mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-05-03T10:00:38.143835+00:00
This commit is contained in:
parent
d0c1e590cf
commit
6d32aa6193
55
CVE-2023/CVE-2023-254xx/CVE-2023-25457.json
Normal file
55
CVE-2023/CVE-2023-254xx/CVE-2023-25457.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-25457",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-05-03T08:15:06.603",
|
||||||
|
"lastModified": "2024-05-03T08:15:06.603",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Missing Authorization vulnerability in Richteam Slider Carousel \u2013 Responsive Image Slider.This issue affects Slider Carousel \u2013 Responsive Image Slider: from n/a through 1.5.1.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/slider-images/wordpress-slider-carousel-responsive-image-slider-plugin-1-5-0-broken-access-control-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-31211",
|
"id": "CVE-2023-31211",
|
||||||
"sourceIdentifier": "security@checkmk.com",
|
"sourceIdentifier": "security@checkmk.com",
|
||||||
"published": "2024-01-12T08:15:43.137",
|
"published": "2024-01-12T08:15:43.137",
|
||||||
"lastModified": "2024-01-19T02:09:26.650",
|
"lastModified": "2024-05-03T09:15:07.230",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -41,20 +41,20 @@
|
|||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
"attackVector": "LOCAL",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"privilegesRequired": "LOW",
|
"privilegesRequired": "LOW",
|
||||||
"userInteraction": "NONE",
|
"userInteraction": "NONE",
|
||||||
"scope": "CHANGED",
|
"scope": "UNCHANGED",
|
||||||
"confidentialityImpact": "HIGH",
|
"confidentialityImpact": "HIGH",
|
||||||
"integrityImpact": "HIGH",
|
"integrityImpact": "HIGH",
|
||||||
"availabilityImpact": "HIGH",
|
"availabilityImpact": "HIGH",
|
||||||
"baseScore": 8.8,
|
"baseScore": 8.8,
|
||||||
"baseSeverity": "HIGH"
|
"baseSeverity": "HIGH"
|
||||||
},
|
},
|
||||||
"exploitabilityScore": 2.0,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 6.0
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
32
CVE-2023/CVE-2023-357xx/CVE-2023-35701.json
Normal file
32
CVE-2023/CVE-2023-357xx/CVE-2023-35701.json
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-35701",
|
||||||
|
"sourceIdentifier": "security@apache.org",
|
||||||
|
"published": "2024-05-03T09:15:07.587",
|
||||||
|
"lastModified": "2024-05-03T09:15:07.587",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Hive.\n\nThe vulnerability affects the Hive JDBC driver component and it can potentially lead to arbitrary code execution on the machine/endpoint that the JDBC driver (client) is running. The malicious user must have sufficient permissions to specify/edit JDBC URL(s) in an endpoint relying on the Hive JDBC driver and the JDBC client process must run under a privileged user to fully exploit the vulnerability.\u00a0\n\nThe attacker can setup a malicious HTTP server and specify a JDBC URL pointing towards this server. When a JDBC connection is attempted, the malicious HTTP server can provide a special response with customized payload that can trigger the execution of certain commands in the JDBC client.This issue affects Apache Hive: from 4.0.0-alpha-1 before 4.0.0.\n\nUsers are recommended to upgrade to version 4.0.0, which fixes the issue.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@apache.org",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://lists.apache.org/thread/7zcv6l63spl4r66xwz5jv9rtrg2opx81",
|
||||||
|
"source": "security@apache.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2023/CVE-2023-444xx/CVE-2023-44472.json
Normal file
55
CVE-2023/CVE-2023-444xx/CVE-2023-44472.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-44472",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-05-03T08:15:06.850",
|
||||||
|
"lastModified": "2024-05-03T08:15:06.850",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Missing Authorization vulnerability in ThemeFuse Unyson.This issue affects Unyson: from n/a through 2.7.28.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/unyson/wordpress-unyson-plugin-2-7-28-broken-access-control-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-239xx/CVE-2024-23912.json
Normal file
55
CVE-2024/CVE-2024-239xx/CVE-2024-23912.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-23912",
|
||||||
|
"sourceIdentifier": "prodsec@nozominetworks.com",
|
||||||
|
"published": "2024-05-03T09:15:07.737",
|
||||||
|
"lastModified": "2024-05-03T09:15:07.737",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Out-of-bounds Read vulnerability in Merge DICOM Toolkit C/C++ on Windows.\n\nWhen MC_Open_File() function is used to read a malformed DICOM data, it might result in over-reading memory buffer and could cause memory access violation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@nozominetworks.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 4.0,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.5,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@nozominetworks.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-125"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-23912",
|
||||||
|
"source": "prodsec@nozominetworks.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
43
CVE-2024/CVE-2024-239xx/CVE-2024-23913.json
Normal file
43
CVE-2024/CVE-2024-239xx/CVE-2024-23913.json
Normal file
@ -0,0 +1,43 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-23913",
|
||||||
|
"sourceIdentifier": "prodsec@nozominetworks.com",
|
||||||
|
"published": "2024-05-03T09:15:07.920",
|
||||||
|
"lastModified": "2024-05-03T09:15:07.920",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Use of Out-of-range Pointer Offset vulnerability in Merge DICOM Toolkit C/C++ on Windows.\n\nWhen deprecated MC_XML_To_Message() function is used to read a malformed DICOM XML file, it might result in memory access violation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@nozominetworks.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 4.0,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.5,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-23913",
|
||||||
|
"source": "prodsec@nozominetworks.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-239xx/CVE-2024-23914.json
Normal file
55
CVE-2024/CVE-2024-239xx/CVE-2024-23914.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-23914",
|
||||||
|
"sourceIdentifier": "prodsec@nozominetworks.com",
|
||||||
|
"published": "2024-05-03T09:15:08.090",
|
||||||
|
"lastModified": "2024-05-03T09:15:08.090",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Use of Externally-Controlled Format String vulnerability in Merge DICOM Toolkit C/C++ on Windows.\n\nWhen MC_Open_Association() function is used to open DICOM Association and gets DICOM Application Context Name with illegal characters, it might result in an unhandled exception."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@nozominetworks.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "ADJACENT_NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.7,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@nozominetworks.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-134"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-23914",
|
||||||
|
"source": "prodsec@nozominetworks.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-247xx/CVE-2024-24710.json
Normal file
55
CVE-2024/CVE-2024-247xx/CVE-2024-24710.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-24710",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-05-03T08:15:07.033",
|
||||||
|
"lastModified": "2024-05-03T08:15:07.033",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Missing Authorization vulnerability in SlickRemix Feed Them Social.This issue affects Feed Them Social: from n/a through 4.2.0.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/feed-them-social/wordpress-feed-them-social-plugin-4-2-0-broken-access-control-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
59
CVE-2024/CVE-2024-280xx/CVE-2024-28072.json
Normal file
59
CVE-2024/CVE-2024-280xx/CVE-2024-28072.json
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28072",
|
||||||
|
"sourceIdentifier": "psirt@solarwinds.com",
|
||||||
|
"published": "2024-05-03T08:15:07.217",
|
||||||
|
"lastModified": "2024-05-03T08:15:07.217",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A highly privileged account can overwrite arbitrary files on the system with log output. The log file path tags were not sanitized properly. \n\n\n\n\n\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@solarwinds.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L",
|
||||||
|
"attackVector": "ADJACENT_NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.7,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.9,
|
||||||
|
"impactScore": 4.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@solarwinds.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-532"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://solarwindscore.my.site.com/SuccessCenter/s/article/Serv-U-15-4-2-Hotfix-1-Release-Notes?language=en_US",
|
||||||
|
"source": "psirt@solarwinds.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28072",
|
||||||
|
"source": "psirt@solarwinds.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-328xx/CVE-2024-32810.json
Normal file
55
CVE-2024/CVE-2024-328xx/CVE-2024-32810.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-32810",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-05-03T08:15:07.430",
|
||||||
|
"lastModified": "2024-05-03T08:15:07.430",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Missing Authorization vulnerability in ShortPixel ShortPixel Critical CSS.This issue affects ShortPixel Critical CSS: from n/a through 1.0.2.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 7.6,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 4.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/shortpixel-critical-css/wordpress-shortpixel-critical-css-plugin-1-0-2-broken-access-control-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-328xx/CVE-2024-32831.json
Normal file
55
CVE-2024/CVE-2024-328xx/CVE-2024-32831.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-32831",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-05-03T08:15:07.713",
|
||||||
|
"lastModified": "2024-05-03T08:15:07.713",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Lorna Timbah (webgrrrl) Accessibility Widget allows Stored XSS.This issue affects Accessibility Widget: from n/a through 2.2.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 3.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/accessibility-widget/wordpress-accessibility-widget-plugin-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-339xx/CVE-2024-33914.json
Normal file
55
CVE-2024/CVE-2024-339xx/CVE-2024-33914.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33914",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-05-03T09:15:08.257",
|
||||||
|
"lastModified": "2024-05-03T09:15:08.257",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Missing Authorization vulnerability in Exclusive Addons Exclusive Addons Elementor.This issue affects Exclusive Addons Elementor: from n/a through 2.6.9.1.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/exclusive-addons-for-elementor/wordpress-exclusive-addons-for-elementor-plugin-2-6-9-1-broken-access-control-on-post-duplication-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-339xx/CVE-2024-33915.json
Normal file
55
CVE-2024/CVE-2024-339xx/CVE-2024-33915.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33915",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-05-03T09:15:08.443",
|
||||||
|
"lastModified": "2024-05-03T09:15:08.443",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Missing Authorization vulnerability in Bowo Debug Log Manager.This issue affects Debug Log Manager: from n/a through 2.3.1.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/debug-log-manager/wordpress-debug-log-manager-plugin-2-3-1-broken-access-control-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-339xx/CVE-2024-33916.json
Normal file
55
CVE-2024/CVE-2024-339xx/CVE-2024-33916.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33916",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-05-03T08:15:07.930",
|
||||||
|
"lastModified": "2024-05-03T08:15:07.930",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MachoThemes CPO Companion allows Stored XSS.This issue affects CPO Companion: from n/a through 1.1.0.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 3.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/cpo-companion/wordpress-cpo-companion-plugin-1-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-339xx/CVE-2024-33918.json
Normal file
55
CVE-2024/CVE-2024-339xx/CVE-2024-33918.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33918",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-05-03T08:15:08.113",
|
||||||
|
"lastModified": "2024-05-03T08:15:08.113",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Maxim K AJAX Login and Registration modal popup + inline form allows Stored XSS.This issue affects AJAX Login and Registration modal popup + inline form: from n/a through 2.23.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 3.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/ajax-login-and-registration-modal-popup/wordpress-ajax-login-and-registration-modal-popup-inline-form-plugin-2-23-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-339xx/CVE-2024-33919.json
Normal file
55
CVE-2024/CVE-2024-339xx/CVE-2024-33919.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33919",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-05-03T09:15:08.633",
|
||||||
|
"lastModified": "2024-05-03T09:15:08.633",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Missing Authorization vulnerability in Rometheme RomethemeKit For Elementor.This issue affects RomethemeKit For Elementor: from n/a through 1.4.1.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 2.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/rometheme-for-elementor/wordpress-romethemekit-for-elementor-plugin-1-4-1-broken-access-control-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-339xx/CVE-2024-33920.json
Normal file
55
CVE-2024/CVE-2024-339xx/CVE-2024-33920.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33920",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-05-03T09:15:08.827",
|
||||||
|
"lastModified": "2024-05-03T09:15:08.827",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Missing Authorization vulnerability in Kama Democracy Poll.This issue affects Democracy Poll: from n/a through 6.0.3.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/democracy-poll/wordpress-democracy-poll-plugin-6-0-3-broken-access-control-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
43
CVE-2024/CVE-2024-339xx/CVE-2024-33921.json
Normal file
43
CVE-2024/CVE-2024-339xx/CVE-2024-33921.json
Normal file
@ -0,0 +1,43 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33921",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-05-03T09:15:09.020",
|
||||||
|
"lastModified": "2024-05-03T09:15:09.020",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Broken Access Control vulnerability in ReviewX.This issue affects ReviewX: from n/a through 1.6.21.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/reviewx/wordpress-reviewx-plugin-1-6-21-broken-access-control-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-339xx/CVE-2024-33923.json
Normal file
55
CVE-2024/CVE-2024-339xx/CVE-2024-33923.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33923",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-05-03T09:15:09.183",
|
||||||
|
"lastModified": "2024-05-03T09:15:09.183",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Missing Authorization vulnerability in Smartypants SP Project & Document Manager.This issue affects SP Project & Document Manager : from n/a through 4.69.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/sp-client-document-manager/wordpress-sp-project-document-manager-plugin-4-69-broken-access-control-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-339xx/CVE-2024-33924.json
Normal file
55
CVE-2024/CVE-2024-339xx/CVE-2024-33924.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33924",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-05-03T08:15:08.303",
|
||||||
|
"lastModified": "2024-05-03T08:15:08.303",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Realtyna Realtyna Organic IDX plugin allows Reflected XSS.This issue affects Realtyna Organic IDX plugin: from n/a through 4.14.4.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/real-estate-listing-realtyna-wpl/wordpress-realtyna-organic-idx-plugin-wpl-real-estate-plugin-4-14-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-339xx/CVE-2024-33925.json
Normal file
55
CVE-2024/CVE-2024-339xx/CVE-2024-33925.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33925",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-05-03T09:15:09.387",
|
||||||
|
"lastModified": "2024-05-03T09:15:09.387",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Missing Authorization vulnerability in Adrian M\u00f6rchen Embed Google Fonts.This issue affects Embed Google Fonts: from n/a through 3.1.0.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/embed-google-fonts/wordpress-embed-google-fonts-plugin-3-1-0-broken-access-control-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-339xx/CVE-2024-33926.json
Normal file
55
CVE-2024/CVE-2024-339xx/CVE-2024-33926.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33926",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-05-03T08:15:08.490",
|
||||||
|
"lastModified": "2024-05-03T08:15:08.490",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Karl Kiesinger GWP-Histats allows Stored XSS.This issue affects GWP-Histats: from n/a through 1.0.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 3.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/gwp-histats/wordpress-gwp-histats-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-339xx/CVE-2024-33927.json
Normal file
55
CVE-2024/CVE-2024-339xx/CVE-2024-33927.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33927",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-05-03T08:15:08.673",
|
||||||
|
"lastModified": "2024-05-03T08:15:08.673",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Team GIPHY Giphypress allows Stored XSS.This issue affects Giphypress: from n/a through 1.6.2.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 3.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/giphypress/wordpress-giphypress-plugin-1-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-339xx/CVE-2024-33929.json
Normal file
55
CVE-2024/CVE-2024-339xx/CVE-2024-33929.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33929",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-05-03T09:15:09.580",
|
||||||
|
"lastModified": "2024-05-03T09:15:09.580",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Missing Authorization vulnerability in wpWax Directorist.This issue affects Directorist: from n/a through 7.8.6.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/directorist/wordpress-directorist-plugin-7-8-6-broken-access-control-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-339xx/CVE-2024-33931.json
Normal file
55
CVE-2024/CVE-2024-339xx/CVE-2024-33931.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33931",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-05-03T09:15:09.763",
|
||||||
|
"lastModified": "2024-05-03T09:15:09.763",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Missing Authorization vulnerability in ilGhera JW Player for WordPress.This issue affects JW Player for WordPress: from n/a through 2.3.3.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 2.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/jw-player-7-for-wp/wordpress-jw-player-for-wordpress-plugin-2-3-3-broken-access-control-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-339xx/CVE-2024-33937.json
Normal file
55
CVE-2024/CVE-2024-339xx/CVE-2024-33937.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33937",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-05-03T09:15:09.950",
|
||||||
|
"lastModified": "2024-05-03T09:15:09.950",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Missing Authorization vulnerability in Nico Martin Progressive WordPress (PWA).This issue affects Progressive WordPress (PWA): from n/a through 2.1.13.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/progressive-wp/wordpress-progressive-wordpress-pwa-plugin-2-1-13-broken-access-control-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-339xx/CVE-2024-33941.json
Normal file
55
CVE-2024/CVE-2024-339xx/CVE-2024-33941.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-33941",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-05-03T08:15:08.863",
|
||||||
|
"lastModified": "2024-05-03T08:15:08.863",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Missing Authorization vulnerability in Avirtum iPanorama 360 WordPress Virtual Tour Builder.This issue affects iPanorama 360 WordPress Virtual Tour Builder: from n/a through 1.8.1.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/ipanorama-360-virtual-tour-builder-lite/wordpress-ipanorama-360-plugin-1-8-1-broken-access-control-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
72
README.md
72
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-05-03T08:00:38.282086+00:00
|
2024-05-03T10:00:38.143835+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-05-03T07:15:40.610000+00:00
|
2024-05-03T09:15:09.950000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,55 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
248471
|
248497
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `15`
|
Recently added CVEs: `26`
|
||||||
|
|
||||||
- [CVE-2024-33928](CVE-2024/CVE-2024-339xx/CVE-2024-33928.json) (`2024-05-03T07:15:38.507`)
|
- [CVE-2023-35701](CVE-2023/CVE-2023-357xx/CVE-2023-35701.json) (`2024-05-03T09:15:07.587`)
|
||||||
- [CVE-2024-33932](CVE-2024/CVE-2024-339xx/CVE-2024-33932.json) (`2024-05-03T07:15:38.870`)
|
- [CVE-2023-44472](CVE-2023/CVE-2023-444xx/CVE-2023-44472.json) (`2024-05-03T08:15:06.850`)
|
||||||
- [CVE-2024-33934](CVE-2024/CVE-2024-339xx/CVE-2024-33934.json) (`2024-05-03T07:15:39.073`)
|
- [CVE-2024-23912](CVE-2024/CVE-2024-239xx/CVE-2024-23912.json) (`2024-05-03T09:15:07.737`)
|
||||||
- [CVE-2024-33935](CVE-2024/CVE-2024-339xx/CVE-2024-33935.json) (`2024-05-03T07:15:39.283`)
|
- [CVE-2024-23913](CVE-2024/CVE-2024-239xx/CVE-2024-23913.json) (`2024-05-03T09:15:07.920`)
|
||||||
- [CVE-2024-33936](CVE-2024/CVE-2024-339xx/CVE-2024-33936.json) (`2024-05-03T07:15:39.510`)
|
- [CVE-2024-23914](CVE-2024/CVE-2024-239xx/CVE-2024-23914.json) (`2024-05-03T09:15:08.090`)
|
||||||
- [CVE-2024-33940](CVE-2024/CVE-2024-339xx/CVE-2024-33940.json) (`2024-05-03T07:15:39.737`)
|
- [CVE-2024-24710](CVE-2024/CVE-2024-247xx/CVE-2024-24710.json) (`2024-05-03T08:15:07.033`)
|
||||||
- [CVE-2024-33943](CVE-2024/CVE-2024-339xx/CVE-2024-33943.json) (`2024-05-03T07:15:39.960`)
|
- [CVE-2024-28072](CVE-2024/CVE-2024-280xx/CVE-2024-28072.json) (`2024-05-03T08:15:07.217`)
|
||||||
- [CVE-2024-33945](CVE-2024/CVE-2024-339xx/CVE-2024-33945.json) (`2024-05-03T07:15:40.183`)
|
- [CVE-2024-32810](CVE-2024/CVE-2024-328xx/CVE-2024-32810.json) (`2024-05-03T08:15:07.430`)
|
||||||
- [CVE-2024-33946](CVE-2024/CVE-2024-339xx/CVE-2024-33946.json) (`2024-05-03T07:15:40.390`)
|
- [CVE-2024-32831](CVE-2024/CVE-2024-328xx/CVE-2024-32831.json) (`2024-05-03T08:15:07.713`)
|
||||||
- [CVE-2024-33947](CVE-2024/CVE-2024-339xx/CVE-2024-33947.json) (`2024-05-03T07:15:40.610`)
|
- [CVE-2024-33914](CVE-2024/CVE-2024-339xx/CVE-2024-33914.json) (`2024-05-03T09:15:08.257`)
|
||||||
- [CVE-2024-34408](CVE-2024/CVE-2024-344xx/CVE-2024-34408.json) (`2024-05-03T06:15:13.883`)
|
- [CVE-2024-33915](CVE-2024/CVE-2024-339xx/CVE-2024-33915.json) (`2024-05-03T09:15:08.443`)
|
||||||
- [CVE-2024-3637](CVE-2024/CVE-2024-36xx/CVE-2024-3637.json) (`2024-05-03T06:15:14.367`)
|
- [CVE-2024-33916](CVE-2024/CVE-2024-339xx/CVE-2024-33916.json) (`2024-05-03T08:15:07.930`)
|
||||||
- [CVE-2024-3692](CVE-2024/CVE-2024-36xx/CVE-2024-3692.json) (`2024-05-03T06:15:14.590`)
|
- [CVE-2024-33918](CVE-2024/CVE-2024-339xx/CVE-2024-33918.json) (`2024-05-03T08:15:08.113`)
|
||||||
- [CVE-2024-3703](CVE-2024/CVE-2024-37xx/CVE-2024-3703.json) (`2024-05-03T06:15:14.800`)
|
- [CVE-2024-33919](CVE-2024/CVE-2024-339xx/CVE-2024-33919.json) (`2024-05-03T09:15:08.633`)
|
||||||
- [CVE-2024-4439](CVE-2024/CVE-2024-44xx/CVE-2024-4439.json) (`2024-05-03T06:15:14.947`)
|
- [CVE-2024-33920](CVE-2024/CVE-2024-339xx/CVE-2024-33920.json) (`2024-05-03T09:15:08.827`)
|
||||||
|
- [CVE-2024-33921](CVE-2024/CVE-2024-339xx/CVE-2024-33921.json) (`2024-05-03T09:15:09.020`)
|
||||||
|
- [CVE-2024-33923](CVE-2024/CVE-2024-339xx/CVE-2024-33923.json) (`2024-05-03T09:15:09.183`)
|
||||||
|
- [CVE-2024-33924](CVE-2024/CVE-2024-339xx/CVE-2024-33924.json) (`2024-05-03T08:15:08.303`)
|
||||||
|
- [CVE-2024-33925](CVE-2024/CVE-2024-339xx/CVE-2024-33925.json) (`2024-05-03T09:15:09.387`)
|
||||||
|
- [CVE-2024-33926](CVE-2024/CVE-2024-339xx/CVE-2024-33926.json) (`2024-05-03T08:15:08.490`)
|
||||||
|
- [CVE-2024-33927](CVE-2024/CVE-2024-339xx/CVE-2024-33927.json) (`2024-05-03T08:15:08.673`)
|
||||||
|
- [CVE-2024-33929](CVE-2024/CVE-2024-339xx/CVE-2024-33929.json) (`2024-05-03T09:15:09.580`)
|
||||||
|
- [CVE-2024-33931](CVE-2024/CVE-2024-339xx/CVE-2024-33931.json) (`2024-05-03T09:15:09.763`)
|
||||||
|
- [CVE-2024-33937](CVE-2024/CVE-2024-339xx/CVE-2024-33937.json) (`2024-05-03T09:15:09.950`)
|
||||||
|
- [CVE-2024-33941](CVE-2024/CVE-2024-339xx/CVE-2024-33941.json) (`2024-05-03T08:15:08.863`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `21`
|
Recently modified CVEs: `1`
|
||||||
|
|
||||||
- [CVE-2023-52614](CVE-2023/CVE-2023-526xx/CVE-2023-52614.json) (`2024-05-03T06:15:08.503`)
|
- [CVE-2023-31211](CVE-2023/CVE-2023-312xx/CVE-2023-31211.json) (`2024-05-03T09:15:07.230`)
|
||||||
- [CVE-2024-26920](CVE-2024/CVE-2024-269xx/CVE-2024-26920.json) (`2024-05-03T06:15:09.207`)
|
|
||||||
- [CVE-2024-26922](CVE-2024/CVE-2024-269xx/CVE-2024-26922.json) (`2024-05-03T06:15:09.570`)
|
|
||||||
- [CVE-2024-26923](CVE-2024/CVE-2024-269xx/CVE-2024-26923.json) (`2024-05-03T06:15:10.053`)
|
|
||||||
- [CVE-2024-26924](CVE-2024/CVE-2024-269xx/CVE-2024-26924.json) (`2024-05-03T06:15:10.280`)
|
|
||||||
- [CVE-2024-26926](CVE-2024/CVE-2024-269xx/CVE-2024-26926.json) (`2024-05-03T06:15:10.483`)
|
|
||||||
- [CVE-2024-26981](CVE-2024/CVE-2024-269xx/CVE-2024-26981.json) (`2024-05-03T06:15:10.663`)
|
|
||||||
- [CVE-2024-26982](CVE-2024/CVE-2024-269xx/CVE-2024-26982.json) (`2024-05-03T06:15:10.953`)
|
|
||||||
- [CVE-2024-26984](CVE-2024/CVE-2024-269xx/CVE-2024-26984.json) (`2024-05-03T06:15:11.130`)
|
|
||||||
- [CVE-2024-26988](CVE-2024/CVE-2024-269xx/CVE-2024-26988.json) (`2024-05-03T06:15:11.337`)
|
|
||||||
- [CVE-2024-26993](CVE-2024/CVE-2024-269xx/CVE-2024-26993.json) (`2024-05-03T06:15:11.530`)
|
|
||||||
- [CVE-2024-26994](CVE-2024/CVE-2024-269xx/CVE-2024-26994.json) (`2024-05-03T06:15:11.740`)
|
|
||||||
- [CVE-2024-26997](CVE-2024/CVE-2024-269xx/CVE-2024-26997.json) (`2024-05-03T06:15:11.950`)
|
|
||||||
- [CVE-2024-26999](CVE-2024/CVE-2024-269xx/CVE-2024-26999.json) (`2024-05-03T06:15:12.137`)
|
|
||||||
- [CVE-2024-27000](CVE-2024/CVE-2024-270xx/CVE-2024-27000.json) (`2024-05-03T06:15:12.350`)
|
|
||||||
- [CVE-2024-27001](CVE-2024/CVE-2024-270xx/CVE-2024-27001.json) (`2024-05-03T06:15:12.590`)
|
|
||||||
- [CVE-2024-27004](CVE-2024/CVE-2024-270xx/CVE-2024-27004.json) (`2024-05-03T06:15:12.800`)
|
|
||||||
- [CVE-2024-27008](CVE-2024/CVE-2024-270xx/CVE-2024-27008.json) (`2024-05-03T06:15:13.000`)
|
|
||||||
- [CVE-2024-27013](CVE-2024/CVE-2024-270xx/CVE-2024-27013.json) (`2024-05-03T06:15:13.277`)
|
|
||||||
- [CVE-2024-27020](CVE-2024/CVE-2024-270xx/CVE-2024-27020.json) (`2024-05-03T06:15:13.507`)
|
|
||||||
- [CVE-2024-27022](CVE-2024/CVE-2024-270xx/CVE-2024-27022.json) (`2024-05-03T06:15:13.697`)
|
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
100
_state.csv
100
_state.csv
@ -217992,6 +217992,7 @@ CVE-2023-25451,0,0,bf9f65354c0c14c6247ca4f7ffbc13c8f1c663eb328d83c64fc6ef4fc9f28
|
|||||||
CVE-2023-25452,0,0,571ef3748c95bfbe0b203cdf3ffc5b7535ee70d82cfd72e88027c72ee00eeb46,2023-05-10T02:26:18.077000
|
CVE-2023-25452,0,0,571ef3748c95bfbe0b203cdf3ffc5b7535ee70d82cfd72e88027c72ee00eeb46,2023-05-10T02:26:18.077000
|
||||||
CVE-2023-25453,0,0,60471186e0c170cee446cbaa0f4fe3eca3fe1a604dd5df7fc93e2fb25442b2c0,2023-09-01T12:09:39.707000
|
CVE-2023-25453,0,0,60471186e0c170cee446cbaa0f4fe3eca3fe1a604dd5df7fc93e2fb25442b2c0,2023-09-01T12:09:39.707000
|
||||||
CVE-2023-25456,0,0,408499d865f2649a5a437b37da197fa52a399927aa162950e5bbd8727fe58d15,2023-11-07T04:08:58.840000
|
CVE-2023-25456,0,0,408499d865f2649a5a437b37da197fa52a399927aa162950e5bbd8727fe58d15,2023-11-07T04:08:58.840000
|
||||||
|
CVE-2023-25457,1,1,c0229a4d30959c47c34eae5d740cf13de0563946cd3c7c0384fa985d436f62bb,2024-05-03T08:15:06.603000
|
||||||
CVE-2023-25458,0,0,1065fa2b79e67ae65d3a3be77e6869d78ed621dc83197f39f93d1f300f7d61c5,2023-05-08T13:38:48.890000
|
CVE-2023-25458,0,0,1065fa2b79e67ae65d3a3be77e6869d78ed621dc83197f39f93d1f300f7d61c5,2023-05-08T13:38:48.890000
|
||||||
CVE-2023-25459,0,0,b452b828450505952fe00d6bb72761dbdbf71b667f1dd51cd4b90d57aea38cfd,2023-08-10T03:52:36.750000
|
CVE-2023-25459,0,0,b452b828450505952fe00d6bb72761dbdbf71b667f1dd51cd4b90d57aea38cfd,2023-08-10T03:52:36.750000
|
||||||
CVE-2023-2546,0,0,0c9ab6d4260067a910f2654d5f4ba8d79079cf0fe265a6a584c483c68b3635ea,2023-11-07T04:12:51.690000
|
CVE-2023-2546,0,0,0c9ab6d4260067a910f2654d5f4ba8d79079cf0fe265a6a584c483c68b3635ea,2023-11-07T04:12:51.690000
|
||||||
@ -222531,7 +222532,7 @@ CVE-2023-31208,0,0,5734c51815db6b57a8026bf78fa2fd363219f3d8846acb63cc3b1fa2c8f74
|
|||||||
CVE-2023-31209,0,0,265b69c6c647506d4027f23aaf619e8ae4ead2ce4ba1cf17fdeb126549adc09a,2023-08-17T18:46:11.130000
|
CVE-2023-31209,0,0,265b69c6c647506d4027f23aaf619e8ae4ead2ce4ba1cf17fdeb126549adc09a,2023-08-17T18:46:11.130000
|
||||||
CVE-2023-3121,0,0,acc3ea9a35e95881e6fb1a32ac832e4e0495284aeb391e11d047b4fb76b05fbc,2024-04-11T01:21:03.627000
|
CVE-2023-3121,0,0,acc3ea9a35e95881e6fb1a32ac832e4e0495284aeb391e11d047b4fb76b05fbc,2024-04-11T01:21:03.627000
|
||||||
CVE-2023-31210,0,0,22db411452e4413b24810b6f87647cdbad1853694542f15e240cee8fe93fc316,2023-12-18T17:31:51.650000
|
CVE-2023-31210,0,0,22db411452e4413b24810b6f87647cdbad1853694542f15e240cee8fe93fc316,2023-12-18T17:31:51.650000
|
||||||
CVE-2023-31211,0,0,25b8616d1c09299eaeb19215263ab8a437b4688bd3d65f84a2c4134e75a29552,2024-01-19T02:09:26.650000
|
CVE-2023-31211,0,1,bcf13972193b4b415b2d12adfbcf8d2f73fba1f0337b67e0fcd53d7d3aa27bd8,2024-05-03T09:15:07.230000
|
||||||
CVE-2023-31212,0,0,b3dca3f1049aeb20dc6f644e1d420b3cba3b924328724987f22ceb6add12b28e,2023-11-08T18:47:36.203000
|
CVE-2023-31212,0,0,b3dca3f1049aeb20dc6f644e1d420b3cba3b924328724987f22ceb6add12b28e,2023-11-08T18:47:36.203000
|
||||||
CVE-2023-31213,0,0,aa93d62aa161bdef803d7fb4d1edfbba0517314ec0fd9cf94fe731d75469d683,2023-07-19T18:25:45.263000
|
CVE-2023-31213,0,0,aa93d62aa161bdef803d7fb4d1edfbba0517314ec0fd9cf94fe731d75469d683,2023-07-19T18:25:45.263000
|
||||||
CVE-2023-31215,0,0,b89fa5ca9251f56c11de8c448270940ecd6643a443f0f280749266a956d5de72,2023-12-28T13:32:56.443000
|
CVE-2023-31215,0,0,b89fa5ca9251f56c11de8c448270940ecd6643a443f0f280749266a956d5de72,2023-12-28T13:32:56.443000
|
||||||
@ -225664,6 +225665,7 @@ CVE-2023-35698,0,0,1a5f0de9e827e1f26d8ce1a23936779b2a92a9242596f2af26444c4d5f2f3
|
|||||||
CVE-2023-35699,0,0,c06aba707c695839836dd82c54f55ca34badb20d57868cee747251dc69fa9bf6,2023-07-18T11:46:43.907000
|
CVE-2023-35699,0,0,c06aba707c695839836dd82c54f55ca34badb20d57868cee747251dc69fa9bf6,2023-07-18T11:46:43.907000
|
||||||
CVE-2023-3570,0,0,12377f8f2531f9bb5228e4098a72207ca93d76b44354ff18076ee4d4cf633e78,2023-08-25T07:15:08.680000
|
CVE-2023-3570,0,0,12377f8f2531f9bb5228e4098a72207ca93d76b44354ff18076ee4d4cf633e78,2023-08-25T07:15:08.680000
|
||||||
CVE-2023-35700,0,0,d85439aec76d8ba3f8c755512b44f4a752c457c5d0362fdcaf7a45cdedd4d318,2023-11-07T04:15:57.173000
|
CVE-2023-35700,0,0,d85439aec76d8ba3f8c755512b44f4a752c457c5d0362fdcaf7a45cdedd4d318,2023-11-07T04:15:57.173000
|
||||||
|
CVE-2023-35701,1,1,e6dce6e08d5a6cc3d293e6cd63d2a5714872136194df65318be5a5281538d41d,2024-05-03T09:15:07.587000
|
||||||
CVE-2023-35702,0,0,43a538fd2a6551344790ddc23675ac41256cc49affe767c42203bb8af1f9d9f6,2024-04-09T21:15:08.687000
|
CVE-2023-35702,0,0,43a538fd2a6551344790ddc23675ac41256cc49affe767c42203bb8af1f9d9f6,2024-04-09T21:15:08.687000
|
||||||
CVE-2023-35703,0,0,bd220da906e6173a01fcf88c08076bd5470744a21943fd30147c0383607c053a,2024-04-09T21:15:08.797000
|
CVE-2023-35703,0,0,bd220da906e6173a01fcf88c08076bd5470744a21943fd30147c0383607c053a,2024-04-09T21:15:08.797000
|
||||||
CVE-2023-35704,0,0,9f7caa8dfb464038a77a6e4bcadca0149b6bc7207c34073f0385815b079c70e4,2024-04-09T21:15:08.890000
|
CVE-2023-35704,0,0,9f7caa8dfb464038a77a6e4bcadca0149b6bc7207c34073f0385815b079c70e4,2024-04-09T21:15:08.890000
|
||||||
@ -232174,6 +232176,7 @@ CVE-2023-44469,0,0,960da4dd20058cd7b4d769768e751d771f02293e397b85b243d1f37fdbb2c
|
|||||||
CVE-2023-4447,0,0,04feba11f7263b0d5ebcdb950df716fdf7ecaf06906bce3ab8c4a6b5740dbd87,2024-04-11T01:22:28.583000
|
CVE-2023-4447,0,0,04feba11f7263b0d5ebcdb950df716fdf7ecaf06906bce3ab8c4a6b5740dbd87,2024-04-11T01:22:28.583000
|
||||||
CVE-2023-44470,0,0,20af9da7b19e16e3f751716ce6388203de2002045e4dd1b4757141898d21d736,2023-10-12T19:50:34.870000
|
CVE-2023-44470,0,0,20af9da7b19e16e3f751716ce6388203de2002045e4dd1b4757141898d21d736,2023-10-12T19:50:34.870000
|
||||||
CVE-2023-44471,0,0,789a6d719a2ecab868455dd65b3c31581b8eb5ef3909c19aa7f5e53cf830ab7f,2023-10-12T19:47:22.937000
|
CVE-2023-44471,0,0,789a6d719a2ecab868455dd65b3c31581b8eb5ef3909c19aa7f5e53cf830ab7f,2023-10-12T19:47:22.937000
|
||||||
|
CVE-2023-44472,1,1,9fc2dc211aae777b11c8a71d5cd607751cc27d1aea020eca500662a619a692d0,2024-05-03T08:15:06.850000
|
||||||
CVE-2023-44473,0,0,3a9f0b2529589df722344951f86b13ba970a14c956936c368f28ca8952e1920d,2023-10-12T17:53:16.280000
|
CVE-2023-44473,0,0,3a9f0b2529589df722344951f86b13ba970a14c956936c368f28ca8952e1920d,2023-10-12T17:53:16.280000
|
||||||
CVE-2023-44474,0,0,906c16b458f6396badf347b8626690f11ce844c55596d85f29232e2ffaca4997,2023-10-04T02:15:06.293000
|
CVE-2023-44474,0,0,906c16b458f6396badf347b8626690f11ce844c55596d85f29232e2ffaca4997,2023-10-04T02:15:06.293000
|
||||||
CVE-2023-44475,0,0,708b5c32369c471fc4e211ff1c1662f1ff9edd336e0cb60d14f1fa0bbbd0bda8,2023-10-12T19:42:15.347000
|
CVE-2023-44475,0,0,708b5c32369c471fc4e211ff1c1662f1ff9edd336e0cb60d14f1fa0bbbd0bda8,2023-10-12T19:42:15.347000
|
||||||
@ -237427,7 +237430,7 @@ CVE-2023-52610,0,0,ebaaf65a540d2d00c4af03f0e9706e60a1009d9da7920c40e2c8ec7ab71ca
|
|||||||
CVE-2023-52611,0,0,adfea1110379d41eef258374943e124ecab67c2f114c78e000c2827978075fff,2024-03-18T12:38:25.490000
|
CVE-2023-52611,0,0,adfea1110379d41eef258374943e124ecab67c2f114c78e000c2827978075fff,2024-03-18T12:38:25.490000
|
||||||
CVE-2023-52612,0,0,be8ed4f9689fee6a6f6e71f10685bce50996952b147db667defb3c11e0b94b65,2024-03-18T12:38:25.490000
|
CVE-2023-52612,0,0,be8ed4f9689fee6a6f6e71f10685bce50996952b147db667defb3c11e0b94b65,2024-03-18T12:38:25.490000
|
||||||
CVE-2023-52613,0,0,2a6a775fa4fd80939ff842c405dbd6a4a567d8e153ce0381397d1e3184eb21ad,2024-03-18T12:38:25.490000
|
CVE-2023-52613,0,0,2a6a775fa4fd80939ff842c405dbd6a4a567d8e153ce0381397d1e3184eb21ad,2024-03-18T12:38:25.490000
|
||||||
CVE-2023-52614,0,1,5fa9392dab1a0ff2ef9ab069524da01ac5c70765327d5cf6ad2105a88f5860e1,2024-05-03T06:15:08.503000
|
CVE-2023-52614,0,0,5fa9392dab1a0ff2ef9ab069524da01ac5c70765327d5cf6ad2105a88f5860e1,2024-05-03T06:15:08.503000
|
||||||
CVE-2023-52615,0,0,b03f1c20882d93ba4b42bf55c3ee735bb7dd825a67b076e419d8b9cf0c5ffa93,2024-03-18T12:38:25.490000
|
CVE-2023-52615,0,0,b03f1c20882d93ba4b42bf55c3ee735bb7dd825a67b076e419d8b9cf0c5ffa93,2024-03-18T12:38:25.490000
|
||||||
CVE-2023-52616,0,0,731b6afefc6a8d9bec529131375a0b58acf488391c57bbd120c7bdf51049fbac,2024-03-18T12:38:25.490000
|
CVE-2023-52616,0,0,731b6afefc6a8d9bec529131375a0b58acf488391c57bbd120c7bdf51049fbac,2024-03-18T12:38:25.490000
|
||||||
CVE-2023-52617,0,0,0af55b403517bed7905346887f3a1061bb99bf76dd43932b8429b5d4200ff19c,2024-03-18T12:38:25.490000
|
CVE-2023-52617,0,0,0af55b403517bed7905346887f3a1061bb99bf76dd43932b8429b5d4200ff19c,2024-03-18T12:38:25.490000
|
||||||
@ -242933,6 +242936,9 @@ CVE-2024-23905,0,0,2d8ebad5c05b335845d8a0c6b27832798a9c27087f41f1dd4daf5a7e2afef
|
|||||||
CVE-2024-2391,0,0,fd3c56d19cfdb51c26b65d074d54709719e794ba6c0db8c6b8b791a18f6fe3ca,2024-04-11T01:25:23.393000
|
CVE-2024-2391,0,0,fd3c56d19cfdb51c26b65d074d54709719e794ba6c0db8c6b8b791a18f6fe3ca,2024-04-11T01:25:23.393000
|
||||||
CVE-2024-23910,0,0,e6adc416dd7b19484faa305c4e8491b3ff3f8809d94d53eb510d517290865995,2024-04-04T01:15:50.027000
|
CVE-2024-23910,0,0,e6adc416dd7b19484faa305c4e8491b3ff3f8809d94d53eb510d517290865995,2024-04-04T01:15:50.027000
|
||||||
CVE-2024-23911,0,0,f05e17f474751d92c0d0b7dd0326335d7f22fd7de41e1b09eac2c91ab043885f,2024-04-15T13:15:31.997000
|
CVE-2024-23911,0,0,f05e17f474751d92c0d0b7dd0326335d7f22fd7de41e1b09eac2c91ab043885f,2024-04-15T13:15:31.997000
|
||||||
|
CVE-2024-23912,1,1,8b76a5e0353fd2e3399286fd1795cfde96165072137263962a5069d762fe6be6,2024-05-03T09:15:07.737000
|
||||||
|
CVE-2024-23913,1,1,62a397291ca4ff6f894ba2b8fb788e66ab96f4372c15c5465e89848a8108a6f0,2024-05-03T09:15:07.920000
|
||||||
|
CVE-2024-23914,1,1,481b78c97eba7946db4772e616ee8e8ae3f254b4a59e9894073706a7f542c37d,2024-05-03T09:15:08.090000
|
||||||
CVE-2024-23917,0,0,43acd2786eef775b4e5af3da03e8f628e79a58b917087bea0e9c91638665592f,2024-02-09T01:05:22.180000
|
CVE-2024-23917,0,0,43acd2786eef775b4e5af3da03e8f628e79a58b917087bea0e9c91638665592f,2024-02-09T01:05:22.180000
|
||||||
CVE-2024-2392,0,0,42336a48d6bafcd50dc6522fe24a4d56dee45c4fa6295037e9d4d2226834e64c,2024-03-22T12:45:36.130000
|
CVE-2024-2392,0,0,42336a48d6bafcd50dc6522fe24a4d56dee45c4fa6295037e9d4d2226834e64c,2024-03-22T12:45:36.130000
|
||||||
CVE-2024-2393,0,0,a735f579c8d8282e2e770bb2e57ba455b9e1d053a4e15dfbb3b2c5e4432a6f37,2024-04-11T01:25:23.490000
|
CVE-2024-2393,0,0,a735f579c8d8282e2e770bb2e57ba455b9e1d053a4e15dfbb3b2c5e4432a6f37,2024-04-11T01:25:23.490000
|
||||||
@ -243225,6 +243231,7 @@ CVE-2024-24706,0,0,4d433b03a4c26ebc6bd4b9712c01509648b3f2cecc7341b14e252b0e38dfa
|
|||||||
CVE-2024-24707,0,0,23a49dd490264be4d0f1f787e396daad28e9b33e6cecae6e6ede109ea8372e70,2024-04-03T17:24:18.150000
|
CVE-2024-24707,0,0,23a49dd490264be4d0f1f787e396daad28e9b33e6cecae6e6ede109ea8372e70,2024-04-03T17:24:18.150000
|
||||||
CVE-2024-24708,0,0,f693d4f4acd95516c93eac11f2cab76ea0d55ea86fcf1b386fdcecddbfc9bf86,2024-02-29T13:49:29.390000
|
CVE-2024-24708,0,0,f693d4f4acd95516c93eac11f2cab76ea0d55ea86fcf1b386fdcecddbfc9bf86,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-2471,0,0,c433bac72e984da7ddd7f5d293078fb939e9f74235bc4818486a5edc71f6f4a6,2024-04-08T18:48:40.217000
|
CVE-2024-2471,0,0,c433bac72e984da7ddd7f5d293078fb939e9f74235bc4818486a5edc71f6f4a6,2024-04-08T18:48:40.217000
|
||||||
|
CVE-2024-24710,1,1,302749c2c1ec57ae8197be467cd5499b82b7cfef1d6d9bf6afcb026b279a5b1f,2024-05-03T08:15:07.033000
|
||||||
CVE-2024-24711,0,0,0d048c3822039d008612960507a20bcb0af4972abb0e8757f981885d0a5986fc,2024-03-26T12:55:05.010000
|
CVE-2024-24711,0,0,0d048c3822039d008612960507a20bcb0af4972abb0e8757f981885d0a5986fc,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-24712,0,0,3eb883409ceb5cd8ab7cfb2c23165937e7138a0fdba93206148a8d8c39991d81,2024-02-16T14:48:04.207000
|
CVE-2024-24712,0,0,3eb883409ceb5cd8ab7cfb2c23165937e7138a0fdba93206148a8d8c39991d81,2024-02-16T14:48:04.207000
|
||||||
CVE-2024-24713,0,0,016796105eec4ced1aaab79578ed2b6dc8b6c4a64b21f9341804bb78b76a15f2,2024-02-16T15:48:04.237000
|
CVE-2024-24713,0,0,016796105eec4ced1aaab79578ed2b6dc8b6c4a64b21f9341804bb78b76a15f2,2024-02-16T15:48:04.237000
|
||||||
@ -244696,13 +244703,13 @@ CVE-2024-26917,0,0,76ac629e9c8e03234b1cc0f2056c3a72474e19f6de790dc934c6f9ce7aac4
|
|||||||
CVE-2024-26918,0,0,856369cd1dea2e2c11af16942fbef9a6c4bc54310e835905719eaafb6e04f03b,2024-04-17T16:51:07.347000
|
CVE-2024-26918,0,0,856369cd1dea2e2c11af16942fbef9a6c4bc54310e835905719eaafb6e04f03b,2024-04-17T16:51:07.347000
|
||||||
CVE-2024-26919,0,0,8ce229e6f304423499a3d2dbc331713eb1fbfa99e3cc0b71da0db8b8b65f091c,2024-04-17T16:51:07.347000
|
CVE-2024-26919,0,0,8ce229e6f304423499a3d2dbc331713eb1fbfa99e3cc0b71da0db8b8b65f091c,2024-04-17T16:51:07.347000
|
||||||
CVE-2024-2692,0,0,aefc05ddca23ffc90de039367cc7fed9a06f50bd32c460cfe2bbf1c8645c8f06,2024-04-04T12:48:41.700000
|
CVE-2024-2692,0,0,aefc05ddca23ffc90de039367cc7fed9a06f50bd32c460cfe2bbf1c8645c8f06,2024-04-04T12:48:41.700000
|
||||||
CVE-2024-26920,0,1,21e54f7cffce25f076f12e61f0ebb2408a05fa58f844d6d62f7a9b8a454f9f45,2024-05-03T06:15:09.207000
|
CVE-2024-26920,0,0,21e54f7cffce25f076f12e61f0ebb2408a05fa58f844d6d62f7a9b8a454f9f45,2024-05-03T06:15:09.207000
|
||||||
CVE-2024-26921,0,0,76d623900726b55efb66263c05dcf2e665a9ce9fb4f9ecc19bf3b35e90cf98c7,2024-04-18T13:04:28.900000
|
CVE-2024-26921,0,0,76d623900726b55efb66263c05dcf2e665a9ce9fb4f9ecc19bf3b35e90cf98c7,2024-04-18T13:04:28.900000
|
||||||
CVE-2024-26922,0,1,af76b1b0f3ab9ee10956791f730bd4870f5c1e7911748c677fba653e48abc0dc,2024-05-03T06:15:09.570000
|
CVE-2024-26922,0,0,af76b1b0f3ab9ee10956791f730bd4870f5c1e7911748c677fba653e48abc0dc,2024-05-03T06:15:09.570000
|
||||||
CVE-2024-26923,0,1,da4573b83844f36cbecbdc77d107c82583a707415e7aff11d2f41c3052c0b580,2024-05-03T06:15:10.053000
|
CVE-2024-26923,0,0,da4573b83844f36cbecbdc77d107c82583a707415e7aff11d2f41c3052c0b580,2024-05-03T06:15:10.053000
|
||||||
CVE-2024-26924,0,1,f1745d5b13e99b2b6fe2577e278513d3ec9c9776eb98248608246c98329d345c,2024-05-03T06:15:10.280000
|
CVE-2024-26924,0,0,f1745d5b13e99b2b6fe2577e278513d3ec9c9776eb98248608246c98329d345c,2024-05-03T06:15:10.280000
|
||||||
CVE-2024-26925,0,0,205e70a4a50c2237fc125a81400662661ac0821c29e77dd6328c788eab96e62d,2024-04-25T13:18:20.370000
|
CVE-2024-26925,0,0,205e70a4a50c2237fc125a81400662661ac0821c29e77dd6328c788eab96e62d,2024-04-25T13:18:20.370000
|
||||||
CVE-2024-26926,0,1,a92f86f9d106171e65901edda1c9fe34c87217de61e4b80a80c2e7bdcc5c3e47,2024-05-03T06:15:10.483000
|
CVE-2024-26926,0,0,a92f86f9d106171e65901edda1c9fe34c87217de61e4b80a80c2e7bdcc5c3e47,2024-05-03T06:15:10.483000
|
||||||
CVE-2024-26927,0,0,28230e8b97d6569ef237a255c6a2e0072a98bc7d1c93aa8cc80d54b6a5ee9b90,2024-04-29T12:42:03.667000
|
CVE-2024-26927,0,0,28230e8b97d6569ef237a255c6a2e0072a98bc7d1c93aa8cc80d54b6a5ee9b90,2024-04-29T12:42:03.667000
|
||||||
CVE-2024-26928,0,0,53acf010395ad47667d15ddc661fbb74b301d2b8a0a815cafc528a88f313f269,2024-04-29T12:42:03.667000
|
CVE-2024-26928,0,0,53acf010395ad47667d15ddc661fbb74b301d2b8a0a815cafc528a88f313f269,2024-04-29T12:42:03.667000
|
||||||
CVE-2024-26929,0,0,210a45e065d81016f9f4302ea5eeb9d3cefda708dec3da96a9abae5328ec9000,2024-05-01T13:02:20.750000
|
CVE-2024-26929,0,0,210a45e065d81016f9f4302ea5eeb9d3cefda708dec3da96a9abae5328ec9000,2024-05-01T13:02:20.750000
|
||||||
@ -244758,40 +244765,40 @@ CVE-2024-26977,0,0,59fbfe9ac1b848fdb83996742e166e4603a5bfea7240a7586e65048734931
|
|||||||
CVE-2024-26978,0,0,257555735a82f0f0efd2e94ab4b0ebf9c131fcff18bc7c75ac3a99b0b6b5f572,2024-05-01T13:02:20.750000
|
CVE-2024-26978,0,0,257555735a82f0f0efd2e94ab4b0ebf9c131fcff18bc7c75ac3a99b0b6b5f572,2024-05-01T13:02:20.750000
|
||||||
CVE-2024-26979,0,0,08c2e9d864acb753e6fde04699b98be30568e3e09397d447207596d52a0e4221,2024-05-01T13:02:20.750000
|
CVE-2024-26979,0,0,08c2e9d864acb753e6fde04699b98be30568e3e09397d447207596d52a0e4221,2024-05-01T13:02:20.750000
|
||||||
CVE-2024-26980,0,0,76e4503c5881b9716dec0fa482a2044db22902d212dbbb181fd17d260a1362d1,2024-05-03T03:16:26.907000
|
CVE-2024-26980,0,0,76e4503c5881b9716dec0fa482a2044db22902d212dbbb181fd17d260a1362d1,2024-05-03T03:16:26.907000
|
||||||
CVE-2024-26981,0,1,3038c3174fa5069e42a0db4274374d74c2b5066ad475e921f47c4589915379cd,2024-05-03T06:15:10.663000
|
CVE-2024-26981,0,0,3038c3174fa5069e42a0db4274374d74c2b5066ad475e921f47c4589915379cd,2024-05-03T06:15:10.663000
|
||||||
CVE-2024-26982,0,1,71a4b88e652ac72451ef2b1c06677d2a8721eacfd6194887bc3cbe1ed1aa0fda,2024-05-03T06:15:10.953000
|
CVE-2024-26982,0,0,71a4b88e652ac72451ef2b1c06677d2a8721eacfd6194887bc3cbe1ed1aa0fda,2024-05-03T06:15:10.953000
|
||||||
CVE-2024-26983,0,0,ccd819c1ec21baac0e82aceb812621bf7a6f5600a1aad568a7abc52c10f314e2,2024-05-03T03:16:27.040000
|
CVE-2024-26983,0,0,ccd819c1ec21baac0e82aceb812621bf7a6f5600a1aad568a7abc52c10f314e2,2024-05-03T03:16:27.040000
|
||||||
CVE-2024-26984,0,1,51fd78b3299a4f7fe92b2972cdef3a37b9d7ca38e2666df6b4d0952e7bd0b097,2024-05-03T06:15:11.130000
|
CVE-2024-26984,0,0,51fd78b3299a4f7fe92b2972cdef3a37b9d7ca38e2666df6b4d0952e7bd0b097,2024-05-03T06:15:11.130000
|
||||||
CVE-2024-26985,0,0,ce7ffde23e660a23826c5fcfbdd5ad4846c5aa4f0b4b6f75087a6ed63926e72a,2024-05-03T03:16:27.140000
|
CVE-2024-26985,0,0,ce7ffde23e660a23826c5fcfbdd5ad4846c5aa4f0b4b6f75087a6ed63926e72a,2024-05-03T03:16:27.140000
|
||||||
CVE-2024-26986,0,0,0e86af409a08ebe8b054bd624b96ed0e828f392c169b319d54501b325508aadd,2024-05-03T03:16:27.180000
|
CVE-2024-26986,0,0,0e86af409a08ebe8b054bd624b96ed0e828f392c169b319d54501b325508aadd,2024-05-03T03:16:27.180000
|
||||||
CVE-2024-26987,0,0,265a594118bd17bd2c87735bf4fa037cf64a099e7646ca58a130053e3ef0c2de,2024-05-03T03:16:27.223000
|
CVE-2024-26987,0,0,265a594118bd17bd2c87735bf4fa037cf64a099e7646ca58a130053e3ef0c2de,2024-05-03T03:16:27.223000
|
||||||
CVE-2024-26988,0,1,20a9c0c0c1e4b746621fc27fde9b93d36608a168e68af7fd64c18a89981d9bc7,2024-05-03T06:15:11.337000
|
CVE-2024-26988,0,0,20a9c0c0c1e4b746621fc27fde9b93d36608a168e68af7fd64c18a89981d9bc7,2024-05-03T06:15:11.337000
|
||||||
CVE-2024-26989,0,0,d7f79764735bb4bdca04432cc868232052eb8d9179b27315b8e08d4922b9686a,2024-05-03T03:16:27.310000
|
CVE-2024-26989,0,0,d7f79764735bb4bdca04432cc868232052eb8d9179b27315b8e08d4922b9686a,2024-05-03T03:16:27.310000
|
||||||
CVE-2024-26990,0,0,c2b48f7cac4e7058728495aeb50489a6af7fceca948a9ba35a0bfe9cf11f80df,2024-05-03T03:16:27.360000
|
CVE-2024-26990,0,0,c2b48f7cac4e7058728495aeb50489a6af7fceca948a9ba35a0bfe9cf11f80df,2024-05-03T03:16:27.360000
|
||||||
CVE-2024-26991,0,0,92aca6f670fd950bfe8e8d7689a5b2dcc7fdd95b5fa52a077f4602d6da9ab552,2024-05-03T03:16:27.407000
|
CVE-2024-26991,0,0,92aca6f670fd950bfe8e8d7689a5b2dcc7fdd95b5fa52a077f4602d6da9ab552,2024-05-03T03:16:27.407000
|
||||||
CVE-2024-26992,0,0,d7559e1aed92214c24aa61e94393eb033d4d8c74c8b1c622d267c4c8db1a1879,2024-05-03T03:16:27.453000
|
CVE-2024-26992,0,0,d7559e1aed92214c24aa61e94393eb033d4d8c74c8b1c622d267c4c8db1a1879,2024-05-03T03:16:27.453000
|
||||||
CVE-2024-26993,0,1,4c5086a6b5387518cd4e4c2b518527fd853d25c2e06829ce9a9cb9a4e269dcf7,2024-05-03T06:15:11.530000
|
CVE-2024-26993,0,0,4c5086a6b5387518cd4e4c2b518527fd853d25c2e06829ce9a9cb9a4e269dcf7,2024-05-03T06:15:11.530000
|
||||||
CVE-2024-26994,0,1,c0b1a2d204b67af1b29d2f01286a4399fab92fd0c89afdec263b4c615c8875fe,2024-05-03T06:15:11.740000
|
CVE-2024-26994,0,0,c0b1a2d204b67af1b29d2f01286a4399fab92fd0c89afdec263b4c615c8875fe,2024-05-03T06:15:11.740000
|
||||||
CVE-2024-26995,0,0,2146327fe9ef53c3bea971f53925b0d81cb30e2aa49b7f2fcad91b5a54abf9f9,2024-05-03T03:16:27.580000
|
CVE-2024-26995,0,0,2146327fe9ef53c3bea971f53925b0d81cb30e2aa49b7f2fcad91b5a54abf9f9,2024-05-03T03:16:27.580000
|
||||||
CVE-2024-26996,0,0,20e9ce694108d42f9ed143bd1ce7355d03895129e220e05953a671dfaa83faab,2024-05-03T03:16:27.623000
|
CVE-2024-26996,0,0,20e9ce694108d42f9ed143bd1ce7355d03895129e220e05953a671dfaa83faab,2024-05-03T03:16:27.623000
|
||||||
CVE-2024-26997,0,1,bdfca562d47f9e5d3fc1098c4dacc21d61a7ba014b51a9e792d5f847f7afb48b,2024-05-03T06:15:11.950000
|
CVE-2024-26997,0,0,bdfca562d47f9e5d3fc1098c4dacc21d61a7ba014b51a9e792d5f847f7afb48b,2024-05-03T06:15:11.950000
|
||||||
CVE-2024-26998,0,0,48b4ca2a741e8d6d024f95381b4079f893db1ee6d4448ad105243249c86303ae,2024-05-03T03:16:27.673000
|
CVE-2024-26998,0,0,48b4ca2a741e8d6d024f95381b4079f893db1ee6d4448ad105243249c86303ae,2024-05-03T03:16:27.673000
|
||||||
CVE-2024-26999,0,1,9ac4807c2521e1d8db890c0527b001317552b4ac44ce0b01702365258c787f45,2024-05-03T06:15:12.137000
|
CVE-2024-26999,0,0,9ac4807c2521e1d8db890c0527b001317552b4ac44ce0b01702365258c787f45,2024-05-03T06:15:12.137000
|
||||||
CVE-2024-2700,0,0,ec51b942504a96d4888f64f81c70906fd44973b0d1ace8e2f862241f82ce29e0,2024-04-17T20:15:08.240000
|
CVE-2024-2700,0,0,ec51b942504a96d4888f64f81c70906fd44973b0d1ace8e2f862241f82ce29e0,2024-04-17T20:15:08.240000
|
||||||
CVE-2024-27000,0,1,ad2ef5bdd7c2f9d77d1b6346a92f926b0e0114b79caa616e96d2bb2c427a8aac,2024-05-03T06:15:12.350000
|
CVE-2024-27000,0,0,ad2ef5bdd7c2f9d77d1b6346a92f926b0e0114b79caa616e96d2bb2c427a8aac,2024-05-03T06:15:12.350000
|
||||||
CVE-2024-27001,0,1,f4defde5af84e6133600f9028ad4a44c6061db86e7d3ca3705bde065e8cf1441,2024-05-03T06:15:12.590000
|
CVE-2024-27001,0,0,f4defde5af84e6133600f9028ad4a44c6061db86e7d3ca3705bde065e8cf1441,2024-05-03T06:15:12.590000
|
||||||
CVE-2024-27002,0,0,4cebae80cd053089254650a19e4cdf93233e79968b6c0483f943fbf8eb0cf543,2024-05-03T03:16:27.847000
|
CVE-2024-27002,0,0,4cebae80cd053089254650a19e4cdf93233e79968b6c0483f943fbf8eb0cf543,2024-05-03T03:16:27.847000
|
||||||
CVE-2024-27003,0,0,20d6474febb33d1d9738664aa924171cff621ef4d42b96c379bbc7ca17910189,2024-05-03T03:16:27.890000
|
CVE-2024-27003,0,0,20d6474febb33d1d9738664aa924171cff621ef4d42b96c379bbc7ca17910189,2024-05-03T03:16:27.890000
|
||||||
CVE-2024-27004,0,1,5ee749957714436a863b1829cedb06effa94ab50e8e0d157eedbc8feaa729442,2024-05-03T06:15:12.800000
|
CVE-2024-27004,0,0,5ee749957714436a863b1829cedb06effa94ab50e8e0d157eedbc8feaa729442,2024-05-03T06:15:12.800000
|
||||||
CVE-2024-27005,0,0,0c7a4c5a8a302385907f4d9c54b83be92049a557d43dc801da14311e4ea3f7a4,2024-05-03T03:16:27.987000
|
CVE-2024-27005,0,0,0c7a4c5a8a302385907f4d9c54b83be92049a557d43dc801da14311e4ea3f7a4,2024-05-03T03:16:27.987000
|
||||||
CVE-2024-27006,0,0,9900a00aac2a484a183478a545d94e3424532992b67d5cfee8fd40ed3f7546e8,2024-05-03T03:16:28.030000
|
CVE-2024-27006,0,0,9900a00aac2a484a183478a545d94e3424532992b67d5cfee8fd40ed3f7546e8,2024-05-03T03:16:28.030000
|
||||||
CVE-2024-27007,0,0,de7399fdc0b28ed2c42071d5017655949f209978d39881d9334f8ddef84470c7,2024-05-03T03:16:28.070000
|
CVE-2024-27007,0,0,de7399fdc0b28ed2c42071d5017655949f209978d39881d9334f8ddef84470c7,2024-05-03T03:16:28.070000
|
||||||
CVE-2024-27008,0,1,7c531cd27599bc8e765bc8b2bcfe3367556b19229be46bca53a9aed7b180470f,2024-05-03T06:15:13
|
CVE-2024-27008,0,0,7c531cd27599bc8e765bc8b2bcfe3367556b19229be46bca53a9aed7b180470f,2024-05-03T06:15:13
|
||||||
CVE-2024-27009,0,0,082aadf95ded16775ba368e9fa1e3bc06e75ebc1b513c777a07e1478cf4c616b,2024-05-03T03:16:28.153000
|
CVE-2024-27009,0,0,082aadf95ded16775ba368e9fa1e3bc06e75ebc1b513c777a07e1478cf4c616b,2024-05-03T03:16:28.153000
|
||||||
CVE-2024-27010,0,0,a6b226a3d7862570b3a5f1461f3ecf1560912a7fcca01d922620078fb22bf622,2024-05-03T03:16:28.203000
|
CVE-2024-27010,0,0,a6b226a3d7862570b3a5f1461f3ecf1560912a7fcca01d922620078fb22bf622,2024-05-03T03:16:28.203000
|
||||||
CVE-2024-27011,0,0,db70e071dff497d63faa562953c0d7c3853f1610192f278ddda0161d961a984c,2024-05-03T03:16:28.243000
|
CVE-2024-27011,0,0,db70e071dff497d63faa562953c0d7c3853f1610192f278ddda0161d961a984c,2024-05-03T03:16:28.243000
|
||||||
CVE-2024-27012,0,0,b8e156e06c82d793b237dbde50ffe6b624c2b1835a7cba57a14fe890f6110d04,2024-05-03T03:16:28.290000
|
CVE-2024-27012,0,0,b8e156e06c82d793b237dbde50ffe6b624c2b1835a7cba57a14fe890f6110d04,2024-05-03T03:16:28.290000
|
||||||
CVE-2024-27013,0,1,2cb52126af3572c7b5f55dc10a3eca31ff3fe95965d644de25764971ca372951,2024-05-03T06:15:13.277000
|
CVE-2024-27013,0,0,2cb52126af3572c7b5f55dc10a3eca31ff3fe95965d644de25764971ca372951,2024-05-03T06:15:13.277000
|
||||||
CVE-2024-27014,0,0,3bc710ae26afc6886d8e44039274f51c5633db31a76486b47eb838367827ccb0,2024-05-03T03:16:28.390000
|
CVE-2024-27014,0,0,3bc710ae26afc6886d8e44039274f51c5633db31a76486b47eb838367827ccb0,2024-05-03T03:16:28.390000
|
||||||
CVE-2024-27015,0,0,865c903fbd1b927b928209eb7b4c7715de07a45a86f79d252af767bda9c897a4,2024-05-03T03:16:28.440000
|
CVE-2024-27015,0,0,865c903fbd1b927b928209eb7b4c7715de07a45a86f79d252af767bda9c897a4,2024-05-03T03:16:28.440000
|
||||||
CVE-2024-27016,0,0,b2331bdd993764cb67ade407248d33cc3fb586a90e9566cbcc5899af3f716753,2024-05-03T03:16:28.483000
|
CVE-2024-27016,0,0,b2331bdd993764cb67ade407248d33cc3fb586a90e9566cbcc5899af3f716753,2024-05-03T03:16:28.483000
|
||||||
@ -244799,9 +244806,9 @@ CVE-2024-27017,0,0,392c3e259be6fc543be409181e8df13c7334fad3361f061cae96ba4f88846
|
|||||||
CVE-2024-27018,0,0,b13a811b60b2f25c3befd7c81c629dbd75dc7217b56740e51cd33ae5baaebae5,2024-05-03T03:16:28.567000
|
CVE-2024-27018,0,0,b13a811b60b2f25c3befd7c81c629dbd75dc7217b56740e51cd33ae5baaebae5,2024-05-03T03:16:28.567000
|
||||||
CVE-2024-27019,0,0,8449fc532c456110a7b37562bd69b32b830596967c204f5dcc1f236b208ecec6,2024-05-03T03:16:28.623000
|
CVE-2024-27019,0,0,8449fc532c456110a7b37562bd69b32b830596967c204f5dcc1f236b208ecec6,2024-05-03T03:16:28.623000
|
||||||
CVE-2024-2702,0,0,d714950951d2438da53d97b453b8470335efdb106b4a3aaafe4c816e98d263df,2024-03-20T13:00:16.367000
|
CVE-2024-2702,0,0,d714950951d2438da53d97b453b8470335efdb106b4a3aaafe4c816e98d263df,2024-03-20T13:00:16.367000
|
||||||
CVE-2024-27020,0,1,92e449b5dfa875d0c65fac42a6b907353432a5a01260d217191fb3e39711aefc,2024-05-03T06:15:13.507000
|
CVE-2024-27020,0,0,92e449b5dfa875d0c65fac42a6b907353432a5a01260d217191fb3e39711aefc,2024-05-03T06:15:13.507000
|
||||||
CVE-2024-27021,0,0,7629e8b536a7370126b5401755d0979503442514581afaecdca94d05ca6a3a8e,2024-05-03T03:16:28.710000
|
CVE-2024-27021,0,0,7629e8b536a7370126b5401755d0979503442514581afaecdca94d05ca6a3a8e,2024-05-03T03:16:28.710000
|
||||||
CVE-2024-27022,0,1,181d1b8331ba17e558fecd3c8e3cefddaa774350612d20cdd672dcecfa940b03,2024-05-03T06:15:13.697000
|
CVE-2024-27022,0,0,181d1b8331ba17e558fecd3c8e3cefddaa774350612d20cdd672dcecfa940b03,2024-05-03T06:15:13.697000
|
||||||
CVE-2024-27023,0,0,bfdbebf8e04e0e157abeb9fd87665eab36c5df352f61196601859b27ac3c2ee3,2024-05-01T19:50:25.633000
|
CVE-2024-27023,0,0,bfdbebf8e04e0e157abeb9fd87665eab36c5df352f61196601859b27ac3c2ee3,2024-05-01T19:50:25.633000
|
||||||
CVE-2024-27024,0,0,96efa799e2ac56fadc351826798dc36d316169ab611d5986673fe6d683b41700,2024-05-01T19:50:25.633000
|
CVE-2024-27024,0,0,96efa799e2ac56fadc351826798dc36d316169ab611d5986673fe6d683b41700,2024-05-01T19:50:25.633000
|
||||||
CVE-2024-27025,0,0,82ff3eddcb89598ee39fb858ceee867459deeb1b4ff43367b3380d9fbdbba60e,2024-05-01T19:50:25.633000
|
CVE-2024-27025,0,0,82ff3eddcb89598ee39fb858ceee867459deeb1b4ff43367b3380d9fbdbba60e,2024-05-01T19:50:25.633000
|
||||||
@ -245328,6 +245335,7 @@ CVE-2024-28066,0,0,8d264de635ae9c8dc6d41b6ed16f7f85828f585eea298ce9fb065b16c3368
|
|||||||
CVE-2024-28069,0,0,99a57a9955c5ed5463e7c560b95e0a17dfa2789ec3c024f2825003d476d4b80d,2024-03-17T22:38:29.433000
|
CVE-2024-28069,0,0,99a57a9955c5ed5463e7c560b95e0a17dfa2789ec3c024f2825003d476d4b80d,2024-03-17T22:38:29.433000
|
||||||
CVE-2024-2807,0,0,389dec77d863d88d0729c3b21a13c4f638dbaad2d7ffdf5a3bec6019fd1a7b1b,2024-04-11T01:25:36.783000
|
CVE-2024-2807,0,0,389dec77d863d88d0729c3b21a13c4f638dbaad2d7ffdf5a3bec6019fd1a7b1b,2024-04-11T01:25:36.783000
|
||||||
CVE-2024-28070,0,0,c8eeec88fa6e3b91036a4eadc63dd921f090ad52309176e7af22a570b911aeac,2024-03-17T22:38:29.433000
|
CVE-2024-28070,0,0,c8eeec88fa6e3b91036a4eadc63dd921f090ad52309176e7af22a570b911aeac,2024-03-17T22:38:29.433000
|
||||||
|
CVE-2024-28072,1,1,6596801048e07b80a6611c70d3d9bcb61d1ca69e1e839f899621c9e0d90f7e27,2024-05-03T08:15:07.217000
|
||||||
CVE-2024-28073,0,0,cdb5d61cc6a19952dccba6c20cc81a1525eeb0c1fc701ee23bfbd240d2d310cb,2024-04-17T20:08:21.887000
|
CVE-2024-28073,0,0,cdb5d61cc6a19952dccba6c20cc81a1525eeb0c1fc701ee23bfbd240d2d310cb,2024-04-17T20:08:21.887000
|
||||||
CVE-2024-28076,0,0,573150dd6c1cd2ebee3e74b864dba3fbe351c8f7cfb57fda1c213b0f2a3aeb0c,2024-04-19T14:15:11.080000
|
CVE-2024-28076,0,0,573150dd6c1cd2ebee3e74b864dba3fbe351c8f7cfb57fda1c213b0f2a3aeb0c,2024-04-19T14:15:11.080000
|
||||||
CVE-2024-2808,0,0,c3ed3b9e68948cd880b53f1e926f321cf4b47941f31cc49bbad2cbe5e609284b,2024-04-11T01:25:36.883000
|
CVE-2024-2808,0,0,c3ed3b9e68948cd880b53f1e926f321cf4b47941f31cc49bbad2cbe5e609284b,2024-04-11T01:25:36.883000
|
||||||
@ -247678,6 +247686,7 @@ CVE-2024-32803,0,0,87ef628ed36a01981de6b24a9a46f4b15174f60f02a3679855347999c2d8f
|
|||||||
CVE-2024-32806,0,0,d8037ba4bbb861d02087bc0e815d7d332fc801a9609bcadd59a9397c35ec5a94,2024-04-24T17:16:50.397000
|
CVE-2024-32806,0,0,d8037ba4bbb861d02087bc0e815d7d332fc801a9609bcadd59a9397c35ec5a94,2024-04-24T17:16:50.397000
|
||||||
CVE-2024-32808,0,0,4a82bef92c296d86caf3ed2592cda4e11078b8b017423c1d319584391f5d5ff2,2024-04-24T13:39:42.883000
|
CVE-2024-32808,0,0,4a82bef92c296d86caf3ed2592cda4e11078b8b017423c1d319584391f5d5ff2,2024-04-24T13:39:42.883000
|
||||||
CVE-2024-3281,0,0,b3c51db3aca3b371ad4faa3c1c4537d2c54d8323123f7ae9b26414cd9ee432a6,2024-04-10T13:24:22.187000
|
CVE-2024-3281,0,0,b3c51db3aca3b371ad4faa3c1c4537d2c54d8323123f7ae9b26414cd9ee432a6,2024-04-10T13:24:22.187000
|
||||||
|
CVE-2024-32810,1,1,c173dd59fdda872fb4ca533b772f6e53231f1a4fcade1e500868c541949d68e3,2024-05-03T08:15:07.430000
|
||||||
CVE-2024-32812,0,0,a6c0140cb5875c5619d43acc5c77a24a0f3ff7202fb936829a583061f4a5590b,2024-04-24T13:39:42.883000
|
CVE-2024-32812,0,0,a6c0140cb5875c5619d43acc5c77a24a0f3ff7202fb936829a583061f4a5590b,2024-04-24T13:39:42.883000
|
||||||
CVE-2024-32815,0,0,fdfcf6bbe35deb9ef34763a17ff64d385e838875d5c0ab731c71e0463aa8a48a,2024-04-24T13:39:42.883000
|
CVE-2024-32815,0,0,fdfcf6bbe35deb9ef34763a17ff64d385e838875d5c0ab731c71e0463aa8a48a,2024-04-24T13:39:42.883000
|
||||||
CVE-2024-32816,0,0,2fa63efd4ad7910d44e8053cdc5b80901495c5148f9f0b492de6d141c5af6f05,2024-04-24T13:39:42.883000
|
CVE-2024-32816,0,0,2fa63efd4ad7910d44e8053cdc5b80901495c5148f9f0b492de6d141c5af6f05,2024-04-24T13:39:42.883000
|
||||||
@ -247690,6 +247699,7 @@ CVE-2024-32826,0,0,0d7c35c38998736930e8124de26137dd3edb154046638c71583ab2454604a
|
|||||||
CVE-2024-32828,0,0,e98a289b3626e9e97ee2c25450e252107ac1631ec54c8e821ef6379945d6166a,2024-04-26T12:58:17.720000
|
CVE-2024-32828,0,0,e98a289b3626e9e97ee2c25450e252107ac1631ec54c8e821ef6379945d6166a,2024-04-26T12:58:17.720000
|
||||||
CVE-2024-32829,0,0,af974fc6efe469e422423920d456ebe47e66f08b752628aef0bab2a184975ddc,2024-04-26T12:58:17.720000
|
CVE-2024-32829,0,0,af974fc6efe469e422423920d456ebe47e66f08b752628aef0bab2a184975ddc,2024-04-26T12:58:17.720000
|
||||||
CVE-2024-3283,0,0,8b1939d21df3d4399a3bf874e70470053c1a0ae20421841ad51c79aca5727c56,2024-04-10T19:49:51.183000
|
CVE-2024-3283,0,0,8b1939d21df3d4399a3bf874e70470053c1a0ae20421841ad51c79aca5727c56,2024-04-10T19:49:51.183000
|
||||||
|
CVE-2024-32831,1,1,d49d650149fd5e16e13712d2e2e041eb3e0fdad6c40d10c333d65e676beb8060,2024-05-03T08:15:07.713000
|
||||||
CVE-2024-32833,0,0,75a734274df361ea9a3f6b3015d66d3525b2c570f6f2524ded71781e2b6ac99a,2024-04-24T13:39:42.883000
|
CVE-2024-32833,0,0,75a734274df361ea9a3f6b3015d66d3525b2c570f6f2524ded71781e2b6ac99a,2024-04-24T13:39:42.883000
|
||||||
CVE-2024-32834,0,0,d2ed9ea40163afd5f111e44be27b5edfb4cb8a8dd0234c49fdc13943a21fbf2d,2024-04-24T13:39:42.883000
|
CVE-2024-32834,0,0,d2ed9ea40163afd5f111e44be27b5edfb4cb8a8dd0234c49fdc13943a21fbf2d,2024-04-24T13:39:42.883000
|
||||||
CVE-2024-32835,0,0,a55a936ce932c192bddb52ecc7ef5c50500f7aaee0689f590c1aa942fe932618,2024-04-24T13:39:42.883000
|
CVE-2024-32835,0,0,a55a936ce932c192bddb52ecc7ef5c50500f7aaee0689f590c1aa942fe932618,2024-04-24T13:39:42.883000
|
||||||
@ -247976,19 +247986,35 @@ CVE-2024-33904,0,0,94e3a98c0463f8acd176e3df60de225e1631e2e1dbcd1a948aa64ab2e616e
|
|||||||
CVE-2024-33905,0,0,4f2af541fd9603df50f92dd094e460dd4dcee3f568c1f2af9533e6ef2f5fb1b0,2024-05-01T18:15:24.390000
|
CVE-2024-33905,0,0,4f2af541fd9603df50f92dd094e460dd4dcee3f568c1f2af9533e6ef2f5fb1b0,2024-05-01T18:15:24.390000
|
||||||
CVE-2024-33911,0,0,3aecc9c6853b34c79146d922a590e2ff56a9634dc21e6f2275a777f672ad645b,2024-05-02T13:27:25.103000
|
CVE-2024-33911,0,0,3aecc9c6853b34c79146d922a590e2ff56a9634dc21e6f2275a777f672ad645b,2024-05-02T13:27:25.103000
|
||||||
CVE-2024-33913,0,0,fdcdfb506731b7f26c0d67c69dc8ed8c4bfdff71029b6b2f6e847f10e09b4905,2024-05-02T13:27:25.103000
|
CVE-2024-33913,0,0,fdcdfb506731b7f26c0d67c69dc8ed8c4bfdff71029b6b2f6e847f10e09b4905,2024-05-02T13:27:25.103000
|
||||||
|
CVE-2024-33914,1,1,d122138be1a4fa8f27f9a0154da62d95ee81352feb2e1f626c2b2720e3403478,2024-05-03T09:15:08.257000
|
||||||
|
CVE-2024-33915,1,1,7c97997ce00e2d31c63289dc1e9746492eef885457e2bab723cd9319b57ba16f,2024-05-03T09:15:08.443000
|
||||||
|
CVE-2024-33916,1,1,ddd81f51d78ff782f4665a4ee9d333f86d813d4bcccec8ffdac234592aabb001,2024-05-03T08:15:07.930000
|
||||||
|
CVE-2024-33918,1,1,ba35302d59b1f228115eeac250b715e051bd909d507675eba6b357f166b006e0,2024-05-03T08:15:08.113000
|
||||||
|
CVE-2024-33919,1,1,7570d4fc7a2e8b3576ff733bced3ede576f448bf3de61a243b932998bf7c9cfc,2024-05-03T09:15:08.633000
|
||||||
|
CVE-2024-33920,1,1,382fce48f7cf5efd062e4ed4411b3d4fd03d6495b1dddc1fcc58d48f4c3f1134,2024-05-03T09:15:08.827000
|
||||||
|
CVE-2024-33921,1,1,3e9250cf923f5f8f392eda3aa5efd0f95f852ae8dee59bbffa2326e66a8927bb,2024-05-03T09:15:09.020000
|
||||||
CVE-2024-33922,0,0,581070d9342f09fc7f3ba266aca2e54acec3a9f423037ff85b1ca1eb7af20122,2024-05-02T13:27:25.103000
|
CVE-2024-33922,0,0,581070d9342f09fc7f3ba266aca2e54acec3a9f423037ff85b1ca1eb7af20122,2024-05-02T13:27:25.103000
|
||||||
CVE-2024-33928,1,1,37e17338656e9b82882ce5a5575a68963bdf87b4947c48e4b26d76ff5fc32cc9,2024-05-03T07:15:38.507000
|
CVE-2024-33923,1,1,d0d8882dc254b1dcabb14b1df2e1b07735ce639cb0a50e662607c8688e0f97e0,2024-05-03T09:15:09.183000
|
||||||
|
CVE-2024-33924,1,1,c02dc11273085260cc198f1ebd137c9b0764a090b5b9cf33d2498355cfaf7699,2024-05-03T08:15:08.303000
|
||||||
|
CVE-2024-33925,1,1,6888fe843484e9b81477479a204796f7c7a51535f6e24af1459fa8ee19ffd0a0,2024-05-03T09:15:09.387000
|
||||||
|
CVE-2024-33926,1,1,5dccccae30fe1c23daacb6f298ed41edbf09405611ee109b3ef629696835fed5,2024-05-03T08:15:08.490000
|
||||||
|
CVE-2024-33927,1,1,5086b925ed192a5a3cd38aeac2295c3ce6c4ec549de3f122558161961985c3ee,2024-05-03T08:15:08.673000
|
||||||
|
CVE-2024-33928,0,0,37e17338656e9b82882ce5a5575a68963bdf87b4947c48e4b26d76ff5fc32cc9,2024-05-03T07:15:38.507000
|
||||||
|
CVE-2024-33929,1,1,0aca218489f58414054b89a88071ccd0d02935eac4a07478a9646fce00efdfde,2024-05-03T09:15:09.580000
|
||||||
CVE-2024-33930,0,0,d4854365518648983f110687642324ab33baba9fea77b8107ff83d4e8904d188,2024-05-02T13:27:25.103000
|
CVE-2024-33930,0,0,d4854365518648983f110687642324ab33baba9fea77b8107ff83d4e8904d188,2024-05-02T13:27:25.103000
|
||||||
CVE-2024-33932,1,1,7914dfec4aa92667bc194a1419455363ed058990262d7d04ea185f47de84ebe0,2024-05-03T07:15:38.870000
|
CVE-2024-33931,1,1,1dcb86ce59e2bbe2442d913840b204a26a61261b4e27f6ae256bf1d0926993aa,2024-05-03T09:15:09.763000
|
||||||
CVE-2024-33934,1,1,03f4279a02f160865e001cc3fbf5c3b2df6b3e7680a55c79cf854ef137560caa,2024-05-03T07:15:39.073000
|
CVE-2024-33932,0,0,7914dfec4aa92667bc194a1419455363ed058990262d7d04ea185f47de84ebe0,2024-05-03T07:15:38.870000
|
||||||
CVE-2024-33935,1,1,436e9a7e0496167e6737047ce6da521178a6b9ea215919af8b8c47e7f3f44db3,2024-05-03T07:15:39.283000
|
CVE-2024-33934,0,0,03f4279a02f160865e001cc3fbf5c3b2df6b3e7680a55c79cf854ef137560caa,2024-05-03T07:15:39.073000
|
||||||
CVE-2024-33936,1,1,57c60904b917bc2363b0f4e62d2bc144fa23a459366819d356164d1c0fc67f33,2024-05-03T07:15:39.510000
|
CVE-2024-33935,0,0,436e9a7e0496167e6737047ce6da521178a6b9ea215919af8b8c47e7f3f44db3,2024-05-03T07:15:39.283000
|
||||||
CVE-2024-33940,1,1,d916933a371eec0e6c276877f59092e5f502eed100e4b352e50f04737f83ce33,2024-05-03T07:15:39.737000
|
CVE-2024-33936,0,0,57c60904b917bc2363b0f4e62d2bc144fa23a459366819d356164d1c0fc67f33,2024-05-03T07:15:39.510000
|
||||||
CVE-2024-33943,1,1,4003668220f55a0b39406712e9a49dee067bde2efbe0782460513424b1eec6a1,2024-05-03T07:15:39.960000
|
CVE-2024-33937,1,1,2b2f5f3899102cebc3eb08181d91585bb923176ca2570954e37dd77f42f2811c,2024-05-03T09:15:09.950000
|
||||||
|
CVE-2024-33940,0,0,d916933a371eec0e6c276877f59092e5f502eed100e4b352e50f04737f83ce33,2024-05-03T07:15:39.737000
|
||||||
|
CVE-2024-33941,1,1,c23d6d664b6e586d7cbfe565b596f55ce703d669b0d8c8e1f468764b7f0499f0,2024-05-03T08:15:08.863000
|
||||||
|
CVE-2024-33943,0,0,4003668220f55a0b39406712e9a49dee067bde2efbe0782460513424b1eec6a1,2024-05-03T07:15:39.960000
|
||||||
CVE-2024-33944,0,0,4cc781cd62cbbf938c7006c765253cd67313b7791b0366c8f2092cb45b8a99dc,2024-05-02T13:27:25.103000
|
CVE-2024-33944,0,0,4cc781cd62cbbf938c7006c765253cd67313b7791b0366c8f2092cb45b8a99dc,2024-05-02T13:27:25.103000
|
||||||
CVE-2024-33945,1,1,1f8ed9e30fbf665a8f89e5c2ed08da58ea4f4a4d8aac43703bea3cdd0d82f183,2024-05-03T07:15:40.183000
|
CVE-2024-33945,0,0,1f8ed9e30fbf665a8f89e5c2ed08da58ea4f4a4d8aac43703bea3cdd0d82f183,2024-05-03T07:15:40.183000
|
||||||
CVE-2024-33946,1,1,7749bc95bb44b6b3399654fc1acfa67a1aa736677e6f671389a5a081f68ebe0f,2024-05-03T07:15:40.390000
|
CVE-2024-33946,0,0,7749bc95bb44b6b3399654fc1acfa67a1aa736677e6f671389a5a081f68ebe0f,2024-05-03T07:15:40.390000
|
||||||
CVE-2024-33947,1,1,a4152554225f2e5b535d459a8d349f7815ed1971de50ee606ff773d00d6ba544,2024-05-03T07:15:40.610000
|
CVE-2024-33947,0,0,a4152554225f2e5b535d459a8d349f7815ed1971de50ee606ff773d00d6ba544,2024-05-03T07:15:40.610000
|
||||||
CVE-2024-33948,0,0,2bb7b1a0fe53ad644dd8a2c603bf2dadaa4b303b20f5403ca2602ecee7c6317d,2024-05-02T18:00:37.360000
|
CVE-2024-33948,0,0,2bb7b1a0fe53ad644dd8a2c603bf2dadaa4b303b20f5403ca2602ecee7c6317d,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-33949,0,0,9d0ce2c159023e8535673165a86e327dfd4d2416dece4753f569198bb9736d90,2024-05-02T18:00:37.360000
|
CVE-2024-33949,0,0,9d0ce2c159023e8535673165a86e327dfd4d2416dece4753f569198bb9736d90,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-3400,0,0,5bb68c1f741d7492d6e3e08b6f1711eb6e28a4a827bd2f3f354ccd1b7a47a1fe,2024-04-23T19:57:25.207000
|
CVE-2024-3400,0,0,5bb68c1f741d7492d6e3e08b6f1711eb6e28a4a827bd2f3f354ccd1b7a47a1fe,2024-04-23T19:57:25.207000
|
||||||
@ -248049,7 +248075,7 @@ CVE-2024-34401,0,0,d39980a44b57d8fe0020ed0bdce81702e281b86c7f9454dc35849d8e484fd
|
|||||||
CVE-2024-34402,0,0,0d3847bdfd4bfbe9f122b3fcf7acc95f3a8de36e7abc3044a43566cbb28e2d12,2024-05-03T01:15:48.633000
|
CVE-2024-34402,0,0,0d3847bdfd4bfbe9f122b3fcf7acc95f3a8de36e7abc3044a43566cbb28e2d12,2024-05-03T01:15:48.633000
|
||||||
CVE-2024-34403,0,0,b7c7a64d817fd02e8957eb2d5226e2560fb04b07c2a754376240d5d9a61b4f6f,2024-05-03T01:15:48.693000
|
CVE-2024-34403,0,0,b7c7a64d817fd02e8957eb2d5226e2560fb04b07c2a754376240d5d9a61b4f6f,2024-05-03T01:15:48.693000
|
||||||
CVE-2024-34404,0,0,588c33f3a39dbf54a6a30da6c4efbef4f6b568a9b48e3960d118c2011f0523bd,2024-05-03T01:15:48.753000
|
CVE-2024-34404,0,0,588c33f3a39dbf54a6a30da6c4efbef4f6b568a9b48e3960d118c2011f0523bd,2024-05-03T01:15:48.753000
|
||||||
CVE-2024-34408,1,1,9674e37790921a6412ccb1ad00a4c7e299039ac9af39ad200e5276e5bd5862bc,2024-05-03T06:15:13.883000
|
CVE-2024-34408,0,0,9674e37790921a6412ccb1ad00a4c7e299039ac9af39ad200e5276e5bd5862bc,2024-05-03T06:15:13.883000
|
||||||
CVE-2024-3441,0,0,657e15d08a05c85e0f4e982fae7cec49fd4b8dda898982a18c454ae2db45f222,2024-04-11T01:26:02.813000
|
CVE-2024-3441,0,0,657e15d08a05c85e0f4e982fae7cec49fd4b8dda898982a18c454ae2db45f222,2024-04-11T01:26:02.813000
|
||||||
CVE-2024-3442,0,0,756156f7de62e4a3ae69e9bbc13d8b798986428892e90d3991a24b2c8375a976,2024-04-11T01:26:02.893000
|
CVE-2024-3442,0,0,756156f7de62e4a3ae69e9bbc13d8b798986428892e90d3991a24b2c8375a976,2024-04-11T01:26:02.893000
|
||||||
CVE-2024-3443,0,0,05006967bda17a889e39c8ccda497403cb2b35584eb895b86d4c8dd8b79230c6,2024-04-11T01:26:02.973000
|
CVE-2024-3443,0,0,05006967bda17a889e39c8ccda497403cb2b35584eb895b86d4c8dd8b79230c6,2024-04-11T01:26:02.973000
|
||||||
@ -248153,7 +248179,7 @@ CVE-2024-3622,0,0,8a36012169667d948c0b90aa74b5439b232e5ac011c2df4d1ba7f1e8b3410d
|
|||||||
CVE-2024-3623,0,0,9044a03f32811b426f24d5347da98fbfdb67f97317f2e90baed487a2da0b464c,2024-04-26T12:58:17.720000
|
CVE-2024-3623,0,0,9044a03f32811b426f24d5347da98fbfdb67f97317f2e90baed487a2da0b464c,2024-04-26T12:58:17.720000
|
||||||
CVE-2024-3624,0,0,e0ac19607b4c8d1214127703973418b820b7283270ffca198194137ef8f4191a,2024-04-26T12:58:17.720000
|
CVE-2024-3624,0,0,e0ac19607b4c8d1214127703973418b820b7283270ffca198194137ef8f4191a,2024-04-26T12:58:17.720000
|
||||||
CVE-2024-3625,0,0,bb7fa72c43d725aef9f66641f31c3359a614ed8ba414acf9f05b8e44148cef81,2024-04-26T12:58:17.720000
|
CVE-2024-3625,0,0,bb7fa72c43d725aef9f66641f31c3359a614ed8ba414acf9f05b8e44148cef81,2024-04-26T12:58:17.720000
|
||||||
CVE-2024-3637,1,1,a862d2c5cd0cacf30f8cf772ed0aa1e62601ac9ac72ada5ce414ffd1ac3478ed,2024-05-03T06:15:14.367000
|
CVE-2024-3637,0,0,a862d2c5cd0cacf30f8cf772ed0aa1e62601ac9ac72ada5ce414ffd1ac3478ed,2024-05-03T06:15:14.367000
|
||||||
CVE-2024-3645,0,0,9bfaa42192c6fa49951fba1d7645fb7975d3a2b4cd9bcc55a7dd9ceef33e077c,2024-04-22T19:24:12.920000
|
CVE-2024-3645,0,0,9bfaa42192c6fa49951fba1d7645fb7975d3a2b4cd9bcc55a7dd9ceef33e077c,2024-04-22T19:24:12.920000
|
||||||
CVE-2024-3646,0,0,f1ba7615d07aeacaca9371aa5a68bf3033db9a231eaf2716a6cbfd3f340bcd58,2024-04-19T16:19:49.043000
|
CVE-2024-3646,0,0,f1ba7615d07aeacaca9371aa5a68bf3033db9a231eaf2716a6cbfd3f340bcd58,2024-04-19T16:19:49.043000
|
||||||
CVE-2024-3647,0,0,9a58c5cd1724db67ae31d7fcb82614e13b94745ce70e2f631b6a89fd4209e534,2024-05-02T18:00:37.360000
|
CVE-2024-3647,0,0,9a58c5cd1724db67ae31d7fcb82614e13b94745ce70e2f631b6a89fd4209e534,2024-05-02T18:00:37.360000
|
||||||
@ -248181,13 +248207,13 @@ CVE-2024-3688,0,0,3c3da89dff2f70e57f08c91100cb9c86b1a450e1376976b3915fc6db73e441
|
|||||||
CVE-2024-3689,0,0,ca03c96614779955212f56af1bfe396d14767fb4e42684be0d25e5a13ee997ef,2024-04-15T13:15:51.577000
|
CVE-2024-3689,0,0,ca03c96614779955212f56af1bfe396d14767fb4e42684be0d25e5a13ee997ef,2024-04-15T13:15:51.577000
|
||||||
CVE-2024-3690,0,0,45ec985edc29a1318bd4462496029f540b76442d39a99652ea154ad9b947ac31,2024-04-15T13:15:51.577000
|
CVE-2024-3690,0,0,45ec985edc29a1318bd4462496029f540b76442d39a99652ea154ad9b947ac31,2024-04-15T13:15:51.577000
|
||||||
CVE-2024-3691,0,0,50a4350944100a4a70bc8a429651ad99366d63f29ce56edffa6a7e21ea9072d9,2024-04-15T13:15:51.577000
|
CVE-2024-3691,0,0,50a4350944100a4a70bc8a429651ad99366d63f29ce56edffa6a7e21ea9072d9,2024-04-15T13:15:51.577000
|
||||||
CVE-2024-3692,1,1,73b00bb45ab9f367e8f05b791b33fa9be05cd13d0f8ae9132ec2f390fa44c71e,2024-05-03T06:15:14.590000
|
CVE-2024-3692,0,0,73b00bb45ab9f367e8f05b791b33fa9be05cd13d0f8ae9132ec2f390fa44c71e,2024-05-03T06:15:14.590000
|
||||||
CVE-2024-3695,0,0,0a43ca9cb7c9ed3b42a0a2ca78fb1a22450722e79069ea4af175196569fb25d2,2024-04-15T13:15:51.577000
|
CVE-2024-3695,0,0,0a43ca9cb7c9ed3b42a0a2ca78fb1a22450722e79069ea4af175196569fb25d2,2024-04-15T13:15:51.577000
|
||||||
CVE-2024-3696,0,0,76b6c8c2c1c888d8dbcd35fa3dca1be5fd86a30262a9814ac950ae6f81231ade,2024-04-15T13:15:51.577000
|
CVE-2024-3696,0,0,76b6c8c2c1c888d8dbcd35fa3dca1be5fd86a30262a9814ac950ae6f81231ade,2024-04-15T13:15:51.577000
|
||||||
CVE-2024-3697,0,0,e4b1bcbf89b8a1942985523bcb445f6ad3c80d5c75b882ffd7ee4a29710123b3,2024-04-15T13:15:31.997000
|
CVE-2024-3697,0,0,e4b1bcbf89b8a1942985523bcb445f6ad3c80d5c75b882ffd7ee4a29710123b3,2024-04-15T13:15:31.997000
|
||||||
CVE-2024-3698,0,0,fa933a41a7207cccf1114c08f1063dd5ca2a9eed2da27e37cd95d87db2808078,2024-04-15T13:15:31.997000
|
CVE-2024-3698,0,0,fa933a41a7207cccf1114c08f1063dd5ca2a9eed2da27e37cd95d87db2808078,2024-04-15T13:15:31.997000
|
||||||
CVE-2024-3701,0,0,d78f52a76181001272debccb095fb5971bb478ebc111313d9ff2994f4ec0598f,2024-04-15T13:15:31.997000
|
CVE-2024-3701,0,0,d78f52a76181001272debccb095fb5971bb478ebc111313d9ff2994f4ec0598f,2024-04-15T13:15:31.997000
|
||||||
CVE-2024-3703,1,1,5474bf3418205b5be3a5cf5d423333337e108efebac07931feb7c2c558316d32,2024-05-03T06:15:14.800000
|
CVE-2024-3703,0,0,5474bf3418205b5be3a5cf5d423333337e108efebac07931feb7c2c558316d32,2024-05-03T06:15:14.800000
|
||||||
CVE-2024-3704,0,0,ad7f205e31bc442943bbd584692b194a3485d815654eeb83e4eefef6a6eff393,2024-04-15T13:15:51.577000
|
CVE-2024-3704,0,0,ad7f205e31bc442943bbd584692b194a3485d815654eeb83e4eefef6a6eff393,2024-04-15T13:15:51.577000
|
||||||
CVE-2024-3705,0,0,44f1c76d2f6cd8dab882ddfdbdbe908a4e3a8f22d6a90f31f0279b7faf87a669,2024-04-15T13:15:51.577000
|
CVE-2024-3705,0,0,44f1c76d2f6cd8dab882ddfdbdbe908a4e3a8f22d6a90f31f0279b7faf87a669,2024-04-15T13:15:51.577000
|
||||||
CVE-2024-3706,0,0,93b27543775cdce8e7b256b8d014ea258e7a61f0ddb1cca03581da1a85330700,2024-04-15T13:15:51.577000
|
CVE-2024-3706,0,0,93b27543775cdce8e7b256b8d014ea258e7a61f0ddb1cca03581da1a85330700,2024-04-15T13:15:51.577000
|
||||||
@ -248469,4 +248495,4 @@ CVE-2024-4369,0,0,352391da6a6ef399397c7f9abf94d5a6fda2875f0f06f0b38dacd9a1a940e5
|
|||||||
CVE-2024-4405,0,0,ae0f4db23c6909c7d74c90a9689be79a58cad53d93c458fbc8aa608abe2f0377,2024-05-02T18:00:37.360000
|
CVE-2024-4405,0,0,ae0f4db23c6909c7d74c90a9689be79a58cad53d93c458fbc8aa608abe2f0377,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-4406,0,0,e1c30f2212dcad9d546e3af047be1a2ed8c32271936aca83f8eb5fa48d87e35c,2024-05-02T18:00:37.360000
|
CVE-2024-4406,0,0,e1c30f2212dcad9d546e3af047be1a2ed8c32271936aca83f8eb5fa48d87e35c,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-4433,0,0,57fa2b8bf7e34ebce0673dcb40cbc1cb3d930cfbe754fed569c751398fdf1c6b,2024-05-02T18:00:37.360000
|
CVE-2024-4433,0,0,57fa2b8bf7e34ebce0673dcb40cbc1cb3d930cfbe754fed569c751398fdf1c6b,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-4439,1,1,1a2ab1ea900fe1258f90808166f3d7d377ba90d092c402bdfc5c7c6496b9b12b,2024-05-03T06:15:14.947000
|
CVE-2024-4439,0,0,1a2ab1ea900fe1258f90808166f3d7d377ba90d092c402bdfc5c7c6496b9b12b,2024-05-03T06:15:14.947000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user