mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2024-04-29T10:00:38.038569+00:00
This commit is contained in:
parent
2f6f999fcb
commit
ce5a61dc8f
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2021-36821",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-03-16T15:15:10.113",
|
||||
"lastModified": "2023-11-07T03:36:51.373",
|
||||
"lastModified": "2024-04-29T09:15:06.850",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unauth. Stored Cross-Site Scripting (XSS) vulnerability in WPMU DEV Forminator \u2013 Contact Form, Payment Form & Custom Form Builder plugin\u00a0<= 1.14.11 versions."
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPMU DEV Forminator \u2013 Contact Form, Payment Form & Custom Form Builder allows Stored XSS.This issue affects Forminator \u2013 Contact Form, Payment Form & Custom Form Builder: from n/a through 1.14.11.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2021-36823",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2021-09-23T17:15:12.080",
|
||||
"lastModified": "2023-11-07T03:36:51.463",
|
||||
"lastModified": "2024-04-29T09:15:07.020",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Auth. Stored Cross-Site Scripting (XSS) vulnerability in WordPress Absolutely Glamorous Custom Admin plugin <= 6.8\u00a0versions.\n\n"
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Cusmin AGCA - Absolutely Glamorous Custom Admin (WordPress plugin) allows Stored XSS.This issue affects AGCA - Absolutely Glamorous Custom Admin (WordPress plugin): from n/a through 6.8.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-37998",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-10-03T10:15:10.483",
|
||||
"lastModified": "2023-10-04T19:54:12.660",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-04-29T09:15:07.163",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Saas Disabler plugin <=\u00a03.0.3 versions."
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Saas Disabler allows Cross Site Request Forgery.This issue affects Disabler: from n/a through 3.0.3.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-41728",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-10-02T08:15:38.580",
|
||||
"lastModified": "2023-10-03T20:55:45.703",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-04-29T09:15:07.277",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Rescue Themes Rescue Shortcodes plugin <=\u00a02.5 versions."
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rescue Themes Rescue Shortcodes allows Stored XSS.This issue affects Rescue Shortcodes: from n/a through 2.5.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27956",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-21T17:15:08.437",
|
||||
"lastModified": "2024-03-21T19:47:03.943",
|
||||
"lastModified": "2024-04-29T09:15:07.387",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,6 +51,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/articles/critical-vulnerabilities-patched-in-wordpress-automatic-plugin?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-automatic/wordpress-automatic-plugin-3-92-0-unauthenticated-arbitrary-sql-execution-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
|
55
CVE-2024/CVE-2024-289xx/CVE-2024-28961.json
Normal file
55
CVE-2024/CVE-2024-289xx/CVE-2024-28961.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-28961",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-04-29T09:15:07.477",
|
||||
"lastModified": "2024-04-29T09:15:07.477",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell OpenManage Enterprise, versions 4.0.0 and 4.0.1, contains a sensitive information disclosure vulnerability. A local low privileged malicious user could potentially exploit this vulnerability to obtain credentials leading to unauthorized access with elevated privileges. This could lead to further attacks, thus Dell recommends customers to upgrade at the earliest opportunity."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-256"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000224251/dsa-2024-184-security-update-for-dell-openmanage-enterprise-vulnerability",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-32109",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-11T13:15:56.157",
|
||||
"lastModified": "2024-04-11T13:30:38.000",
|
||||
"lastModified": "2024-04-29T09:15:07.707",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Julien Berthelot / MPEmbed.Com WP Matterport Shortcode.This issue affects WP Matterport Shortcode: from n/a through 2.1.8.\n\n"
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Julien Berthelot / MPEmbed.Com WP Matterport Shortcode allows Cross Site Request Forgery.This issue affects WP Matterport Shortcode: from n/a through 2.1.9.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-32129",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-15T11:15:11.233",
|
||||
"lastModified": "2024-04-15T13:15:31.997",
|
||||
"lastModified": "2024-04-29T09:15:07.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Freshworks Freshdesk (official).This issue affects Freshdesk (official): from n/a through 2.3.4.\n\n"
|
||||
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Freshworks Freshdesk (official).This issue affects Freshdesk (official): from n/a through 2.3.6.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33538.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33538.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33538",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T08:15:06.383",
|
||||
"lastModified": "2024-04-29T08:15:06.383",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Fastline Media LLC Assistant \u2013 Every Day Productivity Apps.This issue affects Assistant \u2013 Every Day Productivity Apps: from n/a through 1.4.9.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/assistant/wordpress-assistant-every-day-productivity-apps-plugin-1-4-9-1-sensitive-data-exposure-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33553.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33553.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33553",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T08:15:06.603",
|
||||
"lastModified": "2024-04-29T08:15:06.603",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of Untrusted Data vulnerability in 8theme XStore Core.This issue affects XStore Core: from n/a through 5.3.5.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/et-core-plugin/wordpress-xstore-core-plugin-5-3-5-unauthenticated-php-object-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33558.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33558.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33558",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T09:15:07.890",
|
||||
"lastModified": "2024-04-29T09:15:07.890",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in 8theme XStore Core.This issue affects XStore Core: from n/a through 5.3.5.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/et-core-plugin/wordpress-xstore-core-plugin-5-3-5-limited-arbitrary-file-download-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33566.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33566.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33566",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T08:15:06.803",
|
||||
"lastModified": "2024-04-29T08:15:06.803",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in N-Media OrderConvo allows OS Command Injection.This issue affects OrderConvo: from n/a through 12.4.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/admin-and-client-message-after-order-for-woocommerce/wordpress-orderconvo-plugin-12-4-unauthenticated-api-access-to-arbitrary-file-upload-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33575.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33575.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33575",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T08:15:06.987",
|
||||
"lastModified": "2024-04-29T08:15:06.987",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in User Meta user-meta.This issue affects User Meta: from n/a through 3.0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/user-meta/wordpress-user-meta-plugin-3-0-sensitive-data-exposure-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33584.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33584.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33584",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T08:15:07.170",
|
||||
"lastModified": "2024-04-29T08:15:07.170",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Deepen Bajracharya Video Conferencing with Zoom.This issue affects Video Conferencing with Zoom: from n/a through 4.4.4.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/video-conferencing-with-zoom-api/wordpress-video-conferencing-with-zoom-plugin-4-4-4-open-redirection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33596.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33596.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33596",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T09:15:08.080",
|
||||
"lastModified": "2024-04-29T09:15:08.080",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Five Star Plugins Five Star Restaurant Reservations.This issue affects Five Star Restaurant Reservations: from n/a through 2.6.16.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/restaurant-reservations/wordpress-five-star-restaurant-reservations-plugin-2-6-16-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33597.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33597.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33597",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T09:15:08.270",
|
||||
"lastModified": "2024-04-29T09:15:08.270",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in ProFaceOff SSU.This issue affects SSU: from n/a through 1.5.0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-s3-smart-upload/wordpress-ssu-plugin-1-5-0-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-336xx/CVE-2024-33627.json
Normal file
55
CVE-2024/CVE-2024-336xx/CVE-2024-33627.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33627",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T08:15:07.367",
|
||||
"lastModified": "2024-04-29T08:15:07.367",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Server-Side Request Forgery (SSRF) vulnerability in Cusmin Absolutely Glamorous Custom Admin.This issue affects Absolutely Glamorous Custom Admin: from n/a through 7.2.2.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/ag-custom-admin/wordpress-agca-custom-dashboard-login-page-plugin-7-2-2-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-336xx/CVE-2024-33629.json
Normal file
55
CVE-2024/CVE-2024-336xx/CVE-2024-33629.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33629",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T08:15:07.640",
|
||||
"lastModified": "2024-04-29T08:15:07.640",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Server-Side Request Forgery (SSRF) vulnerability in Creative Motion Auto Featured Image (Auto Post Thumbnail).This issue affects Auto Featured Image (Auto Post Thumbnail): from n/a through 4.0.0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/auto-post-thumbnail/wordpress-auto-featured-image-auto-post-thumbnail-plugin-4-0-0-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-336xx/CVE-2024-33634.json
Normal file
55
CVE-2024/CVE-2024-336xx/CVE-2024-33634.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33634",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T08:15:07.830",
|
||||
"lastModified": "2024-04-29T08:15:07.830",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Server-Side Request Forgery (SSRF) vulnerability in Piotnet Piotnet Addons For Elementor Pro.This issue affects Piotnet Addons For Elementor Pro: from n/a through 7.1.17.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/piotnet-addons-for-elementor-pro/wordpress-piotnet-addons-for-elementor-pro-plugin-7-1-17-unauthenticated-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-336xx/CVE-2024-33635.json
Normal file
55
CVE-2024/CVE-2024-336xx/CVE-2024-33635.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33635",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T09:15:08.460",
|
||||
"lastModified": "2024-04-29T09:15:08.460",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Piotnet Piotnet Addons For Elementor Pro.This issue affects Piotnet Addons For Elementor Pro: from n/a through 7.1.17.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/piotnet-addons-for-elementor-pro/wordpress-piotnet-addons-for-elementor-pro-plugin-7-1-17-unauthenticated-arbitrary-post-page-deletion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-336xx/CVE-2024-33636.json
Normal file
55
CVE-2024/CVE-2024-336xx/CVE-2024-33636.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33636",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T09:15:08.640",
|
||||
"lastModified": "2024-04-29T09:15:08.640",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Mahesh Vora WP Page Post Widget Clone.This issue affects WP Page Post Widget Clone: from n/a through 1.0.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-page-post-widget-clone/wordpress-wp-page-post-widget-clone-plugin-1-0-1-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-336xx/CVE-2024-33637.json
Normal file
55
CVE-2024/CVE-2024-336xx/CVE-2024-33637.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33637",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T08:15:08.007",
|
||||
"lastModified": "2024-04-29T08:15:08.007",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insertion of Sensitive Information into Log File vulnerability in Solid Plugins Solid Affiliate.This issue affects Solid Affiliate: from n/a through 1.9.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-532"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/solid-affiliate/wordpress-solid-affiliate-plugin-1-9-1-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-336xx/CVE-2024-33641.json
Normal file
55
CVE-2024/CVE-2024-336xx/CVE-2024-33641.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33641",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T08:15:08.200",
|
||||
"lastModified": "2024-04-29T08:15:08.200",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of Untrusted Data vulnerability in Team Yoast Custom field finder.This issue affects Custom field finder: from n/a through 0.3.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/custom-field-finder/wordpress-custom-field-finder-plugin-0-3-php-object-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-336xx/CVE-2024-33652.json
Normal file
55
CVE-2024/CVE-2024-336xx/CVE-2024-33652.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33652",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T08:15:08.383",
|
||||
"lastModified": "2024-04-29T08:15:08.383",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Real Big Plugins Client Dash.This issue affects Client Dash: from n/a through 2.2.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/client-dash/wordpress-client-dash-plugin-2-2-1-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-336xx/CVE-2024-33684.json
Normal file
55
CVE-2024/CVE-2024-336xx/CVE-2024-33684.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33684",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T09:15:08.833",
|
||||
"lastModified": "2024-04-29T09:15:08.833",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Pdfcrowd Save as PDF plugin by Pdfcrowd allows Stored XSS.This issue affects Save as PDF plugin by Pdfcrowd: from n/a through 3.2.0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/save-as-pdf-by-pdfcrowd/wordpress-save-as-pdf-plugin-by-pdfcrowd-plugin-3-2-0-broken-access-control-to-stored-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-33xx/CVE-2024-3375.json
Normal file
55
CVE-2024/CVE-2024-33xx/CVE-2024-3375.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-3375",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-04-29T09:15:09.017",
|
||||
"lastModified": "2024-04-29T09:15:09.017",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect Permission Assignment for Critical Resource vulnerability in Havelsan Inc. Dialogue allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Dialogue: from v1.83 before v1.83.1 or v1.84.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.4,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-0363",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
63
README.md
63
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-29T08:00:38.345826+00:00
|
||||
2024-04-29T10:00:38.038569+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-29T07:15:08.740000+00:00
|
||||
2024-04-29T09:15:09.017000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,46 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
247065
|
||||
247084
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `30`
|
||||
Recently added CVEs: `19`
|
||||
|
||||
- [CVE-2024-3193](CVE-2024/CVE-2024-31xx/CVE-2024-3193.json) (`2024-04-29T07:15:07.773`)
|
||||
- [CVE-2024-3194](CVE-2024/CVE-2024-31xx/CVE-2024-3194.json) (`2024-04-29T07:15:08.070`)
|
||||
- [CVE-2024-3195](CVE-2024/CVE-2024-31xx/CVE-2024-3195.json) (`2024-04-29T07:15:08.400`)
|
||||
- [CVE-2024-3196](CVE-2024/CVE-2024-31xx/CVE-2024-3196.json) (`2024-04-29T07:15:08.740`)
|
||||
- [CVE-2024-33537](CVE-2024/CVE-2024-335xx/CVE-2024-33537.json) (`2024-04-29T06:15:08.083`)
|
||||
- [CVE-2024-33539](CVE-2024/CVE-2024-335xx/CVE-2024-33539.json) (`2024-04-29T06:15:08.930`)
|
||||
- [CVE-2024-33540](CVE-2024/CVE-2024-335xx/CVE-2024-33540.json) (`2024-04-29T06:15:09.637`)
|
||||
- [CVE-2024-33542](CVE-2024/CVE-2024-335xx/CVE-2024-33542.json) (`2024-04-29T06:15:10.220`)
|
||||
- [CVE-2024-33544](CVE-2024/CVE-2024-335xx/CVE-2024-33544.json) (`2024-04-29T07:15:06.543`)
|
||||
- [CVE-2024-33546](CVE-2024/CVE-2024-335xx/CVE-2024-33546.json) (`2024-04-29T07:15:06.810`)
|
||||
- [CVE-2024-33548](CVE-2024/CVE-2024-335xx/CVE-2024-33548.json) (`2024-04-29T06:15:10.937`)
|
||||
- [CVE-2024-33551](CVE-2024/CVE-2024-335xx/CVE-2024-33551.json) (`2024-04-29T06:15:11.487`)
|
||||
- [CVE-2024-33554](CVE-2024/CVE-2024-335xx/CVE-2024-33554.json) (`2024-04-29T06:15:12.090`)
|
||||
- [CVE-2024-33559](CVE-2024/CVE-2024-335xx/CVE-2024-33559.json) (`2024-04-29T06:15:12.607`)
|
||||
- [CVE-2024-33562](CVE-2024/CVE-2024-335xx/CVE-2024-33562.json) (`2024-04-29T06:15:13.163`)
|
||||
- [CVE-2024-33571](CVE-2024/CVE-2024-335xx/CVE-2024-33571.json) (`2024-04-29T06:15:13.667`)
|
||||
- [CVE-2024-33630](CVE-2024/CVE-2024-336xx/CVE-2024-33630.json) (`2024-04-29T06:15:14.450`)
|
||||
- [CVE-2024-33631](CVE-2024/CVE-2024-336xx/CVE-2024-33631.json) (`2024-04-29T06:15:14.940`)
|
||||
- [CVE-2024-33632](CVE-2024/CVE-2024-336xx/CVE-2024-33632.json) (`2024-04-29T06:15:15.537`)
|
||||
- [CVE-2024-33681](CVE-2024/CVE-2024-336xx/CVE-2024-33681.json) (`2024-04-29T06:15:16.057`)
|
||||
- [CVE-2024-33686](CVE-2024/CVE-2024-336xx/CVE-2024-33686.json) (`2024-04-29T06:15:16.623`)
|
||||
- [CVE-2024-33904](CVE-2024/CVE-2024-339xx/CVE-2024-33904.json) (`2024-04-29T06:15:17.320`)
|
||||
- [CVE-2024-33905](CVE-2024/CVE-2024-339xx/CVE-2024-33905.json) (`2024-04-29T06:15:17.667`)
|
||||
- [CVE-2024-4302](CVE-2024/CVE-2024-43xx/CVE-2024-4302.json) (`2024-04-29T06:15:17.803`)
|
||||
- [CVE-2024-4303](CVE-2024/CVE-2024-43xx/CVE-2024-4303.json) (`2024-04-29T06:15:18.457`)
|
||||
- [CVE-2024-28961](CVE-2024/CVE-2024-289xx/CVE-2024-28961.json) (`2024-04-29T09:15:07.477`)
|
||||
- [CVE-2024-33538](CVE-2024/CVE-2024-335xx/CVE-2024-33538.json) (`2024-04-29T08:15:06.383`)
|
||||
- [CVE-2024-33553](CVE-2024/CVE-2024-335xx/CVE-2024-33553.json) (`2024-04-29T08:15:06.603`)
|
||||
- [CVE-2024-33558](CVE-2024/CVE-2024-335xx/CVE-2024-33558.json) (`2024-04-29T09:15:07.890`)
|
||||
- [CVE-2024-33566](CVE-2024/CVE-2024-335xx/CVE-2024-33566.json) (`2024-04-29T08:15:06.803`)
|
||||
- [CVE-2024-33575](CVE-2024/CVE-2024-335xx/CVE-2024-33575.json) (`2024-04-29T08:15:06.987`)
|
||||
- [CVE-2024-33584](CVE-2024/CVE-2024-335xx/CVE-2024-33584.json) (`2024-04-29T08:15:07.170`)
|
||||
- [CVE-2024-33596](CVE-2024/CVE-2024-335xx/CVE-2024-33596.json) (`2024-04-29T09:15:08.080`)
|
||||
- [CVE-2024-33597](CVE-2024/CVE-2024-335xx/CVE-2024-33597.json) (`2024-04-29T09:15:08.270`)
|
||||
- [CVE-2024-33627](CVE-2024/CVE-2024-336xx/CVE-2024-33627.json) (`2024-04-29T08:15:07.367`)
|
||||
- [CVE-2024-33629](CVE-2024/CVE-2024-336xx/CVE-2024-33629.json) (`2024-04-29T08:15:07.640`)
|
||||
- [CVE-2024-33634](CVE-2024/CVE-2024-336xx/CVE-2024-33634.json) (`2024-04-29T08:15:07.830`)
|
||||
- [CVE-2024-33635](CVE-2024/CVE-2024-336xx/CVE-2024-33635.json) (`2024-04-29T09:15:08.460`)
|
||||
- [CVE-2024-33636](CVE-2024/CVE-2024-336xx/CVE-2024-33636.json) (`2024-04-29T09:15:08.640`)
|
||||
- [CVE-2024-33637](CVE-2024/CVE-2024-336xx/CVE-2024-33637.json) (`2024-04-29T08:15:08.007`)
|
||||
- [CVE-2024-33641](CVE-2024/CVE-2024-336xx/CVE-2024-33641.json) (`2024-04-29T08:15:08.200`)
|
||||
- [CVE-2024-33652](CVE-2024/CVE-2024-336xx/CVE-2024-33652.json) (`2024-04-29T08:15:08.383`)
|
||||
- [CVE-2024-33684](CVE-2024/CVE-2024-336xx/CVE-2024-33684.json) (`2024-04-29T09:15:08.833`)
|
||||
- [CVE-2024-3375](CVE-2024/CVE-2024-33xx/CVE-2024-3375.json) (`2024-04-29T09:15:09.017`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `7`
|
||||
|
||||
- [CVE-2024-1023](CVE-2024/CVE-2024-10xx/CVE-2024-1023.json) (`2024-04-29T07:15:06.233`)
|
||||
- [CVE-2024-1300](CVE-2024/CVE-2024-13xx/CVE-2024-1300.json) (`2024-04-29T07:15:06.423`)
|
||||
- [CVE-2021-36821](CVE-2021/CVE-2021-368xx/CVE-2021-36821.json) (`2024-04-29T09:15:06.850`)
|
||||
- [CVE-2021-36823](CVE-2021/CVE-2021-368xx/CVE-2021-36823.json) (`2024-04-29T09:15:07.020`)
|
||||
- [CVE-2023-37998](CVE-2023/CVE-2023-379xx/CVE-2023-37998.json) (`2024-04-29T09:15:07.163`)
|
||||
- [CVE-2023-41728](CVE-2023/CVE-2023-417xx/CVE-2023-41728.json) (`2024-04-29T09:15:07.277`)
|
||||
- [CVE-2024-27956](CVE-2024/CVE-2024-279xx/CVE-2024-27956.json) (`2024-04-29T09:15:07.387`)
|
||||
- [CVE-2024-32109](CVE-2024/CVE-2024-321xx/CVE-2024-32109.json) (`2024-04-29T09:15:07.707`)
|
||||
- [CVE-2024-32129](CVE-2024/CVE-2024-321xx/CVE-2024-32129.json) (`2024-04-29T09:15:07.803`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
97
_state.csv
97
_state.csv
@ -179206,8 +179206,8 @@ CVE-2021-36818,0,0,2033cd4988573d21f25ce8babf37194bb98983bd21b883fa66e8587ed3b5d
|
||||
CVE-2021-36819,0,0,21dec9b0b146d489f3ee23dd8879ad8572069279acd9be25b86f3906e832f059,2023-11-07T03:36:50.893000
|
||||
CVE-2021-3682,0,0,0f8e570c4f9966e0dfc70ace2ee43e3192608b4365180d452215f9eea36a5d5a,2023-03-31T18:26:51.630000
|
||||
CVE-2021-36820,0,0,c6a4937e7063cb9ab4b264d0478673f6d51d9032791dbd93389c0b268f395049,2023-11-07T03:36:51.130000
|
||||
CVE-2021-36821,0,0,61d58f36327d01044e65fbad1a3aef08f2ff4862546a68ba812efd5ed02b3928,2023-11-07T03:36:51.373000
|
||||
CVE-2021-36823,0,0,9008ea2710ab1328fd307f8a5d98e3a5df66b9e7d4e7d6c6d091b79989e96320,2023-11-07T03:36:51.463000
|
||||
CVE-2021-36821,0,1,5143e6cad35fa9a0f4029a8643b85a408f5d31fec8532aa4f1704d78dd733bcf,2024-04-29T09:15:06.850000
|
||||
CVE-2021-36823,0,1,8cbcf9733cf1ed187f61116d89b52e148d59203005cad4a257f2215db428a4a0,2024-04-29T09:15:07.020000
|
||||
CVE-2021-36826,0,0,08d3d74590139e3fb6d5829346559d76245d5ea576a3299c7ae0afa05861256b,2023-11-07T03:36:51.557000
|
||||
CVE-2021-36827,0,0,c41dd6b48f6c916c91266a4cc3382d8af6038eefef9c1739e93482528ed892d5,2023-11-07T03:36:51.653000
|
||||
CVE-2021-36828,0,0,63e193c12dcccf2cf5162cb230c3af11b82709a825557d9ed13a73b18760ff72,2023-10-12T12:15:09.920000
|
||||
@ -227142,7 +227142,7 @@ CVE-2023-37994,0,0,145c46abd9a225a566f9e609d241a77007bf221aa4f45667049dff5ef2012
|
||||
CVE-2023-37995,0,0,d2997272909836e557b3f86dfeec338712dbc866fa0d494a8e9dcdd88f6a8006,2023-10-05T17:04:25.617000
|
||||
CVE-2023-37996,0,0,e3a09fdcf2e5a94ed2ba35ff3097a80c48c320097f9c91ee2fe29ed9d48ed7e7,2023-10-04T17:13:22.887000
|
||||
CVE-2023-37997,0,0,634a8f00a3a7cefaea8286574903fd4dd9cef7262779039b9494ebb47f14c6b7,2023-09-07T13:05:27.313000
|
||||
CVE-2023-37998,0,0,1e32225316349b19ac5d99a727f7ef3fdaabd14e9071142212ce28f8a95ba748,2023-10-04T19:54:12.660000
|
||||
CVE-2023-37998,0,1,1747e4f0f6ddf4d50fd6cbdf2ef7e31b2a7283ba267cf7dde73ae9cd8c8e621a,2024-04-29T09:15:07.163000
|
||||
CVE-2023-3800,0,0,774d32c7b5fb881d1d40e6872ba5eec3309f4fee64d58b63dc188b5cb5069530,2024-04-11T01:21:23.090000
|
||||
CVE-2023-38000,0,0,0e0c6bbc8458c85090972cb27733399c7be344be574c892a61848bb47624d50a,2023-10-16T17:04:06.637000
|
||||
CVE-2023-38003,0,0,1818608b52e574766674a96fd387dab05b406afb5af9478c08cafc61d6b9b561,2024-01-19T16:15:09.013000
|
||||
@ -229810,7 +229810,7 @@ CVE-2023-41724,0,0,52a7ac367ea3adaef0da452d1f9fcfe8e474049192390ddce1cdad2f409b3
|
||||
CVE-2023-41725,0,0,ef65a845340b2e5995978b7ff227127be0d8e07ed7a8d62bd421fd7106110973,2023-11-09T20:48:01.590000
|
||||
CVE-2023-41726,0,0,fb669107c42200a4419d1537040429448894a928afcfa430fdee2f48dca99d87,2023-11-09T20:47:03.140000
|
||||
CVE-2023-41727,0,0,1aea9ec78204883dbfc26cfb24b18446bca80c0abe98ce4d6d9d69448220db2e,2023-12-21T04:48:25.067000
|
||||
CVE-2023-41728,0,0,412eb06c20bf3866dfa57a11d0ee087de3e3eff171a28895f60b7d9e0cc862d2,2023-10-03T20:55:45.703000
|
||||
CVE-2023-41728,0,1,7a0742b27b0ade05defe664bcd5a99072ff0d518cd86f979b9cb64aefdbdc469,2024-04-29T09:15:07.277000
|
||||
CVE-2023-41729,0,0,5df9823fffd4661ec50c1f97a1351b1d8951df4a280dd104e71fe164a121673d,2023-10-03T20:55:37.293000
|
||||
CVE-2023-4173,0,0,4da8873068b249eb68d85abdc6a2b4432dbfdb20685e151dced0645fbf06d4cc,2024-04-11T01:22:22.807000
|
||||
CVE-2023-41730,0,0,a5d777a2d4ed8b6bbf02038800ba1cae8428175b6bdde086d65deb9402e1c86d,2023-10-11T20:51:55.970000
|
||||
@ -236717,7 +236717,7 @@ CVE-2023-52716,0,0,fac095701883d01d5f92e56c70701dc066b3ae8f92d0c5921c5cf0aa2fbb0
|
||||
CVE-2023-52717,0,0,e713315d9fcc50e6cbb98e0dd380e2c86ba52b63a35d352b23f2645ee0f83a24,2024-04-08T18:48:40.217000
|
||||
CVE-2023-5272,0,0,e188ff056a72e73c412c109b97d5eb37c41b2dbce71d285e9dfeb205fc3a7064,2024-04-11T01:22:56.733000
|
||||
CVE-2023-52722,0,0,58a4dacfed06269af66d591e2c90392281dec137a91dd3653eb193059da1f3b7,2024-04-28T00:15:07.270000
|
||||
CVE-2023-52723,1,1,d4be2feca33226ddfe4838f7958d61e46f837250fa1c183dc1e9ed285ea7ec65,2024-04-29T06:15:06.983000
|
||||
CVE-2023-52723,0,0,d4be2feca33226ddfe4838f7958d61e46f837250fa1c183dc1e9ed285ea7ec65,2024-04-29T06:15:06.983000
|
||||
CVE-2023-5273,0,0,6f05c674078315237abe3d7b2ebcc88fea13416a5c7e4aafdfcff23a1ae8a322,2024-04-11T01:22:56.817000
|
||||
CVE-2023-5274,0,0,230ef4c0e160801f289163632d814f7177c2b1395a715b72f33c8d0b5d876249,2023-12-05T18:20:39.937000
|
||||
CVE-2023-5275,0,0,9a81436027e8dad0b67eefc484a675cc6dfdf47ffb7247993749a2124145a13c,2023-12-05T18:18:37.050000
|
||||
@ -239233,7 +239233,7 @@ CVE-2024-1019,0,0,27c6fed97db80e9684966512d657c2ae1b8d86be0f46f2f894fd714e51d0d5
|
||||
CVE-2024-1020,0,0,adc5ab5f2da8e36fe7b7aa7c315c830611f48798a94b22d42b050e3e9e630362,2024-04-11T01:24:18.170000
|
||||
CVE-2024-1021,0,0,7bcf34eb76307cde4ae64d588874bf57854c5c64505f94e3349469a346a9c6cb,2024-04-11T01:24:18.257000
|
||||
CVE-2024-1022,0,0,357efb4939784b3bedb659f15a28d0e47d08529e441db0e0be00cbc23a0198b9,2024-04-11T01:24:18.350000
|
||||
CVE-2024-1023,0,1,f385656c92a71370efff252bd7c129136dc520292043427aaca7a2375a03c816,2024-04-29T07:15:06.233000
|
||||
CVE-2024-1023,0,0,f385656c92a71370efff252bd7c129136dc520292043427aaca7a2375a03c816,2024-04-29T07:15:06.233000
|
||||
CVE-2024-1024,0,0,85149b221a8921f7ffbd9c6aa85a2dfcc208fc0fbfab7fd4f41d63975d68c1d5,2024-04-11T01:24:18.463000
|
||||
CVE-2024-1026,0,0,ce9d6ecfc0c397ada0ff1130145169bc08739645437cccf4be1ae651761bfb1b,2024-04-11T01:24:18.550000
|
||||
CVE-2024-1027,0,0,ee916bdd4519e7da0384e34a5415b2bb4d3bac5a3382b229877ac74923e86538,2024-04-11T01:24:18.637000
|
||||
@ -239468,7 +239468,7 @@ CVE-2024-1294,0,0,1a6fde55ee17952393d258a28e1938bfe41cafec05fa305cc82057814b7c2b
|
||||
CVE-2024-1296,0,0,ab648d9dba58ca530bb990b50d92c4f5ce9f591faa8fbeeb49385095b8425c33,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1297,0,0,1fc219bb038ab422185a999365115aff94759fe3e5ff94e3dc4180f1d6bc82d0,2024-02-20T19:50:53.960000
|
||||
CVE-2024-1299,0,0,165a6e5bf7396c9871edb84a6ce28d3386b33fd34eb9238065e890fa150a178a,2024-03-07T13:52:27.110000
|
||||
CVE-2024-1300,0,1,0d670db12603e944dcc15b5481ece919335822514a418179c496d8822134bd6f,2024-04-29T07:15:06.423000
|
||||
CVE-2024-1300,0,0,0d670db12603e944dcc15b5481ece919335822514a418179c496d8822134bd6f,2024-04-29T07:15:06.423000
|
||||
CVE-2024-1301,0,0,68d5e322fab21220735382791ea9287e8104e954fa5bc7b1f8f02021f25e280b,2024-03-12T17:46:17.273000
|
||||
CVE-2024-1302,0,0,e42b35f7a02693024fada8fec8e812444e0bb721c54c537bf6c1b8db8c60ce66,2024-03-12T17:46:17.273000
|
||||
CVE-2024-1303,0,0,d6386ac67e1b3bd9c657849a1747229ab86034b9c989d20fb5cde0be8bba0359,2024-03-12T17:46:17.273000
|
||||
@ -239938,7 +239938,7 @@ CVE-2024-1900,0,0,df3a7e0d7f662e0642af797e67801f5b993e667e914107fd3f604cd2322f2a
|
||||
CVE-2024-1901,0,0,e852d825cede13009c4c827235fab136069de3983ba4df012d62632a4fcd1d38,2024-03-06T15:18:08.093000
|
||||
CVE-2024-1902,0,0,012f8c6561b23779499ee60e1b0701a7ed975d80b89eade3a28f94f4708254ec,2024-04-15T18:15:10.070000
|
||||
CVE-2024-1904,0,0,894e214d09f8efe1b9b69452204531788406056d1489422306bbd393d57cb47d,2024-04-10T13:23:38.787000
|
||||
CVE-2024-1905,1,1,99fc2a264209d40d17540b1f82384a2b60d6e4fdfef05f9a479a7d2dc908eb8d,2024-04-29T06:15:07.650000
|
||||
CVE-2024-1905,0,0,99fc2a264209d40d17540b1f82384a2b60d6e4fdfef05f9a479a7d2dc908eb8d,2024-04-29T06:15:07.650000
|
||||
CVE-2024-1906,0,0,4a0389164694374915846934d3ecd021a9b146d80ff266286dcad5a6eeb2c849,2024-02-27T14:19:41.650000
|
||||
CVE-2024-1907,0,0,674a8f990612fbd789e8b29e4f4db555efa2966321d7535d44b4ff9d82432ec5,2024-02-27T14:19:41.650000
|
||||
CVE-2024-1908,0,0,92bf17210112d2d60d7d442f37608315d845944e26306753d826ae8aa1a4dd43,2024-03-21T12:58:51.093000
|
||||
@ -242601,7 +242601,7 @@ CVE-2024-25030,0,0,fc3de3fd573e21787e1c0bdd960fb3a4c590b360d40ba7c7d9e34380b9c90
|
||||
CVE-2024-2504,0,0,b952b345d554f248180cfc37dd33de3d29aef92bb40f82f2454b4ee2e2c1523d,2024-04-10T13:23:38.787000
|
||||
CVE-2024-25046,0,0,64b67efbc5b2947bdef146aee983b6003b7daa23659b2bfe93519b90947330ac,2024-04-03T17:24:18.150000
|
||||
CVE-2024-25048,0,0,f98b5f829311c9c9a726d02cd66b8a93a4755ae4aa235bf4cd2af7701d9667d0,2024-04-27T12:15:10.517000
|
||||
CVE-2024-2505,1,1,52f7b4fb73939784ef566f22fc7864f65f01228d17a754b7b6510c54c8095deb,2024-04-29T06:15:07.937000
|
||||
CVE-2024-2505,0,0,52f7b4fb73939784ef566f22fc7864f65f01228d17a754b7b6510c54c8095deb,2024-04-29T06:15:07.937000
|
||||
CVE-2024-25050,0,0,1ff20d693c75735252bb078c1b9df844137fdb7eca3fe844e495a58addd9c2a1,2024-04-28T13:15:08.257000
|
||||
CVE-2024-25062,0,0,9596ed5cf07a8bc8469d4afc28fc727a431af7cff3b6b8e84435c301d9955756,2024-02-13T00:40:40.503000
|
||||
CVE-2024-25063,0,0,ada8a3e76748f7f6ba8d6378c081423ac8f962f095964d00e876ad6b7009736e,2024-03-04T22:45:02.117000
|
||||
@ -244203,7 +244203,7 @@ CVE-2024-27950,0,0,56d632dad56c45d949d3327de16e5b70b08683cea8ce7876ca8c59cc37ee8
|
||||
CVE-2024-27951,0,0,fb648e7b48d01c386d90ab877e0e6e5ad9ac54d7f9cf31355978050c72eaffef,2024-04-03T12:38:04.840000
|
||||
CVE-2024-27952,0,0,fe624616809d2b08e76659d4d30a802797c8b1dea609a0360dcd8752b7d9cac9,2024-03-13T18:15:58.530000
|
||||
CVE-2024-27953,0,0,2a6d5a1801b407ff03c3610ff9d51f6689bbe6434fd00573a417d8c900d7386a,2024-03-13T18:15:58.530000
|
||||
CVE-2024-27956,0,0,f490f7ec3bd48189a1ef57af88670e81296dde010b86c5edf00de693d7370df0,2024-03-21T19:47:03.943000
|
||||
CVE-2024-27956,0,1,194fe594f0f82199e60d61684a1f7c8db8c04bdf57c93a45e71af1bb25f7851a,2024-04-29T09:15:07.387000
|
||||
CVE-2024-27957,0,0,3bb51417dd78fa81cd8d3e079ab9ae6ed1b9709468847cb623b9c9568eef40f4,2024-03-17T22:38:29.433000
|
||||
CVE-2024-27958,0,0,3c69427bef710d3f7bb781ce81b405984dd58d08367be619f590c223ad730fd4,2024-03-17T22:38:29.433000
|
||||
CVE-2024-27959,0,0,b6158d09fbe57e466eaa147e639a460dd447ef6efe99a61800919c1426ccc29c,2024-03-17T22:38:29.433000
|
||||
@ -244706,6 +244706,7 @@ CVE-2024-28951,0,0,c59d22693a6783914cb02db5be2e1a6f5b0c6277d54a6ec5614d046ef86ff
|
||||
CVE-2024-28957,0,0,a169098a05ac68c39610a9d0c21c80f908b4c73fb6ad140d0292417789484670,2024-04-15T13:15:31.997000
|
||||
CVE-2024-2896,0,0,5de59d7245da47f589f3ef8b760f3f6474bf3327cc8f382548cfd383506a8e1b,2024-04-11T01:25:40.217000
|
||||
CVE-2024-28960,0,0,e8dbeb1ca04aba553db6ad0a923d45f708fa651bef11fd340f54cf32195f3cfb,2024-04-19T23:15:10.657000
|
||||
CVE-2024-28961,1,1,bca106ae9d03a30b3071a716b43bd6a4eee060236e9367c779bc0c8b76366875,2024-04-29T09:15:07.477000
|
||||
CVE-2024-28963,0,0,c5c3b185efea606aed4d9595c8d313f3f2c0068b841b7e1d435fe02dbde99f32,2024-04-24T13:39:42.883000
|
||||
CVE-2024-2897,0,0,845f7ba04cd28c84698eb0ec67ce51aa02df2e982261e886754cbe95c0546759,2024-04-11T01:25:40.303000
|
||||
CVE-2024-28976,0,0,224761c00a34a63d518e2df17d9e4e0dcdf6133206e4a1c859d89e6d8634ce80,2024-04-24T13:39:42.883000
|
||||
@ -246088,8 +246089,8 @@ CVE-2024-31873,0,0,30397559953deb34a9ae192149473632dc6b2334245e920787a4c5e14fc76
|
||||
CVE-2024-31874,0,0,1770e58d0ae5591eb931a8cdfdb054fb4d854f81849d14af250c71db6caf553c,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3188,0,0,5d70d4884e37e1862c5503e8662fdd8be316d1df7ecad77f44114699c1426b8a,2024-04-26T12:58:17.720000
|
||||
CVE-2024-31887,0,0,e951c215b0e12b882bcc7244c98d7631ee4f4b7a3271b5f24e369f1a635cd3e5,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3191,1,1,909de57a0e1134c017815b99f5374905a7cebaa6da948da4a489799e7c96ecfa,2024-04-29T07:15:07.080000
|
||||
CVE-2024-3192,1,1,725dda67edbc96beb58e8c0c2444a458c6950abc195edff7ad4f85d511813766,2024-04-29T07:15:07.480000
|
||||
CVE-2024-3191,0,0,909de57a0e1134c017815b99f5374905a7cebaa6da948da4a489799e7c96ecfa,2024-04-29T07:15:07.080000
|
||||
CVE-2024-3192,0,0,725dda67edbc96beb58e8c0c2444a458c6950abc195edff7ad4f85d511813766,2024-04-29T07:15:07.480000
|
||||
CVE-2024-31920,0,0,3c0045dbbecad7d78d5b9eb044589c2fc290e421e2d5accb9391890092efc90f,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31921,0,0,732b3dfcff7f3c38928ece374bd7708cd93eb00a4dc0a7d5ac8e2f115b9d7217,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31922,0,0,ab7058b1ab970c1607707e3b516fb20a2b1bb9e11ac7a3e1d4bef18b1ec4d6b7,2024-04-15T13:15:31.997000
|
||||
@ -246100,7 +246101,7 @@ CVE-2024-31926,0,0,5ea07bd781aaf165e7c249d84898bbaee298d70cc8e541e3b74d17ae8e2ec
|
||||
CVE-2024-31927,0,0,6cd17f97d47f2415c03c97ad66e9324a16977292b8eb97b821aae9ba7a0f2833,2024-04-11T13:30:38
|
||||
CVE-2024-31928,0,0,e6cc120c3629d81f3db9dcadc93c459e7b269490e6128fcc8be3997c3ef595e9,2024-04-11T13:30:38
|
||||
CVE-2024-31929,0,0,5359df4522faa8d2c46f605d48868a6939d06d35e038e5f3287851d0461688a3,2024-04-11T13:30:38
|
||||
CVE-2024-3193,1,1,ea73d12bc10265a58216dce72c432ee965205457c358de1f1b4800cf51e18cca,2024-04-29T07:15:07.773000
|
||||
CVE-2024-3193,0,0,ea73d12bc10265a58216dce72c432ee965205457c358de1f1b4800cf51e18cca,2024-04-29T07:15:07.773000
|
||||
CVE-2024-31930,0,0,628cb0e5103582aeccc9f3e33331b9dbe7dba70b3951389bc2f9327ad3b8f5ee,2024-04-11T13:30:38
|
||||
CVE-2024-31931,0,0,31bc6de522002d5fbdfc52e575ea088ef3d3fde1fc3f2ee4856692982b9dc2cf,2024-04-11T13:30:38
|
||||
CVE-2024-31932,0,0,cbdc79dc2f64dd5bef9877c31b5d39549faf66977f5313958012ec22e616327c,2024-04-11T13:30:38
|
||||
@ -246111,7 +246112,7 @@ CVE-2024-31936,0,0,41ae8d4679677e086c385533d0a63055153ebb271d32fb7547401292a6a57
|
||||
CVE-2024-31937,0,0,24fb14fc8c636ca322e17128cc4ef69cbdba60a9f579b74e55aed300a2f73ed6,2024-04-11T13:30:38
|
||||
CVE-2024-31938,0,0,5f3f05f61d1ef2cd5bad53d9f5667002cb10342b194111eed40f5ded72653f03,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31939,0,0,dc9cc0dfd8ae0f6c4caa1a4775b1cc86559b00f81c6408b5f2a51c57007b5d9e,2024-04-11T12:47:44.137000
|
||||
CVE-2024-3194,1,1,d329211d83b0115ad0b19eeb5be2a89ccbb6bafb933feb45b5e8a49d955922d1,2024-04-29T07:15:08.070000
|
||||
CVE-2024-3194,0,0,d329211d83b0115ad0b19eeb5be2a89ccbb6bafb933feb45b5e8a49d955922d1,2024-04-29T07:15:08.070000
|
||||
CVE-2024-31940,0,0,1ddf48c04277bac2492208785102f32503356b7d59b7891c524b2c22b8846edb,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31941,0,0,b8dc065fda42126e32d28a44ef547549a83996a827e764074359d3e3ec8c1e09,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31942,0,0,ceae4b513a0b6e905236b05cb5dd98d07a79c0420729857e9c51c87c35b65b17,2024-04-15T13:15:31.997000
|
||||
@ -246119,10 +246120,10 @@ CVE-2024-31943,0,0,d050ed16bd2fd56e0b74cc5712c1eb7ef94538d6cfa9c00022a6cfa048bd2
|
||||
CVE-2024-31944,0,0,d1cf01bee95ac2d1b4f198f30f665ce7f3dae041b6378dd5d37f86b95341e18f,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31948,0,0,61f6d35222c1e3f11e25e4eb10990c24f6ea2b07724ec51b46fb0ba4b709b0cc,2024-04-28T07:15:08.843000
|
||||
CVE-2024-31949,0,0,d55253e38f8bc425df8f875d525d4d6b96cb3180b7d665ec7de9778e227e2105,2024-04-28T07:15:08.917000
|
||||
CVE-2024-3195,1,1,6d60776e21ae5e9a12630c8927b26ba77fa690068c68c10ca942d3c06a3f5897,2024-04-29T07:15:08.400000
|
||||
CVE-2024-3195,0,0,6d60776e21ae5e9a12630c8927b26ba77fa690068c68c10ca942d3c06a3f5897,2024-04-29T07:15:08.400000
|
||||
CVE-2024-31950,0,0,6cefb0ca8246a802eee33ecaeabf30a3794c53c92173f69e19945e3bf38104d7,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31951,0,0,a02cb6e83819b8aefe87f14fcbaf10a3986c9b6174676e08f67eb54fe256f190,2024-04-08T18:48:40.217000
|
||||
CVE-2024-3196,1,1,ddedfe5cfa69a5a0e563bb0daac4e7b058b56096294d5609b3943dc244d20005,2024-04-29T07:15:08.740000
|
||||
CVE-2024-3196,0,0,ddedfe5cfa69a5a0e563bb0daac4e7b058b56096294d5609b3943dc244d20005,2024-04-29T07:15:08.740000
|
||||
CVE-2024-31978,0,0,905fe24a9cf546b211ed3cfae7258dc772856eb0550beb1f55c95bc3799601d2,2024-04-09T12:48:04.090000
|
||||
CVE-2024-31981,0,0,6b90fc014c719d42bc6275e095b2e18dc9d544859b6ab5a3b554ecb5ab03a845,2024-04-11T12:47:44.137000
|
||||
CVE-2024-31982,0,0,8e15c1dad7e15762a1fbb5bb26c4de9afb40b54c1e4ad12ab123edd90435cd54,2024-04-11T12:47:44.137000
|
||||
@ -246198,14 +246199,14 @@ CVE-2024-32105,0,0,14f3c307fe159fa2b4817fc42bb4e5becf74df81f12e854ac688d637ee1e6
|
||||
CVE-2024-32106,0,0,2e3f5a57bd781bd3a30c937e8aa33ba1f212672a8df9850b791a63471fb05d63,2024-04-11T13:30:38
|
||||
CVE-2024-32107,0,0,b90c8135a82473fde7e5bf44c3c1cf9d7846ba95270115659d7d68306d87ca81,2024-04-11T13:30:38
|
||||
CVE-2024-32108,0,0,950a29a68ef37c40439ae0dcf3c3d4b039242eaece664c349c7d4089e193ee6e,2024-04-11T13:30:38
|
||||
CVE-2024-32109,0,0,e0a4e8c5f217571de21e69ff68b322f2becdcc662ae51f8c1b5dcaad24451a40,2024-04-11T13:30:38
|
||||
CVE-2024-32109,0,1,4ab4248625b2b88c43ecf2bed644e80e80c54bafb94ddc41cebae0bbd84f78ff,2024-04-29T09:15:07.707000
|
||||
CVE-2024-3211,0,0,d6d8ef851a76d01f08b13c4c6093534cf0125e4133f007b8f3a299cb3bb38192,2024-04-12T12:43:46.210000
|
||||
CVE-2024-32112,0,0,2df62c2ad1478d07a612eff17f984ad78c51d3b47027012c1c38076227812cd3,2024-04-11T12:47:44.137000
|
||||
CVE-2024-32125,0,0,df49ac279a5dab5894d2cf46d4df920e793fb77c32b1360bd4eb9ce6cc4c2bcb,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32126,0,0,03bbe2b7a7bd325cdda583bb7823f2b70916aad3961fcbd3bac07e945035870f,2024-04-18T13:04:28.900000
|
||||
CVE-2024-32127,0,0,57252810e1702be160161ac7dc44c20062237ffc3e0f3ad79884c0b06ee5b822,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32128,0,0,cb935dc8078553e54335e879bd7502243cd9a625b79c1c1dfceb4bfba45b9de1,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32129,0,0,7dc12cce8517a17cd70ddfa746950a5eac6137ebf8d213b92102ec061182c7b6,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32129,0,1,836d2bd4732456c79c79f4c8efead95083abe0bdcddc45563d15237fa265590b,2024-04-29T09:15:07.803000
|
||||
CVE-2024-3213,0,0,ea3f20ff836368484318fafaf2de028dfc4fe493b01551892e8e53b852a2d76e,2024-04-10T13:23:38.787000
|
||||
CVE-2024-32130,0,0,c3815df651bee8fabb39b6ee1601a12e78be3e64615a56410b03d7d3217c5c2f,2024-04-17T12:48:07.510000
|
||||
CVE-2024-32132,0,0,b8f2c67a5eb9317d71844e548f7098002fd937824ef3f3cc031dff8cdf6f8053,2024-04-15T13:15:31.997000
|
||||
@ -246637,38 +246638,53 @@ CVE-2024-3351,0,0,4e83ab506e7228a3886d0c35bd4699b3cc13e079b52b9390280e70733aeb1d
|
||||
CVE-2024-3352,0,0,2bb858a13268847c6f0639e9c58251e5b0608c0fcc2f637338ed79183e654688,2024-04-11T01:25:59.117000
|
||||
CVE-2024-3353,0,0,a43304c0c957cee30ec6a0fe5705b568475f27f66d5199c2166f449cd8eb908f,2024-04-11T01:25:59.200000
|
||||
CVE-2024-33531,0,0,71e7e7c369e07333ae7410b9238493e0b8e5a70255296aafd8bfae114b6e76d5,2024-04-24T13:39:42.883000
|
||||
CVE-2024-33537,1,1,1abcca94500cff61689bc299259daf6c77965db351f4065549770837c6336670,2024-04-29T06:15:08.083000
|
||||
CVE-2024-33539,1,1,8f41542e5f77851d2f4faa8d70582127978bd07484561d364c44db3eb5ca61fd,2024-04-29T06:15:08.930000
|
||||
CVE-2024-33537,0,0,1abcca94500cff61689bc299259daf6c77965db351f4065549770837c6336670,2024-04-29T06:15:08.083000
|
||||
CVE-2024-33538,1,1,2c1e0d3b7f9f337908146a436e9747f359f4444ae266b9d82b0a3ad465ad1d36,2024-04-29T08:15:06.383000
|
||||
CVE-2024-33539,0,0,8f41542e5f77851d2f4faa8d70582127978bd07484561d364c44db3eb5ca61fd,2024-04-29T06:15:08.930000
|
||||
CVE-2024-3354,0,0,4a4ea1b685e77f1329c6119be3c557bd8627ab8e6e7bcdf524dde072c4485f2b,2024-04-11T01:25:59.280000
|
||||
CVE-2024-33540,1,1,747a115e4ae2ca6e4d30057a4f7d7e64e2b02e1bc21f016e186f3ec5a7c4cbee,2024-04-29T06:15:09.637000
|
||||
CVE-2024-33542,1,1,c46844096e18c90d4389e00877bdc86b55250f44e249077d028e212eff872075,2024-04-29T06:15:10.220000
|
||||
CVE-2024-33544,1,1,1466a86d502d8d54ff1b9a60222a92956c868d95a390bd0d2b95b1d73fa6edf0,2024-04-29T07:15:06.543000
|
||||
CVE-2024-33546,1,1,3ef102e69d02cbc32fbb5297ea63418695ffc6bd67887340158d2086fadabd61,2024-04-29T07:15:06.810000
|
||||
CVE-2024-33548,1,1,f1884ac10132cc8231eb6aaac64ad6b1e7a3129e60b9c76432db676e6c17cc0b,2024-04-29T06:15:10.937000
|
||||
CVE-2024-33540,0,0,747a115e4ae2ca6e4d30057a4f7d7e64e2b02e1bc21f016e186f3ec5a7c4cbee,2024-04-29T06:15:09.637000
|
||||
CVE-2024-33542,0,0,c46844096e18c90d4389e00877bdc86b55250f44e249077d028e212eff872075,2024-04-29T06:15:10.220000
|
||||
CVE-2024-33544,0,0,1466a86d502d8d54ff1b9a60222a92956c868d95a390bd0d2b95b1d73fa6edf0,2024-04-29T07:15:06.543000
|
||||
CVE-2024-33546,0,0,3ef102e69d02cbc32fbb5297ea63418695ffc6bd67887340158d2086fadabd61,2024-04-29T07:15:06.810000
|
||||
CVE-2024-33548,0,0,f1884ac10132cc8231eb6aaac64ad6b1e7a3129e60b9c76432db676e6c17cc0b,2024-04-29T06:15:10.937000
|
||||
CVE-2024-3355,0,0,1992313db0de37cd343f2e0c4d60ca5be53ec7c18d85010c791b43a1a0033536,2024-04-11T01:25:59.360000
|
||||
CVE-2024-33551,1,1,48cbe7358b0d6b0348a8420e63ce1222decf42609ef0aa9cdee85f45dc0831b8,2024-04-29T06:15:11.487000
|
||||
CVE-2024-33554,1,1,44f60587812c323490409e830f796cfbd35a235319f7237d253181849d9ed8df,2024-04-29T06:15:12.090000
|
||||
CVE-2024-33559,1,1,948fdd92ac3165b98a9a3e7d7bdf15d3f487bac4b7adfad2a4fb49bd7435a7e9,2024-04-29T06:15:12.607000
|
||||
CVE-2024-33551,0,0,48cbe7358b0d6b0348a8420e63ce1222decf42609ef0aa9cdee85f45dc0831b8,2024-04-29T06:15:11.487000
|
||||
CVE-2024-33553,1,1,58c7a083e3fbc8457256ecd25a5cfe4812df86ca040239bf0e4438f4512e16fb,2024-04-29T08:15:06.603000
|
||||
CVE-2024-33554,0,0,44f60587812c323490409e830f796cfbd35a235319f7237d253181849d9ed8df,2024-04-29T06:15:12.090000
|
||||
CVE-2024-33558,1,1,5029ca8f3a7bf223327e10c6a6ec6d6546659ad2ec7630fc2ce0a4310b50be3e,2024-04-29T09:15:07.890000
|
||||
CVE-2024-33559,0,0,948fdd92ac3165b98a9a3e7d7bdf15d3f487bac4b7adfad2a4fb49bd7435a7e9,2024-04-29T06:15:12.607000
|
||||
CVE-2024-3356,0,0,087254ad27ba51e796f585bd19b7860bdf92d5d8812be46839c2000c6ff7ec4e,2024-04-11T01:25:59.443000
|
||||
CVE-2024-33562,1,1,ba9f8f690ca4d53bf11bc838f8b9a916ae70cc6d375248da36a8a28d84f314fd,2024-04-29T06:15:13.163000
|
||||
CVE-2024-33562,0,0,ba9f8f690ca4d53bf11bc838f8b9a916ae70cc6d375248da36a8a28d84f314fd,2024-04-29T06:15:13.163000
|
||||
CVE-2024-33566,1,1,f351fdb0905c12001d59ba086a0e050db3a855534570f5f484c67c74322726ad,2024-04-29T08:15:06.803000
|
||||
CVE-2024-3357,0,0,4504c33b3bb653378795a255a83c05295c4cb93d37914e6c8a1edf8397686b85,2024-04-11T01:25:59.530000
|
||||
CVE-2024-33571,1,1,32fa1280ecb5787c1681505d41e97480c3bdfd2dc281b5a45dc4061c57561d00,2024-04-29T06:15:13.667000
|
||||
CVE-2024-33571,0,0,32fa1280ecb5787c1681505d41e97480c3bdfd2dc281b5a45dc4061c57561d00,2024-04-29T06:15:13.667000
|
||||
CVE-2024-33575,1,1,8a6bf9849cfd0c7120251b3216db90d4f144aeb07869d1cd1863ab78ad1f77a6,2024-04-29T08:15:06.987000
|
||||
CVE-2024-3358,0,0,694a0960c89fb254bc37c7c2f594e5cb197e9c3b955cd9433f44c414aff75d2b,2024-04-11T01:25:59.610000
|
||||
CVE-2024-33584,1,1,39d0b5b446b0f295919190ab8bffd1407daf4c41e0b5ed410bbb4e880d676836,2024-04-29T08:15:07.170000
|
||||
CVE-2024-3359,0,0,a779b2e33399e3789113d39f065b1425ad824801b217abc54417c2cce7e7d2db,2024-04-11T01:25:59.687000
|
||||
CVE-2024-33592,0,0,db5c0b056d9b2b7db6cca903286bba2d07a26aaa9035eb96ef4301de432670e3,2024-04-25T17:25:05.903000
|
||||
CVE-2024-33596,1,1,59d33578c03d9dd8ac1b12b8c12643b60a50f1912263f798db68827f617e9fd5,2024-04-29T09:15:08.080000
|
||||
CVE-2024-33597,1,1,09b0dc0dcae761c513b39db2acacd77654acadc7386cfd702498cf05f993342e,2024-04-29T09:15:08.270000
|
||||
CVE-2024-33598,0,0,951d122bd41cb7218bd6ac7f6b225f4876d714fab2f67658757b81f4282e18e0,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3360,0,0,2ffbaa301c04a2d62013f221bb69a21a0f4034a97959f93c6ac130d96a9162d3,2024-04-11T01:25:59.770000
|
||||
CVE-2024-3361,0,0,c120caf4947180a69c26140d9354a0af916b072bcc15573944dc923bbf223f7d,2024-04-11T01:25:59.847000
|
||||
CVE-2024-3362,0,0,4f698660b915c64322658e8738d0fb3f09460cf98fd487b3189e8f9d96e2b2c1,2024-04-11T01:25:59.930000
|
||||
CVE-2024-33627,1,1,6bd293ec393a12757f348a08df0a807d274a93e48d6a424cd8ed2e1993e9af24,2024-04-29T08:15:07.367000
|
||||
CVE-2024-33629,1,1,7451df54ae983be1843ec70db21b668071acfab04684129da17a41f9e4f5a70f,2024-04-29T08:15:07.640000
|
||||
CVE-2024-3363,0,0,f5bcc8af5a66d22a73abe7e86b636154362f284983c790b03385b20aa4737ceb,2024-04-11T01:26:00.010000
|
||||
CVE-2024-33630,1,1,d429997353148ad4f03de5fcc4c3beaa034ad03ad4bb2b1118cf25cea4d32b29,2024-04-29T06:15:14.450000
|
||||
CVE-2024-33631,1,1,c9134f1e88711f8a04a135872712a121867f709063e57f4fb1d965c1ed67f734,2024-04-29T06:15:14.940000
|
||||
CVE-2024-33632,1,1,f4f40947da0388a7ccb639f255eb9d8f044af737b4c70d0121643974544be28d,2024-04-29T06:15:15.537000
|
||||
CVE-2024-33630,0,0,d429997353148ad4f03de5fcc4c3beaa034ad03ad4bb2b1118cf25cea4d32b29,2024-04-29T06:15:14.450000
|
||||
CVE-2024-33631,0,0,c9134f1e88711f8a04a135872712a121867f709063e57f4fb1d965c1ed67f734,2024-04-29T06:15:14.940000
|
||||
CVE-2024-33632,0,0,f4f40947da0388a7ccb639f255eb9d8f044af737b4c70d0121643974544be28d,2024-04-29T06:15:15.537000
|
||||
CVE-2024-33633,0,0,14ae8b34b1aba55606c0bcadc7809f885230f727e35d21246f86a6c94ca95b9f,2024-04-29T05:15:06.507000
|
||||
CVE-2024-33634,1,1,7c3d356780beb93432a0e8b51f643638872933a4cee73820a4c86a4470818a9b,2024-04-29T08:15:07.830000
|
||||
CVE-2024-33635,1,1,c95e29b9a1ad1d8dfb46c7dde2788e355ca94abf4e510c87e381e8c28a569823,2024-04-29T09:15:08.460000
|
||||
CVE-2024-33636,1,1,c5b178766ef408aa0a01f491826a34cda7a22147287653a27a481b3e6d345fd1,2024-04-29T09:15:08.640000
|
||||
CVE-2024-33637,1,1,e0f43624862cba671c8f707d69b8ea9ebc41776e51399eeb6e5319abd0b8c50d,2024-04-29T08:15:08.007000
|
||||
CVE-2024-33638,0,0,3427361ab991422b101cc37f7607a376f6587ef09d6fc7a47e3613da65e0631b,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33639,0,0,c46b4523c8f0d554545e91766a68c1aa539c722a582823f8a257dc980bedbf11,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3364,0,0,2986dc00429f74e0e2572cb8153933c26e825f7eed092370bca7e4ac84ee4fdf,2024-04-11T01:26:00.090000
|
||||
CVE-2024-33640,0,0,569f42cf53adfed99d6bea04072e40faa2e5188d736f2609872b6d759c9e31ac,2024-04-29T05:15:06.757000
|
||||
CVE-2024-33641,1,1,a4251f6ea07e08afbeb0bf2d03ec4e4c399ced810e586f0e722387b3653df811,2024-04-29T08:15:08.200000
|
||||
CVE-2024-33642,0,0,7569707402e488c170fb19233ca774daa51c8f856e1cd5f3428c5b203d123531,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33643,0,0,0ff6c747729a96b60f6ad504f202ccec54992f8c5c6e4d4ffb32ec39b77ce94a,2024-04-29T05:15:06.960000
|
||||
CVE-2024-33645,0,0,85d2eafbf303b88d1d1d02964653d2fa337d6e4277b033b67c0b7e23c7278b7a,2024-04-29T05:15:07.153000
|
||||
@ -246678,6 +246694,7 @@ CVE-2024-33649,0,0,76be47f9e9623693c2dc4f7dbd7700f237602a11cf08c5a162589622dee41
|
||||
CVE-2024-3365,0,0,64a2e531185071bb7e6b7a9cf067546b0c6c5f700f703a6639ecd4e081a3dcb7,2024-04-11T01:26:00.170000
|
||||
CVE-2024-33650,0,0,19d8d8a0b27cf4dde85e5f92d8bf04c572aaff417d777c3294978343c2e4f677,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33651,0,0,1cefad65f2bec7e29ec0f3af20b45cba9167a66152171d6da2043875d9e6dcf1,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33652,1,1,bb7b23e1593a340c3c6db2f3594ba525e0f418b8d14449e6abdfdb58acdc7dfc,2024-04-29T08:15:08.383000
|
||||
CVE-2024-3366,0,0,641beaaa3f9fd7d2de3006c0b03aadadafd130dcdab91419774c604b06cf9b30,2024-04-11T01:26:00.240000
|
||||
CVE-2024-33661,0,0,335b3962b8b35021f7d1525fb53b5e1ed72d069375d3f8ee59966d5db4f26d91,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33663,0,0,ec8e93da37d2d2637b8f6a349ca26f3f71e8cd5e6cb10be23a57d50df0caa826,2024-04-26T12:58:17.720000
|
||||
@ -246696,10 +246713,11 @@ CVE-2024-33677,0,0,923eddda39cd03a5bb517e05a480a9596b3c6c82a0ed2f89c09750c19ea74
|
||||
CVE-2024-33678,0,0,e29c82afa965b755a6e3188aace0a357ae40d5fe9b52b7f7177043f7792e9dd7,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33679,0,0,f84e540fe859a7afe5f4ff76589343075f3d0bdf8c9cff62c28aa7a3f40455e2,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33680,0,0,0b464bc2ce373b95fed587888415ba32213dd9ce01298ab4cd8f52af9d530aea,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33681,1,1,548950ce0064cdd92a907d7ce32bf554f4a3c02c1609223f9d1197b4fd07d45c,2024-04-29T06:15:16.057000
|
||||
CVE-2024-33681,0,0,548950ce0064cdd92a907d7ce32bf554f4a3c02c1609223f9d1197b4fd07d45c,2024-04-29T06:15:16.057000
|
||||
CVE-2024-33682,0,0,2077d9f86dbcd7afb58135718cb00b93d9684082b8213c0215eee7a02c222543,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33683,0,0,d7c4bf8bbdd8bd3ca6f26bbf7a4bf0688b7570f813369db65ed2d59e99a11ae9,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33686,1,1,cb11bce9d4222859e78a22a350bf0fbd12a312d0c6cee087f3196d5cf87e6c79,2024-04-29T06:15:16.623000
|
||||
CVE-2024-33684,1,1,13115094fafe12c8a45609d682b3f7f12077f3ddd305c85974dca87e43b95406,2024-04-29T09:15:08.833000
|
||||
CVE-2024-33686,0,0,cb11bce9d4222859e78a22a350bf0fbd12a312d0c6cee087f3196d5cf87e6c79,2024-04-29T06:15:16.623000
|
||||
CVE-2024-33688,0,0,15c623ea6d0e85e99afd20753787faa07eb45674316852700f3732b9713c4938,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33689,0,0,9a3d372175f3eea45d33e57473572a2b8c9a57d63f47cd918b323f42ce5db301,2024-04-26T15:32:22.523000
|
||||
CVE-2024-3369,0,0,943fbc9826beb11428b980e60e48ec152ecf5fda97b5d1c26bb0e96c030079eb,2024-04-11T01:26:00.317000
|
||||
@ -246712,6 +246730,7 @@ CVE-2024-33695,0,0,1d926ddf5c81a389bb7d8e4855841dceb198002508750e6d1b49d88c03728
|
||||
CVE-2024-33696,0,0,073bc1cd15f6e8f569b263e3a552dcd1544b7a88083033c38736ec61b1c19277,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33697,0,0,f1a322dee5ec8563df23e02e8d701179da9c0f74bc61aaadca8daa27bdd8a04b,2024-04-26T15:32:22.523000
|
||||
CVE-2024-3371,0,0,a0481e14f6cfcb9b0215a88c87fda086117ad0add8d553a83f1550e7381c3170,2024-04-26T15:15:49.357000
|
||||
CVE-2024-3375,1,1,ce382d1eeef77887b1f05ea91dffb7654a2e9ab836368bbd657742b42f2551ed,2024-04-29T09:15:09.017000
|
||||
CVE-2024-3376,0,0,f944ee3af49afac066405b13bcc14ad1a3aba304f57c015d653c31ce71a21bf1,2024-04-11T01:26:00.397000
|
||||
CVE-2024-3377,0,0,4f5c5a9a0c925d4c25c7e7a8167aad399bf59289271bce69d10c801ec2848ece,2024-04-11T01:26:00.473000
|
||||
CVE-2024-3378,0,0,4f86c276b9b6898b0be7d5e038b0b93861aa9bc2234c5fb397df84486317a3f0,2024-04-14T04:15:56.560000
|
||||
@ -246727,8 +246746,8 @@ CVE-2024-33883,0,0,3b17b48394bf62744fbd468bf457ba6f01138ca86f08a667646ea9846d188
|
||||
CVE-2024-33891,0,0,4d067bbdb453306352bedaf699cdd4319a93f8f140e1ffcfce72980a6fa91b2e,2024-04-28T23:15:07.200000
|
||||
CVE-2024-33899,0,0,83c5c675381e020685b43fd536d5112506568fc46560c71323f3b12b51ed8097,2024-04-29T00:15:07.773000
|
||||
CVE-2024-33903,0,0,d96c3db96f0e438997e300c2112a3a0d050aa12880229d964d5b557d89ba9aa1,2024-04-29T01:15:09.600000
|
||||
CVE-2024-33904,1,1,f1065144aff1f3a07dac950b2bff4e0d7bebc724ec8bb15e6e11e7eef4705f37,2024-04-29T06:15:17.320000
|
||||
CVE-2024-33905,1,1,5f8214ca78ea0daa3bd7aaf864c15a416c36c5d929bc1d8c2eeecabcee92677e,2024-04-29T06:15:17.667000
|
||||
CVE-2024-33904,0,0,f1065144aff1f3a07dac950b2bff4e0d7bebc724ec8bb15e6e11e7eef4705f37,2024-04-29T06:15:17.320000
|
||||
CVE-2024-33905,0,0,5f8214ca78ea0daa3bd7aaf864c15a416c36c5d929bc1d8c2eeecabcee92677e,2024-04-29T06:15:17.667000
|
||||
CVE-2024-3400,0,0,5bb68c1f741d7492d6e3e08b6f1711eb6e28a4a827bd2f3f354ccd1b7a47a1fe,2024-04-23T19:57:25.207000
|
||||
CVE-2024-3413,0,0,7c0263f5aa26015f580f259b17ac76e3fb232807ce6eb6b3e0fa4a42d34def58,2024-04-11T01:26:00.727000
|
||||
CVE-2024-3414,0,0,fcf8b2012e3dcab7048965e9d40e8c26f25a86217cc70e6c24a2ae712b119943,2024-04-11T01:26:00.803000
|
||||
@ -247062,5 +247081,5 @@ CVE-2024-4298,0,0,f9266dd2ad13ca247a2df7083a82f45a12f2423c014a4332f080e78d4a3074
|
||||
CVE-2024-4299,0,0,6dce476fcec521482054b6b4839e21007c148c2a950959748caa8366570861ec,2024-04-29T04:15:08.623000
|
||||
CVE-2024-4300,0,0,7a5406d5809ec914ba2d29d702f12271779019152ddc347a0ac4109f28246321,2024-04-29T04:15:08.887000
|
||||
CVE-2024-4301,0,0,ac824d829df059c2e56cb3512d1d60cfb48e2f3b0d50bb1c7774c0330baa7e64,2024-04-29T04:15:09.110000
|
||||
CVE-2024-4302,1,1,974068c107cd4e505ac6377f0f4fb62ae26afdc69c450f8704f68a7f42518f2c,2024-04-29T06:15:17.803000
|
||||
CVE-2024-4303,1,1,269dace03dedf0bc843109dbe92c35792422f71f9659b58da62f3fe6d0141fa9,2024-04-29T06:15:18.457000
|
||||
CVE-2024-4302,0,0,974068c107cd4e505ac6377f0f4fb62ae26afdc69c450f8704f68a7f42518f2c,2024-04-29T06:15:17.803000
|
||||
CVE-2024-4303,0,0,269dace03dedf0bc843109dbe92c35792422f71f9659b58da62f3fe6d0141fa9,2024-04-29T06:15:18.457000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user