60afbc020788dd69a365e3ae504be6,2024-04-16T13:24:07.103000
|
||||
CVE-2024-32644,0,0,1c6536d9b118a22e007df0508c4274faf4a9f6bb52ca2e5c9b157aa559740e67,2024-04-19T16:19:49.043000
|
||||
CVE-2024-32645,1,1,c10fc1828cd41b8d3541bbbed3fa7f79d0dd503cc5f310bceb9a6abc62b53dcb,2024-04-25T18:15:08.593000
|
||||
CVE-2024-32646,1,1,7465592dd1e44548f173546753838831d7c653e35a72256d503a4bb716beb5b6,2024-04-25T18:15:08.780000
|
||||
CVE-2024-32647,1,1,b02ccf5e7bf15789453f412d1dff8cd4c4a66a7f81e32b46c9bd1b07e6feb7e4,2024-04-25T18:15:08.963000
|
||||
CVE-2024-32648,1,1,bf8ff4e762d18423d4730e9a303273e17ff4b747027b7f8295db3609a349f2c5,2024-04-25T18:15:09.157000
|
||||
CVE-2024-32649,1,1,ef8bb57e43e862c70f928ae64587bffc598ad5cfc8b0e17d0d423dd29700903d,2024-04-25T18:15:09.350000
|
||||
CVE-2024-32650,0,0,3ec938fa621d2b09851dc7c9c4a0bab9e06500eb12a687bac8f1323156efc6df,2024-04-19T16:19:49.043000
|
||||
CVE-2024-32652,0,0,507899e8cc0ef719a4df6a408b43b1aeaf42e8d25b41dcf9a35617406adccb9d,2024-04-22T13:28:50.310000
|
||||
CVE-2024-32653,0,0,96a4de58183f8a4c5475803e77d708dc553ab0aba5c22712929dba4355cb603d,2024-04-23T12:52:26.253000
|
||||
@ -246478,7 +246485,7 @@ CVE-2024-3356,0,0,087254ad27ba51e796f585bd19b7860bdf92d5d8812be46839c2000c6ff7ec
|
||||
CVE-2024-3357,0,0,4504c33b3bb653378795a255a83c05295c4cb93d37914e6c8a1edf8397686b85,2024-04-11T01:25:59.530000
|
||||
CVE-2024-3358,0,0,694a0960c89fb254bc37c7c2f594e5cb197e9c3b955cd9433f44c414aff75d2b,2024-04-11T01:25:59.610000
|
||||
CVE-2024-3359,0,0,a779b2e33399e3789113d39f065b1425ad824801b217abc54417c2cce7e7d2db,2024-04-11T01:25:59.687000
|
||||
CVE-2024-33592,0,1,dc3e0d94cd47d0ea73220517b5aaa098a37fe316a3d5e3b0ef33e4a8423b62af,2024-04-25T17:25:05.903000
|
||||
CVE-2024-33592,0,0,dc3e0d94cd47d0ea73220517b5aaa098a37fe316a3d5e3b0ef33e4a8423b62af,2024-04-25T17:25:05.903000
|
||||
CVE-2024-3360,0,0,2ffbaa301c04a2d62013f221bb69a21a0f4034a97959f93c6ac130d96a9162d3,2024-04-11T01:25:59.770000
|
||||
CVE-2024-3361,0,0,c120caf4947180a69c26140d9354a0af916b072bcc15573944dc923bbf223f7d,2024-04-11T01:25:59.847000
|
||||
CVE-2024-3362,0,0,4f698660b915c64322658e8738d0fb3f09460cf98fd487b3189e8f9d96e2b2c1,2024-04-11T01:25:59.930000
|
||||
@ -246545,6 +246552,7 @@ CVE-2024-3470,0,0,630f5f35df37b6b978ca7687ce76aaec305cc639bf4ca3fb3b6aed08fe283b
|
||||
CVE-2024-3491,0,0,22475c1a2c147b599aec5499497f20fc9fa37c1dc206a0659b8807ac37f4f324,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3493,0,0,63ead7e160b6b2cbd834dd6075f87d345af3361e8d55520f11e81a53e2086aaa,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3505,0,0,d46d6b7d35449c168e9ff66f3c93f973f2e1e579109b94b88c63ad7baac2b7b8,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3508,1,1,51729891088a42816c8521723aba1a8231ccab1d41c4122824706cfbeb0b2cec,2024-04-25T18:15:09.567000
|
||||
CVE-2024-3512,0,0,7186c9ec3829c2082fd68b5fc8e23caed587fdf0f4e68c2974db5f41b90fb514,2024-04-25T13:15:51.663000
|
||||
CVE-2024-3514,0,0,fd39bbcd0f0890f4d85c4ccfb46694b71dc6efa7f8c56852e1f4fd99d58e20d2,2024-04-24T17:15:47.423000
|
||||
CVE-2024-3515,0,0,5591c01553945d08e143bb397e7b7011721b53594a14b5bacff6fedc69b36f26,2024-04-19T23:15:11.963000
|
||||
@ -246595,6 +246603,10 @@ CVE-2024-3618,0,0,4930954b63fbf1867ea6023e0e85abb5ce3c463a36dea55dc99465af5aaf25
|
||||
CVE-2024-3619,0,0,e46a3b263395cb61cb97e22d10d38e54d57de91c1d7f1832b85e56c338bf09fb,2024-04-11T12:47:44.137000
|
||||
CVE-2024-3620,0,0,a7eeb1bc049879e174341aab349252fb94be8452f8b1f4ee171cd19f6ef0b10d,2024-04-11T12:47:44.137000
|
||||
CVE-2024-3621,0,0,84afe5bfc8ac11b311e81571bedd8fcb4ae60929cf687215eae135d692582687,2024-04-11T12:47:44.137000
|
||||
CVE-2024-3622,1,1,310e8e96b4e0377294ed8424658ec62e1f85161e08d1a4c8176be74bc881671e,2024-04-25T18:15:09.747000
|
||||
CVE-2024-3623,1,1,defe19a1c1930a83b1939e4122cf12d7e4f9c322e33d040be201f24c6ea908ae,2024-04-25T18:15:09.980000
|
||||
CVE-2024-3624,1,1,39cf6595062d3109a327ec6291be8c704a5a6313cda6518882b37654a8530d50,2024-04-25T18:15:10.170000
|
||||
CVE-2024-3625,1,1,a944ebc7bdeed144a0e375f3f32445033c69e44dc0d01adb954342ab95755610,2024-04-25T18:15:10.360000
|
||||
CVE-2024-3645,0,0,67d98e2e4153ee647deaff1e3df569df07b34dacff73ef5068937bbd33f489da,2024-04-22T19:24:12.920000
|
||||
CVE-2024-3646,0,0,acb9cfc5d5c2523df1f5225ae5c2cd01f196734634fe01108d948b04f61908e2,2024-04-19T16:19:49.043000
|
||||
CVE-2024-3652,0,0,a467de8b64f8147acdef48edc35752a89afb7d5856e17302ea9c57335ed0f61c,2024-04-11T12:47:44.137000
|
||||
@ -246726,7 +246738,7 @@ CVE-2024-3948,0,0,427154a0226db385c08a1dc567a28e238ab290a5825189b73e5e958b25b296
|
||||
CVE-2024-3979,0,0,9ef752ac5397ef4280bc4d9888fb417cb985331164bf90affafa759f391a2bfe,2024-04-19T18:29:53.040000
|
||||
CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000
|
||||
CVE-2024-3994,0,0,b2b5b0b0c4c4fea2326dd93e55a0fe437a44bb4fcb47799868e54f8400b49891,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4006,0,1,c01f76a94a613b3c1164a343531010831608cdd75a6ec28b08e74210a0c91542,2024-04-25T17:25:05.903000
|
||||
CVE-2024-4006,0,0,c01f76a94a613b3c1164a343531010831608cdd75a6ec28b08e74210a0c91542,2024-04-25T17:25:05.903000
|
||||
CVE-2024-4014,0,0,321273114f78ac117c4f7a805b62a62926b23a5461c74b2705504b7b2e21d158,2024-04-22T13:28:43.747000
|
||||
CVE-2024-4017,0,0,9cc899b07e49c20d1d42511c9c41a533c695fd74b1701843b26490566c6e33e3,2024-04-22T13:28:50.310000
|
||||
CVE-2024-4018,0,0,b534838241485b84911a40a305fab0f06a9a1281f09d3d1140d27d7f52b1a84d,2024-04-22T13:28:50.310000
|
||||
@ -246734,7 +246746,7 @@ CVE-2024-4019,0,0,4ced7c6540a74633018fd49c35c9e41874265303e22396ab90391c2405ff63
|
||||
CVE-2024-4020,0,0,fd9bedf3f2e4b41e8bc994bd6387cb7e34a5d92d9443a0588f231180a5be8980,2024-04-22T13:28:43.747000
|
||||
CVE-2024-4021,0,0,21ca31bf18d88881f7a6cc1002b89ea9bbd51b89715a0adf7c08b2eb5ac210a6,2024-04-22T15:15:47.813000
|
||||
CVE-2024-4022,0,0,ebd323c8f90bdf29bd6ff35ea1eff449874a3d962dc85b687039f47f7b416e73,2024-04-22T13:28:43.747000
|
||||
CVE-2024-4024,0,1,2513e42c9761fa628df45a7f36c826de0321b5337fc977a42e2a9577e9688fa4,2024-04-25T17:25:05.903000
|
||||
CVE-2024-4024,0,0,2513e42c9761fa628df45a7f36c826de0321b5337fc977a42e2a9577e9688fa4,2024-04-25T17:25:05.903000
|
||||
CVE-2024-4026,0,0,65bff2dba626fde0f88488c1e6df610a37e761e2e041855587a3bbcb3e849c23,2024-04-22T13:28:34.007000
|
||||
CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000
|
||||
CVE-2024-4035,0,0,c5a100809c68e4eb6a9b717e4eec2ebc0eca46983cf9d752b9f7c4bddb880732,2024-04-25T13:18:02.660000
|
||||
@ -246780,8 +246792,8 @@ CVE-2024-4167,0,0,5a577704bd944bc61eff52aeb8d2a212dc6f2b5e7c88adbb94b253b080df76
|
||||
CVE-2024-4168,0,0,219de4336a115a8b080bb6cb3987b54d7220d2e425aebf18b44d58d7069a2e48,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4169,0,0,e1fee76b748617e9b2c46e38252cc9379fc1a8eaf99f9c6736f3828fad6bc8be,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4170,0,0,3446fdb4e7ac2944c9d659703371f2768dd383cf2bfb07485f0ab35862c01353,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4171,0,1,305ee5ec7049b42df7b6e8ac3dd5a88d1ca0546d3129a040355605d5c84f694d,2024-04-25T17:25:05.903000
|
||||
CVE-2024-4172,0,1,74935923348139a33a5ec86dfba1caf328eac5abe35bcbc7775440df01ee8417,2024-04-25T17:25:05.903000
|
||||
CVE-2024-4171,0,0,305ee5ec7049b42df7b6e8ac3dd5a88d1ca0546d3129a040355605d5c84f694d,2024-04-25T17:25:05.903000
|
||||
CVE-2024-4172,0,0,74935923348139a33a5ec86dfba1caf328eac5abe35bcbc7775440df01ee8417,2024-04-25T17:25:05.903000
|
||||
CVE-2024-4173,0,0,1106ad2058e1f16ad44d21713021236fb96bd635ad795642c968f7eaea81a585,2024-04-25T13:18:13.537000
|
||||
CVE-2024-4174,0,0,8165b92f84043201b67993ccc68eb94f9c51d9c6b32fc95aff490860d26962cf,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4175,0,0,17322bbbd4155ded1e9cb395a3c60d3f922650a6043102cb41ba3b81f581a395,2024-04-25T13:18:02.660000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user