mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-03-19T15:00:42.729377+00:00
This commit is contained in:
parent
5cb342ecb7
commit
7e3359e0a9
@ -2,31 +2,14 @@
|
||||
"id": "CVE-2021-46907",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-27T07:15:06.543",
|
||||
"lastModified": "2024-02-27T14:20:06.637",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-19T13:15:06.713",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: VMX: Don't use vcpu->run->internal.ndata as an array index\n\n__vmx_handle_exit() uses vcpu->run->internal.ndata as an index for\nan array access. Since vcpu->run is (can be) mapped to a user address\nspace with a writer permission, the 'ndata' could be updated by the\nuser process at anytime (the user process can set it to outside the\nbounds of the array).\nSo, it is not safe that __vmx_handle_exit() uses the 'ndata' that way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: VMX: No use vcpu->run->internal.ndata como \u00edndice de matriz __vmx_handle_exit() usa vcpu->run->internal.ndata como \u00edndice para un acceso a la matriz. Dado que vcpu->run est\u00e1 (puede) asignarse a un espacio de direcciones de usuario con permiso de escritor, el proceso de usuario podr\u00eda actualizar el 'ndata' en cualquier momento (el proceso de usuario puede configurarlo fuera de los l\u00edmites de la matriz). Por lo tanto, no es seguro que __vmx_handle_exit() use 'ndata' de esa manera."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/04c4f2ee3f68c9a4bf1653d15f1a9a435ae33f7a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7f64753835a78c7d2cc2932a5808ef3b7fd4c050",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ce541d7b59566a0d94c7c99bfb5d34b050e6af70",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,51 +2,14 @@
|
||||
"id": "CVE-2021-46975",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-27T19:04:07.543",
|
||||
"lastModified": "2024-02-28T14:06:45.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-19T14:15:07.467",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: conntrack: Make global sysctls readonly in non-init netns\n\nThese sysctls point to global variables:\n- NF_SYSCTL_CT_MAX (&nf_conntrack_max)\n- NF_SYSCTL_CT_EXPECT_MAX (&nf_ct_expect_max)\n- NF_SYSCTL_CT_BUCKETS (&nf_conntrack_htable_size_user)\n\nBecause their data pointers are not updated to point to per-netns\nstructures, they must be marked read-only in a non-init_net ns.\nOtherwise, changes in any net namespace are reflected in (leaked into)\nall other net namespaces. This problem has existed since the\nintroduction of net namespaces.\n\nThe current logic marks them read-only only if the net namespace is\nowned by an unprivileged user (other than init_user_ns).\n\nCommit d0febd81ae77 (\"netfilter: conntrack: re-visit sysctls in\nunprivileged namespaces\") \"exposes all sysctls even if the namespace is\nunpriviliged.\" Since we need to mark them readonly in any case, we can\nforego the unprivileged user check altogether."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: conntrack: Hacer que los sysctls globales sean de solo lectura en redes que no son init. Estos sysctls apuntan a variables globales: - NF_SYSCTL_CT_MAX (&nf_conntrack_max) - NF_SYSCTL_CT_EXPECT_MAX (&nf_ct_expect_max) - NF_SYSCTL_CT_BUCKETS (&nf_conntrack_htable_size _user) Porque sus datos Los punteros no se actualizan para apuntar a estructuras por red, deben marcarse como de solo lectura en un ns que no sea init_net. De lo contrario, los cambios en cualquier espacio de nombres de red se reflejan (se filtran) en todos los dem\u00e1s espacios de nombres de red. Este problema existe desde la introducci\u00f3n de los espacios de nombres de red. La l\u00f3gica actual los marca como de solo lectura si el espacio de nombres de red es propiedad de un usuario sin privilegios (que no sea init_user_ns). El commit d0febd81ae77 (\"netfilter: conntrack: volver a visitar sysctls en espacios de nombres sin privilegios\") \"expone todos los sysctls incluso si el espacio de nombres no tiene privilegios\". Dado que en cualquier caso necesitamos marcarlos como de s\u00f3lo lectura, podemos prescindir por completo de la verificaci\u00f3n de usuarios sin privilegios."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2671fa4dc0109d3fb581bc3078fdf17b5d9080f6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/671c54ea8c7ff47bd88444f3fffb65bf9799ce43",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/68122479c128a929f8f7bdd951cfdc8dd0e75b8f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9b288479f7a901a14ce703938596438559d7df55",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/baea536cf51f8180ab993e374cb134b5edad25e2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d3598eb3915cc0c0d8cab42f4a6258ff44c4033e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/da50f56e826e1db141693297afb99370ebc160dd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fbf85a34ce17c4cf0a37ee253f4c582bbfb8231b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,47 +2,14 @@
|
||||
"id": "CVE-2021-47084",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-04T18:15:07.253",
|
||||
"lastModified": "2024-03-05T13:41:01.900",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-19T14:15:07.540",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nhamradio: defer ax25 kfree after unregister_netdev\n\nThere is a possible race condition (use-after-free) like below\n\n (USE) | (FREE)\nax25_sendmsg |\n ax25_queue_xmit |\n dev_queue_xmit |\n __dev_queue_xmit |\n __dev_xmit_skb |\n sch_direct_xmit | ...\n xmit_one |\n netdev_start_xmit | tty_ldisc_kill\n __netdev_start_xmit | mkiss_close\n ax_xmit | kfree\n ax_encaps |\n |\n\nEven though there are two synchronization primitives before the kfree:\n1. wait_for_completion(&ax->dead). This can prevent the race with\nroutines from mkiss_ioctl. However, it cannot stop the routine coming\nfrom upper layer, i.e., the ax25_sendmsg.\n\n2. netif_stop_queue(ax->dev). It seems that this line of code aims to\nhalt the transmit queue but it fails to stop the routine that already\nbeing xmit.\n\nThis patch reorder the kfree after the unregister_netdev to avoid the\npossible UAF as the unregister_netdev() is well synchronized and won't\nreturn if there is a running routine."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3e0588c291d6ce225f2b891753ca41d45ba42469",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/450121075a6a6f1d50f97225d3396315309d61a1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/896193a02a2981e60c40d4614fd095ce92135ccd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8a1a314965a17c62084a056b4f2cb7a770854c90",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b5b193d0c67180fefdc664650138e3b7959df615",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cb6c99aedd2c843056a598a8907a6128cb07603b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/eaa816a86e629cbcc0a94f38391fee09231628c7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ef5f7bfa19e3fc366f4c6d1a841ceaddf7a9f5d4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,47 +2,14 @@
|
||||
"id": "CVE-2021-47085",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-04T18:15:07.317",
|
||||
"lastModified": "2024-03-05T13:41:01.900",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-19T14:15:07.603",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nhamradio: improve the incomplete fix to avoid NPD\n\nThe previous commit 3e0588c291d6 (\"hamradio: defer ax25 kfree after\nunregister_netdev\") reorder the kfree operations and unregister_netdev\noperation to prevent UAF.\n\nThis commit improves the previous one by also deferring the nullify of\nthe ax->tty pointer. Otherwise, a NULL pointer dereference bug occurs.\nPartial of the stack trace is shown below.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000538\nRIP: 0010:ax_xmit+0x1f9/0x400\n...\nCall Trace:\n dev_hard_start_xmit+0xec/0x320\n sch_direct_xmit+0xea/0x240\n __qdisc_run+0x166/0x5c0\n __dev_queue_xmit+0x2c7/0xaf0\n ax25_std_establish_data_link+0x59/0x60\n ax25_connect+0x3a0/0x500\n ? security_socket_connect+0x2b/0x40\n __sys_connect+0x96/0xc0\n ? __hrtimer_init+0xc0/0xc0\n ? common_nsleep+0x2e/0x50\n ? switch_fpu_return+0x139/0x1a0\n __x64_sys_connect+0x11/0x20\n do_syscall_64+0x33/0x40\n entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nThe crash point is shown as below\n\nstatic void ax_encaps(...) {\n ...\n set_bit(TTY_DO_WRITE_WAKEUP, &ax->tty->flags); // ax->tty = NULL!\n ...\n}\n\nBy placing the nullify action after the unregister_netdev, the ax->tty\npointer won't be assigned as NULL net_device framework layer is well\nsynchronized."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/03d00f7f1815ec00dab5035851b3de83afd054a8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/371a874ea06f147d6ca30be43dad33683965eba6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7dd52af1eb5798f590d9d9e1c56ed8f5744ee0ca",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/83ba6ec97c74fb1a60f7779a26b6a94b28741d8a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a5c6a13e9056d87805ba3042c208fbd4164ad22b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a7b0ae2cc486fcb601f9f9d87d98138cc7b7f7f9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b2f37aead1b82a770c48b5d583f35ec22aabb61e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b68f41c6320b2b7fbb54a95f07a69f3dc7e56c59",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-40275",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-19T01:15:44.743",
|
||||
"lastModified": "2024-03-19T01:15:44.743",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in OpenClinic GA 5.247.01. It allows retrieval of patient lists via queries such as findFirstname= to _common/search/searchByAjax/patientslistShow.jsp."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en OpenClinic GA 5.247.01. Permite la recuperaci\u00f3n de listas de pacientes mediante consultas como findFirstname= a _common/search/searchByAjax/patientslistShow.jsp."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-40276",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-19T01:15:44.807",
|
||||
"lastModified": "2024-03-19T01:15:44.807",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in OpenClinic GA 5.247.01. An Unauthenticated File Download vulnerability has been discovered in pharmacy/exportFile.jsp."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en OpenClinic GA 5.247.01. Se ha descubierto una vulnerabilidad de descarga de archivos no autenticados en farmacia/exportFile.jsp."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-40277",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-19T01:15:44.850",
|
||||
"lastModified": "2024-03-19T01:15:44.850",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in OpenClinic GA 5.247.01. A Reflected Cross-Site Scripting (XSS) vulnerability has been discovered in the login.jsp message parameter."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en OpenClinic GA 5.247.01. Se ha descubierto una vulnerabilidad de Cross-Site Scripting (XSS) Reflejado en el par\u00e1metro de mensaje login.jsp."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40278",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-19T12:15:07.473",
|
||||
"lastModified": "2024-03-19T12:15:07.473",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
24
CVE-2023/CVE-2023-402xx/CVE-2023-40279.json
Normal file
24
CVE-2023/CVE-2023-402xx/CVE-2023-40279.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-40279",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-19T13:15:06.837",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in OpenClinic GA 5.247.01. An attacker can perform a directory path traversal via the Page parameter in a GET request to main.do."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/BugBountyHunterCVE/CVE-2023-40279/blob/main/CVE-2023-40279_Authenticated-Directory-Path-Traversal_OpenClinic-GA_5.247.01_Report.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://sourceforge.net/projects/open-clinic/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-40280",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-19T01:15:44.900",
|
||||
"lastModified": "2024-03-19T01:15:44.900",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in OpenClinic GA 5.247.01. An attacker can perform a directory path traversal via the Page parameter in a GET request to popup.jsp."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en OpenClinic GA 5.247.01. Un atacante puede realizar un directory path traversal a trav\u00e9s del par\u00e1metro P\u00e1gina en una solicitud GET a popup.jsp."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5388",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:07.537",
|
||||
"lastModified": "2024-03-19T12:15:07.537",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-0054",
|
||||
"sourceIdentifier": "product-security@axis.com",
|
||||
"published": "2024-03-19T07:15:07.033",
|
||||
"lastModified": "2024-03-19T07:15:07.033",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX APIs local_list.cgi, create_overlay.cgi and irissetup.cgi\u00a0was vulnerable for file globbing which could lead to a resource exhaustion attack. Axis has released patched AXIS OS\nversions for the highlighted flaw. Please refer to the Axis security advisory\nfor more information and solution.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Sandro Poppi, miembro del programa AXIS OS Bug Bounty, descubri\u00f3 que las API de VAPIX local_list.cgi, create_overlay.cgi e irissetup.cgi eran vulnerables a la acumulaci\u00f3n de archivos, lo que podr\u00eda provocar un ataque de agotamiento de recursos. Axis ha lanzado versiones parcheadas del sistema operativo AXIS para la falla resaltada. Consulte el aviso de seguridad de Axis para obtener m\u00e1s informaci\u00f3n y soluciones."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-0055",
|
||||
"sourceIdentifier": "product-security@axis.com",
|
||||
"published": "2024-03-19T07:15:08.667",
|
||||
"lastModified": "2024-03-19T07:15:08.667",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX APIs mediaclip.cgi and playclip.cgi was vulnerable for file globbing which could lead to a resource exhaustion attack. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Sandro Poppi, miembro del programa AXIS OS Bug Bounty, descubri\u00f3 que las API de VAPIX mediaclip.cgi y playclip.cgi eran vulnerables a la acumulaci\u00f3n de archivos, lo que podr\u00eda provocar un ataque de agotamiento de recursos. Axis ha lanzado versiones parcheadas del sistema operativo AXIS para la falla resaltada. Consulte el aviso de seguridad de Axis para obtener m\u00e1s informaci\u00f3n y soluciones."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1144",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-19T12:15:07.910",
|
||||
"lastModified": "2024-03-19T12:15:07.910",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1145",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-19T12:15:08.177",
|
||||
"lastModified": "2024-03-19T12:15:08.177",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1146",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-19T12:15:08.443",
|
||||
"lastModified": "2024-03-19T12:15:08.443",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-21503",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2024-03-19T05:15:09.447",
|
||||
"lastModified": "2024-03-19T05:15:09.447",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service.\r\rExploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones del paquete black anteriores a la 24.3.0 son vulnerables a la denegaci\u00f3n de servicio de expresi\u00f3n regular (ReDoS) a trav\u00e9s de la funci\u00f3nlines_with_leading_tabs_expanded en el archivo strings.py. Un atacante podr\u00eda aprovechar esta vulnerabilidad creando una entrada maliciosa que provoque una denegaci\u00f3n de servicio. Es posible explotar esta vulnerabilidad cuando se ejecuta Black en entradas que no son de confianza o si habitualmente coloca miles de caracteres de tabulaci\u00f3n iniciales en sus cadenas de documentaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-21504",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2024-03-19T05:15:09.813",
|
||||
"lastModified": "2024-03-19T05:15:09.813",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Versions of the package livewire/livewire from 3.3.5 and before 3.4.9 are vulnerable to Cross-site Scripting (XSS) when a page uses [Url] for a property. An attacker can inject HTML code in the context of the user's browser session by crafting a malicious link and convincing the user to click on it."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones del paquete livewire/livewire desde 3.3.5 y anteriores a 3.4.9 son vulnerables a Cross-site Scripting (XSS) cuando una p\u00e1gina usa [Url] para una propiedad. Un atacante puede inyectar c\u00f3digo HTML en el contexto de la sesi\u00f3n del navegador del usuario creando un enlace malicioso y convenciendo al usuario de que haga clic en \u00e9l."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-22017",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-03-19T05:15:10.073",
|
||||
"lastModified": "2024-03-19T05:15:10.073",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "setuid() does not affect libuv's internal io_uring operations if initialized before the call to setuid().\nThis allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid().\nThis vulnerability affects all users using version greater or equal than Node.js 18.18.0, Node.js 20.4.0 and Node.js 21."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "setuid() no afecta las operaciones io_uring internas de libuv si se inicializa antes de la llamada a setuid(). Esto permite que el proceso realice operaciones privilegiadas a pesar de haber perdido dichos privilegios mediante una llamada a setuid(). Esta vulnerabilidad afecta a todos los usuarios que utilizan una versi\u00f3n mayor o igual a Node.js 18.18.0, Node.js 20.4.0 y Node.js 21."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-22025",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-03-19T05:15:10.267",
|
||||
"lastModified": "2024-03-19T05:15:10.267",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in Node.js has been identified, allowing for a Denial of Service (DoS) attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL.\nThe vulnerability stems from the fact that the fetch() function in Node.js always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL.\nAn attacker controlling the URL passed into fetch() can exploit this vulnerability to exhaust memory, potentially leading to process termination, depending on the system configuration."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad en Node.js, que permite un ataque de denegaci\u00f3n de servicio (DoS) por agotamiento de recursos cuando se utiliza la funci\u00f3n fetch() para recuperar contenido de una URL que no es de confianza. La vulnerabilidad surge del hecho de que la funci\u00f3n fetch() en Node.js siempre decodifica Brotli, lo que hace posible que un atacante provoque el agotamiento de los recursos al recuperar contenido de una URL que no es de confianza. Un atacante que controle la URL pasada a fetch() puede aprovechar esta vulnerabilidad para agotar la memoria, lo que podr\u00eda provocar la terminaci\u00f3n del proceso, seg\u00fan la configuraci\u00f3n del sistema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-22412",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-18T21:15:06.230",
|
||||
"lastModified": "2024-03-18T21:15:06.230",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ClickHouse is an open-source column-oriented database management system. A bug exists in the cloud ClickHouse offering prior to version 24.0.2.54535 and in github.com/clickhouse/clickhouse version 23.1. Query caching bypasses the role based access controls and the policies being enforced on roles. In affected versions, the query cache only respects separate users, however this is not documented and not expected behavior. People relying on ClickHouse roles can have their access control lists bypassed if they are using query caching. Attackers who have control of a role could guess queries and see data they shouldn't have access to. Version 24.1 of ClickHouse and version 24.0.2.54535 of ClickHouse Cloud contain a patch for this issue. Based on the documentation, role based access control should be enforced regardless if query caching is enabled or not."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "ClickHouse es un sistema de gesti\u00f3n de bases de datos orientado a columnas de c\u00f3digo abierto. Existe un error en la oferta de nube de ClickHouse anterior a la versi\u00f3n 24.0.2.54535 y en github.com/clickhouse/clickhouse versi\u00f3n 23.1. El almacenamiento en cach\u00e9 de consultas evita los controles de acceso basados en roles y las pol\u00edticas que se aplican a los roles. En las versiones afectadas, la cach\u00e9 de consultas solo respeta a usuarios separados; sin embargo, esto no est\u00e1 documentado ni es un comportamiento esperado. Las personas que dependen de roles de ClickHouse pueden evitar sus listas de control de acceso si utilizan el almacenamiento en cach\u00e9 de consultas. Los atacantes que tienen control de una funci\u00f3n podr\u00edan adivinar consultas y ver datos a los que no deber\u00edan tener acceso. La versi\u00f3n 24.1 de ClickHouse y la versi\u00f3n 24.0.2.54535 de ClickHouse Cloud contienen un parche para este problema. Seg\u00fan la documentaci\u00f3n, se debe aplicar el control de acceso basado en roles independientemente de si el almacenamiento en cach\u00e9 de consultas est\u00e1 habilitado o no."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-22453",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-03-19T08:15:06.480",
|
||||
"lastModified": "2024-03-19T08:15:06.480",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell PowerEdge Server BIOS contains a heap-based buffer overflow vulnerability. A local high privileged attacker could potentially exploit this vulnerability to write to otherwise unauthorized memory."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El BIOS del servidor Dell PowerEdge contiene una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico. Un atacante local con privilegios elevados podr\u00eda explotar esta vulnerabilidad para escribir en una memoria que de otro modo no estar\u00eda autorizada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-23333",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-18T21:15:06.473",
|
||||
"lastModified": "2024-03-18T21:15:06.473",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LDAP Account Manager (LAM) is a webfrontend for managing entries stored in an LDAP directory. LAM's log configuration allows to specify arbitrary paths for log files. Prior to version 8.7, an attacker could exploit this by creating a PHP file and cause LAM to log some PHP code to this file. When the file is then accessed via web the code would be executed. The issue is mitigated by the following: An attacker needs to know LAM's master configuration password to be able to change the main settings; and the webserver needs write access to a directory that is accessible via web. LAM itself does not provide any such directories. The issue has been fixed in 8.7. As a workaround, limit access to LAM configuration pages to authorized users.\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "LDAP Account Manager (LAM) es una interfaz web para administrar entradas almacenadas en un directorio LDAP. La configuraci\u00f3n de registro de LAM permite especificar rutas arbitrarias para archivos de registro. Antes de la versi\u00f3n 8.7, un atacante pod\u00eda aprovechar esto creando un archivo PHP y hacer que LAM registrara alg\u00fan c\u00f3digo PHP en este archivo. Cuando se accede al archivo a trav\u00e9s de la web, se ejecutar\u00e1 el c\u00f3digo. El problema se mitiga con lo siguiente: un atacante necesita conocer la contrase\u00f1a de configuraci\u00f3n maestra de LAM para poder cambiar la configuraci\u00f3n principal; y el servidor web necesita acceso de escritura a un directorio al que se pueda acceder a trav\u00e9s de la web. La propia LAM no proporciona dichos directorios. El problema se solucion\u00f3 en 8.7. Como workaround, limite el acceso a las p\u00e1ginas de configuraci\u00f3n de LAM a usuarios autorizados."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-24042",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-19T07:15:09.097",
|
||||
"lastModified": "2024-03-19T07:15:09.097",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Directory Traversal vulnerability in Devan-Kerman ARRP v.0.8.1 and before allows a remote attacker to execute arbitrary code via the dumpDirect in RuntimeResourcePackImpl component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de Directory Traversal en Devan-Kerman ARRP v.0.8.1 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente dumpDirect en RuntimeResourcePackImpl."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24043",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-19T07:15:09.517",
|
||||
"lastModified": "2024-03-19T07:15:09.517",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-24578",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-18T22:15:07.683",
|
||||
"lastModified": "2024-03-18T22:15:07.683",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "RaspberryMatic is an open-source operating system for HomeMatic internet-of-things devices. RaspberryMatic / OCCU prior to version 3.75.6.20240316 contains a unauthenticated remote code execution (RCE) vulnerability, caused by multiple issues within the Java based `HMIPServer.jar` component. RaspberryMatric includes a Java based `HMIPServer`, that can be accessed through URLs starting with `/pages/jpages`. The `FirmwareController` class does however not perform any session id checks, thus this feature can be accessed without a valid session. Due to this issue, attackers can gain remote code execution as root user, allowing a full system compromise. Version 3.75.6.20240316 contains a patch."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "RaspberryMatic es un sistema operativo de c\u00f3digo abierto para dispositivos de Internet de las cosas HomeMatic. RaspberryMatic/OCCU anterior a la versi\u00f3n 3.75.6.20240316 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) no autenticada, causada por m\u00faltiples problemas dentro del componente `HMIPServer.jar` basado en Java. RaspberryMatric incluye un `HMIPServer` basado en Java, al que se puede acceder a trav\u00e9s de URL que comienzan con `/pages/jpages`. Sin embargo, la clase `FirmwareController` no realiza ninguna verificaci\u00f3n de identificaci\u00f3n de sesi\u00f3n, por lo que se puede acceder a esta funci\u00f3n sin una sesi\u00f3n v\u00e1lida. Debido a este problema, los atacantes pueden obtener la ejecuci\u00f3n remota de c\u00f3digo como usuario root, lo que permite comprometer todo el sistema. La versi\u00f3n 3.75.6.20240316 contiene un parche."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24683",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-03-19T09:15:06.630",
|
||||
"lastModified": "2024-03-19T09:15:06.630",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-25654",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-18T20:15:08.867",
|
||||
"lastModified": "2024-03-18T20:15:08.867",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure permissions for log files of AVSystem Unified Management Platform (UMP) 23.07.0.16567~LTS allow members (with local access to the UMP application server) to access credentials to authenticate to all services, and to decrypt sensitive data stored in the database."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los permisos inseguros para archivos de registro de AVSystem Unified Management Platform (UMP) 23.07.0.16567~LTS permiten a los miembros (con acceso local al servidor de aplicaciones UMP) acceder a las credenciales para autenticarse en todos los servicios y descifrar datos confidenciales almacenados en la base de datos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-25655",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-18T20:15:08.917",
|
||||
"lastModified": "2024-03-18T20:15:08.917",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure storage of LDAP passwords in the authentication functionality of AVSystem Unified Management Platform (UMP) 23.07.0.16567~LTS allows members (with read access to the application database) to decrypt the LDAP passwords of users who successfully authenticate to web management via LDAP."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El almacenamiento inseguro de contrase\u00f1as LDAP en la funcionalidad de autenticaci\u00f3n de AVSystem Unified Management Platform (UMP) 23.07.0.16567~LTS permite a los miembros (con acceso de lectura a la base de datos de la aplicaci\u00f3n) descifrar las contrase\u00f1as LDAP de los usuarios que se autentican exitosamente en la administraci\u00f3n web a trav\u00e9s de LDAP."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-25656",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-18T20:15:08.963",
|
||||
"lastModified": "2024-03-18T20:15:08.963",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper input validation in AVSystem Unified Management Platform (UMP) 23.07.0.16567~LTS can result in unauthenticated CPE (Customer Premises Equipment) devices storing arbitrarily large amounts of data during registration. This can potentially lead to DDoS attacks on the application database and, ultimately, affect the entire product."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una validaci\u00f3n de entrada incorrecta en AVSystem Unified Management Platform (UMP) 23.07.0.16567~LTS puede provocar que dispositivos CPE (equipos en las instalaciones del cliente) no autenticados almacenen cantidades arbitrariamente grandes de datos durante el registro. Potencialmente, esto puede provocar ataques DDoS en la base de datos de la aplicaci\u00f3n y, en \u00faltima instancia, afectar a todo el producto."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-25657",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-18T20:15:09.013",
|
||||
"lastModified": "2024-03-18T20:15:09.013",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An open redirect in the Login/Logout functionality of web management in AVSystem Unified Management Platform (UMP) 23.07.0.16567~LTS could allow attackers to redirect authenticated users to malicious websites."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una redirecci\u00f3n abierta en la funcionalidad de inicio de sesi\u00f3n/cierre de sesi\u00f3n de la administraci\u00f3n web en AVSystem Unified Management Platform (UMP) 23.07.0.16567~LTS podr\u00eda permitir a atacantes redirigir a usuarios autenticados a sitios web maliciosos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-25942",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-03-19T08:15:06.713",
|
||||
"lastModified": "2024-03-19T08:15:06.713",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell PowerEdge Server BIOS contains an Improper SMM communication buffer verification vulnerability. A physical high privileged attacker could potentially exploit this vulnerability leading to arbitrary writes to SMRAM."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El BIOS del servidor Dell PowerEdge contiene una vulnerabilidad de verificaci\u00f3n del b\u00fafer de comunicaci\u00f3n SMM incorrecta. Un atacante f\u00edsico con altos privilegios podr\u00eda explotar esta vulnerabilidad y provocar escrituras arbitrarias en SMRAM."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-26369",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-19T06:15:06.267",
|
||||
"lastModified": "2024-03-19T06:15:06.267",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the HistoryQosPolicy component of FastDDS v2.12.x, v2.11.x, v2.10.x, and v2.6.x leads to a SIGABRT (signal abort) upon receiving DataWriter's data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en el componente HistoryQosPolicy de FastDDS v2.12.x, v2.11.x, v2.10.x y v2.6.x provoca un SIGABRT (anulaci\u00f3n de se\u00f1al) al recibir los datos de DataWriter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2604",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-18T21:15:06.723",
|
||||
"lastModified": "2024-03-19T04:15:07.710",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester File Manager App 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /endpoint/update-file.php. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257182 is the identifier assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en la aplicaci\u00f3n SourceCodester File Manager 1.0. Ha sido declarada cr\u00edtica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo /endpoint/update-file.php. La manipulaci\u00f3n del archivo de argumentos conduce a una carga sin restricciones. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-257182 es el identificador asignado a esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2605",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:08.690",
|
||||
"lastModified": "2024-03-19T12:15:08.690",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2606",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:08.740",
|
||||
"lastModified": "2024-03-19T12:15:08.740",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2607",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:08.790",
|
||||
"lastModified": "2024-03-19T12:15:08.790",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2608",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:08.843",
|
||||
"lastModified": "2024-03-19T12:15:08.843",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2609",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:08.910",
|
||||
"lastModified": "2024-03-19T12:15:08.910",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2610",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:08.957",
|
||||
"lastModified": "2024-03-19T12:15:08.957",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2611",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:09.007",
|
||||
"lastModified": "2024-03-19T12:15:09.007",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2612",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:09.063",
|
||||
"lastModified": "2024-03-19T12:15:09.063",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2613",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:09.113",
|
||||
"lastModified": "2024-03-19T12:15:09.113",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2614",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:09.160",
|
||||
"lastModified": "2024-03-19T12:15:09.160",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2615",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:09.210",
|
||||
"lastModified": "2024-03-19T12:15:09.210",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2616",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:09.260",
|
||||
"lastModified": "2024-03-19T12:15:09.260",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2620",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-19T01:15:44.953",
|
||||
"lastModified": "2024-03-19T01:15:44.953",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in Fujian Kelixin Communication Command and Dispatch Platform up to 20240318 and classified as critical. Affected by this vulnerability is an unknown functionality of the file api/client/down_file.php. The manipulation of the argument uuid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257197 was assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad ha sido encontrada en Fujian Kelixin Communication Command and Dispatch Platform hasta 20240318 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo api/client/down_file.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento uuid conduce a la inyecci\u00f3n de SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-257197."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2621",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-19T01:15:45.180",
|
||||
"lastModified": "2024-03-19T01:15:45.180",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Fujian Kelixin Communication Command and Dispatch Platform up to 20240318 and classified as critical. Affected by this issue is some unknown functionality of the file api/client/user/pwd_update.php. The manipulation of the argument uuid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-257198 is the identifier assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en Fujian Kelixin Communication Command and Dispatch Platform hasta 20240318 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo api/client/user/pwd_update.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento uuid conduce a la inyecci\u00f3n de SQL. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-257198 es el identificador asignado a esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2622",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-19T02:15:05.980",
|
||||
"lastModified": "2024-03-19T02:15:05.980",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Fujian Kelixin Communication Command and Dispatch Platform up to 20240318. It has been classified as critical. This affects an unknown part of the file /api/client/editemedia.php. The manipulation of the argument number/enterprise_uuid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257199."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en Fujian Kelixin Communication Command and Dispatch Platform hasta 20240318 y clasificada como cr\u00edtica. Esto afecta a una parte desconocida del archivo /api/client/editemedia.php. La manipulaci\u00f3n del argumento n\u00famero/enterprise_uuid conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-257199."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2632",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-19T12:15:09.307",
|
||||
"lastModified": "2024-03-19T12:15:09.307",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2633",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-19T12:15:09.530",
|
||||
"lastModified": "2024-03-19T12:15:09.530",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2634",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-19T12:15:09.773",
|
||||
"lastModified": "2024-03-19T12:15:09.773",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-2635",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-19T12:15:09.993",
|
||||
"lastModified": "2024-03-19T12:15:09.993",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been discovered in Cegid Meta4 HR that consists of execution after redirect. This vulnerability could allow an attacker to bypass the security measures of the applications by accessing the webappconfig.jsp file directly and canceling the redirect request, leading to the configuration file inside the application, in which an attacker could modify different parameters. "
|
||||
"value": " The configuration pages available are not intended to be placed on an Internet facing web server, as they expose file paths to the client, who can be an attacker. Instead of rewriting these pages to avoid this vulnerability, they will be dismissed from future releases of Cegid Meta4 HR, as they do not offer product functionality "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -48,7 +48,7 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cegid.com/global/meta4-es-joins-cegid/",
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-meta4-hr-cegid",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
|
55
CVE-2024/CVE-2024-26xx/CVE-2024-2636.json
Normal file
55
CVE-2024/CVE-2024-26xx/CVE-2024-2636.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-2636",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-19T13:15:07.190",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": " An Unrestricted Upload of File vulnerability has been found on Cegid Meta4 HR, that allows an attacker to upload malicios files to the server via '/config/espanol/update_password.jsp' file. Modifying the 'M4_NEW_PASSWORD' parameter, an attacker could store a malicious JSP file inside the file directory, to be executed the the file is loaded in the application. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-meta4-hr-cegid",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27439",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-03-19T11:15:06.537",
|
||||
"lastModified": "2024-03-19T11:15:06.537",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-28237",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-18T22:15:07.980",
|
||||
"lastModified": "2024-03-18T22:15:07.980",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.9.3 contain a vulnerability that allows malicious admins to configure or talk a victim with administrator rights into configuring a webcam snapshot URL which when tested through the \"Test\" button included in the web interface will execute JavaScript code in the victims browser when attempting to render the snapshot image. An attacker who successfully talked a victim with admin rights into performing a snapshot test with such a crafted URL could use this to retrieve or modify sensitive configuration settings, interrupt prints or otherwise interact with the OctoPrint instance in a malicious way. The vulnerability is patched in version 1.10.0rc3. OctoPrint administrators are strongly advised to thoroughly vet who has admin access to their installation and what settings they modify based on instructions by strangers."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "OctoPrint proporciona una interfaz web para controlar impresoras 3D de consumo. Las versiones de OctoPrint hasta la 1.9.3 incluida contienen una vulnerabilidad que permite a administradores maliciosos configurar o convencer a una v\u00edctima con derechos de administrador para que configure una URL de instant\u00e1nea de c\u00e1mara web que, cuando se prueba a trav\u00e9s del bot\u00f3n \"Probar\" incluido en la interfaz web, ejecutar\u00e1 c\u00f3digo JavaScript en el navegador de la v\u00edctima al intentar renderizar la imagen instant\u00e1nea. Un atacante que consiguiera convencer a una v\u00edctima con derechos de administrador para que realizara una prueba instant\u00e1nea con una URL tan manipulada podr\u00eda utilizarla para recuperar o modificar ajustes de configuraci\u00f3n confidenciales, interrumpir impresiones o interactuar de otro modo con la instancia de OctoPrint de forma maliciosa. La vulnerabilidad est\u00e1 parcheada en la versi\u00f3n 1.10.0rc3. Se recomienda encarecidamente a los administradores de OctoPrint que investiguen minuciosamente qui\u00e9n tiene acceso de administrador a su instalaci\u00f3n y qu\u00e9 configuraciones modifican seg\u00fan instrucciones de extra\u00f1os."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-28248",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-18T22:15:08.220",
|
||||
"lastModified": "2024-03-18T22:15:08.220",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Starting in version 1.13.9 and prior to versions 1.13.13, 1.14.8, and 1.15.2, Cilium's HTTP policies are not consistently applied to all traffic in the scope of the policies, leading to HTTP traffic being incorrectly and intermittently forwarded when it should be dropped. This issue has been patched in Cilium 1.15.2, 1.14.8, and 1.13.13. There are no known workarounds for this issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Cilium es una soluci\u00f3n de redes, observabilidad y seguridad con un plano de datos basado en eBPF. A partir de la versi\u00f3n 1.13.9 y antes de las versiones 1.13.13, 1.14.8 y 1.15.2, las pol\u00edticas HTTP de Cilium no se aplican de manera consistente a todo el tr\u00e1fico en el alcance de las pol\u00edticas, lo que lleva a que el tr\u00e1fico HTTP se reenv\u00ede de manera incorrecta e intermitente cuando deber\u00eda dejarse caer. Este problema se solucion\u00f3 en Cilium 1.15.2, 1.14.8 y 1.13.13. No se conocen workarounds para este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-28249",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-18T22:15:08.503",
|
||||
"lastModified": "2024-03-18T22:15:08.503",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.13.13, 1.14.8, and 1.15.2, in Cilium clusters with IPsec enabled and traffic matching Layer 7 policies, IPsec-eligible traffic between a node's Envoy proxy and pods on other nodes is sent unencrypted and IPsec-eligible traffic between a node's DNS proxy and pods on other nodes is sent unencrypted. This issue has been resolved in Cilium 1.15.2, 1.14.8, and 1.13.13. There is no known workaround for this issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Cilium es una soluci\u00f3n de redes, observabilidad y seguridad con un plano de datos basado en eBPF. Antes de las versiones 1.13.13, 1.14.8 y 1.15.2, en los cl\u00fasteres de Cilium con IPsec habilitado y el tr\u00e1fico que coincide con las pol\u00edticas de Capa 7, el tr\u00e1fico elegible para IPsec entre el proxy Envoy de un nodo y los pods en otros nodos se env\u00eda sin cifrar y es elegible para IPsec. El tr\u00e1fico entre el proxy DNS de un nodo y los pods de otros nodos se env\u00eda sin cifrar. Este problema se resolvi\u00f3 en Cilium 1.15.2, 1.14.8 y 1.13.13. No se conoce ning\u00fan workaround para este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-28250",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-18T22:15:08.750",
|
||||
"lastModified": "2024-03-18T22:15:08.750",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Starting in version 1.14.0 and prior to versions 1.14.8 and 1.15.2, In Cilium clusters with WireGuard enabled and traffic matching Layer 7 policies Wireguard-eligible traffic that is sent between a node's Envoy proxy and pods on other nodes is sent unencrypted and Wireguard-eligible traffic that is sent between a node's DNS proxy and pods on other nodes is sent unencrypted. This issue has been resolved in Cilium 1.14.8 and 1.15.2 in in native routing mode (`routingMode=native`) and in Cilium 1.14.4 in tunneling mode (`routingMode=tunnel`). Not that in tunneling mode, `encryption.wireguard.encapsulate` must be set to `true`. There is no known workaround for this issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Cilium es una soluci\u00f3n de redes, observabilidad y seguridad con un plano de datos basado en eBPF. A partir de la versi\u00f3n 1.14.0 y anteriores a las versiones 1.14.8 y 1.15.2, en los cl\u00fasteres de Cilium con WireGuard habilitado y el tr\u00e1fico que coincide con las pol\u00edticas de Capa 7, el tr\u00e1fico elegible para Wireguard que se env\u00eda entre el proxy Envoy de un nodo y los pods de otros nodos se env\u00eda sin cifrar. y el tr\u00e1fico elegible para Wireguard que se env\u00eda entre el proxy DNS de un nodo y los pods de otros nodos se env\u00eda sin cifrar. Este problema se resolvi\u00f3 en Cilium 1.14.8 y 1.15.2 en modo de enrutamiento nativo (`routingMode=native`) y en Cilium 1.14.4 en modo de t\u00fanel (`routingMode=tunnel`). No es que en modo t\u00fanel, `encryption.wireguard.encapsulate` deba establecerse en `true`. No se conoce ning\u00fan workaround para este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-28446",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-19T06:15:07.547",
|
||||
"lastModified": "2024-03-19T06:15:07.547",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Shenzhen Libituo Technology Co., Ltd LBT-T300-mini1 v1.2.9 was discovered to contain a buffer overflow via lan_netmask parameter at /apply.cgi."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que Shenzhen Libituo Technology Co., Ltd LBT-T300-mini1 v1.2.9 conten\u00eda un desbordamiento del b\u00fafer a trav\u00e9s del par\u00e1metro lan_netmask en /apply.cgi."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-28447",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-19T06:15:07.697",
|
||||
"lastModified": "2024-03-19T06:15:07.697",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Shenzhen Libituo Technology Co., Ltd LBT-T300-mini1 v1.2.9 was discovered to contain a buffer overflow via lan_ipaddr parameters at /apply.cgi."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que Shenzhen Libituo Technology Co., Ltd LBT-T300-mini1 v1.2.9 conten\u00eda un desbordamiento del b\u00fafer a trav\u00e9s de los par\u00e1metros lan_ipaddr en /apply.cgi."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
28
CVE-2024/CVE-2024-287xx/CVE-2024-28734.json
Normal file
28
CVE-2024/CVE-2024-287xx/CVE-2024-28734.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-28734",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-19T14:15:07.687",
|
||||
"lastModified": "2024-03-19T14:31:27.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in Unit4 Financials by Coda v.2024Q1 allows a remote attacker to escalate privileges via a crafted script to the cols parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://financials.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://unit4.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/177619/Financials-By-Coda-Cross-Site-Scripting.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-28855",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-18T22:15:08.963",
|
||||
"lastModified": "2024-03-18T22:15:08.963",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ZITADEL, open source authentication management software, uses Go templates to render the login UI. Due to a improper use of the `text/template` instead of the `html/template` package, the Login UI did not sanitize input parameters prior to versions 2.47.3, 2.46.1, 2.45.1, 2.44.3, 2.43.9, 2.42.15, and 2.41.15. An attacker could create a malicious link, where he injected code which would be rendered as part of the login screen. While it was possible to inject HTML including JavaScript, the execution of such scripts would be prevented by the Content Security Policy. Versions 2.47.3, 2.46.1, 2.45.1, 2.44.3, 2.43.9, 2.42.15, and 2.41.15 contain a patch for this issue. No known workarounds are available."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "ZITADEL, software de gesti\u00f3n de autenticaci\u00f3n de c\u00f3digo abierto, utiliza plantillas Go para representar la interfaz de usuario de inicio de sesi\u00f3n. Debido a un uso inadecuado del paquete `text/template` en lugar del paquete `html/template`, la interfaz de usuario de inicio de sesi\u00f3n no sanitiz\u00f3 los par\u00e1metros de entrada antes de las versiones 2.47.3, 2.46.1, 2.45.1, 2.44.3, 2.43. .9, 2.42.15 y 2.41.15. Un atacante podr\u00eda crear un enlace malicioso, donde inyectar\u00eda un c\u00f3digo que se mostrar\u00eda como parte de la pantalla de inicio de sesi\u00f3n. Si bien era posible inyectar HTML, incluido JavaScript, la Pol\u00edtica de seguridad de contenido impedir\u00eda la ejecuci\u00f3n de dichos scripts. Las versiones 2.47.3, 2.46.1, 2.45.1, 2.44.3, 2.43.9, 2.42.15 y 2.41.15 contienen un parche para este problema. No hay workarounds conocidos disponibles."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-28864",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-18T22:15:09.247",
|
||||
"lastModified": "2024-03-18T22:15:09.247",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SecureProps is a PHP library designed to simplify the encryption and decryption of property data in objects. A vulnerability in SecureProps version 1.2.0 and 1.2.1 involves a regex failing to detect tags during decryption of encrypted data. This occurs when the encrypted data has been encoded with `NullEncoder` and passed to `TagAwareCipher`, and contains special characters such as `\\n`. As a result, the decryption process is skipped since the tags are not detected. This causes the encrypted data to be returned in plain format. The vulnerability affects users who implement `TagAwareCipher` with any base cipher that has `NullEncoder` (not default). The patch for the issue has been released. Users are advised to update to version 1.2.2. As a workaround, one may use the default `Base64Encoder` with the base cipher decorated with `TagAwareCipher` to prevent special characters in the encrypted string from interfering with regex tag detection logic. This workaround is safe but may involve double encoding since `TagAwareCipher` uses `NullEncoder` by default."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "SecureProps es una librer\u00eda PHP dise\u00f1ada para simplificar el cifrado y descifrado de datos de propiedades en objetos. Una vulnerabilidad en SecureProps versi\u00f3n 1.2.0 y 1.2.1 implica que una expresi\u00f3n regular no detecta etiquetas durante el descifrado de datos cifrados. Esto ocurre cuando los datos cifrados se codificaron con `NullEncoder` y se pasaron a `TagAwareCipher` y contienen caracteres especiales como `\\n`. Como resultado, se omite el proceso de descifrado ya que no se detectan las etiquetas. Esto hace que los datos cifrados se devuelvan en formato plano. La vulnerabilidad afecta a los usuarios que implementan `TagAwareCipher` con cualquier cifrado base que tenga `NullEncoder` (no predeterminado). Se ha publicado el parche para el problema. Se recomienda a los usuarios que actualicen a la versi\u00f3n 1.2.2. Como workaround, se puede utilizar el `Base64Encoder` predeterminado con el cifrado base decorado con `TagAwareCipher` para evitar que los caracteres especiales en la cadena cifrada interfieran con la l\u00f3gica de detecci\u00f3n de etiquetas regex. Este workaround es seguro pero puede implicar doble codificaci\u00f3n ya que `TagAwareCipher` usa `NullEncoder` de forma predeterminada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-28865",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-18T22:15:09.510",
|
||||
"lastModified": "2024-03-18T22:15:09.510",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "django-wiki is a wiki system for Django. Installations of django-wiki prior to version 0.10.1 are vulnerable to maliciously crafted article content that can cause severe use of server CPU through a regular expression loop. Version 0.10.1 fixes this issue. As a workaround, close off access to create and edit articles by anonymous users."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "django-wiki es un sistema wiki para Django. Las instalaciones de django-wiki anteriores a la versi\u00f3n 0.10.1 son vulnerables al contenido de art\u00edculos creados con fines malintencionados que pueden causar un uso severo de la CPU del servidor a trav\u00e9s de un bucle de expresi\u00f3n regular. La versi\u00f3n 0.10.1 soluciona este problema. Como workaround, cierre el acceso para crear y editar art\u00edculos a usuarios an\u00f3nimos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
55
CVE-2024/CVE-2024-291xx/CVE-2024-29127.json
Normal file
55
CVE-2024/CVE-2024-291xx/CVE-2024-29127.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-29127",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-19T14:15:07.750",
|
||||
"lastModified": "2024-03-19T14:31:27.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AAM Advanced Access Manager allows Reflected XSS.This issue affects Advanced Access Manager: from n/a through 6.9.20.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/advanced-access-manager/wordpress-advanced-access-manager-plugin-6-9-20-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-291xx/CVE-2024-29128.json
Normal file
55
CVE-2024/CVE-2024-291xx/CVE-2024-29128.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-29128",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-19T14:15:08.010",
|
||||
"lastModified": "2024-03-19T14:31:27.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Post SMTP POST SMTP allows Reflected XSS.This issue affects POST SMTP: from n/a through 2.8.6.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/post-smtp/wordpress-post-smtp-mailer-plugin-2-8-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-291xx/CVE-2024-29129.json
Normal file
55
CVE-2024/CVE-2024-291xx/CVE-2024-29129.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-29129",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-19T14:15:08.230",
|
||||
"lastModified": "2024-03-19T14:31:27.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPLIT Pty Ltd OxyExtras allows Reflected XSS.This issue affects OxyExtras: from n/a through 1.4.4.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/oxyextras/wordpress-oxyextras-plugin-1-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-291xx/CVE-2024-29130.json
Normal file
55
CVE-2024/CVE-2024-291xx/CVE-2024-29130.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-29130",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-19T14:15:08.460",
|
||||
"lastModified": "2024-03-19T14:31:27.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scott Paterson Contact Form 7 \u2013 PayPal & Stripe Add-on allows Reflected XSS.This issue affects Contact Form 7 \u2013 PayPal & Stripe Add-on: from n/a through 2.0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/contact-form-7-paypal-add-on/wordpress-contact-form-7-paypal-stripe-add-on-plugin-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-291xx/CVE-2024-29134.json
Normal file
55
CVE-2024/CVE-2024-291xx/CVE-2024-29134.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-29134",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-19T14:15:08.690",
|
||||
"lastModified": "2024-03-19T14:31:27.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themefic Tourfic allows Stored XSS.This issue affects Tourfic: from n/a through 2.11.8.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/tourfic/wordpress-tourfic-plugin-2-11-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-291xx/CVE-2024-29135.json
Normal file
55
CVE-2024/CVE-2024-291xx/CVE-2024-29135.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-29135",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-19T14:15:08.900",
|
||||
"lastModified": "2024-03-19T14:31:27.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in Tourfic.This issue affects Tourfic: from n/a through 2.11.15.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.9,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/tourfic/wordpress-tourfic-plugin-2-11-15-arbitrary-file-upload-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-291xx/CVE-2024-29136.json
Normal file
55
CVE-2024/CVE-2024-291xx/CVE-2024-29136.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-29136",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-19T14:15:09.093",
|
||||
"lastModified": "2024-03-19T14:31:27.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of Untrusted Data vulnerability in Themefic Tourfic.This issue affects Tourfic: from n/a through 2.11.17.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/tourfic/wordpress-tourfic-plugin-2-11-17-php-object-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-291xx/CVE-2024-29137.json
Normal file
55
CVE-2024/CVE-2024-291xx/CVE-2024-29137.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-29137",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-19T14:15:09.283",
|
||||
"lastModified": "2024-03-19T14:31:27.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themefic Tourfic allows Reflected XSS.This issue affects Tourfic: from n/a through 2.11.7.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/tourfic/wordpress-tourfic-plugin-2-11-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-291xx/CVE-2024-29138.json
Normal file
55
CVE-2024/CVE-2024-291xx/CVE-2024-29138.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-29138",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-19T14:15:09.487",
|
||||
"lastModified": "2024-03-19T14:31:27.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DEV Institute Restrict User Access \u2013 Membership Plugin with Force allows Reflected XSS.This issue affects Restrict User Access \u2013 Membership Plugin with Force: from n/a through 2.5.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/restrict-user-access/wordpress-restrict-user-access-plugin-2-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-291xx/CVE-2024-29139.json
Normal file
55
CVE-2024/CVE-2024-291xx/CVE-2024-29139.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-29139",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-19T14:15:09.703",
|
||||
"lastModified": "2024-03-19T14:31:27.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mark Tilly MyCurator Content Curation allows Reflected XSS.This issue affects MyCurator Content Curation: from n/a through 3.76.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/mycurator/wordpress-mycurator-content-curation-plugin-3-76-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-291xx/CVE-2024-29140.json
Normal file
55
CVE-2024/CVE-2024-291xx/CVE-2024-29140.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-29140",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-19T14:15:09.913",
|
||||
"lastModified": "2024-03-19T14:31:27.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Matt Manning MJM Clinic allows Stored XSS.This issue affects MJM Clinic: from n/a through 1.1.22.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/mjm-clinic/wordpress-mjm-clinic-plugin-1-1-22-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-291xx/CVE-2024-29141.json
Normal file
55
CVE-2024/CVE-2024-291xx/CVE-2024-29141.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-29141",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-19T14:15:10.117",
|
||||
"lastModified": "2024-03-19T14:31:27.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PDF Embedder allows Stored XSS.This issue affects PDF Embedder: from n/a through 4.6.4.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/pdf-embedder/wordpress-pdf-embedder-plugin-4-6-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-291xx/CVE-2024-29142.json
Normal file
55
CVE-2024/CVE-2024-291xx/CVE-2024-29142.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-29142",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-19T14:15:10.330",
|
||||
"lastModified": "2024-03-19T14:31:27.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WebberZone Better Search \u2013 Relevant search results for WordPress allows Stored XSS.This issue affects Better Search \u2013 Relevant search results for WordPress: from n/a through 3.3.0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/better-search/wordpress-better-search-plugin-3-3-0-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-291xx/CVE-2024-29143.json
Normal file
55
CVE-2024/CVE-2024-291xx/CVE-2024-29143.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-29143",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-19T13:15:06.890",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Cozmoslabs, sareiodata Passwordless Login passwordless-login allows Stored XSS.This issue affects Passwordless Login: from n/a through 1.1.2.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/passwordless-login/wordpress-passwordless-login-plugin-1-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
76
README.md
76
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-19T13:00:38.498523+00:00
|
||||
2024-03-19T15:00:42.729377+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-19T12:15:09.993000+00:00
|
||||
2024-03-19T14:31:27.883000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,43 +29,61 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
241985
|
||||
242002
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `22`
|
||||
Recently added CVEs: `17`
|
||||
|
||||
* [CVE-2023-40278](CVE-2023/CVE-2023-402xx/CVE-2023-40278.json) (`2024-03-19T12:15:07.473`)
|
||||
* [CVE-2023-5388](CVE-2023/CVE-2023-53xx/CVE-2023-5388.json) (`2024-03-19T12:15:07.537`)
|
||||
* [CVE-2024-1144](CVE-2024/CVE-2024-11xx/CVE-2024-1144.json) (`2024-03-19T12:15:07.910`)
|
||||
* [CVE-2024-1145](CVE-2024/CVE-2024-11xx/CVE-2024-1145.json) (`2024-03-19T12:15:08.177`)
|
||||
* [CVE-2024-1146](CVE-2024/CVE-2024-11xx/CVE-2024-1146.json) (`2024-03-19T12:15:08.443`)
|
||||
* [CVE-2024-2605](CVE-2024/CVE-2024-26xx/CVE-2024-2605.json) (`2024-03-19T12:15:08.690`)
|
||||
* [CVE-2024-2606](CVE-2024/CVE-2024-26xx/CVE-2024-2606.json) (`2024-03-19T12:15:08.740`)
|
||||
* [CVE-2024-2607](CVE-2024/CVE-2024-26xx/CVE-2024-2607.json) (`2024-03-19T12:15:08.790`)
|
||||
* [CVE-2024-2608](CVE-2024/CVE-2024-26xx/CVE-2024-2608.json) (`2024-03-19T12:15:08.843`)
|
||||
* [CVE-2024-2609](CVE-2024/CVE-2024-26xx/CVE-2024-2609.json) (`2024-03-19T12:15:08.910`)
|
||||
* [CVE-2024-2610](CVE-2024/CVE-2024-26xx/CVE-2024-2610.json) (`2024-03-19T12:15:08.957`)
|
||||
* [CVE-2024-2611](CVE-2024/CVE-2024-26xx/CVE-2024-2611.json) (`2024-03-19T12:15:09.007`)
|
||||
* [CVE-2024-2612](CVE-2024/CVE-2024-26xx/CVE-2024-2612.json) (`2024-03-19T12:15:09.063`)
|
||||
* [CVE-2024-2613](CVE-2024/CVE-2024-26xx/CVE-2024-2613.json) (`2024-03-19T12:15:09.113`)
|
||||
* [CVE-2024-2614](CVE-2024/CVE-2024-26xx/CVE-2024-2614.json) (`2024-03-19T12:15:09.160`)
|
||||
* [CVE-2024-2615](CVE-2024/CVE-2024-26xx/CVE-2024-2615.json) (`2024-03-19T12:15:09.210`)
|
||||
* [CVE-2024-2616](CVE-2024/CVE-2024-26xx/CVE-2024-2616.json) (`2024-03-19T12:15:09.260`)
|
||||
* [CVE-2024-2632](CVE-2024/CVE-2024-26xx/CVE-2024-2632.json) (`2024-03-19T12:15:09.307`)
|
||||
* [CVE-2024-2633](CVE-2024/CVE-2024-26xx/CVE-2024-2633.json) (`2024-03-19T12:15:09.530`)
|
||||
* [CVE-2024-2634](CVE-2024/CVE-2024-26xx/CVE-2024-2634.json) (`2024-03-19T12:15:09.773`)
|
||||
* [CVE-2024-2635](CVE-2024/CVE-2024-26xx/CVE-2024-2635.json) (`2024-03-19T12:15:09.993`)
|
||||
* [CVE-2024-27439](CVE-2024/CVE-2024-274xx/CVE-2024-27439.json) (`2024-03-19T11:15:06.537`)
|
||||
* [CVE-2023-40279](CVE-2023/CVE-2023-402xx/CVE-2023-40279.json) (`2024-03-19T13:15:06.837`)
|
||||
* [CVE-2024-2636](CVE-2024/CVE-2024-26xx/CVE-2024-2636.json) (`2024-03-19T13:15:07.190`)
|
||||
* [CVE-2024-28734](CVE-2024/CVE-2024-287xx/CVE-2024-28734.json) (`2024-03-19T14:15:07.687`)
|
||||
* [CVE-2024-29127](CVE-2024/CVE-2024-291xx/CVE-2024-29127.json) (`2024-03-19T14:15:07.750`)
|
||||
* [CVE-2024-29128](CVE-2024/CVE-2024-291xx/CVE-2024-29128.json) (`2024-03-19T14:15:08.010`)
|
||||
* [CVE-2024-29129](CVE-2024/CVE-2024-291xx/CVE-2024-29129.json) (`2024-03-19T14:15:08.230`)
|
||||
* [CVE-2024-29130](CVE-2024/CVE-2024-291xx/CVE-2024-29130.json) (`2024-03-19T14:15:08.460`)
|
||||
* [CVE-2024-29134](CVE-2024/CVE-2024-291xx/CVE-2024-29134.json) (`2024-03-19T14:15:08.690`)
|
||||
* [CVE-2024-29135](CVE-2024/CVE-2024-291xx/CVE-2024-29135.json) (`2024-03-19T14:15:08.900`)
|
||||
* [CVE-2024-29136](CVE-2024/CVE-2024-291xx/CVE-2024-29136.json) (`2024-03-19T14:15:09.093`)
|
||||
* [CVE-2024-29137](CVE-2024/CVE-2024-291xx/CVE-2024-29137.json) (`2024-03-19T14:15:09.283`)
|
||||
* [CVE-2024-29138](CVE-2024/CVE-2024-291xx/CVE-2024-29138.json) (`2024-03-19T14:15:09.487`)
|
||||
* [CVE-2024-29139](CVE-2024/CVE-2024-291xx/CVE-2024-29139.json) (`2024-03-19T14:15:09.703`)
|
||||
* [CVE-2024-29140](CVE-2024/CVE-2024-291xx/CVE-2024-29140.json) (`2024-03-19T14:15:09.913`)
|
||||
* [CVE-2024-29141](CVE-2024/CVE-2024-291xx/CVE-2024-29141.json) (`2024-03-19T14:15:10.117`)
|
||||
* [CVE-2024-29142](CVE-2024/CVE-2024-291xx/CVE-2024-29142.json) (`2024-03-19T14:15:10.330`)
|
||||
* [CVE-2024-29143](CVE-2024/CVE-2024-291xx/CVE-2024-29143.json) (`2024-03-19T13:15:06.890`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `62`
|
||||
|
||||
* [CVE-2024-0743](CVE-2024/CVE-2024-07xx/CVE-2024-0743.json) (`2024-03-19T12:15:07.607`)
|
||||
* [CVE-2024-24683](CVE-2024/CVE-2024-246xx/CVE-2024-24683.json) (`2024-03-19T09:15:06.630`)
|
||||
* [CVE-2024-2610](CVE-2024/CVE-2024-26xx/CVE-2024-2610.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-2611](CVE-2024/CVE-2024-26xx/CVE-2024-2611.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-2612](CVE-2024/CVE-2024-26xx/CVE-2024-2612.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-2613](CVE-2024/CVE-2024-26xx/CVE-2024-2613.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-2614](CVE-2024/CVE-2024-26xx/CVE-2024-2614.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-2615](CVE-2024/CVE-2024-26xx/CVE-2024-2615.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-2616](CVE-2024/CVE-2024-26xx/CVE-2024-2616.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-2620](CVE-2024/CVE-2024-26xx/CVE-2024-2620.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-2621](CVE-2024/CVE-2024-26xx/CVE-2024-2621.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-2622](CVE-2024/CVE-2024-26xx/CVE-2024-2622.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-2632](CVE-2024/CVE-2024-26xx/CVE-2024-2632.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-2633](CVE-2024/CVE-2024-26xx/CVE-2024-2633.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-2634](CVE-2024/CVE-2024-26xx/CVE-2024-2634.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-2635](CVE-2024/CVE-2024-26xx/CVE-2024-2635.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-26369](CVE-2024/CVE-2024-263xx/CVE-2024-26369.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-27439](CVE-2024/CVE-2024-274xx/CVE-2024-27439.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-28237](CVE-2024/CVE-2024-282xx/CVE-2024-28237.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-28248](CVE-2024/CVE-2024-282xx/CVE-2024-28248.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-28249](CVE-2024/CVE-2024-282xx/CVE-2024-28249.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-28250](CVE-2024/CVE-2024-282xx/CVE-2024-28250.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-28446](CVE-2024/CVE-2024-284xx/CVE-2024-28446.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-28447](CVE-2024/CVE-2024-284xx/CVE-2024-28447.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-28855](CVE-2024/CVE-2024-288xx/CVE-2024-28855.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-28864](CVE-2024/CVE-2024-288xx/CVE-2024-28864.json) (`2024-03-19T13:26:46.000`)
|
||||
* [CVE-2024-28865](CVE-2024/CVE-2024-288xx/CVE-2024-28865.json) (`2024-03-19T13:26:46.000`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
143
_state.csv
143
_state.csv
@ -186611,7 +186611,7 @@ CVE-2021-46903,0,0,59ca1d694c639409297840c930e3dd8d372cadedd1376cf64770674d9911e
|
||||
CVE-2021-46904,0,0,2302e1ddf24af079b1d01d772be4a976d87d15ae47821a4694e8a7dcf254dbe3,2024-02-26T16:32:25.577000
|
||||
CVE-2021-46905,0,0,c04cc80f385b5f0ce87eed63a1dcbed071b4b221007a63ccfb23523dee210cbb,2024-02-26T16:32:25.577000
|
||||
CVE-2021-46906,0,0,bc23dcb13ae8ce225e3d35edd1baa1ef6ecf58db3eb361b25dcc37487d469a8b,2024-02-26T22:10:40.463000
|
||||
CVE-2021-46907,0,0,acea2c35745a8259c2226fdda84adef26778b943b513bbac255da8c3e04f22d4,2024-02-27T14:20:06.637000
|
||||
CVE-2021-46907,0,1,1f9b2c2375fa009b016f94aa5d024afa767a5a81d6bdb7bf20e32e33a05d91c6,2024-03-19T13:15:06.713000
|
||||
CVE-2021-46908,0,0,67f912657f123d50c1881b9d265bd000af86b0195a2b177aad9980da36a2a329,2024-02-27T14:20:06.637000
|
||||
CVE-2021-46909,0,0,e631d720c5af3d93100a1d5b75c61b7ce8e8de41b1e355e917900d6be2739ad1,2024-02-27T14:20:06.637000
|
||||
CVE-2021-46910,0,0,acb3da1af30b35efc1d65a115c25ebe4fe878b8cccdb0e816f6128bd0f8b19c6,2024-02-27T14:20:06.637000
|
||||
@ -186679,7 +186679,7 @@ CVE-2021-46971,0,0,c2acba3e9677967cedc033866cb55ce76d7cb0c77189e50c4b02ad205da26
|
||||
CVE-2021-46972,0,0,2fcaadface21d7b60dfca811761541432c1fabe6d46d6fccab28d3dfdd7179df,2024-02-28T14:06:45.783000
|
||||
CVE-2021-46973,0,0,94fa31c2c960d781e64f58fd8227097c0cffd544107ad7cb7afc44d1325641b6,2024-02-28T14:06:45.783000
|
||||
CVE-2021-46974,0,0,cb7c9c6f7950590a35d58300b6dd52f3529bec49e82f6cbe84a7815cfba5c578,2024-02-28T14:06:45.783000
|
||||
CVE-2021-46975,0,0,855006f62e08049fb490ecf1d7e5d453ef0f0ed0725fcb17d9236e1111201218,2024-02-28T14:06:45.783000
|
||||
CVE-2021-46975,0,1,70af865cc9b576a205c8bc8fd6eaa7ab2fd6b8e90cd6fa7ce47ab72509cf0a81,2024-03-19T14:15:07.467000
|
||||
CVE-2021-46976,0,0,ff864086cc0c57c094b2b601c8753502b496fd034a66715a8c785d4afa83c1ad,2024-02-28T14:06:45.783000
|
||||
CVE-2021-46977,0,0,ca903d50445e2ce2f31a19cf01106354f4f019bf25908319cbfe5e64ed68eb0b,2024-02-28T14:06:45.783000
|
||||
CVE-2021-46978,0,0,7e6353c7ec59c2f8c8ed1b327a5e28465eabfd0e8aac3de9e5dabf625f9cb071,2024-02-28T14:06:45.783000
|
||||
@ -186788,8 +186788,8 @@ CVE-2021-47080,0,0,6c76ef2e6d45cb2bdf0418cfb11542ae72e260d23c2600aabae0a92c64677
|
||||
CVE-2021-47081,0,0,57aae1ae924703732f16c71bb59edb7708c5940509057722be6f41cb1db7f39a,2024-03-01T22:22:25.913000
|
||||
CVE-2021-47082,0,0,7422e0d037c25022fce44cf73597551dbfe2b4454c463b24f9b9d4302a4a0623,2024-03-05T13:41:01.900000
|
||||
CVE-2021-47083,0,0,d9f3923d86c800954ffa1321dcce9a7d151b8ce8166dfc611d15d44aab1f16e2,2024-03-05T13:41:01.900000
|
||||
CVE-2021-47084,0,0,75393811ab24bfbe2624db82f3bed52cd2bc18962c5d97adf5d70fd646528bbb,2024-03-05T13:41:01.900000
|
||||
CVE-2021-47085,0,0,f019499ca544c742b643daf18513ad41f724608883fe244ccb23b701b069663e,2024-03-05T13:41:01.900000
|
||||
CVE-2021-47084,0,1,530450d184c6a372fe69a9fb7dc9c06e0653a9f98fffc8b75fb630d9dc3c392a,2024-03-19T14:15:07.540000
|
||||
CVE-2021-47085,0,1,6c3dcf2378d1a25b475aa163da4c101a5333ed9c207949ae756275d03825026b,2024-03-19T14:15:07.603000
|
||||
CVE-2021-47086,0,0,8e2a111280ab3f5bc40a5999404b23ce7ee0d0e43f64fe81723eee892294b9ee,2024-03-05T13:41:01.900000
|
||||
CVE-2021-47087,0,0,31e839bc251f516711577b0407a8846cb91388c92d4f6612a9a1315fbeec8664,2024-03-05T13:41:01.900000
|
||||
CVE-2021-47088,0,0,4a3656c48bbc8c85faa05c1d3ec8b55d7b1596867161e47372621d5840c3db5f,2024-03-05T13:41:01.900000
|
||||
@ -228520,12 +228520,13 @@ CVE-2023-40271,0,0,32b1ed8a2c4dfeba3528370a5421b70aa0af2b6fe9492a3bbbb74a3d2d59e
|
||||
CVE-2023-40272,0,0,7a6056d607654f824702d2e9e2dc9f865fd4e8a03c7008b2d3cdc50ed43631ee,2023-08-24T17:00:07.203000
|
||||
CVE-2023-40273,0,0,b65a3421fac6479ee49375b6d74ec543e99b2ad7b1b4bfafe9fd90bd40db6338,2023-08-29T16:14:08.630000
|
||||
CVE-2023-40274,0,0,a87703ce0cec9b2f71f145b4ad6930a4558be41188f81bc5cadeaf5b92764c44,2023-08-22T17:47:49.207000
|
||||
CVE-2023-40275,0,0,6355574985198dc6e7f85aa6c98fde8df05fe38075e6e6447f453afea16b7034,2024-03-19T01:15:44.743000
|
||||
CVE-2023-40276,0,0,81528dffb63509adc0a167e771fb055fcc7b8625a14356190751a6ed7fde0eb7,2024-03-19T01:15:44.807000
|
||||
CVE-2023-40277,0,0,1649d36ee5744da7853e6f63a529e8568ec9bb7f13c5f96607f0f1dacda93a70,2024-03-19T01:15:44.850000
|
||||
CVE-2023-40278,1,1,7fc796a9c8a4b86b281e82f24dbfcfc7f15ce8d00cd7c187936bcb2d2f119d44,2024-03-19T12:15:07.473000
|
||||
CVE-2023-40275,0,1,d780185042568c4c5e3d908e653899a5842f98ee62e01a07d03c8beba4c60da3,2024-03-19T13:26:46
|
||||
CVE-2023-40276,0,1,c11192dae3dc71f4563d9f630d2c4104dfda98c34e0c079da52dacb986ab77a2,2024-03-19T13:26:46
|
||||
CVE-2023-40277,0,1,5e3039987e71db28e1645868c72e7cc629e7899bbfa946bc3b175b032f17bbf8,2024-03-19T13:26:46
|
||||
CVE-2023-40278,0,1,449d1aa400538bb35df149f20fa827f27617d7708ef29b49fbe49c1dcfa036bc,2024-03-19T13:26:46
|
||||
CVE-2023-40279,1,1,0b1da15b4dd1a21424c1ed5a892012624fcce085a13e38c07b0f6c8a78169e1e,2024-03-19T13:26:46
|
||||
CVE-2023-4028,0,0,3df4ea134e3bc2993759c7fd73fca43c7cce7bc86509f2d520d8c4274d249028,2023-08-24T17:53:34.333000
|
||||
CVE-2023-40280,0,0,0a6158d8927adeba96545304d54666c1db28ebdd9babb20c813ed6077a34edb8,2024-03-19T01:15:44.900000
|
||||
CVE-2023-40280,0,1,d8471b523c83add259439e0e8ab1ab3dc90ad3841be77a74243f33b052d6e8c5,2024-03-19T13:26:46
|
||||
CVE-2023-40281,0,0,9151ee58e4e34a5d0e50b7a1455975136c3b0ec7392bd5aeea0e6461170746f4,2023-08-23T15:27:41.540000
|
||||
CVE-2023-40282,0,0,68e143824499af6080364e5a6f136bf1432ee4ad4f0d4132f7f32cbe6cc136cb,2023-11-07T04:20:11.230000
|
||||
CVE-2023-40283,0,0,f509256457d45926216ae9129c3e4ee52dab388f6335b0dd0bd2d155acf5d072,2024-01-11T19:15:10.930000
|
||||
@ -236195,7 +236196,7 @@ CVE-2023-5384,0,0,441f1b8a30756cc9b5f3117d86e72f400495bdf444d07abaff550854597f23
|
||||
CVE-2023-5385,0,0,9ae213cb30ffb83a1a2cc696047d7aba4caab30c852d1ef2dcb64596a9208adb,2023-11-27T20:13:07.160000
|
||||
CVE-2023-5386,0,0,bfe87044f02046ad817ff7d54d504256b17a835afbb668f0ba9ab1d54dcdd82f,2023-11-27T20:14:47.710000
|
||||
CVE-2023-5387,0,0,45867b8235da7c9a90990530159b5190e5bd4e4eb429c6ce43ac3327afc64eac,2023-11-27T20:15:21.673000
|
||||
CVE-2023-5388,1,1,697e009ac3688cb2f69b444c49a93c510d3e6aa1329ac0f96fc092bbce7b3e17,2024-03-19T12:15:07.537000
|
||||
CVE-2023-5388,0,1,26f8ca6712e59aac3dc5fff2076937ae68316fcbd5536f9f22742283255c64ca,2024-03-19T13:26:46
|
||||
CVE-2023-5389,0,0,07d2db5823402611439109f7f34a4853364795f9958639185189e21209a9cfea,2024-02-08T15:20:04.057000
|
||||
CVE-2023-5390,0,0,7ebaee5947d3e1f1edd0aa63aeb1bb5e132bc79873105ca039e3fefbf61f0d4e,2024-02-08T17:18:46.787000
|
||||
CVE-2023-5391,0,0,e65a9210280128a68a8a49095d5446b17a62134416876921dbd7f459dcc8b6e5,2024-02-01T00:49:46.897000
|
||||
@ -237744,8 +237745,8 @@ CVE-2024-0050,0,0,ac4e7fe9d34761575417473ff0725a23428cba002d4bdba2ecc8c3f11dcdf6
|
||||
CVE-2024-0051,0,0,1e10d7ae88cadc9f5a72832435250d22c26ea58118b48436460d9ab0abdd889a,2024-03-12T12:40:13.500000
|
||||
CVE-2024-0052,0,0,982ec5f500f55c393e1ad95104d1acd01617089fcfa88bc636de292bcef45a51,2024-03-12T12:40:13.500000
|
||||
CVE-2024-0053,0,0,260483d756f420e8962c4a32143c98e01fe118d5502a6b9f7b4edbf25e96bf4f,2024-03-12T12:40:13.500000
|
||||
CVE-2024-0054,0,0,3552e1d3e922d75516a78ab3f1411140d50345a0eebabee07273897f2c8adc04,2024-03-19T07:15:07.033000
|
||||
CVE-2024-0055,0,0,3460661a6f9f0f8643b57c7938cf658a4032397eb07fb1569d1574481d778c96,2024-03-19T07:15:08.667000
|
||||
CVE-2024-0054,0,1,987efaa1857469d87adfaae38079aee4e9c660539b169f0b4c9210a0c7eb4365,2024-03-19T13:26:46
|
||||
CVE-2024-0055,0,1,7cea323e5f22231f34a966995c2bb8e831665aebf4714879a2fd8ff073c52f27,2024-03-19T13:26:46
|
||||
CVE-2024-0056,0,0,8e4c5bb83a29ac8333eedaa800b8f7cbc24d65d51285a7605c7436e724c22f27,2024-02-27T20:42:01.233000
|
||||
CVE-2024-0057,0,0,e4dc663a42ac696d9f4ea85b4eec7c26c470f055092858eb6ffdd99343f4d6bf,2024-02-27T20:41:51.863000
|
||||
CVE-2024-0068,0,0,29054351872f671ffd0afada76da136d48518b88acaefb639ccc6c169ead07a3,2024-03-01T14:04:26.010000
|
||||
@ -238241,7 +238242,7 @@ CVE-2024-0738,0,0,e180008c6191582af8846975460523b38bf746526c1330b21eec59d5ba0663
|
||||
CVE-2024-0739,0,0,92b1abf635667968fc6fc797839e0df67043fa3679af54f39fb17a879e4f027e,2024-02-29T01:43:27.693000
|
||||
CVE-2024-0741,0,0,a9fda7b42aa854b426665305c7828769c163150b209cbb19ab9d616db9041a98,2024-02-02T17:19:30.117000
|
||||
CVE-2024-0742,0,0,1ae741d10e1bed36bf34ad7f16caeaf1531efb403a5a51e45593c25df5bee474,2024-02-02T17:19:23.497000
|
||||
CVE-2024-0743,0,1,10e6de3ff74d2fe6d808f7772622f8bf9b8141c31ffaa09133123be56fedc9c1,2024-03-19T12:15:07.607000
|
||||
CVE-2024-0743,0,0,10e6de3ff74d2fe6d808f7772622f8bf9b8141c31ffaa09133123be56fedc9c1,2024-03-19T12:15:07.607000
|
||||
CVE-2024-0744,0,0,e96805dde96bfb723552d652089a0f0d2e0f936866d1fca2d8bc36dda88ad35c,2024-01-29T22:47:40.353000
|
||||
CVE-2024-0745,0,0,e95f46af45f166ba44148aad2d02421e51785e292696d491c32d77e99976a28a,2024-01-30T16:08:53.497000
|
||||
CVE-2024-0746,0,0,86e154f7304b77b0253dd3ebca2a1985a3fb1b8ae7973ed11288f18ffe31e532,2024-02-02T17:19:10.737000
|
||||
@ -238545,9 +238546,9 @@ CVE-2024-1138,0,0,0bb26866b03e9dd351d8284004467140fe2cfdfbd72af071fda864e5a2dc9e
|
||||
CVE-2024-1140,0,0,113ab98fbbd3f38fc36026b5aef44eb4b38cd7d347ba07fcabb6b9d9a69118a5,2024-02-27T19:17:32.253000
|
||||
CVE-2024-1141,0,0,48ded67d016daf0f3b16719f5ccedb465e548a958cef24ce4f350672f3d23e36,2024-02-09T20:22:03.893000
|
||||
CVE-2024-1143,0,0,0e1cc50dc6fadb90e5e9f42ce552c5269c71acc03717875a86d6ea10d7db2994,2024-02-09T19:08:27.423000
|
||||
CVE-2024-1144,1,1,46ba07079959d0bc5a1bd80131fbc31b6ec1add882bbb171f0d9910b026f00f7,2024-03-19T12:15:07.910000
|
||||
CVE-2024-1145,1,1,f0d0e965634c237c0bfc88fd7f3d047f78ebffe6c269b0c22cd127ca447dd95f,2024-03-19T12:15:08.177000
|
||||
CVE-2024-1146,1,1,0e5bfb2c890fa993042df6fb1eeb1edf7e276838e73c72f55376d2188650bb35,2024-03-19T12:15:08.443000
|
||||
CVE-2024-1144,0,1,699c2bb82fba001126116e7164ac75649c735a4cdb950cd58a7f55fabda24513,2024-03-19T13:26:46
|
||||
CVE-2024-1145,0,1,1d0b86d1728dfc6934144e4a4f59fc809aef7b32372367e4e23c4951edbc35c7,2024-03-19T13:26:46
|
||||
CVE-2024-1146,0,1,b019873db4fb4d3601a6d970fbcd29d15f8b04d24e65f17a5b4b42e67dfad811,2024-03-19T13:26:46
|
||||
CVE-2024-1149,0,0,e12aca11c49edcecd68e875fe82a5687fd0ed0bd531ab2619a9a9843b555ddd2,2024-02-15T17:52:08.970000
|
||||
CVE-2024-1150,0,0,254c78737835be39b8538afdba98acb889151a71de178f55236b85ab77801784,2024-02-15T17:42:08.113000
|
||||
CVE-2024-1151,0,0,9228ed7d5915ff157a1f719259771d692c1e75b64670d2aac60410feae41cc91,2024-02-22T04:15:08.477000
|
||||
@ -239525,8 +239526,8 @@ CVE-2024-2150,0,0,b83314ad56669588db95aa786ae7a17f777458826d382001055429649dadce
|
||||
CVE-2024-21500,0,0,c7cd747e0f0c4b38d8e4dbe19bee0ca66b1639098d16200b89805bcc371371ae,2024-02-20T19:50:53.960000
|
||||
CVE-2024-21501,0,0,130609650a6eb4f8bc8998fc23ffe06266af91576d81d0c32d1798485b0b5ef0,2024-03-06T14:15:48.343000
|
||||
CVE-2024-21502,0,0,253b7cd8cd65099448332976329a521bac2b28af5e046192a7c42ab6af135b17,2024-02-26T13:42:22.567000
|
||||
CVE-2024-21503,0,0,2a36a1a5fed9fa183ac791c22d331872eb5d5935cbb721aeb5dc38bd4860eedb,2024-03-19T05:15:09.447000
|
||||
CVE-2024-21504,0,0,98f52e8e564b1a295f7b7c821232de2d94a2633e837d34077a0bedb064ca31d7,2024-03-19T05:15:09.813000
|
||||
CVE-2024-21503,0,1,dbde89ae4e130de7b3da2486efecec01760e430d7d72c91a7a50092dd8618341,2024-03-19T13:26:46
|
||||
CVE-2024-21504,0,1,49e3dd2437933564763de1c9017a71fc9b864133b3b4959dcdb8b06a9a352074,2024-03-19T13:26:46
|
||||
CVE-2024-2151,0,0,495640d86128d2bc0aeeff77d3b870070f1388478e718a7bad3a177fbcc68beb,2024-03-04T13:58:23.447000
|
||||
CVE-2024-2152,0,0,d677d760100442be712e5eec50e33d95d66b2aa83966714505912fafaea405bb,2024-03-04T13:58:23.447000
|
||||
CVE-2024-2153,0,0,fb8a655e3fba8ce0afef143bbe07f9318fe9ac9ad4a4312149ae082896b81088,2024-03-04T13:58:23.447000
|
||||
@ -239713,12 +239714,12 @@ CVE-2024-22010,0,0,c8be08522110436a9d4fa99d4021d5a2fb6c1481cb50733e6d40fe00f78ad
|
||||
CVE-2024-22011,0,0,0b600b1e31e74facb27c71d7c9b3f514c8b8b4c777fc0d39f1c7ce9fc8756817,2024-03-12T12:40:13.500000
|
||||
CVE-2024-22012,0,0,6083637305fc19ea62a8c209ebe6bfac1cd035e045c787ca530a090291dc1971,2024-03-12T21:15:57.953000
|
||||
CVE-2024-22016,0,0,72bb3341c866069974fe863b6c9e848e25809f5f0697d51cda8a3c348c9671f4,2024-02-07T17:33:12.727000
|
||||
CVE-2024-22017,0,0,14a3fcdf6f182b423fd9f5e9942b0441a65dbbd11c9c79f1c863b5211adc660b,2024-03-19T05:15:10.073000
|
||||
CVE-2024-22017,0,1,0f6f205b1f325c4a0d9e7320cb7015df886250fb433faa3c59bf3b2f4d0b8c64,2024-03-19T13:26:46
|
||||
CVE-2024-22019,0,0,f2437e68c6ddb8f7177f54a0e9f52e5ca8426b13996c7a8a6cfcbbb0d671c60e,2024-03-15T11:15:08.807000
|
||||
CVE-2024-22021,0,0,ba38d4b86a2c5af951f989c7a28594b6207f0b19739ba3d580be6e4d49001bfb,2024-02-29T01:44:04.690000
|
||||
CVE-2024-22022,0,0,925c0d46bbd39b5d0f2644b5e26e0cd82488a20b7de7cccfa4639e9bb8f60d9e,2024-02-15T18:45:30.887000
|
||||
CVE-2024-22024,0,0,980d44adebdc63cfe4985efd7aa2ee2044d33423093fc7c9f165c43f20a43115,2024-02-13T15:15:32.193000
|
||||
CVE-2024-22025,0,0,86fafa4f33c0e6fa4f2207a6a7311c72b954a26bcbe7a62e0f3dc1d575de20c3,2024-03-19T05:15:10.267000
|
||||
CVE-2024-22025,0,1,5d68e9acf6c67c273a95150bd270bdc446473f3d7435d2a1bda2b5f400f71a4b,2024-03-19T13:26:46
|
||||
CVE-2024-22027,0,0,0822e6ca4a0197c830c667319442a46ae27f8152642de8d7f05f1858eada021b,2024-01-18T20:02:46.993000
|
||||
CVE-2024-22028,0,0,8abd1038154eaf5ca23784f859ed6e719a17c93e427bf707fe61eab823cdcecc,2024-01-22T20:22:47.847000
|
||||
CVE-2024-22039,0,0,ef8c56b19d2a3b2c57a146991f2128767113626aa58dc9954ac8669d3630e403,2024-03-12T12:40:13.500000
|
||||
@ -239916,7 +239917,7 @@ CVE-2024-22409,0,0,e92019bfa6d50bbc1b264991877e3bce269448ec71e0f6c2b5cda34228640
|
||||
CVE-2024-2241,0,0,8140c62c714d3fd2a22700403717bf3cfaf9fbf79f8cdabdd27c1e9d7b2a0abf,2024-03-07T13:52:27.110000
|
||||
CVE-2024-22410,0,0,62ec72647b5ea1700889ddc0efc97499359f7397b987554973f4390a961ee686,2024-01-26T18:49:50.430000
|
||||
CVE-2024-22411,0,0,6d4ccfd5be4a20d9101c94b80064355c062bf11f8809c3501e5626e8ec589cbf,2024-01-24T18:54:46.323000
|
||||
CVE-2024-22412,0,0,5dc751ffae813d57e28569e2697b5365a450459489f6b3a24014306ab9f3b82f,2024-03-18T21:15:06.230000
|
||||
CVE-2024-22412,0,1,9f5ebb25ebb7b516cc1523424d10c702fb58e04a913ecff3a0cc20783e93702b,2024-03-19T13:26:46
|
||||
CVE-2024-22414,0,0,aa253a2ddcbd1f00003e4344af9f9779c648d8d1e96a0675fd9bce3d0b73e941,2024-01-26T18:50:02.263000
|
||||
CVE-2024-22415,0,0,b983bf76f15dc67da57f6fa69618a5b3a2be5696a2de0f5691e589e6644ff872,2024-01-30T15:22:32.770000
|
||||
CVE-2024-22416,0,0,4743c834e9f721c7d271903d375817b56210d75d85a6318060ff428a321c4e6d,2024-01-29T17:02:04.487000
|
||||
@ -239938,7 +239939,7 @@ CVE-2024-22445,0,0,874153d1fc6b93fe9f1bc951c0a860f76df46d0b4a1da0ccdd296d9b31c66
|
||||
CVE-2024-22449,0,0,bbda7843d9766542fd731dac4991558c835fbecfc00731f79a512d8c0e63a23d,2024-02-03T00:30:30.737000
|
||||
CVE-2024-2245,0,0,691730e073363309cbbedda1561ea8c86cfdfccb1b6917a0eaaacd61f92e651b,2024-03-07T13:52:27.110000
|
||||
CVE-2024-22452,0,0,80a49da4f3f93f14d99e56090386038017924d30f728430f2aac9792c96b9939,2024-03-04T13:58:23.447000
|
||||
CVE-2024-22453,0,0,0d97d1ab802dde23679a52d547d0ba14c788d33b17beb79dc898db967b80b762,2024-03-19T08:15:06.480000
|
||||
CVE-2024-22453,0,1,d34f36f5ba0d6c8920acf384004dd0c56235ac34a71473708e1fa31b04710cc8,2024-03-19T13:26:46
|
||||
CVE-2024-22454,0,0,323c0cbc8c3a94d57ed602cc461475e5ca2e60a686452caf750d59ecf708ba74,2024-02-27T17:10:16.097000
|
||||
CVE-2024-22455,0,0,93b62f3ddef8805afbddbbac0392b16d3832897fc5287e2cb0477eb46d680dca,2024-02-14T13:59:35.580000
|
||||
CVE-2024-22457,0,0,7279ce58ecce8320d3d09adc8f81224f08bd00041f311a050a60e7628b040618,2024-03-01T14:04:04.827000
|
||||
@ -240275,7 +240276,7 @@ CVE-2024-2333,0,0,7859497755577a3c12474b65d1ce2a88fd8fe4e66b8c7ed1fad652e4225be2
|
||||
CVE-2024-23330,0,0,4c6f25b3798cb741ccc23b207d525fcd88994089a8ae4e38ec06ed8734c9fdae,2024-02-01T17:20:38.387000
|
||||
CVE-2024-23331,0,0,28e704ef5336c7eeb7f5c6708c0676ab5e78ab6128c57db716e26b15b903c5a7,2024-01-29T15:31:57.737000
|
||||
CVE-2024-23332,0,0,ad52e25a8e8aa939055f450db475e34085130355e0e6d4b9d3c88d3525604a79,2024-02-29T21:16:49.777000
|
||||
CVE-2024-23333,0,0,a8785c875a8f4e1794be9b2b54e1650211a07f52c1246334627e5e26c2069340,2024-03-18T21:15:06.473000
|
||||
CVE-2024-23333,0,1,7b8931efbf20aee2c14dc80ecf0d7a5ac3c4ce24616b4a2bde21d3ff46ae73e6,2024-03-19T13:26:46
|
||||
CVE-2024-23334,0,0,08cde117a4b38806b93df46059f745f0c6d4757b2ad8859dd7f49ccce43fe183,2024-02-09T03:15:09.603000
|
||||
CVE-2024-23339,0,0,ff39b3b78ba3a587e65c45755920a02972ff0423fe99d41c48ef314a8ec0f5c3,2024-01-30T14:30:28.343000
|
||||
CVE-2024-23340,0,0,1464843bbb79a1028e64685d9db4214cd46f9ec4abb91dc09759e94b16f2cd52,2024-01-30T14:30:38.267000
|
||||
@ -240586,8 +240587,8 @@ CVE-2024-2403,0,0,db710ca0e617c3da526a0c52d62f8976f63ed0af009f8cc6c6ef6ea3cb5744
|
||||
CVE-2024-24034,0,0,f4e2cb1ad61decc8759fc1601847f210f2a72bb15bd38e4d1e3133a19621c99b,2024-02-08T13:44:21.670000
|
||||
CVE-2024-24035,0,0,77bbb29060dad0a4e27b56775f789e0b578831621d3fa9615a4c8def660cc461,2024-03-08T14:02:57.420000
|
||||
CVE-2024-24041,0,0,f96650c9700d93c943d8efc95d65c599a8e77cc1d7aaa4ba87820d6237153959,2024-02-07T17:14:41.607000
|
||||
CVE-2024-24042,0,0,9b757c90c57cd5d1d10fe306a61b474dc9d79508ef1e555352eb52d5ba1e7c62,2024-03-19T07:15:09.097000
|
||||
CVE-2024-24043,0,0,3a611e6fbf058a328646fd276c24f5e7ff336bb5fc813d0bc4299dbc9a473942,2024-03-19T07:15:09.517000
|
||||
CVE-2024-24042,0,1,4a4e7ea160d5d0244b906cb4642841160ba9374fd30aaa87521360ed2e8ecd1a,2024-03-19T13:26:46
|
||||
CVE-2024-24043,0,1,8fe33813863354c4eead332dc6243b19fd5b77f5e3a94ddd813814cf68659374,2024-03-19T13:26:46
|
||||
CVE-2024-24059,0,0,3da8cffbcfd869f14b04835347f156c5cf1a6025fa9627a3ec1ec79a41a9d0be,2024-02-03T00:40:43.793000
|
||||
CVE-2024-2406,0,0,93c22b844fdd3e9e5d23091d0d4a49fe9aed9112f23dba2ad0e01fb92984ecfa,2024-03-13T12:33:51.697000
|
||||
CVE-2024-24060,0,0,3a6250076b98d97024da5e52a26f1f0c29807ef38de327e60f431783e4f1deaa,2024-02-03T00:40:48.600000
|
||||
@ -240746,7 +240747,7 @@ CVE-2024-24573,0,0,f1d93bff5c6bcd3d059b458503c133493da6cd5465afade6772d6b8918d46
|
||||
CVE-2024-24574,0,0,5c3354df94ed3c3d722a424e9070a4de2494df1de1ab089a157997969d54ce57,2024-02-12T21:41:04.237000
|
||||
CVE-2024-24575,0,0,c5118ffbdcace809888bdecc6b2d6f4ac84a219f33368ef55d9e1f22d09dbdd6,2024-02-22T04:15:08.973000
|
||||
CVE-2024-24577,0,0,7ef14d5c8728a47e9875ffb624dc06c6afcf3442302e1966297037a51f00a2ea,2024-02-27T10:15:08.137000
|
||||
CVE-2024-24578,0,0,d5a99ac3cd7ad2ccbf6e3d84651df345648e6ec8e16af1e5b91d13bca4289bfb,2024-03-18T22:15:07.683000
|
||||
CVE-2024-24578,0,1,62e834482d41eab6204ee6f77e0822c926a00522b8b9c721b6887e6533b1762e,2024-03-19T13:26:46
|
||||
CVE-2024-24579,0,0,25ba0ad5d2b9fe2e68c29dd6b44a88334c242edef527d576e4dc8319e8e9e7fc,2024-02-09T16:22:53.863000
|
||||
CVE-2024-24590,0,0,3ffc61baf7136eb0cebd087f00dd08f374ea9e3979726488f90e3503fab0cbb6,2024-02-15T15:43:23.723000
|
||||
CVE-2024-24591,0,0,2a8f2c8ae8e16511a53ec0edcf0ebd3935279ad4fedae1cc0dd81de4ffb3ff58,2024-02-15T18:38:38.730000
|
||||
@ -240756,7 +240757,7 @@ CVE-2024-24594,0,0,2d1d6ef3edb6eea27d760a77187cf0f21d8b0e3aa5e2b1e9eb45515b37617
|
||||
CVE-2024-24595,0,0,53aa45116d4573f7c0b646b17e4787137c5ab03b6e722457f3ddd917489c99e4,2024-02-13T14:08:55.650000
|
||||
CVE-2024-24680,0,0,00c6b06cbd399fac9a1cb69a45fdeee991ea9572aae73c195704c3555b436eb7,2024-02-15T18:46:48.693000
|
||||
CVE-2024-24681,0,0,705110c1a0575ef95794934b23101ccc4a6f384f7c61c4db9f4dbf9a8c528dd4,2024-02-26T13:42:22.567000
|
||||
CVE-2024-24683,0,1,83867e1d338460bbfdf92b236075e9d9bb5ed3b017b9bdb0c57d93bffd7eb55d,2024-03-19T09:15:06.630000
|
||||
CVE-2024-24683,0,1,5dcfcb131b936f6ead6cae5418b28b2fe1bb1011c1c921fe73c5d9bd261bf34a,2024-03-19T13:26:46
|
||||
CVE-2024-24690,0,0,4249963fcab3f64839ca35be1a62d20e5da7a24ba0a47ce2bf9c0d2ae28ac410,2024-02-14T13:59:35.580000
|
||||
CVE-2024-24691,0,0,87a55408e5efa0a4e3ce695995ae48834f0ce6baa0932acdc26c28bc7459ff4b,2024-02-14T13:59:35.580000
|
||||
CVE-2024-24692,0,0,96b263e11e7ffd264e5e6330a524d4e167d94ed5d670d61f6bb2c4bb8b02f370,2024-03-14T12:52:21.763000
|
||||
@ -241213,10 +241214,10 @@ CVE-2024-25650,0,0,86db7f9cd2961887ed39c6b63b2949a71fabae22076ac99000118f6e3ecf6
|
||||
CVE-2024-25651,0,0,4935c44deda83694ae7a33c550d78c8ec02d262dfb7e7f44dbd503c93d5109ae,2024-03-14T12:52:09.877000
|
||||
CVE-2024-25652,0,0,1684edbbe6a032e904cd3d9da8c2e3b5d162c7d94708a30170c5b1a8fdc4de06,2024-03-14T12:52:09.877000
|
||||
CVE-2024-25653,0,0,cf0ab93d3f68bfc65ae7a6e2836e0f599b295638c5107d23ca26fba04d235e4d,2024-03-14T12:52:09.877000
|
||||
CVE-2024-25654,0,0,35710c08ea200bd4ca2b82efb385ac91676dd06b2277b23e7a09b8ed95a4584b,2024-03-18T20:15:08.867000
|
||||
CVE-2024-25655,0,0,497fc247020860a0e989e692bda15bb5b3ff33013f9aabf95526ba6a8e9de845,2024-03-18T20:15:08.917000
|
||||
CVE-2024-25656,0,0,01e8acc1ac6c00734ec45f98e319356116f249999299312a9d5964c4ffcb44f5,2024-03-18T20:15:08.963000
|
||||
CVE-2024-25657,0,0,839da495267262cba64414cb3e5370e98a862beefccd35073ce4852490946cc8,2024-03-18T20:15:09.013000
|
||||
CVE-2024-25654,0,1,443dd6477f938280a9539712121cd8f0a140deb10e2592786f011bd3c7862757,2024-03-19T13:26:46
|
||||
CVE-2024-25655,0,1,cfd01f93e6b64ad7a955ed10b897e999b8082ff41ae6b578e5741fe51c904326,2024-03-19T13:26:46
|
||||
CVE-2024-25656,0,1,a1c4baf15e9e6266971ee38086755c707f6eecd60a5f0a598af59477f39b7282,2024-03-19T13:26:46
|
||||
CVE-2024-25657,0,1,2290acac0b1f2ee0f8a63996470c150f7d06e1f1d744f9a2687df3640958ea62,2024-03-19T13:26:46
|
||||
CVE-2024-2566,0,0,ed567a54762e476dd15dbc04cae8d4f21a5d4f74ce8fc49b33cd9ee0cd891b98,2024-03-17T22:38:29.433000
|
||||
CVE-2024-2567,0,0,ff763586eaeb9828f0f0be736b7098338446f0e0bca197b5ce3956cb1b2450d7,2024-03-17T22:38:29.433000
|
||||
CVE-2024-25674,0,0,880844ace2ad9fa6a214f1eff7f46e3beaded8f86ef202dfc09585e1e07ca21c,2024-02-12T14:30:40.343000
|
||||
@ -241337,7 +241338,7 @@ CVE-2024-25936,0,0,8effd82663b8db2d960ef33e023d14a22fda9a759a9ee34ebfd84341bfced
|
||||
CVE-2024-2594,0,0,62f22797cf1e847607c0f48ec8428fa7570128cbcbde2cadf780cc6697bdf9c5,2024-03-18T19:40:00.173000
|
||||
CVE-2024-25940,0,0,81faf8084be28ad3443bfad1349de788b40c215e318cb61e901b3079aac1c24e,2024-02-15T06:23:39.303000
|
||||
CVE-2024-25941,0,0,ca1cef65d30f17057b47421c2700ecf50e418e7bf4da35eb3fcc2989f17ef1eb,2024-02-15T06:23:39.303000
|
||||
CVE-2024-25942,0,0,413a4a699ee3a4d6da7a88c45eaf655b380d00f6d235170f5e5e5f636c182c38,2024-03-19T08:15:06.713000
|
||||
CVE-2024-25942,0,1,f61fbc9a4d226989af6c7dbccbce6eac1bf08e9ecba7753f027f3c66eedf16fc,2024-03-19T13:26:46
|
||||
CVE-2024-2595,0,0,2deb54d18ba7636df2c2b5e2f14f094eeefaa5b876ae68e9d3b6166f648310d6,2024-03-18T19:40:00.173000
|
||||
CVE-2024-25951,0,0,4cab9db546da1535e7f7aa83987aad28b8aa7aeb3328d636aa2cd78c27a2b2c1,2024-03-11T01:32:39.697000
|
||||
CVE-2024-2596,0,0,978865da9be9e1fb873a9c434a053f33d1f0c5219abdf12becebd1212242ea79,2024-03-18T19:40:00.173000
|
||||
@ -241384,20 +241385,20 @@ CVE-2024-26033,0,0,a62f89ca33c1301b3a8553ce4a902ac0986ba96609d90d7ba8159a4334ce3
|
||||
CVE-2024-26034,0,0,35110260ffd27f8b9039a8623f4cdd752639fac9afb8175ed15ab5f3af291bf5,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26035,0,0,959e3b7742979ce4ac183e1633741df1f331595110945682f4bb44401d1b75ec,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26038,0,0,4be9be259e1e9c3fa3225cc05b36a049686fb0adace908f95fb41412cb6e0bcb,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2604,0,0,3098a184d89606ed318da8f184dbdea962bbb0424dd4fb48dd052f7924ba78c2,2024-03-19T04:15:07.710000
|
||||
CVE-2024-2604,0,1,bd86f044c8fce4719bca38aa323c7d41eaf3e0ee0be5caf43a05936109c8aa60,2024-03-19T13:26:46
|
||||
CVE-2024-26040,0,0,b0ae3a36c80524fb04d890d078dcb86cbdb5b2e4d0d6158071755615a9b80c36,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26041,0,0,0799c5eeb4cb0b95b90068c43bb829bcbdbd6098bbf70f9d3eaf8431ea269ecb,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26042,0,0,927f70a352d7c944271929f8711b34e89bf0c26c9040985cbf997f7bb85f142c,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26043,0,0,77ce18daefee0fb24763d2de04c9f4ff1f3fc9c499267ef23cade7defef226a1,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26044,0,0,f556d4225ae31cf4a75b95323be404b6e96c152dafd030c24bdb1036f337da08,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26045,0,0,12a76916f2e3fabe11f0da4acd8c315d84502c254bb0159c5076b8a08d2bf1f8,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2605,1,1,5811c2b58ce546bf0c49dc0fbf1dce8b3c4eb5f9e17aaef658dcdcdc4734323e,2024-03-19T12:15:08.690000
|
||||
CVE-2024-2605,0,1,958f80d1e117b0d7676c48509b0d094be4eaedfa64fe217ab9e6ae20c579abf2,2024-03-19T13:26:46
|
||||
CVE-2024-26050,0,0,aef0a31966034fb7cad23737b141d0ec896d58774ba8eff9ccccd20d65bf9701,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26051,0,0,27f4a4cc55152422e98812c372f02a9a52ea0edc20866d873d003a2f46e2c392,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26052,0,0,4afe062ef50e3846cb25cfceaebb6f1cb55d0294a22d349f7d6dc8aa00db6a18,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26056,0,0,60712556392fbef8788174cb4444764b1e98f110de0c08a36a1c6d35b38a27f4,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26059,0,0,4c713ebfa874c9051e3b2fefbe42e45a5f50df79fbce0963b1f0497ba00efe5b,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2606,1,1,9ff42d2fc52c3bc81bc08c599167d0a35be9768ac3e3188167457c840c15b7c0,2024-03-19T12:15:08.740000
|
||||
CVE-2024-2606,0,1,76c29aea8872ebd78558e069d7a198fcad1091c3bf5cfefce91bb3a1d0f63472,2024-03-19T13:26:46
|
||||
CVE-2024-26061,0,0,e5d349ee86366a82d94cc4ffc66dadaca867fab96cb64cbab8974800307976f5,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26062,0,0,87ec57cf947d718a02d0ed767da86d3295cd5451b81149c31cd2bbba6395c4cb,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26063,0,0,1ba9efc90459d106edfffaf83d96a3b240f0673b88e00cd157d3f6e90cfb5a06,2024-03-18T19:40:00.173000
|
||||
@ -241405,14 +241406,14 @@ CVE-2024-26064,0,0,ff144dd493cab1ed761f56b7eed61318aa93a620b7f1f749119957a2f49a9
|
||||
CVE-2024-26065,0,0,f05434d986097dd89c414a15c420cdddc61d6433e66c11de1a1a2441f62c78a5,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26067,0,0,771feae423c61b47115f901b11f3c3dcf0abf651e532228608443b53ddaf898b,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26069,0,0,816c3bf702e981a32d8f2cbc8f4ffc747fd5bb2fd9e85087b9348ecbb0d6a22b,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2607,1,1,2a51d58380efb4b0abbeb30113b40ef6253ceca1431c6e4fa157343902b1fccd,2024-03-19T12:15:08.790000
|
||||
CVE-2024-2607,0,1,8416e61ed4039c56f8f167bad12a64573666f50072c46c347d9371b1e5a61324,2024-03-19T13:26:46
|
||||
CVE-2024-26073,0,0,6888cf6593fb4013d9ac96b5e0e04253a32891793ba0fc6b5d0f9bb6acf56fbf,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2608,1,1,265015116837e37458e64280395c041002aedf2a19b7256cf1fbfbcf6084e197,2024-03-19T12:15:08.843000
|
||||
CVE-2024-2608,0,1,385f2484bd620feb51a5fde0149022a647e386291085041e344a0e5965cec265,2024-03-19T13:26:46
|
||||
CVE-2024-26080,0,0,4c7f5e68dedcd9fba242c25344b93a9a82fec0775eb26628d32eb9d1bc78f44c,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2609,1,1,ab9ccaacfd11661e2827774717e08fca08dd1f13b7681e453ae2280448511152,2024-03-19T12:15:08.910000
|
||||
CVE-2024-2609,0,1,cc8825c211fc81d11ba8d4a686cc4e666f184437fb79cc71e4c781293d9d0cab,2024-03-19T13:26:46
|
||||
CVE-2024-26094,0,0,85e3ce7a818102789382308d4aee284348d003fd2b7cf5cdd2a80c2099ce4bab,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26096,0,0,7149acbb034794a59086aa3fa6e989a4571021a73871d6ede0203941e15d68d8,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2610,1,1,c2824264a0b7fa729f2018b8d31f48f12673d361a8beae7110486d68ec2187e4,2024-03-19T12:15:08.957000
|
||||
CVE-2024-2610,0,1,eb1d4ad7e50c19c4645c8dd2c646141a257c505b926818bbd7845cd09110b883,2024-03-19T13:26:46
|
||||
CVE-2024-26101,0,0,a99024df1b18b54a773096b0beb63b24fd79a9e9974023773ae59f2a37feed95,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26102,0,0,238e693f3e2d466bc8d2c153335d74273ddf22aee27378fc2288011848995267,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26103,0,0,d8456b4083613d4d8db27a085dde20a49ef73abb0168ef69a30fce12bb31e1c6,2024-03-18T19:40:00.173000
|
||||
@ -241420,16 +241421,16 @@ CVE-2024-26104,0,0,26fa5e620c52b2c3f13956dc7ddff142e7a4604a5ec9b5dd0aa8139e69f91
|
||||
CVE-2024-26105,0,0,11537b15eb4cc2020a0de2c2950a0ccff35f84e7097158552d59dda934784eba,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26106,0,0,1bcf517c10e9d03e04f36309423fea2ee998c751ee4d56005c66807def8df1c2,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26107,0,0,08a7d4a713d69f5e9264f33bf201cb0a984991aa907bf9c03d1e9d80640879b3,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2611,1,1,161fc729524d5c4c7e1cea9579661e2b0572b8abf0724e013fb128173f26f902,2024-03-19T12:15:09.007000
|
||||
CVE-2024-2611,0,1,39d597716843c2ea41256e1b23fa4cded226eefd5a110a1a42d84cda0c9d1815,2024-03-19T13:26:46
|
||||
CVE-2024-26118,0,0,7c64ac890dd2a49d6d942d5500b1240c8fe85648327d773fcda60ffa1a5badd7,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26119,0,0,d15b90520fefb7812fc1dd26c7161c951db5fa8c9a1a7a8a2878ce59a176d881,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2612,1,1,5436126de8edea12a1ddfdb3c820de0b5da83895b0cac3aa1025993b67aecb80,2024-03-19T12:15:09.063000
|
||||
CVE-2024-2612,0,1,7a264412c55645db8b723f7d770eed1fd5f159750493435f0da8ec388eb0c063,2024-03-19T13:26:46
|
||||
CVE-2024-26120,0,0,1657b6d18890514d9af3eeebc8c2352500124f93d0e64bb8ac66ddfc251885ca,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26124,0,0,82c27b96a9dc28b3e1fb2de7ffef79a19fe8428577dd4db99bfdfe3e5dd7dcb3,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26125,0,0,b8e9f2510a0a2d65e00221b700c4ebf67290c396472beeb55853dce893354627,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26128,0,0,487fd4a47ca7d01d688a4160da954eb7676a1080733cdfedc265ac6cf53a8666,2024-02-23T02:42:54.547000
|
||||
CVE-2024-26129,0,0,968e60f64e57be6f8f2df784210f5788e81353ced4a4f4353953a10484d71d0a,2024-02-20T19:50:53.960000
|
||||
CVE-2024-2613,1,1,09a2410e4a908ae17a48f75b6026fd314ec15c2f5a707e707d45947f3caac53e,2024-03-19T12:15:09.113000
|
||||
CVE-2024-2613,0,1,7b75bfa5f75ee65da0c00ba860f500b8a576e78673c7b386f18b6e3ba02232e8,2024-03-19T13:26:46
|
||||
CVE-2024-26130,0,0,a100f31d14662694d3f6ac3371aa0aa02486ee73cfbe5beddc735c4f540ce1d4,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26131,0,0,1fe68deeaaca58bb492ce63c50849cc8b6db7b3677668061d7c8d3bfdc8a7612,2024-02-29T13:49:29.390000
|
||||
CVE-2024-26132,0,0,efcbc1c03bc7ecd913f4cad008d19857c5246eca6426cc18f4f717c65825e8a0,2024-02-29T13:49:29.390000
|
||||
@ -241438,7 +241439,7 @@ CVE-2024-26134,0,0,c48fec61bdbea71825089d60ba10afed6847a83574a5b8775f63985c4fd7b
|
||||
CVE-2024-26135,0,0,59fe0ab8843c555cfe91a706ee16a0503bc6707525e2af12cfc8995ef8319782,2024-02-20T21:52:55.187000
|
||||
CVE-2024-26136,0,0,bc3bbfc3e7ddd7f5422807ceb3e66f18b225baf2ed7e74657a084b480c15c1ff,2024-02-22T19:07:37.840000
|
||||
CVE-2024-26138,0,0,4d4da9f47e13e4c424c52e5eff6306f34e02033e2d2c801866f22decefe9c2c2,2024-02-22T19:07:27.197000
|
||||
CVE-2024-2614,1,1,d6a3ef07a512fa4deeabdae9e4baad12c27d9b864bda179f5d8eeff8439a6acc,2024-03-19T12:15:09.160000
|
||||
CVE-2024-2614,0,1,17a4197d3ae25a1e7f6088740634e33e5e0c6071de890ec2796f08684856a0e4,2024-03-19T13:26:46
|
||||
CVE-2024-26140,0,0,6de2d0c9ebf70d5d176c18f61310d4c12ab2f9c1ae885cf141ebe9307850ffc6,2024-02-22T19:07:37.840000
|
||||
CVE-2024-26141,0,0,9df246c55a4395e8557802daf50823ee55f3169dd101c749aaebaef21dae00c2,2024-02-29T13:49:47.277000
|
||||
CVE-2024-26142,0,0,edb6243c44774fbfc22b55927ba153d435243b85e5fd0fb08002baf86f2fdeda,2024-02-28T14:07:00.563000
|
||||
@ -241449,12 +241450,12 @@ CVE-2024-26146,0,0,bd024c90d4aeed8e0a6d50c3aa07c3200c9424641413cfb8168503eefdab2
|
||||
CVE-2024-26147,0,0,13addf1c8834f3ea67c55cec0f4c0eb059c8c47b1e8094df62594b8de41f2fde,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26148,0,0,05337c7b03b0d1ad121194c9ea9b96c7e58591b109aa2163af845b513f2c72fe,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26149,0,0,518a6e749fa42da9b701c9605e92313b609e16a6573a8caa383f380b0cdfc77a,2024-02-26T22:10:40.463000
|
||||
CVE-2024-2615,1,1,06ff763470f86e8717af3f3d8547f9cc00284b1673a49d507c12215ad9268687,2024-03-19T12:15:09.210000
|
||||
CVE-2024-2615,0,1,2897f6bf2cf0e0fde3a356dae0c568e7f9829899166c83f28dea26b5d8278178,2024-03-19T13:26:46
|
||||
CVE-2024-26150,0,0,8ea3c18b0fb78100fc3632066a5c3403e90a7daa780b43e6f9240c2ed9fee7b2,2024-02-23T19:31:25.817000
|
||||
CVE-2024-26151,0,0,23d71c73b4a2821ea019a978d698b1910ca82d8c9eb2d93a0500cf52583cbf84,2024-02-23T02:42:54.547000
|
||||
CVE-2024-26152,0,0,7e68ad422883506103ec46c3174c4872da8a983d075ae50a3e01c580804f4253,2024-02-23T02:42:54.547000
|
||||
CVE-2024-26159,0,0,8db8f42d5662b161251586cebfdfad3ac7119bf59dcefc0ce4412d5330cc45ab,2024-03-12T17:46:17.273000
|
||||
CVE-2024-2616,1,1,8126975d85b4cb7a7a7fb49ad4920bfe7c96700c000dd06a81157986baefc930,2024-03-19T12:15:09.260000
|
||||
CVE-2024-2616,0,1,f32289c10acf879cc140d4f8bf90ac1f01af6caffd8a046c694371fba7665709,2024-03-19T13:26:46
|
||||
CVE-2024-26160,0,0,fa9ab77966a6520f6fd48a75b259529e6a68bdc5f72bc11ac282a7c57a6be71f,2024-03-12T17:46:17.273000
|
||||
CVE-2024-26161,0,0,179c500caa38708835a1de408543085e57586fd097d7453a1bf1888d48f494e3,2024-03-12T17:46:17.273000
|
||||
CVE-2024-26162,0,0,abe9736aa1712017432f5ac3cb4f9e06d55b8e6b2899e4fcc1a691ec906deb0c,2024-03-12T17:46:17.273000
|
||||
@ -241479,12 +241480,12 @@ CVE-2024-26192,0,0,f07a970bc2ded04c67022b6088a41fc6fe2d91cb2c4bf591834efc750edce
|
||||
CVE-2024-26197,0,0,64e0c17fa38e1ddfc329353df89f21d18efef0c61b013b6ab2347be0a8ccca2a,2024-03-12T17:46:17.273000
|
||||
CVE-2024-26198,0,0,32e84a6f8e7edbd83cbbaa8eaa2f2ea438e29fa92c2f41a41b8ec3df15ab3010,2024-03-12T17:46:17.273000
|
||||
CVE-2024-26199,0,0,c783249e58f7a34cdbc3a4a74bdf378194f69958b248f8c80379c0377a914ecc,2024-03-12T17:46:17.273000
|
||||
CVE-2024-2620,0,0,9e2c22a4547ee52c9c7b636172f47adb2d628fbc07e353913323de7e5bce806e,2024-03-19T01:15:44.953000
|
||||
CVE-2024-2620,0,1,f3255920b306bafdd1da523932f66e80191cf904c394babc03c34cf8585a75de,2024-03-19T13:26:46
|
||||
CVE-2024-26201,0,0,117ccddc353ed4894703f364acf785dd6a24217537e061ef980d1ca56918f180,2024-03-12T17:46:17.273000
|
||||
CVE-2024-26203,0,0,6110281b9eda03c7d5a8219ec3a2aff67cf54ad90870a79c096fe875f28ea385,2024-03-12T17:46:17.273000
|
||||
CVE-2024-26204,0,0,413dd43bdbc47045478482b7d3349e3e66b0c3197ca627e0b5f71ae7053c6d3e,2024-03-12T17:46:17.273000
|
||||
CVE-2024-2621,0,0,2c3b85eedaa5fc5ccd73005916083945efc6d4132dd877cc5358ea4becf7bd75,2024-03-19T01:15:45.180000
|
||||
CVE-2024-2622,0,0,49023cc1d3e819b804476583244ce52eff617b639e0324317ae5ef2978255077,2024-03-19T02:15:05.980000
|
||||
CVE-2024-2621,0,1,4dcded8ed0d3843e38f2a0cf238c6407bad583439af1967a363eb87cd9f1f21f,2024-03-19T13:26:46
|
||||
CVE-2024-2622,0,1,8db0807f3ae933828e2ab3a3d5361557ce81ed24a952a466b650718c3cebc2bc,2024-03-19T13:26:46
|
||||
CVE-2024-26246,0,0,229a0d6478eae87edf8816e00563b02e82089fc0fc04e0e1cf7f1270429d5b96,2024-03-15T12:53:06.423000
|
||||
CVE-2024-26260,0,0,e265a50d624e832bed578eaaf671225475ee52a0a641253d8d3fa4cc960d0968,2024-02-15T06:23:39.303000
|
||||
CVE-2024-26261,0,0,0e54368aae0104b528b2c2b10aa27bd070162dbc45df6e809e95785e5efd10d2,2024-02-15T06:23:39.303000
|
||||
@ -241519,23 +241520,24 @@ CVE-2024-26310,0,0,cdf3231f7a059b92520dd591ab7449fe300f81e89c81c63cb479e44416fa6
|
||||
CVE-2024-26311,0,0,c10525456294b75c6b4919ba396921719972a7cc08a82934dcff79f6c0deabee,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26313,0,0,307927a31aa9525f579ecee601093796b34c0481bc031cf5fc7cd7d3e73f1218,2024-03-08T14:02:57.420000
|
||||
CVE-2024-26318,0,0,5a8434e81e693bc0f90a66d9a6d8655df17a4e5f3f1f4a63075d970f5e64fed9,2024-02-20T19:50:53.960000
|
||||
CVE-2024-2632,1,1,e58563df22e3d97655720bc6889c7505eb99503ec7bfd5ec4b415994d426fd60,2024-03-19T12:15:09.307000
|
||||
CVE-2024-2632,0,1,dff03ec7e37c98d35abb19e9a26176b2a30cc69fb976e671042e229e7e80975b,2024-03-19T13:26:46
|
||||
CVE-2024-26327,0,0,ed8d19077e03f59789fd57e15d79ebd6fa2e85738782585f472f97265da3d970,2024-02-20T19:50:53.960000
|
||||
CVE-2024-26328,0,0,483204e568c37ddd385ae6419587f3cba8922820a5f3e4626565041a8ff87314,2024-02-20T19:50:53.960000
|
||||
CVE-2024-2633,1,1,6434744162cbeb882ce57c72de5c0b3cd92363ae9edc6a42446efe9c5667361e,2024-03-19T12:15:09.530000
|
||||
CVE-2024-2633,0,1,9b3bfe968c9927c18d46eb1544ff4bf163f939e52bc81c05627839ed0f9dfa66,2024-03-19T13:26:46
|
||||
CVE-2024-26333,0,0,694ee07e9a9eebd54e976b1efdfcd9c1e5579c307624f1b176728a9b5ec66620,2024-03-05T13:41:01.900000
|
||||
CVE-2024-26334,0,0,a2c81f8955be04bed36d435c0180176ac51a579e96e04b4d72eb87b607366d07,2024-03-05T13:41:01.900000
|
||||
CVE-2024-26335,0,0,b13dcfefb7d44684fbd7bca27c28b61eaa6fdca68532cea06942a84065f07fea,2024-03-05T13:41:01.900000
|
||||
CVE-2024-26337,0,0,3a4c73678ac95a037d1d40acba24ef87be9086770b788876de82a51522b533c6,2024-03-05T13:41:01.900000
|
||||
CVE-2024-26339,0,0,7eb4f269852f486a1ab2b0d193aa159613957884ae1cd1b107a1c58ebf743408,2024-03-05T13:41:01.900000
|
||||
CVE-2024-2634,1,1,44624de763c6269a817a3b532a5bc58740e20dcc28154e4e1394f06b4cb8da17,2024-03-19T12:15:09.773000
|
||||
CVE-2024-2634,0,1,c2ba4e4d789da020d771d583193bd1c9d084479a499143c527cb4bd3c4e49f79,2024-03-19T13:26:46
|
||||
CVE-2024-26342,0,0,872e5b33eb7a5e55045de887e3aa3885f68eb96ab7b6c872c9c6b04465e64391,2024-02-29T13:49:47.277000
|
||||
CVE-2024-26349,0,0,01186c28ef719dd0149527c4abd8d67b60279349307693d6719ba1d7ab32ddce,2024-02-22T19:07:27.197000
|
||||
CVE-2024-2635,1,1,75845e77e5ff781129814c7f5910ce2b4cbe828aa358218b6ea6f6fd62509504,2024-03-19T12:15:09.993000
|
||||
CVE-2024-2635,0,1,4f51e798709dd6e7c4bb5415d9b67d3ce36b987f481f4828b362f22e681e964c,2024-03-19T13:26:46
|
||||
CVE-2024-26350,0,0,1f62ec8cd425e84b1282a5e55493461489796820c50a425af585677fa2bae43e,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26351,0,0,61b98d66760f09ba8a0757ca890b9ad836349a62d566c880c0eb8336d14dbb04,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26352,0,0,ed876b320273da7c752d57a08640f2d98ce80b026324bdf46d0712ec0097ce54,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26369,0,0,bbf7f56a04a37dfe1f3ccce0f59653fe19675329bafc0dad09256de06ce153d2,2024-03-19T06:15:06.267000
|
||||
CVE-2024-2636,1,1,fb8e3d7e526592be8c8915751ac3074f1926eca740e68019146af8c375a9c754,2024-03-19T13:26:46
|
||||
CVE-2024-26369,0,1,b0322db94f9b89a2da31dd1ffa70ef568f3b1c4901ca044ba9c0ea1e2eb29c09,2024-03-19T13:26:46
|
||||
CVE-2024-26445,0,0,3735cabd04dab3a1baa3e135ef467df65425520025be25bd7cf66dc1b1b0bf61,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26450,0,0,e70e1c7044e1447bb73bfa4a556135e1953f1916a7225089ba5c38735bf8ee34,2024-03-09T08:15:06.120000
|
||||
CVE-2024-26454,0,0,bae0c35b4dfcdbee5c6f4167647fab36cadeab218796adaaf17826bd73693c56,2024-03-15T12:53:06.423000
|
||||
@ -241730,7 +241732,7 @@ CVE-2024-27354,0,0,3316a11ae03e51007e09710a76a22632e619f5d31d833e6569bcace78ce3c
|
||||
CVE-2024-27355,0,0,0b9031e2eb548ad12d2d9e0065d270364951139eb9b910f1e5678f52ec43857a,2024-03-04T13:58:23.447000
|
||||
CVE-2024-27356,0,0,2464f4bdc7cd759969915038df7055199f0bd02c6d9b1a8ceb85c7588507e9ba,2024-02-27T14:20:06.637000
|
||||
CVE-2024-27359,0,0,45c452c4a5013555c154282328f794ae0e5bd9c68f52a53f3747792eec7b2661,2024-02-26T16:32:25.577000
|
||||
CVE-2024-27439,1,1,e6f57a14fb97cb51d4de95859548ccf9f7adfd2c4d52695146e9929ca36f2fc9,2024-03-19T11:15:06.537000
|
||||
CVE-2024-27439,0,1,6cfc291dd017dff23e77d405e142bbdceb3893686b1e0edaa8bb0d491f944e19,2024-03-19T13:26:46
|
||||
CVE-2024-27440,0,0,f656cf3f867b554b4acbc17eee670f16835e4e41b3c8da203b1b487ef7d6f2b3,2024-03-13T12:33:51.697000
|
||||
CVE-2024-27441,0,0,e840685b8600bbca2bd5265ffc2375dd0e1834727afca845fa72402578217a21,2024-03-13T15:15:52.083000
|
||||
CVE-2024-27444,0,0,a237f36c45a82911cb697384887c7b89bc1c2ea038ffd45f33470a0acaad42ea,2024-02-26T16:32:25.577000
|
||||
@ -241897,13 +241899,13 @@ CVE-2024-28228,0,0,fafeac90b4103ecc037c0d15d4376f652ba43048a680a73a3c13807568e40
|
||||
CVE-2024-28229,0,0,7bfc3b59e790a5126732ec4d8d480f9938166a41475488b32e066c1e064ccb9f,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28230,0,0,3036aa70102b53b9cc695265dc4a11e5a4f5b8d26f6120835dbd1a9c3d93e7ec,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28236,0,0,ea7d34bffb060eb0191757ceb4c446ee8bfa4166cb7d1e0d8e67e75c651ba966,2024-03-13T12:33:51.697000
|
||||
CVE-2024-28237,0,0,165d9cf1ec5128c017ccfcfad24257fbf5c50f8d35ff06dfb0c2a6f99950b604,2024-03-18T22:15:07.980000
|
||||
CVE-2024-28237,0,1,e54564ebce9f53fbf47a1a617d4c2539d1d06a16522000543afac14f934cf25f,2024-03-19T13:26:46
|
||||
CVE-2024-28238,0,0,38219e010007b7fe5426826144cd2eabd2e22d36d31c50aa8471901674b524b3,2024-03-13T12:33:51.697000
|
||||
CVE-2024-28239,0,0,faccbe471f1ae24e1ff85c8426d7d0f8447bb8e496567a24af19b5962ca5e940,2024-03-13T12:33:51.697000
|
||||
CVE-2024-28242,0,0,9b0e39431cf5407ac797c89bdeeecca7ea971387c91b8e8005c08f8a0179928d,2024-03-17T22:38:29.433000
|
||||
CVE-2024-28248,0,0,c2f2cb7b7cbc373c30bed42db8bbe162ec996964e97787c98de12dcea8f61b7e,2024-03-18T22:15:08.220000
|
||||
CVE-2024-28249,0,0,8f582ddb420947ff7b325f4610190a61dd6031b0b867856d025e02310109e3a3,2024-03-18T22:15:08.503000
|
||||
CVE-2024-28250,0,0,776b0128fa0660667a815ac4ea35a99b4578d9475d79e05db8d33dff98528376,2024-03-18T22:15:08.750000
|
||||
CVE-2024-28248,0,1,b617812c524b85d27f2a46b3a739648463fa9ffb5a6e46ea47ba0c68bd3fa409,2024-03-19T13:26:46
|
||||
CVE-2024-28249,0,1,7f01b3731d6ed3594265964b9061da88eb89dfe99b6d59bfec8413859c3ac454,2024-03-19T13:26:46
|
||||
CVE-2024-28250,0,1,dacc68b6e843dc808e1d498d69054a425a6f10e258af235d9a1256f74372900d,2024-03-19T13:26:46
|
||||
CVE-2024-28251,0,0,19fc23d56f5d00fa3c69d993b0deb280b2d4a1df9b73eb3d828c9ec8b6104ec4,2024-03-14T12:52:16.723000
|
||||
CVE-2024-28252,0,0,ac84484303fc0c017048b9d298c82aac04da864eaa9b564555df184d62c4afa2,2024-03-17T22:38:29.433000
|
||||
CVE-2024-28253,0,0,b0d1b906324ecf48e7bcfd3c9d0c313a69a8c6ff9baa313b92164ce1f64f0b92,2024-03-17T22:38:29.433000
|
||||
@ -241933,8 +241935,8 @@ CVE-2024-28429,0,0,caaa64487b84149266e9e941a72e13f93e6070c94b1fe7355fb56db4eb5b2
|
||||
CVE-2024-28430,0,0,bf34fb49e742ebf9176808c1e05b7467ed1662a29a5c18afe29f976454928e37,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28431,0,0,148c6be422e12f315897bdd57f5208c74e8137e452c7019eafe29f97f527c418,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28432,0,0,4bc8c3df18623e8712ef966fb24c80f6754436b2eb6a0c14d5d3c56f5a161090,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28446,0,0,8a9199274a5a035e1881ec7fd714011fa6cb19f218db9ccd8c619f1bace2e3d1,2024-03-19T06:15:07.547000
|
||||
CVE-2024-28447,0,0,0380c907287ee8a708bc6550562550ab516ab4c431a794e3e88a4816cc06fdcb,2024-03-19T06:15:07.697000
|
||||
CVE-2024-28446,0,1,e3b0d814ee24ce9a2740eda808696f714c3071d6722fa7bd76f62923d12a194d,2024-03-19T13:26:46
|
||||
CVE-2024-28447,0,1,729795bf39bd106c71b5b798b10fa8f526cc5d6a6eb2785b0edfa8459a535a4c,2024-03-19T13:26:46
|
||||
CVE-2024-28535,0,0,05b59fc574e3ec1a67ffae1023c5999e94849ce19d6ee2f539dda71a994d8b6c,2024-03-12T16:02:33.900000
|
||||
CVE-2024-28537,0,0,ff6bf2a37289dca28bccb57e311acb6479e1a577841d298af6b3b484403dfc2c,2024-03-18T19:40:00.173000
|
||||
CVE-2024-28547,0,0,a2de8a258b087cbf7c5442c921d96afce5895db417e9c628fe7656334d2bb7cc,2024-03-18T19:40:00.173000
|
||||
@ -241963,6 +241965,7 @@ CVE-2024-28681,0,0,ed8a4fd064b6b3346412990e6226cbe04bee8a6bd2aaad4671fdcd0478ce5
|
||||
CVE-2024-28682,0,0,2c53ed716809a76ded005fd10ac6d93891dbf2dd9f02238c66f1445af60cb8e7,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28683,0,0,14fce1fb8fe5dd3fb68153125dd387047f48de59cd587ce41acfe8b0e8fa04c2,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28684,0,0,df89c702874c46527da5dc5bf33ec252c05a69f53466623f5ca04f0566a6cd25,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28734,1,1,bb594e0a4ca8bb02d549585c26850af992a8eb906f708b8c0205bd91934fdfb1,2024-03-19T14:31:27.883000
|
||||
CVE-2024-28745,0,0,15394cfaddabd1c5537f1c3a0b8bc4d088d58358d421e9d9475a38fad6a5e44f,2024-03-18T12:38:25.490000
|
||||
CVE-2024-28746,0,0,4e08f19b517756fb15fbaf966494c1aeec3b9803b4e2b615b4d5a557eb48c84a,2024-03-14T12:52:09.877000
|
||||
CVE-2024-28752,0,0,b6856abb589c0fed02798f341901c4f3025e287fced11706e9fa0c89b392cd6a,2024-03-15T12:53:06.423000
|
||||
@ -241976,11 +241979,25 @@ CVE-2024-28848,0,0,d27a55fc8b3eea5068b0edc9f739a1262c5b3ba173e1bce8f8f28fb698ae0
|
||||
CVE-2024-28849,0,0,3fd4e14c66f66b904cf6ec0b520762c4afbd3156d6cd6b7fed8cfe38b4a83639,2024-03-14T18:11:35.910000
|
||||
CVE-2024-28851,0,0,f15187ac52243f1288d6dabed456ab5bd2287b2db60c97a538d0582f4f0ba12d,2024-03-17T22:38:29.433000
|
||||
CVE-2024-28854,0,0,8cb03aded6b194ffbf5e93b6a999bfbf01ac8f736343c4fc752b0e38a8bc9f90,2024-03-17T22:38:29.433000
|
||||
CVE-2024-28855,0,0,da1692d55c8277ff7b15a2f9dc2ea3af441190aa6ea58c805960c23feea31427,2024-03-18T22:15:08.963000
|
||||
CVE-2024-28855,0,1,2384a3330fde47f752f152bfa13a6226cb6b236bb18ff2466f5e886c7d3e893c,2024-03-19T13:26:46
|
||||
CVE-2024-28859,0,0,2d0407c7b83f2786a493b842ae3fe3ce3f906494adee8b0e0f61c75557fcb17c,2024-03-17T22:38:29.433000
|
||||
CVE-2024-28862,0,0,b0dc40150b0e5f15633ecb26c2614b37fe6eefbb423911349887989b36d78640,2024-03-17T22:38:29.433000
|
||||
CVE-2024-28864,0,0,8ecac72c8ce0b8666fe83d04998b15e9e25eb89afbb3c7e7b043572caf392104,2024-03-18T22:15:09.247000
|
||||
CVE-2024-28865,0,0,31587421e86ac661628ab3ed621ea8c833f3a082ce70dc79d0cfa2346ddc78e8,2024-03-18T22:15:09.510000
|
||||
CVE-2024-28864,0,1,6556868d08f3b43cf56ee8c0e31629a1275e8137bc2387bf2430488f9854bd36,2024-03-19T13:26:46
|
||||
CVE-2024-28865,0,1,346bb195552b29118071ab302fbe331daaaa3a5da7b31ab976886613f922d084,2024-03-19T13:26:46
|
||||
CVE-2024-29127,1,1,a7c9182d8dfd24bac53ccd20d210e1f2758d351147e41e77e221fc6a34e529f7,2024-03-19T14:31:27.883000
|
||||
CVE-2024-29128,1,1,61da0a32d080f7c6c3936b5f22919d05a96c2e77b99426b59efd6aa54d86caad,2024-03-19T14:31:27.883000
|
||||
CVE-2024-29129,1,1,c4685d475a32c1bf5d503bdc1836946845ebcc6d68390349a0ecc6d0d543792f,2024-03-19T14:31:27.883000
|
||||
CVE-2024-29130,1,1,8c36569935eec7ee1fa923a6f5af71be7c9875c1eb1a445fbebbed1c601bb9d5,2024-03-19T14:31:27.883000
|
||||
CVE-2024-29134,1,1,67e38de1ed25c9915c1356ac1bec7b021f7e9f0cf40a7ff2dda736023daa142b,2024-03-19T14:31:27.883000
|
||||
CVE-2024-29135,1,1,10277b39d09d85bbcf9cda4bd50ce89bb55c19db898b8be268aa5acfb65da1ea,2024-03-19T14:31:27.883000
|
||||
CVE-2024-29136,1,1,c9aaae06815bfa252a5fabe71ba691fbb72d22213b7ac7a3a9ee833f7a351a78,2024-03-19T14:31:27.883000
|
||||
CVE-2024-29137,1,1,a8ae2ac54ecca5501e76f1ba0a3ab7da323337ca76cb11d647c87969de540d29,2024-03-19T14:31:27.883000
|
||||
CVE-2024-29138,1,1,13a5f3e4a15aa7575e0cee2e35e75677f3088378b59ebb53b1201a50ceb758fb,2024-03-19T14:31:27.883000
|
||||
CVE-2024-29139,1,1,bdad396a3e59207c19c5dd195086927af19b346005fc62bace942c4cd8946de7,2024-03-19T14:31:27.883000
|
||||
CVE-2024-29140,1,1,81b0188b02ec97eea25ba71e207c764caac64152b7cc837d2aa82b57919f9b47,2024-03-19T14:31:27.883000
|
||||
CVE-2024-29141,1,1,0c36d86235af1b05ffdd671977b0a9f1efad4a89eb52195bc0218075263f9454,2024-03-19T14:31:27.883000
|
||||
CVE-2024-29142,1,1,aa64581089439270488fd3ec7318d50f51fe018a933a4c7619fcc03f33e8f61b,2024-03-19T14:31:27.883000
|
||||
CVE-2024-29143,1,1,a3f92e2c9ae6aaf4168f841be16c13a544cace199faa049656661980aa53e607,2024-03-19T13:26:46
|
||||
CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24c8f,2024-03-18T12:38:25.490000
|
||||
CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000
|
||||
CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user