mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2024-04-23T14:00:38.816345+00:00
This commit is contained in:
parent
03d24f08e3
commit
afb12ed9ef
59
CVE-2023/CVE-2023-477xx/CVE-2023-47731.json
Normal file
59
CVE-2023/CVE-2023-477xx/CVE-2023-47731.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-47731",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-04-23T13:15:46.343",
|
||||
"lastModified": "2024-04-23T13:15:46.343",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM QRadar Suite Software 1.10.12.0 through 1.10.19.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 272203."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/272203",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://https://www.ibm.com/support/pages/node/7148994",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-48183",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-23T07:15:42.730",
|
||||
"lastModified": "2024-04-23T07:15:42.730",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:09.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "QuickJS before c4cdd61 has a build_for_in_iterator NULL pointer dereference because of an erroneous lexical scope of \"this\" with eval."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "QuickJS anterior a c4cdd61 tiene una desreferencia de puntero NULL build_for_in_iterator debido a un alcance l\u00e9xico err\u00f3neo de \"this\" con eval."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-48184",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-23T07:15:42.840",
|
||||
"lastModified": "2024-04-23T07:15:42.840",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:09.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "QuickJS before 7414e5f has a quickjs.h JS_FreeValueRT use-after-free because of incorrect garbage collection of async functions with closures."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "QuickJS anterior a 7414e5f tiene un use-after-free de Quickjs.h JS_FreeValueRT debido a una recolecci\u00f3n de basura incorrecta de funciones as\u00edncronas con cierres."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-6833",
|
||||
"sourceIdentifier": "hirt@hitachi.co.jp",
|
||||
"published": "2024-04-23T06:15:06.340",
|
||||
"lastModified": "2024-04-23T06:15:06.340",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:09.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insertion of Sensitive Information into Log File vulnerability in Hitachi Ops Center Administrator allows local users to gain sensitive information.This issue affects Hitachi Ops Center Administrator: before 11.0.1.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en el archivo de registro en Hitachi Ops Center Administrator permite a los usuarios locales obtener informaci\u00f3n confidencial. Este problema afecta a Hitachi Ops Center Administrator: versiones anteriores a 11.0.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-0900",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-23T09:15:06.833",
|
||||
"lastModified": "2024-04-23T09:15:06.833",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:09.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Elespare \u2013 Build Your Blog, News & Magazine Websites with Expert-Designed Template Kits. One Click Import: No Coding Skills Required! plugin for WordPress is vulnerable to unauthorized post creation due to a missing capability check on the elespare_create_post() function hooked via AJAX in all versions up to, and including, 2.1.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to create arbitrary posts."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento The Elespare \u2013 Build Your Blog, News & Magazine Websites with Expert-Designed Template Kits. One Click Import: No Coding Skills Required! para WordPress es vulnerable a la creaci\u00f3n de publicaciones no autorizadas debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n elespare_create_post() conectada a trav\u00e9s de AJAX en todas las versiones hasta la 2.1.2 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, creen publicaciones arbitrarias."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-1241",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2024-04-23T04:15:08.357",
|
||||
"lastModified": "2024-04-23T04:15:08.357",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:09.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Watchdog Antivirus v1.6.415 is vulnerable to a Denial of Service vulnerability by triggering the 0x80002014 IOCTL code of the wsdk-driver.sys driver."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Watchdog Antivirus v1.6.415 es afectado por una vulnerabilidad de denegaci\u00f3n de servicio al activar el c\u00f3digo IOCTL 0x80002014 del controlador wsdk-driver.sys."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-21511",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2024-04-23T05:15:48.963",
|
||||
"lastModified": "2024-04-23T05:15:48.963",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:09.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Versions of the package mysql2 before 3.9.7 are vulnerable to Arbitrary Code Injection due to improper sanitization of the timezone parameter in the readCodeFor function by calling a native MySQL Server date/time function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones del paquete mysql2 anteriores a la 3.9.7 son vulnerables a la inyecci\u00f3n de c\u00f3digo arbitrario debido a una sanitizaci\u00f3n inadecuada del par\u00e1metro de zona horaria en la funci\u00f3n readCodeFor al llamar a una funci\u00f3n de fecha/hora nativa del servidor MySQL."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2493",
|
||||
"sourceIdentifier": "hirt@hitachi.co.jp",
|
||||
"published": "2024-04-23T06:15:06.797",
|
||||
"lastModified": "2024-04-23T06:15:06.797",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:09.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Session Hijacking vulnerability in Hitachi Ops Center Analyzer.This issue affects Hitachi Ops Center Analyzer: from 10.0.0-00 before 11.0.1-00.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de secuestro de sesi\u00f3n en Hitachi Ops Center Analyzer. Este problema afecta a Hitachi Ops Center Analyzer: desde 10.0.0-00 antes de 11.0.1-00."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
20
CVE-2024/CVE-2024-269xx/CVE-2024-26922.json
Normal file
20
CVE-2024/CVE-2024-269xx/CVE-2024-26922.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-26922",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-23T13:15:46.643",
|
||||
"lastModified": "2024-04-23T13:15:46.643",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: validate the parameters of bo mapping operations more clearly\n\nVerify the parameters of\namdgpu_vm_bo_(map/replace_map/clearing_mappings) in one common place."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6fef2d4c00b5b8561ad68dd2b68173f5c6af1e75",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-27574",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T21:15:48.987",
|
||||
"lastModified": "2024-04-22T21:15:48.987",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:26.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability in Trainme Academy version Ichin v.1.3.2 allows a remote attacker to obtain sensitive information via the informacion, idcurso, and tit parameters."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de inyecci\u00f3n SQL en Trainme Academy versi\u00f3n Ichin v.1.3.2 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de los par\u00e1metros informacion, idcurso y tit."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2760",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2024-04-23T04:15:08.717",
|
||||
"lastModified": "2024-04-23T04:15:08.717",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:09.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Bkav Home v7816, build 2403161130 is vulnerable to a Memory Information Leak vulnerability by triggering the 0x222240 IOCTL code of the BkavSDFlt.sys driver."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Bkav Home v7816, compilaci\u00f3n 2403161130 es afectado por una vulnerabilidad de fuga de informaci\u00f3n de memoria al activar el c\u00f3digo IOCTL 0x222240 del controlador BkavSDFlt.sys."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2798",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-23T06:15:07.143",
|
||||
"lastModified": "2024-04-23T06:15:07.143",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:09.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widget containers in all versions up to, and including, 1.3.971 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Royal Elementor Addons and Templates para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los contenedores de widgets del complemento en todas las versiones hasta la 1.3.971 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2799",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-23T06:15:07.417",
|
||||
"lastModified": "2024-04-23T06:15:07.417",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:09.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Image Grid & Advanced Text widget HTML tags in all versions up to, and including, 1.3.96 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Royal Elementor Addons and Templates para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de las etiquetas HTML del widget Image Grid & Advanced Text en todas las versiones hasta la 1.3.96 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida proporcionado por el usuario. atributos. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-28890",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-04-23T05:15:49.260",
|
||||
"lastModified": "2024-04-23T05:15:49.260",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:09.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Forminator prior to 1.29.0 contains an unrestricted upload of file with dangerous type vulnerability. If this vulnerability is exploited, a remote attacker may obtain sensitive information by accessing files on the server, alter the site that uses the plugin, and cause a denial-of-service (DoS) condition. "
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Forminator anterior a 1.29.0 contiene una carga sin restricciones de archivos con una vulnerabilidad de tipo peligroso. Si se explota esta vulnerabilidad, un atacante remoto puede obtener informaci\u00f3n confidencial accediendo a archivos en el servidor, alterar el sitio que utiliza el complemento y provocar una condici\u00f3n de denegaci\u00f3n de servicio (DoS)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-29368",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T21:15:49.043",
|
||||
"lastModified": "2024-04-22T21:15:49.043",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:26.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue discovered in moziloCMS v2.0 allows attackers to bypass file upload restrictions and run arbitrary code by changing the file extension after upload via crafted POST request."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema descubierto en moziloCMS v2.0 permite a los atacantes eludir las restricciones de carga de archivos y ejecutar c\u00f3digo arbitrario cambiando la extensi\u00f3n del archivo despu\u00e9s de la carga mediante una solicitud POST manipulada."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
24
CVE-2024/CVE-2024-308xx/CVE-2024-30800.json
Normal file
24
CVE-2024/CVE-2024-308xx/CVE-2024-30800.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-30800",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-23T13:15:46.700",
|
||||
"lastModified": "2024-04-23T13:15:46.700",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "PX4 Autopilot v.1.14 allows an attacker to fly the drone into no-fly zones by breaching the geofence using flaws in the function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/PX4/PX4-Autopilot/issues/22282",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/PX4/PX4-Autopilot/pull/22394",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-31036",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T22:15:07.400",
|
||||
"lastModified": "2024-04-22T22:15:07.400",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:26.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A heap-buffer-overflow vulnerability in the read_byte function in NanoMQ v.0.21.7 allows attackers to cause a denial of service via transmission of crafted hexstreams."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en la funci\u00f3n read_byte en NanoMQ v.0.21.7 permite a los atacantes provocar una denegaci\u00f3n de servicio mediante la transmisi\u00f3n de hexstreams manipulados."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-31077",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-04-23T05:15:49.323",
|
||||
"lastModified": "2024-04-23T05:15:49.323",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:09.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Forminator prior to 1.29.3 contains a SQL injection vulnerability. If this vulnerability is exploited, a remote authenticated attacker with an administrative privilege may obtain and alter any information in the database and cause a denial-of-service (DoS) condition."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Forminator anterior a 1.29.3 contiene una vulnerabilidad de inyecci\u00f3n SQL. Si se explota esta vulnerabilidad, un atacante remoto autenticado con privilegios administrativos puede obtener y alterar cualquier informaci\u00f3n en la base de datos y provocar una condici\u00f3n de denegaci\u00f3n de servicio (DoS)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-31857",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-04-23T05:15:49.377",
|
||||
"lastModified": "2024-04-23T05:15:49.377",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:09.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Forminator prior to 1.15.4 contains a cross-site scripting vulnerability. If this vulnerability is exploited, a remote attacker may obtain user information etc. and alter the page contents on the user's web browser."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Forminator anterior a 1.15.4 contiene una vulnerabilidad de Cross Site Scripting. Si se explota esta vulnerabilidad, un atacante remoto puede obtener informaci\u00f3n del usuario, etc. y alterar el contenido de la p\u00e1gina en el navegador web del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3177",
|
||||
"sourceIdentifier": "jordan@liggitt.net",
|
||||
"published": "2024-04-22T23:15:51.180",
|
||||
"lastModified": "2024-04-22T23:15:51.180",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:26.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service account\u2019s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema de seguridad en Kubernetes donde los usuarios pueden lanzar contenedores que omiten la pol\u00edtica de secretos montables aplicada por el complemento de admisi\u00f3n ServiceAccount cuando usan contenedores, contenedores init y contenedores ef\u00edmeros con el campo envFrom completo. La pol\u00edtica garantiza que los pods que se ejecutan con una cuenta de servicio solo puedan hacer referencia a secretos especificados en el campo de secretos de la cuenta de servicio. Los cl\u00fasteres de Kubernetes solo se ven afectados si el complemento de admisi\u00f3n ServiceAccount y la anotaci\u00f3n kubernetes.io/enforce-mountable-secrets se usan junto con contenedores, contenedores init y contenedores ef\u00edmeros con el campo envFrom completo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3185",
|
||||
"sourceIdentifier": "cve@rapid7.com",
|
||||
"published": "2024-04-23T09:15:07.023",
|
||||
"lastModified": "2024-04-23T09:15:07.023",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:09.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32039",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-22T21:15:49.090",
|
||||
"lastModified": "2024-04-22T21:15:49.090",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:26.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients using a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to integer overflow and out-of-bounds write. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use `/gfx` options (e.g. deactivate with `/bpp:32` or `/rfx` as it is on by default)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "FreeRDP es una implementaci\u00f3n gratuita del protocolo de escritorio remoto. Los clientes basados en FreeRDP que utilizan una versi\u00f3n de FreeRDP anterior a la 3.5.0 o 2.11.6 son vulnerables al desbordamiento de enteros y a la escritura fuera de los l\u00edmites. Las versiones 3.5.0 y 2.11.6 solucionan el problema. Como workaround, no utilice las opciones `/gfx` (por ejemplo, desact\u00edvelas con `/bpp:32` o `/rfx`, ya que est\u00e1n activadas de forma predeterminada)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32040",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-22T21:15:49.290",
|
||||
"lastModified": "2024-04-22T21:15:49.290",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:26.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 and have connections to servers using the `NSC` codec are vulnerable to integer underflow. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use the NSC codec (e.g. use `-nsc`)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "FreeRDP es una implementaci\u00f3n gratuita del protocolo de escritorio remoto. Los clientes basados en FreeRDP que utilizan una versi\u00f3n de FreeRDP anterior a la 3.5.0 o 2.11.6 y tienen conexiones a servidores que utilizan el c\u00f3dec `NSC` son vulnerables al desbordamiento de enteros. Las versiones 3.5.0 y 2.11.6 solucionan el problema. Como workaround, no utilice el c\u00f3dec NSC (por ejemplo, utilice `-nsc`)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32041",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-22T21:15:49.477",
|
||||
"lastModified": "2024-04-22T21:15:49.477",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:26.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, deactivate `/gfx` (on by default, set `/bpp` or `/rfx` options instead."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "FreeRDP es una implementaci\u00f3n gratuita del protocolo de escritorio remoto. Los clientes basados en FreeRDP que utilizan una versi\u00f3n de FreeRDP anterior a 3.5.0 o 2.11.6 son vulnerables a lecturas fuera de los l\u00edmites. Las versiones 3.5.0 y 2.11.6 solucionan el problema. Como workaround, desactive `/gfx` (activado de forma predeterminada, configure las opciones `/bpp` o `/rfx` en su lugar."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32238",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T20:15:07.630",
|
||||
"lastModified": "2024-04-22T20:15:07.630",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:30.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "H3C ER8300G2-X is vulnerable to Incorrect Access Control. The password for the router's management system can be accessed via the management system page login interface."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "H3C ER8300G2-X es vulnerable a un control de acceso incorrecto. Se puede acceder a la contrase\u00f1a del sistema de administraci\u00f3n del enrutador a trav\u00e9s de la interfaz de inicio de sesi\u00f3n de la p\u00e1gina del sistema de administraci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32394",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T21:15:49.657",
|
||||
"lastModified": "2024-04-22T21:15:49.657",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:26.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in ruijie.com/cn RG-RSR10-01G-T(WA)-S RSR_3.0(1)B9P2_RSR10-01G-TW-S_07150910 and RG-RSR10-01G-T(WA)-S RSR_3.0(1)B9P2_RSR10-01G-TW-S_07150910 allows a remote attacker to execute arbitrary code via a crafted HTTP request."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en ruijie.com/cn RG-RSR10-01G-T(WA)-S RSR_3.0(1)B9P2_RSR10-01G-TW-S_07150910 y RG-RSR10-01G-T(WA)-S RSR_3.0( 1) B9P2_RSR10-01G-TW-S_07150910 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud HTTP manipulada."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32399",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T20:15:07.683",
|
||||
"lastModified": "2024-04-22T20:15:07.683",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:30.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Directory Traversal vulnerability in RaidenMAILD Mail Server v.4.9.4 and before allows a remote attacker to obtain sensitive information via the /webeditor/ component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de Directory Traversal en RaidenMAILD Mail Server v.4.9.4 y anteriores permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente /webeditor/."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32405",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T20:15:07.737",
|
||||
"lastModified": "2024-04-22T20:15:07.737",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:26.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in inducer relate before v.2024.1 allows a remote attacker to escalate privileges via a crafted payload to the Answer field of InlineMultiQuestion parameter on Exam function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de Cross Site Scripting en Inducer Relate anterior a v.2024.1 permite a un atacante remoto escalar privilegios a trav\u00e9s de un payload manipulado al campo Respuesta del par\u00e1metro InlineMultiQuestion en la funci\u00f3n Examen."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32458",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-22T21:15:49.707",
|
||||
"lastModified": "2024-04-22T21:15:49.707",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:26.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use `/gfx` or `/rfx` modes (on by default, require server side support)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "FreeRDP es una implementaci\u00f3n gratuita del protocolo de escritorio remoto. Los clientes basados en FreeRDP que utilizan una versi\u00f3n de FreeRDP anterior a 3.5.0 o 2.11.6 son vulnerables a lecturas fuera de los l\u00edmites. Las versiones 3.5.0 y 2.11.6 solucionan el problema. Como workaround, utilice los modos `/gfx` o `/rfx` (activados de forma predeterminada, requieren soporte del lado del servidor)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32459",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-22T22:15:07.463",
|
||||
"lastModified": "2024-04-22T22:15:07.463",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:26.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients and servers that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. No known workarounds are available."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "FreeRDP es una implementaci\u00f3n gratuita del orotocolo de escritorio remoto. Los clientes y servidores basados en FreeRDP que utilizan una versi\u00f3n de FreeRDP anterior a 3.5.0 o 2.11.6 son vulnerables a lecturas fuera de los l\u00edmites. Las versiones 3.5.0 y 2.11.6 solucionan el problema. No hay workarounds disponibles."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32460",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-22T22:15:07.647",
|
||||
"lastModified": "2024-04-22T22:15:07.647",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:26.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based based clients using `/bpp:32` legacy `GDI` drawing path with a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use modern drawing paths (e.g. `/rfx` or `/gfx` options). The workaround requires server side support."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "FreeRDP es una implementaci\u00f3n gratuita del protocolo de escritorio remoto. Los clientes basados en FreeRDP que utilizan la ruta de dibujo `/bpp:32` heredada `GDI` con una versi\u00f3n de FreeRDP anterior a 3.5.0 o 2.11.6 son vulnerables a lecturas fuera de los l\u00edmites. Las versiones 3.5.0 y 2.11.6 solucionan el problema. Como workaround, utilice rutas de dibujo modernas (por ejemplo, las opciones `/rfx` o `/gfx`). El workaround requiere soporte del lado del servidor."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32461",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-22T22:15:07.840",
|
||||
"lastModified": "2024-04-22T22:15:07.840",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:26.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A SQL injection vulnerability in POST /search/search=packages in LibreNMS prior to version 24.4.0 allows a user with global read privileges to execute SQL commands via the package parameter. With this vulnerability, an attacker can exploit a SQL injection time based vulnerability to extract all data from the database, such as administrator credentials. Version 24.4.0 contains a patch for the vulnerability.\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "LibreNMS es un sistema de monitoreo de red de c\u00f3digo abierto basado en PHP/MySQL/SNMP. Una vulnerabilidad de inyecci\u00f3n SQL en POST /search/search=packages en LibreNMS anterior a la versi\u00f3n 24.4.0 permite a un usuario con privilegios de lectura global ejecutar comandos SQL a trav\u00e9s del par\u00e1metro del paquete. Con esta vulnerabilidad, un atacante puede aprovechar una vulnerabilidad basada en el tiempo de inyecci\u00f3n SQL para extraer todos los datos de la base de datos, como las credenciales de administrador. La versi\u00f3n 24.4.0 contiene un parche para la vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32479",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-22T22:15:08.027",
|
||||
"lastModified": "2024-04-22T22:15:08.027",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:26.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Prior to version 24.4.0, there is improper sanitization on the `Service` template name, which can lead to stored Cross-site Scripting. Version 24.4.0 fixes this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "LibreNMS es un sistema de monitoreo de red de c\u00f3digo abierto basado en PHP/MySQL/SNMP. Antes de la versi\u00f3n 24.4.0, hab\u00eda una sanitizaci\u00f3n inadecuada en el nombre de la plantilla \"Servicio\", lo que puede provocar que se almacenen Cross Site Scripting. La versi\u00f3n 24.4.0 corrige esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32480",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-22T23:15:50.440",
|
||||
"lastModified": "2024-04-22T23:15:50.440",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:26.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Versions prior to 24.4.0 are vulnerable to SQL injection. The `order` parameter is obtained from `$request`. After performing a string check, the value is directly incorporated into an SQL statement and concatenated, resulting in a SQL injection vulnerability. An attacker may extract a whole database this way. Version 24.4.0 fixes the issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "LibreNMS es un sistema de monitoreo de red de c\u00f3digo abierto basado en PHP/MySQL/SNMP. Las versiones anteriores a la 24.4.0 son vulnerables a la inyecci\u00f3n SQL. El par\u00e1metro `order` se obtiene de `$request`. Despu\u00e9s de realizar una verificaci\u00f3n de cadena, el valor se incorpora directamente a una declaraci\u00f3n SQL y se concatena, lo que genera una vulnerabilidad de inyecci\u00f3n SQL. Un atacante puede extraer una base de datos completa de esta manera. La versi\u00f3n 24.4.0 soluciona el problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32653",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-22T23:15:50.630",
|
||||
"lastModified": "2024-04-22T23:15:50.630",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:26.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "jadx is a Dex to Java decompiler. Prior to version 1.5.0, the package name is not filtered before concatenation. This can be exploited to inject arbitrary code into the package name. The vulnerability allows an attacker to execute commands with shell privileges. Version 1.5.0 contains a patch for the vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "jadx es un descompilador de Dex a Java. Antes de la versi\u00f3n 1.5.0, el nombre del paquete no se filtra antes de la concatenaci\u00f3n. Esto se puede aprovechar para inyectar c\u00f3digo arbitrario en el nombre del paquete. La vulnerabilidad permite a un atacante ejecutar comandos con privilegios de shell. La versi\u00f3n 1.5.0 contiene un parche para la vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32656",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-22T23:15:50.817",
|
||||
"lastModified": "2024-04-22T23:15:50.817",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:26.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Ant Media Server is live streaming engine software. A local privilege escalation vulnerability in present in versions 2.6.0 through 2.8.2 allows any unprivileged operating system user account to escalate privileges to the root user account on the system. This vulnerability arises from Ant Media Server running with Java Management Extensions (JMX) enabled and authentication disabled on localhost on port 5599/TCP. This vulnerability is nearly identical to the local privilege escalation vulnerability CVE-2023-26269 identified in Apache James. Any unprivileged operating system user can connect to the JMX service running on port 5599/TCP on localhost and leverage the MLet Bean within JMX to load a remote MBean from an attacker-controlled server. This allows an attacker to execute arbitrary code within the Java process run by Ant Media Server and execute code within the context of the `antmedia` service account on the system. Version 2.9.0 contains a patch for the issue. As a workaround, one may remove certain parameters from the `antmedia.service` file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Ant Media Server es un software de motor de transmisi\u00f3n en vivo. Una vulnerabilidad de escalada de privilegios local presente en las versiones 2.6.0 a 2.8.2 permite que cualquier cuenta de usuario del sistema operativo sin privilegios escale privilegios a la cuenta de usuario ra\u00edz del sistema. Esta vulnerabilidad surge cuando Ant Media Server se ejecuta con Java Management Extensions (JMX) habilitadas y la autenticaci\u00f3n deshabilitada en localhost en el puerto 5599/TCP. Esta vulnerabilidad es casi id\u00e9ntica a la vulnerabilidad de escalada de privilegios locales CVE-2023-26269 identificada en Apache James. Cualquier usuario de sistema operativo sin privilegios puede conectarse al servicio JMX que se ejecuta en el puerto 5599/TCP en localhost y aprovechar MLet Bean dentro de JMX para cargar un MBean remoto desde un servidor controlado por un atacante. Esto permite a un atacante ejecutar c\u00f3digo arbitrario dentro del proceso Java ejecutado por Ant Media Server y ejecutar c\u00f3digo dentro del contexto de la cuenta de servicio \"antmedia\" en el sistema. La versi\u00f3n 2.9.0 contiene un parche para el problema. Como workaround, se pueden eliminar ciertos par\u00e1metros del archivo `antmedia.service`."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32657",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-22T23:15:50.997",
|
||||
"lastModified": "2024-04-22T23:15:50.997",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:26.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Hydra is a Continuous Integration service for Nix based projects. Attackers can execute arbitrary code in the browser context of Hydra and execute authenticated HTTP requests. The abused feature allows Nix builds to specify files that Hydra serves to clients. One use of this functionality is serving NixOS `.iso` files. The issue is only with html files served by Hydra. The issue has been patched on https://hydra.nixos.org around 2024-04-21 14:30 UTC. The nixpkgs package were fixed in unstable and 23.11. Users with custom Hydra packages can apply the fix commit to their local installations. The vulnerability is only triggered when opening HTML build artifacts, so not opening them until the vulnerability is fixed works around the issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Hydra es un servicio de integraci\u00f3n continua para proyectos basados en Nix. Los atacantes pueden ejecutar c\u00f3digo arbitrario en el contexto del navegador de Hydra y ejecutar solicitudes HTTP autenticadas. La caracter\u00edstica abusada permite que las compilaciones de Nix especifiquen los archivos que Hydra entrega a los clientes. Un uso de esta funcionalidad es servir archivos `.iso` de NixOS. El problema es s\u00f3lo con los archivos html proporcionados por Hydra. El problema se solucion\u00f3 en https://hydra.nixos.org alrededor del 21 de abril de 2024 a las 14:30 UTC. El paquete nixpkgs se corrigi\u00f3 en inestable y 23.11. Los usuarios con paquetes Hydra personalizados pueden aplicar la confirmaci\u00f3n de correcci\u00f3n a sus instalaciones locales. La vulnerabilidad solo se activa al abrir artefactos de compilaci\u00f3n HTML, por lo que no abrirlos hasta que se solucione la vulnerabilidad soluciona el problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3293",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-23T02:15:48.390",
|
||||
"lastModified": "2024-04-23T02:15:48.390",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:26.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The rtMedia for WordPress, BuddyPress and bbPress plugin for WordPress is vulnerable to blind SQL Injection via the rtmedia_gallery shortcode in all versions up to, and including, 4.6.18 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento rtMedia para WordPress, BuddyPress y bbPress para WordPress es vulnerable a la inyecci\u00f3n SQL ciega a trav\u00e9s del c\u00f3digo corto rtmedia_gallery en todas las versiones hasta la 4.6.18 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3491",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-23T11:15:45.967",
|
||||
"lastModified": "2024-04-23T11:15:45.967",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:09.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3664",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-23T08:15:45.177",
|
||||
"lastModified": "2024-04-23T08:15:45.177",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:09.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Quick Featured Images plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the set_thumbnail and delete_thumbnail functions in all versions up to, and including, 13.7.0. This makes it possible for authenticated attackers, with contributor-level access and above, to delete thumbnails and add thumbnails to posts they did not author."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Quick Featured Images para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en las funciones set_thumbnail y delete_thumbnail en todas las versiones hasta la 13.7.0 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, eliminen miniaturas y agreguen miniaturas a publicaciones que no fueron de su autor\u00eda."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3665",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-23T10:15:06.923",
|
||||
"lastModified": "2024-04-23T10:15:06.923",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:09.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3732",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-23T10:15:07.537",
|
||||
"lastModified": "2024-04-23T10:15:07.537",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:09.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3889",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-23T06:15:07.700",
|
||||
"lastModified": "2024-04-23T06:15:07.700",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:09.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Advanced Accordion widget in all versions up to, and including, 1.3.971 due to insufficient input sanitization and output escaping on user supplied attributes like 'accordion_title_tag'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Royal Elementor Addons and Templates para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget Advanced Accordion del complemento en todas las versiones hasta la 1.3.971 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en atributos proporcionados por el usuario como 'accordion_title_tag '. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
55
CVE-2024/CVE-2024-39xx/CVE-2024-3911.json
Normal file
55
CVE-2024/CVE-2024-39xx/CVE-2024-3911.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-3911",
|
||||
"sourceIdentifier": "info@cert.vde.com",
|
||||
"published": "2024-04-23T13:15:46.770",
|
||||
"lastModified": "2024-04-23T13:15:46.770",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthenticated remote attacker can\u00a0deceive users into performing unintended actions due to improper restriction of rendered UI layers or frames.\u00a0\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "info@cert.vde.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "info@cert.vde.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1021"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert.vde.com/en/advisories/VDE-2024-023",
|
||||
"source": "info@cert.vde.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4031",
|
||||
"sourceIdentifier": "cve-coordination@logitech.com",
|
||||
"published": "2024-04-23T07:15:43.087",
|
||||
"lastModified": "2024-04-23T07:15:43.087",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:09.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unquoted Search Path or Element vulnerability in Logitech MEVO WEBCAM APP on Windows allows Local Execution of Code."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de elemento o ruta de b\u00fasqueda sin comillas en la aplicaci\u00f3n Logitech MEVO WEBCAM en Windows permite la ejecuci\u00f3n local de c\u00f3digo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4040",
|
||||
"sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
|
||||
"published": "2024-04-22T20:15:07.803",
|
||||
"lastModified": "2024-04-22T21:15:49.890",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-23T12:52:26.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "VFS Sandbox Escape in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "VFS Sandbox Escape en CrushFTP en todas las versiones anteriores a 10.7.1 y 11.1.0 en todas las plataformas permite a atacantes remotos con privilegios bajos leer archivos del sistema de archivos fuera de VFS Sandbox."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
43
README.md
43
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-23T12:00:37.979443+00:00
|
||||
2024-04-23T14:00:38.816345+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-23T11:15:45.967000+00:00
|
||||
2024-04-23T13:15:46.770000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,23 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
246540
|
||||
246544
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2024-3491](CVE-2024/CVE-2024-34xx/CVE-2024-3491.json) (`2024-04-23T11:15:45.967`)
|
||||
- [CVE-2024-3665](CVE-2024/CVE-2024-36xx/CVE-2024-3665.json) (`2024-04-23T10:15:06.923`)
|
||||
- [CVE-2024-3732](CVE-2024/CVE-2024-37xx/CVE-2024-3732.json) (`2024-04-23T10:15:07.537`)
|
||||
- [CVE-2023-47731](CVE-2023/CVE-2023-477xx/CVE-2023-47731.json) (`2024-04-23T13:15:46.343`)
|
||||
- [CVE-2024-26922](CVE-2024/CVE-2024-269xx/CVE-2024-26922.json) (`2024-04-23T13:15:46.643`)
|
||||
- [CVE-2024-30800](CVE-2024/CVE-2024-308xx/CVE-2024-30800.json) (`2024-04-23T13:15:46.700`)
|
||||
- [CVE-2024-3911](CVE-2024/CVE-2024-39xx/CVE-2024-3911.json) (`2024-04-23T13:15:46.770`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `42`
|
||||
|
||||
- [CVE-2024-3185](CVE-2024/CVE-2024-31xx/CVE-2024-3185.json) (`2024-04-23T09:15:07.023`)
|
||||
- [CVE-2024-31857](CVE-2024/CVE-2024-318xx/CVE-2024-31857.json) (`2024-04-23T12:52:09.397`)
|
||||
- [CVE-2024-32039](CVE-2024/CVE-2024-320xx/CVE-2024-32039.json) (`2024-04-23T12:52:26.253`)
|
||||
- [CVE-2024-32040](CVE-2024/CVE-2024-320xx/CVE-2024-32040.json) (`2024-04-23T12:52:26.253`)
|
||||
- [CVE-2024-32041](CVE-2024/CVE-2024-320xx/CVE-2024-32041.json) (`2024-04-23T12:52:26.253`)
|
||||
- [CVE-2024-32238](CVE-2024/CVE-2024-322xx/CVE-2024-32238.json) (`2024-04-23T12:52:30.940`)
|
||||
- [CVE-2024-32394](CVE-2024/CVE-2024-323xx/CVE-2024-32394.json) (`2024-04-23T12:52:26.253`)
|
||||
- [CVE-2024-32399](CVE-2024/CVE-2024-323xx/CVE-2024-32399.json) (`2024-04-23T12:52:30.940`)
|
||||
- [CVE-2024-32405](CVE-2024/CVE-2024-324xx/CVE-2024-32405.json) (`2024-04-23T12:52:26.253`)
|
||||
- [CVE-2024-32458](CVE-2024/CVE-2024-324xx/CVE-2024-32458.json) (`2024-04-23T12:52:26.253`)
|
||||
- [CVE-2024-32459](CVE-2024/CVE-2024-324xx/CVE-2024-32459.json) (`2024-04-23T12:52:26.253`)
|
||||
- [CVE-2024-32460](CVE-2024/CVE-2024-324xx/CVE-2024-32460.json) (`2024-04-23T12:52:26.253`)
|
||||
- [CVE-2024-32461](CVE-2024/CVE-2024-324xx/CVE-2024-32461.json) (`2024-04-23T12:52:26.253`)
|
||||
- [CVE-2024-32479](CVE-2024/CVE-2024-324xx/CVE-2024-32479.json) (`2024-04-23T12:52:26.253`)
|
||||
- [CVE-2024-32480](CVE-2024/CVE-2024-324xx/CVE-2024-32480.json) (`2024-04-23T12:52:26.253`)
|
||||
- [CVE-2024-32653](CVE-2024/CVE-2024-326xx/CVE-2024-32653.json) (`2024-04-23T12:52:26.253`)
|
||||
- [CVE-2024-32656](CVE-2024/CVE-2024-326xx/CVE-2024-32656.json) (`2024-04-23T12:52:26.253`)
|
||||
- [CVE-2024-32657](CVE-2024/CVE-2024-326xx/CVE-2024-32657.json) (`2024-04-23T12:52:26.253`)
|
||||
- [CVE-2024-3293](CVE-2024/CVE-2024-32xx/CVE-2024-3293.json) (`2024-04-23T12:52:26.253`)
|
||||
- [CVE-2024-3491](CVE-2024/CVE-2024-34xx/CVE-2024-3491.json) (`2024-04-23T12:52:09.397`)
|
||||
- [CVE-2024-3664](CVE-2024/CVE-2024-36xx/CVE-2024-3664.json) (`2024-04-23T12:52:09.397`)
|
||||
- [CVE-2024-3665](CVE-2024/CVE-2024-36xx/CVE-2024-3665.json) (`2024-04-23T12:52:09.397`)
|
||||
- [CVE-2024-3732](CVE-2024/CVE-2024-37xx/CVE-2024-3732.json) (`2024-04-23T12:52:09.397`)
|
||||
- [CVE-2024-3889](CVE-2024/CVE-2024-38xx/CVE-2024-3889.json) (`2024-04-23T12:52:09.397`)
|
||||
- [CVE-2024-4031](CVE-2024/CVE-2024-40xx/CVE-2024-4031.json) (`2024-04-23T12:52:09.397`)
|
||||
- [CVE-2024-4040](CVE-2024/CVE-2024-40xx/CVE-2024-4040.json) (`2024-04-23T12:52:26.253`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
88
_state.csv
88
_state.csv
@ -233555,6 +233555,7 @@ CVE-2023-47718,0,0,c741441681738efc3979d67da4409868f353d29cc92314f5037f92d080930
|
||||
CVE-2023-4772,0,0,2771ff64adbe1ba6f7dfdd5d8e8af50d5674985cd4bd14f9ff6d841da9878bd5,2023-11-07T04:22:57.827000
|
||||
CVE-2023-47722,0,0,5f2ccb67ee0472008868026b0561431d013bb25eb62913fd40686172191b4bbe,2023-12-12T21:04:18.177000
|
||||
CVE-2023-4773,0,0,46809a7c239cdb033db621dca5a458d470c07362dae46adc2ff34854ee8e494c,2023-11-07T04:22:57.903000
|
||||
CVE-2023-47731,1,1,89987d51737196570bc03d907f705c55494118e0ad765e66305a171fcd3e9341,2024-04-23T13:15:46.343000
|
||||
CVE-2023-4774,0,0,35ac46a4fdf0cf52bb3ea874efbb49ea5abac6c41f64de60f5743bc6ef3ffb58,2023-11-07T04:22:58.080000
|
||||
CVE-2023-47741,0,0,bc210f1d0d5dc855129de9cb9f7b0cec12b64c4591e6a3d888b1fc1b1b8d7ef9,2023-12-22T18:40:58.353000
|
||||
CVE-2023-47742,0,0,7ffaa6b11d646a28b2360a23ac04f2e6f6782e58ebd6f8361fb596b3069e8084,2024-03-04T13:58:23.447000
|
||||
@ -233749,8 +233750,8 @@ CVE-2023-4817,0,0,1a2b9af52c66a7fd99bf64763147c554fc82c52e367b85809793ea9592305b
|
||||
CVE-2023-48172,0,0,5a469e0274433a0ae0c832bd74c7fde63212f4ba8f5394a1cc6402ed0325e021,2023-12-09T04:46:27.490000
|
||||
CVE-2023-48176,0,0,c3abf7182d832669fb665b5e3a6edfc409b19c925d485b0863dc39013424ec2e,2023-11-30T20:21:54.850000
|
||||
CVE-2023-4818,0,0,9954c56b59d69f6380bac719b5f55b5ab2a4f6102bd5dc276878f93883a125b9,2024-01-19T16:35:49.683000
|
||||
CVE-2023-48183,0,0,129011b1c54672e489d23f39a90ae4ba5175bfed0b6176dfe3d293e12354c067,2024-04-23T07:15:42.730000
|
||||
CVE-2023-48184,0,0,fb24325ab525ea5b866e249e02a921e31a1d53a17285bd408c822e48751546ec,2024-04-23T07:15:42.840000
|
||||
CVE-2023-48183,0,1,374fef2d154279a8b351befbca3ad5116cc95f0c1cc7011c511ba962c5439277,2024-04-23T12:52:09.397000
|
||||
CVE-2023-48184,0,1,899caf45ae8acd3a7cda77d5b27c17e70ad3d79c87aaa9397538df7a4162100f,2024-04-23T12:52:09.397000
|
||||
CVE-2023-48185,0,0,7ef7d220f1c753558def21f6a3c05b2c9063a72adb28cbfed77d5f1a672c1649,2023-12-02T00:21:40.093000
|
||||
CVE-2023-48188,0,0,215b3c362c06f3f67c5f56adafe9b5433496acde9c1298c239fef4711454e212,2023-12-01T04:00:46.523000
|
||||
CVE-2023-4819,0,0,486c1da204e823d4e3904d929a1e95095c2adfb2e9e8d41b10f2b239f97150b3,2023-11-07T04:23:00.223000
|
||||
@ -237968,7 +237969,7 @@ CVE-2023-6828,0,0,5f4e621a26f675509a21b4e2930f2bceb4ddb7b7fd69c98ea769a7d538bb63
|
||||
CVE-2023-6830,0,0,60b860cb37e3725679c9ff0121ff0e6caf0b54eddc8c5cabcf4f47e5b13450f0,2024-01-16T17:05:57.137000
|
||||
CVE-2023-6831,0,0,d22e6a14a06b817ad1b5878c79aa0e8f40346efc1343acf6730c9b95393b85fd,2024-02-13T22:15:45.633000
|
||||
CVE-2023-6832,0,0,7ed4386fd24d6856af93f562dba88714828752ac6cbbdbbcaac4e0117f874808,2023-12-21T14:47:05.363000
|
||||
CVE-2023-6833,0,0,8dd81fdfebaeba5cb094b7629bba5227a50c280e14740a7c3fa16e2c0c9f497d,2024-04-23T06:15:06.340000
|
||||
CVE-2023-6833,0,1,e8ecb391ae212456444625d2511eded607be00d8aba692b2421c94e9bb9e82df,2024-04-23T12:52:09.397000
|
||||
CVE-2023-6835,0,0,f8b6623f61d013928a6105a1c7550b3d8ff8a3e89ec2373802121baf8a7a7762,2023-12-28T20:19:11.697000
|
||||
CVE-2023-6836,0,0,587b66ab7f5df7562168af9bbc63d21bd8d42ab304ba7eedd5a7c992f41b8088,2023-12-19T13:52:56.807000
|
||||
CVE-2023-6837,0,0,fb15ab3396d120dc166f6807c27288be0cf7a164ade223cfab481073d4070ca9,2024-01-05T19:56:39.097000
|
||||
@ -239024,7 +239025,7 @@ CVE-2024-0896,0,0,5348557c7ea4ddb4fdb7fdcc9e92238aad12e82aa66cf5c51f44520b0ef95a
|
||||
CVE-2024-0897,0,0,54d1bf8163931c80ebde85ab8390c0fecedb390a8355fe15103e3a67a3a29cc9,2024-03-13T18:16:18.563000
|
||||
CVE-2024-0898,0,0,8e1a15f2adb6e1251c3b5c487bb49c70d962e45988b99a32b53b9adb0687df3d,2024-03-13T18:16:18.563000
|
||||
CVE-2024-0899,0,0,7d5a1ea0e11c81ea4fdf5cc7256f52b0decb0abb96aea80029ec1a81b2559961,2024-04-10T13:24:00.070000
|
||||
CVE-2024-0900,0,0,cb433b60adbb648204fa5444a3f480cde06c8792b31caf9d9f1d858e75ae26d9,2024-04-23T09:15:06.833000
|
||||
CVE-2024-0900,0,1,0df16b48e073462cef0a451a68261119942789edbcc049ef43c079272fea0ea9,2024-04-23T12:52:09.397000
|
||||
CVE-2024-0901,0,0,8395d055c39a2ded7a6676d9f91e364a6c601b11f066a458c7ff4909044d580a,2024-03-26T12:55:05.010000
|
||||
CVE-2024-0902,0,0,c022af4b73cd366b52a576af13eecfefbd72fc877962e0376aba015f72537ab5,2024-04-15T13:15:31.997000
|
||||
CVE-2024-0903,0,0,4e5a944405938a6def0adf008001af709d311e38e0572265081d65abf85ff9fb,2024-02-22T19:07:27.197000
|
||||
@ -239316,7 +239317,7 @@ CVE-2024-1236,0,0,88f351cdece6c13383e2ef64090741dd27c149d6d5fc4eae9681e06c5b4747
|
||||
CVE-2024-1237,0,0,69ceb9351727cdff4ae84eff7cbe42d0ab784516d20cfa01c677677192dd4b80,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1238,0,0,519bc4d0e22e37477a7bba0c3527a633c9daaf81790c98dc65378f4451d4a7cb,2024-04-01T01:12:59.077000
|
||||
CVE-2024-1239,0,0,79b2087d3168ea3b3ddb25eae5afcee4c807d21abf2847eb51305ac385c39cbe,2024-03-17T22:38:29.433000
|
||||
CVE-2024-1241,0,0,0026865a830ad029c61d9ace01d8c9f64e0f198ae99f29a16832a3d722b33ee0,2024-04-23T04:15:08.357000
|
||||
CVE-2024-1241,0,1,7f642b52864fd35425cf85677ae6d83516031e7124364cddcdda87b3eeba2984,2024-04-23T12:52:09.397000
|
||||
CVE-2024-1242,0,0,ab4609d5893ed1ea66780779f1561665f88460dbdd62166f0432c338817451ed,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1245,0,0,2e59378dab8a209b430a7bdf5dfa1ad37455bcba638f93f331bd6727be23a3f7,2024-02-15T04:44:27.987000
|
||||
CVE-2024-1246,0,0,668589ae819ff5835ff63858d61771ccdb54522dbf26239874e373ac001fe82c,2024-02-15T04:44:35.470000
|
||||
@ -240676,7 +240677,7 @@ CVE-2024-21507,0,0,b27f6d75429acab2680ad1c4eafae6068e12dceeaf532d34c061e24473a2d
|
||||
CVE-2024-21508,0,0,cd586a09fe54df7c696f2b333fd5accf6715d2f6a2387d472b5f305a62739372,2024-04-11T12:47:44.137000
|
||||
CVE-2024-21509,0,0,b1840eaff4c2213087c96721aaf87fdc6158bea90de6f63bdc95977af5681b08,2024-04-10T13:23:38.787000
|
||||
CVE-2024-2151,0,0,1984075479a813303a33fbf40ee9d084e33ab05911d0014a1aff56e74a532cd4,2024-04-11T01:25:19.060000
|
||||
CVE-2024-21511,0,0,89b63877d043d4c3dfac2e169c5e62ecb21af8e06db8dbfbe8857fe11eb023f3,2024-04-23T05:15:48.963000
|
||||
CVE-2024-21511,0,1,d034a9f6c4dcc55a5c4fdcdd7e3a31e0606abc8a26dae5773e22f734aa49e036,2024-04-23T12:52:09.397000
|
||||
CVE-2024-2152,0,0,d88c805e31f2469ea62a2f070cd3165046fcadf7379eeee508317e4c8341dd17,2024-04-11T01:25:19.140000
|
||||
CVE-2024-2153,0,0,5a75e22f63315456f3ebc78cfda206253cd84838795a10d092092a6057d48f7b,2024-04-11T01:25:19.217000
|
||||
CVE-2024-2154,0,0,e92421c8f1816c3c47b366ed659476814adc73f98704550d7856f4f06883affa,2024-04-11T01:25:19.300000
|
||||
@ -242405,7 +242406,7 @@ CVE-2024-24926,0,0,85370a4bba915c1c0a13743f2e9c9f2fe0c41f39fe0825744152646b71e97
|
||||
CVE-2024-24927,0,0,98cdaf1a350e38617e814138381d6395355353f08efaf652523d3ef2353525e2,2024-02-16T13:41:18.167000
|
||||
CVE-2024-24928,0,0,f27dd8933b3e0c04c71f94b7ba6e4efe2cc65b2a36497881a1a86b654ddd9d9b,2024-02-16T13:41:04.027000
|
||||
CVE-2024-24929,0,0,86fd02089d6dd5db2285320055e05295225cbf800517773fc03a0bfca1a6cc16,2024-02-12T14:19:54.330000
|
||||
CVE-2024-2493,0,0,1abd3ff3230694a89cd1ef734cc4224a1c64377f8633ce3dc3b6afb803a8477a,2024-04-23T06:15:06.797000
|
||||
CVE-2024-2493,0,1,e606c23056a16cbd8d6eac9ce477fd3e041c258777c92546def600782512e2bc,2024-04-23T12:52:09.397000
|
||||
CVE-2024-24930,0,0,fcd1d34f13943d1262f56fac388a51cc622b565da8178878c89844bdd4fe9a8a,2024-02-16T21:33:40.590000
|
||||
CVE-2024-24931,0,0,78eddbcbbbfa8c6976ef00426867f55edd6e7bf66e82c01969653d70a2e2ef2e,2024-02-16T21:33:29.340000
|
||||
CVE-2024-24932,0,0,b2f44460390b42f56a628f2eb2dc294afc8ce430fc863f2d6f9f1973cdcede3b,2024-02-16T21:35:59.587000
|
||||
@ -243666,6 +243667,7 @@ CVE-2024-26919,0,0,8ce229e6f304423499a3d2dbc331713eb1fbfa99e3cc0b71da0db8b8b65f0
|
||||
CVE-2024-2692,0,0,aefc05ddca23ffc90de039367cc7fed9a06f50bd32c460cfe2bbf1c8645c8f06,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26920,0,0,8ad9dc4497d0ab325621ba9253d9bafe6f0648f6e0dcc53db528add7b30825c1,2024-04-17T16:51:07.347000
|
||||
CVE-2024-26921,0,0,76d623900726b55efb66263c05dcf2e665a9ce9fb4f9ecc19bf3b35e90cf98c7,2024-04-18T13:04:28.900000
|
||||
CVE-2024-26922,1,1,e46cde7562a4d5471cdbee8c3c8c5b6be2ee86f4e9fc22b84ea50e2337f7739f,2024-04-23T13:15:46.643000
|
||||
CVE-2024-2693,0,0,0523f248585c70810eb494560526f8a16efe419cf7f3014aa23838648b0d3e89,2024-04-10T13:23:38.787000
|
||||
CVE-2024-2700,0,0,ec51b942504a96d4888f64f81c70906fd44973b0d1ace8e2f862241f82ce29e0,2024-04-17T20:15:08.240000
|
||||
CVE-2024-2702,0,0,d714950951d2438da53d97b453b8470335efdb106b4a3aaafe4c816e98d263df,2024-03-20T13:00:16.367000
|
||||
@ -243897,12 +243899,12 @@ CVE-2024-27569,0,0,000ff88e8ff4678a3790d0ee96674581a9a53afd1b5f0d49033b717c5dd65
|
||||
CVE-2024-27570,0,0,30e1bdadd931878127199d0565523cd94923921178695ba62d569ae38e48386b,2024-03-01T15:23:36.177000
|
||||
CVE-2024-27571,0,0,2fcce61cb867ec2a650e4bd74e7018e990625a473882c12953648f5c8c2545b3,2024-03-01T15:23:36.177000
|
||||
CVE-2024-27572,0,0,6169a6a6221da5c6dbb1556f7b45e6b45c4deebae5e21607b1e3cfa478f1fe5b,2024-03-01T15:23:36.177000
|
||||
CVE-2024-27574,0,0,bcc5eeca8a1b5f671cf3af5d812b47b420b66573be9babdf35ec56e12529b804,2024-04-22T21:15:48.987000
|
||||
CVE-2024-27574,0,1,8e35363a297bb354ed77e854cc086ede00fd9f4b0bf134e0bf41d2ca17f3da6f,2024-04-23T12:52:26.253000
|
||||
CVE-2024-27575,0,0,fe78cdbfc48ba2557faf61957a122c11738e27bfad3d91860b0cc50d57150a36,2024-04-07T04:15:07.723000
|
||||
CVE-2024-2758,0,0,a3cb437eedb439caebfac4666310f05bccf69de779d818f9f315740c92bee7d8,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2759,0,0,cb410b99122b16bbafd55e196fc83701c95bae09fba9353767401f5fe587c56c,2024-04-04T16:33:06.610000
|
||||
CVE-2024-27592,0,0,1ee880de3a9d61f4b25b2b3ac56dc03f1e8964452682bc0959dc8a13f2b2c67c,2024-04-16T23:15:08.690000
|
||||
CVE-2024-2760,0,0,08c1f34ef20ee3fccdabe30058675227fd892a51408a4d79c262955a8c8bf562,2024-04-23T04:15:08.717000
|
||||
CVE-2024-2760,0,1,a061be605bfdf89df12f7caacd6b7263c7034257ee7260474dff7d3e633c6b9d,2024-04-23T12:52:09.397000
|
||||
CVE-2024-27602,0,0,641d004f193cbc187bf560868353a5607871444565457a2a1f222c57bafe0082,2024-04-03T12:38:04.840000
|
||||
CVE-2024-27604,0,0,5dd90a20288c95f7805059ddcbf501c6de9e3b933a16f752b43bf101ed5f2058,2024-04-03T12:38:04.840000
|
||||
CVE-2024-27605,0,0,4f744199930e3e7e9b7f220c4e73a81bb4fe207bf4ecc2f618ea8f6d8437d165,2024-04-03T12:38:04.840000
|
||||
@ -244060,7 +244062,7 @@ CVE-2024-27975,0,0,5e723b988881d768c48479414306df95a821f21a86f27f09cadd1c6d52236
|
||||
CVE-2024-27976,0,0,f3b1e833dad783111ddd8bfbbe0149eef66e07b7a8072b5581df7564368c462e,2024-04-19T13:10:25.637000
|
||||
CVE-2024-27977,0,0,79115d830f48a29f88dcdaaca48ae6ee1fb6d0fb09d17cc8101a8fadff78d08c,2024-04-19T13:10:25.637000
|
||||
CVE-2024-27978,0,0,e9674be0e16d316b4e2f9c28404921788d0b6676687576369bca16c3012670cc,2024-04-19T13:10:25.637000
|
||||
CVE-2024-2798,0,0,21e436f667c3c76cb5f2c07c9f81ccea19a79dd780b17ce51d0666b51470d984,2024-04-23T06:15:07.143000
|
||||
CVE-2024-2798,0,1,ef363290583ea8fbea084f3f83308db5f7af67c2905e490208724743ab38649d,2024-04-23T12:52:09.397000
|
||||
CVE-2024-27981,0,0,bca4d502eb0003b495c2e3eabf4c8b77f995ffb842787b13a54996fb18ec7ff9,2024-04-05T12:40:52.763000
|
||||
CVE-2024-27983,0,0,48b00542bfe0407141490fb6286509a0a18be683ecd066fca326b2c27e57f8c3,2024-04-20T02:15:06.660000
|
||||
CVE-2024-27984,0,0,ee279ea71cab569d834a91520f5be7e4eb6eb4d684563974daf49b55af180ddb,2024-04-19T13:10:25.637000
|
||||
@ -244069,7 +244071,7 @@ CVE-2024-27986,0,0,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d0260198
|
||||
CVE-2024-27987,0,0,457341cfe208a4dd4f1ca3a12fe23df96b337000dbd585aed58689be29e5bec4,2024-03-15T12:53:06.423000
|
||||
CVE-2024-27988,0,0,6c9106d9d93540022c2645bd4805400b787b700ca5be437ad0fb1c8ff1ee9be2,2024-04-11T12:47:44.137000
|
||||
CVE-2024-27989,0,0,b74d1fab0316c439670e13d6ca0bb34eb2d1548d6234fefc31480e33b2f7df2d,2024-04-11T12:47:44.137000
|
||||
CVE-2024-2799,0,0,bfc0b11d3665998e42f5e165818294484e3b2a4809bfd417d40cf64581b6d74c,2024-04-23T06:15:07.417000
|
||||
CVE-2024-2799,0,1,9db541a4a294db65d198468a4160524d1cc3b2cab37a5bd2e04ce13a063dd4d8,2024-04-23T12:52:09.397000
|
||||
CVE-2024-27990,0,0,df25e8dbaefe3a11a25da19c2008c6b4ec9f7383734455218851ceae8f43e308,2024-04-11T12:47:44.137000
|
||||
CVE-2024-27991,0,0,36f883d0dbe2d030fe1b02c54d7115774c5d98e58b51c740fdf9f85a9e38a2e6,2024-04-11T12:47:44.137000
|
||||
CVE-2024-27992,0,0,4c4ec466b544e71b7536bee00d1d61b3e4a0ad3df5ab4cd688e5c81388056454,2024-04-11T12:47:44.137000
|
||||
@ -244464,7 +244466,7 @@ CVE-2024-28871,0,0,afc28d49a83d8eabefecf413603caf0043f414fa513c9500837e2c75462e6
|
||||
CVE-2024-28878,0,0,fe5b4dea6079affbe530b6afc0ec6cbc2c58efa98e54aaf61e9565b0ce4541ce,2024-04-15T13:15:51.577000
|
||||
CVE-2024-2888,0,0,e48cc71bf8d96ab718c88bf59dd81f25047204b13c0446dd48014e6c60fc42d9,2024-03-26T12:55:05.010000
|
||||
CVE-2024-2889,0,0,047900621574a9797901d8767443e859750a2765d7b4c1f50c805ec45928b2d3,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28890,0,0,522af5a98fb8ca91d8b44d26fb136ad7ffffeb796e0f0844ff2f140d7220b937,2024-04-23T05:15:49.260000
|
||||
CVE-2024-28890,0,1,9dae4a32452d4c238c84193167d3f8528617bb8ee93882e0c116e3ba82982853,2024-04-23T12:52:09.397000
|
||||
CVE-2024-28891,0,0,d3e45bd47b45b967827b685dc5aca79c502a599b4c4b2ae06f1259844016862c,2024-03-22T12:45:36.130000
|
||||
CVE-2024-28894,0,0,139b37292842325266e36fcf501a8211453c4135dbf7a79b4d495c356e7cd07a,2024-04-15T13:15:31.997000
|
||||
CVE-2024-28895,0,0,e719d13135e97e941113ab974fe7dd84c43c28aacb52b0a20894b149f6e995bb,2024-04-01T01:33:21.910000
|
||||
@ -244725,7 +244727,7 @@ CVE-2024-2934,0,0,0a91524619de13afaff0e82d7a21ecc81f28b80f897e74dbcf5f2c4795f84a
|
||||
CVE-2024-2935,0,0,03b2e13118238c25a371886663ff5ca99f3babe087c5e23aed7873fb02fb806f,2024-04-11T01:25:41.850000
|
||||
CVE-2024-2936,0,0,939d0b63a99773a9af28992aa96fda3d6af92afdee01445b26fbf5b1e7eb245c,2024-03-29T12:45:02.937000
|
||||
CVE-2024-29366,0,0,7401048215b84763b7b2374bbab17e21709c21accf205850b7210511d30d6293,2024-03-22T19:02:10.300000
|
||||
CVE-2024-29368,0,0,b2fb1a5d45a101f827338a5ca2925b1e6be000e87c6951b2c0bef7990fa345fc,2024-04-22T21:15:49.043000
|
||||
CVE-2024-29368,0,1,ebfc1e19b0921e6b3ba960ec37fbdf00205266214a9fd474b282643da9277c74,2024-04-23T12:52:26.253000
|
||||
CVE-2024-29374,0,0,dd275404ab360479a756d96aca2b6517b11bd3239b0ee4b1b68a18e9bbec3822,2024-03-21T19:47:03.943000
|
||||
CVE-2024-29375,0,0,61c42a83ac8fdf63093e9fa8c57bcfe142ca6a7e368bf61cc8c311f84268ba4d,2024-04-04T12:48:41.700000
|
||||
CVE-2024-29376,0,0,396d2086661367bf2f120a5a23cedf0a6063f8b47eb6959047bd018cf7f6b2b3,2024-04-22T19:24:06.727000
|
||||
@ -245452,6 +245454,7 @@ CVE-2024-30737,0,0,1c036a16278ee8ea2e333e89f0d66457a587f7e2e9da86fd57591a8972289
|
||||
CVE-2024-3077,0,0,df42d4a62ceb1c6a6275b9b1d36ac8da42c0ae3505d0e07beac8238605b5504b,2024-03-29T12:45:02.937000
|
||||
CVE-2024-3078,0,0,de9e294582cbb558bf2417239a323549d99f034f1b581828b43e34b1ad1f5683,2024-04-11T01:25:52.940000
|
||||
CVE-2024-30799,0,0,eae5bca102ad0c1fe3f236f7e51af89eca892740403953a6086f43b81ad7d92b,2024-04-22T13:28:43.747000
|
||||
CVE-2024-30800,1,1,017770c8d8dc17c7d67d8fc770f953349d662c5623fd132d5a66e83de6189441,2024-04-23T13:15:46.700000
|
||||
CVE-2024-30806,0,0,3c4bbd71defb52c4de24f9ad1626459edef6b60997b976e6d74aead4ee0b3b0f,2024-04-02T20:31:58.463000
|
||||
CVE-2024-30807,0,0,8463e04fd42dedab289dad3fe1621f8f66d69fb63942da8a4e7f4baade23226e,2024-04-02T20:31:58.463000
|
||||
CVE-2024-30808,0,0,3edb296009dfb16a5061a2505986b3903e36250320b7a7a1ea6af0d775f588e5,2024-04-02T20:31:58.463000
|
||||
@ -245545,7 +245548,7 @@ CVE-2024-31025,0,0,049c3aee715c9c75f255eea2ba7d71aee620ad97e93ef3b0e0a948ae51dd0
|
||||
CVE-2024-31031,0,0,29fa87d48aad0a0bc20057b1b9ecb42c0a06bf12b16eb69819fa3b6a4f2669e1,2024-04-17T20:08:21.887000
|
||||
CVE-2024-31032,0,0,71dbb2a787f73b1914bf5d51e1b83b5365eb112b3ab9ed4df5d1066682b5223b,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31033,0,0,200340e7b08fbb0d6701818d4b83bef89c21119b7d9fe7f5be450bb2b1edb614,2024-04-11T01:25:48.953000
|
||||
CVE-2024-31036,0,0,59affa21405d25f7d7f4aaa77f6b92475c58d92809aadc797bc272693561d4c1,2024-04-22T22:15:07.400000
|
||||
CVE-2024-31036,0,1,909c6e2eb879d6c5010d6c5c1d0b605640db140d047e5e64355a95d48cb1e70f,2024-04-23T12:52:26.253000
|
||||
CVE-2024-31040,0,0,58d694e98ef6e322b940345b4415e080b141132f654a38c35a41dac24f1e6dc0,2024-04-17T20:08:21.887000
|
||||
CVE-2024-31041,0,0,55cb17ccb9a4ccc47749a0a1f025025c536447c530ceaeb2d7f75919ad09c350,2024-04-17T20:08:21.887000
|
||||
CVE-2024-31047,0,0,ed6b998d2efbbc258ad744f538162378aa1b702ac5e17462e2e5f42d9945fb08,2024-04-09T12:48:04.090000
|
||||
@ -245555,7 +245558,7 @@ CVE-2024-31063,0,0,8c5e031664c3b218697e91183f663111a47f52e7fd5496cafc4f238d7a0c4
|
||||
CVE-2024-31064,0,0,f87fea954d6623f92ad98dc571744769b0a41ba2a8ecac509cf34a5bc1aaafc6,2024-03-28T20:53:20.813000
|
||||
CVE-2024-31065,0,0,36c2c4ddfef551b3df9316a574430562ba7ec0ea51f9e5ecbfa0af993c7946d3,2024-03-28T20:53:20.813000
|
||||
CVE-2024-31069,0,0,d29f1e01bd410bc9e289e23142033a3c4695bcaf7cee5af8670edc7046e0bf75,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31077,0,0,5e70a5b93565325c41d3654d0d9da55f442014552ad5996917e7bf0ff0b812f1,2024-04-23T05:15:49.323000
|
||||
CVE-2024-31077,0,1,cf1dae6bdc673263e7fd88f3fafa76996295a3cc4f001c878e21a09e0714f3a7,2024-04-23T12:52:09.397000
|
||||
CVE-2024-31080,0,0,e119d7df475aacadb30c21c56f7423850172683be264bf07be811aba439e59e4,2024-04-19T23:15:11.210000
|
||||
CVE-2024-31081,0,0,325d39ddb700558fd97dc406aa6a705450eef92b871ed7f9ac57a8809deb6a92,2024-04-19T23:15:11.290000
|
||||
CVE-2024-31082,0,0,5bd47d789b65017aa198a3c2ac34b0aa429ab490a4fcd5200779dbcd7d5b3ef9,2024-04-04T16:33:06.610000
|
||||
@ -245819,7 +245822,7 @@ CVE-2024-31745,0,0,ca5ec1c092fce054af70d410aee2649145d7a18036901e509dca6c0e74718
|
||||
CVE-2024-31750,0,0,ef2fe441e5dcedf0cb2da823df8fe57e9b7ada67d4a5ac9a3c649524c0ed2fa2,2024-04-19T13:10:25.637000
|
||||
CVE-2024-31759,0,0,7081cd22df5b9e4148ecc914176fc1f6cc04366073f8b1e4eccd8dfe4f2b7d73,2024-04-17T12:48:07.510000
|
||||
CVE-2024-31760,0,0,7b1e0b53a94a63e7f108110799c5f85524efc23136fc5608e680b8482e690959,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3177,0,0,4188435cf2eb3b06c526aa46bc19d8a49354941ecbdc9288f83e4d38423ff0a7,2024-04-22T23:15:51.180000
|
||||
CVE-2024-3177,0,1,0ec6cd116e7d510a9fccbf5b405a9ca182489a9307c7005a7220e6a302563bc9,2024-04-23T12:52:26.253000
|
||||
CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818bf,2024-04-04T12:48:41.700000
|
||||
CVE-2024-31783,0,0,39c4df7f07fa9e66dc5d42dd16bc0981c0d6511a0c96852796a6de0ccb03c2ac,2024-04-16T13:24:07.103000
|
||||
CVE-2024-31784,0,0,0055eda0e2e2e3cebbac3d895c086f3674073feab99e847bee4ca99f9495a801,2024-04-16T13:24:07.103000
|
||||
@ -245845,11 +245848,11 @@ CVE-2024-31841,0,0,de5efd40e0d92babbab87030506b1a212fb4afe9f3f9b49fa0c7d8acedda7
|
||||
CVE-2024-31846,0,0,4aa9b2c36e227ec317e3797135e2468ef28cbbea439839bcc511c8ec99315bbc,2024-04-19T16:19:49.043000
|
||||
CVE-2024-31848,0,0,2da60f6a287cac48661bc0aa0bb0ac92caa20fc3ae4255bef230dfecf644c92e,2024-04-08T18:49:25.863000
|
||||
CVE-2024-31849,0,0,f45798bfe1f17890c1c9f615c3d632efe82fbe29dd84fe4753d6d6beae3b4f6a,2024-04-08T18:49:25.863000
|
||||
CVE-2024-3185,0,1,7d5aee3d07be9ec39704ac3d9974706c9ad0674f1443c2cd3364d807869aabfe,2024-04-23T09:15:07.023000
|
||||
CVE-2024-3185,0,1,7fcf61647d547b77181d5225cd4d3f1f2099e2653d1cd7f2d6fbb610b985c0ed,2024-04-23T12:52:09.397000
|
||||
CVE-2024-31850,0,0,4dfa9605a049a09744618be099ad889f274ff40fc42a18e168685588a6a44b6d,2024-04-08T18:49:25.863000
|
||||
CVE-2024-31851,0,0,0e8250a21123e214b1f09f2b325f0d0e22e98cb6715480d7ac13d673f761eb46,2024-04-08T18:49:25.863000
|
||||
CVE-2024-31852,0,0,7a968282e2d23775fda0d6edce03c38caf21ca868b2fca3251339d962c2ec4c6,2024-04-08T18:49:25.863000
|
||||
CVE-2024-31857,0,0,25cf386d472a6a9dd436a170b897e41bdd36b8428ebda30686b5e9656f982c23,2024-04-23T05:15:49.377000
|
||||
CVE-2024-31857,0,1,3e7ac60afeec75094fbcaec8b53e1a238b7bcb05ca078ef7a1edb4dbe4dfc654,2024-04-23T12:52:09.397000
|
||||
CVE-2024-31860,0,0,55dd12597bf39ae8e0517c5d55b7ea30406697589bf4efd38a9030f7ffb75da9,2024-04-09T12:48:04.090000
|
||||
CVE-2024-31861,0,0,2ef21b0cb7540121255e11559e1c009c67fcac815944858c998e249e0cd71735,2024-04-11T12:47:44.137000
|
||||
CVE-2024-31862,0,0,9f707e95c44d810f3a15296bc63963399801058986b2544d08155d8eb18bc340,2024-04-09T12:48:04.090000
|
||||
@ -245929,10 +245932,10 @@ CVE-2024-3203,0,0,d460cfbc8661b4424cc0984f526a676bb0961256fc9d04a7d500e891870298
|
||||
CVE-2024-32035,0,0,9f9419e7b7ca688ca6c807b99c4196d3fdd26d305c290e1d723cf412a79167b9,2024-04-16T13:24:07.103000
|
||||
CVE-2024-32036,0,0,4358f457ff05e2fb3005eccdac6fca8cb869be3ffa209c190e441f2c4aed7dbe,2024-04-16T23:15:09.173000
|
||||
CVE-2024-32038,0,0,0c62c1bb60ae59f0486be34fe779022cf62ebed910094f07560f60e059fb8333,2024-04-19T16:19:49.043000
|
||||
CVE-2024-32039,0,0,903d6f1b801ce3cb1cf30fb63096cefc285997d688eb683fcfe664b5835eba84,2024-04-22T21:15:49.090000
|
||||
CVE-2024-32039,0,1,ad4990c66c843cfb78c18ddf4863c9df097d3c92a62d93c490b95501745f6176,2024-04-23T12:52:26.253000
|
||||
CVE-2024-3204,0,0,2a2a133d829052d72380a6f7a45e32f6ecd96ec6da65fdbadcbe92a1f79d774f,2024-04-11T01:25:55.933000
|
||||
CVE-2024-32040,0,0,3766545a4f13c59ba4d4b4d068bd390255fef99cd14416b0ba9f81ad55a8bd93,2024-04-22T21:15:49.290000
|
||||
CVE-2024-32041,0,0,04b89046e3d0ca3229dfcf282ef96cdae99675e6240ef182516afb2b8e764edc,2024-04-22T21:15:49.477000
|
||||
CVE-2024-32040,0,1,c9e8a9bafebd4e002463be520ee967b3c928ddf4cec6865e7aa23fa1d81b2834,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32041,0,1,e88f61c8c702a5d00724562a1be23c2ca0fc9ec03e84f95db2dfed035982cfb4,2024-04-23T12:52:26.253000
|
||||
CVE-2024-3205,0,0,befb48df2bb5e20af3b4383c1ef82865b9f9fb3145e096ffb7e0098ff096b4f8,2024-04-11T01:25:56.010000
|
||||
CVE-2024-3207,0,0,a57734da301192d6a9381ac71eef9bc84e6acf70886d5628a9c0939255320fc2,2024-04-11T01:25:56.090000
|
||||
CVE-2024-32079,0,0,da7c5fc89984eb26823f30faeb9a07fc0733d153f127ad026564ff0d33e59be6,2024-04-15T13:15:31.997000
|
||||
@ -246003,7 +246006,7 @@ CVE-2024-32206,0,0,75e2f6344ef11995a7b224164fb98cef520a3da698959b3897e594f3d6e35
|
||||
CVE-2024-3221,0,0,feefc929b27a3432f5d1352d15fe99f1f6ccd294cecb07c343d15630058ba883,2024-04-11T01:25:56.367000
|
||||
CVE-2024-3222,0,0,66f6b4b9196c6c0a91ef8acd4cd0373a609da64e89b651a11374a40389e0fbce,2024-04-11T01:25:56.443000
|
||||
CVE-2024-3223,0,0,9ffc982a7efad24c324809c3c91bef1f04ff8280442a22bc3b8b997888a9a5ba,2024-04-11T01:25:56.520000
|
||||
CVE-2024-32238,0,0,94ecef49732194650c203704488bc0b79a53c465c93001f6f8f1542de7946f78,2024-04-22T20:15:07.630000
|
||||
CVE-2024-32238,0,1,0e920ec9ded0c0837401c703af1964a27843eb631a1c2ab20523a0b29f896ad3,2024-04-23T12:52:30.940000
|
||||
CVE-2024-3224,0,0,c02e228ce7415d482e2413c615262ec703d9597aa6708474ae81bc765129424f,2024-04-11T01:25:56.600000
|
||||
CVE-2024-3225,0,0,756f5e08f46ab3796e26d62cd11cd06a14dd07d1ee049ee62586436225e04f96,2024-04-11T01:25:56.680000
|
||||
CVE-2024-32254,0,0,0a822eba06a834cf336156a0938a7461bb1c4b55ddb75ffba99f3f6b4a1c1462,2024-04-17T12:48:31.863000
|
||||
@ -246058,9 +246061,9 @@ CVE-2024-3235,0,0,87b194ac57d76e3164f790cf262b7f15e5577bfab72d12fd067ebb5070eb75
|
||||
CVE-2024-32368,0,0,9c8576a3d1f1b62a70cacd6450f34a9ed8bf7b0c58e8707835f5fedae490db3f,2024-04-22T19:24:12.920000
|
||||
CVE-2024-32391,0,0,b9d2ada2509e9e002fcf7fc50c30e5fa24f6bd077b7f0fab83dbe519d76755ce,2024-04-22T13:28:50.310000
|
||||
CVE-2024-32392,0,0,e9dc77721f231608117a79f151c9f1e6be5cd7530989658bd3dd67ce41889ce5,2024-04-22T13:28:50.310000
|
||||
CVE-2024-32394,0,0,7cc3b3f3c56a0cd88d7f07ffeeee92eac04f5586caffaf5b812f8c10697a9b00,2024-04-22T21:15:49.657000
|
||||
CVE-2024-32399,0,0,40453e37a9d27fb351270e340117d3028138554e32350bcb25c71c2e15cf0ec2,2024-04-22T20:15:07.683000
|
||||
CVE-2024-32405,0,0,cd4abce15bd5cb1377317eccf2c7ee074ab0be4cd112d0ba830261b578da6355,2024-04-22T20:15:07.737000
|
||||
CVE-2024-32394,0,1,5f3cc70e4b86c8028147d2489cef40fa6c9285878a28bdb0855878990e97443a,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32399,0,1,881ee2dd975bc6f828957c741f38d2e9a20065eb3fba67ea84e4e0b7e3e06627,2024-04-23T12:52:30.940000
|
||||
CVE-2024-32405,0,1,3981342fdb5111e1ad684c404fe5fa643bf161596abde4f7fd085ddcbb79a5d7,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32407,0,0,04bdb1c21d2d45016e5f7565a6490533ba649bcc5c4dc99b7e34c030532cab3a,2024-04-22T19:24:06.727000
|
||||
CVE-2024-32409,0,0,2cc0bf26ecd8938fd89992a98bae2541af2d19072f0bc8cdc919759b6ea980aa,2024-04-19T16:19:49.043000
|
||||
CVE-2024-32418,0,0,95e561b293359ffe96c6d53d8bd7aa5dba172944f2d114b653ec1a760700c5d9,2024-04-22T13:28:43.747000
|
||||
@ -246095,10 +246098,10 @@ CVE-2024-32454,0,0,82612665e825c6121646d06374d65bca8862992c0c337ca5fb468894f9c7a
|
||||
CVE-2024-32455,0,0,e310d9ab26897191bedf34ef484874a672ce976e6db5d528b2061e5197a0cfa7,2024-04-17T12:48:31.863000
|
||||
CVE-2024-32456,0,0,c0a0240c7bede6707c2eded61ccd88c169f1ed302e5ff3046ec6dac746537832,2024-04-17T12:48:07.510000
|
||||
CVE-2024-32457,0,0,7fd7ce0ef138de93b6c3b9f686be4ed7bf60ffc47479de2dc6e171832d6a4fe7,2024-04-17T12:48:07.510000
|
||||
CVE-2024-32458,0,0,989b13b43b54d8f9cae040df7c674dd8954010e1c670a628aa0cd71bc829f1f5,2024-04-22T21:15:49.707000
|
||||
CVE-2024-32459,0,0,b6a2b85c474d6d273e8772c0703d0fd9ae9420c57a4e08e0484ab20fd240e8bb,2024-04-22T22:15:07.463000
|
||||
CVE-2024-32460,0,0,b845923fc459d84695a94a20e151c8f5df593861653d803b32fbe677bc895e1e,2024-04-22T22:15:07.647000
|
||||
CVE-2024-32461,0,0,83d22b222d6b085342ae6ac86da8ce1f6b9f8b689b2e3ba283ede0f14ce6e3f6,2024-04-22T22:15:07.840000
|
||||
CVE-2024-32458,0,1,63f1a521197c952f60c25934e7fd7aa3c850cb789e0fbf4fc9820f82322003bd,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32459,0,1,d31dd58136316769d63b8c95928f52be7e44ec5e5809b7af370f96f2aca14313,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32460,0,1,fc58ca5ee1d47b6a3e46a6c825461997a8b177fb47b38edb8831274c3530e6c9,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32461,0,1,3941d8bd271b020582637450c6381a991de4b9ffa39f4db030841834b9e2af51,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32462,0,0,a3aed35daade2ee454524a5ebc934210d89481f944e09c871e8061833830b63d,2024-04-21T03:15:45.827000
|
||||
CVE-2024-32463,0,0,1671e195c4973ac11a31a2856358d6fb78fc6f39ffe0d1d851cfbba7a397b723,2024-04-17T16:51:07.347000
|
||||
CVE-2024-32466,0,0,0986c266c64cc5e4b364446dfb796a6c4980d483c5a2beb3f21f15de4cb49c0b,2024-04-18T18:25:55.267000
|
||||
@ -246110,9 +246113,9 @@ CVE-2024-32474,0,0,adf2e54d1f50eac76d6eed4deebd0da24270aeb71946944c9f131a9545119
|
||||
CVE-2024-32475,0,0,0fc7232a86aa0c1544df06e871c45b3dd3b0f61d5e2b0b45727dd45ce07af33f,2024-04-18T18:25:55.267000
|
||||
CVE-2024-32477,0,0,edf9feceec657c5323b0a5bdd9c7c512982639e1cf50dad09f7080d975a64ba8,2024-04-19T13:10:25.637000
|
||||
CVE-2024-32478,0,0,767d0906439929f5e4e53d4d2396aabddb8a0de51e7967f13464fca079c7076f,2024-04-19T16:19:49.043000
|
||||
CVE-2024-32479,0,0,4cf43690c9d0407b6643c2c4c1ff406d9dc16127b06823a7a9d52f9aa8cac76e,2024-04-22T22:15:08.027000
|
||||
CVE-2024-32479,0,1,9f233b992ed22cd02276821942e34be3b1cd724f5562f573e840e7a10cf66aba,2024-04-23T12:52:26.253000
|
||||
CVE-2024-3248,0,0,65f6d4ddfc43ae235edf2e59fc9daa1f1d020439a4fa197a41a6ddd58e106004,2024-04-03T12:38:04.840000
|
||||
CVE-2024-32480,0,0,48d5eafc84d47aa80e4ad469390e78c3add13778656b7bdca54179d867e858ee,2024-04-22T23:15:50.440000
|
||||
CVE-2024-32480,0,1,f740881091f1f05e0445ba97b5de61d4d063547c57ff7478943e1cd018db3728,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32487,0,0,746d95a6c3889a9e0164763739aef81432a5222f159aa33a064a3132dbd4a7ad,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32488,0,0,6ce6bcee8af0a677e98d2bf7a3efd66cf8a3e580423515387116f39d710ba974,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32489,0,0,cbc8895e7f5e99c09f7bd505220fcc5514b4573939580e3f381a933acf3c9ef0,2024-04-15T13:15:31.997000
|
||||
@ -246227,9 +246230,9 @@ CVE-2024-32634,0,0,399e2bba8e548c1c98770d2f478e96e69a60afbc020788dd69a365e3ae504
|
||||
CVE-2024-32644,0,0,1c6536d9b118a22e007df0508c4274faf4a9f6bb52ca2e5c9b157aa559740e67,2024-04-19T16:19:49.043000
|
||||
CVE-2024-32650,0,0,3ec938fa621d2b09851dc7c9c4a0bab9e06500eb12a687bac8f1323156efc6df,2024-04-19T16:19:49.043000
|
||||
CVE-2024-32652,0,0,507899e8cc0ef719a4df6a408b43b1aeaf42e8d25b41dcf9a35617406adccb9d,2024-04-22T13:28:50.310000
|
||||
CVE-2024-32653,0,0,15746b291b5be192848135c0c6fd678673b4bcbf809efc95adb9fcdbf0746ddd,2024-04-22T23:15:50.630000
|
||||
CVE-2024-32656,0,0,e07ca629d22e469dec44e49bf609e2394a8cdf2f0a281225759204e05756045e,2024-04-22T23:15:50.817000
|
||||
CVE-2024-32657,0,0,d75a2dbf2d53b439d4955d8a51cd17809b320c82c440e545c3087705382adb9e,2024-04-22T23:15:50.997000
|
||||
CVE-2024-32653,0,1,96a4de58183f8a4c5475803e77d708dc553ab0aba5c22712929dba4355cb603d,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32656,0,1,507ca72541b43d2bb1e3f8cba739ba39a5095ac212b37ee6cfc977f3944f903a,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32657,0,1,45665c321c855eccec4d820153233a5ab3c0184c9eb39067bd012d7165ff1a87,2024-04-23T12:52:26.253000
|
||||
CVE-2024-3266,0,0,254a5ba127b10ac48f062b62dbe4c90ef51eaba1ed741161e5a22416cbb32240,2024-04-10T13:23:38.787000
|
||||
CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000
|
||||
CVE-2024-32681,0,0,30385cf8415af0417b19f52d5eb22ace0b875cd333ead985847624dbf28043cd,2024-04-22T13:28:34.007000
|
||||
@ -246260,7 +246263,7 @@ CVE-2024-32746,0,0,15529f833c25b7b5b5022877593c49d5afec10018bbf65b56334a694e0bc4
|
||||
CVE-2024-3281,0,0,b3c51db3aca3b371ad4faa3c1c4537d2c54d8323123f7ae9b26414cd9ee432a6,2024-04-10T13:24:22.187000
|
||||
CVE-2024-3283,0,0,8b1939d21df3d4399a3bf874e70470053c1a0ae20421841ad51c79aca5727c56,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3285,0,0,ea17e16acaa3172cbcc052cf9bfb1b3e7ee2b004434b062b8e67c1c1ed8bff14,2024-04-11T12:47:44.137000
|
||||
CVE-2024-3293,0,0,96b18d34a2e2a67e831d502d7277c02c7af81e51afa5ce9e95357ddd8d071569,2024-04-23T02:15:48.390000
|
||||
CVE-2024-3293,0,1,3552485a27a6b6c8b2cadd17fbdb3e630238722099a3e2d8d97b0f239cd2dc1a,2024-04-23T12:52:26.253000
|
||||
CVE-2024-3296,0,0,bcc39314c1e9f6d53aa0ccc8e7e7cac7c279f7f6ee5a27f19287b128ea2ed6c7,2024-04-05T12:15:37.777000
|
||||
CVE-2024-3298,0,0,35145d829af4d19541380a93e6723503e514b69e11aa4b007b05099610c37f21,2024-04-04T16:33:06.610000
|
||||
CVE-2024-3299,0,0,f60f2a80accdd6f345a6a9cd66637eda180121596f90c2e7d75707c9fce20eb6,2024-04-04T16:33:06.610000
|
||||
@ -246352,7 +246355,7 @@ CVE-2024-3464,0,0,0c53100717f2f28c54c57fbaaef472d29e3cb0ff81ebf61eb104a899922afe
|
||||
CVE-2024-3465,0,0,a42aecf57f43969ec60c90b90013ebe0e449783aa33103b39be184486d2b2ca9,2024-04-11T01:26:03.697000
|
||||
CVE-2024-3466,0,0,06b3d0b5c629cfcd72994ab03bcc3d914522a60f9b439b6d13775db50704418a,2024-04-11T01:26:03.777000
|
||||
CVE-2024-3470,0,0,630f5f35df37b6b978ca7687ce76aaec305cc639bf4ca3fb3b6aed08fe283bb6,2024-04-19T16:19:49.043000
|
||||
CVE-2024-3491,1,1,faf3b6d379e6629535a9da007f12e5993e23962b408fdc889f4de5a26877ec61,2024-04-23T11:15:45.967000
|
||||
CVE-2024-3491,0,1,22475c1a2c147b599aec5499497f20fc9fa37c1dc206a0659b8807ac37f4f324,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3493,0,0,63ead7e160b6b2cbd834dd6075f87d345af3361e8d55520f11e81a53e2086aaa,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3505,0,0,d46d6b7d35449c168e9ff66f3c93f973f2e1e579109b94b88c63ad7baac2b7b8,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3512,0,0,0bde0dc5c2508608f7df2e92075f3b315e69961d5bc617a9cf046c486aab6ef4,2024-04-10T13:23:38.787000
|
||||
@ -246411,8 +246414,8 @@ CVE-2024-3652,0,0,a467de8b64f8147acdef48edc35752a89afb7d5856e17302ea9c57335ed0f6
|
||||
CVE-2024-3654,0,0,7e2b4ab81bb1b43884c0db8e806df093bdf87a3fc5c587d83d67f54180b50daf,2024-04-19T16:19:49.043000
|
||||
CVE-2024-3660,0,0,27de83d41a96740d974951cfc0f4ab32e626a768053ae4e7908802eefe823936,2024-04-17T12:48:31.863000
|
||||
CVE-2024-3662,0,0,aac492e0cb08799a7f888c46af5bedb595fa2e9ad6dc15c21be50e9dae70066e,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3664,0,0,8aa56e3e9a106325054a4f102bf91cc6b5b5e266540265b47d44ed328856fa38,2024-04-23T08:15:45.177000
|
||||
CVE-2024-3665,1,1,84d9a6ae54b89e9f03596e34f3b2e2c9da62b8d2d5ab31800dba00af2f75d21a,2024-04-23T10:15:06.923000
|
||||
CVE-2024-3664,0,1,afb9452532a9b46276f3e123567931f2d9b14afd62c66b887c9d751f65c725bc,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3665,0,1,22dbbd6c0bec2b9f433688ae97b549cd541e7f2d387c3796dd32246c851476cf,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3672,0,0,b7de207aaf40bb160711ae23312b83bd4f3d950fbf99cf282ee38b1e3854739f,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3684,0,0,693360cd268d4b961448865406a570238e347409fa389434d499b6fc0f790dc0,2024-04-19T16:19:49.043000
|
||||
CVE-2024-3685,0,0,2d04d41485feb8a52bd1142022b18bc3f24805efb219d419e0508c4773991260,2024-04-15T13:15:51.577000
|
||||
@ -246435,7 +246438,7 @@ CVE-2024-3719,0,0,f291ba68ba6e93978bc9c39b527e377db4603f9cf0b58326694ce4a62db069
|
||||
CVE-2024-3720,0,0,548129ada226460eeed0bbe63afac7cb948fd16d011c5ffd900fa7625265466b,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3721,0,0,e2cd22ce24461bd25c9ec7cb92e927b75c559a9256137266b8480ef946c8e320,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3731,0,0,bdcc8f677627b7b108ec8e839a01e7cc6ba34354d6004394dff79046d7838f40,2024-04-19T13:10:25.637000
|
||||
CVE-2024-3732,1,1,0cd92d835ab1d877a1b01b9882d820039573565a8ca882f0a6286949b787f6dc,2024-04-23T10:15:07.537000
|
||||
CVE-2024-3732,0,1,47b10b9e83ea0bac70990c3295c25b56cc73657af82bc6f5c1f4fd37930f5edb,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3735,0,0,9300dd852c0feb2e50ee641119a226f214818e2f2843b357387d0b439146ec2c,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3736,0,0,8e1e49a70c099a42d25fc2ef350c0eb9767073e2fa96b7ffe6bc4d265c3f8c23,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3737,0,0,1990edd10a050a438850658c5a42b3f737afd31a7356a3decab691dfe1bc7cad,2024-04-15T13:15:31.997000
|
||||
@ -246515,7 +246518,7 @@ CVE-2024-3879,0,0,9c5ce4d1a3fc01133b3321115c4ccd096980cfe5baa042c4c9bf7b273029d2
|
||||
CVE-2024-3880,0,0,237e3bb93a0b113a1c50538806f68b5377561349bd4f47a9139ec72cd356417d,2024-04-17T12:48:31.863000
|
||||
CVE-2024-3881,0,0,9055ecf63e1aedc7e2787afc56e67bc831564d5ee15f418ef1b408c81c24bb16,2024-04-17T12:48:31.863000
|
||||
CVE-2024-3882,0,0,846c922d5cf92347db05da515dc041ccc83bdcd548fefc386c188946857d0db7,2024-04-17T12:48:31.863000
|
||||
CVE-2024-3889,0,0,529f3bbc2e9505f214020728f19282b593b604b7ec4622036c61b5ecf60e556c,2024-04-23T06:15:07.700000
|
||||
CVE-2024-3889,0,1,c4039354ee4d81ce5faec2ce618c8f0af30c97c1ad1feeb689836cb585b438a6,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3900,0,0,5bafaa90d65e26f460054cb65a089d31ecb0030e0f85c3f0ee595a0cce123691,2024-04-17T20:08:21.887000
|
||||
CVE-2024-3905,0,0,666ba6ab36ae43f19518f88ffcc3dc3578e7336eef9fa01b067c40b574dea570,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3906,0,0,dd9841bce880aeaa28c9d51ba9e314b7fd3abe4741e8e805c9e3a8477cebd832,2024-04-17T12:48:07.510000
|
||||
@ -246523,6 +246526,7 @@ CVE-2024-3907,0,0,b4e4be60c17ce688486097ec16bf10c01177f6c8b54984e903905f799945f5
|
||||
CVE-2024-3908,0,0,26db16f32c52be83b374f19657727a3a2a3db16f8ab3cda20dc3ad146f877b39,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3909,0,0,c5efb647be20bf9f2ba452fa9666b153466b94d0e5f3c713649def6568acf5a0,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3910,0,0,7d8aafa4b35964a72cdc3d08dd6c7b1615ef522d553c6c78d413b0e25fdc718e,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3911,1,1,11f3bec5f1587eb22151392a8d155bb89d10f83f95efada567bdaf5751a2af93,2024-04-23T13:15:46.770000
|
||||
CVE-2024-3914,0,0,bfcdc28110b7c28097238d4f47d5360ee99989ca670a402fe72b8be56b94f618,2024-04-23T02:15:49.160000
|
||||
CVE-2024-3928,0,0,114c97f372c53f33fe3b26cd091686f1eb78a3749714814b77901a77b62a0107,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3931,0,0,adc8a79b07f48b35a9681a97a568e852ba1ef2cbd3b7271f585750c2d2c4216b,2024-04-18T13:04:28.900000
|
||||
@ -246537,5 +246541,5 @@ CVE-2024-4020,0,0,fd9bedf3f2e4b41e8bc994bd6387cb7e34a5d92d9443a0588f231180a5be89
|
||||
CVE-2024-4021,0,0,21ca31bf18d88881f7a6cc1002b89ea9bbd51b89715a0adf7c08b2eb5ac210a6,2024-04-22T15:15:47.813000
|
||||
CVE-2024-4022,0,0,ebd323c8f90bdf29bd6ff35ea1eff449874a3d962dc85b687039f47f7b416e73,2024-04-22T13:28:43.747000
|
||||
CVE-2024-4026,0,0,65bff2dba626fde0f88488c1e6df610a37e761e2e041855587a3bbcb3e849c23,2024-04-22T13:28:34.007000
|
||||
CVE-2024-4031,0,0,b8510946ad028bee7307984f52b83ceb9689ead2308e23f275d8d966c6713d87,2024-04-23T07:15:43.087000
|
||||
CVE-2024-4040,0,0,973a0d3e869c71c707f4ed9e103d14c0135314b263cd796fdd1f54f7ba104b13,2024-04-22T21:15:49.890000
|
||||
CVE-2024-4031,0,1,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000
|
||||
CVE-2024-4040,0,1,1c076b2ab70ecb1e80edff07a45eda641d4fa881fea89ccf32a60b6e73154ae3,2024-04-23T12:52:26.253000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user