mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2024-05-08T16:00:37.448803+00:00
This commit is contained in:
parent
2fd93a3436
commit
bb670f9838
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-21819",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2022-03-11T14:15:07.700",
|
||||
"lastModified": "2022-03-22T14:29:49.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-05-08T14:15:07.550",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -148,6 +148,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.thegoodpenguin.co.uk/blog/pcie-dma-attack-against-a-secured-jetson-nano-cve-2022-21819/",
|
||||
"source": "psirt@nvidia.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-217xx/CVE-2024-21793.json
Normal file
55
CVE-2024/CVE-2024-217xx/CVE-2024-21793.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-21793",
|
||||
"sourceIdentifier": "f5sirt@f5.com",
|
||||
"published": "2024-05-08T15:15:07.557",
|
||||
"lastModified": "2024-05-08T15:15:07.557",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nAn OData injection vulnerability exists in the BIG-IP Next Central Manager API (URI).\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://my.f5.com/manage/s/article/K000138732",
|
||||
"source": "f5sirt@f5.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-248xx/CVE-2024-24833.json
Normal file
55
CVE-2024/CVE-2024-248xx/CVE-2024-24833.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-24833",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-08T14:15:07.730",
|
||||
"lastModified": "2024-05-08T14:15:07.730",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Leevio Happy Addons for Elementor.This issue affects Happy Addons for Elementor: from n/a through 3.10.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/happy-elementor-addons/wordpress-happy-addons-for-elementor-plugin-3-10-1-broken-access-control-on-post-clone-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-255xx/CVE-2024-25515.json
Normal file
20
CVE-2024/CVE-2024-255xx/CVE-2024-25515.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-25515",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-08T15:15:07.780",
|
||||
"lastModified": "2024-05-08T15:15:07.780",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the sys_file_storage_id parameter at /WorkFlow/wf_work_finish_file_down.aspx."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_finish_file_downaspx",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-255xx/CVE-2024-25517.json
Normal file
20
CVE-2024/CVE-2024-255xx/CVE-2024-25517.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-25517",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-08T15:15:07.843",
|
||||
"lastModified": "2024-05-08T15:15:07.843",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the tbTable argument at /WebUtility/MF.aspx."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#mfaspx",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-255xx/CVE-2024-25518.json
Normal file
20
CVE-2024/CVE-2024-255xx/CVE-2024-25518.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-25518",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-08T15:15:07.903",
|
||||
"lastModified": "2024-05-08T15:15:07.903",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the template_id parameter at /WorkFlow/wf_get_fields_approve.aspx."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_get_fields_approveaspx",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-255xx/CVE-2024-25519.json
Normal file
20
CVE-2024/CVE-2024-255xx/CVE-2024-25519.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-25519",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-08T15:15:07.960",
|
||||
"lastModified": "2024-05-08T15:15:07.960",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the idlist parameter at /WorkFlow/wf_work_print.aspx."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_printaspx",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-255xx/CVE-2024-25520.json
Normal file
20
CVE-2024/CVE-2024-255xx/CVE-2024-25520.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-25520",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-08T15:15:08.017",
|
||||
"lastModified": "2024-05-08T15:15:08.017",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the id parameter at /SysManage/sys_blogtemplate_new.aspx."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#sys_blogtemplate_newaspx",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-255xx/CVE-2024-25521.json
Normal file
20
CVE-2024/CVE-2024-255xx/CVE-2024-25521.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-25521",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-08T15:15:08.073",
|
||||
"lastModified": "2024-05-08T15:15:08.073",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the txt_keyword parameter at get_company.aspx."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_companyaspx",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-255xx/CVE-2024-25522.json
Normal file
20
CVE-2024/CVE-2024-255xx/CVE-2024-25522.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-25522",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-08T15:15:08.130",
|
||||
"lastModified": "2024-05-08T15:15:08.130",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the office_missive_id parameter at /WorkFlow/wf_work_form_save.aspx."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_form_saveaspx",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-255xx/CVE-2024-25523.json
Normal file
20
CVE-2024/CVE-2024-255xx/CVE-2024-25523.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-25523",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-08T15:15:08.183",
|
||||
"lastModified": "2024-05-08T15:15:08.183",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the file_id parameter at /filemanage/file_memo.aspx."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#file_memoaspx",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-255xx/CVE-2024-25524.json
Normal file
20
CVE-2024/CVE-2024-255xx/CVE-2024-25524.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-25524",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-08T15:15:08.253",
|
||||
"lastModified": "2024-05-08T15:15:08.253",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the sys_file_storage_id parameter at /WorkPlan/WorkPlanAttachDownLoad.aspx."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#workplanattachdownloadaspx",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-255xx/CVE-2024-25525.json
Normal file
20
CVE-2024/CVE-2024-255xx/CVE-2024-25525.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-25525",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-08T15:15:08.310",
|
||||
"lastModified": "2024-05-08T15:15:08.310",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the filename parameter at /WorkFlow/OfficeFileDownload.aspx."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#officefiledownloadaspx",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-255xx/CVE-2024-25526.json
Normal file
20
CVE-2024/CVE-2024-255xx/CVE-2024-25526.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-25526",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-08T15:15:08.367",
|
||||
"lastModified": "2024-05-08T15:15:08.367",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the project_id parameter at /ProjectManage/pm_gatt_inc.aspx."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#pm_gatt_incaspx",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-255xx/CVE-2024-25560.json
Normal file
55
CVE-2024/CVE-2024-255xx/CVE-2024-25560.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-25560",
|
||||
"sourceIdentifier": "f5sirt@f5.com",
|
||||
"published": "2024-05-08T15:15:08.423",
|
||||
"lastModified": "2024-05-08T15:15:08.423",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nWhen BIG-IP AFM is licensed and provisioned, undisclosed DNS traffic can cause the Traffic Management Microkernel (TMM) to terminate.\n\n \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://my.f5.com/manage/s/article/K000139037",
|
||||
"source": "f5sirt@f5.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-260xx/CVE-2024-26026.json
Normal file
55
CVE-2024/CVE-2024-260xx/CVE-2024-26026.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-26026",
|
||||
"sourceIdentifier": "f5sirt@f5.com",
|
||||
"published": "2024-05-08T15:15:08.623",
|
||||
"lastModified": "2024-05-08T15:15:08.623",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\n\n\nAn SQL injection vulnerability exists in the BIG-IP Next Central Manager API (URI).\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://my.f5.com/manage/s/article/K000138733",
|
||||
"source": "f5sirt@f5.com"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2024/CVE-2024-265xx/CVE-2024-26579.json
Normal file
32
CVE-2024/CVE-2024-265xx/CVE-2024-26579.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2024-26579",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-05-08T15:15:08.817",
|
||||
"lastModified": "2024-05-08T15:15:08.817",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of Untrusted Data vulnerability in Apache InLong.This issue affects Apache InLong: from 1.7.0 through 1.11.0,\u00a0\n\n the attackers can bypass using malicious parameters.\n\nUsers are advised to upgrade to Apache InLong's 1.12.0 or cherry-pick [1], [2] to solve it.\n\n[1] https://github.com/apache/inlong/pull/9694 \n\n[2]\u00a0 https://github.com/apache/inlong/pull/9707 \n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/d2hndtvh6bll4pkl91o2oqxyynhr54k3",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26925",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-25T06:15:57.590",
|
||||
"lastModified": "2024-05-07T18:15:08.287",
|
||||
"lastModified": "2024-05-08T15:15:08.917",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -20,6 +20,10 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/05/07/6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/05/08/2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0d459e2ffb541841714839e8228b845458ed3b27",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
55
CVE-2024/CVE-2024-272xx/CVE-2024-27202.json
Normal file
55
CVE-2024/CVE-2024-272xx/CVE-2024-27202.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-27202",
|
||||
"sourceIdentifier": "f5sirt@f5.com",
|
||||
"published": "2024-05-08T15:15:08.980",
|
||||
"lastModified": "2024-05-08T15:15:08.980",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nA DOM-based cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user.\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://my.f5.com/manage/s/article/K000138520",
|
||||
"source": "f5sirt@f5.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-281xx/CVE-2024-28132.json
Normal file
55
CVE-2024/CVE-2024-281xx/CVE-2024-28132.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-28132",
|
||||
"sourceIdentifier": "f5sirt@f5.com",
|
||||
"published": "2024-05-08T15:15:09.183",
|
||||
"lastModified": "2024-05-08T15:15:09.183",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nExposure of Sensitive Information vulnerability exists in the GSLB container, which may allow an authenticated attacker with local access to view sensitive information.\u00a0\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-922"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://my.f5.com/manage/s/article/K000138913",
|
||||
"source": "f5sirt@f5.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-288xx/CVE-2024-28883.json
Normal file
55
CVE-2024/CVE-2024-288xx/CVE-2024-28883.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-28883",
|
||||
"sourceIdentifier": "f5sirt@f5.com",
|
||||
"published": "2024-05-08T15:15:09.380",
|
||||
"lastModified": "2024-05-08T15:15:09.380",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An origin validation vulnerability exists in \n\nBIG-IP APM browser network access VPN client \n\n\n\n for Windows, macOS and Linux which may allow an attacker to bypass F5 endpoint inspection. \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-346"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://my.f5.com/manage/s/article/K000138744",
|
||||
"source": "f5sirt@f5.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-288xx/CVE-2024-28889.json
Normal file
55
CVE-2024/CVE-2024-288xx/CVE-2024-28889.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-28889",
|
||||
"sourceIdentifier": "f5sirt@f5.com",
|
||||
"published": "2024-05-08T15:15:09.590",
|
||||
"lastModified": "2024-05-08T15:15:09.590",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\n\n\nWhen an SSL profile with alert timeout is configured with a non-default value on a virtual server, undisclosed traffic along with conditions beyond the attacker's control can cause the Traffic Management Microkernel (TMM) to terminate.\u00a0\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-825"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://my.f5.com/manage/s/article/K000138912",
|
||||
"source": "f5sirt@f5.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-304xx/CVE-2024-30459.json
Normal file
55
CVE-2024/CVE-2024-304xx/CVE-2024-30459.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30459",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-08T14:15:07.923",
|
||||
"lastModified": "2024-05-08T14:15:07.923",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in AIpost AI WP Writer.This issue affects AI WP Writer: from n/a through 3.6.5.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/ai-wp-writer/wordpress-ai-wp-writer-plugin-3-6-5-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-311xx/CVE-2024-31156.json
Normal file
55
CVE-2024/CVE-2024-311xx/CVE-2024-31156.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31156",
|
||||
"sourceIdentifier": "f5sirt@f5.com",
|
||||
"published": "2024-05-08T15:15:09.790",
|
||||
"lastModified": "2024-05-08T15:15:09.790",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nA stored cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user.\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://my.f5.com/manage/s/article/K000138636",
|
||||
"source": "f5sirt@f5.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-312xx/CVE-2024-31270.json
Normal file
55
CVE-2024/CVE-2024-312xx/CVE-2024-31270.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31270",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-08T14:15:08.117",
|
||||
"lastModified": "2024-05-08T14:15:08.117",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Repute InfoSystems ARForms Form Builder.This issue affects ARForms Form Builder: from n/a through 1.6.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/arforms-form-builder/wordpress-arforms-form-builder-plugin-1-6-1-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-320xx/CVE-2024-32049.json
Normal file
55
CVE-2024/CVE-2024-320xx/CVE-2024-32049.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32049",
|
||||
"sourceIdentifier": "f5sirt@f5.com",
|
||||
"published": "2024-05-08T15:15:09.987",
|
||||
"lastModified": "2024-05-08T15:15:09.987",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "BIG-IP Next Central Manager (CM) may allow an unauthenticated, remote attacker to obtain the BIG-IP Next LTM/WAF instance credentials.\u00a0\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-300"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://my.f5.com/manage/s/article/K000138634",
|
||||
"source": "f5sirt@f5.com"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2024/CVE-2024-321xx/CVE-2024-32113.json
Normal file
44
CVE-2024/CVE-2024-321xx/CVE-2024-32113.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-32113",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-05-08T15:15:10.227",
|
||||
"lastModified": "2024-05-08T15:15:10.227",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz.This issue affects Apache OFBiz: before 18.12.13.\n\nUsers are recommended to upgrade to version 18.12.13, which fixes the issue.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://issues.apache.org/jira/browse/OFBIZ-13006",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/w6s60okgkxp2th1sr8vx0ndmgk68fqrd",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://ofbiz.apache.org/download.html",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://ofbiz.apache.org/security.html",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-327xx/CVE-2024-32761.json
Normal file
55
CVE-2024/CVE-2024-327xx/CVE-2024-32761.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32761",
|
||||
"sourceIdentifier": "f5sirt@f5.com",
|
||||
"published": "2024-05-08T15:15:10.330",
|
||||
"lastModified": "2024-05-08T15:15:10.330",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nUnder certain conditions, a potential data leak may occur in the Traffic Management Microkernels (TMMs) of BIG-IP tenants running on VELOS and rSeries platforms. However, this issue cannot be exploited by an attacker because it is not consistently reproducible and is beyond an attacker's control.\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://my.f5.com/manage/s/article/K000139217",
|
||||
"source": "f5sirt@f5.com"
|
||||
}
|
||||
]
|
||||
}
|
79
CVE-2024/CVE-2024-328xx/CVE-2024-32886.json
Normal file
79
CVE-2024/CVE-2024-328xx/CVE-2024-32886.json
Normal file
@ -0,0 +1,79 @@
|
||||
{
|
||||
"id": "CVE-2024-32886",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-05-08T14:15:08.310",
|
||||
"lastModified": "2024-05-08T14:15:08.310",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vitess is a database clustering system for horizontal scaling of MySQL. When executing the following simple query, the `vtgate` will go into an endless loop that also keeps consuming memory and eventually will run out of memory. This vulnerability is fixed in 19.0.4, 18.0.5, and 17.0.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-835"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/vitessio/vitess/blob/8f6cfaaa643a08dc111395a75a2d250ee746cfa8/go/mysql/collations/charset/convert.go#L73-L79",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vitessio/vitess/blob/8f6cfaaa643a08dc111395a75a2d250ee746cfa8/go/mysql/collations/charset/unicode/utf16.go#L69-L71",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vitessio/vitess/commit/2fd5ba1dbf6e9b32fdfdaf869d130066b1b5c0df",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vitessio/vitess/commit/9df4b66550e46b5d7079e21ed0e1b0f49f92b055",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vitessio/vitess/commit/c46dc5b6a4329a10589ca928392218d96031ac8d",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vitessio/vitess/commit/d438adf7e34a6cf00fe441db80842ec669a99202",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vitessio/vitess/security/advisories/GHSA-649x-hxfx-57j2",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-329xx/CVE-2024-32980.json
Normal file
59
CVE-2024/CVE-2024-329xx/CVE-2024-32980.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-32980",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-05-08T15:15:10.530",
|
||||
"lastModified": "2024-05-08T15:15:10.530",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Spin is the developer tool for building and running serverless applications powered by WebAssembly. Prior to 2.4.3, some specifically configured Spin applications that use `self` requests without a specified URL authority can be induced to make requests to arbitrary hosts via the `Host` HTTP header. The following conditions need to be met for an application to be vulnerable: 1. The environment Spin is deployed in routes requests to the Spin runtime based on the request URL instead of the `Host` header, and leaves the `Host` header set to its original value; 2. The Spin application's component handling the incoming request is configured with an `allow_outbound_hosts` list containing `\"self\"`; and 3. In reaction to an incoming request, the component makes an outbound request whose URL doesn't include the hostname/port. Spin 2.4.3 has been released to fix this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-610"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/fermyon/spin/commit/b3db535c9edb72278d4db3a201f0ed214e561354",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/fermyon/spin/security/advisories/GHSA-f3h7-gpjj-wcvh",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33573.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33573.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33573",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-08T14:15:08.523",
|
||||
"lastModified": "2024-05-08T14:15:08.523",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in EPROLO EPROLO Dropshipping.This issue affects EPROLO Dropshipping: from n/a through 1.7.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/eprolo-dropshipping/wordpress-eprolo-dropshipping-plugin-1-7-1-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33574.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33574.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33574",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-08T14:15:08.713",
|
||||
"lastModified": "2024-05-08T14:15:08.713",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in appsbd Vitepos.This issue affects Vitepos: from n/a through 3.0.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/vitepos-lite/wordpress-vitepos-plugin-3-0-1-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-336xx/CVE-2024-33604.json
Normal file
55
CVE-2024/CVE-2024-336xx/CVE-2024-33604.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33604",
|
||||
"sourceIdentifier": "f5sirt@f5.com",
|
||||
"published": "2024-05-08T15:15:10.733",
|
||||
"lastModified": "2024-05-08T15:15:10.733",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nA reflected cross-site scripting (XSS) vulnerability exist in undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user.\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://my.f5.com/manage/s/article/K000138894",
|
||||
"source": "f5sirt@f5.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-336xx/CVE-2024-33608.json
Normal file
55
CVE-2024/CVE-2024-336xx/CVE-2024-33608.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33608",
|
||||
"sourceIdentifier": "f5sirt@f5.com",
|
||||
"published": "2024-05-08T15:15:10.930",
|
||||
"lastModified": "2024-05-08T15:15:10.930",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "When IPsec is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-824"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://my.f5.com/manage/s/article/K000138728",
|
||||
"source": "f5sirt@f5.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-336xx/CVE-2024-33612.json
Normal file
55
CVE-2024/CVE-2024-336xx/CVE-2024-33612.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33612",
|
||||
"sourceIdentifier": "f5sirt@f5.com",
|
||||
"published": "2024-05-08T15:15:11.113",
|
||||
"lastModified": "2024-05-08T15:15:11.113",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\n\n\nAn improper certificate validation vulnerability exists in BIG-IP Next Central Manager and may allow an attacker to impersonate an Instance Provider system. A successful exploit of this vulnerability can allow the attacker to cross a security boundary.\u00a0\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://my.f5.com/manage/s/article/K000139012",
|
||||
"source": "f5sirt@f5.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-343xx/CVE-2024-34347.json
Normal file
59
CVE-2024/CVE-2024-343xx/CVE-2024-34347.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-34347",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-05-08T15:15:11.310",
|
||||
"lastModified": "2024-05-08T15:15:11.310",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "@hoppscotch/cli is a CLI to run Hoppscotch Test Scripts in CI environments. Prior to 0.8.0, the @hoppscotch/js-sandbox package provides a Javascript sandbox that uses the Node.js vm module. However, the vm module is not safe for sandboxing untrusted Javascript code. This is because code inside the vm context can break out if it can get a hold of any reference to an object created outside of the vm. In the case of @hoppscotch/js-sandbox, multiple references to external objects are passed into the vm context to allow pre-request scripts interactions with environment variables and more. But this also allows the pre-request script to escape the sandbox. This vulnerability is fixed in 0.8.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/hoppscotch/hoppscotch/commit/22c6eabd133195d22874250a5ae40cb26b851b01",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-qmmm-73r2-f8xr",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-39xx/CVE-2024-3951.json
Normal file
55
CVE-2024/CVE-2024-39xx/CVE-2024-3951.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-3951",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-05-08T15:15:11.517",
|
||||
"lastModified": "2024-05-08T15:15:11.517",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nPTC Codebeamer is vulnerable to a cross site scripting vulnerability that could allow an attacker to inject and execute malicious code.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-128-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-42xx/CVE-2024-4233.json
Normal file
63
CVE-2024/CVE-2024-42xx/CVE-2024-4233.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-4233",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-08T14:15:08.907",
|
||||
"lastModified": "2024-05-08T14:15:08.907",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Tyche Softwares Print Invoice & Delivery Notes for WooCommerce, Tyche Softwares Arconix Shortcodes, Tyche Softwares Arconix FAQ.This issue affects Print Invoice & Delivery Notes for WooCommerce: from n/a through 4.8.1; Arconix Shortcodes: from n/a through 2.1.10; Arconix FAQ: from n/a through 1.9.3.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/arconix-faq/wordpress-arconix-faq-plugin-1-9-3-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/arconix-shortcodes/wordpress-arconix-shortcodes-plugin-2-1-10-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/woocommerce-delivery-notes/wordpress-print-invoice-delivery-notes-for-woocommerce-plugin-4-8-1-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-46xx/CVE-2024-4649.json
Normal file
92
CVE-2024/CVE-2024-46xx/CVE-2024-4649.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4649",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-08T14:15:09.107",
|
||||
"lastModified": "2024-05-08T14:15:09.107",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic has been found in Campcodes Complete Web-Based School Management System 1.0. This affects an unknown part of the file /view/student_exam_mark_insert_form1.php. The manipulation of the argument page leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263493 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20xss/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2018.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263493",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263493",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.330123",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-46xx/CVE-2024-4650.json
Normal file
92
CVE-2024/CVE-2024-46xx/CVE-2024-4650.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4650",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-08T14:15:09.337",
|
||||
"lastModified": "2024-05-08T14:15:09.337",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in Campcodes Complete Web-Based School Management System 1.0. This vulnerability affects unknown code of the file /view/student_due_payment.php. The manipulation of the argument due_month leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-263494 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20xss/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2019.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263494",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263494",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.330124",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-46xx/CVE-2024-4651.json
Normal file
92
CVE-2024/CVE-2024-46xx/CVE-2024-4651.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4651",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-08T14:15:09.563",
|
||||
"lastModified": "2024-05-08T14:15:09.563",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in Campcodes Complete Web-Based School Management System 1.0. This issue affects some unknown processing of the file /view/student_attendance_history1.php. The manipulation of the argument year leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263495."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20xss/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2020.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263495",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263495",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.330125",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-46xx/CVE-2024-4652.json
Normal file
92
CVE-2024/CVE-2024-46xx/CVE-2024-4652.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4652",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-08T14:15:09.780",
|
||||
"lastModified": "2024-05-08T14:15:09.780",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, was found in Campcodes Complete Web-Based School Management System 1.0. Affected is an unknown function of the file /view/show_teacher2.php. The manipulation of the argument month leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263496."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20xss/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2021.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263496",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263496",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.330126",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-46xx/CVE-2024-4653.json
Normal file
92
CVE-2024/CVE-2024-46xx/CVE-2024-4653.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4653",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-08T15:15:11.723",
|
||||
"lastModified": "2024-05-08T15:15:11.723",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in BlueNet Technology Clinical Browsing System 1.2.1 and classified as critical. Affected by this issue is some unknown functionality of the file /xds/outIndex.php. The manipulation of the argument name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-263498 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Hefei-Coffee/cve/blob/main/sql.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263498",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263498",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.330628",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-46xx/CVE-2024-4654.json
Normal file
92
CVE-2024/CVE-2024-46xx/CVE-2024-4654.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4654",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-08T15:15:11.950",
|
||||
"lastModified": "2024-05-08T15:15:11.950",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in BlueNet Technology Clinical Browsing System 1.2.1. It has been classified as critical. This affects an unknown part of the file /xds/cloudInterface.php. The manipulation of the argument INSTI_CODE leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263499."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Hefei-Coffee/cve/blob/main/sql2.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263499",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263499",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.330631",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
78
README.md
78
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-05-08T14:00:37.732351+00:00
|
||||
2024-05-08T16:00:37.448803+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-05-08T13:15:17.563000+00:00
|
||||
2024-05-08T15:15:11.950000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,60 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
249030
|
||||
249072
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `16`
|
||||
Recently added CVEs: `42`
|
||||
|
||||
- [CVE-2022-40218](CVE-2022/CVE-2022-402xx/CVE-2022-40218.json) (`2024-05-08T12:15:07.650`)
|
||||
- [CVE-2024-1438](CVE-2024/CVE-2024-14xx/CVE-2024-1438.json) (`2024-05-08T13:15:07.733`)
|
||||
- [CVE-2024-34255](CVE-2024/CVE-2024-342xx/CVE-2024-34255.json) (`2024-05-08T13:15:08.033`)
|
||||
- [CVE-2024-34414](CVE-2024/CVE-2024-344xx/CVE-2024-34414.json) (`2024-05-08T12:15:07.990`)
|
||||
- [CVE-2024-34546](CVE-2024/CVE-2024-345xx/CVE-2024-34546.json) (`2024-05-08T12:15:08.180`)
|
||||
- [CVE-2024-34547](CVE-2024/CVE-2024-345xx/CVE-2024-34547.json) (`2024-05-08T12:15:08.370`)
|
||||
- [CVE-2024-34548](CVE-2024/CVE-2024-345xx/CVE-2024-34548.json) (`2024-05-08T12:15:08.560`)
|
||||
- [CVE-2024-34553](CVE-2024/CVE-2024-345xx/CVE-2024-34553.json) (`2024-05-08T12:15:08.747`)
|
||||
- [CVE-2024-34558](CVE-2024/CVE-2024-345xx/CVE-2024-34558.json) (`2024-05-08T12:15:08.933`)
|
||||
- [CVE-2024-34560](CVE-2024/CVE-2024-345xx/CVE-2024-34560.json) (`2024-05-08T12:15:09.133`)
|
||||
- [CVE-2024-34561](CVE-2024/CVE-2024-345xx/CVE-2024-34561.json) (`2024-05-08T12:15:09.330`)
|
||||
- [CVE-2024-4644](CVE-2024/CVE-2024-46xx/CVE-2024-4644.json) (`2024-05-08T12:15:09.540`)
|
||||
- [CVE-2024-4645](CVE-2024/CVE-2024-46xx/CVE-2024-4645.json) (`2024-05-08T13:15:08.090`)
|
||||
- [CVE-2024-4646](CVE-2024/CVE-2024-46xx/CVE-2024-4646.json) (`2024-05-08T13:15:08.307`)
|
||||
- [CVE-2024-4647](CVE-2024/CVE-2024-46xx/CVE-2024-4647.json) (`2024-05-08T13:15:08.517`)
|
||||
- [CVE-2024-4648](CVE-2024/CVE-2024-46xx/CVE-2024-4648.json) (`2024-05-08T13:15:08.740`)
|
||||
- [CVE-2024-28132](CVE-2024/CVE-2024-281xx/CVE-2024-28132.json) (`2024-05-08T15:15:09.183`)
|
||||
- [CVE-2024-28883](CVE-2024/CVE-2024-288xx/CVE-2024-28883.json) (`2024-05-08T15:15:09.380`)
|
||||
- [CVE-2024-28889](CVE-2024/CVE-2024-288xx/CVE-2024-28889.json) (`2024-05-08T15:15:09.590`)
|
||||
- [CVE-2024-30459](CVE-2024/CVE-2024-304xx/CVE-2024-30459.json) (`2024-05-08T14:15:07.923`)
|
||||
- [CVE-2024-31156](CVE-2024/CVE-2024-311xx/CVE-2024-31156.json) (`2024-05-08T15:15:09.790`)
|
||||
- [CVE-2024-31270](CVE-2024/CVE-2024-312xx/CVE-2024-31270.json) (`2024-05-08T14:15:08.117`)
|
||||
- [CVE-2024-32049](CVE-2024/CVE-2024-320xx/CVE-2024-32049.json) (`2024-05-08T15:15:09.987`)
|
||||
- [CVE-2024-32113](CVE-2024/CVE-2024-321xx/CVE-2024-32113.json) (`2024-05-08T15:15:10.227`)
|
||||
- [CVE-2024-32761](CVE-2024/CVE-2024-327xx/CVE-2024-32761.json) (`2024-05-08T15:15:10.330`)
|
||||
- [CVE-2024-32886](CVE-2024/CVE-2024-328xx/CVE-2024-32886.json) (`2024-05-08T14:15:08.310`)
|
||||
- [CVE-2024-32980](CVE-2024/CVE-2024-329xx/CVE-2024-32980.json) (`2024-05-08T15:15:10.530`)
|
||||
- [CVE-2024-33573](CVE-2024/CVE-2024-335xx/CVE-2024-33573.json) (`2024-05-08T14:15:08.523`)
|
||||
- [CVE-2024-33574](CVE-2024/CVE-2024-335xx/CVE-2024-33574.json) (`2024-05-08T14:15:08.713`)
|
||||
- [CVE-2024-33604](CVE-2024/CVE-2024-336xx/CVE-2024-33604.json) (`2024-05-08T15:15:10.733`)
|
||||
- [CVE-2024-33608](CVE-2024/CVE-2024-336xx/CVE-2024-33608.json) (`2024-05-08T15:15:10.930`)
|
||||
- [CVE-2024-33612](CVE-2024/CVE-2024-336xx/CVE-2024-33612.json) (`2024-05-08T15:15:11.113`)
|
||||
- [CVE-2024-34347](CVE-2024/CVE-2024-343xx/CVE-2024-34347.json) (`2024-05-08T15:15:11.310`)
|
||||
- [CVE-2024-3951](CVE-2024/CVE-2024-39xx/CVE-2024-3951.json) (`2024-05-08T15:15:11.517`)
|
||||
- [CVE-2024-4233](CVE-2024/CVE-2024-42xx/CVE-2024-4233.json) (`2024-05-08T14:15:08.907`)
|
||||
- [CVE-2024-4649](CVE-2024/CVE-2024-46xx/CVE-2024-4649.json) (`2024-05-08T14:15:09.107`)
|
||||
- [CVE-2024-4650](CVE-2024/CVE-2024-46xx/CVE-2024-4650.json) (`2024-05-08T14:15:09.337`)
|
||||
- [CVE-2024-4651](CVE-2024/CVE-2024-46xx/CVE-2024-4651.json) (`2024-05-08T14:15:09.563`)
|
||||
- [CVE-2024-4652](CVE-2024/CVE-2024-46xx/CVE-2024-4652.json) (`2024-05-08T14:15:09.780`)
|
||||
- [CVE-2024-4653](CVE-2024/CVE-2024-46xx/CVE-2024-4653.json) (`2024-05-08T15:15:11.723`)
|
||||
- [CVE-2024-4654](CVE-2024/CVE-2024-46xx/CVE-2024-4654.json) (`2024-05-08T15:15:11.950`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `105`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
- [CVE-2024-34346](CVE-2024/CVE-2024-343xx/CVE-2024-34346.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-34562](CVE-2024/CVE-2024-345xx/CVE-2024-34562.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-34563](CVE-2024/CVE-2024-345xx/CVE-2024-34563.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-34564](CVE-2024/CVE-2024-345xx/CVE-2024-34564.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-34565](CVE-2024/CVE-2024-345xx/CVE-2024-34565.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-34566](CVE-2024/CVE-2024-345xx/CVE-2024-34566.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-34568](CVE-2024/CVE-2024-345xx/CVE-2024-34568.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-34569](CVE-2024/CVE-2024-345xx/CVE-2024-34569.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-34570](CVE-2024/CVE-2024-345xx/CVE-2024-34570.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-34571](CVE-2024/CVE-2024-345xx/CVE-2024-34571.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-34572](CVE-2024/CVE-2024-345xx/CVE-2024-34572.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-34573](CVE-2024/CVE-2024-345xx/CVE-2024-34573.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-34574](CVE-2024/CVE-2024-345xx/CVE-2024-34574.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-3494](CVE-2024/CVE-2024-34xx/CVE-2024-3494.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-3507](CVE-2024/CVE-2024-35xx/CVE-2024-3507.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-4030](CVE-2024/CVE-2024-40xx/CVE-2024-4030.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-4135](CVE-2024/CVE-2024-41xx/CVE-2024-4135.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-4162](CVE-2024/CVE-2024-41xx/CVE-2024-4162.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-4281](CVE-2024/CVE-2024-42xx/CVE-2024-4281.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-4393](CVE-2024/CVE-2024-43xx/CVE-2024-4393.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-4418](CVE-2024/CVE-2024-44xx/CVE-2024-4418.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-4436](CVE-2024/CVE-2024-44xx/CVE-2024-4436.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-4437](CVE-2024/CVE-2024-44xx/CVE-2024-4437.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-4438](CVE-2024/CVE-2024-44xx/CVE-2024-4438.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2024-4456](CVE-2024/CVE-2024-44xx/CVE-2024-4456.json) (`2024-05-08T13:15:00.690`)
|
||||
- [CVE-2022-21819](CVE-2022/CVE-2022-218xx/CVE-2022-21819.json) (`2024-05-08T14:15:07.550`)
|
||||
- [CVE-2024-26925](CVE-2024/CVE-2024-269xx/CVE-2024-26925.json) (`2024-05-08T15:15:08.917`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
288
_state.csv
288
_state.csv
@ -178066,47 +178066,47 @@ CVE-2021-34943,0,0,79829aa4e8783586817907836ed443f420cfb8a4403a57667921019530660
|
||||
CVE-2021-34944,0,0,c251446deb1df58e883468eb0bef8656750c01994be8bdbce125a763b0fdb358,2022-01-14T21:57:39.450000
|
||||
CVE-2021-34945,0,0,894124dcd5223928e2b30904e128120e5a452de8fb669f38709e2ba6ac86b5e0,2022-01-14T21:57:42.767000
|
||||
CVE-2021-34946,0,0,238cb2ff5021a0153160e32639313470e17854d0eea313b4da0fa2f4583545f2,2022-01-14T21:57:47.790000
|
||||
CVE-2021-34947,0,1,649edcfe6b39f68e79e05dad7dcfb15a395f710bfcaa9804eddddba5e9ef91bb,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34948,0,1,d2afb226a87a6e2c18a5b2a9f306f3d0645d5e2dc6c2165b491181aab7268e11,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34949,0,1,bbdfa7136555493fe298163227e7993bf5d1c04aa5114adb65f8d6b02f98350b,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34947,0,0,649edcfe6b39f68e79e05dad7dcfb15a395f710bfcaa9804eddddba5e9ef91bb,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34948,0,0,d2afb226a87a6e2c18a5b2a9f306f3d0645d5e2dc6c2165b491181aab7268e11,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34949,0,0,bbdfa7136555493fe298163227e7993bf5d1c04aa5114adb65f8d6b02f98350b,2024-05-08T13:15:00.690000
|
||||
CVE-2021-3495,0,0,6c8feb86378604f2c77172669992d6bfb20c95890248f2554fbfd7b80008fd78,2021-06-14T15:13:37.510000
|
||||
CVE-2021-34950,0,1,aafc5335462a2c28106e5f5b776399ed5a22a6e6b1f33449692cd05add2545f9,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34951,0,1,f306d43e0c33211afb834bd5581a2becd5e29f6dfe7e4a3dc86808fa5242a6d4,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34952,0,1,a46c13a50448f2931fcdbc4ee19d0d2c06d1b9e47202990d844d329751a5b782,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34953,0,1,8e84df010ac9cb7bb5de4c59310ed030d3f112dd6c30dde57c2c32408595aeac,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34954,0,1,bc887410ac50d49dd38cc1f5dc58b204a6155f5ccbdfe3e38862a21d5b7fefde,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34955,0,1,c6d5bc7c374da12dcac72ef7798b7bf292c105454208da6eee29af0d77a7b6d3,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34956,0,1,0672b5dbf6599284ce1c834072e1ce517be79ac003f3896bf209cd93c5889f95,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34957,0,1,e6053f3c82578492fbd6985dc0e1c5051fd88167d77de3a99703999b26281e72,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34958,0,1,fe385bacb5e189b50f943bc6f20b511d10b49d60aba643358585f0bc06deddfb,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34959,0,1,086001c27334536f5791f172ee72a20c71b0165c4f328eb7e14723e2fc54cbf1,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34950,0,0,aafc5335462a2c28106e5f5b776399ed5a22a6e6b1f33449692cd05add2545f9,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34951,0,0,f306d43e0c33211afb834bd5581a2becd5e29f6dfe7e4a3dc86808fa5242a6d4,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34952,0,0,a46c13a50448f2931fcdbc4ee19d0d2c06d1b9e47202990d844d329751a5b782,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34953,0,0,8e84df010ac9cb7bb5de4c59310ed030d3f112dd6c30dde57c2c32408595aeac,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34954,0,0,bc887410ac50d49dd38cc1f5dc58b204a6155f5ccbdfe3e38862a21d5b7fefde,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34955,0,0,c6d5bc7c374da12dcac72ef7798b7bf292c105454208da6eee29af0d77a7b6d3,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34956,0,0,0672b5dbf6599284ce1c834072e1ce517be79ac003f3896bf209cd93c5889f95,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34957,0,0,e6053f3c82578492fbd6985dc0e1c5051fd88167d77de3a99703999b26281e72,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34958,0,0,fe385bacb5e189b50f943bc6f20b511d10b49d60aba643358585f0bc06deddfb,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34959,0,0,086001c27334536f5791f172ee72a20c71b0165c4f328eb7e14723e2fc54cbf1,2024-05-08T13:15:00.690000
|
||||
CVE-2021-3496,0,0,cba6ca6d32c9979e9f0216c0fdbd435ff14a04133999a2a1669335c6016d76c8,2022-12-21T15:01:19.963000
|
||||
CVE-2021-34960,0,1,b27fbff663a84d419e6fdca00cfed15814964be1df8122bb2e9ae4cec29f7ae7,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34961,0,1,59efd67a3424408ff99bc86d6fee5fd1b0df402a9084fdc8664be4ac997b5a3a,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34962,0,1,2342232c5305895f7551abe7751aee6b55c213d464f8bb710567a4ce39cecab1,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34963,0,1,a6ffd5163efcf3092294214185994805cdf15ed32d18e7718b58219b164e7658,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34964,0,1,d7654e6ee590fc3f94f2d2dc0dc58c5517b9b5803d764b640840ecfaa4a688c0,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34965,0,1,4e9e9ef37af4133c023bdf9af13d7f3eb13f661c7d2196be78f203d624402297,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34966,0,1,316ff66b067e781d53ae85d9b82916d3f9c78a579e6cb5944c97c56b205c40db,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34967,0,1,9fca0ce93543b650605b4191049cf51344fcab7545ef01d9bf4ef15553a5c0aa,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34968,0,1,8b9041efbb07731cca038e497c0e9f165041b1e2b5081f0ff480f39f4257d4ac,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34969,0,1,6cfa3f938bb810b82e9c28471142e9cd064f6efca7860f3d2bbb4b426b723d9d,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34960,0,0,b27fbff663a84d419e6fdca00cfed15814964be1df8122bb2e9ae4cec29f7ae7,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34961,0,0,59efd67a3424408ff99bc86d6fee5fd1b0df402a9084fdc8664be4ac997b5a3a,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34962,0,0,2342232c5305895f7551abe7751aee6b55c213d464f8bb710567a4ce39cecab1,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34963,0,0,a6ffd5163efcf3092294214185994805cdf15ed32d18e7718b58219b164e7658,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34964,0,0,d7654e6ee590fc3f94f2d2dc0dc58c5517b9b5803d764b640840ecfaa4a688c0,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34965,0,0,4e9e9ef37af4133c023bdf9af13d7f3eb13f661c7d2196be78f203d624402297,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34966,0,0,316ff66b067e781d53ae85d9b82916d3f9c78a579e6cb5944c97c56b205c40db,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34967,0,0,9fca0ce93543b650605b4191049cf51344fcab7545ef01d9bf4ef15553a5c0aa,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34968,0,0,8b9041efbb07731cca038e497c0e9f165041b1e2b5081f0ff480f39f4257d4ac,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34969,0,0,6cfa3f938bb810b82e9c28471142e9cd064f6efca7860f3d2bbb4b426b723d9d,2024-05-08T13:15:00.690000
|
||||
CVE-2021-3497,0,0,8c93190c8f8f06570107ff3200a0533b7ac5baa5d7a48e3fdbc516aad460b63f,2022-09-28T20:02:01.217000
|
||||
CVE-2021-34970,0,1,14405ef4c46b56d686653d0357ca18863bbc1164fa150218f3610d5ff53f7c26,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34971,0,1,6121ff3bf31a0d383e66f001991eb2adabe6c8f47a486e5d986dd4ddc0be0b5a,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34972,0,1,1c38da68ccb62b69f875b53b0840dc3066e4a933dccf0818206dfb16c98ec646,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34973,0,1,d31680b0dfbeedad62a487fa7db63ccba73bc0bf72867a581e220ec61f33cbd5,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34974,0,1,23628a5f495633834f3b7ee1316fd6b42a3107901420a6e2c3ea8e2bdee41573,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34975,0,1,172eec8eecb7b856eb302f28f67369e4d997d215085f22640aeccacd8e80f2d2,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34976,0,1,089b37ad8bf254a3c1d51dfccb25b235a2e8088fd2895fb48b887e04d7df2571,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34970,0,0,14405ef4c46b56d686653d0357ca18863bbc1164fa150218f3610d5ff53f7c26,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34971,0,0,6121ff3bf31a0d383e66f001991eb2adabe6c8f47a486e5d986dd4ddc0be0b5a,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34972,0,0,1c38da68ccb62b69f875b53b0840dc3066e4a933dccf0818206dfb16c98ec646,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34973,0,0,d31680b0dfbeedad62a487fa7db63ccba73bc0bf72867a581e220ec61f33cbd5,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34974,0,0,23628a5f495633834f3b7ee1316fd6b42a3107901420a6e2c3ea8e2bdee41573,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34975,0,0,172eec8eecb7b856eb302f28f67369e4d997d215085f22640aeccacd8e80f2d2,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34976,0,0,089b37ad8bf254a3c1d51dfccb25b235a2e8088fd2895fb48b887e04d7df2571,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34977,0,0,1ed94e884f1d18f5e0d22d17f5665be0e83b35a39386a165550b262f89d1f3f3,2022-01-20T14:46:59.397000
|
||||
CVE-2021-34978,0,0,41b87c3619dadcd2e0d7e11b17da3c8be7889d7da3f99c606dd82257bedb540e,2022-01-20T14:53:48.037000
|
||||
CVE-2021-34979,0,0,af86c47ae95e4db95b1d595fc69d3e18c1383e2db7496d6d464cf9aacbca1b0a,2022-01-19T20:12:40.507000
|
||||
CVE-2021-3498,0,0,9db04db7fa73b3a1d604a88a21add474c43d170fe2a85578e0a339a540e923b2,2022-10-24T15:08:30.287000
|
||||
CVE-2021-34980,0,0,695d450ac3010085055af6f4c8015c9a5a99f4cbd53d27536267deac44ef250c,2022-01-19T20:09:51.213000
|
||||
CVE-2021-34981,0,1,a86c7a2b8999d98fb3cff07db08d72432f44527c148646cacd0001e7ee781074,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34982,0,1,4a2b26920c2e3bf27a87a0154230c8ea58f21f56e8aaaddf18f7211819a6d859,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34983,0,1,725f20735fbd875cf89d00c7e1722de3066f0e1ade7f4d5934ee13a34ed2f180,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34981,0,0,a86c7a2b8999d98fb3cff07db08d72432f44527c148646cacd0001e7ee781074,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34982,0,0,4a2b26920c2e3bf27a87a0154230c8ea58f21f56e8aaaddf18f7211819a6d859,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34983,0,0,725f20735fbd875cf89d00c7e1722de3066f0e1ade7f4d5934ee13a34ed2f180,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34984,0,0,ed1596c3833443a873e7d02bebcfed85bd0444d4a8d914b244eb5c80f1614178,2022-01-20T18:19:58.510000
|
||||
CVE-2021-34985,0,0,4b3f317c382d7c1092261fe5dc1b7226e47650b7fb394ae8588db8e05c896d21,2022-01-20T18:20:32.257000
|
||||
CVE-2021-34986,0,0,24560d4aa489c4308ce32c4030da8089bd5fc75cf6cb58858d651dbb454ae7ab,2022-07-22T14:01:25.817000
|
||||
@ -178120,11 +178120,11 @@ CVE-2021-34995,0,0,b987e23c91a9ce361d255ee6b68e9a84185cbe93748de3bf17bc2e7f20725
|
||||
CVE-2021-34996,0,0,ac8345224df59bef3395e866995ae852f29a3052f38a0210a3dbb91d08aa851b,2022-01-22T03:54:01.530000
|
||||
CVE-2021-34997,0,0,da191d65fecb70eff6271c6a391f2981294bc6a88a19f2ecc798b5ba41cc7768,2022-01-22T03:51:16.197000
|
||||
CVE-2021-34998,0,0,8daaf5896e25e964bec08f6f47903b28cac7f2914df3cdc6447f9a908fa517c7,2022-01-20T18:30:33.707000
|
||||
CVE-2021-34999,0,1,7460fefdb7b6ed665d1f312799e5033a8f64cf693047164f67834fd77673950c,2024-05-08T13:15:00.690000
|
||||
CVE-2021-34999,0,0,7460fefdb7b6ed665d1f312799e5033a8f64cf693047164f67834fd77673950c,2024-05-08T13:15:00.690000
|
||||
CVE-2021-3500,0,0,9340bdcc39d6768c22cad58393e78acf0df9529bcfee4fd6641fb12b733ff973,2022-03-09T21:41:13.120000
|
||||
CVE-2021-35000,0,1,6579d1fb9c2e90b707d7de3a0ffcf1a4362253aff04bbdfaf65eff2b8fcb667b,2024-05-08T13:15:00.690000
|
||||
CVE-2021-35001,0,1,8f50c031057706b7317d47524eaec76ed0328c5e883a18e5845dc7a55ba180b9,2024-05-08T13:15:00.690000
|
||||
CVE-2021-35002,0,1,0388a2638126566f81340042c88e6c8663a143d6fef041e488bbe0deec0df791,2024-05-08T13:15:00.690000
|
||||
CVE-2021-35000,0,0,6579d1fb9c2e90b707d7de3a0ffcf1a4362253aff04bbdfaf65eff2b8fcb667b,2024-05-08T13:15:00.690000
|
||||
CVE-2021-35001,0,0,8f50c031057706b7317d47524eaec76ed0328c5e883a18e5845dc7a55ba180b9,2024-05-08T13:15:00.690000
|
||||
CVE-2021-35002,0,0,0388a2638126566f81340042c88e6c8663a143d6fef041e488bbe0deec0df791,2024-05-08T13:15:00.690000
|
||||
CVE-2021-35003,0,0,e1f603fec983e36b9544b98ede333cdc2216c0b32bcde04e0c0f7fd473ff7e2c,2022-01-27T18:31:58.600000
|
||||
CVE-2021-35004,0,0,5847821a90bcfa1efaf35ec5b2f7f51f3387e0ecee584dd4bd7bf6f90ac3bf29,2022-01-27T18:34:57.367000
|
||||
CVE-2021-35005,0,0,5f8ced7f6f59f4d8b9536a43fdcf32ebf6d441af082d683e6baf41b534b6e569,2023-06-26T18:59:40.723000
|
||||
@ -187300,7 +187300,7 @@ CVE-2022-0365,0,0,07faf7616acb5d4e690848e6f4ff862b450b8d4c606f022dfba5b2f7db152a
|
||||
CVE-2022-0366,0,0,2a55351fff07363d45bfbd9160d74d0088ede08bd3bb090a9a4a676a0ad53cd5,2023-08-08T14:21:49.707000
|
||||
CVE-2022-0367,0,0,6ddd9cb85cd6bbf4e0b9be6b5f146d6cbde4e3c46172bd8a577bacac285a5e43,2022-09-30T19:49:41.133000
|
||||
CVE-2022-0368,0,0,3ad0e782e93ac056f3d86a89eda3b83a1844078678a6a83c7f60ca644ddd950b,2022-11-09T03:52:57.447000
|
||||
CVE-2022-0369,0,1,f8bdaa41a10652b21e1376614d162903049ec39a9642f8c09bd948fbabd5eaba,2024-05-08T13:15:00.690000
|
||||
CVE-2022-0369,0,0,f8bdaa41a10652b21e1376614d162903049ec39a9642f8c09bd948fbabd5eaba,2024-05-08T13:15:00.690000
|
||||
CVE-2022-0370,0,0,7e34e2221c03b6539d97cfd37ee954f1affe7ff993bbca23cafdb8ee9b87e718,2022-02-02T15:09:35.097000
|
||||
CVE-2022-0371,0,0,6c6244223f3a0bab81469c49be9c48280022ce75b9e2133a4f29e3db7544fd45,2022-04-04T19:14:52.183000
|
||||
CVE-2022-0372,0,0,47f87f1a5ce57bbd11f98832e2e10f944ae82e2d1db25dec8cc34c7d4bb1dfee,2022-02-02T13:44:12.263000
|
||||
@ -190626,7 +190626,7 @@ CVE-2022-21815,0,0,f790f24d37214e5cee37ca7dd83c3f9be7e1b0d536a79e6787a4256244465
|
||||
CVE-2022-21816,0,0,ff386e80493db4cd98a1a498f62fa81e99311c0b7b45d8997863e5ceb3bcb87e,2023-07-03T20:35:17.977000
|
||||
CVE-2022-21817,0,0,78085610e2b74dca4affb0f714ededbe8979cf749a9ad83032b7af356387479f,2023-07-24T13:52:04.670000
|
||||
CVE-2022-21818,0,0,8c3dabf9409ba2c34ba37156ecb0548dd15470740eab0bd4ab6e79b85a651abe,2022-02-23T18:41:10.190000
|
||||
CVE-2022-21819,0,0,a26342226b8977acfd1c6b6c0b0211b6796d9b989fafd5ccc9770168f220df57,2022-03-22T14:29:49.827000
|
||||
CVE-2022-21819,0,1,0d9ec6e831e4bd73c8a3f8993cd365fad8bee4b339a5102c4dfb20ae3eb486cf,2024-05-08T14:15:07.550000
|
||||
CVE-2022-2182,0,0,1678e61b09551ae00c4f35ba0646d900331f1aba85e86d9e915a60bd4ea99c30,2023-11-07T03:46:16.313000
|
||||
CVE-2022-21820,0,0,cf3582b742e22dfdecfb5803c157bd69b598e0e8d06a19877f47bbd9861ee182,2023-07-24T13:46:40.093000
|
||||
CVE-2022-21821,0,0,081dee849832e209023e970e855bf73489de7624c404e3a0f7a77172356f5c99,2022-04-08T14:31:45.347000
|
||||
@ -205515,7 +205515,7 @@ CVE-2022-40214,0,0,075704b9c4a2c8aecf891493001e82ba198db96beb659a7b1ac4a36c0957b
|
||||
CVE-2022-40215,0,0,d75a99076a8c740b3f576f7cdfeae73dd9f62a50323901377cebd6b7bbacf0d6,2022-09-26T15:05:46.373000
|
||||
CVE-2022-40216,0,0,578a4640f64b639ee8557ea6ff7e75f120d314383b545d883c772250da267b49,2023-08-08T14:21:49.707000
|
||||
CVE-2022-40217,0,0,6ebd6bb26c34914dd8a9dcd60d89bbfb999ba13007fbb6f92cfb8d2d618d50a8,2022-09-23T03:00:39.007000
|
||||
CVE-2022-40218,1,1,3de3658f286ae76c9878bb9d8c127fed7745738ff159500e49559c3190d1017f,2024-05-08T13:15:00.690000
|
||||
CVE-2022-40218,0,0,3de3658f286ae76c9878bb9d8c127fed7745738ff159500e49559c3190d1017f,2024-05-08T13:15:00.690000
|
||||
CVE-2022-40219,0,0,b00f290daafe970dd9a2d96c68c220d6aef2fb5d4b3533fc8231158cca1c9f55,2022-09-22T19:46:08.817000
|
||||
CVE-2022-4022,0,0,b1531080342a1541d377df22cb8e9b2c299a211720859560e80cb74f74e2de1d,2023-11-07T03:56:43.417000
|
||||
CVE-2022-40220,0,0,aefda2ad93fea5ab1d1535bfff5d1f23f6fd7af321bf1bee60f4c9e3c1e959d4,2023-02-02T17:20:47.583000
|
||||
@ -208262,12 +208262,12 @@ CVE-2022-43648,0,0,bdd9262c3bc11efb72013cc7895b70c85732c3dce34edf8a9d5912dc646af
|
||||
CVE-2022-43649,0,0,0a87f35670ab11ed7ba3a548795d36641100c4bd1dad68de11109653eb18c0e5,2023-04-06T18:37:24.863000
|
||||
CVE-2022-4365,0,0,1852e2977e24c854a31a9df11d5dc6e0dfc7668a1c5c7b038970503352a6e237,2023-01-20T19:31:53.417000
|
||||
CVE-2022-43650,0,0,915b098b5f13f8eaadcfa71658bd16c657272a7d2b0eca08378973d2655fc548,2023-04-06T18:37:46.767000
|
||||
CVE-2022-43651,0,1,8e4308cf1283500cb364395695cd353a89be45d5ebb791a86295492d8c69c633,2024-05-08T13:15:00.690000
|
||||
CVE-2022-43652,0,1,d74962f6eb609d18ade801721cb354bdcfd86326c925bdb66d7580d58622601e,2024-05-08T13:15:00.690000
|
||||
CVE-2022-43653,0,1,5413e82f80d30e22068f51ffc72b0d7c7f057df3dd1b120403ad570f1d08ed46,2024-05-08T13:15:00.690000
|
||||
CVE-2022-43654,0,1,de8187c585c0eef83bdf3f8a520ac6b636dcbd30ed2ad15befe25b62fc168b60,2024-05-08T13:15:00.690000
|
||||
CVE-2022-43655,0,1,c6400d1086cff4ba4a77dcef9144438ba34ec2f6060ff4f50af494cd0dd65348,2024-05-08T13:15:00.690000
|
||||
CVE-2022-43656,0,1,d9b357a17376d24305ac854eceacc16ee0459c9dec20db9df1e59aebdea4de0c,2024-05-08T13:15:00.690000
|
||||
CVE-2022-43651,0,0,8e4308cf1283500cb364395695cd353a89be45d5ebb791a86295492d8c69c633,2024-05-08T13:15:00.690000
|
||||
CVE-2022-43652,0,0,d74962f6eb609d18ade801721cb354bdcfd86326c925bdb66d7580d58622601e,2024-05-08T13:15:00.690000
|
||||
CVE-2022-43653,0,0,5413e82f80d30e22068f51ffc72b0d7c7f057df3dd1b120403ad570f1d08ed46,2024-05-08T13:15:00.690000
|
||||
CVE-2022-43654,0,0,de8187c585c0eef83bdf3f8a520ac6b636dcbd30ed2ad15befe25b62fc168b60,2024-05-08T13:15:00.690000
|
||||
CVE-2022-43655,0,0,c6400d1086cff4ba4a77dcef9144438ba34ec2f6060ff4f50af494cd0dd65348,2024-05-08T13:15:00.690000
|
||||
CVE-2022-43656,0,0,d9b357a17376d24305ac854eceacc16ee0459c9dec20db9df1e59aebdea4de0c,2024-05-08T13:15:00.690000
|
||||
CVE-2022-4366,0,0,a73b27b189ffafd993f726a18e71a333c3a03fd5d6ed74db9e5e6da0f7f5be96,2023-07-06T15:15:10.590000
|
||||
CVE-2022-43660,0,0,f4be19524560855b9acca8631d26d41a54a0dc2b41b0475637c3e7df271fa33e,2022-12-12T14:35:51.977000
|
||||
CVE-2022-43662,0,0,c94c66f61778619c4675f0b29f72c8958f79e71f1b6836ff081509227bc42f03,2023-01-12T20:54:32.723000
|
||||
@ -219493,7 +219493,7 @@ CVE-2023-27318,0,0,4b557d087d889e8a68b0d6e103495a8af7301d02f420bf35baafcd7b8fb5c
|
||||
CVE-2023-27319,0,0,361240baf6163199a352b75919fdde2e3cd331e152206bea9eeb65d833be25e2,2024-01-03T02:24:18.600000
|
||||
CVE-2023-2732,0,0,e6ae3fed49f77287aee8b9024664e6b99ed70688d5521a62d46378dd2694ede3,2023-11-07T04:13:13.630000
|
||||
CVE-2023-27320,0,0,50bb51731b4dd6f4bb053c0c0f44829920be232907835206d2d1a9de0622e6b6,2023-11-07T04:09:54.090000
|
||||
CVE-2023-27321,0,1,3a70c31017de0e06cd0c44c94aadf1a4201f888d6966e3912ba5b1d287c306e8,2024-05-08T13:15:00.690000
|
||||
CVE-2023-27321,0,0,3a70c31017de0e06cd0c44c94aadf1a4201f888d6966e3912ba5b1d287c306e8,2024-05-08T13:15:00.690000
|
||||
CVE-2023-27322,0,0,41af2c06fac92feb8df0e81204cac6d7b9ba1aec806a5677145a46170b52b1b5,2024-05-03T12:50:34.250000
|
||||
CVE-2023-27323,0,0,6a2729b07ef3245b45a326d76896c33be30fd211e92f44198f5795b647d4e2c8,2024-05-03T12:50:34.250000
|
||||
CVE-2023-27324,0,0,547cb3927c5d8c05690a62fcd13600df2209c003f4bd104333b7fe7a757672d4,2024-05-03T12:50:34.250000
|
||||
@ -225801,8 +225801,8 @@ CVE-2023-35744,0,0,df67bcbfbb16baf2b8445f9f20cb23715272e1e0ead1addb32883be084a90
|
||||
CVE-2023-35745,0,0,7cf6a1507013b7aa83e9cecaf0998c3dee4e2e14cbeb467894edaa9f5133d103,2024-05-03T12:50:12.213000
|
||||
CVE-2023-35746,0,0,aa9c17076dfa4c5c8a4607e866ac8d5ccf21cb29b88388ada09aa8d7ba85bcb8,2024-05-03T12:50:12.213000
|
||||
CVE-2023-35747,0,0,b6c6a00a997e0a2b0a87f8bf52f72741c3ebbdffbd62ef30cc7c1bbba130e1eb,2024-05-03T12:50:12.213000
|
||||
CVE-2023-35748,0,1,4c3b7135c62ff40d3afe6ff9647ffccf6acac2e0900ade2e38082d5e448a89f1,2024-05-08T13:15:00.690000
|
||||
CVE-2023-35749,0,1,03f0c1977658a384a85a933af7f38097372b623e597d41019d59aa00f540e7bf,2024-05-08T13:15:00.690000
|
||||
CVE-2023-35748,0,0,4c3b7135c62ff40d3afe6ff9647ffccf6acac2e0900ade2e38082d5e448a89f1,2024-05-08T13:15:00.690000
|
||||
CVE-2023-35749,0,0,03f0c1977658a384a85a933af7f38097372b623e597d41019d59aa00f540e7bf,2024-05-08T13:15:00.690000
|
||||
CVE-2023-3575,0,0,cb418c109da6ae5c3db4c1cfd49867dd6bedc2e2b3460bc932b1f4a8938017b2,2023-11-07T04:19:05.260000
|
||||
CVE-2023-35750,0,0,0372fdf8be4a69445e10f831caaa306bdf1b02ee7c3b66fd6eda9263966bfcf6,2024-05-03T12:50:12.213000
|
||||
CVE-2023-35751,0,0,0f50fad6b3b7a0459c70e86432b10bae4122d7443f7fb868b5171b5aea23331b,2024-05-03T12:50:12.213000
|
||||
@ -225811,7 +225811,7 @@ CVE-2023-35753,0,0,7a70e676378efbbb870d1f0f9a76ec3615e50d6acc096ee2d609d1af3ad17
|
||||
CVE-2023-35754,0,0,1e0f0d78a4ecf1adaabb8f5a19739c526e2531fbd08365f73bd093b0b8394950,2024-05-03T12:50:12.213000
|
||||
CVE-2023-35755,0,0,edf49f2a8ea8cf41eee80c59e4adebbdaada76c11859c81036e6f73b5c2a5af3,2024-05-03T12:50:12.213000
|
||||
CVE-2023-35756,0,0,76696556b0e4ba9767b90a754c99636c8e6597c5e271095f546d8259220d87ff,2024-05-03T12:50:12.213000
|
||||
CVE-2023-35757,0,1,2eb1ed81b6cdbd4be6706f0031f503e2553199c4c017452ffb1406c7e84b5a9d,2024-05-08T13:15:00.690000
|
||||
CVE-2023-35757,0,0,2eb1ed81b6cdbd4be6706f0031f503e2553199c4c017452ffb1406c7e84b5a9d,2024-05-08T13:15:00.690000
|
||||
CVE-2023-35759,0,0,737d089372a13d311d938b6f73fbc87604835ac5d6e732c4dc0dc97aa37b299e,2024-02-05T17:15:08.490000
|
||||
CVE-2023-3576,0,0,afc3943dafc3dce0b127a1fe6f63cb13cec0d0d4331467a034b7ea0ef34bb624,2024-03-11T13:15:52.550000
|
||||
CVE-2023-35762,0,0,d3d58c95cdc44cd1c3674a8efa00d524d00379a36ec6dd9b457951306765e9b9,2023-11-29T20:52:44.790000
|
||||
@ -226980,7 +226980,7 @@ CVE-2023-37321,0,0,7c383faa91513be4ead255891df748499b1447afff42ed1591b2a025cabe3
|
||||
CVE-2023-37322,0,0,fb7a634b2d0f8ddc6d1ed4cf2afb5ad92cf97f2a13b8d335fb41696615c84711,2024-05-03T12:50:12.213000
|
||||
CVE-2023-37323,0,0,0460568f5180ac29f059e52bdc148313fb27e1c6b06e1d04456c200acb66ff9b,2024-05-03T12:50:12.213000
|
||||
CVE-2023-37324,0,0,7fcdc5f162f2d4b2b04e7d6795f31b50183891bc06d51062996d0f203c2804d7,2024-05-03T12:50:12.213000
|
||||
CVE-2023-37325,0,1,dea1514d9c11c6d5d4356a3c2588812a2ccc1bd6f08f64e8add2cfdb254c682d,2024-05-08T13:15:00.690000
|
||||
CVE-2023-37325,0,0,dea1514d9c11c6d5d4356a3c2588812a2ccc1bd6f08f64e8add2cfdb254c682d,2024-05-08T13:15:00.690000
|
||||
CVE-2023-37326,0,0,0df6959df6e8982524522a10dc1d191985b3996ef1566d234e34302217acc9d7,2024-05-03T12:50:12.213000
|
||||
CVE-2023-37327,0,0,90780d89452b29664e500b2739c0d60da7e932d962f7bc71d717dc20e4b5ac3b,2024-05-03T12:50:12.213000
|
||||
CVE-2023-37328,0,0,25b4e136455ce1498a01d29129b6919e670d241d5aa8e2f9f70f42049455c17a,2024-05-03T12:50:12.213000
|
||||
@ -229468,7 +229468,7 @@ CVE-2023-40487,0,0,8babb802d8684ea3bd8f9f67c241c0f9f14e99f5d74d33b3dd3b9d36fd425
|
||||
CVE-2023-40488,0,0,7f21d512cffd575a0b255ee798409fad47c0a840c0e08cb08274de3f5ba9ecf8,2024-05-03T12:50:12.213000
|
||||
CVE-2023-40489,0,0,e64d33464be70f7e4501830d0597fb979910a11708f1acc1a44b3cf8dc8e2f18,2024-05-03T12:50:12.213000
|
||||
CVE-2023-4049,0,0,71fae35bc5d304b4be264c850401392d3380077690fcdea8849d782905b00193,2023-08-09T21:15:11.627000
|
||||
CVE-2023-40490,0,1,e15b444a315d38da98c3a1d9a1624f8dae029dcbbd73cf4b751e8d0528064c01,2024-05-08T13:15:00.690000
|
||||
CVE-2023-40490,0,0,e15b444a315d38da98c3a1d9a1624f8dae029dcbbd73cf4b751e8d0528064c01,2024-05-08T13:15:00.690000
|
||||
CVE-2023-40491,0,0,73976a6eabc49ccd31da65a633203c752cf2a8c25b805aff7ea6ac769479984f,2024-05-03T12:50:12.213000
|
||||
CVE-2023-40492,0,0,1fda272f8f38bd4c92c81f3da6aa8bca351b2ccfb672ada5f5e3fc6b4efba7fd,2024-05-03T12:50:12.213000
|
||||
CVE-2023-40493,0,0,95dbd3b6fb9e364aaa69cd65610d769b0fc7657ddfeff767ccaafb4904008488,2024-05-03T12:50:12.213000
|
||||
@ -229655,7 +229655,7 @@ CVE-2023-40687,0,0,3d5325cd240fff6828d190edc5180b5c0b1be7c3f0943dafebe093747f11e
|
||||
CVE-2023-4069,0,0,21c4fe7ce1f447c2893d0b683f06466646b5a992fd8ff8d7a5624190920b09a9,2024-01-31T17:15:13.707000
|
||||
CVE-2023-40691,0,0,b19d0039b9d369e8da51138f6cbdcd9b571d7277a76106e34e44eadf845402b8,2023-12-22T18:29:03.297000
|
||||
CVE-2023-40692,0,0,5d1534d4e7e21fa9390b98d81651d1d7826202f8500ba044c71064fec8968b6e,2024-01-19T16:15:09.330000
|
||||
CVE-2023-40694,0,1,0fa6cdbe2c00c431ec9d5a6bfbacf334a258182d521c89240f8842910996f304,2024-05-08T13:15:00.690000
|
||||
CVE-2023-40694,0,0,0fa6cdbe2c00c431ec9d5a6bfbacf334a258182d521c89240f8842910996f304,2024-05-08T13:15:00.690000
|
||||
CVE-2023-40695,0,0,2bea21fe3c5416b457ba380a7e1a1c6215790bf723f762940cfae8bd3ab130bb,2024-05-06T12:44:56.377000
|
||||
CVE-2023-40696,0,0,5cc23a9fc279a6ebb2e55081c25a1adbd79450799afb579e9da839d39db118b2,2024-05-06T12:44:56.377000
|
||||
CVE-2023-40699,0,0,79bc213a5cd564549a74658337333acb19913662247889e9cab8e99673e71d45,2023-12-04T18:33:32.667000
|
||||
@ -230298,7 +230298,7 @@ CVE-2023-41646,0,0,18872d99f41225485498d9e8c2692d88ff9a8f83473e28d824a74d5f8abd8
|
||||
CVE-2023-41648,0,0,7aba724c272c2df8b8df1a5d1668309227ee6a4fe293519e1f4c4824c288d64f,2023-12-22T20:46:36.737000
|
||||
CVE-2023-4165,0,0,5b69fb5f32ae07ea85ff672c7ffd70f448ef951c413cd6f1090367a0a10eb99c,2024-04-11T01:22:22.110000
|
||||
CVE-2023-41650,0,0,9301942fc8bae797416fce3a76261015bdf039ff60e62aca5237c480ffc103c9,2023-10-10T19:22:25.553000
|
||||
CVE-2023-41651,0,1,86b78991012b3ebea03de6aaab56373fe382ba23780a7a5d99ef61e2bc9fafc5,2024-05-08T13:15:00.690000
|
||||
CVE-2023-41651,0,0,86b78991012b3ebea03de6aaab56373fe382ba23780a7a5d99ef61e2bc9fafc5,2024-05-08T13:15:00.690000
|
||||
CVE-2023-41652,0,0,fd70badbcd1f95421c8de96225f9166fcc4a236e21cd876cdf9c4c72509bc439,2023-11-13T18:31:03.343000
|
||||
CVE-2023-41653,0,0,1a702717000197b0f80f8de0a045beb5c11fffa51b0d21f6eb81f9064866a1f6,2023-09-28T17:16:29.787000
|
||||
CVE-2023-41654,0,0,b5bb5221e9e5cf15a520603d1385650d64de3086bf708eff528b6ccb1f9fe959,2023-10-10T19:22:19.100000
|
||||
@ -238498,7 +238498,7 @@ CVE-2023-6236,0,0,c746200290431ebe52c336c97f229880dd537f5eeffbab0aaed59ac6b0e48c
|
||||
CVE-2023-6237,0,0,d39862f419c6ec5c3793deb43c92a1a0aad502a73e1a347dcb18a61acce9047c,2024-05-01T18:15:12.590000
|
||||
CVE-2023-6238,0,0,7332193d1454e7405dd3270d745aa7f762b874d0f84c51906784a637ceb0212d,2024-02-07T00:15:55.240000
|
||||
CVE-2023-6239,0,0,6ce1b576ddd7c9169d0997e75fde3efd606153edbf61fba1116d733c98bbf90d,2023-12-04T19:06:20.213000
|
||||
CVE-2023-6240,0,1,c5033d7fe03cb9e41aeef2152afb93e522fc64264cea8994e31cac8161d5570e,2024-05-08T13:15:07.470000
|
||||
CVE-2023-6240,0,0,c5033d7fe03cb9e41aeef2152afb93e522fc64264cea8994e31cac8161d5570e,2024-05-08T13:15:07.470000
|
||||
CVE-2023-6241,0,0,0b049661e1c37f8f2850456643594af3b5520aab1f0e1861b7e81cf1492260e4,2024-03-04T13:58:23.447000
|
||||
CVE-2023-6242,0,0,6d69e67cbd815bd255adaa5950d4591e05a6bb1ed9a7b28e0dca7e7af1589ec7,2024-01-18T18:13:53.840000
|
||||
CVE-2023-6244,0,0,738eadbc72f60cd69becd30725fdeeb14cb3b5c05736eda414dcb1a46832ac22,2024-01-18T16:13:00.490000
|
||||
@ -239351,12 +239351,12 @@ CVE-2024-0018,0,0,bb0a25fb19b9bf711b5002d2fc95b30c44dbd513c8d66774c21d649b174725
|
||||
CVE-2024-0019,0,0,2a992db62ce12ab2ee987ae6d8596f1222c80c515fbedbed97a1af53d00222a9,2024-02-16T21:39:50.223000
|
||||
CVE-2024-0020,0,0,10041dfbf81efabcaeebded3d09f521b1a43a499af72b2f92a5be41564fb243b,2024-02-16T21:39:50.223000
|
||||
CVE-2024-0021,0,0,195598eeee803724595407e6749c18133eef4a41fdfa20e3801df52f8b02d210,2024-02-16T21:39:50.223000
|
||||
CVE-2024-0022,0,1,4a467d6471e95818a3d22a3a3b2b0ace1e955edd8938bf07362529e426c48b2a,2024-05-08T13:15:00.690000
|
||||
CVE-2024-0022,0,0,4a467d6471e95818a3d22a3a3b2b0ace1e955edd8938bf07362529e426c48b2a,2024-05-08T13:15:00.690000
|
||||
CVE-2024-0023,0,0,71da3b12c0926fa4407d7d8b99e783afc4b3b8dca223802c3cbec4fc1454193b,2024-02-16T21:39:50.223000
|
||||
CVE-2024-0024,0,1,9695496faf21869ae27e24fd5804a5db62c0e4d48854b678bfad1ed86d21796b,2024-05-08T13:15:00.690000
|
||||
CVE-2024-0025,0,1,af2ba2278c83468f9c9ee0818a23ceb585092240fb112c4e6afc1134d6fd4bad,2024-05-08T13:15:00.690000
|
||||
CVE-2024-0026,0,1,e6a377fd8570a4c81be68a612c3de8ef2df46e27fc79072d59d489ce3a103b25,2024-05-08T13:15:00.690000
|
||||
CVE-2024-0027,0,1,feebb29267eef6b846e635c87d884020111a5d4fbb253c2894c96109d4c1ea4e,2024-05-08T13:15:00.690000
|
||||
CVE-2024-0024,0,0,9695496faf21869ae27e24fd5804a5db62c0e4d48854b678bfad1ed86d21796b,2024-05-08T13:15:00.690000
|
||||
CVE-2024-0025,0,0,af2ba2278c83468f9c9ee0818a23ceb585092240fb112c4e6afc1134d6fd4bad,2024-05-08T13:15:00.690000
|
||||
CVE-2024-0026,0,0,e6a377fd8570a4c81be68a612c3de8ef2df46e27fc79072d59d489ce3a103b25,2024-05-08T13:15:00.690000
|
||||
CVE-2024-0027,0,0,feebb29267eef6b846e635c87d884020111a5d4fbb253c2894c96109d4c1ea4e,2024-05-08T13:15:00.690000
|
||||
CVE-2024-0029,0,0,095a39a40d263e89af48de4c6c2fad99c624ff9d4486c4388646dda629a45307,2024-02-16T13:37:55.033000
|
||||
CVE-2024-0030,0,0,13b9ef30b4ddf3dc33f3691e1ffdf43744c22c4945c3db2bbc2cc35ea6de8cb0,2024-02-16T13:37:55.033000
|
||||
CVE-2024-0031,0,0,4729fe791b13e496056e5a737d467f275a73408750b6410f5cd4e4a046530604,2024-02-16T13:37:55.033000
|
||||
@ -239370,8 +239370,8 @@ CVE-2024-0038,0,0,8798af074e75acf30506472783c98fe3ca6f9989b456036fb13460ce3a0660
|
||||
CVE-2024-0039,0,0,eef2053d277ee92cf2426457ee1c3166f51184d93b11850784119e4a32b8f532,2024-03-12T12:40:13.500000
|
||||
CVE-2024-0040,0,0,4afedb45d19d9a2df9a3ecdcf577c422a3b0751bcf061eb077253f060c2e8e31,2024-02-16T13:37:51.433000
|
||||
CVE-2024-0041,0,0,4dc5cf8202a81389ba1711e9ab4229bb6c315c100ad135fbbcb3e9e75477a4a9,2024-02-16T13:37:51.433000
|
||||
CVE-2024-0042,0,1,54aa11511c3436154cc58982a9c29fd41c0a94a3fbbc291e5ee682eb8413416c,2024-05-08T13:15:00.690000
|
||||
CVE-2024-0043,0,1,d8662c3f376186d2afa8921d0f64ba917609cb5d50d7912e4139ecbce23b8235,2024-05-08T13:15:00.690000
|
||||
CVE-2024-0042,0,0,54aa11511c3436154cc58982a9c29fd41c0a94a3fbbc291e5ee682eb8413416c,2024-05-08T13:15:00.690000
|
||||
CVE-2024-0043,0,0,d8662c3f376186d2afa8921d0f64ba917609cb5d50d7912e4139ecbce23b8235,2024-05-08T13:15:00.690000
|
||||
CVE-2024-0044,0,0,252052610b4ae0ffd4cf0806647555b0208a30970458880cb5d65b093fa59399,2024-03-12T20:15:07.633000
|
||||
CVE-2024-0045,0,0,74be948ede2409dd1fced42dd7b971d5edcab5dd8de9a50e019ab3d0529aa80e,2024-03-12T12:40:13.500000
|
||||
CVE-2024-0046,0,0,db8b26e423bc7f5764a0a6553823c47d2a6413b4d120bb9d62204abe423b4123,2024-03-12T12:40:13.500000
|
||||
@ -240215,7 +240215,7 @@ CVE-2024-1072,0,0,32fe471ba00a9e765c56a143079ee3e98644ebc38ce83029c2cc4a8bc24964
|
||||
CVE-2024-1073,0,0,adaf97fc5155b3c580417fc4779c1ce9fb6459b581a763739c6822c5178eb839,2024-02-07T20:56:30.313000
|
||||
CVE-2024-1074,0,0,633d4c34e54d562a3c8ef166e41f454bd743f2b77196fa371b31e3cbb9b84270,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1075,0,0,1a2b469e57d35fd84b679f6fccb1281a6feade2a72464af7e7a4de99488a9956,2024-02-13T19:43:13.480000
|
||||
CVE-2024-1076,0,1,5a9f9042e17a4f18255753cc0108cf3dbe7c5142f87a1141b1768f9f2a5c2e61,2024-05-08T13:15:00.690000
|
||||
CVE-2024-1076,0,0,5a9f9042e17a4f18255753cc0108cf3dbe7c5142f87a1141b1768f9f2a5c2e61,2024-05-08T13:15:00.690000
|
||||
CVE-2024-1077,0,0,e9f68f289e9abed92d15ff856c2fcc321bbcef63d9600b92166ab0eb9a1d34f2,2024-02-05T20:49:00.927000
|
||||
CVE-2024-1078,0,0,6c9dee916fa3df09a1f7e03c1b0577e56d8c16195545070c4376ae3f631ca16e,2024-02-14T18:39:51.437000
|
||||
CVE-2024-1079,0,0,6ac7286a778516cf89549df1a9d53e18b60d41d010ca37479fb08260829225dd,2024-02-14T19:33:09.977000
|
||||
@ -240530,7 +240530,7 @@ CVE-2024-1434,0,0,e4e786f55d846b84af2540d68c957293cebce80ec0876b8df12d123ed18145
|
||||
CVE-2024-1435,0,0,3d9157bea425ae0ccbf8fb80f8804820a71722fe736e6d6583f664e8ae632d19,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1436,0,0,6bc8b27a2ea5af40fccc1e92152c5147ee2de193867fde85be366aba07117a2b,2024-02-26T16:32:25.577000
|
||||
CVE-2024-1437,0,0,95b845910a840a20b7fa4620989917eab09ec6f88cd90b7d076b0bb6f7afcc4a,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1438,1,1,98e5f1d1b0aa2bcf2b5587462d47fc60c81d5c232fad2af007df499ad01e48d6,2024-05-08T13:15:17.563000
|
||||
CVE-2024-1438,0,0,98e5f1d1b0aa2bcf2b5587462d47fc60c81d5c232fad2af007df499ad01e48d6,2024-05-08T13:15:17.563000
|
||||
CVE-2024-1439,0,0,111aa319a28b6612b690706c94ad9d813b84a022aa5a41258ea3f5bb43056ff3,2024-02-12T14:19:54.330000
|
||||
CVE-2024-1441,0,0,f364258337462cfa80910faec94b096ae863c3d271a16626be7d0063c601ef00,2024-04-30T20:15:07.380000
|
||||
CVE-2024-1442,0,0,d5be8c6d2acf818787220c68cc096ecac92494a9aeb2f3b78b57d2953e31d3e2,2024-03-08T14:02:57.420000
|
||||
@ -240924,8 +240924,8 @@ CVE-2024-1925,0,0,b15aa98b0592f9242d13916a80688f3bbf7b6d60030fd101a2b9d466d1a26c
|
||||
CVE-2024-1926,0,0,8773a8337f80e596bf6f4e6c01da1a317fcd71717c4b5292efe100c03e77fc15,2024-04-11T01:24:34.163000
|
||||
CVE-2024-1927,0,0,272489f4addf45cf6bb38d4183c6459b672282a671714ea158eabbc383424da2,2024-04-11T01:24:34.247000
|
||||
CVE-2024-1928,0,0,ce94ec63205e6aa85b5a559496f823814c1cb4c8bba251a028dd87a071a77e46,2024-04-11T01:24:34.327000
|
||||
CVE-2024-1929,0,1,3332c348abe2ec55e440f6248fed1a4ed270158e5658f7c88b1e6bb963ccdab9,2024-05-08T13:15:00.690000
|
||||
CVE-2024-1930,0,1,fdb59fca49fb5e54ea59db9c9eb6e43f53d3770fb02303c610334b8657eb9ae1,2024-05-08T13:15:00.690000
|
||||
CVE-2024-1929,0,0,3332c348abe2ec55e440f6248fed1a4ed270158e5658f7c88b1e6bb963ccdab9,2024-05-08T13:15:00.690000
|
||||
CVE-2024-1930,0,0,fdb59fca49fb5e54ea59db9c9eb6e43f53d3770fb02303c610334b8657eb9ae1,2024-05-08T13:15:00.690000
|
||||
CVE-2024-1931,0,0,e71f7a88f68b5d3702fc1141e5fbdcf00d33a90e3791bbd349a9e1c6ddf3f008,2024-04-28T04:15:11
|
||||
CVE-2024-1932,0,0,dfd6617a73caabfbfba2b5ee899213931b787c71ad6a77e11bae9543ad134a99,2024-02-28T14:06:45.783000
|
||||
CVE-2024-1933,0,0,22dab3b8ed3dbdec751e3b3ea3557732635c7de83916428fa2e460c959fedb1c,2024-03-26T17:09:53.043000
|
||||
@ -241946,6 +241946,7 @@ CVE-2024-21780,0,0,d48d7051a12d6b86e075a9d1aefe4f65d2bdd55923d9dc3dc8a6a540d4a90
|
||||
CVE-2024-21782,0,0,a54768f93a9b07a30680122b1877fb41eae0f01a5d667d71a8861ee6fcf71d48,2024-02-14T18:04:45.380000
|
||||
CVE-2024-21789,0,0,065592bcd8c720a7bd60596f25729aa5b68a77a3a9f40afcc7521d9d3e39931f,2024-02-14T18:04:45.380000
|
||||
CVE-2024-2179,0,0,ae7ec0d777d4f092532ca994d6b0860fc5ecc6f92bb84e39b0499b0a5cdf3be6,2024-03-06T15:18:08.093000
|
||||
CVE-2024-21793,1,1,8e503f45a5253e4068ac235bda3d34f56a956ccc1949447202434630f9e53347,2024-05-08T15:15:07.557000
|
||||
CVE-2024-21794,0,0,5140601c591fc7e01c922f6b4426d49907b4278c42a623419c59c4c96fa7afa6,2024-02-07T17:15:44.653000
|
||||
CVE-2024-21795,0,0,3f97d15b4fad76f44a86834312294b67e000044b0ba6ac0faa07d011642d4d38,2024-04-02T15:15:52.517000
|
||||
CVE-2024-21796,0,0,ad6ea83e4ba68ed8909637d1ef7b65d12f04c56232c1b05d9173891b89591836,2024-01-30T22:14:16.247000
|
||||
@ -242218,8 +242219,8 @@ CVE-2024-22258,0,0,73834c066fffbf1ceac081ac0d8fd511b8fd9e870301a54667895cd45741a
|
||||
CVE-2024-22259,0,0,547e720795826cec4771fb96783f58d3e37f083da9aea1ec36ad1e3651ab2c72,2024-03-17T22:38:29.433000
|
||||
CVE-2024-2226,0,0,ee8f1ca60db458688b285f09c24138ba2af43e7eda48e7abf64d7861f3a6fd0e,2024-04-10T13:23:38.787000
|
||||
CVE-2024-22262,0,0,9e557bc78734cb2cf073f865dcae26aa42c53d7117f48641d9186f5ec0f03587,2024-04-16T13:24:07.103000
|
||||
CVE-2024-22264,0,1,96bdae8486634c5f71f7c0824f656da1157e383d5f4bd5d08e042b1398b50bf7,2024-05-08T13:15:00.690000
|
||||
CVE-2024-22266,0,1,00ca0b0bb686e5de0808c372a0dca387ad248949c8bb90b3dfb3008d90a00e7f,2024-05-08T13:15:00.690000
|
||||
CVE-2024-22264,0,0,96bdae8486634c5f71f7c0824f656da1157e383d5f4bd5d08e042b1398b50bf7,2024-05-08T13:15:00.690000
|
||||
CVE-2024-22266,0,0,00ca0b0bb686e5de0808c372a0dca387ad248949c8bb90b3dfb3008d90a00e7f,2024-05-08T13:15:00.690000
|
||||
CVE-2024-2227,0,0,a04566641cf07b0256d6370713fe01392f720fcac34bba4d9533a8931d87226f,2024-03-22T19:02:10.300000
|
||||
CVE-2024-2228,0,0,9da409d4c88fb5c41c04e34c5096b8810f55668a8720e19e0dcad976dea69ce5,2024-03-22T19:02:10.300000
|
||||
CVE-2024-22282,0,0,53d62e993d25bddde67f64a9b7b05dfd45a21e7eb7c9bf0be8fb90ec2911d888,2024-02-06T16:55:19.983000
|
||||
@ -242866,7 +242867,7 @@ CVE-2024-2354,0,0,bfb745cc28a2103da071c6c9a02a91e2d148dfd7208d02f92e01be3195a8e6
|
||||
CVE-2024-23540,0,0,5f2fc628eb81e8c82d87211152b074fc9fa203c38db7086bfb5e6e1436b136d8,2024-04-03T17:24:18.150000
|
||||
CVE-2024-2355,0,0,f6c721310f82df9519580d017e8bf61029f8844a70bedd8de94b8b84e67d5aa4,2024-04-11T01:25:22.953000
|
||||
CVE-2024-23550,0,0,233aa541fdda788f0e4e95c8a9a0a8f5d7fa7689dcd559af0cf5e5843a531076,2024-02-13T00:57:33.613000
|
||||
CVE-2024-23551,0,1,96a25e11351f4649a98a4c5ff5524cf1d9d2fddc8f277b1f892661e041d69491,2024-05-08T13:15:00.690000
|
||||
CVE-2024-23551,0,0,96a25e11351f4649a98a4c5ff5524cf1d9d2fddc8f277b1f892661e041d69491,2024-05-08T13:15:00.690000
|
||||
CVE-2024-23553,0,0,51ea2d50cc1ff4dbab518de2a29e9ef6a91bd6b91073c23eb1a7f0cb7c8f1090,2024-02-10T00:59:00.423000
|
||||
CVE-2024-23557,0,0,c1e3777f7706c5637c3babf0c39f0462f9d51e731fae3bfba6c8c968c64a983b,2024-04-19T13:10:25.637000
|
||||
CVE-2024-23558,0,0,0e030b3ddee305097ecf13a5fc93f84821f79454ea82e12098abf6fd591f4cb5,2024-04-16T13:24:07.103000
|
||||
@ -242959,16 +242960,16 @@ CVE-2024-23688,0,0,07f47d429f26f5d25558115321368745a1af1492969a475a8855a8882844f
|
||||
CVE-2024-23689,0,0,d7d4e018343e45ab929852f091e2e71006911f05a5c0cdd59769a6f5a80fdcee,2024-01-26T14:50:45.023000
|
||||
CVE-2024-2369,0,0,6a36576cd82a0efb1a6cf47fca1f81c4dce9d8f7b0632041d2d5bfbf236b9c0b,2024-04-08T18:15:08.527000
|
||||
CVE-2024-2370,0,0,d585ae9ac856bf263bbb5fc87411ce61002d06f83e420348ba9623542805dbad,2024-03-20T16:15:08.270000
|
||||
CVE-2024-23704,0,1,b6e98937a05e8e3c54df94790ffc1b76a7a7dbc7d0f374847ce3c9bc63a138f4,2024-05-08T13:15:00.690000
|
||||
CVE-2024-23705,0,1,208f2921dda59fa7b14af1145627e3c7132ea207198825c4a670a9a509059f41,2024-05-08T13:15:00.690000
|
||||
CVE-2024-23706,0,1,ede5e9781e6c6ec2abcdffec573f476f646b6ee17b57168f8acd6e142b27a4f2,2024-05-08T13:15:00.690000
|
||||
CVE-2024-23707,0,1,beaafb205c308f17a4429b5bf78e5116812407accb95c86e274dcfc855a4d3d2,2024-05-08T13:15:00.690000
|
||||
CVE-2024-23708,0,1,944bf8e3b1bdd5dd13087e52b6bc0b12db4ce28387d3267bdede3aac1b86f48b,2024-05-08T13:15:00.690000
|
||||
CVE-2024-23709,0,1,7d7720ecbab15759adcb1691fe9ddfb28fe198373b1d1b7d71dfb9c0add8cd6b,2024-05-08T13:15:00.690000
|
||||
CVE-2024-23704,0,0,b6e98937a05e8e3c54df94790ffc1b76a7a7dbc7d0f374847ce3c9bc63a138f4,2024-05-08T13:15:00.690000
|
||||
CVE-2024-23705,0,0,208f2921dda59fa7b14af1145627e3c7132ea207198825c4a670a9a509059f41,2024-05-08T13:15:00.690000
|
||||
CVE-2024-23706,0,0,ede5e9781e6c6ec2abcdffec573f476f646b6ee17b57168f8acd6e142b27a4f2,2024-05-08T13:15:00.690000
|
||||
CVE-2024-23707,0,0,beaafb205c308f17a4429b5bf78e5116812407accb95c86e274dcfc855a4d3d2,2024-05-08T13:15:00.690000
|
||||
CVE-2024-23708,0,0,944bf8e3b1bdd5dd13087e52b6bc0b12db4ce28387d3267bdede3aac1b86f48b,2024-05-08T13:15:00.690000
|
||||
CVE-2024-23709,0,0,7d7720ecbab15759adcb1691fe9ddfb28fe198373b1d1b7d71dfb9c0add8cd6b,2024-05-08T13:15:00.690000
|
||||
CVE-2024-2371,0,0,a8997ff43822803cbf539ca13b12874ecac2c50678484052b1886a13bb4141ef,2024-03-12T12:40:13.500000
|
||||
CVE-2024-23710,0,1,875b540c736db70688faac8a12bf84197a0fca29c77d660c89604a89a08155fc,2024-05-08T13:15:00.690000
|
||||
CVE-2024-23712,0,1,919e3319d1f664152d53fed292be330cd72f407fec402d411bcb187a93e318fb,2024-05-08T13:15:00.690000
|
||||
CVE-2024-23713,0,1,0691c897fc48ab427b9bc1671f8a76e244ad28c6f85b4df5ef0dd1573e78d54a,2024-05-08T13:15:00.690000
|
||||
CVE-2024-23710,0,0,875b540c736db70688faac8a12bf84197a0fca29c77d660c89604a89a08155fc,2024-05-08T13:15:00.690000
|
||||
CVE-2024-23712,0,0,919e3319d1f664152d53fed292be330cd72f407fec402d411bcb187a93e318fb,2024-05-08T13:15:00.690000
|
||||
CVE-2024-23713,0,0,0691c897fc48ab427b9bc1671f8a76e244ad28c6f85b4df5ef0dd1573e78d54a,2024-05-08T13:15:00.690000
|
||||
CVE-2024-23717,0,0,6124f28576b39881108c8f8a6a5c6f0e66ec8c6ba51a289d578374ba7fe9cba6,2024-03-12T12:40:13.500000
|
||||
CVE-2024-23721,0,0,4c5a2d52378f8e46ea724b0f797b6d954983df3d251eb4a27defb616bbf83240,2024-03-21T12:58:51.093000
|
||||
CVE-2024-23722,0,0,a9b0a777e5fe6ce3139b9265b8428b51f6f9a472e3a11168445dfbf933d3ddd3,2024-03-26T17:09:53.043000
|
||||
@ -243535,6 +243536,7 @@ CVE-2024-2483,0,0,682c56b97d015c05c7ea646f5d7c8218367bfe51d46c303c40c0e16e3cd0bc
|
||||
CVE-2024-24830,0,0,0d9adea9164c18f7ff7989d5488b101c9a82392f2b7e4acf1331d044331cbf79,2024-02-15T18:53:54.370000
|
||||
CVE-2024-24831,0,0,c84e178260bd3abff1690dc35c00a2b3b1eccfdb8ac833753e26fa86bbd36f7d,2024-02-16T16:22:00.857000
|
||||
CVE-2024-24832,0,0,7442a4fba2f00ec0598b4c5e5afb5878a3ed7e240a66642725dee24340656d52,2024-03-25T01:51:01.223000
|
||||
CVE-2024-24833,1,1,f05d3344d5652b6b94d395eb49827e58eee9f8759e93c31985abe3750eddaa1f,2024-05-08T14:15:07.730000
|
||||
CVE-2024-24834,0,0,f1b0afc5b1406c76028e9a1457aaaa7c9c4a1ab2208a1bb8ffbf62e150ea41ea,2024-02-15T03:16:47.957000
|
||||
CVE-2024-24835,0,0,036d694eb9f3305dd8b127674f2ba284ec80fdae7e0031d0ac7d97b66371b4a6,2024-03-25T01:51:01.223000
|
||||
CVE-2024-24836,0,0,ee629b5aec26f66dc40add401b90f57bfb13b9931b4b44678b51676d92007087,2024-02-15T02:40:53.413000
|
||||
@ -243926,6 +243928,17 @@ CVE-2024-25511,0,0,36990ea230f8e0295138374df895088f1be44b9af326906b2ad95eb8bb736
|
||||
CVE-2024-25512,0,0,487e85c1efba2c219f7ab96f81a2282d8bcbf7dcfb1a58d12077094e43d2fae9,2024-05-07T20:07:58.737000
|
||||
CVE-2024-25513,0,0,93bd4fc6036371c36be39d026b8c850f42962428d21b144f40c0e447c5572c87,2024-05-07T20:07:58.737000
|
||||
CVE-2024-25514,0,0,38640653ba8f160458aa00a44eadb3429ad755b0b55104858ca21d629404a949,2024-05-07T20:07:58.737000
|
||||
CVE-2024-25515,1,1,85c8e54a584231bb6f4577a45d957673ff610c3a63094c02b71515449cb08a69,2024-05-08T15:15:07.780000
|
||||
CVE-2024-25517,1,1,f8998713716cb22b0e29876c68beff0b0523082e54b7c7821336906b48781b9d,2024-05-08T15:15:07.843000
|
||||
CVE-2024-25518,1,1,6cd463cc9fe041aa696858ddf42524f83b820a052f299d689c9f5d06c39dfb77,2024-05-08T15:15:07.903000
|
||||
CVE-2024-25519,1,1,3efa026769d792fa692d64237e3b1f77109b85c526662a999fe3f20a6c915f35,2024-05-08T15:15:07.960000
|
||||
CVE-2024-25520,1,1,f8201c937c04a0d30cab6d897128ea32fcc94d4aea4dd69a557f65a32311812e,2024-05-08T15:15:08.017000
|
||||
CVE-2024-25521,1,1,0bdbb758eec31a40c94a6f1cfa30e30ebf6e9552b1256a96359d34ced008400d,2024-05-08T15:15:08.073000
|
||||
CVE-2024-25522,1,1,ebe7d50ff147650b02943d7ba78a25a4186cc91d5934f5cfa4c851a63e81a62c,2024-05-08T15:15:08.130000
|
||||
CVE-2024-25523,1,1,a94280f6832c4ac7f9c34825277ea9b5c6bb7d21dc6f3cba44fcb9cdfe8558a6,2024-05-08T15:15:08.183000
|
||||
CVE-2024-25524,1,1,d846745bf4b12f650055faa37725c7daf56a31199b86928256d3ecb415d4f2df,2024-05-08T15:15:08.253000
|
||||
CVE-2024-25525,1,1,bcc0d44d9b1f076f15e25ee59e45e853ef891942ca41c51416bbd5af233fe91b,2024-05-08T15:15:08.310000
|
||||
CVE-2024-25526,1,1,20b2483d52fba5b39c6ee7536543d9745bdafbcd5615acac2d26f08c4bad99d1,2024-05-08T15:15:08.367000
|
||||
CVE-2024-2553,0,0,eb7ced6efdb6fe86afb3f2317443a6426cb70bdf9ec8bc702fd587bbd249ae12,2024-04-11T01:25:27.517000
|
||||
CVE-2024-2554,0,0,19388cc1a3622a95c4f2bac0ba7738d03fe03eea95bbda485b36a1780f948f91,2024-04-11T01:25:27.590000
|
||||
CVE-2024-25545,0,0,8526ed8de9098a72565cdcc04fa7aedeb1b9a5c07e5de61b39c48fe6223c15e6,2024-04-15T13:15:51.577000
|
||||
@ -243936,6 +243949,7 @@ CVE-2024-25553,0,0,7897cd9b8668fce1d605300c650e28167f9921d03a4fde26bc34f4ebe4511
|
||||
CVE-2024-25554,0,0,a87c08d7479e0670c1de7ac680e974b7c966b7f12d7b309312798a5acd199088,2024-03-01T08:15:38.107000
|
||||
CVE-2024-25559,0,0,b710ef2f87d2510e81b25ebbc4243b848284fc64bfa4b8a44d47d25b0e965b42,2024-02-15T06:23:39.303000
|
||||
CVE-2024-2556,0,0,5a3397ecc5fdef519ab75d3f33842b25dc006ffb41e1f908e35adb09560e9ffb,2024-04-11T01:25:27.740000
|
||||
CVE-2024-25560,1,1,5212feb610f6926efda1e74bc04cd7c47142ba08fc20fe69ea6ad6cc7e08bcdc,2024-05-08T15:15:08.423000
|
||||
CVE-2024-25567,0,0,bbb8c64eb3dcee3e8e89951734f837d0c3bea66c11459a30529f4c9133593805,2024-03-22T12:45:36.130000
|
||||
CVE-2024-25568,0,0,64eb53482937f270c14cf377745a1f7d8d5cbc3555eb58e76e7de7c26a9505c7,2024-04-04T12:48:41.700000
|
||||
CVE-2024-25569,0,0,4638448a8546825fa9e00c3ff94a077ca9cbdaa5d8882a201d353ede23041668,2024-05-05T03:15:07.033000
|
||||
@ -244231,6 +244245,7 @@ CVE-2024-26016,0,0,225df2de732dbe1aa65450d758c74d9fd62d1571f14eb88fac267d40c0b49
|
||||
CVE-2024-26018,0,0,f0a23aadd063ff7c7efa65bdfb2fba637cb4053fe19b3da7278a7f893beabdc7,2024-03-26T12:55:05.010000
|
||||
CVE-2024-26019,0,0,fbe6a7f77deb15cc085d52bc5fe2b39474b81c363a3a1755ab2818a8be2623e5,2024-04-11T12:47:44.137000
|
||||
CVE-2024-26023,0,0,03df4473c85ab0c8247169f36cdaabb6d0ade251a86d2a476e4dede57424f28c,2024-04-15T13:15:31.997000
|
||||
CVE-2024-26026,1,1,7453e5140765a794c806980b93e175082dfb907f2c6f6326c0de5f7769ab22cf,2024-05-08T15:15:08.623000
|
||||
CVE-2024-26028,0,0,f0eeab6f00388b393e9761660fb13451fd75e54f8248c45c23f5d18cc79809b2,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2603,0,0,4c37ef52a7f3919b1ed75f79e6f53895a8c8809eb0619c9287c9e5b10ed97fd0,2024-04-26T12:58:17.720000
|
||||
CVE-2024-26030,0,0,6e3023416b037dd092fe7b5e942072e3533649d1b2cfd157142cc39338fedbad,2024-03-18T19:40:00.173000
|
||||
@ -244541,6 +244556,7 @@ CVE-2024-26566,0,0,e082212a38f258b5c22bdd7daa5a29191a5e851b4c959cb2f66848d27d20d
|
||||
CVE-2024-26574,0,0,dcbd7ef017b2c94376d84166225aa21f7faefc7d209424b74f38bdb42fbf0b3e,2024-04-08T18:48:40.217000
|
||||
CVE-2024-26577,0,0,eb994672bf510d158b4978f43b0d7e0594f22405d228a7c909ba4da4498cc451,2024-03-27T12:29:30.307000
|
||||
CVE-2024-26578,0,0,631d617cd0985d9923eed32b0cb4b9e9025809830b6a3ca2ef1a468d4f2a7124,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26579,1,1,72033f66020a56983373fd3c4d64584fe418341ce1b2e913ce65b0e85b1e59f6,2024-05-08T15:15:08.817000
|
||||
CVE-2024-26580,0,0,e93e326bf874d6375913aabe9e4eb74306f223b50ee60aec567361b7229e49cb,2024-05-01T18:15:15.603000
|
||||
CVE-2024-26581,0,0,6313645f513de26967acd9d6721419082a344ce45ec1a0cf923d928a6491861a,2024-04-19T17:41:29.470000
|
||||
CVE-2024-26582,0,0,3ff5c496d753899c1fc1e8062e53c8f61453498de38167daf1346ce24125ba81,2024-03-15T13:56:41.843000
|
||||
@ -244918,7 +244934,7 @@ CVE-2024-26921,0,0,76d623900726b55efb66263c05dcf2e665a9ce9fb4f9ecc19bf3b35e90cf9
|
||||
CVE-2024-26922,0,0,af76b1b0f3ab9ee10956791f730bd4870f5c1e7911748c677fba653e48abc0dc,2024-05-03T06:15:09.570000
|
||||
CVE-2024-26923,0,0,da4573b83844f36cbecbdc77d107c82583a707415e7aff11d2f41c3052c0b580,2024-05-03T06:15:10.053000
|
||||
CVE-2024-26924,0,0,f1745d5b13e99b2b6fe2577e278513d3ec9c9776eb98248608246c98329d345c,2024-05-03T06:15:10.280000
|
||||
CVE-2024-26925,0,0,9454200f70256d027955c429f9168d9e9350fb44e0e5b5b439cad7f6988e131a,2024-05-07T18:15:08.287000
|
||||
CVE-2024-26925,0,1,61d82bb84ab1f11ebda78632ac94a8e6e8b3f938a1962639db9167a8cafdfdeb,2024-05-08T15:15:08.917000
|
||||
CVE-2024-26926,0,0,a92f86f9d106171e65901edda1c9fe34c87217de61e4b80a80c2e7bdcc5c3e47,2024-05-03T06:15:10.483000
|
||||
CVE-2024-26927,0,0,84d28aa2d82d7b353955d491991b07be5f1f5eedde26b528784c0de359b7829c,2024-04-29T12:42:03.667000
|
||||
CVE-2024-26928,0,0,356749b5efd3e51950b32012233c612b93e1c25f21b750fb61ffd2aaf8554d2d,2024-04-29T12:42:03.667000
|
||||
@ -245138,6 +245154,7 @@ CVE-2024-27198,0,0,e4259fe3d4611134ab5dfb0d4f88f5b563c21b8238f30b4253811838ad004
|
||||
CVE-2024-27199,0,0,3dd3bfb58b796a8c7735f0a6f342852f32998fc13795786d35eb3d4375df0417,2024-03-11T15:15:47.663000
|
||||
CVE-2024-2720,0,0,1e73fd7ceb3d6de541dbc5fc4c6f9e1db2be88473b780597a0d18540df181039,2024-04-11T01:25:34.303000
|
||||
CVE-2024-27201,0,0,10d33bde6c72f02eeeb78886fe63b84ea9f8986232310509561963bb62431c7f,2024-04-03T17:24:18.150000
|
||||
CVE-2024-27202,1,1,ecd59f27fa3e1eee6d02a6fed492d725c0e4b623c9905b09ef7bef337a9d9a6b,2024-05-08T15:15:08.980000
|
||||
CVE-2024-27204,0,0,31307da8b37d2876c0a574bcaca818758278f54e6ee44387e0d35b50299a386d,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27205,0,0,52855ef1396675bf7ce515be434e694f795d99891e26fffa6e36d6a889b1c72f,2024-03-15T20:15:08.703000
|
||||
CVE-2024-27206,0,0,7a39e0c9f0f47b5a6e43427d7518d5d862cb34ba539b01bd0717056c4e6dcf42,2024-03-15T20:15:08.743000
|
||||
@ -245186,7 +245203,7 @@ CVE-2024-27266,0,0,f3ab0f27c5fbbc81843b4329fa53134d5b91174cad9bacbbc5dbf01cfacc3
|
||||
CVE-2024-27268,0,0,5ee3875e7ce23e0a22f3973d639f8ec37762f6a4d7ebf553d0b8d456239df178,2024-05-04T14:16:02.520000
|
||||
CVE-2024-2727,0,0,958214357d5cfc59c51fd0300fa3ab5e09b0479b417a5156cb98159538007f76,2024-03-22T15:34:43.663000
|
||||
CVE-2024-27270,0,0,90fac36f214c0b31b291ee9cc7c1398845637888710e65e72962c5636284122e,2024-03-27T15:49:51.300000
|
||||
CVE-2024-27273,0,1,121e1276bc15459b31678ff1a9bdce8a08ac88a34e7ab9da955a5958c30154f9,2024-05-08T13:15:00.690000
|
||||
CVE-2024-27273,0,0,121e1276bc15459b31678ff1a9bdce8a08ac88a34e7ab9da955a5958c30154f9,2024-05-08T13:15:00.690000
|
||||
CVE-2024-27277,0,0,6c09ef572e665868238fb6d81d7d941702112e8d7fb954bfa230fe4edfeb437e,2024-03-21T19:47:03.943000
|
||||
CVE-2024-27278,0,0,2ef9546b6eb3a76ad70be700186038d995dd630654759ed72b9b3d10968f6d39,2024-03-06T15:18:08.093000
|
||||
CVE-2024-27279,0,0,a0a465925dfcee0f633443a4d3db070f2bf023c10d4135b020d1a0fbe76c5a4b,2024-03-12T12:40:13.500000
|
||||
@ -245287,7 +245304,7 @@ CVE-2024-27453,0,0,cd1a7b85d4587bfefcd89bf35294964a1d211509b3fabcc9d2dccae653d97
|
||||
CVE-2024-27454,0,0,6d3a09532b89ef204254e66da503964dcbafd450b5bdda0990f449d144c8e54b,2024-02-26T16:32:25.577000
|
||||
CVE-2024-27455,0,0,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000
|
||||
CVE-2024-27456,0,0,3292722b93148b4ab52923fa8e4498babe5b306f79794afb1b6b9f9d803c4911,2024-02-26T16:32:25.577000
|
||||
CVE-2024-2746,0,1,1b5368899c557a576ffe86c7e7b79d4b6baeb106e8e490e5cd11b765b982c384,2024-05-08T13:15:00.690000
|
||||
CVE-2024-2746,0,0,1b5368899c557a576ffe86c7e7b79d4b6baeb106e8e490e5cd11b765b982c384,2024-05-08T13:15:00.690000
|
||||
CVE-2024-27462,0,0,ffc1613a8162349f9e85ee9ce86cbdc5073a2092a76bc9fd14c2d891290e403c,2024-04-14T23:15:45.830000
|
||||
CVE-2024-27474,0,0,eedd7f52a8e754286d0994212e940bbab5a78ce0f631ba173f8be2320f55c67f,2024-04-10T19:49:51.183000
|
||||
CVE-2024-27476,0,0,8cccfbd88a289b73ae2a82f1969e7e11b3256be620bf6a323e970ad5fee54963,2024-04-10T19:49:51.183000
|
||||
@ -245599,6 +245616,7 @@ CVE-2024-28128,0,0,ef4664596358b3dc6747b9cba3aab3612190b1b010cfc8ac1373f0312ebe3
|
||||
CVE-2024-2813,0,0,3865aecff2b91b62589698cb7c5e00900ba25735c720a1f987c1446276b2b657,2024-04-11T01:25:37.367000
|
||||
CVE-2024-28130,0,0,cbec5f7662fe045bb02cd420ce819fd5bf0b6932c239a81cf021f71390340ca7,2024-04-24T13:39:42.883000
|
||||
CVE-2024-28131,0,0,71ad2488de19c24d1ea9f5cf9bb09689eb95070aa628709b8cf1a59fb2b5934d,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28132,1,1,e1e957ff15e140805c5e801a3628b7634e3b21c473d476e5b3e24b716c491bbb,2024-05-08T15:15:09.183000
|
||||
CVE-2024-2814,0,0,5e97abae59e20490512eaa4d4563fb81e8669546976139cfba889d604f681692,2024-04-11T01:25:37.477000
|
||||
CVE-2024-28148,0,0,dae8adaa9a9f352e6ec75654d798899599fff5056d36885fb288ef42e72a3322,2024-05-08T09:15:08.620000
|
||||
CVE-2024-28149,0,0,41104aad52a41f735bff830317158bdc9ba92207034c216d3619939dc1f50d3c,2024-05-01T18:15:16.697000
|
||||
@ -245825,7 +245843,7 @@ CVE-2024-28589,0,0,0bbfba634be0a6220fb48d12550a4d1e9192f3d277848f34860717c51da56
|
||||
CVE-2024-2859,0,0,815e8dcdbaea58414fdcd79cdf68569eba0b4de72a6cab4f785b8ad0b30ed870,2024-04-29T12:42:03.667000
|
||||
CVE-2024-28593,0,0,12e50d1047d9408aca5b77d1096e4a71cda0fba8e4dc35d15cd483b7f871d0cb,2024-04-11T01:25:10.400000
|
||||
CVE-2024-28595,0,0,542734c5d7a6316ed6be596eecae4717d67621271c4b97cd461c76a709543cb8,2024-03-20T13:00:16.367000
|
||||
CVE-2024-2860,0,1,848e87a843db1b43e30fcdf29537e9a17cd2aded1859da70c487ffc26ec541ae,2024-05-08T13:15:00.690000
|
||||
CVE-2024-2860,0,0,848e87a843db1b43e30fcdf29537e9a17cd2aded1859da70c487ffc26ec541ae,2024-05-08T13:15:00.690000
|
||||
CVE-2024-28613,0,0,bda4150312b2b3b79a305a8c0a3aeb6013ca159f1baaa84b69f3b052dab94ea7,2024-04-24T13:39:42.883000
|
||||
CVE-2024-2862,0,0,a714f5e8cb944f65576648fcdb042cca021906895d812cc8cb0301d4fdfba94b,2024-03-25T13:47:14.087000
|
||||
CVE-2024-28623,0,0,972befedc73e4c4f8bdd2f8c4cf61d42fcf307bb5ef2beaaeb5c62226e79d63e,2024-03-13T12:33:51.697000
|
||||
@ -245926,6 +245944,8 @@ CVE-2024-28870,0,0,0cf8b42440c9130608dacb5605e29ce5ef5a35c267c5a5fa0e99bf26d2d01
|
||||
CVE-2024-28871,0,0,afc28d49a83d8eabefecf413603caf0043f414fa513c9500837e2c75462e6216,2024-04-04T16:33:06.610000
|
||||
CVE-2024-28878,0,0,fe5b4dea6079affbe530b6afc0ec6cbc2c58efa98e54aaf61e9565b0ce4541ce,2024-04-15T13:15:51.577000
|
||||
CVE-2024-2888,0,0,e48cc71bf8d96ab718c88bf59dd81f25047204b13c0446dd48014e6c60fc42d9,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28883,1,1,b11156b41f6b1ff6e3ff92213af684ada9e592b35095dd9c08d2502710c4402d,2024-05-08T15:15:09.380000
|
||||
CVE-2024-28889,1,1,83e698f4455b3107ed49f7bd5d8d5d50741f723e21f11de59ecf8a9bcc2532a1,2024-05-08T15:15:09.590000
|
||||
CVE-2024-2889,0,0,047900621574a9797901d8767443e859750a2765d7b4c1f50c805ec45928b2d3,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28890,0,0,9dae4a32452d4c238c84193167d3f8528617bb8ee93882e0c116e3ba82982853,2024-04-23T12:52:09.397000
|
||||
CVE-2024-28891,0,0,d3e45bd47b45b967827b685dc5aca79c502a599b4c4b2ae06f1259844016862c,2024-03-22T12:45:36.130000
|
||||
@ -246775,6 +246795,7 @@ CVE-2024-30455,0,0,115244366736fad049cb2d568fd37bcd1f9387962814ae164a94d7f893776
|
||||
CVE-2024-30456,0,0,58b7f6d9df0133114222c028c59aa68a983be02157b04b25b467f54970276f3b,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30457,0,0,0e1a5411ec4ddd12ef39ffb10d5b7f249bf382292e8158c3b3ccafeb0f7acbcd,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30458,0,0,138b6d21084a1b9981d25ac0a20e6d58c8531b97987312f29ce581613992ae6f,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30459,1,1,35e11e77078005c8c409b09bd879a757f7bd6f4571a1865c425a82358f4c83a1,2024-05-08T14:15:07.923000
|
||||
CVE-2024-3046,0,0,f5e052c1ea891df75a0fe667fc4295d772a2daf5c23e7fc1339c4348c40758b9,2024-04-10T06:15:07.253000
|
||||
CVE-2024-30460,0,0,60239bce124e04867e82f31e5cfb960c5f3a93584351525e2543cdd96d5ccb22,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30462,0,0,d59392c9106e622ed8a8be18c11749718bba226bfa2a23231020ec7d96976f3a,2024-04-01T01:12:59.077000
|
||||
@ -247123,7 +247144,7 @@ CVE-2024-31109,0,0,3766de0285c03422fb77f1fd2a4106a3e09e42f3bd086e20e704d883507e7
|
||||
CVE-2024-31110,0,0,cc696090cfd929541a1ca3b42d624a66dc89644b2049217890247603bee15f04,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31112,0,0,4c0b6d124815c5fbc71413fa9db9ceb5adb5efe4d3f57754f8397ffa9f3c1ac9,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31114,0,0,2db2f19bbb762fd0846a2fd0f4c21316984760b44cf0e285d2fa1b7eb4e97fa5,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31115,0,1,f67bb2935cdc482183cf83d729450e227d4215d9791e6eef39eb5dd63dc4ee92,2024-05-08T13:15:07.937000
|
||||
CVE-2024-31115,0,0,f67bb2935cdc482183cf83d729450e227d4215d9791e6eef39eb5dd63dc4ee92,2024-05-08T13:15:07.937000
|
||||
CVE-2024-31116,0,0,3e5261af5d77a4c950ede646e6aaa3b3de701ce47018fc260e62e0781699fc7b,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31117,0,0,f06fda643bf8c516426ab572b27573cbf6214c3aa5f8b1df27ac2265745b81dc,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31120,0,0,7340f0aa8567a325d352b7087d6dd0d44e3a1e7ab597204dd16dbc0e323747bc,2024-04-01T01:12:59.077000
|
||||
@ -247137,6 +247158,7 @@ CVE-2024-31137,0,0,d8c60b512e3cd344cbe0e7070d591f251aa086e93689a00f3d05728c7eb4b
|
||||
CVE-2024-31138,0,0,80619d8b23ffb923a4bb521ee1877f29e2a086a5161850672cdc2424af6c6396,2024-04-08T22:41:43.087000
|
||||
CVE-2024-31139,0,0,6254efb24474a93bf19fb224a952376f20b94666e671b313ffb9fb5d6ba4e123,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31140,0,0,8ac72cdd6b5f7f56e71e87459ff46ad8714fcc8b963def523c845a786f9f62ca,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31156,1,1,f8e6ab52f4d541105e93e50105da007b9790407e8d5a5db424334e62cf8382b2,2024-05-08T15:15:09.790000
|
||||
CVE-2024-3116,0,0,398207d2760952c7d30e8a692022e3a890986df7c49b38076f15d6ef6a9e4edb,2024-04-23T02:15:48.310000
|
||||
CVE-2024-3117,0,0,5cfd272187006d856ef7162243290045436f0b0b42109be53aee5ea008fdca8a,2024-04-11T01:25:53.827000
|
||||
CVE-2024-3118,0,0,9600b12c1bed90a06c567891d64400576dd46ef84328956c7b0762f081c0594a,2024-04-11T01:25:53.910000
|
||||
@ -247193,6 +247215,7 @@ CVE-2024-31265,0,0,73b53303ea2aa4510d95cf2e30536090282921bee1e4ddf1a7938462135cb
|
||||
CVE-2024-31266,0,0,f7171832f2bbf1c48f48a13e14cce15186ad868f1fa9f9b4e6a38a27a645802a,2024-04-25T13:18:13.537000
|
||||
CVE-2024-31268,0,0,c260b292f4a0557333471e9a298a56aee0f8adfc83aea133a9470b069de5a2b5,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31269,0,0,d795c0acb6cd496e9d563a25767f3786288bcffe37844eb18ef033fe012b3b5a,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31270,1,1,66bdfdfc48b5b34cc2c92c9655d58c7fa17ce37d3684862913380d1b2925663c,2024-05-08T14:15:08.117000
|
||||
CVE-2024-31271,0,0,d8228662c1440f14ee742f57032f82398c2055e3f352f6a0fc3cc42050b1d28d,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31272,0,0,cd2f0ad40b656f4b3504a130655e8227ea71f55dca7e33bbe56d00f117fbeb5f,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31277,0,0,6d9f95169e2f33c46b0cc3384ba6f4f8c5335f74523b1231fd7b9d9c4e3271a9,2024-04-08T18:48:40.217000
|
||||
@ -247518,6 +247541,7 @@ CVE-2024-3204,0,0,2a2a133d829052d72380a6f7a45e32f6ecd96ec6da65fdbadcbe92a1f79d77
|
||||
CVE-2024-32040,0,0,c9e8a9bafebd4e002463be520ee967b3c928ddf4cec6865e7aa23fa1d81b2834,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32041,0,0,e88f61c8c702a5d00724562a1be23c2ca0fc9ec03e84f95db2dfed035982cfb4,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32046,0,0,3771b70436f95435fc521db21da6fd859bb3ed607b3e6e7edd188445267746f3,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32049,1,1,b94a24b0b23a2f488c11ba182406872c38e4f15261e3934a160da59783b9672a,2024-05-08T15:15:09.987000
|
||||
CVE-2024-3205,0,0,befb48df2bb5e20af3b4383c1ef82865b9f9fb3145e096ffb7e0098ff096b4f8,2024-04-11T01:25:56.010000
|
||||
CVE-2024-32051,0,0,6b68078466255ceca82525e73c2bf321431fb4aeacd1939a9b40ac3cfa9637f8,2024-04-24T13:39:42.883000
|
||||
CVE-2024-3206,0,0,4f66dc84e4a326417e01236d129b8e00324e4f8f4b544443bf63c69a85f69c50,2024-05-02T18:00:37.360000
|
||||
@ -247557,6 +247581,7 @@ CVE-2024-32108,0,0,950a29a68ef37c40439ae0dcf3c3d4b039242eaece664c349c7d4089e193e
|
||||
CVE-2024-32109,0,0,4ab4248625b2b88c43ecf2bed644e80e80c54bafb94ddc41cebae0bbd84f78ff,2024-04-29T09:15:07.707000
|
||||
CVE-2024-3211,0,0,d6d8ef851a76d01f08b13c4c6093534cf0125e4133f007b8f3a299cb3bb38192,2024-04-12T12:43:46.210000
|
||||
CVE-2024-32112,0,0,2df62c2ad1478d07a612eff17f984ad78c51d3b47027012c1c38076227812cd3,2024-04-11T12:47:44.137000
|
||||
CVE-2024-32113,1,1,24d20595f33dd2e7d018ed8dac09191bb93c497144e8b8d579ad173db490c8b7,2024-05-08T15:15:10.227000
|
||||
CVE-2024-32114,0,0,f86e794836506b6f3debc92c788cbea6d342740812ff0770c4838ed0614d76f2,2024-05-02T13:27:25.103000
|
||||
CVE-2024-32125,0,0,df49ac279a5dab5894d2cf46d4df920e793fb77c32b1360bd4eb9ce6cc4c2bcb,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32126,0,0,03bbe2b7a7bd325cdda583bb7823f2b70916aad3961fcbd3bac07e945035870f,2024-04-18T13:04:28.900000
|
||||
@ -247864,7 +247889,7 @@ CVE-2024-32662,0,0,cc82e255660f76e8294a012a16568aaf2fb6ae82fd6edb9a95574f4ae5e4e
|
||||
CVE-2024-32663,0,0,63ceaab581055a3d9a9b8c8792c2fbb320ea717f7ea9a74b5dcef8cec26756f1,2024-05-07T20:07:58.737000
|
||||
CVE-2024-32664,0,0,1f356e6ff19a379eb7e5d2f904c065cf238ccbf66a59d74313de573a133634e5,2024-05-07T20:07:58.737000
|
||||
CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000
|
||||
CVE-2024-32674,0,1,96f59a78cffb2c821be18a303b9da0d3f816839c22dca4209a77529199edce40,2024-05-08T13:15:00.690000
|
||||
CVE-2024-32674,0,0,96f59a78cffb2c821be18a303b9da0d3f816839c22dca4209a77529199edce40,2024-05-08T13:15:00.690000
|
||||
CVE-2024-32675,0,0,87b463967c2204618d7e556d0f9b434f519dfbe770ec74ef985201062de7ccc7,2024-04-24T17:16:50.397000
|
||||
CVE-2024-32676,0,0,3585205cf50aeb554d2a389a3c92c05231728f39aed4a3ec7d0a9db1453b1c81,2024-04-25T13:18:02.660000
|
||||
CVE-2024-32677,0,0,b2d5b21c6c0b64a6ef3d2bb5d4a7fb394174b9e010ebfad39ee101d085a71d44,2024-04-25T11:15:46.440000
|
||||
@ -247910,6 +247935,7 @@ CVE-2024-32744,0,0,1b7d2f5284e3100bac5a22aa75dd41934cf75bbb03b5daf27a5bf3a3b911d
|
||||
CVE-2024-32745,0,0,7c7ddc449e8c742cc889f2211c73cf5b3fd566001a852588319e29620ec0008a,2024-04-18T13:04:28.900000
|
||||
CVE-2024-32746,0,0,15529f833c25b7b5b5022877593c49d5afec10018bbf65b56334a694e0bc455a,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3275,0,0,911ea91aef7f88befc82f4227a09867c3c1d7c5e1f1eaf9e7dcf15d1eb26a443,2024-05-02T18:00:37.360000
|
||||
CVE-2024-32761,1,1,0d8c041084d5273dcaf584c946bad9c126a0ef128138a2a6b6b88a14cfa42a74,2024-05-08T15:15:10.330000
|
||||
CVE-2024-32764,0,0,bc3d072b957e003e653de0b420ab306da82665736b4d7b512b364e6134049d7c,2024-04-26T15:32:22.523000
|
||||
CVE-2024-32766,0,0,7119553a94fda386a48677f0171c3a85e12acf48042d943380d9db048f166a25,2024-04-26T15:32:22.523000
|
||||
CVE-2024-32772,0,0,2d4fb680b13b3176b160b34c5ead370c8635624f7414f557ffce882457014cd9,2024-04-24T13:39:42.883000
|
||||
@ -247967,6 +247993,7 @@ CVE-2024-32881,0,0,a69d7f9beb676365acef6aaf3810d23c9ee7ac916fc4e9b8b59f337998d4f
|
||||
CVE-2024-32882,0,0,5274fa89ec3421b5c11bab925ea13ca1712a5851453fd229685e139cad05710c,2024-05-02T13:27:25.103000
|
||||
CVE-2024-32883,0,0,e2e880e0de452420192927c1f1d12c9c36baa1369f4d1c0ab4e6cde1e002abd2,2024-04-29T12:42:03.667000
|
||||
CVE-2024-32884,0,0,06add33b7e931ee07e2f51e4a86646fd0a9c5d7e5967928a204325c2528e5c2e,2024-04-26T19:59:19.793000
|
||||
CVE-2024-32886,1,1,3b9eb74f36f71837a6b682dd80fea8318a558b6bc8b40f39b33b40c70bfc2b96,2024-05-08T14:15:08.310000
|
||||
CVE-2024-32887,0,0,9a0b5c279911d37e81f985d5cbe7f0510b3ecf67815d6d232314f8cb4e8f94aa,2024-04-29T12:42:03.667000
|
||||
CVE-2024-32890,0,0,80b53d257dbc47827b967a6ec22fc70e9bb39dae5de4579c97bb47ad58884e95,2024-05-01T13:01:51.263000
|
||||
CVE-2024-3293,0,0,3552485a27a6b6c8b2cadd17fbdb3e630238722099a3e2d8d97b0f239cd2dc1a,2024-04-23T12:52:26.253000
|
||||
@ -247994,6 +248021,7 @@ CVE-2024-32972,0,0,5937a84a65773c5e3fbf207041e07c28ee92384b1ea5fdf94ab9ab961121a
|
||||
CVE-2024-32973,0,0,c022c9f4134f1adead82c1b269e30d0c14622c1fcaf8b6997a4d5a316715d39c,2024-05-01T13:01:51.263000
|
||||
CVE-2024-32979,0,0,415a3504af4253fb9330760c79feca97e4169fdf22dd7f9c2c9ff0e4f9c129df,2024-05-01T13:01:51.263000
|
||||
CVE-2024-3298,0,0,35145d829af4d19541380a93e6723503e514b69e11aa4b007b05099610c37f21,2024-04-04T16:33:06.610000
|
||||
CVE-2024-32980,1,1,0951a382ff0fd365dfc3eb638de57bfcfb828f3192ad40e643095eead459e715,2024-05-08T15:15:10.530000
|
||||
CVE-2024-32982,0,0,cccb00c23d7b545c6bc74a2356624cd9a0d0d2e9e8f2661f68a558928cf51708,2024-05-06T21:15:48.373000
|
||||
CVE-2024-32984,0,0,c1781ab02b497f7ad9edbf8a8951c53661ebdb78ecb66c7cf14dd96168971cad,2024-05-01T13:01:51.263000
|
||||
CVE-2024-32986,0,0,b404a42958c3dfcc24f18b47a69c095e379b00c067dc9631f47ed1d9304ece33,2024-05-03T12:48:41.067000
|
||||
@ -248158,6 +248186,8 @@ CVE-2024-33566,0,0,46d17e7fcf76ea9cc29b76ef68ee9038fd04b7d980a772b2f399515ebb8e8
|
||||
CVE-2024-3357,0,0,4504c33b3bb653378795a255a83c05295c4cb93d37914e6c8a1edf8397686b85,2024-04-11T01:25:59.530000
|
||||
CVE-2024-33570,0,0,0537b9c72bfbf1655961ce253b4489c4b95e74d24416659de6615e2bf1c6b703,2024-05-07T13:39:32.710000
|
||||
CVE-2024-33571,0,0,7491ee4b5721aac2bfd880f448bc941e8fa61c24acdbbd5222ab9b2cea79a689,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33573,1,1,ac61cc3ebd489322c415b628f4e8eddbd5c01b89ef17c5da55c59770ead5b620,2024-05-08T14:15:08.523000
|
||||
CVE-2024-33574,1,1,42b46397cfc2829b03cf6a789e780ff39350a3cbb9ab853345a11cb1e34066be,2024-05-08T14:15:08.713000
|
||||
CVE-2024-33575,0,0,ba650f18eda31a51989bac6516ae56cab367e4b24de4dc251d448b46a52e51ca,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33576,0,0,afeccf39ea64ea858ce0f73e9ac8d3f7813955ee6b94e1666af6f7ba451357db,2024-05-07T13:39:32.710000
|
||||
CVE-2024-3358,0,0,694a0960c89fb254bc37c7c2f594e5cb197e9c3b955cd9433f44c414aff75d2b,2024-04-11T01:25:59.610000
|
||||
@ -248182,7 +248212,10 @@ CVE-2024-3360,0,0,2ffbaa301c04a2d62013f221bb69a21a0f4034a97959f93c6ac130d96a9162
|
||||
CVE-2024-33600,0,0,392d663a20e37ea99d531b2d1494f9731213af52e8d86eceeba8709856ff36b8,2024-05-07T13:39:32.710000
|
||||
CVE-2024-33601,0,0,677e02c7b9a7354d12f1558cb835f8d17e5599681a196d853572e599231ef4d5,2024-05-07T13:39:32.710000
|
||||
CVE-2024-33602,0,0,15d94cc4914bd563b5cebd7d733d131cd923c30c1c31fb52ef556530a056ad7c,2024-05-07T13:39:32.710000
|
||||
CVE-2024-33604,1,1,aeaa4aea30a25fdb25e337437e4513b6bd0e9ec0305f9cb6d86872360c8e16f8,2024-05-08T15:15:10.733000
|
||||
CVE-2024-33608,1,1,1eb408b24400baae1d061b646fdb6038f6f79e320fd21b6dd67246df8b702a05,2024-05-08T15:15:10.930000
|
||||
CVE-2024-3361,0,0,c120caf4947180a69c26140d9354a0af916b072bcc15573944dc923bbf223f7d,2024-04-11T01:25:59.847000
|
||||
CVE-2024-33612,1,1,2ce9126000c293500d697a3712215b0aa640d59962b2277dc4b77bd5204a609e,2024-05-08T15:15:11.113000
|
||||
CVE-2024-3362,0,0,4f698660b915c64322658e8738d0fb3f09460cf98fd487b3189e8f9d96e2b2c1,2024-04-11T01:25:59.930000
|
||||
CVE-2024-33627,0,0,46d1ca344f6adedbf698f1c5642ffd1e81c65d9ee122179e4726e5c233352e37,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33629,0,0,9c289386a90a37d7a3105c6378e86670a64a304277cc6973b5fc7ab9cb833007,2024-04-29T12:42:03.667000
|
||||
@ -248392,7 +248425,7 @@ CVE-2024-3425,0,0,0b502b5fe56c141fc6aaa3ded71e217f218e1c6fcf28e8e0142e3542789425
|
||||
CVE-2024-34250,0,0,26e21f2bb01a57acf78e728eb5d9f3c5603451355511d5ba33182a62d5e78195,2024-05-06T19:53:38.797000
|
||||
CVE-2024-34251,0,0,74f3f22bcb4835c3e235b981a0ef23d39df6ae8f5972284fca2feabee345728d,2024-05-06T19:53:38.797000
|
||||
CVE-2024-34252,0,0,00f099c2475d0a549ea8547eb6ad8d068470fc0abe3ed5b882b055d8806f95cc,2024-05-06T16:00:59.253000
|
||||
CVE-2024-34255,1,1,ee350c63effad23ae3a0aab2930d2dfb38f6c069dadf7ea6d06ddef1d4b08ca1,2024-05-08T13:15:17.563000
|
||||
CVE-2024-34255,0,0,ee350c63effad23ae3a0aab2930d2dfb38f6c069dadf7ea6d06ddef1d4b08ca1,2024-05-08T13:15:17.563000
|
||||
CVE-2024-3426,0,0,420411016bf478ae85cc2a4f27037eb2ff47235b4f68d61b15fe1ac7cc727921,2024-04-11T01:26:01.757000
|
||||
CVE-2024-3427,0,0,4fd695df226b35a5776d38ab2775e26c898b2763a8bf7883f6b39f5ee92452ea,2024-04-11T01:26:01.840000
|
||||
CVE-2024-3428,0,0,50915d543bb4362075920ac47216610e54188a7796ff3aa0592e5ad1754de0f3,2024-04-11T01:26:01.917000
|
||||
@ -248405,7 +248438,8 @@ CVE-2024-3433,0,0,9daf2209e24504628b986e1f65ece6eda07fd4ab55bdd47fe9779359663e71
|
||||
CVE-2024-3434,0,0,954da8a67c7ed83cd00d8f12a08610158a6b6e85c4d2c5bfe68c69ad1cf2e22e,2024-04-11T01:26:02.303000
|
||||
CVE-2024-34341,0,0,401915f472d8b560762fae9a3c4d0749731347c66e7bd00518f3019ddfe821fa,2024-05-07T20:07:58.737000
|
||||
CVE-2024-34342,0,0,aa3191e56985251661624a2fa3b491ca3b13c762a81e998933c326f33a99f181,2024-05-07T20:07:58.737000
|
||||
CVE-2024-34346,0,1,f52097ade7b5e4599f6ef6850f0ed1a9b313d490e9105e7facad506e728d0b5f,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34346,0,0,f52097ade7b5e4599f6ef6850f0ed1a9b313d490e9105e7facad506e728d0b5f,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34347,1,1,1b37926286a5636f5dd46778deed3a5f8d34fb4ec740bf865bd38646cdd2dcda,2024-05-08T15:15:11.310000
|
||||
CVE-2024-3436,0,0,d56d6daef5f64944191e2814a0e8e0368edbb9fb66b8510fd7eacfe56842ed00,2024-04-11T01:26:02.383000
|
||||
CVE-2024-34366,0,0,0d3f5bedc206c2395fd40f02a930e96a2ecd55a373d55f2b02f6aeccbb807ecf,2024-05-06T19:53:38.797000
|
||||
CVE-2024-34367,0,0,09cdc74d280ef140661f2da3bf1a0a89bd8cdc87b8783ab4e406f707e957795e,2024-05-06T19:53:38.797000
|
||||
@ -248446,7 +248480,7 @@ CVE-2024-34408,0,0,3c2f335ba274ff508132a154cc309c40bc38b19efdd9298e3de175f41fa57
|
||||
CVE-2024-3441,0,0,657e15d08a05c85e0f4e982fae7cec49fd4b8dda898982a18c454ae2db45f222,2024-04-11T01:26:02.813000
|
||||
CVE-2024-34412,0,0,351dac1423dc8e8517c032f303060fddddfb4b70d0143bb8c231e0e9db5dba48,2024-05-06T19:53:38.797000
|
||||
CVE-2024-34413,0,0,e5e744c34345ba6294637a8f85597b78c532aba1fad9c01dda8872ea5e3b50da,2024-05-07T13:39:32.710000
|
||||
CVE-2024-34414,1,1,db5e229a6208cf153470eb619a9f053a88051c892d8bfdd6779719795c6eb462,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34414,0,0,db5e229a6208cf153470eb619a9f053a88051c892d8bfdd6779719795c6eb462,2024-05-08T13:15:00.690000
|
||||
CVE-2024-3442,0,0,756156f7de62e4a3ae69e9bbc13d8b798986428892e90d3991a24b2c8375a976,2024-04-11T01:26:02.893000
|
||||
CVE-2024-3443,0,0,05006967bda17a889e39c8ccda497403cb2b35584eb895b86d4c8dd8b79230c6,2024-04-11T01:26:02.973000
|
||||
CVE-2024-3444,0,0,20ed8f6fb3358c183e59c59fd1e15718847c74b3b8477277ced05a568bf760d4,2024-04-11T01:26:03.057000
|
||||
@ -248501,28 +248535,28 @@ CVE-2024-34532,0,0,d9b4420ad130ffd345b42ea32943d3ea85ac93b28aeef2c295a30cff870d6
|
||||
CVE-2024-34533,0,0,fed7485b3815bc732c1be42f2d650622d72077ebf51ccbf0574f1a6ca151164a,2024-05-07T13:39:32.710000
|
||||
CVE-2024-34534,0,0,5b41ae364cb5686db0e61f768f78dbb771742090e9171960a6e9b0a284823916,2024-05-07T13:39:32.710000
|
||||
CVE-2024-34538,0,0,ad2e465bd4501134b8655c84262a62a1ec8a7e4ecf43c5e35b8118420879cc3c,2024-05-06T12:44:56.377000
|
||||
CVE-2024-34546,1,1,c2d3cb2b20dc218584a3e29d42bf74758d50d12287d7d00198db4d41ad728570,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34547,1,1,68485045b79b039986ac8a2bc39116a73bcfb61cefe86b3c97c2629af1031b6d,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34548,1,1,a263052f22b9ed630797ec6d56bcffb08c7a0f2402a01d542130845b1abea7a8,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34546,0,0,c2d3cb2b20dc218584a3e29d42bf74758d50d12287d7d00198db4d41ad728570,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34547,0,0,68485045b79b039986ac8a2bc39116a73bcfb61cefe86b3c97c2629af1031b6d,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34548,0,0,a263052f22b9ed630797ec6d56bcffb08c7a0f2402a01d542130845b1abea7a8,2024-05-08T13:15:00.690000
|
||||
CVE-2024-3455,0,0,18e948f1ff2182718852b2ba697f0fa9a8598811bb1c2e87509c3bd543b90a57,2024-04-11T01:26:03.233000
|
||||
CVE-2024-34553,1,1,1304ae8bb8e28c589f4f4c4923637af1159951d928589d0c318d92743d849bb1,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34558,1,1,fd5998d9df1dce5cfda505c9e8613d541a45f233eb2b964898c563a731af2258,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34553,0,0,1304ae8bb8e28c589f4f4c4923637af1159951d928589d0c318d92743d849bb1,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34558,0,0,fd5998d9df1dce5cfda505c9e8613d541a45f233eb2b964898c563a731af2258,2024-05-08T13:15:00.690000
|
||||
CVE-2024-3456,0,0,944b33373fddc7621692e3fce6708723c7abc962139d88da65ad0c4ce610f104,2024-04-11T01:26:03.310000
|
||||
CVE-2024-34560,1,1,4482b0d4c584fd15cdd119877a459e5053a4023f991ca5c022656cf8754ce943,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34561,1,1,471655415e985f0d6ce4b171d0bc58c0f90a4268b0b352f88e346d893b94c886,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34562,0,1,3f0e5c20e0dadc17ed9db4089e3ebe7fa1e7ac47de5d2db66a9348541c0f510b,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34563,0,1,a1a78de36c2dd2191843017818934aa0e4f73a29819ebfe2dd110f648f9d03e7,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34564,0,1,1832f6b4f0801ec1d0785f1dd9384001c877135270106c4799ceaf9117f6cbba,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34565,0,1,c835f062edb5d41d0f2a3cee2de3ffc7f38996768fc7d529d0c23909c136399c,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34566,0,1,54ad4ed9349a29320a16d9315bd5c4f96767a25129864c6a9b89fdbce70ab854,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34568,0,1,d7ca48abcd0c40ef13ec95e8a2a1a6b305163aff78729aa16c87f25cec895423,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34569,0,1,a16024e78299b43c5762559dcff860a8c87dc6e28da153486a499004aa4ac322,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34560,0,0,4482b0d4c584fd15cdd119877a459e5053a4023f991ca5c022656cf8754ce943,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34561,0,0,471655415e985f0d6ce4b171d0bc58c0f90a4268b0b352f88e346d893b94c886,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34562,0,0,3f0e5c20e0dadc17ed9db4089e3ebe7fa1e7ac47de5d2db66a9348541c0f510b,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34563,0,0,a1a78de36c2dd2191843017818934aa0e4f73a29819ebfe2dd110f648f9d03e7,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34564,0,0,1832f6b4f0801ec1d0785f1dd9384001c877135270106c4799ceaf9117f6cbba,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34565,0,0,c835f062edb5d41d0f2a3cee2de3ffc7f38996768fc7d529d0c23909c136399c,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34566,0,0,54ad4ed9349a29320a16d9315bd5c4f96767a25129864c6a9b89fdbce70ab854,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34568,0,0,d7ca48abcd0c40ef13ec95e8a2a1a6b305163aff78729aa16c87f25cec895423,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34569,0,0,a16024e78299b43c5762559dcff860a8c87dc6e28da153486a499004aa4ac322,2024-05-08T13:15:00.690000
|
||||
CVE-2024-3457,0,0,eda30bdfb17395ab91987b75a43f4990cc086dc3cfa77a90fc0cb388efd5e793,2024-04-11T01:26:03.387000
|
||||
CVE-2024-34570,0,1,e2defb2768fd7a805110ecf9a5728133ca58bcd0d6d6a88c80feca8c7f2f026a,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34571,0,1,ed7ca309054164b81bcbb5f66ed020554ce5c66aae91fb6e039e5de0badcc945,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34572,0,1,9ed710fb369f730183cf747ddcccd35192867c6d5121bdeb0e64eb444712f476,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34573,0,1,41ab5ca1c62c51e2d5398c3ef19591aec3618667df7c2294a33f2fd9794a697b,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34574,0,1,da62f69044cff1544e9db72428db6676f4511c77628679a41b2b8efda0b3bd93,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34570,0,0,e2defb2768fd7a805110ecf9a5728133ca58bcd0d6d6a88c80feca8c7f2f026a,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34571,0,0,ed7ca309054164b81bcbb5f66ed020554ce5c66aae91fb6e039e5de0badcc945,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34572,0,0,9ed710fb369f730183cf747ddcccd35192867c6d5121bdeb0e64eb444712f476,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34573,0,0,41ab5ca1c62c51e2d5398c3ef19591aec3618667df7c2294a33f2fd9794a697b,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34574,0,0,da62f69044cff1544e9db72428db6676f4511c77628679a41b2b8efda0b3bd93,2024-05-08T13:15:00.690000
|
||||
CVE-2024-3458,0,0,7db0bf8708dfce15955953888170391178462556da97d3ad2486d006a9f8ebab,2024-04-11T01:26:03.460000
|
||||
CVE-2024-3463,0,0,f35096c01e521c580de90ee225d8b67562638ead2824e5fc7702bc6c9f4524f8,2024-04-11T01:26:03.537000
|
||||
CVE-2024-3464,0,0,0c53100717f2f28c54c57fbaaef472d29e3cb0ff81ebf61eb104a899922afe93,2024-04-11T01:26:03.617000
|
||||
@ -248544,11 +248578,11 @@ CVE-2024-3489,0,0,407fc99ac607d8b254895aa9dc68afca4c0fff929cb004325e3c06bd83280a
|
||||
CVE-2024-3490,0,0,243d31a8a91d548ae7245abd7ab9112de0ee4857a2da5c2f334b7a81fefaf51e,2024-05-02T13:27:25.103000
|
||||
CVE-2024-3491,0,0,155e981c246f1ab173bd75da38bee4b8800ff4b0566c01179dcadac412465c38,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3493,0,0,63ead7e160b6b2cbd834dd6075f87d345af3361e8d55520f11e81a53e2086aaa,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3494,0,1,64d46dc2a19508d3711e9aedb3c5a94f86b9d5284b5f5f7adc98cacb6f1d9c54,2024-05-08T13:15:00.690000
|
||||
CVE-2024-3494,0,0,64d46dc2a19508d3711e9aedb3c5a94f86b9d5284b5f5f7adc98cacb6f1d9c54,2024-05-08T13:15:00.690000
|
||||
CVE-2024-3499,0,0,38e1f3a6ce5aff826b19a73a4f796b980cc1161eaf58f8fada2f6f87e54573a4,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3500,0,0,bd83544d3c8c82359104dcd5b032a6095cbae3178ec9c9c56ddfe242d28462ee,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3505,0,0,d46d6b7d35449c168e9ff66f3c93f973f2e1e579109b94b88c63ad7baac2b7b8,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3507,0,1,1c054f8eb468e9fc0cea1e0bf278f9d5e4223b4637b6d1e6bd047269f92998e3,2024-05-08T13:15:00.690000
|
||||
CVE-2024-3507,0,0,1c054f8eb468e9fc0cea1e0bf278f9d5e4223b4637b6d1e6bd047269f92998e3,2024-05-08T13:15:00.690000
|
||||
CVE-2024-3508,0,0,c82390a1238326cf6817e875dca33757792126eb5098bd44b5a908dea5e7149a,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3512,0,0,7186c9ec3829c2082fd68b5fc8e23caed587fdf0f4e68c2974db5f41b90fb514,2024-04-25T13:15:51.663000
|
||||
CVE-2024-3514,0,0,fd39bbcd0f0890f4d85c4ccfb46694b71dc6efa7f8c56852e1f4fd99d58e20d2,2024-04-24T17:15:47.423000
|
||||
@ -248792,6 +248826,7 @@ CVE-2024-3932,0,0,bce0f8b09e2fc4acc0cfce5940d57ce5f1e0384ac19f6c68ed218175688d8f
|
||||
CVE-2024-3936,0,0,eab146c2dabc68c3a2670ed40014918c1546d7792590be508b2f098c474c009c,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3942,0,0,093aed42e5de67d43c3e1fe2ea0608a4fa8ab77d933bee3fc5a54a0d1f857aa1,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3948,0,0,427154a0226db385c08a1dc567a28e238ab290a5825189b73e5e958b25b296e5,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3951,1,1,63353908b055c38cd048fe7a4791055e9557ccfbed275726db22304d5ceff8db,2024-05-08T15:15:11.517000
|
||||
CVE-2024-3955,0,0,bba90f25cff74c274e08a67a3936bf55505a38180fc074269167b54bd0903537,2024-05-02T13:27:25.103000
|
||||
CVE-2024-3957,0,0,2b744dd88d6cc9c827c02d6b12c55f272a575442480ebe581b900faacfe3a2a0,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3962,0,0,9de964d29f43823164300439a0e71453bbca4a5c1f5767eca51db600267798cd,2024-04-26T12:58:17.720000
|
||||
@ -248813,7 +248848,7 @@ CVE-2024-4022,0,0,ebd323c8f90bdf29bd6ff35ea1eff449874a3d962dc85b687039f47f7b416e
|
||||
CVE-2024-4024,0,0,ef64ae76a72fe30f0382303f22cba197d841a5535eb50d7c4ad40f3e475d662a,2024-04-25T17:25:05.903000
|
||||
CVE-2024-4026,0,0,9eff728af4fb17cd0b046ae2444303f230bc7685cadbda3feb2bd1007c766627,2024-04-22T13:28:34.007000
|
||||
CVE-2024-4029,0,0,9463712b5e647e14085984bed383bec7860a9d9a5318196c531ac42338eae2f7,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4030,0,1,795a3bbc64b5f3c541eda3871e64672190edffb58908cba6374ff9dfb2797a41,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4030,0,0,795a3bbc64b5f3c541eda3871e64672190edffb58908cba6374ff9dfb2797a41,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000
|
||||
CVE-2024-4033,0,0,ec8e3c78ea3271fa1478d4b20befe7f07ff679b5d632c0e137b31e0d9ec5ea21,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4034,0,0,fafd19fe9fec289104edaec6de04b5d97871dbbe831f4ab5035660db95fb5c8a,2024-05-02T18:00:37.360000
|
||||
@ -248862,14 +248897,14 @@ CVE-2024-4126,0,0,52d53c69f90fffba02f4ee03823f6932b3dbf87e0fe4c676029ee51a28a916
|
||||
CVE-2024-4127,0,0,4364ebf3636399a6b862124e1d4818af14c41cdffb5c73435c8a8f0aa84db1d3,2024-04-25T13:18:20.370000
|
||||
CVE-2024-4128,0,0,dbb061a4cce465a0cb61b00ade10d9b747ca5e17e039d640902bb2e7236edc48,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4133,0,0,edddaf22ac50287e4d41278289e1df9ea316ee8a51647f77da27d00841431234,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4135,0,1,2f5ec05990a2d3fd6c58d2bd3017e3c06528bb0d0b0a54b28242ee75749e6a9b,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4135,0,0,2f5ec05990a2d3fd6c58d2bd3017e3c06528bb0d0b0a54b28242ee75749e6a9b,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4140,0,0,bb3e400fe6c4b8cf6821bf141f5d1d6536fc52c547337b85d936fc6d6f95cc9a,2024-05-03T12:50:34.250000
|
||||
CVE-2024-4141,0,0,569cd2fcd9188d9eabeb08d432690880975d5549c17482aa7e239fef9c6bb2e6,2024-04-24T19:58:40.710000
|
||||
CVE-2024-4142,0,0,6297707db3df670a282f3d4e6720e4836d7467220b5fcc108ef053e6a6308f68,2024-05-02T13:27:25.103000
|
||||
CVE-2024-4156,0,0,08ed32a025121f03b8a02946b754b432972d33916a48e29ae90b57a1d08fdf80,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4159,0,0,cf0daf8ecd317ce4288e8a4812364c59b3b10d10c0c5945533667d40be8a71fc,2024-04-25T23:15:47.087000
|
||||
CVE-2024-4161,0,0,8c35858b76cabcd8cf78ed758e4c9d58e5dffa2b20a32ec25b41a43a372b2218,2024-04-25T13:18:13.537000
|
||||
CVE-2024-4162,0,1,3ab30e180def8149fd8494b0a91d0c176ba9184404d532022796a118c67b4ade,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4162,0,0,3ab30e180def8149fd8494b0a91d0c176ba9184404d532022796a118c67b4ade,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4163,0,0,0abae06321832430d51e94179291aa50a40ff5a5f25f762f5290e51ebf608907,2024-04-26T12:58:17.720000
|
||||
CVE-2024-4164,0,0,47d42509563ff118e80fb01ab32da3a01e6b310e48a92c3ae5fc79acb90ef6df,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4165,0,0,2b8667aaf2a68631633b130c7e16d5d65b2d5175fcfbf6deaef662c04ff84691,2024-04-25T13:18:02.660000
|
||||
@ -248895,6 +248930,7 @@ CVE-2024-4215,0,0,0d7dbfaf8275e9ff6c32259712a00cedd32b92104e92991d7893f67c59faf7
|
||||
CVE-2024-4216,0,0,80b76898bbc4459141293c47297450a985b668060a3a6e72db0d9ef898a4d417,2024-05-03T12:50:34.250000
|
||||
CVE-2024-4225,0,0,ac71ef092dab43c080586d967efe31f36fc3673c6a3103eaf0a29ff9fdbbfa8b,2024-04-30T13:11:16.690000
|
||||
CVE-2024-4226,0,0,71c8bf7eb5a4d3d3ec7c43ac428cd4d409488f8f04217410fc871554bd101d4e,2024-04-30T13:11:16.690000
|
||||
CVE-2024-4233,1,1,97cfae5f1f0e419dfc77283cca8b5b34fe72abf6b0cc53925731cf781bdd8568,2024-05-08T14:15:08.907000
|
||||
CVE-2024-4234,0,0,007b9b5f266bd1a230094439603af6b2584a9759013139ef15c8a83c147fb7e2,2024-04-26T15:32:22.523000
|
||||
CVE-2024-4235,0,0,56fe55bfa9e5032250cb76a0428e6701e1156edfc8fca4b04bbe3adaedf6d795,2024-04-26T19:59:19.793000
|
||||
CVE-2024-4236,0,0,7ac00e186cd2c2e1c79c57240d28f35f7ae0ebb8e21a175f5525fb6a05d72ea1,2024-04-26T19:59:19.793000
|
||||
@ -248918,7 +248954,7 @@ CVE-2024-4255,0,0,e56f3d9fc9bcac063de04d50ea338ebd897707944646fe347248f9057b44ad
|
||||
CVE-2024-4256,0,0,7306acbdfbcfdbac15858c1f2c67d7bd707c7019b8eaaf3005a017f2282a931e,2024-04-29T12:42:03.667000
|
||||
CVE-2024-4257,0,0,63a2e5a626e37ee2037a88ecaf87159da170b2e93a6613f6fd5f09cce2014f62,2024-04-29T12:42:03.667000
|
||||
CVE-2024-4265,0,0,91d38fbd7b9c4ea0cd26c0f2028b5e1f8ee8c7d7e1c2c632d6b17cd2b7b69603,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4281,0,1,f2f6c94941e4ed7f1c98ab6351686f1d868a8657bf9b3ff2bb73d7d016e69d14,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4281,0,0,f2f6c94941e4ed7f1c98ab6351686f1d868a8657bf9b3ff2bb73d7d016e69d14,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4291,0,0,026425f7582d5a8b9b7c69bee6a121d95c15faa949c9b0f3f135fcde175ec19a,2024-04-29T12:42:03.667000
|
||||
CVE-2024-4292,0,0,16b2c7000f08d30809e9aff3078f5630d0209d46626c0ae6f1710109bf28b425,2024-04-29T12:42:03.667000
|
||||
CVE-2024-4293,0,0,ff4ebb1950772c60e21bdd44e74ba1ef8486ce2724daf47c032714a7f53490f7,2024-04-29T12:42:03.667000
|
||||
@ -248950,16 +248986,16 @@ CVE-2024-4348,0,0,58c372bcfdfd13a40dcad9095bf019969258123c09df37a486f5ad5f3ede8e
|
||||
CVE-2024-4349,0,0,f37ccdd1092fa74fa2c30a0fd9ee697b77c3abde136f8542413ea2c7851c4bb8,2024-05-06T14:15:08.090000
|
||||
CVE-2024-4368,0,0,0ee02ebde276d817508f5495294b3429c463a1f4241660388e0c329992e72be6,2024-05-04T02:15:06.853000
|
||||
CVE-2024-4369,0,0,ab5992320463150d25768d540495632f3cea0e672e96fca10ae18e5fed17e7b3,2024-05-02T03:15:15.027000
|
||||
CVE-2024-4393,0,1,104b496ba9688611beda7ef57b83424396e65d62ee7d7a6e8c7b696d3fc66e71,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4393,0,0,104b496ba9688611beda7ef57b83424396e65d62ee7d7a6e8c7b696d3fc66e71,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4405,0,0,c1f36263ba5841514dcf823ce87455ea826983b04201750caf275a7578687d86,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4406,0,0,24efbd07edfc7f89a7b1e694cb4faff02b108244486a9e17a0ab6aa554d1cf0e,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4418,0,1,b75df24fbcd879bc4a65285c93bd33dc1c31ae502a7b108d2ac08220fcbe0dd6,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4418,0,0,b75df24fbcd879bc4a65285c93bd33dc1c31ae502a7b108d2ac08220fcbe0dd6,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4433,0,0,a671ce2518271e49fdeb5cf5eaca489e751e352fe28902a9e3a1500395ee9006,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4436,0,1,64033ee8163e93734d3356c76b1219aa507b767e43c629d466579eff9eca6a17,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4437,0,1,a62637ebd732289d5432e95cdaf60c3e47133a5119cabcd67c7d4d14d6736462,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4438,0,1,93ceea5f04a92ff8a47d298b7349cd99931c0f6ebe6d5712d64fba3d2e18a77c,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4436,0,0,64033ee8163e93734d3356c76b1219aa507b767e43c629d466579eff9eca6a17,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4437,0,0,a62637ebd732289d5432e95cdaf60c3e47133a5119cabcd67c7d4d14d6736462,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4438,0,0,93ceea5f04a92ff8a47d298b7349cd99931c0f6ebe6d5712d64fba3d2e18a77c,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4439,0,0,a04aad1631b3777470b58d8a82d09407f3c5e63b2eeaeebb2f2cdb5c6b9c3ede,2024-05-03T12:48:41.067000
|
||||
CVE-2024-4456,0,1,43bdd543de001702ca45614b4a3579c52bfa7b188e5cb3e6b81f25f610f74e45,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4456,0,0,43bdd543de001702ca45614b4a3579c52bfa7b188e5cb3e6b81f25f610f74e45,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4461,0,0,7ca39b07094b9badd740410c9408db11fe23a2c272b945e9ccd422d33b255a72,2024-05-03T12:48:41.067000
|
||||
CVE-2024-4466,0,0,362cf34285ea8ef22c0a4fe2e518499aaa4b8f79660cea3c0f457b3e58b9b244,2024-05-03T12:48:41.067000
|
||||
CVE-2024-4491,0,0,d21d67654af00d0e8aec399506b941096b080e93fc90b1b79355cb50deb5ffe8,2024-05-06T12:44:56.377000
|
||||
@ -249024,8 +249060,14 @@ CVE-2024-4596,0,0,be8f6f31f7b9fe629a0401c9cf81fadfc64729080c75f7aaf2c3860b6963e2
|
||||
CVE-2024-4599,0,0,7a2dd9d366beb25d47b0c05043c7c832d7abfddbca078d457eae393ffc0c13b9,2024-05-07T13:39:32.710000
|
||||
CVE-2024-4600,0,0,34514a912341a00b4dd13ba9bc66d0fe1a7a1cb8661452904cea5e1c3463f08f,2024-05-07T13:39:32.710000
|
||||
CVE-2024-4601,0,0,9e1e1f008012e98662e601d1d10e65eeb89abb9d2b4ea828e06c076d042c7c66,2024-05-07T13:39:32.710000
|
||||
CVE-2024-4644,1,1,fe8c946aa85c5afed75f9f115eec97bea79a068ee2bf126353993d4359a1320d,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4645,1,1,d16dc3a11840f0e48a1d6ecd44be97aa16267f5e0e0f86be91755b05a89e5159,2024-05-08T13:15:17.563000
|
||||
CVE-2024-4646,1,1,b5453579534812ac281aa61d279375375a21c607e3f47f1297a5f64dff9b26e8,2024-05-08T13:15:17.563000
|
||||
CVE-2024-4647,1,1,2aa6e717228c7562a555a387c458fa7f53158f3e272215b16fecc7a791b9fb29,2024-05-08T13:15:17.563000
|
||||
CVE-2024-4648,1,1,5282bfe48e6b6eea5c6083fe67a31e29341655bccc37d1c45b982574f2095da3,2024-05-08T13:15:17.563000
|
||||
CVE-2024-4644,0,0,fe8c946aa85c5afed75f9f115eec97bea79a068ee2bf126353993d4359a1320d,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4645,0,0,d16dc3a11840f0e48a1d6ecd44be97aa16267f5e0e0f86be91755b05a89e5159,2024-05-08T13:15:17.563000
|
||||
CVE-2024-4646,0,0,b5453579534812ac281aa61d279375375a21c607e3f47f1297a5f64dff9b26e8,2024-05-08T13:15:17.563000
|
||||
CVE-2024-4647,0,0,2aa6e717228c7562a555a387c458fa7f53158f3e272215b16fecc7a791b9fb29,2024-05-08T13:15:17.563000
|
||||
CVE-2024-4648,0,0,5282bfe48e6b6eea5c6083fe67a31e29341655bccc37d1c45b982574f2095da3,2024-05-08T13:15:17.563000
|
||||
CVE-2024-4649,1,1,cd5786310b255003ffd2f50fb4679b37c80b9ad4ef02f4614b554f58a86aa605,2024-05-08T14:15:09.107000
|
||||
CVE-2024-4650,1,1,94b83e87d8c77355e308ebe7f64fdfce28546fc7789f8cae8d4ffbb00dd93332,2024-05-08T14:15:09.337000
|
||||
CVE-2024-4651,1,1,c89f5e8523846ffe07d1e5d9cdf31b1c588c40ccc00298f42d057418ce29c0c2,2024-05-08T14:15:09.563000
|
||||
CVE-2024-4652,1,1,3fb7704a5138fbf59862b522c8dbad2a3392af8430b8684654ef307d0ae4c14a,2024-05-08T14:15:09.780000
|
||||
CVE-2024-4653,1,1,3a4121672e5ec11915823af5ad2554dc391eb4183f232bf20d773e2232961cd8,2024-05-08T15:15:11.723000
|
||||
CVE-2024-4654,1,1,019e4638b3e7c571cf7613cc239a081aaec2e1bdbcd1daa9ddfad2feb06bb726,2024-05-08T15:15:11.950000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user