mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-04-08T16:00:37.564234+00:00
This commit is contained in:
parent
1b2352119c
commit
b27fa6bd93
36
CVE-2024/CVE-2024-25xx/CVE-2024-2511.json
Normal file
36
CVE-2024/CVE-2024-25xx/CVE-2024-2511.json
Normal file
@ -0,0 +1,36 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2511",
|
||||||
|
"sourceIdentifier": "openssl-security@openssl.org",
|
||||||
|
"published": "2024-04-08T14:15:07.660",
|
||||||
|
"lastModified": "2024-04-08T14:15:07.660",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Issue summary: Some non-default TLS server configurations can cause unbounded\nmemory growth when processing TLSv1.3 sessions\n\nImpact summary: An attacker may exploit certain server configurations to trigger\nunbounded memory growth that would lead to a Denial of Service\n\nThis problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is\nbeing used (but not if early_data support is also configured and the default\nanti-replay protection is in use). In this case, under certain conditions, the\nsession cache can get into an incorrect state and it will fail to flush properly\nas it fills. The session cache will continue to grow in an unbounded manner. A\nmalicious client could deliberately create the scenario for this failure to\nforce a Denial of Service. It may also happen by accident in normal operation.\n\nThis issue only affects TLS servers supporting TLSv1.3. It does not affect TLS\nclients.\n\nThe FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL\n1.0.2 is also not affected by this issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/openssl/openssl/commit/7e4d731b1c07201ad9374c1cd9ac5263bdf35bce",
|
||||||
|
"source": "openssl-security@openssl.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/openssl/openssl/commit/b52867a9f618bb955bed2a3ce3db4d4f97ed8e5d",
|
||||||
|
"source": "openssl-security@openssl.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/openssl/openssl/commit/e9d7083e241670332e0443da0f0d4ffb52829f08",
|
||||||
|
"source": "openssl-security@openssl.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.openssl.org/openssl/extended-releases/commit/5f8d25770ae6437db119dfc951e207271a326640",
|
||||||
|
"source": "openssl-security@openssl.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.openssl.org/news/secadv/20240408.txt",
|
||||||
|
"source": "openssl-security@openssl.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
24
CVE-2024/CVE-2024-287xx/CVE-2024-28732.json
Normal file
24
CVE-2024/CVE-2024-287xx/CVE-2024-28732.json
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28732",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-04-08T14:15:07.600",
|
||||||
|
"lastModified": "2024-04-08T14:15:07.600",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An issue was discovered in OFPMatch in parser.py in Faucet SDN Ryu version 4.34, allows remote attackers to cause a denial of service (DoS) (infinite loop)."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://gist.github.com/ErodedElk/1133d64dde2d92393a065edc9b243792",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/faucetsdn/ryu/issues/188",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
59
CVE-2024/CVE-2024-302xx/CVE-2024-30269.json
Normal file
59
CVE-2024/CVE-2024-302xx/CVE-2024-30269.json
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-30269",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-04-08T15:15:07.820",
|
||||||
|
"lastModified": "2024-04-08T15:15:07.820",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "DataEase, an open source data visualization and analysis tool, has a database configuration information exposure vulnerability prior to version 2.5.0. Visiting the `/de2api/engine/getEngine;.js` path via a browser reveals that the platform's database configuration is returned. The vulnerability has been fixed in v2.5.0. No known workarounds are available aside from upgrading."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/dataease/dataease/releases/tag/v2.5.0",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/dataease/dataease/security/advisories/GHSA-8gvx-4qvj-6vv5",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
59
CVE-2024/CVE-2024-312xx/CVE-2024-31205.json
Normal file
59
CVE-2024/CVE-2024-312xx/CVE-2024-31205.json
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-31205",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-04-08T15:15:08.023",
|
||||||
|
"lastModified": "2024-04-08T15:15:08.023",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Saleor is an e-commerce platform. Starting in version 3.10.0 and prior to versions 3.14.64, 3.15.39, 3.16.39, 3.17.35, 3.18.31, and 3.19.19, an attacker may bypass cross-set request forgery (CSRF) validation when calling refresh token mutation with empty string. When a user provides an empty string in `refreshToken` mutation, while the token persists in `JWT_REFRESH_TOKEN_COOKIE_NAME` cookie, application omits validation against CSRF token and returns valid access token. Versions 3.14.64, 3.15.39, 3.16.39, 3.17.35, 3.18.31, and 3.19.19 contain a patch for the issue. As a workaround, one may replace `saleor.graphql.account.mutations.authentication.refresh_token.py.get_refresh_token`. This will fix the issue, but be aware, that it returns `JWT_MISSING_TOKEN` instead of `JWT_INVALID_TOKEN`.\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.2,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.6,
|
||||||
|
"impactScore": 2.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-352"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/saleor/saleor/commit/36699c6f5c99590d24f46e3d5c5b1a3c2fd072e7",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/saleor/saleor/security/advisories/GHSA-ff69-fwjf-3c9w",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
67
CVE-2024/CVE-2024-312xx/CVE-2024-31221.json
Normal file
67
CVE-2024/CVE-2024-312xx/CVE-2024-31221.json
Normal file
@ -0,0 +1,67 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-31221",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-04-08T15:15:08.207",
|
||||||
|
"lastModified": "2024-04-08T15:15:08.207",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Sunshine is a self-hosted game stream host for Moonlight. Starting in version 0.10.0 and prior to version 0.23.0, after unpairing all devices in the web UI interface and then pairing only one device, all of the previously devices will be temporarily paired. Version 0.23.0 contains a patch for the issue. As a workaround, restarting Sunshine after unpairing all devices prevents the vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 4.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-384"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/LizardByte/Sunshine/commit/b7aa8119f1471844dccdf73a8b6f7efc9baddb5e",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/LizardByte/Sunshine/issues/2305",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/LizardByte/Sunshine/pull/2365",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/LizardByte/Sunshine/security/advisories/GHSA-v8gw-jw28-v55m",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-34xx/CVE-2024-3440.json
Normal file
92
CVE-2024/CVE-2024-34xx/CVE-2024-3440.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-3440",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-04-08T14:15:07.737",
|
||||||
|
"lastModified": "2024-04-08T14:15:07.737",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in SourceCodester Prison Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /Admin/edit_profile.php. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259693 was assigned to this vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "MULTIPLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"baseScore": 5.8
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 6.4,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/fubxx/CVE/blob/main/PrisonManagementSystemSQL3.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.259693",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.259693",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.312207",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-34xx/CVE-2024-3441.json
Normal file
92
CVE-2024/CVE-2024-34xx/CVE-2024-3441.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-3441",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-04-08T14:15:07.953",
|
||||||
|
"lastModified": "2024-04-08T14:15:07.953",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in SourceCodester Prison Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /Employee/edit-profile.php. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-259694 is the identifier assigned to this vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"baseScore": 6.5
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/fubxx/CVE/blob/main/PrisonManagementSystemSQL4.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.259694",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.259694",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.312219",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-34xx/CVE-2024-3442.json
Normal file
92
CVE-2024/CVE-2024-34xx/CVE-2024-3442.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-3442",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-04-08T15:15:08.407",
|
||||||
|
"lastModified": "2024-04-08T15:15:08.407",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability classified as critical has been found in SourceCodester Prison Management System 1.0. This affects an unknown part of the file /Employee/delete_leave.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259695."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"baseScore": 6.5
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/fubxx/CVE/blob/main/PrisonManagementSystemSQL5.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.259695",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.259695",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.312248",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-34xx/CVE-2024-3443.json
Normal file
92
CVE-2024/CVE-2024-34xx/CVE-2024-3443.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-3443",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-04-08T15:15:08.623",
|
||||||
|
"lastModified": "2024-04-08T15:15:08.623",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability classified as problematic was found in SourceCodester Prison Management System 1.0. This vulnerability affects unknown code of the file /Employee/apply_leave.php. The manipulation of the argument txtstart_date/txtend_date leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259696."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 3.5,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 2.9,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zyairelai/CVE-submissions/blob/main/prison-xss.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.259696",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.259696",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.312285",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-34xx/CVE-2024-3444.json
Normal file
92
CVE-2024/CVE-2024-34xx/CVE-2024-3444.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-3444",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-04-08T15:15:08.833",
|
||||||
|
"lastModified": "2024-04-08T15:15:08.833",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in Wangshen SecGate 3600 up to 20240408. It has been classified as critical. This affects an unknown part of the file /?g=net_pro_keyword_import_save. The manipulation of the argument reqfile leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259701 was assigned to this vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "MULTIPLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"baseScore": 5.8
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 6.4,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-434"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/h0e4a0r1t/lLGcmVjGkR/blob/main/Wangshen%20SecGata%203600%20Firewall%20net_pro_keyword_import_save%20arbitrary%20file%20upload%20vulnerability.pdf",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.259701",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.259701",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.312293",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
40
README.md
40
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-04-08T14:00:39.840993+00:00
|
2024-04-08T16:00:37.564234+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-04-08T13:15:09.030000+00:00
|
2024-04-08T15:15:08.833000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,39 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
244449
|
244459
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `19`
|
Recently added CVEs: `10`
|
||||||
|
|
||||||
- [CVE-2011-10006](CVE-2011/CVE-2011-100xx/CVE-2011-10006.json) (`2024-04-08T13:15:07.680`)
|
- [CVE-2024-2511](CVE-2024/CVE-2024-25xx/CVE-2024-2511.json) (`2024-04-08T14:15:07.660`)
|
||||||
- [CVE-2014-125111](CVE-2014/CVE-2014-1251xx/CVE-2014-125111.json) (`2024-04-08T13:15:07.940`)
|
- [CVE-2024-28732](CVE-2024/CVE-2024-287xx/CVE-2024-28732.json) (`2024-04-08T14:15:07.600`)
|
||||||
- [CVE-2022-43216](CVE-2022/CVE-2022-432xx/CVE-2022-43216.json) (`2024-04-08T12:15:08.017`)
|
- [CVE-2024-30269](CVE-2024/CVE-2024-302xx/CVE-2024-30269.json) (`2024-04-08T15:15:07.820`)
|
||||||
- [CVE-2024-26574](CVE-2024/CVE-2024-265xx/CVE-2024-26574.json) (`2024-04-08T12:15:08.167`)
|
- [CVE-2024-31205](CVE-2024/CVE-2024-312xx/CVE-2024-31205.json) (`2024-04-08T15:15:08.023`)
|
||||||
- [CVE-2024-28066](CVE-2024/CVE-2024-280xx/CVE-2024-28066.json) (`2024-04-08T13:15:08.247`)
|
- [CVE-2024-31221](CVE-2024/CVE-2024-312xx/CVE-2024-31221.json) (`2024-04-08T15:15:08.207`)
|
||||||
- [CVE-2024-2834](CVE-2024/CVE-2024-28xx/CVE-2024-2834.json) (`2024-04-08T13:15:08.303`)
|
- [CVE-2024-3440](CVE-2024/CVE-2024-34xx/CVE-2024-3440.json) (`2024-04-08T14:15:07.737`)
|
||||||
- [CVE-2024-31805](CVE-2024/CVE-2024-318xx/CVE-2024-31805.json) (`2024-04-08T13:15:08.500`)
|
- [CVE-2024-3441](CVE-2024/CVE-2024-34xx/CVE-2024-3441.json) (`2024-04-08T14:15:07.953`)
|
||||||
- [CVE-2024-31806](CVE-2024/CVE-2024-318xx/CVE-2024-31806.json) (`2024-04-08T13:15:08.550`)
|
- [CVE-2024-3442](CVE-2024/CVE-2024-34xx/CVE-2024-3442.json) (`2024-04-08T15:15:08.407`)
|
||||||
- [CVE-2024-31807](CVE-2024/CVE-2024-318xx/CVE-2024-31807.json) (`2024-04-08T13:15:08.603`)
|
- [CVE-2024-3443](CVE-2024/CVE-2024-34xx/CVE-2024-3443.json) (`2024-04-08T15:15:08.623`)
|
||||||
- [CVE-2024-31808](CVE-2024/CVE-2024-318xx/CVE-2024-31808.json) (`2024-04-08T13:15:08.650`)
|
- [CVE-2024-3444](CVE-2024/CVE-2024-34xx/CVE-2024-3444.json) (`2024-04-08T15:15:08.833`)
|
||||||
- [CVE-2024-31809](CVE-2024/CVE-2024-318xx/CVE-2024-31809.json) (`2024-04-08T13:15:08.700`)
|
|
||||||
- [CVE-2024-31811](CVE-2024/CVE-2024-318xx/CVE-2024-31811.json) (`2024-04-08T13:15:08.750`)
|
|
||||||
- [CVE-2024-31812](CVE-2024/CVE-2024-318xx/CVE-2024-31812.json) (`2024-04-08T13:15:08.800`)
|
|
||||||
- [CVE-2024-31813](CVE-2024/CVE-2024-318xx/CVE-2024-31813.json) (`2024-04-08T13:15:08.840`)
|
|
||||||
- [CVE-2024-31814](CVE-2024/CVE-2024-318xx/CVE-2024-31814.json) (`2024-04-08T13:15:08.887`)
|
|
||||||
- [CVE-2024-31815](CVE-2024/CVE-2024-318xx/CVE-2024-31815.json) (`2024-04-08T13:15:08.937`)
|
|
||||||
- [CVE-2024-31816](CVE-2024/CVE-2024-318xx/CVE-2024-31816.json) (`2024-04-08T13:15:08.987`)
|
|
||||||
- [CVE-2024-31817](CVE-2024/CVE-2024-318xx/CVE-2024-31817.json) (`2024-04-08T13:15:09.030`)
|
|
||||||
- [CVE-2024-3439](CVE-2024/CVE-2024-34xx/CVE-2024-3439.json) (`2024-04-08T12:15:08.220`)
|
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `1`
|
Recently modified CVEs: `0`
|
||||||
|
|
||||||
- [CVE-2024-24746](CVE-2024/CVE-2024-247xx/CVE-2024-24746.json) (`2024-04-08T12:15:08.097`)
|
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
50
_state.csv
50
_state.csv
@ -47842,7 +47842,7 @@ CVE-2011-10002,0,0,2f5c79da9c186910a82db4a5f14dfebcd7206e31e98b22c79e42fe0bba7e3
|
|||||||
CVE-2011-10003,0,0,2026c4079e74eac5bfc9311e86e7ce9f21d964d0e6b0bc94b7e309537efd938f,2024-03-21T02:20:00.170000
|
CVE-2011-10003,0,0,2026c4079e74eac5bfc9311e86e7ce9f21d964d0e6b0bc94b7e309537efd938f,2024-03-21T02:20:00.170000
|
||||||
CVE-2011-10004,0,0,a2a10f2ec673334b258022d25977603fbd2e23338523a3a9724f67f9ed890da9,2024-03-21T02:20:00.270000
|
CVE-2011-10004,0,0,a2a10f2ec673334b258022d25977603fbd2e23338523a3a9724f67f9ed890da9,2024-03-21T02:20:00.270000
|
||||||
CVE-2011-10005,0,0,1da7e8a59e4a8fdf077810678087b965270fa6613ffcc057ae3b57793ef6211c,2024-03-21T02:20:00.380000
|
CVE-2011-10005,0,0,1da7e8a59e4a8fdf077810678087b965270fa6613ffcc057ae3b57793ef6211c,2024-03-21T02:20:00.380000
|
||||||
CVE-2011-10006,1,1,9c453bd948e612439d9a5beed01270f23be1480b503617daa0044d0a60613089,2024-04-08T13:15:07.680000
|
CVE-2011-10006,0,0,9c453bd948e612439d9a5beed01270f23be1480b503617daa0044d0a60613089,2024-04-08T13:15:07.680000
|
||||||
CVE-2011-1001,0,0,02dd2cee837f6a4c96181392eb052369d2a2c6de4f5565315e208a9142403d4f,2023-11-07T02:06:55.477000
|
CVE-2011-1001,0,0,02dd2cee837f6a4c96181392eb052369d2a2c6de4f5565315e208a9142403d4f,2023-11-07T02:06:55.477000
|
||||||
CVE-2011-1002,0,0,6fb40ee3e364eb8cc65e130b94fa70b6c238e9fb08dfc24da9c1556946b502f3,2023-12-22T18:19:10.320000
|
CVE-2011-1002,0,0,6fb40ee3e364eb8cc65e130b94fa70b6c238e9fb08dfc24da9c1556946b502f3,2023-12-22T18:19:10.320000
|
||||||
CVE-2011-1003,0,0,45b3cc8d5f86e0bed0f44908b808a698e5d46ecd8842a09f7107a04ab2204486,2023-11-07T02:06:55.620000
|
CVE-2011-1003,0,0,45b3cc8d5f86e0bed0f44908b808a698e5d46ecd8842a09f7107a04ab2204486,2023-11-07T02:06:55.620000
|
||||||
@ -65722,7 +65722,7 @@ CVE-2014-125107,0,0,bfd9ca046914604ad337b831020bd7921670934f51aae3a46e59b5001d11
|
|||||||
CVE-2014-125108,0,0,75d9b54cbcabe9921aa612e467918de22b2b2197478812f0999a3ba60991df6d,2024-03-21T02:22:56.403000
|
CVE-2014-125108,0,0,75d9b54cbcabe9921aa612e467918de22b2b2197478812f0999a3ba60991df6d,2024-03-21T02:22:56.403000
|
||||||
CVE-2014-125109,0,0,01e9c5c239bc7b6c0a09a8f4a78ac7c3d3ef7fc615bf5f269037c53c3dacdfd0,2024-03-21T02:22:56.497000
|
CVE-2014-125109,0,0,01e9c5c239bc7b6c0a09a8f4a78ac7c3d3ef7fc615bf5f269037c53c3dacdfd0,2024-03-21T02:22:56.497000
|
||||||
CVE-2014-125110,0,0,f90a53533485545a5c34422270bdd6687de2a73e005010b68c1b47f1274785fb,2024-04-01T01:12:59.077000
|
CVE-2014-125110,0,0,f90a53533485545a5c34422270bdd6687de2a73e005010b68c1b47f1274785fb,2024-04-01T01:12:59.077000
|
||||||
CVE-2014-125111,1,1,94d52bcaed270fe5e955ea11a6682236410ef477d216b2eeb752211264b81b38,2024-04-08T13:15:07.940000
|
CVE-2014-125111,0,0,94d52bcaed270fe5e955ea11a6682236410ef477d216b2eeb752211264b81b38,2024-04-08T13:15:07.940000
|
||||||
CVE-2014-1252,0,0,5c1bf4726c5cb198c1167d9c7c184154587e8b0681d0d74b1a4f02ba2dd131da,2017-08-29T01:34:24.123000
|
CVE-2014-1252,0,0,5c1bf4726c5cb198c1167d9c7c184154587e8b0681d0d74b1a4f02ba2dd131da,2017-08-29T01:34:24.123000
|
||||||
CVE-2014-1253,0,0,d1f3d585a5f0525543d475f077ce5dc5cee7d692ed4fb1c164ed31f81a853a70,2015-11-02T17:49:20.727000
|
CVE-2014-1253,0,0,d1f3d585a5f0525543d475f077ce5dc5cee7d692ed4fb1c164ed31f81a853a70,2015-11-02T17:49:20.727000
|
||||||
CVE-2014-1254,0,0,34461d8604e0415bfe62fdf5cf0a4343a8530eaa4e39be23841e494cef0c9dbb,2014-02-27T13:50:25.627000
|
CVE-2014-1254,0,0,34461d8604e0415bfe62fdf5cf0a4343a8530eaa4e39be23841e494cef0c9dbb,2014-02-27T13:50:25.627000
|
||||||
@ -207759,7 +207759,7 @@ CVE-2022-43212,0,0,bd8462c32cea228c2af7c2be89a884392a96230646f83c3ab91fabc7177b6
|
|||||||
CVE-2022-43213,0,0,49445923691b8afb2bb11c0e852bfd102be60f738be6ba8f0b1d60993d03b781,2023-11-07T03:53:44.070000
|
CVE-2022-43213,0,0,49445923691b8afb2bb11c0e852bfd102be60f738be6ba8f0b1d60993d03b781,2023-11-07T03:53:44.070000
|
||||||
CVE-2022-43214,0,0,2a2257063c7e6ce1c215f52d0028d12e398ed621a33a7e16b20bf1cc96792ddc,2023-11-07T03:53:44.267000
|
CVE-2022-43214,0,0,2a2257063c7e6ce1c215f52d0028d12e398ed621a33a7e16b20bf1cc96792ddc,2023-11-07T03:53:44.267000
|
||||||
CVE-2022-43215,0,0,846f8b9f3d1d79c7f0c81dfba005b4b8767aa7739fc4d48bb58d8f8d1834936b,2023-11-07T03:53:44.453000
|
CVE-2022-43215,0,0,846f8b9f3d1d79c7f0c81dfba005b4b8767aa7739fc4d48bb58d8f8d1834936b,2023-11-07T03:53:44.453000
|
||||||
CVE-2022-43216,1,1,128153a65fb4464b5924996a38bb5a662e7d4b74f1aee15cf4658cd5a96fe98c,2024-04-08T12:15:08.017000
|
CVE-2022-43216,0,0,128153a65fb4464b5924996a38bb5a662e7d4b74f1aee15cf4658cd5a96fe98c,2024-04-08T12:15:08.017000
|
||||||
CVE-2022-4322,0,0,64d226b5e67e1a38b354f047a2d45500be1924b5886439dbb2eebeb01e8a818a,2023-11-07T03:57:32.157000
|
CVE-2022-4322,0,0,64d226b5e67e1a38b354f047a2d45500be1924b5886439dbb2eebeb01e8a818a,2023-11-07T03:57:32.157000
|
||||||
CVE-2022-43221,0,0,f34353bfd6d5920cdcc1ad66435dfcbdc8f8231d58b412b25e5de8371fbf0af9,2022-11-02T14:35:09.283000
|
CVE-2022-43221,0,0,f34353bfd6d5920cdcc1ad66435dfcbdc8f8231d58b412b25e5de8371fbf0af9,2022-11-02T14:35:09.283000
|
||||||
CVE-2022-43222,0,0,0435a2ca3ade7910094cffee0fe15850b30e2a88fa659e83d008125c1f16f00c,2022-11-02T14:37:33.047000
|
CVE-2022-43222,0,0,0435a2ca3ade7910094cffee0fe15850b30e2a88fa659e83d008125c1f16f00c,2022-11-02T14:37:33.047000
|
||||||
@ -241558,7 +241558,7 @@ CVE-2024-24740,0,0,94627927950e034fe009e1b56943190fe0270770418d88376117f7eb948d7
|
|||||||
CVE-2024-24741,0,0,b36526d12028f9f0a272c640e04888cda254a4c78be623b67c24d416de3ba4c0,2024-02-13T14:01:40.577000
|
CVE-2024-24741,0,0,b36526d12028f9f0a272c640e04888cda254a4c78be623b67c24d416de3ba4c0,2024-02-13T14:01:40.577000
|
||||||
CVE-2024-24742,0,0,52b6b6ee7bccac207ad1f85b8052a556cad122f010bbc53b1420d8442c2340f2,2024-02-13T14:01:40.577000
|
CVE-2024-24742,0,0,52b6b6ee7bccac207ad1f85b8052a556cad122f010bbc53b1420d8442c2340f2,2024-02-13T14:01:40.577000
|
||||||
CVE-2024-24743,0,0,0f9fe8c46f95fe6a826ca3990c6a9cc5f65190a01cad4e6f6e9f271c18043aaf,2024-02-13T14:01:40.577000
|
CVE-2024-24743,0,0,0f9fe8c46f95fe6a826ca3990c6a9cc5f65190a01cad4e6f6e9f271c18043aaf,2024-02-13T14:01:40.577000
|
||||||
CVE-2024-24746,0,1,4be3448e057b37bfcd483cbfe96ec1381a2a9b8db1bd6b11b515e6b66b68d810,2024-04-08T12:15:08.097000
|
CVE-2024-24746,0,0,4be3448e057b37bfcd483cbfe96ec1381a2a9b8db1bd6b11b515e6b66b68d810,2024-04-08T12:15:08.097000
|
||||||
CVE-2024-24747,0,0,f1a9181559802764d3abc2532f673fd70e99148bf526b7e772b90a95095b418a,2024-02-09T15:18:00.510000
|
CVE-2024-24747,0,0,f1a9181559802764d3abc2532f673fd70e99148bf526b7e772b90a95095b418a,2024-02-09T15:18:00.510000
|
||||||
CVE-2024-24748,0,0,ecaeb1145f78c27b3263c7d08a914384649823870ed552d13ac62854d31ce79b,2024-03-17T22:38:29.433000
|
CVE-2024-24748,0,0,ecaeb1145f78c27b3263c7d08a914384649823870ed552d13ac62854d31ce79b,2024-03-17T22:38:29.433000
|
||||||
CVE-2024-2475,0,0,217b3852eba1552a23ac999c983aecc21d18a764f179fbfb3a08ea63fa4dac64,2024-03-29T12:45:02.937000
|
CVE-2024-2475,0,0,217b3852eba1552a23ac999c983aecc21d18a764f179fbfb3a08ea63fa4dac64,2024-03-29T12:45:02.937000
|
||||||
@ -241774,6 +241774,7 @@ CVE-2024-25106,0,0,8dd509f504f26480381227e2c04ae3a9349d520b35ffd468656ee448e39af
|
|||||||
CVE-2024-25107,0,0,992c3cc86b9f4e37cd07cf04dd6b07a615d04dcf9532b8285a434870940db3c5,2024-02-15T18:52:25.613000
|
CVE-2024-25107,0,0,992c3cc86b9f4e37cd07cf04dd6b07a615d04dcf9532b8285a434870940db3c5,2024-02-15T18:52:25.613000
|
||||||
CVE-2024-25108,0,0,2f3b0912c45a14bc4609391cde835a7bde0bd98f58e5cc253a1a3a5d46e14714,2024-02-12T20:39:09.773000
|
CVE-2024-25108,0,0,2f3b0912c45a14bc4609391cde835a7bde0bd98f58e5cc253a1a3a5d46e14714,2024-02-12T20:39:09.773000
|
||||||
CVE-2024-25109,0,0,66bef0024d89c0196f311e07e8ca5885fe47e2eb23f582eff05d8874e7ab5e40,2024-02-11T22:29:15.837000
|
CVE-2024-25109,0,0,66bef0024d89c0196f311e07e8ca5885fe47e2eb23f582eff05d8874e7ab5e40,2024-02-11T22:29:15.837000
|
||||||
|
CVE-2024-2511,1,1,7ac7d160101e52de6ef2d1b1fa4b88240b9ae386337efbf8e31231af77b9bffe,2024-04-08T14:15:07.660000
|
||||||
CVE-2024-25110,0,0,1882d1c872d6fb46fba6f5e40e671a2fda6881ec6c33fd95f706ae7cf820760c,2024-02-12T20:39:09.773000
|
CVE-2024-25110,0,0,1882d1c872d6fb46fba6f5e40e671a2fda6881ec6c33fd95f706ae7cf820760c,2024-02-12T20:39:09.773000
|
||||||
CVE-2024-25111,0,0,f72e8e44455321d1ed6e80f096ea71e33de3e8d0ccd8f6d4c6adc0c0a3546f5f,2024-03-06T21:42:48.053000
|
CVE-2024-25111,0,0,f72e8e44455321d1ed6e80f096ea71e33de3e8d0ccd8f6d4c6adc0c0a3546f5f,2024-03-06T21:42:48.053000
|
||||||
CVE-2024-25112,0,0,9f92b56982d5d0e159eb7030e033a87c46cac6fe6908722221c7e2c374361051,2024-02-13T14:01:40.577000
|
CVE-2024-25112,0,0,9f92b56982d5d0e159eb7030e033a87c46cac6fe6908722221c7e2c374361051,2024-02-13T14:01:40.577000
|
||||||
@ -242483,7 +242484,7 @@ CVE-2024-26557,0,0,413b34482d1eed582f272b955524fa71f7b68414d25ad46ae764ef2e2b341
|
|||||||
CVE-2024-26559,0,0,32dd037e107446e11601c6ddb83598fc34f3ebdb48b667f29294eba708b9e4c1,2024-02-29T13:49:47.277000
|
CVE-2024-26559,0,0,32dd037e107446e11601c6ddb83598fc34f3ebdb48b667f29294eba708b9e4c1,2024-02-29T13:49:47.277000
|
||||||
CVE-2024-2656,0,0,6b1e617671c5db4410a66b02a7ae4562c59aef6d1d72bcdc3b2418b06c13ceed,2024-04-06T04:15:11.030000
|
CVE-2024-2656,0,0,6b1e617671c5db4410a66b02a7ae4562c59aef6d1d72bcdc3b2418b06c13ceed,2024-04-06T04:15:11.030000
|
||||||
CVE-2024-26566,0,0,e082212a38f258b5c22bdd7daa5a29191a5e851b4c959cb2f66848d27d20d8bb,2024-03-07T13:52:27.110000
|
CVE-2024-26566,0,0,e082212a38f258b5c22bdd7daa5a29191a5e851b4c959cb2f66848d27d20d8bb,2024-03-07T13:52:27.110000
|
||||||
CVE-2024-26574,1,1,cbc9f0294f6e683059540a942a6e167b4d20fa58f67b2cbe636ed3c4b8e5071d,2024-04-08T12:15:08.167000
|
CVE-2024-26574,0,0,cbc9f0294f6e683059540a942a6e167b4d20fa58f67b2cbe636ed3c4b8e5071d,2024-04-08T12:15:08.167000
|
||||||
CVE-2024-26577,0,0,eb994672bf510d158b4978f43b0d7e0594f22405d228a7c909ba4da4498cc451,2024-03-27T12:29:30.307000
|
CVE-2024-26577,0,0,eb994672bf510d158b4978f43b0d7e0594f22405d228a7c909ba4da4498cc451,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-26578,0,0,631d617cd0985d9923eed32b0cb4b9e9025809830b6a3ca2ef1a468d4f2a7124,2024-02-22T19:07:27.197000
|
CVE-2024-26578,0,0,631d617cd0985d9923eed32b0cb4b9e9025809830b6a3ca2ef1a468d4f2a7124,2024-02-22T19:07:27.197000
|
||||||
CVE-2024-26580,0,0,495279035de581ec6008f44dc7438add36c8c374f59c2ede086a388e56fdb00a,2024-03-06T15:18:08.093000
|
CVE-2024-26580,0,0,495279035de581ec6008f44dc7438add36c8c374f59c2ede086a388e56fdb00a,2024-03-06T15:18:08.093000
|
||||||
@ -243126,7 +243127,7 @@ CVE-2024-28053,0,0,c90f3b62964e2e2422d9b5798f17f1825dc5ae41ec90f71b2b9fe7b9e8ea4
|
|||||||
CVE-2024-28054,0,0,b289eaa8f221cef12d20f4d7c4d850be722c706b733d8c81d770795eac46dd81,2024-03-23T03:15:11.510000
|
CVE-2024-28054,0,0,b289eaa8f221cef12d20f4d7c4d850be722c706b733d8c81d770795eac46dd81,2024-03-23T03:15:11.510000
|
||||||
CVE-2024-2806,0,0,31a1a52b37b2e720eae0233b1b19dee00c5a6dd1df73e31128b38dde57d091e7,2024-03-26T03:11:41.880000
|
CVE-2024-2806,0,0,31a1a52b37b2e720eae0233b1b19dee00c5a6dd1df73e31128b38dde57d091e7,2024-03-26T03:11:41.880000
|
||||||
CVE-2024-28065,0,0,860e1bfe6126cf5c07cb1eddc7c9671f368193a1540ce3473fdd211437faae95,2024-04-05T18:15:09.307000
|
CVE-2024-28065,0,0,860e1bfe6126cf5c07cb1eddc7c9671f368193a1540ce3473fdd211437faae95,2024-04-05T18:15:09.307000
|
||||||
CVE-2024-28066,1,1,a7550c1400557bb44c26136e48a89d5f33f60881e1d442b225a7d956f47349fd,2024-04-08T13:15:08.247000
|
CVE-2024-28066,0,0,a7550c1400557bb44c26136e48a89d5f33f60881e1d442b225a7d956f47349fd,2024-04-08T13:15:08.247000
|
||||||
CVE-2024-28069,0,0,99a57a9955c5ed5463e7c560b95e0a17dfa2789ec3c024f2825003d476d4b80d,2024-03-17T22:38:29.433000
|
CVE-2024-28069,0,0,99a57a9955c5ed5463e7c560b95e0a17dfa2789ec3c024f2825003d476d4b80d,2024-03-17T22:38:29.433000
|
||||||
CVE-2024-2807,0,0,47b8a7021ebbb15acc350203dd3081726f7b96c650b8d998414fd135c1027f2f,2024-03-26T03:12:50.837000
|
CVE-2024-2807,0,0,47b8a7021ebbb15acc350203dd3081726f7b96c650b8d998414fd135c1027f2f,2024-03-26T03:12:50.837000
|
||||||
CVE-2024-28070,0,0,c8eeec88fa6e3b91036a4eadc63dd921f090ad52309176e7af22a570b911aeac,2024-03-17T22:38:29.433000
|
CVE-2024-28070,0,0,c8eeec88fa6e3b91036a4eadc63dd921f090ad52309176e7af22a570b911aeac,2024-03-17T22:38:29.433000
|
||||||
@ -243271,7 +243272,7 @@ CVE-2024-28323,0,0,2aeca3d06db49b1f3cf193f09da3283ca9cea9d02fb53cf2b91c906fc8c5a
|
|||||||
CVE-2024-28335,0,0,a217e219718a353480ebe6dbe5087fa485efbd4ed754c44582430f96bbfa9ecc,2024-03-27T12:29:30.307000
|
CVE-2024-28335,0,0,a217e219718a353480ebe6dbe5087fa485efbd4ed754c44582430f96bbfa9ecc,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-28338,0,0,3ea1d4c3a66b67172d60399e17da8570aa15fd5d4f0e652ed0ed26bd90bdb1be,2024-03-12T17:46:17.273000
|
CVE-2024-28338,0,0,3ea1d4c3a66b67172d60399e17da8570aa15fd5d4f0e652ed0ed26bd90bdb1be,2024-03-12T17:46:17.273000
|
||||||
CVE-2024-28339,0,0,eb06dcbba6c6b866b3957a0b1f6af1817f1ee37fb8932a4cb080c5ef814ab185,2024-03-12T17:46:17.273000
|
CVE-2024-28339,0,0,eb06dcbba6c6b866b3957a0b1f6af1817f1ee37fb8932a4cb080c5ef814ab185,2024-03-12T17:46:17.273000
|
||||||
CVE-2024-2834,1,1,e702eb5e5c0efcea19efc921d419d1429541767645d0fe24466de2412b9cf268,2024-04-08T13:15:08.303000
|
CVE-2024-2834,0,0,e702eb5e5c0efcea19efc921d419d1429541767645d0fe24466de2412b9cf268,2024-04-08T13:15:08.303000
|
||||||
CVE-2024-28340,0,0,b694df29079c0854c0447fab99b606db18330fac912bd90c8918c409f1ded072,2024-03-12T17:46:17.273000
|
CVE-2024-28340,0,0,b694df29079c0854c0447fab99b606db18330fac912bd90c8918c409f1ded072,2024-03-12T17:46:17.273000
|
||||||
CVE-2024-28353,0,0,f5d0b12a1e8a931f5519e51563d18b142745d332ff192847a7afb495f17e2dd3,2024-03-15T12:53:06.423000
|
CVE-2024-28353,0,0,f5d0b12a1e8a931f5519e51563d18b142745d332ff192847a7afb495f17e2dd3,2024-03-15T12:53:06.423000
|
||||||
CVE-2024-28354,0,0,b6680336ce24c3665bbea7456a49c23f2010021d3a256de9fa063452e0cf7d3a,2024-03-15T12:53:06.423000
|
CVE-2024-28354,0,0,b6680336ce24c3665bbea7456a49c23f2010021d3a256de9fa063452e0cf7d3a,2024-03-15T12:53:06.423000
|
||||||
@ -243392,6 +243393,7 @@ CVE-2024-28713,0,0,beab16cae2dae6cd08028a095390b29624a6437ed474d84784c32091c71ec
|
|||||||
CVE-2024-28714,0,0,05d12d8ac80645ded00d1ead25c51baa98cf4af4d5a078fc724fffec6f7925ec,2024-03-29T12:45:02.937000
|
CVE-2024-28714,0,0,05d12d8ac80645ded00d1ead25c51baa98cf4af4d5a078fc724fffec6f7925ec,2024-03-29T12:45:02.937000
|
||||||
CVE-2024-28715,0,0,054dc6dc725c244acb835446cab8d82270f7d8ffd8311eb9aca1ba238d62a38d,2024-03-20T13:00:16.367000
|
CVE-2024-28715,0,0,054dc6dc725c244acb835446cab8d82270f7d8ffd8311eb9aca1ba238d62a38d,2024-03-20T13:00:16.367000
|
||||||
CVE-2024-2873,0,0,38b44d61d3230fcaba1c551f8073fe8dda4eadd0cd50d8705b668e3c4529f628,2024-03-26T12:55:05.010000
|
CVE-2024-2873,0,0,38b44d61d3230fcaba1c551f8073fe8dda4eadd0cd50d8705b668e3c4529f628,2024-03-26T12:55:05.010000
|
||||||
|
CVE-2024-28732,1,1,2a8a82892f5ff982d8c39eab88daf82e9eaf93a7fe90e90d01072dc1a7f77cc6,2024-04-08T14:15:07.600000
|
||||||
CVE-2024-28734,0,0,f4687488b267ac163f3e0d4b9d3eb38f6f5a041c19b985a560624c627a7f4e16,2024-04-01T21:15:33.200000
|
CVE-2024-28734,0,0,f4687488b267ac163f3e0d4b9d3eb38f6f5a041c19b985a560624c627a7f4e16,2024-04-01T21:15:33.200000
|
||||||
CVE-2024-28735,0,0,27a3fb731c930af76bd97477e46fd57873e1d90373135fa3e190a08c95c9db47,2024-04-01T21:15:37.360000
|
CVE-2024-28735,0,0,27a3fb731c930af76bd97477e46fd57873e1d90373135fa3e190a08c95c9db47,2024-04-01T21:15:37.360000
|
||||||
CVE-2024-28741,0,0,1678ed4de6f62b62747c7cf1ef99a3f3ff7e7dec4db75414c76ffae859a52b6b,2024-04-06T19:15:07.247000
|
CVE-2024-28741,0,0,1678ed4de6f62b62747c7cf1ef99a3f3ff7e7dec4db75414c76ffae859a52b6b,2024-04-06T19:15:07.247000
|
||||||
@ -243934,6 +243936,7 @@ CVE-2024-30263,0,0,865e3a568432a1e114cdb349ba49e79d9bbc223ad67092921d5af173a6615
|
|||||||
CVE-2024-30264,0,0,a36afcbf82744a440a1fca3c8df613ac17f10025eaa77ba35cbe326ee3634d26,2024-04-05T12:40:52.763000
|
CVE-2024-30264,0,0,a36afcbf82744a440a1fca3c8df613ac17f10025eaa77ba35cbe326ee3634d26,2024-04-05T12:40:52.763000
|
||||||
CVE-2024-30265,0,0,8b7bd77316a7922f3fb99eedf42325c9dfd214ba3a070dae26dd8c71a6913b9c,2024-04-04T12:48:41.700000
|
CVE-2024-30265,0,0,8b7bd77316a7922f3fb99eedf42325c9dfd214ba3a070dae26dd8c71a6913b9c,2024-04-04T12:48:41.700000
|
||||||
CVE-2024-30266,0,0,e3c467c9914201aad848d0a5b4b17739ce57c9b602514a7cf905d903659d55fa,2024-04-04T16:33:06.610000
|
CVE-2024-30266,0,0,e3c467c9914201aad848d0a5b4b17739ce57c9b602514a7cf905d903659d55fa,2024-04-04T16:33:06.610000
|
||||||
|
CVE-2024-30269,1,1,055916305bd660d9b64d72a16185c4d580145377dd39425d064d3053e2a64f84,2024-04-08T15:15:07.820000
|
||||||
CVE-2024-30270,0,0,1d63c3afc5f402042a52c95204320e8698a660fcf024b4b1cd2dbe82419521bf,2024-04-05T12:40:52.763000
|
CVE-2024-30270,0,0,1d63c3afc5f402042a52c95204320e8698a660fcf024b4b1cd2dbe82419521bf,2024-04-05T12:40:52.763000
|
||||||
CVE-2024-3030,0,0,88c29228ef56d61e184f00d5d8d99ea5dd9800435eeb42a07f389309c9f00688,2024-04-04T12:48:41.700000
|
CVE-2024-3030,0,0,88c29228ef56d61e184f00d5d8d99ea5dd9800435eeb42a07f389309c9f00688,2024-04-04T12:48:41.700000
|
||||||
CVE-2024-30322,0,0,82127178dd2c4390457a625b1b802dc21960ed844c23f33ac3f61e8d8c162a4f,2024-04-03T17:24:18.150000
|
CVE-2024-30322,0,0,82127178dd2c4390457a625b1b802dc21960ed844c23f33ac3f61e8d8c162a4f,2024-04-03T17:24:18.150000
|
||||||
@ -244261,6 +244264,7 @@ CVE-2024-3116,0,0,442c5653c6cfe9feb902808d7a86b402a42b6c98e54ac39c11d1d128b28eb1
|
|||||||
CVE-2024-3117,0,0,136fb5551ef6dfa1bf4e08424db43ed91a6bb8dd83f3d6ce39a5378e07bb201b,2024-04-01T01:12:59.077000
|
CVE-2024-3117,0,0,136fb5551ef6dfa1bf4e08424db43ed91a6bb8dd83f3d6ce39a5378e07bb201b,2024-04-01T01:12:59.077000
|
||||||
CVE-2024-3118,0,0,f6c34b2c6946d5fdb10aa55aa3b524d7a78d6b6fed9a90242c451ed5ef8e29f1,2024-04-01T01:12:59.077000
|
CVE-2024-3118,0,0,f6c34b2c6946d5fdb10aa55aa3b524d7a78d6b6fed9a90242c451ed5ef8e29f1,2024-04-01T01:12:59.077000
|
||||||
CVE-2024-31204,0,0,d77d8a78ba72f2a1144250dcbd3aeb2b57d00c9418a1c9337730d8bd71684606,2024-04-05T12:40:52.763000
|
CVE-2024-31204,0,0,d77d8a78ba72f2a1144250dcbd3aeb2b57d00c9418a1c9337730d8bd71684606,2024-04-05T12:40:52.763000
|
||||||
|
CVE-2024-31205,1,1,a6d36033e64309ba1256ccf74dd3497e30901befe8a78ff0f29c1f7440c2ef65,2024-04-08T15:15:08.023000
|
||||||
CVE-2024-31206,0,0,bd1cbc8a5901cc2b410cb59c86ef8c814546918b6efc52403de5ae308d36d9dc,2024-04-05T12:40:52.763000
|
CVE-2024-31206,0,0,bd1cbc8a5901cc2b410cb59c86ef8c814546918b6efc52403de5ae308d36d9dc,2024-04-05T12:40:52.763000
|
||||||
CVE-2024-31207,0,0,af1a3137415a749d0a1549c9f6fa25303b24e194f3861bc2095545bb707985a2,2024-04-04T16:33:06.610000
|
CVE-2024-31207,0,0,af1a3137415a749d0a1549c9f6fa25303b24e194f3861bc2095545bb707985a2,2024-04-04T16:33:06.610000
|
||||||
CVE-2024-31209,0,0,dc7f150a1f8931f337c3d30121f71937562fb9b370a799204e5d75b796fcdc02,2024-04-04T16:33:06.610000
|
CVE-2024-31209,0,0,dc7f150a1f8931f337c3d30121f71937562fb9b370a799204e5d75b796fcdc02,2024-04-04T16:33:06.610000
|
||||||
@ -244271,6 +244275,7 @@ CVE-2024-31213,0,0,19a0c401ca67e66e86518628c3bc67a57443f6d2510fb0e2e0eb2b07016e3
|
|||||||
CVE-2024-31215,0,0,34a0a231f3970708fb3e5686678c657f48cd1675d27ab51eed18f5cf652dec67,2024-04-04T16:33:06.610000
|
CVE-2024-31215,0,0,34a0a231f3970708fb3e5686678c657f48cd1675d27ab51eed18f5cf652dec67,2024-04-04T16:33:06.610000
|
||||||
CVE-2024-31218,0,0,2cc0c7155891260a2e304c7f7c9b9f864ea2df678ab0837aa91ce6bd7b753c89,2024-04-05T15:15:07.863000
|
CVE-2024-31218,0,0,2cc0c7155891260a2e304c7f7c9b9f864ea2df678ab0837aa91ce6bd7b753c89,2024-04-05T15:15:07.863000
|
||||||
CVE-2024-31220,0,0,8d197f4e82630274399fe6c2cf5db685f8a9989529d5618ae3648323da3da3fe,2024-04-05T15:15:08.060000
|
CVE-2024-31220,0,0,8d197f4e82630274399fe6c2cf5db685f8a9989529d5618ae3648323da3da3fe,2024-04-05T15:15:08.060000
|
||||||
|
CVE-2024-31221,1,1,db08706f0e4cf0a4b15a3fb27b6262d35e75ecb4a425ad19e41547e21bfb7e0c,2024-04-08T15:15:08.207000
|
||||||
CVE-2024-31233,0,0,01776c48338e2c3eab6d14190a3411779ae36b37bbb141038e67728efaf69c9a,2024-04-07T18:15:08.797000
|
CVE-2024-31233,0,0,01776c48338e2c3eab6d14190a3411779ae36b37bbb141038e67728efaf69c9a,2024-04-07T18:15:08.797000
|
||||||
CVE-2024-31234,0,0,1fa31637e187c994b5d6f8d31633b9c52245dc14b1ef75120de91cf881de99c2,2024-04-07T18:15:09
|
CVE-2024-31234,0,0,1fa31637e187c994b5d6f8d31633b9c52245dc14b1ef75120de91cf881de99c2,2024-04-07T18:15:09
|
||||||
CVE-2024-31236,0,0,e30316997648dd95fa701bb0da95fa4c9d6a2e26dca12b212bba28299a961fd8,2024-04-07T18:15:09.197000
|
CVE-2024-31236,0,0,e30316997648dd95fa701bb0da95fa4c9d6a2e26dca12b212bba28299a961fd8,2024-04-07T18:15:09.197000
|
||||||
@ -244333,19 +244338,19 @@ CVE-2024-3165,0,0,de9c55d425cf1712b174cf5953c3fab2e18950a6202399f31519128938dc30
|
|||||||
CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818bf,2024-04-04T12:48:41.700000
|
CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818bf,2024-04-04T12:48:41.700000
|
||||||
CVE-2024-3179,0,0,5abb24f6a5051585dee8d043e9230e5c2a9202caf7e3c5044373b856d11a8a98,2024-04-04T12:48:41.700000
|
CVE-2024-3179,0,0,5abb24f6a5051585dee8d043e9230e5c2a9202caf7e3c5044373b856d11a8a98,2024-04-04T12:48:41.700000
|
||||||
CVE-2024-3180,0,0,cb7e6ecd5dde884356237a2b2dbf7b6ac67d07b2baecdd8da937f602eadd96a4,2024-04-04T12:48:41.700000
|
CVE-2024-3180,0,0,cb7e6ecd5dde884356237a2b2dbf7b6ac67d07b2baecdd8da937f602eadd96a4,2024-04-04T12:48:41.700000
|
||||||
CVE-2024-31805,1,1,03535f64ad6f6ac5f0b4d3b831ce8fbc8f8ece7dff83b25c064759625107e892,2024-04-08T13:15:08.500000
|
CVE-2024-31805,0,0,03535f64ad6f6ac5f0b4d3b831ce8fbc8f8ece7dff83b25c064759625107e892,2024-04-08T13:15:08.500000
|
||||||
CVE-2024-31806,1,1,e4a95aff9ed6df07ea8ac844857c48795cf21a7673643b2bdd562243e9f3b0ff,2024-04-08T13:15:08.550000
|
CVE-2024-31806,0,0,e4a95aff9ed6df07ea8ac844857c48795cf21a7673643b2bdd562243e9f3b0ff,2024-04-08T13:15:08.550000
|
||||||
CVE-2024-31807,1,1,a00ed81c73c7f6fca07b7014930b8c335957bdb6642be620b49ceae240c61bf4,2024-04-08T13:15:08.603000
|
CVE-2024-31807,0,0,a00ed81c73c7f6fca07b7014930b8c335957bdb6642be620b49ceae240c61bf4,2024-04-08T13:15:08.603000
|
||||||
CVE-2024-31808,1,1,57f81d0e75534c21c4194d1a7f49f39d5ff3b99761ec9585d5628d1c935e520a,2024-04-08T13:15:08.650000
|
CVE-2024-31808,0,0,57f81d0e75534c21c4194d1a7f49f39d5ff3b99761ec9585d5628d1c935e520a,2024-04-08T13:15:08.650000
|
||||||
CVE-2024-31809,1,1,ce5384c6bc2cd50fd589c7bee394d0dd06b431f579d578a104effe2c491dcf06,2024-04-08T13:15:08.700000
|
CVE-2024-31809,0,0,ce5384c6bc2cd50fd589c7bee394d0dd06b431f579d578a104effe2c491dcf06,2024-04-08T13:15:08.700000
|
||||||
CVE-2024-3181,0,0,19462f0bae052150ee3deea6a2833d73153169ade51a21a9a0ee903c88e94c7c,2024-04-04T12:48:41.700000
|
CVE-2024-3181,0,0,19462f0bae052150ee3deea6a2833d73153169ade51a21a9a0ee903c88e94c7c,2024-04-04T12:48:41.700000
|
||||||
CVE-2024-31811,1,1,a56ee0448e01073f2a88500262077cb3f92f9536366663a6c6036b0f9871942e,2024-04-08T13:15:08.750000
|
CVE-2024-31811,0,0,a56ee0448e01073f2a88500262077cb3f92f9536366663a6c6036b0f9871942e,2024-04-08T13:15:08.750000
|
||||||
CVE-2024-31812,1,1,cd66e32d28d34953870b28ab83a3e6818a458605c9bf58a2a2b21c9f97a24c42,2024-04-08T13:15:08.800000
|
CVE-2024-31812,0,0,cd66e32d28d34953870b28ab83a3e6818a458605c9bf58a2a2b21c9f97a24c42,2024-04-08T13:15:08.800000
|
||||||
CVE-2024-31813,1,1,c9894f35696abdc8404b1e2697c11574377d9950ba140374b62d8895d224c8f8,2024-04-08T13:15:08.840000
|
CVE-2024-31813,0,0,c9894f35696abdc8404b1e2697c11574377d9950ba140374b62d8895d224c8f8,2024-04-08T13:15:08.840000
|
||||||
CVE-2024-31814,1,1,eee8e2cc4502e2c6411251d705a601a5bfa063839c789135fd920fe995015226,2024-04-08T13:15:08.887000
|
CVE-2024-31814,0,0,eee8e2cc4502e2c6411251d705a601a5bfa063839c789135fd920fe995015226,2024-04-08T13:15:08.887000
|
||||||
CVE-2024-31815,1,1,dd6aac3cc20a47e3bf7bac069a64a57d58e00a168ee46569283cc16b211a4f3a,2024-04-08T13:15:08.937000
|
CVE-2024-31815,0,0,dd6aac3cc20a47e3bf7bac069a64a57d58e00a168ee46569283cc16b211a4f3a,2024-04-08T13:15:08.937000
|
||||||
CVE-2024-31816,1,1,b95351c7e817cf8e4f6ce9574bbef6cce660acea96f193da36bb21ae6cad7436,2024-04-08T13:15:08.987000
|
CVE-2024-31816,0,0,b95351c7e817cf8e4f6ce9574bbef6cce660acea96f193da36bb21ae6cad7436,2024-04-08T13:15:08.987000
|
||||||
CVE-2024-31817,1,1,937e9140614a26ae450030779571dff3a4b6d6c943e1661477bd9f951c156ad8,2024-04-08T13:15:09.030000
|
CVE-2024-31817,0,0,937e9140614a26ae450030779571dff3a4b6d6c943e1661477bd9f951c156ad8,2024-04-08T13:15:09.030000
|
||||||
CVE-2024-31848,0,0,6965f04cc86efd819ec97fa65a940af868313d4b9414d4c137bc5206ad729602,2024-04-05T18:15:09.360000
|
CVE-2024-31848,0,0,6965f04cc86efd819ec97fa65a940af868313d4b9414d4c137bc5206ad729602,2024-04-05T18:15:09.360000
|
||||||
CVE-2024-31849,0,0,ba19687c183971580d9b8978873bbf6d8219ba5de3f65dc5058b582de0f38692,2024-04-05T18:15:09.563000
|
CVE-2024-31849,0,0,ba19687c183971580d9b8978873bbf6d8219ba5de3f65dc5058b582de0f38692,2024-04-05T18:15:09.563000
|
||||||
CVE-2024-31850,0,0,4982070fceb832e31d5e30fb03a84954ccaa75a897ce5879a6b4f81a150e310c,2024-04-05T18:15:09.753000
|
CVE-2024-31850,0,0,4982070fceb832e31d5e30fb03a84954ccaa75a897ce5879a6b4f81a150e310c,2024-04-05T18:15:09.753000
|
||||||
@ -244447,4 +244452,9 @@ CVE-2024-3434,0,0,ca234f20211bb517f953b7f67ae3f10ab7d87d9990b0f4b049d3a839cf31dc
|
|||||||
CVE-2024-3436,0,0,e0e5ca3dd8c714d9a5e39a78035c324e727b4b3c8f911bb9e4a1189c878cbe35,2024-04-08T00:15:08.300000
|
CVE-2024-3436,0,0,e0e5ca3dd8c714d9a5e39a78035c324e727b4b3c8f911bb9e4a1189c878cbe35,2024-04-08T00:15:08.300000
|
||||||
CVE-2024-3437,0,0,123eb2c99d4357ae11fb4721846c8d14f1c5c5df0aa6b588d74123cc924c8ceb,2024-04-08T00:15:08.537000
|
CVE-2024-3437,0,0,123eb2c99d4357ae11fb4721846c8d14f1c5c5df0aa6b588d74123cc924c8ceb,2024-04-08T00:15:08.537000
|
||||||
CVE-2024-3438,0,0,6aa2babb713a9ff09398356e50b2cda9faed0e388dee6285a645928c2aca71c0,2024-04-08T11:15:50.310000
|
CVE-2024-3438,0,0,6aa2babb713a9ff09398356e50b2cda9faed0e388dee6285a645928c2aca71c0,2024-04-08T11:15:50.310000
|
||||||
CVE-2024-3439,1,1,69cc741ea655c4a2d89b68a8daf53cfa66f6de13bb1c1dcde6c854895f506c54,2024-04-08T12:15:08.220000
|
CVE-2024-3439,0,0,69cc741ea655c4a2d89b68a8daf53cfa66f6de13bb1c1dcde6c854895f506c54,2024-04-08T12:15:08.220000
|
||||||
|
CVE-2024-3440,1,1,effe0961510bad7e8c4ff018cfa0edf1ee22b6e3dca0f11cd720843b6e621572,2024-04-08T14:15:07.737000
|
||||||
|
CVE-2024-3441,1,1,8d5bbefefea6812fc49088025995bef976f75da71f1ba2c98279a63d9f20e4b8,2024-04-08T14:15:07.953000
|
||||||
|
CVE-2024-3442,1,1,9cc36f8f361a3d8960eaa6fc08e1e4540639d14611f1e55df640efc83188f693,2024-04-08T15:15:08.407000
|
||||||
|
CVE-2024-3443,1,1,c84c0ff8127a2896cfdad8c89089c5330f71dbb74239c5797b2db62ead1d2484,2024-04-08T15:15:08.623000
|
||||||
|
CVE-2024-3444,1,1,f3f0a7a83b7dee21ee32f2a842641df915e1807265b186dc1fd440ed4bdc6a3f,2024-04-08T15:15:08.833000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user