mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2024-03-28T03:00:31.559275+00:00
This commit is contained in:
parent
c1f25b57a2
commit
b93a652e98
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2013-4184",
|
"id": "CVE-2013-4184",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2019-12-10T15:15:11.573",
|
"published": "2019-12-10T15:15:11.573",
|
||||||
"lastModified": "2019-12-17T18:42:20.790",
|
"lastModified": "2024-03-28T02:15:09.320",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -166,6 +166,14 @@
|
|||||||
"VDB Entry"
|
"VDB Entry"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3F2KOK2SM2LFI4BNFOVV2G2XVJQBIMZL/",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTKH3TWUOXBAAZST7364UVZ4UPH4CEO7/",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://security-tracker.debian.org/tracker/CVE-2013-4184",
|
"url": "https://security-tracker.debian.org/tracker/CVE-2013-4184",
|
||||||
"source": "secalert@redhat.com",
|
"source": "secalert@redhat.com",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-0582",
|
"id": "CVE-2023-0582",
|
||||||
"sourceIdentifier": "psirt@forgerock.com",
|
"sourceIdentifier": "psirt@forgerock.com",
|
||||||
"published": "2024-03-27T18:15:08.237",
|
"published": "2024-03-27T18:15:08.237",
|
||||||
"lastModified": "2024-03-27T18:15:08.237",
|
"lastModified": "2024-03-28T02:01:21.693",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-47438",
|
"id": "CVE-2023-47438",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-27T22:15:07.607",
|
"published": "2024-03-27T22:15:07.607",
|
||||||
"lastModified": "2024-03-27T22:15:07.607",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-0071",
|
"id": "CVE-2024-0071",
|
||||||
"sourceIdentifier": "psirt@nvidia.com",
|
"sourceIdentifier": "psirt@nvidia.com",
|
||||||
"published": "2024-03-27T22:15:07.667",
|
"published": "2024-03-27T22:15:07.667",
|
||||||
"lastModified": "2024-03-27T22:15:07.667",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-0073",
|
"id": "CVE-2024-0073",
|
||||||
"sourceIdentifier": "psirt@nvidia.com",
|
"sourceIdentifier": "psirt@nvidia.com",
|
||||||
"published": "2024-03-27T22:15:08.133",
|
"published": "2024-03-27T22:15:08.133",
|
||||||
"lastModified": "2024-03-27T22:15:08.133",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-0074",
|
"id": "CVE-2024-0074",
|
||||||
"sourceIdentifier": "psirt@nvidia.com",
|
"sourceIdentifier": "psirt@nvidia.com",
|
||||||
"published": "2024-03-27T22:15:08.617",
|
"published": "2024-03-27T22:15:08.617",
|
||||||
"lastModified": "2024-03-27T22:15:08.617",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-0075",
|
"id": "CVE-2024-0075",
|
||||||
"sourceIdentifier": "psirt@nvidia.com",
|
"sourceIdentifier": "psirt@nvidia.com",
|
||||||
"published": "2024-03-27T22:15:09.140",
|
"published": "2024-03-27T22:15:09.140",
|
||||||
"lastModified": "2024-03-27T22:15:09.140",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-0077",
|
"id": "CVE-2024-0077",
|
||||||
"sourceIdentifier": "psirt@nvidia.com",
|
"sourceIdentifier": "psirt@nvidia.com",
|
||||||
"published": "2024-03-27T22:15:09.510",
|
"published": "2024-03-27T22:15:09.510",
|
||||||
"lastModified": "2024-03-27T22:15:09.510",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-0078",
|
"id": "CVE-2024-0078",
|
||||||
"sourceIdentifier": "psirt@nvidia.com",
|
"sourceIdentifier": "psirt@nvidia.com",
|
||||||
"published": "2024-03-27T22:15:09.700",
|
"published": "2024-03-27T22:15:09.700",
|
||||||
"lastModified": "2024-03-27T22:15:09.700",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-0079",
|
"id": "CVE-2024-0079",
|
||||||
"sourceIdentifier": "psirt@nvidia.com",
|
"sourceIdentifier": "psirt@nvidia.com",
|
||||||
"published": "2024-03-27T22:15:09.897",
|
"published": "2024-03-27T22:15:09.897",
|
||||||
"lastModified": "2024-03-27T22:15:09.897",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-0980",
|
"id": "CVE-2024-0980",
|
||||||
"sourceIdentifier": "psirt@okta.com",
|
"sourceIdentifier": "psirt@okta.com",
|
||||||
"published": "2024-03-28T00:15:07.867",
|
"published": "2024-03-28T00:15:07.867",
|
||||||
"lastModified": "2024-03-28T00:15:07.867",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
47
CVE-2024/CVE-2024-17xx/CVE-2024-1770.json
Normal file
47
CVE-2024/CVE-2024-17xx/CVE-2024-1770.json
Normal file
@ -0,0 +1,47 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-1770",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2024-03-28T02:15:09.573",
|
||||||
|
"lastModified": "2024-03-28T02:15:09.573",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The Meta Tag Manager plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.0.2 via deserialization of untrusted input in the get_post_data function. This makes it possible for authenticated attackers, with contributor access or higher, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset/3054910/meta-tag-manager/trunk/meta-tag-manager.php",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9ec1aed2-d299-4fa9-add6-10b63ed6aa30?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-20307",
|
"id": "CVE-2024-20307",
|
||||||
"sourceIdentifier": "ykramarz@cisco.com",
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||||||
"published": "2024-03-27T18:15:09.357",
|
"published": "2024-03-27T18:15:09.357",
|
||||||
"lastModified": "2024-03-27T18:15:09.357",
|
"lastModified": "2024-03-28T02:01:21.693",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-20308",
|
"id": "CVE-2024-20308",
|
||||||
"sourceIdentifier": "ykramarz@cisco.com",
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||||||
"published": "2024-03-27T18:15:09.853",
|
"published": "2024-03-27T18:15:09.853",
|
||||||
"lastModified": "2024-03-27T18:15:09.853",
|
"lastModified": "2024-03-28T02:01:21.693",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
47
CVE-2024/CVE-2024-21xx/CVE-2024-2110.json
Normal file
47
CVE-2024/CVE-2024-21xx/CVE-2024-2110.json
Normal file
@ -0,0 +1,47 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2110",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2024-03-28T02:15:09.990",
|
||||||
|
"lastModified": "2024-03-28T02:15:09.990",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The Events Manager \u2013 Calendar, Bookings, Tickets, and more! plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.4.7.1. This is due to missing or incorrect nonce validation on several actions. This makes it possible for unauthenticated attackers to modify booking statuses via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset/3054883/events-manager/trunk/classes/em-bookings-table.php",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c0538999-0a09-4d24-a530-a32fb5b4e5e6?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
47
CVE-2024/CVE-2024-21xx/CVE-2024-2111.json
Normal file
47
CVE-2024/CVE-2024-21xx/CVE-2024-2111.json
Normal file
@ -0,0 +1,47 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2111",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2024-03-28T02:15:10.397",
|
||||||
|
"lastModified": "2024-03-28T02:15:10.397",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The Events Manager \u2013 Calendar, Bookings, Tickets, and more! plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the physical location value in all versions up to, and including, 6.4.7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3054883%40events-manager&new=3054883%40events-manager&sfp_email=&sfph_mail=",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/95ded4bf-9964-4bb3-b6e5-5ad37360f87d?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-23451",
|
"id": "CVE-2024-23451",
|
||||||
"sourceIdentifier": "bressers@elastic.co",
|
"sourceIdentifier": "bressers@elastic.co",
|
||||||
"published": "2024-03-27T18:15:10.330",
|
"published": "2024-03-27T18:15:10.330",
|
||||||
"lastModified": "2024-03-27T18:15:10.330",
|
"lastModified": "2024-03-28T02:01:21.693",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-25354",
|
"id": "CVE-2024-25354",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-27T22:15:10.093",
|
"published": "2024-03-27T22:15:10.093",
|
||||||
"lastModified": "2024-03-27T22:15:10.093",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
32
CVE-2024/CVE-2024-280xx/CVE-2024-28005.json
Normal file
32
CVE-2024/CVE-2024-280xx/CVE-2024-28005.json
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28005",
|
||||||
|
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"published": "2024-03-28T01:15:47.100",
|
||||||
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker who has obtained high privileges can execute arbitrary scripts."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-250"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html",
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
32
CVE-2024/CVE-2024-280xx/CVE-2024-28006.json
Normal file
32
CVE-2024/CVE-2024-280xx/CVE-2024-28006.json
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28006",
|
||||||
|
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"published": "2024-03-28T01:15:47.177",
|
||||||
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Improper authentication vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker to view device information."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-287"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html",
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
32
CVE-2024/CVE-2024-280xx/CVE-2024-28007.json
Normal file
32
CVE-2024/CVE-2024-280xx/CVE-2024-28007.json
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28007",
|
||||||
|
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"published": "2024-03-28T01:15:47.250",
|
||||||
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Improper authentication vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker to execute an arbitrary command with the root privilege via the internet."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-287"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html",
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
32
CVE-2024/CVE-2024-280xx/CVE-2024-28008.json
Normal file
32
CVE-2024/CVE-2024-280xx/CVE-2024-28008.json
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28008",
|
||||||
|
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"published": "2024-03-28T01:15:47.327",
|
||||||
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Active Debug Code in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker to execute an arbitrary OS command via the internet."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-489"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html",
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
32
CVE-2024/CVE-2024-280xx/CVE-2024-28009.json
Normal file
32
CVE-2024/CVE-2024-280xx/CVE-2024-28009.json
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28009",
|
||||||
|
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"published": "2024-03-28T01:15:47.400",
|
||||||
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Improper authentication vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker to execute an arbitrary command with the root privilege via the internet."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-287"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html",
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
32
CVE-2024/CVE-2024-280xx/CVE-2024-28010.json
Normal file
32
CVE-2024/CVE-2024-280xx/CVE-2024-28010.json
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28010",
|
||||||
|
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"published": "2024-03-28T01:15:47.470",
|
||||||
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Use of Hard-coded Password in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker to execute an arbitrary OS command via the internet."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-259"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html",
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
32
CVE-2024/CVE-2024-280xx/CVE-2024-28011.json
Normal file
32
CVE-2024/CVE-2024-280xx/CVE-2024-28011.json
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28011",
|
||||||
|
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"published": "2024-03-28T01:15:47.550",
|
||||||
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Hidden Functionality vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker to execute an arbitrary OS command with the root privilege via the internet"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-912"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html",
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
32
CVE-2024/CVE-2024-280xx/CVE-2024-28012.json
Normal file
32
CVE-2024/CVE-2024-280xx/CVE-2024-28012.json
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28012",
|
||||||
|
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"published": "2024-03-28T01:15:47.620",
|
||||||
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Improper authentication vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker to execute an arbitrary command with the root privilege via the internet."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-287"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html",
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
32
CVE-2024/CVE-2024-280xx/CVE-2024-28013.json
Normal file
32
CVE-2024/CVE-2024-280xx/CVE-2024-28013.json
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28013",
|
||||||
|
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"published": "2024-03-28T01:15:47.693",
|
||||||
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Use of Insufficiently Random Values vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker to change settings via the internet."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-330"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html",
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
32
CVE-2024/CVE-2024-280xx/CVE-2024-28014.json
Normal file
32
CVE-2024/CVE-2024-280xx/CVE-2024-28014.json
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28014",
|
||||||
|
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"published": "2024-03-28T01:15:47.773",
|
||||||
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Stack-based Buffer Overflow vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker to execute an arbitrary command via the internet."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-121"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html",
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
32
CVE-2024/CVE-2024-280xx/CVE-2024-28015.json
Normal file
32
CVE-2024/CVE-2024-280xx/CVE-2024-28015.json
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28015",
|
||||||
|
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"published": "2024-03-28T01:15:47.843",
|
||||||
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Improper Neutralization of Special Elements used in an OS Command vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker to execute an arbitrary OS command with the root privilege via the internet."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-78"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html",
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
32
CVE-2024/CVE-2024-280xx/CVE-2024-28016.json
Normal file
32
CVE-2024/CVE-2024-280xx/CVE-2024-28016.json
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28016",
|
||||||
|
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"published": "2024-03-28T01:15:47.923",
|
||||||
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Improper Access Controlvulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker to get device informations via the internet."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-284"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html",
|
||||||
|
"source": "psirt-info@cyber.jp.nec.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28085",
|
"id": "CVE-2024-28085",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-27T19:15:48.367",
|
"published": "2024-03-27T19:15:48.367",
|
||||||
"lastModified": "2024-03-27T19:15:48.367",
|
"lastModified": "2024-03-28T02:01:21.693",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28233",
|
"id": "CVE-2024-28233",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-27T19:15:48.430",
|
"published": "2024-03-27T19:15:48.430",
|
||||||
"lastModified": "2024-03-27T19:15:48.430",
|
"lastModified": "2024-03-28T02:01:21.693",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28247",
|
"id": "CVE-2024-28247",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-27T19:15:48.637",
|
"published": "2024-03-27T19:15:48.637",
|
||||||
"lastModified": "2024-03-27T19:15:48.637",
|
"lastModified": "2024-03-28T02:01:21.693",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28860",
|
"id": "CVE-2024-28860",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-27T19:15:48.827",
|
"published": "2024-03-27T19:15:48.827",
|
||||||
"lastModified": "2024-03-27T19:15:48.827",
|
"lastModified": "2024-03-28T02:01:21.693",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-29886",
|
"id": "CVE-2024-29886",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-27T19:15:49.023",
|
"published": "2024-03-27T19:15:49.023",
|
||||||
"lastModified": "2024-03-27T19:15:49.023",
|
"lastModified": "2024-03-28T02:01:21.693",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-29887",
|
"id": "CVE-2024-29887",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-27T19:15:49.230",
|
"published": "2024-03-27T19:15:49.230",
|
||||||
"lastModified": "2024-03-27T19:15:49.230",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-29888",
|
"id": "CVE-2024-29888",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-27T19:15:49.410",
|
"published": "2024-03-27T19:15:49.410",
|
||||||
"lastModified": "2024-03-27T19:15:49.410",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-29891",
|
"id": "CVE-2024-29891",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-27T20:15:07.780",
|
"published": "2024-03-27T20:15:07.780",
|
||||||
"lastModified": "2024-03-27T20:15:07.780",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-29892",
|
"id": "CVE-2024-29892",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-27T20:15:08.303",
|
"published": "2024-03-27T20:15:08.303",
|
||||||
"lastModified": "2024-03-27T20:15:08.303",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2988",
|
"id": "CVE-2024-2988",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T18:15:10.757",
|
"published": "2024-03-27T18:15:10.757",
|
||||||
"lastModified": "2024-03-27T18:15:10.757",
|
"lastModified": "2024-03-28T02:01:21.693",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2989",
|
"id": "CVE-2024-2989",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T18:15:11.293",
|
"published": "2024-03-27T18:15:11.293",
|
||||||
"lastModified": "2024-03-27T18:15:11.293",
|
"lastModified": "2024-03-28T02:01:21.693",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2990",
|
"id": "CVE-2024-2990",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T19:15:49.710",
|
"published": "2024-03-27T19:15:49.710",
|
||||||
"lastModified": "2024-03-27T19:15:49.710",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2991",
|
"id": "CVE-2024-2991",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T19:15:49.940",
|
"published": "2024-03-27T19:15:49.940",
|
||||||
"lastModified": "2024-03-27T19:15:49.940",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2992",
|
"id": "CVE-2024-2992",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T19:15:50.173",
|
"published": "2024-03-27T19:15:50.173",
|
||||||
"lastModified": "2024-03-27T19:15:50.173",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2993",
|
"id": "CVE-2024-2993",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T20:15:08.780",
|
"published": "2024-03-27T20:15:08.780",
|
||||||
"lastModified": "2024-03-27T20:15:08.780",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2994",
|
"id": "CVE-2024-2994",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T20:15:09.337",
|
"published": "2024-03-27T20:15:09.337",
|
||||||
"lastModified": "2024-03-27T20:15:09.337",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2995",
|
"id": "CVE-2024-2995",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T20:15:09.903",
|
"published": "2024-03-27T20:15:09.903",
|
||||||
"lastModified": "2024-03-27T20:15:09.903",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2996",
|
"id": "CVE-2024-2996",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T20:15:10.507",
|
"published": "2024-03-27T20:15:10.507",
|
||||||
"lastModified": "2024-03-27T20:15:10.507",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2997",
|
"id": "CVE-2024-2997",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T21:15:48.897",
|
"published": "2024-03-27T21:15:48.897",
|
||||||
"lastModified": "2024-03-27T21:15:48.897",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2998",
|
"id": "CVE-2024-2998",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T21:15:49.127",
|
"published": "2024-03-27T21:15:49.127",
|
||||||
"lastModified": "2024-03-27T21:15:49.127",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2999",
|
"id": "CVE-2024-2999",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T21:15:49.407",
|
"published": "2024-03-27T21:15:49.407",
|
||||||
"lastModified": "2024-03-27T21:15:49.407",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-3000",
|
"id": "CVE-2024-3000",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T22:15:10.150",
|
"published": "2024-03-27T22:15:10.150",
|
||||||
"lastModified": "2024-03-27T22:15:10.150",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-3001",
|
"id": "CVE-2024-3001",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T22:15:10.673",
|
"published": "2024-03-27T22:15:10.673",
|
||||||
"lastModified": "2024-03-27T22:15:10.673",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-3002",
|
"id": "CVE-2024-3002",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T22:15:11.300",
|
"published": "2024-03-27T22:15:11.300",
|
||||||
"lastModified": "2024-03-27T22:15:11.300",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-3003",
|
"id": "CVE-2024-3003",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T22:15:11.880",
|
"published": "2024-03-27T22:15:11.880",
|
||||||
"lastModified": "2024-03-27T22:15:11.880",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-3004",
|
"id": "CVE-2024-3004",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T23:15:46.637",
|
"published": "2024-03-27T23:15:46.637",
|
||||||
"lastModified": "2024-03-27T23:15:46.637",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-3006",
|
"id": "CVE-2024-3006",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T23:15:46.880",
|
"published": "2024-03-27T23:15:46.880",
|
||||||
"lastModified": "2024-03-27T23:15:46.880",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-3007",
|
"id": "CVE-2024-3007",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T23:15:47.110",
|
"published": "2024-03-27T23:15:47.110",
|
||||||
"lastModified": "2024-03-27T23:15:47.110",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-3008",
|
"id": "CVE-2024-3008",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T23:15:47.340",
|
"published": "2024-03-27T23:15:47.340",
|
||||||
"lastModified": "2024-03-27T23:15:47.340",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-3009",
|
"id": "CVE-2024-3009",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-28T00:15:07.993",
|
"published": "2024-03-28T00:15:07.993",
|
||||||
"lastModified": "2024-03-28T00:15:07.993",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-3010",
|
"id": "CVE-2024-3010",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-28T00:15:08.250",
|
"published": "2024-03-28T00:15:08.250",
|
||||||
"lastModified": "2024-03-28T00:15:08.250",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-3011",
|
"id": "CVE-2024-3011",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-28T00:15:08.500",
|
"published": "2024-03-28T00:15:08.500",
|
||||||
"lastModified": "2024-03-28T00:15:08.500",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-3012",
|
"id": "CVE-2024-3012",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-28T00:15:08.773",
|
"published": "2024-03-28T00:15:08.773",
|
||||||
"lastModified": "2024-03-28T00:15:08.773",
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
92
CVE-2024/CVE-2024-30xx/CVE-2024-3013.json
Normal file
92
CVE-2024/CVE-2024-30xx/CVE-2024-3013.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-3013",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-03-28T01:15:47.997",
|
||||||
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in FLIR AX8 up to 1.46.16. It has been rated as critical. This issue affects some unknown processing of the file /tools/test_login.php?action=register of the component User Registration. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258299. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"baseScore": 6.5
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-285"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://h0e4a0r1t.github.io/2024/vulns/FLIR-AX8%20Fixed%20Thermal%20Cameras%20Register%20any%20user%20in%20the%20background--test_login.php.pdf",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.258299",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.258299",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.301588",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-30xx/CVE-2024-3014.json
Normal file
92
CVE-2024/CVE-2024-30xx/CVE-2024-3014.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-3014",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-03-28T01:15:48.227",
|
||||||
|
"lastModified": "2024-03-28T02:01:13.303",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability classified as critical has been found in SourceCodester Simple Subscription Website 1.0. Affected is an unknown function of the file Actions.php. The manipulation of the argument title leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258300."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"baseScore": 6.5
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Viciglu/cvehub/blob/main/Simple%20Subscription%20Website%20with%20Admin%20System%20Actions.php%20has%20Sqlinjection.pdf",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.258300",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.258300",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.305648",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-30xx/CVE-2024-3015.json
Normal file
92
CVE-2024/CVE-2024-30xx/CVE-2024-3015.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-3015",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-03-28T02:15:10.813",
|
||||||
|
"lastModified": "2024-03-28T02:15:10.813",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability classified as critical was found in SourceCodester Simple Subscription Website 1.0. Affected by this vulnerability is an unknown functionality of the file manage_plan.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258301 was assigned to this vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"baseScore": 6.5
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Viciglu/cvehub/blob/main/Simple%20Subscription%20Website%20with%20Admin%20System%20manage_plan.php%20has%20Sqlinjection.pdf",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.258301",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.258301",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.305649",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
96
CVE-2024/CVE-2024-30xx/CVE-2024-3024.json
Normal file
96
CVE-2024/CVE-2024-30xx/CVE-2024-3024.json
Normal file
@ -0,0 +1,96 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-3024",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-03-28T02:15:11.337",
|
||||||
|
"lastModified": "2024-03-28T02:15:11.337",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in appneta tcpreplay up to 4.4.4. It has been classified as problematic. This affects the function get_layer4_v6 of the file /tcpreplay/src/common/get.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-258333 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"accessVector": "LOCAL",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"baseScore": 4.3
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-122"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://docs.google.com/document/d/1wCIrViAJwGsO5afPBLLjRhO5RClsoUo3J9q1psLs84s/edit?usp=sharing",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://drive.google.com/file/d/1zV9MSkfYLIrdtK3yczy1qbsJr_yN2fwH/view",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.258333",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.258333",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.297866",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
65
README.md
65
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-03-28T00:55:29.902562+00:00
|
2024-03-28T03:00:31.559275+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-03-28T00:15:08.773000+00:00
|
2024-03-28T02:15:11.337000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -27,34 +27,69 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-03-27T01:00:20.271570+00:00
|
2024-03-28T01:00:20.267440+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
243083
|
243102
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `9`
|
Recently added CVEs: `19`
|
||||||
|
|
||||||
- [CVE-2024-0980](CVE-2024/CVE-2024-09xx/CVE-2024-0980.json) (`2024-03-28T00:15:07.867`)
|
- [CVE-2024-1770](CVE-2024/CVE-2024-17xx/CVE-2024-1770.json) (`2024-03-28T02:15:09.573`)
|
||||||
- [CVE-2024-3004](CVE-2024/CVE-2024-30xx/CVE-2024-3004.json) (`2024-03-27T23:15:46.637`)
|
- [CVE-2024-2110](CVE-2024/CVE-2024-21xx/CVE-2024-2110.json) (`2024-03-28T02:15:09.990`)
|
||||||
- [CVE-2024-3006](CVE-2024/CVE-2024-30xx/CVE-2024-3006.json) (`2024-03-27T23:15:46.880`)
|
- [CVE-2024-2111](CVE-2024/CVE-2024-21xx/CVE-2024-2111.json) (`2024-03-28T02:15:10.397`)
|
||||||
- [CVE-2024-3007](CVE-2024/CVE-2024-30xx/CVE-2024-3007.json) (`2024-03-27T23:15:47.110`)
|
- [CVE-2024-28005](CVE-2024/CVE-2024-280xx/CVE-2024-28005.json) (`2024-03-28T01:15:47.100`)
|
||||||
- [CVE-2024-3008](CVE-2024/CVE-2024-30xx/CVE-2024-3008.json) (`2024-03-27T23:15:47.340`)
|
- [CVE-2024-28006](CVE-2024/CVE-2024-280xx/CVE-2024-28006.json) (`2024-03-28T01:15:47.177`)
|
||||||
- [CVE-2024-3009](CVE-2024/CVE-2024-30xx/CVE-2024-3009.json) (`2024-03-28T00:15:07.993`)
|
- [CVE-2024-28007](CVE-2024/CVE-2024-280xx/CVE-2024-28007.json) (`2024-03-28T01:15:47.250`)
|
||||||
- [CVE-2024-3010](CVE-2024/CVE-2024-30xx/CVE-2024-3010.json) (`2024-03-28T00:15:08.250`)
|
- [CVE-2024-28008](CVE-2024/CVE-2024-280xx/CVE-2024-28008.json) (`2024-03-28T01:15:47.327`)
|
||||||
- [CVE-2024-3011](CVE-2024/CVE-2024-30xx/CVE-2024-3011.json) (`2024-03-28T00:15:08.500`)
|
- [CVE-2024-28009](CVE-2024/CVE-2024-280xx/CVE-2024-28009.json) (`2024-03-28T01:15:47.400`)
|
||||||
- [CVE-2024-3012](CVE-2024/CVE-2024-30xx/CVE-2024-3012.json) (`2024-03-28T00:15:08.773`)
|
- [CVE-2024-28010](CVE-2024/CVE-2024-280xx/CVE-2024-28010.json) (`2024-03-28T01:15:47.470`)
|
||||||
|
- [CVE-2024-28011](CVE-2024/CVE-2024-280xx/CVE-2024-28011.json) (`2024-03-28T01:15:47.550`)
|
||||||
|
- [CVE-2024-28012](CVE-2024/CVE-2024-280xx/CVE-2024-28012.json) (`2024-03-28T01:15:47.620`)
|
||||||
|
- [CVE-2024-28013](CVE-2024/CVE-2024-280xx/CVE-2024-28013.json) (`2024-03-28T01:15:47.693`)
|
||||||
|
- [CVE-2024-28014](CVE-2024/CVE-2024-280xx/CVE-2024-28014.json) (`2024-03-28T01:15:47.773`)
|
||||||
|
- [CVE-2024-28015](CVE-2024/CVE-2024-280xx/CVE-2024-28015.json) (`2024-03-28T01:15:47.843`)
|
||||||
|
- [CVE-2024-28016](CVE-2024/CVE-2024-280xx/CVE-2024-28016.json) (`2024-03-28T01:15:47.923`)
|
||||||
|
- [CVE-2024-3013](CVE-2024/CVE-2024-30xx/CVE-2024-3013.json) (`2024-03-28T01:15:47.997`)
|
||||||
|
- [CVE-2024-3014](CVE-2024/CVE-2024-30xx/CVE-2024-3014.json) (`2024-03-28T01:15:48.227`)
|
||||||
|
- [CVE-2024-3015](CVE-2024/CVE-2024-30xx/CVE-2024-3015.json) (`2024-03-28T02:15:10.813`)
|
||||||
|
- [CVE-2024-3024](CVE-2024/CVE-2024-30xx/CVE-2024-3024.json) (`2024-03-28T02:15:11.337`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `0`
|
Recently modified CVEs: `48`
|
||||||
|
|
||||||
|
- [CVE-2024-2989](CVE-2024/CVE-2024-29xx/CVE-2024-2989.json) (`2024-03-28T02:01:21.693`)
|
||||||
|
- [CVE-2024-29891](CVE-2024/CVE-2024-298xx/CVE-2024-29891.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-29892](CVE-2024/CVE-2024-298xx/CVE-2024-29892.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-2990](CVE-2024/CVE-2024-29xx/CVE-2024-2990.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-2991](CVE-2024/CVE-2024-29xx/CVE-2024-2991.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-2992](CVE-2024/CVE-2024-29xx/CVE-2024-2992.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-2993](CVE-2024/CVE-2024-29xx/CVE-2024-2993.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-2994](CVE-2024/CVE-2024-29xx/CVE-2024-2994.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-2995](CVE-2024/CVE-2024-29xx/CVE-2024-2995.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-2996](CVE-2024/CVE-2024-29xx/CVE-2024-2996.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-2997](CVE-2024/CVE-2024-29xx/CVE-2024-2997.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-2998](CVE-2024/CVE-2024-29xx/CVE-2024-2998.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-2999](CVE-2024/CVE-2024-29xx/CVE-2024-2999.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-3000](CVE-2024/CVE-2024-30xx/CVE-2024-3000.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-3001](CVE-2024/CVE-2024-30xx/CVE-2024-3001.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-3002](CVE-2024/CVE-2024-30xx/CVE-2024-3002.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-3003](CVE-2024/CVE-2024-30xx/CVE-2024-3003.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-3004](CVE-2024/CVE-2024-30xx/CVE-2024-3004.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-3006](CVE-2024/CVE-2024-30xx/CVE-2024-3006.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-3007](CVE-2024/CVE-2024-30xx/CVE-2024-3007.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-3008](CVE-2024/CVE-2024-30xx/CVE-2024-3008.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-3009](CVE-2024/CVE-2024-30xx/CVE-2024-3009.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-3010](CVE-2024/CVE-2024-30xx/CVE-2024-3010.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-3011](CVE-2024/CVE-2024-30xx/CVE-2024-3011.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
- [CVE-2024-3012](CVE-2024/CVE-2024-30xx/CVE-2024-3012.json) (`2024-03-28T02:01:13.303`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
115
_state.csv
115
_state.csv
@ -61558,7 +61558,7 @@ CVE-2013-4180,0,0,78a63c637611db22fa46f611204e6fd6139c219e97f0f5547c042e0d69c20c
|
|||||||
CVE-2013-4181,0,0,2eb362951baf4cca44bb9432679cacd4248a3a6611d36532071864132e3930e4,2023-02-13T04:45:01.727000
|
CVE-2013-4181,0,0,2eb362951baf4cca44bb9432679cacd4248a3a6611d36532071864132e3930e4,2023-02-13T04:45:01.727000
|
||||||
CVE-2013-4182,0,0,13c9d69cf7b0abd3d794ab735a9605061c330b1ead46dd7a79e1cd18b5538450,2023-02-13T04:45:02.247000
|
CVE-2013-4182,0,0,13c9d69cf7b0abd3d794ab735a9605061c330b1ead46dd7a79e1cd18b5538450,2023-02-13T04:45:02.247000
|
||||||
CVE-2013-4183,0,0,52c30707c5f18711de1e5620d781ac5fad4e95114d76a83126a0dcdc773515ad,2013-10-31T03:34:49.813000
|
CVE-2013-4183,0,0,52c30707c5f18711de1e5620d781ac5fad4e95114d76a83126a0dcdc773515ad,2013-10-31T03:34:49.813000
|
||||||
CVE-2013-4184,0,0,a99d2743637b65b74ed791b4321e80bf71ca063cde11b879be9c770193c058ed,2019-12-17T18:42:20.790000
|
CVE-2013-4184,0,1,b9f8f2c9f1c18d97b815f3e7483f062ba7383a1820c19d6f58c21970cbc3a0bc,2024-03-28T02:15:09.320000
|
||||||
CVE-2013-4185,0,0,5265ccf51b00a73e4fed0ec6285046513fb02fd76b63e477c7d96cb9eed9423d,2018-11-15T18:34:48.107000
|
CVE-2013-4185,0,0,5265ccf51b00a73e4fed0ec6285046513fb02fd76b63e477c7d96cb9eed9423d,2018-11-15T18:34:48.107000
|
||||||
CVE-2013-4186,0,0,d2d0cc318dc321327f00c03cb9d150b92782acb31a953a447cb9ce9be93bb364,2023-11-07T02:16:09.143000
|
CVE-2013-4186,0,0,d2d0cc318dc321327f00c03cb9d150b92782acb31a953a447cb9ce9be93bb364,2023-11-07T02:16:09.143000
|
||||||
CVE-2013-4187,0,0,3dae0ca9ef467b5832ba7c7549e1ab2720d40b93fa83116402eb724e14fabd03,2020-02-06T15:12:57.383000
|
CVE-2013-4187,0,0,3dae0ca9ef467b5832ba7c7549e1ab2720d40b93fa83116402eb724e14fabd03,2020-02-06T15:12:57.383000
|
||||||
@ -212065,7 +212065,7 @@ CVE-2023-0578,0,0,c2cf10d09529bf342567ff561ff5fc5b2abe259e50445b77cdf258d0a115db
|
|||||||
CVE-2023-0579,0,0,504b4338f864e933aa44e888a09084f9d604fd2edb1bc93c969428fcc9526d01,2023-11-07T04:00:52.513000
|
CVE-2023-0579,0,0,504b4338f864e933aa44e888a09084f9d604fd2edb1bc93c969428fcc9526d01,2023-11-07T04:00:52.513000
|
||||||
CVE-2023-0580,0,0,496b4aaf459be8082f40af9709a8d52cae4c41b641bd7ca2e1f477b04712ed00,2023-11-07T04:00:52.727000
|
CVE-2023-0580,0,0,496b4aaf459be8082f40af9709a8d52cae4c41b641bd7ca2e1f477b04712ed00,2023-11-07T04:00:52.727000
|
||||||
CVE-2023-0581,0,0,80d4f5ae1b34ea0255629d958cda2cdcf146f8044343eecb0200e915f691c351,2023-11-07T04:00:52.963000
|
CVE-2023-0581,0,0,80d4f5ae1b34ea0255629d958cda2cdcf146f8044343eecb0200e915f691c351,2023-11-07T04:00:52.963000
|
||||||
CVE-2023-0582,0,0,b3d8f7c84b265316b7e893995a48113564e6ef297a2eb81dadb43454ece92941,2024-03-27T18:15:08.237000
|
CVE-2023-0582,0,1,e507bc1e5bfba860f5547b55816ff5405f59aa76a3b833f5f6eb6cc3a6a61a84,2024-03-28T02:01:21.693000
|
||||||
CVE-2023-0583,0,0,ce927582782be4db333475ecc49caef43ac381b8ee355357a8ae6188916854c1,2023-11-07T04:00:53.253000
|
CVE-2023-0583,0,0,ce927582782be4db333475ecc49caef43ac381b8ee355357a8ae6188916854c1,2023-11-07T04:00:53.253000
|
||||||
CVE-2023-0584,0,0,661ecf0e0e258efd0247b994949d777aeb58bd9b6fb3f10f25ebfe1d0595391a,2023-11-07T04:00:53.487000
|
CVE-2023-0584,0,0,661ecf0e0e258efd0247b994949d777aeb58bd9b6fb3f10f25ebfe1d0595391a,2023-11-07T04:00:53.487000
|
||||||
CVE-2023-0585,0,0,e90d02e3a14ec76a3f74d6f239a409836679ba4da0fdac7466ba614a8fa9d16d,2023-11-07T04:00:53.740000
|
CVE-2023-0585,0,0,e90d02e3a14ec76a3f74d6f239a409836679ba4da0fdac7466ba614a8fa9d16d,2023-11-07T04:00:53.740000
|
||||||
@ -233151,7 +233151,7 @@ CVE-2023-47422,0,0,53e4ba62d7fd0242ce1870b57522bcebcee34260151a2b5b738b7621b64d4
|
|||||||
CVE-2023-4743,0,0,7bfbdabe8b9425296f1d631d292f0a9fb2f878bdfac9a0c89327f6098a11bb34,2024-03-21T02:49:52.253000
|
CVE-2023-4743,0,0,7bfbdabe8b9425296f1d631d292f0a9fb2f878bdfac9a0c89327f6098a11bb34,2024-03-21T02:49:52.253000
|
||||||
CVE-2023-47430,0,0,e6a5754bab3f4151de611d77cd2c885bddd03b736d05dd3ab604542d22404cc3,2024-03-26T12:55:05.010000
|
CVE-2023-47430,0,0,e6a5754bab3f4151de611d77cd2c885bddd03b736d05dd3ab604542d22404cc3,2024-03-26T12:55:05.010000
|
||||||
CVE-2023-47437,0,0,6e79bd1227b77bbb4f11ccfeeaa138eb5ff31bfe22e27fcab2f47ad374baaeca,2023-12-01T19:48:29.537000
|
CVE-2023-47437,0,0,6e79bd1227b77bbb4f11ccfeeaa138eb5ff31bfe22e27fcab2f47ad374baaeca,2023-12-01T19:48:29.537000
|
||||||
CVE-2023-47438,0,0,522d6ee1fc05d0946ab2173f13d638b091448082f51d8de059dae7edd97b3bd1,2024-03-27T22:15:07.607000
|
CVE-2023-47438,0,1,e19cf49c88db0c67b3c3ac69fce63c6471c5ddbd88ae8bf9e6b62af83c69e9d4,2024-03-28T02:01:13.303000
|
||||||
CVE-2023-4744,0,0,f33e2f57712194685c3dca3e1493ab9255a824e0935438d389efcbddb6e95f44,2024-03-21T02:49:52.340000
|
CVE-2023-4744,0,0,f33e2f57712194685c3dca3e1493ab9255a824e0935438d389efcbddb6e95f44,2024-03-21T02:49:52.340000
|
||||||
CVE-2023-47440,0,0,b65a22d6ec75b9b58933b07ceb717cde5ccdee4dab3cc2632d1662455c5a9b4d,2023-12-12T18:06:36.190000
|
CVE-2023-47440,0,0,b65a22d6ec75b9b58933b07ceb717cde5ccdee4dab3cc2632d1662455c5a9b4d,2023-12-12T18:06:36.190000
|
||||||
CVE-2023-47444,0,0,75fffcc4c2ccad6cbd523a225547a38913fed508632c010f0070b3ffb755f791,2023-11-21T01:02:43.800000
|
CVE-2023-47444,0,0,75fffcc4c2ccad6cbd523a225547a38913fed508632c010f0070b3ffb755f791,2023-11-21T01:02:43.800000
|
||||||
@ -237960,13 +237960,13 @@ CVE-2024-0057,0,0,e4dc663a42ac696d9f4ea85b4eec7c26c470f055092858eb6ffdd99343f4d6
|
|||||||
CVE-2024-0068,0,0,29054351872f671ffd0afada76da136d48518b88acaefb639ccc6c169ead07a3,2024-03-01T14:04:26.010000
|
CVE-2024-0068,0,0,29054351872f671ffd0afada76da136d48518b88acaefb639ccc6c169ead07a3,2024-03-01T14:04:26.010000
|
||||||
CVE-2024-0069,0,0,fcda9c827a68481a563f617244a09b1d788f56c62c31734c572fbfe1a75ea718,2023-11-28T00:15:07.140000
|
CVE-2024-0069,0,0,fcda9c827a68481a563f617244a09b1d788f56c62c31734c572fbfe1a75ea718,2023-11-28T00:15:07.140000
|
||||||
CVE-2024-0070,0,0,f5edfa828dbd64ca40da0463d8d67355f807a2f6d8ea2e049578dd15434f1821,2023-11-28T00:15:07.183000
|
CVE-2024-0070,0,0,f5edfa828dbd64ca40da0463d8d67355f807a2f6d8ea2e049578dd15434f1821,2023-11-28T00:15:07.183000
|
||||||
CVE-2024-0071,0,0,30a428905c67c7adb95d2412a9689eb89a21c088a6addc56bfe101ff63aadc6e,2024-03-27T22:15:07.667000
|
CVE-2024-0071,0,1,3c378887eeaa6b11db2b19d4595e7c0cd53509985d1c9d98774f1aebb8c59b80,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-0073,0,0,880cf04fc43f0cfad9e2d59cff6705bb4a9889733cf925e4ff2ffdb354927c7e,2024-03-27T22:15:08.133000
|
CVE-2024-0073,0,1,71dca8455bfd5b8c3378a88f2fbf329de69dbdef467620d938e3e37f25db95cf,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-0074,0,0,75bd56d00f0ec411ef82bce7d8ebe09e0783e167c1f0d15a390a1d7b477ad2e2,2024-03-27T22:15:08.617000
|
CVE-2024-0074,0,1,b90c1b008436f10bec0ffec9ce1a7d33a04ae5e63b2f2bb9e311d102f045f060,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-0075,0,0,a4a1cddb3e5e73443b6db68fcdc803a1d517a7ec139e4f9fd304639e870d9ce9,2024-03-27T22:15:09.140000
|
CVE-2024-0075,0,1,2d9eb533d1befa0362cd71e816e50a3e6da65e89da52195d8b4a42d8d2dc2502,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-0077,0,0,c78e3005696d3d73c5dab0fe61f2c93ea360e3ee2dac536997251669e079dfc1,2024-03-27T22:15:09.510000
|
CVE-2024-0077,0,1,bdf0c108d3ee1d8bf315e6b9cd05e08015440b0ddbfb885d17680a79f074465e,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-0078,0,0,cbef8e60b1078c0b436b75294924dc6c05ec75db357c01d5117d20285417c736,2024-03-27T22:15:09.700000
|
CVE-2024-0078,0,1,6621a60a53ce37e266eb25f99012c87dc7679be246eb19ae41d9218e5094e5f6,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-0079,0,0,c2d3ae39b02554c9afe92817ff9cd9f4e84911e27a55abdf769773a6746f8f33,2024-03-27T22:15:09.897000
|
CVE-2024-0079,0,1,f4767fa11332039161d4216c5e55ec4d198329b07073d82b7244b84c097d8516,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-0154,0,0,503aed517e3c557edd7cd4a234585f8e223bdcb46afc8dd52a7284b4bb324992,2024-03-13T18:15:58.530000
|
CVE-2024-0154,0,0,503aed517e3c557edd7cd4a234585f8e223bdcb46afc8dd52a7284b4bb324992,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-0155,0,0,a75d6b44d8976b9f082fed092efd11db077fc0559b3b5c46ef337c5d8f761d3f,2024-03-04T13:58:23.447000
|
CVE-2024-0155,0,0,a75d6b44d8976b9f082fed092efd11db077fc0559b3b5c46ef337c5d8f761d3f,2024-03-04T13:58:23.447000
|
||||||
CVE-2024-0156,0,0,978a8cd7f1acaeac5930d83f177d0fbfbff728a7123e5197399066e9731cb1b4,2024-03-04T13:58:23.447000
|
CVE-2024-0156,0,0,978a8cd7f1acaeac5930d83f177d0fbfbff728a7123e5197399066e9731cb1b4,2024-03-04T13:58:23.447000
|
||||||
@ -238636,7 +238636,7 @@ CVE-2024-0975,0,0,91c0791baf9b48c9c245a77636f61287ad592fe47de1863701c5fe6e61c0d6
|
|||||||
CVE-2024-0976,0,0,161140e9c1a200eff62ad44296dc49a8303a23be090ab83243cad7c797f8f82d,2024-03-13T18:16:18.563000
|
CVE-2024-0976,0,0,161140e9c1a200eff62ad44296dc49a8303a23be090ab83243cad7c797f8f82d,2024-03-13T18:16:18.563000
|
||||||
CVE-2024-0977,0,0,265a9a088dbf9179612f3eba4d6866f7160bf19014cca832dc6a54c521c233b7,2024-02-14T18:46:52.707000
|
CVE-2024-0977,0,0,265a9a088dbf9179612f3eba4d6866f7160bf19014cca832dc6a54c521c233b7,2024-02-14T18:46:52.707000
|
||||||
CVE-2024-0978,0,0,bd9486fab4a038f4e847f9788adcccd45ac34e1994eb8b3f3f5dba77cc4513b0,2024-02-29T13:49:29.390000
|
CVE-2024-0978,0,0,bd9486fab4a038f4e847f9788adcccd45ac34e1994eb8b3f3f5dba77cc4513b0,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-0980,1,1,b3fa7be79647782a2f5a91ddd509e8ef36876e86b6b47d209cfae1efa6c4141b,2024-03-28T00:15:07.867000
|
CVE-2024-0980,0,1,da28e8102b3bd45e94607e62ff3413eb1f6e0ab8b1e2566ed2a18e6cb2f6aa98,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-0983,0,0,bb1cce9780d9afeb412811ada7cb9acefd8863ec35c930bdc009e174d02d368f,2024-02-29T13:49:29.390000
|
CVE-2024-0983,0,0,bb1cce9780d9afeb412811ada7cb9acefd8863ec35c930bdc009e174d02d368f,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-0984,0,0,6080915a3c285e627ed886246e31c6de8d5b3ffea571b8480ecb0516c7add805,2024-02-29T13:49:29.390000
|
CVE-2024-0984,0,0,6080915a3c285e627ed886246e31c6de8d5b3ffea571b8480ecb0516c7add805,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-0985,0,0,7f62d4f229f42e211d79e54ca95fbe4e7e170d1291d382df953b17f7c27d2355,2024-03-18T17:15:06.070000
|
CVE-2024-0985,0,0,7f62d4f229f42e211d79e54ca95fbe4e7e170d1291d382df953b17f7c27d2355,2024-03-18T17:15:06.070000
|
||||||
@ -239176,6 +239176,7 @@ CVE-2024-1764,0,0,c434e7eb3867d4e9c121215628110f61b78b54be2a078e3d4abbb0d2595e24
|
|||||||
CVE-2024-1765,0,0,9393650a3716a95a879e579180f18ed4907e1cef3b587b0e572b47942072153d,2024-03-13T12:33:51.697000
|
CVE-2024-1765,0,0,9393650a3716a95a879e579180f18ed4907e1cef3b587b0e572b47942072153d,2024-03-13T12:33:51.697000
|
||||||
CVE-2024-1767,0,0,164cfb2f79cabfa462770ec4a455f8e91d058d9fb18bef76ee945606225fec24,2024-03-11T01:32:39.697000
|
CVE-2024-1767,0,0,164cfb2f79cabfa462770ec4a455f8e91d058d9fb18bef76ee945606225fec24,2024-03-11T01:32:39.697000
|
||||||
CVE-2024-1769,0,0,4b17a6efe485c004cbf1cc71fd32ae864ff319587ea6998c7a1ad28d6dff65e5,2024-03-05T13:41:01.900000
|
CVE-2024-1769,0,0,4b17a6efe485c004cbf1cc71fd32ae864ff319587ea6998c7a1ad28d6dff65e5,2024-03-05T13:41:01.900000
|
||||||
|
CVE-2024-1770,1,1,9281c6af1a99a418595299dd2676ee054fda1e9647084c1aca476ff988b536ee,2024-03-28T02:15:09.573000
|
||||||
CVE-2024-1771,0,0,cc7280a085dd6f03eb9687c2eff5425926f2bc0e4a81dde799379b7786c7a87e,2024-03-06T15:18:08.093000
|
CVE-2024-1771,0,0,cc7280a085dd6f03eb9687c2eff5425926f2bc0e4a81dde799379b7786c7a87e,2024-03-06T15:18:08.093000
|
||||||
CVE-2024-1772,0,0,0b326d9510559c6067c267d36e9a70471b8bb7ef9e6a03b194bff9465ff37901,2024-03-13T18:15:58.530000
|
CVE-2024-1772,0,0,0b326d9510559c6067c267d36e9a70471b8bb7ef9e6a03b194bff9465ff37901,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-1773,0,0,eea85e1a4bb87da89a486d39c94ff7ae4042032c41aee54c0645824074a798c9,2024-03-08T14:02:57.420000
|
CVE-2024-1773,0,0,eea85e1a4bb87da89a486d39c94ff7ae4042032c41aee54c0645824074a798c9,2024-03-08T14:02:57.420000
|
||||||
@ -239395,8 +239396,8 @@ CVE-2024-20301,0,0,5731f674f5ae2bcf96420fc328e70e5146901802d1ab3db25461c019cd209
|
|||||||
CVE-2024-20303,0,0,e5ac9d50052f4c4c8ef804ccaefc800a16509a09aa16e231d189818adcc2e3c2,2024-03-27T17:48:21.140000
|
CVE-2024-20303,0,0,e5ac9d50052f4c4c8ef804ccaefc800a16509a09aa16e231d189818adcc2e3c2,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-20305,0,0,ab61a4ab7882e267880cc2c0e6b3ec1ab9c8b4d0dadf3a4832bdf14ae2ae012d,2024-02-15T19:56:38.910000
|
CVE-2024-20305,0,0,ab61a4ab7882e267880cc2c0e6b3ec1ab9c8b4d0dadf3a4832bdf14ae2ae012d,2024-02-15T19:56:38.910000
|
||||||
CVE-2024-20306,0,0,7ce4ce882880d6a48a5bc5e41b86d2467b57bc87bd8f78243b3657e3eec48482,2024-03-27T17:48:21.140000
|
CVE-2024-20306,0,0,7ce4ce882880d6a48a5bc5e41b86d2467b57bc87bd8f78243b3657e3eec48482,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-20307,0,0,6e057a049f344ad501317a246d37c6a97da44c74d43554b7afa1d19dde729fe3,2024-03-27T18:15:09.357000
|
CVE-2024-20307,0,1,cfac14e2d03f5d2ce0658f69db5b5fd1610287e2ff1d64a236d9cbc4d290f6bb,2024-03-28T02:01:21.693000
|
||||||
CVE-2024-20308,0,0,5982f15762a09863ecfc1c3105619d4c65dd988fdcec0e1b0f62fbfed1430f39,2024-03-27T18:15:09.853000
|
CVE-2024-20308,0,1,af0b2c931d159b241294b59c6f7af8dddd60840a0fc7fa6b1fc4c79e4a4631f3,2024-03-28T02:01:21.693000
|
||||||
CVE-2024-20309,0,0,e1a5a828e0a9998a91a0f24ce922d605b9c5494ea6372c8e56a89d1b0cae6848,2024-03-27T17:48:21.140000
|
CVE-2024-20309,0,0,e1a5a828e0a9998a91a0f24ce922d605b9c5494ea6372c8e56a89d1b0cae6848,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-2031,0,0,8c1bcd6bbcf916842768e08303dd42fc425614624a1e3216d105b6a1ddb5c8c0,2024-03-13T12:33:51.697000
|
CVE-2024-2031,0,0,8c1bcd6bbcf916842768e08303dd42fc425614624a1e3216d105b6a1ddb5c8c0,2024-03-13T12:33:51.697000
|
||||||
CVE-2024-20311,0,0,c693e0e2ebd0ccff4af9c3de016bddd629d8a55f7bab90eb59f830d5f1210bde,2024-03-27T17:48:21.140000
|
CVE-2024-20311,0,0,c693e0e2ebd0ccff4af9c3de016bddd629d8a55f7bab90eb59f830d5f1210bde,2024-03-27T17:48:21.140000
|
||||||
@ -239676,6 +239677,8 @@ CVE-2024-20986,0,0,55fd916bbc66a048aba24029df1cdbff6d17cbdc5963bc85efdc3f349c48d
|
|||||||
CVE-2024-20987,0,0,e6a4199f934ca8909c51db00ae903048e2b51791ebdf6565c06b10750c7af3ef,2024-01-20T18:30:16.877000
|
CVE-2024-20987,0,0,e6a4199f934ca8909c51db00ae903048e2b51791ebdf6565c06b10750c7af3ef,2024-01-20T18:30:16.877000
|
||||||
CVE-2024-2106,0,0,36a22e42a96a914c41992c81c774d6efd7bfa3b0b0b3c330a2d2cbc45a2a449b,2024-03-13T18:15:58.530000
|
CVE-2024-2106,0,0,36a22e42a96a914c41992c81c774d6efd7bfa3b0b0b3c330a2d2cbc45a2a449b,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-2107,0,0,b116f601239eee1477d732dcdf4bd402d2ca5c711c20a89df0a8e9dd54cd4cd1,2024-03-13T12:33:51.697000
|
CVE-2024-2107,0,0,b116f601239eee1477d732dcdf4bd402d2ca5c711c20a89df0a8e9dd54cd4cd1,2024-03-13T12:33:51.697000
|
||||||
|
CVE-2024-2110,1,1,98901d9ed02484f2b53c16b0465c0dbe1ecb16bc867b94090e8f842ba0641aba,2024-03-28T02:15:09.990000
|
||||||
|
CVE-2024-2111,1,1,64df82b18b96c74f73d8db51669d22a82054cda6f44d598fdf2fd62828a1828f,2024-03-28T02:15:10.397000
|
||||||
CVE-2024-2120,0,0,d869e2d6a05f40fd099ef5d11b57f9e00d7f0b266e38148b71c8a447ce60ab1d,2024-03-27T12:29:30.307000
|
CVE-2024-2120,0,0,d869e2d6a05f40fd099ef5d11b57f9e00d7f0b266e38148b71c8a447ce60ab1d,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-2121,0,0,4e86b6ec3433d288b50b9e9c9587d6707962f4c2d7ff92215a6366c5fd16dc6b,2024-03-27T12:29:30.307000
|
CVE-2024-2121,0,0,4e86b6ec3433d288b50b9e9c9587d6707962f4c2d7ff92215a6366c5fd16dc6b,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-2123,0,0,73501544f7a3558963420aa67d952b80e94655e9088396c3288ccd604d8029fd,2024-03-13T12:33:51.697000
|
CVE-2024-2123,0,0,73501544f7a3558963420aa67d952b80e94655e9088396c3288ccd604d8029fd,2024-03-13T12:33:51.697000
|
||||||
@ -240664,7 +240667,7 @@ CVE-2024-23446,0,0,250d55c97e03f858281f4b571f5417bd7430f2eb75d812ec1a5460363cd23
|
|||||||
CVE-2024-23447,0,0,d914699914a1032e2f26c2be4fcf7737ff60c4d99dbe7a58145b0312508d8818,2024-02-14T20:02:00.753000
|
CVE-2024-23447,0,0,d914699914a1032e2f26c2be4fcf7737ff60c4d99dbe7a58145b0312508d8818,2024-02-14T20:02:00.753000
|
||||||
CVE-2024-23448,0,0,9b1c1e9aca41646e9bc0b5aea887714df628a3eafb241e1a8858ac207b41bd27,2024-02-15T15:39:14.317000
|
CVE-2024-23448,0,0,9b1c1e9aca41646e9bc0b5aea887714df628a3eafb241e1a8858ac207b41bd27,2024-02-15T15:39:14.317000
|
||||||
CVE-2024-23450,0,0,6ff242ba8621158a6fc5bf1e14cebaff80a919a65abf5fe5c94bac3fd2cfef43,2024-03-27T17:48:21.140000
|
CVE-2024-23450,0,0,6ff242ba8621158a6fc5bf1e14cebaff80a919a65abf5fe5c94bac3fd2cfef43,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-23451,0,0,396a36e96f019a84ce41421d631ed0347d8e4d3267d4975e6f03c5a130a41249,2024-03-27T18:15:10.330000
|
CVE-2024-23451,0,1,f3b5a24f7da83e111444dc1acc1868313e949f20ef4570c22f64673b983cb9ff,2024-03-28T02:01:21.693000
|
||||||
CVE-2024-23452,0,0,aaa529ca6e03eefd16006bb57cfd95647fc8b44bb3a3176fd8a83e06021cb7e9,2024-02-29T01:44:08.877000
|
CVE-2024-23452,0,0,aaa529ca6e03eefd16006bb57cfd95647fc8b44bb3a3176fd8a83e06021cb7e9,2024-02-29T01:44:08.877000
|
||||||
CVE-2024-23453,0,0,ab3a22284e10fea1933712f86026a2e7792304e1f83321557a4d02140679b266,2024-01-29T22:58:07.777000
|
CVE-2024-23453,0,0,ab3a22284e10fea1933712f86026a2e7792304e1f83321557a4d02140679b266,2024-01-29T22:58:07.777000
|
||||||
CVE-2024-23476,0,0,e3d84cdb88c20fc5ad4183c7e154fd4eb94d6574a64f56328103056889f0fc9e,2024-02-20T20:39:10.033000
|
CVE-2024-23476,0,0,e3d84cdb88c20fc5ad4183c7e154fd4eb94d6574a64f56328103056889f0fc9e,2024-02-20T20:39:10.033000
|
||||||
@ -241544,7 +241547,7 @@ CVE-2024-25344,0,0,5140bac0aef452b65d54f79c6217b05ec44dd1a460f10a2ceaa1e65877e2e
|
|||||||
CVE-2024-2535,0,0,0dd9e1bc0e1cb89bd4d5eca9981e8a4999a84b5f3fcccfdbdcf3cfa421537713,2024-03-21T02:52:37.310000
|
CVE-2024-2535,0,0,0dd9e1bc0e1cb89bd4d5eca9981e8a4999a84b5f3fcccfdbdcf3cfa421537713,2024-03-21T02:52:37.310000
|
||||||
CVE-2024-25350,0,0,3b5e1a464fb4fcd28f6d7166045a369486403df18ae61c0e2fab4e4e5871d428,2024-02-29T13:49:47.277000
|
CVE-2024-25350,0,0,3b5e1a464fb4fcd28f6d7166045a369486403df18ae61c0e2fab4e4e5871d428,2024-02-29T13:49:47.277000
|
||||||
CVE-2024-25351,0,0,28c4ca40865cd756499ab4d2ad9d55bb73b890cae2259528816b47b2a536dca5,2024-02-29T13:49:47.277000
|
CVE-2024-25351,0,0,28c4ca40865cd756499ab4d2ad9d55bb73b890cae2259528816b47b2a536dca5,2024-02-29T13:49:47.277000
|
||||||
CVE-2024-25354,0,0,8ffa14e65dad44e455c11c6e3bac91e7d99dc2f81dd850ad2377a545aef5694f,2024-03-27T22:15:10.093000
|
CVE-2024-25354,0,1,a12b2d299fce99ca8082ea1fd30c459ccbbfd96e0b721c0145b84f55090dd048,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-25359,0,0,9c7e950ef54f547e29dbfe7e3905d1cbbbe8e0be6e3cf6f262ec35911e4dc9e2,2024-03-21T12:58:51.093000
|
CVE-2024-25359,0,0,9c7e950ef54f547e29dbfe7e3905d1cbbbe8e0be6e3cf6f262ec35911e4dc9e2,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-25360,0,0,3e224bc7b3e9e14e80fd4bf018fb256496be6af2f44b523d9f71f67e98675039,2024-02-12T17:31:21.670000
|
CVE-2024-25360,0,0,3e224bc7b3e9e14e80fd4bf018fb256496be6af2f44b523d9f71f67e98675039,2024-02-12T17:31:21.670000
|
||||||
CVE-2024-25366,0,0,dee495aa8a0f0bbcbead8039fddcd3f716b7e5ed2944c5a0aca4a92e1be3c151,2024-02-20T19:50:53.960000
|
CVE-2024-25366,0,0,dee495aa8a0f0bbcbead8039fddcd3f716b7e5ed2944c5a0aca4a92e1be3c151,2024-02-20T19:50:53.960000
|
||||||
@ -242450,6 +242453,18 @@ CVE-2024-27995,0,0,31db9c3046ef3b6826fd04aab15586376d26e0b529bdf84ce7eba17bac569
|
|||||||
CVE-2024-27996,0,0,79cff30308b011c07df476cb18acc5ff1830e7bf17b14d1ca5a0d9446fa716b8,2024-03-20T13:00:16.367000
|
CVE-2024-27996,0,0,79cff30308b011c07df476cb18acc5ff1830e7bf17b14d1ca5a0d9446fa716b8,2024-03-20T13:00:16.367000
|
||||||
CVE-2024-27997,0,0,b42c7cf4751e4a11a6e5eeb90c0df264fce89958ee556b8b06894cd2e68b11ce,2024-03-20T13:00:16.367000
|
CVE-2024-27997,0,0,b42c7cf4751e4a11a6e5eeb90c0df264fce89958ee556b8b06894cd2e68b11ce,2024-03-20T13:00:16.367000
|
||||||
CVE-2024-27998,0,0,325b1a8419d02931fcb08c1286afe5c33e53c5bf8527e201a365155e360914cf,2024-03-20T13:00:16.367000
|
CVE-2024-27998,0,0,325b1a8419d02931fcb08c1286afe5c33e53c5bf8527e201a365155e360914cf,2024-03-20T13:00:16.367000
|
||||||
|
CVE-2024-28005,1,1,8683f5c2a8105ad701e313b14e0701e07109091805a7494e1e3a66bd4dc47ae5,2024-03-28T02:01:13.303000
|
||||||
|
CVE-2024-28006,1,1,f88c502d4a65d1f66cc70843b883d7246320056be031b7f1a8e9c1929111a63a,2024-03-28T02:01:13.303000
|
||||||
|
CVE-2024-28007,1,1,eeaa3124554634dbe3aa791e9381e85b397525258e1205e3ad612c93c3d4926d,2024-03-28T02:01:13.303000
|
||||||
|
CVE-2024-28008,1,1,4ab2d90baecd4ac275519b421b0807a78662a112314e89d8dc6953cd05b64727,2024-03-28T02:01:13.303000
|
||||||
|
CVE-2024-28009,1,1,e1c3e4fa24cd04cd8c467609d26d27e72f11993ac4c36c700f27746cdd0ae07c,2024-03-28T02:01:13.303000
|
||||||
|
CVE-2024-28010,1,1,d6b058bc281ac248ea38e84579789c0636ce5372c40f0ca078aa2d6659d9f0a7,2024-03-28T02:01:13.303000
|
||||||
|
CVE-2024-28011,1,1,2c6fa266dd1c65d935074c5d457daa7b9a6d8d5c8359b69f36eab79706d44e51,2024-03-28T02:01:13.303000
|
||||||
|
CVE-2024-28012,1,1,cc1bd50e1c07bef900959872f35ca6f528ba778dc6bf5c9e1f79469d29bfd25a,2024-03-28T02:01:13.303000
|
||||||
|
CVE-2024-28013,1,1,5b1ea81b724b32bbc27814407c9aeab9d56b1feae6a99f2edfe2bf7cb69c2824,2024-03-28T02:01:13.303000
|
||||||
|
CVE-2024-28014,1,1,2766d243cce4e440bd7bf9e6afb16a2018c8b35e3aa83a9fe5a882f1973daab5,2024-03-28T02:01:13.303000
|
||||||
|
CVE-2024-28015,1,1,e94184d7384bc0cddf6a652e35600ae00fd000a34a504d303eb07e1147272be1,2024-03-28T02:01:13.303000
|
||||||
|
CVE-2024-28016,1,1,70725e6369abb30b9e296b010e5e3a25e39825a8553c40bab8c10cd665f2a8f3,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-2802,0,0,3b7ed9aefbc68681b0633b6ab16c0b3db6db844ee4c655f6c7e6863ac6e1f543,2024-03-26T15:15:49.677000
|
CVE-2024-2802,0,0,3b7ed9aefbc68681b0633b6ab16c0b3db6db844ee4c655f6c7e6863ac6e1f543,2024-03-26T15:15:49.677000
|
||||||
CVE-2024-28029,0,0,9e465d515603ce2b4056e1d4099525822960990d4afbdcda109cb1a09fe772c2,2024-03-25T16:06:44.403000
|
CVE-2024-28029,0,0,9e465d515603ce2b4056e1d4099525822960990d4afbdcda109cb1a09fe772c2,2024-03-25T16:06:44.403000
|
||||||
CVE-2024-28033,0,0,d380f707343e80ca8a48383d7130e8455ae81fc182e0d67c36374f1eb571652f,2024-03-26T12:55:05.010000
|
CVE-2024-28033,0,0,d380f707343e80ca8a48383d7130e8455ae81fc182e0d67c36374f1eb571652f,2024-03-26T12:55:05.010000
|
||||||
@ -242468,7 +242483,7 @@ CVE-2024-2807,0,0,47b8a7021ebbb15acc350203dd3081726f7b96c650b8d998414fd135c1027f
|
|||||||
CVE-2024-28070,0,0,d9b3309fdc4db05937449ae85d6df93a299898f40c2c79f5bb7988f4ebb25838,2024-03-17T22:38:29.433000
|
CVE-2024-28070,0,0,d9b3309fdc4db05937449ae85d6df93a299898f40c2c79f5bb7988f4ebb25838,2024-03-17T22:38:29.433000
|
||||||
CVE-2024-2808,0,0,a0621aec3e17f906967cd04e2f75551ea2d13f29c3ece6e8f56dccb94d17afe1,2024-03-26T03:13:36.183000
|
CVE-2024-2808,0,0,a0621aec3e17f906967cd04e2f75551ea2d13f29c3ece6e8f56dccb94d17afe1,2024-03-26T03:13:36.183000
|
||||||
CVE-2024-28084,0,0,e855eaf3201adbee7f29bca688e63324787cf32844050753a9cd1965f8c4b542,2024-03-23T03:15:11.583000
|
CVE-2024-28084,0,0,e855eaf3201adbee7f29bca688e63324787cf32844050753a9cd1965f8c4b542,2024-03-23T03:15:11.583000
|
||||||
CVE-2024-28085,0,0,98bf8795c0110d4df8052feb8dcd9584d06668c2d76d6af8803048daa3592c71,2024-03-27T19:15:48.367000
|
CVE-2024-28085,0,1,0844fa2b1529f2eeab96b834f8c50db7faab0f274d17fe55fe3f3354648f9ded,2024-03-28T02:01:21.693000
|
||||||
CVE-2024-28088,0,0,d2f20b1069b24ba10d21e8bf3b61c2c6a1c6b345ff59786676752b80abbde7a4,2024-03-13T21:16:00.380000
|
CVE-2024-28088,0,0,d2f20b1069b24ba10d21e8bf3b61c2c6a1c6b345ff59786676752b80abbde7a4,2024-03-13T21:16:00.380000
|
||||||
CVE-2024-28089,0,0,830991c1dd5898b6a817a3f8bb8784922af3636f20b8b62ba1c918d5d83f6f10,2024-03-11T01:32:29.610000
|
CVE-2024-28089,0,0,830991c1dd5898b6a817a3f8bb8784922af3636f20b8b62ba1c918d5d83f6f10,2024-03-11T01:32:29.610000
|
||||||
CVE-2024-2809,0,0,16a24c41619de5ba8d47e944f4573d2f7981695d1c5bec0e5f48dbb2fc9c9b69,2024-03-26T03:13:47.830000
|
CVE-2024-2809,0,0,16a24c41619de5ba8d47e944f4573d2f7981695d1c5bec0e5f48dbb2fc9c9b69,2024-03-26T03:13:47.830000
|
||||||
@ -242561,7 +242576,7 @@ CVE-2024-28229,0,0,7bfc3b59e790a5126732ec4d8d480f9938166a41475488b32e066c1e064cc
|
|||||||
CVE-2024-2823,0,0,1867dc09c5e833da359a0c14ac91c9482d72bb78f2ce80c84c0309fdaa923bfc,2024-03-22T19:02:10.300000
|
CVE-2024-2823,0,0,1867dc09c5e833da359a0c14ac91c9482d72bb78f2ce80c84c0309fdaa923bfc,2024-03-22T19:02:10.300000
|
||||||
CVE-2024-28230,0,0,3036aa70102b53b9cc695265dc4a11e5a4f5b8d26f6120835dbd1a9c3d93e7ec,2024-03-07T13:52:27.110000
|
CVE-2024-28230,0,0,3036aa70102b53b9cc695265dc4a11e5a4f5b8d26f6120835dbd1a9c3d93e7ec,2024-03-07T13:52:27.110000
|
||||||
CVE-2024-28231,0,0,f41f4c1605399e97b52547261c763ca0d059815d5c55e921912a149cd091acde,2024-03-21T12:58:51.093000
|
CVE-2024-28231,0,0,f41f4c1605399e97b52547261c763ca0d059815d5c55e921912a149cd091acde,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-28233,0,0,6e7adbfcda365f18ba124f94907710cd713a299e802391a71f30620ea74e66ca,2024-03-27T19:15:48.430000
|
CVE-2024-28233,0,1,accd19653e4fb87965492361d5e3e83a58cd9545ef54fcd1230d21b32b8e2d7d,2024-03-28T02:01:21.693000
|
||||||
CVE-2024-28236,0,0,ea7d34bffb060eb0191757ceb4c446ee8bfa4166cb7d1e0d8e67e75c651ba966,2024-03-13T12:33:51.697000
|
CVE-2024-28236,0,0,ea7d34bffb060eb0191757ceb4c446ee8bfa4166cb7d1e0d8e67e75c651ba966,2024-03-13T12:33:51.697000
|
||||||
CVE-2024-28237,0,0,e54564ebce9f53fbf47a1a617d4c2539d1d06a16522000543afac14f934cf25f,2024-03-19T13:26:46
|
CVE-2024-28237,0,0,e54564ebce9f53fbf47a1a617d4c2539d1d06a16522000543afac14f934cf25f,2024-03-19T13:26:46
|
||||||
CVE-2024-28238,0,0,38219e010007b7fe5426826144cd2eabd2e22d36d31c50aa8471901674b524b3,2024-03-13T12:33:51.697000
|
CVE-2024-28238,0,0,38219e010007b7fe5426826144cd2eabd2e22d36d31c50aa8471901674b524b3,2024-03-13T12:33:51.697000
|
||||||
@ -242572,7 +242587,7 @@ CVE-2024-28243,0,0,b62121443f467a21df9a72e6de805a7094f659c79fc9b69ca113c6cd74783
|
|||||||
CVE-2024-28244,0,0,8a0b0822374c9608b1ee3be4ddc31140538b510b0fd28061fd05bdbdf794fae2,2024-03-26T12:55:05.010000
|
CVE-2024-28244,0,0,8a0b0822374c9608b1ee3be4ddc31140538b510b0fd28061fd05bdbdf794fae2,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-28245,0,0,ad5a09bb643469edf06f460630cbf65a15180867ced005dc01d0df0098be8f11,2024-03-26T12:55:05.010000
|
CVE-2024-28245,0,0,ad5a09bb643469edf06f460630cbf65a15180867ced005dc01d0df0098be8f11,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-28246,0,0,cd369a06f7ae7fd9ab35271cb07a672352ca99976424cd04633d8a0d97406151,2024-03-26T12:55:05.010000
|
CVE-2024-28246,0,0,cd369a06f7ae7fd9ab35271cb07a672352ca99976424cd04633d8a0d97406151,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-28247,0,0,4c1010e8b1387a3575ae9cc58499c5ad2d20c679556fbdf0aedbea77747fa924,2024-03-27T19:15:48.637000
|
CVE-2024-28247,0,1,87b4f0566478ba31d229d1c04aaf30844c7556166681b4cd3694403f3487669f,2024-03-28T02:01:21.693000
|
||||||
CVE-2024-28248,0,0,b617812c524b85d27f2a46b3a739648463fa9ffb5a6e46ea47ba0c68bd3fa409,2024-03-19T13:26:46
|
CVE-2024-28248,0,0,b617812c524b85d27f2a46b3a739648463fa9ffb5a6e46ea47ba0c68bd3fa409,2024-03-19T13:26:46
|
||||||
CVE-2024-28249,0,0,7f01b3731d6ed3594265964b9061da88eb89dfe99b6d59bfec8413859c3ac454,2024-03-19T13:26:46
|
CVE-2024-28249,0,0,7f01b3731d6ed3594265964b9061da88eb89dfe99b6d59bfec8413859c3ac454,2024-03-19T13:26:46
|
||||||
CVE-2024-2825,0,0,731d564e18c15016bfac25b783d866bfc2b3073e42c4b54f0ca736209097bfbb,2024-03-25T01:51:01.223000
|
CVE-2024-2825,0,0,731d564e18c15016bfac25b783d866bfc2b3073e42c4b54f0ca736209097bfbb,2024-03-25T01:51:01.223000
|
||||||
@ -242731,7 +242746,7 @@ CVE-2024-28854,0,0,8cb03aded6b194ffbf5e93b6a999bfbf01ac8f736343c4fc752b0e38a8bc9
|
|||||||
CVE-2024-28855,0,0,2384a3330fde47f752f152bfa13a6226cb6b236bb18ff2466f5e886c7d3e893c,2024-03-19T13:26:46
|
CVE-2024-28855,0,0,2384a3330fde47f752f152bfa13a6226cb6b236bb18ff2466f5e886c7d3e893c,2024-03-19T13:26:46
|
||||||
CVE-2024-28859,0,0,2d0407c7b83f2786a493b842ae3fe3ce3f906494adee8b0e0f61c75557fcb17c,2024-03-17T22:38:29.433000
|
CVE-2024-28859,0,0,2d0407c7b83f2786a493b842ae3fe3ce3f906494adee8b0e0f61c75557fcb17c,2024-03-17T22:38:29.433000
|
||||||
CVE-2024-2886,0,0,6e2c93ce5d4e26c4d3323ffd43f5daeef03c7e577cbecbc4edf8fb5cb68f2687,2024-03-27T12:29:30.307000
|
CVE-2024-2886,0,0,6e2c93ce5d4e26c4d3323ffd43f5daeef03c7e577cbecbc4edf8fb5cb68f2687,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-28860,0,0,8530891db4a7f991deeb8743eda677f9aafce06f98a8d822a07506287d8e28eb,2024-03-27T19:15:48.827000
|
CVE-2024-28860,0,1,2922536757c7a9c3be62061c37c7cfc0e4757a979c8cb3f1c58b90b8c5136336,2024-03-28T02:01:21.693000
|
||||||
CVE-2024-28861,0,0,614b056391803730ffc563205182a9ac310eb6811e0e407400ba2dc4b494f050,2024-03-22T19:02:10.300000
|
CVE-2024-28861,0,0,614b056391803730ffc563205182a9ac310eb6811e0e407400ba2dc4b494f050,2024-03-22T19:02:10.300000
|
||||||
CVE-2024-28862,0,0,b0dc40150b0e5f15633ecb26c2614b37fe6eefbb423911349887989b36d78640,2024-03-17T22:38:29.433000
|
CVE-2024-28862,0,0,b0dc40150b0e5f15633ecb26c2614b37fe6eefbb423911349887989b36d78640,2024-03-17T22:38:29.433000
|
||||||
CVE-2024-28863,0,0,ad7818a88579939a8a2c9b467548624411262308646c7865759640aa6d437826,2024-03-22T12:45:36.130000
|
CVE-2024-28863,0,0,ad7818a88579939a8a2c9b467548624411262308646c7865759640aa6d437826,2024-03-22T12:45:36.130000
|
||||||
@ -242983,22 +242998,22 @@ CVE-2024-29876,0,0,81e9b92db68fe1869c86668a1e00f2a9ff624f59839df1fbe18d8e987774c
|
|||||||
CVE-2024-29877,0,0,5b6a7271e346dceec62c9141f9ae12b0e5342a31cc26366c653fe20c26c8bc21,2024-03-21T15:24:35.093000
|
CVE-2024-29877,0,0,5b6a7271e346dceec62c9141f9ae12b0e5342a31cc26366c653fe20c26c8bc21,2024-03-21T15:24:35.093000
|
||||||
CVE-2024-29878,0,0,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dda8d,2024-03-21T15:24:35.093000
|
CVE-2024-29878,0,0,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dda8d,2024-03-21T15:24:35.093000
|
||||||
CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000
|
CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000
|
||||||
CVE-2024-2988,0,0,44a505017c98ed38c8d5dc5d8e011605d3c9f7895e5eca811eae32b18fc8f7bb,2024-03-27T18:15:10.757000
|
CVE-2024-2988,0,1,095fa6458e008f6f7d69334248969b0501d37383db72dc8bee93560edc741f88,2024-03-28T02:01:21.693000
|
||||||
CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000
|
CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000
|
||||||
CVE-2024-29881,0,0,7eaff78a6eecd508372203508f2ecab97ebc62cfd94b7af6101b5d7b6ca209b2,2024-03-26T17:09:53.043000
|
CVE-2024-29881,0,0,7eaff78a6eecd508372203508f2ecab97ebc62cfd94b7af6101b5d7b6ca209b2,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29883,0,0,2444d321a867d6f4cdf63bf8a1bc6af3b407752f2134c1f64a1d02545242c426,2024-03-26T17:09:53.043000
|
CVE-2024-29883,0,0,2444d321a867d6f4cdf63bf8a1bc6af3b407752f2134c1f64a1d02545242c426,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29886,0,0,1adbb5073cba9b65593ecf8998a22e2a5d29436a3607268c528bf401c023cbf4,2024-03-27T19:15:49.023000
|
CVE-2024-29886,0,1,3f88cfdb4cfb88186dd10b00ca51e7380d7eb2a0a458754ea1dfe21c4512300e,2024-03-28T02:01:21.693000
|
||||||
CVE-2024-29887,0,0,d4e3377385744fa243f8c752377b78d10fb04f6b3cf56c3bd0fe2bd96f11984d,2024-03-27T19:15:49.230000
|
CVE-2024-29887,0,1,f387f1fcc31e0714aa90eb378be59a2d52ee246f68fe9dafd34624693c2abecd,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-29888,0,0,816e1902566b12dbf24377b613baef5b79a414fcea833a258cf044d46f30bd51,2024-03-27T19:15:49.410000
|
CVE-2024-29888,0,1,e6980a084f851bc0c8ffe0d4edac384e7194ab82af737faf570a62d329543dbf,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-2989,0,0,28b7dcd865137d9f2b8b08b53206e10e337ffacc5ed400750f6a854bac66dab1,2024-03-27T18:15:11.293000
|
CVE-2024-2989,0,1,7bf7e9a03ba8c5d37e74d436f6afb4547ab8035499b1c3a92009f461628a8bf5,2024-03-28T02:01:21.693000
|
||||||
CVE-2024-29891,0,0,7f9df39928cbbf99e5030accf6dd8020531a4366a49ed903a14fbbd277432a72,2024-03-27T20:15:07.780000
|
CVE-2024-29891,0,1,8db13a694d94d9c0ea356374520c4ec758a3562c2da8a21f831daea1cc8fa44b,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-29892,0,0,11a2de43764af3b9fd0910af9f11c950352c98e69bb104177454ad296186dea9,2024-03-27T20:15:08.303000
|
CVE-2024-29892,0,1,59c6b24496fc40dcb3fc7fa651d54d9a835514ae28a8bca0877d6fdd02e37f42,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-2990,0,0,29d47249dc9edae8b71b72a27ada065a3a8487192facbacb3019e2adced6a348,2024-03-27T19:15:49.710000
|
CVE-2024-2990,0,1,7b8bc4275f049749984166beead5725a3bf23799e4803482e7e47aaa1bac7e25,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-29906,0,0,5e6afa8dbe77b2ceaee29629c66d8bdf273caddf4f38f955d682aeefe9beab4c,2024-03-27T12:29:30.307000
|
CVE-2024-29906,0,0,5e6afa8dbe77b2ceaee29629c66d8bdf273caddf4f38f955d682aeefe9beab4c,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29907,0,0,95ebf1e66704307f93559559f18923b10f644f7f3c6486fedede31060b34f004,2024-03-27T12:29:30.307000
|
CVE-2024-29907,0,0,95ebf1e66704307f93559559f18923b10f644f7f3c6486fedede31060b34f004,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29908,0,0,e8d16098eaf081188862f8dc959904187f56568ff6eac559fa0228e1e293cd7d,2024-03-27T12:29:30.307000
|
CVE-2024-29908,0,0,e8d16098eaf081188862f8dc959904187f56568ff6eac559fa0228e1e293cd7d,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29909,0,0,e35d692490bf4e850bd9c44310b2bcdc71d1e19ea89b9513c3662fc2e536f1c8,2024-03-27T12:29:30.307000
|
CVE-2024-29909,0,0,e35d692490bf4e850bd9c44310b2bcdc71d1e19ea89b9513c3662fc2e536f1c8,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-2991,0,0,014fa0679cec95d7a2a8ad346f5e226ee43d3aeec7d3d19682b1d957d0dafc70,2024-03-27T19:15:49.940000
|
CVE-2024-2991,0,1,28194ab52dc1533fb7cd9475b7ea52373eb0e89e0809cf242b249c7cd9338c9e,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-29910,0,0,95e0ced080c2415c20a79532702b8302d4b33d6cd325a6b1a825844244f8d827,2024-03-27T12:29:30.307000
|
CVE-2024-29910,0,0,95e0ced080c2415c20a79532702b8302d4b33d6cd325a6b1a825844244f8d827,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29911,0,0,4092008a0663d92018dc076934d26b4252495c9f0c609c40c7a0a9cb7408115c,2024-03-27T12:29:30.307000
|
CVE-2024-29911,0,0,4092008a0663d92018dc076934d26b4252495c9f0c609c40c7a0a9cb7408115c,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29912,0,0,d4e137e215b0b00b25a8930ce0d0657c6dd7b00bfc0db6a92606d9a19e62f5d7,2024-03-27T12:29:30.307000
|
CVE-2024-29912,0,0,d4e137e215b0b00b25a8930ce0d0657c6dd7b00bfc0db6a92606d9a19e62f5d7,2024-03-27T12:29:30.307000
|
||||||
@ -243009,7 +243024,7 @@ CVE-2024-29916,0,0,dd300e18b662f862d3dd0881eace85d81be3f3aaeb79c908bcef100a80a89
|
|||||||
CVE-2024-29917,0,0,95c3e445522199a26b83d938184afd90a1d9b3b2a8bc319b5dd0b9abf802413e,2024-03-27T12:29:30.307000
|
CVE-2024-29917,0,0,95c3e445522199a26b83d938184afd90a1d9b3b2a8bc319b5dd0b9abf802413e,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29918,0,0,c4d24a04c4f4c9971aa2b61b2b16b6699727fc3170e99022d4d427890c1308f4,2024-03-27T12:29:30.307000
|
CVE-2024-29918,0,0,c4d24a04c4f4c9971aa2b61b2b16b6699727fc3170e99022d4d427890c1308f4,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29919,0,0,817229c260cd52d55a65e42df611e748e6f73b9a57660f2c28863f6cf3622c00,2024-03-27T12:29:30.307000
|
CVE-2024-29919,0,0,817229c260cd52d55a65e42df611e748e6f73b9a57660f2c28863f6cf3622c00,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-2992,0,0,2d65220d2b906672bb98850be6a500c5b6a513172eb7363240df1e5290ef793c,2024-03-27T19:15:50.173000
|
CVE-2024-2992,0,1,9219d051f876e9941f510c639a9b5b2cc6f24f0362001ef7f916e18c91fe6287,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-29920,0,0,ef33728d425fa66d6d618e2c1f88f50e442af75e655f18f6b3eeb620b9fc8dc0,2024-03-27T12:29:30.307000
|
CVE-2024-29920,0,0,ef33728d425fa66d6d618e2c1f88f50e442af75e655f18f6b3eeb620b9fc8dc0,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29921,0,0,d005f56290a07c8d41af4f88ae2cfe5cc38df315cb7fe36491d361da55105483,2024-03-27T12:29:30.307000
|
CVE-2024-29921,0,0,d005f56290a07c8d41af4f88ae2cfe5cc38df315cb7fe36491d361da55105483,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29922,0,0,43b2a415461fb932606c7e442074762fc1c7f75ddb5f3011fe888c9d97612372,2024-03-27T12:29:30.307000
|
CVE-2024-29922,0,0,43b2a415461fb932606c7e442074762fc1c7f75ddb5f3011fe888c9d97612372,2024-03-27T12:29:30.307000
|
||||||
@ -243020,7 +243035,7 @@ CVE-2024-29926,0,0,a774ce80509ca41dda348dca084b78d2d28da05a59a7cf4caade3a676403d
|
|||||||
CVE-2024-29927,0,0,be07820d91f38299d9fb6d4df08336e2d6d59401fb34adcc97e6c8bfc54c88ce,2024-03-27T12:29:30.307000
|
CVE-2024-29927,0,0,be07820d91f38299d9fb6d4df08336e2d6d59401fb34adcc97e6c8bfc54c88ce,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29928,0,0,af15186b7473fc265776521d890548138671a1bf67efd8d69ad310a551d30c19,2024-03-27T12:29:30.307000
|
CVE-2024-29928,0,0,af15186b7473fc265776521d890548138671a1bf67efd8d69ad310a551d30c19,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29929,0,0,27716aabdc6516c3ef94065c2b993ed5b5982de82d07dca6a414e351d3ba3758,2024-03-27T12:29:30.307000
|
CVE-2024-29929,0,0,27716aabdc6516c3ef94065c2b993ed5b5982de82d07dca6a414e351d3ba3758,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-2993,0,0,4a6a8a4998f75a6ef469a63cfb2c694f28f2ad841535ff48deca75494d13eed3,2024-03-27T20:15:08.780000
|
CVE-2024-2993,0,1,19fb072ccdbbe3c6f13615b4b61686a3a806880bbe254abf203e1109d2e68c8c,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-29930,0,0,6fcc220221700641e9da16e849b0714ef9f33840931a344748681165e2c7f58e,2024-03-27T12:29:30.307000
|
CVE-2024-29930,0,0,6fcc220221700641e9da16e849b0714ef9f33840931a344748681165e2c7f58e,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29931,0,0,5fa913a409729523af37223992622bba3903bd19b9d545f7af9b777e9cbf348b,2024-03-27T12:29:30.307000
|
CVE-2024-29931,0,0,5fa913a409729523af37223992622bba3903bd19b9d545f7af9b777e9cbf348b,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29932,0,0,5d75cdd8ba02e2819991be48064230f949a31f4f4858cf3f43a7fca421016a8e,2024-03-27T12:29:30.307000
|
CVE-2024-29932,0,0,5d75cdd8ba02e2819991be48064230f949a31f4f4858cf3f43a7fca421016a8e,2024-03-27T12:29:30.307000
|
||||||
@ -243028,28 +243043,31 @@ CVE-2024-29933,0,0,dedf4a0436c982230abe9b7179ec1be71724b7f64030e788ba0f8ea6283ee
|
|||||||
CVE-2024-29934,0,0,ca29550acd62f197f05fb73019cfe7d9a35aa76590a642b08535ea1b8d4c335b,2024-03-27T12:29:30.307000
|
CVE-2024-29934,0,0,ca29550acd62f197f05fb73019cfe7d9a35aa76590a642b08535ea1b8d4c335b,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29935,0,0,be0415ab39e2424d7707b3e026043937bddf40f9f881b75f312fe4db29a7520f,2024-03-27T12:29:30.307000
|
CVE-2024-29935,0,0,be0415ab39e2424d7707b3e026043937bddf40f9f881b75f312fe4db29a7520f,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29936,0,0,a0aa951ea6a61ca1da8503010b43db132d71646708e0e57d95e11fe2a44ec10b,2024-03-27T12:29:30.307000
|
CVE-2024-29936,0,0,a0aa951ea6a61ca1da8503010b43db132d71646708e0e57d95e11fe2a44ec10b,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-2994,0,0,9187e6071eddb36de6c79beb98a55c89d0ec8e6a41098ca1d49256ced96f9544,2024-03-27T20:15:09.337000
|
CVE-2024-2994,0,1,01df9e0e701aa4c00b07aa8699ff96f5f299daeb7fd543137b2bb411af05f8be,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-29943,0,0,39d573a490fc5d2b219e8af270d3feeff9aa72e4341ddd52f10b0ddfa677f78e,2024-03-22T15:34:43.663000
|
CVE-2024-29943,0,0,39d573a490fc5d2b219e8af270d3feeff9aa72e4341ddd52f10b0ddfa677f78e,2024-03-22T15:34:43.663000
|
||||||
CVE-2024-29944,0,0,4d21f9c7c1ab1ff30cce77b261f7b06b8e28526248b968d986726dab452f24fc,2024-03-25T17:15:51.670000
|
CVE-2024-29944,0,0,4d21f9c7c1ab1ff30cce77b261f7b06b8e28526248b968d986726dab452f24fc,2024-03-25T17:15:51.670000
|
||||||
CVE-2024-29945,0,0,d468839ff8eda4d8c6f46306d679b186fb3a35cb164da7996268d3c3b56c2c95,2024-03-27T19:15:49.607000
|
CVE-2024-29945,0,0,d468839ff8eda4d8c6f46306d679b186fb3a35cb164da7996268d3c3b56c2c95,2024-03-27T19:15:49.607000
|
||||||
CVE-2024-29946,0,0,1dcd38a0ed008144b587f71b29e9f0373aec4787ad19668521370ecc593e8a2d,2024-03-27T17:48:21.140000
|
CVE-2024-29946,0,0,1dcd38a0ed008144b587f71b29e9f0373aec4787ad19668521370ecc593e8a2d,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-2995,0,0,4626bf177e733f40a1ea9f83594ae62ce4072729d8dd6b6a61f3df0501cb44a7,2024-03-27T20:15:09.903000
|
CVE-2024-2995,0,1,6938b04394412a984b03c3b3f2aae9a80d546f606dc78bd3c0d765c908d4e00d,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-2996,0,0,e21e31a1014d7574fca474fe1e8c11dded480086d1946ee193f1b733f7350546,2024-03-27T20:15:10.507000
|
CVE-2024-2996,0,1,a33827e06c0891f964663494f7bcb2f8e84df325c8f21a7c33767ff93c651a34,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-2997,0,0,5c3b6b4ce06af38af512caba97a7c7ae74fa11b39083401d1d2075e5a6abd3a5,2024-03-27T21:15:48.897000
|
CVE-2024-2997,0,1,edf54a0b2200417f8f2161eecc7e05836af23a7a14234d037fa87fe37094f10d,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-2998,0,0,cd5705d6b026d396871ca4e95d4b7f9a86838b3d78e397cd9761907425fce04e,2024-03-27T21:15:49.127000
|
CVE-2024-2998,0,1,29e7e756b2f4afa97646ced006d2335e8d1283d2dad0e7404736374e946fe6f8,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-2999,0,0,afb3d73c91581365be63fa5ad0aeb88c569b47d42295c65beb15f1f5f4da51b8,2024-03-27T21:15:49.407000
|
CVE-2024-2999,0,1,b7f6186b496208d85a602fa4826f0ddb59ffb865a352724ee454d2fd5dcc1a52,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-3000,0,0,9b22952ee64e5e87fc79d5099df1aa4069802e8b7a1f4268d0cc87031d41285f,2024-03-27T22:15:10.150000
|
CVE-2024-3000,0,1,63ab755d7f6ac81083e0c5233def11665816dd389e8c671c2abd93b07292d136,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-3001,0,0,682d2044f9a3a30255eeea942d0bec4a353ff887fcb100216ed3c8742fc3f068,2024-03-27T22:15:10.673000
|
CVE-2024-3001,0,1,b0a4d94d810b3b5ce203967d5d4f192906775734fe22a601ae42fa09b4614872,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-3002,0,0,55dfa15a59deb16ce7a61101429cb6a8191bd094bf0dd573efdf4afe24cfc945,2024-03-27T22:15:11.300000
|
CVE-2024-3002,0,1,72379fcb06b968b866e87b09abf565f7f1b9c210012d38abd054c283ba39f429,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-3003,0,0,56f5a4cff6fc6f04e203cdc8d50b76613ad1ba3c8ec74b96104c067150748f8c,2024-03-27T22:15:11.880000
|
CVE-2024-3003,0,1,0c7db0454eb65bd6813f92fabacfe6818ad9b3811de3bddd8af2c028d374d479,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-3004,1,1,606d1f0aa8668c78ba578e749fbb4dc419dcd7c2b7c096f394756340a48c333b,2024-03-27T23:15:46.637000
|
CVE-2024-3004,0,1,1ed2e312bfd69d62a979910fb81949ea2c0f19fc22049e794e7c6c166d721ee1,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-3006,1,1,b11495a55d0cd29c3ed7b43bfa3a9ba78c9c7973b037290d36617d18ec58efab,2024-03-27T23:15:46.880000
|
CVE-2024-3006,0,1,19131dc4e80d3e35b5a5630a8a59b6a59e2c322457df664736e6101b500ccd96,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-3007,1,1,bc66cda1d8770250fca6580b74df2bfa28ab43f5007732e2d7025c69fba10414,2024-03-27T23:15:47.110000
|
CVE-2024-3007,0,1,e24dc48f046385a605302d5cc27ea771dce08a7f050daff2a52f236e98628db4,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-3008,1,1,50fca93d9a2d37b182d9c6595996d4602fc230762a1497844317c339a776e2db,2024-03-27T23:15:47.340000
|
CVE-2024-3008,0,1,980a9dd754f4dffebc503825af6cc97086497abcad051206431fa223da1c02af,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-3009,1,1,d2b61b9d4ba9193e8061eaf543ce59ab4ac7f530b350b764963338ee5f1a011c,2024-03-28T00:15:07.993000
|
CVE-2024-3009,0,1,4cffd8d9e8f2a2f7b01296b73439a1025174aff1fdfbe526a7febd47ef374640,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-3010,1,1,45ebde3dd088c947f711d3eed73d4f214f69f041f5b4264e6d7fdda078526e5b,2024-03-28T00:15:08.250000
|
CVE-2024-3010,0,1,1d79c6735c24633a8cac524b82b7024ac823a23d87ef87f8c3e5dc24ef21d531,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-3011,1,1,31ee23f5891c25a234edbee875fdb131fd96ed37bae73293ae67f6e74ebae19c,2024-03-28T00:15:08.500000
|
CVE-2024-3011,0,1,a80a297d10b8f124e8428966475875e7d47253f91e3c2fcc2d74dc76bcf01fe5,2024-03-28T02:01:13.303000
|
||||||
CVE-2024-3012,1,1,b138b64b62478c2d40769e68357ff0f5228d86d81849bfaa053d881f32f63560,2024-03-28T00:15:08.773000
|
CVE-2024-3012,0,1,e828f82506d2cce05b2f55b2fe4a731b5432f75e82c24d919f208e00ece9c7f9,2024-03-28T02:01:13.303000
|
||||||
|
CVE-2024-3013,1,1,db364a22fe20e2d060338b4b3367ff26d00c44da0eb170a2568b3193dd990911,2024-03-28T02:01:13.303000
|
||||||
|
CVE-2024-3014,1,1,57dd337802948c0c36abeb7862e4d697d25a39c1914e60d6e237ec085f38c22e,2024-03-28T02:01:13.303000
|
||||||
|
CVE-2024-3015,1,1,8a30b4b1ce42c6dc8701b41d326d2dd150d690f1c908172c7e205b75748707f6,2024-03-28T02:15:10.813000
|
||||||
CVE-2024-30156,0,0,aff0cd27a6d4ebd55e03f44f61cc23ee9163e094843acbac5af736e684ab9391,2024-03-25T01:51:01.223000
|
CVE-2024-30156,0,0,aff0cd27a6d4ebd55e03f44f61cc23ee9163e094843acbac5af736e684ab9391,2024-03-25T01:51:01.223000
|
||||||
CVE-2024-30161,0,0,f6d00094643508d05d1e5626fca4ef83c82ab69ba4696adb329c49eff6d0ab4a,2024-03-25T01:51:01.223000
|
CVE-2024-30161,0,0,f6d00094643508d05d1e5626fca4ef83c82ab69ba4696adb329c49eff6d0ab4a,2024-03-25T01:51:01.223000
|
||||||
CVE-2024-30177,0,0,ce7cec2fca67508ea4a8b86ac0339410ad9c9cb05c2afad1960db626913e7789,2024-03-27T12:29:30.307000
|
CVE-2024-30177,0,0,ce7cec2fca67508ea4a8b86ac0339410ad9c9cb05c2afad1960db626913e7789,2024-03-27T12:29:30.307000
|
||||||
@ -243082,3 +243100,4 @@ CVE-2024-30233,0,0,4c2695d2f3b076c7408bd91fee17c2a607f64636c8c0001f359b0796de1d2
|
|||||||
CVE-2024-30234,0,0,a6be244378f8a1646e756d1cd111fc8fb568601f74deb65508c56b004a03b137,2024-03-26T17:09:53.043000
|
CVE-2024-30234,0,0,a6be244378f8a1646e756d1cd111fc8fb568601f74deb65508c56b004a03b137,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-30235,0,0,ef6f7f84deca979173abd2d122dde5dfb4f5568a80e848e8fa95eae1319c946f,2024-03-26T17:09:53.043000
|
CVE-2024-30235,0,0,ef6f7f84deca979173abd2d122dde5dfb4f5568a80e848e8fa95eae1319c946f,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-30238,0,0,33e85580fdd0a4e3fa2eff1ee3b65f63c015d9c54bc4af4192eb2ee2204281b7,2024-03-27T15:49:41.437000
|
CVE-2024-30238,0,0,33e85580fdd0a4e3fa2eff1ee3b65f63c015d9c54bc4af4192eb2ee2204281b7,2024-03-27T15:49:41.437000
|
||||||
|
CVE-2024-3024,1,1,5dbf5f2d941f96943d3fea061836a41f326705e3244e22070d3d45564f39691e,2024-03-28T02:15:11.337000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user