mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2024-05-02T14:00:37.776516+00:00
This commit is contained in:
parent
cee59ab258
commit
951bfd5fbc
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-36593",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-01T22:15:09.340",
|
||||
"lastModified": "2024-05-01T22:15:09.340",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-36594",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-01T22:15:09.413",
|
||||
"lastModified": "2024-05-01T22:15:09.413",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2023/CVE-2023-287xx/CVE-2023-28798.json
Normal file
55
CVE-2023/CVE-2023-287xx/CVE-2023-28798.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-28798",
|
||||
"sourceIdentifier": "cve@zscaler.com",
|
||||
"published": "2024-05-02T13:23:05.807",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds write to heap in the pacparser library on Zscaler Client Connector on Mac may lead to arbitrary code execution."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@zscaler.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@zscaler.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=macOS&applicable_version=3.7&deployment_date=2022-08-19&id=1414851",
|
||||
"source": "cve@zscaler.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-419xx/CVE-2023-41970.json
Normal file
55
CVE-2023/CVE-2023-419xx/CVE-2023-41970.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-41970",
|
||||
"sourceIdentifier": "cve@zscaler.com",
|
||||
"published": "2024-05-02T13:23:06.003",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Improper Validation of Integrity Check Value vulnerability in Zscaler Client Connector on Windows during the Repair App functionality may allow Local Execution of Code.This issue affects Client Connector on Windows: before 4.1.0.62.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@zscaler.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@zscaler.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-354"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=windows&applicable_version=4.1",
|
||||
"source": "cve@zscaler.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-419xx/CVE-2023-41971.json
Normal file
55
CVE-2023/CVE-2023-419xx/CVE-2023-41971.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-41971",
|
||||
"sourceIdentifier": "cve@zscaler.com",
|
||||
"published": "2024-05-02T13:23:06.180",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Improper Link Resolution Before File Access ('Link Following') vulnerability in Zscaler Client Connector on Windows allows a system file to be overwritten.This issue affects Client Connector on Windows: before 3.7.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@zscaler.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@zscaler.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021??applicable_category=windows&applicable_version=3.7",
|
||||
"source": "cve@zscaler.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-46294",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-01T20:15:12.267",
|
||||
"lastModified": "2024-05-01T20:15:12.267",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Teledyne FLIR M300 2.00-19. User account passwords are encrypted locally, and can be decrypted to cleartext passwords using the utility umSetup. This utility requires root permissions to execute."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en Teledyne FLIR M300 2.00-19. Las contrase\u00f1as de las cuentas de usuario se cifran localmente y se pueden descifrar en contrase\u00f1as de texto plano mediante la utilidad umSetup. Esta utilidad requiere permisos de root para ejecutarse."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-46295",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-01T20:15:12.330",
|
||||
"lastModified": "2024-05-01T20:15:12.330",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Teledyne FLIR M300 2.00-19. Unauthenticated remote code execution can occur in the web server. An attacker can exploit this by sending a POST request to the vulnerable PHP page. An attacker can elevate to root permissions with Sudo."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en Teledyne FLIR M300 2.00-19. Puede ocurrir una ejecuci\u00f3n remota de c\u00f3digo no autenticado en el servidor web. Un atacante puede aprovechar esto enviando una solicitud POST a la p\u00e1gina PHP vulnerable. Un atacante puede elevar los permisos a root con Sudo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51631",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-05-02T00:15:07.270",
|
||||
"lastModified": "2024-05-02T00:15:07.270",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2024/CVE-2024-234xx/CVE-2024-23459.json
Normal file
55
CVE-2024/CVE-2024-234xx/CVE-2024-23459.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-23459",
|
||||
"sourceIdentifier": "cve@zscaler.com",
|
||||
"published": "2024-05-02T13:23:06.363",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Improper Link Resolution Before File Access ('Link Following') vulnerability in Zscaler Client Connector on Mac allows a system file to be overwritten.This issue affects Zscaler Client Connector on Mac : before 3.7.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@zscaler.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@zscaler.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=macos&applicable_version=3.7",
|
||||
"source": "cve@zscaler.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-234xx/CVE-2024-23461.json
Normal file
55
CVE-2024/CVE-2024-234xx/CVE-2024-23461.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-23461",
|
||||
"sourceIdentifier": "cve@zscaler.com",
|
||||
"published": "2024-05-02T13:23:06.567",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Improper Validation of Integrity Check Value vulnerability in Zscaler Client Connector on MacOS during the upgrade process may allow a Local Execution of Code.This issue affects Client Connector on MacOS: before 3.4.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@zscaler.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@zscaler.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-354"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021?applicable_category=macos&applicable_version=3.4",
|
||||
"source": "cve@zscaler.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-234xx/CVE-2024-23462.json
Normal file
55
CVE-2024/CVE-2024-234xx/CVE-2024-23462.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-23462",
|
||||
"sourceIdentifier": "cve@zscaler.com",
|
||||
"published": "2024-05-02T13:23:06.810",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Improper Validation of Integrity Check Value vulnerability in Zscaler Client Connector on MacOS allows a denial of service of the Client Connector binary and thus removing client functionality.This issue affects Client Connector on MacOS: before 3.4.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@zscaler.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@zscaler.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-354"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021?applicable_category=macos&applicable_version=3.4",
|
||||
"source": "cve@zscaler.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2405",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-05-02T06:15:49.947",
|
||||
"lastModified": "2024-05-02T06:15:49.947",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-25676",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-01T20:15:12.733",
|
||||
"lastModified": "2024-05-01T20:15:12.733",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ViewerJS 0.5.8. A script from the component loads content via URL TAGs without properly sanitizing it. This leads to both open redirection and out-of-band resource loading."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en ViewerJS 0.5.8. Un script del componente carga contenido a trav\u00e9s de ETIQUETAS URL sin sanitizarlo adecuadamente. Esto conduce tanto a la redirecci\u00f3n abierta como a la carga de recursos fuera de banda."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3005",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-02T11:15:46.477",
|
||||
"lastModified": "2024-05-02T11:15:46.477",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-32114",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-05-02T09:15:06.990",
|
||||
"lastModified": "2024-05-02T09:15:06.990",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-32638",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-05-02T10:15:08.443",
|
||||
"lastModified": "2024-05-02T10:15:08.443",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-32882",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-05-02T07:15:20.967",
|
||||
"lastModified": "2024-05-02T07:15:20.967",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-32962",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-05-02T07:15:21.420",
|
||||
"lastModified": "2024-05-02T07:15:21.420",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-32971",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-05-02T07:15:21.733",
|
||||
"lastModified": "2024-05-02T07:15:21.733",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3280",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-02T08:15:08.270",
|
||||
"lastModified": "2024-05-02T08:15:08.270",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-33306",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-01T20:15:12.787",
|
||||
"lastModified": "2024-05-01T20:15:12.787",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SourceCodester Laboratory Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via \"First Name\" parameter in Create User."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "SourceCodester Laboratory Management System 1.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s del par\u00e1metro \"Nombre\" en Crear usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-33307",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-01T20:15:12.837",
|
||||
"lastModified": "2024-05-01T20:15:12.837",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SourceCodester Laboratory Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via \"Last Name\" parameter in Create User."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "SourceCodester Laboratory Management System 1.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s del par\u00e1metro \"Apellido\" en Crear usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-33423",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-01T20:15:12.887",
|
||||
"lastModified": "2024-05-01T20:15:12.887",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Scripting (XSS) vulnerability in the Settings menu of CMSimple v5.15 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Logout parameter under the Language section."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de Cross Site Scripting (XSS) en el men\u00fa Configuraci\u00f3n de CMSimple v5.15 permite a los atacantes ejecutar script web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Cerrar sesi\u00f3n en la secci\u00f3n Idioma."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33911",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-02T11:15:45.663",
|
||||
"lastModified": "2024-05-02T11:15:45.663",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33913",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-02T11:15:45.883",
|
||||
"lastModified": "2024-05-02T11:15:45.883",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33922",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-02T11:15:46.080",
|
||||
"lastModified": "2024-05-02T11:15:46.080",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33930",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-02T11:15:46.273",
|
||||
"lastModified": "2024-05-02T11:15:46.273",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2024/CVE-2024-339xx/CVE-2024-33944.json
Normal file
55
CVE-2024/CVE-2024-339xx/CVE-2024-33944.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33944",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-02T13:15:26.240",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Kestrel WooCommerce AWeber Newsletter Subscription.This issue affects WooCommerce AWeber Newsletter Subscription: from n/a through 4.0.2.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/woocommerce-aweber-newsletter-subscription/wordpress-woocommerce-aweber-newsletter-subscription-plugin-4-0-1-unauthenticated-access-token-change-reset-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3471",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-05-02T06:15:50.350",
|
||||
"lastModified": "2024-05-02T06:15:50.350",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3472",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-05-02T06:15:50.453",
|
||||
"lastModified": "2024-05-02T06:15:50.453",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3474",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-05-02T06:15:50.527",
|
||||
"lastModified": "2024-05-02T06:15:50.527",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3475",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-05-02T06:15:50.660",
|
||||
"lastModified": "2024-05-02T06:15:50.660",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3476",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-05-02T06:15:50.887",
|
||||
"lastModified": "2024-05-02T06:15:50.887",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3477",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-05-02T06:15:50.950",
|
||||
"lastModified": "2024-05-02T06:15:50.950",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3478",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-05-02T06:15:51.033",
|
||||
"lastModified": "2024-05-02T06:15:51.033",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3481",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-05-02T06:15:51.130",
|
||||
"lastModified": "2024-05-02T06:15:51.130",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3490",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-02T07:15:22.040",
|
||||
"lastModified": "2024-05-02T07:15:22.040",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3883",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-02T09:15:07.233",
|
||||
"lastModified": "2024-05-02T09:15:07.233",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3955",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2024-05-02T10:15:08.630",
|
||||
"lastModified": "2024-05-02T10:15:08.630",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4142",
|
||||
"sourceIdentifier": "reefs@jfrog.com",
|
||||
"published": "2024-05-01T21:15:51.000",
|
||||
"lastModified": "2024-05-01T21:15:51.000",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Improper input validation vulnerability that could potentially lead to privilege escalation\u00a0was discovered in JFrog Artifactory.\n\nDue to this vulnerability, users with low privileges may gain administrative access to the system.\n\nThis issue can also be exploited in Artifactory platforms with anonymous access enabled.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 en JFrog Artifactory una vulnerabilidad de validaci\u00f3n de entrada incorrecta que podr\u00eda conducir a una escalada de privilegios. Debido a esta vulnerabilidad, los usuarios con privilegios bajos pueden obtener acceso administrativo al sistema. Este problema tambi\u00e9n se puede aprovechar en plataformas Artifactory con acceso an\u00f3nimo habilitado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
49
README.md
49
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-05-02T12:00:33.114492+00:00
|
||||
2024-05-02T14:00:37.776516+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-05-02T11:15:46.477000+00:00
|
||||
2024-05-02T13:27:25.103000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,28 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
247528
|
||||
247535
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
|
||||
- [CVE-2024-3005](CVE-2024/CVE-2024-30xx/CVE-2024-3005.json) (`2024-05-02T11:15:46.477`)
|
||||
- [CVE-2024-32638](CVE-2024/CVE-2024-326xx/CVE-2024-32638.json) (`2024-05-02T10:15:08.443`)
|
||||
- [CVE-2024-33911](CVE-2024/CVE-2024-339xx/CVE-2024-33911.json) (`2024-05-02T11:15:45.663`)
|
||||
- [CVE-2024-33913](CVE-2024/CVE-2024-339xx/CVE-2024-33913.json) (`2024-05-02T11:15:45.883`)
|
||||
- [CVE-2024-33922](CVE-2024/CVE-2024-339xx/CVE-2024-33922.json) (`2024-05-02T11:15:46.080`)
|
||||
- [CVE-2024-33930](CVE-2024/CVE-2024-339xx/CVE-2024-33930.json) (`2024-05-02T11:15:46.273`)
|
||||
- [CVE-2024-3955](CVE-2024/CVE-2024-39xx/CVE-2024-3955.json) (`2024-05-02T10:15:08.630`)
|
||||
- [CVE-2023-28798](CVE-2023/CVE-2023-287xx/CVE-2023-28798.json) (`2024-05-02T13:23:05.807`)
|
||||
- [CVE-2023-41970](CVE-2023/CVE-2023-419xx/CVE-2023-41970.json) (`2024-05-02T13:23:06.003`)
|
||||
- [CVE-2023-41971](CVE-2023/CVE-2023-419xx/CVE-2023-41971.json) (`2024-05-02T13:23:06.180`)
|
||||
- [CVE-2024-23459](CVE-2024/CVE-2024-234xx/CVE-2024-23459.json) (`2024-05-02T13:23:06.363`)
|
||||
- [CVE-2024-23461](CVE-2024/CVE-2024-234xx/CVE-2024-23461.json) (`2024-05-02T13:23:06.567`)
|
||||
- [CVE-2024-23462](CVE-2024/CVE-2024-234xx/CVE-2024-23462.json) (`2024-05-02T13:23:06.810`)
|
||||
- [CVE-2024-33944](CVE-2024/CVE-2024-339xx/CVE-2024-33944.json) (`2024-05-02T13:15:26.240`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `33`
|
||||
|
||||
- [CVE-2023-52651](CVE-2023/CVE-2023-526xx/CVE-2023-52651.json) (`2024-05-02T10:15:07.500`)
|
||||
- [CVE-2024-31390](CVE-2024/CVE-2024-313xx/CVE-2024-31390.json) (`2024-05-02T11:15:45.547`)
|
||||
- [CVE-2024-32114](CVE-2024/CVE-2024-321xx/CVE-2024-32114.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-32638](CVE-2024/CVE-2024-326xx/CVE-2024-32638.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-3280](CVE-2024/CVE-2024-32xx/CVE-2024-3280.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-32882](CVE-2024/CVE-2024-328xx/CVE-2024-32882.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-32962](CVE-2024/CVE-2024-329xx/CVE-2024-32962.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-32971](CVE-2024/CVE-2024-329xx/CVE-2024-32971.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-33306](CVE-2024/CVE-2024-333xx/CVE-2024-33306.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-33307](CVE-2024/CVE-2024-333xx/CVE-2024-33307.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-33423](CVE-2024/CVE-2024-334xx/CVE-2024-33423.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-33911](CVE-2024/CVE-2024-339xx/CVE-2024-33911.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-33913](CVE-2024/CVE-2024-339xx/CVE-2024-33913.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-33922](CVE-2024/CVE-2024-339xx/CVE-2024-33922.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-33930](CVE-2024/CVE-2024-339xx/CVE-2024-33930.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-3471](CVE-2024/CVE-2024-34xx/CVE-2024-3471.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-3472](CVE-2024/CVE-2024-34xx/CVE-2024-3472.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-3474](CVE-2024/CVE-2024-34xx/CVE-2024-3474.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-3475](CVE-2024/CVE-2024-34xx/CVE-2024-3475.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-3476](CVE-2024/CVE-2024-34xx/CVE-2024-3476.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-3477](CVE-2024/CVE-2024-34xx/CVE-2024-3477.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-3478](CVE-2024/CVE-2024-34xx/CVE-2024-3478.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-3481](CVE-2024/CVE-2024-34xx/CVE-2024-3481.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-3490](CVE-2024/CVE-2024-34xx/CVE-2024-3490.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-3883](CVE-2024/CVE-2024-38xx/CVE-2024-3883.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-3955](CVE-2024/CVE-2024-39xx/CVE-2024-3955.json) (`2024-05-02T13:27:25.103`)
|
||||
- [CVE-2024-4142](CVE-2024/CVE-2024-41xx/CVE-2024-4142.json) (`2024-05-02T13:27:25.103`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
77
_state.csv
77
_state.csv
@ -179059,8 +179059,8 @@ CVE-2021-36581,0,0,28f8ea59999d4558aee34d2c014fcb68377b3d5200cfb73c0f2065280cb46
|
||||
CVE-2021-36582,0,0,aec2b4c2ad5639c3875456cc05c5a75c67ea0c230a00eecca0f7679b2d6b74cb,2021-09-28T14:57:24.057000
|
||||
CVE-2021-36584,0,0,f9476909b004a3c17d2b2fb626756e5e1ce61872e9bc17b0420d36921e31c97f,2021-08-12T18:56:25.233000
|
||||
CVE-2021-3659,0,0,f6fc2184fd003eece7a84f930a31721a62bc4c4eab4def2834bf08132b926069,2023-11-07T03:38:11.547000
|
||||
CVE-2021-36593,0,0,3ec3deec62293992fea9d31f42488020012eff32789e1e52bc3683ee46c0f473,2024-05-01T22:15:09.340000
|
||||
CVE-2021-36594,0,0,d9948746dcff9a74447e56a96019b9153de86ebaf4c8b5c9d4c2de6c87cb4640,2024-05-01T22:15:09.413000
|
||||
CVE-2021-36593,0,1,33f6ee3b593829bb556439be69cabe3ea83905e273d461bcedf335295e86166a,2024-05-02T13:27:25.103000
|
||||
CVE-2021-36594,0,1,9d68287e23e0a7190a393a52ed4e64fa87e82cd43f6169ce4cd49454b6821931,2024-05-02T13:27:25.103000
|
||||
CVE-2021-3660,0,0,45339e93b73a8e367140c34fa3b160abd0afe9d9c5b347481f7388450a2dafee,2023-02-12T23:42:07.917000
|
||||
CVE-2021-36601,0,0,efd8db70ae16b416c5df047a47a4200389b707a770874f88bfc7d6ece7c156e8,2021-08-19T14:05:14.620000
|
||||
CVE-2021-36603,0,0,7fb0e80c74bdfd8f2dc4edef2e166e14fe11ff7343deacfe1c010480e838d371,2023-01-13T14:59:33.493000
|
||||
@ -220719,6 +220719,7 @@ CVE-2023-28794,0,0,9d51fc9f9827cf3a9571a22038a1941a51dbb81199c04a2297ad7d779556e
|
||||
CVE-2023-28795,0,0,64c65c1aefea896c155021adfe19b01db7da306ed5e6ec262f956af64c2861c4,2023-10-27T00:41:21.067000
|
||||
CVE-2023-28796,0,0,6bc02a1ea37dbd7efb5a62c0a7f9b8486d8965b21edb4572472ded7b0020d893,2023-10-27T00:41:34.893000
|
||||
CVE-2023-28797,0,0,82b327a4ee3d3fcf4befb89dcf050b6020e6db547cc8e579973bb925d433a26d,2023-10-27T00:41:53.097000
|
||||
CVE-2023-28798,1,1,e2efa1e591c173b572917abb1d2598c8ea00f419a0cbd8540e0ce71442dededd,2024-05-02T13:27:25.103000
|
||||
CVE-2023-28799,0,0,21c5c181de36d4b9fe988d12e6caae360f4ff902c380bd31c4880bb3a0fa4c45,2023-06-30T17:15:59.797000
|
||||
CVE-2023-2880,0,0,4308abad4c2c9d1051fac1abec8354d5a397aa885799ec5c32dc39f4199c6ab0,2023-07-12T15:39:38.407000
|
||||
CVE-2023-28800,0,0,20e475c7b2fbd54ae242e7400ab113b4511bff874b581889b9a4cf71acf2a912,2023-06-30T15:08:41.290000
|
||||
@ -230018,6 +230019,8 @@ CVE-2023-41967,0,0,8e02dbae31e5167552a8965141c33a2e264759fb6dbab0897ce89326a49ec
|
||||
CVE-2023-41968,0,0,1248c9df7ecfb3920853d876ba26e870eae54e3bdcb4167f52b0214e6558ef25,2023-11-07T04:21:11.093000
|
||||
CVE-2023-41969,0,0,bf5a7b1169643942e6a97bb41a89261410b2d9b234111ccc127efeb4ca378c2c,2024-03-26T17:09:53.043000
|
||||
CVE-2023-4197,0,0,f146d2ff6232fd5933bf8142dd157ce30d6c6646be201da9229ef783e3b9cbfb,2023-11-08T19:47:53.387000
|
||||
CVE-2023-41970,1,1,9022449cbd13c153fd7a0dd3bf4e1e71d460721d35a4530ddf1557b74452f024,2024-05-02T13:27:25.103000
|
||||
CVE-2023-41971,1,1,5c526b74a29770e051dcbbfa956abb97bb9d78828def320907d1102e963ff5a3,2024-05-02T13:27:25.103000
|
||||
CVE-2023-41972,0,0,2d440c64845c645ec5ed0f2f136f4f51547ba1f4cbbb8dacb5d7780b5782ba31,2024-03-26T17:09:53.043000
|
||||
CVE-2023-41973,0,0,72880a2948f5f25cc0a4df217a1d2ea4ff5f2bd81d6cea96a01b5cecf905ce10,2024-03-26T17:09:53.043000
|
||||
CVE-2023-41974,0,0,ec7dd2b6702f5a8bbc562cadb789ab42ea352cdfbc62d11784bae6116e1e8ab4,2024-01-17T21:17:26.303000
|
||||
@ -232653,8 +232656,8 @@ CVE-2023-46288,0,0,cd41e139907d96ac2db3ea78bc3121553172dc6779b14d26502efe4fb9ccf
|
||||
CVE-2023-46289,0,0,eeb8999c1027929e8e1432385e10738220f809cefa40c971cda5d3b70278abe2,2023-11-07T18:18:35.950000
|
||||
CVE-2023-4629,0,0,46099667ebb1d5620c651151fc81b80f7b26e3b0acd8b7bf49782cc690ba95f3,2024-03-12T12:40:13.500000
|
||||
CVE-2023-46290,0,0,60b800c48e60334c2e69f95b8f0bf14e1eb82a55ac0513b709fcee11b9dfacac,2023-11-07T19:09:56.033000
|
||||
CVE-2023-46294,0,0,02073655bb64bd18f43e3ab8f74c510771a3d9083c7aa327c87c18f708e3b206,2024-05-01T20:15:12.267000
|
||||
CVE-2023-46295,0,0,e8d4359171cc571df7ef4cfa8d8d375520d56e03872894d4273bbcb542d65a4b,2024-05-01T20:15:12.330000
|
||||
CVE-2023-46294,0,1,d783b82054408b7c98198cf9de768f7b26016fb2ccfc90ad71b9515834779094,2024-05-02T13:27:25.103000
|
||||
CVE-2023-46295,0,1,457eaf15e2892398271302dc9373fdd6809c617422b7b9e79ec4f464f0931804,2024-05-02T13:27:25.103000
|
||||
CVE-2023-46298,0,0,b077731bbae2546ee5da04f8027611b1fe7cb45539952cb1927c0319e4c642b7,2023-10-28T03:30:11.740000
|
||||
CVE-2023-4630,0,0,4ec69a1c8fa3ee9a535125a88ba9d69fb2f86c9491ff178e8c57f885e14fd03b,2023-09-13T16:50:23.250000
|
||||
CVE-2023-46300,0,0,0717e33737bc41686c733bf7e7fb3f4e87670f94456a3f5f908d9ad680b0f47e,2023-10-31T17:08:50.757000
|
||||
@ -236004,7 +236007,7 @@ CVE-2023-5161,0,0,9b65b8e4b4f79aedfd4feee2a1808cd60164bd7cfa868cb8a3eaab434c101f
|
||||
CVE-2023-5162,0,0,0eac3e9fd752be3c7b22805015c13078655cd25c41aeb7e980086d31f6b61a06,2023-11-07T04:23:34.360000
|
||||
CVE-2023-5163,0,0,dcb773ab2d6fe9431102c7737c1a9ab1410c0276847172a178a17b93819afb8b,2023-11-27T22:10:37.123000
|
||||
CVE-2023-51630,0,0,e9c56408d552b149daee5fe15432377ab22c6d1afc3ccc27406f3f891f5d5f7f,2024-02-15T17:15:20.487000
|
||||
CVE-2023-51631,0,0,4086391b4b1eb0340d783c2e9a6f98b675ad3f645b1ee1447c6022b585eeeb13,2024-05-02T00:15:07.270000
|
||||
CVE-2023-51631,0,1,baf8bcb2af27fa04761ad3ab7475a98ffaef9a3784170fa6c2f3e50a9ac1759f,2024-05-02T13:27:25.103000
|
||||
CVE-2023-5164,0,0,eb58535c78bf4b607f05ff8e1f903241064df3ad7b0f4d3f1636df61307fb477,2023-11-07T20:09:50.093000
|
||||
CVE-2023-51649,0,0,11e105f951d553e940608590efdc1e572e1718a59f6fe7f415e90e2b5b510151,2024-01-03T20:05:01.863000
|
||||
CVE-2023-5165,0,0,a5831e8b47bcc2e026ef3c692d9374429299bcbb82887bff8c322b1d5bf13c3b,2023-09-26T15:50:49.217000
|
||||
@ -236752,7 +236755,7 @@ CVE-2023-52648,0,0,0cd0cdab462fcf2c595167fa5d1cd9cc7cdc530a2c1038043e42a9a4861e6
|
||||
CVE-2023-52649,0,0,932fa73ad16a2d4cd94f89d74e91afa7bbc2458b1b7df1b9277843dba2b1e76d,2024-05-01T19:50:25.633000
|
||||
CVE-2023-5265,0,0,2a8378d4c6e1a4043ef9a62bd4c22a5b923a77fb44f4c12af78e362e629e3051,2024-04-11T01:22:56.040000
|
||||
CVE-2023-52650,0,0,6c0999d320440dd5b65301df92fb13a3042ac6f53ee18da8c9bb76d62d39cee9,2024-05-01T19:50:25.633000
|
||||
CVE-2023-52651,0,1,b4f3a0cd669ba420fce4a6d4537b1eeb00fca2d8899e3172188c84b869ede5da,2024-05-02T10:15:07.500000
|
||||
CVE-2023-52651,0,0,b4f3a0cd669ba420fce4a6d4537b1eeb00fca2d8899e3172188c84b869ede5da,2024-05-02T10:15:07.500000
|
||||
CVE-2023-52652,0,0,a4852fe9f75c6ec40bb56bc2f1b85635ed06dc40f0d8bbbdb99a6820ccab51aa,2024-05-01T19:50:25.633000
|
||||
CVE-2023-52653,0,0,40b231362ce2dd826d58c4fdcf0dc86a21ef14260f86ab2a2cb525882bd63297,2024-05-01T19:50:25.633000
|
||||
CVE-2023-5266,0,0,832870c6041d22c4531b84dd381b413460d59a972119dc82a2f73fc33512c1a5,2024-04-11T01:22:56.120000
|
||||
@ -241850,6 +241853,9 @@ CVE-2024-23451,0,0,1527b911dea291b0766ddb3062c19eeaba982e875c4189924798b47289a05
|
||||
CVE-2024-23452,0,0,aaa529ca6e03eefd16006bb57cfd95647fc8b44bb3a3176fd8a83e06021cb7e9,2024-02-29T01:44:08.877000
|
||||
CVE-2024-23453,0,0,ab3a22284e10fea1933712f86026a2e7792304e1f83321557a4d02140679b266,2024-01-29T22:58:07.777000
|
||||
CVE-2024-23457,0,0,dddcb9f63fdf61bed2576a33360886a9fc9b5c97f52251225a112f2d6a151192,2024-05-01T19:50:25.633000
|
||||
CVE-2024-23459,1,1,4ed7f4199c264d3f5f28878b60206e5d5e03f218babe4efae2e82f0c38f4bb0e,2024-05-02T13:27:25.103000
|
||||
CVE-2024-23461,1,1,592e53b60d3189db5240e48bca603c7e471bea37b7133779df77751b554cbf6a,2024-05-02T13:27:25.103000
|
||||
CVE-2024-23462,1,1,041d85efc6ce88ff6e6fced0dbd768b5895566f8813b2133ec33b5efb25d14d4,2024-05-02T13:27:25.103000
|
||||
CVE-2024-23463,0,0,3070d116c7eebce5ad718e81d73788ac1f4a2d237e9b828c393b0270c134b332,2024-04-30T17:52:35.057000
|
||||
CVE-2024-2347,0,0,72273356ef668e46bc249f1161d9e793d562ab02a3d6eaa18d7e41a99c45f641,2024-04-10T13:23:38.787000
|
||||
CVE-2024-23476,0,0,e3d84cdb88c20fc5ad4183c7e154fd4eb94d6574a64f56328103056889f0fc9e,2024-02-20T20:39:10.033000
|
||||
@ -242210,7 +242216,7 @@ CVE-2024-2404,0,0,bb119e7c54353aa80d96b0c40c09b73768b3e9de919c9d8afc1368ad1d5506
|
||||
CVE-2024-24041,0,0,f96650c9700d93c943d8efc95d65c599a8e77cc1d7aaa4ba87820d6237153959,2024-02-07T17:14:41.607000
|
||||
CVE-2024-24042,0,0,4a4e7ea160d5d0244b906cb4642841160ba9374fd30aaa87521360ed2e8ecd1a,2024-03-19T13:26:46
|
||||
CVE-2024-24043,0,0,8fe33813863354c4eead332dc6243b19fd5b77f5e3a94ddd813814cf68659374,2024-03-19T13:26:46
|
||||
CVE-2024-2405,0,0,ca5ba74f3b1e356b2b6f78e8802858483445502ae4c688933a3c7d0fa75fd8a5,2024-05-02T06:15:49.947000
|
||||
CVE-2024-2405,0,1,a312bfe89e28af8302190c1b58eb6d0f15f2a12e6045507a036b540098cdfc29,2024-05-02T13:27:25.103000
|
||||
CVE-2024-24050,0,0,ccdf8a4463bf6582ad99a29c76e6e3640436eaa4075881cd577d9e7450feacb8,2024-03-21T12:58:51.093000
|
||||
CVE-2024-24059,0,0,3da8cffbcfd869f14b04835347f156c5cf1a6025fa9627a3ec1ec79a41a9d0be,2024-02-03T00:40:43.793000
|
||||
CVE-2024-2406,0,0,8d2b09ba3140c788e70ce565b39b21e35552b7351d8b624734dbaec586875fdb,2024-04-11T01:25:23.690000
|
||||
@ -243022,7 +243028,7 @@ CVE-2024-2566,0,0,2f62bcc0096a9cfce28d9f1629303aca5ddd1acc1617ceaa0e5d962e8bbd56
|
||||
CVE-2024-2567,0,0,cc7e72a7a709da818c37cf067d917b3c0e066e65a77707e27383c334e41c88c1,2024-04-11T01:25:28.590000
|
||||
CVE-2024-25674,0,0,880844ace2ad9fa6a214f1eff7f46e3beaded8f86ef202dfc09585e1e07ca21c,2024-02-12T14:30:40.343000
|
||||
CVE-2024-25675,0,0,7eb120f8543ce89181641a0a8c791e82666c8e07d23577075c360f9dbf73d233,2024-02-12T14:30:28.640000
|
||||
CVE-2024-25676,0,0,42547099b92752a0d480889307a8cd269ab9cf2b19365c84e7d2495655a01888,2024-05-01T20:15:12.733000
|
||||
CVE-2024-25676,0,1,6e92b41ae6bd1911a9a842e41a79d250b20cd9da74201914715c0c0b9b590631,2024-05-02T13:27:25.103000
|
||||
CVE-2024-25677,0,0,1d7f4f51208daa48b27418602ba1484337c537523201080701287445cfed0006,2024-02-15T19:43:24.983000
|
||||
CVE-2024-25678,0,0,9470e3115b8c3f5b60b6b175aa8ef46b05e07e3f194ab4ff036467dbe264bd9e,2024-02-15T18:45:09.663000
|
||||
CVE-2024-25679,0,0,224a0956154aafe3a65144732719712897f981c578a083f4eecb3f79135bc5a3,2024-02-15T18:44:40.547000
|
||||
@ -245503,7 +245509,7 @@ CVE-2024-3001,0,0,166014582f95ace18f19056bf46328e639c7eacf99106f9aa7a80816fde73f
|
||||
CVE-2024-3002,0,0,16788083fe7e681bdbe59bf4b485529665f3f0fe70ff2027f0a151c33e7f2889,2024-04-11T01:25:51.360000
|
||||
CVE-2024-3003,0,0,2a188d39504a8ef237d1494970327966c9b79531cd80142b261ee3cd1a2bfd25,2024-04-11T01:25:51.437000
|
||||
CVE-2024-3004,0,0,13c3a49477c1957f3ba862d9d64f7f0cfc7a867ab429294dcc31aefbf0339669,2024-04-11T01:25:51.517000
|
||||
CVE-2024-3005,1,1,a0607436e077f05390a767a1d51d8a3c6066c7f4c28e09323279f31b4946de06,2024-05-02T11:15:46.477000
|
||||
CVE-2024-3005,0,1,882e8609d3372a51aa89545afbcb75a47ad1aeefa870edd59b9a824ffa4ac294,2024-05-02T13:27:25.103000
|
||||
CVE-2024-3006,0,0,7e4efd97d17f29ea2d10f563ddab0fe2014f89540c16cf776c4bac4b7579d473,2024-04-11T01:25:51.597000
|
||||
CVE-2024-3007,0,0,83ad0d540449e02aee098a1031a34f2d8297179700c7acb99470f214bdabbce9,2024-04-11T01:25:51.677000
|
||||
CVE-2024-3008,0,0,9c438d43ee970ebac15533a5b88357c1f258f5ed280b95afc9cf1b5285727535,2024-04-11T01:25:51.757000
|
||||
@ -246219,7 +246225,7 @@ CVE-2024-31387,0,0,ae479bfa1926a7fd40fb5cef5475ced5aee0d15930c68100ea8467ea55c88
|
||||
CVE-2024-31388,0,0,26d907273df7947ec6ad690e5e970b363bc74f3d9bdbd15977ad183463b21599,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31389,0,0,ec18832e3cfc0d0ccb73210696ec4d56f9e9fc30aaf99bfa52a18537d9ffe4ce,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3139,0,0,c174ece4bd5366d5eddcb8afdcde0c6c7c4276d7790f9ff1f5e9ef5c069a0098,2024-04-11T01:25:54.583000
|
||||
CVE-2024-31390,0,1,dfa8d8f4e77b9847761a388d3f327a708e1f4a96a1363bc14cb318e90d22d684,2024-05-02T11:15:45.547000
|
||||
CVE-2024-31390,0,0,dfa8d8f4e77b9847761a388d3f327a708e1f4a96a1363bc14cb318e90d22d684,2024-05-02T11:15:45.547000
|
||||
CVE-2024-31391,0,0,7edc74b1175065af6008c4d194ed91acb716bd48f1d16beca88a58acb51aa8e5,2024-05-01T17:15:36.400000
|
||||
CVE-2024-31392,0,0,e47fa59932bfeb069e43bdeea717668f4f8eb0beb6cf866b3eeac98c4b5a7755,2024-04-03T17:24:18.150000
|
||||
CVE-2024-31393,0,0,37f7a5992221d6bde3095665f91d96a5b3c012db649e1c1c87f1a16619b63290,2024-04-03T17:24:18.150000
|
||||
@ -246494,7 +246500,7 @@ CVE-2024-32108,0,0,950a29a68ef37c40439ae0dcf3c3d4b039242eaece664c349c7d4089e193e
|
||||
CVE-2024-32109,0,0,4ab4248625b2b88c43ecf2bed644e80e80c54bafb94ddc41cebae0bbd84f78ff,2024-04-29T09:15:07.707000
|
||||
CVE-2024-3211,0,0,d6d8ef851a76d01f08b13c4c6093534cf0125e4133f007b8f3a299cb3bb38192,2024-04-12T12:43:46.210000
|
||||
CVE-2024-32112,0,0,2df62c2ad1478d07a612eff17f984ad78c51d3b47027012c1c38076227812cd3,2024-04-11T12:47:44.137000
|
||||
CVE-2024-32114,0,0,971257cb4ba4edfac252d62e09fe34f2f864d6c516457b593b2a9396fc1094df,2024-05-02T09:15:06.990000
|
||||
CVE-2024-32114,0,1,f74e35bf4baba0bdaef9add7ba1f45cafb6d7b14cf428324b385a7c33bdb04ae,2024-05-02T13:27:25.103000
|
||||
CVE-2024-32125,0,0,df49ac279a5dab5894d2cf46d4df920e793fb77c32b1360bd4eb9ce6cc4c2bcb,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32126,0,0,03bbe2b7a7bd325cdda583bb7823f2b70916aad3961fcbd3bac07e945035870f,2024-04-18T13:04:28.900000
|
||||
CVE-2024-32127,0,0,57252810e1702be160161ac7dc44c20062237ffc3e0f3ad79884c0b06ee5b822,2024-04-15T13:15:31.997000
|
||||
@ -246770,7 +246776,7 @@ CVE-2024-32631,0,0,f6179c4a1916a92ef208430456218c10bd0600c556ab5afe50d23115ed2f9
|
||||
CVE-2024-32632,0,0,363f256990a9e0bbc1d5ebda216d881268683761016a5132b054fbdb44080942,2024-04-16T13:24:07.103000
|
||||
CVE-2024-32633,0,0,8ac8ce6a1ac201ef8dc36e7fab192ecb8b1b583d781df940a83a5707e31555c1,2024-04-16T13:24:07.103000
|
||||
CVE-2024-32634,0,0,399e2bba8e548c1c98770d2f478e96e69a60afbc020788dd69a365e3ae504be6,2024-04-16T13:24:07.103000
|
||||
CVE-2024-32638,1,1,c80a8de09c6e4da739a162a0f5a8963e91a633669180aa78c293985c47a9d80b,2024-05-02T10:15:08.443000
|
||||
CVE-2024-32638,0,1,1c203c569295d2700dd4cdcc26da0f3bdbdbd15a786655ac909defaba54a8fd1,2024-05-02T13:27:25.103000
|
||||
CVE-2024-32644,0,0,e88c5eb3a89ae127bbaa68ee6900bb69776588719de1a17fdbc979f8b62412c9,2024-04-19T16:19:49.043000
|
||||
CVE-2024-32645,0,0,b793223b9f315c955102349a0fffec6d395200342592d911bfc2d42be0594699,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32646,0,0,9f830707470a3978892edc29be298706f63ea6896e8eab377ae270338a7fdb45,2024-04-26T12:58:17.720000
|
||||
@ -246851,7 +246857,7 @@ CVE-2024-32793,0,0,0401f7dd95b92b4af3dcee32342e29d30d2d3f61cc7363bc65938bb767c3d
|
||||
CVE-2024-32794,0,0,af04326430aa58ca3538b2b06900d7134dad884debf7c66f895129df101dc2a3,2024-04-24T17:16:50.397000
|
||||
CVE-2024-32795,0,0,64f3e792420781d69f50cef2545cc7bb9fa85c0624bbe3b99a02d4e4d983f838,2024-04-24T17:16:50.397000
|
||||
CVE-2024-32796,0,0,843f023f5500c45cf310f05263a796673694f0181757f7df75501ca87d8b0d28,2024-04-24T13:39:42.883000
|
||||
CVE-2024-3280,0,0,423c17c6bb2c676f7980b7a8094ef07781cc5067b2ad63b7e24525d82bd1880b,2024-05-02T08:15:08.270000
|
||||
CVE-2024-3280,0,1,d522c5cdd1fc6ab9f1068e3b6fa43977f9255dadc036b3f1de62c96a4196e80e,2024-05-02T13:27:25.103000
|
||||
CVE-2024-32801,0,0,4be65ed820d72048b16cb83f60ce532f34668282312680f5d997e7dd9ae65c7e,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32803,0,0,87ef628ed36a01981de6b24a9a46f4b15174f60f02a3679855347999c2d8f373,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32806,0,0,d8037ba4bbb861d02087bc0e815d7d332fc801a9609bcadd59a9397c35ec5a94,2024-04-24T17:16:50.397000
|
||||
@ -246884,7 +246890,7 @@ CVE-2024-32878,0,0,d8e3ab888c6aa88a915625acc211c2c1d2f518e2e93c8d03f4a103f476f0c
|
||||
CVE-2024-32879,0,0,0b0046e51a12ad5b1f4492d6cff2d6482480cc94626283d2a6f79bd97479ab0a,2024-04-25T13:18:20.370000
|
||||
CVE-2024-32880,0,0,5c7d6aa44fda3ee69a48104785812fedaa6d3ea7fbc26c71102dbf3b2182bded,2024-04-26T19:59:19.793000
|
||||
CVE-2024-32881,0,0,537bd0e70a49a0bbbedab5b33f25129a5e0bd4c96a0fa7233edc0c7a221f4717,2024-04-29T12:42:03.667000
|
||||
CVE-2024-32882,0,0,77e2d4e38a68544e2d04b1615ce5bd2ca0a83a57d1e3fbe19af21f16f9eee751,2024-05-02T07:15:20.967000
|
||||
CVE-2024-32882,0,1,62d5134d31fd8b76c053c6dec56f8f4efa47d49f1286970c4ba0dbde3e9c31c1,2024-05-02T13:27:25.103000
|
||||
CVE-2024-32883,0,0,a9c9fca2091d1c27f409014c2160b5507d3c163d519fd25861f91b38d4e5bf24,2024-04-29T12:42:03.667000
|
||||
CVE-2024-32884,0,0,feb09aaeaf00882860d9891266c7a76bef3350941384b117a7f5be081c117262,2024-04-26T19:59:19.793000
|
||||
CVE-2024-32887,0,0,b5ae3b4b1b4138c74179295fbe12f89b3d44be2f4f1d80d57b3f63df33aa8023,2024-04-29T12:42:03.667000
|
||||
@ -246903,12 +246909,12 @@ CVE-2024-32957,0,0,346b5f65dd888f3e9cb1b26dea7ac5e5c32edd9cfc4549cda79654054cc98
|
||||
CVE-2024-32958,0,0,6e18b56f26294982072f644e4fa58f1addf07815dbbad1f52ebebe6c09cb7d66,2024-04-24T17:16:50.397000
|
||||
CVE-2024-3296,0,0,bcc39314c1e9f6d53aa0ccc8e7e7cac7c279f7f6ee5a27f19287b128ea2ed6c7,2024-04-05T12:15:37.777000
|
||||
CVE-2024-32961,0,0,37957fa4fcdb7f781bae6e07abfae16d232866e70e85a1248b96c2770b0e66b0,2024-04-25T13:18:13.537000
|
||||
CVE-2024-32962,0,0,cffd765d2dc7e2918662878421ad7e9abc0fd21eb6caa1737b404d451742f73e,2024-05-02T07:15:21.420000
|
||||
CVE-2024-32962,0,1,021a4fe9ba919861c38c2b964e77028fcdb55186c2b0e5c56245031d0a0c9a14,2024-05-02T13:27:25.103000
|
||||
CVE-2024-32963,0,0,f743abd9aa526f3db97a21eadfaf4dc2f78a15d414daa21cc895f590ee32aaa6,2024-05-01T13:01:51.263000
|
||||
CVE-2024-32966,0,0,a2baf3fb2b5c80cd4610837ff7bcc9d3104b6f5e43dec9799ce3ae8e928c9347,2024-05-01T13:01:51.263000
|
||||
CVE-2024-32967,0,0,33de1e5d8e137ccf9d9b5b41849c40d635d06fe85dd3137a481db57c2b683f2c,2024-05-01T13:01:51.263000
|
||||
CVE-2024-32970,0,0,2982e33a9b9fd795c78b587d4b9af475752bff8fc1f960ef793d6562bbaa4d4c,2024-05-01T13:02:20.750000
|
||||
CVE-2024-32971,0,0,1ce587cf771e56839dbc652517f8efd235dc7989393d175fd24d10b1f9281038,2024-05-02T07:15:21.733000
|
||||
CVE-2024-32971,0,1,adadc7f800bad47f6e908f977629062b54aa4131018b80d8cf97c9d00ec0bdc7,2024-05-02T13:27:25.103000
|
||||
CVE-2024-32973,0,0,26b1e65a2b333830ce66544334f5113e1beaf6a050e56e0aaddd733df67df7d2,2024-05-01T13:01:51.263000
|
||||
CVE-2024-32979,0,0,4609f2e37347930e20422fd7d03fe2a9f10f1e16fc9069624b36f432c125737a,2024-05-01T13:01:51.263000
|
||||
CVE-2024-3298,0,0,35145d829af4d19541380a93e6723503e514b69e11aa4b007b05099610c37f21,2024-04-04T16:33:06.610000
|
||||
@ -246953,8 +246959,8 @@ CVE-2024-33276,0,0,e40c3e22a282bef2a772b0e5f45a645b1fd132b128d015830c0d51073e572
|
||||
CVE-2024-33292,0,0,020ab2c353c55eeef9a1e2b2491642f03af415da4e6b7c13c8119d36fd6b99ec,2024-05-01T19:50:25.633000
|
||||
CVE-2024-33300,0,0,a8560aed29473cc1a37b4579725520190d52c05a1e4bff50c24662249af209ac,2024-05-01T19:50:25.633000
|
||||
CVE-2024-33304,0,0,026cbcee891c3ff389557bc0be4741a8beff7985f5bea7709dba7a015c5d1fd5,2024-05-01T19:50:25.633000
|
||||
CVE-2024-33306,0,0,909dc24eadff430d79bde03d04d11a7220581a5702b8aa3bedac7a6807c5d6aa,2024-05-01T20:15:12.787000
|
||||
CVE-2024-33307,0,0,c6016f93d6f8e8f6d1fc979ff128ac687b3fdf296b7210ed46420666ce893096,2024-05-01T20:15:12.837000
|
||||
CVE-2024-33306,0,1,428bbc6a8b5a62ff998dea118b0c1a9bedf7e8da9bb5b3a1ca2dc047c805df5f,2024-05-02T13:27:25.103000
|
||||
CVE-2024-33307,0,1,685e6dd47a08dab94c9ba0e23fd24014f68fb2d510e871d193d497b88ce19585,2024-05-02T13:27:25.103000
|
||||
CVE-2024-33308,0,0,c7a96f814c2d5cc70229a8e21ec556c626542afdc137f20682b753e0d11d5580,2024-04-30T17:52:35.057000
|
||||
CVE-2024-33309,0,0,bc213cb8c1d9aef27edd281310b54c36cbe3c640e12ed51efcef8f301e533289,2024-04-30T17:52:35.057000
|
||||
CVE-2024-3333,0,0,8caee5b26018a8a7a4f06ec5d64d35dd731cf8d2f43a25885f4e67db044a1bff,2024-04-17T12:48:07.510000
|
||||
@ -246972,7 +246978,7 @@ CVE-2024-33383,0,0,b8f5911f0b0cbe287e38f2b2fab377f64f313b30790fd4bdc966dac5709dc
|
||||
CVE-2024-33393,0,0,2ab9320d7f4b87c8af5836daf49f2661e07e659861544cc1220a6a10a480893a,2024-05-01T19:50:25.633000
|
||||
CVE-2024-33401,0,0,0257ba245d43966b8ea0e03e8f08a7375e5df55049a2ef0dac897f7812fea9bd,2024-04-30T13:11:16.690000
|
||||
CVE-2024-3342,0,0,de1407685a84ff141581e4e11e63bda4ec890e2f76cb4a57d17a5da8af4ca55a,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33423,0,0,7702a103f8c4aa8a8aa61aa707fcd42d7cce8fa17a21b83ffe65dd9f4d28eec5,2024-05-01T20:15:12.887000
|
||||
CVE-2024-33423,0,1,8f1fa788450514658e193af05941c337fea69ba60eb865ed38aa69b9043ad774,2024-05-02T13:27:25.103000
|
||||
CVE-2024-33424,0,0,9ddd443c9165aa595f3269bf3ff48c5e18f823e6a41a214de5a31d11eee5736f,2024-05-01T19:50:25.633000
|
||||
CVE-2024-33428,0,0,fcab77d6fc0b69ab678ed2bb9da6ee9d864cbf9ca3697923a1cae36bc98dec59,2024-05-01T19:50:25.633000
|
||||
CVE-2024-33429,0,0,2b80ce1efdb79d5635575a559e9b2aee95026f445ddab8685a5ec9d01adac202,2024-05-01T19:50:25.633000
|
||||
@ -247138,10 +247144,11 @@ CVE-2024-33899,0,0,7114a5be0b85d57a35dcfad97c0c36a38d30e75da327295f2beafea50fa60
|
||||
CVE-2024-33903,0,0,68f0c13d39cafb4abebbd2993c0e3f21cb6d5284664624c053d60cc9d0b27b3e,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33904,0,0,94e3a98c0463f8acd176e3df60de225e1631e2e1dbcd1a948aa64ab2e616e6ce,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33905,0,0,4f2af541fd9603df50f92dd094e460dd4dcee3f568c1f2af9533e6ef2f5fb1b0,2024-05-01T18:15:24.390000
|
||||
CVE-2024-33911,1,1,18f97d50c742f8eaea6fa218d788a2655d570ba52b280d709e96fcd2034acced,2024-05-02T11:15:45.663000
|
||||
CVE-2024-33913,1,1,04462e0a4e4e7888344fec411a58f4fb2d5ab710919843d562a94b1f3da5c179,2024-05-02T11:15:45.883000
|
||||
CVE-2024-33922,1,1,b8b7648fa381a27565b385f3500dd5dc18b0e2fb8196c940baf15b27d7ddd521,2024-05-02T11:15:46.080000
|
||||
CVE-2024-33930,1,1,ad48838396558beade10730a795a90efe6b623381cb35cbdbe412ca11b8d78a7,2024-05-02T11:15:46.273000
|
||||
CVE-2024-33911,0,1,3aecc9c6853b34c79146d922a590e2ff56a9634dc21e6f2275a777f672ad645b,2024-05-02T13:27:25.103000
|
||||
CVE-2024-33913,0,1,fdcdfb506731b7f26c0d67c69dc8ed8c4bfdff71029b6b2f6e847f10e09b4905,2024-05-02T13:27:25.103000
|
||||
CVE-2024-33922,0,1,581070d9342f09fc7f3ba266aca2e54acec3a9f423037ff85b1ca1eb7af20122,2024-05-02T13:27:25.103000
|
||||
CVE-2024-33930,0,1,d4854365518648983f110687642324ab33baba9fea77b8107ff83d4e8904d188,2024-05-02T13:27:25.103000
|
||||
CVE-2024-33944,1,1,4cc781cd62cbbf938c7006c765253cd67313b7791b0366c8f2092cb45b8a99dc,2024-05-02T13:27:25.103000
|
||||
CVE-2024-3400,0,0,5bb68c1f741d7492d6e3e08b6f1711eb6e28a4a827bd2f3f354ccd1b7a47a1fe,2024-04-23T19:57:25.207000
|
||||
CVE-2024-34010,0,0,c7884be7d8f67ffff162a59652385bb9347b3f5ac2f6a7086eb2095d43bb9782,2024-04-30T13:11:16.690000
|
||||
CVE-2024-34011,0,0,92172f1292d1799c8fa1869d3451ebd57e86a05ed284e99cb50bbf506cf263ac,2024-04-30T13:11:16.690000
|
||||
@ -247199,15 +247206,15 @@ CVE-2024-3464,0,0,0c53100717f2f28c54c57fbaaef472d29e3cb0ff81ebf61eb104a899922afe
|
||||
CVE-2024-3465,0,0,a42aecf57f43969ec60c90b90013ebe0e449783aa33103b39be184486d2b2ca9,2024-04-11T01:26:03.697000
|
||||
CVE-2024-3466,0,0,06b3d0b5c629cfcd72994ab03bcc3d914522a60f9b439b6d13775db50704418a,2024-04-11T01:26:03.777000
|
||||
CVE-2024-3470,0,0,736c8b21abac392de8987478bb4430873353b2c43829321b68bed57cd49a65ed,2024-04-19T16:19:49.043000
|
||||
CVE-2024-3471,0,0,e541290d721d2b5e7cc32c8a1d842931b0d359aad1fcbb12cc9dfcca3abc212f,2024-05-02T06:15:50.350000
|
||||
CVE-2024-3472,0,0,e66d94a260f396cd2818a7e0fb014bcdd72caed7f142c32f42d8f202a4d6f234,2024-05-02T06:15:50.453000
|
||||
CVE-2024-3474,0,0,19256a603288843ef4957f755876dda44d2ff7236c5c87e71a9744bb3a115e2f,2024-05-02T06:15:50.527000
|
||||
CVE-2024-3475,0,0,5ab7580b07fdcc174360630058d4e84c427107435d0ba2262027ed3024bbf325,2024-05-02T06:15:50.660000
|
||||
CVE-2024-3476,0,0,51e1c923f1df0f86e114d870c961d0bafe1f0be0b2c57ccf5e916dc6715bb10c,2024-05-02T06:15:50.887000
|
||||
CVE-2024-3477,0,0,6a6e64dbf9c90af7cfc44f0b75391927494f4071435a4181b76c104182a02dd0,2024-05-02T06:15:50.950000
|
||||
CVE-2024-3478,0,0,f8a37bb4ffffb5ad2048f3d48be4ff9deef053a6c4502828e1728418c54dd747,2024-05-02T06:15:51.033000
|
||||
CVE-2024-3481,0,0,3bd1195a471d42f599c39971cba83ae972241d10ef31e66b5133987c56bb6c5b,2024-05-02T06:15:51.130000
|
||||
CVE-2024-3490,0,0,0e9f7f2bbbdc9a59708ede1ee3d312621701cfcf2d134fb6e542d2086ba6d7b2,2024-05-02T07:15:22.040000
|
||||
CVE-2024-3471,0,1,cbc5cb26007632d100e107fde481d72ff9ba06a89efad1e9ff744a9c1739fbf7,2024-05-02T13:27:25.103000
|
||||
CVE-2024-3472,0,1,f68a94f1652baaa594c100312dcabc5e1efb3130c41114defb02ca9928a769f8,2024-05-02T13:27:25.103000
|
||||
CVE-2024-3474,0,1,53c5670b18dc6efe7d3a5e88fe978e0627d53230b8847a965c80dee6dd1780b1,2024-05-02T13:27:25.103000
|
||||
CVE-2024-3475,0,1,db623f7e8ebc459406db8205bf10c97451f6b3addd71e8a79752e00cf4508384,2024-05-02T13:27:25.103000
|
||||
CVE-2024-3476,0,1,00e7dfb333b8fa42d7d616bccfce141aab1431d73f385df2d140fc38580dc8b6,2024-05-02T13:27:25.103000
|
||||
CVE-2024-3477,0,1,11ef2e1865e18bceb9ea45f02068625dd5bcb5e8c6d6e0bf96d90ee4f4de10aa,2024-05-02T13:27:25.103000
|
||||
CVE-2024-3478,0,1,c4bafaa9faa426369eb02c9eba910e713d91bcb0d6aa64f149900899ce6d93b5,2024-05-02T13:27:25.103000
|
||||
CVE-2024-3481,0,1,dcd5e193ceb8a2177751b79e2f89dd989eec37674b662702f65fe4d13178c825,2024-05-02T13:27:25.103000
|
||||
CVE-2024-3490,0,1,2d446316d7bcf1534476db11353610538165cd9a08885b6a1ae3fad6c54bb10c,2024-05-02T13:27:25.103000
|
||||
CVE-2024-3491,0,0,155e981c246f1ab173bd75da38bee4b8800ff4b0566c01179dcadac412465c38,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3493,0,0,63ead7e160b6b2cbd834dd6075f87d345af3361e8d55520f11e81a53e2086aaa,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3505,0,0,d46d6b7d35449c168e9ff66f3c93f973f2e1e579109b94b88c63ad7baac2b7b8,2024-04-15T13:15:31.997000
|
||||
@ -247382,7 +247389,7 @@ CVE-2024-3879,0,0,9c5ce4d1a3fc01133b3321115c4ccd096980cfe5baa042c4c9bf7b273029d2
|
||||
CVE-2024-3880,0,0,237e3bb93a0b113a1c50538806f68b5377561349bd4f47a9139ec72cd356417d,2024-04-17T12:48:31.863000
|
||||
CVE-2024-3881,0,0,9055ecf63e1aedc7e2787afc56e67bc831564d5ee15f418ef1b408c81c24bb16,2024-04-17T12:48:31.863000
|
||||
CVE-2024-3882,0,0,846c922d5cf92347db05da515dc041ccc83bdcd548fefc386c188946857d0db7,2024-04-17T12:48:31.863000
|
||||
CVE-2024-3883,0,0,9ea655a2b0770b5f6ffb7da3956dd1607de90059c9cfd51599ac5d996e832c9a,2024-05-02T09:15:07.233000
|
||||
CVE-2024-3883,0,1,d522e1e6d76397d7d1c41b40447ec6f8b3dea98505e8f95466fe7adb4c43b24d,2024-05-02T13:27:25.103000
|
||||
CVE-2024-3889,0,0,c4039354ee4d81ce5faec2ce618c8f0af30c97c1ad1feeb689836cb585b438a6,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3890,0,0,167befe3a418fe829a07bf47548aa5d5c5fe13f91b75a3184f188bef038919b6,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3893,0,0,44a15b07d473e504956c2fc6e9bdbbb981ef84a8f1b69c702ee1ea4228dd1195,2024-04-25T13:18:13.537000
|
||||
@ -247400,7 +247407,7 @@ CVE-2024-3929,0,0,31d0a734bfd88727a2a61deb7a29595ac9c8ac4a930ee35c31639990489d02
|
||||
CVE-2024-3931,0,0,adc8a79b07f48b35a9681a97a568e852ba1ef2cbd3b7271f585750c2d2c4216b,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3932,0,0,bce0f8b09e2fc4acc0cfce5940d57ce5f1e0384ac19f6c68ed218175688d8f12,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3948,0,0,427154a0226db385c08a1dc567a28e238ab290a5825189b73e5e958b25b296e5,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3955,1,1,229e44a55eb86fafe24e428a64a08d05e85be3a8fb4ceef1e03c0b4b17ec4724,2024-05-02T10:15:08.630000
|
||||
CVE-2024-3955,0,1,b36745fcce7d9f6f62e934de905ca8807abf8663f34b0c9516f7cf619fc6ffde,2024-05-02T13:27:25.103000
|
||||
CVE-2024-3962,0,0,9de964d29f43823164300439a0e71453bbca4a5c1f5767eca51db600267798cd,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3979,0,0,6aa42ee8d62ec6e8fed861933fb15c1009717c3d7f11cc3e5cf9c236e2a9f63c,2024-04-19T18:29:53.040000
|
||||
CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000
|
||||
@ -247454,7 +247461,7 @@ CVE-2024-4125,0,0,19bddfa0d8b792df08a0313793e20293ca71260dadfffff6dfe8897c2d9d61
|
||||
CVE-2024-4126,0,0,52d53c69f90fffba02f4ee03823f6932b3dbf87e0fe4c676029ee51a28a9165b,2024-04-25T13:18:20.370000
|
||||
CVE-2024-4127,0,0,4364ebf3636399a6b862124e1d4818af14c41cdffb5c73435c8a8f0aa84db1d3,2024-04-25T13:18:20.370000
|
||||
CVE-2024-4141,0,0,569cd2fcd9188d9eabeb08d432690880975d5549c17482aa7e239fef9c6bb2e6,2024-04-24T19:58:40.710000
|
||||
CVE-2024-4142,0,0,3319bcb448f3c3357df7dde2998672d2661950e66b9efb9011de480ed8c964ff,2024-05-01T21:15:51
|
||||
CVE-2024-4142,0,1,6297707db3df670a282f3d4e6720e4836d7467220b5fcc108ef053e6a6308f68,2024-05-02T13:27:25.103000
|
||||
CVE-2024-4159,0,0,cf0daf8ecd317ce4288e8a4812364c59b3b10d10c0c5945533667d40be8a71fc,2024-04-25T23:15:47.087000
|
||||
CVE-2024-4161,0,0,8c35858b76cabcd8cf78ed758e4c9d58e5dffa2b20a32ec25b41a43a372b2218,2024-04-25T13:18:13.537000
|
||||
CVE-2024-4163,0,0,0abae06321832430d51e94179291aa50a40ff5a5f25f762f5290e51ebf608907,2024-04-26T12:58:17.720000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user