mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-04-23T22:00:37.926836+00:00
This commit is contained in:
parent
bd82966a1a
commit
879f679529
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-30007",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-05-17T16:15:09.217",
|
||||
"lastModified": "2022-05-26T00:39:25.050",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-04-23T20:15:07.160",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -93,6 +93,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZackSecurity/VulnerReport/blob/cve/gxcms/1.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/breezety/gxcms15/issues/1",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-22638",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-25T21:15:09.470",
|
||||
"lastModified": "2024-01-29T15:57:43.763",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-04-23T20:15:07.290",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "liveSite v2019.1 was discovered to contain a remote code execution (RCE) vulenrabiity via the component /livesite/edit_designer_region.php."
|
||||
"value": "liveSite v2019.1 was discovered to contain a remote code execution (RCE) vulenrabiity via the component /livesite/edit_designer_region.php or /livesite/add_email_campaign.php."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -76,6 +76,10 @@
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/51936",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-2919",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-04T03:15:06.413",
|
||||
"lastModified": "2024-04-04T12:48:41.700",
|
||||
"lastModified": "2024-04-23T21:15:48.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Gutenberg Blocks by Kadence Blocks \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Countdown and CountUp Widget in all versions up to, and including, 3.2.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
"value": "The Gutenberg Blocks by Kadence Blocks \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the CountUp Widget in all versions up to, and including, 3.2.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -39,10 +39,6 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3062911/kadence-blocks/trunk/includes/assets/js/kb-countdown.min.js",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3062911/kadence-blocks/trunk/includes/assets/js/kb-countup.min.js",
|
||||
"source": "security@wordfence.com"
|
||||
|
63
CVE-2024/CVE-2024-326xx/CVE-2024-32659.json
Normal file
63
CVE-2024/CVE-2024-326xx/CVE-2024-32659.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-32659",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-23T20:15:07.407",
|
||||
"lastModified": "2024-04-23T20:15:07.407",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read if `((nWidth == 0) and (nHeight == 0))`. Version 3.5.1 contains a patch for the issue. No known workarounds are available."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/FreeRDP/FreeRDP/commit/6430945ce003a5e24d454d8566f54aae1b6b617b",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8jgr-7r33-x87w",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://oss-fuzz.com/testcase-detail/6156779722440704",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-326xx/CVE-2024-32660.json
Normal file
63
CVE-2024/CVE-2024-326xx/CVE-2024-32660.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-32660",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-23T20:15:07.617",
|
||||
"lastModified": "2024-04-23T20:15:07.617",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.5.1, a malicious server can crash the FreeRDP client by sending invalid huge allocation size. Version 3.5.1 contains a patch for the issue. No known workarounds are available."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/FreeRDP/FreeRDP/commit/5e5d27cf310e4c10b854be7667bfb7a5d774eb47",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxv6-2cw6-m3mx",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://oss-fuzz.com/testcase-detail/5559242514825216",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-326xx/CVE-2024-32661.json
Normal file
59
CVE-2024/CVE-2024-326xx/CVE-2024-32661.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-32661",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-23T20:15:07.800",
|
||||
"lastModified": "2024-04-23T20:15:07.800",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to a possible `NULL` access and crash. Version 3.5.1 contains a patch for the issue. No known workarounds are available."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/FreeRDP/FreeRDP/commit/71e463e31b4d69f4022d36bfc814592f56600793",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-p5m5-342g-pv9m",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-326xx/CVE-2024-32662.json
Normal file
63
CVE-2024/CVE-2024-326xx/CVE-2024-32662.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-32662",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-23T21:15:48.200",
|
||||
"lastModified": "2024-04-23T21:15:48.200",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/FreeRDP/FreeRDP/commit/626d10a94a88565d957ddc30768ed08b320049a7",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vffh-j6hh-95f4",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://oss-fuzz.com/testcase-detail/4985227207311360",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-328xx/CVE-2024-32866.json
Normal file
63
CVE-2024/CVE-2024-328xx/CVE-2024-32866.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-32866",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-23T21:15:48.407",
|
||||
"lastModified": "2024-04-23T21:15:48.407",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Conform, a type-safe form validation library, allows the parsing of nested objects in the form of `object.property`. Due to an improper implementation of this feature in versions prior to 1.1.1, an attacker can exploit the feature to trigger prototype pollution by passing a crafted input to `parseWith...` functions. Applications that use conform for server-side validation of form data or URL parameters are affected by this vulnerability. Version 1.1.1 contains a patch for the issue.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1321"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/edmundhung/conform/blob/59156d7115a7207fa3b6f8a70a4342a9b24c2501/packages/conform-dom/formdata.ts#L117",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/edmundhung/conform/commit/4819d51b5a53fd5486fc85c17cdc148eb160e3de",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/edmundhung/conform/security/advisories/GHSA-624g-8qjg-8qxf",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-328xx/CVE-2024-32869.json
Normal file
59
CVE-2024/CVE-2024-328xx/CVE-2024-32869.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-32869",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-23T21:15:48.623",
|
||||
"lastModified": "2024-04-23T21:15:48.623",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.2.7, when using serveStatic with deno, it is possible to traverse the directory where `main.ts` is located. This can result in retrieval of unexpected files. Version 4.2.7 contains a patch for the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/honojs/hono/commit/92e65fbb6e5e7372650e7690dbd84938432d9e65",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/honojs/hono/security/advisories/GHSA-3mpf-rcc7-5347",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2024/CVE-2024-328xx/CVE-2024-32875.json
Normal file
67
CVE-2024/CVE-2024-328xx/CVE-2024-32875.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2024-32875",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-23T21:15:48.837",
|
||||
"lastModified": "2024-04-23T21:15:48.837",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Hugo is a static site generator. Starting in version 0.123.0 and prior to version 0.125.3, title arguments in Markdown for links and images not escaped in internal render hooks. Hugo users who are impacted are those who have these hooks enabled and do not trust their Markdown content files. The issue is patched in v0.125.3. As a workaround, replace the templates with user defined templates or disable the internal templates."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-80"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gohugoio/hugo/releases/tag/v0.125.3",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/gohugoio/hugo/security/advisories/GHSA-ppf8-hhpp-f5hj",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-40xx/CVE-2024-4064.json
Normal file
92
CVE-2024/CVE-2024-40xx/CVE-2024-4064.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4064",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-23T20:15:07.997",
|
||||
"lastModified": "2024-04-23T20:15:07.997",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tenda AC8 16.03.34.09. It has been declared as critical. This vulnerability affects the function R7WebsSecurityHandler of the file /goform/execCommand. The manipulation of the argument password leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-261790 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/R7WebsSecurityHandler.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.261790",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.261790",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.316493",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-40xx/CVE-2024-4065.json
Normal file
92
CVE-2024/CVE-2024-40xx/CVE-2024-4065.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4065",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-23T20:15:08.223",
|
||||
"lastModified": "2024-04-23T20:15:08.223",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tenda AC8 16.03.34.09. It has been rated as critical. This issue affects the function formSetRebootTimer of the file /goform/SetRebootTimer. The manipulation of the argument rebootTime leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-261791. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/formSetRebootTimer.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.261791",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.261791",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.316494",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-40xx/CVE-2024-4066.json
Normal file
92
CVE-2024/CVE-2024-40xx/CVE-2024-4066.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4066",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-23T21:15:49.040",
|
||||
"lastModified": "2024-04-23T21:15:49.040",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in Tenda AC8 16.03.34.09. Affected is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation of the argument wanMTU/wanSpeed/cloneType/mac/serviceName/serverName leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-261792. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/fromAdvSetMacMtuWan.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.261792",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.261792",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.316495",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
52
README.md
52
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-23T20:00:32.054630+00:00
|
||||
2024-04-23T22:00:37.926836+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-23T19:57:33.843000+00:00
|
||||
2024-04-23T21:15:49.040000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,48 +33,32 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
246563
|
||||
246573
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `5`
|
||||
Recently added CVEs: `10`
|
||||
|
||||
- [CVE-2024-31208](CVE-2024/CVE-2024-312xx/CVE-2024-31208.json) (`2024-04-23T18:15:14.457`)
|
||||
- [CVE-2024-32482](CVE-2024/CVE-2024-324xx/CVE-2024-32482.json) (`2024-04-23T18:15:14.810`)
|
||||
- [CVE-2024-32658](CVE-2024/CVE-2024-326xx/CVE-2024-32658.json) (`2024-04-23T18:15:15.000`)
|
||||
- [CVE-2024-4062](CVE-2024/CVE-2024-40xx/CVE-2024-4062.json) (`2024-04-23T19:15:46.553`)
|
||||
- [CVE-2024-4063](CVE-2024/CVE-2024-40xx/CVE-2024-4063.json) (`2024-04-23T19:15:46.870`)
|
||||
- [CVE-2024-32659](CVE-2024/CVE-2024-326xx/CVE-2024-32659.json) (`2024-04-23T20:15:07.407`)
|
||||
- [CVE-2024-32660](CVE-2024/CVE-2024-326xx/CVE-2024-32660.json) (`2024-04-23T20:15:07.617`)
|
||||
- [CVE-2024-32661](CVE-2024/CVE-2024-326xx/CVE-2024-32661.json) (`2024-04-23T20:15:07.800`)
|
||||
- [CVE-2024-32662](CVE-2024/CVE-2024-326xx/CVE-2024-32662.json) (`2024-04-23T21:15:48.200`)
|
||||
- [CVE-2024-32866](CVE-2024/CVE-2024-328xx/CVE-2024-32866.json) (`2024-04-23T21:15:48.407`)
|
||||
- [CVE-2024-32869](CVE-2024/CVE-2024-328xx/CVE-2024-32869.json) (`2024-04-23T21:15:48.623`)
|
||||
- [CVE-2024-32875](CVE-2024/CVE-2024-328xx/CVE-2024-32875.json) (`2024-04-23T21:15:48.837`)
|
||||
- [CVE-2024-4064](CVE-2024/CVE-2024-40xx/CVE-2024-4064.json) (`2024-04-23T20:15:07.997`)
|
||||
- [CVE-2024-4065](CVE-2024/CVE-2024-40xx/CVE-2024-4065.json) (`2024-04-23T20:15:08.223`)
|
||||
- [CVE-2024-4066](CVE-2024/CVE-2024-40xx/CVE-2024-4066.json) (`2024-04-23T21:15:49.040`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `24`
|
||||
Recently modified CVEs: `3`
|
||||
|
||||
- [CVE-2004-0285](CVE-2004/CVE-2004-02xx/CVE-2004-0285.json) (`2024-04-23T19:52:22.567`)
|
||||
- [CVE-2006-4993](CVE-2006/CVE-2006-49xx/CVE-2006-4993.json) (`2024-04-23T19:52:10.963`)
|
||||
- [CVE-2007-0171](CVE-2007/CVE-2007-01xx/CVE-2007-0171.json) (`2024-04-23T19:52:32.443`)
|
||||
- [CVE-2007-0172](CVE-2007/CVE-2007-01xx/CVE-2007-0172.json) (`2024-04-23T19:52:27.450`)
|
||||
- [CVE-2011-2483](CVE-2011/CVE-2011-24xx/CVE-2011-2483.json) (`2024-04-23T19:57:33.843`)
|
||||
- [CVE-2021-38201](CVE-2021/CVE-2021-382xx/CVE-2021-38201.json) (`2024-04-23T18:57:47.143`)
|
||||
- [CVE-2024-24558](CVE-2024/CVE-2024-245xx/CVE-2024-24558.json) (`2024-04-23T19:52:49.107`)
|
||||
- [CVE-2024-26592](CVE-2024/CVE-2024-265xx/CVE-2024-26592.json) (`2024-04-23T19:46:27.683`)
|
||||
- [CVE-2024-31497](CVE-2024/CVE-2024-314xx/CVE-2024-31497.json) (`2024-04-23T18:15:14.660`)
|
||||
- [CVE-2024-3400](CVE-2024/CVE-2024-34xx/CVE-2024-3400.json) (`2024-04-23T19:57:25.207`)
|
||||
- [CVE-2024-3832](CVE-2024/CVE-2024-38xx/CVE-2024-3832.json) (`2024-04-23T18:15:15.187`)
|
||||
- [CVE-2024-3833](CVE-2024/CVE-2024-38xx/CVE-2024-3833.json) (`2024-04-23T18:15:15.247`)
|
||||
- [CVE-2024-3834](CVE-2024/CVE-2024-38xx/CVE-2024-3834.json) (`2024-04-23T18:15:15.290`)
|
||||
- [CVE-2024-3837](CVE-2024/CVE-2024-38xx/CVE-2024-3837.json) (`2024-04-23T18:15:15.350`)
|
||||
- [CVE-2024-3838](CVE-2024/CVE-2024-38xx/CVE-2024-3838.json) (`2024-04-23T18:15:15.410`)
|
||||
- [CVE-2024-3839](CVE-2024/CVE-2024-38xx/CVE-2024-3839.json) (`2024-04-23T18:15:15.467`)
|
||||
- [CVE-2024-3840](CVE-2024/CVE-2024-38xx/CVE-2024-3840.json) (`2024-04-23T18:15:15.520`)
|
||||
- [CVE-2024-3841](CVE-2024/CVE-2024-38xx/CVE-2024-3841.json) (`2024-04-23T18:15:15.570`)
|
||||
- [CVE-2024-3843](CVE-2024/CVE-2024-38xx/CVE-2024-3843.json) (`2024-04-23T18:15:15.610`)
|
||||
- [CVE-2024-3844](CVE-2024/CVE-2024-38xx/CVE-2024-3844.json) (`2024-04-23T18:15:15.650`)
|
||||
- [CVE-2024-3845](CVE-2024/CVE-2024-38xx/CVE-2024-3845.json) (`2024-04-23T18:15:15.690`)
|
||||
- [CVE-2024-3846](CVE-2024/CVE-2024-38xx/CVE-2024-3846.json) (`2024-04-23T18:15:15.733`)
|
||||
- [CVE-2024-3847](CVE-2024/CVE-2024-38xx/CVE-2024-3847.json) (`2024-04-23T18:15:15.783`)
|
||||
- [CVE-2024-3914](CVE-2024/CVE-2024-39xx/CVE-2024-3914.json) (`2024-04-23T18:15:15.823`)
|
||||
- [CVE-2022-30007](CVE-2022/CVE-2022-300xx/CVE-2022-30007.json) (`2024-04-23T20:15:07.160`)
|
||||
- [CVE-2024-22638](CVE-2024/CVE-2024-226xx/CVE-2024-22638.json) (`2024-04-23T20:15:07.290`)
|
||||
- [CVE-2024-2919](CVE-2024/CVE-2024-29xx/CVE-2024-2919.json) (`2024-04-23T21:15:48.110`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
74
_state.csv
74
_state.csv
@ -8585,7 +8585,7 @@ CVE-2004-0281,0,0,a5b551c3f5758977d1a6a77a80db29af6ba522c65dd4e0c3867b0a52503659
|
||||
CVE-2004-0282,0,0,744b019872557a60425c8e9f327b7c6a01217d34347d47b80eb0036a99d39825,2017-07-11T01:30:02.197000
|
||||
CVE-2004-0283,0,0,7f67424bd500d69fa23e7313f40bb2460b5f89ec23d8f1bf69bfb0ab9d9426fa,2017-07-11T01:30:02.290000
|
||||
CVE-2004-0284,0,0,30dc472b0514ba857b844047d928c73bbc88561ec49c91b8c77d7528c40bcd71,2021-07-23T12:55:03.667000
|
||||
CVE-2004-0285,0,1,a8725954addf3a9df00374974b23d7f1f3f5ca556c3dbd4fe55c4e89f43b70bd,2024-04-23T19:52:22.567000
|
||||
CVE-2004-0285,0,0,a8725954addf3a9df00374974b23d7f1f3f5ca556c3dbd4fe55c4e89f43b70bd,2024-04-23T19:52:22.567000
|
||||
CVE-2004-0286,0,0,8dafc033e9db42a284c051c97601275bb38f27107642786473faae250f95994f,2017-07-11T01:30:02.447000
|
||||
CVE-2004-0287,0,0,d16fbbe99dfa71ae0f58dae25f7eb40378a65b2fc6b062d93cc7fbca7fed5ad3,2017-07-11T01:30:02.497000
|
||||
CVE-2004-0288,0,0,e7d35c35b4d43cd12bd27c6400ef38cb508599ceb7f9bcebfb7adf3341b3d7c3,2017-07-11T01:30:02.540000
|
||||
@ -20699,7 +20699,7 @@ CVE-2006-4989,0,0,c8f8336fb475c8b77442c832ff06b116e53ec3d6b8312b23f5e9acd82755c1
|
||||
CVE-2006-4990,0,0,68e78265ed8a4059465d637668eeecd3177adb6612a6fa7cbeffd4e499dbf6b1,2018-10-17T21:40:46.843000
|
||||
CVE-2006-4991,0,0,bed8d0e9764ff007e05ddffb5cf9d7b9cd584e0ba0e0ca4daa02142535927112,2018-10-17T21:40:49.280000
|
||||
CVE-2006-4992,0,0,b8d0accf8f637a19df0e29fdf2230f06557325eddf4888299b929243d4ac85e9,2023-11-07T01:59:25.357000
|
||||
CVE-2006-4993,0,1,f6a35a486a060a4f4e33c50a6533794931439da174aa90e85e5f1a11cfdcbad1,2024-04-23T19:52:10.963000
|
||||
CVE-2006-4993,0,0,f6a35a486a060a4f4e33c50a6533794931439da174aa90e85e5f1a11cfdcbad1,2024-04-23T19:52:10.963000
|
||||
CVE-2006-4994,0,0,c5ef94894f67872840e7af1237a13b217e874e8632eebd993ea8f0817545e4c7,2023-11-07T01:59:25.447000
|
||||
CVE-2006-4995,0,0,9f54345c01b423490629d9b822ffec72c053418110b019deeaf9acc3385d1d62,2023-11-07T01:59:25.503000
|
||||
CVE-2006-4996,0,0,737f972222c16b53ed01a9a4f964ea8ad5e7ddf27c68d4ea7a159bddd1a2bd06,2023-11-07T01:59:25.550000
|
||||
@ -23104,8 +23104,8 @@ CVE-2007-0167,0,0,6cd4c9ade160e632ceeeab387f2f2499f6f93a50a2b3169f74e363bd349f67
|
||||
CVE-2007-0168,0,0,a0050464d8845d796c6f8ae4fc2a20e31ae37eb9cac07b6e2e52426630a8cabe,2021-04-07T18:53:50.540000
|
||||
CVE-2007-0169,0,0,0a1d2970ccb0b23439136925bf805227c4ecaae40815eb2e9c2798fa0d08171c,2021-04-07T18:53:50.540000
|
||||
CVE-2007-0170,0,0,2fdb53bbda6bb874a40a8eb5eadbc199a05dc61bcf29939ad238e05c27505b48,2017-10-19T01:29:56.877000
|
||||
CVE-2007-0171,0,1,d2226e45244da55f46fad664b1ca3ad0854391cdf8200cf071b7589aa51832c2,2024-04-23T19:52:32.443000
|
||||
CVE-2007-0172,0,1,0779ae5792a8552bc8272c20b39947f4059221cafa60623d9cf374e4ee689fc5,2024-04-23T19:52:27.450000
|
||||
CVE-2007-0171,0,0,d2226e45244da55f46fad664b1ca3ad0854391cdf8200cf071b7589aa51832c2,2024-04-23T19:52:32.443000
|
||||
CVE-2007-0172,0,0,0779ae5792a8552bc8272c20b39947f4059221cafa60623d9cf374e4ee689fc5,2024-04-23T19:52:27.450000
|
||||
CVE-2007-0173,0,0,9e35c7150e9ede27174f0fa51be519750b2029054723f72f1a52aec76e911e72,2017-10-19T01:29:57.050000
|
||||
CVE-2007-0174,0,0,7f7a52e6fa84076c43a3e8684f4e8ee641fa71f4d8f0d5cd36efb4a612dcd9bc,2018-10-16T16:31:33.853000
|
||||
CVE-2007-0175,0,0,2803595c41c760cdd09df1de3fc2cc755b9a180ee6a03df5e6e915141c86ad4d,2017-07-29T01:30:01.923000
|
||||
@ -49193,7 +49193,7 @@ CVE-2011-2479,0,0,ea96e6a2bbba76561fd23117e5cc9c01f320acee594086228a9fc77f86cd54
|
||||
CVE-2011-2480,0,0,2caa3c3f9928f2b9f769985d2d097dc928f38961695a36bf6dedb962a1063587,2019-12-10T18:31:42.187000
|
||||
CVE-2011-2481,0,0,af086350743452129d38c65a28de9682e79eb88ec762814e94b29746bb28e87b,2023-11-07T02:07:41.860000
|
||||
CVE-2011-2482,0,0,ae377ae7f1d01ad14ddea1a083686fae6fa1adc88f4460adb43143c5994fe0c4,2023-02-13T01:19:46.610000
|
||||
CVE-2011-2483,0,1,4fe49fd68a2f287a11f3923a628ae22b51586f171bb5a219b86e8150478f02d0,2024-04-23T19:57:33.843000
|
||||
CVE-2011-2483,0,0,4fe49fd68a2f287a11f3923a628ae22b51586f171bb5a219b86e8150478f02d0,2024-04-23T19:57:33.843000
|
||||
CVE-2011-2484,0,0,f091721d23b1b471ad871d9bd7dbd20e81ab9a82115b4c1158d186b17d0759e2,2020-07-27T22:41:19.207000
|
||||
CVE-2011-2485,0,0,371567b94b5e4c39bb9f5037074d0c7ac039a56289c29e3e453d852d9d896c01,2012-07-03T16:40:29.677000
|
||||
CVE-2011-2486,0,0,675ec82931bf7cb75fe920931492eb49b152c633d41804eb65e783ba3a791fbf,2013-09-01T06:24:51.890000
|
||||
@ -180281,7 +180281,7 @@ CVE-2021-38198,0,0,7696d1781d4a6e6dd38679d773a122377b4c0939ef0b498dfcd5880d84d5c
|
||||
CVE-2021-38199,0,0,616df992225670ac31780c0efcc159084ba6f2ebff7eed7dceae196e7d72efd9,2021-12-21T12:54:21.507000
|
||||
CVE-2021-3820,0,0,48f02685b471f1f43f375e9e04a0c37a8807abd18d490dcc1b054bae4526feb9,2022-07-29T16:57:55.093000
|
||||
CVE-2021-38200,0,0,8a24f015ba3b51ed5cef349654270e9c3f1a6fb891297563cadaab34c54ac165,2021-08-12T14:24:53.037000
|
||||
CVE-2021-38201,0,1,f1843512ad29412c0a68086e86dc10ff3e41e09c77b3dfd8448188f697e73d3d,2024-04-23T18:57:47.143000
|
||||
CVE-2021-38201,0,0,f1843512ad29412c0a68086e86dc10ff3e41e09c77b3dfd8448188f697e73d3d,2024-04-23T18:57:47.143000
|
||||
CVE-2021-38202,0,0,14faf085d2c84be5c44f9685f49354984c54aa73ea3dca07ce2e5825643630f5,2021-10-07T20:39:27.070000
|
||||
CVE-2021-38203,0,0,8e7c322c1f9ec5ee808d54305c7b5dbc54e11ae76f98cbb9da1dd43756dec8cb,2022-05-03T16:04:40.443000
|
||||
CVE-2021-38204,0,0,7dff5129b1cf28be9d17a961d6715a859b2471390672f824080ba793687c1cc2,2022-01-04T16:37:18.183000
|
||||
@ -197519,7 +197519,7 @@ CVE-2022-30001,0,0,9ea7556402d779647820b483c0e1325aaf1ae4ee6ec5c8343e4f2be222d1c
|
||||
CVE-2022-30002,0,0,a1ec15dce750f399632a47395f14eba75124d3844f1fe520b5aa5606d2a2855f,2022-05-21T03:07:18.990000
|
||||
CVE-2022-30003,0,0,31e1d67aa0a2ecaec299f8af016c40ed494849a65c43f62f3e2e46bad29f1b30,2022-09-28T17:04:10.997000
|
||||
CVE-2022-30004,0,0,b4989293c4645d9294ac11654eec236433c850b421daaeead194cd4e0dd5067c,2022-09-28T17:03:19.440000
|
||||
CVE-2022-30007,0,0,d865819d5fa65c9b32418636715f54735ae56387e319a2c4a14fe4f9497a0b14,2022-05-26T00:39:25.050000
|
||||
CVE-2022-30007,0,1,aa7c77313fa22c1f036fbd74aaf6589e3efbe2f34aa8c05f8f55278498ca2445,2024-04-23T20:15:07.160000
|
||||
CVE-2022-3001,0,0,241186fa240affe9cf81bda98be3340e7b209585b3d42e5f160beb90ad55b3f8,2022-09-19T19:08:04.817000
|
||||
CVE-2022-30011,0,0,a5dd8bf2e83f88b528c8ca5668042d8231268b9062d3c91b93eb2b8fd5941f57,2023-11-02T01:12:30.027000
|
||||
CVE-2022-30012,0,0,0929777da5ceac88984634610aa273b30287d4672915d7d193c4b510ea42192e,2022-05-24T17:04:39.297000
|
||||
@ -241273,7 +241273,7 @@ CVE-2024-2263,0,0,df8d6f616c06d7efbf230a22645526f71cba2b5d98ac7477968fae54aee385
|
||||
CVE-2024-22635,0,0,4862506d4e37fbac04654e9c145033c5c19772547553e0905cdb496418310552,2024-01-29T15:57:23.770000
|
||||
CVE-2024-22636,0,0,d2329967243db7b2d90664e4db5aafab2eefb2c63c9125405da2b73ddd46c40f,2024-01-29T15:57:32.540000
|
||||
CVE-2024-22637,0,0,26b297452537f73426f9b1e1c51d8375cdf08e35ab6ae3bee9824c37bc50f94b,2024-02-15T15:19:44.187000
|
||||
CVE-2024-22638,0,0,3af9b550c5e91fc5f9396d71fc0f20f86d7c6a12d36aa6b3628acd4047f5d092,2024-01-29T15:57:43.763000
|
||||
CVE-2024-22638,0,1,60058d6cb515c8aa3a8ab899f954be18d8e911ef19644ca8cbcf96f8a8fef453,2024-04-23T20:15:07.290000
|
||||
CVE-2024-22639,0,0,d147d90780a694ff1383e30f52d6dbe1e7da032a2cc352a3c7766915866417f2,2024-01-29T15:57:50.477000
|
||||
CVE-2024-2264,0,0,974a3209feed4d6057f1020f41685c0d8e8695fcbf79c0fbc4c6d1a61e8e6de4,2024-04-11T01:25:20.247000
|
||||
CVE-2024-22640,0,0,1cf939be90392a4e496db73ac9b310c70c3d191887c946934cc9645d6269f346,2024-04-19T16:19:49.043000
|
||||
@ -242167,7 +242167,7 @@ CVE-2024-24548,0,0,9dbe1af5af4a9b865bf88b2a305b739ac231a7ce95c9c8ed04344b3144708
|
||||
CVE-2024-24549,0,0,41f01a6ce0acab1e663a33240960755cce5d7348c8154f4ae0884170d1f21b3b,2024-04-06T06:15:08.030000
|
||||
CVE-2024-24556,0,0,5eadc80f5e2b4d40f2247a29eb7c2aa8b2d9f2f191f8cfe4f491f2d184a6cbe7,2024-02-06T19:24:46.810000
|
||||
CVE-2024-24557,0,0,803986686a1d77830cb33582e01547bf1b4ed013f71e8dbf2a84322efe6db933,2024-02-09T20:21:32.970000
|
||||
CVE-2024-24558,0,1,26ffac7b2f9dc8041f02bc6fb374f1f9b0b06e69d8b3e191802aa68af28d0bbc,2024-04-23T19:52:49.107000
|
||||
CVE-2024-24558,0,0,26ffac7b2f9dc8041f02bc6fb374f1f9b0b06e69d8b3e191802aa68af28d0bbc,2024-04-23T19:52:49.107000
|
||||
CVE-2024-24559,0,0,a0cb86b836a7e79e3e1b100a5872aae73fa30cbfc276547c01a7202600c7c117,2024-02-12T21:40:56.547000
|
||||
CVE-2024-2456,0,0,50cc90bc41b3799405fb23cbe82f5c15d252305910bd20a549ad8554a4e042cd,2024-04-10T13:23:38.787000
|
||||
CVE-2024-24560,0,0,d3bc441b7f7323645f1a247e96e6668e58a3a1d0f8c643e79ccfcc74a44eb295,2024-02-12T15:23:42.867000
|
||||
@ -243312,7 +243312,7 @@ CVE-2024-26589,0,0,528da0ad6ce01bf77db8eec7de0776ce7a2f821b4949af8b66c0af55f0b75
|
||||
CVE-2024-2659,0,0,f70d39261e85fb28ecf8b90e66824a1515a67332ae1cb9fb94b78b0878034f3f,2024-04-15T19:12:25.887000
|
||||
CVE-2024-26590,0,0,abd86201bd23efc7d86afd5c0d7b0d654a2577ad84615d2348f851e6a7a9eae0,2024-03-18T17:54:20.197000
|
||||
CVE-2024-26591,0,0,5929783d5428bb2c14c53508060d365bc2cc03643c73a5c691e380ff07f76710,2024-03-18T17:54:44.267000
|
||||
CVE-2024-26592,0,1,f757e026c76c6fd4946732bc503cc5d664f7a9fcf3e2d940e8aa27b4fa0ddffd,2024-04-23T19:46:27.683000
|
||||
CVE-2024-26592,0,0,f757e026c76c6fd4946732bc503cc5d664f7a9fcf3e2d940e8aa27b4fa0ddffd,2024-04-23T19:46:27.683000
|
||||
CVE-2024-26593,0,0,98e4a4e90fea8bbd21c17da9b47a219607d5ce75195bf465a61fda95e4390501,2024-04-19T17:58:44.667000
|
||||
CVE-2024-26594,0,0,07543a5cd1955430bfc49a61bb08638317c690c5df69e623c4efd4c3bc80964a,2024-04-19T18:42:49.670000
|
||||
CVE-2024-26595,0,0,4aab14a348ba85d767a05d71533f3a3f5d4b6347adf8eb4cca8cbcf592f0a830,2024-04-17T19:55:31.323000
|
||||
@ -244667,7 +244667,7 @@ CVE-2024-29186,0,0,9eae16b82ad0960a39bab28b7331d7fbcb06214ff5e685dffe5ebccb6351d
|
||||
CVE-2024-29187,0,0,e759748c9eddb6fb94f310b6fbfd0a60978fe40972c402d0d57e603137386e75,2024-03-25T01:51:01.223000
|
||||
CVE-2024-29188,0,0,936a9c226ba5e7f9ce4bf09d536924cb3ac611efe865e82a6596de0401a89ca0,2024-03-25T01:51:01.223000
|
||||
CVE-2024-29189,0,0,6878e9b35a058677d2a3fa4fc5bfa3461c367e63050b0e9c52331e170e2ec716,2024-03-26T12:55:05.010000
|
||||
CVE-2024-2919,0,0,32a8e7a536908ee366830f3669988141427f95b22fc2af5934c8ce4e4bcd3650,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2919,0,1,cab14862d675b468b7e5387271dae4d6b312c3201b5a28cf77935ce461c632ba,2024-04-23T21:15:48.110000
|
||||
CVE-2024-29190,0,0,dd993808aabbfadd07f226263f194d2c29a65f1d0e197a65068c6fa33a34d2ff,2024-03-25T01:51:01.223000
|
||||
CVE-2024-29191,0,0,b520f6c0ae464ba6b8ed6e55ee8e36c1dbac951b2168f7a78b0ab9cc09ee27cc,2024-04-04T16:33:06.610000
|
||||
CVE-2024-29192,0,0,668f235aea1f149843465a9bb5e6c8d16a1e3bb6d67526ade216b3935ba2a245,2024-04-04T19:24:50.670000
|
||||
@ -245618,7 +245618,7 @@ CVE-2024-31204,0,0,d77d8a78ba72f2a1144250dcbd3aeb2b57d00c9418a1c9337730d8bd71684
|
||||
CVE-2024-31205,0,0,b253fd2658a692223bc8e40aabe86fdefb374b65b71659aad1a1d9f39a934ec9,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31206,0,0,bd1cbc8a5901cc2b410cb59c86ef8c814546918b6efc52403de5ae308d36d9dc,2024-04-05T12:40:52.763000
|
||||
CVE-2024-31207,0,0,af1a3137415a749d0a1549c9f6fa25303b24e194f3861bc2095545bb707985a2,2024-04-04T16:33:06.610000
|
||||
CVE-2024-31208,1,1,f64a273d7331256197537aa26a480aa4e0dfc51f9056697d51c22575b6ba6ddf,2024-04-23T18:15:14.457000
|
||||
CVE-2024-31208,0,0,f64a273d7331256197537aa26a480aa4e0dfc51f9056697d51c22575b6ba6ddf,2024-04-23T18:15:14.457000
|
||||
CVE-2024-31209,0,0,dc7f150a1f8931f337c3d30121f71937562fb9b370a799204e5d75b796fcdc02,2024-04-04T16:33:06.610000
|
||||
CVE-2024-31210,0,0,0c3a74f1634842d277fcf52471d61be8d27ebe967ace4d479af8f65fffdace19,2024-04-05T12:40:52.763000
|
||||
CVE-2024-31211,0,0,37f6ef15b9def8ff0d686fae9ad61ad1a082be15bc6a18f70a40cbfe15e962e2,2024-04-05T12:40:52.763000
|
||||
@ -245785,7 +245785,7 @@ CVE-2024-3147,0,0,f05061e9d718b866336ceef3f83885c168403f8d387cf11dbe00ac736df358
|
||||
CVE-2024-3148,0,0,12b6e15e00d964ce79c059c99a6c4df70691a740ad2056657f2d4843c78fc654,2024-04-11T01:25:55.337000
|
||||
CVE-2024-31487,0,0,ffef7fcdc05bb476a1f2c02c71de4a76075ea7f0301d6a8889db629ce9b194c6,2024-04-10T13:24:22.187000
|
||||
CVE-2024-31492,0,0,a251126d380ad734bdcae40155276c0c8cd0f78c057d6c232814179759c90bf9,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31497,0,1,d6b4bcfa71e3a1696f4ae8c4f0f836abdfcd8a872f251758c7124dbc72616b69,2024-04-23T18:15:14.660000
|
||||
CVE-2024-31497,0,0,d6b4bcfa71e3a1696f4ae8c4f0f836abdfcd8a872f251758c7124dbc72616b69,2024-04-23T18:15:14.660000
|
||||
CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08
|
||||
CVE-2024-31503,0,0,a2a7c8d9eaf4775895950c76302a02326a8d6e67bb7d5ec85d9e8a8516e17053,2024-04-17T12:48:07.510000
|
||||
CVE-2024-31506,0,0,8be7ef5b3e9d65e4bba9dd63e2b7475f0658a4b183369094a98038d4eee40099,2024-04-10T13:24:00.070000
|
||||
@ -246124,7 +246124,7 @@ CVE-2024-32478,0,0,767d0906439929f5e4e53d4d2396aabddb8a0de51e7967f13464fca079c70
|
||||
CVE-2024-32479,0,0,9f233b992ed22cd02276821942e34be3b1cd724f5562f573e840e7a10cf66aba,2024-04-23T12:52:26.253000
|
||||
CVE-2024-3248,0,0,65f6d4ddfc43ae235edf2e59fc9daa1f1d020439a4fa197a41a6ddd58e106004,2024-04-03T12:38:04.840000
|
||||
CVE-2024-32480,0,0,f740881091f1f05e0445ba97b5de61d4d063547c57ff7478943e1cd018db3728,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32482,1,1,d968a70aa898a4f3f97bc16df8c7125cc3072d2ec01d0f51343071622157545c,2024-04-23T18:15:14.810000
|
||||
CVE-2024-32482,0,0,d968a70aa898a4f3f97bc16df8c7125cc3072d2ec01d0f51343071622157545c,2024-04-23T18:15:14.810000
|
||||
CVE-2024-32487,0,0,746d95a6c3889a9e0164763739aef81432a5222f159aa33a064a3132dbd4a7ad,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32488,0,0,6ce6bcee8af0a677e98d2bf7a3efd66cf8a3e580423515387116f39d710ba974,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32489,0,0,cbc8895e7f5e99c09f7bd505220fcc5514b4573939580e3f381a933acf3c9ef0,2024-04-15T13:15:31.997000
|
||||
@ -246242,8 +246242,12 @@ CVE-2024-32652,0,0,507899e8cc0ef719a4df6a408b43b1aeaf42e8d25b41dcf9a35617406adcc
|
||||
CVE-2024-32653,0,0,96a4de58183f8a4c5475803e77d708dc553ab0aba5c22712929dba4355cb603d,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32656,0,0,507ca72541b43d2bb1e3f8cba739ba39a5095ac212b37ee6cfc977f3944f903a,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32657,0,0,45665c321c855eccec4d820153233a5ab3c0184c9eb39067bd012d7165ff1a87,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32658,1,1,7069993bd5ea0f3424896d58f9e2d6edcb0d553ec3f3fcbae32b44ca4bca3d06,2024-04-23T18:15:15
|
||||
CVE-2024-32658,0,0,7069993bd5ea0f3424896d58f9e2d6edcb0d553ec3f3fcbae32b44ca4bca3d06,2024-04-23T18:15:15
|
||||
CVE-2024-32659,1,1,3863493766e8b92f6e935a4c624689c9791585ec089717c13ff45c96f4bafeec,2024-04-23T20:15:07.407000
|
||||
CVE-2024-3266,0,0,254a5ba127b10ac48f062b62dbe4c90ef51eaba1ed741161e5a22416cbb32240,2024-04-10T13:23:38.787000
|
||||
CVE-2024-32660,1,1,d62fd7f207ea2a95737f95de3789bba0f5e2e8c6d3dba892168735cafbe777f5,2024-04-23T20:15:07.617000
|
||||
CVE-2024-32661,1,1,b3ea525969a9e5c2dcb91781acfcb1f5f215822dc7619cb2b5af90a890d7189f,2024-04-23T20:15:07.800000
|
||||
CVE-2024-32662,1,1,0badc9bcc789e6aa6c2864071ddc14c3ca8e18de773ff401805be71e226c3d0e,2024-04-23T21:15:48.200000
|
||||
CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000
|
||||
CVE-2024-32679,0,0,ef89c247f793ab0c364d15f1c12e10a818494992e9afdd2f8a5235049bafdc91,2024-04-23T15:15:49.823000
|
||||
CVE-2024-32681,0,0,30385cf8415af0417b19f52d5eb22ace0b875cd333ead985847624dbf28043cd,2024-04-22T13:28:34.007000
|
||||
@ -246274,6 +246278,9 @@ CVE-2024-32746,0,0,15529f833c25b7b5b5022877593c49d5afec10018bbf65b56334a694e0bc4
|
||||
CVE-2024-3281,0,0,b3c51db3aca3b371ad4faa3c1c4537d2c54d8323123f7ae9b26414cd9ee432a6,2024-04-10T13:24:22.187000
|
||||
CVE-2024-3283,0,0,8b1939d21df3d4399a3bf874e70470053c1a0ae20421841ad51c79aca5727c56,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3285,0,0,ea17e16acaa3172cbcc052cf9bfb1b3e7ee2b004434b062b8e67c1c1ed8bff14,2024-04-11T12:47:44.137000
|
||||
CVE-2024-32866,1,1,05678f43fde377094870958f3884da0ddab39ebb03caf1126589a6adb2aeb008,2024-04-23T21:15:48.407000
|
||||
CVE-2024-32869,1,1,ab50b9f75b25c61594accda9ae6ab253572d5f8b04d2fd0a7c7a99be62faabe2,2024-04-23T21:15:48.623000
|
||||
CVE-2024-32875,1,1,d07c3544404bdf6b8e4f3a41c660a40665138d4b2b82393b554fde4845ce31d9,2024-04-23T21:15:48.837000
|
||||
CVE-2024-3293,0,0,3552485a27a6b6c8b2cadd17fbdb3e630238722099a3e2d8d97b0f239cd2dc1a,2024-04-23T12:52:26.253000
|
||||
CVE-2024-3296,0,0,bcc39314c1e9f6d53aa0ccc8e7e7cac7c279f7f6ee5a27f19287b128ea2ed6c7,2024-04-05T12:15:37.777000
|
||||
CVE-2024-3298,0,0,35145d829af4d19541380a93e6723503e514b69e11aa4b007b05099610c37f21,2024-04-04T16:33:06.610000
|
||||
@ -246329,7 +246336,7 @@ CVE-2024-3385,0,0,dafd55987e5738b5d6ec37d523526a7e0269d60d96cd780933abafbc800645
|
||||
CVE-2024-3386,0,0,d08d523d066834a85bfe06023f05a033d8631a6197479f66bfb86438af143c6d,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3387,0,0,59a783d7f5a632f1312dc02ccd745e7c758f93e478c4554a0dbc9aba27d256c0,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3388,0,0,9a13547aa29d2171bfe252870fb3dde44261a463a11a31d9062dc130e0f3c4f3,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3400,0,1,5bb68c1f741d7492d6e3e08b6f1711eb6e28a4a827bd2f3f354ccd1b7a47a1fe,2024-04-23T19:57:25.207000
|
||||
CVE-2024-3400,0,0,5bb68c1f741d7492d6e3e08b6f1711eb6e28a4a827bd2f3f354ccd1b7a47a1fe,2024-04-23T19:57:25.207000
|
||||
CVE-2024-3413,0,0,7c0263f5aa26015f580f259b17ac76e3fb232807ce6eb6b3e0fa4a42d34def58,2024-04-11T01:26:00.727000
|
||||
CVE-2024-3414,0,0,fcf8b2012e3dcab7048965e9d40e8c26f25a86217cc70e6c24a2ae712b119943,2024-04-11T01:26:00.803000
|
||||
CVE-2024-3415,0,0,80d83d8ba89e3620cb20eb7a8b2b10e1c5fbd8b76c068e7c00b4af6deadd81dd,2024-04-11T01:26:00.900000
|
||||
@ -246494,19 +246501,19 @@ CVE-2024-3804,0,0,d2c04bcba3b9dcee33d8ad0e898646d48639f7e3e6aed11c413cf03cea6afb
|
||||
CVE-2024-3817,0,0,46e4b3903939ad7f28eeb8afee28fc4c5b18be71847d60ae426ede3b66e11122,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3818,0,0,3b93c96d931c7712dba585285a5a0f954163c40c8ab2b4d2e42e74b7a416a166,2024-04-19T13:10:25.637000
|
||||
CVE-2024-3825,0,0,f398f78dcc905612b8b1fff020bcc62d405b80ffdf3a9053d9f90f163c40baa7,2024-04-17T15:31:50.160000
|
||||
CVE-2024-3832,0,1,1075b96952121645fbb81b228e0c3813e39db7e21c4c9aa1fc24c30b61618c13,2024-04-23T18:15:15.187000
|
||||
CVE-2024-3833,0,1,a457fea2be3570f92e174a05ad3ebccc260fba3d80fa99b9571951cefff83bf8,2024-04-23T18:15:15.247000
|
||||
CVE-2024-3834,0,1,d74323c3b1f82373afa6afa9a2099c919ed3327f614f52d5ae9ffbb2921db60f,2024-04-23T18:15:15.290000
|
||||
CVE-2024-3837,0,1,1a7543d4c4d038a08e38b9f40b6dd120ea1a46620fdb71cd83a132c5f4434d75,2024-04-23T18:15:15.350000
|
||||
CVE-2024-3838,0,1,bd55ca068ebe4472845bce1f3d037932d27279da54b129864c942318cbf6c399,2024-04-23T18:15:15.410000
|
||||
CVE-2024-3839,0,1,c6f5f4ba36659bbdf95cdeb0e47e41641932dccad8eaf764f80b72ad0dd47f13,2024-04-23T18:15:15.467000
|
||||
CVE-2024-3840,0,1,c5e7f6b1ea42f8b045423d9acc57d84648dca4d80ba872d4df6831e3c4cf4908,2024-04-23T18:15:15.520000
|
||||
CVE-2024-3841,0,1,85253b65c449a8cc578a7de0959057d75700f84aa10824187b3b99abb67adde7,2024-04-23T18:15:15.570000
|
||||
CVE-2024-3843,0,1,832cfd8f4407c61d4a78edbbcbe24a6a38c56c364aead34f5b47a06d711bf3df,2024-04-23T18:15:15.610000
|
||||
CVE-2024-3844,0,1,c12354244043fbfc51820f35c8a63b4dfe16d1459a37300b3a4231a1ddd9e60f,2024-04-23T18:15:15.650000
|
||||
CVE-2024-3845,0,1,e7fa4e6524d058fce6ed4d80d8501b11a06f3e2ff47789c744cfd8da13426ec7,2024-04-23T18:15:15.690000
|
||||
CVE-2024-3846,0,1,b465ce0b0fca30612f30027655057056e96c1e5f955b7bd495917b047afcd41a,2024-04-23T18:15:15.733000
|
||||
CVE-2024-3847,0,1,92826ca89ff64563c0ca9b0b7e1566037f47624d36b52031222c1c623aa66584,2024-04-23T18:15:15.783000
|
||||
CVE-2024-3832,0,0,1075b96952121645fbb81b228e0c3813e39db7e21c4c9aa1fc24c30b61618c13,2024-04-23T18:15:15.187000
|
||||
CVE-2024-3833,0,0,a457fea2be3570f92e174a05ad3ebccc260fba3d80fa99b9571951cefff83bf8,2024-04-23T18:15:15.247000
|
||||
CVE-2024-3834,0,0,d74323c3b1f82373afa6afa9a2099c919ed3327f614f52d5ae9ffbb2921db60f,2024-04-23T18:15:15.290000
|
||||
CVE-2024-3837,0,0,1a7543d4c4d038a08e38b9f40b6dd120ea1a46620fdb71cd83a132c5f4434d75,2024-04-23T18:15:15.350000
|
||||
CVE-2024-3838,0,0,bd55ca068ebe4472845bce1f3d037932d27279da54b129864c942318cbf6c399,2024-04-23T18:15:15.410000
|
||||
CVE-2024-3839,0,0,c6f5f4ba36659bbdf95cdeb0e47e41641932dccad8eaf764f80b72ad0dd47f13,2024-04-23T18:15:15.467000
|
||||
CVE-2024-3840,0,0,c5e7f6b1ea42f8b045423d9acc57d84648dca4d80ba872d4df6831e3c4cf4908,2024-04-23T18:15:15.520000
|
||||
CVE-2024-3841,0,0,85253b65c449a8cc578a7de0959057d75700f84aa10824187b3b99abb67adde7,2024-04-23T18:15:15.570000
|
||||
CVE-2024-3843,0,0,832cfd8f4407c61d4a78edbbcbe24a6a38c56c364aead34f5b47a06d711bf3df,2024-04-23T18:15:15.610000
|
||||
CVE-2024-3844,0,0,c12354244043fbfc51820f35c8a63b4dfe16d1459a37300b3a4231a1ddd9e60f,2024-04-23T18:15:15.650000
|
||||
CVE-2024-3845,0,0,e7fa4e6524d058fce6ed4d80d8501b11a06f3e2ff47789c744cfd8da13426ec7,2024-04-23T18:15:15.690000
|
||||
CVE-2024-3846,0,0,b465ce0b0fca30612f30027655057056e96c1e5f955b7bd495917b047afcd41a,2024-04-23T18:15:15.733000
|
||||
CVE-2024-3847,0,0,92826ca89ff64563c0ca9b0b7e1566037f47624d36b52031222c1c623aa66584,2024-04-23T18:15:15.783000
|
||||
CVE-2024-3852,0,0,3038e46972183e994310b2b410f139aaace8bd74e7e7e979d336a57b5feba459,2024-04-22T10:15:07.430000
|
||||
CVE-2024-3853,0,0,da9bcb4a065926b49732a0dd79b2f07a12fd9777c9341906bc363e07df8725cf,2024-04-17T12:48:31.863000
|
||||
CVE-2024-3854,0,0,1fc25728bc86cd277ba270d144040c69a89e438f315d3ebf85291cac5fb28ebb,2024-04-22T10:15:07.470000
|
||||
@ -246544,7 +246551,7 @@ CVE-2024-3908,0,0,26db16f32c52be83b374f19657727a3a2a3db16f8ab3cda20dc3ad146f877b
|
||||
CVE-2024-3909,0,0,c5efb647be20bf9f2ba452fa9666b153466b94d0e5f3c713649def6568acf5a0,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3910,0,0,7d8aafa4b35964a72cdc3d08dd6c7b1615ef522d553c6c78d413b0e25fdc718e,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3911,0,0,11f3bec5f1587eb22151392a8d155bb89d10f83f95efada567bdaf5751a2af93,2024-04-23T13:15:46.770000
|
||||
CVE-2024-3914,0,1,97e3c2a1ceda5baa1eed65646997d7cab2203eabae8e05a9bf7340c2163a5004,2024-04-23T18:15:15.823000
|
||||
CVE-2024-3914,0,0,97e3c2a1ceda5baa1eed65646997d7cab2203eabae8e05a9bf7340c2163a5004,2024-04-23T18:15:15.823000
|
||||
CVE-2024-3928,0,0,114c97f372c53f33fe3b26cd091686f1eb78a3749714814b77901a77b62a0107,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3931,0,0,adc8a79b07f48b35a9681a97a568e852ba1ef2cbd3b7271f585750c2d2c4216b,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3932,0,0,bce0f8b09e2fc4acc0cfce5940d57ce5f1e0384ac19f6c68ed218175688d8f12,2024-04-18T13:04:28.900000
|
||||
@ -246560,5 +246567,8 @@ CVE-2024-4022,0,0,ebd323c8f90bdf29bd6ff35ea1eff449874a3d962dc85b687039f47f7b416e
|
||||
CVE-2024-4026,0,0,65bff2dba626fde0f88488c1e6df610a37e761e2e041855587a3bbcb3e849c23,2024-04-22T13:28:34.007000
|
||||
CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000
|
||||
CVE-2024-4040,0,0,1c076b2ab70ecb1e80edff07a45eda641d4fa881fea89ccf32a60b6e73154ae3,2024-04-23T12:52:26.253000
|
||||
CVE-2024-4062,1,1,fd0989c37011fb6cb5794fb7df968df0263f3f31c3aef5d67b3f6a349ba1e358,2024-04-23T19:15:46.553000
|
||||
CVE-2024-4063,1,1,2008c390464bacff63172644a55a59e96a94988eb99fab2491b3e8e538a775f3,2024-04-23T19:15:46.870000
|
||||
CVE-2024-4062,0,0,fd0989c37011fb6cb5794fb7df968df0263f3f31c3aef5d67b3f6a349ba1e358,2024-04-23T19:15:46.553000
|
||||
CVE-2024-4063,0,0,2008c390464bacff63172644a55a59e96a94988eb99fab2491b3e8e538a775f3,2024-04-23T19:15:46.870000
|
||||
CVE-2024-4064,1,1,09ee7a85b82de580b2a486361eb0eaa08998727fa590a9268296692079168787,2024-04-23T20:15:07.997000
|
||||
CVE-2024-4065,1,1,a5da92576f462db4d931c9ed36d295da893b4e991ec9663049a58cac021ab267,2024-04-23T20:15:08.223000
|
||||
CVE-2024-4066,1,1,56a8ad546d4df99104a2f9d47e1c66543e4a309385ab664f82bdeb489fbff99f,2024-04-23T21:15:49.040000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user