mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-04-08T16:00:37.564234+00:00
This commit is contained in:
parent
1b2352119c
commit
b27fa6bd93
36
CVE-2024/CVE-2024-25xx/CVE-2024-2511.json
Normal file
36
CVE-2024/CVE-2024-25xx/CVE-2024-2511.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-2511",
|
||||
"sourceIdentifier": "openssl-security@openssl.org",
|
||||
"published": "2024-04-08T14:15:07.660",
|
||||
"lastModified": "2024-04-08T14:15:07.660",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Issue summary: Some non-default TLS server configurations can cause unbounded\nmemory growth when processing TLSv1.3 sessions\n\nImpact summary: An attacker may exploit certain server configurations to trigger\nunbounded memory growth that would lead to a Denial of Service\n\nThis problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is\nbeing used (but not if early_data support is also configured and the default\nanti-replay protection is in use). In this case, under certain conditions, the\nsession cache can get into an incorrect state and it will fail to flush properly\nas it fills. The session cache will continue to grow in an unbounded manner. A\nmalicious client could deliberately create the scenario for this failure to\nforce a Denial of Service. It may also happen by accident in normal operation.\n\nThis issue only affects TLS servers supporting TLSv1.3. It does not affect TLS\nclients.\n\nThe FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL\n1.0.2 is also not affected by this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/openssl/openssl/commit/7e4d731b1c07201ad9374c1cd9ac5263bdf35bce",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openssl/openssl/commit/b52867a9f618bb955bed2a3ce3db4d4f97ed8e5d",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openssl/openssl/commit/e9d7083e241670332e0443da0f0d4ffb52829f08",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.openssl.org/openssl/extended-releases/commit/5f8d25770ae6437db119dfc951e207271a326640",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openssl.org/news/secadv/20240408.txt",
|
||||
"source": "openssl-security@openssl.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-287xx/CVE-2024-28732.json
Normal file
24
CVE-2024/CVE-2024-287xx/CVE-2024-28732.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-28732",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T14:15:07.600",
|
||||
"lastModified": "2024-04-08T14:15:07.600",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in OFPMatch in parser.py in Faucet SDN Ryu version 4.34, allows remote attackers to cause a denial of service (DoS) (infinite loop)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/ErodedElk/1133d64dde2d92393a065edc9b243792",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/faucetsdn/ryu/issues/188",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-302xx/CVE-2024-30269.json
Normal file
59
CVE-2024/CVE-2024-302xx/CVE-2024-30269.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-30269",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-08T15:15:07.820",
|
||||
"lastModified": "2024-04-08T15:15:07.820",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DataEase, an open source data visualization and analysis tool, has a database configuration information exposure vulnerability prior to version 2.5.0. Visiting the `/de2api/engine/getEngine;.js` path via a browser reveals that the platform's database configuration is returned. The vulnerability has been fixed in v2.5.0. No known workarounds are available aside from upgrading."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/dataease/dataease/releases/tag/v2.5.0",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/dataease/dataease/security/advisories/GHSA-8gvx-4qvj-6vv5",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-312xx/CVE-2024-31205.json
Normal file
59
CVE-2024/CVE-2024-312xx/CVE-2024-31205.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-31205",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-08T15:15:08.023",
|
||||
"lastModified": "2024-04-08T15:15:08.023",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Saleor is an e-commerce platform. Starting in version 3.10.0 and prior to versions 3.14.64, 3.15.39, 3.16.39, 3.17.35, 3.18.31, and 3.19.19, an attacker may bypass cross-set request forgery (CSRF) validation when calling refresh token mutation with empty string. When a user provides an empty string in `refreshToken` mutation, while the token persists in `JWT_REFRESH_TOKEN_COOKIE_NAME` cookie, application omits validation against CSRF token and returns valid access token. Versions 3.14.64, 3.15.39, 3.16.39, 3.17.35, 3.18.31, and 3.19.19 contain a patch for the issue. As a workaround, one may replace `saleor.graphql.account.mutations.authentication.refresh_token.py.get_refresh_token`. This will fix the issue, but be aware, that it returns `JWT_MISSING_TOKEN` instead of `JWT_INVALID_TOKEN`.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/saleor/saleor/commit/36699c6f5c99590d24f46e3d5c5b1a3c2fd072e7",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/saleor/saleor/security/advisories/GHSA-ff69-fwjf-3c9w",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2024/CVE-2024-312xx/CVE-2024-31221.json
Normal file
67
CVE-2024/CVE-2024-312xx/CVE-2024-31221.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2024-31221",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-08T15:15:08.207",
|
||||
"lastModified": "2024-04-08T15:15:08.207",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Sunshine is a self-hosted game stream host for Moonlight. Starting in version 0.10.0 and prior to version 0.23.0, after unpairing all devices in the web UI interface and then pairing only one device, all of the previously devices will be temporarily paired. Version 0.23.0 contains a patch for the issue. As a workaround, restarting Sunshine after unpairing all devices prevents the vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-384"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LizardByte/Sunshine/commit/b7aa8119f1471844dccdf73a8b6f7efc9baddb5e",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/LizardByte/Sunshine/issues/2305",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/LizardByte/Sunshine/pull/2365",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/LizardByte/Sunshine/security/advisories/GHSA-v8gw-jw28-v55m",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-34xx/CVE-2024-3440.json
Normal file
92
CVE-2024/CVE-2024-34xx/CVE-2024-3440.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3440",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-08T14:15:07.737",
|
||||
"lastModified": "2024-04-08T14:15:07.737",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Prison Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /Admin/edit_profile.php. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259693 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 5.8
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/fubxx/CVE/blob/main/PrisonManagementSystemSQL3.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259693",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259693",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.312207",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-34xx/CVE-2024-3441.json
Normal file
92
CVE-2024/CVE-2024-34xx/CVE-2024-3441.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3441",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-08T14:15:07.953",
|
||||
"lastModified": "2024-04-08T14:15:07.953",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Prison Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /Employee/edit-profile.php. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-259694 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/fubxx/CVE/blob/main/PrisonManagementSystemSQL4.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259694",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259694",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.312219",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-34xx/CVE-2024-3442.json
Normal file
92
CVE-2024/CVE-2024-34xx/CVE-2024-3442.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3442",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-08T15:15:08.407",
|
||||
"lastModified": "2024-04-08T15:15:08.407",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in SourceCodester Prison Management System 1.0. This affects an unknown part of the file /Employee/delete_leave.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259695."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/fubxx/CVE/blob/main/PrisonManagementSystemSQL5.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259695",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259695",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.312248",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-34xx/CVE-2024-3443.json
Normal file
92
CVE-2024/CVE-2024-34xx/CVE-2024-3443.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3443",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-08T15:15:08.623",
|
||||
"lastModified": "2024-04-08T15:15:08.623",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in SourceCodester Prison Management System 1.0. This vulnerability affects unknown code of the file /Employee/apply_leave.php. The manipulation of the argument txtstart_date/txtend_date leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259696."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zyairelai/CVE-submissions/blob/main/prison-xss.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259696",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259696",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.312285",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-34xx/CVE-2024-3444.json
Normal file
92
CVE-2024/CVE-2024-34xx/CVE-2024-3444.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3444",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-08T15:15:08.833",
|
||||
"lastModified": "2024-04-08T15:15:08.833",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Wangshen SecGate 3600 up to 20240408. It has been classified as critical. This affects an unknown part of the file /?g=net_pro_keyword_import_save. The manipulation of the argument reqfile leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259701 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 5.8
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/h0e4a0r1t/lLGcmVjGkR/blob/main/Wangshen%20SecGata%203600%20Firewall%20net_pro_keyword_import_save%20arbitrary%20file%20upload%20vulnerability.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259701",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259701",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.312293",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
40
README.md
40
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-08T14:00:39.840993+00:00
|
||||
2024-04-08T16:00:37.564234+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-08T13:15:09.030000+00:00
|
||||
2024-04-08T15:15:08.833000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,39 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
244449
|
||||
244459
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `19`
|
||||
Recently added CVEs: `10`
|
||||
|
||||
- [CVE-2011-10006](CVE-2011/CVE-2011-100xx/CVE-2011-10006.json) (`2024-04-08T13:15:07.680`)
|
||||
- [CVE-2014-125111](CVE-2014/CVE-2014-1251xx/CVE-2014-125111.json) (`2024-04-08T13:15:07.940`)
|
||||
- [CVE-2022-43216](CVE-2022/CVE-2022-432xx/CVE-2022-43216.json) (`2024-04-08T12:15:08.017`)
|
||||
- [CVE-2024-26574](CVE-2024/CVE-2024-265xx/CVE-2024-26574.json) (`2024-04-08T12:15:08.167`)
|
||||
- [CVE-2024-28066](CVE-2024/CVE-2024-280xx/CVE-2024-28066.json) (`2024-04-08T13:15:08.247`)
|
||||
- [CVE-2024-2834](CVE-2024/CVE-2024-28xx/CVE-2024-2834.json) (`2024-04-08T13:15:08.303`)
|
||||
- [CVE-2024-31805](CVE-2024/CVE-2024-318xx/CVE-2024-31805.json) (`2024-04-08T13:15:08.500`)
|
||||
- [CVE-2024-31806](CVE-2024/CVE-2024-318xx/CVE-2024-31806.json) (`2024-04-08T13:15:08.550`)
|
||||
- [CVE-2024-31807](CVE-2024/CVE-2024-318xx/CVE-2024-31807.json) (`2024-04-08T13:15:08.603`)
|
||||
- [CVE-2024-31808](CVE-2024/CVE-2024-318xx/CVE-2024-31808.json) (`2024-04-08T13:15:08.650`)
|
||||
- [CVE-2024-31809](CVE-2024/CVE-2024-318xx/CVE-2024-31809.json) (`2024-04-08T13:15:08.700`)
|
||||
- [CVE-2024-31811](CVE-2024/CVE-2024-318xx/CVE-2024-31811.json) (`2024-04-08T13:15:08.750`)
|
||||
- [CVE-2024-31812](CVE-2024/CVE-2024-318xx/CVE-2024-31812.json) (`2024-04-08T13:15:08.800`)
|
||||
- [CVE-2024-31813](CVE-2024/CVE-2024-318xx/CVE-2024-31813.json) (`2024-04-08T13:15:08.840`)
|
||||
- [CVE-2024-31814](CVE-2024/CVE-2024-318xx/CVE-2024-31814.json) (`2024-04-08T13:15:08.887`)
|
||||
- [CVE-2024-31815](CVE-2024/CVE-2024-318xx/CVE-2024-31815.json) (`2024-04-08T13:15:08.937`)
|
||||
- [CVE-2024-31816](CVE-2024/CVE-2024-318xx/CVE-2024-31816.json) (`2024-04-08T13:15:08.987`)
|
||||
- [CVE-2024-31817](CVE-2024/CVE-2024-318xx/CVE-2024-31817.json) (`2024-04-08T13:15:09.030`)
|
||||
- [CVE-2024-3439](CVE-2024/CVE-2024-34xx/CVE-2024-3439.json) (`2024-04-08T12:15:08.220`)
|
||||
- [CVE-2024-2511](CVE-2024/CVE-2024-25xx/CVE-2024-2511.json) (`2024-04-08T14:15:07.660`)
|
||||
- [CVE-2024-28732](CVE-2024/CVE-2024-287xx/CVE-2024-28732.json) (`2024-04-08T14:15:07.600`)
|
||||
- [CVE-2024-30269](CVE-2024/CVE-2024-302xx/CVE-2024-30269.json) (`2024-04-08T15:15:07.820`)
|
||||
- [CVE-2024-31205](CVE-2024/CVE-2024-312xx/CVE-2024-31205.json) (`2024-04-08T15:15:08.023`)
|
||||
- [CVE-2024-31221](CVE-2024/CVE-2024-312xx/CVE-2024-31221.json) (`2024-04-08T15:15:08.207`)
|
||||
- [CVE-2024-3440](CVE-2024/CVE-2024-34xx/CVE-2024-3440.json) (`2024-04-08T14:15:07.737`)
|
||||
- [CVE-2024-3441](CVE-2024/CVE-2024-34xx/CVE-2024-3441.json) (`2024-04-08T14:15:07.953`)
|
||||
- [CVE-2024-3442](CVE-2024/CVE-2024-34xx/CVE-2024-3442.json) (`2024-04-08T15:15:08.407`)
|
||||
- [CVE-2024-3443](CVE-2024/CVE-2024-34xx/CVE-2024-3443.json) (`2024-04-08T15:15:08.623`)
|
||||
- [CVE-2024-3444](CVE-2024/CVE-2024-34xx/CVE-2024-3444.json) (`2024-04-08T15:15:08.833`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2024-24746](CVE-2024/CVE-2024-247xx/CVE-2024-24746.json) (`2024-04-08T12:15:08.097`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
50
_state.csv
50
_state.csv
@ -47842,7 +47842,7 @@ CVE-2011-10002,0,0,2f5c79da9c186910a82db4a5f14dfebcd7206e31e98b22c79e42fe0bba7e3
|
||||
CVE-2011-10003,0,0,2026c4079e74eac5bfc9311e86e7ce9f21d964d0e6b0bc94b7e309537efd938f,2024-03-21T02:20:00.170000
|
||||
CVE-2011-10004,0,0,a2a10f2ec673334b258022d25977603fbd2e23338523a3a9724f67f9ed890da9,2024-03-21T02:20:00.270000
|
||||
CVE-2011-10005,0,0,1da7e8a59e4a8fdf077810678087b965270fa6613ffcc057ae3b57793ef6211c,2024-03-21T02:20:00.380000
|
||||
CVE-2011-10006,1,1,9c453bd948e612439d9a5beed01270f23be1480b503617daa0044d0a60613089,2024-04-08T13:15:07.680000
|
||||
CVE-2011-10006,0,0,9c453bd948e612439d9a5beed01270f23be1480b503617daa0044d0a60613089,2024-04-08T13:15:07.680000
|
||||
CVE-2011-1001,0,0,02dd2cee837f6a4c96181392eb052369d2a2c6de4f5565315e208a9142403d4f,2023-11-07T02:06:55.477000
|
||||
CVE-2011-1002,0,0,6fb40ee3e364eb8cc65e130b94fa70b6c238e9fb08dfc24da9c1556946b502f3,2023-12-22T18:19:10.320000
|
||||
CVE-2011-1003,0,0,45b3cc8d5f86e0bed0f44908b808a698e5d46ecd8842a09f7107a04ab2204486,2023-11-07T02:06:55.620000
|
||||
@ -65722,7 +65722,7 @@ CVE-2014-125107,0,0,bfd9ca046914604ad337b831020bd7921670934f51aae3a46e59b5001d11
|
||||
CVE-2014-125108,0,0,75d9b54cbcabe9921aa612e467918de22b2b2197478812f0999a3ba60991df6d,2024-03-21T02:22:56.403000
|
||||
CVE-2014-125109,0,0,01e9c5c239bc7b6c0a09a8f4a78ac7c3d3ef7fc615bf5f269037c53c3dacdfd0,2024-03-21T02:22:56.497000
|
||||
CVE-2014-125110,0,0,f90a53533485545a5c34422270bdd6687de2a73e005010b68c1b47f1274785fb,2024-04-01T01:12:59.077000
|
||||
CVE-2014-125111,1,1,94d52bcaed270fe5e955ea11a6682236410ef477d216b2eeb752211264b81b38,2024-04-08T13:15:07.940000
|
||||
CVE-2014-125111,0,0,94d52bcaed270fe5e955ea11a6682236410ef477d216b2eeb752211264b81b38,2024-04-08T13:15:07.940000
|
||||
CVE-2014-1252,0,0,5c1bf4726c5cb198c1167d9c7c184154587e8b0681d0d74b1a4f02ba2dd131da,2017-08-29T01:34:24.123000
|
||||
CVE-2014-1253,0,0,d1f3d585a5f0525543d475f077ce5dc5cee7d692ed4fb1c164ed31f81a853a70,2015-11-02T17:49:20.727000
|
||||
CVE-2014-1254,0,0,34461d8604e0415bfe62fdf5cf0a4343a8530eaa4e39be23841e494cef0c9dbb,2014-02-27T13:50:25.627000
|
||||
@ -207759,7 +207759,7 @@ CVE-2022-43212,0,0,bd8462c32cea228c2af7c2be89a884392a96230646f83c3ab91fabc7177b6
|
||||
CVE-2022-43213,0,0,49445923691b8afb2bb11c0e852bfd102be60f738be6ba8f0b1d60993d03b781,2023-11-07T03:53:44.070000
|
||||
CVE-2022-43214,0,0,2a2257063c7e6ce1c215f52d0028d12e398ed621a33a7e16b20bf1cc96792ddc,2023-11-07T03:53:44.267000
|
||||
CVE-2022-43215,0,0,846f8b9f3d1d79c7f0c81dfba005b4b8767aa7739fc4d48bb58d8f8d1834936b,2023-11-07T03:53:44.453000
|
||||
CVE-2022-43216,1,1,128153a65fb4464b5924996a38bb5a662e7d4b74f1aee15cf4658cd5a96fe98c,2024-04-08T12:15:08.017000
|
||||
CVE-2022-43216,0,0,128153a65fb4464b5924996a38bb5a662e7d4b74f1aee15cf4658cd5a96fe98c,2024-04-08T12:15:08.017000
|
||||
CVE-2022-4322,0,0,64d226b5e67e1a38b354f047a2d45500be1924b5886439dbb2eebeb01e8a818a,2023-11-07T03:57:32.157000
|
||||
CVE-2022-43221,0,0,f34353bfd6d5920cdcc1ad66435dfcbdc8f8231d58b412b25e5de8371fbf0af9,2022-11-02T14:35:09.283000
|
||||
CVE-2022-43222,0,0,0435a2ca3ade7910094cffee0fe15850b30e2a88fa659e83d008125c1f16f00c,2022-11-02T14:37:33.047000
|
||||
@ -241558,7 +241558,7 @@ CVE-2024-24740,0,0,94627927950e034fe009e1b56943190fe0270770418d88376117f7eb948d7
|
||||
CVE-2024-24741,0,0,b36526d12028f9f0a272c640e04888cda254a4c78be623b67c24d416de3ba4c0,2024-02-13T14:01:40.577000
|
||||
CVE-2024-24742,0,0,52b6b6ee7bccac207ad1f85b8052a556cad122f010bbc53b1420d8442c2340f2,2024-02-13T14:01:40.577000
|
||||
CVE-2024-24743,0,0,0f9fe8c46f95fe6a826ca3990c6a9cc5f65190a01cad4e6f6e9f271c18043aaf,2024-02-13T14:01:40.577000
|
||||
CVE-2024-24746,0,1,4be3448e057b37bfcd483cbfe96ec1381a2a9b8db1bd6b11b515e6b66b68d810,2024-04-08T12:15:08.097000
|
||||
CVE-2024-24746,0,0,4be3448e057b37bfcd483cbfe96ec1381a2a9b8db1bd6b11b515e6b66b68d810,2024-04-08T12:15:08.097000
|
||||
CVE-2024-24747,0,0,f1a9181559802764d3abc2532f673fd70e99148bf526b7e772b90a95095b418a,2024-02-09T15:18:00.510000
|
||||
CVE-2024-24748,0,0,ecaeb1145f78c27b3263c7d08a914384649823870ed552d13ac62854d31ce79b,2024-03-17T22:38:29.433000
|
||||
CVE-2024-2475,0,0,217b3852eba1552a23ac999c983aecc21d18a764f179fbfb3a08ea63fa4dac64,2024-03-29T12:45:02.937000
|
||||
@ -241774,6 +241774,7 @@ CVE-2024-25106,0,0,8dd509f504f26480381227e2c04ae3a9349d520b35ffd468656ee448e39af
|
||||
CVE-2024-25107,0,0,992c3cc86b9f4e37cd07cf04dd6b07a615d04dcf9532b8285a434870940db3c5,2024-02-15T18:52:25.613000
|
||||
CVE-2024-25108,0,0,2f3b0912c45a14bc4609391cde835a7bde0bd98f58e5cc253a1a3a5d46e14714,2024-02-12T20:39:09.773000
|
||||
CVE-2024-25109,0,0,66bef0024d89c0196f311e07e8ca5885fe47e2eb23f582eff05d8874e7ab5e40,2024-02-11T22:29:15.837000
|
||||
CVE-2024-2511,1,1,7ac7d160101e52de6ef2d1b1fa4b88240b9ae386337efbf8e31231af77b9bffe,2024-04-08T14:15:07.660000
|
||||
CVE-2024-25110,0,0,1882d1c872d6fb46fba6f5e40e671a2fda6881ec6c33fd95f706ae7cf820760c,2024-02-12T20:39:09.773000
|
||||
CVE-2024-25111,0,0,f72e8e44455321d1ed6e80f096ea71e33de3e8d0ccd8f6d4c6adc0c0a3546f5f,2024-03-06T21:42:48.053000
|
||||
CVE-2024-25112,0,0,9f92b56982d5d0e159eb7030e033a87c46cac6fe6908722221c7e2c374361051,2024-02-13T14:01:40.577000
|
||||
@ -242483,7 +242484,7 @@ CVE-2024-26557,0,0,413b34482d1eed582f272b955524fa71f7b68414d25ad46ae764ef2e2b341
|
||||
CVE-2024-26559,0,0,32dd037e107446e11601c6ddb83598fc34f3ebdb48b667f29294eba708b9e4c1,2024-02-29T13:49:47.277000
|
||||
CVE-2024-2656,0,0,6b1e617671c5db4410a66b02a7ae4562c59aef6d1d72bcdc3b2418b06c13ceed,2024-04-06T04:15:11.030000
|
||||
CVE-2024-26566,0,0,e082212a38f258b5c22bdd7daa5a29191a5e851b4c959cb2f66848d27d20d8bb,2024-03-07T13:52:27.110000
|
||||
CVE-2024-26574,1,1,cbc9f0294f6e683059540a942a6e167b4d20fa58f67b2cbe636ed3c4b8e5071d,2024-04-08T12:15:08.167000
|
||||
CVE-2024-26574,0,0,cbc9f0294f6e683059540a942a6e167b4d20fa58f67b2cbe636ed3c4b8e5071d,2024-04-08T12:15:08.167000
|
||||
CVE-2024-26577,0,0,eb994672bf510d158b4978f43b0d7e0594f22405d228a7c909ba4da4498cc451,2024-03-27T12:29:30.307000
|
||||
CVE-2024-26578,0,0,631d617cd0985d9923eed32b0cb4b9e9025809830b6a3ca2ef1a468d4f2a7124,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26580,0,0,495279035de581ec6008f44dc7438add36c8c374f59c2ede086a388e56fdb00a,2024-03-06T15:18:08.093000
|
||||
@ -243126,7 +243127,7 @@ CVE-2024-28053,0,0,c90f3b62964e2e2422d9b5798f17f1825dc5ae41ec90f71b2b9fe7b9e8ea4
|
||||
CVE-2024-28054,0,0,b289eaa8f221cef12d20f4d7c4d850be722c706b733d8c81d770795eac46dd81,2024-03-23T03:15:11.510000
|
||||
CVE-2024-2806,0,0,31a1a52b37b2e720eae0233b1b19dee00c5a6dd1df73e31128b38dde57d091e7,2024-03-26T03:11:41.880000
|
||||
CVE-2024-28065,0,0,860e1bfe6126cf5c07cb1eddc7c9671f368193a1540ce3473fdd211437faae95,2024-04-05T18:15:09.307000
|
||||
CVE-2024-28066,1,1,a7550c1400557bb44c26136e48a89d5f33f60881e1d442b225a7d956f47349fd,2024-04-08T13:15:08.247000
|
||||
CVE-2024-28066,0,0,a7550c1400557bb44c26136e48a89d5f33f60881e1d442b225a7d956f47349fd,2024-04-08T13:15:08.247000
|
||||
CVE-2024-28069,0,0,99a57a9955c5ed5463e7c560b95e0a17dfa2789ec3c024f2825003d476d4b80d,2024-03-17T22:38:29.433000
|
||||
CVE-2024-2807,0,0,47b8a7021ebbb15acc350203dd3081726f7b96c650b8d998414fd135c1027f2f,2024-03-26T03:12:50.837000
|
||||
CVE-2024-28070,0,0,c8eeec88fa6e3b91036a4eadc63dd921f090ad52309176e7af22a570b911aeac,2024-03-17T22:38:29.433000
|
||||
@ -243271,7 +243272,7 @@ CVE-2024-28323,0,0,2aeca3d06db49b1f3cf193f09da3283ca9cea9d02fb53cf2b91c906fc8c5a
|
||||
CVE-2024-28335,0,0,a217e219718a353480ebe6dbe5087fa485efbd4ed754c44582430f96bbfa9ecc,2024-03-27T12:29:30.307000
|
||||
CVE-2024-28338,0,0,3ea1d4c3a66b67172d60399e17da8570aa15fd5d4f0e652ed0ed26bd90bdb1be,2024-03-12T17:46:17.273000
|
||||
CVE-2024-28339,0,0,eb06dcbba6c6b866b3957a0b1f6af1817f1ee37fb8932a4cb080c5ef814ab185,2024-03-12T17:46:17.273000
|
||||
CVE-2024-2834,1,1,e702eb5e5c0efcea19efc921d419d1429541767645d0fe24466de2412b9cf268,2024-04-08T13:15:08.303000
|
||||
CVE-2024-2834,0,0,e702eb5e5c0efcea19efc921d419d1429541767645d0fe24466de2412b9cf268,2024-04-08T13:15:08.303000
|
||||
CVE-2024-28340,0,0,b694df29079c0854c0447fab99b606db18330fac912bd90c8918c409f1ded072,2024-03-12T17:46:17.273000
|
||||
CVE-2024-28353,0,0,f5d0b12a1e8a931f5519e51563d18b142745d332ff192847a7afb495f17e2dd3,2024-03-15T12:53:06.423000
|
||||
CVE-2024-28354,0,0,b6680336ce24c3665bbea7456a49c23f2010021d3a256de9fa063452e0cf7d3a,2024-03-15T12:53:06.423000
|
||||
@ -243392,6 +243393,7 @@ CVE-2024-28713,0,0,beab16cae2dae6cd08028a095390b29624a6437ed474d84784c32091c71ec
|
||||
CVE-2024-28714,0,0,05d12d8ac80645ded00d1ead25c51baa98cf4af4d5a078fc724fffec6f7925ec,2024-03-29T12:45:02.937000
|
||||
CVE-2024-28715,0,0,054dc6dc725c244acb835446cab8d82270f7d8ffd8311eb9aca1ba238d62a38d,2024-03-20T13:00:16.367000
|
||||
CVE-2024-2873,0,0,38b44d61d3230fcaba1c551f8073fe8dda4eadd0cd50d8705b668e3c4529f628,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28732,1,1,2a8a82892f5ff982d8c39eab88daf82e9eaf93a7fe90e90d01072dc1a7f77cc6,2024-04-08T14:15:07.600000
|
||||
CVE-2024-28734,0,0,f4687488b267ac163f3e0d4b9d3eb38f6f5a041c19b985a560624c627a7f4e16,2024-04-01T21:15:33.200000
|
||||
CVE-2024-28735,0,0,27a3fb731c930af76bd97477e46fd57873e1d90373135fa3e190a08c95c9db47,2024-04-01T21:15:37.360000
|
||||
CVE-2024-28741,0,0,1678ed4de6f62b62747c7cf1ef99a3f3ff7e7dec4db75414c76ffae859a52b6b,2024-04-06T19:15:07.247000
|
||||
@ -243934,6 +243936,7 @@ CVE-2024-30263,0,0,865e3a568432a1e114cdb349ba49e79d9bbc223ad67092921d5af173a6615
|
||||
CVE-2024-30264,0,0,a36afcbf82744a440a1fca3c8df613ac17f10025eaa77ba35cbe326ee3634d26,2024-04-05T12:40:52.763000
|
||||
CVE-2024-30265,0,0,8b7bd77316a7922f3fb99eedf42325c9dfd214ba3a070dae26dd8c71a6913b9c,2024-04-04T12:48:41.700000
|
||||
CVE-2024-30266,0,0,e3c467c9914201aad848d0a5b4b17739ce57c9b602514a7cf905d903659d55fa,2024-04-04T16:33:06.610000
|
||||
CVE-2024-30269,1,1,055916305bd660d9b64d72a16185c4d580145377dd39425d064d3053e2a64f84,2024-04-08T15:15:07.820000
|
||||
CVE-2024-30270,0,0,1d63c3afc5f402042a52c95204320e8698a660fcf024b4b1cd2dbe82419521bf,2024-04-05T12:40:52.763000
|
||||
CVE-2024-3030,0,0,88c29228ef56d61e184f00d5d8d99ea5dd9800435eeb42a07f389309c9f00688,2024-04-04T12:48:41.700000
|
||||
CVE-2024-30322,0,0,82127178dd2c4390457a625b1b802dc21960ed844c23f33ac3f61e8d8c162a4f,2024-04-03T17:24:18.150000
|
||||
@ -244261,6 +244264,7 @@ CVE-2024-3116,0,0,442c5653c6cfe9feb902808d7a86b402a42b6c98e54ac39c11d1d128b28eb1
|
||||
CVE-2024-3117,0,0,136fb5551ef6dfa1bf4e08424db43ed91a6bb8dd83f3d6ce39a5378e07bb201b,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3118,0,0,f6c34b2c6946d5fdb10aa55aa3b524d7a78d6b6fed9a90242c451ed5ef8e29f1,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31204,0,0,d77d8a78ba72f2a1144250dcbd3aeb2b57d00c9418a1c9337730d8bd71684606,2024-04-05T12:40:52.763000
|
||||
CVE-2024-31205,1,1,a6d36033e64309ba1256ccf74dd3497e30901befe8a78ff0f29c1f7440c2ef65,2024-04-08T15:15:08.023000
|
||||
CVE-2024-31206,0,0,bd1cbc8a5901cc2b410cb59c86ef8c814546918b6efc52403de5ae308d36d9dc,2024-04-05T12:40:52.763000
|
||||
CVE-2024-31207,0,0,af1a3137415a749d0a1549c9f6fa25303b24e194f3861bc2095545bb707985a2,2024-04-04T16:33:06.610000
|
||||
CVE-2024-31209,0,0,dc7f150a1f8931f337c3d30121f71937562fb9b370a799204e5d75b796fcdc02,2024-04-04T16:33:06.610000
|
||||
@ -244271,6 +244275,7 @@ CVE-2024-31213,0,0,19a0c401ca67e66e86518628c3bc67a57443f6d2510fb0e2e0eb2b07016e3
|
||||
CVE-2024-31215,0,0,34a0a231f3970708fb3e5686678c657f48cd1675d27ab51eed18f5cf652dec67,2024-04-04T16:33:06.610000
|
||||
CVE-2024-31218,0,0,2cc0c7155891260a2e304c7f7c9b9f864ea2df678ab0837aa91ce6bd7b753c89,2024-04-05T15:15:07.863000
|
||||
CVE-2024-31220,0,0,8d197f4e82630274399fe6c2cf5db685f8a9989529d5618ae3648323da3da3fe,2024-04-05T15:15:08.060000
|
||||
CVE-2024-31221,1,1,db08706f0e4cf0a4b15a3fb27b6262d35e75ecb4a425ad19e41547e21bfb7e0c,2024-04-08T15:15:08.207000
|
||||
CVE-2024-31233,0,0,01776c48338e2c3eab6d14190a3411779ae36b37bbb141038e67728efaf69c9a,2024-04-07T18:15:08.797000
|
||||
CVE-2024-31234,0,0,1fa31637e187c994b5d6f8d31633b9c52245dc14b1ef75120de91cf881de99c2,2024-04-07T18:15:09
|
||||
CVE-2024-31236,0,0,e30316997648dd95fa701bb0da95fa4c9d6a2e26dca12b212bba28299a961fd8,2024-04-07T18:15:09.197000
|
||||
@ -244333,19 +244338,19 @@ CVE-2024-3165,0,0,de9c55d425cf1712b174cf5953c3fab2e18950a6202399f31519128938dc30
|
||||
CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818bf,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3179,0,0,5abb24f6a5051585dee8d043e9230e5c2a9202caf7e3c5044373b856d11a8a98,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3180,0,0,cb7e6ecd5dde884356237a2b2dbf7b6ac67d07b2baecdd8da937f602eadd96a4,2024-04-04T12:48:41.700000
|
||||
CVE-2024-31805,1,1,03535f64ad6f6ac5f0b4d3b831ce8fbc8f8ece7dff83b25c064759625107e892,2024-04-08T13:15:08.500000
|
||||
CVE-2024-31806,1,1,e4a95aff9ed6df07ea8ac844857c48795cf21a7673643b2bdd562243e9f3b0ff,2024-04-08T13:15:08.550000
|
||||
CVE-2024-31807,1,1,a00ed81c73c7f6fca07b7014930b8c335957bdb6642be620b49ceae240c61bf4,2024-04-08T13:15:08.603000
|
||||
CVE-2024-31808,1,1,57f81d0e75534c21c4194d1a7f49f39d5ff3b99761ec9585d5628d1c935e520a,2024-04-08T13:15:08.650000
|
||||
CVE-2024-31809,1,1,ce5384c6bc2cd50fd589c7bee394d0dd06b431f579d578a104effe2c491dcf06,2024-04-08T13:15:08.700000
|
||||
CVE-2024-31805,0,0,03535f64ad6f6ac5f0b4d3b831ce8fbc8f8ece7dff83b25c064759625107e892,2024-04-08T13:15:08.500000
|
||||
CVE-2024-31806,0,0,e4a95aff9ed6df07ea8ac844857c48795cf21a7673643b2bdd562243e9f3b0ff,2024-04-08T13:15:08.550000
|
||||
CVE-2024-31807,0,0,a00ed81c73c7f6fca07b7014930b8c335957bdb6642be620b49ceae240c61bf4,2024-04-08T13:15:08.603000
|
||||
CVE-2024-31808,0,0,57f81d0e75534c21c4194d1a7f49f39d5ff3b99761ec9585d5628d1c935e520a,2024-04-08T13:15:08.650000
|
||||
CVE-2024-31809,0,0,ce5384c6bc2cd50fd589c7bee394d0dd06b431f579d578a104effe2c491dcf06,2024-04-08T13:15:08.700000
|
||||
CVE-2024-3181,0,0,19462f0bae052150ee3deea6a2833d73153169ade51a21a9a0ee903c88e94c7c,2024-04-04T12:48:41.700000
|
||||
CVE-2024-31811,1,1,a56ee0448e01073f2a88500262077cb3f92f9536366663a6c6036b0f9871942e,2024-04-08T13:15:08.750000
|
||||
CVE-2024-31812,1,1,cd66e32d28d34953870b28ab83a3e6818a458605c9bf58a2a2b21c9f97a24c42,2024-04-08T13:15:08.800000
|
||||
CVE-2024-31813,1,1,c9894f35696abdc8404b1e2697c11574377d9950ba140374b62d8895d224c8f8,2024-04-08T13:15:08.840000
|
||||
CVE-2024-31814,1,1,eee8e2cc4502e2c6411251d705a601a5bfa063839c789135fd920fe995015226,2024-04-08T13:15:08.887000
|
||||
CVE-2024-31815,1,1,dd6aac3cc20a47e3bf7bac069a64a57d58e00a168ee46569283cc16b211a4f3a,2024-04-08T13:15:08.937000
|
||||
CVE-2024-31816,1,1,b95351c7e817cf8e4f6ce9574bbef6cce660acea96f193da36bb21ae6cad7436,2024-04-08T13:15:08.987000
|
||||
CVE-2024-31817,1,1,937e9140614a26ae450030779571dff3a4b6d6c943e1661477bd9f951c156ad8,2024-04-08T13:15:09.030000
|
||||
CVE-2024-31811,0,0,a56ee0448e01073f2a88500262077cb3f92f9536366663a6c6036b0f9871942e,2024-04-08T13:15:08.750000
|
||||
CVE-2024-31812,0,0,cd66e32d28d34953870b28ab83a3e6818a458605c9bf58a2a2b21c9f97a24c42,2024-04-08T13:15:08.800000
|
||||
CVE-2024-31813,0,0,c9894f35696abdc8404b1e2697c11574377d9950ba140374b62d8895d224c8f8,2024-04-08T13:15:08.840000
|
||||
CVE-2024-31814,0,0,eee8e2cc4502e2c6411251d705a601a5bfa063839c789135fd920fe995015226,2024-04-08T13:15:08.887000
|
||||
CVE-2024-31815,0,0,dd6aac3cc20a47e3bf7bac069a64a57d58e00a168ee46569283cc16b211a4f3a,2024-04-08T13:15:08.937000
|
||||
CVE-2024-31816,0,0,b95351c7e817cf8e4f6ce9574bbef6cce660acea96f193da36bb21ae6cad7436,2024-04-08T13:15:08.987000
|
||||
CVE-2024-31817,0,0,937e9140614a26ae450030779571dff3a4b6d6c943e1661477bd9f951c156ad8,2024-04-08T13:15:09.030000
|
||||
CVE-2024-31848,0,0,6965f04cc86efd819ec97fa65a940af868313d4b9414d4c137bc5206ad729602,2024-04-05T18:15:09.360000
|
||||
CVE-2024-31849,0,0,ba19687c183971580d9b8978873bbf6d8219ba5de3f65dc5058b582de0f38692,2024-04-05T18:15:09.563000
|
||||
CVE-2024-31850,0,0,4982070fceb832e31d5e30fb03a84954ccaa75a897ce5879a6b4f81a150e310c,2024-04-05T18:15:09.753000
|
||||
@ -244447,4 +244452,9 @@ CVE-2024-3434,0,0,ca234f20211bb517f953b7f67ae3f10ab7d87d9990b0f4b049d3a839cf31dc
|
||||
CVE-2024-3436,0,0,e0e5ca3dd8c714d9a5e39a78035c324e727b4b3c8f911bb9e4a1189c878cbe35,2024-04-08T00:15:08.300000
|
||||
CVE-2024-3437,0,0,123eb2c99d4357ae11fb4721846c8d14f1c5c5df0aa6b588d74123cc924c8ceb,2024-04-08T00:15:08.537000
|
||||
CVE-2024-3438,0,0,6aa2babb713a9ff09398356e50b2cda9faed0e388dee6285a645928c2aca71c0,2024-04-08T11:15:50.310000
|
||||
CVE-2024-3439,1,1,69cc741ea655c4a2d89b68a8daf53cfa66f6de13bb1c1dcde6c854895f506c54,2024-04-08T12:15:08.220000
|
||||
CVE-2024-3439,0,0,69cc741ea655c4a2d89b68a8daf53cfa66f6de13bb1c1dcde6c854895f506c54,2024-04-08T12:15:08.220000
|
||||
CVE-2024-3440,1,1,effe0961510bad7e8c4ff018cfa0edf1ee22b6e3dca0f11cd720843b6e621572,2024-04-08T14:15:07.737000
|
||||
CVE-2024-3441,1,1,8d5bbefefea6812fc49088025995bef976f75da71f1ba2c98279a63d9f20e4b8,2024-04-08T14:15:07.953000
|
||||
CVE-2024-3442,1,1,9cc36f8f361a3d8960eaa6fc08e1e4540639d14611f1e55df640efc83188f693,2024-04-08T15:15:08.407000
|
||||
CVE-2024-3443,1,1,c84c0ff8127a2896cfdad8c89089c5330f71dbb74239c5797b2db62ead1d2484,2024-04-08T15:15:08.623000
|
||||
CVE-2024-3444,1,1,f3f0a7a83b7dee21ee32f2a842641df915e1807265b186dc1fd440ed4bdc6a3f,2024-04-08T15:15:08.833000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user