mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2024-04-10T23:55:29.847623+00:00
This commit is contained in:
parent
4c14a907ce
commit
ae1c8bd448
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28219",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-03T03:15:09.710",
|
||||
"lastModified": "2024-04-10T05:15:48.810",
|
||||
"lastModified": "2024-04-10T22:15:07.193",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00008.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4XLPUT3VK4GQ6EVY525TT2QNUIXNRU5M/",
|
||||
"source": "cve@mitre.org"
|
||||
|
20
CVE-2024/CVE-2024-294xx/CVE-2024-29439.json
Normal file
20
CVE-2024/CVE-2024-294xx/CVE-2024-29439.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29439",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T23:15:06.753",
|
||||
"lastModified": "2024-04-10T23:15:06.753",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthorized node injection vulnerability has been identified in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS2 nodes into the system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-29439",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-294xx/CVE-2024-29443.json
Normal file
20
CVE-2024/CVE-2024-294xx/CVE-2024-29443.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29443",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T23:15:06.810",
|
||||
"lastModified": "2024-04-10T23:15:06.810",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-29443",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-294xx/CVE-2024-29445.json
Normal file
20
CVE-2024/CVE-2024-294xx/CVE-2024-29445.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29445",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T23:15:06.857",
|
||||
"lastModified": "2024-04-10T23:15:06.857",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3 where the system transmits messages in plaintext, allowing attackers to access sensitive information via a man-in-the-middle attack."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-29445",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-295xx/CVE-2024-29504.json
Normal file
24
CVE-2024/CVE-2024-295xx/CVE-2024-29504.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-29504",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T22:15:07.287",
|
||||
"lastModified": "2024-04-10T22:15:07.287",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in Summernote v.0.8.18 and before allows a remote attacker to execute arbtirary code via a crafted payload to the codeview parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/phoenix118go/a9192281efcfa518daa709ab7638712b",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/summernote/summernote/pull/3782",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
71
CVE-2024/CVE-2024-299xx/CVE-2024-29902.json
Normal file
71
CVE-2024/CVE-2024-299xx/CVE-2024-29902.json
Normal file
@ -0,0 +1,71 @@
|
||||
{
|
||||
"id": "CVE-2024-29902",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-10T23:15:06.920",
|
||||
"lastModified": "2024-04-10T23:15:06.920",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cosign provides code signing and transparency for containers and binaries. Prior to version 2.2.4, a remote image with a malicious attachment can cause denial of service of the host machine running Cosign. This can impact other services on the machine that rely on having memory available such as a Redis database which can result in data loss. It can also impact the availability of other services on the machine that will not be available for the duration of the machine denial. The root cause of this issue is that Cosign reads the attachment from a remote image entirely into memory without checking the size of the attachment first. As such, a large attachment can make Cosign read a large attachment into memory; If the attachments size is larger than the machine has memory available, the machine will be denied of service. The Go runtime will make a SigKill after a few seconds of system-wide denial. This issue can allow a supply-chain escalation from a compromised registry to the Cosign user: If an attacher has compromised a registry or the account of an image vendor, they can include a malicious attachment and hurt the image consumer. Version 2.2.4 contains a patch for the vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/google/go-containerregistry/blob/a0658aa1d0cc7a7f1bcc4a3af9155335b6943f40/pkg/v1/remote/layer.go#L36-L40",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sigstore/cosign/blob/9bc3ee309bf35d2f6e17f5d23f231a3d8bf580bc/pkg/oci/remote/remote.go#L228-L239",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sigstore/cosign/commit/629f5f8fa672973503edde75f84dcd984637629e",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sigstore/cosign/releases/tag/v2.2.4",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sigstore/cosign/security/advisories/GHSA-88jx-383q-w4qc",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
71
CVE-2024/CVE-2024-299xx/CVE-2024-29903.json
Normal file
71
CVE-2024/CVE-2024-299xx/CVE-2024-29903.json
Normal file
@ -0,0 +1,71 @@
|
||||
{
|
||||
"id": "CVE-2024-29903",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-10T23:15:07.130",
|
||||
"lastModified": "2024-04-10T23:15:07.130",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cosign provides code signing and transparency for containers and binaries. Prior to version 2.2.4, maliciously-crafted software artifacts can cause denial of service of the machine running Cosign thereby impacting all services on the machine. The root cause is that Cosign creates slices based on the number of signatures, manifests or attestations in untrusted artifacts. As such, the untrusted artifact can control the amount of memory that Cosign allocates. The exact issue is Cosign allocates excessive memory on the lines that creates a slice of the same length as the manifests. Version 2.2.4 contains a patch for the vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/sigstore/cosign/blob/14795db16417579fac0c00c11e166868d7976b61/pkg/cosign/verify.go#L948-L955",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sigstore/cosign/blob/286a98a4a99c1b2f32f84b0d560e324100312280/pkg/oci/remote/signatures.go#L56-L70",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sigstore/cosign/commit/629f5f8fa672973503edde75f84dcd984637629e",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sigstore/cosign/releases/tag/v2.2.4",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sigstore/cosign/security/advisories/GHSA-95pr-fxf5-86gv",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-307xx/CVE-2024-30728.json
Normal file
20
CVE-2024/CVE-2024-307xx/CVE-2024-30728.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-30728",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T23:15:07.317",
|
||||
"lastModified": "2024-04-10T23:15:07.317",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in the default configurations of ROS (Robot Operating System) Kinetic Kame ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yashpatelphd/CVE-2024-30728",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2024/CVE-2024-319xx/CVE-2024-31995.json
Normal file
67
CVE-2024/CVE-2024-319xx/CVE-2024-31995.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2024-31995",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-10T22:15:07.340",
|
||||
"lastModified": "2024-04-10T22:15:07.340",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "`@digitalbazaar/zcap` provides JavaScript reference implementation for Authorization Capabilities. Prior to version 9.0.1, when invoking a capability with a chain depth of 2, i.e., it is delegated directly from the root capability, the `expires` property is not properly checked against the current date or other `date` param. This can allow invocations outside of the original intended time period. A zcap still cannot be invoked without being able to use the associated private key material. `@digitalbazaar/zcap` v9.0.1 fixes expiration checking. As a workaround, one may revoke a zcap at any time."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-613"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/digitalbazaar/zcap/commit/261eea040109b6e25159c88d8ed49d3c37f8fcfe",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/digitalbazaar/zcap/commit/55f8549c80124b85dfb0f3dcf83f2c63f42532e5",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/digitalbazaar/zcap/pull/82",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/digitalbazaar/zcap/security/advisories/GHSA-hp8h-7x69-4wmv",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
71
CVE-2024/CVE-2024-319xx/CVE-2024-31997.json
Normal file
71
CVE-2024/CVE-2024-319xx/CVE-2024-31997.json
Normal file
@ -0,0 +1,71 @@
|
||||
{
|
||||
"id": "CVE-2024-31997",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-10T22:15:07.527",
|
||||
"lastModified": "2024-04-10T22:15:07.527",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "XWiki Platform is a generic wiki platform. Prior to versions 4.10.19, 15.5.4, and 15.10-rc-1, parameters of UI extensions are always interpreted as Velocity code and executed with programming rights. Any user with edit right on any document like the user's own profile can create UI extensions. This allows remote code execution and thereby impacts the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.19, 15.5.4 and 15.9-RC1. No known workarounds are available."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.9,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/commit/171e7c7d0e56deaa7b3678657ae26ef95379b1ea",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/commit/1b2574eb966457ca4ef34e557376b8751d1be90d",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/commit/56748e154a9011f0d6239bec0823eaaeab6ec3f7",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c2gg-4gq4-jv5j",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.xwiki.org/browse/XWIKI-21335",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-319xx/CVE-2024-31999.json
Normal file
59
CVE-2024/CVE-2024-319xx/CVE-2024-31999.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-31999",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-10T22:15:07.710",
|
||||
"lastModified": "2024-04-10T22:15:07.710",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "@festify/secure-session creates a secure stateless cookie session for Fastify. At the end of the request handling, it will encrypt all data in the session with a secret key and attach the ciphertext as a cookie value with the defined cookie name. After that, the session on the server side is destroyed. When an encrypted cookie with matching session name is provided with subsequent requests, it will decrypt the ciphertext to get the data. The plugin then creates a new session with the data in the ciphertext. Thus theoretically the web instance is still accessing the data from a server-side session, but technically that session is generated solely from a user provided cookie (which is assumed to be non-craftable because it is encrypted with a secret key not known to the user). The issue exists in the session removal process. In the delete function of the code, when the session is deleted, it is marked for deletion. However, if an attacker could gain access to the cookie, they could keep using it forever. Version 7.3.0 contains a patch for the issue. As a workaround, one may include a \"last update\" field in the session, and treat \"old sessions\" as expired."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-613"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/fastify/fastify-secure-session/commit/56d66642ecc633cff0606927601e81cdac361370",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/fastify/fastify-secure-session/security/advisories/GHSA-9wwp-q7wq-jx35",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-320xx/CVE-2024-32001.json
Normal file
63
CVE-2024/CVE-2024-320xx/CVE-2024-32001.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-32001",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-10T23:15:07.363",
|
||||
"lastModified": "2024-04-10T23:15:07.363",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SpiceDB is a graph database purpose-built for storing and evaluating access control data. Use of a relation of the form: `relation folder: folder | folder#parent` with an arrow such as `folder->view` can cause LookupSubjects to only return the subjects found under subjects for either `folder` or `folder#parent`. This bug only manifests if the same subject type is used multiple types in a relation, relationships exist for both subject types and an arrow is used over the relation. Any user making a negative authorization decision based on the results of a LookupSubjects request with version before v1.30.1 is affected. Version 1.30.1 contains a patch for the issue. As a workaround, avoid using LookupSubjects for negative authorization decisions and/or avoid using the broken schema.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.2,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-755"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/authzed/spicedb/commit/a244ed1edfaf2382711dccdb699971ec97190c7b",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/authzed/spicedb/releases/tag/v1.30.1",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/authzed/spicedb/security/advisories/GHSA-j85q-46hg-36p2",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
50
README.md
50
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-10T22:00:38.015965+00:00
|
||||
2024-04-10T23:55:29.847623+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-10T21:15:07.510000+00:00
|
||||
2024-04-10T23:15:07.363000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,47 +33,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
245139
|
||||
245150
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `19`
|
||||
Recently added CVEs: `11`
|
||||
|
||||
- [CVE-2024-1481](CVE-2024/CVE-2024-14xx/CVE-2024-1481.json) (`2024-04-10T21:15:06.313`)
|
||||
- [CVE-2024-26362](CVE-2024/CVE-2024-263xx/CVE-2024-26362.json) (`2024-04-10T21:15:06.533`)
|
||||
- [CVE-2024-29269](CVE-2024/CVE-2024-292xx/CVE-2024-29269.json) (`2024-04-10T20:15:07.440`)
|
||||
- [CVE-2024-29460](CVE-2024/CVE-2024-294xx/CVE-2024-29460.json) (`2024-04-10T21:15:06.583`)
|
||||
- [CVE-2024-29500](CVE-2024/CVE-2024-295xx/CVE-2024-29500.json) (`2024-04-10T20:15:07.510`)
|
||||
- [CVE-2024-29502](CVE-2024/CVE-2024-295xx/CVE-2024-29502.json) (`2024-04-10T20:15:07.567`)
|
||||
- [CVE-2024-31430](CVE-2024/CVE-2024-314xx/CVE-2024-31430.json) (`2024-04-10T20:15:07.620`)
|
||||
- [CVE-2024-31465](CVE-2024/CVE-2024-314xx/CVE-2024-31465.json) (`2024-04-10T20:15:07.833`)
|
||||
- [CVE-2024-31819](CVE-2024/CVE-2024-318xx/CVE-2024-31819.json) (`2024-04-10T20:15:08.027`)
|
||||
- [CVE-2024-31939](CVE-2024/CVE-2024-319xx/CVE-2024-31939.json) (`2024-04-10T20:15:08.083`)
|
||||
- [CVE-2024-31981](CVE-2024/CVE-2024-319xx/CVE-2024-31981.json) (`2024-04-10T20:15:08.280`)
|
||||
- [CVE-2024-31982](CVE-2024/CVE-2024-319xx/CVE-2024-31982.json) (`2024-04-10T20:15:08.463`)
|
||||
- [CVE-2024-31983](CVE-2024/CVE-2024-319xx/CVE-2024-31983.json) (`2024-04-10T20:15:08.650`)
|
||||
- [CVE-2024-31984](CVE-2024/CVE-2024-319xx/CVE-2024-31984.json) (`2024-04-10T20:15:08.830`)
|
||||
- [CVE-2024-31985](CVE-2024/CVE-2024-319xx/CVE-2024-31985.json) (`2024-04-10T21:15:06.723`)
|
||||
- [CVE-2024-31986](CVE-2024/CVE-2024-319xx/CVE-2024-31986.json) (`2024-04-10T21:15:06.917`)
|
||||
- [CVE-2024-31987](CVE-2024/CVE-2024-319xx/CVE-2024-31987.json) (`2024-04-10T21:15:07.110`)
|
||||
- [CVE-2024-31988](CVE-2024/CVE-2024-319xx/CVE-2024-31988.json) (`2024-04-10T21:15:07.297`)
|
||||
- [CVE-2024-31996](CVE-2024/CVE-2024-319xx/CVE-2024-31996.json) (`2024-04-10T21:15:07.510`)
|
||||
- [CVE-2024-29439](CVE-2024/CVE-2024-294xx/CVE-2024-29439.json) (`2024-04-10T23:15:06.753`)
|
||||
- [CVE-2024-29443](CVE-2024/CVE-2024-294xx/CVE-2024-29443.json) (`2024-04-10T23:15:06.810`)
|
||||
- [CVE-2024-29445](CVE-2024/CVE-2024-294xx/CVE-2024-29445.json) (`2024-04-10T23:15:06.857`)
|
||||
- [CVE-2024-29504](CVE-2024/CVE-2024-295xx/CVE-2024-29504.json) (`2024-04-10T22:15:07.287`)
|
||||
- [CVE-2024-29902](CVE-2024/CVE-2024-299xx/CVE-2024-29902.json) (`2024-04-10T23:15:06.920`)
|
||||
- [CVE-2024-29903](CVE-2024/CVE-2024-299xx/CVE-2024-29903.json) (`2024-04-10T23:15:07.130`)
|
||||
- [CVE-2024-30728](CVE-2024/CVE-2024-307xx/CVE-2024-30728.json) (`2024-04-10T23:15:07.317`)
|
||||
- [CVE-2024-31995](CVE-2024/CVE-2024-319xx/CVE-2024-31995.json) (`2024-04-10T22:15:07.340`)
|
||||
- [CVE-2024-31997](CVE-2024/CVE-2024-319xx/CVE-2024-31997.json) (`2024-04-10T22:15:07.527`)
|
||||
- [CVE-2024-31999](CVE-2024/CVE-2024-319xx/CVE-2024-31999.json) (`2024-04-10T22:15:07.710`)
|
||||
- [CVE-2024-32001](CVE-2024/CVE-2024-320xx/CVE-2024-32001.json) (`2024-04-10T23:15:07.363`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `9`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2021-46945](CVE-2021/CVE-2021-469xx/CVE-2021-46945.json) (`2024-04-10T20:11:52.607`)
|
||||
- [CVE-2021-46947](CVE-2021/CVE-2021-469xx/CVE-2021-46947.json) (`2024-04-10T20:00:47.847`)
|
||||
- [CVE-2021-46948](CVE-2021/CVE-2021-469xx/CVE-2021-46948.json) (`2024-04-10T20:14:23.420`)
|
||||
- [CVE-2021-46949](CVE-2021/CVE-2021-469xx/CVE-2021-46949.json) (`2024-04-10T20:14:05.477`)
|
||||
- [CVE-2021-46950](CVE-2021/CVE-2021-469xx/CVE-2021-46950.json) (`2024-04-10T20:13:16.993`)
|
||||
- [CVE-2021-46951](CVE-2021/CVE-2021-469xx/CVE-2021-46951.json) (`2024-04-10T20:15:55.593`)
|
||||
- [CVE-2021-46952](CVE-2021/CVE-2021-469xx/CVE-2021-46952.json) (`2024-04-10T20:15:42.153`)
|
||||
- [CVE-2021-46953](CVE-2021/CVE-2021-469xx/CVE-2021-46953.json) (`2024-04-10T20:15:31.827`)
|
||||
- [CVE-2021-46954](CVE-2021/CVE-2021-469xx/CVE-2021-46954.json) (`2024-04-10T20:15:05.997`)
|
||||
- [CVE-2024-28219](CVE-2024/CVE-2024-282xx/CVE-2024-28219.json) (`2024-04-10T22:15:07.193`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
69
_state.csv
69
_state.csv
@ -186671,16 +186671,16 @@ CVE-2021-46941,0,0,2ce82780f5a41832c9f1a25f06ccfdaa21aea0198a98e335b1d5dcb3a9149
|
||||
CVE-2021-46942,0,0,71a41cff6abe69a3265caabe98ca8aa57ab0c584e39536edfbd964c34d56e2cf,2024-04-10T19:56:14.227000
|
||||
CVE-2021-46943,0,0,2a1ca0405fb7880053d590ee8ada03dc0948253fa996ab8b3397058593a5b290,2024-04-10T19:54:14.133000
|
||||
CVE-2021-46944,0,0,d82544911189784027f8e2047744f9ca05b54cebfb5102fe4426566e939bb2ca,2024-04-10T19:53:31.403000
|
||||
CVE-2021-46945,0,1,1613c958c09405129a6b68f2262f9d58b2f5c10f7a982b4987ec1994d9a32d3b,2024-04-10T20:11:52.607000
|
||||
CVE-2021-46945,0,0,1613c958c09405129a6b68f2262f9d58b2f5c10f7a982b4987ec1994d9a32d3b,2024-04-10T20:11:52.607000
|
||||
CVE-2021-46946,0,0,0a7824c78fda312e2a69c092b1751fd0538157938572285a8b1a980223fde408,2024-03-08T10:15:45.650000
|
||||
CVE-2021-46947,0,1,b836dedfa92fccc459fea40fd62d889b18f3a7211503c6e1458f463ce4cd94fa,2024-04-10T20:00:47.847000
|
||||
CVE-2021-46948,0,1,b735e473c0cc9db781753c23f03e7c4346b8baca6dd6c7b501cb74c7e8f13da1,2024-04-10T20:14:23.420000
|
||||
CVE-2021-46949,0,1,5b1e4d2b1d1decfe38452960e2060c08e8baefdc1774769d6276c72ce0ba66a0,2024-04-10T20:14:05.477000
|
||||
CVE-2021-46950,0,1,3e0c1477c3d1b853b315d95e62161507cd6ba5a2f228afbd68ca9b69bca6cc21,2024-04-10T20:13:16.993000
|
||||
CVE-2021-46951,0,1,cdeb017dba1dc02345762262d8f58167052941f9bff86ac49714bca449358df9,2024-04-10T20:15:55.593000
|
||||
CVE-2021-46952,0,1,f0590ad3581458f5870bbcc3eeafad1b8dc84f834be560190a650ebee3f1aec9,2024-04-10T20:15:42.153000
|
||||
CVE-2021-46953,0,1,fc975863d057a83236efe5442bd7ee1f9bf1317c42d05c8e8457e553a3d1fcab,2024-04-10T20:15:31.827000
|
||||
CVE-2021-46954,0,1,7b86c3106c31d68eb2c15d95a5dc1291fc4efed7efd9059eadfa1b565e6e38e1,2024-04-10T20:15:05.997000
|
||||
CVE-2021-46947,0,0,b836dedfa92fccc459fea40fd62d889b18f3a7211503c6e1458f463ce4cd94fa,2024-04-10T20:00:47.847000
|
||||
CVE-2021-46948,0,0,b735e473c0cc9db781753c23f03e7c4346b8baca6dd6c7b501cb74c7e8f13da1,2024-04-10T20:14:23.420000
|
||||
CVE-2021-46949,0,0,5b1e4d2b1d1decfe38452960e2060c08e8baefdc1774769d6276c72ce0ba66a0,2024-04-10T20:14:05.477000
|
||||
CVE-2021-46950,0,0,3e0c1477c3d1b853b315d95e62161507cd6ba5a2f228afbd68ca9b69bca6cc21,2024-04-10T20:13:16.993000
|
||||
CVE-2021-46951,0,0,cdeb017dba1dc02345762262d8f58167052941f9bff86ac49714bca449358df9,2024-04-10T20:15:55.593000
|
||||
CVE-2021-46952,0,0,f0590ad3581458f5870bbcc3eeafad1b8dc84f834be560190a650ebee3f1aec9,2024-04-10T20:15:42.153000
|
||||
CVE-2021-46953,0,0,fc975863d057a83236efe5442bd7ee1f9bf1317c42d05c8e8457e553a3d1fcab,2024-04-10T20:15:31.827000
|
||||
CVE-2021-46954,0,0,7b86c3106c31d68eb2c15d95a5dc1291fc4efed7efd9059eadfa1b565e6e38e1,2024-04-10T20:15:05.997000
|
||||
CVE-2021-46955,0,0,8e7e45a3c2d2d91bfe6dad4aedbcc224c005a793a9b3eb00dc68e85801b57fe7,2024-02-28T14:06:45.783000
|
||||
CVE-2021-46956,0,0,f7bc9f8b64d6935913ddffde8af0208d9079784355a122db9c80c84c9d51a638,2024-02-28T14:06:45.783000
|
||||
CVE-2021-46957,0,0,14fd49e37d540c926a80f3f6606795d4205f9233f4239fe575d9c38428402a5d,2024-02-28T14:06:45.783000
|
||||
@ -239335,7 +239335,7 @@ CVE-2024-1476,0,0,d66db5b934d457173411a6e7c87c116f96f98ca76565b282c78606f1c9c844
|
||||
CVE-2024-1477,0,0,b1175a71510fd842138862374f281c1bda7457d7b234a1bf81a7a2fcce39bd63,2024-03-20T13:00:16.367000
|
||||
CVE-2024-1478,0,0,54fc4d2d1af2d772e45f440cc01a56a5078a7b4f242f25febd2c561b4b9b409a,2024-03-05T13:41:01.900000
|
||||
CVE-2024-1479,0,0,75eecf66dbf69c578ea2f09e6e564cdf3b04311a1ae51ea49bee3724800fe960,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1481,1,1,5a8cba030f734642adbec08edae8c0145fab160bd4605da2cbc1b80853cd5c84,2024-04-10T21:15:06.313000
|
||||
CVE-2024-1481,0,0,5a8cba030f734642adbec08edae8c0145fab160bd4605da2cbc1b80853cd5c84,2024-04-10T21:15:06.313000
|
||||
CVE-2024-1482,0,0,61f1933d97f430ea5062371f54d100c6fb03c771024804bcdad5092bc2efbfc7,2024-02-15T06:23:39.303000
|
||||
CVE-2024-1484,0,0,2816ffb064ebf87ebca44e6afd6928df4e130e61997f3bc50802157887bafe8f,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1485,0,0,b9f4145834ee9d538c2d6e8caecb301f8f2dde5a282a13e80f59671c5263bb0b,2024-02-22T01:15:07.980000
|
||||
@ -242777,7 +242777,7 @@ CVE-2024-26350,0,0,94fde44080954984b73836ed416075677e0fc24eadc0bc6ed473bcf70a41b
|
||||
CVE-2024-26351,0,0,ca59fd7de6fb4b8be3d1dd63bf1340c6e097ec7efd2f74728f2b6d3782e5af9c,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26352,0,0,a91e9b827b34ff74d03de6eecd5ed6a244c3125227e96fd7536e6e0fc75fc75e,2024-02-22T19:07:27.197000
|
||||
CVE-2024-2636,0,0,2136f31c86bb7a335e516e0265dfb7c3eee5b1d10cfc06f1391b5375fe684311,2024-03-19T13:26:46
|
||||
CVE-2024-26362,1,1,62de1107964cb50e28a10d04c294360068e68e0c98598460e24293d6c63a086a,2024-04-10T21:15:06.533000
|
||||
CVE-2024-26362,0,0,62de1107964cb50e28a10d04c294360068e68e0c98598460e24293d6c63a086a,2024-04-10T21:15:06.533000
|
||||
CVE-2024-26369,0,0,b0322db94f9b89a2da31dd1ffa70ef568f3b1c4901ca044ba9c0ea1e2eb29c09,2024-03-19T13:26:46
|
||||
CVE-2024-2639,0,0,be497fbeac2957b5f2ef163ba1fe7a3d496ebe7aa691b9e8ccc0009da154c0e9,2024-03-21T02:52:40.373000
|
||||
CVE-2024-2641,0,0,f0564c17f72fe0389b5a4a0ad2383b43964c9e94cd832dbe5a5b092dd0b3e0d4,2024-03-21T02:52:40.450000
|
||||
@ -243606,7 +243606,7 @@ CVE-2024-28213,0,0,090aa70f4759221eeb170ac061c15ca31a585444d2e87d3363c44ed2fcccc
|
||||
CVE-2024-28214,0,0,1704cd87ae391533dc81cb622240473051339c712493c3e6ead802f63dccb239,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28215,0,0,3c9fd1adfdd2b7f063ffbf1a9fc9f520d65955380ea257f42f44086732bef016,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28216,0,0,81cb418e285cc210ffc29a8a25f8e508c54e8fe29c1cf038a851918d914b9b1e,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28219,0,0,dab1bc76d4dd1af61b2ba887cb87738dccae692dcedd66dd3387ec79710c0330,2024-04-10T05:15:48.810000
|
||||
CVE-2024-28219,0,1,eda37ea75b94b99dc06763135a1bebed717144ccd3b72bb74b162bc69b3a8690,2024-04-10T22:15:07.193000
|
||||
CVE-2024-2822,0,0,6ab09d9d7524c6d95c8d1ae5b3671b49edc27757385c7737f509e182267f103a,2024-03-22T19:02:10.300000
|
||||
CVE-2024-28222,0,0,d419d3ada13caae27e6dde281d73cbc44d2f509d635642c67ccba01f063babd6,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28224,0,0,3152cc64dff1bcf9fde70fb8b36c735f55a1cb82cfb6f7caa3c629344bcaff59,2024-04-09T12:48:04.090000
|
||||
@ -244053,7 +244053,7 @@ CVE-2024-29241,0,0,0d22a80c0de17d3b18b0f9136bc6951a88a9b84e77f5185bb4dfc57412ae7
|
||||
CVE-2024-29243,0,0,862def336b16032c1130c00f979aa4f537404b17294c1ae567f40eb15801f627,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29244,0,0,f38f58b77ca3d656d49038b33ac381f2ddffb3511144fd7b7141fdc358ac519c,2024-03-21T15:24:35.093000
|
||||
CVE-2024-2925,0,0,7e1bff7e262b77495d2e25a300630629f063c78f4962ee86607d3baa34c6e9cb,2024-04-02T12:50:42.233000
|
||||
CVE-2024-29269,1,1,ad7729230bf69a7e0a7cadebe307ecc7578dda38d8655a375eb1129da284af5e,2024-04-10T20:15:07.440000
|
||||
CVE-2024-29269,0,0,ad7729230bf69a7e0a7cadebe307ecc7578dda38d8655a375eb1129da284af5e,2024-04-10T20:15:07.440000
|
||||
CVE-2024-2927,0,0,870c2fd2083a457bf8424548a11bf469c31670915b4b854d8d74bdf756bd3242,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29271,0,0,86d82853285296d2653b2954b1f865b89755729787a00c9a08bf8b4da2a10347,2024-03-22T12:45:36.130000
|
||||
CVE-2024-29272,0,0,bb3421cdf283ecf2f8722dd79d31aa3f3d26bad518191ad6f8ea2a70c28d47bf,2024-03-22T12:45:36.130000
|
||||
@ -244093,12 +244093,15 @@ CVE-2024-29432,0,0,935ce59b23319f15478ff1d005b1786853efcea9f20ed5b78b83dcf1879a3
|
||||
CVE-2024-29433,0,0,b10a666a979afbf6ffc25b1ef458e1d0fb9c766493f3b32e8a3cbc2c3e4a9e2b,2024-04-02T12:50:42.233000
|
||||
CVE-2024-29434,0,0,e2dd739e4fe1b524f01d6355aa24f60868a619e4b33fdd429c31c5ef2f0acc1e,2024-04-03T12:38:04.840000
|
||||
CVE-2024-29435,0,0,4d03d83d8cb615246ed4e783c1ea07f9aee9ed7e6aa6133cefbb15bfb0a5c168,2024-04-02T12:50:42.233000
|
||||
CVE-2024-29439,1,1,1d69df312d39ff606afcc228505a3de56229b4c462672c963ba3cffa502b3e5d,2024-04-10T23:15:06.753000
|
||||
CVE-2024-2944,0,0,edbe06654b669678b299b573aae74f1e6525956b78541d7e0f3aff7e4dd8cf16,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29440,0,0,b41dbba691936eb263a6e48ee2f4c3b0c65bf928cbb922caedd1e0f5f03baacf,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29442,0,0,7905121fe561461f75c739d09685b7ffc46a6e6f08464603a503f7d567bf4eab,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29443,1,1,1bc9ffda251ef99e368f68a14e5a690c42b0f16382b7e7c81c9aa6a95f66c213,2024-04-10T23:15:06.810000
|
||||
CVE-2024-29445,1,1,6455b8fc0fc660a0a93f47d1c88010878e6e7a3a9d67a016856e4f554a80e1be,2024-04-10T23:15:06.857000
|
||||
CVE-2024-2945,0,0,309a513aec715a57b9d74929d2379e417477e6045825bb68d9c761cada7aab5c,2024-03-27T12:29:30.307000
|
||||
CVE-2024-2946,0,0,8a22c9853e8b531bbd8a8e90a11cfdbe9528f15dbd8531539c68a8acd7935dc8,2024-04-10T13:23:38.787000
|
||||
CVE-2024-29460,1,1,317a4f50f0ffd064a420b5baaaddb1a19ecc45eaf513e4dd83a36a6cb36ef4e4,2024-04-10T21:15:06.583000
|
||||
CVE-2024-29460,0,0,317a4f50f0ffd064a420b5baaaddb1a19ecc45eaf513e4dd83a36a6cb36ef4e4,2024-04-10T21:15:06.583000
|
||||
CVE-2024-29469,0,0,fcd29429266b7a87e58735d5b1a87e454245abd68c4217f0834c945fcf2dbdeb,2024-03-21T12:58:51.093000
|
||||
CVE-2024-2947,0,0,1f5db3dcaa8eaba268358fabd07cd32a790eaac8bc91ef0018408fc63d80627e,2024-03-31T02:15:09.150000
|
||||
CVE-2024-29470,0,0,47e23a8af4be8b838695296b19cd4bea426144fbae12eb976431244ea0a84b06,2024-03-21T12:58:51.093000
|
||||
@ -244112,8 +244115,9 @@ CVE-2024-29489,0,0,281c97da696e2014734e05639dd64d47354e5c2b4bcf9f1b7827a4a4899ee
|
||||
CVE-2024-2949,0,0,fe05e354f0ebdb867f0f2833560dc840c15ef92daf8a56e7a3e31b95f453d065,2024-04-08T18:48:40.217000
|
||||
CVE-2024-29499,0,0,6d5bcd6ddf0ffffbb229032818f99219d3a96f2f060fbc36a33564f3ae345d5e,2024-03-22T19:02:10.300000
|
||||
CVE-2024-2950,0,0,e07028f6204e1653615da40fab9edc1b22f1b4a28f65125bfe5341d4aac985fa,2024-04-08T18:49:25.863000
|
||||
CVE-2024-29500,1,1,1a3796c93fd977880b2e3f6a4cd449efb28cd1e6c930031b6f04cd70a164fb96,2024-04-10T20:15:07.510000
|
||||
CVE-2024-29502,1,1,83c51beb31398b16e738b71df94823c943f102b6a43cefa73fb403ae46123c92,2024-04-10T20:15:07.567000
|
||||
CVE-2024-29500,0,0,1a3796c93fd977880b2e3f6a4cd449efb28cd1e6c930031b6f04cd70a164fb96,2024-04-10T20:15:07.510000
|
||||
CVE-2024-29502,0,0,83c51beb31398b16e738b71df94823c943f102b6a43cefa73fb403ae46123c92,2024-04-10T20:15:07.567000
|
||||
CVE-2024-29504,1,1,b8293d9f170f6d84c833f829ce8ea6210ec4ee95b384f58aa344ba945af5e201,2024-04-10T22:15:07.287000
|
||||
CVE-2024-2951,0,0,7025f71f619ebfb5f00b29e3d72fe62bb5f0ea0dbfe92a58b33e63352aa0779c,2024-03-27T12:29:41.530000
|
||||
CVE-2024-29514,0,0,2d6d3d0a4ae4b5ae40dadfbf4537d707f35bed7e85002b6d4e3d8180d6408f0b,2024-04-02T18:12:16.283000
|
||||
CVE-2024-29515,0,0,79c9f65757e49bdb19c4dcff88d6ba2d524b1951e790ac90d5ffb4f302abcf45,2024-03-26T12:55:05.010000
|
||||
@ -244267,6 +244271,8 @@ CVE-2024-29898,0,0,a2f935bfbb33add93aff8d32c09dc9f7952be5c0243aad5cba34861657283
|
||||
CVE-2024-2990,0,0,482f4612170da1e0b0598818577827b0753e61cf3a51eabc7ad5396b674dba51,2024-03-28T02:01:13.303000
|
||||
CVE-2024-29900,0,0,b99cd571d8d699adcff1d9a0f6085772745471b84efa1b60422f06d61cde9485,2024-04-01T01:12:59.077000
|
||||
CVE-2024-29901,0,0,b07651b5e3683d58062a2619f65cd6b587a09c22191d8a54182f7055ad9642db,2024-04-01T01:12:59.077000
|
||||
CVE-2024-29902,1,1,74d510bae7e52dcfb693caa83fc6056a89f5c9774565283c7495690e3bd96059,2024-04-10T23:15:06.920000
|
||||
CVE-2024-29903,1,1,8f1077224a906fb1bd4ee1e5bd6784bc6127d53cc34f41ad8602c1fa589ac993,2024-04-10T23:15:07.130000
|
||||
CVE-2024-29904,0,0,922d3ca540b7a7a38e394677ef40fbe71374cf5fd3f36e5754c424444d9736e1,2024-04-01T01:12:59.077000
|
||||
CVE-2024-29905,0,0,3a300037a30bf563b822204e8e235e379178549d87f6d48f161231fe894a3135,2024-04-10T13:24:00.070000
|
||||
CVE-2024-29906,0,0,5e6afa8dbe77b2ceaee29629c66d8bdf273caddf4f38f955d682aeefe9beab4c,2024-03-27T12:29:30.307000
|
||||
@ -244691,6 +244697,7 @@ CVE-2024-30723,0,0,dc330635bd2c0f023fa185f0fdee50819537ec1cb3e04c9b923279375b9e4
|
||||
CVE-2024-30724,0,0,c5bc1d62745db5722694ff82efab2f050e090e2cdc10d3b46cd1ca9a686ec9d6,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30726,0,0,3d4fe5e2b1ab21972d6cf937194590c4e66b9e113c35d539a0da2d600d1f2acc,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30727,0,0,0d4038bb750868d5905673e402c30dc4315a2d8a9c9f26326b27ae647049f1e0,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30728,1,1,2794f029da79b2bc9c60b7ad583ff105d73050acce1e67ce6834c0754eded9ae,2024-04-10T23:15:07.317000
|
||||
CVE-2024-30729,0,0,2dc1920138a02b98187be4280645fa3245cc8bcb6e49f3a9af11f72c0a8c1673,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30730,0,0,55714fc9d38b1912a54f0372ab1aa07c606dae0d74e47062a6cd1a41e2c6378e,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30733,0,0,a9382491192019dac57569c44518f9ec249641fcfad37be5bc7ffe4231d9be0e,2024-04-10T13:23:38.787000
|
||||
@ -244896,7 +244903,7 @@ CVE-2024-31419,0,0,36c8a60658bbd6b33e2cacab3bae7069924fea2c95b1bfd68ef2a5a438c0a
|
||||
CVE-2024-3142,0,0,9dd81c211bf76d67e1c43a667eb2bd313a4a58232363655578ff94c12b7d19a5,2024-04-04T13:15:44.937000
|
||||
CVE-2024-31420,0,0,5d7e593d118cd1f41577542846ec46b792c74358a1c27af2e9295870ce46a7f7,2024-04-03T17:24:18.150000
|
||||
CVE-2024-3143,0,0,adef6ddf8aed4b85f5b9ec5c41837e0ea05c8056f77fa6600789550fcc865a57,2024-04-02T12:50:42.233000
|
||||
CVE-2024-31430,1,1,bbb77e152f331e83b1c68e6924ec3fc502573653809464066d1a1ac2ed1c0e1b,2024-04-10T20:15:07.620000
|
||||
CVE-2024-31430,0,0,bbb77e152f331e83b1c68e6924ec3fc502573653809464066d1a1ac2ed1c0e1b,2024-04-10T20:15:07.620000
|
||||
CVE-2024-3144,0,0,0d76c2330ba298defd0f1b4b8583f5577295a22c7482e9267c8cbbe09aa0eb3a,2024-04-02T12:50:42.233000
|
||||
CVE-2024-31442,0,0,bd0c0777ffd79341352bfaf4bac13513052ca764dc9351410c56fde55ac0fa91,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31447,0,0,1686ea065902cff688a9e0e72258f816c60304799af9644c7db6f9ae37572786,2024-04-08T18:48:40.217000
|
||||
@ -244908,7 +244915,7 @@ CVE-2024-31457,0,0,2a3df56afd0a6a9934427214a76e8de40165fd02e6f2532ac344e6e6c96b3
|
||||
CVE-2024-3146,0,0,c53d63ca526f35fd2250cfdb239f061e8b52186457f5fd4f6bc18a291d69a364,2024-04-02T12:50:42.233000
|
||||
CVE-2024-31461,0,0,78d12ab3381b5c3fda69b1f5421edfe2ff30f397a9794d52b313ced0ec0ec1d3,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31464,0,0,0e334e051a2f53edc57cbce800fcc17540fa9d746f3833bb6b1e894dc6dae023,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31465,1,1,09972dd369e6d00ab757e161e12581c05fa6b6e384bbce760d0168d56b304400,2024-04-10T20:15:07.833000
|
||||
CVE-2024-31465,0,0,09972dd369e6d00ab757e161e12581c05fa6b6e384bbce760d0168d56b304400,2024-04-10T20:15:07.833000
|
||||
CVE-2024-3147,0,0,02625b405a9656dc1928c253c58a24946e5b9cb50ef47acb30b3a3a470e8efd5,2024-04-02T12:50:42.233000
|
||||
CVE-2024-3148,0,0,da83dea91bd5fed523ca15df13db4100d62650319dcc492fed6d52171a819a8a,2024-04-02T12:50:42.233000
|
||||
CVE-2024-31487,0,0,4f24e6db0f56a97932d1fcb48db397a06c0f937b932a453b76d90975be251d2c,2024-04-10T13:24:22.187000
|
||||
@ -244943,7 +244950,7 @@ CVE-2024-31814,0,0,e3ca4010fb6a58f61e69bd6376064660d2fdaf6bb387d308db35cab7cd7c1
|
||||
CVE-2024-31815,0,0,30302ad414ab45baa3ec4e6cb3fe786fcebb8651723a135b55d05ee22523845e,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31816,0,0,8b0edd8a38c33b33b513f099b5e67906c887d32cd0308b5fdfadcac29bc21611,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31817,0,0,440a95dbf8589f9a9953a43f37d15f507abb02f786409b55238dedab4fef773a,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31819,1,1,2a3b89d939962fa7b4d302db84d776372b0ec20a0b5a80da0c929edbc2e74167,2024-04-10T20:15:08.027000
|
||||
CVE-2024-31819,0,0,2a3b89d939962fa7b4d302db84d776372b0ec20a0b5a80da0c929edbc2e74167,2024-04-10T20:15:08.027000
|
||||
CVE-2024-31848,0,0,2da60f6a287cac48661bc0aa0bb0ac92caa20fc3ae4255bef230dfecf644c92e,2024-04-08T18:49:25.863000
|
||||
CVE-2024-31849,0,0,f45798bfe1f17890c1c9f615c3d632efe82fbe29dd84fe4753d6d6beae3b4f6a,2024-04-08T18:49:25.863000
|
||||
CVE-2024-31850,0,0,4dfa9605a049a09744618be099ad889f274ff40fc42a18e168685588a6a44b6d,2024-04-08T18:49:25.863000
|
||||
@ -244962,7 +244969,7 @@ CVE-2024-31872,0,0,7d09da772d85c1598253bebf81c543077ef995af0f84d1cf088132605a240
|
||||
CVE-2024-31873,0,0,30397559953deb34a9ae192149473632dc6b2334245e920787a4c5e14fc76375,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31874,0,0,1770e58d0ae5591eb931a8cdfdb054fb4d854f81849d14af250c71db6caf553c,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31924,0,0,f6b9db9f53cdffb6f393ef618d7b0bada6f867ced301e91b9a83cccba162e103,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31939,1,1,1dd1845a3abbc7a2c9bab39b6b25c3966258c3e92d4b72d4feca81b5b57bb65b,2024-04-10T20:15:08.083000
|
||||
CVE-2024-31939,0,0,1dd1845a3abbc7a2c9bab39b6b25c3966258c3e92d4b72d4feca81b5b57bb65b,2024-04-10T20:15:08.083000
|
||||
CVE-2024-31943,0,0,d050ed16bd2fd56e0b74cc5712c1eb7ef94538d6cfa9c00022a6cfa048bd2dcc,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31944,0,0,d1cf01bee95ac2d1b4f198f30f665ce7f3dae041b6378dd5d37f86b95341e18f,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31948,0,0,b8fd3eda997fc89b9e55a498d2068e6465c743165b4060fd79003e8bed0e6076,2024-04-08T18:48:40.217000
|
||||
@ -244970,15 +244977,19 @@ CVE-2024-31949,0,0,e7ba39ada062d71e6dcc57a3b21fdc31258fde0372c873d76cfd22b57d87a
|
||||
CVE-2024-31950,0,0,6cefb0ca8246a802eee33ecaeabf30a3794c53c92173f69e19945e3bf38104d7,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31951,0,0,a02cb6e83819b8aefe87f14fcbaf10a3986c9b6174676e08f67eb54fe256f190,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31978,0,0,905fe24a9cf546b211ed3cfae7258dc772856eb0550beb1f55c95bc3799601d2,2024-04-09T12:48:04.090000
|
||||
CVE-2024-31981,1,1,41ed28ce6bba23b85449be82f11fff9b7cf78c541c7a9b52c36a8133a4d7e339,2024-04-10T20:15:08.280000
|
||||
CVE-2024-31982,1,1,11e46b46340c61f03840a7ce00d1d951c5614258b1b16fe8c8055060204d36ad,2024-04-10T20:15:08.463000
|
||||
CVE-2024-31983,1,1,74f8b65fb73ac5166030eaca2fb6bcbb3eaeea646572692ba025d68a44d23657,2024-04-10T20:15:08.650000
|
||||
CVE-2024-31984,1,1,3dd967b6d867d35a2c47c2387078e637e793f4dd993188fda54bcb553ac6a80b,2024-04-10T21:15:06.637000
|
||||
CVE-2024-31985,1,1,276c22cdfab88ce17976e1fb31121d1912584557af449dc431fd410c22061e99,2024-04-10T21:15:06.723000
|
||||
CVE-2024-31986,1,1,43669e074c85477994fcd4cf3c2c0c0f46b7f690fe7395ed093bf6da81a7c2ed,2024-04-10T21:15:06.917000
|
||||
CVE-2024-31987,1,1,eaf04e5e8adb7495522ece035bec1afa6fa22951b4cdb91bb3bde2024b9f74c0,2024-04-10T21:15:07.110000
|
||||
CVE-2024-31988,1,1,5da0fc4a1538121c707391b7b21e94efdcfa92fbaa21aa92953be0e501557b00,2024-04-10T21:15:07.297000
|
||||
CVE-2024-31996,1,1,1735e73cb95bb856b03a29dc9274bca12643ea7963276488bac15e1aeea916a8,2024-04-10T21:15:07.510000
|
||||
CVE-2024-31981,0,0,41ed28ce6bba23b85449be82f11fff9b7cf78c541c7a9b52c36a8133a4d7e339,2024-04-10T20:15:08.280000
|
||||
CVE-2024-31982,0,0,11e46b46340c61f03840a7ce00d1d951c5614258b1b16fe8c8055060204d36ad,2024-04-10T20:15:08.463000
|
||||
CVE-2024-31983,0,0,74f8b65fb73ac5166030eaca2fb6bcbb3eaeea646572692ba025d68a44d23657,2024-04-10T20:15:08.650000
|
||||
CVE-2024-31984,0,0,3dd967b6d867d35a2c47c2387078e637e793f4dd993188fda54bcb553ac6a80b,2024-04-10T21:15:06.637000
|
||||
CVE-2024-31985,0,0,276c22cdfab88ce17976e1fb31121d1912584557af449dc431fd410c22061e99,2024-04-10T21:15:06.723000
|
||||
CVE-2024-31986,0,0,43669e074c85477994fcd4cf3c2c0c0f46b7f690fe7395ed093bf6da81a7c2ed,2024-04-10T21:15:06.917000
|
||||
CVE-2024-31987,0,0,eaf04e5e8adb7495522ece035bec1afa6fa22951b4cdb91bb3bde2024b9f74c0,2024-04-10T21:15:07.110000
|
||||
CVE-2024-31988,0,0,5da0fc4a1538121c707391b7b21e94efdcfa92fbaa21aa92953be0e501557b00,2024-04-10T21:15:07.297000
|
||||
CVE-2024-31995,1,1,9eb94cdaf5afaba2fbdff98ac2f35a24992c9534ea3eecdf8ad26f5366819717,2024-04-10T22:15:07.340000
|
||||
CVE-2024-31996,0,0,1735e73cb95bb856b03a29dc9274bca12643ea7963276488bac15e1aeea916a8,2024-04-10T21:15:07.510000
|
||||
CVE-2024-31997,1,1,c7ea8c4fd6950595c321adc6b23cbabb7d0eb9826ffba95dd878e3333e4b4022,2024-04-10T22:15:07.527000
|
||||
CVE-2024-31999,1,1,1a2be178d542add2c25b65bd95b65507dd0c56f0e74624fb1f4fb118afe77597,2024-04-10T22:15:07.710000
|
||||
CVE-2024-32001,1,1,f09b35b6b84716fea2178dcb53bcec08140cf7614e1ec079378bf4663c7cad6e,2024-04-10T23:15:07.363000
|
||||
CVE-2024-3202,0,0,c740eb561a7c1440cb5a8dd5eb2f94f0cce226529c05056c2f841e5a9fe9ca73,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3203,0,0,50d63f401f7659abc3d4fe6662d0f1a519a0e385e123db03b5f1830a5a75ec57,2024-04-06T16:15:08.350000
|
||||
CVE-2024-3204,0,0,f0ecaa4cd894fa75e44a48d7dd9614c107f33ee3ea503e315d2394814a086ab4,2024-04-06T16:15:08.530000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user