mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2024-04-12T12:00:39.971702+00:00
This commit is contained in:
parent
da86b872f5
commit
7fe458c6be
47
CVE-2024/CVE-2024-30xx/CVE-2024-3054.json
Normal file
47
CVE-2024/CVE-2024-30xx/CVE-2024-3054.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-3054",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-12T10:15:08.670",
|
||||
"lastModified": "2024-04-12T10:15:08.670",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WPvivid Backup & Migration Plugin for WordPress is vulnerable to PHAR Deserialization in all versions up to, and including, 0.9.99 via deserialization of untrusted input at the wpvividstg_get_custom_exclude_path_free action. This is due to the plugin not providing sufficient path validation on the tree_node[node][id] parameter. This makes it possible for authenticated attackers, with admin-level access and above, to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3067224%40wpvivid-backuprestore&new=3067224%40wpvivid-backuprestore&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bf26fc68-9fd4-4e4e-b34f-c947d95891f9?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-313xx/CVE-2024-31371.json
Normal file
55
CVE-2024/CVE-2024-313xx/CVE-2024-31371.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31371",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-12T10:15:07.473",
|
||||
"lastModified": "2024-04-12T10:15:07.473",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Xylus Themes WP Event Aggregator.This issue affects WP Event Aggregator: from n/a through 1.7.6.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-event-aggregator/wordpress-wp-event-aggregator-plugin-1-7-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-313xx/CVE-2024-31372.json
Normal file
55
CVE-2024/CVE-2024-313xx/CVE-2024-31372.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31372",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-12T10:15:08.327",
|
||||
"lastModified": "2024-04-12T10:15:08.327",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Arnan de Gans No-Bot Registration.This issue affects No-Bot Registration: from n/a through 1.9.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/no-bot-registration/wordpress-no-bot-registration-plugin-1-9-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-32xx/CVE-2024-3211.json
Normal file
47
CVE-2024/CVE-2024-32xx/CVE-2024-3211.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-3211",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-12T10:15:08.840",
|
||||
"lastModified": "2024-04-12T10:15:08.840",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Shopping Cart & eCommerce Store plugin for WordPress is vulnerable to SQL Injection via the 'productid' attribute of the ec_addtocart shortcode in all versions up to, and including, 5.6.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3068711/wp-easycart/trunk/wpeasycart.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/576ca901-45e2-4e6d-9bc4-370bf1f68077?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
31
README.md
31
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-12T10:00:38.646340+00:00
|
||||
2024-04-12T12:00:39.971702+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-12T09:15:10.783000+00:00
|
||||
2024-04-12T10:15:08.840000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,36 +33,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
245294
|
||||
245298
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2024-3400](CVE-2024/CVE-2024-34xx/CVE-2024-3400.json) (`2024-04-12T08:15:06.230`)
|
||||
- [CVE-2024-3054](CVE-2024/CVE-2024-30xx/CVE-2024-3054.json) (`2024-04-12T10:15:08.670`)
|
||||
- [CVE-2024-31371](CVE-2024/CVE-2024-313xx/CVE-2024-31371.json) (`2024-04-12T10:15:07.473`)
|
||||
- [CVE-2024-31372](CVE-2024/CVE-2024-313xx/CVE-2024-31372.json) (`2024-04-12T10:15:08.327`)
|
||||
- [CVE-2024-3211](CVE-2024/CVE-2024-32xx/CVE-2024-3211.json) (`2024-04-12T10:15:08.840`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `16`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2023-28547](CVE-2023/CVE-2023-285xx/CVE-2023-28547.json) (`2024-04-12T09:15:08.583`)
|
||||
- [CVE-2023-33023](CVE-2023/CVE-2023-330xx/CVE-2023-33023.json) (`2024-04-12T09:15:08.740`)
|
||||
- [CVE-2023-33099](CVE-2023/CVE-2023-330xx/CVE-2023-33099.json) (`2024-04-12T09:15:09.120`)
|
||||
- [CVE-2023-33100](CVE-2023/CVE-2023-331xx/CVE-2023-33100.json) (`2024-04-12T09:15:09.280`)
|
||||
- [CVE-2023-33101](CVE-2023/CVE-2023-331xx/CVE-2023-33101.json) (`2024-04-12T09:15:09.390`)
|
||||
- [CVE-2023-33111](CVE-2023/CVE-2023-331xx/CVE-2023-33111.json) (`2024-04-12T09:15:09.510`)
|
||||
- [CVE-2023-33115](CVE-2023/CVE-2023-331xx/CVE-2023-33115.json) (`2024-04-12T09:15:09.623`)
|
||||
- [CVE-2023-43515](CVE-2023/CVE-2023-435xx/CVE-2023-43515.json) (`2024-04-12T09:15:09.743`)
|
||||
- [CVE-2024-21452](CVE-2024/CVE-2024-214xx/CVE-2024-21452.json) (`2024-04-12T09:15:09.877`)
|
||||
- [CVE-2024-21453](CVE-2024/CVE-2024-214xx/CVE-2024-21453.json) (`2024-04-12T09:15:09.977`)
|
||||
- [CVE-2024-21454](CVE-2024/CVE-2024-214xx/CVE-2024-21454.json) (`2024-04-12T09:15:10.083`)
|
||||
- [CVE-2024-21463](CVE-2024/CVE-2024-214xx/CVE-2024-21463.json) (`2024-04-12T09:15:10.193`)
|
||||
- [CVE-2024-21468](CVE-2024/CVE-2024-214xx/CVE-2024-21468.json) (`2024-04-12T09:15:10.303`)
|
||||
- [CVE-2024-21470](CVE-2024/CVE-2024-214xx/CVE-2024-21470.json) (`2024-04-12T09:15:10.433`)
|
||||
- [CVE-2024-21472](CVE-2024/CVE-2024-214xx/CVE-2024-21472.json) (`2024-04-12T09:15:10.623`)
|
||||
- [CVE-2024-21473](CVE-2024/CVE-2024-214xx/CVE-2024-21473.json) (`2024-04-12T09:15:10.783`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
38
_state.csv
38
_state.csv
@ -220378,7 +220378,7 @@ CVE-2023-28543,0,0,72923968fb58f7d93b08c9388fb3cd6b26cf750253768741122f271098671
|
||||
CVE-2023-28544,0,0,5d0584dd224ef1189b34911bc79e1be487f444efbc1b7e64a8c32c274f47324a,2023-09-11T17:08:00.573000
|
||||
CVE-2023-28545,0,0,40a76029c861636682ef7ae4415286554c5dc5d1d415be0be9a6356a5ebdaf77,2023-11-14T18:21:09.870000
|
||||
CVE-2023-28546,0,0,ad8c28921a0e29e9b00929b11bb24a5388c6d1ce1e1e67637f3eca6f98e16180,2023-12-11T13:53:48.177000
|
||||
CVE-2023-28547,0,1,22a05a863516330e9528fe63848355d451e2945068a37757d59c2cc46d2cfe3c,2024-04-12T09:15:08.583000
|
||||
CVE-2023-28547,0,0,22a05a863516330e9528fe63848355d451e2945068a37757d59c2cc46d2cfe3c,2024-04-12T09:15:08.583000
|
||||
CVE-2023-28548,0,0,f7c65cf4601fd278066a8df4b8fe1480d31811bc1d91aaef6f8cd5c349beb4e3,2023-09-11T17:05:04.900000
|
||||
CVE-2023-28549,0,0,104748ea20a39c69181d62c49c65b6f63168cecd1707c0e987c1a9d810449073,2023-09-11T16:58:23.583000
|
||||
CVE-2023-2855,0,0,c986b97ae97c10f4cd8e8e1aaf7af701e5f468795353062853415fd1eb066a1e,2023-10-20T18:02:30.760000
|
||||
@ -223703,7 +223703,7 @@ CVE-2023-3302,0,0,132b05922db0a78b39d95bf528d6259026355fb54b82fd95048a5315abcfa5
|
||||
CVE-2023-33020,0,0,b3a2be6ffe54498647bd663d93aa19d3bcbf24036b1e38dc4b1db628212b85eb,2023-09-08T16:46:27.047000
|
||||
CVE-2023-33021,0,0,a2a491f10962a0cb0dcf6895ca2eb70aafcbb3f7f8375f8edcdeff20126240fa,2023-09-08T16:47:15.713000
|
||||
CVE-2023-33022,0,0,33b34cf51e731a9fd79e2deb6a9fbd02e01fb5734254466bc9e5413ae7f23fd4,2023-12-11T17:50:30.010000
|
||||
CVE-2023-33023,0,1,12e6899cd63837b2e22c7f9ee87e0653fe0311a0d2d94f5f303fdec8c58b54f9,2024-04-12T09:15:08.740000
|
||||
CVE-2023-33023,0,0,12e6899cd63837b2e22c7f9ee87e0653fe0311a0d2d94f5f303fdec8c58b54f9,2024-04-12T09:15:08.740000
|
||||
CVE-2023-33024,0,0,15f885c6a95d4cb7eb5d81035f07c216e079b3bd9db19e813115c92e8d7867b2,2023-12-11T17:51:28.897000
|
||||
CVE-2023-33025,0,0,5a8013edd285230cdbaa919ed23f99d49124480201f3e9ee677fa7aa3300efc3,2024-01-08T18:40:01.160000
|
||||
CVE-2023-33026,0,0,f247ad38f150bd63974dad2a35279f20f1722e7ce7a20457c3802722e5233a50,2023-10-04T19:54:35.327000
|
||||
@ -223779,10 +223779,10 @@ CVE-2023-33095,0,0,2214ee1b141855229ade7fbd0544f2ed4ca54dfc88ff915caff24b908bdd1
|
||||
CVE-2023-33096,0,0,a623ca54747357d4e5b0a69169fa8accba4bb220df6eb22a472abad219466ed8,2024-03-04T13:58:23.447000
|
||||
CVE-2023-33097,0,0,037a1827184e21a02a9696384ac1072eb39d283834fc14cf9eebe9a7373ca15b,2023-12-11T15:09:50.730000
|
||||
CVE-2023-33098,0,0,4d1ca086431b7132ae85883effb66b33741b65e5b2bff6da8b6fd7972cda5b5b,2023-12-11T15:09:02.400000
|
||||
CVE-2023-33099,0,1,284fb317fe394a992f0ebf58998018925ee3d3dea1ac3751f62f455ea3f3f51b,2024-04-12T09:15:09.120000
|
||||
CVE-2023-33099,0,0,284fb317fe394a992f0ebf58998018925ee3d3dea1ac3751f62f455ea3f3f51b,2024-04-12T09:15:09.120000
|
||||
CVE-2023-3310,0,0,c9dd4d7e06895d36e1eb8dc7e64b2748e0d551866b9c52e8460b7cb60521390d,2024-04-11T01:21:08.507000
|
||||
CVE-2023-33100,0,1,ad43aa3eb40c7a870dbb71415be51e5182dfb0081b7b951dca1fd0f823b2861e,2024-04-12T09:15:09.280000
|
||||
CVE-2023-33101,0,1,c4cfabd9ba04737e1d7e20f3b7982acc6d7fdf40b3749e2066f979c06fad5837,2024-04-12T09:15:09.390000
|
||||
CVE-2023-33100,0,0,ad43aa3eb40c7a870dbb71415be51e5182dfb0081b7b951dca1fd0f823b2861e,2024-04-12T09:15:09.280000
|
||||
CVE-2023-33101,0,0,c4cfabd9ba04737e1d7e20f3b7982acc6d7fdf40b3749e2066f979c06fad5837,2024-04-12T09:15:09.390000
|
||||
CVE-2023-33103,0,0,e246ac126dfbefd21de8118c3eb8b7ed9bc5930ac0965a37c5080429e973ef54,2024-03-04T13:58:23.447000
|
||||
CVE-2023-33104,0,0,a34527fb73c781aa4073e31a49224b3f3175e2a9510a612e3895e7886f6ed3c4,2024-03-04T13:58:23.447000
|
||||
CVE-2023-33105,0,0,befe7620c25a7b58d1e911a88cb384a10c361553b3cfc31e48fc87381274d276,2024-03-04T13:58:23.447000
|
||||
@ -223792,11 +223792,11 @@ CVE-2023-33108,0,0,49e6f655dfe7117f0888e36b3a3113fe5c6707bf4548f79d09d7d1bd55b97
|
||||
CVE-2023-33109,0,0,601e518f562071edae61bac64a0facf71b1965cc7f170b7e8fc04965c11b4b34,2024-01-09T19:16:58.157000
|
||||
CVE-2023-3311,0,0,655bfb08b765359d981e9e9b1d731e624e7702073bd31717d1a58bf27f0486ae,2024-04-11T01:21:08.590000
|
||||
CVE-2023-33110,0,0,0a58aa9a9f11251eec56b1c7ad633f078d76f70bb16d54ac166e95d14c582035,2024-01-09T19:19:50.700000
|
||||
CVE-2023-33111,0,1,ed620880c11fd7aeaf89df44f8c0cb125d2173c325a2c8bc5b84bbae9d524070,2024-04-12T09:15:09.510000
|
||||
CVE-2023-33111,0,0,ed620880c11fd7aeaf89df44f8c0cb125d2173c325a2c8bc5b84bbae9d524070,2024-04-12T09:15:09.510000
|
||||
CVE-2023-33112,0,0,30b050044edf5df63c874632e138ac8864a1336629da6272536b355c1a9b7034,2024-01-09T19:21:32.643000
|
||||
CVE-2023-33113,0,0,408180beab72e6032ec99777f8ee13059d28d80ec73118c05e8d5d114a124982,2024-01-09T19:22:25.130000
|
||||
CVE-2023-33114,0,0,22f15233a1225c8a015662e47e32ee09ba395adf6477a940fe3d76709d8a9dc6,2024-01-08T18:48:14.563000
|
||||
CVE-2023-33115,0,1,fe42e485275521b00171edca6a4a76a16c497d01f7cafbf2b4b42ee1bd48c49a,2024-04-12T09:15:09.623000
|
||||
CVE-2023-33115,0,0,fe42e485275521b00171edca6a4a76a16c497d01f7cafbf2b4b42ee1bd48c49a,2024-04-12T09:15:09.623000
|
||||
CVE-2023-33116,0,0,f5f98fe3cb876782b9b8b95b6c4a83fa33edae6209c035931def8d635efeaccb,2024-01-08T18:49:48.687000
|
||||
CVE-2023-33117,0,0,e3592fc4f72611362290f686fbcb190becf679ca7fe8716330ee6a2281273cf4,2024-01-08T18:50:40.583000
|
||||
CVE-2023-33118,0,0,152b3c8cf677d01c77c18f037c8d12c321229b767beb136a7b4389e60187be41,2024-01-08T18:56:00.013000
|
||||
@ -230766,7 +230766,7 @@ CVE-2023-43511,0,0,4f221907e62651305632a5a32288e3ad67d8a23cde38b38dd0db116177e03
|
||||
CVE-2023-43512,0,0,7ab55ea266d4535dec2aecd830497b2d5a277a4fe41ad95af6dc401b0140b432,2024-01-08T18:58:42.300000
|
||||
CVE-2023-43513,0,0,bc2beb3e4f3f02ed04972ae426f3a28a9641c6765237dc6135332d9dfe0c2cef,2024-02-09T00:49:48.173000
|
||||
CVE-2023-43514,0,0,a98af180d895550b32f0aad8d3ae05806e481c9ef4337116173d95ea3744ac38,2024-01-08T18:59:13.010000
|
||||
CVE-2023-43515,0,1,6d7fdf8dd426593404ffede4ca38bee07cae86fb091764ca118bde49c704e7b5,2024-04-12T09:15:09.743000
|
||||
CVE-2023-43515,0,0,6d7fdf8dd426593404ffede4ca38bee07cae86fb091764ca118bde49c704e7b5,2024-04-12T09:15:09.743000
|
||||
CVE-2023-43516,0,0,7868529a5efd20a5da31df285b70cfd7e7a9c8b72515c1e48bcd75fa8fdf9aef,2024-02-09T00:50:24.280000
|
||||
CVE-2023-43517,0,0,b79fdc8ce6edee0c83f61f7e5cff4da87a3bb4881e062252338314b1374f7830,2024-02-09T00:51:20.140000
|
||||
CVE-2023-43518,0,0,3c52e69517627405d2c2b2acebe98884ccaefd681907bbd30da53ca640e1b7a2,2024-02-09T00:51:42.733000
|
||||
@ -240319,16 +240319,16 @@ CVE-2024-21448,0,0,cc7a91363ba573b50587da0303693d8cc9f301ad18237b5902b852564dd20
|
||||
CVE-2024-2145,0,0,7798ca35245cf2302b4a494353f9ed4c3754d17d7f6fce522ae2220692bf9f77,2024-04-11T01:25:18.577000
|
||||
CVE-2024-21450,0,0,ba03d25a544224b919939c73f3c0e5c0df60d80b8563e099528458d18fbd951d,2024-04-11T20:15:33.050000
|
||||
CVE-2024-21451,0,0,3a68c9cb135fb79bfe9a5852a24c7fd1f5875fcd798816d60af8d6fb9ada644d,2024-04-11T20:15:33.143000
|
||||
CVE-2024-21452,0,1,02d31b115a697c05db35da661c22664c85e8181268bd7542a64483c043b4b7b5,2024-04-12T09:15:09.877000
|
||||
CVE-2024-21453,0,1,8dc35af31e64bd045ded864e7fcc07424ae51270f4588b919a1a9152eb1b9be2,2024-04-12T09:15:09.977000
|
||||
CVE-2024-21454,0,1,b257edb5552eb473b4503004e3fc64a602a43324cbc07ac68d19d0a9bcb868c5,2024-04-12T09:15:10.083000
|
||||
CVE-2024-21452,0,0,02d31b115a697c05db35da661c22664c85e8181268bd7542a64483c043b4b7b5,2024-04-12T09:15:09.877000
|
||||
CVE-2024-21453,0,0,8dc35af31e64bd045ded864e7fcc07424ae51270f4588b919a1a9152eb1b9be2,2024-04-12T09:15:09.977000
|
||||
CVE-2024-21454,0,0,b257edb5552eb473b4503004e3fc64a602a43324cbc07ac68d19d0a9bcb868c5,2024-04-12T09:15:10.083000
|
||||
CVE-2024-2146,0,0,90ba34059155d5deaac857965ba4aaa546febd2a4a7e419ab2cfaf6a3d50f218,2024-04-11T01:25:18.660000
|
||||
CVE-2024-21463,0,1,8f929d15ea58ffe4c907e382121f59ff2b72bea6ff85918078d89258f2adb890,2024-04-12T09:15:10.193000
|
||||
CVE-2024-21468,0,1,f2b93df747dc8ffb1a67bf6170c8b74d59ead8db487ef5519f8ed51313b18879,2024-04-12T09:15:10.303000
|
||||
CVE-2024-21463,0,0,8f929d15ea58ffe4c907e382121f59ff2b72bea6ff85918078d89258f2adb890,2024-04-12T09:15:10.193000
|
||||
CVE-2024-21468,0,0,f2b93df747dc8ffb1a67bf6170c8b74d59ead8db487ef5519f8ed51313b18879,2024-04-12T09:15:10.303000
|
||||
CVE-2024-2147,0,0,72af4691710d142352cde118ddeb0a6213cc8192fc38a6d8dde6675520fe763c,2024-04-11T01:25:18.733000
|
||||
CVE-2024-21470,0,1,acd6c1381826abd35aa0c5fc63da2cad3d21675cd9907feb7858c393a543a7f4,2024-04-12T09:15:10.433000
|
||||
CVE-2024-21472,0,1,3ac24f78506f28ec33069bc63754cb268f2c0224fd0d8e9f7e66825ba83d8da4,2024-04-12T09:15:10.623000
|
||||
CVE-2024-21473,0,1,38d4dd241daa4fea6a6c832f59056dc8b8e6051132fc9c9e7057963fa8fe1a97,2024-04-12T09:15:10.783000
|
||||
CVE-2024-21470,0,0,acd6c1381826abd35aa0c5fc63da2cad3d21675cd9907feb7858c393a543a7f4,2024-04-12T09:15:10.433000
|
||||
CVE-2024-21472,0,0,3ac24f78506f28ec33069bc63754cb268f2c0224fd0d8e9f7e66825ba83d8da4,2024-04-12T09:15:10.623000
|
||||
CVE-2024-21473,0,0,38d4dd241daa4fea6a6c832f59056dc8b8e6051132fc9c9e7057963fa8fe1a97,2024-04-12T09:15:10.783000
|
||||
CVE-2024-2148,0,0,bd474b68d5622b66456025b0004ff703ccd31033375df52a4608b4466a35f673,2024-04-11T01:25:18.810000
|
||||
CVE-2024-21483,0,0,9151aea81f4a61f57a2b42ef8dafe022eeea7af379bf181ee6a30f8665567492,2024-03-12T12:40:13.500000
|
||||
CVE-2024-21484,0,0,5f19ab0f68120a92041bdc33d9c29463ccd0d23c1b4da1c7441e6cd0612506af,2024-03-06T14:15:47.533000
|
||||
@ -244671,6 +244671,7 @@ CVE-2024-30532,0,0,357b3cd0362ba41f527f4c50b79023773ef0743103703dd0647d41de653db
|
||||
CVE-2024-30533,0,0,79210a276c197ef0c96ad47c4fb12b67135bbfbac578e6cbb91cd58ced29019a,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30535,0,0,44cf559c2f239523454379743fc839df0944a89751d0feea3aa49546c20c2f6f,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30536,0,0,8b71121133ca2bd2e4e447453aa973175f5a1f5afa02099ef20cc2e88af30470,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3054,1,1,98c56c6403f26332f4070dfabb108b4210c2732c6a6f7938e2364c4cbc59eb5c,2024-04-12T10:15:08.670000
|
||||
CVE-2024-30541,0,0,d78a79d3d88afd14cd20c527bfe41ab0fe37668194e235410187bd48d18e8829,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30543,0,0,de59888ed56e637b17c319241a16835129df317d943b40d1e6d9bcfa3e0bf401,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30548,0,0,88bd7bd1cf2d1002ab9e155734df5d96b2d8cfbbf5bd9c13944c64553d3e002a,2024-04-01T01:12:59.077000
|
||||
@ -244996,6 +244997,8 @@ CVE-2024-31368,0,0,2075bbe380281b0997c3990fa2ac90c9c87c399d3ddf4c8c8d5afff7621d8
|
||||
CVE-2024-31369,0,0,d082a9ab615cec7280a5691a7d44e9570c42e7b3288086312b3cbea4bdb1dc8b,2024-04-09T12:48:04.090000
|
||||
CVE-2024-3137,0,0,85619be4f983f97db1d6302bec8264dd546f884b93dfcad5f6be85034ffe5dcb,2024-04-02T12:50:42.233000
|
||||
CVE-2024-31370,0,0,6f6e1dfc72d0841ebaadb7bdc4bbf124cf6313a520f59380c092d9365f2d4194,2024-04-09T12:48:04.090000
|
||||
CVE-2024-31371,1,1,b754fb6860e8e87474fe3ec2754277e17c6d53aea690a3d9f5f15cc05649f9ef,2024-04-12T10:15:07.473000
|
||||
CVE-2024-31372,1,1,82fc767f56446cc5200f1b06b8369008cdf239ebfd7c3058756d3a1cdf1909db,2024-04-12T10:15:08.327000
|
||||
CVE-2024-31375,0,0,b0ef1f22f63ca31cfb2164ca0bddec7fc53a5ee9672cb520fcd2e704c7c6fdab,2024-04-08T18:48:40.217000
|
||||
CVE-2024-3138,0,0,952bef3e912c81d77b1f4b71c423532beae8fc55963465bb23e6cf3f92e09bdf,2024-04-11T01:25:54.493000
|
||||
CVE-2024-31380,0,0,d044c4c41af2f67b9e10a84372a0da5aeb36e8aa53f4901f4d0660af26a33358,2024-04-05T14:15:10.487000
|
||||
@ -245127,6 +245130,7 @@ CVE-2024-32106,0,0,657892b691bfdac6e494ae38fa5fc13decf2efe62a2803b89920606ad1cdc
|
||||
CVE-2024-32107,0,0,17ceff19a3d307cec6e0950bbc197fbc219a82062e65ab18f9c2e5dedf1e01c7,2024-04-11T13:30:38
|
||||
CVE-2024-32108,0,0,e5f1907011c4132156bac23550771124f6260e9a6dc8e26fa0b361d9e233dc56,2024-04-11T13:30:38
|
||||
CVE-2024-32109,0,0,d98e9340ca426895303f46409be82a676e4c83cd66e11346da406fd04277e8e0,2024-04-11T13:30:38
|
||||
CVE-2024-3211,1,1,e6f83c9738c77772de2cae8f37ae9ac874d38447fc450a34645ff3bf7d6e0cf3,2024-04-12T10:15:08.840000
|
||||
CVE-2024-32112,0,0,ea2c0d37cf01029ebf4bf26966e0705fb857fccc1f7b3e474eb0951714e406a2,2024-04-11T12:47:44.137000
|
||||
CVE-2024-3213,0,0,6f3e7d7b75cebe013a6b4c97df0c4a75297184b51024b4273e6e525d7e8e8681,2024-04-10T13:23:38.787000
|
||||
CVE-2024-3214,0,0,e7faf7d08ea8810657f6ef8ee7498174d5cfef4549343bb1fd0a7e8f9efa72e2,2024-04-10T13:23:38.787000
|
||||
@ -245209,7 +245213,7 @@ CVE-2024-3385,0,0,dafd55987e5738b5d6ec37d523526a7e0269d60d96cd780933abafbc800645
|
||||
CVE-2024-3386,0,0,d08d523d066834a85bfe06023f05a033d8631a6197479f66bfb86438af143c6d,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3387,0,0,59a783d7f5a632f1312dc02ccd745e7c758f93e478c4554a0dbc9aba27d256c0,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3388,0,0,9a13547aa29d2171bfe252870fb3dde44261a463a11a31d9062dc130e0f3c4f3,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3400,1,1,43bca0fa0c00401c33551914645044b7305e9f5c2948fd8aab053186fbcd5862,2024-04-12T08:15:06.230000
|
||||
CVE-2024-3400,0,0,43bca0fa0c00401c33551914645044b7305e9f5c2948fd8aab053186fbcd5862,2024-04-12T08:15:06.230000
|
||||
CVE-2024-3413,0,0,7c0263f5aa26015f580f259b17ac76e3fb232807ce6eb6b3e0fa4a42d34def58,2024-04-11T01:26:00.727000
|
||||
CVE-2024-3414,0,0,fcf8b2012e3dcab7048965e9d40e8c26f25a86217cc70e6c24a2ae712b119943,2024-04-11T01:26:00.803000
|
||||
CVE-2024-3415,0,0,80d83d8ba89e3620cb20eb7a8b2b10e1c5fbd8b76c068e7c00b4af6deadd81dd,2024-04-11T01:26:00.900000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user