mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-03-30T09:00:37.795791+00:00
This commit is contained in:
parent
594a7ada82
commit
ca46ad1ce0
47
CVE-2024/CVE-2024-21xx/CVE-2024-2140.json
Normal file
47
CVE-2024/CVE-2024-21xx/CVE-2024-2140.json
Normal file
@ -0,0 +1,47 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2140",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2024-03-30T07:15:08.893",
|
||||||
|
"lastModified": "2024-03-30T07:15:08.893",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The Ultimate Addons for Beaver Builder \u2013 Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Advanced Icons widget in all versions up to, and including, 1.5.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a9c6c35f-1095-4897-b4a6-e7b295c187de?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
51
CVE-2024/CVE-2024-21xx/CVE-2024-2141.json
Normal file
51
CVE-2024/CVE-2024-21xx/CVE-2024-2141.json
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2141",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2024-03-30T07:15:09.203",
|
||||||
|
"lastModified": "2024-03-30T07:15:09.203",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The Ultimate Addons for Beaver Builder \u2013 Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Button widget in all versions up to, and including, 1.5.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/browser/ultimate-addons-for-beaver-builder-lite/trunk/modules/uabb-button/includes/frontend.php#L25",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/61c3a517-70c8-4fc2-b8d6-1dcb2ad811d8?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
51
CVE-2024/CVE-2024-21xx/CVE-2024-2142.json
Normal file
51
CVE-2024/CVE-2024-21xx/CVE-2024-2142.json
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2142",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2024-03-30T07:15:09.513",
|
||||||
|
"lastModified": "2024-03-30T07:15:09.513",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The Ultimate Addons for Beaver Builder \u2013 Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Info Table widget in all versions up to, and including, 1.5.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/browser/ultimate-addons-for-beaver-builder-lite/trunk/modules/info-table/includes/frontend.php#L29",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8b6c6e10-3feb-4ecd-a17a-81e15c471d3d?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
47
CVE-2024/CVE-2024-21xx/CVE-2024-2143.json
Normal file
47
CVE-2024/CVE-2024-21xx/CVE-2024-2143.json
Normal file
@ -0,0 +1,47 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2143",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2024-03-30T07:15:09.997",
|
||||||
|
"lastModified": "2024-03-30T07:15:09.997",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The Ultimate Addons for Beaver Builder \u2013 Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Heading widget in all versions up to, and including, 1.5.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2b290f4c-293d-41d5-b43e-b9c5c350552b?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
51
CVE-2024/CVE-2024-21xx/CVE-2024-2144.json
Normal file
51
CVE-2024/CVE-2024-21xx/CVE-2024-2144.json
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2144",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2024-03-30T07:15:10.497",
|
||||||
|
"lastModified": "2024-03-30T07:15:10.497",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The Ultimate Addons for Beaver Builder \u2013 Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Image Separator widget in all versions up to, and including, 1.5.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/browser/ultimate-addons-for-beaver-builder-lite/trunk/modules/image-separator/includes/frontend.php#L14",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/552c0810-9687-4a66-91a4-e34228552a15?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
47
CVE-2024/CVE-2024-29xx/CVE-2024-2948.json
Normal file
47
CVE-2024/CVE-2024-29xx/CVE-2024-2948.json
Normal file
@ -0,0 +1,47 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2948",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2024-03-30T08:15:07.330",
|
||||||
|
"lastModified": "2024-03-30T08:15:07.330",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The Favorites plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'user_favorites' shortcode in all versions up to, and including, 2.3.3 due to insufficient input sanitization and output escaping on user supplied attributes such as 'no_favorites'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3061244%40favorites&new=3061244%40favorites&sfp_email=&sfph_mail=",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/38a87046-9a46-40c2-b10d-d1a7d5ef8742?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-30xx/CVE-2024-3084.json
Normal file
92
CVE-2024/CVE-2024-30xx/CVE-2024-3084.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-3084",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-03-30T08:15:07.510",
|
||||||
|
"lastModified": "2024-03-30T08:15:07.510",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. It has been rated as problematic. This issue affects some unknown processing of the component Hire an Ambulance Page. The manipulation of the argument Patient Name/Relative Name/Relative Phone Number/City/State/Message leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258677 was assigned to this vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 10.0,
|
||||||
|
"impactScore": 2.9,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_sxss.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.258677",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.258677",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.306957",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
20
README.md
20
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-03-30T07:00:38.030804+00:00
|
2024-03-30T09:00:37.795791+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-03-30T05:15:35.507000+00:00
|
2024-03-30T08:15:07.510000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,20 +33,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
243426
|
243433
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `7`
|
Recently added CVEs: `7`
|
||||||
|
|
||||||
- [CVE-2024-0367](CVE-2024/CVE-2024-03xx/CVE-2024-0367.json) (`2024-03-30T05:15:34.243`)
|
- [CVE-2024-2140](CVE-2024/CVE-2024-21xx/CVE-2024-2140.json) (`2024-03-30T07:15:08.893`)
|
||||||
- [CVE-2024-1051](CVE-2024/CVE-2024-10xx/CVE-2024-1051.json) (`2024-03-30T05:15:34.537`)
|
- [CVE-2024-2141](CVE-2024/CVE-2024-21xx/CVE-2024-2141.json) (`2024-03-30T07:15:09.203`)
|
||||||
- [CVE-2024-1238](CVE-2024/CVE-2024-12xx/CVE-2024-1238.json) (`2024-03-30T05:15:34.720`)
|
- [CVE-2024-2142](CVE-2024/CVE-2024-21xx/CVE-2024-2142.json) (`2024-03-30T07:15:09.513`)
|
||||||
- [CVE-2024-1692](CVE-2024/CVE-2024-16xx/CVE-2024-1692.json) (`2024-03-30T05:15:34.930`)
|
- [CVE-2024-2143](CVE-2024/CVE-2024-21xx/CVE-2024-2143.json) (`2024-03-30T07:15:09.997`)
|
||||||
- [CVE-2024-2047](CVE-2024/CVE-2024-20xx/CVE-2024-2047.json) (`2024-03-30T05:15:35.113`)
|
- [CVE-2024-2144](CVE-2024/CVE-2024-21xx/CVE-2024-2144.json) (`2024-03-30T07:15:10.497`)
|
||||||
- [CVE-2024-2086](CVE-2024/CVE-2024-20xx/CVE-2024-2086.json) (`2024-03-30T05:15:35.323`)
|
- [CVE-2024-2948](CVE-2024/CVE-2024-29xx/CVE-2024-2948.json) (`2024-03-30T08:15:07.330`)
|
||||||
- [CVE-2024-2794](CVE-2024/CVE-2024-27xx/CVE-2024-2794.json) (`2024-03-30T05:15:35.507`)
|
- [CVE-2024-3084](CVE-2024/CVE-2024-30xx/CVE-2024-3084.json) (`2024-03-30T08:15:07.510`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
21
_state.csv
21
_state.csv
@ -238184,7 +238184,7 @@ CVE-2024-0363,0,0,9cf5e0ae746fc974c76e62172d1c62a6a8911bca7371645b5d5973d7ebd77d
|
|||||||
CVE-2024-0364,0,0,b0bb0fbc5fe29624d76d5280a233bda194a0b6d0955f7b58c5eaf27e0ac04266,2024-03-21T02:51:08.993000
|
CVE-2024-0364,0,0,b0bb0fbc5fe29624d76d5280a233bda194a0b6d0955f7b58c5eaf27e0ac04266,2024-03-21T02:51:08.993000
|
||||||
CVE-2024-0365,0,0,b3344c862595fdff0598c92f765107ba79f4da51f8b20633a7dbcfc8b08afc71,2024-03-18T19:40:00.173000
|
CVE-2024-0365,0,0,b3344c862595fdff0598c92f765107ba79f4da51f8b20633a7dbcfc8b08afc71,2024-03-18T19:40:00.173000
|
||||||
CVE-2024-0366,0,0,af4d10b442ad47433312fcf6d3b66f2427eab18d448eda39b91a6642c2d3ba01,2024-02-13T17:05:59.177000
|
CVE-2024-0366,0,0,af4d10b442ad47433312fcf6d3b66f2427eab18d448eda39b91a6642c2d3ba01,2024-02-13T17:05:59.177000
|
||||||
CVE-2024-0367,1,1,1cef8f2a5479e955e9240223a774fdf8175d7332ac78485bb096d5b655a82efa,2024-03-30T05:15:34.243000
|
CVE-2024-0367,0,0,1cef8f2a5479e955e9240223a774fdf8175d7332ac78485bb096d5b655a82efa,2024-03-30T05:15:34.243000
|
||||||
CVE-2024-0368,0,0,672a5af77135812aa5f33edc1fa2898941e5a841ed55e9a928229f0a0f177191,2024-03-13T18:16:18.563000
|
CVE-2024-0368,0,0,672a5af77135812aa5f33edc1fa2898941e5a841ed55e9a928229f0a0f177191,2024-03-13T18:16:18.563000
|
||||||
CVE-2024-0369,0,0,ca32df463a08be8246427436a1d25265c14749c7b91b2494ef8835512db9eacd,2024-03-13T18:16:18.563000
|
CVE-2024-0369,0,0,ca32df463a08be8246427436a1d25265c14749c7b91b2494ef8835512db9eacd,2024-03-13T18:16:18.563000
|
||||||
CVE-2024-0370,0,0,144df0ac103aa96914c6d9f8ced884dbbde3e04c0153525468c430357c5c06d8,2024-02-09T17:30:35.817000
|
CVE-2024-0370,0,0,144df0ac103aa96914c6d9f8ced884dbbde3e04c0153525468c430357c5c06d8,2024-02-09T17:30:35.817000
|
||||||
@ -238748,7 +238748,7 @@ CVE-2024-1046,0,0,04593d809e4dc181ec893504bde5771d15890d7d13ac640142c747dade4cf5
|
|||||||
CVE-2024-1047,0,0,e96e7a026577614e85a9cd48b2c7dde028c96bb69e07a747ad9c4e24f36cb0c3,2024-02-08T14:20:23.387000
|
CVE-2024-1047,0,0,e96e7a026577614e85a9cd48b2c7dde028c96bb69e07a747ad9c4e24f36cb0c3,2024-02-08T14:20:23.387000
|
||||||
CVE-2024-1048,0,0,7ddaca6abb20834199fed6520efb754b1c7fd66a2e9592afde9a139ac587ed21,2024-03-21T03:15:47.997000
|
CVE-2024-1048,0,0,7ddaca6abb20834199fed6520efb754b1c7fd66a2e9592afde9a139ac587ed21,2024-03-21T03:15:47.997000
|
||||||
CVE-2024-1049,0,0,05714a497f754a88f418be3c4b1d16ea6a0b7eb381f4358b2d1916b6d122112a,2024-03-25T01:51:01.223000
|
CVE-2024-1049,0,0,05714a497f754a88f418be3c4b1d16ea6a0b7eb381f4358b2d1916b6d122112a,2024-03-25T01:51:01.223000
|
||||||
CVE-2024-1051,1,1,6726a71d17b926420b728b067a87546ab2aa2ae6a3308904485c17120fc86381,2024-03-30T05:15:34.537000
|
CVE-2024-1051,0,0,6726a71d17b926420b728b067a87546ab2aa2ae6a3308904485c17120fc86381,2024-03-30T05:15:34.537000
|
||||||
CVE-2024-1052,0,0,cf5f5c6bda7a4876cbb6b2b3fc9e6319f0131320e8b68a9cc322eb9aae681763,2024-02-15T18:49:40.180000
|
CVE-2024-1052,0,0,cf5f5c6bda7a4876cbb6b2b3fc9e6319f0131320e8b68a9cc322eb9aae681763,2024-02-15T18:49:40.180000
|
||||||
CVE-2024-1053,0,0,47a983161efc38cb28d2682fa08d2baacc5d0ed2824df2057fa217999f12681f,2024-02-22T19:07:27.197000
|
CVE-2024-1053,0,0,47a983161efc38cb28d2682fa08d2baacc5d0ed2824df2057fa217999f12681f,2024-02-22T19:07:27.197000
|
||||||
CVE-2024-1054,0,0,931986d9bd52ed93169083bcc919f3cc533efd9ca39d065f752897d53a379b3f,2024-02-29T13:49:29.390000
|
CVE-2024-1054,0,0,931986d9bd52ed93169083bcc919f3cc533efd9ca39d065f752897d53a379b3f,2024-02-29T13:49:29.390000
|
||||||
@ -238898,7 +238898,7 @@ CVE-2024-1234,0,0,45df76259910e35fabad8b84114cbc9dc54b79b27a3f5264b87abe65e748e6
|
|||||||
CVE-2024-1235,0,0,bd3111aea128fd790d8e4dcd61b3806ac7cc01e876f9c218beaf77957a9d5d7b,2024-02-29T13:49:29.390000
|
CVE-2024-1235,0,0,bd3111aea128fd790d8e4dcd61b3806ac7cc01e876f9c218beaf77957a9d5d7b,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-1236,0,0,7018028a282921e4202e93cd9b915a62e29eb4b99c0b29d7f7e92ea4f0c33ed4,2024-02-29T13:49:29.390000
|
CVE-2024-1236,0,0,7018028a282921e4202e93cd9b915a62e29eb4b99c0b29d7f7e92ea4f0c33ed4,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-1237,0,0,eee4cca744388ff49292be78f61df8fb2888ead976b853a0797077e088f51437,2024-03-13T18:16:18.563000
|
CVE-2024-1237,0,0,eee4cca744388ff49292be78f61df8fb2888ead976b853a0797077e088f51437,2024-03-13T18:16:18.563000
|
||||||
CVE-2024-1238,1,1,0acb3899660b8be2f62614ff06a6c031268a064db67c07fb87bf2b7217fc4fb9,2024-03-30T05:15:34.720000
|
CVE-2024-1238,0,0,0acb3899660b8be2f62614ff06a6c031268a064db67c07fb87bf2b7217fc4fb9,2024-03-30T05:15:34.720000
|
||||||
CVE-2024-1239,0,0,e4038cd93b1aa3b535a8fc05cfae9bdad5800b90c01ba1802a3f68ef8818e7dd,2024-03-17T22:38:29.433000
|
CVE-2024-1239,0,0,e4038cd93b1aa3b535a8fc05cfae9bdad5800b90c01ba1802a3f68ef8818e7dd,2024-03-17T22:38:29.433000
|
||||||
CVE-2024-1242,0,0,c3a9f0d7d2241d4a94482083093c45d7f3e32a35dbbd90f86c5401bdd23fe57e,2024-02-29T13:49:29.390000
|
CVE-2024-1242,0,0,c3a9f0d7d2241d4a94482083093c45d7f3e32a35dbbd90f86c5401bdd23fe57e,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-1245,0,0,2e59378dab8a209b430a7bdf5dfa1ad37455bcba638f93f331bd6727be23a3f7,2024-02-15T04:44:27.987000
|
CVE-2024-1245,0,0,2e59378dab8a209b430a7bdf5dfa1ad37455bcba638f93f331bd6727be23a3f7,2024-02-15T04:44:27.987000
|
||||||
@ -239185,7 +239185,7 @@ CVE-2024-1686,0,0,513b8933def64d694b65e22b1395645ba43c1774153040be97c24d03679a52
|
|||||||
CVE-2024-1687,0,0,2c139dd7a4cd5eb96b19cf20743fdcf2a4372838670ad53c30ef28a6668ce9e0,2024-02-27T14:20:06.637000
|
CVE-2024-1687,0,0,2c139dd7a4cd5eb96b19cf20743fdcf2a4372838670ad53c30ef28a6668ce9e0,2024-02-27T14:20:06.637000
|
||||||
CVE-2024-1690,0,0,e16a26a39ebf4d9143c222ac4d3d5665ab1b4b3206bac6531c75e151adca0d64,2024-03-13T18:15:58.530000
|
CVE-2024-1690,0,0,e16a26a39ebf4d9143c222ac4d3d5665ab1b4b3206bac6531c75e151adca0d64,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-1691,0,0,931899b69d7fadfa01c6f75758e366464f8e6df4f21ba5335640db83d91dfd79,2024-03-13T18:15:58.530000
|
CVE-2024-1691,0,0,931899b69d7fadfa01c6f75758e366464f8e6df4f21ba5335640db83d91dfd79,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-1692,1,1,5124b3d74a90b9b2782042b1962348715ecc0120b9827366f6fd22b853d25527,2024-03-30T05:15:34.930000
|
CVE-2024-1692,0,0,5124b3d74a90b9b2782042b1962348715ecc0120b9827366f6fd22b853d25527,2024-03-30T05:15:34.930000
|
||||||
CVE-2024-1696,0,0,99a90d5f5f3ed72de58d46078f56367f3c20ea4ece7ee2f1509d303d1823a04c,2024-03-12T12:40:13.500000
|
CVE-2024-1696,0,0,99a90d5f5f3ed72de58d46078f56367f3c20ea4ece7ee2f1509d303d1823a04c,2024-03-12T12:40:13.500000
|
||||||
CVE-2024-1697,0,0,b9912cd2930d44a47ac605d64b9b7e15b6a5ff5ea1dbcd9b1c108eee29ee7990,2024-03-25T01:51:01.223000
|
CVE-2024-1697,0,0,b9912cd2930d44a47ac605d64b9b7e15b6a5ff5ea1dbcd9b1c108eee29ee7990,2024-03-25T01:51:01.223000
|
||||||
CVE-2024-1698,0,0,75dca8418f9d56ec0cfe8b6a5fe8dbac72155e2590b7f1e80f716b71405b9b9b,2024-02-27T14:20:06.637000
|
CVE-2024-1698,0,0,75dca8418f9d56ec0cfe8b6a5fe8dbac72155e2590b7f1e80f716b71405b9b9b,2024-02-27T14:20:06.637000
|
||||||
@ -239480,7 +239480,7 @@ CVE-2024-20354,0,0,d77b2c2498bd40063174d789072339810259d4fa0e4bc5c8d41a694f11a95
|
|||||||
CVE-2024-2042,0,0,f6d54c5204cd94c19a84e1963b44103dc197c946869366cb59a65e7a4114231d,2024-03-17T22:38:29.433000
|
CVE-2024-2042,0,0,f6d54c5204cd94c19a84e1963b44103dc197c946869366cb59a65e7a4114231d,2024-03-17T22:38:29.433000
|
||||||
CVE-2024-2044,0,0,3d73c6b2cc04bd01f48c15467e360d6d6689d47e2b89d6d93430f2c98bfeca1a,2024-03-23T03:15:12.063000
|
CVE-2024-2044,0,0,3d73c6b2cc04bd01f48c15467e360d6d6689d47e2b89d6d93430f2c98bfeca1a,2024-03-23T03:15:12.063000
|
||||||
CVE-2024-2045,0,0,72838b74e2668b744754639ee1018477ba3696de5929605fbc709ccd12df2c15,2024-03-01T14:04:26.010000
|
CVE-2024-2045,0,0,72838b74e2668b744754639ee1018477ba3696de5929605fbc709ccd12df2c15,2024-03-01T14:04:26.010000
|
||||||
CVE-2024-2047,1,1,4c75974b33e127512311b90b63e78bd882088bb8518d239d1f32cde5b49462e1,2024-03-30T05:15:35.113000
|
CVE-2024-2047,0,0,4c75974b33e127512311b90b63e78bd882088bb8518d239d1f32cde5b49462e1,2024-03-30T05:15:35.113000
|
||||||
CVE-2024-2048,0,0,b1d90a03303b3129ccd01b2fc2b67961e7b3ad9cf6b45fd30e9c61356487e3a3,2024-03-05T13:41:01.900000
|
CVE-2024-2048,0,0,b1d90a03303b3129ccd01b2fc2b67961e7b3ad9cf6b45fd30e9c61356487e3a3,2024-03-05T13:41:01.900000
|
||||||
CVE-2024-2049,0,0,58bf7dd981ad241a63625476de471475168cb2dbbf14e23f948c579239e38831,2024-03-12T16:02:33.900000
|
CVE-2024-2049,0,0,58bf7dd981ad241a63625476de471475168cb2dbbf14e23f948c579239e38831,2024-03-12T16:02:33.900000
|
||||||
CVE-2024-2050,0,0,4f5fe11d2fef816bb813ab7b67c2771483dd928967694c40c1dd1814562f1c8c,2024-03-18T19:40:00.173000
|
CVE-2024-2050,0,0,4f5fe11d2fef816bb813ab7b67c2771483dd928967694c40c1dd1814562f1c8c,2024-03-18T19:40:00.173000
|
||||||
@ -239645,7 +239645,7 @@ CVE-2024-20838,0,0,74be51c0e8bac01e87b9cc86111dc50b4a1adf9e5716391de91ac9b317925
|
|||||||
CVE-2024-20839,0,0,47718a263039ff382077d51343bbfec103acdb679c87532e042d130ab4f66e69,2024-03-05T13:41:01.900000
|
CVE-2024-20839,0,0,47718a263039ff382077d51343bbfec103acdb679c87532e042d130ab4f66e69,2024-03-05T13:41:01.900000
|
||||||
CVE-2024-20840,0,0,5f1653c0b4474c303878781816e019c87e7dd7623159e4de1edd9bba6b997e10,2024-03-05T13:41:01.900000
|
CVE-2024-20840,0,0,5f1653c0b4474c303878781816e019c87e7dd7623159e4de1edd9bba6b997e10,2024-03-05T13:41:01.900000
|
||||||
CVE-2024-20841,0,0,7c22ffdbc2d26c2e1f33d349f596210117487de4423438791b61a39ede4d07c1,2024-03-05T13:41:01.900000
|
CVE-2024-20841,0,0,7c22ffdbc2d26c2e1f33d349f596210117487de4423438791b61a39ede4d07c1,2024-03-05T13:41:01.900000
|
||||||
CVE-2024-2086,1,1,25667b4d5e42337ece49136fcd5e03a76822f00c0056e8537fb8f9eb0185f230,2024-03-30T05:15:35.323000
|
CVE-2024-2086,0,0,25667b4d5e42337ece49136fcd5e03a76822f00c0056e8537fb8f9eb0185f230,2024-03-30T05:15:35.323000
|
||||||
CVE-2024-20903,0,0,c3900fb8b8bb00a3ce86bfd5ca527fde9099622f71073bff3bcad70680bf3f2d,2024-02-20T19:51:05.510000
|
CVE-2024-20903,0,0,c3900fb8b8bb00a3ce86bfd5ca527fde9099622f71073bff3bcad70680bf3f2d,2024-02-20T19:51:05.510000
|
||||||
CVE-2024-20904,0,0,75011684a257ea742330251f679f71917299c125d35b4c6d39df6fddd4b69f37,2024-01-20T18:42:09.760000
|
CVE-2024-20904,0,0,75011684a257ea742330251f679f71917299c125d35b4c6d39df6fddd4b69f37,2024-01-20T18:42:09.760000
|
||||||
CVE-2024-20905,0,0,9331a8e493544ea842bda306a367f01093664d68b881f6092eb05338afffb388,2024-02-20T19:51:05.510000
|
CVE-2024-20905,0,0,9331a8e493544ea842bda306a367f01093664d68b881f6092eb05338afffb388,2024-02-20T19:51:05.510000
|
||||||
@ -239838,6 +239838,7 @@ CVE-2024-21395,0,0,f1993dcc4aa6b30f8100a014aabe16306e5164d7170173d986fa0305ec479
|
|||||||
CVE-2024-21396,0,0,89247a83900398acb67f829665b4596d2292eee6f6859844049c54511236f48b,2024-02-23T17:41:27.623000
|
CVE-2024-21396,0,0,89247a83900398acb67f829665b4596d2292eee6f6859844049c54511236f48b,2024-02-23T17:41:27.623000
|
||||||
CVE-2024-21397,0,0,513c417ad39d9a2066a289680b245c01e1ceeae2b0ee83f69db302cf1dfa050d,2024-02-23T17:47:25.600000
|
CVE-2024-21397,0,0,513c417ad39d9a2066a289680b245c01e1ceeae2b0ee83f69db302cf1dfa050d,2024-02-23T17:47:25.600000
|
||||||
CVE-2024-21399,0,0,481cce32c9e9a83e040ae50a7ae1201df812aadb50eba52c79fdd8a16608ba2c,2024-02-09T03:00:47.227000
|
CVE-2024-21399,0,0,481cce32c9e9a83e040ae50a7ae1201df812aadb50eba52c79fdd8a16608ba2c,2024-02-09T03:00:47.227000
|
||||||
|
CVE-2024-2140,1,1,00c3e2168a7c47eb1826eb294f188731562727cf9d049d1cb71be48665026ae2,2024-03-30T07:15:08.893000
|
||||||
CVE-2024-21400,0,0,b652fe8c0b6abbaa87372d3f18128a0d3ba6de315b5c8ae76a9b6fb5a5c4dd18,2024-03-12T17:46:17.273000
|
CVE-2024-21400,0,0,b652fe8c0b6abbaa87372d3f18128a0d3ba6de315b5c8ae76a9b6fb5a5c4dd18,2024-03-12T17:46:17.273000
|
||||||
CVE-2024-21401,0,0,169936f9e80ab8f68930febaec3b03620bcee4c9e21a4a75d7bfbfb87d28264c,2024-02-23T21:06:05.783000
|
CVE-2024-21401,0,0,169936f9e80ab8f68930febaec3b03620bcee4c9e21a4a75d7bfbfb87d28264c,2024-02-23T21:06:05.783000
|
||||||
CVE-2024-21402,0,0,3dc7f77c0dcdfcbea6de1ddb879c655a9bcdc8aea8cb1ca9e0fd0e2f41a79092,2024-02-22T18:38:54.443000
|
CVE-2024-21402,0,0,3dc7f77c0dcdfcbea6de1ddb879c655a9bcdc8aea8cb1ca9e0fd0e2f41a79092,2024-02-22T18:38:54.443000
|
||||||
@ -239847,18 +239848,21 @@ CVE-2024-21405,0,0,7b2bcd85f8b75e36055a51e8d6e50e620fbb5da00673d7a82956b2dcc3d7e
|
|||||||
CVE-2024-21406,0,0,4926f610f67020e143f717a8966dfc594abc79953c895df1691f78cfff880f19,2024-03-01T22:57:15.940000
|
CVE-2024-21406,0,0,4926f610f67020e143f717a8966dfc594abc79953c895df1691f78cfff880f19,2024-03-01T22:57:15.940000
|
||||||
CVE-2024-21407,0,0,13806882df1727e3bbc8e26b8c7dd4da4315e03da171f9dbf0647863a4d47218,2024-03-21T21:06:06.530000
|
CVE-2024-21407,0,0,13806882df1727e3bbc8e26b8c7dd4da4315e03da171f9dbf0647863a4d47218,2024-03-21T21:06:06.530000
|
||||||
CVE-2024-21408,0,0,5325218009ff3c8f10a3b9269e4b1c5ec312eb3ea56b73f6a728479c1bad3635,2024-03-21T21:06:09.543000
|
CVE-2024-21408,0,0,5325218009ff3c8f10a3b9269e4b1c5ec312eb3ea56b73f6a728479c1bad3635,2024-03-21T21:06:09.543000
|
||||||
|
CVE-2024-2141,1,1,6ffc21259396265e873a86547783a6cdb4f662061372bc1c4dbf3645578deea3,2024-03-30T07:15:09.203000
|
||||||
CVE-2024-21410,0,0,bd862af63cde79d77d3d96c08b20eb8ee12ef6b46d7738e8f98c5d9c8af65aee,2024-02-26T21:10:38.713000
|
CVE-2024-21410,0,0,bd862af63cde79d77d3d96c08b20eb8ee12ef6b46d7738e8f98c5d9c8af65aee,2024-02-26T21:10:38.713000
|
||||||
CVE-2024-21411,0,0,752b3d730293c266885035a1f030073e3f7456710c29851319bdadbb6794b6d6,2024-03-12T17:46:17.273000
|
CVE-2024-21411,0,0,752b3d730293c266885035a1f030073e3f7456710c29851319bdadbb6794b6d6,2024-03-12T17:46:17.273000
|
||||||
CVE-2024-21412,0,0,6df500642ad441e157d67f1fe17b6dc5155211f5565d89e1eed7797770fe5407,2024-03-07T17:48:58.173000
|
CVE-2024-21412,0,0,6df500642ad441e157d67f1fe17b6dc5155211f5565d89e1eed7797770fe5407,2024-03-07T17:48:58.173000
|
||||||
CVE-2024-21413,0,0,e8b53a5cd4bd3cc4178f808efd349017a89b016f9da30aa2b26e33753aaea59b,2024-02-23T21:04:05.710000
|
CVE-2024-21413,0,0,e8b53a5cd4bd3cc4178f808efd349017a89b016f9da30aa2b26e33753aaea59b,2024-02-23T21:04:05.710000
|
||||||
CVE-2024-21418,0,0,ef663b9214de74ab8b1eda2c85169dc13f12218d87536de8a5f4de5236a43541,2024-03-12T17:46:17.273000
|
CVE-2024-21418,0,0,ef663b9214de74ab8b1eda2c85169dc13f12218d87536de8a5f4de5236a43541,2024-03-12T17:46:17.273000
|
||||||
CVE-2024-21419,0,0,2b2cb4db09da9495fc2ecf8fae18cde53ce11b6d772c946de837373d3f835c9d,2024-03-12T17:46:17.273000
|
CVE-2024-21419,0,0,2b2cb4db09da9495fc2ecf8fae18cde53ce11b6d772c946de837373d3f835c9d,2024-03-12T17:46:17.273000
|
||||||
|
CVE-2024-2142,1,1,2baa1be14ea87a7ce70e0e3e17dfb569e87ae981e3997dfc9470e8fa34c8ded6,2024-03-30T07:15:09.513000
|
||||||
CVE-2024-21420,0,0,4a89fb64b6e21ff3e8e62b1263c75efc47583308c96cfb26d691252d4777d2ed,2024-02-13T18:22:43.577000
|
CVE-2024-21420,0,0,4a89fb64b6e21ff3e8e62b1263c75efc47583308c96cfb26d691252d4777d2ed,2024-02-13T18:22:43.577000
|
||||||
CVE-2024-21421,0,0,7f3d201054cbde03fea298b3b62f09a5835e6858ea20c6e60673b54188a987a6,2024-03-12T17:46:17.273000
|
CVE-2024-21421,0,0,7f3d201054cbde03fea298b3b62f09a5835e6858ea20c6e60673b54188a987a6,2024-03-12T17:46:17.273000
|
||||||
CVE-2024-21423,0,0,bdd3e5505bf37095cf28502668c3363668037784f8adcb8492701fb6ce5eb572,2024-02-26T13:42:22.567000
|
CVE-2024-21423,0,0,bdd3e5505bf37095cf28502668c3363668037784f8adcb8492701fb6ce5eb572,2024-02-26T13:42:22.567000
|
||||||
CVE-2024-21426,0,0,d393d657fa9631ae4a7e338940f17c59c22b9a1c79406ce6c198e0e929a7ae1b,2024-03-12T17:46:17.273000
|
CVE-2024-21426,0,0,d393d657fa9631ae4a7e338940f17c59c22b9a1c79406ce6c198e0e929a7ae1b,2024-03-12T17:46:17.273000
|
||||||
CVE-2024-21427,0,0,f2592991e7304b29003b372e68d3f0a5c7232d5b37eb13a43127f77590c861e8,2024-03-12T17:46:17.273000
|
CVE-2024-21427,0,0,f2592991e7304b29003b372e68d3f0a5c7232d5b37eb13a43127f77590c861e8,2024-03-12T17:46:17.273000
|
||||||
CVE-2024-21429,0,0,432d3834c625233c5a21b7d14e6b2d92ea43b60981cfe0a7c1e3f6363d4b8242,2024-03-12T17:46:17.273000
|
CVE-2024-21429,0,0,432d3834c625233c5a21b7d14e6b2d92ea43b60981cfe0a7c1e3f6363d4b8242,2024-03-12T17:46:17.273000
|
||||||
|
CVE-2024-2143,1,1,8a3b02b64ed809034af3eb8399c73ec5024d4cbd3eb660ceef73c1ce395e0221,2024-03-30T07:15:09.997000
|
||||||
CVE-2024-21430,0,0,f0323e656bba17b2c286d5c2f562080f05bce6bcbf944452b18cf9b643e389d2,2024-03-12T17:46:17.273000
|
CVE-2024-21430,0,0,f0323e656bba17b2c286d5c2f562080f05bce6bcbf944452b18cf9b643e389d2,2024-03-12T17:46:17.273000
|
||||||
CVE-2024-21431,0,0,26c4452850a50cb1240e5475bc72713eb6853df62e53111991ad8917b98a91ea,2024-03-12T17:46:17.273000
|
CVE-2024-21431,0,0,26c4452850a50cb1240e5475bc72713eb6853df62e53111991ad8917b98a91ea,2024-03-12T17:46:17.273000
|
||||||
CVE-2024-21432,0,0,fab8d7290e99771982b5f8cadee12a7229e54e95365bb6c52ca3b2240ad66917,2024-03-12T17:46:17.273000
|
CVE-2024-21432,0,0,fab8d7290e99771982b5f8cadee12a7229e54e95365bb6c52ca3b2240ad66917,2024-03-12T17:46:17.273000
|
||||||
@ -239869,6 +239873,7 @@ CVE-2024-21436,0,0,0dd87189c7353c26efcd8b4c46b990b4f91e29fa2912a735a2fd44ab16c87
|
|||||||
CVE-2024-21437,0,0,d68d1284ce344470b1e7d6e7ec437e6a811301e250b1bf82bd56ca2589342e67,2024-03-12T17:46:17.273000
|
CVE-2024-21437,0,0,d68d1284ce344470b1e7d6e7ec437e6a811301e250b1bf82bd56ca2589342e67,2024-03-12T17:46:17.273000
|
||||||
CVE-2024-21438,0,0,0984d49fe88902a08e3f8bcc7e2245bb23fd280e9382fbcf6192c69efb734310,2024-03-12T17:46:17.273000
|
CVE-2024-21438,0,0,0984d49fe88902a08e3f8bcc7e2245bb23fd280e9382fbcf6192c69efb734310,2024-03-12T17:46:17.273000
|
||||||
CVE-2024-21439,0,0,27307394f1ffff04a4b85c5411a75da570619f8a3ad6f4da08c2e001914244e1,2024-03-12T17:46:17.273000
|
CVE-2024-21439,0,0,27307394f1ffff04a4b85c5411a75da570619f8a3ad6f4da08c2e001914244e1,2024-03-12T17:46:17.273000
|
||||||
|
CVE-2024-2144,1,1,f64c0f9437d43b93b69b19c4a347cc382ba1e5cb79a3b9c75bcc71d3c3b01060,2024-03-30T07:15:10.497000
|
||||||
CVE-2024-21440,0,0,6f61fd68e9deac86867c494212547f54aa54ff0eb7ab6436113da9b0d1135d3e,2024-03-12T17:46:17.273000
|
CVE-2024-21440,0,0,6f61fd68e9deac86867c494212547f54aa54ff0eb7ab6436113da9b0d1135d3e,2024-03-12T17:46:17.273000
|
||||||
CVE-2024-21441,0,0,60ec7a64913922ceeff946bffca3a156dc2df936ff37cc69f9b4248e6770163b,2024-03-12T17:46:17.273000
|
CVE-2024-21441,0,0,60ec7a64913922ceeff946bffca3a156dc2df936ff37cc69f9b4248e6770163b,2024-03-12T17:46:17.273000
|
||||||
CVE-2024-21442,0,0,e32988f4a6f4e8b33b6e29cea1f1a0ef77e96b7daa729f5981a98fdcb7c815e2,2024-03-12T17:46:17.273000
|
CVE-2024-21442,0,0,e32988f4a6f4e8b33b6e29cea1f1a0ef77e96b7daa729f5981a98fdcb7c815e2,2024-03-12T17:46:17.273000
|
||||||
@ -242520,7 +242525,7 @@ CVE-2024-27935,0,0,7b1077d10742cf872fc9e5d8af5fb103c17586679f31ea3ae14571738c890
|
|||||||
CVE-2024-27936,0,0,a1698992bdc710af509fc87aab69ebbf3c994ef8d8cad0763b819e4f8661d35d,2024-03-21T12:58:51.093000
|
CVE-2024-27936,0,0,a1698992bdc710af509fc87aab69ebbf3c994ef8d8cad0763b819e4f8661d35d,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-27937,0,0,41170e4b2ade39ac13c39d3b55ef0fea394da87301b5a0e0f141f3f69794850d,2024-03-18T19:40:00.173000
|
CVE-2024-27937,0,0,41170e4b2ade39ac13c39d3b55ef0fea394da87301b5a0e0f141f3f69794850d,2024-03-18T19:40:00.173000
|
||||||
CVE-2024-27938,0,0,992243c7c9e4bac66f51bd7113f98af62b9886d66d4d9e32776474fa2dcd307d,2024-03-12T12:40:13.500000
|
CVE-2024-27938,0,0,992243c7c9e4bac66f51bd7113f98af62b9886d66d4d9e32776474fa2dcd307d,2024-03-12T12:40:13.500000
|
||||||
CVE-2024-2794,1,1,92c4c2544a8b2296e368398d9dfb65aa17b59b73aeb1977221a9b2c5a8df2c73,2024-03-30T05:15:35.507000
|
CVE-2024-2794,0,0,92c4c2544a8b2296e368398d9dfb65aa17b59b73aeb1977221a9b2c5a8df2c73,2024-03-30T05:15:35.507000
|
||||||
CVE-2024-27948,0,0,67e156b37ac5c6da6ca4063513792c829bdbe8e804f7b01b28e54c9fc1c182b2,2024-02-29T13:49:47.277000
|
CVE-2024-27948,0,0,67e156b37ac5c6da6ca4063513792c829bdbe8e804f7b01b28e54c9fc1c182b2,2024-02-29T13:49:47.277000
|
||||||
CVE-2024-27949,0,0,12ee9b935394b527d1677a59b517c94d0df067a0b32bfff31d7cb2be5b4b5d00,2024-03-01T14:04:26.010000
|
CVE-2024-27949,0,0,12ee9b935394b527d1677a59b517c94d0df067a0b32bfff31d7cb2be5b4b5d00,2024-03-01T14:04:26.010000
|
||||||
CVE-2024-27950,0,0,56d632dad56c45d949d3327de16e5b70b08683cea8ce7876ca8c59cc37ee8062,2024-03-01T14:04:04.827000
|
CVE-2024-27950,0,0,56d632dad56c45d949d3327de16e5b70b08683cea8ce7876ca8c59cc37ee8062,2024-03-01T14:04:04.827000
|
||||||
@ -243042,6 +243047,7 @@ CVE-2024-29471,0,0,82d45a5ffd79414ce139218b143945b76a967fb1502a8005b616153a32c45
|
|||||||
CVE-2024-29472,0,0,8914457096a81cfec257e1932986907f8b2f25a966f10c0d7629905ec24b0f86,2024-03-21T12:58:51.093000
|
CVE-2024-29472,0,0,8914457096a81cfec257e1932986907f8b2f25a966f10c0d7629905ec24b0f86,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-29473,0,0,2dcbe7e94767e08f46a9353b62d8f30da500a221f5affb32fc9ef958cfff985b,2024-03-21T12:58:51.093000
|
CVE-2024-29473,0,0,2dcbe7e94767e08f46a9353b62d8f30da500a221f5affb32fc9ef958cfff985b,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-29474,0,0,cd74b93fedbacc13ab911c0f2a2b89e07d9e578953f3b262ce40503b72930e98,2024-03-21T12:58:51.093000
|
CVE-2024-29474,0,0,cd74b93fedbacc13ab911c0f2a2b89e07d9e578953f3b262ce40503b72930e98,2024-03-21T12:58:51.093000
|
||||||
|
CVE-2024-2948,1,1,a4fcee96ac543a16a7c4648e47d99e7d01a8481e14063944ded2893728590958,2024-03-30T08:15:07.330000
|
||||||
CVE-2024-29489,0,0,b53e28436eacd43712154645616899ea4ad86f89638685c2d1c1f1bd71a439fa,2024-03-29T12:45:02.937000
|
CVE-2024-29489,0,0,b53e28436eacd43712154645616899ea4ad86f89638685c2d1c1f1bd71a439fa,2024-03-29T12:45:02.937000
|
||||||
CVE-2024-29499,0,0,bc8db29a97bf5517e5213278d0d5f5ecdec4b51f00adea3262848d25f6e735bc,2024-03-22T19:02:10.300000
|
CVE-2024-29499,0,0,bc8db29a97bf5517e5213278d0d5f5ecdec4b51f00adea3262848d25f6e735bc,2024-03-22T19:02:10.300000
|
||||||
CVE-2024-2951,0,0,7025f71f619ebfb5f00b29e3d72fe62bb5f0ea0dbfe92a58b33e63352aa0779c,2024-03-27T12:29:41.530000
|
CVE-2024-2951,0,0,7025f71f619ebfb5f00b29e3d72fe62bb5f0ea0dbfe92a58b33e63352aa0779c,2024-03-27T12:29:41.530000
|
||||||
@ -243411,6 +243417,7 @@ CVE-2024-30645,0,0,88b4c3396d5e0adacc93f28d39da5928d08265f1211f6c05c1d8690fd0f03
|
|||||||
CVE-2024-3077,0,0,764729ebf4e3dc3c20da54caae721047879db4db5e2887f4d077635ba39ad95a,2024-03-29T12:45:02.937000
|
CVE-2024-3077,0,0,764729ebf4e3dc3c20da54caae721047879db4db5e2887f4d077635ba39ad95a,2024-03-29T12:45:02.937000
|
||||||
CVE-2024-3078,0,0,07ca6090eecfc88a41afb186ab370517deca7caa0d1280cb8ed031f58d59e15a,2024-03-29T13:28:22.880000
|
CVE-2024-3078,0,0,07ca6090eecfc88a41afb186ab370517deca7caa0d1280cb8ed031f58d59e15a,2024-03-29T13:28:22.880000
|
||||||
CVE-2024-3081,0,0,dffc68d1388aac08d9d9a9d84e2f2854f24235b2dd8bd2e907a0a195e3c85f14,2024-03-29T15:15:14.657000
|
CVE-2024-3081,0,0,dffc68d1388aac08d9d9a9d84e2f2854f24235b2dd8bd2e907a0a195e3c85f14,2024-03-29T15:15:14.657000
|
||||||
|
CVE-2024-3084,1,1,feb04b6812a124315d1816b70ccdcdd41a89f3d42f26905fef1bc9732a4ee86a,2024-03-30T08:15:07.510000
|
||||||
CVE-2024-3094,0,0,c6fffd56cf4a81476425ca638ec856baec49e7641b48e65fcf99476d7346527a,2024-03-29T19:15:41.947000
|
CVE-2024-3094,0,0,c6fffd56cf4a81476425ca638ec856baec49e7641b48e65fcf99476d7346527a,2024-03-29T19:15:41.947000
|
||||||
CVE-2024-31032,0,0,f6232fe0ef0534ba6d6e20ea0777fd8892cbb87efba42355deb8d8634b00d21e,2024-03-29T17:15:20.993000
|
CVE-2024-31032,0,0,f6232fe0ef0534ba6d6e20ea0777fd8892cbb87efba42355deb8d8634b00d21e,2024-03-29T17:15:20.993000
|
||||||
CVE-2024-31061,0,0,3a611478260a969dc7c268c913c4f396b21e3b4ebcb9a4cb4b0ae2a352b58da0,2024-03-28T20:53:20.813000
|
CVE-2024-31061,0,0,3a611478260a969dc7c268c913c4f396b21e3b4ebcb9a4cb4b0ae2a352b58da0,2024-03-28T20:53:20.813000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user