Auto-Update: 2024-04-23T22:00:37.926836+00:00

This commit is contained in:
cad-safe-bot 2024-04-23 22:03:28 +00:00
parent bd82966a1a
commit 879f679529
15 changed files with 788 additions and 77 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30007",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-05-17T16:15:09.217",
"lastModified": "2022-05-26T00:39:25.050",
"vulnStatus": "Analyzed",
"lastModified": "2024-04-23T20:15:07.160",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -93,6 +93,10 @@
}
],
"references": [
{
"url": "https://github.com/ZackSecurity/VulnerReport/blob/cve/gxcms/1.md",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/breezety/gxcms15/issues/1",
"source": "cve@mitre.org",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-22638",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-25T21:15:09.470",
"lastModified": "2024-01-29T15:57:43.763",
"vulnStatus": "Analyzed",
"lastModified": "2024-04-23T20:15:07.290",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "liveSite v2019.1 was discovered to contain a remote code execution (RCE) vulenrabiity via the component /livesite/edit_designer_region.php."
"value": "liveSite v2019.1 was discovered to contain a remote code execution (RCE) vulenrabiity via the component /livesite/edit_designer_region.php or /livesite/add_email_campaign.php."
},
{
"lang": "es",
@ -76,6 +76,10 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.exploit-db.com/exploits/51936",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-2919",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-04T03:15:06.413",
"lastModified": "2024-04-04T12:48:41.700",
"lastModified": "2024-04-23T21:15:48.110",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Gutenberg Blocks by Kadence Blocks \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Countdown and CountUp Widget in all versions up to, and including, 3.2.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
"value": "The Gutenberg Blocks by Kadence Blocks \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the CountUp Widget in all versions up to, and including, 3.2.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
@ -39,10 +39,6 @@
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3062911/kadence-blocks/trunk/includes/assets/js/kb-countdown.min.js",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3062911/kadence-blocks/trunk/includes/assets/js/kb-countup.min.js",
"source": "security@wordfence.com"

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-32659",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-23T20:15:07.407",
"lastModified": "2024-04-23T20:15:07.407",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read if `((nWidth == 0) and (nHeight == 0))`. Version 3.5.1 contains a patch for the issue. No known workarounds are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://github.com/FreeRDP/FreeRDP/commit/6430945ce003a5e24d454d8566f54aae1b6b617b",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8jgr-7r33-x87w",
"source": "security-advisories@github.com"
},
{
"url": "https://oss-fuzz.com/testcase-detail/6156779722440704",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-32660",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-23T20:15:07.617",
"lastModified": "2024-04-23T20:15:07.617",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.5.1, a malicious server can crash the FreeRDP client by sending invalid huge allocation size. Version 3.5.1 contains a patch for the issue. No known workarounds are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://github.com/FreeRDP/FreeRDP/commit/5e5d27cf310e4c10b854be7667bfb7a5d774eb47",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxv6-2cw6-m3mx",
"source": "security-advisories@github.com"
},
{
"url": "https://oss-fuzz.com/testcase-detail/5559242514825216",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-32661",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-23T20:15:07.800",
"lastModified": "2024-04-23T20:15:07.800",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to a possible `NULL` access and crash. Version 3.5.1 contains a patch for the issue. No known workarounds are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://github.com/FreeRDP/FreeRDP/commit/71e463e31b4d69f4022d36bfc814592f56600793",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-p5m5-342g-pv9m",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-32662",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-23T21:15:48.200",
"lastModified": "2024-04-23T21:15:48.200",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://github.com/FreeRDP/FreeRDP/commit/626d10a94a88565d957ddc30768ed08b320049a7",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vffh-j6hh-95f4",
"source": "security-advisories@github.com"
},
{
"url": "https://oss-fuzz.com/testcase-detail/4985227207311360",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-32866",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-23T21:15:48.407",
"lastModified": "2024-04-23T21:15:48.407",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Conform, a type-safe form validation library, allows the parsing of nested objects in the form of `object.property`. Due to an improper implementation of this feature in versions prior to 1.1.1, an attacker can exploit the feature to trigger prototype pollution by passing a crafted input to `parseWith...` functions. Applications that use conform for server-side validation of form data or URL parameters are affected by this vulnerability. Version 1.1.1 contains a patch for the issue.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1321"
}
]
}
],
"references": [
{
"url": "https://github.com/edmundhung/conform/blob/59156d7115a7207fa3b6f8a70a4342a9b24c2501/packages/conform-dom/formdata.ts#L117",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/edmundhung/conform/commit/4819d51b5a53fd5486fc85c17cdc148eb160e3de",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/edmundhung/conform/security/advisories/GHSA-624g-8qjg-8qxf",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-32869",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-23T21:15:48.623",
"lastModified": "2024-04-23T21:15:48.623",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.2.7, when using serveStatic with deno, it is possible to traverse the directory where `main.ts` is located. This can result in retrieval of unexpected files. Version 4.2.7 contains a patch for the issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/honojs/hono/commit/92e65fbb6e5e7372650e7690dbd84938432d9e65",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/honojs/hono/security/advisories/GHSA-3mpf-rcc7-5347",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2024-32875",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-23T21:15:48.837",
"lastModified": "2024-04-23T21:15:48.837",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Hugo is a static site generator. Starting in version 0.123.0 and prior to version 0.125.3, title arguments in Markdown for links and images not escaped in internal render hooks. Hugo users who are impacted are those who have these hooks enabled and do not trust their Markdown content files. The issue is patched in v0.125.3. As a workaround, replace the templates with user defined templates or disable the internal templates."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-80"
}
]
}
],
"references": [
{
"url": "https://github.com/gohugoio/hugo/releases/tag/v0.125.3",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gohugoio/hugo/security/advisories/GHSA-ppf8-hhpp-f5hj",
"source": "security-advisories@github.com"
},
{
"url": "https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4064",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-23T20:15:07.997",
"lastModified": "2024-04-23T20:15:07.997",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Tenda AC8 16.03.34.09. It has been declared as critical. This vulnerability affects the function R7WebsSecurityHandler of the file /goform/execCommand. The manipulation of the argument password leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-261790 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/R7WebsSecurityHandler.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.261790",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.261790",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.316493",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4065",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-23T20:15:08.223",
"lastModified": "2024-04-23T20:15:08.223",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Tenda AC8 16.03.34.09. It has been rated as critical. This issue affects the function formSetRebootTimer of the file /goform/SetRebootTimer. The manipulation of the argument rebootTime leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-261791. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/formSetRebootTimer.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.261791",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.261791",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.316494",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4066",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-23T21:15:49.040",
"lastModified": "2024-04-23T21:15:49.040",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Tenda AC8 16.03.34.09. Affected is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation of the argument wanMTU/wanSpeed/cloneType/mac/serviceName/serverName leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-261792. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/fromAdvSetMacMtuWan.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.261792",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.261792",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.316495",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-23T20:00:32.054630+00:00
2024-04-23T22:00:37.926836+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-23T19:57:33.843000+00:00
2024-04-23T21:15:49.040000+00:00
```
### Last Data Feed Release
@ -33,48 +33,32 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
246563
246573
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `10`
- [CVE-2024-31208](CVE-2024/CVE-2024-312xx/CVE-2024-31208.json) (`2024-04-23T18:15:14.457`)
- [CVE-2024-32482](CVE-2024/CVE-2024-324xx/CVE-2024-32482.json) (`2024-04-23T18:15:14.810`)
- [CVE-2024-32658](CVE-2024/CVE-2024-326xx/CVE-2024-32658.json) (`2024-04-23T18:15:15.000`)
- [CVE-2024-4062](CVE-2024/CVE-2024-40xx/CVE-2024-4062.json) (`2024-04-23T19:15:46.553`)
- [CVE-2024-4063](CVE-2024/CVE-2024-40xx/CVE-2024-4063.json) (`2024-04-23T19:15:46.870`)
- [CVE-2024-32659](CVE-2024/CVE-2024-326xx/CVE-2024-32659.json) (`2024-04-23T20:15:07.407`)
- [CVE-2024-32660](CVE-2024/CVE-2024-326xx/CVE-2024-32660.json) (`2024-04-23T20:15:07.617`)
- [CVE-2024-32661](CVE-2024/CVE-2024-326xx/CVE-2024-32661.json) (`2024-04-23T20:15:07.800`)
- [CVE-2024-32662](CVE-2024/CVE-2024-326xx/CVE-2024-32662.json) (`2024-04-23T21:15:48.200`)
- [CVE-2024-32866](CVE-2024/CVE-2024-328xx/CVE-2024-32866.json) (`2024-04-23T21:15:48.407`)
- [CVE-2024-32869](CVE-2024/CVE-2024-328xx/CVE-2024-32869.json) (`2024-04-23T21:15:48.623`)
- [CVE-2024-32875](CVE-2024/CVE-2024-328xx/CVE-2024-32875.json) (`2024-04-23T21:15:48.837`)
- [CVE-2024-4064](CVE-2024/CVE-2024-40xx/CVE-2024-4064.json) (`2024-04-23T20:15:07.997`)
- [CVE-2024-4065](CVE-2024/CVE-2024-40xx/CVE-2024-4065.json) (`2024-04-23T20:15:08.223`)
- [CVE-2024-4066](CVE-2024/CVE-2024-40xx/CVE-2024-4066.json) (`2024-04-23T21:15:49.040`)
### CVEs modified in the last Commit
Recently modified CVEs: `24`
Recently modified CVEs: `3`
- [CVE-2004-0285](CVE-2004/CVE-2004-02xx/CVE-2004-0285.json) (`2024-04-23T19:52:22.567`)
- [CVE-2006-4993](CVE-2006/CVE-2006-49xx/CVE-2006-4993.json) (`2024-04-23T19:52:10.963`)
- [CVE-2007-0171](CVE-2007/CVE-2007-01xx/CVE-2007-0171.json) (`2024-04-23T19:52:32.443`)
- [CVE-2007-0172](CVE-2007/CVE-2007-01xx/CVE-2007-0172.json) (`2024-04-23T19:52:27.450`)
- [CVE-2011-2483](CVE-2011/CVE-2011-24xx/CVE-2011-2483.json) (`2024-04-23T19:57:33.843`)
- [CVE-2021-38201](CVE-2021/CVE-2021-382xx/CVE-2021-38201.json) (`2024-04-23T18:57:47.143`)
- [CVE-2024-24558](CVE-2024/CVE-2024-245xx/CVE-2024-24558.json) (`2024-04-23T19:52:49.107`)
- [CVE-2024-26592](CVE-2024/CVE-2024-265xx/CVE-2024-26592.json) (`2024-04-23T19:46:27.683`)
- [CVE-2024-31497](CVE-2024/CVE-2024-314xx/CVE-2024-31497.json) (`2024-04-23T18:15:14.660`)
- [CVE-2024-3400](CVE-2024/CVE-2024-34xx/CVE-2024-3400.json) (`2024-04-23T19:57:25.207`)
- [CVE-2024-3832](CVE-2024/CVE-2024-38xx/CVE-2024-3832.json) (`2024-04-23T18:15:15.187`)
- [CVE-2024-3833](CVE-2024/CVE-2024-38xx/CVE-2024-3833.json) (`2024-04-23T18:15:15.247`)
- [CVE-2024-3834](CVE-2024/CVE-2024-38xx/CVE-2024-3834.json) (`2024-04-23T18:15:15.290`)
- [CVE-2024-3837](CVE-2024/CVE-2024-38xx/CVE-2024-3837.json) (`2024-04-23T18:15:15.350`)
- [CVE-2024-3838](CVE-2024/CVE-2024-38xx/CVE-2024-3838.json) (`2024-04-23T18:15:15.410`)
- [CVE-2024-3839](CVE-2024/CVE-2024-38xx/CVE-2024-3839.json) (`2024-04-23T18:15:15.467`)
- [CVE-2024-3840](CVE-2024/CVE-2024-38xx/CVE-2024-3840.json) (`2024-04-23T18:15:15.520`)
- [CVE-2024-3841](CVE-2024/CVE-2024-38xx/CVE-2024-3841.json) (`2024-04-23T18:15:15.570`)
- [CVE-2024-3843](CVE-2024/CVE-2024-38xx/CVE-2024-3843.json) (`2024-04-23T18:15:15.610`)
- [CVE-2024-3844](CVE-2024/CVE-2024-38xx/CVE-2024-3844.json) (`2024-04-23T18:15:15.650`)
- [CVE-2024-3845](CVE-2024/CVE-2024-38xx/CVE-2024-3845.json) (`2024-04-23T18:15:15.690`)
- [CVE-2024-3846](CVE-2024/CVE-2024-38xx/CVE-2024-3846.json) (`2024-04-23T18:15:15.733`)
- [CVE-2024-3847](CVE-2024/CVE-2024-38xx/CVE-2024-3847.json) (`2024-04-23T18:15:15.783`)
- [CVE-2024-3914](CVE-2024/CVE-2024-39xx/CVE-2024-3914.json) (`2024-04-23T18:15:15.823`)
- [CVE-2022-30007](CVE-2022/CVE-2022-300xx/CVE-2022-30007.json) (`2024-04-23T20:15:07.160`)
- [CVE-2024-22638](CVE-2024/CVE-2024-226xx/CVE-2024-22638.json) (`2024-04-23T20:15:07.290`)
- [CVE-2024-2919](CVE-2024/CVE-2024-29xx/CVE-2024-2919.json) (`2024-04-23T21:15:48.110`)
## Download and Usage

View File

@ -8585,7 +8585,7 @@ CVE-2004-0281,0,0,a5b551c3f5758977d1a6a77a80db29af6ba522c65dd4e0c3867b0a52503659
CVE-2004-0282,0,0,744b019872557a60425c8e9f327b7c6a01217d34347d47b80eb0036a99d39825,2017-07-11T01:30:02.197000
CVE-2004-0283,0,0,7f67424bd500d69fa23e7313f40bb2460b5f89ec23d8f1bf69bfb0ab9d9426fa,2017-07-11T01:30:02.290000
CVE-2004-0284,0,0,30dc472b0514ba857b844047d928c73bbc88561ec49c91b8c77d7528c40bcd71,2021-07-23T12:55:03.667000
CVE-2004-0285,0,1,a8725954addf3a9df00374974b23d7f1f3f5ca556c3dbd4fe55c4e89f43b70bd,2024-04-23T19:52:22.567000
CVE-2004-0285,0,0,a8725954addf3a9df00374974b23d7f1f3f5ca556c3dbd4fe55c4e89f43b70bd,2024-04-23T19:52:22.567000
CVE-2004-0286,0,0,8dafc033e9db42a284c051c97601275bb38f27107642786473faae250f95994f,2017-07-11T01:30:02.447000
CVE-2004-0287,0,0,d16fbbe99dfa71ae0f58dae25f7eb40378a65b2fc6b062d93cc7fbca7fed5ad3,2017-07-11T01:30:02.497000
CVE-2004-0288,0,0,e7d35c35b4d43cd12bd27c6400ef38cb508599ceb7f9bcebfb7adf3341b3d7c3,2017-07-11T01:30:02.540000
@ -20699,7 +20699,7 @@ CVE-2006-4989,0,0,c8f8336fb475c8b77442c832ff06b116e53ec3d6b8312b23f5e9acd82755c1
CVE-2006-4990,0,0,68e78265ed8a4059465d637668eeecd3177adb6612a6fa7cbeffd4e499dbf6b1,2018-10-17T21:40:46.843000
CVE-2006-4991,0,0,bed8d0e9764ff007e05ddffb5cf9d7b9cd584e0ba0e0ca4daa02142535927112,2018-10-17T21:40:49.280000
CVE-2006-4992,0,0,b8d0accf8f637a19df0e29fdf2230f06557325eddf4888299b929243d4ac85e9,2023-11-07T01:59:25.357000
CVE-2006-4993,0,1,f6a35a486a060a4f4e33c50a6533794931439da174aa90e85e5f1a11cfdcbad1,2024-04-23T19:52:10.963000
CVE-2006-4993,0,0,f6a35a486a060a4f4e33c50a6533794931439da174aa90e85e5f1a11cfdcbad1,2024-04-23T19:52:10.963000
CVE-2006-4994,0,0,c5ef94894f67872840e7af1237a13b217e874e8632eebd993ea8f0817545e4c7,2023-11-07T01:59:25.447000
CVE-2006-4995,0,0,9f54345c01b423490629d9b822ffec72c053418110b019deeaf9acc3385d1d62,2023-11-07T01:59:25.503000
CVE-2006-4996,0,0,737f972222c16b53ed01a9a4f964ea8ad5e7ddf27c68d4ea7a159bddd1a2bd06,2023-11-07T01:59:25.550000
@ -23104,8 +23104,8 @@ CVE-2007-0167,0,0,6cd4c9ade160e632ceeeab387f2f2499f6f93a50a2b3169f74e363bd349f67
CVE-2007-0168,0,0,a0050464d8845d796c6f8ae4fc2a20e31ae37eb9cac07b6e2e52426630a8cabe,2021-04-07T18:53:50.540000
CVE-2007-0169,0,0,0a1d2970ccb0b23439136925bf805227c4ecaae40815eb2e9c2798fa0d08171c,2021-04-07T18:53:50.540000
CVE-2007-0170,0,0,2fdb53bbda6bb874a40a8eb5eadbc199a05dc61bcf29939ad238e05c27505b48,2017-10-19T01:29:56.877000
CVE-2007-0171,0,1,d2226e45244da55f46fad664b1ca3ad0854391cdf8200cf071b7589aa51832c2,2024-04-23T19:52:32.443000
CVE-2007-0172,0,1,0779ae5792a8552bc8272c20b39947f4059221cafa60623d9cf374e4ee689fc5,2024-04-23T19:52:27.450000
CVE-2007-0171,0,0,d2226e45244da55f46fad664b1ca3ad0854391cdf8200cf071b7589aa51832c2,2024-04-23T19:52:32.443000
CVE-2007-0172,0,0,0779ae5792a8552bc8272c20b39947f4059221cafa60623d9cf374e4ee689fc5,2024-04-23T19:52:27.450000
CVE-2007-0173,0,0,9e35c7150e9ede27174f0fa51be519750b2029054723f72f1a52aec76e911e72,2017-10-19T01:29:57.050000
CVE-2007-0174,0,0,7f7a52e6fa84076c43a3e8684f4e8ee641fa71f4d8f0d5cd36efb4a612dcd9bc,2018-10-16T16:31:33.853000
CVE-2007-0175,0,0,2803595c41c760cdd09df1de3fc2cc755b9a180ee6a03df5e6e915141c86ad4d,2017-07-29T01:30:01.923000
@ -49193,7 +49193,7 @@ CVE-2011-2479,0,0,ea96e6a2bbba76561fd23117e5cc9c01f320acee594086228a9fc77f86cd54
CVE-2011-2480,0,0,2caa3c3f9928f2b9f769985d2d097dc928f38961695a36bf6dedb962a1063587,2019-12-10T18:31:42.187000
CVE-2011-2481,0,0,af086350743452129d38c65a28de9682e79eb88ec762814e94b29746bb28e87b,2023-11-07T02:07:41.860000
CVE-2011-2482,0,0,ae377ae7f1d01ad14ddea1a083686fae6fa1adc88f4460adb43143c5994fe0c4,2023-02-13T01:19:46.610000
CVE-2011-2483,0,1,4fe49fd68a2f287a11f3923a628ae22b51586f171bb5a219b86e8150478f02d0,2024-04-23T19:57:33.843000
CVE-2011-2483,0,0,4fe49fd68a2f287a11f3923a628ae22b51586f171bb5a219b86e8150478f02d0,2024-04-23T19:57:33.843000
CVE-2011-2484,0,0,f091721d23b1b471ad871d9bd7dbd20e81ab9a82115b4c1158d186b17d0759e2,2020-07-27T22:41:19.207000
CVE-2011-2485,0,0,371567b94b5e4c39bb9f5037074d0c7ac039a56289c29e3e453d852d9d896c01,2012-07-03T16:40:29.677000
CVE-2011-2486,0,0,675ec82931bf7cb75fe920931492eb49b152c633d41804eb65e783ba3a791fbf,2013-09-01T06:24:51.890000
@ -180281,7 +180281,7 @@ CVE-2021-38198,0,0,7696d1781d4a6e6dd38679d773a122377b4c0939ef0b498dfcd5880d84d5c
CVE-2021-38199,0,0,616df992225670ac31780c0efcc159084ba6f2ebff7eed7dceae196e7d72efd9,2021-12-21T12:54:21.507000
CVE-2021-3820,0,0,48f02685b471f1f43f375e9e04a0c37a8807abd18d490dcc1b054bae4526feb9,2022-07-29T16:57:55.093000
CVE-2021-38200,0,0,8a24f015ba3b51ed5cef349654270e9c3f1a6fb891297563cadaab34c54ac165,2021-08-12T14:24:53.037000
CVE-2021-38201,0,1,f1843512ad29412c0a68086e86dc10ff3e41e09c77b3dfd8448188f697e73d3d,2024-04-23T18:57:47.143000
CVE-2021-38201,0,0,f1843512ad29412c0a68086e86dc10ff3e41e09c77b3dfd8448188f697e73d3d,2024-04-23T18:57:47.143000
CVE-2021-38202,0,0,14faf085d2c84be5c44f9685f49354984c54aa73ea3dca07ce2e5825643630f5,2021-10-07T20:39:27.070000
CVE-2021-38203,0,0,8e7c322c1f9ec5ee808d54305c7b5dbc54e11ae76f98cbb9da1dd43756dec8cb,2022-05-03T16:04:40.443000
CVE-2021-38204,0,0,7dff5129b1cf28be9d17a961d6715a859b2471390672f824080ba793687c1cc2,2022-01-04T16:37:18.183000
@ -197519,7 +197519,7 @@ CVE-2022-30001,0,0,9ea7556402d779647820b483c0e1325aaf1ae4ee6ec5c8343e4f2be222d1c
CVE-2022-30002,0,0,a1ec15dce750f399632a47395f14eba75124d3844f1fe520b5aa5606d2a2855f,2022-05-21T03:07:18.990000
CVE-2022-30003,0,0,31e1d67aa0a2ecaec299f8af016c40ed494849a65c43f62f3e2e46bad29f1b30,2022-09-28T17:04:10.997000
CVE-2022-30004,0,0,b4989293c4645d9294ac11654eec236433c850b421daaeead194cd4e0dd5067c,2022-09-28T17:03:19.440000
CVE-2022-30007,0,0,d865819d5fa65c9b32418636715f54735ae56387e319a2c4a14fe4f9497a0b14,2022-05-26T00:39:25.050000
CVE-2022-30007,0,1,aa7c77313fa22c1f036fbd74aaf6589e3efbe2f34aa8c05f8f55278498ca2445,2024-04-23T20:15:07.160000
CVE-2022-3001,0,0,241186fa240affe9cf81bda98be3340e7b209585b3d42e5f160beb90ad55b3f8,2022-09-19T19:08:04.817000
CVE-2022-30011,0,0,a5dd8bf2e83f88b528c8ca5668042d8231268b9062d3c91b93eb2b8fd5941f57,2023-11-02T01:12:30.027000
CVE-2022-30012,0,0,0929777da5ceac88984634610aa273b30287d4672915d7d193c4b510ea42192e,2022-05-24T17:04:39.297000
@ -241273,7 +241273,7 @@ CVE-2024-2263,0,0,df8d6f616c06d7efbf230a22645526f71cba2b5d98ac7477968fae54aee385
CVE-2024-22635,0,0,4862506d4e37fbac04654e9c145033c5c19772547553e0905cdb496418310552,2024-01-29T15:57:23.770000
CVE-2024-22636,0,0,d2329967243db7b2d90664e4db5aafab2eefb2c63c9125405da2b73ddd46c40f,2024-01-29T15:57:32.540000
CVE-2024-22637,0,0,26b297452537f73426f9b1e1c51d8375cdf08e35ab6ae3bee9824c37bc50f94b,2024-02-15T15:19:44.187000
CVE-2024-22638,0,0,3af9b550c5e91fc5f9396d71fc0f20f86d7c6a12d36aa6b3628acd4047f5d092,2024-01-29T15:57:43.763000
CVE-2024-22638,0,1,60058d6cb515c8aa3a8ab899f954be18d8e911ef19644ca8cbcf96f8a8fef453,2024-04-23T20:15:07.290000
CVE-2024-22639,0,0,d147d90780a694ff1383e30f52d6dbe1e7da032a2cc352a3c7766915866417f2,2024-01-29T15:57:50.477000
CVE-2024-2264,0,0,974a3209feed4d6057f1020f41685c0d8e8695fcbf79c0fbc4c6d1a61e8e6de4,2024-04-11T01:25:20.247000
CVE-2024-22640,0,0,1cf939be90392a4e496db73ac9b310c70c3d191887c946934cc9645d6269f346,2024-04-19T16:19:49.043000
@ -242167,7 +242167,7 @@ CVE-2024-24548,0,0,9dbe1af5af4a9b865bf88b2a305b739ac231a7ce95c9c8ed04344b3144708
CVE-2024-24549,0,0,41f01a6ce0acab1e663a33240960755cce5d7348c8154f4ae0884170d1f21b3b,2024-04-06T06:15:08.030000
CVE-2024-24556,0,0,5eadc80f5e2b4d40f2247a29eb7c2aa8b2d9f2f191f8cfe4f491f2d184a6cbe7,2024-02-06T19:24:46.810000
CVE-2024-24557,0,0,803986686a1d77830cb33582e01547bf1b4ed013f71e8dbf2a84322efe6db933,2024-02-09T20:21:32.970000
CVE-2024-24558,0,1,26ffac7b2f9dc8041f02bc6fb374f1f9b0b06e69d8b3e191802aa68af28d0bbc,2024-04-23T19:52:49.107000
CVE-2024-24558,0,0,26ffac7b2f9dc8041f02bc6fb374f1f9b0b06e69d8b3e191802aa68af28d0bbc,2024-04-23T19:52:49.107000
CVE-2024-24559,0,0,a0cb86b836a7e79e3e1b100a5872aae73fa30cbfc276547c01a7202600c7c117,2024-02-12T21:40:56.547000
CVE-2024-2456,0,0,50cc90bc41b3799405fb23cbe82f5c15d252305910bd20a549ad8554a4e042cd,2024-04-10T13:23:38.787000
CVE-2024-24560,0,0,d3bc441b7f7323645f1a247e96e6668e58a3a1d0f8c643e79ccfcc74a44eb295,2024-02-12T15:23:42.867000
@ -243312,7 +243312,7 @@ CVE-2024-26589,0,0,528da0ad6ce01bf77db8eec7de0776ce7a2f821b4949af8b66c0af55f0b75
CVE-2024-2659,0,0,f70d39261e85fb28ecf8b90e66824a1515a67332ae1cb9fb94b78b0878034f3f,2024-04-15T19:12:25.887000
CVE-2024-26590,0,0,abd86201bd23efc7d86afd5c0d7b0d654a2577ad84615d2348f851e6a7a9eae0,2024-03-18T17:54:20.197000
CVE-2024-26591,0,0,5929783d5428bb2c14c53508060d365bc2cc03643c73a5c691e380ff07f76710,2024-03-18T17:54:44.267000
CVE-2024-26592,0,1,f757e026c76c6fd4946732bc503cc5d664f7a9fcf3e2d940e8aa27b4fa0ddffd,2024-04-23T19:46:27.683000
CVE-2024-26592,0,0,f757e026c76c6fd4946732bc503cc5d664f7a9fcf3e2d940e8aa27b4fa0ddffd,2024-04-23T19:46:27.683000
CVE-2024-26593,0,0,98e4a4e90fea8bbd21c17da9b47a219607d5ce75195bf465a61fda95e4390501,2024-04-19T17:58:44.667000
CVE-2024-26594,0,0,07543a5cd1955430bfc49a61bb08638317c690c5df69e623c4efd4c3bc80964a,2024-04-19T18:42:49.670000
CVE-2024-26595,0,0,4aab14a348ba85d767a05d71533f3a3f5d4b6347adf8eb4cca8cbcf592f0a830,2024-04-17T19:55:31.323000
@ -244667,7 +244667,7 @@ CVE-2024-29186,0,0,9eae16b82ad0960a39bab28b7331d7fbcb06214ff5e685dffe5ebccb6351d
CVE-2024-29187,0,0,e759748c9eddb6fb94f310b6fbfd0a60978fe40972c402d0d57e603137386e75,2024-03-25T01:51:01.223000
CVE-2024-29188,0,0,936a9c226ba5e7f9ce4bf09d536924cb3ac611efe865e82a6596de0401a89ca0,2024-03-25T01:51:01.223000
CVE-2024-29189,0,0,6878e9b35a058677d2a3fa4fc5bfa3461c367e63050b0e9c52331e170e2ec716,2024-03-26T12:55:05.010000
CVE-2024-2919,0,0,32a8e7a536908ee366830f3669988141427f95b22fc2af5934c8ce4e4bcd3650,2024-04-04T12:48:41.700000
CVE-2024-2919,0,1,cab14862d675b468b7e5387271dae4d6b312c3201b5a28cf77935ce461c632ba,2024-04-23T21:15:48.110000
CVE-2024-29190,0,0,dd993808aabbfadd07f226263f194d2c29a65f1d0e197a65068c6fa33a34d2ff,2024-03-25T01:51:01.223000
CVE-2024-29191,0,0,b520f6c0ae464ba6b8ed6e55ee8e36c1dbac951b2168f7a78b0ab9cc09ee27cc,2024-04-04T16:33:06.610000
CVE-2024-29192,0,0,668f235aea1f149843465a9bb5e6c8d16a1e3bb6d67526ade216b3935ba2a245,2024-04-04T19:24:50.670000
@ -245618,7 +245618,7 @@ CVE-2024-31204,0,0,d77d8a78ba72f2a1144250dcbd3aeb2b57d00c9418a1c9337730d8bd71684
CVE-2024-31205,0,0,b253fd2658a692223bc8e40aabe86fdefb374b65b71659aad1a1d9f39a934ec9,2024-04-08T18:48:40.217000
CVE-2024-31206,0,0,bd1cbc8a5901cc2b410cb59c86ef8c814546918b6efc52403de5ae308d36d9dc,2024-04-05T12:40:52.763000
CVE-2024-31207,0,0,af1a3137415a749d0a1549c9f6fa25303b24e194f3861bc2095545bb707985a2,2024-04-04T16:33:06.610000
CVE-2024-31208,1,1,f64a273d7331256197537aa26a480aa4e0dfc51f9056697d51c22575b6ba6ddf,2024-04-23T18:15:14.457000
CVE-2024-31208,0,0,f64a273d7331256197537aa26a480aa4e0dfc51f9056697d51c22575b6ba6ddf,2024-04-23T18:15:14.457000
CVE-2024-31209,0,0,dc7f150a1f8931f337c3d30121f71937562fb9b370a799204e5d75b796fcdc02,2024-04-04T16:33:06.610000
CVE-2024-31210,0,0,0c3a74f1634842d277fcf52471d61be8d27ebe967ace4d479af8f65fffdace19,2024-04-05T12:40:52.763000
CVE-2024-31211,0,0,37f6ef15b9def8ff0d686fae9ad61ad1a082be15bc6a18f70a40cbfe15e962e2,2024-04-05T12:40:52.763000
@ -245785,7 +245785,7 @@ CVE-2024-3147,0,0,f05061e9d718b866336ceef3f83885c168403f8d387cf11dbe00ac736df358
CVE-2024-3148,0,0,12b6e15e00d964ce79c059c99a6c4df70691a740ad2056657f2d4843c78fc654,2024-04-11T01:25:55.337000
CVE-2024-31487,0,0,ffef7fcdc05bb476a1f2c02c71de4a76075ea7f0301d6a8889db629ce9b194c6,2024-04-10T13:24:22.187000
CVE-2024-31492,0,0,a251126d380ad734bdcae40155276c0c8cd0f78c057d6c232814179759c90bf9,2024-04-10T19:49:51.183000
CVE-2024-31497,0,1,d6b4bcfa71e3a1696f4ae8c4f0f836abdfcd8a872f251758c7124dbc72616b69,2024-04-23T18:15:14.660000
CVE-2024-31497,0,0,d6b4bcfa71e3a1696f4ae8c4f0f836abdfcd8a872f251758c7124dbc72616b69,2024-04-23T18:15:14.660000
CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08
CVE-2024-31503,0,0,a2a7c8d9eaf4775895950c76302a02326a8d6e67bb7d5ec85d9e8a8516e17053,2024-04-17T12:48:07.510000
CVE-2024-31506,0,0,8be7ef5b3e9d65e4bba9dd63e2b7475f0658a4b183369094a98038d4eee40099,2024-04-10T13:24:00.070000
@ -246124,7 +246124,7 @@ CVE-2024-32478,0,0,767d0906439929f5e4e53d4d2396aabddb8a0de51e7967f13464fca079c70
CVE-2024-32479,0,0,9f233b992ed22cd02276821942e34be3b1cd724f5562f573e840e7a10cf66aba,2024-04-23T12:52:26.253000
CVE-2024-3248,0,0,65f6d4ddfc43ae235edf2e59fc9daa1f1d020439a4fa197a41a6ddd58e106004,2024-04-03T12:38:04.840000
CVE-2024-32480,0,0,f740881091f1f05e0445ba97b5de61d4d063547c57ff7478943e1cd018db3728,2024-04-23T12:52:26.253000
CVE-2024-32482,1,1,d968a70aa898a4f3f97bc16df8c7125cc3072d2ec01d0f51343071622157545c,2024-04-23T18:15:14.810000
CVE-2024-32482,0,0,d968a70aa898a4f3f97bc16df8c7125cc3072d2ec01d0f51343071622157545c,2024-04-23T18:15:14.810000
CVE-2024-32487,0,0,746d95a6c3889a9e0164763739aef81432a5222f159aa33a064a3132dbd4a7ad,2024-04-15T13:15:31.997000
CVE-2024-32488,0,0,6ce6bcee8af0a677e98d2bf7a3efd66cf8a3e580423515387116f39d710ba974,2024-04-15T13:15:31.997000
CVE-2024-32489,0,0,cbc8895e7f5e99c09f7bd505220fcc5514b4573939580e3f381a933acf3c9ef0,2024-04-15T13:15:31.997000
@ -246242,8 +246242,12 @@ CVE-2024-32652,0,0,507899e8cc0ef719a4df6a408b43b1aeaf42e8d25b41dcf9a35617406adcc
CVE-2024-32653,0,0,96a4de58183f8a4c5475803e77d708dc553ab0aba5c22712929dba4355cb603d,2024-04-23T12:52:26.253000
CVE-2024-32656,0,0,507ca72541b43d2bb1e3f8cba739ba39a5095ac212b37ee6cfc977f3944f903a,2024-04-23T12:52:26.253000
CVE-2024-32657,0,0,45665c321c855eccec4d820153233a5ab3c0184c9eb39067bd012d7165ff1a87,2024-04-23T12:52:26.253000
CVE-2024-32658,1,1,7069993bd5ea0f3424896d58f9e2d6edcb0d553ec3f3fcbae32b44ca4bca3d06,2024-04-23T18:15:15
CVE-2024-32658,0,0,7069993bd5ea0f3424896d58f9e2d6edcb0d553ec3f3fcbae32b44ca4bca3d06,2024-04-23T18:15:15
CVE-2024-32659,1,1,3863493766e8b92f6e935a4c624689c9791585ec089717c13ff45c96f4bafeec,2024-04-23T20:15:07.407000
CVE-2024-3266,0,0,254a5ba127b10ac48f062b62dbe4c90ef51eaba1ed741161e5a22416cbb32240,2024-04-10T13:23:38.787000
CVE-2024-32660,1,1,d62fd7f207ea2a95737f95de3789bba0f5e2e8c6d3dba892168735cafbe777f5,2024-04-23T20:15:07.617000
CVE-2024-32661,1,1,b3ea525969a9e5c2dcb91781acfcb1f5f215822dc7619cb2b5af90a890d7189f,2024-04-23T20:15:07.800000
CVE-2024-32662,1,1,0badc9bcc789e6aa6c2864071ddc14c3ca8e18de773ff401805be71e226c3d0e,2024-04-23T21:15:48.200000
CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000
CVE-2024-32679,0,0,ef89c247f793ab0c364d15f1c12e10a818494992e9afdd2f8a5235049bafdc91,2024-04-23T15:15:49.823000
CVE-2024-32681,0,0,30385cf8415af0417b19f52d5eb22ace0b875cd333ead985847624dbf28043cd,2024-04-22T13:28:34.007000
@ -246274,6 +246278,9 @@ CVE-2024-32746,0,0,15529f833c25b7b5b5022877593c49d5afec10018bbf65b56334a694e0bc4
CVE-2024-3281,0,0,b3c51db3aca3b371ad4faa3c1c4537d2c54d8323123f7ae9b26414cd9ee432a6,2024-04-10T13:24:22.187000
CVE-2024-3283,0,0,8b1939d21df3d4399a3bf874e70470053c1a0ae20421841ad51c79aca5727c56,2024-04-10T19:49:51.183000
CVE-2024-3285,0,0,ea17e16acaa3172cbcc052cf9bfb1b3e7ee2b004434b062b8e67c1c1ed8bff14,2024-04-11T12:47:44.137000
CVE-2024-32866,1,1,05678f43fde377094870958f3884da0ddab39ebb03caf1126589a6adb2aeb008,2024-04-23T21:15:48.407000
CVE-2024-32869,1,1,ab50b9f75b25c61594accda9ae6ab253572d5f8b04d2fd0a7c7a99be62faabe2,2024-04-23T21:15:48.623000
CVE-2024-32875,1,1,d07c3544404bdf6b8e4f3a41c660a40665138d4b2b82393b554fde4845ce31d9,2024-04-23T21:15:48.837000
CVE-2024-3293,0,0,3552485a27a6b6c8b2cadd17fbdb3e630238722099a3e2d8d97b0f239cd2dc1a,2024-04-23T12:52:26.253000
CVE-2024-3296,0,0,bcc39314c1e9f6d53aa0ccc8e7e7cac7c279f7f6ee5a27f19287b128ea2ed6c7,2024-04-05T12:15:37.777000
CVE-2024-3298,0,0,35145d829af4d19541380a93e6723503e514b69e11aa4b007b05099610c37f21,2024-04-04T16:33:06.610000
@ -246329,7 +246336,7 @@ CVE-2024-3385,0,0,dafd55987e5738b5d6ec37d523526a7e0269d60d96cd780933abafbc800645
CVE-2024-3386,0,0,d08d523d066834a85bfe06023f05a033d8631a6197479f66bfb86438af143c6d,2024-04-10T19:49:51.183000
CVE-2024-3387,0,0,59a783d7f5a632f1312dc02ccd745e7c758f93e478c4554a0dbc9aba27d256c0,2024-04-10T19:49:51.183000
CVE-2024-3388,0,0,9a13547aa29d2171bfe252870fb3dde44261a463a11a31d9062dc130e0f3c4f3,2024-04-10T19:49:51.183000
CVE-2024-3400,0,1,5bb68c1f741d7492d6e3e08b6f1711eb6e28a4a827bd2f3f354ccd1b7a47a1fe,2024-04-23T19:57:25.207000
CVE-2024-3400,0,0,5bb68c1f741d7492d6e3e08b6f1711eb6e28a4a827bd2f3f354ccd1b7a47a1fe,2024-04-23T19:57:25.207000
CVE-2024-3413,0,0,7c0263f5aa26015f580f259b17ac76e3fb232807ce6eb6b3e0fa4a42d34def58,2024-04-11T01:26:00.727000
CVE-2024-3414,0,0,fcf8b2012e3dcab7048965e9d40e8c26f25a86217cc70e6c24a2ae712b119943,2024-04-11T01:26:00.803000
CVE-2024-3415,0,0,80d83d8ba89e3620cb20eb7a8b2b10e1c5fbd8b76c068e7c00b4af6deadd81dd,2024-04-11T01:26:00.900000
@ -246494,19 +246501,19 @@ CVE-2024-3804,0,0,d2c04bcba3b9dcee33d8ad0e898646d48639f7e3e6aed11c413cf03cea6afb
CVE-2024-3817,0,0,46e4b3903939ad7f28eeb8afee28fc4c5b18be71847d60ae426ede3b66e11122,2024-04-18T13:04:28.900000
CVE-2024-3818,0,0,3b93c96d931c7712dba585285a5a0f954163c40c8ab2b4d2e42e74b7a416a166,2024-04-19T13:10:25.637000
CVE-2024-3825,0,0,f398f78dcc905612b8b1fff020bcc62d405b80ffdf3a9053d9f90f163c40baa7,2024-04-17T15:31:50.160000
CVE-2024-3832,0,1,1075b96952121645fbb81b228e0c3813e39db7e21c4c9aa1fc24c30b61618c13,2024-04-23T18:15:15.187000
CVE-2024-3833,0,1,a457fea2be3570f92e174a05ad3ebccc260fba3d80fa99b9571951cefff83bf8,2024-04-23T18:15:15.247000
CVE-2024-3834,0,1,d74323c3b1f82373afa6afa9a2099c919ed3327f614f52d5ae9ffbb2921db60f,2024-04-23T18:15:15.290000
CVE-2024-3837,0,1,1a7543d4c4d038a08e38b9f40b6dd120ea1a46620fdb71cd83a132c5f4434d75,2024-04-23T18:15:15.350000
CVE-2024-3838,0,1,bd55ca068ebe4472845bce1f3d037932d27279da54b129864c942318cbf6c399,2024-04-23T18:15:15.410000
CVE-2024-3839,0,1,c6f5f4ba36659bbdf95cdeb0e47e41641932dccad8eaf764f80b72ad0dd47f13,2024-04-23T18:15:15.467000
CVE-2024-3840,0,1,c5e7f6b1ea42f8b045423d9acc57d84648dca4d80ba872d4df6831e3c4cf4908,2024-04-23T18:15:15.520000
CVE-2024-3841,0,1,85253b65c449a8cc578a7de0959057d75700f84aa10824187b3b99abb67adde7,2024-04-23T18:15:15.570000
CVE-2024-3843,0,1,832cfd8f4407c61d4a78edbbcbe24a6a38c56c364aead34f5b47a06d711bf3df,2024-04-23T18:15:15.610000
CVE-2024-3844,0,1,c12354244043fbfc51820f35c8a63b4dfe16d1459a37300b3a4231a1ddd9e60f,2024-04-23T18:15:15.650000
CVE-2024-3845,0,1,e7fa4e6524d058fce6ed4d80d8501b11a06f3e2ff47789c744cfd8da13426ec7,2024-04-23T18:15:15.690000
CVE-2024-3846,0,1,b465ce0b0fca30612f30027655057056e96c1e5f955b7bd495917b047afcd41a,2024-04-23T18:15:15.733000
CVE-2024-3847,0,1,92826ca89ff64563c0ca9b0b7e1566037f47624d36b52031222c1c623aa66584,2024-04-23T18:15:15.783000
CVE-2024-3832,0,0,1075b96952121645fbb81b228e0c3813e39db7e21c4c9aa1fc24c30b61618c13,2024-04-23T18:15:15.187000
CVE-2024-3833,0,0,a457fea2be3570f92e174a05ad3ebccc260fba3d80fa99b9571951cefff83bf8,2024-04-23T18:15:15.247000
CVE-2024-3834,0,0,d74323c3b1f82373afa6afa9a2099c919ed3327f614f52d5ae9ffbb2921db60f,2024-04-23T18:15:15.290000
CVE-2024-3837,0,0,1a7543d4c4d038a08e38b9f40b6dd120ea1a46620fdb71cd83a132c5f4434d75,2024-04-23T18:15:15.350000
CVE-2024-3838,0,0,bd55ca068ebe4472845bce1f3d037932d27279da54b129864c942318cbf6c399,2024-04-23T18:15:15.410000
CVE-2024-3839,0,0,c6f5f4ba36659bbdf95cdeb0e47e41641932dccad8eaf764f80b72ad0dd47f13,2024-04-23T18:15:15.467000
CVE-2024-3840,0,0,c5e7f6b1ea42f8b045423d9acc57d84648dca4d80ba872d4df6831e3c4cf4908,2024-04-23T18:15:15.520000
CVE-2024-3841,0,0,85253b65c449a8cc578a7de0959057d75700f84aa10824187b3b99abb67adde7,2024-04-23T18:15:15.570000
CVE-2024-3843,0,0,832cfd8f4407c61d4a78edbbcbe24a6a38c56c364aead34f5b47a06d711bf3df,2024-04-23T18:15:15.610000
CVE-2024-3844,0,0,c12354244043fbfc51820f35c8a63b4dfe16d1459a37300b3a4231a1ddd9e60f,2024-04-23T18:15:15.650000
CVE-2024-3845,0,0,e7fa4e6524d058fce6ed4d80d8501b11a06f3e2ff47789c744cfd8da13426ec7,2024-04-23T18:15:15.690000
CVE-2024-3846,0,0,b465ce0b0fca30612f30027655057056e96c1e5f955b7bd495917b047afcd41a,2024-04-23T18:15:15.733000
CVE-2024-3847,0,0,92826ca89ff64563c0ca9b0b7e1566037f47624d36b52031222c1c623aa66584,2024-04-23T18:15:15.783000
CVE-2024-3852,0,0,3038e46972183e994310b2b410f139aaace8bd74e7e7e979d336a57b5feba459,2024-04-22T10:15:07.430000
CVE-2024-3853,0,0,da9bcb4a065926b49732a0dd79b2f07a12fd9777c9341906bc363e07df8725cf,2024-04-17T12:48:31.863000
CVE-2024-3854,0,0,1fc25728bc86cd277ba270d144040c69a89e438f315d3ebf85291cac5fb28ebb,2024-04-22T10:15:07.470000
@ -246544,7 +246551,7 @@ CVE-2024-3908,0,0,26db16f32c52be83b374f19657727a3a2a3db16f8ab3cda20dc3ad146f877b
CVE-2024-3909,0,0,c5efb647be20bf9f2ba452fa9666b153466b94d0e5f3c713649def6568acf5a0,2024-04-17T12:48:07.510000
CVE-2024-3910,0,0,7d8aafa4b35964a72cdc3d08dd6c7b1615ef522d553c6c78d413b0e25fdc718e,2024-04-17T12:48:07.510000
CVE-2024-3911,0,0,11f3bec5f1587eb22151392a8d155bb89d10f83f95efada567bdaf5751a2af93,2024-04-23T13:15:46.770000
CVE-2024-3914,0,1,97e3c2a1ceda5baa1eed65646997d7cab2203eabae8e05a9bf7340c2163a5004,2024-04-23T18:15:15.823000
CVE-2024-3914,0,0,97e3c2a1ceda5baa1eed65646997d7cab2203eabae8e05a9bf7340c2163a5004,2024-04-23T18:15:15.823000
CVE-2024-3928,0,0,114c97f372c53f33fe3b26cd091686f1eb78a3749714814b77901a77b62a0107,2024-04-18T13:04:28.900000
CVE-2024-3931,0,0,adc8a79b07f48b35a9681a97a568e852ba1ef2cbd3b7271f585750c2d2c4216b,2024-04-18T13:04:28.900000
CVE-2024-3932,0,0,bce0f8b09e2fc4acc0cfce5940d57ce5f1e0384ac19f6c68ed218175688d8f12,2024-04-18T13:04:28.900000
@ -246560,5 +246567,8 @@ CVE-2024-4022,0,0,ebd323c8f90bdf29bd6ff35ea1eff449874a3d962dc85b687039f47f7b416e
CVE-2024-4026,0,0,65bff2dba626fde0f88488c1e6df610a37e761e2e041855587a3bbcb3e849c23,2024-04-22T13:28:34.007000
CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000
CVE-2024-4040,0,0,1c076b2ab70ecb1e80edff07a45eda641d4fa881fea89ccf32a60b6e73154ae3,2024-04-23T12:52:26.253000
CVE-2024-4062,1,1,fd0989c37011fb6cb5794fb7df968df0263f3f31c3aef5d67b3f6a349ba1e358,2024-04-23T19:15:46.553000
CVE-2024-4063,1,1,2008c390464bacff63172644a55a59e96a94988eb99fab2491b3e8e538a775f3,2024-04-23T19:15:46.870000
CVE-2024-4062,0,0,fd0989c37011fb6cb5794fb7df968df0263f3f31c3aef5d67b3f6a349ba1e358,2024-04-23T19:15:46.553000
CVE-2024-4063,0,0,2008c390464bacff63172644a55a59e96a94988eb99fab2491b3e8e538a775f3,2024-04-23T19:15:46.870000
CVE-2024-4064,1,1,09ee7a85b82de580b2a486361eb0eaa08998727fa590a9268296692079168787,2024-04-23T20:15:07.997000
CVE-2024-4065,1,1,a5da92576f462db4d931c9ed36d295da893b4e991ec9663049a58cac021ab267,2024-04-23T20:15:08.223000
CVE-2024-4066,1,1,56a8ad546d4df99104a2f9d47e1c66543e4a309385ab664f82bdeb489fbff99f,2024-04-23T21:15:49.040000

Can't render this file because it is too large.