mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 03:27:17 +00:00
Auto-Update: 2024-04-22T23:55:30.121853+00:00
This commit is contained in:
parent
d31b157c37
commit
7a24c956fb
20
CVE-2024/CVE-2024-310xx/CVE-2024-31036.json
Normal file
20
CVE-2024/CVE-2024-310xx/CVE-2024-31036.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-31036",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T22:15:07.400",
|
||||
"lastModified": "2024-04-22T22:15:07.400",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A heap-buffer-overflow vulnerability in the read_byte function in NanoMQ v.0.21.7 allows attackers to cause a denial of service via transmission of crafted hexstreams."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nanomq/nanomq/issues/1722",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-31xx/CVE-2024-3177.json
Normal file
59
CVE-2024/CVE-2024-31xx/CVE-2024-3177.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-3177",
|
||||
"sourceIdentifier": "jordan@liggitt.net",
|
||||
"published": "2024-04-22T23:15:51.180",
|
||||
"lastModified": "2024-04-22T23:15:51.180",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service account\u2019s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "jordan@liggitt.net",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.7,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "jordan@liggitt.net",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kubernetes/kubernetes/issues/124336",
|
||||
"source": "jordan@liggitt.net"
|
||||
},
|
||||
{
|
||||
"url": "https://groups.google.com/g/kubernetes-security-announce/c/JxjHf7fkVd8/m/oVCzypyOAQAJ",
|
||||
"source": "jordan@liggitt.net"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2024/CVE-2024-324xx/CVE-2024-32459.json
Normal file
67
CVE-2024/CVE-2024-324xx/CVE-2024-32459.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2024-32459",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-22T22:15:07.463",
|
||||
"lastModified": "2024-04-22T22:15:07.463",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients and servers that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. No known workarounds are available."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/FreeRDP/FreeRDP/pull/10077",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cp4q-p737-rmw9",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2024/CVE-2024-324xx/CVE-2024-32460.json
Normal file
67
CVE-2024/CVE-2024-324xx/CVE-2024-32460.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2024-32460",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-22T22:15:07.647",
|
||||
"lastModified": "2024-04-22T22:15:07.647",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based based clients using `/bpp:32` legacy `GDI` drawing path with a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use modern drawing paths (e.g. `/rfx` or `/gfx` options). The workaround requires server side support."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/FreeRDP/FreeRDP/pull/10077",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4rr8-gr65-vqrr",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-324xx/CVE-2024-32461.json
Normal file
63
CVE-2024/CVE-2024-324xx/CVE-2024-32461.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-32461",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-22T22:15:07.840",
|
||||
"lastModified": "2024-04-22T22:15:07.840",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A SQL injection vulnerability in POST /search/search=packages in LibreNMS prior to version 24.4.0 allows a user with global read privileges to execute SQL commands via the package parameter. With this vulnerability, an attacker can exploit a SQL injection time based vulnerability to extract all data from the database, such as administrator credentials. Version 24.4.0 contains a patch for the vulnerability.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://doc.clickup.com/9013166444/p/h/8ckm0bc-53/16811991bb5fff6",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/commit/d29201fce134347f891102699fbde7070debee33",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-cwx6-cx7x-4q34",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-324xx/CVE-2024-32479.json
Normal file
63
CVE-2024/CVE-2024-324xx/CVE-2024-32479.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-32479",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-22T22:15:08.027",
|
||||
"lastModified": "2024-04-22T22:15:08.027",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Prior to version 24.4.0, there is improper sanitization on the `Service` template name, which can lead to stored Cross-site Scripting. Version 24.4.0 fixes this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/blob/a61c11db7e8ef6a437ab55741658be2be7d14d34/app/Http/Controllers/ServiceTemplateController.php#L67C23-L67C23",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/commit/19344f0584d4d6d4526fdf331adc60530e3f685b",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-72m9-7c8x-pmmw",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-324xx/CVE-2024-32480.json
Normal file
59
CVE-2024/CVE-2024-324xx/CVE-2024-32480.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-32480",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-22T23:15:50.440",
|
||||
"lastModified": "2024-04-22T23:15:50.440",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Versions prior to 24.4.0 are vulnerable to SQL injection. The `order` parameter is obtained from `$request`. After performing a string check, the value is directly incorporated into an SQL statement and concatenated, resulting in a SQL injection vulnerability. An attacker may extract a whole database this way. Version 24.4.0 fixes the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/commit/83fe4b10c440d69a47fe2f8616e290ba2bd3a27c",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-jh57-j3vq-h438",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-326xx/CVE-2024-32653.json
Normal file
63
CVE-2024/CVE-2024-326xx/CVE-2024-32653.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-32653",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-22T23:15:50.630",
|
||||
"lastModified": "2024-04-22T23:15:50.630",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "jadx is a Dex to Java decompiler. Prior to version 1.5.0, the package name is not filtered before concatenation. This can be exploited to inject arbitrary code into the package name. The vulnerability allows an attacker to execute commands with shell privileges. Version 1.5.0 contains a patch for the vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skylot/jadx/blob/9114821fb12558874e01421bf38b0d34fb39df72/jadx-gui/src/main/java/jadx/gui/device/protocol/ADBDevice.java#L108-L109",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/skylot/jadx/releases/tag/v1.5.0",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/skylot/jadx/security/advisories/GHSA-3pp3-hg2q-9gpm",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-326xx/CVE-2024-32656.json
Normal file
59
CVE-2024/CVE-2024-326xx/CVE-2024-32656.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-32656",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-22T23:15:50.817",
|
||||
"lastModified": "2024-04-22T23:15:50.817",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Ant Media Server is live streaming engine software. A local privilege escalation vulnerability in present in versions 2.6.0 through 2.8.2 allows any unprivileged operating system user account to escalate privileges to the root user account on the system. This vulnerability arises from Ant Media Server running with Java Management Extensions (JMX) enabled and authentication disabled on localhost on port 5599/TCP. This vulnerability is nearly identical to the local privilege escalation vulnerability CVE-2023-26269 identified in Apache James. Any unprivileged operating system user can connect to the JMX service running on port 5599/TCP on localhost and leverage the MLet Bean within JMX to load a remote MBean from an attacker-controlled server. This allows an attacker to execute arbitrary code within the Java process run by Ant Media Server and execute code within the context of the `antmedia` service account on the system. Version 2.9.0 contains a patch for the issue. As a workaround, one may remove certain parameters from the `antmedia.service` file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ant-media/Ant-Media-Server/commit/9cb38500729e0ff302da0290b9cfe1ec4dd6c764",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ant-media/Ant-Media-Server/security/advisories/GHSA-qwhw-hh9j-54f5",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2024/CVE-2024-326xx/CVE-2024-32657.json
Normal file
67
CVE-2024/CVE-2024-326xx/CVE-2024-32657.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2024-32657",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-22T23:15:50.997",
|
||||
"lastModified": "2024-04-22T23:15:50.997",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Hydra is a Continuous Integration service for Nix based projects. Attackers can execute arbitrary code in the browser context of Hydra and execute authenticated HTTP requests. The abused feature allows Nix builds to specify files that Hydra serves to clients. One use of this functionality is serving NixOS `.iso` files. The issue is only with html files served by Hydra. The issue has been patched on https://hydra.nixos.org around 2024-04-21 14:30 UTC. The nixpkgs package were fixed in unstable and 23.11. Users with custom Hydra packages can apply the fix commit to their local installations. The vulnerability is only triggered when opening HTML build artifacts, so not opening them until the vulnerability is fixed works around the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/NixOS/hydra/commit/b72528be5074f3e62e9ae2c2ae8ef9c07a0b4dd3",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/NixOS/hydra/security/advisories/GHSA-2p75-6g9f-pqgx",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/NixOS/nixpkgs/pull/306017",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/NixOS/nixpkgs/pull/306018",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
33
README.md
33
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-22T22:00:38.169474+00:00
|
||||
2024-04-22T23:55:30.121853+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-22T21:15:49.890000+00:00
|
||||
2024-04-22T23:15:51.180000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,32 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
246509
|
||||
246519
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `12`
|
||||
Recently added CVEs: `10`
|
||||
|
||||
- [CVE-2024-27574](CVE-2024/CVE-2024-275xx/CVE-2024-27574.json) (`2024-04-22T21:15:48.987`)
|
||||
- [CVE-2024-29368](CVE-2024/CVE-2024-293xx/CVE-2024-29368.json) (`2024-04-22T21:15:49.043`)
|
||||
- [CVE-2024-32039](CVE-2024/CVE-2024-320xx/CVE-2024-32039.json) (`2024-04-22T21:15:49.090`)
|
||||
- [CVE-2024-32040](CVE-2024/CVE-2024-320xx/CVE-2024-32040.json) (`2024-04-22T21:15:49.290`)
|
||||
- [CVE-2024-32041](CVE-2024/CVE-2024-320xx/CVE-2024-32041.json) (`2024-04-22T21:15:49.477`)
|
||||
- [CVE-2024-32205](CVE-2024/CVE-2024-322xx/CVE-2024-32205.json) (`2024-04-22T20:15:07.210`)
|
||||
- [CVE-2024-32238](CVE-2024/CVE-2024-322xx/CVE-2024-32238.json) (`2024-04-22T20:15:07.630`)
|
||||
- [CVE-2024-32394](CVE-2024/CVE-2024-323xx/CVE-2024-32394.json) (`2024-04-22T21:15:49.657`)
|
||||
- [CVE-2024-32399](CVE-2024/CVE-2024-323xx/CVE-2024-32399.json) (`2024-04-22T20:15:07.683`)
|
||||
- [CVE-2024-32405](CVE-2024/CVE-2024-324xx/CVE-2024-32405.json) (`2024-04-22T20:15:07.737`)
|
||||
- [CVE-2024-32458](CVE-2024/CVE-2024-324xx/CVE-2024-32458.json) (`2024-04-22T21:15:49.707`)
|
||||
- [CVE-2024-4040](CVE-2024/CVE-2024-40xx/CVE-2024-4040.json) (`2024-04-22T20:15:07.803`)
|
||||
- [CVE-2024-31036](CVE-2024/CVE-2024-310xx/CVE-2024-31036.json) (`2024-04-22T22:15:07.400`)
|
||||
- [CVE-2024-3177](CVE-2024/CVE-2024-31xx/CVE-2024-3177.json) (`2024-04-22T23:15:51.180`)
|
||||
- [CVE-2024-32459](CVE-2024/CVE-2024-324xx/CVE-2024-32459.json) (`2024-04-22T22:15:07.463`)
|
||||
- [CVE-2024-32460](CVE-2024/CVE-2024-324xx/CVE-2024-32460.json) (`2024-04-22T22:15:07.647`)
|
||||
- [CVE-2024-32461](CVE-2024/CVE-2024-324xx/CVE-2024-32461.json) (`2024-04-22T22:15:07.840`)
|
||||
- [CVE-2024-32479](CVE-2024/CVE-2024-324xx/CVE-2024-32479.json) (`2024-04-22T22:15:08.027`)
|
||||
- [CVE-2024-32480](CVE-2024/CVE-2024-324xx/CVE-2024-32480.json) (`2024-04-22T23:15:50.440`)
|
||||
- [CVE-2024-32653](CVE-2024/CVE-2024-326xx/CVE-2024-32653.json) (`2024-04-22T23:15:50.630`)
|
||||
- [CVE-2024-32656](CVE-2024/CVE-2024-326xx/CVE-2024-32656.json) (`2024-04-22T23:15:50.817`)
|
||||
- [CVE-2024-32657](CVE-2024/CVE-2024-326xx/CVE-2024-32657.json) (`2024-04-22T23:15:50.997`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2023-33584](CVE-2023/CVE-2023-335xx/CVE-2023-33584.json) (`2024-04-22T21:15:48.840`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
36
_state.csv
36
_state.csv
@ -224152,7 +224152,7 @@ CVE-2023-3357,0,0,1795badf23992d8257da46aa6b4ec132f0faaa631a40ad67acb153f32fe5ca
|
||||
CVE-2023-33570,0,0,5a655025878152989d89e7771b68efea923e0d3eca9c90a19bb9fdc08bd526d5,2023-07-10T15:53:05.990000
|
||||
CVE-2023-3358,0,0,093e146a7884d354b9d04cd43dba68f208f197108b7b60132eae24a4d2e990b8,2023-07-06T16:54:55.357000
|
||||
CVE-2023-33580,0,0,aac5173e711c5ded624aefba67c8cc86c5aa0ef6f247bc09d960627fa3791074,2024-04-10T15:16:03.813000
|
||||
CVE-2023-33584,0,1,24f51329ef11580201006296cacbc329505b4a0223919af3f13f93257cc18209,2024-04-22T21:15:48.840000
|
||||
CVE-2023-33584,0,0,24f51329ef11580201006296cacbc329505b4a0223919af3f13f93257cc18209,2024-04-22T21:15:48.840000
|
||||
CVE-2023-3359,0,0,2cd549ba11ae617185e8de20761c8b96b06be0c910e70528783fb5d477433fd0,2023-07-06T16:56:35.407000
|
||||
CVE-2023-33591,0,0,8ef510bd4b46492f800a4fd2dd0839dc6960fd9dafb4be5e2b45b5aa463fa7ca,2023-06-28T15:47:35.893000
|
||||
CVE-2023-33592,0,0,e6f6dffc3bf9dee8a9fcae159522b0cdc35bc154e68c5baea705bdddccb63e44,2023-09-25T16:46:20.430000
|
||||
@ -243890,7 +243890,7 @@ CVE-2024-27569,0,0,000ff88e8ff4678a3790d0ee96674581a9a53afd1b5f0d49033b717c5dd65
|
||||
CVE-2024-27570,0,0,30e1bdadd931878127199d0565523cd94923921178695ba62d569ae38e48386b,2024-03-01T15:23:36.177000
|
||||
CVE-2024-27571,0,0,2fcce61cb867ec2a650e4bd74e7018e990625a473882c12953648f5c8c2545b3,2024-03-01T15:23:36.177000
|
||||
CVE-2024-27572,0,0,6169a6a6221da5c6dbb1556f7b45e6b45c4deebae5e21607b1e3cfa478f1fe5b,2024-03-01T15:23:36.177000
|
||||
CVE-2024-27574,1,1,bcc5eeca8a1b5f671cf3af5d812b47b420b66573be9babdf35ec56e12529b804,2024-04-22T21:15:48.987000
|
||||
CVE-2024-27574,0,0,bcc5eeca8a1b5f671cf3af5d812b47b420b66573be9babdf35ec56e12529b804,2024-04-22T21:15:48.987000
|
||||
CVE-2024-27575,0,0,fe78cdbfc48ba2557faf61957a122c11738e27bfad3d91860b0cc50d57150a36,2024-04-07T04:15:07.723000
|
||||
CVE-2024-2758,0,0,a3cb437eedb439caebfac4666310f05bccf69de779d818f9f315740c92bee7d8,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2759,0,0,cb410b99122b16bbafd55e196fc83701c95bae09fba9353767401f5fe587c56c,2024-04-04T16:33:06.610000
|
||||
@ -244714,7 +244714,7 @@ CVE-2024-2934,0,0,0a91524619de13afaff0e82d7a21ecc81f28b80f897e74dbcf5f2c4795f84a
|
||||
CVE-2024-2935,0,0,03b2e13118238c25a371886663ff5ca99f3babe087c5e23aed7873fb02fb806f,2024-04-11T01:25:41.850000
|
||||
CVE-2024-2936,0,0,939d0b63a99773a9af28992aa96fda3d6af92afdee01445b26fbf5b1e7eb245c,2024-03-29T12:45:02.937000
|
||||
CVE-2024-29366,0,0,7401048215b84763b7b2374bbab17e21709c21accf205850b7210511d30d6293,2024-03-22T19:02:10.300000
|
||||
CVE-2024-29368,1,1,b2fb1a5d45a101f827338a5ca2925b1e6be000e87c6951b2c0bef7990fa345fc,2024-04-22T21:15:49.043000
|
||||
CVE-2024-29368,0,0,b2fb1a5d45a101f827338a5ca2925b1e6be000e87c6951b2c0bef7990fa345fc,2024-04-22T21:15:49.043000
|
||||
CVE-2024-29374,0,0,dd275404ab360479a756d96aca2b6517b11bd3239b0ee4b1b68a18e9bbec3822,2024-03-21T19:47:03.943000
|
||||
CVE-2024-29375,0,0,61c42a83ac8fdf63093e9fa8c57bcfe142ca6a7e368bf61cc8c311f84268ba4d,2024-04-04T12:48:41.700000
|
||||
CVE-2024-29376,0,0,396d2086661367bf2f120a5a23cedf0a6063f8b47eb6959047bd018cf7f6b2b3,2024-04-22T19:24:06.727000
|
||||
@ -245534,6 +245534,7 @@ CVE-2024-31025,0,0,049c3aee715c9c75f255eea2ba7d71aee620ad97e93ef3b0e0a948ae51dd0
|
||||
CVE-2024-31031,0,0,29fa87d48aad0a0bc20057b1b9ecb42c0a06bf12b16eb69819fa3b6a4f2669e1,2024-04-17T20:08:21.887000
|
||||
CVE-2024-31032,0,0,71dbb2a787f73b1914bf5d51e1b83b5365eb112b3ab9ed4df5d1066682b5223b,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31033,0,0,200340e7b08fbb0d6701818d4b83bef89c21119b7d9fe7f5be450bb2b1edb614,2024-04-11T01:25:48.953000
|
||||
CVE-2024-31036,1,1,59affa21405d25f7d7f4aaa77f6b92475c58d92809aadc797bc272693561d4c1,2024-04-22T22:15:07.400000
|
||||
CVE-2024-31040,0,0,58d694e98ef6e322b940345b4415e080b141132f654a38c35a41dac24f1e6dc0,2024-04-17T20:08:21.887000
|
||||
CVE-2024-31041,0,0,55cb17ccb9a4ccc47749a0a1f025025c536447c530ceaeb2d7f75919ad09c350,2024-04-17T20:08:21.887000
|
||||
CVE-2024-31047,0,0,ed6b998d2efbbc258ad744f538162378aa1b702ac5e17462e2e5f42d9945fb08,2024-04-09T12:48:04.090000
|
||||
@ -245806,6 +245807,7 @@ CVE-2024-31745,0,0,ca5ec1c092fce054af70d410aee2649145d7a18036901e509dca6c0e74718
|
||||
CVE-2024-31750,0,0,ef2fe441e5dcedf0cb2da823df8fe57e9b7ada67d4a5ac9a3c649524c0ed2fa2,2024-04-19T13:10:25.637000
|
||||
CVE-2024-31759,0,0,7081cd22df5b9e4148ecc914176fc1f6cc04366073f8b1e4eccd8dfe4f2b7d73,2024-04-17T12:48:07.510000
|
||||
CVE-2024-31760,0,0,7b1e0b53a94a63e7f108110799c5f85524efc23136fc5608e680b8482e690959,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3177,1,1,4188435cf2eb3b06c526aa46bc19d8a49354941ecbdc9288f83e4d38423ff0a7,2024-04-22T23:15:51.180000
|
||||
CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818bf,2024-04-04T12:48:41.700000
|
||||
CVE-2024-31783,0,0,39c4df7f07fa9e66dc5d42dd16bc0981c0d6511a0c96852796a6de0ccb03c2ac,2024-04-16T13:24:07.103000
|
||||
CVE-2024-31784,0,0,0055eda0e2e2e3cebbac3d895c086f3674073feab99e847bee4ca99f9495a801,2024-04-16T13:24:07.103000
|
||||
@ -245913,10 +245915,10 @@ CVE-2024-3203,0,0,d460cfbc8661b4424cc0984f526a676bb0961256fc9d04a7d500e891870298
|
||||
CVE-2024-32035,0,0,9f9419e7b7ca688ca6c807b99c4196d3fdd26d305c290e1d723cf412a79167b9,2024-04-16T13:24:07.103000
|
||||
CVE-2024-32036,0,0,4358f457ff05e2fb3005eccdac6fca8cb869be3ffa209c190e441f2c4aed7dbe,2024-04-16T23:15:09.173000
|
||||
CVE-2024-32038,0,0,0c62c1bb60ae59f0486be34fe779022cf62ebed910094f07560f60e059fb8333,2024-04-19T16:19:49.043000
|
||||
CVE-2024-32039,1,1,903d6f1b801ce3cb1cf30fb63096cefc285997d688eb683fcfe664b5835eba84,2024-04-22T21:15:49.090000
|
||||
CVE-2024-32039,0,0,903d6f1b801ce3cb1cf30fb63096cefc285997d688eb683fcfe664b5835eba84,2024-04-22T21:15:49.090000
|
||||
CVE-2024-3204,0,0,2a2a133d829052d72380a6f7a45e32f6ecd96ec6da65fdbadcbe92a1f79d774f,2024-04-11T01:25:55.933000
|
||||
CVE-2024-32040,1,1,3766545a4f13c59ba4d4b4d068bd390255fef99cd14416b0ba9f81ad55a8bd93,2024-04-22T21:15:49.290000
|
||||
CVE-2024-32041,1,1,04b89046e3d0ca3229dfcf282ef96cdae99675e6240ef182516afb2b8e764edc,2024-04-22T21:15:49.477000
|
||||
CVE-2024-32040,0,0,3766545a4f13c59ba4d4b4d068bd390255fef99cd14416b0ba9f81ad55a8bd93,2024-04-22T21:15:49.290000
|
||||
CVE-2024-32041,0,0,04b89046e3d0ca3229dfcf282ef96cdae99675e6240ef182516afb2b8e764edc,2024-04-22T21:15:49.477000
|
||||
CVE-2024-3205,0,0,befb48df2bb5e20af3b4383c1ef82865b9f9fb3145e096ffb7e0098ff096b4f8,2024-04-11T01:25:56.010000
|
||||
CVE-2024-3207,0,0,a57734da301192d6a9381ac71eef9bc84e6acf70886d5628a9c0939255320fc2,2024-04-11T01:25:56.090000
|
||||
CVE-2024-32079,0,0,da7c5fc89984eb26823f30faeb9a07fc0733d153f127ad026564ff0d33e59be6,2024-04-15T13:15:31.997000
|
||||
@ -245982,12 +245984,12 @@ CVE-2024-32163,0,0,2a0e3e31a356cd8bdaedc62aa40103c9838a070e53ea091fe0aa567b9d093
|
||||
CVE-2024-32166,0,0,af772ceecc3fc2866fca4167f4349d8cebe27f4d82d6a64ba5e2abe771141833,2024-04-19T16:19:49.043000
|
||||
CVE-2024-3217,0,0,3ac42247ba2d685c0a6f4de738ef771d2778cce367312f144d0326551965dbb5,2024-04-05T12:40:52.763000
|
||||
CVE-2024-3218,0,0,75e1c84ee83eb1d158244a2182789a8e99b92d3a400a75a7854fff9872030968,2024-04-11T01:25:56.290000
|
||||
CVE-2024-32205,1,1,3b6122f4454c6189a285ee435770c5e0b5d0cb175cbe04dd262a3757da1f87c2,2024-04-22T20:15:07.210000
|
||||
CVE-2024-32205,0,0,3b6122f4454c6189a285ee435770c5e0b5d0cb175cbe04dd262a3757da1f87c2,2024-04-22T20:15:07.210000
|
||||
CVE-2024-32206,0,0,75e2f6344ef11995a7b224164fb98cef520a3da698959b3897e594f3d6e35fe2,2024-04-19T16:19:49.043000
|
||||
CVE-2024-3221,0,0,feefc929b27a3432f5d1352d15fe99f1f6ccd294cecb07c343d15630058ba883,2024-04-11T01:25:56.367000
|
||||
CVE-2024-3222,0,0,66f6b4b9196c6c0a91ef8acd4cd0373a609da64e89b651a11374a40389e0fbce,2024-04-11T01:25:56.443000
|
||||
CVE-2024-3223,0,0,9ffc982a7efad24c324809c3c91bef1f04ff8280442a22bc3b8b997888a9a5ba,2024-04-11T01:25:56.520000
|
||||
CVE-2024-32238,1,1,94ecef49732194650c203704488bc0b79a53c465c93001f6f8f1542de7946f78,2024-04-22T20:15:07.630000
|
||||
CVE-2024-32238,0,0,94ecef49732194650c203704488bc0b79a53c465c93001f6f8f1542de7946f78,2024-04-22T20:15:07.630000
|
||||
CVE-2024-3224,0,0,c02e228ce7415d482e2413c615262ec703d9597aa6708474ae81bc765129424f,2024-04-11T01:25:56.600000
|
||||
CVE-2024-3225,0,0,756f5e08f46ab3796e26d62cd11cd06a14dd07d1ee049ee62586436225e04f96,2024-04-11T01:25:56.680000
|
||||
CVE-2024-32254,0,0,0a822eba06a834cf336156a0938a7461bb1c4b55ddb75ffba99f3f6b4a1c1462,2024-04-17T12:48:31.863000
|
||||
@ -246042,9 +246044,9 @@ CVE-2024-3235,0,0,87b194ac57d76e3164f790cf262b7f15e5577bfab72d12fd067ebb5070eb75
|
||||
CVE-2024-32368,0,0,9c8576a3d1f1b62a70cacd6450f34a9ed8bf7b0c58e8707835f5fedae490db3f,2024-04-22T19:24:12.920000
|
||||
CVE-2024-32391,0,0,b9d2ada2509e9e002fcf7fc50c30e5fa24f6bd077b7f0fab83dbe519d76755ce,2024-04-22T13:28:50.310000
|
||||
CVE-2024-32392,0,0,e9dc77721f231608117a79f151c9f1e6be5cd7530989658bd3dd67ce41889ce5,2024-04-22T13:28:50.310000
|
||||
CVE-2024-32394,1,1,7cc3b3f3c56a0cd88d7f07ffeeee92eac04f5586caffaf5b812f8c10697a9b00,2024-04-22T21:15:49.657000
|
||||
CVE-2024-32399,1,1,40453e37a9d27fb351270e340117d3028138554e32350bcb25c71c2e15cf0ec2,2024-04-22T20:15:07.683000
|
||||
CVE-2024-32405,1,1,cd4abce15bd5cb1377317eccf2c7ee074ab0be4cd112d0ba830261b578da6355,2024-04-22T20:15:07.737000
|
||||
CVE-2024-32394,0,0,7cc3b3f3c56a0cd88d7f07ffeeee92eac04f5586caffaf5b812f8c10697a9b00,2024-04-22T21:15:49.657000
|
||||
CVE-2024-32399,0,0,40453e37a9d27fb351270e340117d3028138554e32350bcb25c71c2e15cf0ec2,2024-04-22T20:15:07.683000
|
||||
CVE-2024-32405,0,0,cd4abce15bd5cb1377317eccf2c7ee074ab0be4cd112d0ba830261b578da6355,2024-04-22T20:15:07.737000
|
||||
CVE-2024-32407,0,0,04bdb1c21d2d45016e5f7565a6490533ba649bcc5c4dc99b7e34c030532cab3a,2024-04-22T19:24:06.727000
|
||||
CVE-2024-32409,0,0,2cc0bf26ecd8938fd89992a98bae2541af2d19072f0bc8cdc919759b6ea980aa,2024-04-19T16:19:49.043000
|
||||
CVE-2024-32418,0,0,95e561b293359ffe96c6d53d8bd7aa5dba172944f2d114b653ec1a760700c5d9,2024-04-22T13:28:43.747000
|
||||
@ -246079,7 +246081,10 @@ CVE-2024-32454,0,0,82612665e825c6121646d06374d65bca8862992c0c337ca5fb468894f9c7a
|
||||
CVE-2024-32455,0,0,e310d9ab26897191bedf34ef484874a672ce976e6db5d528b2061e5197a0cfa7,2024-04-17T12:48:31.863000
|
||||
CVE-2024-32456,0,0,c0a0240c7bede6707c2eded61ccd88c169f1ed302e5ff3046ec6dac746537832,2024-04-17T12:48:07.510000
|
||||
CVE-2024-32457,0,0,7fd7ce0ef138de93b6c3b9f686be4ed7bf60ffc47479de2dc6e171832d6a4fe7,2024-04-17T12:48:07.510000
|
||||
CVE-2024-32458,1,1,989b13b43b54d8f9cae040df7c674dd8954010e1c670a628aa0cd71bc829f1f5,2024-04-22T21:15:49.707000
|
||||
CVE-2024-32458,0,0,989b13b43b54d8f9cae040df7c674dd8954010e1c670a628aa0cd71bc829f1f5,2024-04-22T21:15:49.707000
|
||||
CVE-2024-32459,1,1,b6a2b85c474d6d273e8772c0703d0fd9ae9420c57a4e08e0484ab20fd240e8bb,2024-04-22T22:15:07.463000
|
||||
CVE-2024-32460,1,1,b845923fc459d84695a94a20e151c8f5df593861653d803b32fbe677bc895e1e,2024-04-22T22:15:07.647000
|
||||
CVE-2024-32461,1,1,83d22b222d6b085342ae6ac86da8ce1f6b9f8b689b2e3ba283ede0f14ce6e3f6,2024-04-22T22:15:07.840000
|
||||
CVE-2024-32462,0,0,a3aed35daade2ee454524a5ebc934210d89481f944e09c871e8061833830b63d,2024-04-21T03:15:45.827000
|
||||
CVE-2024-32463,0,0,1671e195c4973ac11a31a2856358d6fb78fc6f39ffe0d1d851cfbba7a397b723,2024-04-17T16:51:07.347000
|
||||
CVE-2024-32466,0,0,0986c266c64cc5e4b364446dfb796a6c4980d483c5a2beb3f21f15de4cb49c0b,2024-04-18T18:25:55.267000
|
||||
@ -246091,7 +246096,9 @@ CVE-2024-32474,0,0,adf2e54d1f50eac76d6eed4deebd0da24270aeb71946944c9f131a9545119
|
||||
CVE-2024-32475,0,0,0fc7232a86aa0c1544df06e871c45b3dd3b0f61d5e2b0b45727dd45ce07af33f,2024-04-18T18:25:55.267000
|
||||
CVE-2024-32477,0,0,edf9feceec657c5323b0a5bdd9c7c512982639e1cf50dad09f7080d975a64ba8,2024-04-19T13:10:25.637000
|
||||
CVE-2024-32478,0,0,767d0906439929f5e4e53d4d2396aabddb8a0de51e7967f13464fca079c7076f,2024-04-19T16:19:49.043000
|
||||
CVE-2024-32479,1,1,4cf43690c9d0407b6643c2c4c1ff406d9dc16127b06823a7a9d52f9aa8cac76e,2024-04-22T22:15:08.027000
|
||||
CVE-2024-3248,0,0,65f6d4ddfc43ae235edf2e59fc9daa1f1d020439a4fa197a41a6ddd58e106004,2024-04-03T12:38:04.840000
|
||||
CVE-2024-32480,1,1,48d5eafc84d47aa80e4ad469390e78c3add13778656b7bdca54179d867e858ee,2024-04-22T23:15:50.440000
|
||||
CVE-2024-32487,0,0,746d95a6c3889a9e0164763739aef81432a5222f159aa33a064a3132dbd4a7ad,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32488,0,0,6ce6bcee8af0a677e98d2bf7a3efd66cf8a3e580423515387116f39d710ba974,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32489,0,0,cbc8895e7f5e99c09f7bd505220fcc5514b4573939580e3f381a933acf3c9ef0,2024-04-15T13:15:31.997000
|
||||
@ -246206,6 +246213,9 @@ CVE-2024-32634,0,0,399e2bba8e548c1c98770d2f478e96e69a60afbc020788dd69a365e3ae504
|
||||
CVE-2024-32644,0,0,1c6536d9b118a22e007df0508c4274faf4a9f6bb52ca2e5c9b157aa559740e67,2024-04-19T16:19:49.043000
|
||||
CVE-2024-32650,0,0,3ec938fa621d2b09851dc7c9c4a0bab9e06500eb12a687bac8f1323156efc6df,2024-04-19T16:19:49.043000
|
||||
CVE-2024-32652,0,0,507899e8cc0ef719a4df6a408b43b1aeaf42e8d25b41dcf9a35617406adccb9d,2024-04-22T13:28:50.310000
|
||||
CVE-2024-32653,1,1,15746b291b5be192848135c0c6fd678673b4bcbf809efc95adb9fcdbf0746ddd,2024-04-22T23:15:50.630000
|
||||
CVE-2024-32656,1,1,e07ca629d22e469dec44e49bf609e2394a8cdf2f0a281225759204e05756045e,2024-04-22T23:15:50.817000
|
||||
CVE-2024-32657,1,1,d75a2dbf2d53b439d4955d8a51cd17809b320c82c440e545c3087705382adb9e,2024-04-22T23:15:50.997000
|
||||
CVE-2024-3266,0,0,254a5ba127b10ac48f062b62dbe4c90ef51eaba1ed741161e5a22416cbb32240,2024-04-10T13:23:38.787000
|
||||
CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000
|
||||
CVE-2024-32681,0,0,30385cf8415af0417b19f52d5eb22ace0b875cd333ead985847624dbf28043cd,2024-04-22T13:28:34.007000
|
||||
@ -246507,4 +246517,4 @@ CVE-2024-4020,0,0,fd9bedf3f2e4b41e8bc994bd6387cb7e34a5d92d9443a0588f231180a5be89
|
||||
CVE-2024-4021,0,0,21ca31bf18d88881f7a6cc1002b89ea9bbd51b89715a0adf7c08b2eb5ac210a6,2024-04-22T15:15:47.813000
|
||||
CVE-2024-4022,0,0,ebd323c8f90bdf29bd6ff35ea1eff449874a3d962dc85b687039f47f7b416e73,2024-04-22T13:28:43.747000
|
||||
CVE-2024-4026,0,0,65bff2dba626fde0f88488c1e6df610a37e761e2e041855587a3bbcb3e849c23,2024-04-22T13:28:34.007000
|
||||
CVE-2024-4040,1,1,973a0d3e869c71c707f4ed9e103d14c0135314b263cd796fdd1f54f7ba104b13,2024-04-22T21:15:49.890000
|
||||
CVE-2024-4040,0,0,973a0d3e869c71c707f4ed9e103d14c0135314b263cd796fdd1f54f7ba104b13,2024-04-22T21:15:49.890000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user