mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2024-04-07T10:00:38.318313+00:00
This commit is contained in:
parent
c1ab5f8810
commit
baf2ef6a24
96
CVE-2021/CVE-2021-44xx/CVE-2021-4438.json
Normal file
96
CVE-2021/CVE-2021-44xx/CVE-2021-4438.json
Normal file
@ -0,0 +1,96 @@
|
||||
{
|
||||
"id": "CVE-2021-4438",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-07T09:15:07.980",
|
||||
"lastModified": "2024-04-07T09:15:07.980",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in kyivstarteam react-native-sms-user-consent up to 1.1.4 on Android. Affected by this issue is the function registerReceiver of the file android/src/main/java/ua/kyivstar/reactnativesmsuserconsent/SmsUserConsentModule.kt. The manipulation leads to improper export of android application components. Attacking locally is a requirement. Upgrading to version 1.1.5 is able to address this issue. The name of the patch is 5423dcb0cd3e4d573b5520a71fa08aa279e4c3c7. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-259508."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "LOCAL",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 4.3
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-926"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kyivstarteam/react-native-sms-user-consent/commit/5423dcb0cd3e4d573b5520a71fa08aa279e4c3c7",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/kyivstarteam/react-native-sms-user-consent/pull/4",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/kyivstarteam/react-native-sms-user-consent/releases/tag/1.1.5",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259508",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259508",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-523xx/CVE-2023-52382.json
Normal file
24
CVE-2023/CVE-2023-523xx/CVE-2023-52382.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-52382",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-04-07T09:15:08.317",
|
||||
"lastModified": "2024-04-07T09:15:08.317",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability of improper control over foreground service notifications in the notification module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-527xx/CVE-2023-52713.json
Normal file
24
CVE-2023/CVE-2023-527xx/CVE-2023-52713.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-52713",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-04-07T09:15:08.377",
|
||||
"lastModified": "2024-04-07T09:15:08.377",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability of improper permission control in the window management module.\nImpact: Successful exploitation of this vulnerability will affect availability and confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-527xx/CVE-2023-52714.json
Normal file
24
CVE-2023/CVE-2023-527xx/CVE-2023-52714.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-52714",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-04-07T09:15:08.423",
|
||||
"lastModified": "2024-04-07T09:15:08.423",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability of defects introduced in the design process in the hwnff module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-527xx/CVE-2023-52715.json
Normal file
24
CVE-2023/CVE-2023-527xx/CVE-2023-52715.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-52715",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-04-07T09:15:08.477",
|
||||
"lastModified": "2024-04-07T09:15:08.477",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The SystemUI module has a vulnerability in permission management.\nImpact: Successful exploitation of this vulnerability may affect availability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2023/CVE-2023-527xx/CVE-2023-52716.json
Normal file
36
CVE-2023/CVE-2023-527xx/CVE-2023-52716.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-52716",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-04-07T09:15:08.520",
|
||||
"lastModified": "2024-04-07T09:15:08.520",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability of starting activities in the background in the ActivityManagerService (AMS) module.\nImpact: Successful exploitation of this vulnerability will affect availability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-527xx/CVE-2023-52717.json
Normal file
24
CVE-2023/CVE-2023-527xx/CVE-2023-52717.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-52717",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-04-07T09:15:08.600",
|
||||
"lastModified": "2024-04-07T09:15:08.600",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Permission verification vulnerability in the lock screen module.\nImpact: Successful exploitation of this vulnerability will affect availability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-304xx/CVE-2024-30413.json
Normal file
24
CVE-2024/CVE-2024-304xx/CVE-2024-30413.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-30413",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-04-07T08:15:07.227",
|
||||
"lastModified": "2024-04-07T08:15:07.227",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability of improper permission control in the window management module.\nImpact: Successful exploitation of this vulnerability will affect availability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2024/CVE-2024-304xx/CVE-2024-30414.json
Normal file
36
CVE-2024/CVE-2024-304xx/CVE-2024-30414.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-30414",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-04-07T08:15:07.373",
|
||||
"lastModified": "2024-04-07T08:15:07.373",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Command injection vulnerability in the AccountManager module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-304xx/CVE-2024-30415.json
Normal file
24
CVE-2024/CVE-2024-304xx/CVE-2024-30415.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-30415",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-04-07T08:15:07.483",
|
||||
"lastModified": "2024-04-07T08:15:07.483",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability of improper permission control in the window management module.\nImpact: Successful exploitation of this vulnerability will affect availability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2024/CVE-2024-304xx/CVE-2024-30416.json
Normal file
36
CVE-2024/CVE-2024-304xx/CVE-2024-30416.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-30416",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-04-07T09:15:08.650",
|
||||
"lastModified": "2024-04-07T09:15:08.650",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use After Free (UAF) vulnerability in the underlying driver module.\nImpact: Successful exploitation of this vulnerability will affect availability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2024/CVE-2024-304xx/CVE-2024-30417.json
Normal file
36
CVE-2024/CVE-2024-304xx/CVE-2024-30417.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-30417",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-04-07T09:15:08.727",
|
||||
"lastModified": "2024-04-07T09:15:08.727",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Path traversal vulnerability in the Bluetooth-based sharing module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-304xx/CVE-2024-30418.json
Normal file
24
CVE-2024/CVE-2024-304xx/CVE-2024-30418.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-30418",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-04-07T09:15:08.810",
|
||||
"lastModified": "2024-04-07T09:15:08.810",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability of insufficient permission verification in the app management module.\nImpact: Successful exploitation of this vulnerability will affect availability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
22
README.md
22
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-07T08:00:38.092428+00:00
|
||||
2024-04-07T10:00:38.318313+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-07T06:15:08.223000+00:00
|
||||
2024-04-07T09:15:08.810000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,14 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
244301
|
||||
244314
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `13`
|
||||
|
||||
- [CVE-2024-3417](CVE-2024/CVE-2024-34xx/CVE-2024-3417.json) (`2024-04-07T06:15:08.223`)
|
||||
- [CVE-2021-4438](CVE-2021/CVE-2021-44xx/CVE-2021-4438.json) (`2024-04-07T09:15:07.980`)
|
||||
- [CVE-2023-52382](CVE-2023/CVE-2023-523xx/CVE-2023-52382.json) (`2024-04-07T09:15:08.317`)
|
||||
- [CVE-2023-52713](CVE-2023/CVE-2023-527xx/CVE-2023-52713.json) (`2024-04-07T09:15:08.377`)
|
||||
- [CVE-2023-52714](CVE-2023/CVE-2023-527xx/CVE-2023-52714.json) (`2024-04-07T09:15:08.423`)
|
||||
- [CVE-2023-52715](CVE-2023/CVE-2023-527xx/CVE-2023-52715.json) (`2024-04-07T09:15:08.477`)
|
||||
- [CVE-2023-52716](CVE-2023/CVE-2023-527xx/CVE-2023-52716.json) (`2024-04-07T09:15:08.520`)
|
||||
- [CVE-2023-52717](CVE-2023/CVE-2023-527xx/CVE-2023-52717.json) (`2024-04-07T09:15:08.600`)
|
||||
- [CVE-2024-30413](CVE-2024/CVE-2024-304xx/CVE-2024-30413.json) (`2024-04-07T08:15:07.227`)
|
||||
- [CVE-2024-30414](CVE-2024/CVE-2024-304xx/CVE-2024-30414.json) (`2024-04-07T08:15:07.373`)
|
||||
- [CVE-2024-30415](CVE-2024/CVE-2024-304xx/CVE-2024-30415.json) (`2024-04-07T08:15:07.483`)
|
||||
- [CVE-2024-30416](CVE-2024/CVE-2024-304xx/CVE-2024-30416.json) (`2024-04-07T09:15:08.650`)
|
||||
- [CVE-2024-30417](CVE-2024/CVE-2024-304xx/CVE-2024-30417.json) (`2024-04-07T09:15:08.727`)
|
||||
- [CVE-2024-30418](CVE-2024/CVE-2024-304xx/CVE-2024-30418.json) (`2024-04-07T09:15:08.810`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
15
_state.csv
15
_state.csv
@ -185016,6 +185016,7 @@ CVE-2021-44376,0,0,ef70a3af0a788bfe441fa3cea7278b2fd1473c6bd37e6305118fc4225d7cc
|
||||
CVE-2021-44377,0,0,82d9f1ee7625cf617c5207ed67c52743ff5cd59a53b29fd20eaab2bedc0c3c65,2022-10-25T17:45:19.107000
|
||||
CVE-2021-44378,0,0,870e0612881d8a665fabb9b00101d49ceaddb187df8ea88f52e7214e1e791834,2022-10-25T17:45:12.060000
|
||||
CVE-2021-44379,0,0,51327504aa3cccaa51d1f682f6476074bb5b893fa6786d25ec532872024e3202,2022-10-25T17:44:33.863000
|
||||
CVE-2021-4438,1,1,6990a0cce9d4303ae05d808caa0961520276040bea73ecf742bf42148acf73aa,2024-04-07T09:15:07.980000
|
||||
CVE-2021-44380,0,0,443a97fca81c1b1c154ed9d4148e2b7583b2c41b9af3ee8cf674d3756df1b0fc,2022-10-25T17:44:25.900000
|
||||
CVE-2021-44381,0,0,dba69d3bc7ac8803c1636b3170844432e2975cb35137a1f5631b90e20981faa3,2022-10-25T17:44:17.347000
|
||||
CVE-2021-44382,0,0,1708be32e649249e0730e3064dd46b522eaf902f954fe0c6d8964a709e7b95b1,2022-10-25T17:44:29.867000
|
||||
@ -236153,6 +236154,7 @@ CVE-2023-52379,0,0,ca682d4d897e50937e81bcdf7730d5c2894d90bd816224171ff8486a1fbed
|
||||
CVE-2023-5238,0,0,a261b85ed6b7b17d61d99dc1a4da76845d0517dc6639c69481ed60057b693590,2023-11-08T18:37:35.557000
|
||||
CVE-2023-52380,0,0,d58f8abe62c6a33934f8c0dca186b52f3ce877c05545d71e6b6419ff9d811f02,2024-02-20T19:50:53.960000
|
||||
CVE-2023-52381,0,0,472b65e10275d2947c6588b1ef901c2b36df20ae38152db3173d8780f82018ab,2024-02-20T19:50:53.960000
|
||||
CVE-2023-52382,1,1,f973ee9d583d8e697e8b4f7637a6e5190862ca7e889e9b6c9293a012c3392d53,2024-04-07T09:15:08.317000
|
||||
CVE-2023-52387,0,0,5d67110ecd6bd3e11c6d9a0b6111500c254e06ec210161b97966bed3e04d85cb,2024-02-20T19:50:53.960000
|
||||
CVE-2023-52389,0,0,0fee7704e079ab3b4f714b445118b41a4b2e46d55413f0fbef2c2dadc64f3a04,2024-02-08T16:43:22.473000
|
||||
CVE-2023-5239,0,0,7c3185e021110163a371df48ac7e58ad34571a8f388d20b4e340a0c44f625d88,2023-12-01T19:22:45.963000
|
||||
@ -236386,6 +236388,11 @@ CVE-2023-5268,0,0,0962b04b5f2e0bf762a96ebb8616f9140fd2d59b16626fe338dc7cc8ec8b84
|
||||
CVE-2023-5269,0,0,4f38ec3d168762c5ca24d91f141ea3b0d5a2670e2027eea13a5d8bb7213d80e9,2024-03-21T02:50:12.440000
|
||||
CVE-2023-5270,0,0,45e6e373740d9b24137c078ed2725b31491b15b24a5a3abd78c46fdf4eea0b37,2024-03-21T02:50:12.537000
|
||||
CVE-2023-5271,0,0,72c78ae7eeaf234a144e38c51597ad336e62e29aa3a60522a770290559a4b05f,2024-03-21T02:50:12.613000
|
||||
CVE-2023-52713,1,1,9344407565b28aac5555737da721952ecb27b6ada3641a2503337c56c7efa958,2024-04-07T09:15:08.377000
|
||||
CVE-2023-52714,1,1,78b60c9f9e8cb02e8f71cd5f0cd761b045b65e9fef89079ea15dd3d7b855db81,2024-04-07T09:15:08.423000
|
||||
CVE-2023-52715,1,1,2cb5ced073851f70984636b09da9983fbac0efc453e117e436da6440da236c1e,2024-04-07T09:15:08.477000
|
||||
CVE-2023-52716,1,1,24c1ad970d25cbdd030294ff3f96772405729e13b1f4ae00c63e18bdd429535b,2024-04-07T09:15:08.520000
|
||||
CVE-2023-52717,1,1,3d4ee5754b53d2a9bd6433f121f5706b2bb7f0d39cf2c21fa3aebd9c29809199,2024-04-07T09:15:08.600000
|
||||
CVE-2023-5272,0,0,0bb9b4e6b6780e8183edbfb5c097d850776c156d93382f68f3552c771fa7f059,2024-03-21T02:50:12.690000
|
||||
CVE-2023-5273,0,0,3768d104890d72f805182c048009a35b3050621fe725bc64a0e78c6c7372d88f,2024-03-21T02:50:12.773000
|
||||
CVE-2023-5274,0,0,230ef4c0e160801f289163632d814f7177c2b1395a715b72f33c8d0b5d876249,2023-12-05T18:20:39.937000
|
||||
@ -243917,6 +243924,12 @@ CVE-2024-30371,0,0,b1d655f20dce1a124d87b962baf334d2a249a3ceff7f094651f12c5849e1f
|
||||
CVE-2024-3039,0,0,81922daeb5016788549747eb633cf2cb36e0064f861b28dab53687d178ed51a9,2024-03-28T16:07:30.893000
|
||||
CVE-2024-3040,0,0,e987ce224402b7c6ae92dea1553b3428b1d1ea83a8843974e3829b4ae2d222f5,2024-03-28T16:07:30.893000
|
||||
CVE-2024-3041,0,0,6c17e75e5a23e8d64473e423f0739f5cbb4a4c0a92a00e74133d2d0cbfd4b93a,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30413,1,1,a0e1eff62222949cb8be10b864594acd8caba3617db28ac986f09688d43d6c7d,2024-04-07T08:15:07.227000
|
||||
CVE-2024-30414,1,1,b27e1b4a39f9ba55e05dec2a6c8ff8717b4f2f33aba1895c77fb7100c6339363,2024-04-07T08:15:07.373000
|
||||
CVE-2024-30415,1,1,ec66a60a1026f4f723633cee4d5d5ef7a809aa29bf0dad743231374275b4777c,2024-04-07T08:15:07.483000
|
||||
CVE-2024-30416,1,1,2eceeea5f7d0943fabd5fe204f55f71ab3347211ad22117142e558cb5cae7c37,2024-04-07T09:15:08.650000
|
||||
CVE-2024-30417,1,1,afb8c378fd1228b6529f12ca1a856b8988ffcab3ce1021e751ec2a439341979d,2024-04-07T09:15:08.727000
|
||||
CVE-2024-30418,1,1,84ef1f436dd42d3e7bc9f5048cf9f0789a32fb90e830e451d8583fea4a305c1c,2024-04-07T09:15:08.810000
|
||||
CVE-2024-3042,0,0,c14582e836c58b6dd5a313f7fba974623fe7cf38c96ce08ac4814f262bd27396,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30421,0,0,8cfd124574a85b45cac2d52527d901d612a69bb0525bed810c2e40b98978560c,2024-03-28T12:42:56.150000
|
||||
CVE-2024-30422,0,0,ba819084ec2bbeb55fdd38ba0e9a54a8d622d3ff700a26bbbbcd13ded8068264,2024-03-28T12:42:56.150000
|
||||
@ -244299,4 +244312,4 @@ CVE-2024-3413,0,0,e1d44a7f6ecaa59001e0c3b7293038f73b00022993d5cfe2b006c5f004dd07
|
||||
CVE-2024-3414,0,0,865b8b9a463ec948dc343c4a30756496edcf661fb9a023649606bd76ffc5f79d,2024-04-06T21:15:20.167000
|
||||
CVE-2024-3415,0,0,23cc20be89e4c811c9f035ba78dae2c60f0134aa8421de0bb9bfdc4f8027ffdc,2024-04-06T23:15:07.630000
|
||||
CVE-2024-3416,0,0,200d89ec70de0812fd3c5d8005f173692de3332633ae40be8d1d14b8003608f6,2024-04-07T04:15:07.853000
|
||||
CVE-2024-3417,1,1,b709776032706fffe344a55daccb44666332d7c2f5bd28c6517d5f92d2dba641,2024-04-07T06:15:08.223000
|
||||
CVE-2024-3417,0,0,b709776032706fffe344a55daccb44666332d7c2f5bd28c6517d5f92d2dba641,2024-04-07T06:15:08.223000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user