mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-04-25T20:00:38.051859+00:00
This commit is contained in:
parent
0a8e9fdbbf
commit
5f12c43026
@ -2,58 +2,14 @@
|
|||||||
"id": "CVE-2024-25700",
|
"id": "CVE-2024-25700",
|
||||||
"sourceIdentifier": "psirt@esri.com",
|
"sourceIdentifier": "psirt@esri.com",
|
||||||
"published": "2024-04-04T18:15:11.837",
|
"published": "2024-04-04T18:15:11.837",
|
||||||
"lastModified": "2024-04-04T19:24:50.670",
|
"lastModified": "2024-04-25T18:15:07.817",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Rejected",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Web App Builder versions <= 11.1 that may allow a remote, authenticated attacker to create a crafted link that is stored in a web map link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high.\u00a0"
|
"value": "Rejected reason: \nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time."
|
||||||
},
|
|
||||||
{
|
|
||||||
"lang": "es",
|
|
||||||
"value": "Existe una vulnerabilidad de Cross-Site Scripting almacenada en Esri Portal for ArcGIS Enterprise Web App Builder versiones <= 11.1 que puede permitir a un atacante remoto y autenticado crear un v\u00ednculo manipulado que se almacena en un v\u00ednculo de un mapa web y que, al hacer clic, podr\u00eda ejecutarse de forma arbitraria. C\u00f3digo JavaScript en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son elevados."
|
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {},
|
||||||
"cvssMetricV31": [
|
"references": []
|
||||||
{
|
|
||||||
"source": "psirt@esri.com",
|
|
||||||
"type": "Secondary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
|
||||||
"attackVector": "NETWORK",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "HIGH",
|
|
||||||
"userInteraction": "REQUIRED",
|
|
||||||
"scope": "CHANGED",
|
|
||||||
"confidentialityImpact": "LOW",
|
|
||||||
"integrityImpact": "LOW",
|
|
||||||
"availabilityImpact": "NONE",
|
|
||||||
"baseScore": 4.8,
|
|
||||||
"baseSeverity": "MEDIUM"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 1.7,
|
|
||||||
"impactScore": 2.7
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"weaknesses": [
|
|
||||||
{
|
|
||||||
"source": "psirt@esri.com",
|
|
||||||
"type": "Primary",
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "CWE-79"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"references": [
|
|
||||||
{
|
|
||||||
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/",
|
|
||||||
"source": "psirt@esri.com"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
}
|
@ -2,58 +2,14 @@
|
|||||||
"id": "CVE-2024-25703",
|
"id": "CVE-2024-25703",
|
||||||
"sourceIdentifier": "psirt@esri.com",
|
"sourceIdentifier": "psirt@esri.com",
|
||||||
"published": "2024-04-04T18:15:12.090",
|
"published": "2024-04-04T18:15:12.090",
|
||||||
"lastModified": "2024-04-04T19:24:50.670",
|
"lastModified": "2024-04-25T19:15:49.520",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Rejected",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "There is a reflected cross site scripting vulnerability in the home application in Esri Portal for ArcGIS 11.1 and below on Windows and Linux that allows a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser."
|
"value": "Rejected reason: \nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.\n\n"
|
||||||
},
|
|
||||||
{
|
|
||||||
"lang": "es",
|
|
||||||
"value": "Hay una vulnerabilidad de Cross-Site Scripting reflejada en la aplicaci\u00f3n dom\u00e9stica en Esri Portal para ArcGIS 11.1 y versiones anteriores en Windows y Linux que permite a un atacante remoto y no autenticado crear un enlace manipulado que, al hacer clic, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima."
|
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {},
|
||||||
"cvssMetricV31": [
|
"references": []
|
||||||
{
|
|
||||||
"source": "psirt@esri.com",
|
|
||||||
"type": "Secondary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
||||||
"attackVector": "NETWORK",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "NONE",
|
|
||||||
"userInteraction": "REQUIRED",
|
|
||||||
"scope": "CHANGED",
|
|
||||||
"confidentialityImpact": "LOW",
|
|
||||||
"integrityImpact": "LOW",
|
|
||||||
"availabilityImpact": "NONE",
|
|
||||||
"baseScore": 6.1,
|
|
||||||
"baseSeverity": "MEDIUM"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 2.8,
|
|
||||||
"impactScore": 2.7
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"weaknesses": [
|
|
||||||
{
|
|
||||||
"source": "psirt@esri.com",
|
|
||||||
"type": "Primary",
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "CWE-79"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"references": [
|
|
||||||
{
|
|
||||||
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/",
|
|
||||||
"source": "psirt@esri.com"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
}
|
@ -2,58 +2,14 @@
|
|||||||
"id": "CVE-2024-25704",
|
"id": "CVE-2024-25704",
|
||||||
"sourceIdentifier": "psirt@esri.com",
|
"sourceIdentifier": "psirt@esri.com",
|
||||||
"published": "2024-04-04T18:15:12.343",
|
"published": "2024-04-04T18:15:12.343",
|
||||||
"lastModified": "2024-04-04T19:24:50.670",
|
"lastModified": "2024-04-25T19:15:49.597",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Rejected",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Experience Builder versions <= 11.1 that may allow a remote, authenticated attacker to create a crafted link that is stored in the Experience Builder Embed widget which when loaded could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high.\u00a0"
|
"value": "Rejected reason: \nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.\n\n"
|
||||||
},
|
|
||||||
{
|
|
||||||
"lang": "es",
|
|
||||||
"value": "Existe una vulnerabilidad de Cross-Site Scripting almacenada en Esri Portal for ArcGIS Enterprise Experience Builder versiones <= 11.1 que puede permitir que un atacante remoto y autenticado cree un enlace manipulado que se almacena en el widget de inserci\u00f3n de Experience Builder que, cuando se carga, podr\u00eda ejecutarse de forma arbitraria. C\u00f3digo JavaScript en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son elevados."
|
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {},
|
||||||
"cvssMetricV31": [
|
"references": []
|
||||||
{
|
|
||||||
"source": "psirt@esri.com",
|
|
||||||
"type": "Secondary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
|
||||||
"attackVector": "NETWORK",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "HIGH",
|
|
||||||
"userInteraction": "REQUIRED",
|
|
||||||
"scope": "CHANGED",
|
|
||||||
"confidentialityImpact": "LOW",
|
|
||||||
"integrityImpact": "LOW",
|
|
||||||
"availabilityImpact": "NONE",
|
|
||||||
"baseScore": 4.8,
|
|
||||||
"baseSeverity": "MEDIUM"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 1.7,
|
|
||||||
"impactScore": 2.7
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"weaknesses": [
|
|
||||||
{
|
|
||||||
"source": "psirt@esri.com",
|
|
||||||
"type": "Primary",
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "CWE-79"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"references": [
|
|
||||||
{
|
|
||||||
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/",
|
|
||||||
"source": "psirt@esri.com"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
}
|
@ -2,58 +2,14 @@
|
|||||||
"id": "CVE-2024-25705",
|
"id": "CVE-2024-25705",
|
||||||
"sourceIdentifier": "psirt@esri.com",
|
"sourceIdentifier": "psirt@esri.com",
|
||||||
"published": "2024-04-04T18:15:12.603",
|
"published": "2024-04-04T18:15:12.603",
|
||||||
"lastModified": "2024-04-04T19:24:50.670",
|
"lastModified": "2024-04-25T19:15:49.660",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Rejected",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "There is a cross site scripting vulnerability in the Esri Portal for ArcGIS Experience Builder 11.1 and below on Windows and Linux that allows a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are low.\u00a0"
|
"value": "Rejected reason: \nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.\n\n"
|
||||||
},
|
|
||||||
{
|
|
||||||
"lang": "es",
|
|
||||||
"value": "Existe una vulnerabilidad de Cross-Site Scripting en Esri Portal para ArcGIS Experience Builder 11.1 y versiones anteriores en Windows y Linux que permite a un atacante remoto no autenticado crear un enlace manipulado que, al hacer clic, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son bajos."
|
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {},
|
||||||
"cvssMetricV31": [
|
"references": []
|
||||||
{
|
|
||||||
"source": "psirt@esri.com",
|
|
||||||
"type": "Secondary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
|
||||||
"attackVector": "NETWORK",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "LOW",
|
|
||||||
"userInteraction": "REQUIRED",
|
|
||||||
"scope": "CHANGED",
|
|
||||||
"confidentialityImpact": "LOW",
|
|
||||||
"integrityImpact": "LOW",
|
|
||||||
"availabilityImpact": "NONE",
|
|
||||||
"baseScore": 5.4,
|
|
||||||
"baseSeverity": "MEDIUM"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 2.3,
|
|
||||||
"impactScore": 2.7
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"weaknesses": [
|
|
||||||
{
|
|
||||||
"source": "psirt@esri.com",
|
|
||||||
"type": "Primary",
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "CWE-79"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"references": [
|
|
||||||
{
|
|
||||||
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/",
|
|
||||||
"source": "psirt@esri.com"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
}
|
@ -2,58 +2,14 @@
|
|||||||
"id": "CVE-2024-25706",
|
"id": "CVE-2024-25706",
|
||||||
"sourceIdentifier": "psirt@esri.com",
|
"sourceIdentifier": "psirt@esri.com",
|
||||||
"published": "2024-04-04T18:15:12.830",
|
"published": "2024-04-04T18:15:12.830",
|
||||||
"lastModified": "2024-04-04T19:24:50.670",
|
"lastModified": "2024-04-25T19:15:49.720",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Rejected",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "There is an HTML injection vulnerability in Esri Portal for ArcGIS <=11.0 that may allow a remote, unauthenticated attacker to craft a URL which, when clicked, could potentially generate a message that may entice an unsuspecting victim to visit an arbitrary website. This could simplify phishing attacks. "
|
"value": "Rejected reason: \nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.\n\n"
|
||||||
},
|
|
||||||
{
|
|
||||||
"lang": "es",
|
|
||||||
"value": "Existe una vulnerabilidad de inyecci\u00f3n de HTML en Esri Portal for ArcGIS <=11.0 que puede permitir que un atacante remoto y no autenticado cree una URL que, al hacer clic, podr\u00eda generar un mensaje que podr\u00eda atraer a una v\u00edctima desprevenida a visitar un sitio web arbitrario. Esto podr\u00eda simplificar los ataques de phishing."
|
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {},
|
||||||
"cvssMetricV31": [
|
"references": []
|
||||||
{
|
|
||||||
"source": "psirt@esri.com",
|
|
||||||
"type": "Secondary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
||||||
"attackVector": "NETWORK",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "NONE",
|
|
||||||
"userInteraction": "REQUIRED",
|
|
||||||
"scope": "CHANGED",
|
|
||||||
"confidentialityImpact": "LOW",
|
|
||||||
"integrityImpact": "LOW",
|
|
||||||
"availabilityImpact": "NONE",
|
|
||||||
"baseScore": 6.1,
|
|
||||||
"baseSeverity": "MEDIUM"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 2.8,
|
|
||||||
"impactScore": 2.7
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"weaknesses": [
|
|
||||||
{
|
|
||||||
"source": "psirt@esri.com",
|
|
||||||
"type": "Primary",
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "CWE-94"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"references": [
|
|
||||||
{
|
|
||||||
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/",
|
|
||||||
"source": "psirt@esri.com"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
}
|
@ -2,58 +2,14 @@
|
|||||||
"id": "CVE-2024-25709",
|
"id": "CVE-2024-25709",
|
||||||
"sourceIdentifier": "psirt@esri.com",
|
"sourceIdentifier": "psirt@esri.com",
|
||||||
"published": "2024-04-04T18:15:13.340",
|
"published": "2024-04-04T18:15:13.340",
|
||||||
"lastModified": "2024-04-19T23:15:10.307",
|
"lastModified": "2024-04-25T19:15:49.777",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Rejected",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS versions 10.8.1 \u2013 1121 that may allow a remote, authenticated attacker to create a crafted link that can be saved as a new location when moving an existing item which will potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high.\u00a0"
|
"value": "Rejected reason: \nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.\n\n"
|
||||||
},
|
|
||||||
{
|
|
||||||
"lang": "es",
|
|
||||||
"value": "Existe una vulnerabilidad de Cross-Site Scripting almacenado en Esri Portal for ArcGIS versiones 10.8.1 \u2013 1121 que puede permitir que un atacante remoto y autenticado cree un enlace manipulado que se puede guardar como una nueva ubicaci\u00f3n al mover un elemento existente que potencialmente se ejecutar\u00e1. c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son elevados."
|
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {},
|
||||||
"cvssMetricV31": [
|
"references": []
|
||||||
{
|
|
||||||
"source": "psirt@esri.com",
|
|
||||||
"type": "Secondary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
||||||
"attackVector": "NETWORK",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "NONE",
|
|
||||||
"userInteraction": "REQUIRED",
|
|
||||||
"scope": "CHANGED",
|
|
||||||
"confidentialityImpact": "LOW",
|
|
||||||
"integrityImpact": "LOW",
|
|
||||||
"availabilityImpact": "NONE",
|
|
||||||
"baseScore": 6.1,
|
|
||||||
"baseSeverity": "MEDIUM"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 2.8,
|
|
||||||
"impactScore": 2.7
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"weaknesses": [
|
|
||||||
{
|
|
||||||
"source": "psirt@esri.com",
|
|
||||||
"type": "Primary",
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "CWE-79"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"references": [
|
|
||||||
{
|
|
||||||
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/",
|
|
||||||
"source": "psirt@esri.com"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-28734",
|
"id": "CVE-2024-28734",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-19T14:15:07.687",
|
"published": "2024-03-19T14:15:07.687",
|
||||||
"lastModified": "2024-04-01T21:15:33.200",
|
"lastModified": "2024-04-25T19:15:49.850",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -19,6 +19,14 @@
|
|||||||
{
|
{
|
||||||
"url": "https://packetstormsecurity.com/files/177619/Financials-By-Coda-Cross-Site-Scripting.html",
|
"url": "https://packetstormsecurity.com/files/177619/Financials-By-Coda-Cross-Site-Scripting.html",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.unit4.com/",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.unit4.com/products/financial-management-software",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-28735",
|
"id": "CVE-2024-28735",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T15:15:07.920",
|
"published": "2024-03-20T15:15:07.920",
|
||||||
"lastModified": "2024-04-01T21:15:37.360",
|
"lastModified": "2024-04-25T19:15:49.910",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -27,6 +27,14 @@
|
|||||||
{
|
{
|
||||||
"url": "https://packetstormsecurity.com/files/177620/Financials-By-Coda-Authorization-Bypass.html",
|
"url": "https://packetstormsecurity.com/files/177620/Financials-By-Coda-Authorization-Bypass.html",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.unit4.com/",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.unit4.com/products/financial-management-software",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-28834",
|
"id": "CVE-2024-28834",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2024-03-21T14:15:07.547",
|
"published": "2024-03-21T14:15:07.547",
|
||||||
"lastModified": "2024-04-18T05:15:48.167",
|
"lastModified": "2024-04-25T18:15:07.903",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -59,6 +59,14 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2024:1879",
|
"url": "https://access.redhat.com/errata/RHSA-2024:1879",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:1997",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:2044",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2024-28834",
|
"url": "https://access.redhat.com/security/cve/CVE-2024-28834",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
|
63
CVE-2024/CVE-2024-29xx/CVE-2024-2905.json
Normal file
63
CVE-2024/CVE-2024-29xx/CVE-2024-2905.json
Normal file
@ -0,0 +1,63 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2905",
|
||||||
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
|
"published": "2024-04-25T18:15:08.037",
|
||||||
|
"lastModified": "2024-04-25T18:15:08.037",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A security vulnerability has been discovered within rpm-ostree, pertaining to the /etc/shadow file in default builds having the world-readable bit enabled. This issue arises from the default permissions being set at a higher level than recommended, potentially exposing sensitive authentication data to unauthorized access."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "secalert@redhat.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.2,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.5,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "secalert@redhat.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-732"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2024-2905",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271585",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/coreos/rpm-ostree/security/advisories/GHSA-2m76-cwhg-7wv6",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
20
CVE-2024/CVE-2024-309xx/CVE-2024-30939.json
Normal file
20
CVE-2024/CVE-2024-309xx/CVE-2024-30939.json
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-30939",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-04-25T19:15:49.970",
|
||||||
|
"lastModified": "2024-04-25T19:15:49.970",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An issue discovered in Yealink VP59 Teams Editions with firmware version 91.15.0.118 allows a physically proximate attacker to gain control of an account via a flaw in the factory reset procedure."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://medium.com/%40deepsahu1/yealink-ip-phone-account-take-over-9bf9e7b847c0?source=friends_link&sk=b0d664dd5b3aad5b758e4934aca997ad",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-31080",
|
"id": "CVE-2024-31080",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2024-04-04T14:15:10.330",
|
"published": "2024-04-04T14:15:10.330",
|
||||||
"lastModified": "2024-04-24T02:15:45.987",
|
"lastModified": "2024-04-25T18:15:08.253",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -55,6 +55,34 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2024:1785",
|
"url": "https://access.redhat.com/errata/RHSA-2024:1785",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:2036",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:2037",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:2038",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:2039",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:2040",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:2041",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:2042",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2024-31080",
|
"url": "https://access.redhat.com/security/cve/CVE-2024-31080",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-31081",
|
"id": "CVE-2024-31081",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2024-04-04T14:15:10.593",
|
"published": "2024-04-04T14:15:10.593",
|
||||||
"lastModified": "2024-04-24T02:15:46.110",
|
"lastModified": "2024-04-25T18:15:08.367",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -55,6 +55,34 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2024:1785",
|
"url": "https://access.redhat.com/errata/RHSA-2024:1785",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:2036",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:2037",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:2038",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:2039",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:2040",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:2041",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:2042",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2024-31081",
|
"url": "https://access.redhat.com/security/cve/CVE-2024-31081",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-31083",
|
"id": "CVE-2024-31083",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2024-04-05T12:15:37.577",
|
"published": "2024-04-05T12:15:37.577",
|
||||||
"lastModified": "2024-04-24T02:15:46.203",
|
"lastModified": "2024-04-25T18:15:08.470",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -55,6 +55,34 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2024:1785",
|
"url": "https://access.redhat.com/errata/RHSA-2024:1785",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:2036",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:2037",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:2038",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:2039",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:2040",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:2041",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:2042",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2024-31083",
|
"url": "https://access.redhat.com/security/cve/CVE-2024-31083",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
|
55
CVE-2024/CVE-2024-326xx/CVE-2024-32645.json
Normal file
55
CVE-2024/CVE-2024-326xx/CVE-2024-32645.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-32645",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-04-25T18:15:08.593",
|
||||||
|
"lastModified": "2024-04-25T18:15:08.593",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, incorrect values can be logged when `raw_log` builtin is called with memory or storage arguments to be used as topics. A contract search was performed and no vulnerable contracts were found in production. The `build_IR` function of the `RawLog` class fails to properly unwrap the variables provided as topics. Consequently, incorrect values are logged as topics. As of time of publication, no fixed version is available."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-20"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-xchq-w5r3-4wg3",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-326xx/CVE-2024-32646.json
Normal file
55
CVE-2024/CVE-2024-326xx/CVE-2024-32646.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-32646",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-04-25T18:15:08.780",
|
||||||
|
"lastModified": "2024-04-25T18:15:08.780",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `slice` builtin can result in a double eval vulnerability when the buffer argument is either `msg.data`, `self.code` or `<address>.code` and either the `start` or `length` arguments have side-effects. It can be easily triggered only with the versions `<0.3.4` as `0.3.4` introduced the unique symbol fence. No vulnerable production contracts were found. Additionally, double evaluation of side-effects should be easily discoverable in client tests. As such, the impact is low. As of time of publication, no fixed versions are available.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-20"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-r56x-j438-vw5m",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
59
CVE-2024/CVE-2024-326xx/CVE-2024-32647.json
Normal file
59
CVE-2024/CVE-2024-326xx/CVE-2024-32647.json
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-32647",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-04-25T18:15:08.963",
|
||||||
|
"lastModified": "2024-04-25T18:15:08.963",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `create_from_blueprint` builtin can result in a double eval vulnerability when `raw_args=True` and the `args` argument has side-effects. It can be seen that the `_build_create_IR` function of the `create_from_blueprint` builtin doesn't cache the mentioned `args` argument to the stack. As such, it can be evaluated multiple times (instead of retrieving the value from the stack). No vulnerable production contracts were found. Additionally, double evaluation of side-effects should be easily discoverable in client tests. As such, the impact is low. As of time of publication, no fixed versions exist.\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-95"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/vyperlang/vyper/blob/cedf7087e68e67c7bfbd47ae95dcb16b81ad2e02/vyper/builtins/functions.py#L1847",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-3whq-64q2-qfj6",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
63
CVE-2024/CVE-2024-326xx/CVE-2024-32648.json
Normal file
63
CVE-2024/CVE-2024-326xx/CVE-2024-32648.json
Normal file
@ -0,0 +1,63 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-32648",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-04-25T18:15:09.157",
|
||||||
|
"lastModified": "2024-04-25T18:15:09.157",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Prior to version 0.3.0, default functions don't respect nonreentrancy keys and the lock isn't emitted. No vulnerable production contracts were found. Additionally, using a lock on a `default` function is a very sparsely used pattern. As such, the impact is low. Version 0.3.0 contains a patch for the issue.\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-667"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/vyperlang/vyper/commit/93287e5ac184b53b395c907d40701f721daf8177",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/vyperlang/vyper/issues/2455",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-m2v9-w374-5hj9",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-326xx/CVE-2024-32649.json
Normal file
55
CVE-2024/CVE-2024-326xx/CVE-2024-32649.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-32649",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-04-25T18:15:09.350",
|
||||||
|
"lastModified": "2024-04-25T18:15:09.350",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `sqrt` builtin can result in double eval vulnerability when the argument has side-effects. It can be seen that the `build_IR` function of the `sqrt` builtin doesn't cache the argument to the stack. As such, it can be evaluated multiple times (instead of retrieving the value from the stack). No vulnerable production contracts were found. Additionally, double evaluation of side-effects should be easily discoverable in client tests. As such, the impact is low. As of time of publication, no fixed versions are available.\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-95"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-5jrj-52x8-m64h",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
47
CVE-2024/CVE-2024-35xx/CVE-2024-3508.json
Normal file
47
CVE-2024/CVE-2024-35xx/CVE-2024-3508.json
Normal file
@ -0,0 +1,47 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-3508",
|
||||||
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
|
"published": "2024-04-25T18:15:09.567",
|
||||||
|
"lastModified": "2024-04-25T18:15:09.567",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A flaw was found in Bombastic, which allows authenticated users to upload compressed (bzip2 or zstd) SBOMs. The API endpoint verifies the presence of some fields and values in the JSON. To perform this verification, the uploaded file must first be decompressed."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "secalert@redhat.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2024-3508",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274109",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
59
CVE-2024/CVE-2024-36xx/CVE-2024-3622.json
Normal file
59
CVE-2024/CVE-2024-36xx/CVE-2024-3622.json
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-3622",
|
||||||
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
|
"published": "2024-04-25T18:15:09.747",
|
||||||
|
"lastModified": "2024-04-25T18:15:09.747",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "secalert@redhat.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "secalert@redhat.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-256"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2024-3622",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274400",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
59
CVE-2024/CVE-2024-36xx/CVE-2024-3623.json
Normal file
59
CVE-2024/CVE-2024-36xx/CVE-2024-3623.json
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-3623",
|
||||||
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
|
"published": "2024-04-25T18:15:09.980",
|
||||||
|
"lastModified": "2024-04-25T18:15:09.980",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A flaw was found when using mirror-registry to install Quay. It uses a default database secret key, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same database secret key. This flaw allows a malicious actor to access sensitive information from Quay's database."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "secalert@redhat.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 8.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "secalert@redhat.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-256"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2024-3623",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274404",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
59
CVE-2024/CVE-2024-36xx/CVE-2024-3624.json
Normal file
59
CVE-2024/CVE-2024-36xx/CVE-2024-3624.json
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-3624",
|
||||||
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
|
"published": "2024-04-25T18:15:10.170",
|
||||||
|
"lastModified": "2024-04-25T18:15:10.170",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A flaw was found in how Quay's database is stored in plain-text in mirror-registry on the jinja's config.yaml file. This flaw allows a malicious actor with access to this file to gain access to Quay's database."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "secalert@redhat.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"attackVector": "ADJACENT_NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.3,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "secalert@redhat.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-256"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2024-3624",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274407",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
59
CVE-2024/CVE-2024-36xx/CVE-2024-3625.json
Normal file
59
CVE-2024/CVE-2024-36xx/CVE-2024-3625.json
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-3625",
|
||||||
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
|
"published": "2024-04-25T18:15:10.360",
|
||||||
|
"lastModified": "2024-04-25T18:15:10.360",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A flaw was found in Quay, where Quay's database is stored in plain text in mirror-registry on Jinja's config.yaml file. This issue leaves the possibility of a malicious actor with access to this file to gain access to Quay's Redis instance."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "secalert@redhat.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"attackVector": "ADJACENT_NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.3,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "secalert@redhat.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-256"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2024-3625",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274408",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
73
README.md
73
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-04-25T18:00:39.836334+00:00
|
2024-04-25T20:00:38.051859+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-04-25T17:25:05.903000+00:00
|
2024-04-25T19:15:49.970000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,58 +33,43 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
246786
|
246798
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `22`
|
Recently added CVEs: `12`
|
||||||
|
|
||||||
- [CVE-2023-5675](CVE-2023/CVE-2023-56xx/CVE-2023-5675.json) (`2024-04-25T16:15:08.570`)
|
- [CVE-2024-2905](CVE-2024/CVE-2024-29xx/CVE-2024-2905.json) (`2024-04-25T18:15:08.037`)
|
||||||
- [CVE-2023-6484](CVE-2023/CVE-2023-64xx/CVE-2023-6484.json) (`2024-04-25T16:15:09.743`)
|
- [CVE-2024-30939](CVE-2024/CVE-2024-309xx/CVE-2024-30939.json) (`2024-04-25T19:15:49.970`)
|
||||||
- [CVE-2023-6544](CVE-2023/CVE-2023-65xx/CVE-2023-6544.json) (`2024-04-25T16:15:10.097`)
|
- [CVE-2024-32645](CVE-2024/CVE-2024-326xx/CVE-2024-32645.json) (`2024-04-25T18:15:08.593`)
|
||||||
- [CVE-2023-6596](CVE-2023/CVE-2023-65xx/CVE-2023-6596.json) (`2024-04-25T16:15:10.353`)
|
- [CVE-2024-32646](CVE-2024/CVE-2024-326xx/CVE-2024-32646.json) (`2024-04-25T18:15:08.780`)
|
||||||
- [CVE-2023-6717](CVE-2023/CVE-2023-67xx/CVE-2023-6717.json) (`2024-04-25T16:15:10.653`)
|
- [CVE-2024-32647](CVE-2024/CVE-2024-326xx/CVE-2024-32647.json) (`2024-04-25T18:15:08.963`)
|
||||||
- [CVE-2023-6787](CVE-2023/CVE-2023-67xx/CVE-2023-6787.json) (`2024-04-25T16:15:10.867`)
|
- [CVE-2024-32648](CVE-2024/CVE-2024-326xx/CVE-2024-32648.json) (`2024-04-25T18:15:09.157`)
|
||||||
- [CVE-2024-0874](CVE-2024/CVE-2024-08xx/CVE-2024-0874.json) (`2024-04-25T17:15:47.083`)
|
- [CVE-2024-32649](CVE-2024/CVE-2024-326xx/CVE-2024-32649.json) (`2024-04-25T18:15:09.350`)
|
||||||
- [CVE-2024-1102](CVE-2024/CVE-2024-11xx/CVE-2024-1102.json) (`2024-04-25T17:15:47.457`)
|
- [CVE-2024-3508](CVE-2024/CVE-2024-35xx/CVE-2024-3508.json) (`2024-04-25T18:15:09.567`)
|
||||||
- [CVE-2024-1139](CVE-2024/CVE-2024-11xx/CVE-2024-1139.json) (`2024-04-25T17:15:47.650`)
|
- [CVE-2024-3622](CVE-2024/CVE-2024-36xx/CVE-2024-3622.json) (`2024-04-25T18:15:09.747`)
|
||||||
- [CVE-2024-1657](CVE-2024/CVE-2024-16xx/CVE-2024-1657.json) (`2024-04-25T17:15:48.013`)
|
- [CVE-2024-3623](CVE-2024/CVE-2024-36xx/CVE-2024-3623.json) (`2024-04-25T18:15:09.980`)
|
||||||
- [CVE-2024-1726](CVE-2024/CVE-2024-17xx/CVE-2024-1726.json) (`2024-04-25T17:15:48.257`)
|
- [CVE-2024-3624](CVE-2024/CVE-2024-36xx/CVE-2024-3624.json) (`2024-04-25T18:15:10.170`)
|
||||||
- [CVE-2024-2467](CVE-2024/CVE-2024-24xx/CVE-2024-2467.json) (`2024-04-25T17:15:49.580`)
|
- [CVE-2024-3625](CVE-2024/CVE-2024-36xx/CVE-2024-3625.json) (`2024-04-25T18:15:10.360`)
|
||||||
- [CVE-2024-25624](CVE-2024/CVE-2024-256xx/CVE-2024-25624.json) (`2024-04-25T17:15:48.813`)
|
|
||||||
- [CVE-2024-28240](CVE-2024/CVE-2024-282xx/CVE-2024-28240.json) (`2024-04-25T17:15:49.010`)
|
|
||||||
- [CVE-2024-28241](CVE-2024/CVE-2024-282xx/CVE-2024-28241.json) (`2024-04-25T17:15:49.200`)
|
|
||||||
- [CVE-2024-29660](CVE-2024/CVE-2024-296xx/CVE-2024-29660.json) (`2024-04-25T17:15:49.377`)
|
|
||||||
- [CVE-2024-30890](CVE-2024/CVE-2024-308xx/CVE-2024-30890.json) (`2024-04-25T17:15:49.797`)
|
|
||||||
- [CVE-2024-31574](CVE-2024/CVE-2024-315xx/CVE-2024-31574.json) (`2024-04-25T17:15:49.853`)
|
|
||||||
- [CVE-2024-32236](CVE-2024/CVE-2024-322xx/CVE-2024-32236.json) (`2024-04-25T17:15:49.957`)
|
|
||||||
- [CVE-2024-32358](CVE-2024/CVE-2024-323xx/CVE-2024-32358.json) (`2024-04-25T17:15:50.020`)
|
|
||||||
- [CVE-2024-32467](CVE-2024/CVE-2024-324xx/CVE-2024-32467.json) (`2024-04-25T17:15:50.080`)
|
|
||||||
- [CVE-2024-32481](CVE-2024/CVE-2024-324xx/CVE-2024-32481.json) (`2024-04-25T17:15:50.273`)
|
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `17`
|
Recently modified CVEs: `12`
|
||||||
|
|
||||||
- [CVE-2023-5685](CVE-2023/CVE-2023-56xx/CVE-2023-5685.json) (`2024-04-25T16:15:08.777`)
|
- [CVE-2024-25700](CVE-2024/CVE-2024-257xx/CVE-2024-25700.json) (`2024-04-25T18:15:07.817`)
|
||||||
- [CVE-2023-5764](CVE-2023/CVE-2023-57xx/CVE-2023-5764.json) (`2024-04-25T16:15:08.903`)
|
- [CVE-2024-25703](CVE-2024/CVE-2024-257xx/CVE-2024-25703.json) (`2024-04-25T19:15:49.520`)
|
||||||
- [CVE-2023-5824](CVE-2023/CVE-2023-58xx/CVE-2023-5824.json) (`2024-04-25T16:15:09.027`)
|
- [CVE-2024-25704](CVE-2024/CVE-2024-257xx/CVE-2024-25704.json) (`2024-04-25T19:15:49.597`)
|
||||||
- [CVE-2023-6356](CVE-2023/CVE-2023-63xx/CVE-2023-6356.json) (`2024-04-25T16:15:09.513`)
|
- [CVE-2024-25705](CVE-2024/CVE-2024-257xx/CVE-2024-25705.json) (`2024-04-25T19:15:49.660`)
|
||||||
- [CVE-2023-6535](CVE-2023/CVE-2023-65xx/CVE-2023-6535.json) (`2024-04-25T16:15:09.970`)
|
- [CVE-2024-25706](CVE-2024/CVE-2024-257xx/CVE-2024-25706.json) (`2024-04-25T19:15:49.720`)
|
||||||
- [CVE-2023-7192](CVE-2023/CVE-2023-71xx/CVE-2023-7192.json) (`2024-04-25T17:15:46.553`)
|
- [CVE-2024-25709](CVE-2024/CVE-2024-257xx/CVE-2024-25709.json) (`2024-04-25T19:15:49.777`)
|
||||||
- [CVE-2024-0914](CVE-2024/CVE-2024-09xx/CVE-2024-0914.json) (`2024-04-25T17:15:47.280`)
|
- [CVE-2024-28734](CVE-2024/CVE-2024-287xx/CVE-2024-28734.json) (`2024-04-25T19:15:49.850`)
|
||||||
- [CVE-2024-2236](CVE-2024/CVE-2024-22xx/CVE-2024-2236.json) (`2024-04-25T17:15:49.467`)
|
- [CVE-2024-28735](CVE-2024/CVE-2024-287xx/CVE-2024-28735.json) (`2024-04-25T19:15:49.910`)
|
||||||
- [CVE-2024-22373](CVE-2024/CVE-2024-223xx/CVE-2024-22373.json) (`2024-04-25T17:25:05.903`)
|
- [CVE-2024-28834](CVE-2024/CVE-2024-288xx/CVE-2024-28834.json) (`2024-04-25T18:15:07.903`)
|
||||||
- [CVE-2024-22391](CVE-2024/CVE-2024-223xx/CVE-2024-22391.json) (`2024-04-25T17:25:05.903`)
|
- [CVE-2024-31080](CVE-2024/CVE-2024-310xx/CVE-2024-31080.json) (`2024-04-25T18:15:08.253`)
|
||||||
- [CVE-2024-25569](CVE-2024/CVE-2024-255xx/CVE-2024-25569.json) (`2024-04-25T17:25:05.903`)
|
- [CVE-2024-31081](CVE-2024/CVE-2024-310xx/CVE-2024-31081.json) (`2024-04-25T18:15:08.367`)
|
||||||
- [CVE-2024-31745](CVE-2024/CVE-2024-317xx/CVE-2024-31745.json) (`2024-04-25T16:15:11.227`)
|
- [CVE-2024-31083](CVE-2024/CVE-2024-310xx/CVE-2024-31083.json) (`2024-04-25T18:15:08.470`)
|
||||||
- [CVE-2024-33592](CVE-2024/CVE-2024-335xx/CVE-2024-33592.json) (`2024-04-25T17:25:05.903`)
|
|
||||||
- [CVE-2024-4006](CVE-2024/CVE-2024-40xx/CVE-2024-4006.json) (`2024-04-25T17:25:05.903`)
|
|
||||||
- [CVE-2024-4024](CVE-2024/CVE-2024-40xx/CVE-2024-4024.json) (`2024-04-25T17:25:05.903`)
|
|
||||||
- [CVE-2024-4171](CVE-2024/CVE-2024-41xx/CVE-2024-4171.json) (`2024-04-25T17:25:05.903`)
|
|
||||||
- [CVE-2024-4172](CVE-2024/CVE-2024-41xx/CVE-2024-4172.json) (`2024-04-25T17:25:05.903`)
|
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
114
_state.csv
114
_state.csv
@ -237025,7 +237025,7 @@ CVE-2023-5671,0,0,3cc2b9c1deb62dceb8ed00c2d8762fe59a768998f615d5585f03bd3dd8ce13
|
|||||||
CVE-2023-5672,0,0,b606b655dc2985c3ef150964e49693e9c24950f987c8d71991ac4c23768844b2,2024-01-04T17:08:45.617000
|
CVE-2023-5672,0,0,b606b655dc2985c3ef150964e49693e9c24950f987c8d71991ac4c23768844b2,2024-01-04T17:08:45.617000
|
||||||
CVE-2023-5673,0,0,70e5322ee14dd36a1fef1c30959d5e0c92016645b510b75cfd68b74728b861b6,2024-01-04T17:09:37.303000
|
CVE-2023-5673,0,0,70e5322ee14dd36a1fef1c30959d5e0c92016645b510b75cfd68b74728b861b6,2024-01-04T17:09:37.303000
|
||||||
CVE-2023-5674,0,0,d18ab2900ed7e529311b11ab81d26d18c239ed8c3d95a148f12ff9fdb604f6d6,2024-01-04T18:49:34.613000
|
CVE-2023-5674,0,0,d18ab2900ed7e529311b11ab81d26d18c239ed8c3d95a148f12ff9fdb604f6d6,2024-01-04T18:49:34.613000
|
||||||
CVE-2023-5675,1,1,2afc649da9f718a03c8832aa97b201cab4db6707ad961f549c65ca40d5f0491b,2024-04-25T17:25:05.903000
|
CVE-2023-5675,0,0,2afc649da9f718a03c8832aa97b201cab4db6707ad961f549c65ca40d5f0491b,2024-04-25T17:25:05.903000
|
||||||
CVE-2023-5676,0,0,c192e1317c9dd9e6e795afdc87fde3c831c86613079a468411f986e2046923eb,2023-11-22T22:39:25.137000
|
CVE-2023-5676,0,0,c192e1317c9dd9e6e795afdc87fde3c831c86613079a468411f986e2046923eb,2023-11-22T22:39:25.137000
|
||||||
CVE-2023-5677,0,0,bf0403fa11a7a963d15423f4bb38a7680c1d99fd326f3defc8c62611e429b9f6,2024-02-13T00:38:00.893000
|
CVE-2023-5677,0,0,bf0403fa11a7a963d15423f4bb38a7680c1d99fd326f3defc8c62611e429b9f6,2024-02-13T00:38:00.893000
|
||||||
CVE-2023-5678,0,0,10ee8f19cb0834ae8a34613205f620c83611435a6974173b992451221b4bf83e,2023-11-30T22:15:09.723000
|
CVE-2023-5678,0,0,10ee8f19cb0834ae8a34613205f620c83611435a6974173b992451221b4bf83e,2023-11-30T22:15:09.723000
|
||||||
@ -237035,7 +237035,7 @@ CVE-2023-5681,0,0,c8515c91e7de329908b78ff5da5c4b7570295fc0bfb78f4f5768b1289e9cf5
|
|||||||
CVE-2023-5682,0,0,f6333687ab0645a1fd8953eb4ecc238bde4805dd1880c1dd8846d7fce2a7def8,2024-04-11T01:23:04.923000
|
CVE-2023-5682,0,0,f6333687ab0645a1fd8953eb4ecc238bde4805dd1880c1dd8846d7fce2a7def8,2024-04-11T01:23:04.923000
|
||||||
CVE-2023-5683,0,0,cb0f33b1d08b1ce9cc57c71e5c40d5b9f1d2607c9aa1a5ffa32c5fd0a2a17ee1,2024-04-11T01:23:05.010000
|
CVE-2023-5683,0,0,cb0f33b1d08b1ce9cc57c71e5c40d5b9f1d2607c9aa1a5ffa32c5fd0a2a17ee1,2024-04-11T01:23:05.010000
|
||||||
CVE-2023-5684,0,0,880c97a624c250bf87e546dfac2388f6a5459910d66d603bc0971081b810b8e1,2024-04-11T01:23:05.100000
|
CVE-2023-5684,0,0,880c97a624c250bf87e546dfac2388f6a5459910d66d603bc0971081b810b8e1,2024-04-11T01:23:05.100000
|
||||||
CVE-2023-5685,0,1,c003834f963e781af89ebdad00b9567c0a77e3aa6f42eea0e12da658f72c250c,2024-04-25T16:15:08.777000
|
CVE-2023-5685,0,0,c003834f963e781af89ebdad00b9567c0a77e3aa6f42eea0e12da658f72c250c,2024-04-25T16:15:08.777000
|
||||||
CVE-2023-5686,0,0,14e9a4f551dedb4d867ff16706440a6a3cb2d418db4a34eccb414d1c48955525,2024-01-21T03:20:51.297000
|
CVE-2023-5686,0,0,14e9a4f551dedb4d867ff16706440a6a3cb2d418db4a34eccb414d1c48955525,2024-01-21T03:20:51.297000
|
||||||
CVE-2023-5687,0,0,163c067ad4e8b872c5abffc6eb0e33e3ec476cd671e69e540f448f37eb4f9636,2023-10-27T18:51:42.730000
|
CVE-2023-5687,0,0,163c067ad4e8b872c5abffc6eb0e33e3ec476cd671e69e540f448f37eb4f9636,2023-10-27T18:51:42.730000
|
||||||
CVE-2023-5688,0,0,06a783b4a174a26699fc289ad2f278ef95fec4ff44eb7fd150fc30bbf083b5a6,2023-10-27T18:51:36
|
CVE-2023-5688,0,0,06a783b4a174a26699fc289ad2f278ef95fec4ff44eb7fd150fc30bbf083b5a6,2023-10-27T18:51:36
|
||||||
@ -237109,7 +237109,7 @@ CVE-2023-5760,0,0,b26c322f998e6825a09e7c5127ec0e45a89874e1999d9532ece8cb05bf015c
|
|||||||
CVE-2023-5761,0,0,2da90484712dc730b83c569fce9e74f344e1096a8227445e34e8b1b3bda148f4,2023-12-12T15:50:05.353000
|
CVE-2023-5761,0,0,2da90484712dc730b83c569fce9e74f344e1096a8227445e34e8b1b3bda148f4,2023-12-12T15:50:05.353000
|
||||||
CVE-2023-5762,0,0,995fc5f6a706edf8dbe1791dcc11a016a4bb9d17014abdfb2902d3f921ab2baa,2023-12-08T15:02:37.390000
|
CVE-2023-5762,0,0,995fc5f6a706edf8dbe1791dcc11a016a4bb9d17014abdfb2902d3f921ab2baa,2023-12-08T15:02:37.390000
|
||||||
CVE-2023-5763,0,0,4ff2accd99d449a0742854b854d08d639fb4972bda32ba25f042cd82d146e614,2023-11-13T19:55:13.637000
|
CVE-2023-5763,0,0,4ff2accd99d449a0742854b854d08d639fb4972bda32ba25f042cd82d146e614,2023-11-13T19:55:13.637000
|
||||||
CVE-2023-5764,0,1,5f85602bb7701613217a37a59d74c36afc9670c24213af655bc54e0c8dc2d5b4,2024-04-25T16:15:08.903000
|
CVE-2023-5764,0,0,5f85602bb7701613217a37a59d74c36afc9670c24213af655bc54e0c8dc2d5b4,2024-04-25T16:15:08.903000
|
||||||
CVE-2023-5765,0,0,e9be9ac85c17528e84195bedf3d2830fc278ff555389e845d31a431003373392,2023-11-09T01:26:48.773000
|
CVE-2023-5765,0,0,e9be9ac85c17528e84195bedf3d2830fc278ff555389e845d31a431003373392,2023-11-09T01:26:48.773000
|
||||||
CVE-2023-5766,0,0,78f2d9d8ac7b95b8a4e5dc0e8997029ac798051d62cff83a1d9b45e59b35751f,2023-11-09T01:24:32.057000
|
CVE-2023-5766,0,0,78f2d9d8ac7b95b8a4e5dc0e8997029ac798051d62cff83a1d9b45e59b35751f,2023-11-09T01:24:32.057000
|
||||||
CVE-2023-5767,0,0,ad794c53a0f217448e62fe696cd061911833f672e0cea2f495554452a7466841,2023-12-07T17:54:21.037000
|
CVE-2023-5767,0,0,ad794c53a0f217448e62fe696cd061911833f672e0cea2f495554452a7466841,2023-12-07T17:54:21.037000
|
||||||
@ -237166,7 +237166,7 @@ CVE-2023-5820,0,0,58b1f50113fd55505ed149f5b7bb49dbfd0a0f6f9f535a05335349c658343b
|
|||||||
CVE-2023-5821,0,0,cd4303955b9a7b3fe4b37581e654f24a81586d7580cc2ef9208ebb1641da3356,2023-11-07T04:24:27.417000
|
CVE-2023-5821,0,0,cd4303955b9a7b3fe4b37581e654f24a81586d7580cc2ef9208ebb1641da3356,2023-11-07T04:24:27.417000
|
||||||
CVE-2023-5822,0,0,b67ceab18bbb1fb0f9fb81217782253fb2873c03b0c31906a9c6b3b9849c939f,2023-11-29T19:15:14.147000
|
CVE-2023-5822,0,0,b67ceab18bbb1fb0f9fb81217782253fb2873c03b0c31906a9c6b3b9849c939f,2023-11-29T19:15:14.147000
|
||||||
CVE-2023-5823,0,0,d7f788774a2604af95c673fde3d28e3d353cbc4a5a4bfbe3d382e943ed035843,2023-11-14T16:18:57.250000
|
CVE-2023-5823,0,0,d7f788774a2604af95c673fde3d28e3d353cbc4a5a4bfbe3d382e943ed035843,2023-11-14T16:18:57.250000
|
||||||
CVE-2023-5824,0,1,cdab4b76ac240ba49e3863e4d4f68cbb853364f4a1b487ece0111a5626020c5d,2024-04-25T16:15:09.027000
|
CVE-2023-5824,0,0,cdab4b76ac240ba49e3863e4d4f68cbb853364f4a1b487ece0111a5626020c5d,2024-04-25T16:15:09.027000
|
||||||
CVE-2023-5825,0,0,0399606a6ebebea85a4c7dc21bd0805603b974624a6b245cb9ef9839d4896e32,2023-11-14T17:00:25.433000
|
CVE-2023-5825,0,0,0399606a6ebebea85a4c7dc21bd0805603b974624a6b245cb9ef9839d4896e32,2023-11-14T17:00:25.433000
|
||||||
CVE-2023-5826,0,0,dfa886a374966eb99bebb692d38b2d2da634c5e6ea16dec23011361fe53252dc,2024-04-11T01:23:08.860000
|
CVE-2023-5826,0,0,dfa886a374966eb99bebb692d38b2d2da634c5e6ea16dec23011361fe53252dc,2024-04-11T01:23:08.860000
|
||||||
CVE-2023-5827,0,0,91233a7921eea4d64db8679e624be8b385b9e9cdbdd67eba5d3fa15262c38b1b,2024-04-11T01:23:08.953000
|
CVE-2023-5827,0,0,91233a7921eea4d64db8679e624be8b385b9e9cdbdd67eba5d3fa15262c38b1b,2024-04-11T01:23:08.953000
|
||||||
@ -237628,7 +237628,7 @@ CVE-2023-6352,0,0,a7c9f6deee309d44509b6c9208a201145230316f41723e551e729328a3c70e
|
|||||||
CVE-2023-6353,0,0,24c2382fdf0767add5b7141089ec0613fc1eb47c1182ffa2cb7b84f6aeb0444b,2023-12-06T18:18:09.320000
|
CVE-2023-6353,0,0,24c2382fdf0767add5b7141089ec0613fc1eb47c1182ffa2cb7b84f6aeb0444b,2023-12-06T18:18:09.320000
|
||||||
CVE-2023-6354,0,0,2bf459d55b21a066ff498992abe18be99d182acea7ca336905eeed3616a89b88,2023-12-06T18:18:01.950000
|
CVE-2023-6354,0,0,2bf459d55b21a066ff498992abe18be99d182acea7ca336905eeed3616a89b88,2023-12-06T18:18:01.950000
|
||||||
CVE-2023-6355,0,0,6fdeecd4f0ee699805371cfc1ea0606b87b44ad25b2626176d3ef32b51ed450e,2024-01-02T15:26:45.317000
|
CVE-2023-6355,0,0,6fdeecd4f0ee699805371cfc1ea0606b87b44ad25b2626176d3ef32b51ed450e,2024-01-02T15:26:45.317000
|
||||||
CVE-2023-6356,0,1,bde87d9abed8a4bf595c9622ff2deeecfc04a9b4d596b6d93211e8c79cb3a6b5,2024-04-25T16:15:09.513000
|
CVE-2023-6356,0,0,bde87d9abed8a4bf595c9622ff2deeecfc04a9b4d596b6d93211e8c79cb3a6b5,2024-04-25T16:15:09.513000
|
||||||
CVE-2023-6357,0,0,bbd74398a0b444bacefe820e1535d1409864c58ab45fa3a132d88d21bbd97f01,2023-12-11T20:49:14.117000
|
CVE-2023-6357,0,0,bbd74398a0b444bacefe820e1535d1409864c58ab45fa3a132d88d21bbd97f01,2023-12-11T20:49:14.117000
|
||||||
CVE-2023-6359,0,0,eec65d1d46b6f4ae76547d3688eca6bb28b35f6576162bb0891e35895c51f4af,2023-11-30T20:36:00.537000
|
CVE-2023-6359,0,0,eec65d1d46b6f4ae76547d3688eca6bb28b35f6576162bb0891e35895c51f4af,2023-11-30T20:36:00.537000
|
||||||
CVE-2023-6360,0,0,9012dbc9de46bbd36921c61a8fd2b617642d26aa0bcbe12d97c341719ee01d79,2023-12-06T00:38:20.297000
|
CVE-2023-6360,0,0,9012dbc9de46bbd36921c61a8fd2b617642d26aa0bcbe12d97c341719ee01d79,2023-12-06T00:38:20.297000
|
||||||
@ -237730,7 +237730,7 @@ CVE-2023-6478,0,0,a2204e2f69cdc6c882d51d5123b56b5f88413c8782871b6a0414da718fbf03
|
|||||||
CVE-2023-6481,0,0,7bf3f957b787a6827701226e0ca3372c64cd44f2ab0cfcaeb6091c2fdc472edd,2023-12-07T19:57:46.020000
|
CVE-2023-6481,0,0,7bf3f957b787a6827701226e0ca3372c64cd44f2ab0cfcaeb6091c2fdc472edd,2023-12-07T19:57:46.020000
|
||||||
CVE-2023-6482,0,0,4d9c5a1788fe7dfbaf4eca53c69fe7a1ffbc45cd5b295a4cce9c5f95cb7c7755,2024-02-01T04:14:20.480000
|
CVE-2023-6482,0,0,4d9c5a1788fe7dfbaf4eca53c69fe7a1ffbc45cd5b295a4cce9c5f95cb7c7755,2024-02-01T04:14:20.480000
|
||||||
CVE-2023-6483,0,0,4d97a6b64ab24b94d49daa44a79554fbeead9ae7d46cd7c731ffa4efefc4885f,2023-12-22T20:23:00.340000
|
CVE-2023-6483,0,0,4d97a6b64ab24b94d49daa44a79554fbeead9ae7d46cd7c731ffa4efefc4885f,2023-12-22T20:23:00.340000
|
||||||
CVE-2023-6484,1,1,70fda0457d3cf00f2d12882d228af9219459c18b0be3209649da6bf3bb62a852,2024-04-25T17:25:05.903000
|
CVE-2023-6484,0,0,70fda0457d3cf00f2d12882d228af9219459c18b0be3209649da6bf3bb62a852,2024-04-25T17:25:05.903000
|
||||||
CVE-2023-6485,0,0,d84b1f2fa339ee3fbe00211d49269bf9012e27d7ef753ce7f80b70bff072340c,2024-01-08T19:31:52.377000
|
CVE-2023-6485,0,0,d84b1f2fa339ee3fbe00211d49269bf9012e27d7ef753ce7f80b70bff072340c,2024-01-08T19:31:52.377000
|
||||||
CVE-2023-6486,0,0,c81210cab8dc9e396502360bc8e7405406f09e8235326da2aa05788514a5507a,2024-04-10T13:24:00.070000
|
CVE-2023-6486,0,0,c81210cab8dc9e396502360bc8e7405406f09e8235326da2aa05788514a5507a,2024-04-10T13:24:00.070000
|
||||||
CVE-2023-6488,0,0,a2d2155218f4cd12cbd7cf86a1d373ca9d8739c736f0c67e222296ebea42699d,2023-12-22T19:30:36.993000
|
CVE-2023-6488,0,0,a2d2155218f4cd12cbd7cf86a1d373ca9d8739c736f0c67e222296ebea42699d,2023-12-22T19:30:36.993000
|
||||||
@ -237773,12 +237773,12 @@ CVE-2023-6531,0,0,72b65d47f2191f5c2b848fd880cd1cdca9d89e892c5d11530a6913981eda25
|
|||||||
CVE-2023-6532,0,0,f738506a21aaa4b97e1d01a3f1b1b963270b7eece9c06e5ade2e7f91cd03ea0f,2024-01-11T20:04:00.773000
|
CVE-2023-6532,0,0,f738506a21aaa4b97e1d01a3f1b1b963270b7eece9c06e5ade2e7f91cd03ea0f,2024-01-11T20:04:00.773000
|
||||||
CVE-2023-6533,0,0,dcd64452143eb3dc7b1d81d028067d07f5ed73ffb53920de9ac74711589702ac,2024-02-22T19:07:27.197000
|
CVE-2023-6533,0,0,dcd64452143eb3dc7b1d81d028067d07f5ed73ffb53920de9ac74711589702ac,2024-02-22T19:07:27.197000
|
||||||
CVE-2023-6534,0,0,d1014e93c47cb4df91754765b442aa44e330a073857ff83c407b8638b2e2b237,2024-01-12T14:15:49
|
CVE-2023-6534,0,0,d1014e93c47cb4df91754765b442aa44e330a073857ff83c407b8638b2e2b237,2024-01-12T14:15:49
|
||||||
CVE-2023-6535,0,1,5da9b8bdeaf50d3c67aabb006b5b9591fa308aa13793c7c151f558b8df852c3a,2024-04-25T16:15:09.970000
|
CVE-2023-6535,0,0,5da9b8bdeaf50d3c67aabb006b5b9591fa308aa13793c7c151f558b8df852c3a,2024-04-25T16:15:09.970000
|
||||||
CVE-2023-6536,0,0,306d35a4d2e64b27f32ba44d255c645fda283c56655a4025154895afc9a4229d,2024-04-15T14:15:07.447000
|
CVE-2023-6536,0,0,306d35a4d2e64b27f32ba44d255c645fda283c56655a4025154895afc9a4229d,2024-04-15T14:15:07.447000
|
||||||
CVE-2023-6538,0,0,3a39b4ad035054d825d9bc8e0c8cc78afbd8a886d818da82d3bd686b80edb3a0,2023-12-14T17:02:15.203000
|
CVE-2023-6538,0,0,3a39b4ad035054d825d9bc8e0c8cc78afbd8a886d818da82d3bd686b80edb3a0,2023-12-14T17:02:15.203000
|
||||||
CVE-2023-6540,0,0,e8a4000d3c1c7c36a8e07e1b70f09f28354d68ee96913653b539560cbc6666cf,2024-01-10T20:23:28.493000
|
CVE-2023-6540,0,0,e8a4000d3c1c7c36a8e07e1b70f09f28354d68ee96913653b539560cbc6666cf,2024-01-10T20:23:28.493000
|
||||||
CVE-2023-6542,0,0,3003b22c56226936503fcbd3e01db5b83c31e11bacc81c5b330ec2a4d5df4705,2023-12-18T20:00:10.587000
|
CVE-2023-6542,0,0,3003b22c56226936503fcbd3e01db5b83c31e11bacc81c5b330ec2a4d5df4705,2023-12-18T20:00:10.587000
|
||||||
CVE-2023-6544,1,1,0eadf8b680848dcd7ff77536b2c7cd18c9612c5693540daf3e9c0fe2b58589bb,2024-04-25T17:24:59.967000
|
CVE-2023-6544,0,0,0eadf8b680848dcd7ff77536b2c7cd18c9612c5693540daf3e9c0fe2b58589bb,2024-04-25T17:24:59.967000
|
||||||
CVE-2023-6545,0,0,e8fad407643f309508d7beca42d5ec4316241428ccdf0ffe16ab6d5de81adac9,2024-02-15T11:15:10.127000
|
CVE-2023-6545,0,0,e8fad407643f309508d7beca42d5ec4316241428ccdf0ffe16ab6d5de81adac9,2024-02-15T11:15:10.127000
|
||||||
CVE-2023-6546,0,0,8a0376636dd2953004c2fc1d2f0124a770d41464e2479ea6b9c7bf8e32b774cc,2024-04-03T00:15:07.823000
|
CVE-2023-6546,0,0,8a0376636dd2953004c2fc1d2f0124a770d41464e2479ea6b9c7bf8e32b774cc,2024-04-03T00:15:07.823000
|
||||||
CVE-2023-6547,0,0,2916ee27da61a814e8994bd469cb1aad4b6a948d5260e9e94d921cc96ef53cf1,2023-12-14T19:31:10.497000
|
CVE-2023-6547,0,0,2916ee27da61a814e8994bd469cb1aad4b6a948d5260e9e94d921cc96ef53cf1,2023-12-14T19:31:10.497000
|
||||||
@ -237825,7 +237825,7 @@ CVE-2023-6592,0,0,64cc414903b2337cb0bd8a5539f823df2fd800285d9deb31df562c295ab75b
|
|||||||
CVE-2023-6593,0,0,e3b3e08c9100a5e7cf14c217c401234f02853669dddb630e64650e50aa403cb9,2023-12-15T14:38:03.057000
|
CVE-2023-6593,0,0,e3b3e08c9100a5e7cf14c217c401234f02853669dddb630e64650e50aa403cb9,2023-12-15T14:38:03.057000
|
||||||
CVE-2023-6594,0,0,d3868296aafc64b6514f2cb5804c13a0687b79a1bf9d5ede2da8f4a451319021,2024-01-11T23:32:17.207000
|
CVE-2023-6594,0,0,d3868296aafc64b6514f2cb5804c13a0687b79a1bf9d5ede2da8f4a451319021,2024-01-11T23:32:17.207000
|
||||||
CVE-2023-6595,0,0,36c4a8ec5f87bb2afaaafb9bf8ff027d48fb76423d85051bd988412db95a161f,2023-12-19T17:51:54.827000
|
CVE-2023-6595,0,0,36c4a8ec5f87bb2afaaafb9bf8ff027d48fb76423d85051bd988412db95a161f,2023-12-19T17:51:54.827000
|
||||||
CVE-2023-6596,1,1,34525b234858a21b8458c73368b56e0305ab54584c7c4568eb20ecffa728db59,2024-04-25T17:24:59.967000
|
CVE-2023-6596,0,0,34525b234858a21b8458c73368b56e0305ab54584c7c4568eb20ecffa728db59,2024-04-25T17:24:59.967000
|
||||||
CVE-2023-6597,0,0,0ad4260f4e12f5442e67ca98f3e26ae0d54d4cd318021b60e0b78bb11088338f,2024-04-03T15:15:51.783000
|
CVE-2023-6597,0,0,0ad4260f4e12f5442e67ca98f3e26ae0d54d4cd318021b60e0b78bb11088338f,2024-04-03T15:15:51.783000
|
||||||
CVE-2023-6598,0,0,8b8f7f87f85d85987c85ed76cf906c53121cfbe34e11294d4d2ee1e26a9f8779,2024-01-17T21:24:33.233000
|
CVE-2023-6598,0,0,8b8f7f87f85d85987c85ed76cf906c53121cfbe34e11294d4d2ee1e26a9f8779,2024-01-17T21:24:33.233000
|
||||||
CVE-2023-6599,0,0,a782437846e35b14cfc1bab743463edcd34abeb3c74717f8ec091163e3cb6d86,2023-12-12T17:22:17.503000
|
CVE-2023-6599,0,0,a782437846e35b14cfc1bab743463edcd34abeb3c74717f8ec091163e3cb6d86,2023-12-12T17:22:17.503000
|
||||||
@ -237912,7 +237912,7 @@ CVE-2023-6709,0,0,91ad521595673e9f900cc67b519ceef81e072d2cde6bd61134ff43d941e150
|
|||||||
CVE-2023-6710,0,0,17eeccecd49bbe640dfb13fe6d0fb81b3a464ea4613067e730e03201a3ec6b86,2024-03-18T22:15:07.537000
|
CVE-2023-6710,0,0,17eeccecd49bbe640dfb13fe6d0fb81b3a464ea4613067e730e03201a3ec6b86,2024-03-18T22:15:07.537000
|
||||||
CVE-2023-6711,0,0,1272050003612eeabf483df167c872619b5a7a718f82d7efc2ef0df52bffe676,2023-12-28T19:03:00.580000
|
CVE-2023-6711,0,0,1272050003612eeabf483df167c872619b5a7a718f82d7efc2ef0df52bffe676,2023-12-28T19:03:00.580000
|
||||||
CVE-2023-6716,0,0,c5de23f942df1b587dad5bba434231319fdb9bc5ad23f5fda3137bdc12dd0a5f,2024-02-09T09:15:07.733000
|
CVE-2023-6716,0,0,c5de23f942df1b587dad5bba434231319fdb9bc5ad23f5fda3137bdc12dd0a5f,2024-02-09T09:15:07.733000
|
||||||
CVE-2023-6717,1,1,10759856e7a5b7e196b87fe491b866dea0353174d2a321e579a5e4361a4df30e,2024-04-25T17:24:59.967000
|
CVE-2023-6717,0,0,10759856e7a5b7e196b87fe491b866dea0353174d2a321e579a5e4361a4df30e,2024-04-25T17:24:59.967000
|
||||||
CVE-2023-6718,0,0,800326da020c67b5d16628e725304c35ffe57eb2871b679e54fec620b82938a2,2023-12-18T17:39:26.267000
|
CVE-2023-6718,0,0,800326da020c67b5d16628e725304c35ffe57eb2871b679e54fec620b82938a2,2023-12-18T17:39:26.267000
|
||||||
CVE-2023-6719,0,0,9d5dfad7b583b5ed71fda0877cd09b5d62ce26e2849f2a049357d7ee8d8ecdd4,2023-12-18T17:47:32.683000
|
CVE-2023-6719,0,0,9d5dfad7b583b5ed71fda0877cd09b5d62ce26e2849f2a049357d7ee8d8ecdd4,2023-12-18T17:47:32.683000
|
||||||
CVE-2023-6720,0,0,f92ecd0810e967fb2e290113359252cc0605767095d771035373bf698cc8ef63,2023-12-18T17:45:01.760000
|
CVE-2023-6720,0,0,f92ecd0810e967fb2e290113359252cc0605767095d771035373bf698cc8ef63,2023-12-18T17:45:01.760000
|
||||||
@ -237968,7 +237968,7 @@ CVE-2023-6781,0,0,606133b53d71d301d434687c95e9541c45256035c97457e3cef427e3e2fa86
|
|||||||
CVE-2023-6782,0,0,9d49a53aeef1daeb1b880b1c10125bd540373eabc0b6ef10f8f3d1b558ba4034,2024-01-18T16:11:09.587000
|
CVE-2023-6782,0,0,9d49a53aeef1daeb1b880b1c10125bd540373eabc0b6ef10f8f3d1b558ba4034,2024-01-18T16:11:09.587000
|
||||||
CVE-2023-6784,0,0,8a2dc120c2f7c09cd65b30de205a120bba14591ed7954e6b475e7a765c9d6768,2023-12-28T20:16:01.087000
|
CVE-2023-6784,0,0,8a2dc120c2f7c09cd65b30de205a120bba14591ed7954e6b475e7a765c9d6768,2023-12-28T20:16:01.087000
|
||||||
CVE-2023-6785,0,0,6032c6c6494d8ab6426166c8858fe7b4f5d0ea17027dec5e421fd5772b1b9f25,2024-03-13T18:16:18.563000
|
CVE-2023-6785,0,0,6032c6c6494d8ab6426166c8858fe7b4f5d0ea17027dec5e421fd5772b1b9f25,2024-03-13T18:16:18.563000
|
||||||
CVE-2023-6787,1,1,c65105665eaaa00b82a29fe351c93a5103802f058c32e8e730ca7368fbab3721,2024-04-25T17:24:59.967000
|
CVE-2023-6787,0,0,c65105665eaaa00b82a29fe351c93a5103802f058c32e8e730ca7368fbab3721,2024-04-25T17:24:59.967000
|
||||||
CVE-2023-6788,0,0,50e116b22f39b4eda80be0e0174e50805515a5317ae162b416827d632334043b,2024-01-11T23:33:05.333000
|
CVE-2023-6788,0,0,50e116b22f39b4eda80be0e0174e50805515a5317ae162b416827d632334043b,2024-01-11T23:33:05.333000
|
||||||
CVE-2023-6789,0,0,58210ee945774473d3672ef0a5317f3e9fd1821a6536ceabc670f03a82b8c1b1,2023-12-18T18:54:39.670000
|
CVE-2023-6789,0,0,58210ee945774473d3672ef0a5317f3e9fd1821a6536ceabc670f03a82b8c1b1,2023-12-18T18:54:39.670000
|
||||||
CVE-2023-6790,0,0,59d4d6839301f4b4ea57b622791c925b2ceacc81b1978d57ea06e29921fd8384,2023-12-18T18:53:56.697000
|
CVE-2023-6790,0,0,59d4d6839301f4b4ea57b622791c925b2ceacc81b1978d57ea06e29921fd8384,2023-12-18T18:53:56.697000
|
||||||
@ -238311,7 +238311,7 @@ CVE-2023-7188,0,0,fe4d9025095df26d959f210a69a2760922fc73505e5cf1d109482aea8caca3
|
|||||||
CVE-2023-7189,0,0,394104872b51d52e5ce0bb342811c2b39833af1574be7a8d59e381bebf6567bd,2024-04-11T01:23:40.690000
|
CVE-2023-7189,0,0,394104872b51d52e5ce0bb342811c2b39833af1574be7a8d59e381bebf6567bd,2024-04-11T01:23:40.690000
|
||||||
CVE-2023-7190,0,0,5c76dd156689a2e2d27938b6355694f91152f571e94286587d1916ae6b86bff9,2024-04-11T01:23:40.777000
|
CVE-2023-7190,0,0,5c76dd156689a2e2d27938b6355694f91152f571e94286587d1916ae6b86bff9,2024-04-11T01:23:40.777000
|
||||||
CVE-2023-7191,0,0,3e2b5f18b7a3605368089faf4ff0a655a5b20299e41a1b56587fcd587f16bd8e,2024-04-11T01:23:40.893000
|
CVE-2023-7191,0,0,3e2b5f18b7a3605368089faf4ff0a655a5b20299e41a1b56587fcd587f16bd8e,2024-04-11T01:23:40.893000
|
||||||
CVE-2023-7192,0,1,9048ecb6f580e5c8408fa2e3bdb1db47d0d0e6013dcf9892b4743ddb1e8561ab,2024-04-25T17:15:46.553000
|
CVE-2023-7192,0,0,9048ecb6f580e5c8408fa2e3bdb1db47d0d0e6013dcf9892b4743ddb1e8561ab,2024-04-25T17:15:46.553000
|
||||||
CVE-2023-7193,0,0,03ba6fbb5e1a4552fc2b6b0fc14931ff65c633a2370d29bddfddb1c21ee90140,2024-04-11T01:23:41.023000
|
CVE-2023-7193,0,0,03ba6fbb5e1a4552fc2b6b0fc14931ff65c633a2370d29bddfddb1c21ee90140,2024-04-11T01:23:41.023000
|
||||||
CVE-2023-7194,0,0,c12012004827cd0bc34ce11f51f4d80b4388d10ba3ae2687522e188646b70ac8,2024-01-25T02:02:01.610000
|
CVE-2023-7194,0,0,c12012004827cd0bc34ce11f51f4d80b4388d10ba3ae2687522e188646b70ac8,2024-01-25T02:02:01.610000
|
||||||
CVE-2023-7198,0,0,5606627204fd1346b6fe26c836439a1783648ce0b7fc4e92446c427eb2e96f6a,2024-02-27T14:20:06.637000
|
CVE-2023-7198,0,0,5606627204fd1346b6fe26c836439a1783648ce0b7fc4e92446c427eb2e96f6a,2024-02-27T14:20:06.637000
|
||||||
@ -239042,7 +239042,7 @@ CVE-2024-0869,0,0,39eb12d4def5ace38cccd71318a17cc1945f05a59b2d0897303b6745b871b8
|
|||||||
CVE-2024-0871,0,0,9f662ac78f6b1a329c54044768cbd47d14bc8d8fd129fd78afaf32634a3ad01c,2024-03-13T18:16:18.563000
|
CVE-2024-0871,0,0,9f662ac78f6b1a329c54044768cbd47d14bc8d8fd129fd78afaf32634a3ad01c,2024-03-13T18:16:18.563000
|
||||||
CVE-2024-0872,0,0,0924bc55b3c6385ba217ce4e13ea2506dd75654857395c8dd6e4d9ff36d14ecf,2024-04-10T13:24:00.070000
|
CVE-2024-0872,0,0,0924bc55b3c6385ba217ce4e13ea2506dd75654857395c8dd6e4d9ff36d14ecf,2024-04-10T13:24:00.070000
|
||||||
CVE-2024-0873,0,0,ae04380d23748d0f0a688c94a994d5ec2180cdc927be703e44a79b3aa33c7fb2,2024-04-10T13:24:00.070000
|
CVE-2024-0873,0,0,ae04380d23748d0f0a688c94a994d5ec2180cdc927be703e44a79b3aa33c7fb2,2024-04-10T13:24:00.070000
|
||||||
CVE-2024-0874,1,1,f02ef6c1d4bafcba7b95ff91c5736ee3f1719d5d1b6b3f6eba65645f7e5d39ca,2024-04-25T17:24:59.967000
|
CVE-2024-0874,0,0,f02ef6c1d4bafcba7b95ff91c5736ee3f1719d5d1b6b3f6eba65645f7e5d39ca,2024-04-25T17:24:59.967000
|
||||||
CVE-2024-0879,0,0,71dbf86688bbf3d39fdd16f3840204e31946256b985438bb8d263e8d387364ad,2024-01-31T19:16:07.630000
|
CVE-2024-0879,0,0,71dbf86688bbf3d39fdd16f3840204e31946256b985438bb8d263e8d387364ad,2024-01-31T19:16:07.630000
|
||||||
CVE-2024-0880,0,0,12dd80add99b4278efc505ba644272f57307bd9169ca281bf7019fd00c56c698,2024-04-11T01:24:11.007000
|
CVE-2024-0880,0,0,12dd80add99b4278efc505ba644272f57307bd9169ca281bf7019fd00c56c698,2024-04-11T01:24:11.007000
|
||||||
CVE-2024-0881,0,0,f5a1e6e9b750ec678efb854ce078d7ad08217191215f6280dc39f8ef88d758b6,2024-04-12T12:44:04.930000
|
CVE-2024-0881,0,0,f5a1e6e9b750ec678efb854ce078d7ad08217191215f6280dc39f8ef88d758b6,2024-04-12T12:44:04.930000
|
||||||
@ -239070,7 +239070,7 @@ CVE-2024-0907,0,0,736d9a373e93547114922fac343df53c487c280e59648bef9a3cecc6379f90
|
|||||||
CVE-2024-0909,0,0,7864e9d833556eb295eb67e87cebb39c8d9b11d41ed1f5327a80b30fe013438c,2024-02-08T20:07:51.410000
|
CVE-2024-0909,0,0,7864e9d833556eb295eb67e87cebb39c8d9b11d41ed1f5327a80b30fe013438c,2024-02-08T20:07:51.410000
|
||||||
CVE-2024-0911,0,0,5f8186e1a077698fb2fa1e99d28cc6e32ac8b7b7afb205a3a02bc10c8ca698f0,2024-02-14T18:15:48.077000
|
CVE-2024-0911,0,0,5f8186e1a077698fb2fa1e99d28cc6e32ac8b7b7afb205a3a02bc10c8ca698f0,2024-02-14T18:15:48.077000
|
||||||
CVE-2024-0913,0,0,cc9dbbd0e1eb40baf69d2dc96719798ae1dcba5ab6fc531754d7fd6a8c7e7f1d,2024-03-29T12:45:02.937000
|
CVE-2024-0913,0,0,cc9dbbd0e1eb40baf69d2dc96719798ae1dcba5ab6fc531754d7fd6a8c7e7f1d,2024-03-29T12:45:02.937000
|
||||||
CVE-2024-0914,0,1,7f22c9d9b9fd7b20f24efa4809ae53ac72b9c07a501ffa9df44287c5ae5e04b9,2024-04-25T17:15:47.280000
|
CVE-2024-0914,0,0,7f22c9d9b9fd7b20f24efa4809ae53ac72b9c07a501ffa9df44287c5ae5e04b9,2024-04-25T17:15:47.280000
|
||||||
CVE-2024-0917,0,0,1096c18fb8e959955c123559a721fd9eb8bfd390fb54eac5e8167e50a31dc158,2024-03-07T15:15:08.257000
|
CVE-2024-0917,0,0,1096c18fb8e959955c123559a721fd9eb8bfd390fb54eac5e8167e50a31dc158,2024-03-07T15:15:08.257000
|
||||||
CVE-2024-0918,0,0,665fb2ab3d0de8862f8c0f360fe055729484bae6812ecb9bc73647194d5411aa,2024-04-11T01:24:12.193000
|
CVE-2024-0918,0,0,665fb2ab3d0de8862f8c0f360fe055729484bae6812ecb9bc73647194d5411aa,2024-04-11T01:24:12.193000
|
||||||
CVE-2024-0919,0,0,589179645f375446af0d6856749f5d8581b8fa706e54f9dca7ffc4f53fa26164,2024-04-11T01:24:12.283000
|
CVE-2024-0919,0,0,589179645f375446af0d6856749f5d8581b8fa706e54f9dca7ffc4f53fa26164,2024-04-11T01:24:12.283000
|
||||||
@ -239235,7 +239235,7 @@ CVE-2024-1095,0,0,df3c9b754a366dd4bae7a412155dd92109950a1d3409f2396655e3fd5c46a9
|
|||||||
CVE-2024-1096,0,0,0511628751a4d3c33dfebd06790b048648e8a66a1c69f04faa3a9a5040d5bc55,2024-03-21T02:51:34.720000
|
CVE-2024-1096,0,0,0511628751a4d3c33dfebd06790b048648e8a66a1c69f04faa3a9a5040d5bc55,2024-03-21T02:51:34.720000
|
||||||
CVE-2024-1098,0,0,415ccc1f81ef8bc8a03b5ae28bbcf6873771bb680fbb58097e107325c51cced7,2024-04-11T01:24:20.073000
|
CVE-2024-1098,0,0,415ccc1f81ef8bc8a03b5ae28bbcf6873771bb680fbb58097e107325c51cced7,2024-04-11T01:24:20.073000
|
||||||
CVE-2024-1099,0,0,b9d17eb989efcb9f86624a5ec60bed0af4b6dc448bf02db321a08bc2b96355af,2024-04-11T01:24:20.157000
|
CVE-2024-1099,0,0,b9d17eb989efcb9f86624a5ec60bed0af4b6dc448bf02db321a08bc2b96355af,2024-04-11T01:24:20.157000
|
||||||
CVE-2024-1102,1,1,50296c9908c91c2b4d0df0fdc5a6a983204e3c309c572a536009f9bc8b8f7a0e,2024-04-25T17:24:59.967000
|
CVE-2024-1102,0,0,50296c9908c91c2b4d0df0fdc5a6a983204e3c309c572a536009f9bc8b8f7a0e,2024-04-25T17:24:59.967000
|
||||||
CVE-2024-1103,0,0,9ae95595599b6db591a9274da0d5a85146610521126dbe5776496052566f38a4,2024-04-11T01:24:20.247000
|
CVE-2024-1103,0,0,9ae95595599b6db591a9274da0d5a85146610521126dbe5776496052566f38a4,2024-04-11T01:24:20.247000
|
||||||
CVE-2024-1104,0,0,4986f7d9d93ce17dfdb3c18d1dbdea210136d53ee2c0a156b2b261fba310efd6,2024-02-22T19:07:27.197000
|
CVE-2024-1104,0,0,4986f7d9d93ce17dfdb3c18d1dbdea210136d53ee2c0a156b2b261fba310efd6,2024-02-22T19:07:27.197000
|
||||||
CVE-2024-1106,0,0,704e011d119ecc0a0a6c94048139401779c5b0cce30a694f65f63b54706d619d,2024-02-27T14:20:06.637000
|
CVE-2024-1106,0,0,704e011d119ecc0a0a6c94048139401779c5b0cce30a694f65f63b54706d619d,2024-02-27T14:20:06.637000
|
||||||
@ -239268,7 +239268,7 @@ CVE-2024-1135,0,0,2f6bc90f330f2812b6ceb34e2fa1ad9c1c5eca9415bce0719ca3f92f74cd24
|
|||||||
CVE-2024-1136,0,0,609070256c4defa988e1113275bf8273fe15f50574e00ed3dcfde13143e471cc,2024-02-28T14:06:45.783000
|
CVE-2024-1136,0,0,609070256c4defa988e1113275bf8273fe15f50574e00ed3dcfde13143e471cc,2024-02-28T14:06:45.783000
|
||||||
CVE-2024-1137,0,0,9f8c1cf74ca4778ab709faeea998997368a7f042480977a7d6535f2dd892d7f7,2024-03-13T12:33:51.697000
|
CVE-2024-1137,0,0,9f8c1cf74ca4778ab709faeea998997368a7f042480977a7d6535f2dd892d7f7,2024-03-13T12:33:51.697000
|
||||||
CVE-2024-1138,0,0,0bb26866b03e9dd351d8284004467140fe2cfdfbd72af071fda864e5a2dc9e58,2024-03-13T12:33:51.697000
|
CVE-2024-1138,0,0,0bb26866b03e9dd351d8284004467140fe2cfdfbd72af071fda864e5a2dc9e58,2024-03-13T12:33:51.697000
|
||||||
CVE-2024-1139,1,1,fcb53b016a89db0029717168444fac33ac9c8268f043f5b1ef53bbb358230373,2024-04-25T17:24:59.967000
|
CVE-2024-1139,0,0,fcb53b016a89db0029717168444fac33ac9c8268f043f5b1ef53bbb358230373,2024-04-25T17:24:59.967000
|
||||||
CVE-2024-1140,0,0,113ab98fbbd3f38fc36026b5aef44eb4b38cd7d347ba07fcabb6b9d9a69118a5,2024-02-27T19:17:32.253000
|
CVE-2024-1140,0,0,113ab98fbbd3f38fc36026b5aef44eb4b38cd7d347ba07fcabb6b9d9a69118a5,2024-02-27T19:17:32.253000
|
||||||
CVE-2024-1141,0,0,2d32c65ed599159df83e8a47a1f55987e8e9877658103a494dc3a1f00162db73,2024-04-01T15:52:06.640000
|
CVE-2024-1141,0,0,2d32c65ed599159df83e8a47a1f55987e8e9877658103a494dc3a1f00162db73,2024-04-01T15:52:06.640000
|
||||||
CVE-2024-1142,0,0,00d2baa79f6b61708bb1dbc0a1a3ef8f1bea10f64fa60e391934eddcb51481c3,2024-03-21T12:58:51.093000
|
CVE-2024-1142,0,0,00d2baa79f6b61708bb1dbc0a1a3ef8f1bea10f64fa60e391934eddcb51481c3,2024-03-21T12:58:51.093000
|
||||||
@ -239683,7 +239683,7 @@ CVE-2024-1652,0,0,713b08425ff0d91e3a1f6c5fcc742628e562c3c90970b08c1ec718d504f2db
|
|||||||
CVE-2024-1653,0,0,875a0ad46333e774de4f895ea6a9ead74cdbdb6ae6c4ddb02a960bfb85513ae4,2024-02-27T14:19:41.650000
|
CVE-2024-1653,0,0,875a0ad46333e774de4f895ea6a9ead74cdbdb6ae6c4ddb02a960bfb85513ae4,2024-02-27T14:19:41.650000
|
||||||
CVE-2024-1654,0,0,ac0509f6deb6f3ed4a3e95d25ed4dd3bdd67f0f87914e461aded05c6f6644ae7,2024-03-14T12:52:09.877000
|
CVE-2024-1654,0,0,ac0509f6deb6f3ed4a3e95d25ed4dd3bdd67f0f87914e461aded05c6f6644ae7,2024-03-14T12:52:09.877000
|
||||||
CVE-2024-1655,0,0,4b77006431ba07ecbc46dae3c8a08b9d1a8f7126e8ade7abcd81e5f88d783104,2024-04-15T13:15:31.997000
|
CVE-2024-1655,0,0,4b77006431ba07ecbc46dae3c8a08b9d1a8f7126e8ade7abcd81e5f88d783104,2024-04-15T13:15:31.997000
|
||||||
CVE-2024-1657,1,1,d79f2f0b3f60eb4c02b99df35a253ec114d3722d77bf73e0ecf5a2388e076951,2024-04-25T17:24:59.967000
|
CVE-2024-1657,0,0,d79f2f0b3f60eb4c02b99df35a253ec114d3722d77bf73e0ecf5a2388e076951,2024-04-25T17:24:59.967000
|
||||||
CVE-2024-1658,0,0,bd2757c2314dc2f8bd52ce15b18a6ca41069d2e3f9ff401d7a725ad82b1db09d,2024-03-18T19:40:00.173000
|
CVE-2024-1658,0,0,bd2757c2314dc2f8bd52ce15b18a6ca41069d2e3f9ff401d7a725ad82b1db09d,2024-03-18T19:40:00.173000
|
||||||
CVE-2024-1660,0,0,068c83f9afc694d855bcbb99610bd3ca5f918af7baf81b6ceb2a3be3520f6bf7,2024-04-15T13:15:31.997000
|
CVE-2024-1660,0,0,068c83f9afc694d855bcbb99610bd3ca5f918af7baf81b6ceb2a3be3520f6bf7,2024-04-15T13:15:31.997000
|
||||||
CVE-2024-1661,0,0,45603ab3f5ace946374d33296115c15ac156a13c133622c70b4b519036cfa292,2024-04-11T01:24:28.913000
|
CVE-2024-1661,0,0,45603ab3f5ace946374d33296115c15ac156a13c133622c70b4b519036cfa292,2024-04-11T01:24:28.913000
|
||||||
@ -239732,7 +239732,7 @@ CVE-2024-1720,0,0,5a5ae92be6fac7e3fb5aac9fbad05927fd3add77d067fc4c0b5a11a75c8da7
|
|||||||
CVE-2024-1722,0,0,44f76876458eb58496685e90ceedacd781a70fa58f68fffc91c47d3fb5ef0258,2024-02-29T13:49:29.390000
|
CVE-2024-1722,0,0,44f76876458eb58496685e90ceedacd781a70fa58f68fffc91c47d3fb5ef0258,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-1723,0,0,6ede5956ec1f8bc932d476f2c9a22da838daca98409da5821be1a9704022149c,2024-03-13T18:15:58.530000
|
CVE-2024-1723,0,0,6ede5956ec1f8bc932d476f2c9a22da838daca98409da5821be1a9704022149c,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-1725,0,0,d50733b72e0a7510fad89b9c9b7bf0d2638e14767cb02af892440874a7d9300e,2024-04-03T00:15:08.563000
|
CVE-2024-1725,0,0,d50733b72e0a7510fad89b9c9b7bf0d2638e14767cb02af892440874a7d9300e,2024-04-03T00:15:08.563000
|
||||||
CVE-2024-1726,1,1,89dad850dcc0e1a88340678c957b303bc297c72f3495f60c2d2a69bcbd7f390b,2024-04-25T17:24:59.967000
|
CVE-2024-1726,0,0,89dad850dcc0e1a88340678c957b303bc297c72f3495f60c2d2a69bcbd7f390b,2024-04-25T17:24:59.967000
|
||||||
CVE-2024-1727,0,0,a7ba950431c841d63e5eda97447121909cf0b94a0e0f2a68d97b3e6ce11f4afe,2024-04-16T12:15:09.843000
|
CVE-2024-1727,0,0,a7ba950431c841d63e5eda97447121909cf0b94a0e0f2a68d97b3e6ce11f4afe,2024-04-16T12:15:09.843000
|
||||||
CVE-2024-1728,0,0,cc77f96c808327822a9f33d38543fe59887a1a70be257d5713ef1082e9fb55b5,2024-04-10T19:49:51.183000
|
CVE-2024-1728,0,0,cc77f96c808327822a9f33d38543fe59887a1a70be257d5713ef1082e9fb55b5,2024-04-10T19:49:51.183000
|
||||||
CVE-2024-1729,0,0,e89faa43e2aac352951c59ebd22691fbb83ea1dce43d3c94d1423497ec4f419a,2024-04-16T12:15:09.930000
|
CVE-2024-1729,0,0,e89faa43e2aac352951c59ebd22691fbb83ea1dce43d3c94d1423497ec4f419a,2024-04-16T12:15:09.930000
|
||||||
@ -241187,7 +241187,7 @@ CVE-2024-22356,0,0,d81d64e63fe9b642cced3e4c94acc5e30f0113b5fdf3bed9ebc6028d04aab
|
|||||||
CVE-2024-22357,0,0,7cc996f78175ddc6bc31990b99ad084fcec784716961a600ab611825166f830e,2024-04-12T12:43:57.400000
|
CVE-2024-22357,0,0,7cc996f78175ddc6bc31990b99ad084fcec784716961a600ab611825166f830e,2024-04-12T12:43:57.400000
|
||||||
CVE-2024-22358,0,0,bedc70eb5204faddc4ac58f3a3f1fe91ad78c0a0e3e3e71d749223ef4e09fea5,2024-04-15T13:15:31.997000
|
CVE-2024-22358,0,0,bedc70eb5204faddc4ac58f3a3f1fe91ad78c0a0e3e3e71d749223ef4e09fea5,2024-04-15T13:15:31.997000
|
||||||
CVE-2024-22359,0,0,a78ef4de6d794c3736fa556f8e489df7f77fbc569555c9098f3af17456ad2680,2024-04-15T13:15:31.997000
|
CVE-2024-22359,0,0,a78ef4de6d794c3736fa556f8e489df7f77fbc569555c9098f3af17456ad2680,2024-04-15T13:15:31.997000
|
||||||
CVE-2024-2236,0,1,80952342d7ffef3a7dc379705ae844588b9eba4a6660760e9c15f1d1ea642b37,2024-04-25T17:15:49.467000
|
CVE-2024-2236,0,0,80952342d7ffef3a7dc379705ae844588b9eba4a6660760e9c15f1d1ea642b37,2024-04-25T17:15:49.467000
|
||||||
CVE-2024-22360,0,0,b51802432bc04c6d8daeffb43226824cdd8f27647664bb8d35541e7d6a53f5a2,2024-04-03T17:24:18.150000
|
CVE-2024-22360,0,0,b51802432bc04c6d8daeffb43226824cdd8f27647664bb8d35541e7d6a53f5a2,2024-04-03T17:24:18.150000
|
||||||
CVE-2024-22361,0,0,2cb34447b61b8680c66e6f142987700b31f9f16d4e9b8d748c59e5b8ad5a9a29,2024-02-16T21:35:31.953000
|
CVE-2024-22361,0,0,2cb34447b61b8680c66e6f142987700b31f9f16d4e9b8d748c59e5b8ad5a9a29,2024-02-16T21:35:31.953000
|
||||||
CVE-2024-22362,0,0,4494985f455ed96204ebe979f8c6258ea6c0e638d2824040e5afe72aebdf02d6,2024-04-11T01:24:44.947000
|
CVE-2024-22362,0,0,4494985f455ed96204ebe979f8c6258ea6c0e638d2824040e5afe72aebdf02d6,2024-04-11T01:24:44.947000
|
||||||
@ -241200,7 +241200,7 @@ CVE-2024-2237,0,0,95217e309830b6a01494ecd2c39d8ef034463910771c1bc92cd3bee697f61f
|
|||||||
CVE-2024-22370,0,0,13df6251176042b21f4cc7eccb2248918a53b76e3179e3ca6bd1e1e82fbd0a45,2024-01-12T19:29:18.790000
|
CVE-2024-22370,0,0,13df6251176042b21f4cc7eccb2248918a53b76e3179e3ca6bd1e1e82fbd0a45,2024-01-12T19:29:18.790000
|
||||||
CVE-2024-22371,0,0,4bde0f360e03417565b1053dc8e4d6f3c0a609d9b4bebdd79ac08f66edab383f,2024-02-26T16:32:25.577000
|
CVE-2024-22371,0,0,4bde0f360e03417565b1053dc8e4d6f3c0a609d9b4bebdd79ac08f66edab383f,2024-02-26T16:32:25.577000
|
||||||
CVE-2024-22372,0,0,b1b41923d4d5e3a62f9aafb5eb6f291d0486263d2806b04c051fd8c8c54bfad1,2024-01-30T22:17:49.987000
|
CVE-2024-22372,0,0,b1b41923d4d5e3a62f9aafb5eb6f291d0486263d2806b04c051fd8c8c54bfad1,2024-01-30T22:17:49.987000
|
||||||
CVE-2024-22373,0,1,d1f4f666dc187ae0b555d619241ab2f3d3391d848ae198bb44bf62de2ef7063b,2024-04-25T17:25:05.903000
|
CVE-2024-22373,0,0,d1f4f666dc187ae0b555d619241ab2f3d3391d848ae198bb44bf62de2ef7063b,2024-04-25T17:25:05.903000
|
||||||
CVE-2024-2238,0,0,afd0d461b63ffbf0cdec79f63894ae69a7d59a0b22846a34ff25432e2a9728b9,2024-03-13T18:15:58.530000
|
CVE-2024-2238,0,0,afd0d461b63ffbf0cdec79f63894ae69a7d59a0b22846a34ff25432e2a9728b9,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-22380,0,0,fbb17e03b7392116b029e62cf5fc227ae3083f2acc9171774ca51468933ea1b7,2024-01-30T22:14:24.967000
|
CVE-2024-22380,0,0,fbb17e03b7392116b029e62cf5fc227ae3083f2acc9171774ca51468933ea1b7,2024-01-30T22:14:24.967000
|
||||||
CVE-2024-22383,0,0,810a6e86f28ef493260b232f9a886a5828bc2cb5687e22ad7a4e8bfc9a3765be,2024-03-05T13:41:01.900000
|
CVE-2024-22383,0,0,810a6e86f28ef493260b232f9a886a5828bc2cb5687e22ad7a4e8bfc9a3765be,2024-03-05T13:41:01.900000
|
||||||
@ -241208,7 +241208,7 @@ CVE-2024-22386,0,0,9bb868760c88683007f1f54485a980666afe5aeeb8bc008d8d811fea3dbfe
|
|||||||
CVE-2024-22388,0,0,da7359316abb172866812a3012c9f9fa4c74a86ab41d23e55880cf90ab42d985,2024-02-14T20:59:09.660000
|
CVE-2024-22388,0,0,da7359316abb172866812a3012c9f9fa4c74a86ab41d23e55880cf90ab42d985,2024-02-14T20:59:09.660000
|
||||||
CVE-2024-22389,0,0,96781b551653662b24bed6c6167841567f0e5e4776b3fb44064036280367773a,2024-02-14T18:04:45.380000
|
CVE-2024-22389,0,0,96781b551653662b24bed6c6167841567f0e5e4776b3fb44064036280367773a,2024-02-14T18:04:45.380000
|
||||||
CVE-2024-2239,0,0,39e7f275af33a75dc9ccc5324d6f8398d75467c16638ade753370c3004c45df2,2024-03-13T18:15:58.530000
|
CVE-2024-2239,0,0,39e7f275af33a75dc9ccc5324d6f8398d75467c16638ade753370c3004c45df2,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-22391,0,1,5b72b38a377d92d077458f0f85cda136688026b001632237d550d93caba42343,2024-04-25T17:25:05.903000
|
CVE-2024-22391,0,0,5b72b38a377d92d077458f0f85cda136688026b001632237d550d93caba42343,2024-04-25T17:25:05.903000
|
||||||
CVE-2024-22393,0,0,baae8029e1587725a02d8ccb1fb298e540bb69b478da7728d31a9731926e8718,2024-02-22T19:07:27.197000
|
CVE-2024-22393,0,0,baae8029e1587725a02d8ccb1fb298e540bb69b478da7728d31a9731926e8718,2024-02-22T19:07:27.197000
|
||||||
CVE-2024-22394,0,0,fdf2846817bf0321d479c4aa67f29d797db24255733cd4d946cc68e44bfccdc7,2024-02-14T21:46:40.537000
|
CVE-2024-22394,0,0,fdf2846817bf0321d479c4aa67f29d797db24255733cd4d946cc68e44bfccdc7,2024-02-14T21:46:40.537000
|
||||||
CVE-2024-22395,0,0,6711e106c8c4c38c682ec5a4d729c0e15c9677b5ef0302671313a8f4838fafc1,2024-02-26T13:42:22.567000
|
CVE-2024-22395,0,0,6711e106c8c4c38c682ec5a4d729c0e15c9677b5ef0302671313a8f4838fafc1,2024-02-26T13:42:22.567000
|
||||||
@ -242263,7 +242263,7 @@ CVE-2024-2463,0,0,1000d1bb0e067b3946ef610a261a2a460c1b4a25dacc3b01af2944abb9dde9
|
|||||||
CVE-2024-2464,0,0,258119b056e9fce5dd31506f1eb25477966980981d44726c57b4011817bcc3d6,2024-03-21T15:24:35.093000
|
CVE-2024-2464,0,0,258119b056e9fce5dd31506f1eb25477966980981d44726c57b4011817bcc3d6,2024-03-21T15:24:35.093000
|
||||||
CVE-2024-2465,0,0,8a7263ec4d3d7ab7fb04bd888fa4508d9ece49d5518f3ba48a9225f207c19c22,2024-03-21T15:24:35.093000
|
CVE-2024-2465,0,0,8a7263ec4d3d7ab7fb04bd888fa4508d9ece49d5518f3ba48a9225f207c19c22,2024-03-21T15:24:35.093000
|
||||||
CVE-2024-2466,0,0,9b693c57905d5c9df2784625e99d8311f4169bf72ecd0a55d11b3cf49c2f3f64,2024-03-27T12:29:30.307000
|
CVE-2024-2466,0,0,9b693c57905d5c9df2784625e99d8311f4169bf72ecd0a55d11b3cf49c2f3f64,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-2467,1,1,ac29470c2382b30093397872ff618ca67c4cc38c0d78ff75347f91bb673bc37f,2024-04-25T17:24:59.967000
|
CVE-2024-2467,0,0,ac29470c2382b30093397872ff618ca67c4cc38c0d78ff75347f91bb673bc37f,2024-04-25T17:24:59.967000
|
||||||
CVE-2024-2468,0,0,acae2326336f2322a6baa0f217a4c4dd168ec20ba1dcea9f5e39d94f312a5562,2024-03-25T01:51:01.223000
|
CVE-2024-2468,0,0,acae2326336f2322a6baa0f217a4c4dd168ec20ba1dcea9f5e39d94f312a5562,2024-03-25T01:51:01.223000
|
||||||
CVE-2024-24680,0,0,b7924ab65b210d54927b5f43c8c8edcd2081b2a565260632ae3116c1f0f333c4,2024-04-20T03:15:06.820000
|
CVE-2024-24680,0,0,b7924ab65b210d54927b5f43c8c8edcd2081b2a565260632ae3116c1f0f333c4,2024-04-20T03:15:06.820000
|
||||||
CVE-2024-24681,0,0,09faa6afb97dca8c5a40342ef46ed8da48a59db97ae4367588d4084f35b12a3b,2024-03-28T08:15:26.453000
|
CVE-2024-24681,0,0,09faa6afb97dca8c5a40342ef46ed8da48a59db97ae4367588d4084f35b12a3b,2024-03-28T08:15:26.453000
|
||||||
@ -242771,7 +242771,7 @@ CVE-2024-25559,0,0,b710ef2f87d2510e81b25ebbc4243b848284fc64bfa4b8a44d47d25b0e965
|
|||||||
CVE-2024-2556,0,0,5a3397ecc5fdef519ab75d3f33842b25dc006ffb41e1f908e35adb09560e9ffb,2024-04-11T01:25:27.740000
|
CVE-2024-2556,0,0,5a3397ecc5fdef519ab75d3f33842b25dc006ffb41e1f908e35adb09560e9ffb,2024-04-11T01:25:27.740000
|
||||||
CVE-2024-25567,0,0,bbb8c64eb3dcee3e8e89951734f837d0c3bea66c11459a30529f4c9133593805,2024-03-22T12:45:36.130000
|
CVE-2024-25567,0,0,bbb8c64eb3dcee3e8e89951734f837d0c3bea66c11459a30529f4c9133593805,2024-03-22T12:45:36.130000
|
||||||
CVE-2024-25568,0,0,64eb53482937f270c14cf377745a1f7d8d5cbc3555eb58e76e7de7c26a9505c7,2024-04-04T12:48:41.700000
|
CVE-2024-25568,0,0,64eb53482937f270c14cf377745a1f7d8d5cbc3555eb58e76e7de7c26a9505c7,2024-04-04T12:48:41.700000
|
||||||
CVE-2024-25569,0,1,7e329346c74743fe06c117f53b8fdb008c631202523e222e8c2da738974e94d3,2024-04-25T17:25:05.903000
|
CVE-2024-25569,0,0,7e329346c74743fe06c117f53b8fdb008c631202523e222e8c2da738974e94d3,2024-04-25T17:25:05.903000
|
||||||
CVE-2024-2557,0,0,a617119e7aec654c68da3fc71fccd99356ed7ca0eba1b1243e2bc71d72e1c32e,2024-04-11T01:25:27.817000
|
CVE-2024-2557,0,0,a617119e7aec654c68da3fc71fccd99356ed7ca0eba1b1243e2bc71d72e1c32e,2024-04-11T01:25:27.817000
|
||||||
CVE-2024-25572,0,0,6916ce68d4646365d0578802b2b08ffd76a62b8c07df1314570c90fc1d876f93,2024-04-11T12:47:44.137000
|
CVE-2024-25572,0,0,6916ce68d4646365d0578802b2b08ffd76a62b8c07df1314570c90fc1d876f93,2024-04-11T12:47:44.137000
|
||||||
CVE-2024-25574,0,0,4bc8d3cd97ad31d3dfd232c462a09dc1924d30756dc7bfcb27690950ff1edfb2,2024-04-02T12:50:42.233000
|
CVE-2024-25574,0,0,4bc8d3cd97ad31d3dfd232c462a09dc1924d30756dc7bfcb27690950ff1edfb2,2024-04-02T12:50:42.233000
|
||||||
@ -242813,7 +242813,7 @@ CVE-2024-25619,0,0,4148d7c6b7f88f108c739f8691091e275d5db2676638c192202b001773f23
|
|||||||
CVE-2024-2562,0,0,76cb38836dd4db9040793dbc75c2065bb0d9939dc57a1d6dae1f176138006dc6,2024-04-11T01:25:28.190000
|
CVE-2024-2562,0,0,76cb38836dd4db9040793dbc75c2065bb0d9939dc57a1d6dae1f176138006dc6,2024-04-11T01:25:28.190000
|
||||||
CVE-2024-25620,0,0,4dc0e7d0481efa671a76b60244b96320a6f1d8c82285e89393bb5facdd3f14f5,2024-02-15T06:23:39.303000
|
CVE-2024-25620,0,0,4dc0e7d0481efa671a76b60244b96320a6f1d8c82285e89393bb5facdd3f14f5,2024-02-15T06:23:39.303000
|
||||||
CVE-2024-25623,0,0,d7097ca06a605433eb8efcfef9343f15725de6d8ed69964da29f4e86bee1b907,2024-02-20T19:50:53.960000
|
CVE-2024-25623,0,0,d7097ca06a605433eb8efcfef9343f15725de6d8ed69964da29f4e86bee1b907,2024-02-20T19:50:53.960000
|
||||||
CVE-2024-25624,1,1,27af2648f04e67f34aacbfd50ce5c5d1a651701dae1fed6d021a684275a028dd,2024-04-25T17:24:59.967000
|
CVE-2024-25624,0,0,27af2648f04e67f34aacbfd50ce5c5d1a651701dae1fed6d021a684275a028dd,2024-04-25T17:24:59.967000
|
||||||
CVE-2024-25625,0,0,aa9fbe54dd7bd2282f80b78321777ab8fac3f81631cae43246d091ee25cf0360,2024-02-20T19:50:53.960000
|
CVE-2024-25625,0,0,aa9fbe54dd7bd2282f80b78321777ab8fac3f81631cae43246d091ee25cf0360,2024-02-20T19:50:53.960000
|
||||||
CVE-2024-25626,0,0,d9f83485f5fb6b4cc55a1d4f971342f8155aa2e72270d86c4d53f59fca85dc97,2024-02-20T19:50:53.960000
|
CVE-2024-25626,0,0,d9f83485f5fb6b4cc55a1d4f971342f8155aa2e72270d86c4d53f59fca85dc97,2024-02-20T19:50:53.960000
|
||||||
CVE-2024-25627,0,0,2bcab79d49f96281ac7197c55bb9f9a5171d7b9aac31488886e6d6a908f6c3e8,2024-02-16T21:39:50.223000
|
CVE-2024-25627,0,0,2bcab79d49f96281ac7197c55bb9f9a5171d7b9aac31488886e6d6a908f6c3e8,2024-02-16T21:39:50.223000
|
||||||
@ -242860,13 +242860,13 @@ CVE-2024-25697,0,0,87f097c1f7ed0e82757d82e95e600dd576ef9cb40b319980c27885e1d41ee
|
|||||||
CVE-2024-25698,0,0,687369323a3676b43d9872f13157867194abcaff3ec0cdf77866c10431d641b4,2024-04-19T23:15:10.093000
|
CVE-2024-25698,0,0,687369323a3676b43d9872f13157867194abcaff3ec0cdf77866c10431d641b4,2024-04-19T23:15:10.093000
|
||||||
CVE-2024-25699,0,0,0b51cd5f7cb608299fc6784b7d5d83ebe087ecc52f001d7940916b47a92ea6fe,2024-04-19T23:15:10.163000
|
CVE-2024-25699,0,0,0b51cd5f7cb608299fc6784b7d5d83ebe087ecc52f001d7940916b47a92ea6fe,2024-04-19T23:15:10.163000
|
||||||
CVE-2024-2570,0,0,199a0810957750fcfbf310e1d0f94d86c1b191cc17207657e7505077f649570c,2024-04-11T01:25:28.850000
|
CVE-2024-2570,0,0,199a0810957750fcfbf310e1d0f94d86c1b191cc17207657e7505077f649570c,2024-04-11T01:25:28.850000
|
||||||
CVE-2024-25700,0,0,3d94db70fa164c751f6e2475defd42da6dbfc547c79e4c6f5696896567164462,2024-04-04T19:24:50.670000
|
CVE-2024-25700,0,1,7af0107778f703960327721c61c9f88d292d8c7d8136f4aa2adf68e6ecb154dc,2024-04-25T18:15:07.817000
|
||||||
CVE-2024-25703,0,0,da3733614cb1834b853799f98d1a3c92723ef1c7e2a35fde52a7b8d068d8b937,2024-04-04T19:24:50.670000
|
CVE-2024-25703,0,1,c9ba42c9165d3ed0d256a2ca2c76dc0d53caec9ed526f17ff441553f5ef875e5,2024-04-25T19:15:49.520000
|
||||||
CVE-2024-25704,0,0,114594fcf216f4ad1cb9e193c395eaaff638bd00d0aaf049b84a152844cb7be5,2024-04-04T19:24:50.670000
|
CVE-2024-25704,0,1,b31f59b3da36cd1ad4c21679bf4d5448c9ac6d042a5537c086e62b3446556f78,2024-04-25T19:15:49.597000
|
||||||
CVE-2024-25705,0,0,34227715cb43f6e3640da9309be016863749bf56287f9ea1ec6440cc52ef53bb,2024-04-04T19:24:50.670000
|
CVE-2024-25705,0,1,da77fbd71e9cb9b93d31c57182ddbf8287305337f132cbcb286327b5364a7fe3,2024-04-25T19:15:49.660000
|
||||||
CVE-2024-25706,0,0,e5e0a0b76629b916f2eea4da7873e240433ae0abb1182c5974860d658c6ec205,2024-04-04T19:24:50.670000
|
CVE-2024-25706,0,1,943a20bd0f8efbd2cfe7b5bcd9e8b908c23b72c243de966b9fdb32cea68fe18b,2024-04-25T19:15:49.720000
|
||||||
CVE-2024-25708,0,0,0bfa26cc48edbaebdb07961ffdc2f6a8ef4ae650648bc898f6a9eb710ca124d4,2024-04-19T23:15:10.237000
|
CVE-2024-25708,0,0,0bfa26cc48edbaebdb07961ffdc2f6a8ef4ae650648bc898f6a9eb710ca124d4,2024-04-19T23:15:10.237000
|
||||||
CVE-2024-25709,0,0,dba8b4e7b06d8c4e90faaec4cb5d580f8f93a1f5afdcb145881f17c7773cd824,2024-04-19T23:15:10.307000
|
CVE-2024-25709,0,1,c32a39188765515d0d644e2bbacedfa742d420e65c2db16f3996d6038ac83402,2024-04-25T19:15:49.777000
|
||||||
CVE-2024-2571,0,0,3d67d6a1c9f99bb6624a38a13eb1d666f1012c18415504b92f8b3ceaa94bd45b,2024-04-11T01:25:28.927000
|
CVE-2024-2571,0,0,3d67d6a1c9f99bb6624a38a13eb1d666f1012c18415504b92f8b3ceaa94bd45b,2024-04-11T01:25:28.927000
|
||||||
CVE-2024-25710,0,0,ab520189ef240d987a199d6e814c3161f9be705f75e79c9ab42865a168e0f18f,2024-03-07T17:15:12.940000
|
CVE-2024-25710,0,0,ab520189ef240d987a199d6e814c3161f9be705f75e79c9ab42865a168e0f18f,2024-03-07T17:15:12.940000
|
||||||
CVE-2024-25711,0,0,d3f8257017dbfc5bdd6c4e4b8e295b2d28e0327c4086b62797abd4226251f28d,2024-02-27T14:20:06.637000
|
CVE-2024-25711,0,0,d3f8257017dbfc5bdd6c4e4b8e295b2d28e0327c4086b62797abd4226251f28d,2024-02-27T14:20:06.637000
|
||||||
@ -244315,8 +244315,8 @@ CVE-2024-28237,0,0,e54564ebce9f53fbf47a1a617d4c2539d1d06a16522000543afac14f934cf
|
|||||||
CVE-2024-28238,0,0,38219e010007b7fe5426826144cd2eabd2e22d36d31c50aa8471901674b524b3,2024-03-13T12:33:51.697000
|
CVE-2024-28238,0,0,38219e010007b7fe5426826144cd2eabd2e22d36d31c50aa8471901674b524b3,2024-03-13T12:33:51.697000
|
||||||
CVE-2024-28239,0,0,faccbe471f1ae24e1ff85c8426d7d0f8447bb8e496567a24af19b5962ca5e940,2024-03-13T12:33:51.697000
|
CVE-2024-28239,0,0,faccbe471f1ae24e1ff85c8426d7d0f8447bb8e496567a24af19b5962ca5e940,2024-03-13T12:33:51.697000
|
||||||
CVE-2024-2824,0,0,328fa7a1e6a80e6ca42082af4cfcb421fc04b2d053b7da9ed9a17fe14e601656,2024-04-11T01:25:38.183000
|
CVE-2024-2824,0,0,328fa7a1e6a80e6ca42082af4cfcb421fc04b2d053b7da9ed9a17fe14e601656,2024-04-11T01:25:38.183000
|
||||||
CVE-2024-28240,1,1,5389312313d44ebc811e803d5f7e8514a59b26f72ab652d5adae6ff990991df1,2024-04-25T17:24:59.967000
|
CVE-2024-28240,0,0,5389312313d44ebc811e803d5f7e8514a59b26f72ab652d5adae6ff990991df1,2024-04-25T17:24:59.967000
|
||||||
CVE-2024-28241,1,1,020eccadcd5f1029a3f6ba6e9de74874d125183be5078ee4150066646db9c4fe,2024-04-25T17:24:59.967000
|
CVE-2024-28241,0,0,020eccadcd5f1029a3f6ba6e9de74874d125183be5078ee4150066646db9c4fe,2024-04-25T17:24:59.967000
|
||||||
CVE-2024-28242,0,0,8ab07e1269ba6fcb3729d56ebd38e0bb27a072562eae3d4f40fee250d49e0664,2024-03-17T22:38:29.433000
|
CVE-2024-28242,0,0,8ab07e1269ba6fcb3729d56ebd38e0bb27a072562eae3d4f40fee250d49e0664,2024-03-17T22:38:29.433000
|
||||||
CVE-2024-28243,0,0,b62121443f467a21df9a72e6de805a7094f659c79fc9b69ca113c6cd74783b8e,2024-03-26T12:55:05.010000
|
CVE-2024-28243,0,0,b62121443f467a21df9a72e6de805a7094f659c79fc9b69ca113c6cd74783b8e,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-28244,0,0,8a0b0822374c9608b1ee3be4ddc31140538b510b0fd28061fd05bdbdf794fae2,2024-03-26T12:55:05.010000
|
CVE-2024-28244,0,0,8a0b0822374c9608b1ee3be4ddc31140538b510b0fd28061fd05bdbdf794fae2,2024-03-26T12:55:05.010000
|
||||||
@ -244495,8 +244495,8 @@ CVE-2024-28718,0,0,5f0a839ac4250fecd45af64be191fc810afd4c63b89d4fc0f63a8d6841ad9
|
|||||||
CVE-2024-28722,0,0,9f3d9610dcb3a88962a775c4bceb1adf34898d2ad0bcbbf8f024b9f550b378b8,2024-04-22T13:28:43.747000
|
CVE-2024-28722,0,0,9f3d9610dcb3a88962a775c4bceb1adf34898d2ad0bcbbf8f024b9f550b378b8,2024-04-22T13:28:43.747000
|
||||||
CVE-2024-2873,0,0,38b44d61d3230fcaba1c551f8073fe8dda4eadd0cd50d8705b668e3c4529f628,2024-03-26T12:55:05.010000
|
CVE-2024-2873,0,0,38b44d61d3230fcaba1c551f8073fe8dda4eadd0cd50d8705b668e3c4529f628,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-28732,0,0,ec5e6c9882e97cf45b4c95c1c5ffa7b0d32a1a92ed89d346b2a432d5adcd9a14,2024-04-08T18:48:40.217000
|
CVE-2024-28732,0,0,ec5e6c9882e97cf45b4c95c1c5ffa7b0d32a1a92ed89d346b2a432d5adcd9a14,2024-04-08T18:48:40.217000
|
||||||
CVE-2024-28734,0,0,f4687488b267ac163f3e0d4b9d3eb38f6f5a041c19b985a560624c627a7f4e16,2024-04-01T21:15:33.200000
|
CVE-2024-28734,0,1,ab89139fe8499f37581a857758b5dd911586d271cde02f4e4d8e7c034753a72e,2024-04-25T19:15:49.850000
|
||||||
CVE-2024-28735,0,0,27a3fb731c930af76bd97477e46fd57873e1d90373135fa3e190a08c95c9db47,2024-04-01T21:15:37.360000
|
CVE-2024-28735,0,1,96e109e8715188f76ee57d058460375db0bc7cb9155343dbdf53039c574fd622,2024-04-25T19:15:49.910000
|
||||||
CVE-2024-28741,0,0,ba024af92e852f8cb07287ef01e36bda32f00b417065062fcdaec7d68cbce596,2024-04-08T18:48:40.217000
|
CVE-2024-28741,0,0,ba024af92e852f8cb07287ef01e36bda32f00b417065062fcdaec7d68cbce596,2024-04-08T18:48:40.217000
|
||||||
CVE-2024-28744,0,0,9056a307a9a71984eefaac6c50b454d137864982a45296e74420e75a1c59bcd1,2024-04-08T18:48:40.217000
|
CVE-2024-28744,0,0,9056a307a9a71984eefaac6c50b454d137864982a45296e74420e75a1c59bcd1,2024-04-08T18:48:40.217000
|
||||||
CVE-2024-28745,0,0,15394cfaddabd1c5537f1c3a0b8bc4d088d58358d421e9d9475a38fad6a5e44f,2024-03-18T12:38:25.490000
|
CVE-2024-28745,0,0,15394cfaddabd1c5537f1c3a0b8bc4d088d58358d421e9d9475a38fad6a5e44f,2024-03-18T12:38:25.490000
|
||||||
@ -244517,7 +244517,7 @@ CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e
|
|||||||
CVE-2024-28824,0,0,5a9476ae0fdb0520e3a986c832f5f9e27a50da5cb3aa11e06910544296f0e530,2024-03-22T12:45:36.130000
|
CVE-2024-28824,0,0,5a9476ae0fdb0520e3a986c832f5f9e27a50da5cb3aa11e06910544296f0e530,2024-03-22T12:45:36.130000
|
||||||
CVE-2024-28825,0,0,55c040424ce53f1f08bb6f64aa855e81724a1114bed9afdcdd061680c74c099b,2024-04-24T13:39:42.883000
|
CVE-2024-28825,0,0,55c040424ce53f1f08bb6f64aa855e81724a1114bed9afdcdd061680c74c099b,2024-04-24T13:39:42.883000
|
||||||
CVE-2024-2883,0,0,e66be81816608580e2e81ffcb02cca4ae9a2aa5cbea60907cc2e1d80cffbaf4a,2024-03-29T04:15:08.743000
|
CVE-2024-2883,0,0,e66be81816608580e2e81ffcb02cca4ae9a2aa5cbea60907cc2e1d80cffbaf4a,2024-03-29T04:15:08.743000
|
||||||
CVE-2024-28834,0,0,91386e6fe68de98132419bae7f584fb89f08a35334fda5f1baf244927114cd0b,2024-04-18T05:15:48.167000
|
CVE-2024-28834,0,1,43f00cbc6e1d7c004d417f596d771ec499a1f9391765678308f80bf7021bddc2,2024-04-25T18:15:07.903000
|
||||||
CVE-2024-28835,0,0,ed179ff9c8ac6c0a49a4fa6aca5aabe007945dc4c4ad20ab7dd2491ca4f02b05,2024-04-18T05:15:48.263000
|
CVE-2024-28835,0,0,ed179ff9c8ac6c0a49a4fa6aca5aabe007945dc4c4ad20ab7dd2491ca4f02b05,2024-04-18T05:15:48.263000
|
||||||
CVE-2024-28836,0,0,ef9665bb9a0895616f82c07b3b8f93ecbb9dcd318a88906096e3fd29af01d6df,2024-04-03T12:38:04.840000
|
CVE-2024-28836,0,0,ef9665bb9a0895616f82c07b3b8f93ecbb9dcd318a88906096e3fd29af01d6df,2024-04-03T12:38:04.840000
|
||||||
CVE-2024-28847,0,0,91e84a48bf06058e30212c2ac01ab493cb3959d3b6bfc21c8760687b856baf08,2024-03-17T22:38:29.433000
|
CVE-2024-28847,0,0,91e84a48bf06058e30212c2ac01ab493cb3959d3b6bfc21c8760687b856baf08,2024-03-17T22:38:29.433000
|
||||||
@ -244655,6 +244655,7 @@ CVE-2024-29046,0,0,934c54a354b7983248c1038ad849bfccbb8c13c9b2573a8e1ac4e386edc36
|
|||||||
CVE-2024-29047,0,0,caa5c4d2d0f1bf304a4ee6216a36e2941161e0820c7a8b8276d73d490e44c6f2,2024-04-10T13:24:00.070000
|
CVE-2024-29047,0,0,caa5c4d2d0f1bf304a4ee6216a36e2941161e0820c7a8b8276d73d490e44c6f2,2024-04-10T13:24:00.070000
|
||||||
CVE-2024-29048,0,0,95c20ac7de8bc227c17638fc56daca89aa86872041643304379a7c60cc8dac12,2024-04-10T13:24:00.070000
|
CVE-2024-29048,0,0,95c20ac7de8bc227c17638fc56daca89aa86872041643304379a7c60cc8dac12,2024-04-10T13:24:00.070000
|
||||||
CVE-2024-29049,0,0,98b5dd33fb953ac1a2154bc311144d3dc2c9909067218ab4461517f82cf5b6e3,2024-04-09T17:15:58.440000
|
CVE-2024-29049,0,0,98b5dd33fb953ac1a2154bc311144d3dc2c9909067218ab4461517f82cf5b6e3,2024-04-09T17:15:58.440000
|
||||||
|
CVE-2024-2905,1,1,9435a5b5df71b7d5734b0be3755611f5be0fda4fc626759f28e89823bb5ce3c3,2024-04-25T18:15:08.037000
|
||||||
CVE-2024-29050,0,0,b81f6cf3efac23ad29fb0ec76c4ddabcbf2924e0345ac83e98aface32c2a7152,2024-04-10T13:24:00.070000
|
CVE-2024-29050,0,0,b81f6cf3efac23ad29fb0ec76c4ddabcbf2924e0345ac83e98aface32c2a7152,2024-04-10T13:24:00.070000
|
||||||
CVE-2024-29052,0,0,9420b1ae7e90dd1acfc7cdaac9046557a2de2a3786dd73ca82d15f399613dda9,2024-04-10T13:24:00.070000
|
CVE-2024-29052,0,0,9420b1ae7e90dd1acfc7cdaac9046557a2de2a3786dd73ca82d15f399613dda9,2024-04-10T13:24:00.070000
|
||||||
CVE-2024-29053,0,0,697fbabaf9facdb0a00abec112c7dd524df1d041a7d2e72ce266e3893d05d84e,2024-04-10T13:24:00.070000
|
CVE-2024-29053,0,0,697fbabaf9facdb0a00abec112c7dd524df1d041a7d2e72ce266e3893d05d84e,2024-04-10T13:24:00.070000
|
||||||
@ -244887,7 +244888,7 @@ CVE-2024-29640,0,0,87923c5f8022466da2d8ef6f4760770a9b5d77108f7ca786dd890e142c1a6
|
|||||||
CVE-2024-29644,0,0,39829980cc0c3cec42e83f1a7d1e74f651bed504f90005be4e46042a91527a65,2024-03-26T12:55:05.010000
|
CVE-2024-29644,0,0,39829980cc0c3cec42e83f1a7d1e74f651bed504f90005be4e46042a91527a65,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-29650,0,0,8ad374bfabee755625e57dff59b85656db535734df280985070b11f8f0b8c3b6,2024-03-25T16:43:06.137000
|
CVE-2024-29650,0,0,8ad374bfabee755625e57dff59b85656db535734df280985070b11f8f0b8c3b6,2024-03-25T16:43:06.137000
|
||||||
CVE-2024-2966,0,0,474ae2e5b1d6c6447ca9bee38c5e4dafcb7b2c2503070dea1f4351179cfe9798,2024-04-11T12:47:44.137000
|
CVE-2024-2966,0,0,474ae2e5b1d6c6447ca9bee38c5e4dafcb7b2c2503070dea1f4351179cfe9798,2024-04-11T12:47:44.137000
|
||||||
CVE-2024-29660,1,1,5cadce48d0d5ee00a49b61fd1e0081663846d39310fbd0877926aeae99bb4e7f,2024-04-25T17:24:59.967000
|
CVE-2024-29660,0,0,5cadce48d0d5ee00a49b61fd1e0081663846d39310fbd0877926aeae99bb4e7f,2024-04-25T17:24:59.967000
|
||||||
CVE-2024-29661,0,0,0af56c9e6c3f4789c6952b6fc2267b505cb820e8c95b985131711686eeb372e4,2024-04-22T13:28:34.007000
|
CVE-2024-29661,0,0,0af56c9e6c3f4789c6952b6fc2267b505cb820e8c95b985131711686eeb372e4,2024-04-22T13:28:34.007000
|
||||||
CVE-2024-29666,0,0,a8926fce030310567330d9b7c126003f732556a2ce979a6a3fd232707f8bbd99,2024-03-26T12:55:05.010000
|
CVE-2024-29666,0,0,a8926fce030310567330d9b7c126003f732556a2ce979a6a3fd232707f8bbd99,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-29667,0,0,1425649af0fe5303ac647a61948436bd641374e6a3c12789edb4485c777699d5,2024-04-01T01:12:59.077000
|
CVE-2024-29667,0,0,1425649af0fe5303ac647a61948436bd641374e6a3c12789edb4485c777699d5,2024-04-01T01:12:59.077000
|
||||||
@ -245580,7 +245581,7 @@ CVE-2024-30884,0,0,f3a012fdbee7dcdfbc54fb994726741009310b51eecb5e393a9f37c21fbc6
|
|||||||
CVE-2024-30885,0,0,053b43f723add848d769270cc9eabce98f2bef07551ec399121d9cd8c29459b9,2024-04-11T12:47:44.137000
|
CVE-2024-30885,0,0,053b43f723add848d769270cc9eabce98f2bef07551ec399121d9cd8c29459b9,2024-04-11T12:47:44.137000
|
||||||
CVE-2024-30886,0,0,78e1ecd0ca2250189e977131b68a166fe34cee6c425475aee62ecd362250a877,2024-04-24T13:39:42.883000
|
CVE-2024-30886,0,0,78e1ecd0ca2250189e977131b68a166fe34cee6c425475aee62ecd362250a877,2024-04-24T13:39:42.883000
|
||||||
CVE-2024-3089,0,0,3fabfa41353ef448324a78880efdc147758ef8ec187a9149e265df8463410caf,2024-04-11T01:25:53.493000
|
CVE-2024-3089,0,0,3fabfa41353ef448324a78880efdc147758ef8ec187a9149e265df8463410caf,2024-04-11T01:25:53.493000
|
||||||
CVE-2024-30890,1,1,501d5887b268b52d808df81626bc53713f4cadec32b76ecd6d2f5d22282fde8d,2024-04-25T17:24:59.967000
|
CVE-2024-30890,0,0,501d5887b268b52d808df81626bc53713f4cadec32b76ecd6d2f5d22282fde8d,2024-04-25T17:24:59.967000
|
||||||
CVE-2024-30891,0,0,eaa8b86280359f3d73f2f1d8a4256591b68799e019aa5c9624f2214d6f01088e,2024-04-05T12:40:52.763000
|
CVE-2024-30891,0,0,eaa8b86280359f3d73f2f1d8a4256591b68799e019aa5c9624f2214d6f01088e,2024-04-05T12:40:52.763000
|
||||||
CVE-2024-3090,0,0,1ed40e7cb1e30a4ce92e2079672b0e468d7f34e176dec853f1d60bd19ebc8837,2024-04-11T01:25:53.580000
|
CVE-2024-3090,0,0,1ed40e7cb1e30a4ce92e2079672b0e468d7f34e176dec853f1d60bd19ebc8837,2024-04-11T01:25:53.580000
|
||||||
CVE-2024-3091,0,0,2ae7c1b43ade453e63e12426e1c2a8ce72ad964ac1b86e004dbb22f9a3bc2a75,2024-04-11T01:25:53.663000
|
CVE-2024-3091,0,0,2ae7c1b43ade453e63e12426e1c2a8ce72ad964ac1b86e004dbb22f9a3bc2a75,2024-04-11T01:25:53.663000
|
||||||
@ -245600,6 +245601,7 @@ CVE-2024-30928,0,0,caf910b47d65799a57161146e34602829f47360642a8c8fe911c2d8ad140d
|
|||||||
CVE-2024-30929,0,0,3a4b987ba39620a2fa553421d0680484415e43d1909ca51832f180e76c2d2d0f,2024-04-19T13:10:25.637000
|
CVE-2024-30929,0,0,3a4b987ba39620a2fa553421d0680484415e43d1909ca51832f180e76c2d2d0f,2024-04-19T13:10:25.637000
|
||||||
CVE-2024-3093,0,0,32bf1c70eab5da7d509a40d74982ac8945909f57d49846c0cf619694e2add382,2024-04-10T13:23:38.787000
|
CVE-2024-3093,0,0,32bf1c70eab5da7d509a40d74982ac8945909f57d49846c0cf619694e2add382,2024-04-10T13:23:38.787000
|
||||||
CVE-2024-30938,0,0,bb3c87898373ca38f4e6504fd7f34baf274fe16334abf7626317b091c9072986,2024-04-19T13:10:25.637000
|
CVE-2024-30938,0,0,bb3c87898373ca38f4e6504fd7f34baf274fe16334abf7626317b091c9072986,2024-04-19T13:10:25.637000
|
||||||
|
CVE-2024-30939,1,1,3896cec5bfcf879f2ba87214556d281d12e0dcb87609b837870acc446a8df3d4,2024-04-25T19:15:49.970000
|
||||||
CVE-2024-3094,0,0,cba466c06d21b74e1043491724188f63d6d0b9ba1993a884907c833ea9999b43,2024-04-12T07:15:08.740000
|
CVE-2024-3094,0,0,cba466c06d21b74e1043491724188f63d6d0b9ba1993a884907c833ea9999b43,2024-04-12T07:15:08.740000
|
||||||
CVE-2024-30946,0,0,0dff329aaece035fc82f00595012379643bd5a0edb89ee3a7369d6609e13a4d1,2024-04-02T18:12:16.283000
|
CVE-2024-30946,0,0,0dff329aaece035fc82f00595012379643bd5a0edb89ee3a7369d6609e13a4d1,2024-04-02T18:12:16.283000
|
||||||
CVE-2024-30950,0,0,992550aa16b7b69040c27b7eadb42b4babd9ce9c185610db0008bbada9865896,2024-04-17T20:08:21.887000
|
CVE-2024-30950,0,0,992550aa16b7b69040c27b7eadb42b4babd9ce9c185610db0008bbada9865896,2024-04-17T20:08:21.887000
|
||||||
@ -245650,10 +245652,10 @@ CVE-2024-31064,0,0,f87fea954d6623f92ad98dc571744769b0a41ba2a8ecac509cf34a5bc1aaa
|
|||||||
CVE-2024-31065,0,0,36c2c4ddfef551b3df9316a574430562ba7ec0ea51f9e5ecbfa0af993c7946d3,2024-03-28T20:53:20.813000
|
CVE-2024-31065,0,0,36c2c4ddfef551b3df9316a574430562ba7ec0ea51f9e5ecbfa0af993c7946d3,2024-03-28T20:53:20.813000
|
||||||
CVE-2024-31069,0,0,d29f1e01bd410bc9e289e23142033a3c4695bcaf7cee5af8670edc7046e0bf75,2024-04-15T13:15:51.577000
|
CVE-2024-31069,0,0,d29f1e01bd410bc9e289e23142033a3c4695bcaf7cee5af8670edc7046e0bf75,2024-04-15T13:15:51.577000
|
||||||
CVE-2024-31077,0,0,cf1dae6bdc673263e7fd88f3fafa76996295a3cc4f001c878e21a09e0714f3a7,2024-04-23T12:52:09.397000
|
CVE-2024-31077,0,0,cf1dae6bdc673263e7fd88f3fafa76996295a3cc4f001c878e21a09e0714f3a7,2024-04-23T12:52:09.397000
|
||||||
CVE-2024-31080,0,0,629b02d1f8559238cad068acffb68f622aa7e385525cc57d4a06cac698d1aae0,2024-04-24T02:15:45.987000
|
CVE-2024-31080,0,1,5513024a0b3f248fb69c15af5a5e265c6ed8b37e103e0163404d53665b0e4bde,2024-04-25T18:15:08.253000
|
||||||
CVE-2024-31081,0,0,aaae90b3640767676e5e4ba074b3b6ae7552e9f1f8de74b5351b5d6ebc5aa288,2024-04-24T02:15:46.110000
|
CVE-2024-31081,0,1,7bd29e5a7580bbe901288959c9a09eca84e7bfa9965dec91b5dd5a43032127ca,2024-04-25T18:15:08.367000
|
||||||
CVE-2024-31082,0,0,5bd47d789b65017aa198a3c2ac34b0aa429ab490a4fcd5200779dbcd7d5b3ef9,2024-04-04T16:33:06.610000
|
CVE-2024-31082,0,0,5bd47d789b65017aa198a3c2ac34b0aa429ab490a4fcd5200779dbcd7d5b3ef9,2024-04-04T16:33:06.610000
|
||||||
CVE-2024-31083,0,0,6b8fa0ee3f2b9492b7e03ecb2c6e7897f08eca8287d3790467ca98011cdd0b0a,2024-04-24T02:15:46.203000
|
CVE-2024-31083,0,1,01c531cf6a8b2d6580f2b3a1f4d74508b0cde7e769c1aac3d86ccf7e3a0382b7,2024-04-25T18:15:08.470000
|
||||||
CVE-2024-31084,0,0,7e7f6ad60462c421140a8806edcef098f25e94de0014c2ff06256ca8e21d3894,2024-04-01T01:12:59.077000
|
CVE-2024-31084,0,0,7e7f6ad60462c421140a8806edcef098f25e94de0014c2ff06256ca8e21d3894,2024-04-01T01:12:59.077000
|
||||||
CVE-2024-31085,0,0,159d63f28600902a854d5dada2c0b5fba89225c71015785af44f46e211303b47,2024-04-01T01:12:59.077000
|
CVE-2024-31085,0,0,159d63f28600902a854d5dada2c0b5fba89225c71015785af44f46e211303b47,2024-04-01T01:12:59.077000
|
||||||
CVE-2024-31086,0,0,3a59132be6de96612b5e7dbc7323f59f175814cf3bfa0c8c82639a22898b6c14,2024-04-15T13:15:31.997000
|
CVE-2024-31086,0,0,3a59132be6de96612b5e7dbc7323f59f175814cf3bfa0c8c82639a22898b6c14,2024-04-15T13:15:31.997000
|
||||||
@ -245886,7 +245888,7 @@ CVE-2024-31547,0,0,79c088d9519e1ba5d4decbbdb950409a1ff93781e519e023ecbe916ef398d
|
|||||||
CVE-2024-31552,0,0,5a9db2be00e7b7077a4a60e9105689c87f7a53feda5b2567edda13b704df8f81,2024-04-19T18:29:53.040000
|
CVE-2024-31552,0,0,5a9db2be00e7b7077a4a60e9105689c87f7a53feda5b2567edda13b704df8f81,2024-04-19T18:29:53.040000
|
||||||
CVE-2024-3156,0,0,4f0be00c0207aeed7fb186de5775d865483597f176357d0ad848ff41024a288c,2024-04-19T23:15:11.537000
|
CVE-2024-3156,0,0,4f0be00c0207aeed7fb186de5775d865483597f176357d0ad848ff41024a288c,2024-04-19T23:15:11.537000
|
||||||
CVE-2024-3157,0,0,efbf5e20eaa98706deef52c26be2e1cba3d67ed28d54a5b0520df90b69e7c692,2024-04-19T23:15:11.593000
|
CVE-2024-3157,0,0,efbf5e20eaa98706deef52c26be2e1cba3d67ed28d54a5b0520df90b69e7c692,2024-04-19T23:15:11.593000
|
||||||
CVE-2024-31574,1,1,9557f9d440c15cad853b3b201ad71c9482a5a0d678031f67eb8305f497f6b516,2024-04-25T17:24:59.967000
|
CVE-2024-31574,0,0,9557f9d440c15cad853b3b201ad71c9482a5a0d678031f67eb8305f497f6b516,2024-04-25T17:24:59.967000
|
||||||
CVE-2024-31576,0,0,741c8998460302eafaf2dd6cd838e7890c169c726e59c5f45ee51622793abfa6,2024-04-15T16:15:07.270000
|
CVE-2024-31576,0,0,741c8998460302eafaf2dd6cd838e7890c169c726e59c5f45ee51622793abfa6,2024-04-15T16:15:07.270000
|
||||||
CVE-2024-31578,0,0,4c90aef50a02aec622bb8c70d230352c3d3dbfba07e0b0b93d71a37f5c581d6d,2024-04-17T15:31:50.160000
|
CVE-2024-31578,0,0,4c90aef50a02aec622bb8c70d230352c3d3dbfba07e0b0b93d71a37f5c581d6d,2024-04-17T15:31:50.160000
|
||||||
CVE-2024-3158,0,0,10f7ffa67053f9b78f0dc7e48028626f5209dcb47c62106618b35565e7e9d9f6,2024-04-19T23:15:11.643000
|
CVE-2024-3158,0,0,10f7ffa67053f9b78f0dc7e48028626f5209dcb47c62106618b35565e7e9d9f6,2024-04-19T23:15:11.643000
|
||||||
@ -245914,7 +245916,7 @@ CVE-2024-3167,0,0,c19ad392a8875e6cb3d8eb9a976aa540fa751cbd03136dde207326521a2375
|
|||||||
CVE-2024-31678,0,0,6d17d4ce9eaa15ebb6367a838566d027b53ddba56e09f333fd8cadacfd1d2447,2024-04-12T12:44:04.930000
|
CVE-2024-31678,0,0,6d17d4ce9eaa15ebb6367a838566d027b53ddba56e09f333fd8cadacfd1d2447,2024-04-12T12:44:04.930000
|
||||||
CVE-2024-31680,0,0,9cd3893ac983fae5e4213584fc439ab2d2b21e3e6bebab8790c0104ed80c76e1,2024-04-17T12:48:07.510000
|
CVE-2024-31680,0,0,9cd3893ac983fae5e4213584fc439ab2d2b21e3e6bebab8790c0104ed80c76e1,2024-04-17T12:48:07.510000
|
||||||
CVE-2024-31744,0,0,7de9e0ac4d1881e8e6a1c9cabea807c4b59ffea44a7ce9a28f0f69a4b5f1eba8,2024-04-19T16:19:49.043000
|
CVE-2024-31744,0,0,7de9e0ac4d1881e8e6a1c9cabea807c4b59ffea44a7ce9a28f0f69a4b5f1eba8,2024-04-19T16:19:49.043000
|
||||||
CVE-2024-31745,0,1,a3bdd0cf6c191f4f752a70ac6769fb5b2d5c89636eeffe60e00827ad5ab48d32,2024-04-25T16:15:11.227000
|
CVE-2024-31745,0,0,a3bdd0cf6c191f4f752a70ac6769fb5b2d5c89636eeffe60e00827ad5ab48d32,2024-04-25T16:15:11.227000
|
||||||
CVE-2024-31750,0,0,ef2fe441e5dcedf0cb2da823df8fe57e9b7ada67d4a5ac9a3c649524c0ed2fa2,2024-04-19T13:10:25.637000
|
CVE-2024-31750,0,0,ef2fe441e5dcedf0cb2da823df8fe57e9b7ada67d4a5ac9a3c649524c0ed2fa2,2024-04-19T13:10:25.637000
|
||||||
CVE-2024-31759,0,0,7081cd22df5b9e4148ecc914176fc1f6cc04366073f8b1e4eccd8dfe4f2b7d73,2024-04-17T12:48:07.510000
|
CVE-2024-31759,0,0,7081cd22df5b9e4148ecc914176fc1f6cc04366073f8b1e4eccd8dfe4f2b7d73,2024-04-17T12:48:07.510000
|
||||||
CVE-2024-31760,0,0,7b1e0b53a94a63e7f108110799c5f85524efc23136fc5608e680b8482e690959,2024-04-17T12:48:07.510000
|
CVE-2024-31760,0,0,7b1e0b53a94a63e7f108110799c5f85524efc23136fc5608e680b8482e690959,2024-04-17T12:48:07.510000
|
||||||
@ -246105,7 +246107,7 @@ CVE-2024-32206,0,0,75e2f6344ef11995a7b224164fb98cef520a3da698959b3897e594f3d6e35
|
|||||||
CVE-2024-3221,0,0,feefc929b27a3432f5d1352d15fe99f1f6ccd294cecb07c343d15630058ba883,2024-04-11T01:25:56.367000
|
CVE-2024-3221,0,0,feefc929b27a3432f5d1352d15fe99f1f6ccd294cecb07c343d15630058ba883,2024-04-11T01:25:56.367000
|
||||||
CVE-2024-3222,0,0,66f6b4b9196c6c0a91ef8acd4cd0373a609da64e89b651a11374a40389e0fbce,2024-04-11T01:25:56.443000
|
CVE-2024-3222,0,0,66f6b4b9196c6c0a91ef8acd4cd0373a609da64e89b651a11374a40389e0fbce,2024-04-11T01:25:56.443000
|
||||||
CVE-2024-3223,0,0,9ffc982a7efad24c324809c3c91bef1f04ff8280442a22bc3b8b997888a9a5ba,2024-04-11T01:25:56.520000
|
CVE-2024-3223,0,0,9ffc982a7efad24c324809c3c91bef1f04ff8280442a22bc3b8b997888a9a5ba,2024-04-11T01:25:56.520000
|
||||||
CVE-2024-32236,1,1,ba25489404910901f00e1fe403cd34c61ee6685a689103bb387cc7f62005501b,2024-04-25T17:24:59.967000
|
CVE-2024-32236,0,0,ba25489404910901f00e1fe403cd34c61ee6685a689103bb387cc7f62005501b,2024-04-25T17:24:59.967000
|
||||||
CVE-2024-32238,0,0,0e920ec9ded0c0837401c703af1964a27843eb631a1c2ab20523a0b29f896ad3,2024-04-23T12:52:30.940000
|
CVE-2024-32238,0,0,0e920ec9ded0c0837401c703af1964a27843eb631a1c2ab20523a0b29f896ad3,2024-04-23T12:52:30.940000
|
||||||
CVE-2024-3224,0,0,c02e228ce7415d482e2413c615262ec703d9597aa6708474ae81bc765129424f,2024-04-11T01:25:56.600000
|
CVE-2024-3224,0,0,c02e228ce7415d482e2413c615262ec703d9597aa6708474ae81bc765129424f,2024-04-11T01:25:56.600000
|
||||||
CVE-2024-3225,0,0,756f5e08f46ab3796e26d62cd11cd06a14dd07d1ee049ee62586436225e04f96,2024-04-11T01:25:56.680000
|
CVE-2024-3225,0,0,756f5e08f46ab3796e26d62cd11cd06a14dd07d1ee049ee62586436225e04f96,2024-04-11T01:25:56.680000
|
||||||
@ -246159,7 +246161,7 @@ CVE-2024-32343,0,0,862e8e3fbd92547c244c5be90d83e1339d7a18685f98ec207b76da84ef301
|
|||||||
CVE-2024-32344,0,0,47eb1a8da70bc975fdd4934340a6940373147153bf19749b3895ed5e2ae65a6e,2024-04-18T13:04:28.900000
|
CVE-2024-32344,0,0,47eb1a8da70bc975fdd4934340a6940373147153bf19749b3895ed5e2ae65a6e,2024-04-18T13:04:28.900000
|
||||||
CVE-2024-32345,0,0,3c4abcf95580a888529432fa6af7f966006546429f30889ca33584d7f7f45c9a,2024-04-18T13:04:28.900000
|
CVE-2024-32345,0,0,3c4abcf95580a888529432fa6af7f966006546429f30889ca33584d7f7f45c9a,2024-04-18T13:04:28.900000
|
||||||
CVE-2024-3235,0,0,87b194ac57d76e3164f790cf262b7f15e5577bfab72d12fd067ebb5070eb75e0,2024-04-10T13:23:38.787000
|
CVE-2024-3235,0,0,87b194ac57d76e3164f790cf262b7f15e5577bfab72d12fd067ebb5070eb75e0,2024-04-10T13:23:38.787000
|
||||||
CVE-2024-32358,1,1,cdb61032371c79946b8c7d981792c16ed538eb5f566d174bf95696130a8a1c73,2024-04-25T17:24:59.967000
|
CVE-2024-32358,0,0,cdb61032371c79946b8c7d981792c16ed538eb5f566d174bf95696130a8a1c73,2024-04-25T17:24:59.967000
|
||||||
CVE-2024-32368,0,0,9c8576a3d1f1b62a70cacd6450f34a9ed8bf7b0c58e8707835f5fedae490db3f,2024-04-22T19:24:12.920000
|
CVE-2024-32368,0,0,9c8576a3d1f1b62a70cacd6450f34a9ed8bf7b0c58e8707835f5fedae490db3f,2024-04-22T19:24:12.920000
|
||||||
CVE-2024-32391,0,0,b9d2ada2509e9e002fcf7fc50c30e5fa24f6bd077b7f0fab83dbe519d76755ce,2024-04-22T13:28:50.310000
|
CVE-2024-32391,0,0,b9d2ada2509e9e002fcf7fc50c30e5fa24f6bd077b7f0fab83dbe519d76755ce,2024-04-22T13:28:50.310000
|
||||||
CVE-2024-32392,0,0,e9dc77721f231608117a79f151c9f1e6be5cd7530989658bd3dd67ce41889ce5,2024-04-22T13:28:50.310000
|
CVE-2024-32392,0,0,e9dc77721f231608117a79f151c9f1e6be5cd7530989658bd3dd67ce41889ce5,2024-04-22T13:28:50.310000
|
||||||
@ -246208,7 +246210,7 @@ CVE-2024-32461,0,0,3941d8bd271b020582637450c6381a991de4b9ffa39f4db030841834b9e2a
|
|||||||
CVE-2024-32462,0,0,f73d0de6041f829663fddce09f88dca46cdcc3d89024cfa5abf2ed880863f550,2024-04-25T06:15:59.887000
|
CVE-2024-32462,0,0,f73d0de6041f829663fddce09f88dca46cdcc3d89024cfa5abf2ed880863f550,2024-04-25T06:15:59.887000
|
||||||
CVE-2024-32463,0,0,1671e195c4973ac11a31a2856358d6fb78fc6f39ffe0d1d851cfbba7a397b723,2024-04-17T16:51:07.347000
|
CVE-2024-32463,0,0,1671e195c4973ac11a31a2856358d6fb78fc6f39ffe0d1d851cfbba7a397b723,2024-04-17T16:51:07.347000
|
||||||
CVE-2024-32466,0,0,0986c266c64cc5e4b364446dfb796a6c4980d483c5a2beb3f21f15de4cb49c0b,2024-04-18T18:25:55.267000
|
CVE-2024-32466,0,0,0986c266c64cc5e4b364446dfb796a6c4980d483c5a2beb3f21f15de4cb49c0b,2024-04-18T18:25:55.267000
|
||||||
CVE-2024-32467,1,1,8b7115676ad5530fb305796e715605248ddf0a20f4006b35bdfb1dc5f8a8fb59,2024-04-25T17:24:59.967000
|
CVE-2024-32467,0,0,8b7115676ad5530fb305796e715605248ddf0a20f4006b35bdfb1dc5f8a8fb59,2024-04-25T17:24:59.967000
|
||||||
CVE-2024-3247,0,0,095afc187e8f976bc1a2eaa79a4c0328aa3c3e2487a10203585d8616775f8a4d,2024-04-03T12:38:04.840000
|
CVE-2024-3247,0,0,095afc187e8f976bc1a2eaa79a4c0328aa3c3e2487a10203585d8616775f8a4d,2024-04-03T12:38:04.840000
|
||||||
CVE-2024-32470,0,0,d7909429b510db3e426dc3bd0d7cd9294d139aa1133b013525c796626cb985fe,2024-04-18T18:25:55.267000
|
CVE-2024-32470,0,0,d7909429b510db3e426dc3bd0d7cd9294d139aa1133b013525c796626cb985fe,2024-04-18T18:25:55.267000
|
||||||
CVE-2024-32472,0,0,975c522c6d17c4f52e07ac47d9093d86335976bcc8a63a5556dc578cb868f760,2024-04-18T13:04:28.900000
|
CVE-2024-32472,0,0,975c522c6d17c4f52e07ac47d9093d86335976bcc8a63a5556dc578cb868f760,2024-04-18T13:04:28.900000
|
||||||
@ -246220,7 +246222,7 @@ CVE-2024-32478,0,0,767d0906439929f5e4e53d4d2396aabddb8a0de51e7967f13464fca079c70
|
|||||||
CVE-2024-32479,0,0,9f233b992ed22cd02276821942e34be3b1cd724f5562f573e840e7a10cf66aba,2024-04-23T12:52:26.253000
|
CVE-2024-32479,0,0,9f233b992ed22cd02276821942e34be3b1cd724f5562f573e840e7a10cf66aba,2024-04-23T12:52:26.253000
|
||||||
CVE-2024-3248,0,0,65f6d4ddfc43ae235edf2e59fc9daa1f1d020439a4fa197a41a6ddd58e106004,2024-04-03T12:38:04.840000
|
CVE-2024-3248,0,0,65f6d4ddfc43ae235edf2e59fc9daa1f1d020439a4fa197a41a6ddd58e106004,2024-04-03T12:38:04.840000
|
||||||
CVE-2024-32480,0,0,f740881091f1f05e0445ba97b5de61d4d063547c57ff7478943e1cd018db3728,2024-04-23T12:52:26.253000
|
CVE-2024-32480,0,0,f740881091f1f05e0445ba97b5de61d4d063547c57ff7478943e1cd018db3728,2024-04-23T12:52:26.253000
|
||||||
CVE-2024-32481,1,1,a8bfb7bc0fb550f9e44cc492c9444b0f2c5fa44b7b42d1ca20e707b9e15aa980,2024-04-25T17:24:59.967000
|
CVE-2024-32481,0,0,a8bfb7bc0fb550f9e44cc492c9444b0f2c5fa44b7b42d1ca20e707b9e15aa980,2024-04-25T17:24:59.967000
|
||||||
CVE-2024-32482,0,0,e0309808bf3b2543b39750b9d9b0b794ac723e1476b62ac8f4870801d35fc928,2024-04-24T13:39:42.883000
|
CVE-2024-32482,0,0,e0309808bf3b2543b39750b9d9b0b794ac723e1476b62ac8f4870801d35fc928,2024-04-24T13:39:42.883000
|
||||||
CVE-2024-32487,0,0,746d95a6c3889a9e0164763739aef81432a5222f159aa33a064a3132dbd4a7ad,2024-04-15T13:15:31.997000
|
CVE-2024-32487,0,0,746d95a6c3889a9e0164763739aef81432a5222f159aa33a064a3132dbd4a7ad,2024-04-15T13:15:31.997000
|
||||||
CVE-2024-32488,0,0,6ce6bcee8af0a677e98d2bf7a3efd66cf8a3e580423515387116f39d710ba974,2024-04-15T13:15:31.997000
|
CVE-2024-32488,0,0,6ce6bcee8af0a677e98d2bf7a3efd66cf8a3e580423515387116f39d710ba974,2024-04-15T13:15:31.997000
|
||||||
@ -246335,6 +246337,11 @@ CVE-2024-32632,0,0,363f256990a9e0bbc1d5ebda216d881268683761016a5132b054fbdb44080
|
|||||||
CVE-2024-32633,0,0,8ac8ce6a1ac201ef8dc36e7fab192ecb8b1b583d781df940a83a5707e31555c1,2024-04-16T13:24:07.103000
|
CVE-2024-32633,0,0,8ac8ce6a1ac201ef8dc36e7fab192ecb8b1b583d781df940a83a5707e31555c1,2024-04-16T13:24:07.103000
|
||||||
CVE-2024-32634,0,0,399e2bba8e548c1c98770d2f478e96e69a60afbc020788dd69a365e3ae504be6,2024-04-16T13:24:07.103000
|
CVE-2024-32634,0,0,399e2bba8e548c1c98770d2f478e96e69a60afbc020788dd69a365e3ae504be6,2024-04-16T13:24:07.103000
|
||||||
CVE-2024-32644,0,0,1c6536d9b118a22e007df0508c4274faf4a9f6bb52ca2e5c9b157aa559740e67,2024-04-19T16:19:49.043000
|
CVE-2024-32644,0,0,1c6536d9b118a22e007df0508c4274faf4a9f6bb52ca2e5c9b157aa559740e67,2024-04-19T16:19:49.043000
|
||||||
|
CVE-2024-32645,1,1,c10fc1828cd41b8d3541bbbed3fa7f79d0dd503cc5f310bceb9a6abc62b53dcb,2024-04-25T18:15:08.593000
|
||||||
|
CVE-2024-32646,1,1,7465592dd1e44548f173546753838831d7c653e35a72256d503a4bb716beb5b6,2024-04-25T18:15:08.780000
|
||||||
|
CVE-2024-32647,1,1,b02ccf5e7bf15789453f412d1dff8cd4c4a66a7f81e32b46c9bd1b07e6feb7e4,2024-04-25T18:15:08.963000
|
||||||
|
CVE-2024-32648,1,1,bf8ff4e762d18423d4730e9a303273e17ff4b747027b7f8295db3609a349f2c5,2024-04-25T18:15:09.157000
|
||||||
|
CVE-2024-32649,1,1,ef8bb57e43e862c70f928ae64587bffc598ad5cfc8b0e17d0d423dd29700903d,2024-04-25T18:15:09.350000
|
||||||
CVE-2024-32650,0,0,3ec938fa621d2b09851dc7c9c4a0bab9e06500eb12a687bac8f1323156efc6df,2024-04-19T16:19:49.043000
|
CVE-2024-32650,0,0,3ec938fa621d2b09851dc7c9c4a0bab9e06500eb12a687bac8f1323156efc6df,2024-04-19T16:19:49.043000
|
||||||
CVE-2024-32652,0,0,507899e8cc0ef719a4df6a408b43b1aeaf42e8d25b41dcf9a35617406adccb9d,2024-04-22T13:28:50.310000
|
CVE-2024-32652,0,0,507899e8cc0ef719a4df6a408b43b1aeaf42e8d25b41dcf9a35617406adccb9d,2024-04-22T13:28:50.310000
|
||||||
CVE-2024-32653,0,0,96a4de58183f8a4c5475803e77d708dc553ab0aba5c22712929dba4355cb603d,2024-04-23T12:52:26.253000
|
CVE-2024-32653,0,0,96a4de58183f8a4c5475803e77d708dc553ab0aba5c22712929dba4355cb603d,2024-04-23T12:52:26.253000
|
||||||
@ -246478,7 +246485,7 @@ CVE-2024-3356,0,0,087254ad27ba51e796f585bd19b7860bdf92d5d8812be46839c2000c6ff7ec
|
|||||||
CVE-2024-3357,0,0,4504c33b3bb653378795a255a83c05295c4cb93d37914e6c8a1edf8397686b85,2024-04-11T01:25:59.530000
|
CVE-2024-3357,0,0,4504c33b3bb653378795a255a83c05295c4cb93d37914e6c8a1edf8397686b85,2024-04-11T01:25:59.530000
|
||||||
CVE-2024-3358,0,0,694a0960c89fb254bc37c7c2f594e5cb197e9c3b955cd9433f44c414aff75d2b,2024-04-11T01:25:59.610000
|
CVE-2024-3358,0,0,694a0960c89fb254bc37c7c2f594e5cb197e9c3b955cd9433f44c414aff75d2b,2024-04-11T01:25:59.610000
|
||||||
CVE-2024-3359,0,0,a779b2e33399e3789113d39f065b1425ad824801b217abc54417c2cce7e7d2db,2024-04-11T01:25:59.687000
|
CVE-2024-3359,0,0,a779b2e33399e3789113d39f065b1425ad824801b217abc54417c2cce7e7d2db,2024-04-11T01:25:59.687000
|
||||||
CVE-2024-33592,0,1,dc3e0d94cd47d0ea73220517b5aaa098a37fe316a3d5e3b0ef33e4a8423b62af,2024-04-25T17:25:05.903000
|
CVE-2024-33592,0,0,dc3e0d94cd47d0ea73220517b5aaa098a37fe316a3d5e3b0ef33e4a8423b62af,2024-04-25T17:25:05.903000
|
||||||
CVE-2024-3360,0,0,2ffbaa301c04a2d62013f221bb69a21a0f4034a97959f93c6ac130d96a9162d3,2024-04-11T01:25:59.770000
|
CVE-2024-3360,0,0,2ffbaa301c04a2d62013f221bb69a21a0f4034a97959f93c6ac130d96a9162d3,2024-04-11T01:25:59.770000
|
||||||
CVE-2024-3361,0,0,c120caf4947180a69c26140d9354a0af916b072bcc15573944dc923bbf223f7d,2024-04-11T01:25:59.847000
|
CVE-2024-3361,0,0,c120caf4947180a69c26140d9354a0af916b072bcc15573944dc923bbf223f7d,2024-04-11T01:25:59.847000
|
||||||
CVE-2024-3362,0,0,4f698660b915c64322658e8738d0fb3f09460cf98fd487b3189e8f9d96e2b2c1,2024-04-11T01:25:59.930000
|
CVE-2024-3362,0,0,4f698660b915c64322658e8738d0fb3f09460cf98fd487b3189e8f9d96e2b2c1,2024-04-11T01:25:59.930000
|
||||||
@ -246545,6 +246552,7 @@ CVE-2024-3470,0,0,630f5f35df37b6b978ca7687ce76aaec305cc639bf4ca3fb3b6aed08fe283b
|
|||||||
CVE-2024-3491,0,0,22475c1a2c147b599aec5499497f20fc9fa37c1dc206a0659b8807ac37f4f324,2024-04-23T12:52:09.397000
|
CVE-2024-3491,0,0,22475c1a2c147b599aec5499497f20fc9fa37c1dc206a0659b8807ac37f4f324,2024-04-23T12:52:09.397000
|
||||||
CVE-2024-3493,0,0,63ead7e160b6b2cbd834dd6075f87d345af3361e8d55520f11e81a53e2086aaa,2024-04-16T13:24:07.103000
|
CVE-2024-3493,0,0,63ead7e160b6b2cbd834dd6075f87d345af3361e8d55520f11e81a53e2086aaa,2024-04-16T13:24:07.103000
|
||||||
CVE-2024-3505,0,0,d46d6b7d35449c168e9ff66f3c93f973f2e1e579109b94b88c63ad7baac2b7b8,2024-04-15T13:15:31.997000
|
CVE-2024-3505,0,0,d46d6b7d35449c168e9ff66f3c93f973f2e1e579109b94b88c63ad7baac2b7b8,2024-04-15T13:15:31.997000
|
||||||
|
CVE-2024-3508,1,1,51729891088a42816c8521723aba1a8231ccab1d41c4122824706cfbeb0b2cec,2024-04-25T18:15:09.567000
|
||||||
CVE-2024-3512,0,0,7186c9ec3829c2082fd68b5fc8e23caed587fdf0f4e68c2974db5f41b90fb514,2024-04-25T13:15:51.663000
|
CVE-2024-3512,0,0,7186c9ec3829c2082fd68b5fc8e23caed587fdf0f4e68c2974db5f41b90fb514,2024-04-25T13:15:51.663000
|
||||||
CVE-2024-3514,0,0,fd39bbcd0f0890f4d85c4ccfb46694b71dc6efa7f8c56852e1f4fd99d58e20d2,2024-04-24T17:15:47.423000
|
CVE-2024-3514,0,0,fd39bbcd0f0890f4d85c4ccfb46694b71dc6efa7f8c56852e1f4fd99d58e20d2,2024-04-24T17:15:47.423000
|
||||||
CVE-2024-3515,0,0,5591c01553945d08e143bb397e7b7011721b53594a14b5bacff6fedc69b36f26,2024-04-19T23:15:11.963000
|
CVE-2024-3515,0,0,5591c01553945d08e143bb397e7b7011721b53594a14b5bacff6fedc69b36f26,2024-04-19T23:15:11.963000
|
||||||
@ -246595,6 +246603,10 @@ CVE-2024-3618,0,0,4930954b63fbf1867ea6023e0e85abb5ce3c463a36dea55dc99465af5aaf25
|
|||||||
CVE-2024-3619,0,0,e46a3b263395cb61cb97e22d10d38e54d57de91c1d7f1832b85e56c338bf09fb,2024-04-11T12:47:44.137000
|
CVE-2024-3619,0,0,e46a3b263395cb61cb97e22d10d38e54d57de91c1d7f1832b85e56c338bf09fb,2024-04-11T12:47:44.137000
|
||||||
CVE-2024-3620,0,0,a7eeb1bc049879e174341aab349252fb94be8452f8b1f4ee171cd19f6ef0b10d,2024-04-11T12:47:44.137000
|
CVE-2024-3620,0,0,a7eeb1bc049879e174341aab349252fb94be8452f8b1f4ee171cd19f6ef0b10d,2024-04-11T12:47:44.137000
|
||||||
CVE-2024-3621,0,0,84afe5bfc8ac11b311e81571bedd8fcb4ae60929cf687215eae135d692582687,2024-04-11T12:47:44.137000
|
CVE-2024-3621,0,0,84afe5bfc8ac11b311e81571bedd8fcb4ae60929cf687215eae135d692582687,2024-04-11T12:47:44.137000
|
||||||
|
CVE-2024-3622,1,1,310e8e96b4e0377294ed8424658ec62e1f85161e08d1a4c8176be74bc881671e,2024-04-25T18:15:09.747000
|
||||||
|
CVE-2024-3623,1,1,defe19a1c1930a83b1939e4122cf12d7e4f9c322e33d040be201f24c6ea908ae,2024-04-25T18:15:09.980000
|
||||||
|
CVE-2024-3624,1,1,39cf6595062d3109a327ec6291be8c704a5a6313cda6518882b37654a8530d50,2024-04-25T18:15:10.170000
|
||||||
|
CVE-2024-3625,1,1,a944ebc7bdeed144a0e375f3f32445033c69e44dc0d01adb954342ab95755610,2024-04-25T18:15:10.360000
|
||||||
CVE-2024-3645,0,0,67d98e2e4153ee647deaff1e3df569df07b34dacff73ef5068937bbd33f489da,2024-04-22T19:24:12.920000
|
CVE-2024-3645,0,0,67d98e2e4153ee647deaff1e3df569df07b34dacff73ef5068937bbd33f489da,2024-04-22T19:24:12.920000
|
||||||
CVE-2024-3646,0,0,acb9cfc5d5c2523df1f5225ae5c2cd01f196734634fe01108d948b04f61908e2,2024-04-19T16:19:49.043000
|
CVE-2024-3646,0,0,acb9cfc5d5c2523df1f5225ae5c2cd01f196734634fe01108d948b04f61908e2,2024-04-19T16:19:49.043000
|
||||||
CVE-2024-3652,0,0,a467de8b64f8147acdef48edc35752a89afb7d5856e17302ea9c57335ed0f61c,2024-04-11T12:47:44.137000
|
CVE-2024-3652,0,0,a467de8b64f8147acdef48edc35752a89afb7d5856e17302ea9c57335ed0f61c,2024-04-11T12:47:44.137000
|
||||||
@ -246726,7 +246738,7 @@ CVE-2024-3948,0,0,427154a0226db385c08a1dc567a28e238ab290a5825189b73e5e958b25b296
|
|||||||
CVE-2024-3979,0,0,9ef752ac5397ef4280bc4d9888fb417cb985331164bf90affafa759f391a2bfe,2024-04-19T18:29:53.040000
|
CVE-2024-3979,0,0,9ef752ac5397ef4280bc4d9888fb417cb985331164bf90affafa759f391a2bfe,2024-04-19T18:29:53.040000
|
||||||
CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000
|
CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000
|
||||||
CVE-2024-3994,0,0,b2b5b0b0c4c4fea2326dd93e55a0fe437a44bb4fcb47799868e54f8400b49891,2024-04-25T13:18:02.660000
|
CVE-2024-3994,0,0,b2b5b0b0c4c4fea2326dd93e55a0fe437a44bb4fcb47799868e54f8400b49891,2024-04-25T13:18:02.660000
|
||||||
CVE-2024-4006,0,1,c01f76a94a613b3c1164a343531010831608cdd75a6ec28b08e74210a0c91542,2024-04-25T17:25:05.903000
|
CVE-2024-4006,0,0,c01f76a94a613b3c1164a343531010831608cdd75a6ec28b08e74210a0c91542,2024-04-25T17:25:05.903000
|
||||||
CVE-2024-4014,0,0,321273114f78ac117c4f7a805b62a62926b23a5461c74b2705504b7b2e21d158,2024-04-22T13:28:43.747000
|
CVE-2024-4014,0,0,321273114f78ac117c4f7a805b62a62926b23a5461c74b2705504b7b2e21d158,2024-04-22T13:28:43.747000
|
||||||
CVE-2024-4017,0,0,9cc899b07e49c20d1d42511c9c41a533c695fd74b1701843b26490566c6e33e3,2024-04-22T13:28:50.310000
|
CVE-2024-4017,0,0,9cc899b07e49c20d1d42511c9c41a533c695fd74b1701843b26490566c6e33e3,2024-04-22T13:28:50.310000
|
||||||
CVE-2024-4018,0,0,b534838241485b84911a40a305fab0f06a9a1281f09d3d1140d27d7f52b1a84d,2024-04-22T13:28:50.310000
|
CVE-2024-4018,0,0,b534838241485b84911a40a305fab0f06a9a1281f09d3d1140d27d7f52b1a84d,2024-04-22T13:28:50.310000
|
||||||
@ -246734,7 +246746,7 @@ CVE-2024-4019,0,0,4ced7c6540a74633018fd49c35c9e41874265303e22396ab90391c2405ff63
|
|||||||
CVE-2024-4020,0,0,fd9bedf3f2e4b41e8bc994bd6387cb7e34a5d92d9443a0588f231180a5be8980,2024-04-22T13:28:43.747000
|
CVE-2024-4020,0,0,fd9bedf3f2e4b41e8bc994bd6387cb7e34a5d92d9443a0588f231180a5be8980,2024-04-22T13:28:43.747000
|
||||||
CVE-2024-4021,0,0,21ca31bf18d88881f7a6cc1002b89ea9bbd51b89715a0adf7c08b2eb5ac210a6,2024-04-22T15:15:47.813000
|
CVE-2024-4021,0,0,21ca31bf18d88881f7a6cc1002b89ea9bbd51b89715a0adf7c08b2eb5ac210a6,2024-04-22T15:15:47.813000
|
||||||
CVE-2024-4022,0,0,ebd323c8f90bdf29bd6ff35ea1eff449874a3d962dc85b687039f47f7b416e73,2024-04-22T13:28:43.747000
|
CVE-2024-4022,0,0,ebd323c8f90bdf29bd6ff35ea1eff449874a3d962dc85b687039f47f7b416e73,2024-04-22T13:28:43.747000
|
||||||
CVE-2024-4024,0,1,2513e42c9761fa628df45a7f36c826de0321b5337fc977a42e2a9577e9688fa4,2024-04-25T17:25:05.903000
|
CVE-2024-4024,0,0,2513e42c9761fa628df45a7f36c826de0321b5337fc977a42e2a9577e9688fa4,2024-04-25T17:25:05.903000
|
||||||
CVE-2024-4026,0,0,65bff2dba626fde0f88488c1e6df610a37e761e2e041855587a3bbcb3e849c23,2024-04-22T13:28:34.007000
|
CVE-2024-4026,0,0,65bff2dba626fde0f88488c1e6df610a37e761e2e041855587a3bbcb3e849c23,2024-04-22T13:28:34.007000
|
||||||
CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000
|
CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000
|
||||||
CVE-2024-4035,0,0,c5a100809c68e4eb6a9b717e4eec2ebc0eca46983cf9d752b9f7c4bddb880732,2024-04-25T13:18:02.660000
|
CVE-2024-4035,0,0,c5a100809c68e4eb6a9b717e4eec2ebc0eca46983cf9d752b9f7c4bddb880732,2024-04-25T13:18:02.660000
|
||||||
@ -246780,8 +246792,8 @@ CVE-2024-4167,0,0,5a577704bd944bc61eff52aeb8d2a212dc6f2b5e7c88adbb94b253b080df76
|
|||||||
CVE-2024-4168,0,0,219de4336a115a8b080bb6cb3987b54d7220d2e425aebf18b44d58d7069a2e48,2024-04-25T13:18:02.660000
|
CVE-2024-4168,0,0,219de4336a115a8b080bb6cb3987b54d7220d2e425aebf18b44d58d7069a2e48,2024-04-25T13:18:02.660000
|
||||||
CVE-2024-4169,0,0,e1fee76b748617e9b2c46e38252cc9379fc1a8eaf99f9c6736f3828fad6bc8be,2024-04-25T13:18:02.660000
|
CVE-2024-4169,0,0,e1fee76b748617e9b2c46e38252cc9379fc1a8eaf99f9c6736f3828fad6bc8be,2024-04-25T13:18:02.660000
|
||||||
CVE-2024-4170,0,0,3446fdb4e7ac2944c9d659703371f2768dd383cf2bfb07485f0ab35862c01353,2024-04-25T13:18:02.660000
|
CVE-2024-4170,0,0,3446fdb4e7ac2944c9d659703371f2768dd383cf2bfb07485f0ab35862c01353,2024-04-25T13:18:02.660000
|
||||||
CVE-2024-4171,0,1,305ee5ec7049b42df7b6e8ac3dd5a88d1ca0546d3129a040355605d5c84f694d,2024-04-25T17:25:05.903000
|
CVE-2024-4171,0,0,305ee5ec7049b42df7b6e8ac3dd5a88d1ca0546d3129a040355605d5c84f694d,2024-04-25T17:25:05.903000
|
||||||
CVE-2024-4172,0,1,74935923348139a33a5ec86dfba1caf328eac5abe35bcbc7775440df01ee8417,2024-04-25T17:25:05.903000
|
CVE-2024-4172,0,0,74935923348139a33a5ec86dfba1caf328eac5abe35bcbc7775440df01ee8417,2024-04-25T17:25:05.903000
|
||||||
CVE-2024-4173,0,0,1106ad2058e1f16ad44d21713021236fb96bd635ad795642c968f7eaea81a585,2024-04-25T13:18:13.537000
|
CVE-2024-4173,0,0,1106ad2058e1f16ad44d21713021236fb96bd635ad795642c968f7eaea81a585,2024-04-25T13:18:13.537000
|
||||||
CVE-2024-4174,0,0,8165b92f84043201b67993ccc68eb94f9c51d9c6b32fc95aff490860d26962cf,2024-04-25T13:18:02.660000
|
CVE-2024-4174,0,0,8165b92f84043201b67993ccc68eb94f9c51d9c6b32fc95aff490860d26962cf,2024-04-25T13:18:02.660000
|
||||||
CVE-2024-4175,0,0,17322bbbd4155ded1e9cb395a3c60d3f922650a6043102cb41ba3b81f581a395,2024-04-25T13:18:02.660000
|
CVE-2024-4175,0,0,17322bbbd4155ded1e9cb395a3c60d3f922650a6043102cb41ba3b81f581a395,2024-04-25T13:18:02.660000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user