mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 03:27:17 +00:00
Auto-Update: 2024-04-16T20:00:37.778903+00:00
This commit is contained in:
parent
a20a707dc9
commit
9e5bbfec43
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-0878",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2020-09-11T17:15:14.370",
|
||||
"lastModified": "2023-12-31T22:15:46.347",
|
||||
"lastModified": "2024-04-16T19:22:42.250",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2021-11-03",
|
||||
"cisaActionDue": "2022-05-03",
|
||||
@ -251,8 +251,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80235DF1-9241-4DBD-B436-6AC38EFBCF32"
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-1567",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2020-08-17T19:15:20.663",
|
||||
"lastModified": "2024-01-19T00:15:18.873",
|
||||
"lastModified": "2024-04-16T19:22:42.250",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -212,8 +212,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80235DF1-9241-4DBD-B436-6AC38EFBCF32"
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-1570",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2020-08-17T19:15:20.880",
|
||||
"lastModified": "2024-01-19T00:15:19.187",
|
||||
"lastModified": "2024-04-16T19:22:42.250",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -192,8 +192,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80235DF1-9241-4DBD-B436-6AC38EFBCF32"
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-26419",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2021-05-11T19:15:08.837",
|
||||
"lastModified": "2023-08-02T00:15:11.000",
|
||||
"lastModified": "2024-04-16T19:22:42.250",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -207,8 +207,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80235DF1-9241-4DBD-B436-6AC38EFBCF32"
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
55
CVE-2023/CVE-2023-400xx/CVE-2023-40000.json
Normal file
55
CVE-2023/CVE-2023-400xx/CVE-2023-40000.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-40000",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-16T18:15:10.600",
|
||||
"lastModified": "2024-04-16T18:15:10.600",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Stored XSS.This issue affects LiteSpeed Cache: from n/a through 5.7.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-5-7-unauthenticated-site-wide-stored-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-450xx/CVE-2023-45000.json
Normal file
55
CVE-2023/CVE-2023-450xx/CVE-2023-45000.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-45000",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-16T18:15:10.790",
|
||||
"lastModified": "2024-04-16T18:15:10.790",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in LiteSpeed Technologies LiteSpeed Cache.This issue affects LiteSpeed Cache: from n/a through 5.7.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-5-7-unauthenticated-broken-access-control-on-api-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-0948",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-01-26T22:15:11.413",
|
||||
"lastModified": "2024-04-11T01:24:14.583",
|
||||
"lastModified": "2024-04-16T18:15:11.013",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in NetBox up to 3.7.0. This issue affects some unknown processing of the file /core/config-revisions of the component Home Page Configuration. The manipulation with the input <<h1 onload=alert(1)>>test</h1> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252191. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
"value": "** DISPUTED ** A vulnerability, which was classified as problematic, has been found in NetBox up to 3.7.0. This issue affects some unknown processing of the file /core/config-revisions of the component Home Page Configuration. The manipulation with the input <<h1 onload=alert(1)>>test</h1> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The associated identifier of this vulnerability is VDB-252191. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -134,6 +134,10 @@
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.270218",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21598",
|
||||
"sourceIdentifier": "sirt@juniper.net",
|
||||
"published": "2024-04-12T15:15:23.377",
|
||||
"lastModified": "2024-04-15T13:15:51.577",
|
||||
"lastModified": "2024-04-16T18:15:12.357",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -52,7 +52,7 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://supportportal.juniper.netJSA75739",
|
||||
"url": "http://supportportal.juniper.net/JSA75739",
|
||||
"source": "sirt@juniper.net"
|
||||
},
|
||||
{
|
||||
|
55
CVE-2024/CVE-2024-259xx/CVE-2024-25911.json
Normal file
55
CVE-2024/CVE-2024-259xx/CVE-2024-25911.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-25911",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-16T19:15:07.267",
|
||||
"lastModified": "2024-04-16T19:15:07.267",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Skymoon Labs MoveTo.This issue affects MoveTo: from n/a through 6.2.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/moveto/wordpress-moveto-plugin-6-2-unauthenticated-arbitrary-file-deletion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-324xx/CVE-2024-32455.json
Normal file
55
CVE-2024/CVE-2024-324xx/CVE-2024-32455.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32455",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-16T19:15:07.470",
|
||||
"lastModified": "2024-04-16T19:15:07.470",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Very Good Plugins Fatal Error Notify.This issue affects Fatal Error Notify: from n/a through 1.5.2.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/fatal-error-notify/wordpress-fatal-error-notify-plugin-1-5-2-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-38xx/CVE-2024-3875.json
Normal file
92
CVE-2024/CVE-2024-38xx/CVE-2024-3875.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3875",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-16T18:15:14.397",
|
||||
"lastModified": "2024-04-16T18:15:14.397",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tenda F1202 1.2.0.20(408). It has been rated as critical. This issue affects the function fromNatlimit of the file /goform/Natlimit. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-260909 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromNatlimit.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.260909",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.260909",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.312817",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-38xx/CVE-2024-3876.json
Normal file
92
CVE-2024/CVE-2024-38xx/CVE-2024-3876.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3876",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-16T18:15:14.623",
|
||||
"lastModified": "2024-04-16T18:15:14.623",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in Tenda F1202 1.2.0.20(408). Affected is the function fromVirtualSer of the file /goform/VirtualSer. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-260910 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromVirtualSer.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.260910",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.260910",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.312818",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-38xx/CVE-2024-3877.json
Normal file
92
CVE-2024/CVE-2024-38xx/CVE-2024-3877.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3877",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-16T19:15:07.667",
|
||||
"lastModified": "2024-04-16T19:15:07.667",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in Tenda F1202 1.2.0.20(408). Affected by this vulnerability is the function fromqossetting of the file /goform/fromqossetting. The manipulation of the argument qos leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-260911. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromqossetting.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.260911",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.260911",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.312820",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-38xx/CVE-2024-3878.json
Normal file
92
CVE-2024/CVE-2024-38xx/CVE-2024-3878.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3878",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-16T19:15:07.920",
|
||||
"lastModified": "2024-04-16T19:15:07.920",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in Tenda F1202 1.2.0.20(408). Affected by this issue is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-260912. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromwebExcptypemanFilter.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.260912",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.260912",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.312821",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-38xx/CVE-2024-3879.json
Normal file
92
CVE-2024/CVE-2024-38xx/CVE-2024-3879.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3879",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-16T19:15:08.133",
|
||||
"lastModified": "2024-04-16T19:15:08.133",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in Tenda W30E 1.0.1.25(633). This affects the function formSetCfm of the file /goform/setcfm. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-260913 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formSetCfm.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.260913",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.260913",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.312822",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-38xx/CVE-2024-3880.json
Normal file
92
CVE-2024/CVE-2024-38xx/CVE-2024-3880.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3880",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-16T19:15:08.357",
|
||||
"lastModified": "2024-04-16T19:15:08.357",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in Tenda W30E 1.0.1.25(633) and classified as critical. This vulnerability affects the function formWriteFacMac of the file /goform/WriteFacMac. The manipulation of the argument mac leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-260914 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formWriteFacMac.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.260914",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.260914",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.312823",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
56
README.md
56
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-16T18:00:38.092072+00:00
|
||||
2024-04-16T20:00:37.778903+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-16T17:15:11.113000+00:00
|
||||
2024-04-16T19:22:42.250000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,49 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
245724
|
||||
245734
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `22`
|
||||
Recently added CVEs: `10`
|
||||
|
||||
- [CVE-2023-50872](CVE-2023/CVE-2023-508xx/CVE-2023-50872.json) (`2024-04-16T16:15:08.150`)
|
||||
- [CVE-2024-21676](CVE-2024/CVE-2024-216xx/CVE-2024-21676.json) (`2024-04-16T17:15:10.617`)
|
||||
- [CVE-2024-32086](CVE-2024/CVE-2024-320xx/CVE-2024-32086.json) (`2024-04-16T17:15:10.793`)
|
||||
- [CVE-2024-32254](CVE-2024/CVE-2024-322xx/CVE-2024-32254.json) (`2024-04-16T17:15:10.987`)
|
||||
- [CVE-2024-32256](CVE-2024/CVE-2024-322xx/CVE-2024-32256.json) (`2024-04-16T17:15:11.050`)
|
||||
- [CVE-2024-3302](CVE-2024/CVE-2024-33xx/CVE-2024-3302.json) (`2024-04-16T16:15:08.310`)
|
||||
- [CVE-2024-3852](CVE-2024/CVE-2024-38xx/CVE-2024-3852.json) (`2024-04-16T16:15:08.357`)
|
||||
- [CVE-2024-3853](CVE-2024/CVE-2024-38xx/CVE-2024-3853.json) (`2024-04-16T16:15:08.400`)
|
||||
- [CVE-2024-3854](CVE-2024/CVE-2024-38xx/CVE-2024-3854.json) (`2024-04-16T16:15:08.440`)
|
||||
- [CVE-2024-3855](CVE-2024/CVE-2024-38xx/CVE-2024-3855.json) (`2024-04-16T16:15:08.487`)
|
||||
- [CVE-2024-3856](CVE-2024/CVE-2024-38xx/CVE-2024-3856.json) (`2024-04-16T16:15:08.527`)
|
||||
- [CVE-2024-3857](CVE-2024/CVE-2024-38xx/CVE-2024-3857.json) (`2024-04-16T16:15:08.573`)
|
||||
- [CVE-2024-3858](CVE-2024/CVE-2024-38xx/CVE-2024-3858.json) (`2024-04-16T16:15:08.613`)
|
||||
- [CVE-2024-3859](CVE-2024/CVE-2024-38xx/CVE-2024-3859.json) (`2024-04-16T16:15:08.663`)
|
||||
- [CVE-2024-3860](CVE-2024/CVE-2024-38xx/CVE-2024-3860.json) (`2024-04-16T16:15:08.713`)
|
||||
- [CVE-2024-3861](CVE-2024/CVE-2024-38xx/CVE-2024-3861.json) (`2024-04-16T16:15:08.770`)
|
||||
- [CVE-2024-3862](CVE-2024/CVE-2024-38xx/CVE-2024-3862.json) (`2024-04-16T16:15:08.823`)
|
||||
- [CVE-2024-3863](CVE-2024/CVE-2024-38xx/CVE-2024-3863.json) (`2024-04-16T16:15:08.870`)
|
||||
- [CVE-2024-3864](CVE-2024/CVE-2024-38xx/CVE-2024-3864.json) (`2024-04-16T16:15:08.913`)
|
||||
- [CVE-2024-3865](CVE-2024/CVE-2024-38xx/CVE-2024-3865.json) (`2024-04-16T16:15:08.957`)
|
||||
- [CVE-2024-3873](CVE-2024/CVE-2024-38xx/CVE-2024-3873.json) (`2024-04-16T16:15:09.010`)
|
||||
- [CVE-2024-3874](CVE-2024/CVE-2024-38xx/CVE-2024-3874.json) (`2024-04-16T16:15:09.240`)
|
||||
- [CVE-2023-40000](CVE-2023/CVE-2023-400xx/CVE-2023-40000.json) (`2024-04-16T18:15:10.600`)
|
||||
- [CVE-2023-45000](CVE-2023/CVE-2023-450xx/CVE-2023-45000.json) (`2024-04-16T18:15:10.790`)
|
||||
- [CVE-2024-25911](CVE-2024/CVE-2024-259xx/CVE-2024-25911.json) (`2024-04-16T19:15:07.267`)
|
||||
- [CVE-2024-32455](CVE-2024/CVE-2024-324xx/CVE-2024-32455.json) (`2024-04-16T19:15:07.470`)
|
||||
- [CVE-2024-3875](CVE-2024/CVE-2024-38xx/CVE-2024-3875.json) (`2024-04-16T18:15:14.397`)
|
||||
- [CVE-2024-3876](CVE-2024/CVE-2024-38xx/CVE-2024-3876.json) (`2024-04-16T18:15:14.623`)
|
||||
- [CVE-2024-3877](CVE-2024/CVE-2024-38xx/CVE-2024-3877.json) (`2024-04-16T19:15:07.667`)
|
||||
- [CVE-2024-3878](CVE-2024/CVE-2024-38xx/CVE-2024-3878.json) (`2024-04-16T19:15:07.920`)
|
||||
- [CVE-2024-3879](CVE-2024/CVE-2024-38xx/CVE-2024-3879.json) (`2024-04-16T19:15:08.133`)
|
||||
- [CVE-2024-3880](CVE-2024/CVE-2024-38xx/CVE-2024-3880.json) (`2024-04-16T19:15:08.357`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `8`
|
||||
Recently modified CVEs: `6`
|
||||
|
||||
- [CVE-2023-40546](CVE-2023/CVE-2023-405xx/CVE-2023-40546.json) (`2024-04-16T16:15:07.550`)
|
||||
- [CVE-2023-40547](CVE-2023/CVE-2023-405xx/CVE-2023-40547.json) (`2024-04-16T16:15:07.690`)
|
||||
- [CVE-2023-40548](CVE-2023/CVE-2023-405xx/CVE-2023-40548.json) (`2024-04-16T16:15:07.823`)
|
||||
- [CVE-2023-40549](CVE-2023/CVE-2023-405xx/CVE-2023-40549.json) (`2024-04-16T16:15:07.950`)
|
||||
- [CVE-2023-40550](CVE-2023/CVE-2023-405xx/CVE-2023-40550.json) (`2024-04-16T16:15:08.050`)
|
||||
- [CVE-2023-40551](CVE-2023/CVE-2023-405xx/CVE-2023-40551.json) (`2024-04-16T17:15:10.510`)
|
||||
- [CVE-2024-2609](CVE-2024/CVE-2024-26xx/CVE-2024-2609.json) (`2024-04-16T16:15:08.237`)
|
||||
- [CVE-2024-3867](CVE-2024/CVE-2024-38xx/CVE-2024-3867.json) (`2024-04-16T17:15:11.113`)
|
||||
- [CVE-2020-0878](CVE-2020/CVE-2020-08xx/CVE-2020-0878.json) (`2024-04-16T19:22:42.250`)
|
||||
- [CVE-2020-1567](CVE-2020/CVE-2020-15xx/CVE-2020-1567.json) (`2024-04-16T19:22:42.250`)
|
||||
- [CVE-2020-1570](CVE-2020/CVE-2020-15xx/CVE-2020-1570.json) (`2024-04-16T19:22:42.250`)
|
||||
- [CVE-2021-26419](CVE-2021/CVE-2021-264xx/CVE-2021-26419.json) (`2024-04-16T19:22:42.250`)
|
||||
- [CVE-2024-0948](CVE-2024/CVE-2024-09xx/CVE-2024-0948.json) (`2024-04-16T18:15:11.013`)
|
||||
- [CVE-2024-21598](CVE-2024/CVE-2024-215xx/CVE-2024-21598.json) (`2024-04-16T18:15:12.357`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
82
_state.csv
82
_state.csv
@ -144922,7 +144922,7 @@ CVE-2020-0874,0,0,c2fade0606dcb2e9c6eb87976f779476db6037e639a3a9c456a2c05fc2968d
|
||||
CVE-2020-0875,0,0,7d5e612b8c619991b2aa2905c3eee1dcf486e7c52ecf2b852e7e18ac88f292de,2023-12-31T22:15:46.170000
|
||||
CVE-2020-0876,0,0,1034746515d48d79fab68b7c78b50df2f1a57a4da727845fc40df798a64421c6,2021-07-21T11:39:23.747000
|
||||
CVE-2020-0877,0,0,9001dd0ed611f4d498dc5796bf4336c5b602f63019d87b3b2fa84d70c2d94d43,2021-07-21T11:39:23.747000
|
||||
CVE-2020-0878,0,0,ed33a9ba06b1af5717a4f206bd66a777d8bc81a00c98cd3ce3062520efa9a616,2023-12-31T22:15:46.347000
|
||||
CVE-2020-0878,0,1,47b4ccbb6e2aee2e0f6eeb59ea794ab2c1e1b40d148f13b0575e5acc68cc5ad1,2024-04-16T19:22:42.250000
|
||||
CVE-2020-0879,0,0,425d3ec3e00b7dd4a42b5cf7c4478aba2b84b335e2d807b7127c70c2ad85c687,2021-07-21T11:39:23.747000
|
||||
CVE-2020-0880,0,0,2634a69f3ca334f0c8c26e79bca394062d5af4fcbceea830136861013032761e,2021-07-21T11:39:23.747000
|
||||
CVE-2020-0881,0,0,e83b0bffb8c94a880ae5f5982e07570c1bdae5c1d088ff8bd6a7844e3b82273b,2021-07-21T11:39:23.747000
|
||||
@ -150354,7 +150354,7 @@ CVE-2020-15666,0,0,806c77fc438f86f330bc55c879aa960de2885e748df473ced7459962b7b2d
|
||||
CVE-2020-15667,0,0,243a15d4c8a4ba9d467e69a126581e6074bc210dbabb71cf64e9f3a92c9ccc5c,2021-07-21T11:39:23.747000
|
||||
CVE-2020-15668,0,0,4e698705ffefd020b517fb158a528dcedf7be197f4c0d065fb232fb0be01a198,2020-10-02T19:17:09.183000
|
||||
CVE-2020-15669,0,0,64eaa070128ae394e37b554c9f7dcfafab0aea8b537c06401fda981532afa503,2020-10-02T19:02:26.757000
|
||||
CVE-2020-1567,0,0,1481f87dc2a42f97f9adfb0feec0f7fb4236ab00e4644c5e50f2837f49dd2927,2024-01-19T00:15:18.873000
|
||||
CVE-2020-1567,0,1,6988137d9a01ca126164d2622ab96444b87b9050623a346e3fbff0ba552d0432,2024-04-16T19:22:42.250000
|
||||
CVE-2020-15670,0,0,67298c1fe1d638c17c36a656aca282da76a36c165fcad93d0f02fcf233d51021,2021-07-21T11:39:23.747000
|
||||
CVE-2020-15671,0,0,82807d7bf80b81bb741608191d7efc03e971ecb129585447c3a302327bf9fc61,2021-07-21T11:39:23.747000
|
||||
CVE-2020-15673,0,0,c4df2a83f9da27ab7a9bf61aad0f08e9147fa5beb7d47185eccff19549e5c4a2,2022-04-28T18:22:40.927000
|
||||
@ -150384,7 +150384,7 @@ CVE-2020-15696,0,0,6b01411e07d57eee24498a5baade6df6a092e5e78052c31162fb91aa77a13
|
||||
CVE-2020-15697,0,0,e1949b3239b40d44a9cf4dbe76e0780b405a1aaad6dcf8b0c86f771e66837c09,2020-07-15T19:27:59.713000
|
||||
CVE-2020-15698,0,0,96d6895b067626b31ec7929ae0b4b4f698b7f533ac9f91c8f153e3de9adc452b,2021-07-21T11:39:23.747000
|
||||
CVE-2020-15699,0,0,fddee3db14a5fec94a3b9b792a6a00e1de28f8aa1c4d0c0af73804590af47c7a,2020-07-15T19:44:31.413000
|
||||
CVE-2020-1570,0,0,ae84378c432338d52b25650f63dfed87fc3d71c34b634b3d0d897ae2829679e8,2024-01-19T00:15:19.187000
|
||||
CVE-2020-1570,0,1,e433d3c23800dd9c650a2695e9332c48d65e323e86479df2e4a50bcdba487d47,2024-04-16T19:22:42.250000
|
||||
CVE-2020-15700,0,0,4392d5e51f1a617d2a1db6811d21554ab68d3b5bcb968ff3ec815ecba5658de2,2020-07-15T19:46:47.027000
|
||||
CVE-2020-15701,0,0,0ef4f11d4d5e17c76cc90dbda259bf34c0d91dc397e706325817bacef536d57b,2023-01-24T02:45:18.333000
|
||||
CVE-2020-15702,0,0,3123c6db9bb9c3781a203dca58b90178703d4558141b29f546636b5174cda6a7,2023-01-27T18:19:56.737000
|
||||
@ -171750,7 +171750,7 @@ CVE-2021-26415,0,0,aea8f896c13d4c6095e51ab876f24426b34f537d056e2f1b89b1d9a6cf7f4
|
||||
CVE-2021-26416,0,0,993fd9894dcf076a84f2ba65d4209911fe03da6b6b85301b271e3a7aaaa28762,2023-12-29T20:15:49.653000
|
||||
CVE-2021-26417,0,0,131180a6d79030529a6b1b8bb6f6422fb04a2d0161fb18682f4f291505080d9a,2023-12-29T20:15:49.853000
|
||||
CVE-2021-26418,0,0,4b4eff10905b00f64f66b3d523b8e5b777dc0cf0065f314a88729996b9495a9c,2023-08-02T00:15:10.887000
|
||||
CVE-2021-26419,0,0,de00df411ae159557cec3c786395665b5864ee9f49724b5e6b01002c531a6d09,2023-08-02T00:15:11
|
||||
CVE-2021-26419,0,1,5aecddeae175ae40ec027488d50b2c173515e7b42824b45a8b12540c9eb80656,2024-04-16T19:22:42.250000
|
||||
CVE-2021-26420,0,0,259a2a921d60b20b6d7a01472a4e9b29ec5dfbff28ac862cf4ddac896e56114f,2023-08-01T23:15:11.517000
|
||||
CVE-2021-26421,0,0,e59cfaa219509a59895efe167da72eda5665900af0da4e2f54f7d0fea6bc8de4,2023-08-02T00:15:11.110000
|
||||
CVE-2021-26422,0,0,f06273af2cb75d9c8b35a6b1422b25d00a86e6c2b35e208674cd9fc5c21a9f7b,2023-08-02T00:15:11.207000
|
||||
@ -228495,6 +228495,7 @@ CVE-2023-39991,0,0,0340b8efa37bc605092d9c1759b9c813cca0680f0f84b2ea2bf227d0125a7
|
||||
CVE-2023-39992,0,0,fcaf02bda213dd1f17ad161f01bd711a5d2c373d3063a8bcb7d8975ad8f37032,2023-09-06T22:32:25.333000
|
||||
CVE-2023-39999,0,0,7f36dc8514fc357e5e6fee23d3ff01e508ba90292e4f9f40fa57c31fd1bfe82c,2024-02-16T17:16:07.967000
|
||||
CVE-2023-4000,0,0,1005d71e397cb341faeaa4134970e8dfeabc1e1fe3dee59b82c3690ab56614da,2023-11-07T04:22:02.303000
|
||||
CVE-2023-40000,1,1,60763858ab1f538f2ea3445af24c8307d31b29f993af7f85d17e9240b8ec33f5,2024-04-16T18:15:10.600000
|
||||
CVE-2023-40002,0,0,df96ef52ab4b7398a777e2a5595f079d9584908dd83efc246d0dcd480e04e895,2023-11-28T20:50:44.160000
|
||||
CVE-2023-40007,0,0,3d365fc27f53117c77aaf78c7b2029831bb830f090bc89a5ba9063d789b28996,2023-09-08T21:27:24.257000
|
||||
CVE-2023-40008,0,0,b73dbe806c28edbf5665a2cfc6c564be712f9ba5e3900757e8716b96b2d9cb60,2023-10-10T14:54:19.977000
|
||||
@ -228920,13 +228921,13 @@ CVE-2023-40541,0,0,22a9285aa1b8eaf9b78df89c2cbb56f1e6618929d807faee9dc240a09c8ba
|
||||
CVE-2023-40542,0,0,11b6cee368035492cc0902cbd689ed768c381493a72ea99cc6412d219fc6a963,2023-10-17T19:43:55.697000
|
||||
CVE-2023-40544,0,0,8edafee03220c010d1be42f0f88433974482550243d48b064788fcb74f868b01,2024-02-12T16:43:42.320000
|
||||
CVE-2023-40545,0,0,9bca2c73be74af7f189b3862ba8d7799cfe8ca7403c861883fba27fbc72753b2,2024-02-13T21:08:23.400000
|
||||
CVE-2023-40546,0,1,48cf0e25a11b404723c938c7f2372f6d665f9e61d4d93039b150ac46bd9266ba,2024-04-16T16:15:07.550000
|
||||
CVE-2023-40547,0,1,bb7bd48145e03ea26c3012293eee8aef01dde1a360037fc6ddc2efceddb67084,2024-04-16T16:15:07.690000
|
||||
CVE-2023-40548,0,1,2151c653007a04c1d6e2c665beff6fd836d6d256345c2d6d84fc701d99fafb0d,2024-04-16T16:15:07.823000
|
||||
CVE-2023-40549,0,1,7baec3fe402cd65b7bdb29d59a7b5907e4a72ae2595e02f5d060e9cf1e2414da,2024-04-16T16:15:07.950000
|
||||
CVE-2023-40546,0,0,48cf0e25a11b404723c938c7f2372f6d665f9e61d4d93039b150ac46bd9266ba,2024-04-16T16:15:07.550000
|
||||
CVE-2023-40547,0,0,bb7bd48145e03ea26c3012293eee8aef01dde1a360037fc6ddc2efceddb67084,2024-04-16T16:15:07.690000
|
||||
CVE-2023-40548,0,0,2151c653007a04c1d6e2c665beff6fd836d6d256345c2d6d84fc701d99fafb0d,2024-04-16T16:15:07.823000
|
||||
CVE-2023-40549,0,0,7baec3fe402cd65b7bdb29d59a7b5907e4a72ae2595e02f5d060e9cf1e2414da,2024-04-16T16:15:07.950000
|
||||
CVE-2023-4055,0,0,a76fc1fa0e45973f400a49513a2db89a2627bd4fbf5c01947ac1c4f676cd8aeb,2023-08-09T21:15:11.820000
|
||||
CVE-2023-40550,0,1,1ae172f7e60e213fc7c783814faf57b75a3aaf036bbf9bfd5af7052345e2159a,2024-04-16T16:15:08.050000
|
||||
CVE-2023-40551,0,1,d802eee08651ccf0daf3e6ba28740f22e068b4cbdfc8ac862160e4f64ea637a7,2024-04-16T17:15:10.510000
|
||||
CVE-2023-40550,0,0,1ae172f7e60e213fc7c783814faf57b75a3aaf036bbf9bfd5af7052345e2159a,2024-04-16T16:15:08.050000
|
||||
CVE-2023-40551,0,0,d802eee08651ccf0daf3e6ba28740f22e068b4cbdfc8ac862160e4f64ea637a7,2024-04-16T17:15:10.510000
|
||||
CVE-2023-40552,0,0,c2622408aa36bd78f5e5430d30ee7193e6af4e034508bc1f26ac2385010c374f,2023-09-08T21:27:56.877000
|
||||
CVE-2023-40553,0,0,f75c02cf1e791ac55e3a969e16572991fc3e66a0701028da1fb8fc02a85ffa08,2023-09-08T21:22:31.697000
|
||||
CVE-2023-40554,0,0,a92d3a47fe3c14157d269f90a7243f921fd8d94afe574f04f0e5826a46692480,2023-09-08T21:22:23.213000
|
||||
@ -231599,6 +231600,7 @@ CVE-2023-44997,0,0,81ee87730db4999076f9ba13b533f7ee822bfab430b5bd9758fdc4dc99b35
|
||||
CVE-2023-44998,0,0,6cc3050d478119a51a717478faad92a6fd89b774c0150f63b5670fdc0d17544a,2023-10-17T18:19:41.770000
|
||||
CVE-2023-44999,0,0,6be2de0544b798cbaf35c5bfaf5e9581022382b9d93d6ed3c82f778fbc96fd8d,2024-03-27T15:49:41.437000
|
||||
CVE-2023-4500,0,0,24f457d0034a3558ae1365157ea6510acba5eafde6781b3a97c0b2fce404f3c4,2023-11-07T04:22:40.307000
|
||||
CVE-2023-45000,1,1,fc8dd3f687ba5903863afa7504f139eadd3435478e5fd1132dd20fe79aaf7623,2024-04-16T18:15:10.790000
|
||||
CVE-2023-45001,0,0,7ae6d2a6a50d43f250007cb67a905b12b402783a75b5f34158cdfb57c3adcb31,2023-11-10T04:18:01.923000
|
||||
CVE-2023-45003,0,0,e4a647054cefc57f163934c624babd072f49088fb353601c09d173ca854ba7b2,2023-10-20T18:08:51.807000
|
||||
CVE-2023-45004,0,0,da8f78cab1b79c77e19940861ccb67ade7e4c226191b777aa1d2ac852f44063b,2023-10-24T17:13:10.327000
|
||||
@ -235420,7 +235422,7 @@ CVE-2023-50868,0,0,1acef704c38344b53c0b7e369828b095b769c1fc01c9bcc30ab995406b56a
|
||||
CVE-2023-5087,0,0,cb83bb80de48780d6ddfd511869f6feaba7211f246baaaa49f1e770f0a9c1488,2023-11-07T04:23:26.693000
|
||||
CVE-2023-50870,0,0,5b8837a6e60e4203ba051628b99db23d2e092916c152f0e1a5a22594cfa2f839,2023-12-19T18:48:01.647000
|
||||
CVE-2023-50871,0,0,4ddf269f53c856e0f2588f2eb354c7028d0f2397d2615866b6215dfdb27c4698,2023-12-19T18:50:30.227000
|
||||
CVE-2023-50872,1,1,9dcd34b0d225634685d48b93a09972e380a643a50467faee352caf755fd311b1,2024-04-16T16:15:08.150000
|
||||
CVE-2023-50872,0,0,9dcd34b0d225634685d48b93a09972e380a643a50467faee352caf755fd311b1,2024-04-16T16:15:08.150000
|
||||
CVE-2023-50873,0,0,e87fa567670fdb26487260b713fbb41babff8438b4b2db11ec3660a0b120d778,2024-01-04T19:20:51.227000
|
||||
CVE-2023-50874,0,0,bcacd6fc18a6a7384f9e3410fc219a27fd51425023bb3ea76f15234acd5bd7fe,2024-01-04T20:03:30.020000
|
||||
CVE-2023-50875,0,0,1106938097fb18960ed1f89813982d05ff2f39c25d4530bc17f1d69fd9b36d68,2024-02-16T19:28:59.943000
|
||||
@ -238959,7 +238961,7 @@ CVE-2024-0943,0,0,8615d13ce678f891600523a8b0ee9c2a28f695a4a2f0e6fae10271d035bbc0
|
||||
CVE-2024-0944,0,0,6d5b4cc4512d7133beda6486c8a61e389ede985b81d7a45a8ff4bd3e6db7337f,2024-04-11T01:24:14.313000
|
||||
CVE-2024-0945,0,0,acfa867aef6de5f90cd37defae67cb9b2e19e7990c01567c09ada00086ade703,2024-04-11T01:24:14.407000
|
||||
CVE-2024-0946,0,0,283089fb3fdca4da451ffc3499cb9fbed55c67e9f31132e716a01132ba7c4775,2024-04-11T01:24:14.490000
|
||||
CVE-2024-0948,0,0,7028140d4db5f4314f31d3e66c236731f86b5efea9303a5b4263145c4abb616e,2024-04-11T01:24:14.583000
|
||||
CVE-2024-0948,0,1,7970a48163825a944b9c9fd25266b41fa8bda50c2787e9a44a0f18cf8c1c7f2c,2024-04-16T18:15:11.013000
|
||||
CVE-2024-0951,0,0,943e60a265ecc53992d941a81b6f313c111cfeda921581030b0003b8c39af369,2024-03-18T19:40:00.173000
|
||||
CVE-2024-0952,0,0,6f32644ab0ef2315b1a9443b0a1a75ad72efcd18f9832ac32457ec11d58a6f70,2024-04-10T13:24:00.070000
|
||||
CVE-2024-0953,0,0,56fda260ffe976a7ef0af83f343a5276bf8287ea78e25bf62da55b0bd2fa66b4,2024-02-09T16:38:45.380000
|
||||
@ -240439,7 +240441,7 @@ CVE-2024-21594,0,0,e78a123747e83bf49352997c96ddda43bd5d099d3d39e44bb746f6f4a8421
|
||||
CVE-2024-21595,0,0,7e3b4ba0763cdce89df3527c01080d2771397fbe88ccc082e192e7e54ade6128,2024-01-18T20:37:57.160000
|
||||
CVE-2024-21596,0,0,fdd5f969eb5a163c3b72b647f0662316060804632e52fd460429f04bfbe771b4,2024-01-26T01:15:10.873000
|
||||
CVE-2024-21597,0,0,0c0be1133340914db6b7c339beb6f79249e7d6c481b234afba13bf552af31fb6,2024-01-19T21:04:30.330000
|
||||
CVE-2024-21598,0,0,8f05bedfd476257393065d5ec717c67aa50dab6046197729b157992cfaa80e7f,2024-04-15T13:15:51.577000
|
||||
CVE-2024-21598,0,1,8a4cc2c7294bdc4c0dc3ac761e2a08b5949bcdfe4871f2ee9915c7a43c700fc6,2024-04-16T18:15:12.357000
|
||||
CVE-2024-21599,0,0,b6986e58982b522e42c45d11c584d16703553b99d9cc7ed66d50aec3d341a92f,2024-01-19T21:00:23.387000
|
||||
CVE-2024-21600,0,0,b035659aec3f1f176588ca55009dd933cd41bad7a1bbf5fc58abacea7c8eac27,2024-01-19T22:57:21.587000
|
||||
CVE-2024-21601,0,0,7af8a486a0225380a453e7f77af784106bd554df30e6e12f1ee8c22d8e6f7668,2024-01-19T22:57:04.600000
|
||||
@ -240512,7 +240514,7 @@ CVE-2024-21671,0,0,3cba7baecbd743bff3460a30783fdfa6652d7027759bfd8548d117bb55d30
|
||||
CVE-2024-21672,0,0,9f2aedc90d774ed48706458a60cbbcd40554cc9856f73da8b6afc8c3f48c9f05,2024-01-22T14:51:42.907000
|
||||
CVE-2024-21673,0,0,335582ded80dbcc09c2e24dd1d565937d1d848283940587176fda095793b5d8b,2024-01-22T14:50:35.133000
|
||||
CVE-2024-21674,0,0,3800c50d5b1de10d34cf1a729d2e4b9c7e14e723aac2f27150034dbd08207e7c,2024-01-22T14:49:15.167000
|
||||
CVE-2024-21676,1,1,bdf6bfb2492872d59d3313a707924610369b82520e75c8bb381a52970df6ddc9,2024-04-16T17:15:10.617000
|
||||
CVE-2024-21676,0,0,bdf6bfb2492872d59d3313a707924610369b82520e75c8bb381a52970df6ddc9,2024-04-16T17:15:10.617000
|
||||
CVE-2024-21677,0,0,cd63a9344db53196b5943e582014caefd2ce4c1e61501d807a03293e59d4bf83,2024-03-20T13:00:16.367000
|
||||
CVE-2024-21678,0,0,a74398aed7f752b8a4413bad434f2adf6ab8a95bc47028b48620e299957a54d0,2024-02-20T19:50:53.960000
|
||||
CVE-2024-2168,0,0,67cf8c75f308354adb80512123d79c0df6490299e269efbbb1af77cb01863b90,2024-04-11T01:25:19.580000
|
||||
@ -242605,6 +242607,7 @@ CVE-2024-25908,0,0,7ebe84bbb2a09cb3aa50499f551812833cee11c31a88168ddec35ef018574
|
||||
CVE-2024-25909,0,0,1729ac59cd735cb9e10bf43959a450c2c5b8d4775b01f1386f05e50cd4f058ed,2024-02-26T16:32:25.577000
|
||||
CVE-2024-2591,0,0,1c1e64e0f8676b005914356be8e0a1ee9646825adcce807d6ef2b5b382c04da1,2024-03-18T19:40:00.173000
|
||||
CVE-2024-25910,0,0,46915ce767477cde79dec327c420fb80a93ebb8584c8668c193e9ec22215e12b,2024-02-28T14:06:45.783000
|
||||
CVE-2024-25911,1,1,fbc19dd5cda6df633b9ac45349346716b22982abe88c98bc009fef8d2a944de7,2024-04-16T19:15:07.267000
|
||||
CVE-2024-25912,0,0,7630e8eaf6cc6db6843805ce5039a4d1d03a44c94d0a98600a0ccca227d4708f,2024-04-11T12:47:44.137000
|
||||
CVE-2024-25913,0,0,f836a846f4079f05601564732cb9a5408cfd48a38708177104907308615f96c6,2024-02-26T16:32:25.577000
|
||||
CVE-2024-25914,0,0,6c21c235c508fdd4e37939a7918e64e3dd4e50979a576bdc305d842a25f11a05,2024-02-13T14:01:07.747000
|
||||
@ -242731,7 +242734,7 @@ CVE-2024-2608,0,0,ae6bcd3c34b2e2d2990ddd5b5011c47bd45b71daefa72e13093360a8fd3053
|
||||
CVE-2024-26080,0,0,985369cd20039768ffb9e0a343ef3ec94259ec110458f9976172d6fbd3da993c,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26084,0,0,4198569d9b83e7c17fa91f0baf1eeab883647801d84066753aca49311c01beec,2024-04-10T13:23:38.787000
|
||||
CVE-2024-26087,0,0,79a90816bd0d6064ff1c3bd6bcc349fec6b5af43993ed0a4b50116beb1f7cb07,2024-04-10T13:23:38.787000
|
||||
CVE-2024-2609,0,1,4c2f2c2f159cd6452dc8dff12938f36e92fd059d7af4d8c1a185c047acabdd67,2024-04-16T16:15:08.237000
|
||||
CVE-2024-2609,0,0,4c2f2c2f159cd6452dc8dff12938f36e92fd059d7af4d8c1a185c047acabdd67,2024-04-16T16:15:08.237000
|
||||
CVE-2024-26094,0,0,115591706a1991dd063241a84e1b5d445de4b8fd9fdb36186da6ec8b646a848b,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26096,0,0,84e4ab51865319a31a25e45dde90a75fe091e9b10c864322c7ee514e973d84e6,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26097,0,0,7ae84bcb4f2242da5f1cb9c97a939f17dfa4e935e4c482bd4227896c976f6e45,2024-04-10T13:23:38.787000
|
||||
@ -245393,7 +245396,7 @@ CVE-2024-32082,0,0,d6793a42d63a5b66bd996e80396a9a30335e882106f6c04be804aa2a3936f
|
||||
CVE-2024-32083,0,0,e66e40e26022a1e0763bc878bbdc8feaffe474b54f57196f3136bd80c107b035,2024-04-11T13:30:38
|
||||
CVE-2024-32084,0,0,471e7516d00607c85169133c360fc6ced518260327467ed3a794c748685f3d51,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32085,0,0,9b4c9e2fb6bc96927eeec1394a8719561dbdd50c9f33542ee0c236e3cd61ec82,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32086,1,1,e1d5d7c8aad5f6d32f4e4dea1d85e74aadbcbb719a660c19516766267184f65e,2024-04-16T17:15:10.793000
|
||||
CVE-2024-32086,0,0,e1d5d7c8aad5f6d32f4e4dea1d85e74aadbcbb719a660c19516766267184f65e,2024-04-16T17:15:10.793000
|
||||
CVE-2024-32087,0,0,5b82ea46214428d965f4505ef14a371ca536fde7796b874f715623ff0a1f16c9,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32088,0,0,d54b0f9aa73f1da84983b35b9f2f514565a119c386370ddf079df19f0dad4167,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32089,0,0,8bad592641c40e34b81cce947c58cd4a75e42cc31f5d14c33fc7c54b31dabc8f,2024-04-15T13:15:31.997000
|
||||
@ -245447,8 +245450,8 @@ CVE-2024-3222,0,0,66f6b4b9196c6c0a91ef8acd4cd0373a609da64e89b651a11374a40389e0fb
|
||||
CVE-2024-3223,0,0,9ffc982a7efad24c324809c3c91bef1f04ff8280442a22bc3b8b997888a9a5ba,2024-04-11T01:25:56.520000
|
||||
CVE-2024-3224,0,0,c02e228ce7415d482e2413c615262ec703d9597aa6708474ae81bc765129424f,2024-04-11T01:25:56.600000
|
||||
CVE-2024-3225,0,0,756f5e08f46ab3796e26d62cd11cd06a14dd07d1ee049ee62586436225e04f96,2024-04-11T01:25:56.680000
|
||||
CVE-2024-32254,1,1,2573428b93a934a2064f036ff3b42d9815a6b9bd343fab26560d3bf9dfae04c9,2024-04-16T17:15:10.987000
|
||||
CVE-2024-32256,1,1,f10ce9ad928ae4c0cb1d83c943a12f6c97f08af40882de5334d643697f667c1f,2024-04-16T17:15:11.050000
|
||||
CVE-2024-32254,0,0,2573428b93a934a2064f036ff3b42d9815a6b9bd343fab26560d3bf9dfae04c9,2024-04-16T17:15:10.987000
|
||||
CVE-2024-32256,0,0,f10ce9ad928ae4c0cb1d83c943a12f6c97f08af40882de5334d643697f667c1f,2024-04-16T17:15:11.050000
|
||||
CVE-2024-3226,0,0,d213b85d0cbf6ef26ba0599f6da2fa60a98a166b29d84dd0281911091a21b49d,2024-04-11T01:25:56.760000
|
||||
CVE-2024-3227,0,0,0159675aa02206c3d84e4c8df37fb1381a8ad1f04bbe993fe609d30c45518b6a,2024-04-11T01:25:56.837000
|
||||
CVE-2024-3235,0,0,87b194ac57d76e3164f790cf262b7f15e5577bfab72d12fd067ebb5070eb75e0,2024-04-10T13:23:38.787000
|
||||
@ -245480,6 +245483,7 @@ CVE-2024-32451,0,0,35164b93e74a79e2ff8c5d6e259c68545821f296eca514d79c046cda7b805
|
||||
CVE-2024-32452,0,0,c0f74da2c06d889a0c923e0bfbeb1f18dc0cdb6eff90b5a8f84b2a2f9a289fe1,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32453,0,0,e2827bd2fe1a55cbd67f5689db0bfcc1b7a1375e77db28dec81ba12c13346b0a,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32454,0,0,82612665e825c6121646d06374d65bca8862992c0c337ca5fb468894f9c7a05e,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32455,1,1,0e906248413ad5f5775b34e19f6dcf7e2835534bdbd10dc8d027649293326297,2024-04-16T19:15:07.470000
|
||||
CVE-2024-3247,0,0,095afc187e8f976bc1a2eaa79a4c0328aa3c3e2487a10203585d8616775f8a4d,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3248,0,0,65f6d4ddfc43ae235edf2e59fc9daa1f1d020439a4fa197a41a6ddd58e106004,2024-04-03T12:38:04.840000
|
||||
CVE-2024-32487,0,0,746d95a6c3889a9e0164763739aef81432a5222f159aa33a064a3132dbd4a7ad,2024-04-15T13:15:31.997000
|
||||
@ -245515,7 +245519,7 @@ CVE-2024-3285,0,0,ea17e16acaa3172cbcc052cf9bfb1b3e7ee2b004434b062b8e67c1c1ed8bff
|
||||
CVE-2024-3296,0,0,bcc39314c1e9f6d53aa0ccc8e7e7cac7c279f7f6ee5a27f19287b128ea2ed6c7,2024-04-05T12:15:37.777000
|
||||
CVE-2024-3298,0,0,35145d829af4d19541380a93e6723503e514b69e11aa4b007b05099610c37f21,2024-04-04T16:33:06.610000
|
||||
CVE-2024-3299,0,0,f60f2a80accdd6f345a6a9cd66637eda180121596f90c2e7d75707c9fce20eb6,2024-04-04T16:33:06.610000
|
||||
CVE-2024-3302,1,1,f5e9d365642effe3f516dda36e0eafe3272e784b7be34b8c63981283ced9eb1a,2024-04-16T16:15:08.310000
|
||||
CVE-2024-3302,0,0,f5e9d365642effe3f516dda36e0eafe3272e784b7be34b8c63981283ced9eb1a,2024-04-16T16:15:08.310000
|
||||
CVE-2024-3311,0,0,cc24f0e110212be66e02c71f4e3192ea09f47ae5e9090cac74e341e472a33c23,2024-04-11T01:25:58.140000
|
||||
CVE-2024-3313,0,0,a1f61d968ea3c59507e97f1859e014460ea34c753cfc0814a5308608cf321984,2024-04-10T13:23:38.787000
|
||||
CVE-2024-3314,0,0,78c785cb5b32bdf0baed853861c5d6771b22fff72a031a5ec21a411cf5a4d670,2024-04-11T01:25:58.237000
|
||||
@ -245703,23 +245707,29 @@ CVE-2024-3797,0,0,a49e1c5a734d1a2c1373957f16247491a1198771bf616ee0ff20957d954e73
|
||||
CVE-2024-3802,0,0,5395fe7b87f4e5ca6c4397aa1001686137daab009656e2126daa68d47ebdf7e9,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3803,0,0,5839bf1f5fc97242d8c9adb88b40fa5013a07555baee205c3d9bec592a883085,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3804,0,0,d2c04bcba3b9dcee33d8ad0e898646d48639f7e3e6aed11c413cf03cea6afbe3,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3852,1,1,0472225cbc2f96e416c1341e72a079fd54076d905ffa84faf83abbb10b258bbc,2024-04-16T16:15:08.357000
|
||||
CVE-2024-3853,1,1,524556c376b69b9f57a557017406ba157e6d8528497c2b8adb042ba0e0f506ce,2024-04-16T16:15:08.400000
|
||||
CVE-2024-3854,1,1,86abab526fff76e487e6b74dbf4756760404542333fd740275a72c743fdd882c,2024-04-16T16:15:08.440000
|
||||
CVE-2024-3855,1,1,37f88df72aec4be521f5397446ca389b5d836a0b04a485056be346c5442dd1fa,2024-04-16T16:15:08.487000
|
||||
CVE-2024-3856,1,1,53747afee15703a3b3474bf4e2dd3d980c695e2712ebfa95a9f922130f56bf6a,2024-04-16T16:15:08.527000
|
||||
CVE-2024-3857,1,1,a563d4e8fc4ccae36cf5ae0b8141e4cf9cc7a9092af24f2040dd71b7536849d4,2024-04-16T16:15:08.573000
|
||||
CVE-2024-3858,1,1,0748ea6a684b91677a1841c2deae803044d9b0d42925ab232026ce2e20ffc9c2,2024-04-16T16:15:08.613000
|
||||
CVE-2024-3859,1,1,ff8747cd22d0322e0df8e5926b0977c85fdbc0641a46751551d1ef25923a294a,2024-04-16T16:15:08.663000
|
||||
CVE-2024-3860,1,1,5db6489b37b1494761a544e7d3bb0b2a9c6cce3fbc9581de81261ed642426dcd,2024-04-16T16:15:08.713000
|
||||
CVE-2024-3861,1,1,9fb877c95c00a4ba1a2c9b2c04ab6b905b38ed0e1502075e9a20f63627d25be5,2024-04-16T16:15:08.770000
|
||||
CVE-2024-3862,1,1,8bf60269861958ea524d6caec515b234853b6ad81e910ae274c21abe6e5c42f3,2024-04-16T16:15:08.823000
|
||||
CVE-2024-3863,1,1,8ccc25a63f9112c2adb8223a06ac234fa51135e3833a6ee966fa05b00d339157,2024-04-16T16:15:08.870000
|
||||
CVE-2024-3864,1,1,62f2920315b39ddb41df5d6d5db43b2338c901e3b93b3bd0e49ad3355b6b93e3,2024-04-16T16:15:08.913000
|
||||
CVE-2024-3865,1,1,0c26e48e4d42e60df1f06c5df773e37619204b2e1dd3fee714e8f6db2d3e3741,2024-04-16T16:15:08.957000
|
||||
CVE-2024-3867,0,1,1b62d18c2024e05920e3c0687ff0e24e4f942ae67e75e66374d57866a8214187,2024-04-16T17:15:11.113000
|
||||
CVE-2024-3852,0,0,0472225cbc2f96e416c1341e72a079fd54076d905ffa84faf83abbb10b258bbc,2024-04-16T16:15:08.357000
|
||||
CVE-2024-3853,0,0,524556c376b69b9f57a557017406ba157e6d8528497c2b8adb042ba0e0f506ce,2024-04-16T16:15:08.400000
|
||||
CVE-2024-3854,0,0,86abab526fff76e487e6b74dbf4756760404542333fd740275a72c743fdd882c,2024-04-16T16:15:08.440000
|
||||
CVE-2024-3855,0,0,37f88df72aec4be521f5397446ca389b5d836a0b04a485056be346c5442dd1fa,2024-04-16T16:15:08.487000
|
||||
CVE-2024-3856,0,0,53747afee15703a3b3474bf4e2dd3d980c695e2712ebfa95a9f922130f56bf6a,2024-04-16T16:15:08.527000
|
||||
CVE-2024-3857,0,0,a563d4e8fc4ccae36cf5ae0b8141e4cf9cc7a9092af24f2040dd71b7536849d4,2024-04-16T16:15:08.573000
|
||||
CVE-2024-3858,0,0,0748ea6a684b91677a1841c2deae803044d9b0d42925ab232026ce2e20ffc9c2,2024-04-16T16:15:08.613000
|
||||
CVE-2024-3859,0,0,ff8747cd22d0322e0df8e5926b0977c85fdbc0641a46751551d1ef25923a294a,2024-04-16T16:15:08.663000
|
||||
CVE-2024-3860,0,0,5db6489b37b1494761a544e7d3bb0b2a9c6cce3fbc9581de81261ed642426dcd,2024-04-16T16:15:08.713000
|
||||
CVE-2024-3861,0,0,9fb877c95c00a4ba1a2c9b2c04ab6b905b38ed0e1502075e9a20f63627d25be5,2024-04-16T16:15:08.770000
|
||||
CVE-2024-3862,0,0,8bf60269861958ea524d6caec515b234853b6ad81e910ae274c21abe6e5c42f3,2024-04-16T16:15:08.823000
|
||||
CVE-2024-3863,0,0,8ccc25a63f9112c2adb8223a06ac234fa51135e3833a6ee966fa05b00d339157,2024-04-16T16:15:08.870000
|
||||
CVE-2024-3864,0,0,62f2920315b39ddb41df5d6d5db43b2338c901e3b93b3bd0e49ad3355b6b93e3,2024-04-16T16:15:08.913000
|
||||
CVE-2024-3865,0,0,0c26e48e4d42e60df1f06c5df773e37619204b2e1dd3fee714e8f6db2d3e3741,2024-04-16T16:15:08.957000
|
||||
CVE-2024-3867,0,0,1b62d18c2024e05920e3c0687ff0e24e4f942ae67e75e66374d57866a8214187,2024-04-16T17:15:11.113000
|
||||
CVE-2024-3869,0,0,d3f1a622954c88625e31670a65b24b2a780d4a1ef9c3ff8af4e909ec0bb991a2,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3871,0,0,1a2cd663b55080229c1ab7b70d6215741fcbf60f8d0800edd920a4744c6da4d0,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3872,0,0,1b0df76ddcb9ce5edde75b1c572a6253db6bd37bbe91d1899bdf2bd4ba86a63a,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3873,1,1,6682e5b7f8878bd45db1a964a23ec844eed00a434365ad9da3173d84f4bd0b19,2024-04-16T16:15:09.010000
|
||||
CVE-2024-3874,1,1,7d274fefd55c259ca4691ab7d08e98fac32e4f916fb82d1c571be55ee10cbc13,2024-04-16T16:15:09.240000
|
||||
CVE-2024-3873,0,0,6682e5b7f8878bd45db1a964a23ec844eed00a434365ad9da3173d84f4bd0b19,2024-04-16T16:15:09.010000
|
||||
CVE-2024-3874,0,0,7d274fefd55c259ca4691ab7d08e98fac32e4f916fb82d1c571be55ee10cbc13,2024-04-16T16:15:09.240000
|
||||
CVE-2024-3875,1,1,058a3585a4060a4fa5a1cf3650555c0075ec4feddadabad432314a449baa84f9,2024-04-16T18:15:14.397000
|
||||
CVE-2024-3876,1,1,8aae6c9327f3fedb7a3c47383352160bb0d571a0fd38bdab1a9e39af27a7a0c3,2024-04-16T18:15:14.623000
|
||||
CVE-2024-3877,1,1,0ec4828f3bcee138aa57dfe6930de16d44acd8b51570995be560e0c92197b451,2024-04-16T19:15:07.667000
|
||||
CVE-2024-3878,1,1,c0feda0a9e6b7cfd28066ca3c4cf4edbf43f789103afe6c7f587a912949e766b,2024-04-16T19:15:07.920000
|
||||
CVE-2024-3879,1,1,833347e5903011c019d09ee7e95131ee5a00cd17fddad3d8aa11035655b7e6cd,2024-04-16T19:15:08.133000
|
||||
CVE-2024-3880,1,1,5a7a6f4db00dff5c3cf944034037ee4055705722295b1f2eab6f80c0af610ff6,2024-04-16T19:15:08.357000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user