mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-04-26T10:00:40.235804+00:00
This commit is contained in:
parent
9b808f3884
commit
86c10041a9
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32643",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-09-14T20:15:09.770",
|
||||
"lastModified": "2023-09-20T14:32:32.347",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-04-26T09:15:07.127",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -113,6 +113,10 @@
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0005/",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-32665",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-09-14T20:15:09.883",
|
||||
"lastModified": "2023-11-27T14:15:07.820",
|
||||
"lastModified": "2024-04-26T09:15:07.333",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -128,6 +128,10 @@
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202311-18",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0006/",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-41993",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-09-21T19:15:11.660",
|
||||
"lastModified": "2024-01-31T15:15:10.337",
|
||||
"lastModified": "2024-04-26T09:15:07.533",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2023-09-25",
|
||||
"cisaActionDue": "2023-10-16",
|
||||
@ -150,6 +150,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202401-33",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213940",
|
||||
"source": "product-security@apple.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44487",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-10T14:15:10.883",
|
||||
"lastModified": "2024-02-02T15:40:23.610",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-04-26T09:15:07.677",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2023-10-10",
|
||||
"cisaActionDue": "2023-10-31",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
@ -3886,6 +3886,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0007/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.paloaltonetworks.com/CVE-2023-44487",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4408",
|
||||
"sourceIdentifier": "security-officer@isc.org",
|
||||
"published": "2024-02-13T14:15:45.253",
|
||||
"lastModified": "2024-03-04T03:15:06.087",
|
||||
"lastModified": "2024-04-26T09:15:08.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -62,6 +62,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/",
|
||||
"source": "security-officer@isc.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0001/",
|
||||
"source": "security-officer@isc.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5679",
|
||||
"sourceIdentifier": "security-officer@isc.org",
|
||||
"published": "2024-02-13T14:15:45.677",
|
||||
"lastModified": "2024-03-04T03:15:06.680",
|
||||
"lastModified": "2024-04-26T09:15:08.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -62,6 +62,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/",
|
||||
"source": "security-officer@isc.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0002/",
|
||||
"source": "security-officer@isc.org"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-60xx/CVE-2023-6095.json
Normal file
55
CVE-2023/CVE-2023-60xx/CVE-2023-6095.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-6095",
|
||||
"sourceIdentifier": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
|
||||
"published": "2024-04-26T08:15:11.327",
|
||||
"lastModified": "2024-04-26T08:15:11.327",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nVladimir Kononovich, a Security Researcher has found a flaw that allows for a remote code execution on the DVR. An attacker could inject malicious HTTP headers into request packets to execute arbitrary code. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.9,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.hanwhavision.com/wp-content/uploads/2024/04/NVR-DVR-Vulnerability-Report-CVE-2023-6095-6096.pdf",
|
||||
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-60xx/CVE-2023-6096.json
Normal file
55
CVE-2023/CVE-2023-60xx/CVE-2023-6096.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-6096",
|
||||
"sourceIdentifier": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
|
||||
"published": "2024-04-26T08:15:11.583",
|
||||
"lastModified": "2024-04-26T08:15:11.583",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nVladimir Kononovich, a Security Researcher has found a flaw that using a inappropriate encryption logic on the DVR. firmware encryption is broken and allows to decrypt. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.4,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-668"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.hanwhavision.com/wp-content/uploads/2024/04/NVR-DVR-Vulnerability-Report-CVE-2023-6095-6096.pdf",
|
||||
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-61xx/CVE-2023-6116.json
Normal file
55
CVE-2023/CVE-2023-61xx/CVE-2023-6116.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-6116",
|
||||
"sourceIdentifier": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
|
||||
"published": "2024-04-26T08:15:11.797",
|
||||
"lastModified": "2024-04-26T08:15:11.797",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nTeam ENVY, a Security Research TEAM has found a flaw that allows for a remote code execution on the camera. An attacker could inject malicious into http request packets to execute arbitrary code. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.9,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.hanwhavision.com/wp-content/uploads/2024/04/NVR-DVR-Vulnerability-Report-CVE-2023-6116.pdf",
|
||||
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6129",
|
||||
"sourceIdentifier": "openssl-security@openssl.org",
|
||||
"published": "2024-01-09T17:15:12.147",
|
||||
"lastModified": "2024-02-16T13:15:09.910",
|
||||
"lastModified": "2024-04-26T09:15:08.910",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -107,6 +107,14 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240216-0009/",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0008/",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openssl.org/news/secadv/20240109.txt",
|
||||
"source": "openssl-security@openssl.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0853",
|
||||
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
|
||||
"published": "2024-02-03T14:15:50.850",
|
||||
"lastModified": "2024-03-07T17:15:12.657",
|
||||
"lastModified": "2024-04-26T09:15:09.023",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -93,6 +93,10 @@
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0004/",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0009/",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1139",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-25T17:15:47.650",
|
||||
"lastModified": "2024-04-25T17:24:59.967",
|
||||
"lastModified": "2024-04-26T09:15:09.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -47,6 +47,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1887",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-1139",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1753",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-03-18T15:15:41.170",
|
||||
"lastModified": "2024-04-03T02:15:07.693",
|
||||
"lastModified": "2024-04-26T08:15:12.060",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,6 +51,18 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2055",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2064",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2066",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-1753",
|
||||
"source": "secalert@redhat.com"
|
||||
|
47
CVE-2024/CVE-2024-17xx/CVE-2024-1789.json
Normal file
47
CVE-2024/CVE-2024-17xx/CVE-2024-1789.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-1789",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-26T09:15:09.213",
|
||||
"lastModified": "2024-04-26T09:15:09.213",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP SMTP plugin for WordPress is vulnerable to SQL Injection via the 'search' parameter in versions 1.2 to 1.2.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3076663%40wp-smtp&new=3076663%40wp-smtp&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ee269bc7-2822-4a07-be91-6763c1cf6cf2?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-20993",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:12.453",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:09.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0014/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-20994",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:12.623",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:09.500",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-20998",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:13.140",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:09.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21000",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:13.520",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:09.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21002",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:13.870",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:09.700",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21003",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:14.040",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:09.823",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21004",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:14.210",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:09.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21005",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:14.373",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:10.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21008",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:14.920",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:10.100",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21009",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:15.090",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:10.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21011",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:15.437",
|
||||
"lastModified": "2024-04-22T15:15:47.380",
|
||||
"lastModified": "2024-04-26T09:15:10.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -43,6 +43,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21012",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:15.617",
|
||||
"lastModified": "2024-04-22T15:15:47.473",
|
||||
"lastModified": "2024-04-26T09:15:10.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -43,6 +43,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21013",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:15.793",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:10.370",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21015",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:16.140",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:10.440",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0010/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21047",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:21.643",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:10.500",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21049",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:21.990",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:10.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0012/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21050",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:22.157",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:10.637",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0012/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21051",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:22.330",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:10.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0012/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21052",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:22.500",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:10.767",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0012/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21053",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:22.673",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:10.830",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0012/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21054",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:22.840",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:10.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21055",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:23.010",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:10.953",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0011/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21056",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:23.183",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:11.017",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0012/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21060",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:23.910",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:11.080",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21061",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:24.080",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:11.143",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0014/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21062",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:24.247",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:11.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21068",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:25.307",
|
||||
"lastModified": "2024-04-22T15:15:47.540",
|
||||
"lastModified": "2024-04-26T09:15:11.273",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -43,6 +43,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21069",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:25.473",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:11.350",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21085",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:28.293",
|
||||
"lastModified": "2024-04-22T15:15:47.610",
|
||||
"lastModified": "2024-04-26T09:15:11.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -43,6 +43,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21087",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:28.640",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:11.543",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21094",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:29.857",
|
||||
"lastModified": "2024-04-22T15:15:47.683",
|
||||
"lastModified": "2024-04-26T09:15:11.613",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -43,6 +43,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21096",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:30.207",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:11.683",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21101",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:31.087",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:11.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0015/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21102",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:31.270",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-26T09:15:11.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,14 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0015/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
55
CVE-2024/CVE-2024-220xx/CVE-2024-22091.json
Normal file
55
CVE-2024/CVE-2024-220xx/CVE-2024-22091.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-22091",
|
||||
"sourceIdentifier": "responsibledisclosure@mattermost.com",
|
||||
"published": "2024-04-26T09:15:11.880",
|
||||
"lastModified": "2024-04-26T09:15:11.880",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mattermost versions 8.1.x <= 8.1.10, 9.6.x <= 9.6.0, 9.5.x <= 9.5.2 and 8.1.x <= 8.1.11 fail to limit the size of a request path that includes user inputs which allows an attacker to cause\u00a0excessive resource\u00a0consumption, possibly leading to a DoS\u00a0via sending large request paths\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mattermost.com/security-updates",
|
||||
"source": "responsibledisclosure@mattermost.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-2312",
|
||||
"sourceIdentifier": "security@ubuntu.com",
|
||||
"published": "2024-04-05T20:15:09.020",
|
||||
"lastModified": "2024-04-08T18:49:25.863",
|
||||
"lastModified": "2024-04-26T09:15:12.073",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -46,6 +46,10 @@
|
||||
{
|
||||
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2312",
|
||||
"source": "security@ubuntu.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240426-0003/",
|
||||
"source": "security@ubuntu.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-29xx/CVE-2024-2920.json
Normal file
47
CVE-2024/CVE-2024-29xx/CVE-2024-2920.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-2920",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-26T08:15:12.203",
|
||||
"lastModified": "2024-04-26T08:15:12.203",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP-Members Membership Plugin plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 3.4.9.3 due to the plugin uploading user supplied files to a publicly accessible directory in wp-content without any restrictions. This makes it possible for unauthenticated attackers to view files uploaded by other users which may contain sensitive information."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3074215%40wp-members&new=3074215%40wp-members&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4319fa2e-8826-4100-9156-cbe80582367e?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-320xx/CVE-2024-32046.json
Normal file
55
CVE-2024/CVE-2024-320xx/CVE-2024-32046.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32046",
|
||||
"sourceIdentifier": "responsibledisclosure@mattermost.com",
|
||||
"published": "2024-04-26T09:15:12.157",
|
||||
"lastModified": "2024-04-26T09:15:12.157",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mattermost versions 9.6.x <= 9.6.0, 9.5.x <= 9.5.2, 9.4.x <= 9.4.4 and 8.1.x <= 8.1.11 fail to remove detailed error messages in API requests even if the developer mode is off which allows an attacker to get information about the server such as the full path were files are stored\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mattermost.com/security-updates",
|
||||
"source": "responsibledisclosure@mattermost.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33598.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33598.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33598",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-26T08:15:12.370",
|
||||
"lastModified": "2024-04-26T08:15:12.370",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Twinpictures Annual Archive allows Stored XSS.This issue affects Annual Archive: from n/a through 1.6.0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/anual-archive/wordpress-annual-archive-plugin-1-6-0-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-336xx/CVE-2024-33638.json
Normal file
55
CVE-2024/CVE-2024-336xx/CVE-2024-33638.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33638",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-26T08:15:12.567",
|
||||
"lastModified": "2024-04-26T08:15:12.567",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Brijesh Kothari Smart Maintenance Mode.This issue affects Smart Maintenance Mode: from n/a through 1.4.4.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/smart-maintenance-mode/wordpress-smart-maintenance-mode-plugin-1-4-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-336xx/CVE-2024-33639.json
Normal file
55
CVE-2024/CVE-2024-336xx/CVE-2024-33639.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33639",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-26T08:15:12.770",
|
||||
"lastModified": "2024-04-26T08:15:12.770",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AccessAlly PopupAlly allows Stored XSS.This issue affects PopupAlly: from n/a through 2.1.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/popupally/wordpress-popupally-plugin-2-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-336xx/CVE-2024-33642.json
Normal file
55
CVE-2024/CVE-2024-336xx/CVE-2024-33642.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33642",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-26T08:15:12.977",
|
||||
"lastModified": "2024-04-26T08:15:12.977",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in EkoJR Advanced Post List allows Stored XSS.This issue affects Advanced Post List: from n/a through 0.5.6.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/advanced-post-list/wordpress-advanced-post-list-plugin-0-5-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-336xx/CVE-2024-33650.json
Normal file
55
CVE-2024/CVE-2024-336xx/CVE-2024-33650.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33650",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-26T08:15:13.163",
|
||||
"lastModified": "2024-04-26T08:15:13.163",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Cryout Creations Serious Slider.This issue affects Serious Slider: from n/a through 1.2.4.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/cryout-serious-slider/wordpress-serious-slider-plugin-1-2-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-336xx/CVE-2024-33651.json
Normal file
55
CVE-2024/CVE-2024-336xx/CVE-2024-33651.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33651",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-26T08:15:13.370",
|
||||
"lastModified": "2024-04-26T08:15:13.370",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Matthew Fries MF Gig Calendar.This issue affects MF Gig Calendar : from n/a through 1.2.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/mf-gig-calendar/wordpress-mf-gig-calendar-plugin-1-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
51
CVE-2024/CVE-2024-36xx/CVE-2024-3678.json
Normal file
51
CVE-2024/CVE-2024-36xx/CVE-2024-3678.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2024-3678",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-26T08:15:13.567",
|
||||
"lastModified": "2024-04-26T08:15:13.567",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.4.2. This makes it possible for unauthenticated attackers to view limited information from password protected posts."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3069574/blog2social/trunk/includes/Meta.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3074883/blog2social/trunk/includes/Meta.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2dea1bcb-14c2-4ec9-8a4d-087bac2db486?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-38xx/CVE-2024-3890.json
Normal file
47
CVE-2024/CVE-2024-38xx/CVE-2024-3890.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-3890",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-26T08:15:13.773",
|
||||
"lastModified": "2024-04-26T08:15:13.773",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Calendly widget in all versions up to, and including, 3.10.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3076871/happy-elementor-addons/trunk/widgets/calendly/widget.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/22e4eb2a-2c2b-4f4f-821e-8d2d7e558364?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
51
CVE-2024/CVE-2024-39xx/CVE-2024-3962.json
Normal file
51
CVE-2024/CVE-2024-39xx/CVE-2024-3962.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2024-3962",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-26T09:15:12.337",
|
||||
"lastModified": "2024-04-26T09:15:12.337",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Product Addons & Fields for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ppom_upload_file function in all versions up to, and including, 32.0.18. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Successful exploitation requires the PPOM Pro plugin to be installed along with a WooCommerce product that contains a file upload field to retrieve the correct nonce."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3075669/woocommerce-product-addon",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://themeisle.com/plugins/ppom-pro/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4f95bcc3-354e-4016-9a17-945569b076b6?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-41xx/CVE-2024-4182.json
Normal file
55
CVE-2024/CVE-2024-41xx/CVE-2024-4182.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-4182",
|
||||
"sourceIdentifier": "responsibledisclosure@mattermost.com",
|
||||
"published": "2024-04-26T09:15:12.523",
|
||||
"lastModified": "2024-04-26T09:15:12.523",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mattermost versions 9.6.0, 9.5.x before 9.5.3, 9.4.x before 9.4.5, and 8.1.x before 8.1.12 fail to handle JSON parsing errors in custom status values, which allows an authenticated attacker to crash other users' web clients via a malformed custom status.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-754"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mattermost.com/security-updates",
|
||||
"source": "responsibledisclosure@mattermost.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-41xx/CVE-2024-4183.json
Normal file
55
CVE-2024/CVE-2024-41xx/CVE-2024-4183.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-4183",
|
||||
"sourceIdentifier": "responsibledisclosure@mattermost.com",
|
||||
"published": "2024-04-26T09:15:12.717",
|
||||
"lastModified": "2024-04-26T09:15:12.717",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mattermost versions 8.1.x before 8.1.12, 9.6.x before 9.6.1, 9.5.x before 9.5.3, 9.4.x before 9.4.5 fail to limit the number of active sessions, which allows an authenticated attacker to crash the server via repeated requests to the getSessions API after flooding the sessions table.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mattermost.com/security-updates",
|
||||
"source": "responsibledisclosure@mattermost.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-41xx/CVE-2024-4195.json
Normal file
55
CVE-2024/CVE-2024-41xx/CVE-2024-4195.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-4195",
|
||||
"sourceIdentifier": "responsibledisclosure@mattermost.com",
|
||||
"published": "2024-04-26T09:15:12.897",
|
||||
"lastModified": "2024-04-26T09:15:12.897",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully validate role changes, which allows an attacker authenticated as a team admin to promote guests to team admins via crafted HTTP requests.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.7,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mattermost.com/security-updates",
|
||||
"source": "responsibledisclosure@mattermost.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-41xx/CVE-2024-4198.json
Normal file
55
CVE-2024/CVE-2024-41xx/CVE-2024-4198.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-4198",
|
||||
"sourceIdentifier": "responsibledisclosure@mattermost.com",
|
||||
"published": "2024-04-26T09:15:13.097",
|
||||
"lastModified": "2024-04-26T09:15:13.097",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully validate role changes which allows an attacker authenticated as team admin to demote users to guest via crafted HTTP requests.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.7,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mattermost.com/security-updates",
|
||||
"source": "responsibledisclosure@mattermost.com"
|
||||
}
|
||||
]
|
||||
}
|
60
README.md
60
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-26T08:00:41.422303+00:00
|
||||
2024-04-26T10:00:40.235804+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-26T07:15:47.467000+00:00
|
||||
2024-04-26T09:15:13.097000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,24 +33,64 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
246844
|
||||
246864
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `20`
|
||||
|
||||
- [CVE-2024-4056](CVE-2024/CVE-2024-40xx/CVE-2024-4056.json) (`2024-04-26T06:15:06.610`)
|
||||
- [CVE-2023-6095](CVE-2023/CVE-2023-60xx/CVE-2023-6095.json) (`2024-04-26T08:15:11.327`)
|
||||
- [CVE-2023-6096](CVE-2023/CVE-2023-60xx/CVE-2023-6096.json) (`2024-04-26T08:15:11.583`)
|
||||
- [CVE-2023-6116](CVE-2023/CVE-2023-61xx/CVE-2023-6116.json) (`2024-04-26T08:15:11.797`)
|
||||
- [CVE-2024-1789](CVE-2024/CVE-2024-17xx/CVE-2024-1789.json) (`2024-04-26T09:15:09.213`)
|
||||
- [CVE-2024-22091](CVE-2024/CVE-2024-220xx/CVE-2024-22091.json) (`2024-04-26T09:15:11.880`)
|
||||
- [CVE-2024-2920](CVE-2024/CVE-2024-29xx/CVE-2024-2920.json) (`2024-04-26T08:15:12.203`)
|
||||
- [CVE-2024-32046](CVE-2024/CVE-2024-320xx/CVE-2024-32046.json) (`2024-04-26T09:15:12.157`)
|
||||
- [CVE-2024-33598](CVE-2024/CVE-2024-335xx/CVE-2024-33598.json) (`2024-04-26T08:15:12.370`)
|
||||
- [CVE-2024-33638](CVE-2024/CVE-2024-336xx/CVE-2024-33638.json) (`2024-04-26T08:15:12.567`)
|
||||
- [CVE-2024-33639](CVE-2024/CVE-2024-336xx/CVE-2024-33639.json) (`2024-04-26T08:15:12.770`)
|
||||
- [CVE-2024-33642](CVE-2024/CVE-2024-336xx/CVE-2024-33642.json) (`2024-04-26T08:15:12.977`)
|
||||
- [CVE-2024-33650](CVE-2024/CVE-2024-336xx/CVE-2024-33650.json) (`2024-04-26T08:15:13.163`)
|
||||
- [CVE-2024-33651](CVE-2024/CVE-2024-336xx/CVE-2024-33651.json) (`2024-04-26T08:15:13.370`)
|
||||
- [CVE-2024-3678](CVE-2024/CVE-2024-36xx/CVE-2024-3678.json) (`2024-04-26T08:15:13.567`)
|
||||
- [CVE-2024-3890](CVE-2024/CVE-2024-38xx/CVE-2024-3890.json) (`2024-04-26T08:15:13.773`)
|
||||
- [CVE-2024-3962](CVE-2024/CVE-2024-39xx/CVE-2024-3962.json) (`2024-04-26T09:15:12.337`)
|
||||
- [CVE-2024-4182](CVE-2024/CVE-2024-41xx/CVE-2024-4182.json) (`2024-04-26T09:15:12.523`)
|
||||
- [CVE-2024-4183](CVE-2024/CVE-2024-41xx/CVE-2024-4183.json) (`2024-04-26T09:15:12.717`)
|
||||
- [CVE-2024-4195](CVE-2024/CVE-2024-41xx/CVE-2024-4195.json) (`2024-04-26T09:15:12.897`)
|
||||
- [CVE-2024-4198](CVE-2024/CVE-2024-41xx/CVE-2024-4198.json) (`2024-04-26T09:15:13.097`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `4`
|
||||
Recently modified CVEs: `45`
|
||||
|
||||
- [CVE-2019-10190](CVE-2019/CVE-2019-101xx/CVE-2019-10190.json) (`2024-04-26T07:15:46.890`)
|
||||
- [CVE-2019-10191](CVE-2019/CVE-2019-101xx/CVE-2019-10191.json) (`2024-04-26T07:15:47.220`)
|
||||
- [CVE-2019-19331](CVE-2019/CVE-2019-193xx/CVE-2019-19331.json) (`2024-04-26T07:15:47.327`)
|
||||
- [CVE-2020-12667](CVE-2020/CVE-2020-126xx/CVE-2020-12667.json) (`2024-04-26T07:15:47.467`)
|
||||
- [CVE-2024-21011](CVE-2024/CVE-2024-210xx/CVE-2024-21011.json) (`2024-04-26T09:15:10.240`)
|
||||
- [CVE-2024-21012](CVE-2024/CVE-2024-210xx/CVE-2024-21012.json) (`2024-04-26T09:15:10.307`)
|
||||
- [CVE-2024-21013](CVE-2024/CVE-2024-210xx/CVE-2024-21013.json) (`2024-04-26T09:15:10.370`)
|
||||
- [CVE-2024-21015](CVE-2024/CVE-2024-210xx/CVE-2024-21015.json) (`2024-04-26T09:15:10.440`)
|
||||
- [CVE-2024-21047](CVE-2024/CVE-2024-210xx/CVE-2024-21047.json) (`2024-04-26T09:15:10.500`)
|
||||
- [CVE-2024-21049](CVE-2024/CVE-2024-210xx/CVE-2024-21049.json) (`2024-04-26T09:15:10.567`)
|
||||
- [CVE-2024-21050](CVE-2024/CVE-2024-210xx/CVE-2024-21050.json) (`2024-04-26T09:15:10.637`)
|
||||
- [CVE-2024-21051](CVE-2024/CVE-2024-210xx/CVE-2024-21051.json) (`2024-04-26T09:15:10.703`)
|
||||
- [CVE-2024-21052](CVE-2024/CVE-2024-210xx/CVE-2024-21052.json) (`2024-04-26T09:15:10.767`)
|
||||
- [CVE-2024-21053](CVE-2024/CVE-2024-210xx/CVE-2024-21053.json) (`2024-04-26T09:15:10.830`)
|
||||
- [CVE-2024-21054](CVE-2024/CVE-2024-210xx/CVE-2024-21054.json) (`2024-04-26T09:15:10.893`)
|
||||
- [CVE-2024-21055](CVE-2024/CVE-2024-210xx/CVE-2024-21055.json) (`2024-04-26T09:15:10.953`)
|
||||
- [CVE-2024-21056](CVE-2024/CVE-2024-210xx/CVE-2024-21056.json) (`2024-04-26T09:15:11.017`)
|
||||
- [CVE-2024-21060](CVE-2024/CVE-2024-210xx/CVE-2024-21060.json) (`2024-04-26T09:15:11.080`)
|
||||
- [CVE-2024-21061](CVE-2024/CVE-2024-210xx/CVE-2024-21061.json) (`2024-04-26T09:15:11.143`)
|
||||
- [CVE-2024-21062](CVE-2024/CVE-2024-210xx/CVE-2024-21062.json) (`2024-04-26T09:15:11.213`)
|
||||
- [CVE-2024-21068](CVE-2024/CVE-2024-210xx/CVE-2024-21068.json) (`2024-04-26T09:15:11.273`)
|
||||
- [CVE-2024-21069](CVE-2024/CVE-2024-210xx/CVE-2024-21069.json) (`2024-04-26T09:15:11.350`)
|
||||
- [CVE-2024-21085](CVE-2024/CVE-2024-210xx/CVE-2024-21085.json) (`2024-04-26T09:15:11.447`)
|
||||
- [CVE-2024-21087](CVE-2024/CVE-2024-210xx/CVE-2024-21087.json) (`2024-04-26T09:15:11.543`)
|
||||
- [CVE-2024-21094](CVE-2024/CVE-2024-210xx/CVE-2024-21094.json) (`2024-04-26T09:15:11.613`)
|
||||
- [CVE-2024-21096](CVE-2024/CVE-2024-210xx/CVE-2024-21096.json) (`2024-04-26T09:15:11.683`)
|
||||
- [CVE-2024-21101](CVE-2024/CVE-2024-211xx/CVE-2024-21101.json) (`2024-04-26T09:15:11.750`)
|
||||
- [CVE-2024-21102](CVE-2024/CVE-2024-211xx/CVE-2024-21102.json) (`2024-04-26T09:15:11.813`)
|
||||
- [CVE-2024-2312](CVE-2024/CVE-2024-23xx/CVE-2024-2312.json) (`2024-04-26T09:15:12.073`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
120
_state.csv
120
_state.csv
@ -128373,8 +128373,8 @@ CVE-2019-10187,0,0,ae4efc6a9a41fbe0d29ffdeb828add0b75008d49c7bc6c91e9a24ed88ecab
|
||||
CVE-2019-10188,0,0,a13d4ceb0f13d35aeba832a596ced2b432748762a9a8b2b493ff33e5207b061d,2020-09-30T18:05:01.380000
|
||||
CVE-2019-10189,0,0,eb169748c83adb0ad7fbaaf60d671d37009a7e6c40d15a068f3dda73779b0d70,2020-10-01T16:44:05.143000
|
||||
CVE-2019-1019,0,0,0b12b6732dc995748532289557ef7cd9235eb1cf9a7e26c1ffe53d6b8ccbf0ec,2020-08-24T17:37:01.140000
|
||||
CVE-2019-10190,0,1,bb1346d4047c63ad540479aea221fbc23d5bc608df08182b4599bac8df429675,2024-04-26T07:15:46.890000
|
||||
CVE-2019-10191,0,1,21dec4da056735722660008d63c33d3f84466d3184f4ef9a0b1a92eb8e21b013,2024-04-26T07:15:47.220000
|
||||
CVE-2019-10190,0,0,bb1346d4047c63ad540479aea221fbc23d5bc608df08182b4599bac8df429675,2024-04-26T07:15:46.890000
|
||||
CVE-2019-10191,0,0,21dec4da056735722660008d63c33d3f84466d3184f4ef9a0b1a92eb8e21b013,2024-04-26T07:15:47.220000
|
||||
CVE-2019-10192,0,0,f3dcb0c725c48d0c924ab718c861d70bda755b05d176cf095712d5438715f35c,2021-10-28T12:14:58.633000
|
||||
CVE-2019-10193,0,0,401344071bf625f34467a49523730da2f7243f818eddb9d73b2466f103fe820a,2021-10-28T12:14:51.763000
|
||||
CVE-2019-10194,0,0,b417fd7192af4bf5cb5d93fbdccf69225cff4665a2a319b30921b160866de7d1,2023-03-01T16:32:18.023000
|
||||
@ -136372,7 +136372,7 @@ CVE-2019-19328,0,0,a59eed6226128a2f18753f662e460929a2eae01faa2963309e41f09013704
|
||||
CVE-2019-19329,0,0,1a2581e92c9705766dbedb3eb4edb9189fab2e5ff8a3ebd1c8255961a5f99b0c,2019-12-18T18:13:12.107000
|
||||
CVE-2019-1933,0,0,be9658941a3a80193f3901ae9da6e79b0e089e4cb170647e0a7a38b628dcca48,2019-10-09T23:48:35.973000
|
||||
CVE-2019-19330,0,0,38f6f3c1e0ce2cfa7e603942e48095aa1c9a7754913e9d3d14517490db6f04b1,2023-11-07T03:07:37.857000
|
||||
CVE-2019-19331,0,1,23d30054eda2d3f126d2dfc066fafab123cea86021e172fa3a0246294685bafb,2024-04-26T07:15:47.327000
|
||||
CVE-2019-19331,0,0,23d30054eda2d3f126d2dfc066fafab123cea86021e172fa3a0246294685bafb,2024-04-26T07:15:47.327000
|
||||
CVE-2019-19332,0,0,c67cf1a70603b7b226bbee8afe8fc4bb03ced117f10262a0858d9196420c3ae8,2023-02-12T23:37:11
|
||||
CVE-2019-19333,0,0,a17142b3af21dbe86290257021ca41508c13b89df17226966b11722fcb0359ac,2023-11-07T03:07:38.043000
|
||||
CVE-2019-19334,0,0,38da0cd5a9492d6da306869ca26bf9e5d597ea01ab9636bf27c632f7f48be694,2023-11-07T03:07:38.133000
|
||||
@ -147488,7 +147488,7 @@ CVE-2020-1266,0,0,be568c62410ad866d9e5ce6f856285eef36527344ae35a531c0ace60bf4aa7
|
||||
CVE-2020-12662,0,0,a50202a22e5fd6ca70e2ddc132c2e601eb50d5054d053a8739f12375441ac6cf,2023-11-07T03:15:42.370000
|
||||
CVE-2020-12663,0,0,75beb77ebadaa78b84642c5f4c9f19cfe75a93733a1e1b2a433185b1f5b74682,2023-11-07T03:15:42.447000
|
||||
CVE-2020-12666,0,0,fe755727c03d8130c7fd2ed15e9ba86f693d12f15275354037125d23793eaa13,2023-11-07T03:15:42.550000
|
||||
CVE-2020-12667,0,1,fd96d32138ba34fff8302fe18c7d4480b5c7e076daa1e21a385059e1f8c882e9,2024-04-26T07:15:47.467000
|
||||
CVE-2020-12667,0,0,fd96d32138ba34fff8302fe18c7d4480b5c7e076daa1e21a385059e1f8c882e9,2024-04-26T07:15:47.467000
|
||||
CVE-2020-12668,0,0,76729c036030ac405133032ed3ea2891f1f66ef07a3eb7665de76e2610c0bcfd,2021-07-21T11:39:23.747000
|
||||
CVE-2020-12669,0,0,74ee601d98fd6ad7039430102906960989d828cf9bd6e4c06ed3d687ff46d97d,2021-07-21T11:39:23.747000
|
||||
CVE-2020-1267,0,0,05789cc17c6058015a629047859d2317dbbb98762c770905ae60901f6166798e,2021-07-21T11:39:23.747000
|
||||
@ -223432,7 +223432,7 @@ CVE-2023-32639,0,0,5a9dc0b401e1480e783ebd3f6d1222909155323292cc3c55c85aa264db66f
|
||||
CVE-2023-3264,0,0,c99d9106aaa36b20e35519e6a10f0fca32ccd3d6d1eadc97461d4558600774b0,2023-08-25T06:15:10.350000
|
||||
CVE-2023-32641,0,0,61452629ef60827dfe0112aab36e1ea82f081c8eeffba568cbbbb06b3431257d,2023-11-21T20:29:33.007000
|
||||
CVE-2023-32642,0,0,719a98d80599a68c58f789a9156c03155acb9b87132b9cddf4c2b65c16077e70,2024-02-14T15:01:51.137000
|
||||
CVE-2023-32643,0,0,aad79394dd54391c1010467928b66be776031803d7b8c222fac99d09ef62788b,2023-09-20T14:32:32.347000
|
||||
CVE-2023-32643,0,1,a1c2dd3a6ce9789dcfc494218e67b9af2d5e182965c84e78dba5f384cd16b028,2024-04-26T09:15:07.127000
|
||||
CVE-2023-32644,0,0,053df6cababdb2a9193eaa714bc5fba84791e72be4faf2e3a06f4863dd750cb0,2024-02-14T15:01:51.137000
|
||||
CVE-2023-32645,0,0,8f0ff3ec710846e254ffe7c9bdf1260cd6177f09ffe702802c13d06564a68529,2023-10-12T22:27:09.257000
|
||||
CVE-2023-32646,0,0,8a8666e5d8c745f2a8205ab201ba1d9d1ed5f8d8012e7df895ac6a0ef3dc332c,2024-02-14T15:01:51.137000
|
||||
@ -223455,7 +223455,7 @@ CVE-2023-32661,0,0,f6a5bfdc0cd8251bbdbbcac9f7eaed8996e0997cd50c3b864f7b545cb620b
|
||||
CVE-2023-32662,0,0,e6ecfd432d8093b5086df379db0b57cdf40d1685dba2c7fabe307bec0ed72a45,2023-11-21T19:41:02.917000
|
||||
CVE-2023-32663,0,0,3e7ef52ee8898923e5c75493bfae74a9e09e3258bba72eb62046ef7118b9edb7,2023-08-21T17:15:47.183000
|
||||
CVE-2023-32664,0,0,eb42d87345b4b74142e9d98b628cc63fc43d215142fe85e83066ebee2586bda4,2023-09-15T19:15:07.340000
|
||||
CVE-2023-32665,0,0,31f6fbb04d38e24ef8a8bd7c7b632bd8e055665c900cbecbc4c539e406f2b02a,2023-11-27T14:15:07.820000
|
||||
CVE-2023-32665,0,1,9ed2be48c5a7a2b745c7f5e956180148905604b496256df4241d270f55982e23,2024-04-26T09:15:07.333000
|
||||
CVE-2023-32666,0,0,9e4cb6a8ebc3b9a62bc711210afb6752a4df60b12745e2e1ba1c7436db1cb9d9,2024-04-05T09:15:08.497000
|
||||
CVE-2023-32668,0,0,6870504f63fd451347fe0c331096f1e45ff8f6811229f296b8ba61f0b4142f10,2023-05-23T17:31:45.217000
|
||||
CVE-2023-32669,0,0,0f9d4ef16e2f26deb90011f7c395852feb44144b8263c413043ff4187727c7dd,2023-10-04T21:07:05.703000
|
||||
@ -229974,7 +229974,7 @@ CVE-2023-4199,0,0,c7095e600e2e6104c16cd9da29e380b6a8276a658fe0fe7adf07a5b20c4faa
|
||||
CVE-2023-41990,0,0,4cdf41ae5457182e2854914f83e208b2b103461a48653080b69c6bc694e9ca27,2024-02-16T18:45:01.993000
|
||||
CVE-2023-41991,0,0,b9b7eeceae5fb1c749856b474c11967b1f94ed12b649a9ca87d624eb6cfcea52,2024-01-10T22:15:49.337000
|
||||
CVE-2023-41992,0,0,4eb24e92af8591fd41a5264722e8726361a4901d27ef469b051a318156e45b2b,2024-01-10T22:15:49.427000
|
||||
CVE-2023-41993,0,0,1c71cab945194fe2abbfebb0e7101c5f873ca77df6714b50e5f6dfe5c508a4e7,2024-01-31T15:15:10.337000
|
||||
CVE-2023-41993,0,1,a5ebf50a1c06468411de149019839caee6547ef2870a8a011d2945fcbedaefe1,2024-04-26T09:15:07.533000
|
||||
CVE-2023-41994,0,0,9d9ed96a7983233cac79f96192d0a87b7a85f153815c6f80ec3cd0d903fdd3d2,2024-01-12T14:42:23.890000
|
||||
CVE-2023-41995,0,0,e3cc6815d15e6c68ba1ad2369c922ee2a0d1bddabf438d7900aa1668a96a5bd0,2023-12-22T16:15:29.073000
|
||||
CVE-2023-41996,0,0,4b33e62f353d6c102117ee546f57300f74113d54fc9245a6b2d032ea8b426565,2023-12-22T22:15:07.727000
|
||||
@ -231204,7 +231204,7 @@ CVE-2023-4407,0,0,e669c07a7dc059be0bd1b4728409504c7b17834b012b01a7143b3f1fe36f2b
|
||||
CVE-2023-44075,0,0,091daf74eaaa0fe55822ff73dca545ea12eb9b3f14a99e900201c781ab527c78,2023-10-06T22:31:17.653000
|
||||
CVE-2023-44077,0,0,f742ce7317ff364032cd358a2a9b32548511e2577bc38fb124a1555161e98956,2024-02-08T01:15:26.870000
|
||||
CVE-2023-44078,0,0,e7930dc4c0042f4f50d7212b8b55ee198ca6ab0d8d9a32241fa37a7329c3fd8c,2023-11-07T04:21:33.440000
|
||||
CVE-2023-4408,0,0,17b1b9df5a6e223a554f55371a8a9204b951c6589739223148a81fde12ffbec0,2024-03-04T03:15:06.087000
|
||||
CVE-2023-4408,0,1,091b0b0d5e1cfd7b81d20015e500aa8019139679446883a80eb59aa479088f72,2024-04-26T09:15:08.727000
|
||||
CVE-2023-44080,0,0,8f44dd93ae9e021e47f3c338b063885856b0579c4a679f698c074decabf4099c,2023-10-02T20:30:36.210000
|
||||
CVE-2023-44081,0,0,e6a34f57fc1870af14fa217fa0a03c73a472924196905cf3f0227b4e0abca524,2023-10-12T00:42:21.237000
|
||||
CVE-2023-44082,0,0,4edc17f85492156b37037a4987f6e178c62e3cc7fc3d512e93a29ed66c2b97b6,2023-10-12T00:42:40.427000
|
||||
@ -231538,7 +231538,7 @@ CVE-2023-44483,0,0,abd458c39d7804f35d86c409409a0a51acd7b59d8a71577458b89521b8ca6
|
||||
CVE-2023-44484,0,0,3c607aa228a68b964b2db52548635ff25ac48c22853ba49c216d6a5c0f224f68,2024-01-02T16:15:11.687000
|
||||
CVE-2023-44485,0,0,783d43993598e52c4aa946caec4327e5b178637e838ddc90f5a0e6fb91208055,2024-01-02T16:15:11.810000
|
||||
CVE-2023-44486,0,0,69e660b2752ca15314f148c70bf76df91d277bf32edc7e9e09d8fad6284a8a31,2024-01-02T16:15:11.897000
|
||||
CVE-2023-44487,0,0,fad8e2f8b52339c0f52337af7162696b1ec76824950c9358e65e680180b1e953,2024-02-02T15:40:23.610000
|
||||
CVE-2023-44487,0,1,a1e06b612dc65a1fc6f53db74286c844420d3c0e0a1b2334299b94162e9414d3,2024-04-26T09:15:07.677000
|
||||
CVE-2023-44488,0,0,2a0e5afb897d8cb72909ca1ebb1e5285fb8773a2ddf2bff312bb80a3fab5c5ff,2023-11-16T01:37:32.350000
|
||||
CVE-2023-4449,0,0,e13401ba65778368398b487a53c2205295852d929e801d32a588cf912ffa98b1,2024-04-11T01:22:28.753000
|
||||
CVE-2023-4450,0,0,c53d8c7a7998b0ccf4c896be5ae8139e30b049b43842554fe027579d8cd1b8ac,2024-04-11T01:22:28.840000
|
||||
@ -237033,7 +237033,7 @@ CVE-2023-5675,0,0,2afc649da9f718a03c8832aa97b201cab4db6707ad961f549c65ca40d5f049
|
||||
CVE-2023-5676,0,0,c192e1317c9dd9e6e795afdc87fde3c831c86613079a468411f986e2046923eb,2023-11-22T22:39:25.137000
|
||||
CVE-2023-5677,0,0,bf0403fa11a7a963d15423f4bb38a7680c1d99fd326f3defc8c62611e429b9f6,2024-02-13T00:38:00.893000
|
||||
CVE-2023-5678,0,0,10ee8f19cb0834ae8a34613205f620c83611435a6974173b992451221b4bf83e,2023-11-30T22:15:09.723000
|
||||
CVE-2023-5679,0,0,5cd480b6cc7ccd0b2720277841d93ba4628ee4ef02ce20d34193ee4e27a8e14f,2024-03-04T03:15:06.680000
|
||||
CVE-2023-5679,0,1,dec1659e5e42ba39c76a827c151af3c27f0e229b63208f59a860838a2c78b11e,2024-04-26T09:15:08.843000
|
||||
CVE-2023-5680,0,0,214b6742640440787c304ef213658edb5018ddf74792231076d1e107b24bdb56,2024-02-13T15:16:05.223000
|
||||
CVE-2023-5681,0,0,c8515c91e7de329908b78ff5da5c4b7570295fc0bfb78f4f5768b1289e9cf5f3,2024-04-11T01:23:04.830000
|
||||
CVE-2023-5682,0,0,f6333687ab0645a1fd8953eb4ecc238bde4805dd1880c1dd8846d7fce2a7def8,2024-04-11T01:23:04.923000
|
||||
@ -237414,6 +237414,8 @@ CVE-2023-6091,0,0,c030733ef31619d8d6493175fde6228dc979143695432976718bf70837f7ad
|
||||
CVE-2023-6092,0,0,29d6c12d74742133215ae81895362e8792ffaeaedc68872f3a97584c78958e27,2023-11-14T00:15:09.117000
|
||||
CVE-2023-6093,0,0,cdcbd1e1997de9b83295e1322a460ec7a9df4b733c53160638c79ab78836ce70,2024-01-08T19:09:29.700000
|
||||
CVE-2023-6094,0,0,fe64a29ca809dd77087aaa4828738c31a5bbe16b56c0195785a6e8bedba08bc7,2024-01-09T14:55:23.847000
|
||||
CVE-2023-6095,1,1,063b9fc987ce6fe9840675b29d7e2d06898b90480af60f1ef9ea8a2cd48a95ac,2024-04-26T08:15:11.327000
|
||||
CVE-2023-6096,1,1,3d3e813c350f35059bf11b504d05992497571c882f523653d6fdadf662fb8627,2024-04-26T08:15:11.583000
|
||||
CVE-2023-6097,0,0,8f471927c0db95c9c443d2b569c30a548ccaade10ba424581756adcc75d923fc,2023-11-17T21:50:46.223000
|
||||
CVE-2023-6098,0,0,a884ea5c9cec9a8ae0c24d3946c293e66894754a64e111c1bb7e645080a0c3a7,2023-11-17T21:54:07.117000
|
||||
CVE-2023-6099,0,0,b8fe11324ada285b9d0e78e759658d2387e0ec4bc2c7d7d48f6a6a2955428aab,2024-04-11T01:23:13.680000
|
||||
@ -237431,6 +237433,7 @@ CVE-2023-6112,0,0,af49c4c4bc744bcc2ee1b4c87739ad21bf87ca007d7142e64e08afa25a9756
|
||||
CVE-2023-6113,0,0,5bd7b44ff4099818bdd115cc24760ba9d3747e7a2a042be585601a5c63a2e165,2024-01-08T19:05:26.813000
|
||||
CVE-2023-6114,0,0,3cded372d5c081c5316ad7b631bf158c1f936b766a13d127b36046c252df1206,2024-01-05T15:08:00.537000
|
||||
CVE-2023-6115,0,0,24acacd56f69c2299025b1b25e6bcea11e1bac46384e3a27a5d55fdd10bf6c5c,2023-11-14T00:15:09.233000
|
||||
CVE-2023-6116,1,1,1ca8acdcd802088f8c48fd39c5b8e3938ac5646f04a12da16ac1f84f73fa3787,2024-04-26T08:15:11.797000
|
||||
CVE-2023-6117,0,0,23ffc5f4c90a279ac244adcf67ed121b77f5bce3b75efa2fc7c1f1221d790e64,2023-11-30T04:57:56.360000
|
||||
CVE-2023-6118,0,0,185b02f0f82d3669ee7d955ce632c2e7e3f4b765df0085b453c9c70d7373b586,2023-11-30T21:03:09.543000
|
||||
CVE-2023-6119,0,0,6fa8c2bdfe58774c0eadb834ea8a4a17c61f17e55241a9e2b26790316447df0e,2023-11-29T19:32:07.657000
|
||||
@ -237443,7 +237446,7 @@ CVE-2023-6125,0,0,2e00f32201259639e50997e6e826e4503bf2e37b59d034dc77a357159a51bf
|
||||
CVE-2023-6126,0,0,d3bc6c5eab2daa7bc87b0c35afe4663a5f89789dfb523f0d366461cc962f1ba0,2023-11-17T17:59:32.487000
|
||||
CVE-2023-6127,0,0,cbc528ca6c2f4d426493b21c45c9756ec6b73a23feda062df5cd6f6147f97119,2023-11-17T17:58:50.183000
|
||||
CVE-2023-6128,0,0,18a5185c872c0195c00df7b4cefda8a4ec9e052028ee22a9430a9442f1b3e276,2023-11-17T17:46:55.197000
|
||||
CVE-2023-6129,0,0,1b080a1a26a2f3299110bfcdc61805c292589350768c30bc91a7bd92d5febdf4,2024-02-16T13:15:09.910000
|
||||
CVE-2023-6129,0,1,43e66ccf22b129c3c495ae4baed564cdbb3fc2729b1f53557763b6940f3ba104,2024-04-26T09:15:08.910000
|
||||
CVE-2023-6130,0,0,8239845a39313eacf028b2bd63492686b07fc70f3767d7058e75c10c52bfe245,2023-11-17T21:28:58.080000
|
||||
CVE-2023-6131,0,0,21c0fa6db4db155f01eda37b69f1ad685fb7a96721612d297d93f2ddfa5ed708,2023-11-17T21:28:31.490000
|
||||
CVE-2023-6132,0,0,fede4b64bb05a0d8ba325ed71575084f395f4d8796bbeae1c8737cc00109ccb1,2024-03-01T14:04:26.010000
|
||||
@ -239031,7 +239034,7 @@ CVE-2024-0841,0,0,00c1a87332bcc448f20d823e8d7d15c699f2b88301134bf45ff680384c84d2
|
||||
CVE-2024-0842,0,0,2d4febcc0a5bd3f6b5f6eeeb222e1bdadfd7499df5c95fd0f9cc7e2a10a87dbd,2024-02-15T19:11:14.253000
|
||||
CVE-2024-0844,0,0,9b0ede7ee0379ed34aa516e6f2cba464e96d05ae45278d47c03f7b0b4baaf7d5,2024-02-08T16:15:39.903000
|
||||
CVE-2024-0849,0,0,ab143b9a0b5d37d266faac9cd54f50fee666b57f962e8e1bec5db73357a455f9,2024-02-13T19:16:30.810000
|
||||
CVE-2024-0853,0,0,72eb57fa9d91eeed9b78ea6861ab48b720d6a39710ade722cce53b9624df3bc8,2024-03-07T17:15:12.657000
|
||||
CVE-2024-0853,0,1,10d2950cab7add5c8b74a387f490bd3fdcebc839d913eb1d487dd6b215cf9d3b,2024-04-26T09:15:09.023000
|
||||
CVE-2024-0854,0,0,b2a19a635a88b4ff68549abb31f11c392c07f9e329d9704350bbb3ee75810c41,2024-01-30T17:01:37.127000
|
||||
CVE-2024-0855,0,0,fee06b61accc977f963cdb2b2ef743d4f7ee62d05033c371692bc8e3d7ebf823,2024-02-27T14:20:06.637000
|
||||
CVE-2024-0856,0,0,8a983d8c50be1d3613f19eded6b95fe0d8c3112f3be2f7896b7d9e22f3aaf5cc,2024-03-20T13:00:16.367000
|
||||
@ -239274,7 +239277,7 @@ CVE-2024-1135,0,0,2f6bc90f330f2812b6ceb34e2fa1ad9c1c5eca9415bce0719ca3f92f74cd24
|
||||
CVE-2024-1136,0,0,609070256c4defa988e1113275bf8273fe15f50574e00ed3dcfde13143e471cc,2024-02-28T14:06:45.783000
|
||||
CVE-2024-1137,0,0,9f8c1cf74ca4778ab709faeea998997368a7f042480977a7d6535f2dd892d7f7,2024-03-13T12:33:51.697000
|
||||
CVE-2024-1138,0,0,0bb26866b03e9dd351d8284004467140fe2cfdfbd72af071fda864e5a2dc9e58,2024-03-13T12:33:51.697000
|
||||
CVE-2024-1139,0,0,fcb53b016a89db0029717168444fac33ac9c8268f043f5b1ef53bbb358230373,2024-04-25T17:24:59.967000
|
||||
CVE-2024-1139,0,1,7c10a081b52deeb6bf17c8aead933de0237a8edb19d8cd0f48777aa131178e29,2024-04-26T09:15:09.103000
|
||||
CVE-2024-1140,0,0,113ab98fbbd3f38fc36026b5aef44eb4b38cd7d347ba07fcabb6b9d9a69118a5,2024-02-27T19:17:32.253000
|
||||
CVE-2024-1141,0,0,2d32c65ed599159df83e8a47a1f55987e8e9877658103a494dc3a1f00162db73,2024-04-01T15:52:06.640000
|
||||
CVE-2024-1142,0,0,00d2baa79f6b61708bb1dbc0a1a3ef8f1bea10f64fa60e391934eddcb51481c3,2024-03-21T12:58:51.093000
|
||||
@ -239760,7 +239763,7 @@ CVE-2024-1749,0,0,333be4b88192e2e4c430588986a6c08bc8d18a961724558cd63d34341f9df2
|
||||
CVE-2024-1750,0,0,e3bbc65ee5131d172a658128bbf945392e55621bf205fc2f71228c3e1b5f20b2,2024-04-11T01:24:30.157000
|
||||
CVE-2024-1751,0,0,7aa616bef5e27ed13b371ce9dacd4080fc5ffa6154b1e45a0ce11f0de1f1df9e,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1752,0,0,3b691eb63c202be2eb926d4c3601a8229a1e699fd5812dcaec474adfd9c6bd05,2024-04-08T18:48:40.217000
|
||||
CVE-2024-1753,0,0,aa30df1cb172801f871eb1fa3df691669f8009710c533f5936be4b1cb4f55960,2024-04-03T02:15:07.693000
|
||||
CVE-2024-1753,0,1,d4184dde14f41b28b8c5025367fbdfec6752c2aa224d3be8e304ee89a1814ce5,2024-04-26T08:15:12.060000
|
||||
CVE-2024-1754,0,0,bb1af71458eba5bdfb6b90e382cbcddd60b96fb9bcb7aef4fa5483aa2a532c8d,2024-04-15T13:15:31.997000
|
||||
CVE-2024-1755,0,0,c4c00c2e9213cda2dc6708362bc52ae20ba1dfc3c894f2897c9375b229ad840b,2024-04-15T13:15:31.997000
|
||||
CVE-2024-1756,0,0,62e52d79aae78b309e4cd5e4ccf86fb8ee93e230c568d1d0b7a63a1cf36aba4f,2024-04-24T13:39:42.883000
|
||||
@ -239791,6 +239794,7 @@ CVE-2024-1785,0,0,876f54e758144e65bdb2dbfed145663c2de508f0271124e6075f587cf87035
|
||||
CVE-2024-1786,0,0,8d272bb934edd6ba22bea71862b8c1a4f9dd955b8b61c076d6b42c937a212ef5,2024-04-11T01:24:30.693000
|
||||
CVE-2024-1787,0,0,4146a54c8ed6fe4a4bd4ac127005b4c82b6cbf8a65b06534af23146a4cc88e7f,2024-03-20T13:00:16.367000
|
||||
CVE-2024-1788,0,0,880181e49a800669246c4d4cd32ccd361560cda70996b821fd2bf7b522fa9d8b,2024-03-04T13:15:44.523000
|
||||
CVE-2024-1789,1,1,7ef8e657f7f02a7d374125039e6483a1fa4efb90d64c9213b4900fa70beade86,2024-04-26T09:15:09.213000
|
||||
CVE-2024-1790,0,0,b8412da1a4c3f521dd650e697e4a3d85fe859c9cf5470ebe731f0a2e75023a71,2024-04-10T13:23:38.787000
|
||||
CVE-2024-1791,0,0,94b807664cc318fbe90aaeaea162bfe11604582cb7b653dcbd8bff403308918c,2024-02-28T14:06:45.783000
|
||||
CVE-2024-1792,0,0,a70c1954f887a10d02e564a2dd7108def38a57268e885b26020a4a15e640cbe4,2024-04-10T13:23:38.787000
|
||||
@ -240396,29 +240400,29 @@ CVE-2024-20989,0,0,1099698bdd22d39f9e25479c50b0efd206bf85aad553a1e3f77c7b4a07fab
|
||||
CVE-2024-20990,0,0,d40aaaae46d3a5fa8355d5298d9c8617ba7ddcfab984f3b5ca25b46a177af7b9,2024-04-17T12:48:31.863000
|
||||
CVE-2024-20991,0,0,d04ea58647934f66efbbeb3379f091486fa915d04eb4ee7cbcd83a9f8dbd19bb,2024-04-17T12:48:31.863000
|
||||
CVE-2024-20992,0,0,5c7cfd024f695fd73c7feaaec20c6f4cc8fc9e334a8defeab9c811fd17e29167,2024-04-17T12:48:31.863000
|
||||
CVE-2024-20993,0,0,72f8e8c32c6de7ef2e9788cd36709a3e68ff4a57347045317bf4d73bae761208,2024-04-17T12:48:31.863000
|
||||
CVE-2024-20994,0,0,b5f5e0a9e8a6be7fe7828caea12e7d0386e93ea7df7f0aae0e352a68a4367a32,2024-04-17T12:48:31.863000
|
||||
CVE-2024-20993,0,1,c76300dcc4585f2fd56825f1fae341382d1cd779fec3e9fb9411c2853b2830e0,2024-04-26T09:15:09.417000
|
||||
CVE-2024-20994,0,1,b3403ec5f8f7e61f7f4af0c6aace34821d061ec3c3a5defb0a1731263df52eb0,2024-04-26T09:15:09.500000
|
||||
CVE-2024-20995,0,0,b95ab7ba1796a5c7c3d8cca5a05491e5c3405546d94cafab94c4e486e52dbfc6,2024-04-17T12:48:31.863000
|
||||
CVE-2024-20997,0,0,a0562a98fec8a4ebdffc03b42c8a9bd17be145809ca03786920461d7f7935e0b,2024-04-17T12:48:31.863000
|
||||
CVE-2024-20998,0,0,96dd78d69c02e408e75ef50fd9ad7830a63a57a680fb7f8ab10cde65d262dc87,2024-04-17T12:48:31.863000
|
||||
CVE-2024-20998,0,1,85de6ffd6030cc8a221ae4016bc0c4c8c05647ac9c3e97be0058ceba11b095e5,2024-04-26T09:15:09.567000
|
||||
CVE-2024-20999,0,0,38d72c1914c2f7cd32bbca38dbf6b31d7cdb66a1301d3d4028479f0594575e11,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21000,0,0,8d2efaf2a3706f357d5510fe423a69ed1f2164d79355e1c8d99469a7ee6fc42d,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21000,0,1,b798a7a05ed2c5c61deffa53fd920f65f082fefcd1be9dcb2f05765ff755e538,2024-04-26T09:15:09.633000
|
||||
CVE-2024-21001,0,0,3ea0c4d6e032b3ca8ec16b34404a4967da44fa0d30a3f03ab34610e8d8a28c90,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21002,0,0,ae6bee545c68a7d8988256c0575d1ace87a5c7a690da7a83a89f0ecd8a6f25a8,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21003,0,0,19e5512e083323b4346eb914dae95d1df35c630e6cd102f5b2d783e1c651871f,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21004,0,0,a403b0423950f749e2642568ca13532dbbfccd822f14e940da0d7ee2e2d24f29,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21005,0,0,8f177a15ee6ad4a78a1d4009e3187651c8eac8438be37604962afc63c73254f1,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21002,0,1,912079d25edc735374135830d5e38e11308fc296dc1524a0614b28b00ea75838,2024-04-26T09:15:09.700000
|
||||
CVE-2024-21003,0,1,2c71360234bbd88e8e1ffe30dd6c2d57548d38b1fc1ad2177acf6fe245551297,2024-04-26T09:15:09.823000
|
||||
CVE-2024-21004,0,1,9c8d18a475fd16283e8e319d765bd94c58704b78df42c7bd6a9b9793fec706a8,2024-04-26T09:15:09.933000
|
||||
CVE-2024-21005,0,1,0242b6ef89ff4f42964dcb9c191790e8b5db8cf4176ffe3303956ff8a5e8f568,2024-04-26T09:15:10.030000
|
||||
CVE-2024-21006,0,0,24276fa121e200514fbab563a229066611a958ddf026b368bb42bffc3d6d1536,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21007,0,0,5e79b59d23f74227973014469c9c006292d5a48a207617d864ea85e415e8727f,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21008,0,0,1f74aa2bfb98889c1bed8925030ffa9517c511fc8005172f7be9db4e39a2d548,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21009,0,0,af97e37904620b744b697a7c41a38f3bc0333ea61492fd7779760f5a79950296,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21008,0,1,180cac58dafa1a6df58140c22b0eca553c92b315a62e4ef184cd9f39162279ed,2024-04-26T09:15:10.100000
|
||||
CVE-2024-21009,0,1,18229ce1f393c1090ccc124960e638f3e12f15d4c4376268b2d606e28dd897cc,2024-04-26T09:15:10.177000
|
||||
CVE-2024-2101,0,0,c8a12667f3958d332efb261f4cb3c420df5b094482122aff9dbb41fd78e244db,2024-04-17T12:48:07.510000
|
||||
CVE-2024-21010,0,0,0583ed22b473d6988a741927f390c519f270906aef73a2591d45e4735fe791d0,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21011,0,0,8f8c368ee3f30b65341b77ece082caabad559cb8815d7702ed7d6231b225272a,2024-04-22T15:15:47.380000
|
||||
CVE-2024-21012,0,0,efcc536381b894205d2c997792afa24e2ccb5279bf98472cbea3d0304933b6da,2024-04-22T15:15:47.473000
|
||||
CVE-2024-21013,0,0,db21600de0498200b832ed44aabc58eb8b49c1d4a8d6c8cec7db7074ddb629ed,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21011,0,1,e51db7fcde12c70e147c567049e27d3541f52ee809a17a8d7464122ff2dfd216,2024-04-26T09:15:10.240000
|
||||
CVE-2024-21012,0,1,1ba8160029b175c6622d869a0e69ea4e7de662e09959c9853286e890342c833a,2024-04-26T09:15:10.307000
|
||||
CVE-2024-21013,0,1,6e30c4aa1baa0b00a8e15e0b9f7d28d136b57f26f5cb2d1ad7669cc31adc0e9e,2024-04-26T09:15:10.370000
|
||||
CVE-2024-21014,0,0,b080b2efe5f2fb3649d836e7607fe2a15a5965b7e113573ba21bc7eaa39a2434,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21015,0,0,f3158fa1ebc013f3ee7e3704ac259afbfadb34d45c753fdc5d90a070e709ed84,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21015,0,1,ea5567f1cbb685bc8fbac0a611486dcc7ac0c356f4ef23cb3183c111dd29bcc0,2024-04-26T09:15:10.440000
|
||||
CVE-2024-21016,0,0,4c3ad5a49669763de2f73fce64666f049b86c2fb193497660cf9decc483339c2,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21017,0,0,4ec8c4a0bbf41e6c3c752fb69bf253b045b4bb72205aa58b04c616812b4b7dd3,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21018,0,0,e0675cd160267d9376d85a38011a6863fae1399733907b8655543ea315aa93bd,2024-04-17T12:48:31.863000
|
||||
@ -240452,30 +240456,30 @@ CVE-2024-21043,0,0,dc53e5b2fe828c248a1b79bd90c649b6e9d473f8d2bf850bfa71770b33e88
|
||||
CVE-2024-21044,0,0,f5f0129664ed5d5f4ef6ba4b8ff7227550db0957efcbf9e27471a8341fd1353e,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21045,0,0,a3c2b9878bba51820c773e32fc44034cb31f47d9579db1ed3eeab399c07f1a9b,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21046,0,0,13af5418e2a34ce6167e6ab981ecad17f165025d8704a841301a1fba4468c0ed,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21047,0,0,e38834140f8b944f78da6f6fb25c51da4f3a85fda323ca934705e923232f602b,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21047,0,1,918119a0efff6c685604ffe2d05dc98f5b40aca5161da05c5aad375bc55a7bf6,2024-04-26T09:15:10.500000
|
||||
CVE-2024-21048,0,0,7c4ad44b360736f7e8a0910dcc5802fde181125afe297ec3d8d4f833b676c612,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21049,0,0,a1a753910647db623bcbefc6825cfaa0c33250a562818f48ec3b04c902de88ac,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21050,0,0,5d6aa75fa7939279ac58d6386d2cf96ad09d2acdb11fa94832c977805deb1587,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21051,0,0,e8001505ef0efbc2904b6cdd5f70dd1420d4bc0e604e77665b6146e96fd3836d,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21052,0,0,5bcd819f0c7d0779ca8508bd66b5e1f8037dd3c8d550bc7fa5fcdb35e1167703,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21053,0,0,5f3690c8b6394d324badf842cd9e0ac255e25fec8acb1e50c6fcc7a9b443ad7f,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21054,0,0,9ea8b742b5c841e05e78c0f7da0539d289cc401f142cc054e2b7bd87d6c84312,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21055,0,0,065746b7f94228f556df7cfe20a9a0f30b84537f8d3d78b9c4dc219e027bbaef,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21056,0,0,d05743f80d00bccaeee3cbbe1aa70b0a119dd03c55418635ce7a218b4cf85a36,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21049,0,1,7054a195f3429edd9476cd9dfa40257598e09d87ccf8f54b2b49bb0bfb4da7d4,2024-04-26T09:15:10.567000
|
||||
CVE-2024-21050,0,1,f98fec72eb6309b4b34ce86a8c3fc1af06635e46cd1cd5c3eb0a8d6c20caca8c,2024-04-26T09:15:10.637000
|
||||
CVE-2024-21051,0,1,730cfd973bf7091010cd7d085d104e60aabba29ee2a6c8c244aff9d1cbbed2ab,2024-04-26T09:15:10.703000
|
||||
CVE-2024-21052,0,1,8fcaea640b31493e5de3c6ccb4ebeb658571630df3fef65a5175d6e228e8694b,2024-04-26T09:15:10.767000
|
||||
CVE-2024-21053,0,1,c2c0a8c5dcab83286aca7e7963eac42e47eb420c2e3d2a667e93e64c217a6979,2024-04-26T09:15:10.830000
|
||||
CVE-2024-21054,0,1,e24c12fb30efee61e27276f118ec633c2f2181c3cc815f52a626e859d3b61ead,2024-04-26T09:15:10.893000
|
||||
CVE-2024-21055,0,1,2df92d5c8d1855c6d37c903263abdc53486ae44cb92f073c6ae1754af77b63df,2024-04-26T09:15:10.953000
|
||||
CVE-2024-21056,0,1,579cbfc70c1c9aab939983ee7e32b20bd0bb975794ba9eef2d4101c6cd0ec5ba,2024-04-26T09:15:11.017000
|
||||
CVE-2024-21057,0,0,ad7960b918cba84a9285e5b5081ac7265ed8f95ac167f4cd8446241a852a140e,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21058,0,0,eae646366535f64911b6f5c11cf05f1d61655fe725482e333195d91352108784,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21059,0,0,d0601741f771540671417f30cde21017e42f48bcbaa909a0b589bd2b89204ba5,2024-04-17T12:48:31.863000
|
||||
CVE-2024-2106,0,0,15de6b929ace188c18cf26b3c461a92f15449ebc8c35903dbddfc1b7b27db756,2024-03-13T18:15:58.530000
|
||||
CVE-2024-21060,0,0,3adc5db380329c2a5b56a0c3ebde28cdf3b61ed34fa861ceee80c7f5142f8a31,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21061,0,0,51d92b8ebe655e1b6b499d0a31b659c7a916e5d7eef7efc3eaec50f44827a983,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21062,0,0,618793b1d7cdd6ec2f7aab886d0b30fabcf867ba7b496e9d9f123669957cc7d3,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21060,0,1,b942e5dad21401bfd1ddb5c1762fba0f27820544c03df6084d9db3684eef12f2,2024-04-26T09:15:11.080000
|
||||
CVE-2024-21061,0,1,c067c76274d3dd0d768c412c439a785c45be17779bda9b8868cf83195c350110,2024-04-26T09:15:11.143000
|
||||
CVE-2024-21062,0,1,8c99a8a390e279e41608a032223c81c88432586b692c9bfab98f514db375d2e0,2024-04-26T09:15:11.213000
|
||||
CVE-2024-21063,0,0,00386ec9dcc1fb2e461a93486ecd091af48c62d800497f6a70a354e04b74b45f,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21064,0,0,9f3d1dcc2da77fdbd8284a8907c4fea172ce50f42d0e165f15cd0a1ff6590ae3,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21065,0,0,5c383c00c861b9299dc3d8d083a6c7b2ef320b710a4f76187481f80141c2960a,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21066,0,0,de5f164f54f519fa892c56099d5df7cc21033da5ed96c3454d6c06c478b93607,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21067,0,0,a54cc3b06c3985193c6346b3dbabf214dd2faeed68c1d4b7f9a909ecc6ea6d17,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21068,0,0,90b056284ac67c84f3312caa17843414162f46147b609efb3ab8bcab9df91c74,2024-04-22T15:15:47.540000
|
||||
CVE-2024-21069,0,0,1356f0035f59f4ebe3cabf5fb137a1d458f1cefbb702a427e5d48bbf638d91b4,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21068,0,1,925ab1df7b4fc7b2307589563b56953da02ae712410669caebdddd5ebcb570bd,2024-04-26T09:15:11.273000
|
||||
CVE-2024-21069,0,1,87d696eca5e17159ac8157bf45da621592d6c3e7efa7c60a73c51b2eb6a682a6,2024-04-26T09:15:11.350000
|
||||
CVE-2024-2107,0,0,b116f601239eee1477d732dcdf4bd402d2ca5c711c20a89df0a8e9dd54cd4cd1,2024-03-13T12:33:51.697000
|
||||
CVE-2024-21070,0,0,e8030e5c2290cb4930c1b97772fc5cd61f6499852535f41c7c876dacccf80408,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21071,0,0,03289049dae9db581ba288f8404b2ec6bffda8d448aa4ca077c7b01898c361e5,2024-04-17T12:48:31.863000
|
||||
@ -240493,25 +240497,25 @@ CVE-2024-21081,0,0,8525b7c574e97940ea59e5c3f9b60a1dccb8ad8d7a8590b7c7a54ff25a5e4
|
||||
CVE-2024-21082,0,0,c26bfca8435f62f7a91a96e3ea3770988e364ed37b65c6e9e3c3fa331f2f9538,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21083,0,0,1bebe608617a7b6c263f2bd12f08aa2fed726df83e43e9cb80226396336525ef,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21084,0,0,1cb8a741188b441a8430ab8dada3a0d4db99599bc63794a25c2cddb40535089e,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21085,0,0,7423bef7d293723948e7f7692336a4c4f435c8fc76c92741a8460985a7e7c3fc,2024-04-22T15:15:47.610000
|
||||
CVE-2024-21085,0,1,0058a664b0df21c244c1d472b5e2011b273e74051e0bea775e1fbfbea1bb74a2,2024-04-26T09:15:11.447000
|
||||
CVE-2024-21086,0,0,6225dbda94f0cf6447c5470d5f742e2b6c9860df4608d2672fbec36d7710ddae,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21087,0,0,a583c55d3bff66d9e8b3ea3e82126959d82631d9ebff26ed8c89dc44f6423327,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21087,0,1,f8237848d938fc88482015bdb3b6d1a78dccab6ea7842d043b863cb9cebae2ad,2024-04-26T09:15:11.543000
|
||||
CVE-2024-21088,0,0,0b47b6e6f749e55fe17c53a0cff2705786e752e1ca3d888cedabbece54b4b377,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21089,0,0,7ae0e2f140ca265b5d64456eb374dbc3af60cb417339d84d08e68381e3cd98b4,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21090,0,0,60f046f0a9c5304d80718309bd3f85c9cf0c6185072eb892eff16f11c4191497,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21091,0,0,44e6366ed6ec2fbfb62bb3aa882742738c04c1e25886d4262fb2f0c2b7a75b22,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21092,0,0,a96f28afb2f79eb08be708f78284cdf08500da8888a0d9699ed9e4b0d6e8e593,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21093,0,0,3d565421d62fe80376ef2125e9dfb06fdc2a836fda042dda6ad1a1534f2a4f7d,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21094,0,0,aa2a61960fd4fa521e8a1ca2553d138d7964c870b77a3be8a092c2a795bdfda4,2024-04-22T15:15:47.683000
|
||||
CVE-2024-21094,0,1,45dda780f642e6a4bed8a6906d75e79d99e2cd6f95b5c06d841ff6133c98a162,2024-04-26T09:15:11.613000
|
||||
CVE-2024-21095,0,0,5ad9583e4e50b36f664407f6f6164a53dc891483d679c27c4541f930caca17b4,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21096,0,0,ca67a44a0e0eaa923750522145c8947551bcd426be3766e54dffcdf25890c9ef,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21096,0,1,4f32780ae5e28458f2ccddfae5bcad756026bb0de4afeda793309b07a06d714f,2024-04-26T09:15:11.683000
|
||||
CVE-2024-21097,0,0,8349406a296787533db135239586ab1e354af73ee7e59b17b17098f82af1b697,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21098,0,0,831ff7ad8d2c7af64e56d89acbf46d4cc91ab5d8748a94e6b6ad4c192afd1308,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21099,0,0,a8cfc88916a19c4050e2f5c67f5f573e697d20587d6396cec4852563c2a2b6c3,2024-04-17T12:48:31.863000
|
||||
CVE-2024-2110,0,0,1d85de629a97570a97242f5d089550bba2e60a5923838c39c1151e294a5fdcf3,2024-03-28T12:42:56.150000
|
||||
CVE-2024-21100,0,0,af6cffb0e0f6aae56d794497f70f97e4a84ef698b88ffe8d33577d53eb93d579,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21101,0,0,1f9e2a6fad8918e7ac06fa980975da063ccfd0f3a92fff652ef36f600383191d,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21102,0,0,ac72369f1d359c6a6f900c9810273301debf5573205b12f9d3a5703ac9e97a78,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21101,0,1,0211a2aa9549834c29504b837c60e0f78abe166f7178dde571f87f6dba739e23,2024-04-26T09:15:11.750000
|
||||
CVE-2024-21102,0,1,77bd9ccd93d37b7215a3cbfb08f0ebda21e1d1a7ad6e291d055f22aa80163473,2024-04-26T09:15:11.813000
|
||||
CVE-2024-21103,0,0,da07604f216fc47762cc3558419009b27ee70b9a7579c84b768140ec3056e0d7,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21104,0,0,7d7c80407ef04bc733a3eeb547cb035ca30c1fc982a790df18c6a46533ef0669,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21105,0,0,c58e4dcf9abc945e03aaff2ad3b2c6e3c65a1dc3c33e82bc37b3e354bdcfdfbc,2024-04-17T12:48:31.863000
|
||||
@ -241010,6 +241014,7 @@ CVE-2024-22086,0,0,caac68f21275279653fa2eac0d4515b609803b0b74511cc0ca396756f082c
|
||||
CVE-2024-22087,0,0,3bed8292ec524894fc0b4fe8dc2027c662afaeeff7b4dbd00214d4fc1b7ce8b4,2024-01-11T17:03:51.967000
|
||||
CVE-2024-22088,0,0,754170cc6c96efa135c7c7667ac8c5d4d79d7cd2abcaaf938446792b9a2bc8b8,2024-01-10T20:05:19.737000
|
||||
CVE-2024-2209,0,0,eeaa5baaa32a49eda6878a59f2ebb6696131e5d9ac6771a3c4e8da4f915f93d8,2024-03-27T12:29:30.307000
|
||||
CVE-2024-22091,1,1,0ccaa7159e772c2ba1bc028c933a09529def018166ae7ea09a94bd3354c7f0ef,2024-04-26T09:15:11.880000
|
||||
CVE-2024-22092,0,0,35cd11c9c07a47737b4e29cb95e656383a3704154bd1a4578e67800eda161eb7,2024-04-02T12:50:42.233000
|
||||
CVE-2024-22093,0,0,b7c449b9319413a66024fe7dcdb8bf0035d00dbeef636282eb761ad13794295d,2024-02-14T18:04:45.380000
|
||||
CVE-2024-22096,0,0,330d7fb3350f034a1e0c8805b47a2db6dbe2ceb88846f9ddfaaa7c652ddde766,2024-02-07T17:33:26.800000
|
||||
@ -241509,7 +241514,7 @@ CVE-2024-23116,0,0,c69470152165ed3c6f07842580a9d276db25fe5e384880b4a7931b780caf1
|
||||
CVE-2024-23117,0,0,879d7d05d3f28235be6d3551861450f70c4e2f56b92f39afe7f23938cb7730c9,2024-04-02T12:50:42.233000
|
||||
CVE-2024-23118,0,0,2a710ffc24b98413c0e2df0c0c64682e3878440889d1038072b49d9104f7509a,2024-04-02T12:50:42.233000
|
||||
CVE-2024-23119,0,0,dc7a02dfe6c2319112aa9c9c7ba24d29c0a54406c32b5bc7828bc06ecc1e505b,2024-04-02T12:50:42.233000
|
||||
CVE-2024-2312,0,0,67b34d6f82234370a21d304a50f41d547c6298b6b869842388e8a3a4f564b2a2,2024-04-08T18:49:25.863000
|
||||
CVE-2024-2312,0,1,b61108ae65321d61a758b0c732ce308a7e62bd5c3710897745a7af4ce6324077,2024-04-26T09:15:12.073000
|
||||
CVE-2024-23120,0,0,1fdd5384a3247451b572eec50acc63b80f4302d338e02a15db81dbcc92866844,2024-03-01T16:15:45.920000
|
||||
CVE-2024-23121,0,0,ae89a79fcf6c313d61197ac6f338d68b00711a8ed1e7b84e5d9691d517b9b085,2024-03-13T03:15:06.320000
|
||||
CVE-2024-23122,0,0,53a6a7f808f40f9f8ccc6c9426a05387fb59e2867d6b512f9c97f02c17acdf90,2024-03-13T03:15:06.390000
|
||||
@ -244773,6 +244778,7 @@ CVE-2024-29195,0,0,12b6fcead703f320c2faaa3dbf933701901e834c51cbd479cd70a3447afc3
|
||||
CVE-2024-29196,0,0,e02aa4919ed0d6b8af5e1fbc5257465a64fdae2f23d9b9aaabfbc3da2c0d39fa,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29197,0,0,858dd1bb84d1ebe6698f05d7dcbe5bf56e67ebea01a2e217e45dddfd661a75cd,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29199,0,0,78313b772930e0d3c119e70c910c05a3509fc574028745b1b9c80a0f992c34f5,2024-03-26T12:55:05.010000
|
||||
CVE-2024-2920,1,1,8410dfc9e792ac7aff7b47f65d4740a258b943ed52abd67da927c900d6eaabb1,2024-04-26T08:15:12.203000
|
||||
CVE-2024-29200,0,0,2fded465a0d157f739ca7c28831045e810d35e1ed39056bf30a71fa62dc84b9e,2024-03-28T16:07:30.893000
|
||||
CVE-2024-29201,0,0,5033916f5c6e37ebfb2f1925ef22415c52e7214153fce901347173dc9b9eb9c1,2024-04-01T01:12:59.077000
|
||||
CVE-2024-29202,0,0,2407457fd23b926dc515687b0bc64391303eb3a1899c8635138115822d2488d1,2024-04-01T01:12:59.077000
|
||||
@ -246061,6 +246067,7 @@ CVE-2024-32039,0,0,ad4990c66c843cfb78c18ddf4863c9df097d3c92a62d93c490b95501745f6
|
||||
CVE-2024-3204,0,0,2a2a133d829052d72380a6f7a45e32f6ecd96ec6da65fdbadcbe92a1f79d774f,2024-04-11T01:25:55.933000
|
||||
CVE-2024-32040,0,0,c9e8a9bafebd4e002463be520ee967b3c928ddf4cec6865e7aa23fa1d81b2834,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32041,0,0,e88f61c8c702a5d00724562a1be23c2ca0fc9ec03e84f95db2dfed035982cfb4,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32046,1,1,fe58d32837688e75837a3054b1a147db2781db55145575b7901479b793653292,2024-04-26T09:15:12.157000
|
||||
CVE-2024-3205,0,0,befb48df2bb5e20af3b4383c1ef82865b9f9fb3145e096ffb7e0098ff096b4f8,2024-04-11T01:25:56.010000
|
||||
CVE-2024-32051,0,0,6b68078466255ceca82525e73c2bf321431fb4aeacd1939a9b40ac3cfa9637f8,2024-04-24T13:39:42.883000
|
||||
CVE-2024-3207,0,0,a57734da301192d6a9381ac71eef9bc84e6acf70886d5628a9c0939255320fc2,2024-04-11T01:25:56.090000
|
||||
@ -246518,12 +246525,18 @@ CVE-2024-3357,0,0,4504c33b3bb653378795a255a83c05295c4cb93d37914e6c8a1edf8397686b
|
||||
CVE-2024-3358,0,0,694a0960c89fb254bc37c7c2f594e5cb197e9c3b955cd9433f44c414aff75d2b,2024-04-11T01:25:59.610000
|
||||
CVE-2024-3359,0,0,a779b2e33399e3789113d39f065b1425ad824801b217abc54417c2cce7e7d2db,2024-04-11T01:25:59.687000
|
||||
CVE-2024-33592,0,0,dc3e0d94cd47d0ea73220517b5aaa098a37fe316a3d5e3b0ef33e4a8423b62af,2024-04-25T17:25:05.903000
|
||||
CVE-2024-33598,1,1,3f9b63fd5124b3c4c33e063e0bc809f5770244ad29d1368cbc67d28d0eff4352,2024-04-26T08:15:12.370000
|
||||
CVE-2024-3360,0,0,2ffbaa301c04a2d62013f221bb69a21a0f4034a97959f93c6ac130d96a9162d3,2024-04-11T01:25:59.770000
|
||||
CVE-2024-3361,0,0,c120caf4947180a69c26140d9354a0af916b072bcc15573944dc923bbf223f7d,2024-04-11T01:25:59.847000
|
||||
CVE-2024-3362,0,0,4f698660b915c64322658e8738d0fb3f09460cf98fd487b3189e8f9d96e2b2c1,2024-04-11T01:25:59.930000
|
||||
CVE-2024-3363,0,0,f5bcc8af5a66d22a73abe7e86b636154362f284983c790b03385b20aa4737ceb,2024-04-11T01:26:00.010000
|
||||
CVE-2024-33638,1,1,4e4f1e7644790a0bfb1dc4da745aa7ec35a8ca20f79185e32f06b55784b91e6f,2024-04-26T08:15:12.567000
|
||||
CVE-2024-33639,1,1,0ce27d3d156ecf7b594497a0ac3f7803d7ff916273e6dd4248564f0211c61924,2024-04-26T08:15:12.770000
|
||||
CVE-2024-3364,0,0,2986dc00429f74e0e2572cb8153933c26e825f7eed092370bca7e4ac84ee4fdf,2024-04-11T01:26:00.090000
|
||||
CVE-2024-33642,1,1,3b3f2c46d58606960c2d108729a638055dbf60cf4d2ac19fcde69ec4bdc6a06b,2024-04-26T08:15:12.977000
|
||||
CVE-2024-3365,0,0,64a2e531185071bb7e6b7a9cf067546b0c6c5f700f703a6639ecd4e081a3dcb7,2024-04-11T01:26:00.170000
|
||||
CVE-2024-33650,1,1,92b9aa1b09034ce03c5077674003b0f884ebf6a849f1826bf0e8ef3ac4dad11f,2024-04-26T08:15:13.163000
|
||||
CVE-2024-33651,1,1,c97ae072fa5b5756d7760eb457507d14e160cfdb7ae29d2d655972fdde3a6aff,2024-04-26T08:15:13.370000
|
||||
CVE-2024-3366,0,0,641beaaa3f9fd7d2de3006c0b03aadadafd130dcdab91419774c604b06cf9b30,2024-04-11T01:26:00.240000
|
||||
CVE-2024-33661,0,0,a720540c11f666fd8c4f23d288d75213cf5be306e2228f0ae43d82ff0de97bc0,2024-04-26T00:15:08.953000
|
||||
CVE-2024-33663,0,0,eaf65d2ce8cdafafc60192a1bafd6c646cef2a9e6415fd9da4ad3cf341b6fb24,2024-04-26T00:15:09.010000
|
||||
@ -246660,6 +246673,7 @@ CVE-2024-3662,0,0,aac492e0cb08799a7f888c46af5bedb595fa2e9ad6dc15c21be50e9dae7006
|
||||
CVE-2024-3664,0,0,afb9452532a9b46276f3e123567931f2d9b14afd62c66b887c9d751f65c725bc,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3665,0,0,22dbbd6c0bec2b9f433688ae97b549cd541e7f2d387c3796dd32246c851476cf,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3672,0,0,b7de207aaf40bb160711ae23312b83bd4f3d950fbf99cf282ee38b1e3854739f,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3678,1,1,6d5eb93d93cadfb495b170883a8b5b26f4360513ec85acc8b5229fc0058301f9,2024-04-26T08:15:13.567000
|
||||
CVE-2024-3684,0,0,693360cd268d4b961448865406a570238e347409fa389434d499b6fc0f790dc0,2024-04-19T16:19:49.043000
|
||||
CVE-2024-3685,0,0,2d04d41485feb8a52bd1142022b18bc3f24805efb219d419e0508c4773991260,2024-04-15T13:15:51.577000
|
||||
CVE-2024-3686,0,0,811bcae5db0f32a24e5b10c51fcb2c5c47ac8ca123d5e8befb2d943ee92f7589,2024-04-15T13:15:51.577000
|
||||
@ -246764,6 +246778,7 @@ CVE-2024-3880,0,0,237e3bb93a0b113a1c50538806f68b5377561349bd4f47a9139ec72cd35641
|
||||
CVE-2024-3881,0,0,9055ecf63e1aedc7e2787afc56e67bc831564d5ee15f418ef1b408c81c24bb16,2024-04-17T12:48:31.863000
|
||||
CVE-2024-3882,0,0,846c922d5cf92347db05da515dc041ccc83bdcd548fefc386c188946857d0db7,2024-04-17T12:48:31.863000
|
||||
CVE-2024-3889,0,0,c4039354ee4d81ce5faec2ce618c8f0af30c97c1ad1feeb689836cb585b438a6,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3890,1,1,933fd852998a68d1f6b06f4cb4253693cd03f3c6092eccc0e302f52938d20f9f,2024-04-26T08:15:13.773000
|
||||
CVE-2024-3893,0,0,44a15b07d473e504956c2fc6e9bdbbb981ef84a8f1b69c702ee1ea4228dd1195,2024-04-25T13:18:13.537000
|
||||
CVE-2024-3900,0,0,5bafaa90d65e26f460054cb65a089d31ecb0030e0f85c3f0ee595a0cce123691,2024-04-17T20:08:21.887000
|
||||
CVE-2024-3905,0,0,666ba6ab36ae43f19518f88ffcc3dc3578e7336eef9fa01b067c40b574dea570,2024-04-17T12:48:07.510000
|
||||
@ -246779,6 +246794,7 @@ CVE-2024-3929,0,0,31d0a734bfd88727a2a61deb7a29595ac9c8ac4a930ee35c31639990489d02
|
||||
CVE-2024-3931,0,0,adc8a79b07f48b35a9681a97a568e852ba1ef2cbd3b7271f585750c2d2c4216b,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3932,0,0,bce0f8b09e2fc4acc0cfce5940d57ce5f1e0384ac19f6c68ed218175688d8f12,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3948,0,0,427154a0226db385c08a1dc567a28e238ab290a5825189b73e5e958b25b296e5,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3962,1,1,5c615e9897bcbd9f054de5357a3d10fd7f2f15096f7a2d99bafd8a866c72bc8e,2024-04-26T09:15:12.337000
|
||||
CVE-2024-3979,0,0,9ef752ac5397ef4280bc4d9888fb417cb985331164bf90affafa759f391a2bfe,2024-04-19T18:29:53.040000
|
||||
CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000
|
||||
CVE-2024-3994,0,0,b2b5b0b0c4c4fea2326dd93e55a0fe437a44bb4fcb47799868e54f8400b49891,2024-04-25T13:18:02.660000
|
||||
@ -246795,7 +246811,7 @@ CVE-2024-4026,0,0,65bff2dba626fde0f88488c1e6df610a37e761e2e041855587a3bbcb3e849c
|
||||
CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000
|
||||
CVE-2024-4035,0,0,c5a100809c68e4eb6a9b717e4eec2ebc0eca46983cf9d752b9f7c4bddb880732,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4040,0,0,a0c74dcbb8003f53cf76254ffa1dd71c6614e1d71772e98a05f6c7cb5372cc75,2024-04-26T01:00:01.587000
|
||||
CVE-2024-4056,1,1,0e8abea95116ef4fcaf49d76f76e892288e09a2762b021ff80c2a05fe9016ece,2024-04-26T06:15:06.610000
|
||||
CVE-2024-4056,0,0,0e8abea95116ef4fcaf49d76f76e892288e09a2762b021ff80c2a05fe9016ece,2024-04-26T06:15:06.610000
|
||||
CVE-2024-4062,0,0,00e701b26925636f4b147891efd3607d8441f5743e72ff31df8ffeb1293615e9,2024-04-24T13:39:42.883000
|
||||
CVE-2024-4063,0,0,45ec0afed63b6cdcc64eb9b7f37753004f82dbe9793a74b35da8bcfe5ff1c982,2024-04-24T13:39:42.883000
|
||||
CVE-2024-4064,0,0,700737c89c3d95dc4345be318b6f65da5b04cbacf0da44f1e91682579e7a15b3,2024-04-24T13:39:42.883000
|
||||
@ -246843,3 +246859,7 @@ CVE-2024-4172,0,0,74935923348139a33a5ec86dfba1caf328eac5abe35bcbc7775440df01ee84
|
||||
CVE-2024-4173,0,0,806a08191dc2b624e0ee02a7be11ce6c5ceee33617f7b3eb9464afb5420bb62b,2024-04-25T23:15:47.240000
|
||||
CVE-2024-4174,0,0,8165b92f84043201b67993ccc68eb94f9c51d9c6b32fc95aff490860d26962cf,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4175,0,0,17322bbbd4155ded1e9cb395a3c60d3f922650a6043102cb41ba3b81f581a395,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4182,1,1,4dfc94f0ffa2b6a4213efe93241e3a5df76b05f6fe80bd19904d7872f105409b,2024-04-26T09:15:12.523000
|
||||
CVE-2024-4183,1,1,be11ae4b2fab81e7fd11e32b9b5a199a61aa1f37c528a8b1c46bbec98d9dc643,2024-04-26T09:15:12.717000
|
||||
CVE-2024-4195,1,1,fac1853799892f9a8ca0ff4bd37d4fb83107570b979ad94f080c84c1bc9a42fb,2024-04-26T09:15:12.897000
|
||||
CVE-2024-4198,1,1,8c63284311f6661f84f943baba2393e9df632e4831ae1d83e08404c40b1cfd9a,2024-04-26T09:15:13.097000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user