Auto-Update: 2024-04-16T20:00:37.778903+00:00

This commit is contained in:
cad-safe-bot 2024-04-16 20:03:26 +00:00
parent a20a707dc9
commit 9e5bbfec43
18 changed files with 859 additions and 87 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-0878",
"sourceIdentifier": "secure@microsoft.com",
"published": "2020-09-11T17:15:14.370",
"lastModified": "2023-12-31T22:15:46.347",
"lastModified": "2024-04-16T19:22:42.250",
"vulnStatus": "Modified",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2022-05-03",
@ -251,8 +251,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:-:*:*:*:*:*:*",
"matchCriteriaId": "80235DF1-9241-4DBD-B436-6AC38EFBCF32"
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-1567",
"sourceIdentifier": "secure@microsoft.com",
"published": "2020-08-17T19:15:20.663",
"lastModified": "2024-01-19T00:15:18.873",
"lastModified": "2024-04-16T19:22:42.250",
"vulnStatus": "Modified",
"descriptions": [
{
@ -212,8 +212,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:-:*:*:*:*:*:*",
"matchCriteriaId": "80235DF1-9241-4DBD-B436-6AC38EFBCF32"
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-1570",
"sourceIdentifier": "secure@microsoft.com",
"published": "2020-08-17T19:15:20.880",
"lastModified": "2024-01-19T00:15:19.187",
"lastModified": "2024-04-16T19:22:42.250",
"vulnStatus": "Modified",
"descriptions": [
{
@ -192,8 +192,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:-:*:*:*:*:*:*",
"matchCriteriaId": "80235DF1-9241-4DBD-B436-6AC38EFBCF32"
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-26419",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-05-11T19:15:08.837",
"lastModified": "2023-08-02T00:15:11.000",
"lastModified": "2024-04-16T19:22:42.250",
"vulnStatus": "Modified",
"descriptions": [
{
@ -207,8 +207,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:-:*:*:*:*:*:*",
"matchCriteriaId": "80235DF1-9241-4DBD-B436-6AC38EFBCF32"
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360"
}
]
},

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-40000",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-16T18:15:10.600",
"lastModified": "2024-04-16T18:15:10.600",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Stored XSS.This issue affects LiteSpeed Cache: from n/a through 5.7.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-5-7-unauthenticated-site-wide-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-45000",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-16T18:15:10.790",
"lastModified": "2024-04-16T18:15:10.790",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in LiteSpeed Technologies LiteSpeed Cache.This issue affects LiteSpeed Cache: from n/a through 5.7.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-5-7-unauthenticated-broken-access-control-on-api-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-0948",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-26T22:15:11.413",
"lastModified": "2024-04-11T01:24:14.583",
"lastModified": "2024-04-16T18:15:11.013",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in NetBox up to 3.7.0. This issue affects some unknown processing of the file /core/config-revisions of the component Home Page Configuration. The manipulation with the input <<h1 onload=alert(1)>>test</h1> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252191. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
"value": "** DISPUTED ** A vulnerability, which was classified as problematic, has been found in NetBox up to 3.7.0. This issue affects some unknown processing of the file /core/config-revisions of the component Home Page Configuration. The manipulation with the input <<h1 onload=alert(1)>>test</h1> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The associated identifier of this vulnerability is VDB-252191. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
@ -134,6 +134,10 @@
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.270218",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21598",
"sourceIdentifier": "sirt@juniper.net",
"published": "2024-04-12T15:15:23.377",
"lastModified": "2024-04-15T13:15:51.577",
"lastModified": "2024-04-16T18:15:12.357",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -52,7 +52,7 @@
],
"references": [
{
"url": "http://supportportal.juniper.netJSA75739",
"url": "http://supportportal.juniper.net/JSA75739",
"source": "sirt@juniper.net"
},
{

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-25911",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-16T19:15:07.267",
"lastModified": "2024-04-16T19:15:07.267",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Skymoon Labs MoveTo.This issue affects MoveTo: from n/a through 6.2.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/moveto/wordpress-moveto-plugin-6-2-unauthenticated-arbitrary-file-deletion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32455",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-16T19:15:07.470",
"lastModified": "2024-04-16T19:15:07.470",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Very Good Plugins Fatal Error Notify.This issue affects Fatal Error Notify: from n/a through 1.5.2.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/fatal-error-notify/wordpress-fatal-error-notify-plugin-1-5-2-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3875",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-16T18:15:14.397",
"lastModified": "2024-04-16T18:15:14.397",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Tenda F1202 1.2.0.20(408). It has been rated as critical. This issue affects the function fromNatlimit of the file /goform/Natlimit. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-260909 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromNatlimit.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.260909",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.260909",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.312817",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3876",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-16T18:15:14.623",
"lastModified": "2024-04-16T18:15:14.623",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Tenda F1202 1.2.0.20(408). Affected is the function fromVirtualSer of the file /goform/VirtualSer. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-260910 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromVirtualSer.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.260910",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.260910",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.312818",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3877",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-16T19:15:07.667",
"lastModified": "2024-04-16T19:15:07.667",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in Tenda F1202 1.2.0.20(408). Affected by this vulnerability is the function fromqossetting of the file /goform/fromqossetting. The manipulation of the argument qos leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-260911. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromqossetting.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.260911",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.260911",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.312820",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3878",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-16T19:15:07.920",
"lastModified": "2024-04-16T19:15:07.920",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in Tenda F1202 1.2.0.20(408). Affected by this issue is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-260912. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromwebExcptypemanFilter.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.260912",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.260912",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.312821",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3879",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-16T19:15:08.133",
"lastModified": "2024-04-16T19:15:08.133",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in Tenda W30E 1.0.1.25(633). This affects the function formSetCfm of the file /goform/setcfm. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-260913 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formSetCfm.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.260913",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.260913",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.312822",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3880",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-16T19:15:08.357",
"lastModified": "2024-04-16T19:15:08.357",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Tenda W30E 1.0.1.25(633) and classified as critical. This vulnerability affects the function formWriteFacMac of the file /goform/WriteFacMac. The manipulation of the argument mac leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-260914 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formWriteFacMac.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.260914",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.260914",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.312823",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-16T18:00:38.092072+00:00
2024-04-16T20:00:37.778903+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-16T17:15:11.113000+00:00
2024-04-16T19:22:42.250000+00:00
```
### Last Data Feed Release
@ -33,49 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
245724
245734
```
### CVEs added in the last Commit
Recently added CVEs: `22`
Recently added CVEs: `10`
- [CVE-2023-50872](CVE-2023/CVE-2023-508xx/CVE-2023-50872.json) (`2024-04-16T16:15:08.150`)
- [CVE-2024-21676](CVE-2024/CVE-2024-216xx/CVE-2024-21676.json) (`2024-04-16T17:15:10.617`)
- [CVE-2024-32086](CVE-2024/CVE-2024-320xx/CVE-2024-32086.json) (`2024-04-16T17:15:10.793`)
- [CVE-2024-32254](CVE-2024/CVE-2024-322xx/CVE-2024-32254.json) (`2024-04-16T17:15:10.987`)
- [CVE-2024-32256](CVE-2024/CVE-2024-322xx/CVE-2024-32256.json) (`2024-04-16T17:15:11.050`)
- [CVE-2024-3302](CVE-2024/CVE-2024-33xx/CVE-2024-3302.json) (`2024-04-16T16:15:08.310`)
- [CVE-2024-3852](CVE-2024/CVE-2024-38xx/CVE-2024-3852.json) (`2024-04-16T16:15:08.357`)
- [CVE-2024-3853](CVE-2024/CVE-2024-38xx/CVE-2024-3853.json) (`2024-04-16T16:15:08.400`)
- [CVE-2024-3854](CVE-2024/CVE-2024-38xx/CVE-2024-3854.json) (`2024-04-16T16:15:08.440`)
- [CVE-2024-3855](CVE-2024/CVE-2024-38xx/CVE-2024-3855.json) (`2024-04-16T16:15:08.487`)
- [CVE-2024-3856](CVE-2024/CVE-2024-38xx/CVE-2024-3856.json) (`2024-04-16T16:15:08.527`)
- [CVE-2024-3857](CVE-2024/CVE-2024-38xx/CVE-2024-3857.json) (`2024-04-16T16:15:08.573`)
- [CVE-2024-3858](CVE-2024/CVE-2024-38xx/CVE-2024-3858.json) (`2024-04-16T16:15:08.613`)
- [CVE-2024-3859](CVE-2024/CVE-2024-38xx/CVE-2024-3859.json) (`2024-04-16T16:15:08.663`)
- [CVE-2024-3860](CVE-2024/CVE-2024-38xx/CVE-2024-3860.json) (`2024-04-16T16:15:08.713`)
- [CVE-2024-3861](CVE-2024/CVE-2024-38xx/CVE-2024-3861.json) (`2024-04-16T16:15:08.770`)
- [CVE-2024-3862](CVE-2024/CVE-2024-38xx/CVE-2024-3862.json) (`2024-04-16T16:15:08.823`)
- [CVE-2024-3863](CVE-2024/CVE-2024-38xx/CVE-2024-3863.json) (`2024-04-16T16:15:08.870`)
- [CVE-2024-3864](CVE-2024/CVE-2024-38xx/CVE-2024-3864.json) (`2024-04-16T16:15:08.913`)
- [CVE-2024-3865](CVE-2024/CVE-2024-38xx/CVE-2024-3865.json) (`2024-04-16T16:15:08.957`)
- [CVE-2024-3873](CVE-2024/CVE-2024-38xx/CVE-2024-3873.json) (`2024-04-16T16:15:09.010`)
- [CVE-2024-3874](CVE-2024/CVE-2024-38xx/CVE-2024-3874.json) (`2024-04-16T16:15:09.240`)
- [CVE-2023-40000](CVE-2023/CVE-2023-400xx/CVE-2023-40000.json) (`2024-04-16T18:15:10.600`)
- [CVE-2023-45000](CVE-2023/CVE-2023-450xx/CVE-2023-45000.json) (`2024-04-16T18:15:10.790`)
- [CVE-2024-25911](CVE-2024/CVE-2024-259xx/CVE-2024-25911.json) (`2024-04-16T19:15:07.267`)
- [CVE-2024-32455](CVE-2024/CVE-2024-324xx/CVE-2024-32455.json) (`2024-04-16T19:15:07.470`)
- [CVE-2024-3875](CVE-2024/CVE-2024-38xx/CVE-2024-3875.json) (`2024-04-16T18:15:14.397`)
- [CVE-2024-3876](CVE-2024/CVE-2024-38xx/CVE-2024-3876.json) (`2024-04-16T18:15:14.623`)
- [CVE-2024-3877](CVE-2024/CVE-2024-38xx/CVE-2024-3877.json) (`2024-04-16T19:15:07.667`)
- [CVE-2024-3878](CVE-2024/CVE-2024-38xx/CVE-2024-3878.json) (`2024-04-16T19:15:07.920`)
- [CVE-2024-3879](CVE-2024/CVE-2024-38xx/CVE-2024-3879.json) (`2024-04-16T19:15:08.133`)
- [CVE-2024-3880](CVE-2024/CVE-2024-38xx/CVE-2024-3880.json) (`2024-04-16T19:15:08.357`)
### CVEs modified in the last Commit
Recently modified CVEs: `8`
Recently modified CVEs: `6`
- [CVE-2023-40546](CVE-2023/CVE-2023-405xx/CVE-2023-40546.json) (`2024-04-16T16:15:07.550`)
- [CVE-2023-40547](CVE-2023/CVE-2023-405xx/CVE-2023-40547.json) (`2024-04-16T16:15:07.690`)
- [CVE-2023-40548](CVE-2023/CVE-2023-405xx/CVE-2023-40548.json) (`2024-04-16T16:15:07.823`)
- [CVE-2023-40549](CVE-2023/CVE-2023-405xx/CVE-2023-40549.json) (`2024-04-16T16:15:07.950`)
- [CVE-2023-40550](CVE-2023/CVE-2023-405xx/CVE-2023-40550.json) (`2024-04-16T16:15:08.050`)
- [CVE-2023-40551](CVE-2023/CVE-2023-405xx/CVE-2023-40551.json) (`2024-04-16T17:15:10.510`)
- [CVE-2024-2609](CVE-2024/CVE-2024-26xx/CVE-2024-2609.json) (`2024-04-16T16:15:08.237`)
- [CVE-2024-3867](CVE-2024/CVE-2024-38xx/CVE-2024-3867.json) (`2024-04-16T17:15:11.113`)
- [CVE-2020-0878](CVE-2020/CVE-2020-08xx/CVE-2020-0878.json) (`2024-04-16T19:22:42.250`)
- [CVE-2020-1567](CVE-2020/CVE-2020-15xx/CVE-2020-1567.json) (`2024-04-16T19:22:42.250`)
- [CVE-2020-1570](CVE-2020/CVE-2020-15xx/CVE-2020-1570.json) (`2024-04-16T19:22:42.250`)
- [CVE-2021-26419](CVE-2021/CVE-2021-264xx/CVE-2021-26419.json) (`2024-04-16T19:22:42.250`)
- [CVE-2024-0948](CVE-2024/CVE-2024-09xx/CVE-2024-0948.json) (`2024-04-16T18:15:11.013`)
- [CVE-2024-21598](CVE-2024/CVE-2024-215xx/CVE-2024-21598.json) (`2024-04-16T18:15:12.357`)
## Download and Usage

View File

@ -144922,7 +144922,7 @@ CVE-2020-0874,0,0,c2fade0606dcb2e9c6eb87976f779476db6037e639a3a9c456a2c05fc2968d
CVE-2020-0875,0,0,7d5e612b8c619991b2aa2905c3eee1dcf486e7c52ecf2b852e7e18ac88f292de,2023-12-31T22:15:46.170000
CVE-2020-0876,0,0,1034746515d48d79fab68b7c78b50df2f1a57a4da727845fc40df798a64421c6,2021-07-21T11:39:23.747000
CVE-2020-0877,0,0,9001dd0ed611f4d498dc5796bf4336c5b602f63019d87b3b2fa84d70c2d94d43,2021-07-21T11:39:23.747000
CVE-2020-0878,0,0,ed33a9ba06b1af5717a4f206bd66a777d8bc81a00c98cd3ce3062520efa9a616,2023-12-31T22:15:46.347000
CVE-2020-0878,0,1,47b4ccbb6e2aee2e0f6eeb59ea794ab2c1e1b40d148f13b0575e5acc68cc5ad1,2024-04-16T19:22:42.250000
CVE-2020-0879,0,0,425d3ec3e00b7dd4a42b5cf7c4478aba2b84b335e2d807b7127c70c2ad85c687,2021-07-21T11:39:23.747000
CVE-2020-0880,0,0,2634a69f3ca334f0c8c26e79bca394062d5af4fcbceea830136861013032761e,2021-07-21T11:39:23.747000
CVE-2020-0881,0,0,e83b0bffb8c94a880ae5f5982e07570c1bdae5c1d088ff8bd6a7844e3b82273b,2021-07-21T11:39:23.747000
@ -150354,7 +150354,7 @@ CVE-2020-15666,0,0,806c77fc438f86f330bc55c879aa960de2885e748df473ced7459962b7b2d
CVE-2020-15667,0,0,243a15d4c8a4ba9d467e69a126581e6074bc210dbabb71cf64e9f3a92c9ccc5c,2021-07-21T11:39:23.747000
CVE-2020-15668,0,0,4e698705ffefd020b517fb158a528dcedf7be197f4c0d065fb232fb0be01a198,2020-10-02T19:17:09.183000
CVE-2020-15669,0,0,64eaa070128ae394e37b554c9f7dcfafab0aea8b537c06401fda981532afa503,2020-10-02T19:02:26.757000
CVE-2020-1567,0,0,1481f87dc2a42f97f9adfb0feec0f7fb4236ab00e4644c5e50f2837f49dd2927,2024-01-19T00:15:18.873000
CVE-2020-1567,0,1,6988137d9a01ca126164d2622ab96444b87b9050623a346e3fbff0ba552d0432,2024-04-16T19:22:42.250000
CVE-2020-15670,0,0,67298c1fe1d638c17c36a656aca282da76a36c165fcad93d0f02fcf233d51021,2021-07-21T11:39:23.747000
CVE-2020-15671,0,0,82807d7bf80b81bb741608191d7efc03e971ecb129585447c3a302327bf9fc61,2021-07-21T11:39:23.747000
CVE-2020-15673,0,0,c4df2a83f9da27ab7a9bf61aad0f08e9147fa5beb7d47185eccff19549e5c4a2,2022-04-28T18:22:40.927000
@ -150384,7 +150384,7 @@ CVE-2020-15696,0,0,6b01411e07d57eee24498a5baade6df6a092e5e78052c31162fb91aa77a13
CVE-2020-15697,0,0,e1949b3239b40d44a9cf4dbe76e0780b405a1aaad6dcf8b0c86f771e66837c09,2020-07-15T19:27:59.713000
CVE-2020-15698,0,0,96d6895b067626b31ec7929ae0b4b4f698b7f533ac9f91c8f153e3de9adc452b,2021-07-21T11:39:23.747000
CVE-2020-15699,0,0,fddee3db14a5fec94a3b9b792a6a00e1de28f8aa1c4d0c0af73804590af47c7a,2020-07-15T19:44:31.413000
CVE-2020-1570,0,0,ae84378c432338d52b25650f63dfed87fc3d71c34b634b3d0d897ae2829679e8,2024-01-19T00:15:19.187000
CVE-2020-1570,0,1,e433d3c23800dd9c650a2695e9332c48d65e323e86479df2e4a50bcdba487d47,2024-04-16T19:22:42.250000
CVE-2020-15700,0,0,4392d5e51f1a617d2a1db6811d21554ab68d3b5bcb968ff3ec815ecba5658de2,2020-07-15T19:46:47.027000
CVE-2020-15701,0,0,0ef4f11d4d5e17c76cc90dbda259bf34c0d91dc397e706325817bacef536d57b,2023-01-24T02:45:18.333000
CVE-2020-15702,0,0,3123c6db9bb9c3781a203dca58b90178703d4558141b29f546636b5174cda6a7,2023-01-27T18:19:56.737000
@ -171750,7 +171750,7 @@ CVE-2021-26415,0,0,aea8f896c13d4c6095e51ab876f24426b34f537d056e2f1b89b1d9a6cf7f4
CVE-2021-26416,0,0,993fd9894dcf076a84f2ba65d4209911fe03da6b6b85301b271e3a7aaaa28762,2023-12-29T20:15:49.653000
CVE-2021-26417,0,0,131180a6d79030529a6b1b8bb6f6422fb04a2d0161fb18682f4f291505080d9a,2023-12-29T20:15:49.853000
CVE-2021-26418,0,0,4b4eff10905b00f64f66b3d523b8e5b777dc0cf0065f314a88729996b9495a9c,2023-08-02T00:15:10.887000
CVE-2021-26419,0,0,de00df411ae159557cec3c786395665b5864ee9f49724b5e6b01002c531a6d09,2023-08-02T00:15:11
CVE-2021-26419,0,1,5aecddeae175ae40ec027488d50b2c173515e7b42824b45a8b12540c9eb80656,2024-04-16T19:22:42.250000
CVE-2021-26420,0,0,259a2a921d60b20b6d7a01472a4e9b29ec5dfbff28ac862cf4ddac896e56114f,2023-08-01T23:15:11.517000
CVE-2021-26421,0,0,e59cfaa219509a59895efe167da72eda5665900af0da4e2f54f7d0fea6bc8de4,2023-08-02T00:15:11.110000
CVE-2021-26422,0,0,f06273af2cb75d9c8b35a6b1422b25d00a86e6c2b35e208674cd9fc5c21a9f7b,2023-08-02T00:15:11.207000
@ -228495,6 +228495,7 @@ CVE-2023-39991,0,0,0340b8efa37bc605092d9c1759b9c813cca0680f0f84b2ea2bf227d0125a7
CVE-2023-39992,0,0,fcaf02bda213dd1f17ad161f01bd711a5d2c373d3063a8bcb7d8975ad8f37032,2023-09-06T22:32:25.333000
CVE-2023-39999,0,0,7f36dc8514fc357e5e6fee23d3ff01e508ba90292e4f9f40fa57c31fd1bfe82c,2024-02-16T17:16:07.967000
CVE-2023-4000,0,0,1005d71e397cb341faeaa4134970e8dfeabc1e1fe3dee59b82c3690ab56614da,2023-11-07T04:22:02.303000
CVE-2023-40000,1,1,60763858ab1f538f2ea3445af24c8307d31b29f993af7f85d17e9240b8ec33f5,2024-04-16T18:15:10.600000
CVE-2023-40002,0,0,df96ef52ab4b7398a777e2a5595f079d9584908dd83efc246d0dcd480e04e895,2023-11-28T20:50:44.160000
CVE-2023-40007,0,0,3d365fc27f53117c77aaf78c7b2029831bb830f090bc89a5ba9063d789b28996,2023-09-08T21:27:24.257000
CVE-2023-40008,0,0,b73dbe806c28edbf5665a2cfc6c564be712f9ba5e3900757e8716b96b2d9cb60,2023-10-10T14:54:19.977000
@ -228920,13 +228921,13 @@ CVE-2023-40541,0,0,22a9285aa1b8eaf9b78df89c2cbb56f1e6618929d807faee9dc240a09c8ba
CVE-2023-40542,0,0,11b6cee368035492cc0902cbd689ed768c381493a72ea99cc6412d219fc6a963,2023-10-17T19:43:55.697000
CVE-2023-40544,0,0,8edafee03220c010d1be42f0f88433974482550243d48b064788fcb74f868b01,2024-02-12T16:43:42.320000
CVE-2023-40545,0,0,9bca2c73be74af7f189b3862ba8d7799cfe8ca7403c861883fba27fbc72753b2,2024-02-13T21:08:23.400000
CVE-2023-40546,0,1,48cf0e25a11b404723c938c7f2372f6d665f9e61d4d93039b150ac46bd9266ba,2024-04-16T16:15:07.550000
CVE-2023-40547,0,1,bb7bd48145e03ea26c3012293eee8aef01dde1a360037fc6ddc2efceddb67084,2024-04-16T16:15:07.690000
CVE-2023-40548,0,1,2151c653007a04c1d6e2c665beff6fd836d6d256345c2d6d84fc701d99fafb0d,2024-04-16T16:15:07.823000
CVE-2023-40549,0,1,7baec3fe402cd65b7bdb29d59a7b5907e4a72ae2595e02f5d060e9cf1e2414da,2024-04-16T16:15:07.950000
CVE-2023-40546,0,0,48cf0e25a11b404723c938c7f2372f6d665f9e61d4d93039b150ac46bd9266ba,2024-04-16T16:15:07.550000
CVE-2023-40547,0,0,bb7bd48145e03ea26c3012293eee8aef01dde1a360037fc6ddc2efceddb67084,2024-04-16T16:15:07.690000
CVE-2023-40548,0,0,2151c653007a04c1d6e2c665beff6fd836d6d256345c2d6d84fc701d99fafb0d,2024-04-16T16:15:07.823000
CVE-2023-40549,0,0,7baec3fe402cd65b7bdb29d59a7b5907e4a72ae2595e02f5d060e9cf1e2414da,2024-04-16T16:15:07.950000
CVE-2023-4055,0,0,a76fc1fa0e45973f400a49513a2db89a2627bd4fbf5c01947ac1c4f676cd8aeb,2023-08-09T21:15:11.820000
CVE-2023-40550,0,1,1ae172f7e60e213fc7c783814faf57b75a3aaf036bbf9bfd5af7052345e2159a,2024-04-16T16:15:08.050000
CVE-2023-40551,0,1,d802eee08651ccf0daf3e6ba28740f22e068b4cbdfc8ac862160e4f64ea637a7,2024-04-16T17:15:10.510000
CVE-2023-40550,0,0,1ae172f7e60e213fc7c783814faf57b75a3aaf036bbf9bfd5af7052345e2159a,2024-04-16T16:15:08.050000
CVE-2023-40551,0,0,d802eee08651ccf0daf3e6ba28740f22e068b4cbdfc8ac862160e4f64ea637a7,2024-04-16T17:15:10.510000
CVE-2023-40552,0,0,c2622408aa36bd78f5e5430d30ee7193e6af4e034508bc1f26ac2385010c374f,2023-09-08T21:27:56.877000
CVE-2023-40553,0,0,f75c02cf1e791ac55e3a969e16572991fc3e66a0701028da1fb8fc02a85ffa08,2023-09-08T21:22:31.697000
CVE-2023-40554,0,0,a92d3a47fe3c14157d269f90a7243f921fd8d94afe574f04f0e5826a46692480,2023-09-08T21:22:23.213000
@ -231599,6 +231600,7 @@ CVE-2023-44997,0,0,81ee87730db4999076f9ba13b533f7ee822bfab430b5bd9758fdc4dc99b35
CVE-2023-44998,0,0,6cc3050d478119a51a717478faad92a6fd89b774c0150f63b5670fdc0d17544a,2023-10-17T18:19:41.770000
CVE-2023-44999,0,0,6be2de0544b798cbaf35c5bfaf5e9581022382b9d93d6ed3c82f778fbc96fd8d,2024-03-27T15:49:41.437000
CVE-2023-4500,0,0,24f457d0034a3558ae1365157ea6510acba5eafde6781b3a97c0b2fce404f3c4,2023-11-07T04:22:40.307000
CVE-2023-45000,1,1,fc8dd3f687ba5903863afa7504f139eadd3435478e5fd1132dd20fe79aaf7623,2024-04-16T18:15:10.790000
CVE-2023-45001,0,0,7ae6d2a6a50d43f250007cb67a905b12b402783a75b5f34158cdfb57c3adcb31,2023-11-10T04:18:01.923000
CVE-2023-45003,0,0,e4a647054cefc57f163934c624babd072f49088fb353601c09d173ca854ba7b2,2023-10-20T18:08:51.807000
CVE-2023-45004,0,0,da8f78cab1b79c77e19940861ccb67ade7e4c226191b777aa1d2ac852f44063b,2023-10-24T17:13:10.327000
@ -235420,7 +235422,7 @@ CVE-2023-50868,0,0,1acef704c38344b53c0b7e369828b095b769c1fc01c9bcc30ab995406b56a
CVE-2023-5087,0,0,cb83bb80de48780d6ddfd511869f6feaba7211f246baaaa49f1e770f0a9c1488,2023-11-07T04:23:26.693000
CVE-2023-50870,0,0,5b8837a6e60e4203ba051628b99db23d2e092916c152f0e1a5a22594cfa2f839,2023-12-19T18:48:01.647000
CVE-2023-50871,0,0,4ddf269f53c856e0f2588f2eb354c7028d0f2397d2615866b6215dfdb27c4698,2023-12-19T18:50:30.227000
CVE-2023-50872,1,1,9dcd34b0d225634685d48b93a09972e380a643a50467faee352caf755fd311b1,2024-04-16T16:15:08.150000
CVE-2023-50872,0,0,9dcd34b0d225634685d48b93a09972e380a643a50467faee352caf755fd311b1,2024-04-16T16:15:08.150000
CVE-2023-50873,0,0,e87fa567670fdb26487260b713fbb41babff8438b4b2db11ec3660a0b120d778,2024-01-04T19:20:51.227000
CVE-2023-50874,0,0,bcacd6fc18a6a7384f9e3410fc219a27fd51425023bb3ea76f15234acd5bd7fe,2024-01-04T20:03:30.020000
CVE-2023-50875,0,0,1106938097fb18960ed1f89813982d05ff2f39c25d4530bc17f1d69fd9b36d68,2024-02-16T19:28:59.943000
@ -238959,7 +238961,7 @@ CVE-2024-0943,0,0,8615d13ce678f891600523a8b0ee9c2a28f695a4a2f0e6fae10271d035bbc0
CVE-2024-0944,0,0,6d5b4cc4512d7133beda6486c8a61e389ede985b81d7a45a8ff4bd3e6db7337f,2024-04-11T01:24:14.313000
CVE-2024-0945,0,0,acfa867aef6de5f90cd37defae67cb9b2e19e7990c01567c09ada00086ade703,2024-04-11T01:24:14.407000
CVE-2024-0946,0,0,283089fb3fdca4da451ffc3499cb9fbed55c67e9f31132e716a01132ba7c4775,2024-04-11T01:24:14.490000
CVE-2024-0948,0,0,7028140d4db5f4314f31d3e66c236731f86b5efea9303a5b4263145c4abb616e,2024-04-11T01:24:14.583000
CVE-2024-0948,0,1,7970a48163825a944b9c9fd25266b41fa8bda50c2787e9a44a0f18cf8c1c7f2c,2024-04-16T18:15:11.013000
CVE-2024-0951,0,0,943e60a265ecc53992d941a81b6f313c111cfeda921581030b0003b8c39af369,2024-03-18T19:40:00.173000
CVE-2024-0952,0,0,6f32644ab0ef2315b1a9443b0a1a75ad72efcd18f9832ac32457ec11d58a6f70,2024-04-10T13:24:00.070000
CVE-2024-0953,0,0,56fda260ffe976a7ef0af83f343a5276bf8287ea78e25bf62da55b0bd2fa66b4,2024-02-09T16:38:45.380000
@ -240439,7 +240441,7 @@ CVE-2024-21594,0,0,e78a123747e83bf49352997c96ddda43bd5d099d3d39e44bb746f6f4a8421
CVE-2024-21595,0,0,7e3b4ba0763cdce89df3527c01080d2771397fbe88ccc082e192e7e54ade6128,2024-01-18T20:37:57.160000
CVE-2024-21596,0,0,fdd5f969eb5a163c3b72b647f0662316060804632e52fd460429f04bfbe771b4,2024-01-26T01:15:10.873000
CVE-2024-21597,0,0,0c0be1133340914db6b7c339beb6f79249e7d6c481b234afba13bf552af31fb6,2024-01-19T21:04:30.330000
CVE-2024-21598,0,0,8f05bedfd476257393065d5ec717c67aa50dab6046197729b157992cfaa80e7f,2024-04-15T13:15:51.577000
CVE-2024-21598,0,1,8a4cc2c7294bdc4c0dc3ac761e2a08b5949bcdfe4871f2ee9915c7a43c700fc6,2024-04-16T18:15:12.357000
CVE-2024-21599,0,0,b6986e58982b522e42c45d11c584d16703553b99d9cc7ed66d50aec3d341a92f,2024-01-19T21:00:23.387000
CVE-2024-21600,0,0,b035659aec3f1f176588ca55009dd933cd41bad7a1bbf5fc58abacea7c8eac27,2024-01-19T22:57:21.587000
CVE-2024-21601,0,0,7af8a486a0225380a453e7f77af784106bd554df30e6e12f1ee8c22d8e6f7668,2024-01-19T22:57:04.600000
@ -240512,7 +240514,7 @@ CVE-2024-21671,0,0,3cba7baecbd743bff3460a30783fdfa6652d7027759bfd8548d117bb55d30
CVE-2024-21672,0,0,9f2aedc90d774ed48706458a60cbbcd40554cc9856f73da8b6afc8c3f48c9f05,2024-01-22T14:51:42.907000
CVE-2024-21673,0,0,335582ded80dbcc09c2e24dd1d565937d1d848283940587176fda095793b5d8b,2024-01-22T14:50:35.133000
CVE-2024-21674,0,0,3800c50d5b1de10d34cf1a729d2e4b9c7e14e723aac2f27150034dbd08207e7c,2024-01-22T14:49:15.167000
CVE-2024-21676,1,1,bdf6bfb2492872d59d3313a707924610369b82520e75c8bb381a52970df6ddc9,2024-04-16T17:15:10.617000
CVE-2024-21676,0,0,bdf6bfb2492872d59d3313a707924610369b82520e75c8bb381a52970df6ddc9,2024-04-16T17:15:10.617000
CVE-2024-21677,0,0,cd63a9344db53196b5943e582014caefd2ce4c1e61501d807a03293e59d4bf83,2024-03-20T13:00:16.367000
CVE-2024-21678,0,0,a74398aed7f752b8a4413bad434f2adf6ab8a95bc47028b48620e299957a54d0,2024-02-20T19:50:53.960000
CVE-2024-2168,0,0,67cf8c75f308354adb80512123d79c0df6490299e269efbbb1af77cb01863b90,2024-04-11T01:25:19.580000
@ -242605,6 +242607,7 @@ CVE-2024-25908,0,0,7ebe84bbb2a09cb3aa50499f551812833cee11c31a88168ddec35ef018574
CVE-2024-25909,0,0,1729ac59cd735cb9e10bf43959a450c2c5b8d4775b01f1386f05e50cd4f058ed,2024-02-26T16:32:25.577000
CVE-2024-2591,0,0,1c1e64e0f8676b005914356be8e0a1ee9646825adcce807d6ef2b5b382c04da1,2024-03-18T19:40:00.173000
CVE-2024-25910,0,0,46915ce767477cde79dec327c420fb80a93ebb8584c8668c193e9ec22215e12b,2024-02-28T14:06:45.783000
CVE-2024-25911,1,1,fbc19dd5cda6df633b9ac45349346716b22982abe88c98bc009fef8d2a944de7,2024-04-16T19:15:07.267000
CVE-2024-25912,0,0,7630e8eaf6cc6db6843805ce5039a4d1d03a44c94d0a98600a0ccca227d4708f,2024-04-11T12:47:44.137000
CVE-2024-25913,0,0,f836a846f4079f05601564732cb9a5408cfd48a38708177104907308615f96c6,2024-02-26T16:32:25.577000
CVE-2024-25914,0,0,6c21c235c508fdd4e37939a7918e64e3dd4e50979a576bdc305d842a25f11a05,2024-02-13T14:01:07.747000
@ -242731,7 +242734,7 @@ CVE-2024-2608,0,0,ae6bcd3c34b2e2d2990ddd5b5011c47bd45b71daefa72e13093360a8fd3053
CVE-2024-26080,0,0,985369cd20039768ffb9e0a343ef3ec94259ec110458f9976172d6fbd3da993c,2024-03-18T19:40:00.173000
CVE-2024-26084,0,0,4198569d9b83e7c17fa91f0baf1eeab883647801d84066753aca49311c01beec,2024-04-10T13:23:38.787000
CVE-2024-26087,0,0,79a90816bd0d6064ff1c3bd6bcc349fec6b5af43993ed0a4b50116beb1f7cb07,2024-04-10T13:23:38.787000
CVE-2024-2609,0,1,4c2f2c2f159cd6452dc8dff12938f36e92fd059d7af4d8c1a185c047acabdd67,2024-04-16T16:15:08.237000
CVE-2024-2609,0,0,4c2f2c2f159cd6452dc8dff12938f36e92fd059d7af4d8c1a185c047acabdd67,2024-04-16T16:15:08.237000
CVE-2024-26094,0,0,115591706a1991dd063241a84e1b5d445de4b8fd9fdb36186da6ec8b646a848b,2024-03-18T19:40:00.173000
CVE-2024-26096,0,0,84e4ab51865319a31a25e45dde90a75fe091e9b10c864322c7ee514e973d84e6,2024-03-18T19:40:00.173000
CVE-2024-26097,0,0,7ae84bcb4f2242da5f1cb9c97a939f17dfa4e935e4c482bd4227896c976f6e45,2024-04-10T13:23:38.787000
@ -245393,7 +245396,7 @@ CVE-2024-32082,0,0,d6793a42d63a5b66bd996e80396a9a30335e882106f6c04be804aa2a3936f
CVE-2024-32083,0,0,e66e40e26022a1e0763bc878bbdc8feaffe474b54f57196f3136bd80c107b035,2024-04-11T13:30:38
CVE-2024-32084,0,0,471e7516d00607c85169133c360fc6ced518260327467ed3a794c748685f3d51,2024-04-15T13:15:31.997000
CVE-2024-32085,0,0,9b4c9e2fb6bc96927eeec1394a8719561dbdd50c9f33542ee0c236e3cd61ec82,2024-04-15T13:15:31.997000
CVE-2024-32086,1,1,e1d5d7c8aad5f6d32f4e4dea1d85e74aadbcbb719a660c19516766267184f65e,2024-04-16T17:15:10.793000
CVE-2024-32086,0,0,e1d5d7c8aad5f6d32f4e4dea1d85e74aadbcbb719a660c19516766267184f65e,2024-04-16T17:15:10.793000
CVE-2024-32087,0,0,5b82ea46214428d965f4505ef14a371ca536fde7796b874f715623ff0a1f16c9,2024-04-15T13:15:31.997000
CVE-2024-32088,0,0,d54b0f9aa73f1da84983b35b9f2f514565a119c386370ddf079df19f0dad4167,2024-04-15T13:15:31.997000
CVE-2024-32089,0,0,8bad592641c40e34b81cce947c58cd4a75e42cc31f5d14c33fc7c54b31dabc8f,2024-04-15T13:15:31.997000
@ -245447,8 +245450,8 @@ CVE-2024-3222,0,0,66f6b4b9196c6c0a91ef8acd4cd0373a609da64e89b651a11374a40389e0fb
CVE-2024-3223,0,0,9ffc982a7efad24c324809c3c91bef1f04ff8280442a22bc3b8b997888a9a5ba,2024-04-11T01:25:56.520000
CVE-2024-3224,0,0,c02e228ce7415d482e2413c615262ec703d9597aa6708474ae81bc765129424f,2024-04-11T01:25:56.600000
CVE-2024-3225,0,0,756f5e08f46ab3796e26d62cd11cd06a14dd07d1ee049ee62586436225e04f96,2024-04-11T01:25:56.680000
CVE-2024-32254,1,1,2573428b93a934a2064f036ff3b42d9815a6b9bd343fab26560d3bf9dfae04c9,2024-04-16T17:15:10.987000
CVE-2024-32256,1,1,f10ce9ad928ae4c0cb1d83c943a12f6c97f08af40882de5334d643697f667c1f,2024-04-16T17:15:11.050000
CVE-2024-32254,0,0,2573428b93a934a2064f036ff3b42d9815a6b9bd343fab26560d3bf9dfae04c9,2024-04-16T17:15:10.987000
CVE-2024-32256,0,0,f10ce9ad928ae4c0cb1d83c943a12f6c97f08af40882de5334d643697f667c1f,2024-04-16T17:15:11.050000
CVE-2024-3226,0,0,d213b85d0cbf6ef26ba0599f6da2fa60a98a166b29d84dd0281911091a21b49d,2024-04-11T01:25:56.760000
CVE-2024-3227,0,0,0159675aa02206c3d84e4c8df37fb1381a8ad1f04bbe993fe609d30c45518b6a,2024-04-11T01:25:56.837000
CVE-2024-3235,0,0,87b194ac57d76e3164f790cf262b7f15e5577bfab72d12fd067ebb5070eb75e0,2024-04-10T13:23:38.787000
@ -245480,6 +245483,7 @@ CVE-2024-32451,0,0,35164b93e74a79e2ff8c5d6e259c68545821f296eca514d79c046cda7b805
CVE-2024-32452,0,0,c0f74da2c06d889a0c923e0bfbeb1f18dc0cdb6eff90b5a8f84b2a2f9a289fe1,2024-04-15T13:15:31.997000
CVE-2024-32453,0,0,e2827bd2fe1a55cbd67f5689db0bfcc1b7a1375e77db28dec81ba12c13346b0a,2024-04-15T13:15:31.997000
CVE-2024-32454,0,0,82612665e825c6121646d06374d65bca8862992c0c337ca5fb468894f9c7a05e,2024-04-15T13:15:31.997000
CVE-2024-32455,1,1,0e906248413ad5f5775b34e19f6dcf7e2835534bdbd10dc8d027649293326297,2024-04-16T19:15:07.470000
CVE-2024-3247,0,0,095afc187e8f976bc1a2eaa79a4c0328aa3c3e2487a10203585d8616775f8a4d,2024-04-03T12:38:04.840000
CVE-2024-3248,0,0,65f6d4ddfc43ae235edf2e59fc9daa1f1d020439a4fa197a41a6ddd58e106004,2024-04-03T12:38:04.840000
CVE-2024-32487,0,0,746d95a6c3889a9e0164763739aef81432a5222f159aa33a064a3132dbd4a7ad,2024-04-15T13:15:31.997000
@ -245515,7 +245519,7 @@ CVE-2024-3285,0,0,ea17e16acaa3172cbcc052cf9bfb1b3e7ee2b004434b062b8e67c1c1ed8bff
CVE-2024-3296,0,0,bcc39314c1e9f6d53aa0ccc8e7e7cac7c279f7f6ee5a27f19287b128ea2ed6c7,2024-04-05T12:15:37.777000
CVE-2024-3298,0,0,35145d829af4d19541380a93e6723503e514b69e11aa4b007b05099610c37f21,2024-04-04T16:33:06.610000
CVE-2024-3299,0,0,f60f2a80accdd6f345a6a9cd66637eda180121596f90c2e7d75707c9fce20eb6,2024-04-04T16:33:06.610000
CVE-2024-3302,1,1,f5e9d365642effe3f516dda36e0eafe3272e784b7be34b8c63981283ced9eb1a,2024-04-16T16:15:08.310000
CVE-2024-3302,0,0,f5e9d365642effe3f516dda36e0eafe3272e784b7be34b8c63981283ced9eb1a,2024-04-16T16:15:08.310000
CVE-2024-3311,0,0,cc24f0e110212be66e02c71f4e3192ea09f47ae5e9090cac74e341e472a33c23,2024-04-11T01:25:58.140000
CVE-2024-3313,0,0,a1f61d968ea3c59507e97f1859e014460ea34c753cfc0814a5308608cf321984,2024-04-10T13:23:38.787000
CVE-2024-3314,0,0,78c785cb5b32bdf0baed853861c5d6771b22fff72a031a5ec21a411cf5a4d670,2024-04-11T01:25:58.237000
@ -245703,23 +245707,29 @@ CVE-2024-3797,0,0,a49e1c5a734d1a2c1373957f16247491a1198771bf616ee0ff20957d954e73
CVE-2024-3802,0,0,5395fe7b87f4e5ca6c4397aa1001686137daab009656e2126daa68d47ebdf7e9,2024-04-15T13:15:31.997000
CVE-2024-3803,0,0,5839bf1f5fc97242d8c9adb88b40fa5013a07555baee205c3d9bec592a883085,2024-04-16T13:24:07.103000
CVE-2024-3804,0,0,d2c04bcba3b9dcee33d8ad0e898646d48639f7e3e6aed11c413cf03cea6afbe3,2024-04-16T13:24:07.103000
CVE-2024-3852,1,1,0472225cbc2f96e416c1341e72a079fd54076d905ffa84faf83abbb10b258bbc,2024-04-16T16:15:08.357000
CVE-2024-3853,1,1,524556c376b69b9f57a557017406ba157e6d8528497c2b8adb042ba0e0f506ce,2024-04-16T16:15:08.400000
CVE-2024-3854,1,1,86abab526fff76e487e6b74dbf4756760404542333fd740275a72c743fdd882c,2024-04-16T16:15:08.440000
CVE-2024-3855,1,1,37f88df72aec4be521f5397446ca389b5d836a0b04a485056be346c5442dd1fa,2024-04-16T16:15:08.487000
CVE-2024-3856,1,1,53747afee15703a3b3474bf4e2dd3d980c695e2712ebfa95a9f922130f56bf6a,2024-04-16T16:15:08.527000
CVE-2024-3857,1,1,a563d4e8fc4ccae36cf5ae0b8141e4cf9cc7a9092af24f2040dd71b7536849d4,2024-04-16T16:15:08.573000
CVE-2024-3858,1,1,0748ea6a684b91677a1841c2deae803044d9b0d42925ab232026ce2e20ffc9c2,2024-04-16T16:15:08.613000
CVE-2024-3859,1,1,ff8747cd22d0322e0df8e5926b0977c85fdbc0641a46751551d1ef25923a294a,2024-04-16T16:15:08.663000
CVE-2024-3860,1,1,5db6489b37b1494761a544e7d3bb0b2a9c6cce3fbc9581de81261ed642426dcd,2024-04-16T16:15:08.713000
CVE-2024-3861,1,1,9fb877c95c00a4ba1a2c9b2c04ab6b905b38ed0e1502075e9a20f63627d25be5,2024-04-16T16:15:08.770000
CVE-2024-3862,1,1,8bf60269861958ea524d6caec515b234853b6ad81e910ae274c21abe6e5c42f3,2024-04-16T16:15:08.823000
CVE-2024-3863,1,1,8ccc25a63f9112c2adb8223a06ac234fa51135e3833a6ee966fa05b00d339157,2024-04-16T16:15:08.870000
CVE-2024-3864,1,1,62f2920315b39ddb41df5d6d5db43b2338c901e3b93b3bd0e49ad3355b6b93e3,2024-04-16T16:15:08.913000
CVE-2024-3865,1,1,0c26e48e4d42e60df1f06c5df773e37619204b2e1dd3fee714e8f6db2d3e3741,2024-04-16T16:15:08.957000
CVE-2024-3867,0,1,1b62d18c2024e05920e3c0687ff0e24e4f942ae67e75e66374d57866a8214187,2024-04-16T17:15:11.113000
CVE-2024-3852,0,0,0472225cbc2f96e416c1341e72a079fd54076d905ffa84faf83abbb10b258bbc,2024-04-16T16:15:08.357000
CVE-2024-3853,0,0,524556c376b69b9f57a557017406ba157e6d8528497c2b8adb042ba0e0f506ce,2024-04-16T16:15:08.400000
CVE-2024-3854,0,0,86abab526fff76e487e6b74dbf4756760404542333fd740275a72c743fdd882c,2024-04-16T16:15:08.440000
CVE-2024-3855,0,0,37f88df72aec4be521f5397446ca389b5d836a0b04a485056be346c5442dd1fa,2024-04-16T16:15:08.487000
CVE-2024-3856,0,0,53747afee15703a3b3474bf4e2dd3d980c695e2712ebfa95a9f922130f56bf6a,2024-04-16T16:15:08.527000
CVE-2024-3857,0,0,a563d4e8fc4ccae36cf5ae0b8141e4cf9cc7a9092af24f2040dd71b7536849d4,2024-04-16T16:15:08.573000
CVE-2024-3858,0,0,0748ea6a684b91677a1841c2deae803044d9b0d42925ab232026ce2e20ffc9c2,2024-04-16T16:15:08.613000
CVE-2024-3859,0,0,ff8747cd22d0322e0df8e5926b0977c85fdbc0641a46751551d1ef25923a294a,2024-04-16T16:15:08.663000
CVE-2024-3860,0,0,5db6489b37b1494761a544e7d3bb0b2a9c6cce3fbc9581de81261ed642426dcd,2024-04-16T16:15:08.713000
CVE-2024-3861,0,0,9fb877c95c00a4ba1a2c9b2c04ab6b905b38ed0e1502075e9a20f63627d25be5,2024-04-16T16:15:08.770000
CVE-2024-3862,0,0,8bf60269861958ea524d6caec515b234853b6ad81e910ae274c21abe6e5c42f3,2024-04-16T16:15:08.823000
CVE-2024-3863,0,0,8ccc25a63f9112c2adb8223a06ac234fa51135e3833a6ee966fa05b00d339157,2024-04-16T16:15:08.870000
CVE-2024-3864,0,0,62f2920315b39ddb41df5d6d5db43b2338c901e3b93b3bd0e49ad3355b6b93e3,2024-04-16T16:15:08.913000
CVE-2024-3865,0,0,0c26e48e4d42e60df1f06c5df773e37619204b2e1dd3fee714e8f6db2d3e3741,2024-04-16T16:15:08.957000
CVE-2024-3867,0,0,1b62d18c2024e05920e3c0687ff0e24e4f942ae67e75e66374d57866a8214187,2024-04-16T17:15:11.113000
CVE-2024-3869,0,0,d3f1a622954c88625e31670a65b24b2a780d4a1ef9c3ff8af4e909ec0bb991a2,2024-04-16T13:24:07.103000
CVE-2024-3871,0,0,1a2cd663b55080229c1ab7b70d6215741fcbf60f8d0800edd920a4744c6da4d0,2024-04-16T13:24:07.103000
CVE-2024-3872,0,0,1b0df76ddcb9ce5edde75b1c572a6253db6bd37bbe91d1899bdf2bd4ba86a63a,2024-04-16T13:24:07.103000
CVE-2024-3873,1,1,6682e5b7f8878bd45db1a964a23ec844eed00a434365ad9da3173d84f4bd0b19,2024-04-16T16:15:09.010000
CVE-2024-3874,1,1,7d274fefd55c259ca4691ab7d08e98fac32e4f916fb82d1c571be55ee10cbc13,2024-04-16T16:15:09.240000
CVE-2024-3873,0,0,6682e5b7f8878bd45db1a964a23ec844eed00a434365ad9da3173d84f4bd0b19,2024-04-16T16:15:09.010000
CVE-2024-3874,0,0,7d274fefd55c259ca4691ab7d08e98fac32e4f916fb82d1c571be55ee10cbc13,2024-04-16T16:15:09.240000
CVE-2024-3875,1,1,058a3585a4060a4fa5a1cf3650555c0075ec4feddadabad432314a449baa84f9,2024-04-16T18:15:14.397000
CVE-2024-3876,1,1,8aae6c9327f3fedb7a3c47383352160bb0d571a0fd38bdab1a9e39af27a7a0c3,2024-04-16T18:15:14.623000
CVE-2024-3877,1,1,0ec4828f3bcee138aa57dfe6930de16d44acd8b51570995be560e0c92197b451,2024-04-16T19:15:07.667000
CVE-2024-3878,1,1,c0feda0a9e6b7cfd28066ca3c4cf4edbf43f789103afe6c7f587a912949e766b,2024-04-16T19:15:07.920000
CVE-2024-3879,1,1,833347e5903011c019d09ee7e95131ee5a00cd17fddad3d8aa11035655b7e6cd,2024-04-16T19:15:08.133000
CVE-2024-3880,1,1,5a7a6f4db00dff5c3cf944034037ee4055705722295b1f2eab6f80c0af610ff6,2024-04-16T19:15:08.357000

Can't render this file because it is too large.