mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-05-15T22:00:37.827761+00:00
This commit is contained in:
parent
570d512026
commit
c07cd33053
20
CVE-2023/CVE-2023-402xx/CVE-2023-40297.json
Normal file
20
CVE-2023/CVE-2023-402xx/CVE-2023-40297.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40297",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-15T20:15:08.767",
|
||||
"lastModified": "2024-05-15T20:15:08.767",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Stakater Forecastle 1.0.139 and before allows %5C../ directory traversal in the website component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/sahar042/CVE-2023-40297",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-272xx/CVE-2024-27243.json
Normal file
55
CVE-2024/CVE-2024-272xx/CVE-2024-27243.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-27243",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2024-05-15T21:15:07.987",
|
||||
"lastModified": "2024-05-15T21:15:07.987",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer overflow in some Zoom Workplace Apps and SDK\u2019s may allow an authenticated user to conduct a denial of service via network access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@zoom.us",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@zoom.us",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24014/",
|
||||
"source": "security@zoom.us"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-272xx/CVE-2024-27244.json
Normal file
55
CVE-2024/CVE-2024-272xx/CVE-2024-27244.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-27244",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2024-05-15T21:15:08.220",
|
||||
"lastModified": "2024-05-15T21:15:08.220",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient verification of data authenticity in the installer for Zoom Workplace VDI App for Windows may allow an authenticated user to conduct an escalation of privilege via local access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@zoom.us",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@zoom.us",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-345"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24015/",
|
||||
"source": "security@zoom.us"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30055",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-05-14T15:21:50.940",
|
||||
"lastModified": "2024-05-14T16:13:02.773",
|
||||
"lastModified": "2024-05-15T20:15:11.047",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de suplantaci\u00f3n de identidad en Microsoft Edge (basado en Chromium)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -34,6 +38,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-451"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30055",
|
||||
|
59
CVE-2024/CVE-2024-314xx/CVE-2024-31409.json
Normal file
59
CVE-2024/CVE-2024-314xx/CVE-2024-31409.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-31409",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-05-15T20:15:11.203",
|
||||
"lastModified": "2024-05-15T20:15:11.203",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Certain MQTT wildcards are not blocked on the \nCyberPower PowerPanel\n\nsystem, which might result in an attacker obtaining data from throughout the system after gaining access to any device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-314xx/CVE-2024-31410.json
Normal file
59
CVE-2024/CVE-2024-314xx/CVE-2024-31410.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-31410",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-05-15T20:15:11.473",
|
||||
"lastModified": "2024-05-15T20:15:11.473",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The devices which CyberPower PowerPanel manages use identical certificates based on a \nhard-coded cryptographic key. This can allow an attacker to impersonate \nany client in the system and send malicious data."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-321"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-318xx/CVE-2024-31856.json
Normal file
59
CVE-2024/CVE-2024-318xx/CVE-2024-31856.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-31856",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-05-15T20:15:11.710",
|
||||
"lastModified": "2024-05-15T20:15:11.710",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An attacker with certain MQTT permissions can create malicious messages \nto all CyberPower PowerPanel devices. This could result in an attacker injecting \nSQL syntax, writing arbitrary files to the system, and executing remote \ncode."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-320xx/CVE-2024-32042.json
Normal file
59
CVE-2024/CVE-2024-320xx/CVE-2024-32042.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-32042",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-05-15T20:15:11.950",
|
||||
"lastModified": "2024-05-15T20:15:11.950",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The key used to encrypt passwords stored in the database can be found in\n the \nCyberPower PowerPanel\n\napplication code, allowing the passwords to be recovered."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-257"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-320xx/CVE-2024-32047.json
Normal file
59
CVE-2024/CVE-2024-320xx/CVE-2024-32047.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-32047",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-05-15T20:15:12.197",
|
||||
"lastModified": "2024-05-15T20:15:12.197",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Hard-coded credentials for the \nCyberPower PowerPanel test server can be found in the \nproduction code. This might result in an attacker gaining access to the \ntesting or production server."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-489"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-320xx/CVE-2024-32053.json
Normal file
59
CVE-2024/CVE-2024-320xx/CVE-2024-32053.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-32053",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-05-15T20:15:12.443",
|
||||
"lastModified": "2024-05-15T20:15:12.443",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Hard-coded credentials are used by the\u00a0\nCyberPower PowerPanel \n\n platform to authenticate to the \ndatabase, other services, and the cloud. This could result in an \nattacker gaining access to services with the privileges of a Powerpanel \nbusiness application."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-336xx/CVE-2024-33615.json
Normal file
59
CVE-2024/CVE-2024-336xx/CVE-2024-33615.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-33615",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-05-15T20:15:12.687",
|
||||
"lastModified": "2024-05-15T20:15:12.687",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A specially crafted Zip file containing path traversal characters can be\n imported to the \nCyberPower PowerPanel \n\nserver, which allows file writing to the server outside\n the intended scope, and could allow an attacker to achieve remote code \nexecution."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-23"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-336xx/CVE-2024-33625.json
Normal file
59
CVE-2024/CVE-2024-336xx/CVE-2024-33625.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-33625",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-05-15T20:15:12.927",
|
||||
"lastModified": "2024-05-15T20:15:12.927",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CyberPower PowerPanel business \napplication code contains a hard-coded JWT signing key. This could \nresult in an attacker forging JWT tokens to bypass authentication."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-259"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-340xx/CVE-2024-34025.json
Normal file
59
CVE-2024/CVE-2024-340xx/CVE-2024-34025.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-34025",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-05-15T20:15:13.190",
|
||||
"lastModified": "2024-05-15T20:15:13.190",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CyberPower PowerPanel business application code contains a hard-coded set of authentication \ncredentials. This could result in an attacker bypassing authentication \nand gaining administrator privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-259"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-349xx/CVE-2024-34906.json
Normal file
20
CVE-2024/CVE-2024-349xx/CVE-2024-34906.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-34906",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-15T20:15:13.460",
|
||||
"lastModified": "2024-05-15T20:15:13.460",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability in dootask v0.30.13 allows attackers to execute arbitrary code via uploading a crafted PDF file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kuaifan/dootask/issues/210",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-349xx/CVE-2024-34909.json
Normal file
20
CVE-2024/CVE-2024-349xx/CVE-2024-34909.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-34909",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-15T20:15:13.570",
|
||||
"lastModified": "2024-05-15T20:15:13.570",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability in KYKMS v1.0.1 and below allows attackers to execute arbitrary code via uploading a crafted PDF file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Joying-C/Cross-site-scripting-vulnerability/tree/main/KYKMS_Cross_site%20_scripting%20_vulnerability",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-349xx/CVE-2024-34913.json
Normal file
20
CVE-2024/CVE-2024-349xx/CVE-2024-34913.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-34913",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-15T20:15:13.657",
|
||||
"lastModified": "2024-05-15T20:15:13.657",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability in r-pan-scaffolding v5.0 and below allows attackers to execute arbitrary code via uploading a crafted PDF file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Joying-C/Cross-site-scripting-vulnerability/tree/main/r-pan-scaffolding_Cross_site%20_scripting%20_vulnerability",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-49xx/CVE-2024-4904.json
Normal file
92
CVE-2024/CVE-2024-49xx/CVE-2024-4904.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4904",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-15T20:15:13.750",
|
||||
"lastModified": "2024-05-15T20:15:13.750",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Byzoro Smart S200 Management Platform up to 20240507. It has been rated as critical. This issue affects some unknown processing of the file /useratte/userattestation.php. The manipulation of the argument web_img leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264437 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Hefei-Coffee/cve/blob/main/upload.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264437",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264437",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.330636",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-49xx/CVE-2024-4910.json
Normal file
92
CVE-2024/CVE-2024-49xx/CVE-2024-4910.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4910",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-15T20:15:14.167",
|
||||
"lastModified": "2024-05-15T20:15:14.167",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /view/student_exam_mark_insert_form1.php. The manipulation of the argument grade leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264445 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%206.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264445",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264445",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333296",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-49xx/CVE-2024-4911.json
Normal file
92
CVE-2024/CVE-2024-49xx/CVE-2024-4911.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4911",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-15T21:15:08.447",
|
||||
"lastModified": "2024-05-15T21:15:08.447",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /view/student_exam_mark_update_form.php. The manipulation of the argument exam leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-264446 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%207.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264446",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264446",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333297",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-49xx/CVE-2024-4912.json
Normal file
92
CVE-2024/CVE-2024-49xx/CVE-2024-4912.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4912",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-15T21:15:08.720",
|
||||
"lastModified": "2024-05-15T21:15:08.720",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in Campcodes Online Examination System 1.0. This affects an unknown part of the file addExamExe.php. The manipulation of the argument examTitle leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264447."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_addExamExe.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264447",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264447",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333402",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-49xx/CVE-2024-4913.json
Normal file
92
CVE-2024/CVE-2024-49xx/CVE-2024-4913.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4913",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-15T21:15:09.000",
|
||||
"lastModified": "2024-05-15T21:15:09.000",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in Campcodes Online Examination System 1.0. This vulnerability affects unknown code of the file exam.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264448."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_exam.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264448",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264448",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333403",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-49xx/CVE-2024-4947.json
Normal file
24
CVE-2024/CVE-2024-49xx/CVE-2024-4947.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-4947",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-05-15T21:15:09.273",
|
||||
"lastModified": "2024-05-15T21:15:09.273",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Type Confusion in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/340221135",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-49xx/CVE-2024-4948.json
Normal file
24
CVE-2024/CVE-2024-49xx/CVE-2024-4948.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-4948",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-05-15T21:15:09.347",
|
||||
"lastModified": "2024-05-15T21:15:09.347",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use after free in Dawn in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/333414294",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-49xx/CVE-2024-4949.json
Normal file
24
CVE-2024/CVE-2024-49xx/CVE-2024-4949.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-4949",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-05-15T21:15:09.430",
|
||||
"lastModified": "2024-05-15T21:15:09.430",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use after free in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/326607001",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-49xx/CVE-2024-4950.json
Normal file
24
CVE-2024/CVE-2024-49xx/CVE-2024-4950.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-4950",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-05-15T21:15:09.493",
|
||||
"lastModified": "2024-05-15T21:15:09.493",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in Downloads in Google Chrome prior to 125.0.6422.60 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/40065403",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2024/CVE-2024-49xx/CVE-2024-4976.json
Normal file
32
CVE-2024/CVE-2024-49xx/CVE-2024-4976.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2024-4976",
|
||||
"sourceIdentifier": "xpdf@xpdfreader.com",
|
||||
"published": "2024-05-15T21:15:09.560",
|
||||
"lastModified": "2024-05-15T21:15:09.560",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Out-of-bounds array write in Xpdf 4.05 and earlier, due to missing object type check in AcroForm field reference."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "xpdf@xpdfreader.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.xpdfreader.com/security-bug/CVE-2024-4976.html",
|
||||
"source": "xpdf@xpdfreader.com"
|
||||
}
|
||||
]
|
||||
}
|
74
README.md
74
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-05-15T20:00:38.583021+00:00
|
||||
2024-05-15T22:00:37.827761+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-05-15T19:15:09.320000+00:00
|
||||
2024-05-15T21:15:09.560000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,57 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
250026
|
||||
250051
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `17`
|
||||
Recently added CVEs: `25`
|
||||
|
||||
- [CVE-2024-20256](CVE-2024/CVE-2024-202xx/CVE-2024-20256.json) (`2024-05-15T18:15:08.720`)
|
||||
- [CVE-2024-20257](CVE-2024/CVE-2024-202xx/CVE-2024-20257.json) (`2024-05-15T18:15:08.967`)
|
||||
- [CVE-2024-20258](CVE-2024/CVE-2024-202xx/CVE-2024-20258.json) (`2024-05-15T18:15:09.193`)
|
||||
- [CVE-2024-20366](CVE-2024/CVE-2024-203xx/CVE-2024-20366.json) (`2024-05-15T18:15:09.440`)
|
||||
- [CVE-2024-20369](CVE-2024/CVE-2024-203xx/CVE-2024-20369.json) (`2024-05-15T18:15:09.673`)
|
||||
- [CVE-2024-20383](CVE-2024/CVE-2024-203xx/CVE-2024-20383.json) (`2024-05-15T18:15:09.910`)
|
||||
- [CVE-2024-20391](CVE-2024/CVE-2024-203xx/CVE-2024-20391.json) (`2024-05-15T18:15:10.153`)
|
||||
- [CVE-2024-20392](CVE-2024/CVE-2024-203xx/CVE-2024-20392.json) (`2024-05-15T18:15:10.390`)
|
||||
- [CVE-2024-20394](CVE-2024/CVE-2024-203xx/CVE-2024-20394.json) (`2024-05-15T18:15:10.620`)
|
||||
- [CVE-2024-25743](CVE-2024/CVE-2024-257xx/CVE-2024-25743.json) (`2024-05-15T18:15:10.837`)
|
||||
- [CVE-2024-3182](CVE-2024/CVE-2024-31xx/CVE-2024-3182.json) (`2024-05-15T18:15:11.020`)
|
||||
- [CVE-2024-35102](CVE-2024/CVE-2024-351xx/CVE-2024-35102.json) (`2024-05-15T19:15:08.063`)
|
||||
- [CVE-2024-4905](CVE-2024/CVE-2024-49xx/CVE-2024-4905.json) (`2024-05-15T18:15:11.223`)
|
||||
- [CVE-2024-4906](CVE-2024/CVE-2024-49xx/CVE-2024-4906.json) (`2024-05-15T19:15:08.203`)
|
||||
- [CVE-2024-4907](CVE-2024/CVE-2024-49xx/CVE-2024-4907.json) (`2024-05-15T19:15:08.607`)
|
||||
- [CVE-2024-4908](CVE-2024/CVE-2024-49xx/CVE-2024-4908.json) (`2024-05-15T19:15:08.980`)
|
||||
- [CVE-2024-4909](CVE-2024/CVE-2024-49xx/CVE-2024-4909.json) (`2024-05-15T19:15:09.320`)
|
||||
- [CVE-2023-40297](CVE-2023/CVE-2023-402xx/CVE-2023-40297.json) (`2024-05-15T20:15:08.767`)
|
||||
- [CVE-2024-27243](CVE-2024/CVE-2024-272xx/CVE-2024-27243.json) (`2024-05-15T21:15:07.987`)
|
||||
- [CVE-2024-27244](CVE-2024/CVE-2024-272xx/CVE-2024-27244.json) (`2024-05-15T21:15:08.220`)
|
||||
- [CVE-2024-31409](CVE-2024/CVE-2024-314xx/CVE-2024-31409.json) (`2024-05-15T20:15:11.203`)
|
||||
- [CVE-2024-31410](CVE-2024/CVE-2024-314xx/CVE-2024-31410.json) (`2024-05-15T20:15:11.473`)
|
||||
- [CVE-2024-31856](CVE-2024/CVE-2024-318xx/CVE-2024-31856.json) (`2024-05-15T20:15:11.710`)
|
||||
- [CVE-2024-32042](CVE-2024/CVE-2024-320xx/CVE-2024-32042.json) (`2024-05-15T20:15:11.950`)
|
||||
- [CVE-2024-32047](CVE-2024/CVE-2024-320xx/CVE-2024-32047.json) (`2024-05-15T20:15:12.197`)
|
||||
- [CVE-2024-32053](CVE-2024/CVE-2024-320xx/CVE-2024-32053.json) (`2024-05-15T20:15:12.443`)
|
||||
- [CVE-2024-33615](CVE-2024/CVE-2024-336xx/CVE-2024-33615.json) (`2024-05-15T20:15:12.687`)
|
||||
- [CVE-2024-33625](CVE-2024/CVE-2024-336xx/CVE-2024-33625.json) (`2024-05-15T20:15:12.927`)
|
||||
- [CVE-2024-34025](CVE-2024/CVE-2024-340xx/CVE-2024-34025.json) (`2024-05-15T20:15:13.190`)
|
||||
- [CVE-2024-34906](CVE-2024/CVE-2024-349xx/CVE-2024-34906.json) (`2024-05-15T20:15:13.460`)
|
||||
- [CVE-2024-34909](CVE-2024/CVE-2024-349xx/CVE-2024-34909.json) (`2024-05-15T20:15:13.570`)
|
||||
- [CVE-2024-34913](CVE-2024/CVE-2024-349xx/CVE-2024-34913.json) (`2024-05-15T20:15:13.657`)
|
||||
- [CVE-2024-4904](CVE-2024/CVE-2024-49xx/CVE-2024-4904.json) (`2024-05-15T20:15:13.750`)
|
||||
- [CVE-2024-4910](CVE-2024/CVE-2024-49xx/CVE-2024-4910.json) (`2024-05-15T20:15:14.167`)
|
||||
- [CVE-2024-4911](CVE-2024/CVE-2024-49xx/CVE-2024-4911.json) (`2024-05-15T21:15:08.447`)
|
||||
- [CVE-2024-4912](CVE-2024/CVE-2024-49xx/CVE-2024-4912.json) (`2024-05-15T21:15:08.720`)
|
||||
- [CVE-2024-4913](CVE-2024/CVE-2024-49xx/CVE-2024-4913.json) (`2024-05-15T21:15:09.000`)
|
||||
- [CVE-2024-4947](CVE-2024/CVE-2024-49xx/CVE-2024-4947.json) (`2024-05-15T21:15:09.273`)
|
||||
- [CVE-2024-4948](CVE-2024/CVE-2024-49xx/CVE-2024-4948.json) (`2024-05-15T21:15:09.347`)
|
||||
- [CVE-2024-4949](CVE-2024/CVE-2024-49xx/CVE-2024-4949.json) (`2024-05-15T21:15:09.430`)
|
||||
- [CVE-2024-4950](CVE-2024/CVE-2024-49xx/CVE-2024-4950.json) (`2024-05-15T21:15:09.493`)
|
||||
- [CVE-2024-4976](CVE-2024/CVE-2024-49xx/CVE-2024-4976.json) (`2024-05-15T21:15:09.560`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `21`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2023-5938](CVE-2023/CVE-2023-59xx/CVE-2023-5938.json) (`2024-05-15T18:35:11.453`)
|
||||
- [CVE-2023-7258](CVE-2023/CVE-2023-72xx/CVE-2023-7258.json) (`2024-05-15T18:35:11.453`)
|
||||
- [CVE-2024-27593](CVE-2024/CVE-2024-275xx/CVE-2024-27593.json) (`2024-05-15T18:35:11.453`)
|
||||
- [CVE-2024-28042](CVE-2024/CVE-2024-280xx/CVE-2024-28042.json) (`2024-05-15T18:35:11.453`)
|
||||
- [CVE-2024-28087](CVE-2024/CVE-2024-280xx/CVE-2024-28087.json) (`2024-05-15T18:35:11.453`)
|
||||
- [CVE-2024-34082](CVE-2024/CVE-2024-340xx/CVE-2024-34082.json) (`2024-05-15T18:35:11.453`)
|
||||
- [CVE-2024-3483](CVE-2024/CVE-2024-34xx/CVE-2024-3483.json) (`2024-05-15T18:35:11.453`)
|
||||
- [CVE-2024-3484](CVE-2024/CVE-2024-34xx/CVE-2024-3484.json) (`2024-05-15T18:35:11.453`)
|
||||
- [CVE-2024-3485](CVE-2024/CVE-2024-34xx/CVE-2024-3485.json) (`2024-05-15T18:35:11.453`)
|
||||
- [CVE-2024-3486](CVE-2024/CVE-2024-34xx/CVE-2024-3486.json) (`2024-05-15T18:35:11.453`)
|
||||
- [CVE-2024-3487](CVE-2024/CVE-2024-34xx/CVE-2024-3487.json) (`2024-05-15T18:35:11.453`)
|
||||
- [CVE-2024-3488](CVE-2024/CVE-2024-34xx/CVE-2024-3488.json) (`2024-05-15T18:35:11.453`)
|
||||
- [CVE-2024-3892](CVE-2024/CVE-2024-38xx/CVE-2024-3892.json) (`2024-05-15T18:35:11.453`)
|
||||
- [CVE-2024-3967](CVE-2024/CVE-2024-39xx/CVE-2024-3967.json) (`2024-05-15T18:35:11.453`)
|
||||
- [CVE-2024-3968](CVE-2024/CVE-2024-39xx/CVE-2024-3968.json) (`2024-05-15T18:35:11.453`)
|
||||
- [CVE-2024-3970](CVE-2024/CVE-2024-39xx/CVE-2024-3970.json) (`2024-05-15T18:35:11.453`)
|
||||
- [CVE-2024-4200](CVE-2024/CVE-2024-42xx/CVE-2024-4200.json) (`2024-05-15T18:35:11.453`)
|
||||
- [CVE-2024-4202](CVE-2024/CVE-2024-42xx/CVE-2024-4202.json) (`2024-05-15T18:35:11.453`)
|
||||
- [CVE-2024-4357](CVE-2024/CVE-2024-43xx/CVE-2024-4357.json) (`2024-05-15T18:35:11.453`)
|
||||
- [CVE-2024-4622](CVE-2024/CVE-2024-46xx/CVE-2024-4622.json) (`2024-05-15T18:35:11.453`)
|
||||
- [CVE-2024-4837](CVE-2024/CVE-2024-48xx/CVE-2024-4837.json) (`2024-05-15T18:35:11.453`)
|
||||
- [CVE-2024-30055](CVE-2024/CVE-2024-300xx/CVE-2024-30055.json) (`2024-05-15T20:15:11.047`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
103
_state.csv
103
_state.csv
@ -229320,6 +229320,7 @@ CVE-2023-40293,0,0,3e91b40761ee299655829605f60c684af2a5be7622d2e61ae3ccedf339529
|
||||
CVE-2023-40294,0,0,d4bd6509d5c1ac7e980af451b8a70fd7d25239a642ad089d43c8d5295f4c19e4,2023-08-21T17:25:38.010000
|
||||
CVE-2023-40295,0,0,a743eadcf15cc96af9c3861d2210341230395528d845a64c1ccef9069b916475,2023-08-21T17:35:53.970000
|
||||
CVE-2023-40296,0,0,6fa5b6a6cc075360dfd806c6ac6e24533f004f65081952e873daa3d057118e65,2023-08-22T16:26:40.227000
|
||||
CVE-2023-40297,1,1,e62d2327e729521dda43bbd10b29ddfb3c1f9e9a9de6f06ccce8d75e4976cad5,2024-05-15T20:15:08.767000
|
||||
CVE-2023-40299,0,0,c403d355d03425836ef9677b0a19b2c1f60383456e53bb25ea5048d388ab5ab5,2023-10-12T17:32:03.607000
|
||||
CVE-2023-4030,0,0,d357275122959a0f2477f9ecad7a5c2fbfddb1530041a10f12b3e5e5399828d2,2023-08-24T20:29:39.293000
|
||||
CVE-2023-40300,0,0,12b768d230215ee821727c2018b2bf2ec81a405ef96ae608fc36f431cdf69658,2023-12-12T18:55:01.573000
|
||||
@ -238285,7 +238286,7 @@ CVE-2023-5933,0,0,b2dc47ea60178dce229171efc17286a9a55ba1bc64b7b2f8288caea3b27b5e
|
||||
CVE-2023-5935,0,0,81f95d21b7b94dd1eb3e20596c297bdbc3dd4848319eaaded7d3d980ed63f6db,2024-05-15T16:40:19.330000
|
||||
CVE-2023-5936,0,0,5583f504e014a609ffa35d8b6201fa07340f6f24825dc96039f92040f0a2fc42,2024-05-15T16:40:19.330000
|
||||
CVE-2023-5937,0,0,f573ce14ccf02e11266a0930261acb30e0788b26c797d69ab598918a1f4f9ebc,2024-05-15T16:40:19.330000
|
||||
CVE-2023-5938,0,1,433a731ff307f200afe94e480886c553e321402c80fed8a46cedf3f46d71c801,2024-05-15T18:35:11.453000
|
||||
CVE-2023-5938,0,0,433a731ff307f200afe94e480886c553e321402c80fed8a46cedf3f46d71c801,2024-05-15T18:35:11.453000
|
||||
CVE-2023-5939,0,0,df30bba0057ad768b860073ac619e1d98f9a50f696bcc39965da02846f053a07,2024-01-04T18:41:13.330000
|
||||
CVE-2023-5940,0,0,a96f1dd9e0c7bdaa0639d108ff3eb2bb7ebf848c0013a388fa5ecd323f3843ba,2023-12-13T17:39:17.437000
|
||||
CVE-2023-5941,0,0,0d4c6bc97b5579529ae556c93551e474467a1cc1b4a0ed7961a3178ffe37a698,2023-12-14T10:15:08.630000
|
||||
@ -239402,7 +239403,7 @@ CVE-2023-7250,0,0,fa224a4f893e1e2e50282b2f218d1652024c983faf50d7c13dc5c8e5ec9643
|
||||
CVE-2023-7251,0,0,73fa31f7b11a2c8f7785ccd98b3beff89a3869cfbe5b74910fb2dd1341267135,2024-03-26T12:55:05.010000
|
||||
CVE-2023-7252,0,0,2392d7e3f3e585dc7390c0e965b0650ef11fa8ae2796aaf6e5db491d8ab57d29,2024-04-22T13:28:43.747000
|
||||
CVE-2023-7253,0,0,6000cb96a7cdff75b79b770b4fe76bc65674b2e521cea85c3d83d19816bdddbc,2024-04-24T13:39:42.883000
|
||||
CVE-2023-7258,0,1,4640d21b8f3b1e2c63db46c55b88ec973130a40e864e043f94398430f0c06052,2024-05-15T18:35:11.453000
|
||||
CVE-2023-7258,0,0,4640d21b8f3b1e2c63db46c55b88ec973130a40e864e043f94398430f0c06052,2024-05-15T18:35:11.453000
|
||||
CVE-2024-0007,0,0,3bebeca11ed66b29340ad5b2f4a6fdda381d640f217ed7214dda7d3a471e9da1,2024-02-15T06:23:39.303000
|
||||
CVE-2024-0008,0,0,db70626ccf03b2491d218a1d6d38cb10870a351e02a617fba1e6e23a0ac8502b,2024-02-15T06:23:39.303000
|
||||
CVE-2024-0009,0,0,a481cbe6336f9e8c7286d10d3efcc3169667e3db231d83fec3fad506beda4652,2024-02-15T06:23:39.303000
|
||||
@ -241150,9 +241151,9 @@ CVE-2024-20252,0,0,b3e7ab7affd116881816a7adc1b9a82671c5b4da83512a13f8133ebc1b35c
|
||||
CVE-2024-20253,0,0,d3a8e74c395d6dc3e7ac6947f74fcfd7abc559db9a2a5673b58b5d97e64fbd4a,2024-02-02T16:15:53.893000
|
||||
CVE-2024-20254,0,0,483b1bcc903a1f3fe5774e73017e3920b0d7ed3bc82e804e2d29798a514160f0,2024-02-15T15:54:33.153000
|
||||
CVE-2024-20255,0,0,4c8067b6b3b68c94894b4ecd8c182992b7e2d67f936be466104b1472a1d76a79,2024-02-15T15:54:19.960000
|
||||
CVE-2024-20256,1,1,b0dd789612b602052ef2f31485ad5ace974daa07ff42f3a5fb8888aea29b2994,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20257,1,1,b53819264bd51765687f1bbea48604ce7c247cba64f273330beefab6a49de0ca,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20258,1,1,7e0281275342a4241ab1f67f44548dd6cb6ea6363247f2ca0cdb423f16f0e942,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20256,0,0,b0dd789612b602052ef2f31485ad5ace974daa07ff42f3a5fb8888aea29b2994,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20257,0,0,b53819264bd51765687f1bbea48604ce7c247cba64f273330beefab6a49de0ca,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20258,0,0,7e0281275342a4241ab1f67f44548dd6cb6ea6363247f2ca0cdb423f16f0e942,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20259,0,0,73ab78da8d0a510423d7dde4580b3cd86ea36933046212658a9baf6cc1c10b54,2024-03-27T17:48:21.140000
|
||||
CVE-2024-2026,0,0,5071705b646dd74094af5cbedc0c8f83ed6481f03743c4a8c8e638254d8625b5,2024-04-10T13:23:38.787000
|
||||
CVE-2024-20262,0,0,0f454f18496ee5ef2600ffeec90b1f623047ba774ff76b9352de48c47d8ed167,2024-03-13T18:15:58.530000
|
||||
@ -241225,18 +241226,18 @@ CVE-2024-20357,0,0,3a1d2757f67674d091902d27d845115a7046a8d266fe0b3daa6615e60c820
|
||||
CVE-2024-20358,0,0,a08433ecd9375b9385be343adba44e1b907ae2f57b9c630ccf362a5c87517062,2024-04-30T14:47:57.753000
|
||||
CVE-2024-20359,0,0,103c2bc1c6783d5aa055ed80504c27ea24cb5bf5556deb17c85950666ec17e99,2024-04-26T15:25:02.773000
|
||||
CVE-2024-20362,0,0,0e125a5f57daca09b3a31c24c5285918bb46201f033defe636102ce0379b9ecc,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20366,1,1,3c3610af9b81661c93f19efcd99e3b49e6274e6f71fdc733ec6e8ff70752486e,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20366,0,0,3c3610af9b81661c93f19efcd99e3b49e6274e6f71fdc733ec6e8ff70752486e,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20367,0,0,e44fa9dcd83189ac4bb0284b57ce6be9f7d161e3fd46e74e477fe5fd623ca1b7,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20368,0,0,4814a8127430faf4ae61ecb30b9f4c874f54598057d22bcc8b2ca14f1fefa88a,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20369,1,1,114f4c17a7bd9ac58900a0a37ba8d2c7df45f310ac4ea9f52d75d3d1b6987930,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20369,0,0,114f4c17a7bd9ac58900a0a37ba8d2c7df45f310ac4ea9f52d75d3d1b6987930,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20376,0,0,f2d63c495e29c041f088c737c43bc0376762038f0c232e5dc947b16dc2d9b6dc,2024-05-01T19:50:25.633000
|
||||
CVE-2024-20378,0,0,c56331427543a017f67772b9050096817613a232760574cb874b9fcd7b7a2694,2024-05-01T19:50:25.633000
|
||||
CVE-2024-20380,0,0,27a40430fe20b612112590b142958d67807aaab6acdd377d10e76eb25b3ce068,2024-04-19T13:10:25.637000
|
||||
CVE-2024-20383,1,1,ceeddb30ef22193fb87040cbeceb56f942e1176f81db960f5b82d11b7a051d69,2024-05-15T19:15:07.900000
|
||||
CVE-2024-20383,0,0,ceeddb30ef22193fb87040cbeceb56f942e1176f81db960f5b82d11b7a051d69,2024-05-15T19:15:07.900000
|
||||
CVE-2024-2039,0,0,4f1e5a8a814f51edc0234cc5670da2107cc2a93a2ef1eadc628898e3eec44b24,2024-04-10T13:23:38.787000
|
||||
CVE-2024-20391,1,1,23208b722cbec0fe0bcc97ff800afcbfc01e9218747bbaec63dfa6fb2c457339,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20392,1,1,68ce5e0c88f12b888365e155a5ef33213deaaec600edba3211e7ebff5e44a0a7,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20394,1,1,8f49f910e0be2f8c15f8cb5e1959b54a9b81cda2ced34ad7d46b8621bbfc2ab5,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20391,0,0,23208b722cbec0fe0bcc97ff800afcbfc01e9218747bbaec63dfa6fb2c457339,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20392,0,0,68ce5e0c88f12b888365e155a5ef33213deaaec600edba3211e7ebff5e44a0a7,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20394,0,0,8f49f910e0be2f8c15f8cb5e1959b54a9b81cda2ced34ad7d46b8621bbfc2ab5,2024-05-15T18:35:11.453000
|
||||
CVE-2024-2041,0,0,f285d116ebee20fb02fc2c7de4f69fe8567e76fe9eda446fb7969801431b3d7d,2024-05-06T14:15:07.747000
|
||||
CVE-2024-2042,0,0,67e98a9ddaa62c913ab5a6b6d5de4b0b93571e9b9955fcfed7d86ddfd42889ed,2024-03-17T22:38:29.433000
|
||||
CVE-2024-2043,0,0,460bc52876e8486363c6c006eee49a91636701c262b01e4f4016a237e9fb24ba,2024-05-02T18:00:37.360000
|
||||
@ -244209,7 +244210,7 @@ CVE-2024-25739,0,0,3f77808e2a48c50aab928b0c96b70686e724f3302ff450f04c0ab77d04e27
|
||||
CVE-2024-2574,0,0,bb9537e11e6b08d3b85900eb213f5c041b817e4a7c01b1325f1847f41c652182,2024-05-14T15:19:55.943000
|
||||
CVE-2024-25740,0,0,e49082457da2ca822066645fd01741e2b46dee6a85b6e915fd169e8229594e99,2024-02-26T21:11:27.837000
|
||||
CVE-2024-25741,0,0,f1234f859d02ff2a7aa2753dc2a1e43b929acf864167d8c3c5522f3098d24837,2024-02-12T14:20:03.287000
|
||||
CVE-2024-25743,1,1,37902cd6ceb18dc7f5198dc1c50c8c984eab5fa3022e6df53dcc7738f6794e13,2024-05-15T18:35:11.453000
|
||||
CVE-2024-25743,0,0,37902cd6ceb18dc7f5198dc1c50c8c984eab5fa3022e6df53dcc7738f6794e13,2024-05-15T18:35:11.453000
|
||||
CVE-2024-25744,0,0,4b0b476da30d39c3d73f2f74d7d6a3fe7e372d371ce439923d15b6b4e22ccfeb,2024-02-12T14:20:03.287000
|
||||
CVE-2024-25746,0,0,6272a47b2c23f44a1fdd2c4a804d33aa59797a37bb203c19911b0f26f1951dd8,2024-02-23T02:42:54.547000
|
||||
CVE-2024-25748,0,0,beca6aa38f2f4693ac0e2f34d593b69359263cf9d72b56c066509cc509297ece,2024-02-23T02:42:54.547000
|
||||
@ -245348,6 +245349,8 @@ CVE-2024-27236,0,0,050a1052e26047f2e5d0b58d8351e3e856ec1c52f1b2daf95f02084addfb0
|
||||
CVE-2024-27237,0,0,c9df1e7ac4a8ec03918c32a86c9c817e799f7110838b8d32905600c71cb57808,2024-03-12T12:40:13.500000
|
||||
CVE-2024-2724,0,0,d84af29dc771f15bf9bc747f8064ec43ed6ea62cecc1d0bdf5353519ea88d1ba,2024-03-22T15:34:43.663000
|
||||
CVE-2024-27242,0,0,4bcf7143849c415b8cba90784829de5a74333601b3e2c00d25c6430d064be462,2024-04-10T13:24:00.070000
|
||||
CVE-2024-27243,1,1,e44f20f525e45fccb02d77d3a6200843def346a565e57649276c04506a3f5eb0,2024-05-15T21:15:07.987000
|
||||
CVE-2024-27244,1,1,c6337efca1fe10fb443e4701968ffd92ffe4a5ff6932dae35f9eb59e356d64a3,2024-05-15T21:15:08.220000
|
||||
CVE-2024-27247,0,0,9590a32000c7161883bd601f17b84889ac73a7794287ae1fd94cd04419528997,2024-04-10T13:24:00.070000
|
||||
CVE-2024-2725,0,0,f5993e44d4dd2cf17ff419f8f154eb7cefc4802f6428c3ec1541fed0378bb103,2024-03-22T15:34:43.663000
|
||||
CVE-2024-27254,0,0,6863e2c846e99549e249a94dae3c18d1781ed3b7e7fcc2d6019a28e44086daf5,2024-04-03T17:24:18.150000
|
||||
@ -245518,7 +245521,7 @@ CVE-2024-27575,0,0,fe78cdbfc48ba2557faf61957a122c11738e27bfad3d91860b0cc50d57150
|
||||
CVE-2024-2758,0,0,17991f9023170386d082f67ecd28c59f739c4b241c4acc5ac889665593ad11b4,2024-05-01T18:15:19.300000
|
||||
CVE-2024-2759,0,0,cb410b99122b16bbafd55e196fc83701c95bae09fba9353767401f5fe587c56c,2024-04-04T16:33:06.610000
|
||||
CVE-2024-27592,0,0,1ee880de3a9d61f4b25b2b3ac56dc03f1e8964452682bc0959dc8a13f2b2c67c,2024-04-16T23:15:08.690000
|
||||
CVE-2024-27593,0,1,bc7852c90f4f5b0f7f04ef845ab44a5b18bd065a2574fd35b8d203f7b3a647c7,2024-05-15T18:35:11.453000
|
||||
CVE-2024-27593,0,0,bc7852c90f4f5b0f7f04ef845ab44a5b18bd065a2574fd35b8d203f7b3a647c7,2024-05-15T18:35:11.453000
|
||||
CVE-2024-2760,0,0,a061be605bfdf89df12f7caacd6b7263c7034257ee7260474dff7d3e633c6b9d,2024-04-23T12:52:09.397000
|
||||
CVE-2024-27602,0,0,641d004f193cbc187bf560868353a5607871444565457a2a1f222c57bafe0082,2024-04-03T12:38:04.840000
|
||||
CVE-2024-27604,0,0,5dd90a20288c95f7805059ddcbf501c6de9e3b933a16f752b43bf101ed5f2058,2024-04-03T12:38:04.840000
|
||||
@ -245764,7 +245767,7 @@ CVE-2024-28039,0,0,9ef35c96ff38e007b2fd4f37c3f1f5b6d35461c4eaa69f2b36faccd438b26
|
||||
CVE-2024-2804,0,0,e0bc04f900a999f4a26367b15f33e067e2f6beed81e7fe017505f263f65dfc77,2024-04-10T13:23:38.787000
|
||||
CVE-2024-28040,0,0,92dbc878ad6b57fc9235f8005b7929f517428204d8ea6a98b01d4757cc97218d,2024-03-22T12:45:36.130000
|
||||
CVE-2024-28041,0,0,4d284a807f7da2d3fcf5f7c7ae19f2272c31bf9662bccbca7ea6b863e800e974,2024-03-25T13:47:14.087000
|
||||
CVE-2024-28042,0,1,568c7e6609303186ee4d31cfad1af77c468d67824da92bcbd2f8e5b9c8c02e04,2024-05-15T18:35:11.453000
|
||||
CVE-2024-28042,0,0,568c7e6609303186ee4d31cfad1af77c468d67824da92bcbd2f8e5b9c8c02e04,2024-05-15T18:35:11.453000
|
||||
CVE-2024-28045,0,0,f398328ae0e32872e31247004b322ba0fa2d2bf6f860a8ec81e7f59b3326d256,2024-03-22T12:45:36.130000
|
||||
CVE-2024-28048,0,0,e5666138598204bcf10d324dcf85f36b61e34128f66eec1b98b8c785274aa0cf,2024-03-26T12:55:05.010000
|
||||
CVE-2024-2805,0,0,65ecd352418838698058c0251e8b8046382b22c77fa2bf4cbfab1f489cceac98,2024-05-14T15:20:55.190000
|
||||
@ -245784,7 +245787,7 @@ CVE-2024-28076,0,0,573150dd6c1cd2ebee3e74b864dba3fbe351c8f7cfb57fda1c213b0f2a3ae
|
||||
CVE-2024-2808,0,0,0ddc0efb07baf1abf1c2622a6109caa29a4eab8dbb700e58539ddfe8d8656fb4,2024-05-14T15:20:56.390000
|
||||
CVE-2024-28084,0,0,e855eaf3201adbee7f29bca688e63324787cf32844050753a9cd1965f8c4b542,2024-03-23T03:15:11.583000
|
||||
CVE-2024-28085,0,0,f3746c3ddd8d0352f413aa7741d83f5b369ac18a2feb54c8be56427b7c5d5c29,2024-05-01T18:15:16.630000
|
||||
CVE-2024-28087,0,1,57c137f6465d01ad9e26bb9e81229401ea6d3209e391354de557e42e58ac6c64,2024-05-15T18:35:11.453000
|
||||
CVE-2024-28087,0,0,57c137f6465d01ad9e26bb9e81229401ea6d3209e391354de557e42e58ac6c64,2024-05-15T18:35:11.453000
|
||||
CVE-2024-28088,0,0,d2f20b1069b24ba10d21e8bf3b61c2c6a1c6b345ff59786676752b80abbde7a4,2024-03-13T21:16:00.380000
|
||||
CVE-2024-28089,0,0,ebb0921cb9fb93aeb61f55f441ccf2f84797f1edc4a13bbbf59b2589f6308e97,2024-03-11T01:32:29.610000
|
||||
CVE-2024-2809,0,0,f8db6f0d3888771d61b3d045937990f324a2616ff4993d7cb8260fa12f281628,2024-05-14T15:20:56.780000
|
||||
@ -246859,7 +246862,7 @@ CVE-2024-30050,0,0,6cc63ca41548c168dfe0a918b16bc61670b8e886b85ca3011dc326ba16526
|
||||
CVE-2024-30051,0,0,a4d312757bf10e98fc5abde48385ae5800bd3f734365fd985fcda1767b1f318b,2024-05-15T01:00:02.933000
|
||||
CVE-2024-30053,0,0,e35815c7138ab1a7098545e5c1f60270a71687b75ca8293c4e18b251852decd3,2024-05-14T19:17:55.627000
|
||||
CVE-2024-30054,0,0,0a03f044a7097f59453921f002025a6e0ea1442fa3989cfe0a7dc7863bbd74d0,2024-05-14T19:17:55.627000
|
||||
CVE-2024-30055,0,0,ea5af506f93723b5b522e6509b55c3faab44e1e96792f001de97fc266cf47da8,2024-05-14T16:13:02.773000
|
||||
CVE-2024-30055,0,1,3c1bf54fd3fe6c5ab3703162f359c88c3cd7915d8f1fdb651cdd28bec89280a6,2024-05-15T20:15:11.047000
|
||||
CVE-2024-30059,0,0,641bfe1fd5037a786b7946fc4a87eacdde994549eb26a51143ba04c7be98fba1,2024-05-14T19:17:55.627000
|
||||
CVE-2024-3006,0,0,9040253cbc6508390736e1481a4bf2fb025630f8a64b9e7a311033e723677258,2024-05-14T15:39:44.300000
|
||||
CVE-2024-3007,0,0,d1ce0225ebf6de374a1afad6b25cd532199967321f1b7a3dc00faa6df881ee0b,2024-05-14T15:39:44.623000
|
||||
@ -247628,7 +247631,9 @@ CVE-2024-31392,0,0,e47fa59932bfeb069e43bdeea717668f4f8eb0beb6cf866b3eeac98c4b5a7
|
||||
CVE-2024-31393,0,0,37f7a5992221d6bde3095665f91d96a5b3c012db649e1c1c87f1a16619b63290,2024-04-03T17:24:18.150000
|
||||
CVE-2024-3140,0,0,2744d4fc444c3f2c4374003cc63b6e233618c3b69d8d4c39689a5f4bd63a4f88,2024-05-14T15:40:01.177000
|
||||
CVE-2024-31406,0,0,21585692d302884cf3150faa716f097a2673ce3764bdf3b78bdfd36f438a0484,2024-04-24T13:39:42.883000
|
||||
CVE-2024-31409,1,1,75121b5fd6befad9837845a75d72c51008b62cb175e0851e507e0f538bc5ad0d,2024-05-15T20:15:11.203000
|
||||
CVE-2024-3141,0,0,bad35b74388efc9a159a74689bd08287dcf312f9e2c82d7b8d2698820a1f4d16,2024-05-14T15:40:01.717000
|
||||
CVE-2024-31410,1,1,62f60a42e8c97728999144148612a776755f39d5a3f19a64a21e380500f53c38,2024-05-15T20:15:11.473000
|
||||
CVE-2024-31412,0,0,bf5e4b7125888123ed114d5a41d3a9e2f2c13a81227e8af339e531675aae10d6,2024-05-01T19:50:25.633000
|
||||
CVE-2024-31413,0,0,698cad7cc2e917bb34bb0c2eff1e375ca818f5fcbe8e16911c403ef0fbd2428b,2024-05-01T19:50:25.633000
|
||||
CVE-2024-31419,0,0,36c8a60658bbd6b33e2cacab3bae7069924fea2c95b1bfd68ef2a5a438c0a6d2,2024-04-03T17:24:18.150000
|
||||
@ -247788,7 +247793,7 @@ CVE-2024-31816,0,0,8b0edd8a38c33b33b513f099b5e67906c887d32cd0308b5fdfadcac29bc21
|
||||
CVE-2024-31817,0,0,440a95dbf8589f9a9953a43f37d15f507abb02f786409b55238dedab4fef773a,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31818,0,0,72cb9554b67c0af94ffbc580efc3a62e49e452a23305845c2a6157eaa69b0f7f,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31819,0,0,1f8122b9110b9c9e379686153d36743829cf8787fef8a8a1bf73fc202035f197,2024-04-11T12:47:44.137000
|
||||
CVE-2024-3182,1,1,6c8175e2d6a5adec87d6a333f1946440d4dd82fdc394055a831d749195152d50,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3182,0,0,6c8175e2d6a5adec87d6a333f1946440d4dd82fdc394055a831d749195152d50,2024-05-15T18:35:11.453000
|
||||
CVE-2024-31820,0,0,53a16faaf48888346903fcbd57d0be6b6e997c7cc9b808188a566b0da0cce561,2024-04-30T13:11:16.690000
|
||||
CVE-2024-31821,0,0,c569fd754a13100f99a004a097455b073140e65e59c749e53df718879b6f98c3,2024-04-30T13:11:16.690000
|
||||
CVE-2024-31822,0,0,39f03d3ff200c72017a27779b734a3b0a55aa46362d194ac94877ae191a015e0,2024-04-30T13:11:16.690000
|
||||
@ -247804,6 +247809,7 @@ CVE-2024-3185,0,0,7fcf61647d547b77181d5225cd4d3f1f2099e2653d1cd7f2d6fbb610b985c0
|
||||
CVE-2024-31850,0,0,4dfa9605a049a09744618be099ad889f274ff40fc42a18e168685588a6a44b6d,2024-04-08T18:49:25.863000
|
||||
CVE-2024-31851,0,0,0e8250a21123e214b1f09f2b325f0d0e22e98cb6715480d7ac13d673f761eb46,2024-04-08T18:49:25.863000
|
||||
CVE-2024-31852,0,0,7a968282e2d23775fda0d6edce03c38caf21ca868b2fca3251339d962c2ec4c6,2024-04-08T18:49:25.863000
|
||||
CVE-2024-31856,1,1,2fb6a67e4bccfcb957f4ff072409a4238fd92fa1a8ccff2d33cdd48ef9d0d60d,2024-05-15T20:15:11.710000
|
||||
CVE-2024-31857,0,0,3e7ac60afeec75094fbcaec8b53e1a238b7bcb05ca078ef7a1edb4dbe4dfc654,2024-04-23T12:52:09.397000
|
||||
CVE-2024-31860,0,0,a2cd98cb7498e7c2656edd8e2839918c590dac3d691d82a031a70fae29aab7e2,2024-05-01T18:15:23.393000
|
||||
CVE-2024-31861,0,0,9373eb863c6ff79969ca8cd07d1a0b13ff0cef9f98ab0a21b4aa070f1acd5bf4,2024-05-01T18:15:23.450000
|
||||
@ -247914,10 +247920,13 @@ CVE-2024-32039,0,0,ad4990c66c843cfb78c18ddf4863c9df097d3c92a62d93c490b95501745f6
|
||||
CVE-2024-3204,0,0,bc0f1978e5e6211ff53bd820ee230ce63d55ef94ae9e4225c8cae3bc2ba7740b,2024-05-14T15:40:27.180000
|
||||
CVE-2024-32040,0,0,c9e8a9bafebd4e002463be520ee967b3c928ddf4cec6865e7aa23fa1d81b2834,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32041,0,0,e88f61c8c702a5d00724562a1be23c2ca0fc9ec03e84f95db2dfed035982cfb4,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32042,1,1,18f96607196f60df563ea4d0006bcb08eebbb7c581c1ac075c7d9087f3444b53,2024-05-15T20:15:11.950000
|
||||
CVE-2024-32046,0,0,3771b70436f95435fc521db21da6fd859bb3ed607b3e6e7edd188445267746f3,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32047,1,1,81aa201d8f391c623ace611d56c3632457de0b4fca5b72f90454ed1713dff2dc,2024-05-15T20:15:12.197000
|
||||
CVE-2024-32049,0,0,d9cad06fbf5a30eecb78b22409f73f445b96767def965004d9fc51455fda8ca6,2024-05-08T17:05:24.083000
|
||||
CVE-2024-3205,0,0,10c74c58b3966e2a00c16f7270bdcbd811aa5b381e01a238860c78cea2b79c84,2024-05-14T15:40:27.550000
|
||||
CVE-2024-32051,0,0,6b68078466255ceca82525e73c2bf321431fb4aeacd1939a9b40ac3cfa9637f8,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32053,1,1,4aad82d61cd1c4047b29c959274705961fb06a479ecc985fe1208eb7f2f4de71,2024-05-15T20:15:12.443000
|
||||
CVE-2024-32055,0,0,3f8e8a5289d54fb272f8396bfe2ad3739e217a3be6adbbeaee8406791320efbb,2024-05-14T19:17:55.627000
|
||||
CVE-2024-32057,0,0,51b57062e41a1f932a85024c46a8a2ec9ea669d7244ddac01bd3050c5649adf5,2024-05-14T19:17:55.627000
|
||||
CVE-2024-32058,0,0,53257fd9b340d779398d943b31a969b49b3889080b3875550678d88fe76d1bbe,2024-05-14T19:17:55.627000
|
||||
@ -248703,7 +248712,9 @@ CVE-2024-33604,0,0,3ab2c002c5d377b142c243de99829b91e6a82788bf0b2eb8f577e38ce442a
|
||||
CVE-2024-33608,0,0,75bd6a7cfea3f46ff885a646fe991c9389ed68527f615bf970851ddf524ca214,2024-05-08T17:05:24.083000
|
||||
CVE-2024-3361,0,0,987fc9016e6caaea2a05e0ecaac54b996dc88be59c54c7758912ef93d8b301eb,2024-05-14T15:40:45.990000
|
||||
CVE-2024-33612,0,0,0425b598952d370f8a45e51ed1855ee3ad8884230e79284f598bf766f7d5da62,2024-05-08T17:05:24.083000
|
||||
CVE-2024-33615,1,1,ecf057e01e02da48e43be47a3267679fd8628e752ae9702d34b92a2ff396f4a4,2024-05-15T20:15:12.687000
|
||||
CVE-2024-3362,0,0,6ecfba6acd565e85eacdb7075415486f6ca2cf37583c56497e03b226e597b508,2024-05-14T15:40:46.150000
|
||||
CVE-2024-33625,1,1,5178fcf8dfcf7ff7b204eb214114f384509c97b72381770cf1a5dd5cf54c62d7,2024-05-15T20:15:12.927000
|
||||
CVE-2024-33627,0,0,46d1ca344f6adedbf698f1c5642ffd1e81c65d9ee122179e4726e5c233352e37,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33629,0,0,9c289386a90a37d7a3105c6378e86670a64a304277cc6973b5fc7ab9cb833007,2024-04-29T12:42:03.667000
|
||||
CVE-2024-3363,0,0,3541abf9d89d8ffa40b51384a23b6439efdfda78eac97dfab7c1dcd2ccb27dba,2024-05-14T15:40:46.557000
|
||||
@ -248887,6 +248898,7 @@ CVE-2024-3400,0,0,bb755e0acb269b886784f5549d850dac352a6e059a8f5cb5827539d3e41b8b
|
||||
CVE-2024-34010,0,0,c31f2f180475c1f3f2204c1feb2010c5ada948eb1b4d37517c54f97316341f08,2024-04-30T13:11:16.690000
|
||||
CVE-2024-34011,0,0,4e2e0fb5d64e6e75da5ff3561c6f86ff1f891a3646e890e015512c561d328a58,2024-04-30T13:11:16.690000
|
||||
CVE-2024-34020,0,0,9d9b11f4db84c3770acd92b1150bad9b802c58de4fce781bba37a89c232e029f,2024-04-30T13:11:16.690000
|
||||
CVE-2024-34025,1,1,efef57ec9aa0e082e9a5c83219cb61ece32e743eacd52a5ecd541daf92a87dd0,2024-05-15T20:15:13.190000
|
||||
CVE-2024-34031,0,0,32832cbb1e8c12d82b1b4f0b17dd8da5298483e844da3b9dfde76f943f816f64,2024-05-03T12:50:34.250000
|
||||
CVE-2024-34032,0,0,5a4c84545c086e02a753cbdc2a69955417aff416961e34fcc07fc6e9fddc4770,2024-05-03T12:50:34.250000
|
||||
CVE-2024-34033,0,0,719a8ff9b4eb14602d2888920177741310f8b0330069ca799cf076b91625a4df,2024-05-03T12:50:34.250000
|
||||
@ -248919,7 +248931,7 @@ CVE-2024-34078,0,0,82828053870f4925c57756113c35390ae666a52c7685f7de8391ec7c16f1a
|
||||
CVE-2024-34079,0,0,9fcb0ad4a3dfcb1ea318cd4910e18003a9a5afbe5b2fb94481c76cdbd73faadd,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34080,0,0,31511bc199a6f2ff58d809d178822180b69f7a01cc54f423d19f4303cc5c9823,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34081,0,0,e1e1e5fa3e03beaf407cadde441648651a034f36cd3c66a34f4de6854261c6dc,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34082,0,1,dfcfb42195688d761efac33b725f89283a0ee86d0d1c124a1f7eb69250a70c25,2024-05-15T18:35:11.453000
|
||||
CVE-2024-34082,0,0,dfcfb42195688d761efac33b725f89283a0ee86d0d1c124a1f7eb69250a70c25,2024-05-15T18:35:11.453000
|
||||
CVE-2024-34084,0,0,3472cf0a3060d39e1085c2356da46bf3f00aecf0dd516fa3a42f335f20a49f9d,2024-05-07T20:07:58.737000
|
||||
CVE-2024-34085,0,0,d83738fa0c2a322f0cb71130623850a2b6a31059d871027b26253eaf9e4bb5fd,2024-05-14T19:17:55.627000
|
||||
CVE-2024-34086,0,0,c2ccb7f5604719631c62cb46c494b7e7a3c3f8dacc5c8c6ad647f8150087c2bd,2024-05-14T19:17:55.627000
|
||||
@ -249230,16 +249242,19 @@ CVE-2024-34823,0,0,737c5995b3eabe424ea36d114ec1a1d3c39830934d7abcd5d0d3c17fbd538
|
||||
CVE-2024-34825,0,0,6ba1ce532bfd92191eb86f87183f51a75f938fb2026554a0d94db57766c13bfd,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34827,0,0,ec3b4bec9ac3936112ec0f5ade0d9f415950617463511cbea94e2ae26286d697,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34828,0,0,9c80d5b75e8365d647d79189b0dcedf971cc9e925e8468faddbfc0a85ec25e3d,2024-05-14T16:12:23.490000
|
||||
CVE-2024-3483,0,1,427fe5c7afe21571985090a3e61d2dfd832c806066e0f05497be971746e1a0ea,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3484,0,1,eca82b2b79c9812d5f85e32cebf89030f3b45a4b466571083f5222acfb8150bb,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3485,0,1,d37df2823d4b30e0edd74bea10436beccdf4d8f8ab754078c59bdfe32b09cd12,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3486,0,1,9d5afe379cd99633f59e6221033e894c2df3adb2ee4d60a572c8e4ee81c5dba3,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3487,0,1,c7132b6420a5077c5f8de0d217cf5f82271148747d4fe614f8f6800a4f4b117f,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3488,0,1,d6ddf0f923c322dee9b1adbf84db0f6fa06c73b8cc2a3ea94ab21e4aa0e42100,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3483,0,0,427fe5c7afe21571985090a3e61d2dfd832c806066e0f05497be971746e1a0ea,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3484,0,0,eca82b2b79c9812d5f85e32cebf89030f3b45a4b466571083f5222acfb8150bb,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3485,0,0,d37df2823d4b30e0edd74bea10436beccdf4d8f8ab754078c59bdfe32b09cd12,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3486,0,0,9d5afe379cd99633f59e6221033e894c2df3adb2ee4d60a572c8e4ee81c5dba3,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3487,0,0,c7132b6420a5077c5f8de0d217cf5f82271148747d4fe614f8f6800a4f4b117f,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3488,0,0,d6ddf0f923c322dee9b1adbf84db0f6fa06c73b8cc2a3ea94ab21e4aa0e42100,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3489,0,0,407fc99ac607d8b254895aa9dc68afca4c0fff929cb004325e3c06bd83280a91,2024-05-02T18:00:37.360000
|
||||
CVE-2024-34899,0,0,a85a36cd499c09d94efbeda56212d2ba58c2478d4fddc573ece3a4dbf1232e63,2024-05-14T16:12:23.490000
|
||||
CVE-2024-3490,0,0,243d31a8a91d548ae7245abd7ab9112de0ee4857a2da5c2f334b7a81fefaf51e,2024-05-02T13:27:25.103000
|
||||
CVE-2024-34906,1,1,47527fcdfd69ac5314a6e330311f17ba651fcfaa2f59fdfa90c62d2e0c088d22,2024-05-15T20:15:13.460000
|
||||
CVE-2024-34909,1,1,18b038e3cd8824227114274d526008cb38f6fd3f1f837d580c42a9692d89eb19,2024-05-15T20:15:13.570000
|
||||
CVE-2024-3491,0,0,155e981c246f1ab173bd75da38bee4b8800ff4b0566c01179dcadac412465c38,2024-04-23T12:52:09.397000
|
||||
CVE-2024-34913,1,1,a53e1bbb348c8d111f61abb25b3cd4602a13f6853d4612e95a84b25de9bcf03f,2024-05-15T20:15:13.657000
|
||||
CVE-2024-34914,0,0,5bc7d29eabf3d60ac7563aebb997ef32f71e2c79c881b0df9620a63718fdc787,2024-05-14T19:17:55.627000
|
||||
CVE-2024-34921,0,0,e6321f463933f9111e0a5517ef67fece2dbb43da2af562174271b850a60b5090,2024-05-14T16:12:23.490000
|
||||
CVE-2024-3493,0,0,63ead7e160b6b2cbd834dd6075f87d345af3361e8d55520f11e81a53e2086aaa,2024-04-16T13:24:07.103000
|
||||
@ -249266,7 +249281,7 @@ CVE-2024-35050,0,0,40188866046a91f191c7f1639193ce449b408a68c45e9e97f9642e7aafb53
|
||||
CVE-2024-3507,0,0,4311efcb171543ec92e46563bc97a34308842d5cb27d2460f854a987393d053f,2024-05-09T09:15:09.623000
|
||||
CVE-2024-3508,0,0,c82390a1238326cf6817e875dca33757792126eb5098bd44b5a908dea5e7149a,2024-04-26T12:58:17.720000
|
||||
CVE-2024-35099,0,0,93e942b92f9cdfe43455da9473fe46e57ccc0e6f1660402d8f3a7786b97c7b2a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-35102,1,1,7da50a60dd60f1e8d0d29c1c6c16eeb50c73c2afd5ccd062fa12f4bca86353d6,2024-05-15T19:15:08.063000
|
||||
CVE-2024-35102,0,0,7da50a60dd60f1e8d0d29c1c6c16eeb50c73c2afd5ccd062fa12f4bca86353d6,2024-05-15T19:15:08.063000
|
||||
CVE-2024-35108,0,0,3f3dd71c8bba83e52560608eda839ceb07358fe0eac2940e38801ea6c4f52fe7,2024-05-15T16:40:19.330000
|
||||
CVE-2024-35109,0,0,22ca550b25f858548d0753bd84153c4f353fa8f289d5d5402f105e17ad6c273f,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3512,0,0,7186c9ec3829c2082fd68b5fc8e23caed587fdf0f4e68c2974db5f41b90fb514,2024-04-25T13:15:51.663000
|
||||
@ -249539,7 +249554,7 @@ CVE-2024-3885,0,0,18d5fcf15976a3d948a4584d141049e724e0352960b62e33e0645d8a5c3912
|
||||
CVE-2024-3889,0,0,c4039354ee4d81ce5faec2ce618c8f0af30c97c1ad1feeb689836cb585b438a6,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3890,0,0,167befe3a418fe829a07bf47548aa5d5c5fe13f91b75a3184f188bef038919b6,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3891,0,0,8daff08d10085680eb7790a9a2c0ef842bf636f7de8dcdfbf7cd60ad81535ead,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3892,0,1,f624bde4016dca03d61765cf880936f8aeb5bf50ea89634973cc6911c089d7aa,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3892,0,0,f624bde4016dca03d61765cf880936f8aeb5bf50ea89634973cc6911c089d7aa,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3893,0,0,44a15b07d473e504956c2fc6e9bdbbb981ef84a8f1b69c702ee1ea4228dd1195,2024-04-25T13:18:13.537000
|
||||
CVE-2024-3895,0,0,e17d122bfb4ca0c486d0790093f87ef90da21ea7556181e7099c23bc52ef24ea,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3897,0,0,2e6547d98bffe49274878683fd846b0dea4d063f5cc123163d759ecec392b068,2024-05-02T18:00:37.360000
|
||||
@ -249572,9 +249587,9 @@ CVE-2024-3955,0,0,bba90f25cff74c274e08a67a3936bf55505a38180fc074269167b54bd09035
|
||||
CVE-2024-3956,0,0,8f179ad85710f95d08b051c8d0b5b2621fe218860be993c193453df1e0f7004b,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3957,0,0,6e4e327328ad5c18e880466a103b162c10591051d90490bf0a67f6889d728425,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3962,0,0,9de964d29f43823164300439a0e71453bbca4a5c1f5767eca51db600267798cd,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3967,0,1,099dcb4e0ea3276e58d4ae59fff4b2d8b43db5590de7a705773810b96cdf9f56,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3968,0,1,611abf2a3aab73b0f2915499615e54e318f5ba5471c6b03989989674a1034421,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3970,0,1,0ab1a85d07ea361613f15ca4850db019bae5b14452cf6d0fe0130701075daa91,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3967,0,0,099dcb4e0ea3276e58d4ae59fff4b2d8b43db5590de7a705773810b96cdf9f56,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3968,0,0,611abf2a3aab73b0f2915499615e54e318f5ba5471c6b03989989674a1034421,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3970,0,0,0ab1a85d07ea361613f15ca4850db019bae5b14452cf6d0fe0130701075daa91,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3974,0,0,be006e5b3616e00e2f4e1e0d6bc008c0eb4e52aea8dc159d27ca65cdb7fbf6cb,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3979,0,0,d8a406849a56e67550abc4fa218f247855beca50c5a748d1d4b81f36623dd46a,2024-05-14T15:42:39.440000
|
||||
CVE-2024-3985,0,0,73586f1cedc99952324792e19f078c055584e6e606f6222ac3907090ad395ced,2024-05-02T18:00:37.360000
|
||||
@ -249693,8 +249708,8 @@ CVE-2024-4193,0,0,e9deeb0bdc41c13676562ca936725d7aeb1ece3758666bf0b3b852acf97adf
|
||||
CVE-2024-4195,0,0,320e8c641dbb71fd3a637ea44d2a1260b2aea61b9d12f44c9e97c80bff500815,2024-04-26T12:58:17.720000
|
||||
CVE-2024-4198,0,0,845a410de3c7b102462b76b86fccfba72df0a0950e69dc55e9742bae00fec8d9,2024-04-26T12:58:17.720000
|
||||
CVE-2024-4199,0,0,cf6d3693370511a3e101e3f64be76698c9597ca550274152fcbac0c1d8ff2663,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4200,0,1,20489663ef6581577b44e2fe00c40941cede013c8a6115f48d1dde72e3c9c743,2024-05-15T18:35:11.453000
|
||||
CVE-2024-4202,0,1,844c9951a48b3e33cafbd80a61570f748c650c80ab93b55d4a680fa3512b0e12,2024-05-15T18:35:11.453000
|
||||
CVE-2024-4200,0,0,20489663ef6581577b44e2fe00c40941cede013c8a6115f48d1dde72e3c9c743,2024-05-15T18:35:11.453000
|
||||
CVE-2024-4202,0,0,844c9951a48b3e33cafbd80a61570f748c650c80ab93b55d4a680fa3512b0e12,2024-05-15T18:35:11.453000
|
||||
CVE-2024-4203,0,0,b9100cb2d762239b42c8cf03df52f7e057bb3e7a71ddd83596d3f071a56b0f43,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4208,0,0,011160616b763d0a5081c6e2be131e6e753a26d85dcf1b2bacf647a83ceef05b,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4209,0,0,d8400e0dd8f4909c53290c35079fb7499a08d2e56ed4f79281678d4505414506,2024-05-14T16:11:39.510000
|
||||
@ -249770,7 +249785,7 @@ CVE-2024-4345,0,0,f00f50139993a52fd7c5e9953c5559186f91d77a99990283e2fa9024cdbc83
|
||||
CVE-2024-4346,0,0,f22ab2b57ab7913e1ee849412772d79e861a170867683be7f674b4f4c1e4df02,2024-05-07T13:39:32.710000
|
||||
CVE-2024-4348,0,0,7ecf9e2f00b440e06f89d6de0f2df4f5974c418de77e873b94dee542bc66d4a9,2024-05-14T15:43:25.100000
|
||||
CVE-2024-4349,0,0,b0d1c3b85ef1776752c2fc81adc9e145cc6f1d929f017c205ea9b4290d878b74,2024-05-14T15:43:26.100000
|
||||
CVE-2024-4357,0,1,33cb7b166449bad445492f17a8c037924e4da5ea5b4742ac02321837721bff0d,2024-05-15T18:35:11.453000
|
||||
CVE-2024-4357,0,0,33cb7b166449bad445492f17a8c037924e4da5ea5b4742ac02321837721bff0d,2024-05-15T18:35:11.453000
|
||||
CVE-2024-4363,0,0,731dcd1f4c4c888e4437518d0f6d54c108b1221ced167b35922e12ec173e95de,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4367,0,0,afc88763d21b72640d447a05ef1cc5bae3b59696ba891e4d36a74743b38e403b,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4368,0,0,0ee02ebde276d817508f5495294b3429c463a1f4241660388e0c329992e72be6,2024-05-04T02:15:06.853000
|
||||
@ -249892,7 +249907,7 @@ CVE-2024-4605,0,0,a4edcc830b87308032d99d0feea9a229ab6e4f42dd443adbf886b62b0aa445
|
||||
CVE-2024-4606,0,0,3cb7c67f52970802d09367b8e1299e023e023c69e85466074593b74325edd330,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4614,0,0,beb5630ff5db8a415fa4bf6f109dad49279ea5965bb91a1d7f892cd406978f05,2024-05-14T15:44:12.883000
|
||||
CVE-2024-4618,0,0,2c2ff682e4ce5d6b8070b11795aac4e89df6536fa089f1d6d721027dca3a2ac9,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4622,0,1,db6b68bd807a8a0ddb358e449d01643070e9098450ab994d9259859922691c59,2024-05-15T18:35:11.453000
|
||||
CVE-2024-4622,0,0,db6b68bd807a8a0ddb358e449d01643070e9098450ab994d9259859922691c59,2024-05-15T18:35:11.453000
|
||||
CVE-2024-4624,0,0,2f2dfaacad2af40d5d5be1945c7dfb7bd2ed3b09b9d237413e46013b6e4c845a,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4630,0,0,9ee39c9e70c3fde26d4ddaa20f9f4583498b5ac1a624dc38857653acd661b1f9,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4631,0,0,e8ed3d07eca49fd9ce5a62406bcf23da9793cbcc792a956665a267b4f25fd693,2024-05-14T15:44:13.487000
|
||||
@ -250008,7 +250023,7 @@ CVE-2024-4822,0,0,aa15929882cb3b183256f12091f4f730b093d0429ec93cc3d87b04f30f0ba3
|
||||
CVE-2024-4823,0,0,8f31bcd40817f289d241c4794563294d4e400345d0538e98840e69ced9022cee,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4824,0,0,12997f7cb79ce3030574eecdb24c333619e16861704962f1656fbd26f7680d48,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4825,0,0,1e0f749d21405e7cf2edd3aac0c05b5f99c8de86001892a511648a80a7280ab0,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4837,0,1,98aa18fa41c916e1bd621beebea0d7870bfc50e824dc02b9686403b5c337ef1b,2024-05-15T18:35:11.453000
|
||||
CVE-2024-4837,0,0,98aa18fa41c916e1bd621beebea0d7870bfc50e824dc02b9686403b5c337ef1b,2024-05-15T18:35:11.453000
|
||||
CVE-2024-4840,0,0,c9ca0895b4a51cab0e2c0d59965d65e29a18e7a3fb86aea7f8e73c28a9d25dc4,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4847,0,0,bba6603a81b56f6d60e806e2e7574571e772d40efe56d1512e7524611ff51b1c,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4853,0,0,08d9956cd1fc82aacd4cc52b553fb1ad7c9d41ecc90cc195f4a6a68d3e7942e4,2024-05-14T16:11:39.510000
|
||||
@ -250020,8 +250035,18 @@ CVE-2024-4871,0,0,8ab16008698c56948c2f0ae8cf729bc698d4cce8f05c254b91a2ba1c9d6200
|
||||
CVE-2024-4893,0,0,8ffb453add192bbe3edd5219a0cc1fecef136881814a15b6a6fff19e64221c30,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4894,0,0,6ac5cb6e261d69ae931137ad62bda7bde45e9f279ec9c4c45067086e1e08f8a1,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4903,0,0,c9b4ffdf46fc8451d7269331919432007ce882add1bc99c6aee19d392a06ed4c,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4905,1,1,c8a95f887e4224ee07a1acc6bff2a43dfef4589e656da09459f2781a65331d7b,2024-05-15T18:35:11.453000
|
||||
CVE-2024-4906,1,1,2c601a955269aafb6830d9cede65bbd366a0f024c1801724d970935df42f3f51,2024-05-15T19:15:08.203000
|
||||
CVE-2024-4907,1,1,3113954bbefa43c45c3595d8fd618aaa69e1f187ec4fb5985c7de73ea2928b89,2024-05-15T19:15:08.607000
|
||||
CVE-2024-4908,1,1,49953f13c6eb1739a4b893e978dfff6e9d81247d9e887ebf79651c9ba7eae5fb,2024-05-15T19:15:08.980000
|
||||
CVE-2024-4909,1,1,33c70ce6259d6da0a92a6c71c0ea14d1539f9c07a708d9f99240c99eb1475c60,2024-05-15T19:15:09.320000
|
||||
CVE-2024-4904,1,1,820f404bd5f1471552c81d52ea4d478ea95c67f4035d4dafb5d9d0ead535fdc0,2024-05-15T20:15:13.750000
|
||||
CVE-2024-4905,0,0,c8a95f887e4224ee07a1acc6bff2a43dfef4589e656da09459f2781a65331d7b,2024-05-15T18:35:11.453000
|
||||
CVE-2024-4906,0,0,2c601a955269aafb6830d9cede65bbd366a0f024c1801724d970935df42f3f51,2024-05-15T19:15:08.203000
|
||||
CVE-2024-4907,0,0,3113954bbefa43c45c3595d8fd618aaa69e1f187ec4fb5985c7de73ea2928b89,2024-05-15T19:15:08.607000
|
||||
CVE-2024-4908,0,0,49953f13c6eb1739a4b893e978dfff6e9d81247d9e887ebf79651c9ba7eae5fb,2024-05-15T19:15:08.980000
|
||||
CVE-2024-4909,0,0,33c70ce6259d6da0a92a6c71c0ea14d1539f9c07a708d9f99240c99eb1475c60,2024-05-15T19:15:09.320000
|
||||
CVE-2024-4910,1,1,a82052dfa103200f3b9fc39482e4d4d960a5e5de9c8e240b89074cee62e90b4e,2024-05-15T20:15:14.167000
|
||||
CVE-2024-4911,1,1,8d1608f0fa29a13cf0a21881c2ede6ff746ff4b49cb14c00be575f111b962149,2024-05-15T21:15:08.447000
|
||||
CVE-2024-4912,1,1,959608c998df40105cb04722815b6866fe50f22984a019f9f852ebbd393b327c,2024-05-15T21:15:08.720000
|
||||
CVE-2024-4913,1,1,ef1882efdbb97e7e5b3a9f1d624c71c7c6ca83c593dde5ac79d713777664dae8,2024-05-15T21:15:09
|
||||
CVE-2024-4947,1,1,f706014ab5e494173f189b6b147bc73eaca2bb6d431298f9b49d098b14ff5782,2024-05-15T21:15:09.273000
|
||||
CVE-2024-4948,1,1,bdd7cd38392862513bf6cf6f69f8c528e08e359340031d01daba548f07be3f14,2024-05-15T21:15:09.347000
|
||||
CVE-2024-4949,1,1,7a7f679654eca12ebf0c1d1d6ac210b4148b3d26ab259c26b5f77d48b40c4cf5,2024-05-15T21:15:09.430000
|
||||
CVE-2024-4950,1,1,efed32b4f23b877a04e85fe2ab12f10b9d3c39ad2529470125a1a9db3cdcfb9e,2024-05-15T21:15:09.493000
|
||||
CVE-2024-4976,1,1,7bb4e20b87953c4b97f492da11cca71d462ce6af7b37913524811fb56920cd3a,2024-05-15T21:15:09.560000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user