mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-05-07T16:00:38.282013+00:00
This commit is contained in:
parent
e557a991c5
commit
6961a7db13
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Missing Authorization vulnerability in Tilda Publishing.This issue affects Tilda Publishing: from n/a through 0.3.23.\n\n"
|
"value": "Missing Authorization vulnerability in Tilda Publishing.This issue affects Tilda Publishing: from n/a through 0.3.23.\n\n"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en Tilda Publishing. Este problema afecta a Tilda Publishing: desde n/a hasta 0.3.23."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2023-38906",
|
"id": "CVE-2023-38906",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-08-22T00:15:07.920",
|
"published": "2023-08-22T00:15:07.920",
|
||||||
"lastModified": "2024-01-19T20:15:11.007",
|
"lastModified": "2024-05-07T15:15:08.110",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 allows a remote attacker to obtain sensitive information via the authentication code for the UDP message."
|
"value": "An issue in TPLink Smart Bulb Tapo series L530 1.1.9, L510E 1.0.8, L630 1.0.3, P100 1.4.9, Smart Camera Tapo series C200 1.1.18, and Tapo Application 2.8.14 allows a remote attacker to obtain sensitive information via the authentication code for the UDP message."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -92,6 +92,10 @@
|
|||||||
"Third Party Advisory"
|
"Third Party Advisory"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold/",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.scitepress.org/Papers/2023/120929/120929.pdf",
|
"url": "https://www.scitepress.org/Papers/2023/120929/120929.pdf",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2023-38907",
|
"id": "CVE-2023-38907",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-09-25T23:15:09.543",
|
"published": "2023-09-25T23:15:09.543",
|
||||||
"lastModified": "2024-01-19T20:15:11.103",
|
"lastModified": "2024-05-07T15:15:08.250",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 allows a remote attacker to obtain sensitive information via session key in the message function."
|
"value": "An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to replay old messages encrypted with a still valid session key."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -103,6 +103,10 @@
|
|||||||
"Third Party Advisory"
|
"Third Party Advisory"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold/",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.scitepress.org/Papers/2023/120929/120929.pdf",
|
"url": "https://www.scitepress.org/Papers/2023/120929/120929.pdf",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2023-38908",
|
"id": "CVE-2023-38908",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-08-22T01:15:08.153",
|
"published": "2023-08-22T01:15:08.153",
|
||||||
"lastModified": "2024-01-19T20:15:11.197",
|
"lastModified": "2024-05-07T15:15:08.350",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 allows a remote attacker to obtain sensitive information via the TSKEP authentication function."
|
"value": "An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to obtain sensitive information via the TSKEP authentication function."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -100,6 +100,10 @@
|
|||||||
"Third Party Advisory"
|
"Third Party Advisory"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold/",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.scitepress.org/Papers/2023/120929/120929.pdf",
|
"url": "https://www.scitepress.org/Papers/2023/120929/120929.pdf",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2023-38909",
|
"id": "CVE-2023-38909",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-08-22T01:15:08.537",
|
"published": "2023-08-22T01:15:08.537",
|
||||||
"lastModified": "2024-01-19T20:15:11.273",
|
"lastModified": "2024-05-07T15:15:08.433",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 allows a remote attacker to obtain sensitive information via the IV component in the AES128-CBC function."
|
"value": "An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to obtain sensitive information via the IV component in the AES128-CBC function."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -101,6 +101,10 @@
|
|||||||
"Third Party Advisory"
|
"Third Party Advisory"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold/",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.scitepress.org/Papers/2023/120929/120929.pdf",
|
"url": "https://www.scitepress.org/Papers/2023/120929/120929.pdf",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
24
CVE-2023/CVE-2023-460xx/CVE-2023-46012.json
Normal file
24
CVE-2023/CVE-2023-460xx/CVE-2023-46012.json
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-46012",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-05-07T14:15:10.003",
|
||||||
|
"lastModified": "2024-05-07T14:15:10.003",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Buffer Overflow vulnerability LINKSYS EA7500 3.0.1.207964 allows a remote attacker to execute arbitrary code via an HTTP request to the IGD UPnP."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Vulnerabilidad de desbordamiento de b\u00fafer LINKSYS EA7500 3.0.1.207964 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud HTTP al IGD UPnP."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/dest-3/CVE-2023-46012/tree/main",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "The ClickCease Click Fraud Protection plugin for WordPress is vulnerable to unauthorized access of data due to an improper capability check on the get_settings function in all versions up to, and including, 3.2.4. This makes it possible for authenticated attackers, with author access and above, to retrieve the plugin's configured API keys."
|
"value": "The ClickCease Click Fraud Protection plugin for WordPress is vulnerable to unauthorized access of data due to an improper capability check on the get_settings function in all versions up to, and including, 3.2.4. This makes it possible for authenticated attackers, with author access and above, to retrieve the plugin's configured API keys."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "El complemento ClickCease Click Fraud Protection para WordPress es vulnerable al acceso no autorizado a los datos debido a una verificaci\u00f3n de capacidad incorrecta en la funci\u00f3n get_settings en todas las versiones hasta la 3.2.4 incluida. Esto hace posible que los atacantes autenticados, con acceso de autor y superior, recuperen las claves API configuradas del complemento."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "\u00a0An improper authorization level has been detected in the login panel. It may lead to\nunauthenticated Server Side Request Forgery and allows to perform open services\nenumeration. Server makes query to provided server (Server IP/DNS field) and is\ntriggering connection to arbitrary address.\n\n"
|
"value": "\u00a0An improper authorization level has been detected in the login panel. It may lead to\nunauthenticated Server Side Request Forgery and allows to perform open services\nenumeration. Server makes query to provided server (Server IP/DNS field) and is\ntriggering connection to arbitrary address.\n\n"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se ha detectado un nivel de autorizaci\u00f3n inadecuado en el panel de inicio de sesi\u00f3n. Puede provocar Server Side Request Forgery no autenticadas y permite realizar una enumeraci\u00f3n de servicios abiertos. El servidor realiza una consulta al servidor proporcionado (campo IP/DNS del servidor) y activa la conexi\u00f3n a una direcci\u00f3n arbitraria."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability possible to reconfigure OTP allows local attackers to transit RMA(Return Merchandise Authorization) mode, which disables security features. This attack needs additional privilege to control TEE."
|
"value": "A vulnerability possible to reconfigure OTP allows local attackers to transit RMA(Return Merchandise Authorization) mode, which disables security features. This attack needs additional privilege to control TEE."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Una vulnerabilidad posible para reconfigurar OTP permite a atacantes locales transitar el modo RMA (Autorizaci\u00f3n de devoluci\u00f3n de mercanc\u00eda), que desactiva las funciones de seguridad. Este ataque necesita privilegios adicionales para controlar TEE."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper access control vulnerability in multitasking framework prior to SMR May-2024 Release 1 allows physical attackers to access unlocked screen for a while."
|
"value": "Improper access control vulnerability in multitasking framework prior to SMR May-2024 Release 1 allows physical attackers to access unlocked screen for a while."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Una vulnerabilidad de control de acceso inadecuado en el framework multitarea anterior a SMR, versi\u00f3n 1 de mayo de 2024, permite a atacantes f\u00edsicos acceder a la pantalla desbloqueada por un tiempo."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper Authentication vulnerability in Secure Folder prior to SMR May-2024 Release 1 allows physical attackers to access Secure Folder without proper authentication in a specific scenario."
|
"value": "Improper Authentication vulnerability in Secure Folder prior to SMR May-2024 Release 1 allows physical attackers to access Secure Folder without proper authentication in a specific scenario."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Vulnerabilidad de autenticaci\u00f3n incorrecta en Secure Folder anterior a SMR, versi\u00f3n 1 de mayo de 2024, permite a atacantes f\u00edsicos acceder a Secure Folder sin la autenticaci\u00f3n adecuada en un escenario espec\u00edfico."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper access control vulnerability in startListening of CocktailBarService prior to SMR May-2024 Release 1 allows local attackers to access information of current application."
|
"value": "Improper access control vulnerability in startListening of CocktailBarService prior to SMR May-2024 Release 1 allows local attackers to access information of current application."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Vulnerabilidad de control de acceso inadecuado en startListening de CocktailBarService antes de SMR, versi\u00f3n 1 de mayo de 2024, permite a atacantes locales acceder a informaci\u00f3n de la aplicaci\u00f3n actual."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper access control vulnerability in setCocktailHostCallbacks of CocktailBarService prior to SMR May-2024 Release 1 allows local attackers to access information of current application."
|
"value": "Improper access control vulnerability in setCocktailHostCallbacks of CocktailBarService prior to SMR May-2024 Release 1 allows local attackers to access information of current application."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Vulnerabilidad de control de acceso inadecuado en setCocktailHostCallbacks de CocktailBarService antes de SMR Mayo-2024 Versi\u00f3n 1 permite a atacantes locales acceder a informaci\u00f3n de la aplicaci\u00f3n actual."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper access control vulnerability in FactoryCamera prior to SMR May-2024 Release 1 allows local attackers to take pictures without privilege."
|
"value": "Improper access control vulnerability in FactoryCamera prior to SMR May-2024 Release 1 allows local attackers to take pictures without privilege."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Una vulnerabilidad de control de acceso inadecuado en FactoryCamera antes de la versi\u00f3n 1 de SMR de mayo de 2024 permite a atacantes locales tomar fotograf\u00edas sin privilegios."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper export of android application components vulnerability in TelephonyUI prior to SMR May-2024 Release 1 allows local attackers to reboot the device without proper permission."
|
"value": "Improper export of android application components vulnerability in TelephonyUI prior to SMR May-2024 Release 1 allows local attackers to reboot the device without proper permission."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "La exportaci\u00f3n incorrecta de la vulnerabilidad de los componentes de la aplicaci\u00f3n de Android en TelephonyUI antes de la versi\u00f3n 1 de mayo de 2024 de SMR permite a los atacantes locales reiniciar el dispositivo sin el permiso adecuado."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Use after free vulnerability in SveService prior to SMR May-2024 Release 1 allows local privileged attackers to cause memory corruption."
|
"value": "Use after free vulnerability in SveService prior to SMR May-2024 Release 1 allows local privileged attackers to cause memory corruption."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Vulnerabilidad de use after free en SveService anterior a SMR, versi\u00f3n 1 de mayo de 2024, permite a atacantes locales con privilegios provocar da\u00f1os en la memoria."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Out-of-bounds write in SveService prior to SMR May-2024 Release 1 allows local privileged attackers to execute arbitrary code."
|
"value": "Out-of-bounds write in SveService prior to SMR May-2024 Release 1 allows local privileged attackers to execute arbitrary code."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "La escritura fuera de los l\u00edmites en SveService antes de SMR, mayo de 2024, versi\u00f3n 1, permite a atacantes locales con privilegios ejecutar c\u00f3digo arbitrario."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Out of bounds write vulnerability in SNAP in HAL prior to SMR May-2024 Release 1 allows local privileged attackers to execute arbitrary code."
|
"value": "Out of bounds write vulnerability in SNAP in HAL prior to SMR May-2024 Release 1 allows local privileged attackers to execute arbitrary code."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Vulnerabilidad de escritura fuera de los l\u00edmites en SNAP en HAL antes de SMR, versi\u00f3n 1 de mayo de 2024, permite a atacantes locales con privilegios ejecutar c\u00f3digo arbitrario."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper access control vulnerability in DarManagerService prior to SMR May-2024 Release 1 allows local attackers to monitor system resources."
|
"value": "Improper access control vulnerability in DarManagerService prior to SMR May-2024 Release 1 allows local attackers to monitor system resources."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Una vulnerabilidad de control de acceso inadecuado en DarManagerService anterior a SMR de mayo de 2024, versi\u00f3n 1, permite a atacantes locales monitorear los recursos del sistema."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Authentication bypass in bootloader prior to SMR May-2024 Release 1 allows physical attackers to flash arbitrary images."
|
"value": "Authentication bypass in bootloader prior to SMR May-2024 Release 1 allows physical attackers to flash arbitrary images."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "La omisi\u00f3n de autenticaci\u00f3n en el gestor de arranque anterior a SMR May-2024 Release 1 permite a atacantes f\u00edsicos mostrar im\u00e1genes arbitrarias."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Authentication bypass vulnerability in Setupwizard prior to SMR May-2024 Release 1 allows physical attackers to skip activation step."
|
"value": "Authentication bypass vulnerability in Setupwizard prior to SMR May-2024 Release 1 allows physical attackers to skip activation step."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n en el asistente de configuraci\u00f3n anterior a SMR, versi\u00f3n 1 de mayo de 2024, permite a los atacantes f\u00edsicos omitir el paso de activaci\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper privilege management vulnerability in Samsung Email prior to version 6.1.91.14 allows local attackers to access sensitive information."
|
"value": "Improper privilege management vulnerability in Samsung Email prior to version 6.1.91.14 allows local attackers to access sensitive information."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Una vulnerabilidad de gesti\u00f3n de privilegios inadecuada en Samsung Email anterior a la versi\u00f3n 6.1.91.14 permite a atacantes locales acceder a informaci\u00f3n confidencial."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper input validation in Samsung Notes prior to version 4.4.15 allows local attackers to delete files with Samsung Notes privilege under certain conditions."
|
"value": "Improper input validation in Samsung Notes prior to version 4.4.15 allows local attackers to delete files with Samsung Notes privilege under certain conditions."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "La validaci\u00f3n de entrada incorrecta en Samsung Notes anterior a la versi\u00f3n 4.4.15 permite a atacantes locales eliminar archivos con privilegios de Samsung Notes bajo ciertas condiciones."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper privilege management vulnerability in Samsung Internet prior to version 25.0.0.41 allows local attackers to bypass protection for cookies."
|
"value": "Improper privilege management vulnerability in Samsung Internet prior to version 25.0.0.41 allows local attackers to bypass protection for cookies."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Una vulnerabilidad de gesti\u00f3n de privilegios inadecuada en Samsung Internet anterior a la versi\u00f3n 25.0.0.41 permite a atacantes locales eludir la protecci\u00f3n de cookies."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper verification of intent by broadcast receiver vulnerability in Galaxy Store prior to version 4.5.71.8 allows local attackers to write arbitrary files with the privilege of Galaxy Store."
|
"value": "Improper verification of intent by broadcast receiver vulnerability in Galaxy Store prior to version 4.5.71.8 allows local attackers to write arbitrary files with the privilege of Galaxy Store."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "La verificaci\u00f3n inadecuada de la intenci\u00f3n mediante la vulnerabilidad del receptor de transmisi\u00f3n en Galaxy Store antes de la versi\u00f3n 4.5.71.8 permite a atacantes locales escribir archivos arbitrarios con el privilegio de Galaxy Store."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper authorization vulnerability in Samsung Keyboard prior to version One UI 5.1.1 allows physical attackers to partially bypass the factory reset protection."
|
"value": "Improper authorization vulnerability in Samsung Keyboard prior to version One UI 5.1.1 allows physical attackers to partially bypass the factory reset protection."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Vulnerabilidad de autorizaci\u00f3n inadecuada en el teclado Samsung anterior a la versi\u00f3n One UI 5.1.1 permite a atacantes f\u00edsicos eludir parcialmente la protecci\u00f3n de restablecimiento de f\u00e1brica."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper handling of insufficient privileges vulnerability in TalkbackSE prior to version Android 14 allows local attackers to modify setting value of TalkbackSE."
|
"value": "Improper handling of insufficient privileges vulnerability in TalkbackSE prior to version Android 14 allows local attackers to modify setting value of TalkbackSE."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "El manejo inadecuado de la vulnerabilidad de privilegios insuficientes en TalkbackSE anterior a la versi\u00f3n Android 14 permite a atacantes locales modificar el valor de configuraci\u00f3n de TalkbackSE."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "\nA buffer Overflow vulnerability in Silicon Labs 500 Series Z-Wave devices may allow Denial of Service, and potential Remote Code execution\n\nThis issue affects all versions of Silicon Labs\u00a0500 Series SDK prior to v6.85.2\n\nrunning on Silicon Labs 500 series Z-wave devices.\n\n"
|
"value": "\nA buffer Overflow vulnerability in Silicon Labs 500 Series Z-Wave devices may allow Denial of Service, and potential Remote Code execution\n\nThis issue affects all versions of Silicon Labs\u00a0500 Series SDK prior to v6.85.2\n\nrunning on Silicon Labs 500 series Z-wave devices.\n\n"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Una vulnerabilidad de desbordamiento de b\u00fafer en los dispositivos Z-Wave de la serie 500 de Silicon Labs puede permitir una denegaci\u00f3n de servicio y una posible ejecuci\u00f3n remota de c\u00f3digo. Este problema afecta a todas las versiones del SDK de la serie 500 de Silicon Labs anteriores a la v6.85.2 que se ejecutan en dispositivos Z-wave de la serie 500 de Silicon Labs."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free or cause DOS through NULL pointer dereference."
|
"value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free or cause DOS through NULL pointer dereference."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En OpenHarmony v4.0.0 y versiones anteriores permiten a un atacante local la ejecuci\u00f3n de c\u00f3digo arbitrario en aplicaciones preinstaladas mediante use after free o provocan DOS mediante la desreferencia del puntero NULL."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free."
|
"value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local ejecute c\u00f3digo arbitrario en aplicaciones preinstaladas mediante use after free. "
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
59
CVE-2024/CVE-2024-281xx/CVE-2024-28148.json
Normal file
59
CVE-2024/CVE-2024-281xx/CVE-2024-28148.json
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28148",
|
||||||
|
"sourceIdentifier": "security@apache.org",
|
||||||
|
"published": "2024-05-07T14:15:10.103",
|
||||||
|
"lastModified": "2024-05-07T14:15:10.103",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An authenticated user could potentially access metadata for a datasource they are not authorized to view by submitting a targeted REST API request.This issue affects Apache Superset: before 4.0.0.\n\nUsers are recommended to upgrade to version 4.0.0, which fixes the issue.\n\n"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Un usuario autenticado podr\u00eda acceder a los metadatos de una fuente de datos para la que no est\u00e1 autorizado a ver enviando una solicitud de API REST espec\u00edfica. Este problema afecta a Apache Superset: anterior a 4.0.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 4.0.0, que soluciona el problema."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@apache.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@apache.org",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-863"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://lists.apache.org/thread/n27wlbd05oc6bgjh28d5pxzsrrph8dgo",
|
||||||
|
"source": "security@apache.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
63
CVE-2024/CVE-2024-298xx/CVE-2024-29889.json
Normal file
63
CVE-2024/CVE-2024-298xx/CVE-2024-29889.json
Normal file
@ -0,0 +1,63 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-29889",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-05-07T14:15:10.330",
|
||||||
|
"lastModified": "2024-05-07T14:15:10.330",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "GLPI is a Free Asset and IT Management Software package. Prior to 10.0.15, an authenticated user can exploit a SQL injection vulnerability in the saved searches feature to alter another user account data take control of it. This vulnerability is fixed in 10.0.15."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "GLPI es un paquete gratuito de software de gesti\u00f3n de TI y activos. Antes de 10.0.15, un usuario autenticado pod\u00eda explotar una vulnerabilidad de inyecci\u00f3n SQL en la funci\u00f3n de b\u00fasquedas guardadas para alterar los datos de la cuenta de otro usuario y tomar el control de ella. Esta vulnerabilidad se solucion\u00f3 en 10.0.15."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 4.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/glpi-project/glpi/commit/0a6b28be4c0f848106c60b554c703ec2e178d6c7",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-8xvf-v6vv-r75g",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Insecure storage of the ICT MIFARE and DESFire encryption keys in the firmware\nbinary allows malicious actors to create credentials for any site code and card number that is using the default\nICT encryption.\n\n"
|
"value": "Insecure storage of the ICT MIFARE and DESFire encryption keys in the firmware\nbinary allows malicious actors to create credentials for any site code and card number that is using the default\nICT encryption.\n\n"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "El almacenamiento inseguro de las claves de cifrado ICT MIFARE y DESFire en el binario del firmware permite a actores malintencionados crear credenciales para cualquier c\u00f3digo de sitio y n\u00famero de tarjeta que utilice el cifrado ICT predeterminado."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A race condition vulnerability exists in the mintplex-labs/anything-llm repository, specifically within the user invite acceptance process. Attackers can exploit this vulnerability by sending multiple concurrent requests to accept a single user invite, allowing the creation of multiple user accounts from a single invite link intended for only one user. This bypasses the intended security mechanism that restricts invite acceptance to a single user, leading to unauthorized user creation without detection in the invite tab. The issue is due to the lack of validation for concurrent requests in the backend."
|
"value": "A race condition vulnerability exists in the mintplex-labs/anything-llm repository, specifically within the user invite acceptance process. Attackers can exploit this vulnerability by sending multiple concurrent requests to accept a single user invite, allowing the creation of multiple user accounts from a single invite link intended for only one user. This bypasses the intended security mechanism that restricts invite acceptance to a single user, leading to unauthorized user creation without detection in the invite tab. The issue is due to the lack of validation for concurrent requests in the backend."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Existe una vulnerabilidad de condici\u00f3n de ejecuci\u00f3n en el repositorio mintplex-labs/anything-llm, espec\u00edficamente dentro del proceso de aceptaci\u00f3n de invitaci\u00f3n del usuario. Los atacantes pueden aprovechar esta vulnerabilidad enviando m\u00faltiples solicitudes simult\u00e1neas para aceptar una invitaci\u00f3n de un solo usuario, lo que permite la creaci\u00f3n de m\u00faltiples cuentas de usuario desde un \u00fanico enlace de invitaci\u00f3n destinado a un solo usuario. Esto evita el mecanismo de seguridad previsto que restringe la aceptaci\u00f3n de invitaciones a un solo usuario, lo que lleva a la creaci\u00f3n de usuarios no autorizados sin detecci\u00f3n en la pesta\u00f1a de invitaci\u00f3n. El problema se debe a la falta de validaci\u00f3n de solicitudes simult\u00e1neas en el backend."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An issue in V-SOL G/EPON ONU HG323AC-B with firmware version V2.0.08-210715 allows an attacker to execute arbtirary code and obtain sensitive information via crafted POST request to /boaform/getASPdata/formFirewall, /boaform/getASPdata/formAcc."
|
"value": "An issue in V-SOL G/EPON ONU HG323AC-B with firmware version V2.0.08-210715 allows an attacker to execute arbtirary code and obtain sensitive information via crafted POST request to /boaform/getASPdata/formFirewall, /boaform/getASPdata/formAcc."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Un problema en V-SOL G/EPON ONU HG323AC-B con la versi\u00f3n de firmware V2.0.08-210715 permite a un atacante ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de una solicitud POST manipulada para /boaform/getASPdata/formFirewall, /boaform/getASPdata/formAcc ."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through NULL pointer dereference."
|
"value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through NULL pointer dereference."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local provoque una falla del servicio mediante la desreferencia del puntero NULL."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
63
CVE-2024/CVE-2024-314xx/CVE-2024-31456.json
Normal file
63
CVE-2024/CVE-2024-314xx/CVE-2024-31456.json
Normal file
@ -0,0 +1,63 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-31456",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-05-07T14:15:10.550",
|
||||||
|
"lastModified": "2024-05-07T14:15:10.550",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "GLPI is a Free Asset and IT Management Software package. Prior to 10.0.15, an authenticated user can exploit a SQL injection vulnerability from map search. This vulnerability is fixed in 10.0.15."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "GLPI es un paquete gratuito de software de gesti\u00f3n de TI y activos. Antes de 10.0.15, un usuario autenticado pod\u00eda aprovechar una vulnerabilidad de inyecci\u00f3n SQL desde la b\u00fasqueda de mapas. Esta vulnerabilidad se solucion\u00f3 en 10.0.15."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.7,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 4.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/glpi-project/glpi/commit/730c3db29a1edc32f9b9d1e2a940e90a0211ab26",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-gcj4-2cp3-6h5j",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
24
CVE-2024/CVE-2024-323xx/CVE-2024-32369.json
Normal file
24
CVE-2024/CVE-2024-323xx/CVE-2024-32369.json
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-32369",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-05-07T15:15:08.520",
|
||||||
|
"lastModified": "2024-05-07T15:15:08.520",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "SQL Injection vulnerability in HSC Cybersecurity HC Mailinspector 5.2.17-3 through 5.2.18 allows a remote attacker to obtain sensitive information via a crafted payload to the start and limit parameter in the mliWhiteList.php component."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://cwe.mitre.org/data/definitions/89.html",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/chucrutis/CVE-2024-32369",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
24
CVE-2024/CVE-2024-323xx/CVE-2024-32370.json
Normal file
24
CVE-2024/CVE-2024-323xx/CVE-2024-32370.json
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-32370",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-05-07T15:15:08.597",
|
||||||
|
"lastModified": "2024-05-07T15:15:08.597",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An issue in HSC Cybersecurity HC Mailinspector 5.2.17-3 through 5.2.18 allows a remote attacker to obtain sensitive information via a crafted payload to the id parameter in the mliSystemUsers.php component."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://cwe.mitre.org/data/definitions/639.html",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/chucrutis/CVE-2024-32370",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
24
CVE-2024/CVE-2024-323xx/CVE-2024-32371.json
Normal file
24
CVE-2024/CVE-2024-323xx/CVE-2024-32371.json
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-32371",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-05-07T15:15:08.653",
|
||||||
|
"lastModified": "2024-05-07T15:15:08.653",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An issue in HSC Cybersecurity HC Mailinspector 5.2.17-3 through 5.2.18 allows a regular user account to escalate their privileges and gain administrative access by changing the type parameter from 1 to 0."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://cwe.mitre.org/data/definitions/639.html",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/chucrutis/CVE-2024-32371",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
83
CVE-2024/CVE-2024-326xx/CVE-2024-32663.json
Normal file
83
CVE-2024/CVE-2024-326xx/CVE-2024-32663.json
Normal file
@ -0,0 +1,83 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-32663",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-05-07T15:15:08.713",
|
||||||
|
"lastModified": "2024-05-07T15:15:08.713",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.5 and 6.0.19, a small amount of HTTP/2 traffic can lead to Suricata using a large amount of memory. The issue has been addressed in Suricata 7.0.5 and 6.0.19. Workarounds include disabling the HTTP/2 parser and reducing `app-layer.protocols.http2.max-table-size` value (default is 65536)."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-400"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-770"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/OISF/suricata/commit/08d93f7c3762781b743f88f9fdc4389eb9c3eb64",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/OISF/suricata/commit/c0af92295e833d1db29b184d63cd3b829451d7fd",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/OISF/suricata/commit/d24b37a103c04bb2667e449e080ba4c8e56bb019",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/OISF/suricata/commit/e68ec4b227d19498f364a41eb25d3182f0383ca5",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/OISF/suricata/security/advisories/GHSA-9jxm-qw9v-266r",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://redmine.openinfosecfoundation.org/issues/6892",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://redmine.openinfosecfoundation.org/issues/6900",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
67
CVE-2024/CVE-2024-326xx/CVE-2024-32664.json
Normal file
67
CVE-2024/CVE-2024-326xx/CVE-2024-32664.json
Normal file
@ -0,0 +1,67 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-32664",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-05-07T15:15:08.937",
|
||||||
|
"lastModified": "2024-05-07T15:15:08.937",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.5 and 6.0.19, specially crafted traffic or datasets can cause a limited buffer overflow. This vulnerability is fixed in 7.0.5 and 6.0.19. Workarounds include not use rules with `base64_decode` keyword with `bytes` option with value 1, 2 or 5 and for 7.0.x, setting `app-layer.protocols.smtp.mime.body-md5` to false."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-120"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-122"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/OISF/suricata/commit/311002baf288a225f62cf18a90c5fdd294447379",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/OISF/suricata/commit/d5ffecf11ad2c6fe89265e518f5d7443caf26ba4",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/OISF/suricata/security/advisories/GHSA-79vh-hpwq-3jh7",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
91
CVE-2024/CVE-2024-328xx/CVE-2024-32867.json
Normal file
91
CVE-2024/CVE-2024-328xx/CVE-2024-32867.json
Normal file
@ -0,0 +1,91 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-32867",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-05-07T15:15:09.143",
|
||||||
|
"lastModified": "2024-05-07T15:15:09.143",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.5 and 6.0.19, various problems in handling of fragmentation anomalies can lead to mis-detection of rules and policy. This vulnerability is fixed in 7.0.5 or 6.0.19."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-754"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/OISF/suricata/commit/1e110d0a71db46571040b937e17a4bc9f91d6de9",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/OISF/suricata/commit/2f39ba75f153ba9bdf8eedc2a839cc973dbaea66",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/OISF/suricata/commit/414f97c6695c5a2e1d378a36a6f50d7288767634",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/OISF/suricata/commit/bf3d420fb709ebe074019a99e3bd3a2364524a4b",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/OISF/suricata/commit/d13bd2ae217a6d2ceb347f74d27cbfcd37b9bda9",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/OISF/suricata/commit/e6267758ed5da27f804f0c1c07f9423bdf4d72b8",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/OISF/suricata/security/advisories/GHSA-xvrx-88mv-xcq5",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://redmine.openinfosecfoundation.org/issues/6672",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://redmine.openinfosecfoundation.org/issues/6673",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://redmine.openinfosecfoundation.org/issues/6677",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
24
CVE-2024/CVE-2024-331xx/CVE-2024-33120.json
Normal file
24
CVE-2024/CVE-2024-331xx/CVE-2024-33120.json
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33120",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-05-07T15:15:09.353",
|
||||||
|
"lastModified": "2024-05-07T15:15:09.353",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Roothub v2.5 was discovered to contain an arbitrary file upload vulnerability via the customPath parameter in the upload() function. This vulnerability allows attackers to execute arbitrary code via a crafted JSP file."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "http://roothub.com",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33120.txt",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
20
CVE-2024/CVE-2024-331xx/CVE-2024-33122.json
Normal file
20
CVE-2024/CVE-2024-331xx/CVE-2024-33122.json
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33122",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-05-07T15:15:09.417",
|
||||||
|
"lastModified": "2024-05-07T15:15:09.417",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Roothub v2.6 was discovered to contain a SQL injection vulnerability via the topic parameter in the list() function."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33122.txt",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
20
CVE-2024/CVE-2024-331xx/CVE-2024-33124.json
Normal file
20
CVE-2024/CVE-2024-331xx/CVE-2024-33124.json
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33124",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-05-07T15:15:09.477",
|
||||||
|
"lastModified": "2024-05-07T15:15:09.477",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Roothub v2.6 was discovered to contain a SQL injection vulnerability via the nodeTitle parameter in the parentNode() function.."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33124.txt",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
28
CVE-2024/CVE-2024-334xx/CVE-2024-33434.json
Normal file
28
CVE-2024/CVE-2024-334xx/CVE-2024-33434.json
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33434",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-05-07T14:15:10.760",
|
||||||
|
"lastModified": "2024-05-07T14:15:10.760",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An issue in tiagorlampert CHAOS before 1b451cf62582295b7225caf5a7b506f0bad56f6b and 24c9e109b5be34df7b2bce8368eae669c481ed5e allows a remote attacker to execute arbitrary code via the unsafe concatenation of the `filename` argument into the `buildStr` string without any sanitization or filtering."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Un problema en tiagorlampert CHAOS antes de 1b451cf62582295b7225caf5a7b506f0bad56f6b y 24c9e109b5be34df7b2bce8368eae669c481ed5e permite a un atacante remoto ejecutar c\u00f3digo arbitrario mediante la concatenaci\u00f3n insegura del argumento `filename` en la cadena `buildStr` sin ninguna sanitizaci\u00f3n o filtrado."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://gist.github.com/slimwang/d1ec6645ba9012a551ea436679244496",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/tiagorlampert/CHAOS/pull/95",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
24
CVE-2024/CVE-2024-337xx/CVE-2024-33780.json
Normal file
24
CVE-2024/CVE-2024-337xx/CVE-2024-33780.json
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33780",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-05-07T14:15:10.820",
|
||||||
|
"lastModified": "2024-05-07T14:15:10.820",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "MP-SPDZ v0.3.8 was discovered to contain a segmentation violation via the function osuCrypto::copyOut at /Tools/SilentPprf.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted message."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se descubri\u00f3 que MP-SPDZ v0.3.8 conten\u00eda una infracci\u00f3n de segmentaci\u00f3n mediante la funci\u00f3n osuCrypto::copyOut en /Tools/SilentPprf.cpp. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante un mensaje manipulado."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/FudanMPL/Vulnerabilities-in-MPC-Framework/tree/main/MP-SPDZ/SEGV-SlientPprf-3",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
24
CVE-2024/CVE-2024-337xx/CVE-2024-33781.json
Normal file
24
CVE-2024/CVE-2024-337xx/CVE-2024-33781.json
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33781",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-05-07T14:15:10.880",
|
||||||
|
"lastModified": "2024-05-07T14:15:10.880",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "MP-SPDZ v0.3.8 was discovered to contain a stack overflow via the function octetStream::get_bytes in /Tools/octetStream.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted message."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se descubri\u00f3 que MP-SPDZ v0.3.8 conten\u00eda un desbordamiento de pila mediante la funci\u00f3n octetStream::get_bytes en /Tools/octetStream.cpp. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante un mensaje manipulado."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/FudanMPL/Vulnerabilities-in-MPC-Framework/tree/main/MP-SPDZ/stack-buffer-overflow-octetStream",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
24
CVE-2024/CVE-2024-337xx/CVE-2024-33782.json
Normal file
24
CVE-2024/CVE-2024-337xx/CVE-2024-33782.json
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33782",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-05-07T14:15:10.933",
|
||||||
|
"lastModified": "2024-05-07T14:15:10.933",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "MP-SPDZ v0.3.8 was discovered to contain a stack overflow via the function OTExtensionWithMatrix::extend in /OT/OTExtensionWithMatrix.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted message."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se descubri\u00f3 que MP-SPDZ v0.3.8 conten\u00eda un desbordamiento de pila mediante la funci\u00f3n OTExtensionWithMatrix::extend en /OT/OTExtensionWithMatrix.cpp. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante un mensaje manipulado."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/FudanMPL/Vulnerabilities-in-MPC-Framework/tree/main/MP-SPDZ/stack-buffer-overflow-OTExtensionWithMatrix",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
24
CVE-2024/CVE-2024-337xx/CVE-2024-33783.json
Normal file
24
CVE-2024/CVE-2024-337xx/CVE-2024-33783.json
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33783",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-05-07T14:15:10.990",
|
||||||
|
"lastModified": "2024-05-07T14:15:10.990",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "MP-SPDZ v0.3.8 was discovered to contain a segmentation violation via the function osuCrypto::SilentMultiPprfReceiver::expand in /Tools/SilentPprf.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted message."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se descubri\u00f3 que MP-SPDZ v0.3.8 conten\u00eda una infracci\u00f3n de segmentaci\u00f3n mediante la funci\u00f3n osuCrypto::SilentMultiPprfReceiver::expand en /Tools/SilentPprf.cpp. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante un mensaje manipulado."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/FudanMPL/Vulnerabilities-in-MPC-Framework/tree/main/MP-SPDZ/SEGV-SlientPprf",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
59
CVE-2024/CVE-2024-340xx/CVE-2024-34084.json
Normal file
59
CVE-2024/CVE-2024-340xx/CVE-2024-34084.json
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-34084",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-05-07T15:15:09.540",
|
||||||
|
"lastModified": "2024-05-07T15:15:09.540",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Minder's `HandleGithubWebhook` is susceptible to a denial of service attack from an untrusted HTTP request. The vulnerability exists before the request has been validated, and as such the request is still untrusted at the point of failure. This allows an attacker with the ability to send requests to `HandleGithubWebhook` to crash the Minder controlplane and deny other users from using it. This vulnerability is fixed in 0.0.48."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-400"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/stacklok/minder/commit/3e5a527d2f1b535159206161d1d519602c75bd0d",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/stacklok/minder/security/advisories/GHSA-9c5w-9q3f-3hv7",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
75
CVE-2024/CVE-2024-343xx/CVE-2024-34342.json
Normal file
75
CVE-2024/CVE-2024-343xx/CVE-2024-34342.json
Normal file
@ -0,0 +1,75 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-34342",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-05-07T15:15:09.730",
|
||||||
|
"lastModified": "2024-05-07T15:15:09.730",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "react-pdf displays PDFs in React apps. If PDF.js is used to load a malicious PDF, and PDF.js is configured with `isEvalSupported` set to `true` (which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain. This vulnerability is fixed in 7.7.3 and 8.0.2."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.6,
|
||||||
|
"impactScore": 5.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/mozilla/pdf.js/commit/85e64b5c16c9aaef738f421733c12911a441cec6",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/mozilla/pdf.js/pull/18015",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/mozilla/pdf.js/security/advisories/GHSA-wgrm-67xf-hhpq",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/wojtekmaj/react-pdf/commit/208f28dd47fe38c33ce4bac4205b2b0a0bb207fe",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/wojtekmaj/react-pdf/commit/671e6eaa2e373e404040c13cc6b668fe39839cad",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/wojtekmaj/react-pdf/security/advisories/GHSA-87hq-q4gp-9wr4",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
24
CVE-2024/CVE-2024-345xx/CVE-2024-34523.json
Normal file
24
CVE-2024/CVE-2024-345xx/CVE-2024-34523.json
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-34523",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-05-07T15:15:09.930",
|
||||||
|
"lastModified": "2024-05-07T15:15:09.930",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "AChecker 1.5 allows remote attackers to read the contents of arbitrary files via the download.php path parameter by using Unauthenticated Path Traversal. This occurs through readfile in PHP. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/inclusive-design/AChecker/blob/main/checker/download.php",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/piuppi/Proof-of-Concepts/blob/main/AChecker/CVE-2024-34523.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "The EasyEvent WordPress plugin through 1.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed"
|
"value": "The EasyEvent WordPress plugin through 1.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "El complemento EasyEvent WordPress hasta la versi\u00f3n 1.0.0 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques de cross site scripting incluso cuando unfiltered_html no est\u00e1 permitido."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through integer overflow."
|
"value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through integer overflow."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local provoque una falla del servicio a trav\u00e9s de un desbordamiento de enteros."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through heap buffer overflow."
|
"value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through heap buffer overflow."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local ejecute c\u00f3digo arbitrario en TCB a trav\u00e9s de un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through use after free."
|
"value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through use after free."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En OpenHarmony v4.0.0 y versiones anteriores permiten a un atacante local la ejecuci\u00f3n de c\u00f3digo arbitrario en TCB mediante use after free."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "The Build App Online plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.0.5. This is due to the 'eb_user_email_verification_key' default value is empty, and the not empty check is missing in the 'eb_user_email_verify' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id. This can only be exploited if the 'Email Verification' setting is enabled."
|
"value": "The Build App Online plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.0.5. This is due to the 'eb_user_email_verification_key' default value is empty, and the not empty check is missing in the 'eb_user_email_verify' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id. This can only be exploited if the 'Email Verification' setting is enabled."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "El complemento Build App Online para WordPress es vulnerable a la omisi\u00f3n de autenticaci\u00f3n en versiones hasta la 3.0.5 incluida. Esto se debe a que el valor predeterminado 'eb_user_email_verification_key' est\u00e1 vac\u00edo y falta la marca de verificaci\u00f3n no vac\u00eda en la funci\u00f3n 'eb_user_email_verify'. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n como cualquier usuario existente en el sitio, como un administrador, si tienen acceso a la identificaci\u00f3n del usuario. Esto s\u00f3lo se puede explotar si la configuraci\u00f3n 'Verificaci\u00f3n de correo electr\u00f3nico' est\u00e1 habilitada."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "The Startklar Elementor Addons plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'process' function in the 'startklarDropZoneUploadProcess' class in versions up to, and including, 1.7.13. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible."
|
"value": "The Startklar Elementor Addons plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'process' function in the 'startklarDropZoneUploadProcess' class in versions up to, and including, 1.7.13. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "El complemento Startklar Elementor Addons para WordPress es vulnerable a cargas de archivos arbitrarias debido a una validaci\u00f3n insuficiente del tipo de archivo en la funci\u00f3n 'proceso' en la clase 'startklarDropZoneUploadProcess' en versiones hasta la 1.7.13 incluida. Esto hace posible que atacantes no autenticados carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "The Startklar Elementor Addons plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 1.7.13. This is due to the plugin not properly validating the path of an uploaded file prior to deleting it. This makes it possible for unauthenticated attackers to delete arbitrary files, including the wp-config.php file, which can make site takeover and remote code execution possible."
|
"value": "The Startklar Elementor Addons plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 1.7.13. This is due to the plugin not properly validating the path of an uploaded file prior to deleting it. This makes it possible for unauthenticated attackers to delete arbitrary files, including the wp-config.php file, which can make site takeover and remote code execution possible."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "El complemento Startklar Elementor Addons para WordPress es vulnerable a la eliminaci\u00f3n arbitraria de archivos en todas las versiones hasta la 1.7.13 incluida. Esto se debe a que el complemento no valida correctamente la ruta de un archivo cargado antes de eliminarlo. Esto hace posible que atacantes no autenticados eliminen archivos arbitrarios, incluido el archivo wp-config.php, lo que puede hacer posible la toma del sitio y la ejecuci\u00f3n remota de c\u00f3digo."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In Eclipse Dataspace Components from version 0.2.1 to 0.6.2, in the EDC Connector component ( https://github.com/eclipse-edc/Connector ), an attacker might obtain OAuth2 client secrets from the vault.\n\nIn Eclipse Dataspace Components from version 0.2.1 to 0.6.2, we have identified a security vulnerability in the EDC Connector component ( https://github.com/eclipse-edc/Connector ) regarding the OAuth2-protected data sink feature. When using a custom, OAuth2-protected data sink, the OAuth2-specific data address properties are resolved by the provider data plane. Problematically, the consumer-provided clientSecretKey, which indicates the OAuth2 client secret to retrieve from a secrets vault, is resolved in the context of the provider's vault, not the consumer. This secret's value is then sent to the tokenUrl, also consumer-controlled, as part of an OAuth2 client credentials grant. The returned access token is then sent as a bearer token to the data sink URL.\n\nThis feature is now disabled entirely, because not all code paths necessary for a successful realization were fully implemented.\n\n"
|
"value": "In Eclipse Dataspace Components from version 0.2.1 to 0.6.2, in the EDC Connector component ( https://github.com/eclipse-edc/Connector ), an attacker might obtain OAuth2 client secrets from the vault.\n\nIn Eclipse Dataspace Components from version 0.2.1 to 0.6.2, we have identified a security vulnerability in the EDC Connector component ( https://github.com/eclipse-edc/Connector ) regarding the OAuth2-protected data sink feature. When using a custom, OAuth2-protected data sink, the OAuth2-specific data address properties are resolved by the provider data plane. Problematically, the consumer-provided clientSecretKey, which indicates the OAuth2 client secret to retrieve from a secrets vault, is resolved in the context of the provider's vault, not the consumer. This secret's value is then sent to the tokenUrl, also consumer-controlled, as part of an OAuth2 client credentials grant. The returned access token is then sent as a bearer token to the data sink URL.\n\nThis feature is now disabled entirely, because not all code paths necessary for a successful realization were fully implemented.\n\n"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En los componentes de Eclipse Dataspace de la versi\u00f3n 0.2.1 a 0.6.2, en el componente EDC Connector (https://github.com/eclipse-edc/Connector), un atacante podr\u00eda obtener secretos del cliente OAuth2 de la b\u00f3veda. En los componentes de Eclipse Dataspace de la versi\u00f3n 0.2.1 a 0.6.2, hemos identificado una vulnerabilidad de seguridad en el componente EDC Connector (https://github.com/eclipse-edc/Connector) con respecto a la funci\u00f3n de receptor de datos protegido por OAuth2. Cuando se utiliza un receptor de datos personalizado protegido por OAuth2, el plano de datos del proveedor resuelve las propiedades de direcci\u00f3n de datos espec\u00edficas de OAuth2. Lo problem\u00e1tico es que la clientSecretKey proporcionada por el consumidor, que indica el secreto del cliente OAuth2 para recuperar de una b\u00f3veda de secretos, se resuelve en el contexto de la b\u00f3veda del proveedor, no en el del consumidor. Luego, el valor de este secreto se env\u00eda a tokenUrl, tambi\u00e9n controlado por el consumidor, como parte de una concesi\u00f3n de credenciales de cliente OAuth2. El token de acceso devuelto se env\u00eda luego como token de portador a la URL del receptor de datos. Esta caracter\u00edstica ahora est\u00e1 completamente deshabilitada porque no se implementaron completamente todas las rutas de c\u00f3digo necesarias para una realizaci\u00f3n exitosa."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "IDOR vulnerability in Janto Ticketing Software affecting version 4.3r10. This vulnerability could allow a remote user to obtain the download URL of another user to obtain the purchased ticket."
|
"value": "IDOR vulnerability in Janto Ticketing Software affecting version 4.3r10. This vulnerability could allow a remote user to obtain the download URL of another user to obtain the purchased ticket."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Vulnerabilidad IDOR en Janto Ticketing Software que afecta a la versi\u00f3n 4.3r10. Esta vulnerabilidad podr\u00eda permitir que un usuario remoto obtenga la URL de descarga de otro usuario para obtener el billete comprado."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "IDOR vulnerability in Janto Ticketing Software affecting version 4.3r10. This vulnerability could allow a remote user to obtain a user's event ticket by creating a specific request with the ticket reference ID, leading to the exposure of sensitive user data."
|
"value": "IDOR vulnerability in Janto Ticketing Software affecting version 4.3r10. This vulnerability could allow a remote user to obtain a user's event ticket by creating a specific request with the ticket reference ID, leading to the exposure of sensitive user data."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Vulnerabilidad IDOR en Janto Ticketing Software que afecta a la versi\u00f3n 4.3r10. Esta vulnerabilidad podr\u00eda permitir que un usuario remoto obtenga una entrada para un evento mediante la creaci\u00f3n de una solicitud espec\u00edfica con el ID de referencia de la entrada, lo que provocar\u00eda la exposici\u00f3n de datos confidenciales del usuario."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability classified as critical has been found in Faraday GM8181 and GM828x up to 20240429. Affected is an unknown function of the component NTP Service. The manipulation of the argument ntp_srv leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-263304."
|
"value": "A vulnerability classified as critical has been found in Faraday GM8181 and GM828x up to 20240429. Affected is an unknown function of the component NTP Service. The manipulation of the argument ntp_srv leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-263304."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Una vulnerabilidad ha sido encontrada en Faraday GM8181 y GM828x hasta 20240429 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del componente NTP Service es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento ntp_srv conduce a la inyecci\u00f3n de comandos del sistema operativo. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-263304."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability classified as problematic was found in Faraday GM8181 and GM828x up to 20240429. Affected by this vulnerability is an unknown functionality of the component Request Handler. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier VDB-263305 was assigned to this vulnerability."
|
"value": "A vulnerability classified as problematic was found in Faraday GM8181 and GM828x up to 20240429. Affected by this vulnerability is an unknown functionality of the component Request Handler. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier VDB-263305 was assigned to this vulnerability."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Una vulnerabilidad clasificada como problem\u00e1tica fue encontrada en Faraday GM8181 y GM828x hasta 20240429. Una funci\u00f3n desconocida del componente Request Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la divulgaci\u00f3n de informaci\u00f3n. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-263305."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability, which was classified as problematic, has been found in Faraday GM8181 and GM828x up to 20240429. Affected by this issue is some unknown functionality of the file /command_port.ini. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-263306 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
"value": "A vulnerability, which was classified as problematic, has been found in Faraday GM8181 and GM828x up to 20240429. Affected by this issue is some unknown functionality of the file /command_port.ini. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-263306 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Una vulnerabilidad clasificada como problem\u00e1tica ha sido encontrada en Faraday GM8181 y GM828x hasta 20240429. Una funci\u00f3n desconocida del archivo /command_port.ini es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la divulgaci\u00f3n de informaci\u00f3n. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-263306 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability, which was classified as problematic, was found in DedeCMS 5.7. This affects an unknown part of the file /src/dede/member_type.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263307. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
"value": "A vulnerability, which was classified as problematic, was found in DedeCMS 5.7. This affects an unknown part of the file /src/dede/member_type.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263307. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Una vulnerabilidad fue encontrada en DedeCMS 5.7 y clasificada como problem\u00e1tica. Esto afecta a una parte desconocida del archivo /src/dede/member_type.php. La manipulaci\u00f3n conduce a cross-site request forgery. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-263307. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability has been found in DedeCMS 5.7 and classified as problematic. This vulnerability affects unknown code of the file /src/dede/shops_delivery.php. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263308. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
"value": "A vulnerability has been found in DedeCMS 5.7 and classified as problematic. This vulnerability affects unknown code of the file /src/dede/shops_delivery.php. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263308. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Una vulnerabilidad ha sido encontrada en DedeCMS 5.7 y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo /src/dede/shops_delivery.php. La manipulaci\u00f3n conduce a cross-site request forgery. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-263308. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability was found in DedeCMS 5.7 and classified as problematic. This issue affects some unknown processing of the file /src/dede/tpl.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263309 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
"value": "A vulnerability was found in DedeCMS 5.7 and classified as problematic. This issue affects some unknown processing of the file /src/dede/tpl.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263309 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Una vulnerabilidad fue encontrada en DedeCMS 5.7 y clasificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo /src/dede/tpl.php. La manipulaci\u00f3n conduce a cross-site request forgery. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-263309. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability was found in DedeCMS 5.7. It has been classified as problematic. Affected is an unknown function of the file /src/dede/mytag_add.php. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-263310 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
"value": "A vulnerability was found in DedeCMS 5.7. It has been classified as problematic. Affected is an unknown function of the file /src/dede/mytag_add.php. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-263310 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se encontr\u00f3 una vulnerabilidad en DedeCMS 5.7. Ha sido clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo /src/dede/mytag_add.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a cross-site request forgery. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-263310 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability was found in DedeCMS 5.7. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /src/dede/mytag_edit.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263311. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
"value": "A vulnerability was found in DedeCMS 5.7. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /src/dede/mytag_edit.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263311. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se encontr\u00f3 una vulnerabilidad en DedeCMS 5.7. Ha sido declarada problem\u00e1tica. Una funci\u00f3n desconocida del archivo /src/dede/mytag_edit.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a cross-site request forgery. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-263311. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
96
CVE-2024/CVE-2024-45xx/CVE-2024-4590.json
Normal file
96
CVE-2024/CVE-2024-45xx/CVE-2024-4590.json
Normal file
@ -0,0 +1,96 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-4590",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-05-07T14:15:11.050",
|
||||||
|
"lastModified": "2024-05-07T14:15:11.050",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in DedeCMS 5.7. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /src/dede/sys_info.php. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263312. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se encontr\u00f3 una vulnerabilidad en DedeCMS 5.7. Ha sido calificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo /src/dede/sys_info.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a cross-site request forgery. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-263312. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 10.0,
|
||||||
|
"impactScore": 2.9,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-352"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Hckwzh/cms/blob/main/21.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.263312",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.263312",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.324958",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
96
CVE-2024/CVE-2024-45xx/CVE-2024-4591.json
Normal file
96
CVE-2024/CVE-2024-45xx/CVE-2024-4591.json
Normal file
@ -0,0 +1,96 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-4591",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-05-07T14:15:11.277",
|
||||||
|
"lastModified": "2024-05-07T14:15:11.277",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability classified as problematic has been found in DedeCMS 5.7. This affects an unknown part of the file /src/dede/sys_group_add.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263313 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Una vulnerabilidad ha sido encontrada en DedeCMS 5.7 y clasificada como problem\u00e1tica. Esto afecta a una parte desconocida del archivo /src/dede/sys_group_add.php. La manipulaci\u00f3n conduce a cross-site request forgery. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-263313. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 10.0,
|
||||||
|
"impactScore": 2.9,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-352"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Hckwzh/cms/blob/main/22.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.263313",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.263313",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.324959",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
96
CVE-2024/CVE-2024-45xx/CVE-2024-4592.json
Normal file
96
CVE-2024/CVE-2024-45xx/CVE-2024-4592.json
Normal file
@ -0,0 +1,96 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-4592",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-05-07T14:15:11.510",
|
||||||
|
"lastModified": "2024-05-07T14:15:11.510",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability classified as problematic was found in DedeCMS 5.7. This vulnerability affects unknown code of the file /src/dede/sys_group_edit.php. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-263314 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Una vulnerabilidad fue encontrada en DedeCMS 5.7 y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a c\u00f3digo desconocido del archivo /src/dede/sys_group_edit.php. La manipulaci\u00f3n conduce a cross-site request forgery. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-263314 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 10.0,
|
||||||
|
"impactScore": 2.9,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-352"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Hckwzh/cms/blob/main/23.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.263314",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.263314",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.324960",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
96
CVE-2024/CVE-2024-45xx/CVE-2024-4593.json
Normal file
96
CVE-2024/CVE-2024-45xx/CVE-2024-4593.json
Normal file
@ -0,0 +1,96 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-4593",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-05-07T14:15:11.747",
|
||||||
|
"lastModified": "2024-05-07T14:15:11.747",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability, which was classified as problematic, has been found in DedeCMS 5.7. This issue affects some unknown processing of the file /src/dede/sys_multiserv.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263315. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Una vulnerabilidad fue encontrada en DedeCMS 5.7 y clasificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo /src/dede/sys_multiserv.php. La manipulaci\u00f3n conduce a cross-site request forgery. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-263315. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 10.0,
|
||||||
|
"impactScore": 2.9,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-352"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Hckwzh/cms/blob/main/24.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.263315",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.263315",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.324961",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-45xx/CVE-2024-4594.json
Normal file
92
CVE-2024/CVE-2024-45xx/CVE-2024-4594.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-4594",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-05-07T15:15:10.040",
|
||||||
|
"lastModified": "2024-05-07T15:15:10.040",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability, which was classified as problematic, was found in DedeCMS 5.7. Affected is an unknown function of the file /src/dede/sys_safe.php. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263316. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 10.0,
|
||||||
|
"impactScore": 2.9,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-352"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Hckwzh/cms/blob/main/25.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.263316",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.263316",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.324963",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-45xx/CVE-2024-4595.json
Normal file
92
CVE-2024/CVE-2024-45xx/CVE-2024-4595.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-4595",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-05-07T15:15:10.273",
|
||||||
|
"lastModified": "2024-05-07T15:15:10.273",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability has been found in SEMCMS up to 4.8 and classified as critical. Affected by this vulnerability is the function locate of the file function.php. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263317 was assigned to this vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"baseScore": 6.5
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/gatsby2003/Semcms/blob/main/semcms0-sqlinjection.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.263317",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.263317",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.326715",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Remote denial of service vulnerability in LAN Messenger affecting version 3.4.0. This vulnerability allows an attacker to crash the LAN Messenger service by sending a long string directly and continuously over the UDP protocol."
|
"value": "Remote denial of service vulnerability in LAN Messenger affecting version 3.4.0. This vulnerability allows an attacker to crash the LAN Messenger service by sending a long string directly and continuously over the UDP protocol."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Vulnerabilidad de denegaci\u00f3n remota de servicio en LAN Messenger que afecta a la versi\u00f3n 3.4.0. Esta vulnerabilidad permite a un atacante bloquear el servicio LAN Messenger enviando una cadena larga directa y continuamente a trav\u00e9s del protocolo UDP."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Cross-Site Request Forgery vulnerability in Socomec Net Vision, version 7.20. This vulnerability could allow an attacker to trick registered users into performing critical actions, such as adding and updating accounts, due to lack of proper sanitisation of the \u2018set_param.cgi\u2019 file."
|
"value": "Cross-Site Request Forgery vulnerability in Socomec Net Vision, version 7.20. This vulnerability could allow an attacker to trick registered users into performing critical actions, such as adding and updating accounts, due to lack of proper sanitisation of the \u2018set_param.cgi\u2019 file."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Vulnerabilidad de Cross-Site Request Forgery en Socomec Net Vision, versi\u00f3n 7.20. Esta vulnerabilidad podr\u00eda permitir a un atacante enga\u00f1ar a los usuarios registrados para que realicen acciones cr\u00edticas, como agregar y actualizar cuentas, debido a la falta de una desinfecci\u00f3n adecuada del archivo 'set_param.cgi'."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
@ -8,6 +8,10 @@
|
|||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An incorrect authentication vulnerability has been found in Socomec Net Vision affecting version 7.20. This vulnerability allows an attacker to perform a brute force attack on the application and recover a valid session, because the application uses a five-digit integer value."
|
"value": "An incorrect authentication vulnerability has been found in Socomec Net Vision affecting version 7.20. This vulnerability allows an attacker to perform a brute force attack on the application and recover a valid session, because the application uses a five-digit integer value."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se ha encontrado una vulnerabilidad de autenticaci\u00f3n incorrecta en Socomec Net Vision que afecta a la versi\u00f3n 7.20. Esta vulnerabilidad permite a un atacante realizar un ataque de fuerza bruta en la aplicaci\u00f3n y recuperar una sesi\u00f3n v\u00e1lida, porque la aplicaci\u00f3n utiliza un valor entero de cinco d\u00edgitos."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
78
README.md
78
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-05-07T14:00:42.453599+00:00
|
2024-05-07T16:00:38.282013+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-05-07T13:39:32.710000+00:00
|
2024-05-07T15:15:10.273000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,46 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
248842
|
248869
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `13`
|
Recently added CVEs: `27`
|
||||||
|
|
||||||
- [CVE-2023-31234](CVE-2023/CVE-2023-312xx/CVE-2023-31234.json) (`2024-05-07T13:15:47.703`)
|
- [CVE-2024-29889](CVE-2024/CVE-2024-298xx/CVE-2024-29889.json) (`2024-05-07T14:15:10.330`)
|
||||||
- [CVE-2023-7240](CVE-2023/CVE-2023-72xx/CVE-2023-7240.json) (`2024-05-07T13:15:47.973`)
|
- [CVE-2024-31456](CVE-2024/CVE-2024-314xx/CVE-2024-31456.json) (`2024-05-07T14:15:10.550`)
|
||||||
- [CVE-2024-4536](CVE-2024/CVE-2024-45xx/CVE-2024-4536.json) (`2024-05-07T13:15:48.513`)
|
- [CVE-2024-32369](CVE-2024/CVE-2024-323xx/CVE-2024-32369.json) (`2024-05-07T15:15:08.520`)
|
||||||
- [CVE-2024-4537](CVE-2024/CVE-2024-45xx/CVE-2024-4537.json) (`2024-05-07T12:15:09.833`)
|
- [CVE-2024-32370](CVE-2024/CVE-2024-323xx/CVE-2024-32370.json) (`2024-05-07T15:15:08.597`)
|
||||||
- [CVE-2024-4538](CVE-2024/CVE-2024-45xx/CVE-2024-4538.json) (`2024-05-07T12:15:10.030`)
|
- [CVE-2024-32371](CVE-2024/CVE-2024-323xx/CVE-2024-32371.json) (`2024-05-07T15:15:08.653`)
|
||||||
- [CVE-2024-4584](CVE-2024/CVE-2024-45xx/CVE-2024-4584.json) (`2024-05-07T12:15:10.223`)
|
- [CVE-2024-32663](CVE-2024/CVE-2024-326xx/CVE-2024-32663.json) (`2024-05-07T15:15:08.713`)
|
||||||
- [CVE-2024-4585](CVE-2024/CVE-2024-45xx/CVE-2024-4585.json) (`2024-05-07T12:15:10.457`)
|
- [CVE-2024-32664](CVE-2024/CVE-2024-326xx/CVE-2024-32664.json) (`2024-05-07T15:15:08.937`)
|
||||||
- [CVE-2024-4586](CVE-2024/CVE-2024-45xx/CVE-2024-4586.json) (`2024-05-07T13:15:48.770`)
|
- [CVE-2024-32867](CVE-2024/CVE-2024-328xx/CVE-2024-32867.json) (`2024-05-07T15:15:09.143`)
|
||||||
- [CVE-2024-4587](CVE-2024/CVE-2024-45xx/CVE-2024-4587.json) (`2024-05-07T13:15:49.043`)
|
- [CVE-2024-33120](CVE-2024/CVE-2024-331xx/CVE-2024-33120.json) (`2024-05-07T15:15:09.353`)
|
||||||
- [CVE-2024-4588](CVE-2024/CVE-2024-45xx/CVE-2024-4588.json) (`2024-05-07T13:15:49.323`)
|
- [CVE-2024-33122](CVE-2024/CVE-2024-331xx/CVE-2024-33122.json) (`2024-05-07T15:15:09.417`)
|
||||||
- [CVE-2024-4589](CVE-2024/CVE-2024-45xx/CVE-2024-4589.json) (`2024-05-07T13:15:49.603`)
|
- [CVE-2024-33124](CVE-2024/CVE-2024-331xx/CVE-2024-33124.json) (`2024-05-07T15:15:09.477`)
|
||||||
- [CVE-2024-4600](CVE-2024/CVE-2024-46xx/CVE-2024-4600.json) (`2024-05-07T12:15:10.683`)
|
- [CVE-2024-33434](CVE-2024/CVE-2024-334xx/CVE-2024-33434.json) (`2024-05-07T14:15:10.760`)
|
||||||
- [CVE-2024-4601](CVE-2024/CVE-2024-46xx/CVE-2024-4601.json) (`2024-05-07T12:15:10.880`)
|
- [CVE-2024-33780](CVE-2024/CVE-2024-337xx/CVE-2024-33780.json) (`2024-05-07T14:15:10.820`)
|
||||||
|
- [CVE-2024-33781](CVE-2024/CVE-2024-337xx/CVE-2024-33781.json) (`2024-05-07T14:15:10.880`)
|
||||||
|
- [CVE-2024-33782](CVE-2024/CVE-2024-337xx/CVE-2024-33782.json) (`2024-05-07T14:15:10.933`)
|
||||||
|
- [CVE-2024-33783](CVE-2024/CVE-2024-337xx/CVE-2024-33783.json) (`2024-05-07T14:15:10.990`)
|
||||||
|
- [CVE-2024-34084](CVE-2024/CVE-2024-340xx/CVE-2024-34084.json) (`2024-05-07T15:15:09.540`)
|
||||||
|
- [CVE-2024-34342](CVE-2024/CVE-2024-343xx/CVE-2024-34342.json) (`2024-05-07T15:15:09.730`)
|
||||||
|
- [CVE-2024-34523](CVE-2024/CVE-2024-345xx/CVE-2024-34523.json) (`2024-05-07T15:15:09.930`)
|
||||||
|
- [CVE-2024-4590](CVE-2024/CVE-2024-45xx/CVE-2024-4590.json) (`2024-05-07T14:15:11.050`)
|
||||||
|
- [CVE-2024-4591](CVE-2024/CVE-2024-45xx/CVE-2024-4591.json) (`2024-05-07T14:15:11.277`)
|
||||||
|
- [CVE-2024-4592](CVE-2024/CVE-2024-45xx/CVE-2024-4592.json) (`2024-05-07T14:15:11.510`)
|
||||||
|
- [CVE-2024-4593](CVE-2024/CVE-2024-45xx/CVE-2024-4593.json) (`2024-05-07T14:15:11.747`)
|
||||||
|
- [CVE-2024-4594](CVE-2024/CVE-2024-45xx/CVE-2024-4594.json) (`2024-05-07T15:15:10.040`)
|
||||||
|
- [CVE-2024-4595](CVE-2024/CVE-2024-45xx/CVE-2024-4595.json) (`2024-05-07T15:15:10.273`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `64`
|
Recently modified CVEs: `54`
|
||||||
|
|
||||||
- [CVE-2024-33121](CVE-2024/CVE-2024-331xx/CVE-2024-33121.json) (`2024-05-07T13:39:32.710`)
|
- [CVE-2024-2913](CVE-2024/CVE-2024-29xx/CVE-2024-2913.json) (`2024-05-07T13:39:32.710`)
|
||||||
- [CVE-2024-33570](CVE-2024/CVE-2024-335xx/CVE-2024-33570.json) (`2024-05-07T13:39:32.710`)
|
- [CVE-2024-29941](CVE-2024/CVE-2024-299xx/CVE-2024-29941.json) (`2024-05-07T13:39:32.710`)
|
||||||
- [CVE-2024-33576](CVE-2024/CVE-2024-335xx/CVE-2024-33576.json) (`2024-05-07T13:39:32.710`)
|
- [CVE-2024-30973](CVE-2024/CVE-2024-309xx/CVE-2024-30973.json) (`2024-05-07T13:39:32.710`)
|
||||||
- [CVE-2024-33599](CVE-2024/CVE-2024-335xx/CVE-2024-33599.json) (`2024-05-07T13:39:32.710`)
|
- [CVE-2024-31078](CVE-2024/CVE-2024-310xx/CVE-2024-31078.json) (`2024-05-07T13:39:32.710`)
|
||||||
- [CVE-2024-33600](CVE-2024/CVE-2024-336xx/CVE-2024-33600.json) (`2024-05-07T13:39:32.710`)
|
|
||||||
- [CVE-2024-33601](CVE-2024/CVE-2024-336xx/CVE-2024-33601.json) (`2024-05-07T13:39:32.710`)
|
|
||||||
- [CVE-2024-33602](CVE-2024/CVE-2024-336xx/CVE-2024-33602.json) (`2024-05-07T13:39:32.710`)
|
|
||||||
- [CVE-2024-33907](CVE-2024/CVE-2024-339xx/CVE-2024-33907.json) (`2024-05-07T13:39:32.710`)
|
|
||||||
- [CVE-2024-33908](CVE-2024/CVE-2024-339xx/CVE-2024-33908.json) (`2024-05-07T13:39:32.710`)
|
|
||||||
- [CVE-2024-34413](CVE-2024/CVE-2024-344xx/CVE-2024-34413.json) (`2024-05-07T13:39:32.710`)
|
|
||||||
- [CVE-2024-34455](CVE-2024/CVE-2024-344xx/CVE-2024-34455.json) (`2024-05-07T12:15:09.747`)
|
|
||||||
- [CVE-2024-34532](CVE-2024/CVE-2024-345xx/CVE-2024-34532.json) (`2024-05-07T13:39:32.710`)
|
|
||||||
- [CVE-2024-34533](CVE-2024/CVE-2024-345xx/CVE-2024-34533.json) (`2024-05-07T13:39:32.710`)
|
|
||||||
- [CVE-2024-34534](CVE-2024/CVE-2024-345xx/CVE-2024-34534.json) (`2024-05-07T13:39:32.710`)
|
|
||||||
- [CVE-2024-3628](CVE-2024/CVE-2024-36xx/CVE-2024-3628.json) (`2024-05-07T13:39:32.710`)
|
- [CVE-2024-3628](CVE-2024/CVE-2024-36xx/CVE-2024-3628.json) (`2024-05-07T13:39:32.710`)
|
||||||
- [CVE-2024-3757](CVE-2024/CVE-2024-37xx/CVE-2024-3757.json) (`2024-05-07T13:39:32.710`)
|
- [CVE-2024-3757](CVE-2024/CVE-2024-37xx/CVE-2024-3757.json) (`2024-05-07T13:39:32.710`)
|
||||||
- [CVE-2024-3758](CVE-2024/CVE-2024-37xx/CVE-2024-3758.json) (`2024-05-07T13:39:32.710`)
|
- [CVE-2024-3758](CVE-2024/CVE-2024-37xx/CVE-2024-3758.json) (`2024-05-07T13:39:32.710`)
|
||||||
@ -80,10 +82,20 @@ Recently modified CVEs: `64`
|
|||||||
- [CVE-2024-4186](CVE-2024/CVE-2024-41xx/CVE-2024-4186.json) (`2024-05-07T13:39:32.710`)
|
- [CVE-2024-4186](CVE-2024/CVE-2024-41xx/CVE-2024-4186.json) (`2024-05-07T13:39:32.710`)
|
||||||
- [CVE-2024-4345](CVE-2024/CVE-2024-43xx/CVE-2024-4345.json) (`2024-05-07T13:39:32.710`)
|
- [CVE-2024-4345](CVE-2024/CVE-2024-43xx/CVE-2024-4345.json) (`2024-05-07T13:39:32.710`)
|
||||||
- [CVE-2024-4346](CVE-2024/CVE-2024-43xx/CVE-2024-4346.json) (`2024-05-07T13:39:32.710`)
|
- [CVE-2024-4346](CVE-2024/CVE-2024-43xx/CVE-2024-4346.json) (`2024-05-07T13:39:32.710`)
|
||||||
- [CVE-2024-4568](CVE-2024/CVE-2024-45xx/CVE-2024-4568.json) (`2024-05-07T13:39:32.710`)
|
- [CVE-2024-4536](CVE-2024/CVE-2024-45xx/CVE-2024-4536.json) (`2024-05-07T13:39:32.710`)
|
||||||
|
- [CVE-2024-4537](CVE-2024/CVE-2024-45xx/CVE-2024-4537.json) (`2024-05-07T13:39:32.710`)
|
||||||
|
- [CVE-2024-4538](CVE-2024/CVE-2024-45xx/CVE-2024-4538.json) (`2024-05-07T13:39:32.710`)
|
||||||
- [CVE-2024-4582](CVE-2024/CVE-2024-45xx/CVE-2024-4582.json) (`2024-05-07T13:39:32.710`)
|
- [CVE-2024-4582](CVE-2024/CVE-2024-45xx/CVE-2024-4582.json) (`2024-05-07T13:39:32.710`)
|
||||||
- [CVE-2024-4583](CVE-2024/CVE-2024-45xx/CVE-2024-4583.json) (`2024-05-07T13:39:32.710`)
|
- [CVE-2024-4583](CVE-2024/CVE-2024-45xx/CVE-2024-4583.json) (`2024-05-07T13:39:32.710`)
|
||||||
|
- [CVE-2024-4584](CVE-2024/CVE-2024-45xx/CVE-2024-4584.json) (`2024-05-07T13:39:32.710`)
|
||||||
|
- [CVE-2024-4585](CVE-2024/CVE-2024-45xx/CVE-2024-4585.json) (`2024-05-07T13:39:32.710`)
|
||||||
|
- [CVE-2024-4586](CVE-2024/CVE-2024-45xx/CVE-2024-4586.json) (`2024-05-07T13:39:32.710`)
|
||||||
|
- [CVE-2024-4587](CVE-2024/CVE-2024-45xx/CVE-2024-4587.json) (`2024-05-07T13:39:32.710`)
|
||||||
|
- [CVE-2024-4588](CVE-2024/CVE-2024-45xx/CVE-2024-4588.json) (`2024-05-07T13:39:32.710`)
|
||||||
|
- [CVE-2024-4589](CVE-2024/CVE-2024-45xx/CVE-2024-4589.json) (`2024-05-07T13:39:32.710`)
|
||||||
- [CVE-2024-4599](CVE-2024/CVE-2024-45xx/CVE-2024-4599.json) (`2024-05-07T13:39:32.710`)
|
- [CVE-2024-4599](CVE-2024/CVE-2024-45xx/CVE-2024-4599.json) (`2024-05-07T13:39:32.710`)
|
||||||
|
- [CVE-2024-4600](CVE-2024/CVE-2024-46xx/CVE-2024-4600.json) (`2024-05-07T13:39:32.710`)
|
||||||
|
- [CVE-2024-4601](CVE-2024/CVE-2024-46xx/CVE-2024-4601.json) (`2024-05-07T13:39:32.710`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
189
_state.csv
189
_state.csv
@ -198730,7 +198730,7 @@ CVE-2022-31470,0,0,da45f0e101cb2279831f150221f5784badae5d441cb3a004dc43144c822c0
|
|||||||
CVE-2022-31471,0,0,ec0f29e37f8bf7a7a4901e6f51a0bfcb59e247202b8f2c932e9f086fbccb6fc7,2022-08-01T18:56:10.177000
|
CVE-2022-31471,0,0,ec0f29e37f8bf7a7a4901e6f51a0bfcb59e247202b8f2c932e9f086fbccb6fc7,2022-08-01T18:56:10.177000
|
||||||
CVE-2022-31472,0,0,863139ca51f69847a77d3516f865fe25e5a3ccd3b751fae7dfb8778e1ed81720,2022-07-15T12:15:39.223000
|
CVE-2022-31472,0,0,863139ca51f69847a77d3516f865fe25e5a3ccd3b751fae7dfb8778e1ed81720,2022-07-15T12:15:39.223000
|
||||||
CVE-2022-31473,0,0,86e3b13263322637f9043580feb349c6d5db1633c10ea86051ab6ef1536dcfae,2022-08-10T23:36:48.057000
|
CVE-2022-31473,0,0,86e3b13263322637f9043580feb349c6d5db1633c10ea86051ab6ef1536dcfae,2022-08-10T23:36:48.057000
|
||||||
CVE-2022-31474,0,1,74556ae60f2fd8f1574485741a8cfaab9b61960ee159dda03943e917f843c20d,2024-05-07T13:15:47.487000
|
CVE-2022-31474,0,0,74556ae60f2fd8f1574485741a8cfaab9b61960ee159dda03943e917f843c20d,2024-05-07T13:15:47.487000
|
||||||
CVE-2022-31475,0,0,e690085c41613d4ce17469aedbb7b65689dafac4d30f059a25e001de2f358f35,2023-08-08T14:22:24.967000
|
CVE-2022-31475,0,0,e690085c41613d4ce17469aedbb7b65689dafac4d30f059a25e001de2f358f35,2023-08-08T14:22:24.967000
|
||||||
CVE-2022-31476,0,0,e6c9b8e5799a477d2dec8c05c08d08c41827d098f4af05443057a2b31ebba970,2023-08-08T14:22:24.967000
|
CVE-2022-31476,0,0,e6c9b8e5799a477d2dec8c05c08d08c41827d098f4af05443057a2b31ebba970,2023-08-08T14:22:24.967000
|
||||||
CVE-2022-31477,0,0,572033cd11684fb1665bdc7cb1dcdf68ce62fb9b581c38a5d573e2a7f40763c0,2023-11-07T03:47:38.243000
|
CVE-2022-31477,0,0,572033cd11684fb1665bdc7cb1dcdf68ce62fb9b581c38a5d573e2a7f40763c0,2023-11-07T03:47:38.243000
|
||||||
@ -222592,7 +222592,7 @@ CVE-2023-31230,0,0,7a5840326515617fab0ae808406bf516580abd72a8a54ce94870139ef1479
|
|||||||
CVE-2023-31231,0,0,84eac62e69db002070ef9020c293211cc624ba9bc7a273bdf4db2f223bf8f24c,2023-12-27T20:21:21.870000
|
CVE-2023-31231,0,0,84eac62e69db002070ef9020c293211cc624ba9bc7a273bdf4db2f223bf8f24c,2023-12-27T20:21:21.870000
|
||||||
CVE-2023-31232,0,0,c132c95f482830077369b28ecac65713932b48f2431a73dcb51e25bc5de386e0,2023-08-23T18:43:09.977000
|
CVE-2023-31232,0,0,c132c95f482830077369b28ecac65713932b48f2431a73dcb51e25bc5de386e0,2023-08-23T18:43:09.977000
|
||||||
CVE-2023-31233,0,0,032470d9319b440030f236a9bd932092e68d1bcdc2018aa1aae3b8627b30f2d0,2023-05-25T16:32:35.533000
|
CVE-2023-31233,0,0,032470d9319b440030f236a9bd932092e68d1bcdc2018aa1aae3b8627b30f2d0,2023-05-25T16:32:35.533000
|
||||||
CVE-2023-31234,1,1,5e523c524d8d4321fb027bf552c6c148624a365f5eb6fcb3db2e6018f561a9c5,2024-05-07T13:39:32.710000
|
CVE-2023-31234,0,1,adfd5b685c8b19295cd1ad28d9342a6ab797f798f5f63160642924351cc25ba6,2024-05-07T13:39:32.710000
|
||||||
CVE-2023-31235,0,0,449d00ce42470559fda6cd5f557249d2289786d9db988dc445b4da4a785efa82,2023-11-15T17:48:46.407000
|
CVE-2023-31235,0,0,449d00ce42470559fda6cd5f557249d2289786d9db988dc445b4da4a785efa82,2023-11-15T17:48:46.407000
|
||||||
CVE-2023-31236,0,0,3de36842f0d7d5af4c90d2f96438510ce2e5a8a378c75f2fff6ae2017a069265,2023-06-16T03:56:37.700000
|
CVE-2023-31236,0,0,3de36842f0d7d5af4c90d2f96438510ce2e5a8a378c75f2fff6ae2017a069265,2023-06-16T03:56:37.700000
|
||||||
CVE-2023-31237,0,0,9ea6c992a70fd536fccf2aee3eb9b83ec35046868686b6313e07dabea52154ab,2024-01-05T16:10:09.050000
|
CVE-2023-31237,0,0,9ea6c992a70fd536fccf2aee3eb9b83ec35046868686b6313e07dabea52154ab,2024-01-05T16:10:09.050000
|
||||||
@ -224334,7 +224334,7 @@ CVE-2023-33538,0,0,0b4fd8c21e2d660710ef2a7384987739ad3eb61f96e16b9227f955ca26346
|
|||||||
CVE-2023-3354,0,0,862bc4cd5fd3240c4a7eadd35341de2f97dd88cae29299dc7d0f3119dc347a60,2024-03-11T18:15:15.843000
|
CVE-2023-3354,0,0,862bc4cd5fd3240c4a7eadd35341de2f97dd88cae29299dc7d0f3119dc347a60,2024-03-11T18:15:15.843000
|
||||||
CVE-2023-33544,0,0,9e6d80f78e40db4298dd7cf1f4fe3f60783706a7c64a6d079cdc96127578517b,2023-06-08T02:30:24.810000
|
CVE-2023-33544,0,0,9e6d80f78e40db4298dd7cf1f4fe3f60783706a7c64a6d079cdc96127578517b,2023-06-08T02:30:24.810000
|
||||||
CVE-2023-33546,0,0,c7cd3293781e050d42bca7ee17f22f78ebf4dc4807edba198e17d1897dc51b18,2024-04-11T01:20:24.653000
|
CVE-2023-33546,0,0,c7cd3293781e050d42bca7ee17f22f78ebf4dc4807edba198e17d1897dc51b18,2024-04-11T01:20:24.653000
|
||||||
CVE-2023-33548,0,1,44627278eb508a5a82511345258b3240cf0a47600d8f8c09bc15697ac9c4f796,2024-05-07T13:39:32.710000
|
CVE-2023-33548,0,0,44627278eb508a5a82511345258b3240cf0a47600d8f8c09bc15697ac9c4f796,2024-05-07T13:39:32.710000
|
||||||
CVE-2023-3355,0,0,bf8f2e2213ab9d0315acf02bb3acbefe7d8167091f2a1af8149753c8e02648d3,2023-11-07T04:18:35.013000
|
CVE-2023-3355,0,0,bf8f2e2213ab9d0315acf02bb3acbefe7d8167091f2a1af8149753c8e02648d3,2023-11-07T04:18:35.013000
|
||||||
CVE-2023-33551,0,0,43bfe49239080e93b99a41c0e71f0baa51c737526b7eac3f50eee5e70315af9d,2023-11-07T04:14:58.203000
|
CVE-2023-33551,0,0,43bfe49239080e93b99a41c0e71f0baa51c737526b7eac3f50eee5e70315af9d,2023-11-07T04:14:58.203000
|
||||||
CVE-2023-33552,0,0,1dd212c6d94471b31455682339ae3b585755fb6501372079e291a0d6cd792f31,2023-11-07T04:14:59.210000
|
CVE-2023-33552,0,0,1dd212c6d94471b31455682339ae3b585755fb6501372079e291a0d6cd792f31,2023-11-07T04:14:59.210000
|
||||||
@ -228213,10 +228213,10 @@ CVE-2023-3890,0,0,8b0f1a2e2c6675421a4692c9b64c2bed0d012bc59ed4e6b608771dfc4ad755
|
|||||||
CVE-2023-38902,0,0,bf9b56be84cb8e1808eaadb94d0b5ff0d1002e428402439de4d2119727134882,2023-08-23T16:55:24.197000
|
CVE-2023-38902,0,0,bf9b56be84cb8e1808eaadb94d0b5ff0d1002e428402439de4d2119727134882,2023-08-23T16:55:24.197000
|
||||||
CVE-2023-38904,0,0,3ef41414756c078d43e73944776d15a18f9ff9bc0ecc6eade64774a4f8179f49,2023-08-22T18:14:55.080000
|
CVE-2023-38904,0,0,3ef41414756c078d43e73944776d15a18f9ff9bc0ecc6eade64774a4f8179f49,2023-08-22T18:14:55.080000
|
||||||
CVE-2023-38905,0,0,df40cc58a14265a2a3f14db3026008c7c3f94514b3c3a24514eb47ed6f7f4429,2023-08-23T16:57:38.907000
|
CVE-2023-38905,0,0,df40cc58a14265a2a3f14db3026008c7c3f94514b3c3a24514eb47ed6f7f4429,2023-08-23T16:57:38.907000
|
||||||
CVE-2023-38906,0,0,13c9481b7d8b3aaa69390b4773a6f0f75dcc851f1ddbda38a46a8fc077204d07,2024-01-19T20:15:11.007000
|
CVE-2023-38906,0,1,e7b4b93f598441f1dab90d21949621d9df6edf0066dee10147672a287acbffdd,2024-05-07T15:15:08.110000
|
||||||
CVE-2023-38907,0,0,3039940e4b0b5d6f6d1cccea74cf8f151d3a3c00b485a9fb256408144b928813,2024-01-19T20:15:11.103000
|
CVE-2023-38907,0,1,da85d229891384fa30fdaf6eaacf1325fb4094b7013756303c49a7ff93bb5486,2024-05-07T15:15:08.250000
|
||||||
CVE-2023-38908,0,0,d32cf93ea607447cb83bd2d0206762596b8b6a9c2506739aef069fda253fd419,2024-01-19T20:15:11.197000
|
CVE-2023-38908,0,1,81701dbdfc46c1891eaf071e777c07f7fd5ca0772c81b6b6c644ce43bb8b5c2f,2024-05-07T15:15:08.350000
|
||||||
CVE-2023-38909,0,0,ca3527b7fd24f9b9d0e5ed485960f28453a1b790379f1598bb34bbc2b64876d2,2024-01-19T20:15:11.273000
|
CVE-2023-38909,0,1,cdb9187b500cd084cc211501e51acc81e73f9e9b4aedc1e6e437c5d609ccd4d6,2024-05-07T15:15:08.433000
|
||||||
CVE-2023-3891,0,0,9e1f6d30938080f1eb44a4b977a3c1be0cd44658dd5595dcbab492e639cb2338,2023-09-20T18:55:02.363000
|
CVE-2023-3891,0,0,9e1f6d30938080f1eb44a4b977a3c1be0cd44658dd5595dcbab492e639cb2338,2023-09-20T18:55:02.363000
|
||||||
CVE-2023-38910,0,0,7d613e14f2c3f984ca9a3c9da17d5f723287fae066bd7a465f708354967e2cac,2023-08-22T00:58:18.610000
|
CVE-2023-38910,0,0,7d613e14f2c3f984ca9a3c9da17d5f723287fae066bd7a465f708354967e2cac,2023-08-22T00:58:18.610000
|
||||||
CVE-2023-38911,0,0,82a232b015c314242065c66e1353e672c7ab411275c4cc10b1c8fd66da310b81,2023-08-22T00:58:46.030000
|
CVE-2023-38911,0,0,82a232b015c314242065c66e1353e672c7ab411275c4cc10b1c8fd66da310b81,2023-08-22T00:58:46.030000
|
||||||
@ -229456,7 +229456,7 @@ CVE-2023-4053,0,0,9787b30a0ef7d7cf973a583af17f7d010dcb2bb33d0c223bb76d4a1c297415
|
|||||||
CVE-2023-40530,0,0,21cacd9fb10ef624626a204e9c8129f4ca480d965c3773bc34cf254a0cabcffe,2023-08-31T16:29:12.807000
|
CVE-2023-40530,0,0,21cacd9fb10ef624626a204e9c8129f4ca480d965c3773bc34cf254a0cabcffe,2023-08-31T16:29:12.807000
|
||||||
CVE-2023-40531,0,0,11c7b73527e42cdd3db8f2c1d2b037aff1fdef1beab5f14aad46252f86ee7a63,2023-09-11T13:42:39.903000
|
CVE-2023-40531,0,0,11c7b73527e42cdd3db8f2c1d2b037aff1fdef1beab5f14aad46252f86ee7a63,2023-09-11T13:42:39.903000
|
||||||
CVE-2023-40532,0,0,db222b38a4f974689b91eda1581b15889aa08c13350a30489ae75d231e0a63eb,2023-09-28T14:18:03.137000
|
CVE-2023-40532,0,0,db222b38a4f974689b91eda1581b15889aa08c13350a30489ae75d231e0a63eb,2023-09-28T14:18:03.137000
|
||||||
CVE-2023-40533,0,1,74604f18c8cfae49610e4c74aacfdc127bf675bb31b57a4da42d1902026402bb,2024-05-07T12:15:09.223000
|
CVE-2023-40533,0,0,74604f18c8cfae49610e4c74aacfdc127bf675bb31b57a4da42d1902026402bb,2024-05-07T12:15:09.223000
|
||||||
CVE-2023-40534,0,0,b373d4682c6281ff566b9bd7e2d50ff0a4a1ad35bb4fad887d43e035a0a0f7c2,2023-10-19T16:08:42.063000
|
CVE-2023-40534,0,0,b373d4682c6281ff566b9bd7e2d50ff0a4a1ad35bb4fad887d43e035a0a0f7c2,2023-10-19T16:08:42.063000
|
||||||
CVE-2023-40535,0,0,65c755be28ea6f1cd3238d546e4572d48154f16f53855d7a36a0bf39f6134420,2023-09-08T18:49:20.803000
|
CVE-2023-40535,0,0,65c755be28ea6f1cd3238d546e4572d48154f16f53855d7a36a0bf39f6134420,2023-09-08T18:49:20.803000
|
||||||
CVE-2023-40537,0,0,916c6a425f514cfd905244cc37fbdc6e4f0f4c6dc191df586bff22adece1466b,2023-10-19T16:43:11.323000
|
CVE-2023-40537,0,0,916c6a425f514cfd905244cc37fbdc6e4f0f4c6dc191df586bff22adece1466b,2023-10-19T16:43:11.323000
|
||||||
@ -233084,6 +233084,7 @@ CVE-2023-46007,0,0,6d540cf7917d33d1f9d983e500b20f05d5c29bcca54bb5f0e94646ac8afd8
|
|||||||
CVE-2023-46009,0,0,1eea79869ff9979be475d14a391a108d5bb4d81ac6b06bd913ba7c8e20cd6553,2024-03-01T06:15:48.187000
|
CVE-2023-46009,0,0,1eea79869ff9979be475d14a391a108d5bb4d81ac6b06bd913ba7c8e20cd6553,2024-03-01T06:15:48.187000
|
||||||
CVE-2023-4601,0,0,6769fd6a42be6e49717a30413418f1331d95f3a7efb61d44991f6c94c2c61c8d,2023-10-28T03:47:10.133000
|
CVE-2023-4601,0,0,6769fd6a42be6e49717a30413418f1331d95f3a7efb61d44991f6c94c2c61c8d,2023-10-28T03:47:10.133000
|
||||||
CVE-2023-46010,0,0,5c3101c7e3486cee898c26544050cd1e4dac93f563bf83b1f90e9001eb81a654,2023-11-01T17:22:21.600000
|
CVE-2023-46010,0,0,5c3101c7e3486cee898c26544050cd1e4dac93f563bf83b1f90e9001eb81a654,2023-11-01T17:22:21.600000
|
||||||
|
CVE-2023-46012,1,1,db20ba4c77ae4a725206900f2ba07341f8e45798d4b628ca9be8884e939fccc2,2024-05-07T14:15:10.003000
|
||||||
CVE-2023-46014,0,0,d4729429d3274daf3dacb04f38f72ea86d397cc5ddcddf9cf33a1c589166a976,2023-11-16T17:32:08.327000
|
CVE-2023-46014,0,0,d4729429d3274daf3dacb04f38f72ea86d397cc5ddcddf9cf33a1c589166a976,2023-11-16T17:32:08.327000
|
||||||
CVE-2023-46015,0,0,a925f4893e8c378bbe13c70dd87f1a6e101207e6c0972bf6dc467f19c6b90d64,2023-11-16T17:31:55.777000
|
CVE-2023-46015,0,0,a925f4893e8c378bbe13c70dd87f1a6e101207e6c0972bf6dc467f19c6b90d64,2023-11-16T17:31:55.777000
|
||||||
CVE-2023-46016,0,0,aee2ef485dc27314bd5b66585658e6faf5cbfcbe4e851aa29624c3312fd47461,2023-11-16T17:31:46.947000
|
CVE-2023-46016,0,0,aee2ef485dc27314bd5b66585658e6faf5cbfcbe4e851aa29624c3312fd47461,2023-11-16T17:31:46.947000
|
||||||
@ -235579,7 +235580,7 @@ CVE-2023-49598,0,0,f21311a5870d33c6d00267bfb1edabf32c3f3d36935aaf458c13cbd552a1d
|
|||||||
CVE-2023-49599,0,0,26bc9ca331158350ffd55dbb3e19c0f5df4aa8eba07f3e59287b262d3f247262,2024-01-17T15:14:39.320000
|
CVE-2023-49599,0,0,26bc9ca331158350ffd55dbb3e19c0f5df4aa8eba07f3e59287b262d3f247262,2024-01-17T15:14:39.320000
|
||||||
CVE-2023-4960,0,0,ead2f6df7dc3ef62ad43e7bf5719f8fc950bb797ad00a312f90d4c48e90fdf03,2024-01-17T21:53:01.497000
|
CVE-2023-4960,0,0,ead2f6df7dc3ef62ad43e7bf5719f8fc950bb797ad00a312f90d4c48e90fdf03,2024-01-17T21:53:01.497000
|
||||||
CVE-2023-49602,0,0,b819540c46961cc462137affd730f87426ab2599914f382da5da66c46bfa6156,2024-03-04T13:58:23.447000
|
CVE-2023-49602,0,0,b819540c46961cc462137affd730f87426ab2599914f382da5da66c46bfa6156,2024-03-04T13:58:23.447000
|
||||||
CVE-2023-49606,0,1,1bbbe78925df82daa0a7747ef300e8fad91e18c0e2441aac076db8d5c2fb1bac,2024-05-07T12:15:09.413000
|
CVE-2023-49606,0,0,1bbbe78925df82daa0a7747ef300e8fad91e18c0e2441aac076db8d5c2fb1bac,2024-05-07T12:15:09.413000
|
||||||
CVE-2023-49607,0,0,5d00c2f24c1ef5120519e52e04520fca38cec096180912776c98c9538a20ba71,2023-12-14T18:29:44.217000
|
CVE-2023-49607,0,0,5d00c2f24c1ef5120519e52e04520fca38cec096180912776c98c9538a20ba71,2023-12-14T18:29:44.217000
|
||||||
CVE-2023-49609,0,0,cfadb254c8ff32da8dcb4f73efed6c3b90ecd1a350b850cb898b392245d841db,2024-02-14T18:15:46.380000
|
CVE-2023-49609,0,0,cfadb254c8ff32da8dcb4f73efed6c3b90ecd1a350b850cb898b392245d841db,2024-02-14T18:15:46.380000
|
||||||
CVE-2023-4961,0,0,e4aa63ee50fe794744abd71721cecf1e73ef1f06e678ada5c85e909d11885a1b,2023-11-07T04:23:13.490000
|
CVE-2023-4961,0,0,e4aa63ee50fe794744abd71721cecf1e73ef1f06e678ada5c85e909d11885a1b,2023-11-07T04:23:13.490000
|
||||||
@ -238900,7 +238901,7 @@ CVE-2023-6806,0,0,f3b4a07dd94526f1cc5727f439cb459ecde0c71dc1006bd9e80e6b18a8d9a2
|
|||||||
CVE-2023-6807,0,0,8211ca38107dc4f9b4127c6352451c7045672cf7336c16fcb14315bbd9ab0669,2024-02-27T14:21:27.377000
|
CVE-2023-6807,0,0,8211ca38107dc4f9b4127c6352451c7045672cf7336c16fcb14315bbd9ab0669,2024-02-27T14:21:27.377000
|
||||||
CVE-2023-6808,0,0,453d7720ba5e9cbfc061121430ec5679037ea2f22b990571ad72c0ac48f6ec8b,2024-02-09T16:49:29.023000
|
CVE-2023-6808,0,0,453d7720ba5e9cbfc061121430ec5679037ea2f22b990571ad72c0ac48f6ec8b,2024-02-09T16:49:29.023000
|
||||||
CVE-2023-6809,0,0,da849ebc66bf4be9594f5a16c6489da06b73ea4d1114ad0ea42cbcbd1d55570a,2024-03-13T18:16:18.563000
|
CVE-2023-6809,0,0,da849ebc66bf4be9594f5a16c6489da06b73ea4d1114ad0ea42cbcbd1d55570a,2024-03-13T18:16:18.563000
|
||||||
CVE-2023-6810,0,1,c090f1bb536ad3b998163ef63cf46799e4b462d3281e6ed3c4c6820fa5bdbeeb,2024-05-07T13:39:32.710000
|
CVE-2023-6810,0,1,3101b378ed04a5c8247ef1debed918ebc9eb8103dd1b234528b91dafd5921a75,2024-05-07T13:39:32.710000
|
||||||
CVE-2023-6811,0,0,0ae434dca3175548a9ca9dc42c6f8d10f94870a185713460da5dc58ca1a03a92,2024-04-11T12:47:44.137000
|
CVE-2023-6811,0,0,0ae434dca3175548a9ca9dc42c6f8d10f94870a185713460da5dc58ca1a03a92,2024-04-11T12:47:44.137000
|
||||||
CVE-2023-6814,0,0,f914980738323f0d89710adfa1af6d51adf8e3bc868f5019d57b30c5b4448cc4,2024-04-16T03:15:06.230000
|
CVE-2023-6814,0,0,f914980738323f0d89710adfa1af6d51adf8e3bc868f5019d57b30c5b4448cc4,2024-04-16T03:15:06.230000
|
||||||
CVE-2023-6815,0,0,2907a8b4ff24102c477c46109fb1fabfce42d3c6fd03f18fcb9bbd39f14ee3a0,2024-02-14T04:15:08.497000
|
CVE-2023-6815,0,0,2907a8b4ff24102c477c46109fb1fabfce42d3c6fd03f18fcb9bbd39f14ee3a0,2024-02-14T04:15:08.497000
|
||||||
@ -239269,7 +239270,7 @@ CVE-2023-7235,0,0,5a57373c824e0c960ebb1d7ed373397d379b4a945d30165f19c755e196b873
|
|||||||
CVE-2023-7236,0,0,6e6e77097018fc5492b471c7ac49370efcc2a5846a727fd6ec447da2257b6339,2024-03-18T19:40:00.173000
|
CVE-2023-7236,0,0,6e6e77097018fc5492b471c7ac49370efcc2a5846a727fd6ec447da2257b6339,2024-03-18T19:40:00.173000
|
||||||
CVE-2023-7237,0,0,2cb3706433adcf4b4550bf0863cb95155cc1f865add3f6a25d68233a7696874d,2024-04-11T01:23:42.717000
|
CVE-2023-7237,0,0,2cb3706433adcf4b4550bf0863cb95155cc1f865add3f6a25d68233a7696874d,2024-04-11T01:23:42.717000
|
||||||
CVE-2023-7238,0,0,7187ce9bc4d8ddad00e06886245b2e662c42772077283e0d271ebcd7974e5802,2024-01-30T14:20:10.613000
|
CVE-2023-7238,0,0,7187ce9bc4d8ddad00e06886245b2e662c42772077283e0d271ebcd7974e5802,2024-01-30T14:20:10.613000
|
||||||
CVE-2023-7240,1,1,e7e6a81ccc38559f4df6ee13c1a40f9a16c45fc917ce13635c64737e9592babb,2024-05-07T13:39:32.710000
|
CVE-2023-7240,0,1,c8028c5f2283c3d1834fed408ed706bec776a0edaef60da9c34b705dd8ae213f,2024-05-07T13:39:32.710000
|
||||||
CVE-2023-7241,0,0,d4fceec5a7fe5473cc271cfc706947ffdb49bbdf96c33423e2911d3a96606af8,2024-05-01T19:50:25.633000
|
CVE-2023-7241,0,0,d4fceec5a7fe5473cc271cfc706947ffdb49bbdf96c33423e2911d3a96606af8,2024-05-01T19:50:25.633000
|
||||||
CVE-2023-7242,0,0,db2d6d5cc91868613ca46292b47ef3b5a3c4ae96f4def2aa8c9c1271db71c444,2024-03-07T17:50:48.090000
|
CVE-2023-7242,0,0,db2d6d5cc91868613ca46292b47ef3b5a3c4ae96f4def2aa8c9c1271db71c444,2024-03-07T17:50:48.090000
|
||||||
CVE-2023-7243,0,0,c43192a066d4b9535821b574845a0af87800cbe78fe61a46f4663ee5807e93c6,2024-03-07T17:51:08.413000
|
CVE-2023-7243,0,0,c43192a066d4b9535821b574845a0af87800cbe78fe61a46f4663ee5807e93c6,2024-03-07T17:51:08.413000
|
||||||
@ -240664,7 +240665,7 @@ CVE-2024-1688,0,0,00b4663231fd4363af58c5c1074d228a7c964744d2f38e0ca153752afc0e62
|
|||||||
CVE-2024-1690,0,0,f64df43faf81ef2a8a790a9c7a5603e22ee6007009a611d7b1688df810896620,2024-03-13T18:15:58.530000
|
CVE-2024-1690,0,0,f64df43faf81ef2a8a790a9c7a5603e22ee6007009a611d7b1688df810896620,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-1691,0,0,f122d989b2d57485de350b354a899ca74c01df04d45a49a682097dfa29b4d980,2024-03-13T18:15:58.530000
|
CVE-2024-1691,0,0,f122d989b2d57485de350b354a899ca74c01df04d45a49a682097dfa29b4d980,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-1692,0,0,ef8c2f206aee0606f4bca6d6f966b02bdbb84047340b5cc369611d2c6473005f,2024-04-01T01:12:59.077000
|
CVE-2024-1692,0,0,ef8c2f206aee0606f4bca6d6f966b02bdbb84047340b5cc369611d2c6473005f,2024-04-01T01:12:59.077000
|
||||||
CVE-2024-1695,0,1,7fe18c9cbac30241384ca3bf0665e46f72ea6ee4e4c64dee52dbbf5f058010dc,2024-05-07T13:39:32.710000
|
CVE-2024-1695,0,0,7fe18c9cbac30241384ca3bf0665e46f72ea6ee4e4c64dee52dbbf5f058010dc,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-1696,0,0,99a90d5f5f3ed72de58d46078f56367f3c20ea4ece7ee2f1509d303d1823a04c,2024-03-12T12:40:13.500000
|
CVE-2024-1696,0,0,99a90d5f5f3ed72de58d46078f56367f3c20ea4ece7ee2f1509d303d1823a04c,2024-03-12T12:40:13.500000
|
||||||
CVE-2024-1697,0,0,f12238fd2cf039d39a224b6767f588eae71af5d9fa3c34248b412c33612f7c95,2024-03-25T01:51:01.223000
|
CVE-2024-1697,0,0,f12238fd2cf039d39a224b6767f588eae71af5d9fa3c34248b412c33612f7c95,2024-03-25T01:51:01.223000
|
||||||
CVE-2024-1698,0,0,75dca8418f9d56ec0cfe8b6a5fe8dbac72155e2590b7f1e80f716b71405b9b9b,2024-02-27T14:20:06.637000
|
CVE-2024-1698,0,0,75dca8418f9d56ec0cfe8b6a5fe8dbac72155e2590b7f1e80f716b71405b9b9b,2024-02-27T14:20:06.637000
|
||||||
@ -241250,7 +241251,7 @@ CVE-2024-20818,0,0,af19f7cf2bfe5c7b118ed1ba8cb5ab4e5101b649035ef6947f4838f591d6b
|
|||||||
CVE-2024-20819,0,0,e95f6d9489be9463c30426796663bf903448c130b6751dbc9c1955025823a39a,2024-03-12T13:15:49.597000
|
CVE-2024-20819,0,0,e95f6d9489be9463c30426796663bf903448c130b6751dbc9c1955025823a39a,2024-03-12T13:15:49.597000
|
||||||
CVE-2024-2082,0,0,1da00d13c70c67cbac7f285f62e1e9ae31630ddedf1c25e28ac44a84c5c65c37,2024-05-02T18:00:37.360000
|
CVE-2024-2082,0,0,1da00d13c70c67cbac7f285f62e1e9ae31630ddedf1c25e28ac44a84c5c65c37,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-20820,0,0,64165a1c6841919f66314f55bda16e2960850deaf1751bd280429c34ada3d646,2024-04-02T01:15:51.440000
|
CVE-2024-20820,0,0,64165a1c6841919f66314f55bda16e2960850deaf1751bd280429c34ada3d646,2024-04-02T01:15:51.440000
|
||||||
CVE-2024-20821,0,1,2ae8c4f8f0cfa0bb9c4156f0b17d6659b61733c8e3940f63e2394fcef42f8157,2024-05-07T13:39:32.710000
|
CVE-2024-20821,0,1,f2bdec76bf7af89f73cf2d8b75af153eab2536cb0fce6c013ae4b2545950f996,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-20822,0,0,98819c10bc4ccb26ad7071c41bcb0ec9515bc16477a819737e98a30f68f61abb,2024-02-09T17:30:17.653000
|
CVE-2024-20822,0,0,98819c10bc4ccb26ad7071c41bcb0ec9515bc16477a819737e98a30f68f61abb,2024-02-09T17:30:17.653000
|
||||||
CVE-2024-20823,0,0,6f9e92713ae3566f4ff641bdca0209f8f9dd0eb39f9e9ca31277f9552beefba5,2024-02-09T17:30:06.773000
|
CVE-2024-20823,0,0,6f9e92713ae3566f4ff641bdca0209f8f9dd0eb39f9e9ca31277f9552beefba5,2024-02-09T17:30:06.773000
|
||||||
CVE-2024-20824,0,0,e999a6032be9250359143914aa49fcd31e6ac7c99ceb57a4324f9e75baeb901d,2024-02-09T17:31:03.593000
|
CVE-2024-20824,0,0,e999a6032be9250359143914aa49fcd31e6ac7c99ceb57a4324f9e75baeb901d,2024-02-09T17:31:03.593000
|
||||||
@ -241287,25 +241288,25 @@ CVE-2024-20851,0,0,297204ff3342a0021fed72f789d061868b3c384706199689d6e8354fbcf49
|
|||||||
CVE-2024-20852,0,0,dbe0d512055041a9852263beae871d6f46b7f7bc092fee634563eb7a16f7bbd3,2024-04-02T12:50:42.233000
|
CVE-2024-20852,0,0,dbe0d512055041a9852263beae871d6f46b7f7bc092fee634563eb7a16f7bbd3,2024-04-02T12:50:42.233000
|
||||||
CVE-2024-20853,0,0,21647721741a24bcef92dd57781f3a2cba514b2f44535681c89171caa34d7468,2024-04-02T12:50:42.233000
|
CVE-2024-20853,0,0,21647721741a24bcef92dd57781f3a2cba514b2f44535681c89171caa34d7468,2024-04-02T12:50:42.233000
|
||||||
CVE-2024-20854,0,0,a8ee7f368d46d792404f5081c6231f71ce96557f0887c2cbc687cba899ce3bce,2024-04-02T12:50:42.233000
|
CVE-2024-20854,0,0,a8ee7f368d46d792404f5081c6231f71ce96557f0887c2cbc687cba899ce3bce,2024-04-02T12:50:42.233000
|
||||||
CVE-2024-20855,0,1,abf7dd3244cf280e0e7bd1fb2c41ce076f26335ba98783ca945ed54adf8c5291,2024-05-07T13:39:32.710000
|
CVE-2024-20855,0,1,5a31d8261ac9fb93e3fbd9d059170791e8715d725754bcfb29b0adc00d13410e,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-20856,0,1,5a27b269d9d70e31351e7ae3bcd319b86c0f2ee81fab615abbd0775ca5595ae7,2024-05-07T13:39:32.710000
|
CVE-2024-20856,0,1,1c592c9e4d319305b2170b4872282564ba94b291068e185ac30629ca62d7d510,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-20857,0,1,24b9af38bffa656d1bca3a5b963a1b783d3129cf757129280fa7f22261ea66d3,2024-05-07T13:39:32.710000
|
CVE-2024-20857,0,1,4bf646193b847c650d0fd5cc8042165e642140e87639a78791056f42e042659d,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-20858,0,1,215b81ffe37f966bf0e10599b0f862bdec13da0572f4d0a7c2b1faf45d853ed0,2024-05-07T13:39:32.710000
|
CVE-2024-20858,0,1,365ded7c9719d06412d3536df096076e93235858bcda7feae2a0b0302afff1b3,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-20859,0,1,bc3a7ead23bf12249caf07a1bc99ac89a9bc8a458fb28efdb40de0520fdcc9ea,2024-05-07T13:39:32.710000
|
CVE-2024-20859,0,1,faa73fa4e0e021bacabbe322b4cc2aef17f24bb376d16ca5cb2baec65e4d0977,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-2086,0,0,593e47a6623f413790b465bc3b99a950a75ce5580beddc3dd255ab6599671f6d,2024-04-01T01:12:59.077000
|
CVE-2024-2086,0,0,593e47a6623f413790b465bc3b99a950a75ce5580beddc3dd255ab6599671f6d,2024-04-01T01:12:59.077000
|
||||||
CVE-2024-20860,0,1,212d6a3b6e2276206ded4b627b73366319e6a63dc0bb56005aa75e931d216374,2024-05-07T13:39:32.710000
|
CVE-2024-20860,0,1,833d0df937164a52b771b2f7c02b69469462d810f4481b6476ba29c5f6e981cb,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-20861,0,1,5c8d925653de5f24c278b71f10a7782291fdfbfa2f698e6ed4fbc3956b72b55f,2024-05-07T13:39:32.710000
|
CVE-2024-20861,0,1,794576e650b0f3309f10dc4ffd901d857a354f8ba5cee5cf4cd98ea3135ca365,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-20862,0,1,344d145ee115dedf9bb4d6ec73fa6db81ce042163637414e3fe17be8ffae817f,2024-05-07T13:39:32.710000
|
CVE-2024-20862,0,1,05d7570db3a1cde070e21472d5fd69b5830764f3a5425aca7a4a496d4095af5b,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-20863,0,1,f4f3ddc37c315344512ad957df85f40e1d3de2caf8e15b75b22f294fffc0036e,2024-05-07T13:39:32.710000
|
CVE-2024-20863,0,1,dab3717abd5b9267afb4abcddb5b1b579970bcadda744aaacf88dda6202baf58,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-20864,0,1,c0c6eb5747571dddc4affa3508e0d83b74fe8d29b92bda12c6f2a13da8905203,2024-05-07T13:39:32.710000
|
CVE-2024-20864,0,1,efa6fa2b23ca50b4cd485f4853889cb39291f2ae822fa96cda394c5298a1d7d0,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-20865,0,1,0b4e33abf6a914cbe0870270ca92ad4abd3a0e74ab09e59640fc91fe066cca04,2024-05-07T13:39:32.710000
|
CVE-2024-20865,0,1,b88b18d01269cecb6d4e01795ba44f2e59ecd8836bad073817623026acbd57c6,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-20866,0,1,a8fd4a1fcbd4782df59e8b61a84a3d55e13ce68d38e2b0f99f31affdb3acc9e7,2024-05-07T13:39:32.710000
|
CVE-2024-20866,0,1,58d3db3c436cd4edcfbee612570f2e77cc32989fe5de8d87bea6a0e56551a1d4,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-20867,0,1,cd705404a9812e0f73aa3ce26c5e30f498818bcbc2fed3b547aa4721a6b70b78,2024-05-07T13:39:32.710000
|
CVE-2024-20867,0,1,0e6b5e18a9f86247a6a1090b01cf596581daded4155bfbc09972d6cdc5714d2a,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-20868,0,1,69246330a7bdba6be53f72a296a7111b7e50f14804cddee20f8801b074c3947a,2024-05-07T13:39:32.710000
|
CVE-2024-20868,0,1,23d1ca1dba7a2ad9810a7b603f4dc59801094aa235b5516b22a3aa3c056e5066,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-20869,0,1,bdbe1b6ea61ede5aba43b9a63e966809633cc70df6dfa05beb38e28c36d28e40,2024-05-07T13:39:32.710000
|
CVE-2024-20869,0,1,205bcfae207f01cfe9e76e25dfb8358434940d02212d78ea178f2e739e243546,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-20870,0,1,c2bfc61cca6463242d8ada003b148362bf8b972a364195dff6605d51676909cc,2024-05-07T13:39:32.710000
|
CVE-2024-20870,0,1,247de2e7cb6c1589f56f1a1780b91fbe4feee02648b4f01650496931882d0b24,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-20871,0,1,01640e6055c127167e1bec157d1b484d5b01023057aae49c178af50b06ea3a52,2024-05-07T13:39:32.710000
|
CVE-2024-20871,0,1,4b5019addc2549a143f67a36860f5a0576db2a31268cf1be920df7487aeaeae8,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-20872,0,1,75ff1ce26d44926e8add13daefc47dd59f4cd8ff23559d81da24f383db836c64,2024-05-07T13:39:32.710000
|
CVE-2024-20872,0,1,f057840a1e0e70ef07c9af92e3c53b5e58e8fd31ea1c15cdb3fe23cd840da357,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-20903,0,0,c3900fb8b8bb00a3ce86bfd5ca527fde9099622f71073bff3bcad70680bf3f2d,2024-02-20T19:51:05.510000
|
CVE-2024-20903,0,0,c3900fb8b8bb00a3ce86bfd5ca527fde9099622f71073bff3bcad70680bf3f2d,2024-02-20T19:51:05.510000
|
||||||
CVE-2024-20904,0,0,75011684a257ea742330251f679f71917299c125d35b4c6d39df6fddd4b69f37,2024-01-20T18:42:09.760000
|
CVE-2024-20904,0,0,75011684a257ea742330251f679f71917299c125d35b4c6d39df6fddd4b69f37,2024-01-20T18:42:09.760000
|
||||||
CVE-2024-20905,0,0,9331a8e493544ea842bda306a367f01093664d68b881f6092eb05338afffb388,2024-02-20T19:51:05.510000
|
CVE-2024-20905,0,0,9331a8e493544ea842bda306a367f01093664d68b881f6092eb05338afffb388,2024-02-20T19:51:05.510000
|
||||||
@ -242289,7 +242290,7 @@ CVE-2024-22459,0,0,080f34b8e7c0260f0594dad3190a87f1b9dc1d3f20b007347a68c39e9679b
|
|||||||
CVE-2024-22463,0,0,e06d0fc84faf19f9d1987e144eee2bee02d608165b7a56c96c529a1ee137e834,2024-03-04T15:35:25.673000
|
CVE-2024-22463,0,0,e06d0fc84faf19f9d1987e144eee2bee02d608165b7a56c96c529a1ee137e834,2024-03-04T15:35:25.673000
|
||||||
CVE-2024-22464,0,0,890f63b91e1207e51dc2d0fc686f763deb067d6410c523bfc64d52071d75be15,2024-02-15T05:03:27.617000
|
CVE-2024-22464,0,0,890f63b91e1207e51dc2d0fc686f763deb067d6410c523bfc64d52071d75be15,2024-02-15T05:03:27.617000
|
||||||
CVE-2024-2247,0,0,d47546a6b73ddee0cb6fd88f3ec9a57023bd3004d425b99bc080c7d9ccfa2e42,2024-03-14T10:15:07.027000
|
CVE-2024-2247,0,0,d47546a6b73ddee0cb6fd88f3ec9a57023bd3004d425b99bc080c7d9ccfa2e42,2024-03-14T10:15:07.027000
|
||||||
CVE-2024-22472,0,1,b89a95f2a1a16438186a46e67a4c65c3f9f2396af8e1dfc32977d99e3e11e6a2,2024-05-07T13:39:32.710000
|
CVE-2024-22472,0,1,4ab7182b892f9b0334d117f1f559304c9baa050ae6c095fdd3688919803d9fc3,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-22473,0,0,ba695bcad0bbe2cba422f3053697429916506f0f0ce55f150fe9af4a818e1f6b,2024-02-22T19:07:27.197000
|
CVE-2024-22473,0,0,ba695bcad0bbe2cba422f3053697429916506f0f0ce55f150fe9af4a818e1f6b,2024-02-22T19:07:27.197000
|
||||||
CVE-2024-22475,0,0,0731764c36503d08ce16e32f1988cf42ad9d113053cd70f3c3f861f6ae04ccf2,2024-03-18T12:38:25.490000
|
CVE-2024-22475,0,0,0731764c36503d08ce16e32f1988cf42ad9d113053cd70f3c3f861f6ae04ccf2,2024-03-18T12:38:25.490000
|
||||||
CVE-2024-2249,0,0,f298ad136cb14c6033692740767f3b439e3f51f5d5979e590804f3d1c2c5ae5e,2024-03-15T12:53:06.423000
|
CVE-2024-2249,0,0,f298ad136cb14c6033692740767f3b439e3f51f5d5979e590804f3d1c2c5ae5e,2024-03-15T12:53:06.423000
|
||||||
@ -242961,7 +242962,7 @@ CVE-2024-23804,0,0,aaddc8b077c906317cfa8e521b86ad623b3f3e2ab478a4e0f77aaba9dfb60
|
|||||||
CVE-2024-23805,0,0,1d90a5040b1edecdd83d7e40e4948dc26b952fad0f84f463a88867b10bbf10ff,2024-02-14T18:04:45.380000
|
CVE-2024-23805,0,0,1d90a5040b1edecdd83d7e40e4948dc26b952fad0f84f463a88867b10bbf10ff,2024-02-14T18:04:45.380000
|
||||||
CVE-2024-23806,0,0,3c7dd05f0d84cb4b37bdcdbac4571706a903d21147ebee955315287ef797b6ba,2024-02-15T05:01:56.693000
|
CVE-2024-23806,0,0,3c7dd05f0d84cb4b37bdcdbac4571706a903d21147ebee955315287ef797b6ba,2024-02-15T05:01:56.693000
|
||||||
CVE-2024-23807,0,0,df12edcc395b0843ea97d6f3fbf434aff9cef06784aae4873fcae58a24a3d141,2024-02-29T13:49:29.390000
|
CVE-2024-23807,0,0,df12edcc395b0843ea97d6f3fbf434aff9cef06784aae4873fcae58a24a3d141,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-23808,0,1,e4ea908a673bd7a1aaa55e1b7fadca453eb09780caef5bff8365109f98095956,2024-05-07T13:39:32.710000
|
CVE-2024-23808,0,1,5be188e2ed229b6d1c42bb6f499af717d633f551dde12260911eb0c8cbdc2703,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-23809,0,0,e4465b9152c477fa0b8b9ba353cffba5c3ae3843ad0f849fa715a6b77d4c4ae7,2024-04-02T15:15:53.217000
|
CVE-2024-23809,0,0,e4465b9152c477fa0b8b9ba353cffba5c3ae3843ad0f849fa715a6b77d4c4ae7,2024-04-02T15:15:53.217000
|
||||||
CVE-2024-23810,0,0,fcc523095813c9aa174bae9d5d18aa598f3c0429a0b756712e53ba2ee896842a,2024-02-13T14:01:00.987000
|
CVE-2024-23810,0,0,fcc523095813c9aa174bae9d5d18aa598f3c0429a0b756712e53ba2ee896842a,2024-02-13T14:01:00.987000
|
||||||
CVE-2024-23811,0,0,626bc7786e498ad37af14e3917801ad7d39c61c22419a48d031d889eeb5a7ea3,2024-02-13T14:01:00.987000
|
CVE-2024-23811,0,0,626bc7786e498ad37af14e3917801ad7d39c61c22419a48d031d889eeb5a7ea3,2024-02-13T14:01:00.987000
|
||||||
@ -245063,7 +245064,7 @@ CVE-2024-27211,0,0,18a4fb425205868a4eaec308d0eef6e2f3454a5b2c2908d8b6e292778bde1
|
|||||||
CVE-2024-27212,0,0,8b542e0613f1e0f6bcd156d0337a4f6e89ee1dcb82ff0694045f78e4a68c7c58,2024-03-15T20:15:08.910000
|
CVE-2024-27212,0,0,8b542e0613f1e0f6bcd156d0337a4f6e89ee1dcb82ff0694045f78e4a68c7c58,2024-03-15T20:15:08.910000
|
||||||
CVE-2024-27213,0,0,33892e4d94d0b54e6d4249626fe053cc0b69e36c215b31fa7aad394b0392111e,2024-03-12T12:40:13.500000
|
CVE-2024-27213,0,0,33892e4d94d0b54e6d4249626fe053cc0b69e36c215b31fa7aad394b0392111e,2024-03-12T12:40:13.500000
|
||||||
CVE-2024-27215,0,0,651ced2c4948681508a9ad090546fd018840608eea0c7482bdd7848315ac417f,2024-02-21T18:15:52.060000
|
CVE-2024-27215,0,0,651ced2c4948681508a9ad090546fd018840608eea0c7482bdd7848315ac417f,2024-02-21T18:15:52.060000
|
||||||
CVE-2024-27217,0,1,9affc301c0d73f5b5d352af55d1168545c757168fab77b2151f5cfb89c453b78,2024-05-07T13:39:32.710000
|
CVE-2024-27217,0,1,25a1fc7fabcc75fc807bf6a5db3f5c89cc55eb85ba089fca9a9406f8ad59992a,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-27218,0,0,c7e909155330ee918ef1bfc60d0a60842268f5244100d74ebd3f7830cb6dafd2,2024-03-15T20:15:08.960000
|
CVE-2024-27218,0,0,c7e909155330ee918ef1bfc60d0a60842268f5244100d74ebd3f7830cb6dafd2,2024-03-15T20:15:08.960000
|
||||||
CVE-2024-27219,0,0,7a0a76842ad14d87eee010cdcc49f2a5889b1688d4e2b22f53088926c2436c2a,2024-03-12T12:40:13.500000
|
CVE-2024-27219,0,0,7a0a76842ad14d87eee010cdcc49f2a5889b1688d4e2b22f53088926c2436c2a,2024-03-12T12:40:13.500000
|
||||||
CVE-2024-2722,0,0,4472c421148aed40b9ad9d2bd6309a877d23ad4a39ab06bc594f81babbe2f7cf,2024-03-22T15:34:43.663000
|
CVE-2024-2722,0,0,4472c421148aed40b9ad9d2bd6309a877d23ad4a39ab06bc594f81babbe2f7cf,2024-03-22T15:34:43.663000
|
||||||
@ -245510,6 +245511,7 @@ CVE-2024-2813,0,0,3865aecff2b91b62589698cb7c5e00900ba25735c720a1f987c1446276b2b6
|
|||||||
CVE-2024-28130,0,0,cbec5f7662fe045bb02cd420ce819fd5bf0b6932c239a81cf021f71390340ca7,2024-04-24T13:39:42.883000
|
CVE-2024-28130,0,0,cbec5f7662fe045bb02cd420ce819fd5bf0b6932c239a81cf021f71390340ca7,2024-04-24T13:39:42.883000
|
||||||
CVE-2024-28131,0,0,71ad2488de19c24d1ea9f5cf9bb09689eb95070aa628709b8cf1a59fb2b5934d,2024-03-26T12:55:05.010000
|
CVE-2024-28131,0,0,71ad2488de19c24d1ea9f5cf9bb09689eb95070aa628709b8cf1a59fb2b5934d,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-2814,0,0,5e97abae59e20490512eaa4d4563fb81e8669546976139cfba889d604f681692,2024-04-11T01:25:37.477000
|
CVE-2024-2814,0,0,5e97abae59e20490512eaa4d4563fb81e8669546976139cfba889d604f681692,2024-04-11T01:25:37.477000
|
||||||
|
CVE-2024-28148,1,1,1f334143a01e00b749c0f15afa7ad62f70f5fd441fdc9b18d597dd91077a344c,2024-05-07T14:15:10.103000
|
||||||
CVE-2024-28149,0,0,41104aad52a41f735bff830317158bdc9ba92207034c216d3619939dc1f50d3c,2024-05-01T18:15:16.697000
|
CVE-2024-28149,0,0,41104aad52a41f735bff830317158bdc9ba92207034c216d3619939dc1f50d3c,2024-05-01T18:15:16.697000
|
||||||
CVE-2024-2815,0,0,5fcd9bcf87c81d43d417a572f612813115fb87bda28605b295db5da996c4b852,2024-04-11T01:25:37.570000
|
CVE-2024-2815,0,0,5fcd9bcf87c81d43d417a572f612813115fb87bda28605b295db5da996c4b852,2024-04-11T01:25:37.570000
|
||||||
CVE-2024-28150,0,0,8f73eeb6d8dfd3e2b21f5672a6d045b793eb4817035deb2939de0c9c1177c467,2024-05-01T18:15:16.747000
|
CVE-2024-28150,0,0,8f73eeb6d8dfd3e2b21f5672a6d045b793eb4817035deb2939de0c9c1177c467,2024-05-01T18:15:16.747000
|
||||||
@ -245776,7 +245778,7 @@ CVE-2024-28716,0,0,233ac8d363ac194959e51b7b6e78a16c94cfcf615e05cc4cca6cee73b40ed
|
|||||||
CVE-2024-28717,0,0,f3e85174e10e6b2a875251d258bba0061735240c3fbf9f5c26ab3fb13ae8132b,2024-04-22T13:28:34.007000
|
CVE-2024-28717,0,0,f3e85174e10e6b2a875251d258bba0061735240c3fbf9f5c26ab3fb13ae8132b,2024-04-22T13:28:34.007000
|
||||||
CVE-2024-28718,0,0,5f0a839ac4250fecd45af64be191fc810afd4c63b89d4fc0f63a8d6841ad970e,2024-04-15T13:15:51.577000
|
CVE-2024-28718,0,0,5f0a839ac4250fecd45af64be191fc810afd4c63b89d4fc0f63a8d6841ad970e,2024-04-15T13:15:51.577000
|
||||||
CVE-2024-28722,0,0,9f3d9610dcb3a88962a775c4bceb1adf34898d2ad0bcbbf8f024b9f550b378b8,2024-04-22T13:28:43.747000
|
CVE-2024-28722,0,0,9f3d9610dcb3a88962a775c4bceb1adf34898d2ad0bcbbf8f024b9f550b378b8,2024-04-22T13:28:43.747000
|
||||||
CVE-2024-28725,0,1,5d6528e8744d76688217494d6011ccce2f402c87e1721e307b2ae6f6dd89ec12,2024-05-07T13:39:32.710000
|
CVE-2024-28725,0,0,5d6528e8744d76688217494d6011ccce2f402c87e1721e307b2ae6f6dd89ec12,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-2873,0,0,38b44d61d3230fcaba1c551f8073fe8dda4eadd0cd50d8705b668e3c4529f628,2024-03-26T12:55:05.010000
|
CVE-2024-2873,0,0,38b44d61d3230fcaba1c551f8073fe8dda4eadd0cd50d8705b668e3c4529f628,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-28732,0,0,ec5e6c9882e97cf45b4c95c1c5ffa7b0d32a1a92ed89d346b2a432d5adcd9a14,2024-04-08T18:48:40.217000
|
CVE-2024-28732,0,0,ec5e6c9882e97cf45b4c95c1c5ffa7b0d32a1a92ed89d346b2a432d5adcd9a14,2024-04-08T18:48:40.217000
|
||||||
CVE-2024-28734,0,0,ab89139fe8499f37581a857758b5dd911586d271cde02f4e4d8e7c034753a72e,2024-04-25T19:15:49.850000
|
CVE-2024-28734,0,0,ab89139fe8499f37581a857758b5dd911586d271cde02f4e4d8e7c034753a72e,2024-04-25T19:15:49.850000
|
||||||
@ -246012,7 +246014,7 @@ CVE-2024-29126,0,0,0b79b403693aaf9c7e5913e80ff094ac46679e95aebf4152f34d3ef9f7148
|
|||||||
CVE-2024-29127,0,0,e9f78e19445942ea45feb1efb6740d368decd0d9fd92fbb7f6217ca73bcee889,2024-03-19T14:31:27.883000
|
CVE-2024-29127,0,0,e9f78e19445942ea45feb1efb6740d368decd0d9fd92fbb7f6217ca73bcee889,2024-03-19T14:31:27.883000
|
||||||
CVE-2024-29128,0,0,d04b46dfc40328b876fdc916a43fa7604fa03f240de5b2e8b86271d20186b1ca,2024-03-19T14:31:27.883000
|
CVE-2024-29128,0,0,d04b46dfc40328b876fdc916a43fa7604fa03f240de5b2e8b86271d20186b1ca,2024-03-19T14:31:27.883000
|
||||||
CVE-2024-29129,0,0,a7c8734a1d99d99da881b37063436fc7d70f1e96d6183e82074470bef23a602e,2024-03-19T14:31:27.883000
|
CVE-2024-29129,0,0,a7c8734a1d99d99da881b37063436fc7d70f1e96d6183e82074470bef23a602e,2024-03-19T14:31:27.883000
|
||||||
CVE-2024-2913,0,1,11365a40ae478e4f27dc855796bfa3016510ca9ac036c5e9fc77bf6b3c451f0a,2024-05-07T13:39:32.710000
|
CVE-2024-2913,0,1,57384cfe83d625c12223f74456bcf5c1bb18f28b7413731c95c28c9d3fd49a41,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-29130,0,0,ce58c0744ffcb2d9cf875af96e8272ed1e3181995922f97c96a8939275c844b7,2024-03-19T14:31:27.883000
|
CVE-2024-29130,0,0,ce58c0744ffcb2d9cf875af96e8272ed1e3181995922f97c96a8939275c844b7,2024-03-19T14:31:27.883000
|
||||||
CVE-2024-29131,0,0,6dbc951f2aa0a9755b2bbdaa4d19905af93dd93bd4d25c017134d25c3898b424,2024-05-01T18:15:18.090000
|
CVE-2024-29131,0,0,6dbc951f2aa0a9755b2bbdaa4d19905af93dd93bd4d25c017134d25c3898b424,2024-05-01T18:15:18.090000
|
||||||
CVE-2024-29133,0,0,6d247a2a3b8929a01a554821f00c7bbb378a28b457c9c68818a91f35f629cc39,2024-05-01T17:15:31.283000
|
CVE-2024-29133,0,0,6d247a2a3b8929a01a554821f00c7bbb378a28b457c9c68818a91f35f629cc39,2024-05-01T17:15:31.283000
|
||||||
@ -246335,6 +246337,7 @@ CVE-2024-29883,0,0,2b273945f2fe373c1b813e8632fabdd32ad73b5047625c95bb74eb36bf061
|
|||||||
CVE-2024-29886,0,0,f5b2c9f6684cda9bf24c98d4026d908adcfed51ea0d73992d07eab4a69ba7ea0,2024-03-28T02:01:21.693000
|
CVE-2024-29886,0,0,f5b2c9f6684cda9bf24c98d4026d908adcfed51ea0d73992d07eab4a69ba7ea0,2024-03-28T02:01:21.693000
|
||||||
CVE-2024-29887,0,0,3c169b291bd201b76db21cdc6bc1993eb4e303abce042e0ed9996949f9bbc40e,2024-03-28T02:01:13.303000
|
CVE-2024-29887,0,0,3c169b291bd201b76db21cdc6bc1993eb4e303abce042e0ed9996949f9bbc40e,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-29888,0,0,5b6ba13db8aac1230b401585872523e19bc778561fe0a48fb1eb3f88b621dd8e,2024-03-28T02:01:13.303000
|
CVE-2024-29888,0,0,5b6ba13db8aac1230b401585872523e19bc778561fe0a48fb1eb3f88b621dd8e,2024-03-28T02:01:13.303000
|
||||||
|
CVE-2024-29889,1,1,def01bf097f489cbbbe47086e903f908086d9ad44741049218a625c235821727,2024-05-07T14:15:10.330000
|
||||||
CVE-2024-2989,0,0,985e790440accc4b745af83479155b6a6b46fe3ff8cf140b5b808b1078518e6c,2024-04-11T01:25:44.177000
|
CVE-2024-2989,0,0,985e790440accc4b745af83479155b6a6b46fe3ff8cf140b5b808b1078518e6c,2024-04-11T01:25:44.177000
|
||||||
CVE-2024-29890,0,0,323e289288096e79423f991b34b54769daba4b9ed11a0f9953eb686c77f03631,2024-04-01T01:12:59.077000
|
CVE-2024-29890,0,0,323e289288096e79423f991b34b54769daba4b9ed11a0f9953eb686c77f03631,2024-04-01T01:12:59.077000
|
||||||
CVE-2024-29891,0,0,e9e9eeda5be8e5bab460a9a5c404e594ba98dd74ce43f0bcc6e6f38c530b911d,2024-03-28T02:01:13.303000
|
CVE-2024-29891,0,0,e9e9eeda5be8e5bab460a9a5c404e594ba98dd74ce43f0bcc6e6f38c530b911d,2024-03-28T02:01:13.303000
|
||||||
@ -246386,7 +246389,7 @@ CVE-2024-29935,0,0,be0415ab39e2424d7707b3e026043937bddf40f9f881b75f312fe4db29a75
|
|||||||
CVE-2024-29936,0,0,a0aa951ea6a61ca1da8503010b43db132d71646708e0e57d95e11fe2a44ec10b,2024-03-27T12:29:30.307000
|
CVE-2024-29936,0,0,a0aa951ea6a61ca1da8503010b43db132d71646708e0e57d95e11fe2a44ec10b,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29937,0,0,cdd1fd1a57199ebd6cafb76fa77d6bf4c6b90236c50377042f461f6ac9babff6,2024-04-11T12:47:44.137000
|
CVE-2024-29937,0,0,cdd1fd1a57199ebd6cafb76fa77d6bf4c6b90236c50377042f461f6ac9babff6,2024-04-11T12:47:44.137000
|
||||||
CVE-2024-2994,0,0,de6c04df0e9f8de4e560093b2cf89202918172d57c506b82e636ef6cb9957d81,2024-04-11T01:25:44.640000
|
CVE-2024-2994,0,0,de6c04df0e9f8de4e560093b2cf89202918172d57c506b82e636ef6cb9957d81,2024-04-11T01:25:44.640000
|
||||||
CVE-2024-29941,0,1,6084f897c7cd075e0dfc987f459645d6f91da81f7dbae53a5872c0eeaace3ad0,2024-05-07T13:39:32.710000
|
CVE-2024-29941,0,1,c8366f83ecfc48c2afbbe69788063c4363da34d25498360032e4073eb86672a9,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-29943,0,0,7068f3aaca8e1e080468ea07f9763f838e8d9ceb1f502d8b2bb56d270ef56f2f,2024-05-01T18:15:18.933000
|
CVE-2024-29943,0,0,7068f3aaca8e1e080468ea07f9763f838e8d9ceb1f502d8b2bb56d270ef56f2f,2024-05-01T18:15:18.933000
|
||||||
CVE-2024-29944,0,0,59ef64fc7119589746b7ad82f7cc667d1e8ed3ea80b24b438153f375cffbb5e9,2024-05-01T18:15:18.987000
|
CVE-2024-29944,0,0,59ef64fc7119589746b7ad82f7cc667d1e8ed3ea80b24b438153f375cffbb5e9,2024-05-01T18:15:18.987000
|
||||||
CVE-2024-29945,0,0,216b7153a77839bedb4bb1c536945361a5963d79dfd22094fc46f227d0975c54,2024-04-10T01:15:18.693000
|
CVE-2024-29945,0,0,216b7153a77839bedb4bb1c536945361a5963d79dfd22094fc46f227d0975c54,2024-04-10T01:15:18.693000
|
||||||
@ -246933,7 +246936,7 @@ CVE-2024-30926,0,0,800c22b0daa9f7d2b9aeb1272151dd94a2cd3ce872169a6858767bbe8e780
|
|||||||
CVE-2024-30927,0,0,7f5fb9dbb74187186c12e2f8edd52380a2fe14d4923fe303fe1e826ee9046ff5,2024-04-19T13:10:25.637000
|
CVE-2024-30927,0,0,7f5fb9dbb74187186c12e2f8edd52380a2fe14d4923fe303fe1e826ee9046ff5,2024-04-19T13:10:25.637000
|
||||||
CVE-2024-30928,0,0,caf910b47d65799a57161146e34602829f47360642a8c8fe911c2d8ad140dddb,2024-04-19T13:10:25.637000
|
CVE-2024-30928,0,0,caf910b47d65799a57161146e34602829f47360642a8c8fe911c2d8ad140dddb,2024-04-19T13:10:25.637000
|
||||||
CVE-2024-30929,0,0,3a4b987ba39620a2fa553421d0680484415e43d1909ca51832f180e76c2d2d0f,2024-04-19T13:10:25.637000
|
CVE-2024-30929,0,0,3a4b987ba39620a2fa553421d0680484415e43d1909ca51832f180e76c2d2d0f,2024-04-19T13:10:25.637000
|
||||||
CVE-2024-3093,0,1,88e99931e3bb45e3b00bfc123293a0bff2319b704247b4d251e357b27062aff3,2024-05-07T13:15:48.260000
|
CVE-2024-3093,0,0,88e99931e3bb45e3b00bfc123293a0bff2319b704247b4d251e357b27062aff3,2024-05-07T13:15:48.260000
|
||||||
CVE-2024-30938,0,0,bb3c87898373ca38f4e6504fd7f34baf274fe16334abf7626317b091c9072986,2024-04-19T13:10:25.637000
|
CVE-2024-30938,0,0,bb3c87898373ca38f4e6504fd7f34baf274fe16334abf7626317b091c9072986,2024-04-19T13:10:25.637000
|
||||||
CVE-2024-30939,0,0,2c9741729607a2e80601d31a316dfe5a77e488a194c61c09d029bf2778d383d7,2024-04-26T12:58:17.720000
|
CVE-2024-30939,0,0,2c9741729607a2e80601d31a316dfe5a77e488a194c61c09d029bf2778d383d7,2024-04-26T12:58:17.720000
|
||||||
CVE-2024-3094,0,0,8ed23f1232ed36fe384d7a52f468b21b74026ccef3e50e7fa1460af68654fd3b,2024-05-01T19:15:27.340000
|
CVE-2024-3094,0,0,8ed23f1232ed36fe384d7a52f468b21b74026ccef3e50e7fa1460af68654fd3b,2024-05-01T19:15:27.340000
|
||||||
@ -246945,7 +246948,7 @@ CVE-2024-30953,0,0,b6048a3223dd71969afb665512f3c96be52d96e721358fb67ff9cf9a8128e
|
|||||||
CVE-2024-3096,0,0,13c78a6e73aead16232dc164a15de56938b00baab3c6940a2000c803dd2e4bee,2024-05-01T17:15:37.723000
|
CVE-2024-3096,0,0,13c78a6e73aead16232dc164a15de56938b00baab3c6940a2000c803dd2e4bee,2024-05-01T17:15:37.723000
|
||||||
CVE-2024-30965,0,0,0e44dd5d951a25ac3e8873a32678a3145da47d1060cb5312576a9c0471b643ad,2024-04-02T18:12:16.283000
|
CVE-2024-30965,0,0,0e44dd5d951a25ac3e8873a32678a3145da47d1060cb5312576a9c0471b643ad,2024-04-02T18:12:16.283000
|
||||||
CVE-2024-3097,0,0,34b222095b4c58e8686826c73c47f391fd247710053df9aaf322e019da7a6c42,2024-04-26T15:56:40.820000
|
CVE-2024-3097,0,0,34b222095b4c58e8686826c73c47f391fd247710053df9aaf322e019da7a6c42,2024-04-26T15:56:40.820000
|
||||||
CVE-2024-30973,0,1,86223a603c66c29c271be7b4b8c9e7a80922cbcc5a85e7a1487a497e11c0be84,2024-05-07T13:39:32.710000
|
CVE-2024-30973,0,1,60d233d75a25952277335789c679aa444f3525d6e5b6af0f3b5901b26ae4a555,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-30974,0,0,fad1ff421513e997a755a646f437b1cf2946e8e72ed4701dccf29e92d3c1baae,2024-04-22T13:28:50.310000
|
CVE-2024-30974,0,0,fad1ff421513e997a755a646f437b1cf2946e8e72ed4701dccf29e92d3c1baae,2024-04-22T13:28:50.310000
|
||||||
CVE-2024-30977,0,0,0a99023cc49f8723c27525ea3fd6d09c0a18e0536fb7ad1e37e70ef0654b9714,2024-04-08T18:49:25.863000
|
CVE-2024-30977,0,0,0a99023cc49f8723c27525ea3fd6d09c0a18e0536fb7ad1e37e70ef0654b9714,2024-04-08T18:49:25.863000
|
||||||
CVE-2024-30979,0,0,80ab36bca498e33975593d086ceeeedf107c2c6f87bef059b959bbe8c3731bf4,2024-04-17T16:51:07.347000
|
CVE-2024-30979,0,0,80ab36bca498e33975593d086ceeeedf107c2c6f87bef059b959bbe8c3731bf4,2024-04-17T16:51:07.347000
|
||||||
@ -246989,7 +246992,7 @@ CVE-2024-31065,0,0,36c2c4ddfef551b3df9316a574430562ba7ec0ea51f9e5ecbfa0af993c794
|
|||||||
CVE-2024-31069,0,0,d29f1e01bd410bc9e289e23142033a3c4695bcaf7cee5af8670edc7046e0bf75,2024-04-15T13:15:51.577000
|
CVE-2024-31069,0,0,d29f1e01bd410bc9e289e23142033a3c4695bcaf7cee5af8670edc7046e0bf75,2024-04-15T13:15:51.577000
|
||||||
CVE-2024-3107,0,0,8567b8b8d2bb62063ead5812f7765e864af3f68fdbb051cf4e93b652388b3114,2024-05-02T18:00:37.360000
|
CVE-2024-3107,0,0,8567b8b8d2bb62063ead5812f7765e864af3f68fdbb051cf4e93b652388b3114,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-31077,0,0,cf1dae6bdc673263e7fd88f3fafa76996295a3cc4f001c878e21a09e0714f3a7,2024-04-23T12:52:09.397000
|
CVE-2024-31077,0,0,cf1dae6bdc673263e7fd88f3fafa76996295a3cc4f001c878e21a09e0714f3a7,2024-04-23T12:52:09.397000
|
||||||
CVE-2024-31078,0,1,5275efeb1b6fe40a14652836f5d9cde19c9d5a7c3b068f27cc054508562ef312,2024-05-07T13:39:32.710000
|
CVE-2024-31078,0,1,12059b4643db1f23db61cb234ce054c5e189af8320b848468c77237912b37117,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-3108,0,0,0d66f03cf377bb2d07f802576b4c74da72215aae418a6da84f3f123e5c208eaa,2024-05-03T14:17:53.690000
|
CVE-2024-3108,0,0,0d66f03cf377bb2d07f802576b4c74da72215aae418a6da84f3f123e5c208eaa,2024-05-03T14:17:53.690000
|
||||||
CVE-2024-31080,0,0,f054913239e9fff00b61da9bc96b207964c9acbdd383172b674082b38bf77b8e,2024-05-01T18:15:22.810000
|
CVE-2024-31080,0,0,f054913239e9fff00b61da9bc96b207964c9acbdd383172b674082b38bf77b8e,2024-05-01T18:15:22.810000
|
||||||
CVE-2024-31081,0,0,136635ec06154c204154356b9c36d8a3fc773c3e25bcb66a4a971f2dbdc8623f,2024-05-01T18:15:22.920000
|
CVE-2024-31081,0,0,136635ec06154c204154356b9c36d8a3fc773c3e25bcb66a4a971f2dbdc8623f,2024-05-01T18:15:22.920000
|
||||||
@ -247059,7 +247062,7 @@ CVE-2024-31219,0,0,d2d2811e70f71b6e8f1f63a3f7bda6856d7eb5bcd23ce2727f866e79d3b49
|
|||||||
CVE-2024-31220,0,0,5364fec01a2c522837b9bb1f12dd2e109f09573a57ee59445d858fa07dd681f7,2024-04-08T18:49:25.863000
|
CVE-2024-31220,0,0,5364fec01a2c522837b9bb1f12dd2e109f09573a57ee59445d858fa07dd681f7,2024-04-08T18:49:25.863000
|
||||||
CVE-2024-31221,0,0,093d7a2a638171e5d3f8cc3b06e5a6b3ca8a7674a42c7ed40ef62927f76d1926,2024-04-08T18:48:40.217000
|
CVE-2024-31221,0,0,093d7a2a638171e5d3f8cc3b06e5a6b3ca8a7674a42c7ed40ef62927f76d1926,2024-04-08T18:48:40.217000
|
||||||
CVE-2024-31224,0,0,2f84ceb3d774709c2492171042eddaeb6b6b98a31b06a1f67434414d962c7206,2024-04-08T18:48:40.217000
|
CVE-2024-31224,0,0,2f84ceb3d774709c2492171042eddaeb6b6b98a31b06a1f67434414d962c7206,2024-04-08T18:48:40.217000
|
||||||
CVE-2024-31225,0,1,5752a2a442fe279bccc3b7ddc7819796c22970000c602eb85a11b0aa1dc0b196,2024-05-07T12:15:09.507000
|
CVE-2024-31225,0,0,5752a2a442fe279bccc3b7ddc7819796c22970000c602eb85a11b0aa1dc0b196,2024-05-07T12:15:09.507000
|
||||||
CVE-2024-31229,0,0,7de33a876b6efca66be6426e83eb27e50104659e2ffe406707b9d46bf22d8ac4,2024-04-18T13:04:28.900000
|
CVE-2024-31229,0,0,7de33a876b6efca66be6426e83eb27e50104659e2ffe406707b9d46bf22d8ac4,2024-04-18T13:04:28.900000
|
||||||
CVE-2024-31230,0,0,52cfa4cc0c105e0f4a014468a390d1fae46fb176c8f9a3fd8a419c5888fe92a6,2024-04-10T19:49:51.183000
|
CVE-2024-31230,0,0,52cfa4cc0c105e0f4a014468a390d1fae46fb176c8f9a3fd8a419c5888fe92a6,2024-04-10T19:49:51.183000
|
||||||
CVE-2024-31233,0,0,d489633661459fa8fba7247a4e042c4067793ed99651e43e0cd0674db1c81416,2024-04-08T18:48:40.217000
|
CVE-2024-31233,0,0,d489633661459fa8fba7247a4e042c4067793ed99651e43e0cd0674db1c81416,2024-04-08T18:48:40.217000
|
||||||
@ -247207,6 +247210,7 @@ CVE-2024-31452,0,0,45e5c903cec7cbe18673da15b04f8c57c9e71a7a28162860a533aebab0360
|
|||||||
CVE-2024-31453,0,0,1b1ead27c6870d2affe09236bc3123473d08b6ddf2bca0a49b08400d4b48a120,2024-04-10T13:24:00.070000
|
CVE-2024-31453,0,0,1b1ead27c6870d2affe09236bc3123473d08b6ddf2bca0a49b08400d4b48a120,2024-04-10T13:24:00.070000
|
||||||
CVE-2024-31454,0,0,facd63c9b966def9fa208ea7acce2b97e831e91313ffa612db120032d2a37c2c,2024-04-10T13:24:00.070000
|
CVE-2024-31454,0,0,facd63c9b966def9fa208ea7acce2b97e831e91313ffa612db120032d2a37c2c,2024-04-10T13:24:00.070000
|
||||||
CVE-2024-31455,0,0,58d58168822fd35b9c530d967e86c80a8aef11f5f1477a56943eec05e6715b25,2024-04-10T13:24:00.070000
|
CVE-2024-31455,0,0,58d58168822fd35b9c530d967e86c80a8aef11f5f1477a56943eec05e6715b25,2024-04-10T13:24:00.070000
|
||||||
|
CVE-2024-31456,1,1,4d733cb2c8933ced63265d9a109ee6a67d0b98d29b060ebe1a70c2b2f1594386,2024-05-07T14:15:10.550000
|
||||||
CVE-2024-31457,0,0,aff1a7801fbb865d930cb2fb46573de892421c651bc9c2a65dfb3d401e53fdac,2024-04-10T13:24:00.070000
|
CVE-2024-31457,0,0,aff1a7801fbb865d930cb2fb46573de892421c651bc9c2a65dfb3d401e53fdac,2024-04-10T13:24:00.070000
|
||||||
CVE-2024-3146,0,0,1cbea39c0b5c8d0d8af37ab4c1019f1ec3a190542aee7f2e86ced34d06f5796b,2024-04-11T01:25:55.180000
|
CVE-2024-3146,0,0,1cbea39c0b5c8d0d8af37ab4c1019f1ec3a190542aee7f2e86ced34d06f5796b,2024-04-11T01:25:55.180000
|
||||||
CVE-2024-31461,0,0,767e617f714634fb260487a93ce2566660f42b8ac8c16cf9a8eaae2e849cbeef,2024-04-19T16:15:10.293000
|
CVE-2024-31461,0,0,767e617f714634fb260487a93ce2566660f42b8ac8c16cf9a8eaae2e849cbeef,2024-04-19T16:15:10.293000
|
||||||
@ -247397,8 +247401,8 @@ CVE-2024-32000,0,0,5a1773951b9e4056d222ee9010995a856338856d61b3ccc3a9db5455d3c02
|
|||||||
CVE-2024-32001,0,0,5f137f0e0d607eeec96c185575fc4489622e4c58e021858f7aee0551fd5f0547,2024-04-11T12:47:44.137000
|
CVE-2024-32001,0,0,5f137f0e0d607eeec96c185575fc4489622e4c58e021858f7aee0551fd5f0547,2024-04-11T12:47:44.137000
|
||||||
CVE-2024-32003,0,0,8e8c8d945f0ee0a518068e981d0cc584a07044ae728a9a77ce2d918bc43c232f,2024-04-15T13:15:31.997000
|
CVE-2024-32003,0,0,8e8c8d945f0ee0a518068e981d0cc584a07044ae728a9a77ce2d918bc43c232f,2024-04-15T13:15:31.997000
|
||||||
CVE-2024-32005,0,0,67300e4989f99e2e013d8397bc4806c53fe7ab524173b29e08f1814aa041fd14,2024-04-15T13:15:31.997000
|
CVE-2024-32005,0,0,67300e4989f99e2e013d8397bc4806c53fe7ab524173b29e08f1814aa041fd14,2024-04-15T13:15:31.997000
|
||||||
CVE-2024-32017,0,1,c47f78232c4c3749a77898f284cf5dd751f8e553e59dc7410a9242dddea7ca2b,2024-05-07T12:15:09.593000
|
CVE-2024-32017,0,0,c47f78232c4c3749a77898f284cf5dd751f8e553e59dc7410a9242dddea7ca2b,2024-05-07T12:15:09.593000
|
||||||
CVE-2024-32018,0,1,ed367d82895b9d9075702d5ab3b6c086d7325180d4e88bf52d874df7314b6c9a,2024-05-07T12:15:09.667000
|
CVE-2024-32018,0,0,ed367d82895b9d9075702d5ab3b6c086d7325180d4e88bf52d874df7314b6c9a,2024-05-07T12:15:09.667000
|
||||||
CVE-2024-32019,0,0,7d17b262f48d84e5d46deb667dc18694c73147c4bad7ea42fd1b388af87a63d3,2024-04-15T13:15:31.997000
|
CVE-2024-32019,0,0,7d17b262f48d84e5d46deb667dc18694c73147c4bad7ea42fd1b388af87a63d3,2024-04-15T13:15:31.997000
|
||||||
CVE-2024-3202,0,0,3543d902eafc8c4c40bfe450a4b784b21d5eb2e30d7be93129e4c6731c6d0980,2024-04-11T01:25:55.733000
|
CVE-2024-3202,0,0,3543d902eafc8c4c40bfe450a4b784b21d5eb2e30d7be93129e4c6731c6d0980,2024-04-11T01:25:55.733000
|
||||||
CVE-2024-32022,0,0,83ce972a62cb0d496d93021f959db1a9c7d93bf991779ee98a131d07725482e2,2024-04-19T16:15:10.533000
|
CVE-2024-32022,0,0,83ce972a62cb0d496d93021f959db1a9c7d93bf991779ee98a131d07725482e2,2024-04-19T16:15:10.533000
|
||||||
@ -247557,7 +247561,10 @@ CVE-2024-3235,0,0,87b194ac57d76e3164f790cf262b7f15e5577bfab72d12fd067ebb5070eb75
|
|||||||
CVE-2024-32358,0,0,4361acd373c6387e4e9f8c587956d55ed79588179fa5465dd154715a342d96e5,2024-04-25T17:24:59.967000
|
CVE-2024-32358,0,0,4361acd373c6387e4e9f8c587956d55ed79588179fa5465dd154715a342d96e5,2024-04-25T17:24:59.967000
|
||||||
CVE-2024-32359,0,0,b4d29b953e327824af6c91976648aff102dd83fb9c76233181d51fd1f9cb1231,2024-05-02T18:00:37.360000
|
CVE-2024-32359,0,0,b4d29b953e327824af6c91976648aff102dd83fb9c76233181d51fd1f9cb1231,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-32368,0,0,e5f9ac1f5e4b7deacae1b8adfb72b39f31c0e06e3a2c110e19b743f4b05d773c,2024-04-22T19:24:12.920000
|
CVE-2024-32368,0,0,e5f9ac1f5e4b7deacae1b8adfb72b39f31c0e06e3a2c110e19b743f4b05d773c,2024-04-22T19:24:12.920000
|
||||||
|
CVE-2024-32369,1,1,fd6352ea14f58b0f271e42d3c75bb120c5a6c7b04bee43e1b46f7721712c871b,2024-05-07T15:15:08.520000
|
||||||
CVE-2024-3237,0,0,a7f77baf4ea920e0a476bb9398bd9c23d610a4f066f0a85817137f6854639dca,2024-05-06T12:44:56.377000
|
CVE-2024-3237,0,0,a7f77baf4ea920e0a476bb9398bd9c23d610a4f066f0a85817137f6854639dca,2024-05-06T12:44:56.377000
|
||||||
|
CVE-2024-32370,1,1,f8f0d606d58f4f7f6b91610addc88b801e211b038db657218245b7431ab38587,2024-05-07T15:15:08.597000
|
||||||
|
CVE-2024-32371,1,1,17344cf4dfe2c66216b4f61f3b9793b96c7ed1b8cb7ff77de8905ac2e655f56b,2024-05-07T15:15:08.653000
|
||||||
CVE-2024-32391,0,0,b9d2ada2509e9e002fcf7fc50c30e5fa24f6bd077b7f0fab83dbe519d76755ce,2024-04-22T13:28:50.310000
|
CVE-2024-32391,0,0,b9d2ada2509e9e002fcf7fc50c30e5fa24f6bd077b7f0fab83dbe519d76755ce,2024-04-22T13:28:50.310000
|
||||||
CVE-2024-32392,0,0,e9dc77721f231608117a79f151c9f1e6be5cd7530989658bd3dd67ce41889ce5,2024-04-22T13:28:50.310000
|
CVE-2024-32392,0,0,e9dc77721f231608117a79f151c9f1e6be5cd7530989658bd3dd67ce41889ce5,2024-04-22T13:28:50.310000
|
||||||
CVE-2024-32394,0,0,5f3cc70e4b86c8028147d2489cef40fa6c9285878a28bdb0855878990e97443a,2024-04-23T12:52:26.253000
|
CVE-2024-32394,0,0,5f3cc70e4b86c8028147d2489cef40fa6c9285878a28bdb0855878990e97443a,2024-04-23T12:52:26.253000
|
||||||
@ -247757,6 +247764,8 @@ CVE-2024-3266,0,0,254a5ba127b10ac48f062b62dbe4c90ef51eaba1ed741161e5a22416cbb322
|
|||||||
CVE-2024-32660,0,0,2b6893745d0df7661f2e37660ac94578f9985808468863ff8b86e7efb0633a68,2024-04-24T13:39:42.883000
|
CVE-2024-32660,0,0,2b6893745d0df7661f2e37660ac94578f9985808468863ff8b86e7efb0633a68,2024-04-24T13:39:42.883000
|
||||||
CVE-2024-32661,0,0,0b4f6f6bf08605ad36c3697d5c10f022921cc6cf1c11c6d2a8c37ca647145a89,2024-04-24T13:39:42.883000
|
CVE-2024-32661,0,0,0b4f6f6bf08605ad36c3697d5c10f022921cc6cf1c11c6d2a8c37ca647145a89,2024-04-24T13:39:42.883000
|
||||||
CVE-2024-32662,0,0,cc82e255660f76e8294a012a16568aaf2fb6ae82fd6edb9a95574f4ae5e4ec18,2024-04-24T13:39:42.883000
|
CVE-2024-32662,0,0,cc82e255660f76e8294a012a16568aaf2fb6ae82fd6edb9a95574f4ae5e4ec18,2024-04-24T13:39:42.883000
|
||||||
|
CVE-2024-32663,1,1,a690ef3b5b17bef27c427355893a78667914c67c065789e9e38f8915d1fed449,2024-05-07T15:15:08.713000
|
||||||
|
CVE-2024-32664,1,1,dfcf217e0dfa158ebf1d84f74046f62642f4a355ef311c10e2d5090ab74b6217,2024-05-07T15:15:08.937000
|
||||||
CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000
|
CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000
|
||||||
CVE-2024-32675,0,0,87b463967c2204618d7e556d0f9b434f519dfbe770ec74ef985201062de7ccc7,2024-04-24T17:16:50.397000
|
CVE-2024-32675,0,0,87b463967c2204618d7e556d0f9b434f519dfbe770ec74ef985201062de7ccc7,2024-04-24T17:16:50.397000
|
||||||
CVE-2024-32676,0,0,3585205cf50aeb554d2a389a3c92c05231728f39aed4a3ec7d0a9db1453b1c81,2024-04-25T13:18:02.660000
|
CVE-2024-32676,0,0,3585205cf50aeb554d2a389a3c92c05231728f39aed4a3ec7d0a9db1453b1c81,2024-04-25T13:18:02.660000
|
||||||
@ -247846,6 +247855,7 @@ CVE-2024-32835,0,0,a55a936ce932c192bddb52ecc7ef5c50500f7aaee0689f590c1aa942fe932
|
|||||||
CVE-2024-32836,0,0,b79abde0b1fb00c320171e12e4361e475bc7a0910a68d24b478ff673cfed4676,2024-04-24T13:39:42.883000
|
CVE-2024-32836,0,0,b79abde0b1fb00c320171e12e4361e475bc7a0910a68d24b478ff673cfed4676,2024-04-24T13:39:42.883000
|
||||||
CVE-2024-3285,0,0,ea17e16acaa3172cbcc052cf9bfb1b3e7ee2b004434b062b8e67c1c1ed8bff14,2024-04-11T12:47:44.137000
|
CVE-2024-3285,0,0,ea17e16acaa3172cbcc052cf9bfb1b3e7ee2b004434b062b8e67c1c1ed8bff14,2024-04-11T12:47:44.137000
|
||||||
CVE-2024-32866,0,0,20522d9aebf09a5d43cbab0aa4b3dc9ed937958cfd0ea9d3803e03cb59093366,2024-04-24T13:39:42.883000
|
CVE-2024-32866,0,0,20522d9aebf09a5d43cbab0aa4b3dc9ed937958cfd0ea9d3803e03cb59093366,2024-04-24T13:39:42.883000
|
||||||
|
CVE-2024-32867,1,1,f7d15de1501ebc4f0522be086f34b55c69ad4504c3eb5ac370f6749aa94cf9c0,2024-05-07T15:15:09.143000
|
||||||
CVE-2024-32868,0,0,ed4beb9301bd2682ab27b10353d7158266a640938b5fd2758f3ebb745eea4605,2024-04-26T12:58:17.720000
|
CVE-2024-32868,0,0,ed4beb9301bd2682ab27b10353d7158266a640938b5fd2758f3ebb745eea4605,2024-04-26T12:58:17.720000
|
||||||
CVE-2024-32869,0,0,0e473f01ce255dcdc5f11b871766f1c1758b18f6cf26ba19adbc6c7e41a0ee7b,2024-04-24T13:39:42.883000
|
CVE-2024-32869,0,0,0e473f01ce255dcdc5f11b871766f1c1758b18f6cf26ba19adbc6c7e41a0ee7b,2024-04-24T13:39:42.883000
|
||||||
CVE-2024-3287,0,0,2931e418698389557efec190f461462acdf2a1c0b7ebc46c55a5a74f6f678a7b,2024-05-02T18:00:37.360000
|
CVE-2024-3287,0,0,2931e418698389557efec190f461462acdf2a1c0b7ebc46c55a5a74f6f678a7b,2024-05-02T18:00:37.360000
|
||||||
@ -247903,10 +247913,13 @@ CVE-2024-33110,0,0,2fdbb6d02980c9f3e1fa4804c98683e39019b62fc282cbeaec08a4d5ae9de
|
|||||||
CVE-2024-33111,0,0,d601ea56564c0f51c21c02b085600174c929f48bb58d4974d7158465b8d78895,2024-05-06T16:00:59.253000
|
CVE-2024-33111,0,0,d601ea56564c0f51c21c02b085600174c929f48bb58d4974d7158465b8d78895,2024-05-06T16:00:59.253000
|
||||||
CVE-2024-33112,0,0,dbcd84d30f55157f3580af0bc9df4e9ec13d32c09118a2513b547c834b9fb0f7,2024-05-06T16:00:59.253000
|
CVE-2024-33112,0,0,dbcd84d30f55157f3580af0bc9df4e9ec13d32c09118a2513b547c834b9fb0f7,2024-05-06T16:00:59.253000
|
||||||
CVE-2024-33113,0,0,fb9a754c446bd5781c14f13124ea6a5ad5288a7a6262e75f906b014a83614e62,2024-05-06T16:00:59.253000
|
CVE-2024-33113,0,0,fb9a754c446bd5781c14f13124ea6a5ad5288a7a6262e75f906b014a83614e62,2024-05-06T16:00:59.253000
|
||||||
CVE-2024-33117,0,1,1141f5bd55b81d658c6e3c7994ad48fc5e0cf3dec4b9ba799562c98fbb5ae9de,2024-05-07T13:39:32.710000
|
CVE-2024-33117,0,0,1141f5bd55b81d658c6e3c7994ad48fc5e0cf3dec4b9ba799562c98fbb5ae9de,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-33118,0,1,ac34c28b0f9855a32e215f883b1aed7f164e30a3dc6b5ffd7f9c6f2ff28b9096,2024-05-07T13:39:32.710000
|
CVE-2024-33118,0,0,ac34c28b0f9855a32e215f883b1aed7f164e30a3dc6b5ffd7f9c6f2ff28b9096,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-3312,0,0,600190b8b1b98d908237811e0b165781ecf00c4b37f62f7ea411c1ef102136dd,2024-05-02T18:00:37.360000
|
CVE-2024-3312,0,0,600190b8b1b98d908237811e0b165781ecf00c4b37f62f7ea411c1ef102136dd,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-33121,0,1,a062e45141ba707414d4b0cabfd8c30afec0fd96441288a3da042ff169c24117,2024-05-07T13:39:32.710000
|
CVE-2024-33120,1,1,367818054670470a12271e5429a6a7cd3b7b85ee69ec764bd56da986a53b5de2,2024-05-07T15:15:09.353000
|
||||||
|
CVE-2024-33121,0,0,a062e45141ba707414d4b0cabfd8c30afec0fd96441288a3da042ff169c24117,2024-05-07T13:39:32.710000
|
||||||
|
CVE-2024-33122,1,1,4f662425157b1d77179c7810cf5a3aa23654f5ea6e0ee5c9caa14c0c83491053,2024-05-07T15:15:09.417000
|
||||||
|
CVE-2024-33124,1,1,20d4dab979bb7843f0c5aa0442e063eb9419c02e0e84a1f97c30a633884144a0,2024-05-07T15:15:09.477000
|
||||||
CVE-2024-3313,0,0,a1f61d968ea3c59507e97f1859e014460ea34c753cfc0814a5308608cf321984,2024-04-10T13:23:38.787000
|
CVE-2024-3313,0,0,a1f61d968ea3c59507e97f1859e014460ea34c753cfc0814a5308608cf321984,2024-04-10T13:23:38.787000
|
||||||
CVE-2024-3314,0,0,78c785cb5b32bdf0baed853861c5d6771b22fff72a031a5ec21a411cf5a4d670,2024-04-11T01:25:58.237000
|
CVE-2024-3314,0,0,78c785cb5b32bdf0baed853861c5d6771b22fff72a031a5ec21a411cf5a4d670,2024-04-11T01:25:58.237000
|
||||||
CVE-2024-3315,0,0,b04b498365bf550d192eb8f6355a94ceb3682fd952e63a5ca20359721d079b72,2024-04-11T01:25:58.317000
|
CVE-2024-3315,0,0,b04b498365bf550d192eb8f6355a94ceb3682fd952e63a5ca20359721d079b72,2024-04-11T01:25:58.317000
|
||||||
@ -247985,6 +247998,7 @@ CVE-2024-33429,0,0,a8c998123b524ea49b295a5500fc8c6d4ba14ca4f9af69ccfbc5cd4926bf1
|
|||||||
CVE-2024-3343,0,0,c7ada54a8973c3f80fc415b1484b0c0d7aeb75e458012c05cd3c69dcc6f0e33f,2024-04-11T12:47:44.137000
|
CVE-2024-3343,0,0,c7ada54a8973c3f80fc415b1484b0c0d7aeb75e458012c05cd3c69dcc6f0e33f,2024-04-11T12:47:44.137000
|
||||||
CVE-2024-33430,0,0,1bdac97a272b556d66774c83b6b8c517f39c5a8905e843160e381ea022d71681,2024-05-01T19:50:25.633000
|
CVE-2024-33430,0,0,1bdac97a272b556d66774c83b6b8c517f39c5a8905e843160e381ea022d71681,2024-05-01T19:50:25.633000
|
||||||
CVE-2024-33431,0,0,5986fe6c65cec4f439551162bddebc0d25402085e567befaeb51ade3480d9475,2024-05-01T19:50:25.633000
|
CVE-2024-33431,0,0,5986fe6c65cec4f439551162bddebc0d25402085e567befaeb51ade3480d9475,2024-05-01T19:50:25.633000
|
||||||
|
CVE-2024-33434,1,1,8d8d54f4b744dfc11ee0ee0517167bd4a9d7ea6bd25cc6e246b5b45c658073f6,2024-05-07T14:15:10.760000
|
||||||
CVE-2024-33435,0,0,3e0c971a04385b3ffb3c64bb77cb05b33804069513b05364eced055a4dc4fd72,2024-04-30T13:11:16.690000
|
CVE-2024-33435,0,0,3e0c971a04385b3ffb3c64bb77cb05b33804069513b05364eced055a4dc4fd72,2024-04-30T13:11:16.690000
|
||||||
CVE-2024-33436,0,0,701c454e4625ea3667a2a4c57b2b8813ef0906b2788ee031a4fb999b217c8733,2024-05-01T13:02:20.750000
|
CVE-2024-33436,0,0,701c454e4625ea3667a2a4c57b2b8813ef0906b2788ee031a4fb999b217c8733,2024-05-01T13:02:20.750000
|
||||||
CVE-2024-33437,0,0,1ec2ac47d7b1ab44be8b75609a46c1e8607276ea4a6f55841f41e488acd680a8,2024-05-01T13:02:20.750000
|
CVE-2024-33437,0,0,1ec2ac47d7b1ab44be8b75609a46c1e8607276ea4a6f55841f41e488acd680a8,2024-05-01T13:02:20.750000
|
||||||
@ -248034,10 +248048,10 @@ CVE-2024-3356,0,0,087254ad27ba51e796f585bd19b7860bdf92d5d8812be46839c2000c6ff7ec
|
|||||||
CVE-2024-33562,0,0,27fac541d1d64e11476c3268a849af55b6413283c20341e42235e842aff36652,2024-04-29T12:42:03.667000
|
CVE-2024-33562,0,0,27fac541d1d64e11476c3268a849af55b6413283c20341e42235e842aff36652,2024-04-29T12:42:03.667000
|
||||||
CVE-2024-33566,0,0,46d17e7fcf76ea9cc29b76ef68ee9038fd04b7d980a772b2f399515ebb8e8216,2024-04-29T12:42:03.667000
|
CVE-2024-33566,0,0,46d17e7fcf76ea9cc29b76ef68ee9038fd04b7d980a772b2f399515ebb8e8216,2024-04-29T12:42:03.667000
|
||||||
CVE-2024-3357,0,0,4504c33b3bb653378795a255a83c05295c4cb93d37914e6c8a1edf8397686b85,2024-04-11T01:25:59.530000
|
CVE-2024-3357,0,0,4504c33b3bb653378795a255a83c05295c4cb93d37914e6c8a1edf8397686b85,2024-04-11T01:25:59.530000
|
||||||
CVE-2024-33570,0,1,0537b9c72bfbf1655961ce253b4489c4b95e74d24416659de6615e2bf1c6b703,2024-05-07T13:39:32.710000
|
CVE-2024-33570,0,0,0537b9c72bfbf1655961ce253b4489c4b95e74d24416659de6615e2bf1c6b703,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-33571,0,0,7491ee4b5721aac2bfd880f448bc941e8fa61c24acdbbd5222ab9b2cea79a689,2024-04-29T12:42:03.667000
|
CVE-2024-33571,0,0,7491ee4b5721aac2bfd880f448bc941e8fa61c24acdbbd5222ab9b2cea79a689,2024-04-29T12:42:03.667000
|
||||||
CVE-2024-33575,0,0,ba650f18eda31a51989bac6516ae56cab367e4b24de4dc251d448b46a52e51ca,2024-04-29T12:42:03.667000
|
CVE-2024-33575,0,0,ba650f18eda31a51989bac6516ae56cab367e4b24de4dc251d448b46a52e51ca,2024-04-29T12:42:03.667000
|
||||||
CVE-2024-33576,0,1,afeccf39ea64ea858ce0f73e9ac8d3f7813955ee6b94e1666af6f7ba451357db,2024-05-07T13:39:32.710000
|
CVE-2024-33576,0,0,afeccf39ea64ea858ce0f73e9ac8d3f7813955ee6b94e1666af6f7ba451357db,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-3358,0,0,694a0960c89fb254bc37c7c2f594e5cb197e9c3b955cd9433f44c414aff75d2b,2024-04-11T01:25:59.610000
|
CVE-2024-3358,0,0,694a0960c89fb254bc37c7c2f594e5cb197e9c3b955cd9433f44c414aff75d2b,2024-04-11T01:25:59.610000
|
||||||
CVE-2024-33584,0,0,6d7dee1507503c0af4ba1324f7b4ab2bc1354ebe6068cc4c504f0a0ba046981a,2024-04-29T12:42:03.667000
|
CVE-2024-33584,0,0,6d7dee1507503c0af4ba1324f7b4ab2bc1354ebe6068cc4c504f0a0ba046981a,2024-04-29T12:42:03.667000
|
||||||
CVE-2024-33585,0,0,837ce5babfebb1512ee13fb227ab0484b75f13fa24da494e01fcfeae343002c8,2024-04-30T13:11:16.690000
|
CVE-2024-33585,0,0,837ce5babfebb1512ee13fb227ab0484b75f13fa24da494e01fcfeae343002c8,2024-04-30T13:11:16.690000
|
||||||
@ -248055,11 +248069,11 @@ CVE-2024-33595,0,0,9c0a5e357485e97bd37e4a8a4c64b78a12bc525f19900b053d25792d45335
|
|||||||
CVE-2024-33596,0,0,b3721b937a96269507cd9ddd114ba8a363a11b6063a18e3be1015bcf017e8cae,2024-04-29T12:42:03.667000
|
CVE-2024-33596,0,0,b3721b937a96269507cd9ddd114ba8a363a11b6063a18e3be1015bcf017e8cae,2024-04-29T12:42:03.667000
|
||||||
CVE-2024-33597,0,0,73ad27e9a74492edae643f04b7bfaa672e2650fc44661d9f5727922b2ebdac6e,2024-04-29T12:42:03.667000
|
CVE-2024-33597,0,0,73ad27e9a74492edae643f04b7bfaa672e2650fc44661d9f5727922b2ebdac6e,2024-04-29T12:42:03.667000
|
||||||
CVE-2024-33598,0,0,951d122bd41cb7218bd6ac7f6b225f4876d714fab2f67658757b81f4282e18e0,2024-04-26T12:58:17.720000
|
CVE-2024-33598,0,0,951d122bd41cb7218bd6ac7f6b225f4876d714fab2f67658757b81f4282e18e0,2024-04-26T12:58:17.720000
|
||||||
CVE-2024-33599,0,1,9c222b70e190fc4cd86b3eab3d2845025c20bb26f9dde6453be9593bd2c1a037,2024-05-07T13:39:32.710000
|
CVE-2024-33599,0,0,9c222b70e190fc4cd86b3eab3d2845025c20bb26f9dde6453be9593bd2c1a037,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-3360,0,0,2ffbaa301c04a2d62013f221bb69a21a0f4034a97959f93c6ac130d96a9162d3,2024-04-11T01:25:59.770000
|
CVE-2024-3360,0,0,2ffbaa301c04a2d62013f221bb69a21a0f4034a97959f93c6ac130d96a9162d3,2024-04-11T01:25:59.770000
|
||||||
CVE-2024-33600,0,1,392d663a20e37ea99d531b2d1494f9731213af52e8d86eceeba8709856ff36b8,2024-05-07T13:39:32.710000
|
CVE-2024-33600,0,0,392d663a20e37ea99d531b2d1494f9731213af52e8d86eceeba8709856ff36b8,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-33601,0,1,677e02c7b9a7354d12f1558cb835f8d17e5599681a196d853572e599231ef4d5,2024-05-07T13:39:32.710000
|
CVE-2024-33601,0,0,677e02c7b9a7354d12f1558cb835f8d17e5599681a196d853572e599231ef4d5,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-33602,0,1,15d94cc4914bd563b5cebd7d733d131cd923c30c1c31fb52ef556530a056ad7c,2024-05-07T13:39:32.710000
|
CVE-2024-33602,0,0,15d94cc4914bd563b5cebd7d733d131cd923c30c1c31fb52ef556530a056ad7c,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-3361,0,0,c120caf4947180a69c26140d9354a0af916b072bcc15573944dc923bbf223f7d,2024-04-11T01:25:59.847000
|
CVE-2024-3361,0,0,c120caf4947180a69c26140d9354a0af916b072bcc15573944dc923bbf223f7d,2024-04-11T01:25:59.847000
|
||||||
CVE-2024-3362,0,0,4f698660b915c64322658e8738d0fb3f09460cf98fd487b3189e8f9d96e2b2c1,2024-04-11T01:25:59.930000
|
CVE-2024-3362,0,0,4f698660b915c64322658e8738d0fb3f09460cf98fd487b3189e8f9d96e2b2c1,2024-04-11T01:25:59.930000
|
||||||
CVE-2024-33627,0,0,46d1ca344f6adedbf698f1c5642ffd1e81c65d9ee122179e4726e5c233352e37,2024-04-29T12:42:03.667000
|
CVE-2024-33627,0,0,46d1ca344f6adedbf698f1c5642ffd1e81c65d9ee122179e4726e5c233352e37,2024-04-29T12:42:03.667000
|
||||||
@ -248136,6 +248150,10 @@ CVE-2024-33768,0,0,0791da19a973c725c5712ab1092941eb1087a449fcb98acf7c76b570d62aa
|
|||||||
CVE-2024-3377,0,0,4f5c5a9a0c925d4c25c7e7a8167aad399bf59289271bce69d10c801ec2848ece,2024-04-11T01:26:00.473000
|
CVE-2024-3377,0,0,4f5c5a9a0c925d4c25c7e7a8167aad399bf59289271bce69d10c801ec2848ece,2024-04-11T01:26:00.473000
|
||||||
CVE-2024-33775,0,0,ac6a91cce7dd410c87c357ff8a5fa6fd6e4ed140c42f5f7a0a578039144c916c,2024-05-02T16:15:08.243000
|
CVE-2024-33775,0,0,ac6a91cce7dd410c87c357ff8a5fa6fd6e4ed140c42f5f7a0a578039144c916c,2024-05-02T16:15:08.243000
|
||||||
CVE-2024-3378,0,0,4f86c276b9b6898b0be7d5e038b0b93861aa9bc2234c5fb397df84486317a3f0,2024-04-14T04:15:56.560000
|
CVE-2024-3378,0,0,4f86c276b9b6898b0be7d5e038b0b93861aa9bc2234c5fb397df84486317a3f0,2024-04-14T04:15:56.560000
|
||||||
|
CVE-2024-33780,1,1,451be84c2c525fc306d121dcd9fee3c49b91dbbf56a4959c548a722dbe877018,2024-05-07T14:15:10.820000
|
||||||
|
CVE-2024-33781,1,1,f4f7e643ed06dfe34d7e50b920d433e4e1edac48ecbf5cf28dae804cd66afb83,2024-05-07T14:15:10.880000
|
||||||
|
CVE-2024-33782,1,1,4e147f1d19b5edd200dfdb727ecd3e0f98db7a7ea5c40b73ab4a443953c3bb57,2024-05-07T14:15:10.933000
|
||||||
|
CVE-2024-33783,1,1,2be8992d1551df1d9eb166d3e98e19315d9bff6f5817991b06258008fab98bb7,2024-05-07T14:15:10.990000
|
||||||
CVE-2024-33786,0,0,9c9799d563bc0d4c1c04d7279223efdf5fe0cf06bfa6bc6c2187b74f74410331,2024-05-03T14:17:53.690000
|
CVE-2024-33786,0,0,9c9799d563bc0d4c1c04d7279223efdf5fe0cf06bfa6bc6c2187b74f74410331,2024-05-03T14:17:53.690000
|
||||||
CVE-2024-33787,0,0,938d987ff7025b8de50748f3c8129ead7b6e1120b58c6cfd6b1d65c8e7b6d00a,2024-05-03T14:17:53.690000
|
CVE-2024-33787,0,0,938d987ff7025b8de50748f3c8129ead7b6e1120b58c6cfd6b1d65c8e7b6d00a,2024-05-03T14:17:53.690000
|
||||||
CVE-2024-33788,0,0,cb54b61cb7baf2715794935e7d05d4995f4a9ec96d60289fe517e2f17611210d,2024-05-06T16:00:59.253000
|
CVE-2024-33788,0,0,cb54b61cb7baf2715794935e7d05d4995f4a9ec96d60289fe517e2f17611210d,2024-05-06T16:00:59.253000
|
||||||
@ -248164,8 +248182,8 @@ CVE-2024-33899,0,0,3953877290e7ea59299fc2e6fd3641cdc5f0dd0a60947ca4a9fd862e9c59d
|
|||||||
CVE-2024-33903,0,0,d2659cb95032f4bf4e82ec7ebb3e3a955a9eb80acf170b021644b79abb230380,2024-04-29T12:42:03.667000
|
CVE-2024-33903,0,0,d2659cb95032f4bf4e82ec7ebb3e3a955a9eb80acf170b021644b79abb230380,2024-04-29T12:42:03.667000
|
||||||
CVE-2024-33904,0,0,4e23880abf5747270fb682428cdb1c8d9da3ad9f2ae0530104035f429e5a2c50,2024-04-29T12:42:03.667000
|
CVE-2024-33904,0,0,4e23880abf5747270fb682428cdb1c8d9da3ad9f2ae0530104035f429e5a2c50,2024-04-29T12:42:03.667000
|
||||||
CVE-2024-33905,0,0,4f2af541fd9603df50f92dd094e460dd4dcee3f568c1f2af9533e6ef2f5fb1b0,2024-05-01T18:15:24.390000
|
CVE-2024-33905,0,0,4f2af541fd9603df50f92dd094e460dd4dcee3f568c1f2af9533e6ef2f5fb1b0,2024-05-01T18:15:24.390000
|
||||||
CVE-2024-33907,0,1,61fea348950e38683146d14305d27d67cff3f826a8055e478155b8c1d0ac0243,2024-05-07T13:39:32.710000
|
CVE-2024-33907,0,0,61fea348950e38683146d14305d27d67cff3f826a8055e478155b8c1d0ac0243,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-33908,0,1,a88a69da4efefbaf00105bd137ff32d6ed2880bc8a96e30239b8820c98589ef1,2024-05-07T13:39:32.710000
|
CVE-2024-33908,0,0,a88a69da4efefbaf00105bd137ff32d6ed2880bc8a96e30239b8820c98589ef1,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-33910,0,0,1eecf8c9980abe02f4540fa449a7017e954404b33c113c3603477a004b96954f,2024-05-06T19:53:38.797000
|
CVE-2024-33910,0,0,1eecf8c9980abe02f4540fa449a7017e954404b33c113c3603477a004b96954f,2024-05-06T19:53:38.797000
|
||||||
CVE-2024-33911,0,0,d2216d18af7fbb067b283f4026a40e6ff4696a0c62b77138aebc217a926306fc,2024-05-02T13:27:25.103000
|
CVE-2024-33911,0,0,d2216d18af7fbb067b283f4026a40e6ff4696a0c62b77138aebc217a926306fc,2024-05-02T13:27:25.103000
|
||||||
CVE-2024-33912,0,0,dde67555fbfdf9a274f05bf5eeaf0d855650c05d1c13363d279840fb3e774c4d,2024-05-06T19:53:38.797000
|
CVE-2024-33912,0,0,dde67555fbfdf9a274f05bf5eeaf0d855650c05d1c13363d279840fb3e774c4d,2024-05-06T19:53:38.797000
|
||||||
@ -248228,6 +248246,7 @@ CVE-2024-34072,0,0,777211e19119fd714cb117ad917347df8c8d31d8f2a7116f05acd4dee767c
|
|||||||
CVE-2024-34073,0,0,59627a6f2139e186e386d9bee02b29e3f553b11a42322943c49172b647fa4488,2024-05-03T12:48:41.067000
|
CVE-2024-34073,0,0,59627a6f2139e186e386d9bee02b29e3f553b11a42322943c49172b647fa4488,2024-05-03T12:48:41.067000
|
||||||
CVE-2024-34075,0,0,74b8f52c18ba96760f5713abb933f8324f683e778d08e9874ae839df6792f5b8,2024-05-06T12:44:56.377000
|
CVE-2024-34075,0,0,74b8f52c18ba96760f5713abb933f8324f683e778d08e9874ae839df6792f5b8,2024-05-06T12:44:56.377000
|
||||||
CVE-2024-34078,0,0,1763c773ba6f4a58b6d621ab41ac83901c998db7a940162cceef17ca482ef5db,2024-05-06T16:00:59.253000
|
CVE-2024-34078,0,0,1763c773ba6f4a58b6d621ab41ac83901c998db7a940162cceef17ca482ef5db,2024-05-06T16:00:59.253000
|
||||||
|
CVE-2024-34084,1,1,bb1b4815f1c77827629a2b14346d479fd4254f157487b036e8228aa192b0e03e,2024-05-07T15:15:09.540000
|
||||||
CVE-2024-34088,0,0,6883a0b70d0dde6a9cd88ea6282b05e33733ec87c48078fd4a071d0cb0aef5b0,2024-04-30T19:35:36.960000
|
CVE-2024-34088,0,0,6883a0b70d0dde6a9cd88ea6282b05e33733ec87c48078fd4a071d0cb0aef5b0,2024-04-30T19:35:36.960000
|
||||||
CVE-2024-34089,0,0,15b2c0a47fbcc5be5a3bf97fe1a554c3063f6b19ce95e2c291ace7a6dfa23f2b,2024-05-06T19:53:38.797000
|
CVE-2024-34089,0,0,15b2c0a47fbcc5be5a3bf97fe1a554c3063f6b19ce95e2c291ace7a6dfa23f2b,2024-05-06T19:53:38.797000
|
||||||
CVE-2024-34090,0,0,8608bf721bcec5d06420a9e10150e606e4fa123798b3cf5eb08292efdd0a1900,2024-05-06T19:53:38.797000
|
CVE-2024-34090,0,0,8608bf721bcec5d06420a9e10150e606e4fa123798b3cf5eb08292efdd0a1900,2024-05-06T19:53:38.797000
|
||||||
@ -248267,6 +248286,7 @@ CVE-2024-3431,0,0,71ddfcbe759169c8f204f418e8f847a54a9d0260ae81f8f299182963de778e
|
|||||||
CVE-2024-3432,0,0,571dfda74b07ff884b2ea3fb23e5b381f434b6d6f92c90abefd93bb60b98ed52,2024-04-11T01:26:02.150000
|
CVE-2024-3432,0,0,571dfda74b07ff884b2ea3fb23e5b381f434b6d6f92c90abefd93bb60b98ed52,2024-04-11T01:26:02.150000
|
||||||
CVE-2024-3433,0,0,9daf2209e24504628b986e1f65ece6eda07fd4ab55bdd47fe9779359663e710e,2024-04-11T01:26:02.227000
|
CVE-2024-3433,0,0,9daf2209e24504628b986e1f65ece6eda07fd4ab55bdd47fe9779359663e710e,2024-04-11T01:26:02.227000
|
||||||
CVE-2024-3434,0,0,954da8a67c7ed83cd00d8f12a08610158a6b6e85c4d2c5bfe68c69ad1cf2e22e,2024-04-11T01:26:02.303000
|
CVE-2024-3434,0,0,954da8a67c7ed83cd00d8f12a08610158a6b6e85c4d2c5bfe68c69ad1cf2e22e,2024-04-11T01:26:02.303000
|
||||||
|
CVE-2024-34342,1,1,1507e0cd4f8127f9fd74539ab17296eb45f964f4b6237f5766c3568b7c2d4eee,2024-05-07T15:15:09.730000
|
||||||
CVE-2024-3436,0,0,d56d6daef5f64944191e2814a0e8e0368edbb9fb66b8510fd7eacfe56842ed00,2024-04-11T01:26:02.383000
|
CVE-2024-3436,0,0,d56d6daef5f64944191e2814a0e8e0368edbb9fb66b8510fd7eacfe56842ed00,2024-04-11T01:26:02.383000
|
||||||
CVE-2024-34366,0,0,0d3f5bedc206c2395fd40f02a930e96a2ecd55a373d55f2b02f6aeccbb807ecf,2024-05-06T19:53:38.797000
|
CVE-2024-34366,0,0,0d3f5bedc206c2395fd40f02a930e96a2ecd55a373d55f2b02f6aeccbb807ecf,2024-05-06T19:53:38.797000
|
||||||
CVE-2024-34367,0,0,09cdc74d280ef140661f2da3bf1a0a89bd8cdc87b8783ab4e406f707e957795e,2024-05-06T19:53:38.797000
|
CVE-2024-34367,0,0,09cdc74d280ef140661f2da3bf1a0a89bd8cdc87b8783ab4e406f707e957795e,2024-05-06T19:53:38.797000
|
||||||
@ -248305,7 +248325,7 @@ CVE-2024-34404,0,0,b55f98a0483eb8227a5f45093fc640c957fa16f8c8c8bb014d71320a18d26
|
|||||||
CVE-2024-34408,0,0,3c2f335ba274ff508132a154cc309c40bc38b19efdd9298e3de175f41fa5750b,2024-05-03T12:48:41.067000
|
CVE-2024-34408,0,0,3c2f335ba274ff508132a154cc309c40bc38b19efdd9298e3de175f41fa5750b,2024-05-03T12:48:41.067000
|
||||||
CVE-2024-3441,0,0,657e15d08a05c85e0f4e982fae7cec49fd4b8dda898982a18c454ae2db45f222,2024-04-11T01:26:02.813000
|
CVE-2024-3441,0,0,657e15d08a05c85e0f4e982fae7cec49fd4b8dda898982a18c454ae2db45f222,2024-04-11T01:26:02.813000
|
||||||
CVE-2024-34412,0,0,351dac1423dc8e8517c032f303060fddddfb4b70d0143bb8c231e0e9db5dba48,2024-05-06T19:53:38.797000
|
CVE-2024-34412,0,0,351dac1423dc8e8517c032f303060fddddfb4b70d0143bb8c231e0e9db5dba48,2024-05-06T19:53:38.797000
|
||||||
CVE-2024-34413,0,1,e5e744c34345ba6294637a8f85597b78c532aba1fad9c01dda8872ea5e3b50da,2024-05-07T13:39:32.710000
|
CVE-2024-34413,0,0,e5e744c34345ba6294637a8f85597b78c532aba1fad9c01dda8872ea5e3b50da,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-3442,0,0,756156f7de62e4a3ae69e9bbc13d8b798986428892e90d3991a24b2c8375a976,2024-04-11T01:26:02.893000
|
CVE-2024-3442,0,0,756156f7de62e4a3ae69e9bbc13d8b798986428892e90d3991a24b2c8375a976,2024-04-11T01:26:02.893000
|
||||||
CVE-2024-3443,0,0,05006967bda17a889e39c8ccda497403cb2b35584eb895b86d4c8dd8b79230c6,2024-04-11T01:26:02.973000
|
CVE-2024-3443,0,0,05006967bda17a889e39c8ccda497403cb2b35584eb895b86d4c8dd8b79230c6,2024-04-11T01:26:02.973000
|
||||||
CVE-2024-3444,0,0,20ed8f6fb3358c183e59c59fd1e15718847c74b3b8477277ced05a568bf760d4,2024-04-11T01:26:03.057000
|
CVE-2024-3444,0,0,20ed8f6fb3358c183e59c59fd1e15718847c74b3b8477277ced05a568bf760d4,2024-04-11T01:26:03.057000
|
||||||
@ -248314,7 +248334,7 @@ CVE-2024-34447,0,0,61f22f72dc958826fcb7eaf40fe11c9681f5ba2d32a613978ac67658e68b4
|
|||||||
CVE-2024-34449,0,0,24c537d2cf9215e7f09318a469a30752a9e17b9c5c5ae725d1583657f8eba5f3,2024-05-06T12:44:56.377000
|
CVE-2024-34449,0,0,24c537d2cf9215e7f09318a469a30752a9e17b9c5c5ae725d1583657f8eba5f3,2024-05-06T12:44:56.377000
|
||||||
CVE-2024-3445,0,0,c9628f9221624aa27cf7f5ca164e4ed34c93be648ba2ac6a84e0908c02d87fc9,2024-04-11T01:26:03.137000
|
CVE-2024-3445,0,0,c9628f9221624aa27cf7f5ca164e4ed34c93be648ba2ac6a84e0908c02d87fc9,2024-04-11T01:26:03.137000
|
||||||
CVE-2024-34453,0,0,5da0d4c8fa5172c0606affa6991cff2d5ad5006dd04be79361a4961f0a5a4112,2024-05-06T12:44:56.377000
|
CVE-2024-34453,0,0,5da0d4c8fa5172c0606affa6991cff2d5ad5006dd04be79361a4961f0a5a4112,2024-05-06T12:44:56.377000
|
||||||
CVE-2024-34455,0,1,c62a91bb162e764fd7071791775662b012da343b0768a1a106502210378ab16a,2024-05-07T12:15:09.747000
|
CVE-2024-34455,0,0,c62a91bb162e764fd7071791775662b012da343b0768a1a106502210378ab16a,2024-05-07T12:15:09.747000
|
||||||
CVE-2024-3446,0,0,d41b6ff09ba21a5a975268b5a0441447c6b2bcfd6bedfe0914b9c96867cd290f,2024-04-18T08:15:38.340000
|
CVE-2024-3446,0,0,d41b6ff09ba21a5a975268b5a0441447c6b2bcfd6bedfe0914b9c96867cd290f,2024-04-18T08:15:38.340000
|
||||||
CVE-2024-34460,0,0,60e094b8fea98a1e6c2d84a5c3e79aa2608a4215bbc69ee3d50736a9170ecb62,2024-05-06T12:44:56.377000
|
CVE-2024-34460,0,0,60e094b8fea98a1e6c2d84a5c3e79aa2608a4215bbc69ee3d50736a9170ecb62,2024-05-06T12:44:56.377000
|
||||||
CVE-2024-34461,0,0,3644faf8cb5166658e9f89c472700c7639846808287959d2eb6d40da466508d1,2024-05-06T12:44:56.377000
|
CVE-2024-34461,0,0,3644faf8cb5166658e9f89c472700c7639846808287959d2eb6d40da466508d1,2024-05-06T12:44:56.377000
|
||||||
@ -248349,14 +248369,15 @@ CVE-2024-34510,0,0,c138a041eb79436b7de1c3b83e6398f2cca519d06db1d89f8e56261c2f134
|
|||||||
CVE-2024-34511,0,0,a745a802193c49ede413f08dfe649e6d8af96591b11565b9629a902fd64f729e,2024-05-06T12:44:56.377000
|
CVE-2024-34511,0,0,a745a802193c49ede413f08dfe649e6d8af96591b11565b9629a902fd64f729e,2024-05-06T12:44:56.377000
|
||||||
CVE-2024-34515,0,0,441befe9d7895975a107d349ce498a32367020a3c4dfee18c54aff40defe61ba,2024-05-06T12:44:56.377000
|
CVE-2024-34515,0,0,441befe9d7895975a107d349ce498a32367020a3c4dfee18c54aff40defe61ba,2024-05-06T12:44:56.377000
|
||||||
CVE-2024-34519,0,0,dc55bf4efdc02447b88606effbca2705017883549b899ce04066550f5ba0192a,2024-05-06T12:44:56.377000
|
CVE-2024-34519,0,0,dc55bf4efdc02447b88606effbca2705017883549b899ce04066550f5ba0192a,2024-05-06T12:44:56.377000
|
||||||
|
CVE-2024-34523,1,1,9c01465a3a70b18156aaf37eb09d11209cf9596ff8e8bfe6f99c9c639f415055,2024-05-07T15:15:09.930000
|
||||||
CVE-2024-34524,0,0,d417e5a0d59b38b90abb8bf99fa8b826de53fcdc98b24be237ef86e8f5a71704,2024-05-06T12:44:56.377000
|
CVE-2024-34524,0,0,d417e5a0d59b38b90abb8bf99fa8b826de53fcdc98b24be237ef86e8f5a71704,2024-05-06T12:44:56.377000
|
||||||
CVE-2024-34525,0,0,47b03a3cb11dba60daef24d345e95f0ce48a6514d3d6c91b75b0b1ba043b0755,2024-05-06T12:44:56.377000
|
CVE-2024-34525,0,0,47b03a3cb11dba60daef24d345e95f0ce48a6514d3d6c91b75b0b1ba043b0755,2024-05-06T12:44:56.377000
|
||||||
CVE-2024-34527,0,0,d1b19e0463b4b5732ec21b94042db824362fcc949c5cf728b91e262225191d66,2024-05-06T12:44:56.377000
|
CVE-2024-34527,0,0,d1b19e0463b4b5732ec21b94042db824362fcc949c5cf728b91e262225191d66,2024-05-06T12:44:56.377000
|
||||||
CVE-2024-34528,0,0,ca5f9116c6b755deee8a1d55c8d870549125fec04f55c0df98aac91e67527b2e,2024-05-06T12:44:56.377000
|
CVE-2024-34528,0,0,ca5f9116c6b755deee8a1d55c8d870549125fec04f55c0df98aac91e67527b2e,2024-05-06T12:44:56.377000
|
||||||
CVE-2024-34529,0,0,513f9f96810a2d252b2d86f77a6ce296918ff9f2567069a0db024109e56c5976,2024-05-06T12:44:56.377000
|
CVE-2024-34529,0,0,513f9f96810a2d252b2d86f77a6ce296918ff9f2567069a0db024109e56c5976,2024-05-06T12:44:56.377000
|
||||||
CVE-2024-34532,0,1,d9b4420ad130ffd345b42ea32943d3ea85ac93b28aeef2c295a30cff870d635c,2024-05-07T13:39:32.710000
|
CVE-2024-34532,0,0,d9b4420ad130ffd345b42ea32943d3ea85ac93b28aeef2c295a30cff870d635c,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-34533,0,1,fed7485b3815bc732c1be42f2d650622d72077ebf51ccbf0574f1a6ca151164a,2024-05-07T13:39:32.710000
|
CVE-2024-34533,0,0,fed7485b3815bc732c1be42f2d650622d72077ebf51ccbf0574f1a6ca151164a,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-34534,0,1,5b41ae364cb5686db0e61f768f78dbb771742090e9171960a6e9b0a284823916,2024-05-07T13:39:32.710000
|
CVE-2024-34534,0,0,5b41ae364cb5686db0e61f768f78dbb771742090e9171960a6e9b0a284823916,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-34538,0,0,ad2e465bd4501134b8655c84262a62a1ec8a7e4ecf43c5e35b8118420879cc3c,2024-05-06T12:44:56.377000
|
CVE-2024-34538,0,0,ad2e465bd4501134b8655c84262a62a1ec8a7e4ecf43c5e35b8118420879cc3c,2024-05-06T12:44:56.377000
|
||||||
CVE-2024-3455,0,0,18e948f1ff2182718852b2ba697f0fa9a8598811bb1c2e87509c3bd543b90a57,2024-04-11T01:26:03.233000
|
CVE-2024-3455,0,0,18e948f1ff2182718852b2ba697f0fa9a8598811bb1c2e87509c3bd543b90a57,2024-04-11T01:26:03.233000
|
||||||
CVE-2024-3456,0,0,944b33373fddc7621692e3fce6708723c7abc962139d88da65ad0c4ce610f104,2024-04-11T01:26:03.310000
|
CVE-2024-3456,0,0,944b33373fddc7621692e3fce6708723c7abc962139d88da65ad0c4ce610f104,2024-04-11T01:26:03.310000
|
||||||
@ -248457,7 +248478,7 @@ CVE-2024-3622,0,0,8a36012169667d948c0b90aa74b5439b232e5ac011c2df4d1ba7f1e8b3410d
|
|||||||
CVE-2024-3623,0,0,9044a03f32811b426f24d5347da98fbfdb67f97317f2e90baed487a2da0b464c,2024-04-26T12:58:17.720000
|
CVE-2024-3623,0,0,9044a03f32811b426f24d5347da98fbfdb67f97317f2e90baed487a2da0b464c,2024-04-26T12:58:17.720000
|
||||||
CVE-2024-3624,0,0,e0ac19607b4c8d1214127703973418b820b7283270ffca198194137ef8f4191a,2024-04-26T12:58:17.720000
|
CVE-2024-3624,0,0,e0ac19607b4c8d1214127703973418b820b7283270ffca198194137ef8f4191a,2024-04-26T12:58:17.720000
|
||||||
CVE-2024-3625,0,0,bb7fa72c43d725aef9f66641f31c3359a614ed8ba414acf9f05b8e44148cef81,2024-04-26T12:58:17.720000
|
CVE-2024-3625,0,0,bb7fa72c43d725aef9f66641f31c3359a614ed8ba414acf9f05b8e44148cef81,2024-04-26T12:58:17.720000
|
||||||
CVE-2024-3628,0,1,8f121caf10c5aa64c1102fac83294f4969f49de2ec79b7438a238040e55ba25e,2024-05-07T13:39:32.710000
|
CVE-2024-3628,0,1,ad2a38a3d431944b5239dd67ace3bcd2603e3057c8d0a04d847db45516b0c9ea,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-3637,0,0,22cd3d6efad3fe2c302e0ada66b5da05c991e8a68aae7c8c5cbad701e10a3484,2024-05-03T12:48:41.067000
|
CVE-2024-3637,0,0,22cd3d6efad3fe2c302e0ada66b5da05c991e8a68aae7c8c5cbad701e10a3484,2024-05-03T12:48:41.067000
|
||||||
CVE-2024-3645,0,0,9bfaa42192c6fa49951fba1d7645fb7975d3a2b4cd9bcc55a7dd9ceef33e077c,2024-04-22T19:24:12.920000
|
CVE-2024-3645,0,0,9bfaa42192c6fa49951fba1d7645fb7975d3a2b4cd9bcc55a7dd9ceef33e077c,2024-04-22T19:24:12.920000
|
||||||
CVE-2024-3646,0,0,f1ba7615d07aeacaca9371aa5a68bf3033db9a231eaf2716a6cbfd3f340bcd58,2024-04-19T16:19:49.043000
|
CVE-2024-3646,0,0,f1ba7615d07aeacaca9371aa5a68bf3033db9a231eaf2716a6cbfd3f340bcd58,2024-04-19T16:19:49.043000
|
||||||
@ -248526,9 +248547,9 @@ CVE-2024-3747,0,0,7d9f76a0b00dda2450be7453047de386dc88bdd58855be8a05089d3c9c6f1f
|
|||||||
CVE-2024-3752,0,0,3b8c2287d488264d2226cc79c4669713ff7333060b5a327eae3c0502197f7531,2024-05-06T12:44:56.377000
|
CVE-2024-3752,0,0,3b8c2287d488264d2226cc79c4669713ff7333060b5a327eae3c0502197f7531,2024-05-06T12:44:56.377000
|
||||||
CVE-2024-3755,0,0,a3840cfae2b8b48da33739aeda3d1d13951c8010f3b55f1ea4e95af38154a4be,2024-05-06T12:44:56.377000
|
CVE-2024-3755,0,0,a3840cfae2b8b48da33739aeda3d1d13951c8010f3b55f1ea4e95af38154a4be,2024-05-06T12:44:56.377000
|
||||||
CVE-2024-3756,0,0,3e2af0f622528b24cb6f6c9f16defba4a832347684bf8edaa795cc14aee30554,2024-05-06T12:44:56.377000
|
CVE-2024-3756,0,0,3e2af0f622528b24cb6f6c9f16defba4a832347684bf8edaa795cc14aee30554,2024-05-06T12:44:56.377000
|
||||||
CVE-2024-3757,0,1,2e3730d24d1473d3d4cb79982dc34114b234144990afc0b8d6857bab780c4469,2024-05-07T13:39:32.710000
|
CVE-2024-3757,0,1,62301a2775fcbfb9e8b5b1aa90b79aa074cd639699f2863765d338333af4b798,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-3758,0,1,026bc66053a27b646475f6e5176a3ac95ff86ab7f4f9613bcb8871ee22b57948,2024-05-07T13:39:32.710000
|
CVE-2024-3758,0,1,3ea9ecbea279ca1eb1159e542db09b1cab2d2435be79c6a6a563dc4d73ca4285,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-3759,0,1,a3b49886194b34205d645040328f5ec99890367459b8949ab5be47fc57223437,2024-05-07T13:39:32.710000
|
CVE-2024-3759,0,1,20211226ea875c33805e71e9c0afa18c7ce1ad112702c8859afd48ee84347f62,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-3762,0,0,8786cfd326f85cef30984c56459dfc9fe93a76e6338c27d090dd8d173488b8b0,2024-04-15T13:15:31.997000
|
CVE-2024-3762,0,0,8786cfd326f85cef30984c56459dfc9fe93a76e6338c27d090dd8d173488b8b0,2024-04-15T13:15:31.997000
|
||||||
CVE-2024-3763,0,0,1eebac5877c8c886e0c3f8814e0dc9f66bf992c6afa583c2dc485461fb17eebd,2024-04-15T13:15:31.997000
|
CVE-2024-3763,0,0,1eebac5877c8c886e0c3f8814e0dc9f66bf992c6afa583c2dc485461fb17eebd,2024-04-15T13:15:31.997000
|
||||||
CVE-2024-3764,0,0,bc0166392f0fa682ac423224b68b272d1fbe64e8573563127fc316656ba68a89,2024-04-16T07:15:13.437000
|
CVE-2024-3764,0,0,bc0166392f0fa682ac423224b68b272d1fbe64e8573563127fc316656ba68a89,2024-04-16T07:15:13.437000
|
||||||
@ -248719,7 +248740,7 @@ CVE-2024-4175,0,0,60706a95032c3b7b71280c12c10b7cdce6a73ddf5468ef6a0d21aafa3328ee
|
|||||||
CVE-2024-4182,0,0,e7bfd5d03ac4e50248987fdc4c50fca364e9bca2384ff17427febaa9cba5bb33,2024-04-26T12:58:17.720000
|
CVE-2024-4182,0,0,e7bfd5d03ac4e50248987fdc4c50fca364e9bca2384ff17427febaa9cba5bb33,2024-04-26T12:58:17.720000
|
||||||
CVE-2024-4183,0,0,ccc399a2445bf78d9e7d0cacf88ee6d06233217c2d933caf866c50fd88c63c71,2024-04-26T12:58:17.720000
|
CVE-2024-4183,0,0,ccc399a2445bf78d9e7d0cacf88ee6d06233217c2d933caf866c50fd88c63c71,2024-04-26T12:58:17.720000
|
||||||
CVE-2024-4185,0,0,4997c26f83a14bd54a98f3da542941a3f7d6c6c6777c0f0d023281d709e1d844,2024-04-30T13:11:16.690000
|
CVE-2024-4185,0,0,4997c26f83a14bd54a98f3da542941a3f7d6c6c6777c0f0d023281d709e1d844,2024-04-30T13:11:16.690000
|
||||||
CVE-2024-4186,0,1,2f2c57d522ba5b50628130977857372708a7bd282ecd1042a747663d043205a6,2024-05-07T13:39:32.710000
|
CVE-2024-4186,0,1,c459d76d4346b2737077f5ae7b0a1b0ace4353328a79efd93c790decc23cc54f,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-4192,0,0,d6751fa9142aaa91446de5baa4aa2b6db344761a0aff4ab695cf6603148e6a9a,2024-05-01T13:02:20.750000
|
CVE-2024-4192,0,0,d6751fa9142aaa91446de5baa4aa2b6db344761a0aff4ab695cf6603148e6a9a,2024-05-01T13:02:20.750000
|
||||||
CVE-2024-4195,0,0,320e8c641dbb71fd3a637ea44d2a1260b2aea61b9d12f44c9e97c80bff500815,2024-04-26T12:58:17.720000
|
CVE-2024-4195,0,0,320e8c641dbb71fd3a637ea44d2a1260b2aea61b9d12f44c9e97c80bff500815,2024-04-26T12:58:17.720000
|
||||||
CVE-2024-4198,0,0,845a410de3c7b102462b76b86fccfba72df0a0950e69dc55e9742bae00fec8d9,2024-04-26T12:58:17.720000
|
CVE-2024-4198,0,0,845a410de3c7b102462b76b86fccfba72df0a0950e69dc55e9742bae00fec8d9,2024-04-26T12:58:17.720000
|
||||||
@ -248776,8 +248797,8 @@ CVE-2024-4334,0,0,d2c55786eb37c22aeaa962eb29c298610af66b07b247fefb5533e21481037f
|
|||||||
CVE-2024-4336,0,0,bea5a7f53013b694022e2bd0018a4064fb0ebf2c6ec290178b3a567f091ff450,2024-04-30T13:11:16.690000
|
CVE-2024-4336,0,0,bea5a7f53013b694022e2bd0018a4064fb0ebf2c6ec290178b3a567f091ff450,2024-04-30T13:11:16.690000
|
||||||
CVE-2024-4337,0,0,08997cb0f3d0ed65aebc3b58ae13b7e381ac12042dd4375a545df1f240dc7b83,2024-04-30T13:11:16.690000
|
CVE-2024-4337,0,0,08997cb0f3d0ed65aebc3b58ae13b7e381ac12042dd4375a545df1f240dc7b83,2024-04-30T13:11:16.690000
|
||||||
CVE-2024-4340,0,0,cc413663d0b28645506d2728a6df6437d317b717b85c09519211319a2c38a0e2,2024-04-30T17:52:35.057000
|
CVE-2024-4340,0,0,cc413663d0b28645506d2728a6df6437d317b717b85c09519211319a2c38a0e2,2024-04-30T17:52:35.057000
|
||||||
CVE-2024-4345,0,1,f34e556567faaa754024403a92599953f3467ad2d03139f9359f3e798c0070c9,2024-05-07T13:39:32.710000
|
CVE-2024-4345,0,1,f00f50139993a52fd7c5e9953c5559186f91d77a99990283e2fa9024cdbc8333,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-4346,0,1,5cab2db18282085ab0cb83d37ffdf2bf648794f7b00382d9f16065c41620ccd1,2024-05-07T13:39:32.710000
|
CVE-2024-4346,0,1,f22ab2b57ab7913e1ee849412772d79e861a170867683be7f674b4f4c1e4df02,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-4348,0,0,58c372bcfdfd13a40dcad9095bf019969258123c09df37a486f5ad5f3ede8e4f,2024-05-01T13:02:20.750000
|
CVE-2024-4348,0,0,58c372bcfdfd13a40dcad9095bf019969258123c09df37a486f5ad5f3ede8e4f,2024-05-01T13:02:20.750000
|
||||||
CVE-2024-4349,0,0,f37ccdd1092fa74fa2c30a0fd9ee697b77c3abde136f8542413ea2c7851c4bb8,2024-05-06T14:15:08.090000
|
CVE-2024-4349,0,0,f37ccdd1092fa74fa2c30a0fd9ee697b77c3abde136f8542413ea2c7851c4bb8,2024-05-06T14:15:08.090000
|
||||||
CVE-2024-4368,0,0,0ee02ebde276d817508f5495294b3429c463a1f4241660388e0c329992e72be6,2024-05-04T02:15:06.853000
|
CVE-2024-4368,0,0,0ee02ebde276d817508f5495294b3429c463a1f4241660388e0c329992e72be6,2024-05-04T02:15:06.853000
|
||||||
@ -248823,21 +248844,27 @@ CVE-2024-4525,0,0,fec7346bfe6a0a659c359f751d3de5ef45d3f22d169ce3cdb4356d5ad2cad8
|
|||||||
CVE-2024-4526,0,0,cc7912fe528d3a419c138bcd5341c693816e62d16c0baadf4a5615a547fa0e1e,2024-05-06T12:44:56.377000
|
CVE-2024-4526,0,0,cc7912fe528d3a419c138bcd5341c693816e62d16c0baadf4a5615a547fa0e1e,2024-05-06T12:44:56.377000
|
||||||
CVE-2024-4527,0,0,934eed00f5a6845863bd7a3d14c3476fd2d41f7025ec36c7327276b14006fee8,2024-05-06T12:44:56.377000
|
CVE-2024-4527,0,0,934eed00f5a6845863bd7a3d14c3476fd2d41f7025ec36c7327276b14006fee8,2024-05-06T12:44:56.377000
|
||||||
CVE-2024-4528,0,0,36dcc8b8b66fc0f90a0b262a3028f956c42e37c806a1123835953924f58fffe5,2024-05-06T12:44:56.377000
|
CVE-2024-4528,0,0,36dcc8b8b66fc0f90a0b262a3028f956c42e37c806a1123835953924f58fffe5,2024-05-06T12:44:56.377000
|
||||||
CVE-2024-4536,1,1,df0ccf281761acbc6c5357983e1b96c847d15ec791372db49ef3680f37c21bde,2024-05-07T13:39:32.710000
|
CVE-2024-4536,0,1,6d02ed0759b0f2029154ac1e9fa623fe4e250972d7d12c9e4f8d0247100613d5,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-4537,1,1,f9525170aaf4fa5d26daed93759c2be2b3d43a7ac11ec21f6f6c860be5c13780,2024-05-07T13:39:32.710000
|
CVE-2024-4537,0,1,bc82aa6954c5799b0476dc279149a81ab940e42aa35e918500f89f663af922c5,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-4538,1,1,ebe7955bae618829b08cc6f1eacecca8be8a6f64d04a6deade73c04be3b6fe29,2024-05-07T13:39:32.710000
|
CVE-2024-4538,0,1,dbb952ff57fc82a37e26bc4eac10a9f198285e190e0ce1d17eb40564657c4b33,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-4547,0,0,56470b9434f2725c00dfd9ee62f975ef4bfc22f18b14f8aed962b18c333ab6c0,2024-05-06T16:00:59.253000
|
CVE-2024-4547,0,0,56470b9434f2725c00dfd9ee62f975ef4bfc22f18b14f8aed962b18c333ab6c0,2024-05-06T16:00:59.253000
|
||||||
CVE-2024-4548,0,0,11b46ed29382c99da745482bdfcdacd655637cd95de07a1656d3fb9ac7c4dbd1,2024-05-06T16:00:59.253000
|
CVE-2024-4548,0,0,11b46ed29382c99da745482bdfcdacd655637cd95de07a1656d3fb9ac7c4dbd1,2024-05-06T16:00:59.253000
|
||||||
CVE-2024-4549,0,0,6e3cb93e17192899fa37dff35241dc11d5390bcb4fff79238246d111b471c30f,2024-05-06T21:15:48.783000
|
CVE-2024-4549,0,0,6e3cb93e17192899fa37dff35241dc11d5390bcb4fff79238246d111b471c30f,2024-05-06T21:15:48.783000
|
||||||
CVE-2024-4568,0,1,79c6e65478e2e86d702896e792fead76bbebdb118f8c0f66e6390a241a22321a,2024-05-07T13:39:32.710000
|
CVE-2024-4568,0,0,79c6e65478e2e86d702896e792fead76bbebdb118f8c0f66e6390a241a22321a,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-4582,0,1,b7c2a49a3134eb9d3f36ded2458af296b46c55bf2e016ce639ee7c41cd43bae5,2024-05-07T13:39:32.710000
|
CVE-2024-4582,0,1,5cd56e21b40b166c29ee260f4ded179be026a0ecc50535347a4fd31993c23c36,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-4583,0,1,9edb314948285e7fe9829d40ab06a819a5825203a22fcd62e9644d5b8411bd62,2024-05-07T13:39:32.710000
|
CVE-2024-4583,0,1,4a644a30c01a98a0fcdadfb78e2bd1c6842d9a5fcf9ec5c0351f9f1539b0ead7,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-4584,1,1,8a5e5f77f92d660d5f3bd3475dec8caf68ec4179055a0fcc2f82a0dfb1ac1079,2024-05-07T13:39:32.710000
|
CVE-2024-4584,0,1,5ffe086d27e0f5caa665e2531a2697bb8e37e2c32e33db351779fbbc3358327c,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-4585,1,1,e22e7d7850ce29794d5ad9683c35b869451774644518d09cb93389dd2337636c,2024-05-07T13:39:32.710000
|
CVE-2024-4585,0,1,49360dd764ba21ea28d42519ac841829f157a76a4d8490fb7956e27f6b39b3e8,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-4586,1,1,f32ec776dc833ab19d98f20cd53f505c0c9320603c78623d529cb82c3b43f769,2024-05-07T13:39:32.710000
|
CVE-2024-4586,0,1,049a33ffa3d3d83485facbf3fa75da9694447c6fcb68727ecd0ec9dff4297deb,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-4587,1,1,76ebe890a3e836dc91e6853eab14bee7d868d227912cb95ba8932ea2b2ed9058,2024-05-07T13:39:32.710000
|
CVE-2024-4587,0,1,f71d02d1347059cb40434b40fdb4ab6f4e2c47a12b26b28b2760532b37961e32,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-4588,1,1,b8d967221e835069f0c1b11111ddf71543b8c086bf51ea0ac10a2f853487aa45,2024-05-07T13:39:32.710000
|
CVE-2024-4588,0,1,af706a56d97772ee71c3c2907c758707a365ef550d5ebff974d479ca27adaaa9,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-4589,1,1,f83c362b46f7d6c14bea4729f709ffbe7af76217ed34ce930294dc0dd6aadc55,2024-05-07T13:39:32.710000
|
CVE-2024-4589,0,1,1b5e9718f5b37fa98a617a771a596c9447fedc13d9048938ad95077fe1059931,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-4599,0,1,5bdf40d9d16eda8e3c5b51ce4d5106f270ac89ffce0afe04201bc59e04b4ee88,2024-05-07T13:39:32.710000
|
CVE-2024-4590,1,1,98b558cad237e7397f39c3ecd6307628d88978c3d6a806800715cea83a41c971,2024-05-07T14:15:11.050000
|
||||||
CVE-2024-4600,1,1,a60534dd0ec93d29d75eae53f678e7490e66bf912ae9a2da375a7cef304b4ab8,2024-05-07T13:39:32.710000
|
CVE-2024-4591,1,1,505f206e83572b0aceef4a362530b9cb9eba18087a17a379ba7912d44bf9c8cd,2024-05-07T14:15:11.277000
|
||||||
CVE-2024-4601,1,1,43a982f8666a3d1fd9282a88b9ffd85df9905e0624d92099ae6d9a74a56fa37e,2024-05-07T13:39:32.710000
|
CVE-2024-4592,1,1,cbb611439d75710490602298c90c0c9f44c9233bc1143e2c1d76fd73262342d5,2024-05-07T14:15:11.510000
|
||||||
|
CVE-2024-4593,1,1,cf3c6a789cccf30d4f1e235b26bf7083865fa815934d94586b89a1aafe3b80b0,2024-05-07T14:15:11.747000
|
||||||
|
CVE-2024-4594,1,1,49a39b0efa6669fdcb807e7f151ddae1ee2ef7abe70ba6ed5a34954f6a3d81d5,2024-05-07T15:15:10.040000
|
||||||
|
CVE-2024-4595,1,1,aa10098a1ca0c8e5863b2a5e7b8f742f83bf109d43a045f4259c64f8b0539dbd,2024-05-07T15:15:10.273000
|
||||||
|
CVE-2024-4599,0,1,7a2dd9d366beb25d47b0c05043c7c832d7abfddbca078d457eae393ffc0c13b9,2024-05-07T13:39:32.710000
|
||||||
|
CVE-2024-4600,0,1,34514a912341a00b4dd13ba9bc66d0fe1a7a1cb8661452904cea5e1c3463f08f,2024-05-07T13:39:32.710000
|
||||||
|
CVE-2024-4601,0,1,9e1e1f008012e98662e601d1d10e65eeb89abb9d2b4ea828e06c076d042c7c66,2024-05-07T13:39:32.710000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user