mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
Auto-Update: 2024-04-05T14:00:38.541853+00:00
This commit is contained in:
parent
1b6432e81f
commit
cfac9ac0d1
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-38709",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-04-04T20:15:08.047",
|
||||
"lastModified": "2024-04-04T20:15:08.047",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.\n\nThis issue affects Apache HTTP Server: through 2.4.58.\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La validaci\u00f3n de entrada defectuosa en el n\u00facleo de Apache permite que generadores de contenido/backend maliciosos o explotables dividan las respuestas HTTP. Este problema afecta al servidor HTTP Apache: hasta 2.4.58."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-45288",
|
||||
"sourceIdentifier": "security@golang.org",
|
||||
"published": "2024-04-04T21:15:16.113",
|
||||
"lastModified": "2024-04-04T21:15:16.113",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un atacante puede hacer que un endpoint HTTP/2 lea cantidades arbitrarias de datos de encabezado enviando una cantidad excesiva de tramas de CONTINUACI\u00d3N. Mantener el estado de HPACK requiere analizar y procesar todos los encabezados y tramas de CONTINUACI\u00d3N en una conexi\u00f3n. Cuando los encabezados de una solicitud exceden MaxHeaderBytes, no se asigna memoria para almacenar los encabezados sobrantes, pero a\u00fan as\u00ed se analizan. Esto permite a un atacante hacer que un endpoint HTTP/2 lea cantidades arbitrarias de datos de encabezado, todos asociados con una solicitud que ser\u00e1 rechazada. Estos encabezados pueden incluir datos codificados por Huffman, cuya decodificaci\u00f3n es significativamente m\u00e1s costosa para el receptor que para el atacante. La soluci\u00f3n establece un l\u00edmite en la cantidad de fotogramas de encabezado excedentes que procesaremos antes de cerrar una conexi\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52235",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-05T06:15:10.060",
|
||||
"lastModified": "2024-04-05T06:15:10.060",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
59
CVE-2023/CVE-2023-56xx/CVE-2023-5692.json
Normal file
59
CVE-2023/CVE-2023-56xx/CVE-2023-5692.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-5692",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-05T13:15:07.773",
|
||||
"lastModified": "2024-04-05T13:15:07.773",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WordPress Core is vulnerable to Sensitive Information Exposure in versions up to, and including, 6.4.3 via the redirect_guess_404_permalink function. This can allow unauthenticated attackers to expose the slug of a custom post whose 'publicly_queryable' post status has been set to 'false'."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://core.trac.wordpress.org/changeset/57645",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://developer.wordpress.org/reference/functions/is_post_publicly_viewable/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://developer.wordpress.org/reference/functions/is_post_type_viewable/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/WordPress/wordpress-develop/blob/6.3/src/wp-includes/canonical.php#L763",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6e6f993b-ce09-4050-84a1-cbe9953f36b1?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-5973",
|
||||
"sourceIdentifier": "sirt@brocade.com",
|
||||
"published": "2024-04-05T03:15:07.770",
|
||||
"lastModified": "2024-04-05T03:15:07.770",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Brocade\n Web Interface in Brocade Fabric OS v9.x and before v9.2.0 does not \nproperly represent the portName to the user if the portName contains \nreserved characters. This could allow an authenticated user to alter the\n UI of the Brocade Switch and change ports display.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La interfaz web de Brocade en Brocade Fabric OS v9.x y versiones anteriores a v9.2.0 no representa correctamente el nombre del puerto para el usuario si el nombre del puerto contiene caracteres reservados. Esto podr\u00eda permitir a un usuario autenticado alterar la interfaz de usuario del Brocade Switch y cambiar la visualizaci\u00f3n de los puertos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
55
CVE-2023/CVE-2023-65xx/CVE-2023-6522.json
Normal file
55
CVE-2023/CVE-2023-65xx/CVE-2023-6522.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-6522",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-04-05T12:15:36.267",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Privilege Management vulnerability in ExtremePacs Extreme XDS allows Collect Data as Provided by Users.This issue affects Extreme XDS: before 3914.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-0276",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-65xx/CVE-2023-6523.json
Normal file
55
CVE-2023/CVE-2023-65xx/CVE-2023-6523.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-6523",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-04-05T12:15:37.233",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authorization Bypass Through User-Controlled Key vulnerability in ExtremePacs Extreme XDS allows Authentication Abuse.This issue affects Extreme XDS: before 3914.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-0276",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21848",
|
||||
"sourceIdentifier": "responsibledisclosure@mattermost.com",
|
||||
"published": "2024-04-05T09:15:09.017",
|
||||
"lastModified": "2024-04-05T09:15:09.017",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-21894",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-04-04T23:15:15.640",
|
||||
"lastModified": "2024-04-04T23:15:15.640",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A heap overflow vulnerability in IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack. In certain conditions this may lead to execution of arbitrary code "
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de desbordamiento de mont\u00f3n en el componente IPSec de Ivanti Connect Secure (9.x, 22.x) e Ivanti Policy Secure permite que un usuario malintencionado no autenticado env\u00ede solicitudes especialmente manipuladas para bloquear el servicio, provocando as\u00ed un ataque DoS. En determinadas condiciones, esto puede conducir a la ejecuci\u00f3n de c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2115",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-05T08:15:07.470",
|
||||
"lastModified": "2024-04-05T08:15:07.470",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-22023",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-04-04T20:15:08.130",
|
||||
"lastModified": "2024-04-04T20:15:08.130",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An XML entity expansion or XEE vulnerability in SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated attacker to send specially crafted XML requests in-order-to temporarily cause resource exhaustion thereby resulting in a limited-time DoS. "
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una expansi\u00f3n de entidad XML o vulnerabilidad XEE en el componente SAML de Ivanti Connect Secure (9.x, 22.x) e Ivanti Policy Secure permite que un atacante no autenticado env\u00ede solicitudes XML especialmente manipuladas para causar temporalmente el agotamiento de los recursos, lo que resulta en una DoS por tiempo limitado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-22052",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-04-04T20:15:08.333",
|
||||
"lastModified": "2024-04-04T20:15:08.333",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A null pointer dereference vulnerability in IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack "
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de desreferencia de puntero nulo en el componente IPSec de Ivanti Connect Secure (9.x, 22.x) e Ivanti Policy Secure permite que un usuario malintencionado no autenticado env\u00ede solicitudes especialmente manipuladas para bloquear el servicio, provocando as\u00ed un ataque DoS."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-22053",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-04-04T20:15:08.500",
|
||||
"lastModified": "2024-04-04T20:15:08.500",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A heap overflow vulnerability in IPSec component of Ivanti Connect Secure (9.x\n 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack or in certain conditions read contents from memory. "
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de desbordamiento de mont\u00f3n en el componente IPSec de Ivanti Connect Secure (9.x 22.x) e Ivanti Policy Secure permite que un usuario malintencionado no autenticado env\u00ede solicitudes especialmente manipuladas para bloquear el servicio, provocando as\u00ed un ataque DoS o en determinadas condiciones. leer contenidos de la memoria."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22363",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-05T06:15:10.200",
|
||||
"lastModified": "2024-04-05T06:15:10.200",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2024/CVE-2024-23xx/CVE-2024-2380.json
Normal file
55
CVE-2024/CVE-2024-23xx/CVE-2024-2380.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-2380",
|
||||
"sourceIdentifier": "security@checkmk.com",
|
||||
"published": "2024-04-05T13:15:07.973",
|
||||
"lastModified": "2024-04-05T13:15:07.973",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Stored XSS in graph rendering in Checkmk <2.3.0b4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@checkmk.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@checkmk.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-80"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://checkmk.com/werk/16618",
|
||||
"source": "security@checkmk.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-24795",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-04-04T20:15:08.663",
|
||||
"lastModified": "2024-04-04T20:15:08.663",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.\n\nUsers are recommended to upgrade to version 2.4.59, which fixes this issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La divisi\u00f3n de la respuesta HTTP en varios m\u00f3dulos en el servidor HTTP Apache permite que un atacante pueda inyectar encabezados de respuesta maliciosos en aplicaciones backend para provocar un ataque de desincronizaci\u00f3n HTTP. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.4.59, que soluciona este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2447",
|
||||
"sourceIdentifier": "responsibledisclosure@mattermost.com",
|
||||
"published": "2024-04-05T09:15:09.860",
|
||||
"lastModified": "2024-04-05T09:15:09.860",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
47
CVE-2024/CVE-2024-24xx/CVE-2024-2499.json
Normal file
47
CVE-2024/CVE-2024-24xx/CVE-2024-2499.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-2499",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-05T13:15:08.177",
|
||||
"lastModified": "2024-04-05T13:15:08.177",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Squelch Tabs and Accordions Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'accordions' shortcode in all versions up to, and including, 0.4.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3052812/squelch-tabs-and-accordions-shortcodes",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/adf10ad4-38b2-44be-bdc6-ba6b62e9fbe6?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2509",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-04-05T05:15:07.463",
|
||||
"lastModified": "2024-04-05T05:15:07.463",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Gutenberg Blocks by Kadence Blocks WordPress plugin before 3.2.26 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Gutenberg Blocks by Kadence Blocks de WordPress anterior a 3.2.26 no valida ni escapa algunas de sus opciones de bloqueo antes de devolverlas a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el bloque, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superior realiza ataques de Cross-Site Scripting Almacenado"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26329",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-05T07:15:10.970",
|
||||
"lastModified": "2024-04-05T07:15:10.970",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26810",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-05T09:15:09.230",
|
||||
"lastModified": "2024-04-05T09:15:09.230",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26812",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-05T09:15:09.283",
|
||||
"lastModified": "2024-04-05T09:15:09.283",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26813",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-05T09:15:09.340",
|
||||
"lastModified": "2024-04-05T09:15:09.340",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26814",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-05T09:15:09.393",
|
||||
"lastModified": "2024-04-05T09:15:09.393",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-27316",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-04-04T20:15:08.720",
|
||||
"lastModified": "2024-04-04T20:15:08.720",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los encabezados entrantes HTTP/2 que exceden el l\u00edmite se almacenan temporalmente en nghttp2 para generar una respuesta HTTP 413 informativa. Si un cliente no deja de enviar encabezados, esto provoca que se agote la memoria."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27437",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-05T09:15:09.443",
|
||||
"lastModified": "2024-04-05T09:15:09.443",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27448",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-05T06:15:10.263",
|
||||
"lastModified": "2024-04-05T06:15:10.263",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-27981",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-04-04T23:15:15.837",
|
||||
"lastModified": "2024-04-04T23:15:15.837",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Command Injection vulnerability found in a Self-Hosted UniFi Network Servers (Linux) with UniFi Network Application (Version 8.0.28 and earlier) allows a malicious actor with UniFi Network Application Administrator credentials to escalate privileges to root on the host device.\r\n\r\nAffected Products:\r\nUniFi Network Application (Version 8.0.28 and earlier) .\r\n \r\nMitigation:\r\nUpdate UniFi Network Application to Version 8.1.113 or later."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de inyecci\u00f3n de comandos encontrada en servidores de red UniFi autohospedados (Linux) con la aplicaci\u00f3n de red UniFi (versi\u00f3n 8.0.28 y anteriores) permite a un actor malicioso con credenciales de administrador de la aplicaci\u00f3n de red UniFi escalar privilegios a root en el dispositivo host. Productos afectados: Aplicaci\u00f3n de red UniFi (Versi\u00f3n 8.0.28 y anteriores). Mitigaci\u00f3n: actualice la aplicaci\u00f3n UniFi Network a la versi\u00f3n 8.1.113 o posterior."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28949",
|
||||
"sourceIdentifier": "responsibledisclosure@mattermost.com",
|
||||
"published": "2024-04-05T09:15:09.497",
|
||||
"lastModified": "2024-04-05T09:15:09.497",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-29049",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-04-04T22:15:08.827",
|
||||
"lastModified": "2024-04-04T22:15:08.827",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de suplantaci\u00f3n de identidad de Webview2 en Microsoft Edge (basado en Chromium)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29221",
|
||||
"sourceIdentifier": "responsibledisclosure@mattermost.com",
|
||||
"published": "2024-04-05T09:15:09.680",
|
||||
"lastModified": "2024-04-05T09:15:09.680",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-29386",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-04T20:15:08.837",
|
||||
"lastModified": "2024-04-04T20:15:08.837",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "projeqtor up to 11.2.0 was discovered to contain a SQL injection vulnerability via the component /view/criticalResourceExport.php."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que projeqtor hasta 11.2.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del componente /view/criticalResourceExport.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-29387",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-04T20:15:08.920",
|
||||
"lastModified": "2024-04-04T20:15:08.920",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "projeqtor up to 11.2.0 was discovered to contain a remote code execution (RCE) vulnerability via the component /view/print.php."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que projeqtor hasta la versi\u00f3n 11.2.0 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del componente /view/print.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29672",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-05T06:15:10.323",
|
||||
"lastModified": "2024-04-05T06:15:10.323",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29863",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-05T07:15:11.110",
|
||||
"lastModified": "2024-04-05T07:15:11.110",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-29981",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-04-04T22:15:09.153",
|
||||
"lastModified": "2024-04-04T22:15:09.153",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de suplantaci\u00f3n de identidad en Microsoft Edge (basado en Chromium)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30255",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-04T20:15:08.983",
|
||||
"lastModified": "2024-04-04T20:15:08.983",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Envoy is a cloud-native, open source edge and service proxy. The HTTP/2 protocol stack in Envoy versions prior to 1.29.3, 1.28.2, 1.27.4, and 1.26.8 are vulnerable to CPU exhaustion due to flood of CONTINUATION frames. Envoy's HTTP/2 codec allows the client to send an unlimited number of CONTINUATION frames even after exceeding Envoy's header map limits. This allows an attacker to send a sequence of CONTINUATION frames without the END_HEADERS bit set causing CPU utilization, consuming approximately 1 core per 300Mbit/s of traffic and culminating in denial of service through CPU exhaustion. Users should upgrade to version 1.29.3, 1.28.2, 1.27.4, or 1.26.8 to mitigate the effects of the CONTINUATION flood. As a workaround, disable HTTP/2 protocol for downstream connections."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Envoy es un proxy de servicio y borde de c\u00f3digo abierto, nativo de la nube. La pila de protocolos HTTP/2 en las versiones de Envoy anteriores a 1.29.3, 1.28.2, 1.27.4 y 1.26.8 son vulnerables al agotamiento de la CPU debido a la inundaci\u00f3n de tramas de CONTINUACI\u00d3N. El c\u00f3dec HTTP/2 de Envoy permite al cliente enviar un n\u00famero ilimitado de tramas de CONTINUACI\u00d3N incluso despu\u00e9s de exceder los l\u00edmites del mapa de encabezado de Envoy. Esto permite a un atacante enviar una secuencia de tramas CONTINUATION sin que el bit END_HEADERS est\u00e9 configurado causando la utilizaci\u00f3n de la CPU, consumiendo aproximadamente 1 n\u00facleo por cada 300 Mbit/s de tr\u00e1fico y culminando en una denegaci\u00f3n de servicio por agotamiento de la CPU. Los usuarios deben actualizar a la versi\u00f3n 1.29.3, 1.28.2, 1.27.4 o 1.26.8 para mitigar los efectos de la inundaci\u00f3n de CONTINUACI\u00d3N. Como workaround, deshabilite el protocolo HTTP/2 para conexiones descendentes."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30264",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-04T21:15:16.380",
|
||||
"lastModified": "2024-04-04T21:15:16.380",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Typebot is an open-source chatbot builder. A reflected cross-site scripting (XSS) in the sign-in page of typebot.io prior to version 2.24.0 may allow an attacker to hijack a user's account. The sign-in page takes the `redirectPath` parameter from the URL. If a user clicks on a link where the `redirectPath` parameter has a javascript scheme, the attacker that crafted the link may be able to execute arbitrary JavaScript with the privileges of the user. Version 2.24.0 contains a patch for this issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Typebot es un creador de chatbots de c\u00f3digo abierto. Un cross-site scripting (XSS) reflejado en la p\u00e1gina de inicio de sesi\u00f3n de typebot.io antes de la versi\u00f3n 2.24.0 puede permitir que un atacante se apodere de la cuenta de un usuario. La p\u00e1gina de inicio de sesi\u00f3n toma el par\u00e1metro `redirectPath` de la URL. Si un usuario hace clic en un enlace donde el par\u00e1metro `redirectPath` tiene un esquema javascript, el atacante que cre\u00f3 el enlace puede ejecutar JavaScript arbitrario con los privilegios del usuario. La versi\u00f3n 2.24.0 contiene un parche para este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30270",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-04T21:15:16.577",
|
||||
"lastModified": "2024-04-04T21:15:16.577",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "mailcow: dockerized is an open source groupware/email suite based on docker. A security vulnerability has been identified in mailcow affecting versions prior to 2024-04. This vulnerability is a combination of path traversal and arbitrary code execution, specifically targeting the `rspamd_maps()` function. It allows authenticated admin users to overwrite any file writable by the www-data user by exploiting improper path validation. The exploit chain can lead to the execution of arbitrary commands on the server. Version 2024-04 contains a patch for the issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "mailcow: dockerized es un software colaborativo/paquete de correo electr\u00f3nico de c\u00f3digo abierto basado en Docker. Se ha identificado una vulnerabilidad de seguridad en mailcow que afecta a versiones anteriores a 2024-04. Esta vulnerabilidad es una combinaci\u00f3n de path traversal y ejecuci\u00f3n de c\u00f3digo arbitrario, espec\u00edficamente dirigida a la funci\u00f3n `rspamd_maps()`. Permite a los usuarios administradores autenticados sobrescribir cualquier archivo en el que pueda escribir el usuario www-data aprovechando la validaci\u00f3n de ruta incorrecta. La cadena de exploits puede conducir a la ejecuci\u00f3n de comandos arbitrarios en el servidor. La versi\u00f3n 2024-04 contiene un parche para el problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30849",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-05T08:15:07.733",
|
||||
"lastModified": "2024-04-05T08:15:07.733",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30891",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-05T08:15:07.800",
|
||||
"lastModified": "2024-04-05T08:15:07.800",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
59
CVE-2024/CVE-2024-310xx/CVE-2024-31083.json
Normal file
59
CVE-2024/CVE-2024-310xx/CVE-2024-31083.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-31083",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-05T12:15:37.577",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-31083",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-31204",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-04T21:15:16.773",
|
||||
"lastModified": "2024-04-04T21:15:16.773",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "mailcow: dockerized is an open source groupware/email suite based on docker. A security vulnerability has been identified in mailcow affecting versions prior to 2024-04. This vulnerability resides in the exception handling mechanism, specifically when not operating in DEV_MODE. The system saves exception details into a session array without proper sanitization or encoding. These details are later rendered into HTML and executed in a JavaScript block within the user's browser, without adequate escaping of HTML entities. This flaw allows for Cross-Site Scripting (XSS) attacks, where attackers can inject malicious scripts into the admin panel by triggering exceptions with controlled input. The exploitation method involves using any function that might throw an exception with user-controllable argument. This issue can lead to session hijacking and unauthorized administrative actions, posing a significant security risk. Version 2024-04 contains a fix for the issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "mailcow: dockerized es un software colaborativo/paquete de correo electr\u00f3nico de c\u00f3digo abierto basado en Docker. Se ha identificado una vulnerabilidad de seguridad en mailcow que afecta a versiones anteriores a 2024-04. Esta vulnerabilidad reside en el mecanismo de manejo de excepciones, espec\u00edficamente cuando no se opera en DEV_MODE. El sistema guarda los detalles de la excepci\u00f3n en una matriz de sesiones sin una desinfecci\u00f3n o codificaci\u00f3n adecuada. Estos detalles luego se representan en HTML y se ejecutan en un bloque de JavaScript dentro del navegador del usuario, sin un escape adecuado de las entidades HTML. Esta falla permite ataques de Cross-Site Scripting (XSS), donde los atacantes pueden inyectar scripts maliciosos en el panel de administraci\u00f3n activando excepciones con entradas controladas. El m\u00e9todo de explotaci\u00f3n implica el uso de cualquier funci\u00f3n que pueda generar una excepci\u00f3n con un argumento controlable por el usuario. Este problema puede provocar secuestro de sesi\u00f3n y acciones administrativas no autorizadas, lo que supone un riesgo de seguridad importante. La versi\u00f3n 2024-04 contiene una soluci\u00f3n para el problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-31206",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-04T23:15:15.897",
|
||||
"lastModified": "2024-04-04T23:15:15.897",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "dectalk-tts is a Node package to interact with the aeiou Dectalk web API. In `dectalk-tts@1.0.0`, network requests to the third-party API are sent over HTTP, which is unencrypted. Unencrypted traffic can be easily intercepted and modified by attackers. Anyone who uses the package could be the victim of a man-in-the-middle (MITM) attack. The network request was upgraded to HTTPS in version `1.0.1`. There are no workarounds, but some precautions include not sending any sensitive information and carefully verifying the API response before saving it."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "dectalk-tts es un paquete de Nodo para interactuar con la API web aeiou Dectalk. En `dectalk-tts@1.0.0`, las solicitudes de red a la API de terceros se env\u00edan a trav\u00e9s de HTTP, que no est\u00e1 cifrado. Los atacantes pueden interceptar y modificar f\u00e1cilmente el tr\u00e1fico no cifrado. Cualquiera que utilice el paquete podr\u00eda ser v\u00edctima de un ataque de intermediario (MITM). La solicitud de red se actualiz\u00f3 a HTTPS en la versi\u00f3n \"1.0.1\". No existen workarounds, pero algunas precauciones incluyen no enviar informaci\u00f3n confidencial y verificar cuidadosamente la respuesta de la API antes de guardarla."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-31210",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-04T23:15:16.127",
|
||||
"lastModified": "2024-04-04T23:15:16.127",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WordPress is an open publishing platform for the Web. It's possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -> Add New -> Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it's otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites where the `DISALLOW_FILE_MODS` constant is set to `true` are not affected. Sites where an administrative user either does not need to enter FTP credentials or they have access to the valid FTP credentials, are not affected. The issue was fixed in WordPress 6.4.3 on January 30, 2024 and backported to versions 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13, 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3.33, 4.2.37, and 4.1.40. A workaround is available. If the `DISALLOW_FILE_MODS` constant is defined as `true` then it will not be possible for any user to upload a plugin and therefore this issue will not be exploitable.\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "WordPress es una plataforma de publicaci\u00f3n abierta para la Web. Es posible que un usuario administrativo env\u00ede un archivo de un tipo que no sea un archivo zip como un nuevo complemento en la pantalla Complementos -> Agregar nuevo -> Cargar complemento en WordPress. Si se solicitan credenciales FTP para la instalaci\u00f3n (para mover el archivo a un lugar fuera del directorio `uploads`), entonces el archivo cargado permanece disponible temporalmente en la librer\u00eda multimedia a pesar de que no est\u00e9 permitido. Si la constante `DISALLOW_FILE_EDIT` se establece en `true` en el sitio _y_ se requieren credenciales FTP al cargar un nuevo tema o complemento, entonces esto t\u00e9cnicamente permite un RCE cuando el usuario no tendr\u00eda medios para ejecutar c\u00f3digo PHP arbitrario. Este problema _solo_ afecta a los usuarios de nivel de administrador en instalaciones de un solo sitio y a los usuarios de nivel de superadministrador en instalaciones de m\u00faltiples sitios donde, de lo contrario, se espera que el usuario no tenga permiso para cargar o ejecutar c\u00f3digo PHP arbitrario. Los usuarios de niveles inferiores no se ven afectados. Los sitios donde la constante `DISALLOW_FILE_MODS` est\u00e1 establecida en `true` no se ven afectados. Los sitios donde un usuario administrativo no necesita ingresar credenciales FTP o tiene acceso a las credenciales FTP v\u00e1lidas no se ven afectados. El problema se solucion\u00f3 en WordPress 6.4.3 el 30 de enero de 2024 y se actualiz\u00f3 a las versiones 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13. 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3. 33, 4.2.37 y 4.1.40. Hay una soluci\u00f3n disponible. Si la constante `DISALLOW_FILE_MODS` se define como `true`, ning\u00fan usuario podr\u00e1 cargar un complemento y, por lo tanto, este problema no ser\u00e1 explotable."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-31211",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-04T23:15:16.333",
|
||||
"lastModified": "2024-04-04T23:15:16.333",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "WordPress es una plataforma de publicaci\u00f3n abierta para la Web. La deserializaci\u00f3n de instancias de la clase `WP_HTML_Token` permite la ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de su m\u00e9todo m\u00e1gico `__destruct()`. Este problema se solucion\u00f3 en WordPress 6.4.2 el 6 de diciembre de 2023. Las versiones anteriores a la 6.4.0 no se ven afectadas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-31212",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-04T23:15:16.540",
|
||||
"lastModified": "2024-04-04T23:15:16.540",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "InstantCMS is a free and open source content management system. A SQL injection vulnerability affects instantcms v2.16.2 in which an attacker with administrative privileges can cause the application to execute unauthorized SQL code. The vulnerability exists in index_chart_data action, which receives an input from user and passes it unsanitized to the core model `filterFunc` function that further embeds this data in an SQL statement. This allows attackers to inject unwanted SQL code into the statement. The `period` should be escaped before inserting it in the query. As of time of publication, a patched version is not available."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "InstantCMS es un sistema de gesti\u00f3n de contenidos gratuito y de c\u00f3digo abierto. Una vulnerabilidad de inyecci\u00f3n SQL afecta a instantcms v2.16.2 en la que un atacante con privilegios administrativos puede hacer que la aplicaci\u00f3n ejecute c\u00f3digo SQL no autorizado. La vulnerabilidad existe en la acci\u00f3n index_chart_data, que recibe una entrada del usuario y la pasa sin desinfectar a la funci\u00f3n `filterFunc` del modelo central que incorpora a\u00fan m\u00e1s estos datos en una declaraci\u00f3n SQL. Esto permite a los atacantes inyectar c\u00f3digo SQL no deseado en la declaraci\u00f3n. Se debe utilizar un car\u00e1cter de escape antes de insertarlo en la consulta. Al momento de la publicaci\u00f3n, no hay una versi\u00f3n parcheada disponible."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-31498",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-04T23:15:16.743",
|
||||
"lastModified": "2024-04-04T23:15:16.743",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ykman-gui (aka YubiKey Manager GUI) before 1.2.6 on Windows, when Edge is not used, allows privilege escalation because browser windows can open as Administrator."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "ykman-gui (tambi\u00e9n conocido como GUI de YubiKey Manager) anterior a 1.2.6 en Windows, cuando no se usa Edge, permite la escalada de privilegios porque las ventanas del navegador se pueden abrir como Administrador."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3217",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-05T08:15:07.853",
|
||||
"lastModified": "2024-04-05T08:15:07.853",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3296",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-04T14:15:11.080",
|
||||
"lastModified": "2024-04-04T16:33:06.610",
|
||||
"lastModified": "2024-04-05T12:15:37.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A timing-based side-channel exists in the rust-openssl package, which could be sufficient to recover a plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages for decryption. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode."
|
||||
"value": "A timing-based side-channel flaw exists in the rust-openssl package, which could be sufficient to recover a plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages for decryption. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe un canal lateral basado en temporizaci\u00f3n en el paquete rust-openssl, que podr\u00eda ser suficiente para recuperar un texto plano a trav\u00e9s de una red en un ataque estilo Bleichenbacher. Para lograr un descifrado exitoso, un atacante tendr\u00eda que poder enviar una gran cantidad de mensajes de prueba para descifrarlos. La vulnerabilidad afecta al modo de relleno de cifrado RSA PKCS#1v1.5 heredado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3311",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-04T21:15:16.957",
|
||||
"lastModified": "2024-04-04T21:15:16.957",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Dreamer CMS up to 4.1.3.0. It has been declared as critical. Affected by this vulnerability is the function ZipUtils.unZipFiles of the file controller/admin/ThemesController.java. The manipulation leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.3.1 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-259369 was assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en Dreamer CMS hasta 4.1.3.0. Ha sido declarada cr\u00edtica. La funci\u00f3n ZipUtils.unZipFiles del archivo controlador/admin/ThemesController.java es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce al path traversal. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 4.1.3.1 puede solucionar este problema. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-259369."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3314",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-04T21:15:17.203",
|
||||
"lastModified": "2024-04-04T21:15:17.203",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Computer Laboratory Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /classes/Users.php. The manipulation leads to sql injection. The attack may be initiated remotely. The identifier VDB-259385 was assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en SourceCodester Computer Laboratory Management System 1.0 y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo /classes/Users.php. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El ataque puede iniciarse de forma remota. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-259385."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3315",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-04T21:15:17.430",
|
||||
"lastModified": "2024-04-04T21:15:17.430",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Computer Laboratory Management System 1.0. It has been classified as critical. Affected is an unknown function of the file classes/user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-259386 is the identifier assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Computer Laboratory Management System 1.0. Ha sido clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo class/user.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-259386 es el identificador asignado a esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3316",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-04T22:15:09.420",
|
||||
"lastModified": "2024-04-04T22:15:09.420",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Computer Laboratory Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/category/view_category.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259387."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Computer Laboratory Management System 1.0. Ha sido declarada cr\u00edtica. Una funci\u00f3n desconocida del archivo /admin/category/view_category.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-259387."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3320",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-05T00:15:08.147",
|
||||
"lastModified": "2024-04-05T00:15:08.147",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester eLearning System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation of the argument page leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-259388."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester eLearning System 1.0. Ha sido calificada como problem\u00e1tica. Una funci\u00f3n desconocida es afectada por este problema. La manipulaci\u00f3n de la p\u00e1gina de argumentos conduce a Cross-Site Scripting. El ataque puede lanzarse de forma remota. El identificador de esta vulnerabilidad es VDB-259388."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3321",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-05T01:15:51.747",
|
||||
"lastModified": "2024-04-05T01:15:51.747",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic has been found in SourceCodester eLearning System 1.0. This affects an unknown part of the component Maintenance Module. The manipulation of the argument Subject Code/Description leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259389 was assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad ha sido encontrada en SourceCodester eLearning System 1.0 y clasificada como problem\u00e1tica. Una parte desconocida del componente Maintenance Module afecta a una parte desconocida. La manipulaci\u00f3n del argumento C\u00f3digo de asunto/Descripci\u00f3n conduce a Cross-Site Scripting. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-259389."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
64
README.md
64
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-05T10:00:38.649160+00:00
|
||||
2024-04-05T14:00:38.541853+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-05T09:15:09.860000+00:00
|
||||
2024-04-05T13:15:08.177000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,42 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
244187
|
||||
244193
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `13`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2024-2115](CVE-2024/CVE-2024-21xx/CVE-2024-2115.json) (`2024-04-05T08:15:07.470`)
|
||||
- [CVE-2024-21848](CVE-2024/CVE-2024-218xx/CVE-2024-21848.json) (`2024-04-05T09:15:09.017`)
|
||||
- [CVE-2024-2447](CVE-2024/CVE-2024-24xx/CVE-2024-2447.json) (`2024-04-05T09:15:09.860`)
|
||||
- [CVE-2024-26810](CVE-2024/CVE-2024-268xx/CVE-2024-26810.json) (`2024-04-05T09:15:09.230`)
|
||||
- [CVE-2024-26812](CVE-2024/CVE-2024-268xx/CVE-2024-26812.json) (`2024-04-05T09:15:09.283`)
|
||||
- [CVE-2024-26813](CVE-2024/CVE-2024-268xx/CVE-2024-26813.json) (`2024-04-05T09:15:09.340`)
|
||||
- [CVE-2024-26814](CVE-2024/CVE-2024-268xx/CVE-2024-26814.json) (`2024-04-05T09:15:09.393`)
|
||||
- [CVE-2024-27437](CVE-2024/CVE-2024-274xx/CVE-2024-27437.json) (`2024-04-05T09:15:09.443`)
|
||||
- [CVE-2024-28949](CVE-2024/CVE-2024-289xx/CVE-2024-28949.json) (`2024-04-05T09:15:09.497`)
|
||||
- [CVE-2024-29221](CVE-2024/CVE-2024-292xx/CVE-2024-29221.json) (`2024-04-05T09:15:09.680`)
|
||||
- [CVE-2024-30849](CVE-2024/CVE-2024-308xx/CVE-2024-30849.json) (`2024-04-05T08:15:07.733`)
|
||||
- [CVE-2024-30891](CVE-2024/CVE-2024-308xx/CVE-2024-30891.json) (`2024-04-05T08:15:07.800`)
|
||||
- [CVE-2024-3217](CVE-2024/CVE-2024-32xx/CVE-2024-3217.json) (`2024-04-05T08:15:07.853`)
|
||||
- [CVE-2023-5692](CVE-2023/CVE-2023-56xx/CVE-2023-5692.json) (`2024-04-05T13:15:07.773`)
|
||||
- [CVE-2023-6522](CVE-2023/CVE-2023-65xx/CVE-2023-6522.json) (`2024-04-05T12:15:36.267`)
|
||||
- [CVE-2023-6523](CVE-2023/CVE-2023-65xx/CVE-2023-6523.json) (`2024-04-05T12:15:37.233`)
|
||||
- [CVE-2024-2380](CVE-2024/CVE-2024-23xx/CVE-2024-2380.json) (`2024-04-05T13:15:07.973`)
|
||||
- [CVE-2024-2499](CVE-2024/CVE-2024-24xx/CVE-2024-2499.json) (`2024-04-05T13:15:08.177`)
|
||||
- [CVE-2024-31083](CVE-2024/CVE-2024-310xx/CVE-2024-31083.json) (`2024-04-05T12:15:37.577`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `10`
|
||||
Recently modified CVEs: `50`
|
||||
|
||||
- [CVE-2022-34357](CVE-2022/CVE-2022-343xx/CVE-2022-34357.json) (`2024-04-05T09:15:08.060`)
|
||||
- [CVE-2023-22655](CVE-2023/CVE-2023-226xx/CVE-2023-22655.json) (`2024-04-05T09:15:08.203`)
|
||||
- [CVE-2023-30996](CVE-2023/CVE-2023-309xx/CVE-2023-30996.json) (`2024-04-05T09:15:08.317`)
|
||||
- [CVE-2023-32344](CVE-2023/CVE-2023-323xx/CVE-2023-32344.json) (`2024-04-05T09:15:08.407`)
|
||||
- [CVE-2023-32666](CVE-2023/CVE-2023-326xx/CVE-2023-32666.json) (`2024-04-05T09:15:08.497`)
|
||||
- [CVE-2023-35191](CVE-2023/CVE-2023-351xx/CVE-2023-35191.json) (`2024-04-05T09:15:08.583`)
|
||||
- [CVE-2023-38359](CVE-2023/CVE-2023-383xx/CVE-2023-38359.json) (`2024-04-05T09:15:08.677`)
|
||||
- [CVE-2023-38575](CVE-2023/CVE-2023-385xx/CVE-2023-38575.json) (`2024-04-05T09:15:08.763`)
|
||||
- [CVE-2023-39368](CVE-2023/CVE-2023-393xx/CVE-2023-39368.json) (`2024-04-05T09:15:08.850`)
|
||||
- [CVE-2023-43490](CVE-2023/CVE-2023-434xx/CVE-2023-43490.json) (`2024-04-05T09:15:08.930`)
|
||||
- [CVE-2024-29221](CVE-2024/CVE-2024-292xx/CVE-2024-29221.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-29386](CVE-2024/CVE-2024-293xx/CVE-2024-29386.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-29387](CVE-2024/CVE-2024-293xx/CVE-2024-29387.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-29672](CVE-2024/CVE-2024-296xx/CVE-2024-29672.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-29863](CVE-2024/CVE-2024-298xx/CVE-2024-29863.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-29981](CVE-2024/CVE-2024-299xx/CVE-2024-29981.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-30255](CVE-2024/CVE-2024-302xx/CVE-2024-30255.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-30264](CVE-2024/CVE-2024-302xx/CVE-2024-30264.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-30270](CVE-2024/CVE-2024-302xx/CVE-2024-30270.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-30849](CVE-2024/CVE-2024-308xx/CVE-2024-30849.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-30891](CVE-2024/CVE-2024-308xx/CVE-2024-30891.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-31204](CVE-2024/CVE-2024-312xx/CVE-2024-31204.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-31206](CVE-2024/CVE-2024-312xx/CVE-2024-31206.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-31210](CVE-2024/CVE-2024-312xx/CVE-2024-31210.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-31211](CVE-2024/CVE-2024-312xx/CVE-2024-31211.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-31212](CVE-2024/CVE-2024-312xx/CVE-2024-31212.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-31498](CVE-2024/CVE-2024-314xx/CVE-2024-31498.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-3217](CVE-2024/CVE-2024-32xx/CVE-2024-3217.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-3296](CVE-2024/CVE-2024-32xx/CVE-2024-3296.json) (`2024-04-05T12:15:37.777`)
|
||||
- [CVE-2024-3311](CVE-2024/CVE-2024-33xx/CVE-2024-3311.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-3314](CVE-2024/CVE-2024-33xx/CVE-2024-3314.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-3315](CVE-2024/CVE-2024-33xx/CVE-2024-3315.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-3316](CVE-2024/CVE-2024-33xx/CVE-2024-3316.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-3320](CVE-2024/CVE-2024-33xx/CVE-2024-3320.json) (`2024-04-05T12:40:52.763`)
|
||||
- [CVE-2024-3321](CVE-2024/CVE-2024-33xx/CVE-2024-3321.json) (`2024-04-05T12:40:52.763`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
126
_state.csv
126
_state.csv
@ -200854,7 +200854,7 @@ CVE-2022-34352,0,0,1e1d4fbb5a377507f21a2bed94d2ebc5281a09581aee987536370e13d6395
|
||||
CVE-2022-34354,0,0,02584ee6b8cb0bff7f27c7009429134f0b39fd1a6b1116c23548e4adeee7b542,2023-11-07T03:48:33.893000
|
||||
CVE-2022-34355,0,0,c113b0077901660ecb6420de68116b847470d756b400e1b61d0de5945949d9a8,2023-10-10T20:41:30.020000
|
||||
CVE-2022-34356,0,0,2ae14f15be104cb235faa8a6ab8ed3afc398f20d7225fc326f5247476834ae64,2022-09-16T02:56:48.280000
|
||||
CVE-2022-34357,0,1,af87a974bbeca9e2d6e7bafe81283ee0f5421ac9d7cafc5f56a460dca06db348,2024-04-05T09:15:08.060000
|
||||
CVE-2022-34357,0,0,af87a974bbeca9e2d6e7bafe81283ee0f5421ac9d7cafc5f56a460dca06db348,2024-04-05T09:15:08.060000
|
||||
CVE-2022-34358,0,0,c81aeda061a6e1c39a5ea95bf08044fe1aed3523aa70c0f131fd41eb0542b8c2,2022-07-27T23:07:58.250000
|
||||
CVE-2022-3436,0,0,628499c3069d5d4d40a6545fab742a3d0bedd629a4e56c085297ef7620ea4d2d,2023-11-30T14:15:08.173000
|
||||
CVE-2022-34361,0,0,62e052216474f4951eeb4a3cb3acba62f053ad7d01461ecc470cfb339c52d99a,2023-11-07T03:48:34.060000
|
||||
@ -215730,7 +215730,7 @@ CVE-2023-22651,0,0,71c4ad22d720a14f556cbdbb0dfeae4cea5ba5bc7c522362e29fd79de49a8
|
||||
CVE-2023-22652,0,0,22b310772038f08a4e58450ff2cc11ade814694d9e643598182c60a0305bcac8,2023-09-13T03:15:07.693000
|
||||
CVE-2023-22653,0,0,a51dcac8d7628283af317fae95110ee2fc893a6c8b2b6ebf1624613b419371fc,2023-08-02T15:34:59.683000
|
||||
CVE-2023-22654,0,0,5b1a8feee98010e65bed848785e61db9d7b8c5ab9fbbb79f8736b9741ba8db64,2023-05-30T22:22:43.403000
|
||||
CVE-2023-22655,0,1,4014795b5db8a78148a9a1e089cc32279c6823fb131fc7bb94f4872889f6e033,2024-04-05T09:15:08.203000
|
||||
CVE-2023-22655,0,0,4014795b5db8a78148a9a1e089cc32279c6823fb131fc7bb94f4872889f6e033,2024-04-05T09:15:08.203000
|
||||
CVE-2023-22657,0,0,50aba77e7826f44f75fd8eca9cdefd06087e1b24472024d8ed2ae2967b0f87b1,2023-11-07T04:07:12.750000
|
||||
CVE-2023-22659,0,0,71d1f10cbb6b53df610f190613167a6c75fa7f817c0f72a1094380595ddd5133,2023-07-13T17:17:26.230000
|
||||
CVE-2023-2266,0,0,21c36958639008dc9b075634492f4955ca2430a255612c0db16c56bae462bdf1,2023-12-06T00:35:24.197000
|
||||
@ -222139,7 +222139,7 @@ CVE-2023-30991,0,0,d2cd3864d4d0c1e0346308db047da023695d9d74eb35ca6206a98aedc11f1
|
||||
CVE-2023-30993,0,0,03bf4ae9dfc255a68d7e0f8c0d83b167e401827066b7281a4017436cb44acd16,2023-07-05T18:47:03.063000
|
||||
CVE-2023-30994,0,0,50f2536b42ff1c52ec44103505245abc9de1d3604cb0eec34abbe616f409e899,2023-10-18T20:48:41.863000
|
||||
CVE-2023-30995,0,0,52e1bdffb80c2cd6a5585042ac96f61096b1fdd1a66207a01a6edf115e2cc942,2023-10-10T20:15:09.650000
|
||||
CVE-2023-30996,0,1,0cbc5199ab8703e9e1e8f5db93dac42c6c5c4fbde7a4c589a63ada853499569d,2024-04-05T09:15:08.317000
|
||||
CVE-2023-30996,0,0,0cbc5199ab8703e9e1e8f5db93dac42c6c5c4fbde7a4c589a63ada853499569d,2024-04-05T09:15:08.317000
|
||||
CVE-2023-30999,0,0,1ddc78f54cf0c47e9336bc540c859356a71014614a888d063a16c4ae23a656c0,2024-02-06T21:31:55.033000
|
||||
CVE-2023-3100,0,0,178f8cfb72823422aea10e7ffea4194c7bfad6260e8286d491b815750e8a8864,2024-03-21T02:48:24.370000
|
||||
CVE-2023-31001,0,0,c53512fa1496d57027073df272050bde089a391b1726720adc054c5082b0bad7,2024-01-18T17:06:28.277000
|
||||
@ -223041,7 +223041,7 @@ CVE-2023-32339,0,0,cb517b5b344e935e47f6fa2b5d4d177564da71d9c5673af6029fc8ae03edb
|
||||
CVE-2023-3234,0,0,a73a9cbedb7f5d4c8e9c6e64bd0603a581ffe38a404e785fa8e0687b891ef8df,2024-03-21T02:48:28.063000
|
||||
CVE-2023-32341,0,0,1ddf31eafe868585a40c30471b117fdf8bc01f015bb58b603e688577fc61bd21,2024-02-15T04:40:13.650000
|
||||
CVE-2023-32342,0,0,718b739606ceddf8e116cda5b49dc56f9002b527775d566e068e3f50abde9e5c,2023-06-06T18:18:41.097000
|
||||
CVE-2023-32344,0,1,a97deba342fd58800328e47f88083826c0a2753dea8ce966e07e7c270b69e45e,2024-04-05T09:15:08.407000
|
||||
CVE-2023-32344,0,0,a97deba342fd58800328e47f88083826c0a2753dea8ce966e07e7c270b69e45e,2024-04-05T09:15:08.407000
|
||||
CVE-2023-32346,0,0,1720a4f1887d300a5a8abe90d8a81fa98e2566da8b280c128fac5c7393e4f6c4,2023-05-31T20:17:36.940000
|
||||
CVE-2023-32347,0,0,8e4f4f9285f7dd35eb61db76d54965657bbc3f0a44cb8d351372ee30c4f36a96,2023-05-31T20:18:22.233000
|
||||
CVE-2023-32348,0,0,8c439649256e002f4389c48d462357d3b5521993f6f3fda6e5a636fc0d57887a,2023-06-01T14:26:59.373000
|
||||
@ -223361,7 +223361,7 @@ CVE-2023-32662,0,0,e6ecfd432d8093b5086df379db0b57cdf40d1685dba2c7fabe307bec0ed72
|
||||
CVE-2023-32663,0,0,3e7ef52ee8898923e5c75493bfae74a9e09e3258bba72eb62046ef7118b9edb7,2023-08-21T17:15:47.183000
|
||||
CVE-2023-32664,0,0,eb42d87345b4b74142e9d98b628cc63fc43d215142fe85e83066ebee2586bda4,2023-09-15T19:15:07.340000
|
||||
CVE-2023-32665,0,0,31f6fbb04d38e24ef8a8bd7c7b632bd8e055665c900cbecbc4c539e406f2b02a,2023-11-27T14:15:07.820000
|
||||
CVE-2023-32666,0,1,9e4cb6a8ebc3b9a62bc711210afb6752a4df60b12745e2e1ba1c7436db1cb9d9,2024-04-05T09:15:08.497000
|
||||
CVE-2023-32666,0,0,9e4cb6a8ebc3b9a62bc711210afb6752a4df60b12745e2e1ba1c7436db1cb9d9,2024-04-05T09:15:08.497000
|
||||
CVE-2023-32668,0,0,6870504f63fd451347fe0c331096f1e45ff8f6811229f296b8ba61f0b4142f10,2023-05-23T17:31:45.217000
|
||||
CVE-2023-32669,0,0,0f9d4ef16e2f26deb90011f7c395852feb44144b8263c413043ff4187727c7dd,2023-10-04T21:07:05.703000
|
||||
CVE-2023-3267,0,0,2d4c8daf423de31384ed6303e8fbed7365844c7d43ecaa98d82b4375b3aba328,2023-08-22T16:15:46.067000
|
||||
@ -225157,7 +225157,7 @@ CVE-2023-35187,0,0,726f3d269c3fc4ab0e4f8bf02f0782a65d9f79c8f65fbe320311a563e2133
|
||||
CVE-2023-35188,0,0,dc2d51582b0c40a1a991431e82dc96ea83b69d4b6cd75cf2797291ed1d48e8fe,2024-02-13T20:36:01.653000
|
||||
CVE-2023-35189,0,0,727918a3b8004e51f12292fde6090cd74f994ad6d97365addee6dbdc84715391,2023-07-27T17:43:17.170000
|
||||
CVE-2023-3519,0,0,7329bec3703bdc39aea3e59a1cc85b2341feb74f79ed91f9be508e94879784da,2023-08-04T18:15:17.077000
|
||||
CVE-2023-35191,0,1,c31c71c496abdb7f6b10202e2976b8f837d4c71b7eaa2c4113c2b95cf33357cf,2024-04-05T09:15:08.583000
|
||||
CVE-2023-35191,0,0,c31c71c496abdb7f6b10202e2976b8f837d4c71b7eaa2c4113c2b95cf33357cf,2024-04-05T09:15:08.583000
|
||||
CVE-2023-35193,0,0,35d999215ee0714de627ba46454d683b144c8672ad7068fc25e9877364a0d4d5,2023-10-18T14:59:29.847000
|
||||
CVE-2023-35194,0,0,f1422d8c09e7347a9549c0a032c4e17cf30f4016d4503b676ff325c6bb8df1e1,2023-10-18T14:59:10.533000
|
||||
CVE-2023-3520,0,0,03168a3d34c4551d3f89d5576703d3fa9269c779a40ea50d5fa229233446f0fa,2023-07-12T15:34:13.653000
|
||||
@ -227261,7 +227261,7 @@ CVE-2023-38354,0,0,d1e8aae350b3efaa7d933d306935881b296a663e5e0dd367535a6a3341ed7
|
||||
CVE-2023-38355,0,0,249d62dea42b65c43f485337cf2b025ca84978994be22a87ed6e3b2716c3280d,2023-10-13T01:14:34.023000
|
||||
CVE-2023-38356,0,0,c55e6df572a7ad6a09d93d8bf024b6549d086d1593f311c0dcd9f5f419a32e73,2023-09-22T16:45:59.370000
|
||||
CVE-2023-38357,0,0,f899c24b9076099671d7a5c797705766cb7feaa772c69dc54fed2a6af7ab8b59,2023-08-04T18:43:48.817000
|
||||
CVE-2023-38359,0,1,8e809a2260654b54c4b5a8d307cfb00bbc63342d56d8255c4f45147077ddfa79,2024-04-05T09:15:08.677000
|
||||
CVE-2023-38359,0,0,8e809a2260654b54c4b5a8d307cfb00bbc63342d56d8255c4f45147077ddfa79,2024-04-05T09:15:08.677000
|
||||
CVE-2023-3836,0,0,8354a50233ed3d7b2f0f73c2e8a8f66f78bb8f5bae55abc92ae927e41b4b7142,2024-03-21T02:48:47.537000
|
||||
CVE-2023-38360,0,0,79486c66229a0fa5a2154e2865bfba1395d11138731e5917b327ce675040bb76,2024-03-05T13:41:01.900000
|
||||
CVE-2023-38361,0,0,c6e79c96c692623eff2910c3872ad8af4e3692fed7acdbdf474970bee66927f0,2023-11-29T20:52:28.337000
|
||||
@ -227458,7 +227458,7 @@ CVE-2023-38571,0,0,59422f4a140d130cd11989d6215360f540ea5ce2d1940f49a1884661bcc08
|
||||
CVE-2023-38572,0,0,d548f53924cef1c9fed50ca54f02dd79c795d64a5950d4afb21f0974051e6ecc,2024-01-05T14:15:47.123000
|
||||
CVE-2023-38573,0,0,473858576dcb468ddb455cbd057d8489cb45e9be3d5a82dde3da1329775f6312,2023-12-01T20:52:57.627000
|
||||
CVE-2023-38574,0,0,b5446bdb7033f5711e00ad3535ee9383e878f8f0159bc3255c479d6656c1d4a4,2023-09-11T12:50:00.413000
|
||||
CVE-2023-38575,0,1,4e79fe8d2ce008298825516df254661a63b525dae6fedee20e49c3138e848b6a,2024-04-05T09:15:08.763000
|
||||
CVE-2023-38575,0,0,4e79fe8d2ce008298825516df254661a63b525dae6fedee20e49c3138e848b6a,2024-04-05T09:15:08.763000
|
||||
CVE-2023-38576,0,0,af8fe57eb812ce53861c61345d0fee8b81c4f54d4d6d4bf17791b20b4197fa51,2023-08-24T18:26:00.547000
|
||||
CVE-2023-38579,0,0,d675649c63083678f4f6251f8e7bc0f6b675249c8aaa3432eda8a193ed725f0c,2024-02-13T21:56:17.013000
|
||||
CVE-2023-3858,0,0,b0181383daef6c4e2640c077649efa29542f55d1afd5014233b3c6c43dd98b7b,2024-03-21T02:48:49.360000
|
||||
@ -227569,7 +227569,7 @@ CVE-2023-38704,0,0,71ad417d2d62aca56ced15b4b3782cb7ef14a1a963bb598f7ad603e82b901
|
||||
CVE-2023-38706,0,0,d617f4ba91b248078cb18ecbeaa51cab201c52ad3c8f2f18f77c483b475b121f,2023-09-20T19:59:40.533000
|
||||
CVE-2023-38707,0,0,1555d65b227585a9a17048663d159df62df160dae7a887969466cf59d80e31d9,2023-11-07T04:17:23.830000
|
||||
CVE-2023-38708,0,0,7fedbbf4bbe078eadce738b4508b175a97c5b3d1293a62ffb0695e275be0d573,2023-08-09T16:15:56.907000
|
||||
CVE-2023-38709,0,0,4f43d1652d35d613d139bafa21365d4cb956860648974f9c28cfd6c75ee351b3,2024-04-04T20:15:08.047000
|
||||
CVE-2023-38709,0,1,1b21e70572cd6faad02b973b7e9263859747bdbce6656ca4f202620deee31e0d,2024-04-05T12:40:52.763000
|
||||
CVE-2023-3871,0,0,347060670f53b0cd99e5d44184b3be46ead6a2c87242979454189d84cb6cc054,2024-03-21T02:48:49.850000
|
||||
CVE-2023-38710,0,0,c92dcd4884e376d2c6467d62a4785461b746cf66b09b5c314c8a7501bae93f64,2023-12-11T19:34:38.997000
|
||||
CVE-2023-38711,0,0,165f0388158a27a13a90130c6df8b1216fb4e778781b739e91f43d98820cbc39,2023-12-12T13:52:11.970000
|
||||
@ -228048,7 +228048,7 @@ CVE-2023-39363,0,0,3b5e03600cf70b560e94452186ae68035e14537be8e3ab0775f4768bbd4e3
|
||||
CVE-2023-39364,0,0,c3c94f3ad4cb220374e3d08f341ea50d15ec66dff6a2b9cc99e74f26a2402284,2024-03-18T20:15:07.727000
|
||||
CVE-2023-39365,0,0,e973380538b25f82f11649a42c0b64ff80692ed5ec34a2c9828c426b7e157e90,2024-03-18T20:15:07.827000
|
||||
CVE-2023-39366,0,0,ec1d63cbca61e10ab8a85d0a3e36a9a8f98189047df6aef06ced93f8760dd051,2023-11-09T05:15:10.317000
|
||||
CVE-2023-39368,0,1,80c88d98cccc8fda18cc4ce42c7e61c86543eb9a5fed9f7febed87a045c89328,2024-04-05T09:15:08.850000
|
||||
CVE-2023-39368,0,0,80c88d98cccc8fda18cc4ce42c7e61c86543eb9a5fed9f7febed87a045c89328,2024-04-05T09:15:08.850000
|
||||
CVE-2023-39369,0,0,e8aa62682a22aacbf757723c98e0bd960e9af84f36a645dc487bf02ca20fc2a4,2023-09-07T17:44:36.470000
|
||||
CVE-2023-3937,0,0,1b9c2edef5222aa8070478842961fb82be451273a242472108ff086c86dfad93,2023-08-18T14:30:09.183000
|
||||
CVE-2023-39370,0,0,c3e1bdce95fcb360380a5bb3623ace17d0c7e5b2b109774631c738473e281f23,2023-09-08T06:42:31.750000
|
||||
@ -230679,7 +230679,7 @@ CVE-2023-43484,0,0,0e3fd100d8cdabff15f5388cc7ad52bc20ee89b047f07e3d1be0d5fe0a15a
|
||||
CVE-2023-43485,0,0,56e06eecce10771793782bda7486bdc0abaf33406a8b34746335ac307311004e,2023-10-17T20:31:53.560000
|
||||
CVE-2023-43488,0,0,73963ff8fac3febe7fcf1226608d7faad6241fb5160a15c4381098ef0daabd52,2023-11-06T14:41:18.393000
|
||||
CVE-2023-4349,0,0,7bcfa9d15cfc992ac2e945aa6e7aec95ce86c568d8f15fb3ba2380084473c42f,2024-01-31T17:15:14.370000
|
||||
CVE-2023-43490,0,1,9855c56390f04a7d3184cf28686e801bde9b11bfcd2582fd5bccb6e92bdd6f36,2024-04-05T09:15:08.930000
|
||||
CVE-2023-43490,0,0,9855c56390f04a7d3184cf28686e801bde9b11bfcd2582fd5bccb6e92bdd6f36,2024-04-05T09:15:08.930000
|
||||
CVE-2023-43492,0,0,42b5f695dc2a37dd6c1424d01d87bfa34fecc8146eed1f8b9a6b38bb9493ae43,2023-10-30T14:33:25.570000
|
||||
CVE-2023-43493,0,0,c9ba762920ceac7459278a5fd1ff76127d128352a3279e28d59d1b8b275a2639,2023-09-27T20:51:26.677000
|
||||
CVE-2023-43494,0,0,a5e1abcb0e0cbdd68150bd25ed5f4171fce3829cb775e04ccec60c9f09070438,2023-09-25T13:43:35.503000
|
||||
@ -231752,7 +231752,7 @@ CVE-2023-45284,0,0,8ac30ea66f71a985fe5bb7a9cd5117880ebafd3abf8acdf27e1d0743d36c9
|
||||
CVE-2023-45285,0,0,16ff5e8b79188755e5a7a8fbe86dba64b6537f7e34fac57b399b003651fea1da,2024-01-20T04:15:08.013000
|
||||
CVE-2023-45286,0,0,aa66fbaae1e0c30c7595917e56819be1bbb9d239333872f0ea607184384ab322,2024-01-04T19:15:08.737000
|
||||
CVE-2023-45287,0,0,3d0bb90ad6b09d1d9f3bb34a82b2143afa61d21142b51c29073fbf468a053219,2024-01-12T14:15:48.310000
|
||||
CVE-2023-45288,0,0,ff6b87efc60530a09df028bf9af80d06d949ee5c74e3378e9bd7946c57b6df66,2024-04-04T21:15:16.113000
|
||||
CVE-2023-45288,0,1,081d1fc2c52516346fd1583109c04c9c4ee2b6109c03b6a0ea80fd8097e9c5ed,2024-04-05T12:40:52.763000
|
||||
CVE-2023-45289,0,0,3447b599eb83a7083c6a73e53671fb2c29c7d970990d5513c7349cd0a7644fe2,2024-03-29T13:15:13.893000
|
||||
CVE-2023-45290,0,0,d5f93b7a8b1619be03e3f67168cb7e7212bf0df22f898247e2ec2a4b96561862,2024-03-29T13:15:13.957000
|
||||
CVE-2023-45292,0,0,a4390d55b5d08527c3f372908b1fbe1aa0cdd99af7a0f4f36d5f5803a9a43941,2023-12-14T16:26:54.007000
|
||||
@ -236058,7 +236058,7 @@ CVE-2023-52229,0,0,ea00ad4e0597affd30c31fe4f98a420e37e7ad7335b14877a8e6dc8a42c24
|
||||
CVE-2023-5223,0,0,89e8c184d21745a264c9fc9e444990021f80eaf45de773e9b410a22e5226ce45,2024-03-21T02:50:11.113000
|
||||
CVE-2023-52231,0,0,b5d4f82f731fe2c9cd0c678c3b61a598c79c626b8e6400879ca4a307d29966f3,2024-03-28T12:42:56.150000
|
||||
CVE-2023-52234,0,0,1fff4c9561934a3ed1e9215004c9ee935ccd38ea2e79cd4cda085a56cc775bc1,2024-03-28T12:42:56.150000
|
||||
CVE-2023-52235,0,0,f4252331265cbed47d565e61c2d6af947ae9657df278785c08221b7895baa311,2024-04-05T06:15:10.060000
|
||||
CVE-2023-52235,0,1,16981ffc5fe969f81317d84f727c6e32258dd02cfb8c5b06541b383bfe064ddb,2024-04-05T12:40:52.763000
|
||||
CVE-2023-52239,0,0,53232ab6cc2fc288fa443c530cf5456f2ca2ee6e47506bdc07862ff96f4b1242,2024-02-13T22:50:50.313000
|
||||
CVE-2023-52240,0,0,e12239f2302ca733fadb51e07b144a2ef6f5c195fb579e55287a44a10e77cb78,2024-01-08T14:32:47.203000
|
||||
CVE-2023-52251,0,0,37b652e51a7c39e57b6fb6d1511e1d015580821275c80dc97e7e00b5102f4597,2024-02-29T01:42:07.630000
|
||||
@ -236751,6 +236751,7 @@ CVE-2023-5688,0,0,06a783b4a174a26699fc289ad2f278ef95fec4ff44eb7fd150fc30bbf083b5
|
||||
CVE-2023-5689,0,0,4e3175cf7178e77dacef582bf9fb5b0a74671e5f8f56f8b3a11c32f3e6ac3b3e,2023-10-27T18:52:11.203000
|
||||
CVE-2023-5690,0,0,eb25183a76528a8e7fa2a9848820a0b672578839c362a07eeb93f6f992e63076,2023-10-27T18:50:44.663000
|
||||
CVE-2023-5691,0,0,15284afecb760980909bdc0c9968d11e1d4acb39199c2aeb8b4a5c4f0836df39,2024-01-18T15:17:46.287000
|
||||
CVE-2023-5692,1,1,5a43de17769fba853ff662143cfae5b0d47f04a0b28851274071da242abdb9b0,2024-04-05T13:15:07.773000
|
||||
CVE-2023-5693,0,0,92f3c9bc23405271e955ea89350dfa098d870f91e3ef1d0b756cb5a2e610bf09,2024-03-21T02:50:22.343000
|
||||
CVE-2023-5694,0,0,4c7b11d0cd8db135050384a220d7020e36a17cc009f33795b53f57f9cc32303b,2024-03-21T02:50:22.423000
|
||||
CVE-2023-5695,0,0,73e9d0b7d5252380d1b6beec6a6c5cee87c3cd6ce063a9209b7f0140e59c2765,2024-03-21T02:50:22.503000
|
||||
@ -237009,7 +237010,7 @@ CVE-2023-5968,0,0,3df68a2dd455892737ae4ccd5a51eebeb6501735dcdf4b0df0cec23abf6d9c
|
||||
CVE-2023-5969,0,0,134a47156763573087c261bbe70bb15989d9036802658ea7ded005b60736db52,2023-11-14T17:13:54.790000
|
||||
CVE-2023-5970,0,0,a3d173231982020ef5f7b38c5168b740ee778873f57c322454e8fe7b89485a50,2023-12-13T15:32:02.247000
|
||||
CVE-2023-5972,0,0,656064d47e5a67cc669b3046e3f9950e9c88ceaf574ff9ba75f67da5f86ce1b3,2023-11-30T20:31:31.227000
|
||||
CVE-2023-5973,0,0,32a44e92efb19c712cd19c194485505b305f6c23b4a7c9444fc75fd9a02a489d,2024-04-05T03:15:07.770000
|
||||
CVE-2023-5973,0,1,f7b898402b583edab1f75d9292cd44439c623e8c829f2231aab55dc8a659cafe,2024-04-05T12:40:52.763000
|
||||
CVE-2023-5974,0,0,fa5f45166fa670d4c6344a3fb91459f3146ad2d35e7850fcf71ad2fdc079fd1e,2023-12-01T20:14:58.070000
|
||||
CVE-2023-5975,0,0,30b6644af3852b24c8154dd79a3d90d108a53c8bc9032f107504cbc0845a2880,2023-11-14T18:11:18.403000
|
||||
CVE-2023-5976,0,0,97d27a9c52f95e55c71eed6991c193cbb58fd61fdb979d5c6cfd47c0258b66ff,2023-11-14T18:39:05.787000
|
||||
@ -237454,6 +237455,8 @@ CVE-2023-6517,0,0,3467593a9d1064dca9fbac50097aac110e8ea12ac0f5d56273a5e05aa70522
|
||||
CVE-2023-6518,0,0,701884efa90328aec127750f6d7a617892af73d7d9d1cbf5cfc7a0127e0ae388,2024-03-21T02:50:38.627000
|
||||
CVE-2023-6519,0,0,1067c6eb2fdb653773710a715d19abe17d72d4948b55787118a707da115fb55e,2024-03-21T02:50:38.713000
|
||||
CVE-2023-6520,0,0,51cb07e213c2b58051c216c89b744fc7c414cbeef02be0ba128dd84d6c032cdf,2024-01-17T20:43:01.987000
|
||||
CVE-2023-6522,1,1,e2a708a4903adadeca3b568b6a016d873c022ef513915335664038e161f935de,2024-04-05T12:40:52.763000
|
||||
CVE-2023-6523,1,1,d3a9048f5a7ff44e2a6950b8c3357bca3f23405f7d00dd88c1769618a08641fd,2024-04-05T12:40:52.763000
|
||||
CVE-2023-6524,0,0,c1e8fe40a4048e04c188cd09d174accb2325b4f144f04207980ba18caef1e277,2024-02-02T16:33:29.477000
|
||||
CVE-2023-6525,0,0,ac70555a2bef1a8087998ae6359b27cf29025600da9a470253289615b5779d5a,2024-03-17T22:38:29.433000
|
||||
CVE-2023-6526,0,0,bf53e42fb8e2321f8ebfec63b58aabc5d9b3663864ac691d642ae796c386736c,2024-02-12T16:00:51.520000
|
||||
@ -239873,7 +239876,7 @@ CVE-2024-2108,0,0,c2fa70d90e7c92604d37599b63a68c51b88c7a208a94e63da1f79da8e05cb6
|
||||
CVE-2024-2110,0,0,1d85de629a97570a97242f5d089550bba2e60a5923838c39c1151e294a5fdcf3,2024-03-28T12:42:56.150000
|
||||
CVE-2024-2111,0,0,bb223011165a425455ec8ad438d31acdc69716e592665db5e015c6e3c7a0ad9a,2024-03-28T12:42:56.150000
|
||||
CVE-2024-2113,0,0,1af2e189d0f766a4a77361c625e87ddcd239476cacd0eaf00d619a2d2d68e8de,2024-03-29T12:45:02.937000
|
||||
CVE-2024-2115,1,1,958070a5428d52f8ec76429e64306fbbf091a0766862fcf468e218b71279864a,2024-04-05T08:15:07.470000
|
||||
CVE-2024-2115,0,1,ad4a99897aa65ee70731a7a49c28f7d6309b2934d1a4b752871efea7dc55e0f1,2024-04-05T12:40:52.763000
|
||||
CVE-2024-2116,0,0,0a8927d2c3af56415377e26a49eef636f1c80d9f9b3374c561d3bce1d3a48066,2024-03-29T12:45:02.937000
|
||||
CVE-2024-2120,0,0,d869e2d6a05f40fd099ef5d11b57f9e00d7f0b266e38148b71c8a447ce60ab1d,2024-03-27T12:29:30.307000
|
||||
CVE-2024-2121,0,0,4e86b6ec3433d288b50b9e9c9587d6707962f4c2d7ff92215a6366c5fd16dc6b,2024-03-27T12:29:30.307000
|
||||
@ -240202,7 +240205,7 @@ CVE-2024-21838,0,0,2e87184ffbd37f09fc02bbbce38359315ed0c01cd7f2541a39d089530736b
|
||||
CVE-2024-2184,0,0,b7ea4f5ba4c2bd608dff608bfe2a87def706e3fb064d33fdd3c3733ae6e79e4b,2024-03-11T01:32:29.610000
|
||||
CVE-2024-21840,0,0,ba783d6125c59c9321abeb19e4ad3c65376e311d48c8d637117e60a3ad69607f,2024-02-06T18:32:20.340000
|
||||
CVE-2024-21845,0,0,c3c19550dac060de10c39d04cca7b66f65b34853e3fc2412b58fd540397606b8,2024-02-07T18:23:06.690000
|
||||
CVE-2024-21848,1,1,4034ab55412051bd5498ab10b360fcb8e191d5ee68b1a2843a65c4f1c9ab4ae1,2024-04-05T09:15:09.017000
|
||||
CVE-2024-21848,0,1,7a5c20e4b54cd22bcbafb7b3c75de756ff2f96e19251406e86ddab1348ece0ad,2024-04-05T12:40:52.763000
|
||||
CVE-2024-21849,0,0,777d92a1c4bb7f79ad58de292d7b92c84e7bc7c1bbc5ad80d97c5d175c6259e9,2024-02-14T18:04:45.380000
|
||||
CVE-2024-21851,0,0,854dd5d2aabc832591989b715d43ec08aeafe79b0e7fb2b7b8e58485d72989a1,2024-02-07T18:15:48.700000
|
||||
CVE-2024-21852,0,0,3082fd3c592fa6da1ceb030e60633f5be1a3b7d2adb2434a27465175a4927608,2024-02-07T17:15:05.653000
|
||||
@ -240222,7 +240225,7 @@ CVE-2024-21890,0,0,d0d6d1a152080740d6ba84ad392a919d70445665b25a7f6969e602652f189
|
||||
CVE-2024-21891,0,0,e424ef0f7a416dd53e40d650cdce75de43c958a1f5dba4ec358496f75617d5f2,2024-03-15T11:15:08.753000
|
||||
CVE-2024-21892,0,0,20e5acefe40d87bdcf0ddd06c773a67f885e875636f69c9336b01748da654b1a,2024-03-22T19:15:08.477000
|
||||
CVE-2024-21893,0,0,8e30826f2f638f6b28dccfb70150ad8a33cc616c290d8b76095e5ee871803b64,2024-02-01T02:00:01.187000
|
||||
CVE-2024-21894,0,0,2c2a0cfb64a28c521a5d401dd83f4046f41809ef6e3c15336e7ccdba4ed23297,2024-04-04T23:15:15.640000
|
||||
CVE-2024-21894,0,1,9d561f5d68a88dbb0fe4b09146f8c0ec004a64c1ddb6725eb8bf0a7776a74734,2024-04-05T12:40:52.763000
|
||||
CVE-2024-21896,0,0,19b337275b4c80290e30856ac5f19a33170bf79b2972a381de5433010e95582d,2024-03-29T13:15:14
|
||||
CVE-2024-21899,0,0,688bbc85b9f5d15251f75737cd336d68aa458da265ba78cb33907c6eacd4fe61,2024-03-13T14:25:02.043000
|
||||
CVE-2024-21900,0,0,e9e3bacd169a2499fbcf9944a7d36b5aa443f74334f0445e246d0d286dadb841,2024-03-13T14:24:02.157000
|
||||
@ -240263,7 +240266,7 @@ CVE-2024-22019,0,0,f2437e68c6ddb8f7177f54a0e9f52e5ca8426b13996c7a8a6cfcbbb0d671c
|
||||
CVE-2024-2202,0,0,830996a3e5b6be902d6f2e65d3759482285591493d041fcbf74113f66926d781,2024-03-25T01:51:01.223000
|
||||
CVE-2024-22021,0,0,ba38d4b86a2c5af951f989c7a28594b6207f0b19739ba3d580be6e4d49001bfb,2024-02-29T01:44:04.690000
|
||||
CVE-2024-22022,0,0,925c0d46bbd39b5d0f2644b5e26e0cd82488a20b7de7cccfa4639e9bb8f60d9e,2024-02-15T18:45:30.887000
|
||||
CVE-2024-22023,0,0,3577df410797e367ce591a8450abe7916586f9d990d75d779fa2e2a673d5962f,2024-04-04T20:15:08.130000
|
||||
CVE-2024-22023,0,1,a14daae4923791ad31d681c00afbf50ebb0f4d987cec3ae42ffd6ea2dc03c88f,2024-04-05T12:40:52.763000
|
||||
CVE-2024-22024,0,0,980d44adebdc63cfe4985efd7aa2ee2044d33423093fc7c9f165c43f20a43115,2024-02-13T15:15:32.193000
|
||||
CVE-2024-22025,0,0,61459addde8d883e2fba52001930c3fdd5c1e72e223ae9ae0e9157b1bc2b1032,2024-03-27T03:15:11.187000
|
||||
CVE-2024-22027,0,0,0822e6ca4a0197c830c667319442a46ae27f8152642de8d7f05f1858eada021b,2024-01-18T20:02:46.993000
|
||||
@ -240282,8 +240285,8 @@ CVE-2024-22048,0,0,ccec92a3265daf717c2bbbed7f0a34c57c44b3241b68cc37edd5bca0fad67
|
||||
CVE-2024-22049,0,0,9b7359ed630e382551d4570c9533818edaca377c6778b42eef7546c62195794e,2024-01-23T19:15:08.283000
|
||||
CVE-2024-22050,0,0,6cc1f5932c87c1ee4d5f0c22a81597d6852da9226b500ed6c316fab1f5f2b61b,2024-01-10T15:10:36.697000
|
||||
CVE-2024-22051,0,0,351db93d6ca76e0dc0a7975efc553f9724406030c8337d111a27ec7033241658,2024-01-11T17:07:05.660000
|
||||
CVE-2024-22052,0,0,14a4d768869c7a28971d2b2d04b0cf77c314f16631ff983678d9e73790ea25dd,2024-04-04T20:15:08.333000
|
||||
CVE-2024-22053,0,0,4a596ffc7aaec783dbef5de90d68ac9881b9dea6109c03b8af42d8c2c9698fb6,2024-04-04T20:15:08.500000
|
||||
CVE-2024-22052,0,1,5e2f4c08b3f4163dfe9e774d57a2db3d49d7eb216d47a5f7bb0aca6cb4eec961,2024-04-05T12:40:52.763000
|
||||
CVE-2024-22053,0,1,7ecf5fef317ab73ad441d4089ec4b67bac87b1b3bf186e44d3cfa84a2302e11c,2024-04-05T12:40:52.763000
|
||||
CVE-2024-22054,0,0,ea7f90611fdd0de53fc019330b39d133a7eda202c929c51b6ca495fd39ad0bf5,2024-03-04T02:15:16.820000
|
||||
CVE-2024-2206,0,0,d5a4112d81b12c296cee2d4a4427b7935f710f4d11684daab2b2fb84c48f6bc9,2024-03-27T12:29:30.307000
|
||||
CVE-2024-22075,0,0,e134c94ca50cfff14da7c6327f518dbd409e37e86810fc1b2a583012e3bdb9ef,2024-01-10T15:06:42.563000
|
||||
@ -240470,7 +240473,7 @@ CVE-2024-2236,0,0,1caa0e5cdfb424662cbf6124414533e4ab1dd9ca210ea89ecd59ad25abc68f
|
||||
CVE-2024-22360,0,0,dde3d7768ad1c8bc414b134384042470a384d3453ec0b0a0aa751c2a96e1b961,2024-04-03T17:24:18.150000
|
||||
CVE-2024-22361,0,0,2cb34447b61b8680c66e6f142987700b31f9f16d4e9b8d748c59e5b8ad5a9a29,2024-02-16T21:35:31.953000
|
||||
CVE-2024-22362,0,0,194d4da61fd0e172838ae5e875415deb5a10e6ec31fc18ececc7e4c5ad8228c4,2024-03-21T02:52:03.063000
|
||||
CVE-2024-22363,0,0,a2fd052c0c680128839144798c1421a18aa4438b9681bf79d0004d695dacd4dd,2024-04-05T06:15:10.200000
|
||||
CVE-2024-22363,0,1,f2093904f2c0c2583f88242c81aca179a42da115cdf994261e5d1b6c9758852a,2024-04-05T12:40:52.763000
|
||||
CVE-2024-22365,0,0,b09f0e3dd0fc2bf60706805e33c1f78b209416e9ed2aa43cb1cfb00b1fe90d17,2024-02-14T00:27:40.143000
|
||||
CVE-2024-22366,0,0,430ca6193adfaa0b9afcb94c1ccbb70fbf418a97a177252da5823216c0a609df,2024-01-30T22:15:32.033000
|
||||
CVE-2024-22368,0,0,6b22b40b8e4884565fa5c7d8677cdf0e0ae6419db0baf589179542cd6fadbd26,2024-02-27T04:15:06.767000
|
||||
@ -241085,6 +241088,7 @@ CVE-2024-23796,0,0,68b49052815222361e392dae7427245991f98ccb54551665c676eabfa56f8
|
||||
CVE-2024-23797,0,0,88296fcabd0c62d23d6dc4d83f31f348234c406224d771d8c186bba7ca31c7dc,2024-02-13T19:21:42.603000
|
||||
CVE-2024-23798,0,0,2cd5e41e302315de9e9135d604da2d70b7599d127c9a28288d56b32356a443e1,2024-02-13T19:21:49.827000
|
||||
CVE-2024-23799,0,0,87474387c81d478806fb0844a22528b99032771880013f1769bf52de59e38674,2024-02-13T19:22:01.760000
|
||||
CVE-2024-2380,1,1,9c51024d2b67cc435aaad0d9db16bc7c0ef7ca52b0001085e3a5ffd67b099be7,2024-04-05T13:15:07.973000
|
||||
CVE-2024-23800,0,0,1219452dfbe476ca185cadc545cb6e1faf7967b99d4f45a73f3a0c41132a5b8f,2024-02-13T19:22:19.453000
|
||||
CVE-2024-23801,0,0,75b12712cd23dd547e6f46d61312c143d26d1a1e7385a235203762e98c4f26c8,2024-02-13T19:22:25.110000
|
||||
CVE-2024-23802,0,0,2a32b0e6c5f032ce10681625af798e5d1e36f4ff8cac4eb598f5f6d1a1d78fb2,2024-02-13T19:22:31.803000
|
||||
@ -241359,7 +241363,7 @@ CVE-2024-2445,0,0,2f855bbcb84a342093922fd73320bfe19138d60313d23c629da4de19e559d7
|
||||
CVE-2024-2446,0,0,42e5c66ebcf58bc3242675333cd3d5679a04b8d2c648c26027e5a47b9ff8b42a,2024-03-15T12:53:06.423000
|
||||
CVE-2024-24468,0,0,2ffe0e787add87754da9d28139dd49fe0df5af62f9576796ac86e102fb215c8b,2024-02-07T22:03:09.897000
|
||||
CVE-2024-24469,0,0,4f6c0d02ab780395cc2795972f5ccd070037d1f155bb48f88977ff7315e7ceab,2024-02-07T22:02:57.743000
|
||||
CVE-2024-2447,1,1,a48cc78008d5334dfa13937b2dfd060f6e97d4807995da04c53d98553bc8065e,2024-04-05T09:15:09.860000
|
||||
CVE-2024-2447,0,1,906e36be68bb3e3b54c27f29a8d05491b5e785fe002de5d733845b79907f4576,2024-04-05T12:40:52.763000
|
||||
CVE-2024-24470,0,0,0ed64df001bff16a393bf92778dffdaa6681f7af33a9a33c77cdaa83290d7947,2024-02-06T21:07:34.547000
|
||||
CVE-2024-24474,0,0,7ff84388b8a92907ef716e1ca2c29ef338e5f699b29d362e7b2c54bbc2735acd,2024-02-21T01:15:07.857000
|
||||
CVE-2024-24475,0,0,da128c239114738663c22cbcb468c90723f598d143228b589356daf6901317f8,2024-02-21T01:15:07.890000
|
||||
@ -241505,7 +241509,7 @@ CVE-2024-24786,0,0,4dc9334988f29d383874110c009efd994347fefdf817f6300d6c17c85e9cd
|
||||
CVE-2024-2479,0,0,b512f9327eef1235a6ef71b4ddf8b5b87d57b4d3640a58dce1a34c5e174ab6a0,2024-03-21T02:52:34.570000
|
||||
CVE-2024-24793,0,0,c02d48f5d574325816298b4b1d2848ca92f5dc7aa67a2fd30978e3885630bc1b,2024-02-20T19:50:53.960000
|
||||
CVE-2024-24794,0,0,0d491c54da3b197a1321ac69102f9de79d058e3462ee7572209ea583555d837a,2024-02-20T19:50:53.960000
|
||||
CVE-2024-24795,0,0,a0fb4134754f1b931405ad4725d371593b99e9d95b4becb51c162365d10beffb,2024-04-04T20:15:08.663000
|
||||
CVE-2024-24795,0,1,80f6394441dfafaf02f24d20135aff9247904d9ab465f40c096785211238f225,2024-04-05T12:40:52.763000
|
||||
CVE-2024-24796,0,0,a14eda4226a58c2c4e1be311d88c2631825b3dc125c63aa2226f772d7e85a358,2024-02-12T14:19:54.330000
|
||||
CVE-2024-24797,0,0,c19a8ac8bc5c78a5206d6c6bb45c357c3a8b7076e1d1a067b2d060905019e0d6,2024-02-12T14:19:54.330000
|
||||
CVE-2024-24798,0,0,27adaa65a015e65d65b2afdd5c0a25214a188429d30f4388b6afc3dde21fa6d1,2024-02-22T19:07:27.197000
|
||||
@ -241640,6 +241644,7 @@ CVE-2024-24975,0,0,375565038c24fc327fc2c0a3c714946ca9e1c626fbb524a69b78744e6d3ea
|
||||
CVE-2024-24976,0,0,05e50835253d405344bcce43c792303468cefdb2ef727462820c1e8401a1c574,2024-04-03T17:24:18.150000
|
||||
CVE-2024-24988,0,0,5be9c22e9d6c42885be25053a8e3f832fee202eb91ce1cb05a36918eae761d1a,2024-02-29T13:49:29.390000
|
||||
CVE-2024-24989,0,0,d97e7d59a888108ba0075e9a97f262f9ddf8641635a797a2d7dbde62ef345a25,2024-02-14T18:04:45.380000
|
||||
CVE-2024-2499,1,1,8a6f5fdea855cf8d6c10df1c0b8ab45ca5a4fd19528655a57590bd6b5d827ee7,2024-04-05T13:15:08.177000
|
||||
CVE-2024-24990,0,0,8460904a0a222feea20d2b8fa6ac812aab0f6e9d5924ea842cc9dfa3c9617545,2024-02-14T18:04:45.380000
|
||||
CVE-2024-2500,0,0,f5c841f144cdfe7169c1d4e3da08b5dd9b9f87140741671656f61d60bd0ec54e,2024-03-22T12:45:36.130000
|
||||
CVE-2024-25001,0,0,c1f11a8c76d43265d10cf34f1d6db6525f3220be11629d1b39a2f52375286f02,2024-02-02T09:15:37.527000
|
||||
@ -241663,7 +241668,7 @@ CVE-2024-25081,0,0,c28ed534590feb1739659669df4a7c74247df29d1ac0d5daa9ed512959af8
|
||||
CVE-2024-25082,0,0,0376e5832e39b19bc504b78433ebb158054a5715ce980118648e2b6c7f603eff,2024-03-23T03:15:11.393000
|
||||
CVE-2024-25083,0,0,ecc895ce722780048524674e78ace2df40ec2c99910e00911749a5ffd9d0dca3,2024-02-16T21:39:50.223000
|
||||
CVE-2024-25089,0,0,5efabd2c26974f37d1846cb1668b5b36df31dff51c549d5b8d4c512bfb0c7d05,2024-02-13T00:38:12.137000
|
||||
CVE-2024-2509,0,0,e34a229d63bc84791384d23b01283323f1475cd5ed4d696c700df524b07d1dcb,2024-04-05T05:15:07.463000
|
||||
CVE-2024-2509,0,1,e5ff08fec88fb147b1de99cec8e42cff61d51e229b4671aa8632ef1aeac3067d,2024-04-05T12:40:52.763000
|
||||
CVE-2024-25091,0,0,01b357047b564e780ed13b7e87b2fb8ec79ae12ad4e744cc9437e3dc74a94964,2024-03-01T14:04:04.827000
|
||||
CVE-2024-25093,0,0,c29d732f68144a1dd5d537415c8d51940073ac1e6ff114431aa6a52d78b263f0,2024-02-29T13:49:29.390000
|
||||
CVE-2024-25094,0,0,6ba9f5c53aa4aac51446efc522144ae35e985d8a070a664685b43e0df39aa007,2024-02-29T13:49:29.390000
|
||||
@ -242324,7 +242329,7 @@ CVE-2024-26318,0,0,5a8434e81e693bc0f90a66d9a6d8655df17a4e5f3f1f4a63075d970f5e64f
|
||||
CVE-2024-2632,0,0,ea393f116b0cce8559537657b6b48805c98531cb8a651d292d9e39cc33b1c1ca,2024-03-19T13:26:46
|
||||
CVE-2024-26327,0,0,ed8d19077e03f59789fd57e15d79ebd6fa2e85738782585f472f97265da3d970,2024-02-20T19:50:53.960000
|
||||
CVE-2024-26328,0,0,483204e568c37ddd385ae6419587f3cba8922820a5f3e4626565041a8ff87314,2024-02-20T19:50:53.960000
|
||||
CVE-2024-26329,0,0,abe0338d3180af0be53532b1668c2fb2a7dc77c306bc74aac5adb05a928048ec,2024-04-05T07:15:10.970000
|
||||
CVE-2024-26329,0,1,61f5ce23611f085b03f5d098cc8be55618eca0c5c59bafee25a97403dd794491,2024-04-05T12:40:52.763000
|
||||
CVE-2024-2633,0,0,d6d619ede14eb7136c8ee12cb2cd0efea8cc18b4fa44aa46ef5af23251d75954,2024-03-19T13:26:46
|
||||
CVE-2024-26333,0,0,72ddcf1e5079d4095fb63f71d350456e693bb97135c81208eeffa24430bb0b2f,2024-03-05T13:41:01.900000
|
||||
CVE-2024-26334,0,0,561e27fe6d2eae55228bd8cfd4e061bf762c84a8f4fc571dc41629b9250a54d4,2024-03-05T13:41:01.900000
|
||||
@ -242634,10 +242639,10 @@ CVE-2024-26807,0,0,dd58971be5b2b7ae4d4d293dc140016766895ff28462656c96a25f4364a4b
|
||||
CVE-2024-26808,0,0,811c6dcfe9e097a1e05a422eed27dc92a175aa2bf6a558020423935445f2e0d3,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26809,0,0,d8b70b9ed098155a50a0b82965aa5ef8be6d2e172d92379b17e564e5b8017a02,2024-04-04T12:48:22.650000
|
||||
CVE-2024-2681,0,0,211b9a75c4368c46da39324b5885baab82086ddd4b191379e2bc3298587cc094,2024-03-21T02:52:42.143000
|
||||
CVE-2024-26810,1,1,619461e7c161084dbce3405d57c92829428e68e5077dd6f12f741fa63c1ba5fe,2024-04-05T09:15:09.230000
|
||||
CVE-2024-26812,1,1,a16f4ec13ccedd393f7841277e07984befb70b54a45d192608d189ddc454eaa9,2024-04-05T09:15:09.283000
|
||||
CVE-2024-26813,1,1,be7dd918da8f885ffa1fdfa97ab2c9a28b6c6fe4e40508eea87dc59bb9ef1fb4,2024-04-05T09:15:09.340000
|
||||
CVE-2024-26814,1,1,2ae796bc8d6711c6ab5953ca1946cf5304e495f4f0de3b5061a3b39de7ac3e14,2024-04-05T09:15:09.393000
|
||||
CVE-2024-26810,0,1,38efc0e271ddc68cf77956d8ead6e6522daf46934f85727df3e802d5a57313d4,2024-04-05T12:40:52.763000
|
||||
CVE-2024-26812,0,1,9d7026ebf11b448528088f214f842f936958cf9c929eb812614762d5a59c6f36,2024-04-05T12:40:52.763000
|
||||
CVE-2024-26813,0,1,af4f2b053ee61ea2d2b7978accbda1976a2018d4986bdf351689365b94c98f84,2024-04-05T12:40:52.763000
|
||||
CVE-2024-26814,0,1,faf3dfecf29bf595a382a75d07263a7b936c1f72070d1b90b4961ca213525430,2024-04-05T12:40:52.763000
|
||||
CVE-2024-2682,0,0,a085f90f84cb4770a2a70d67fe3862306cc151ef177a765e07fccc3d6343039b,2024-03-21T02:52:42.233000
|
||||
CVE-2024-2683,0,0,788c441aaf8a379a9ab516c0ce7daee2808d93b02ac7acef8c96a67609395231,2024-03-21T02:52:42.310000
|
||||
CVE-2024-2684,0,0,5b5a341f7bbb8bdeccb5899b1d3a7c9eda23994ff0a4743b71e098a891662295,2024-03-21T02:52:42.383000
|
||||
@ -242780,7 +242785,7 @@ CVE-2024-27305,0,0,b3f2edbf169d953c39bcc940e16d0680bda3e4c24593a205df513ed3ad926
|
||||
CVE-2024-27307,0,0,0637b05d2a36e47d121bc1fe1beac809e09e2be90d0aa4c4cb901114110f37d2,2024-03-06T21:42:48.053000
|
||||
CVE-2024-27308,0,0,2c1853ceb0d45fb092e9c133d6553571b7b9f8a855fc6b4950edbdaad595214f,2024-03-06T21:42:48.053000
|
||||
CVE-2024-27315,0,0,1b06bd54abb4ee7969c3aca53e6bed402762ed42c4492d0ee8674e3fa0b42312,2024-02-28T15:15:09.670000
|
||||
CVE-2024-27316,0,0,8385929768940a7e02cc85a622a9931384f535f78ec65c9efcbd3e7cac582b97,2024-04-04T20:15:08.720000
|
||||
CVE-2024-27316,0,1,f74760c26c990a740e0324824f0b675680e5de06987a970f7e8469d8bc15b083,2024-04-05T12:40:52.763000
|
||||
CVE-2024-27317,0,0,4c274cf3230c0a934555f5c84dc2c211701c44c03ccbc45b4514969783da0dab,2024-03-13T12:33:51.697000
|
||||
CVE-2024-27318,0,0,a3f0f72595f3809c797819f31508bb028083ad173f51faf5deddf5194d7af605,2024-03-30T02:15:08.007000
|
||||
CVE-2024-27319,0,0,d6fe8be68b6b995886693969b0a488a73d70bd11aff8f81dff41640aa7a63508,2024-03-30T02:15:08.090000
|
||||
@ -242815,14 +242820,14 @@ CVE-2024-27354,0,0,3ace96f0cae30cfccef0c08e69f46a230792c5572ff398d91aa2a719b3624
|
||||
CVE-2024-27355,0,0,f69927749d318ce3d471850deb21bc77767a9c94b5f501be3a1713c1109a5c66,2024-03-21T02:52:19.970000
|
||||
CVE-2024-27356,0,0,2464f4bdc7cd759969915038df7055199f0bd02c6d9b1a8ceb85c7588507e9ba,2024-02-27T14:20:06.637000
|
||||
CVE-2024-27359,0,0,d9efe9852d793e4ebe4144d07c8562893d90ae6614ba783353ad624a692629dc,2024-02-26T16:32:25.577000
|
||||
CVE-2024-27437,1,1,bda9c439214cca7315752c7e4c1d89e20a7e8bdbee0a1e19cad2d8dde55dbb93,2024-04-05T09:15:09.443000
|
||||
CVE-2024-27437,0,1,6b8491015671cc826aad57b159844f246e0ba09783b584677586c4dd72d60804,2024-04-05T12:40:52.763000
|
||||
CVE-2024-27438,0,0,2aea60b4a1b2c2b9fbe16a013c293c52cf237fb88e8c577aa1b3bbbfc664d4e7,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27439,0,0,124ffecc940e3b1aff5b6c15ba45628af60d45a457d4c32687f284efa16b3296,2024-03-19T13:26:46
|
||||
CVE-2024-27440,0,0,f656cf3f867b554b4acbc17eee670f16835e4e41b3c8da203b1b487ef7d6f2b3,2024-03-13T12:33:51.697000
|
||||
CVE-2024-27441,0,0,e840685b8600bbca2bd5265ffc2375dd0e1834727afca845fa72402578217a21,2024-03-13T15:15:52.083000
|
||||
CVE-2024-27444,0,0,e4b72098e3b1a45c8b94b724b5aa67a3c5d7a627e3b85b33a53ae8fca137be64,2024-02-26T16:32:25.577000
|
||||
CVE-2024-27447,0,0,0ad05b799b801710378617c3e979150b26491a5a3c175938d5888d52afd14aa3,2024-02-26T16:32:25.577000
|
||||
CVE-2024-27448,0,0,be24d2577b4483025f569d831033ddf830d10a5290591dcc6bd6ba289f63fd5b,2024-04-05T06:15:10.263000
|
||||
CVE-2024-27448,0,1,f81f5d795d2c514b1278f07b1bfac28be27d44388681ccc2d557339e34fe134c,2024-04-05T12:40:52.763000
|
||||
CVE-2024-2745,0,0,21dd83e50808577458b12385abb6a5e6bc2a585cd70ef551295012e31869f5dd,2024-04-02T12:50:42.233000
|
||||
CVE-2024-27454,0,0,6d3a09532b89ef204254e66da503964dcbafd450b5bdda0990f449d144c8e54b,2024-02-26T16:32:25.577000
|
||||
CVE-2024-27455,0,0,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000
|
||||
@ -242975,7 +242980,7 @@ CVE-2024-27965,0,0,f61123ce4029323df5e9d7b3d5861b1b78032137365817fb982ed2ce3f089
|
||||
CVE-2024-27968,0,0,81cf818ff4c52a717cdd4ac78ff685291ab11ee5a0785fe2aaaed4be1173d92c,2024-03-21T19:47:03.943000
|
||||
CVE-2024-27972,0,0,5f2a44ef4455f2392170f0062af4e1f33c4163a5c961cda58ad08221f3c689b8,2024-04-03T12:38:04.840000
|
||||
CVE-2024-27974,0,0,c5d12161a6a294fb4d33a068888d07d2dec693f9073d8d47f06182bf4fe2779a,2024-03-18T12:38:25.490000
|
||||
CVE-2024-27981,0,0,9b5a12843bd42fcdebdcb67b05505c9c782e5c81b48b126959ed335e973891c2,2024-04-04T23:15:15.837000
|
||||
CVE-2024-27981,0,1,bca4d502eb0003b495c2e3eabf4c8b77f995ffb842787b13a54996fb18ec7ff9,2024-04-05T12:40:52.763000
|
||||
CVE-2024-27986,0,0,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000
|
||||
CVE-2024-27987,0,0,457341cfe208a4dd4f1ca3a12fe23df96b337000dbd585aed58689be29e5bec4,2024-03-15T12:53:06.423000
|
||||
CVE-2024-27993,0,0,4178545ce3cee5131bcc85417ac208f6615c9c5305016cf5248ec96a71c28f2b,2024-03-21T15:24:35.093000
|
||||
@ -243334,7 +243339,7 @@ CVE-2024-28916,0,0,84c072546ea410ea13293f0749492a9c6fc43f88cd890d2ffd9bf253bd04a
|
||||
CVE-2024-2892,0,0,68731cecf8a220eab24c534e33692124a7488fde840638ea320037b01630a7ff,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2893,0,0,63faf4ffcc4fb1d866004561f401a900492be39dd72829ee9d2ea13386dae33b,2024-03-27T12:29:41.530000
|
||||
CVE-2024-2894,0,0,fe5793bc2f37c037f66adaaa9d347995617de1caef61563c1e61d5c7a1ea58be,2024-03-27T12:29:41.530000
|
||||
CVE-2024-28949,1,1,e1b2e05a7bdf7038f29dd0d6b29a3c6d8008bcaa0e8b3bc61536543928ab0363,2024-04-05T09:15:09.497000
|
||||
CVE-2024-28949,0,1,d59e9094e037f96ff4bc86b6cb6d10d8eb628a7e17d47b677dc979654662e8ff,2024-04-05T12:40:52.763000
|
||||
CVE-2024-2895,0,0,4e78767633bce48ab1dc77c80a270eff03b05a18553fcf7f775b3399e9d28d88,2024-03-27T12:29:41.530000
|
||||
CVE-2024-28951,0,0,c59d22693a6783914cb02db5be2e1a6f5b0c6277d54a6ec5614d046ef86ffa02,2024-04-02T12:50:42.233000
|
||||
CVE-2024-2896,0,0,4ba95787c6889a3eb868a106c99e2b979e5226eabc78640ebaa42c934eab2ab2,2024-03-27T12:29:41.530000
|
||||
@ -243365,7 +243370,7 @@ CVE-2024-29037,0,0,d14590394517ae3abb6cee2c5008c5f9a159ea7cb5e3f1665632e06ebb11a
|
||||
CVE-2024-2904,0,0,ad94cde058aa186716aa9a9e0abda85712b8f6121542c812afe32aed48147ca1,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29041,0,0,062cd423858e5d93d3fcaca6dd38a28eee29d2cae2776de71c0c9845b66bbfc2,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29042,0,0,1acd40f3f2614341c5d235ab7d1243ecc16ed46461e3f61d34bea944cf83e729,2024-03-22T19:02:10.300000
|
||||
CVE-2024-29049,0,0,e78e1e35594f3663bd8ea8d75f4f522d6e9d8a0da7f1b20a9db995d28eba4f15,2024-04-04T22:15:08.827000
|
||||
CVE-2024-29049,0,1,97f1c31413368c53fe5ff54808ff292f8d59ee94d523491d590a05715711e4f2,2024-04-05T12:40:52.763000
|
||||
CVE-2024-29057,0,0,1a7d236424310c38bf79fff65250ee548fa2fb68d692d6ba086f9244a484a161,2024-03-26T03:18:48.760000
|
||||
CVE-2024-29059,0,0,d93ec606be992e55fa01c28ef1ad5d3cf38a06f675d6b6e016fe3fa040aeab38,2024-04-04T22:15:09.033000
|
||||
CVE-2024-2906,0,0,7907d5a5cd3460f6f133374b708901f61c1d81fd1b49c6a2c33ea92916afc2fe,2024-03-26T17:09:53.043000
|
||||
@ -243459,7 +243464,7 @@ CVE-2024-29202,0,0,2407457fd23b926dc515687b0bc64391303eb3a1899c8635138115822d248
|
||||
CVE-2024-29203,0,0,132c3d83e906b655066bee1fc4d3f90e18def73beb9178e8cc6662be34f71a9c,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2921,0,0,c022f783cf261e367ca963516715cb4a81bead64a9c47249d0bf651e034f5912,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000
|
||||
CVE-2024-29221,1,1,2f586d9fe2b7f2c29ef1c4cbe3cf77d28a6fba9f7916246ff73247bae23f244d,2024-04-05T09:15:09.680000
|
||||
CVE-2024-29221,0,1,f2d1d960d4a048ea2d2f1110f82493b575c09a1c9952fc52354f28724a9b468d,2024-04-05T12:40:52.763000
|
||||
CVE-2024-29225,0,0,ebfd9b0992193d61aef178f6206711ffe8f1fc7ffd12fdaca779e58e62421cb3,2024-04-04T12:48:41.700000
|
||||
CVE-2024-29227,0,0,f6ae69390655a5f3b8c2022246ade0c8e664001b7471a757ba66feb751afa8e1,2024-03-28T12:42:56.150000
|
||||
CVE-2024-29228,0,0,c25efa24257cb2397a0d93759c26652d6dbbd7283b577526be7a83acca6ea890,2024-03-28T12:42:56.150000
|
||||
@ -243504,8 +243509,8 @@ CVE-2024-29374,0,0,dd275404ab360479a756d96aca2b6517b11bd3239b0ee4b1b68a18e9bbec3
|
||||
CVE-2024-29375,0,0,38d62c5a230a5d1d6e302dab1df6776e74059ff78e9ec6d309012755deaa55f1,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2938,0,0,74cee8ddd44bab6f9e56f6f66215742d85b488aeba84c862b69365829e2e81e5,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29385,0,0,8759a5732499ce248301d7321fb10ac2a0ff45ccfb82ec638dc2ec07b266090d,2024-03-22T19:02:10.300000
|
||||
CVE-2024-29386,0,0,90865f4630f6b94332bbcba4d50cd16db056d8c7fb60611a586a9b39591ef7b6,2024-04-04T20:15:08.837000
|
||||
CVE-2024-29387,0,0,203be31a92de9eced9d51e0be589b4f7d2c836b6f39b6a6f484910d729a4a454,2024-04-04T20:15:08.920000
|
||||
CVE-2024-29386,0,1,46150b3636ce7f0c25cb166967d8e2ffb59b578767fa72331e04f23b7ba93e5f,2024-04-05T12:40:52.763000
|
||||
CVE-2024-29387,0,1,64dc77a900c3b36a10f003711c44947a360d31708081f08c65915c82f4e2f15d,2024-04-05T12:40:52.763000
|
||||
CVE-2024-2939,0,0,da1b78713b2ffab9e788aedae3466ad09fc771d3ff8f225a843c9a7dc25c77cd,2024-03-27T12:29:30.307000
|
||||
CVE-2024-2940,0,0,1b204d3a7a2103faf20c302c00f4324f89ed0d30301919cb0f9e11008a4cbcf9,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29401,0,0,679ee7eb07f94632974ee3a3d5e9f1f36658f780199e198816f5b2401b4eaa19,2024-03-26T17:09:53.043000
|
||||
@ -243547,7 +243552,7 @@ CVE-2024-29644,0,0,39829980cc0c3cec42e83f1a7d1e74f651bed504f90005be4e46042a91527
|
||||
CVE-2024-29650,0,0,8ad374bfabee755625e57dff59b85656db535734df280985070b11f8f0b8c3b6,2024-03-25T16:43:06.137000
|
||||
CVE-2024-29666,0,0,a8926fce030310567330d9b7c126003f732556a2ce979a6a3fd232707f8bbd99,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29667,0,0,1425649af0fe5303ac647a61948436bd641374e6a3c12789edb4485c777699d5,2024-04-01T01:12:59.077000
|
||||
CVE-2024-29672,0,0,6d7c3144a7c4f0335a7d56a16d1b970f3c8dfd1e397b4170b5f91cc4aa856463,2024-04-05T06:15:10.323000
|
||||
CVE-2024-29672,0,1,776eb07524d64e6e5cc2e229f34f0dd803ed0649383c6a95c6b77a4d3423b9d6,2024-04-05T12:40:52.763000
|
||||
CVE-2024-2968,0,0,bb1433aeb37408aced09cd0721b3e3c51d5f43d4ee9668f91f68b12504b22dc7,2024-03-29T12:45:02.937000
|
||||
CVE-2024-29684,0,0,cda7b88ce861488cce375da0c97c96f4e8ca98f9272907d42a882870472a7fa4,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29686,0,0,3fe58549e83b02ecfa4305dc0559466a6aba26f966980b7f6cfaa89fef3c5836,2024-04-01T02:15:07.663000
|
||||
@ -243626,7 +243631,7 @@ CVE-2024-29858,0,0,ec21ad079a83cd076ada45f6eaa6cdca3318bb07ab260d892702dff1f9c09
|
||||
CVE-2024-29859,0,0,1a3bc8759fdc8c10e013f96dddd14f2ff64d6c749aade8e9054f9e130df1726e,2024-03-21T12:58:51.093000
|
||||
CVE-2024-2986,0,0,2e8b76dcc13c2c0ef53bfba5513dd96506aae0980f1810e28f63c6a33c67f33f,2024-03-27T17:48:21.140000
|
||||
CVE-2024-29862,0,0,a716ba813aa67ee5575393b9d0a0602e3eeaba0f3c15482bf8b9bf774b2f14bb,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29863,0,0,464d1b384d2a13b48267b12cb30c1c0bb3380f5fff95f7b0465f3639fc2cc0f1,2024-04-05T07:15:11.110000
|
||||
CVE-2024-29863,0,1,388618c2b783009f36afce6af0c89975a6bf81e4406d69131389d902724e5763,2024-04-05T12:40:52.763000
|
||||
CVE-2024-29864,0,0,a6ff60d6eca0eec860cad03d4ebcf6ddb2a8ce1d06f7fbda3179547925ea7c1b,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29865,0,0,c71ea820e322882cfd10f1c29db59e00803f8a609d75b87f5e2466dff384d5b6,2024-03-22T15:34:43.663000
|
||||
CVE-2024-29866,0,0,2169c0f3fed16be1069cbb5502128dfabe18fe6fbc7db4f274cc3c93caea8ddd,2024-03-21T15:24:35.093000
|
||||
@ -243707,7 +243712,7 @@ CVE-2024-2995,0,0,ba31d4fdf46a8e9145ed5495217455e3d9072a2ebb94ae2fda6621c0845110
|
||||
CVE-2024-2996,0,0,0b0c96cd4401e8e1fb8060c81f23c89572ad9b0c24303b77f9fc9c7260b30593,2024-03-28T02:01:13.303000
|
||||
CVE-2024-2997,0,0,c25a0bbfb8b81ba4a7609ce1db6b052bf0c441b86ae99d5b115f9aed54aacfaa,2024-03-28T02:01:13.303000
|
||||
CVE-2024-2998,0,0,5681a062ccdd5a830be0384ff482de7d54d630b9f9b97e51bbdaf99053da129c,2024-03-28T02:01:13.303000
|
||||
CVE-2024-29981,0,0,888b77e83dcf240e93a379474f69e048d7dea25488489d8826c8450b166b5347,2024-04-04T22:15:09.153000
|
||||
CVE-2024-29981,0,1,740b7a7428b7d8c9d6ce59873e24813d3664bb9de131e85953b6bdbd8bbce47c,2024-04-05T12:40:52.763000
|
||||
CVE-2024-2999,0,0,80ecdff89fed5b636507b4867b9a819cb9159e93542975d19d9e3f967fe6eba6,2024-03-28T02:01:13.303000
|
||||
CVE-2024-3000,0,0,f99d838672e9d5c2290539736a593838bb67e89cbadb925e87e0aba821826952,2024-03-28T02:01:13.303000
|
||||
CVE-2024-3001,0,0,d9a538358fb1081709849ee14267762e99c97d14b00ed634db4923647ee7e3e9,2024-03-28T02:01:13.303000
|
||||
@ -243788,14 +243793,14 @@ CVE-2024-30249,0,0,b5eba21814438c4e1a3ef97e0a76f9c8e347b440d3e249ce46e1eae5ce64e
|
||||
CVE-2024-30250,0,0,d4c91b52e7ce4c3826ebfe4b0506b29f2a92b911536de8645e4f5c4e45878370,2024-04-04T16:33:06.610000
|
||||
CVE-2024-30252,0,0,b6d7c4bd509d9f0774d6943656971e4b68036813cf38ed2db60a8c1944b8cf86,2024-04-04T19:24:50.670000
|
||||
CVE-2024-30254,0,0,ad69a53ab45fa2dd08c93eaad54ffdf163154de857f05b80a3b804e09305e630,2024-04-04T19:24:50.670000
|
||||
CVE-2024-30255,0,0,f355c4bd77abaf21db6ca3c04f400ecb2a4ac2a3eaaf3cc8bff292612494f559,2024-04-04T20:15:08.983000
|
||||
CVE-2024-30255,0,1,7a6027ee928c41155eb75584731055507a485cc638e26b6a9a3843b7b8e81c23,2024-04-05T12:40:52.763000
|
||||
CVE-2024-30260,0,0,53a68ae353495c80d5d447e9dd64955bc7cded16cfb5e4994cb366d0b2f97411,2024-04-04T16:33:06.610000
|
||||
CVE-2024-30261,0,0,f29558ae55bd6ca47bd5dfae867bb2008a3cd73d7f89b694daf87a66b35a249c,2024-04-04T16:33:06.610000
|
||||
CVE-2024-30263,0,0,6a1f1d03e4b4892044b17a4441df6e18091902fb61c4e9453e9e248247a1e2bf,2024-04-04T19:24:50.670000
|
||||
CVE-2024-30264,0,0,e5c928e81456ae849333596cfc53e15ae2d16cad862cca19a048df643395ed6d,2024-04-04T21:15:16.380000
|
||||
CVE-2024-30264,0,1,a36afcbf82744a440a1fca3c8df613ac17f10025eaa77ba35cbe326ee3634d26,2024-04-05T12:40:52.763000
|
||||
CVE-2024-30265,0,0,f6c1bebbf0f1dd21a5d850b0d285e56edc6e352a64c24f325fdadabccdfb42c9,2024-04-04T12:48:41.700000
|
||||
CVE-2024-30266,0,0,d54283c3548d40ae157748dc50ebd3d7610cba8a4ef6358f6778ac8bb913f298,2024-04-04T16:33:06.610000
|
||||
CVE-2024-30270,0,0,d8af92cca4c96f82cfb6c6d7c56e93aa27e0b045144d04b253835e3311c8b4bf,2024-04-04T21:15:16.577000
|
||||
CVE-2024-30270,0,1,1d63c3afc5f402042a52c95204320e8698a660fcf024b4b1cd2dbe82419521bf,2024-04-05T12:40:52.763000
|
||||
CVE-2024-3030,0,0,ed3d394560fc992f2a931197efacab6ed2b55fb06d9f3928dd0d9fc577ffe7d4,2024-04-04T12:48:41.700000
|
||||
CVE-2024-30322,0,0,64e521cd60b942f55f264dd1b34a0063ca35d4db4eef121c1f7bc208aac4f7ab,2024-04-03T17:24:18.150000
|
||||
CVE-2024-30323,0,0,e32fdd05c5f30f68cf1412b7e36fda0cb57a7690cef1889aa844a8506beb3ac4,2024-04-03T17:24:18.150000
|
||||
@ -244012,7 +244017,7 @@ CVE-2024-30808,0,0,3edb296009dfb16a5061a2505986b3903e36250320b7a7a1ea6af0d775f58
|
||||
CVE-2024-30809,0,0,40751d191f9ee13ea0defe4c96fc4834cb0c82544cd8de5e25d1d000018428a9,2024-04-02T20:31:58.463000
|
||||
CVE-2024-3081,0,0,866ce1fc3c293e10fe34bf8200fad33ced51ccecfb774a7b3540f6fe2adb2cfa,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3084,0,0,c1c38fe5a209c672b804078473ede419a8e761fb44d3cb82a215c5c8a2e1ea16,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30849,1,1,4aabb9bd1031c9de63789df6a4eecf7c5eb5cf5b1d28121f46f8cb27e6112f78,2024-04-05T08:15:07.733000
|
||||
CVE-2024-30849,0,1,7b5f44f857a491a504ba5c8594af0e6700798260b9e3192b0dae6774fedb652e,2024-04-05T12:40:52.763000
|
||||
CVE-2024-3085,0,0,fded51d53dc12d3d7ee965d316f419f95e091e314414485b8200db89663fd527,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30858,0,0,16878632bf0dd21efb8a79fb907fb3fd610dae344e4207e4821dadfd05b70fba,2024-04-02T12:50:42.233000
|
||||
CVE-2024-30859,0,0,07863108200ea1214b143e037da0e726261ba3163514cc96b0c60d438d3489a3,2024-04-02T12:50:42.233000
|
||||
@ -244032,7 +244037,7 @@ CVE-2024-30871,0,0,d803e8a22e3cb0ffc63ce535e7477c16423f4c13198cbe4b49e5311fcca22
|
||||
CVE-2024-30872,0,0,f945e56669ed547eb36a2b5a674eaf51c6f019a23fe630e2694f76da90849356,2024-04-01T15:53:18.060000
|
||||
CVE-2024-3088,0,0,8e3ac933024cbca067c1e71fbcd05cd16f007cceadb9e395d1a7912e6d4c4a98,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3089,0,0,ecb913d4389f70cc5019c633a263616e8c2eb0cbfbc9caeb5e20ebcc84dd91c1,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30891,1,1,e12281cb1191ffa9096f2fd71c8ce450f0aa6b4ad8005e3588610e44c1c03829,2024-04-05T08:15:07.800000
|
||||
CVE-2024-30891,0,1,6288187f9f60f4f25d31df7f5ef76e595bcc7f1b47451b55a9d9d5f34746252d,2024-04-05T12:40:52.763000
|
||||
CVE-2024-3090,0,0,6efcf7101cc09e49c5b79d9f2d4752051b90babce57580f4f3b9d28367ffa945,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3091,0,0,4af5b5d1eaeb5dcee2b11f765f7e4e07712d76dbe9222ddb5cfc716c8e60d042,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3094,0,0,502febf68b0d02803300ecc80fd5edf81a987966a53e4a71d6dd7ef4cc670f65,2024-04-03T06:15:07.873000
|
||||
@ -244060,6 +244065,7 @@ CVE-2024-31065,0,0,36c2c4ddfef551b3df9316a574430562ba7ec0ea51f9e5ecbfa0af993c794
|
||||
CVE-2024-31080,0,0,2ca401fd0c1bed66d451d429c0a44a80ca91b5d5de868201fe057f3b492cfdf4,2024-04-04T16:33:06.610000
|
||||
CVE-2024-31081,0,0,a153eccae067a2f8e03bacbf6acb5a809a5d5fedc66a88773d969612a36b423a,2024-04-04T16:33:06.610000
|
||||
CVE-2024-31082,0,0,1a6d789846dce49d3862bee255d972938e0973085f31646705de1076cce206f9,2024-04-04T16:33:06.610000
|
||||
CVE-2024-31083,1,1,caa3a4de00aa6cf9e253d952f8057265c0ceb3e7cfcf7603d13adec1810e7ff6,2024-04-05T12:40:52.763000
|
||||
CVE-2024-31084,0,0,7e7f6ad60462c421140a8806edcef098f25e94de0014c2ff06256ca8e21d3894,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31085,0,0,159d63f28600902a854d5dada2c0b5fba89225c71015785af44f46e211303b47,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31087,0,0,add2066c1d5f1a4308c5f84501c183a9350a71ec462e958963303b4527a9777f,2024-04-01T01:12:59.077000
|
||||
@ -244102,13 +244108,13 @@ CVE-2024-31140,0,0,8ac72cdd6b5f7f56e71e87459ff46ad8714fcc8b963def523c845a786f9f6
|
||||
CVE-2024-3116,0,0,07e1280cec0acc3241084e2928dc995b883b3c79a61f023bec5928b4f884c12d,2024-04-04T16:33:06.610000
|
||||
CVE-2024-3117,0,0,136fb5551ef6dfa1bf4e08424db43ed91a6bb8dd83f3d6ce39a5378e07bb201b,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3118,0,0,f6c34b2c6946d5fdb10aa55aa3b524d7a78d6b6fed9a90242c451ed5ef8e29f1,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31204,0,0,778ee2e514ae8409a34251ec0718428b19b33226c54155d49c58197316f49800,2024-04-04T21:15:16.773000
|
||||
CVE-2024-31206,0,0,70d97487a50457fdcab2c2764b35210d26c9f34a06e50a16c35d54a406291451,2024-04-04T23:15:15.897000
|
||||
CVE-2024-31204,0,1,d77d8a78ba72f2a1144250dcbd3aeb2b57d00c9418a1c9337730d8bd71684606,2024-04-05T12:40:52.763000
|
||||
CVE-2024-31206,0,1,bd1cbc8a5901cc2b410cb59c86ef8c814546918b6efc52403de5ae308d36d9dc,2024-04-05T12:40:52.763000
|
||||
CVE-2024-31207,0,0,d3876c49ae6a717d1d96886a61c00def756b07d67a7072af0e0c707139e9cb22,2024-04-04T16:33:06.610000
|
||||
CVE-2024-31209,0,0,05d38da92090c630ce652bea70fb74ebd0e72d4aebc34edd452f84719c7d745a,2024-04-04T16:33:06.610000
|
||||
CVE-2024-31210,0,0,6a68e2b347e546ed314c6dab4e2650330525d917ed609ef801f21d7d99ab70b2,2024-04-04T23:15:16.127000
|
||||
CVE-2024-31211,0,0,0b15058289053aebd70a2cd0ee0261afe0048a2d30cb11e09f1019511cc1fed1,2024-04-04T23:15:16.333000
|
||||
CVE-2024-31212,0,0,715d3b2218b5b0fe7089cfd9e66ac01fb8eb421d8519c3bc381247d44fbb7a36,2024-04-04T23:15:16.540000
|
||||
CVE-2024-31210,0,1,0c3a74f1634842d277fcf52471d61be8d27ebe967ace4d479af8f65fffdace19,2024-04-05T12:40:52.763000
|
||||
CVE-2024-31211,0,1,37f6ef15b9def8ff0d686fae9ad61ad1a082be15bc6a18f70a40cbfe15e962e2,2024-04-05T12:40:52.763000
|
||||
CVE-2024-31212,0,1,bc73795c68873aacd12eddecc823b76392ffac886146f1dd814e2d43e468bb84,2024-04-05T12:40:52.763000
|
||||
CVE-2024-31215,0,0,07f7af48d0999954ee8c150eeba531641360a8fad1af070d9e9675df4d3ed6e9,2024-04-04T16:33:06.610000
|
||||
CVE-2024-3124,0,0,0636ee928c0356d73e2effbc159ce59d850c83e7a22c6ba92b3f50b98c28bb80,2024-04-01T15:53:18.060000
|
||||
CVE-2024-3125,0,0,7c2049f0f2088c1a2b8c1e4ee00a5f848a0ae8a9d91f54f3eb97b0a3f7d4e8d6,2024-04-01T15:53:18.060000
|
||||
@ -244135,7 +244141,7 @@ CVE-2024-3145,0,0,910eeb7fc8d864d7945418c0e4535b894388c19da07aa9b0f359cad540d768
|
||||
CVE-2024-3146,0,0,c53d63ca526f35fd2250cfdb239f061e8b52186457f5fd4f6bc18a291d69a364,2024-04-02T12:50:42.233000
|
||||
CVE-2024-3147,0,0,02625b405a9656dc1928c253c58a24946e5b9cb50ef47acb30b3a3a470e8efd5,2024-04-02T12:50:42.233000
|
||||
CVE-2024-3148,0,0,da83dea91bd5fed523ca15df13db4100d62650319dcc492fed6d52171a819a8a,2024-04-02T12:50:42.233000
|
||||
CVE-2024-31498,0,0,76b23ac689905bc2a9281513cf35e67dae5a9eba3661ce4f444119b6c633f27b,2024-04-04T23:15:16.743000
|
||||
CVE-2024-31498,0,1,dbdfff68d351d6d87cb24a5ceff71e8a2890b85f17286eb00296e97541f537ef,2024-04-05T12:40:52.763000
|
||||
CVE-2024-3151,0,0,dbc1fd34b22356e776c12a200bc45c40de5eea60ac1974d151d7c1d279b32bb4,2024-04-02T18:12:16.283000
|
||||
CVE-2024-3160,0,0,f3860e2f9070e5e070adb0fe8ff153c3f84611a0ac253de8db1847a3b6990614,2024-04-02T12:50:42.233000
|
||||
CVE-2024-3162,0,0,7209bf9b1b4a4f41543ae01bfd19e9aec1dd355164cd1434a8cb5548ea161c65,2024-04-03T12:38:04.840000
|
||||
@ -244151,7 +244157,7 @@ CVE-2024-3204,0,0,a9dea1ca01b499632a34af3ee57c461ecd8a21787537da790c2ae8f833a611
|
||||
CVE-2024-3205,0,0,b2f3ceb1bf38a09a954460b526a18eba5a5a22a0c7181b9f1de158755c6153d4,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3207,0,0,5c9ae7819818cf69391317769652edafe7eb5058db1623e7c6299d6d13471791,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3209,0,0,30868cdb47dd928f589dfe2abcfe897db3e1f5f5372f4956ca12525c6828bcc3,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3217,1,1,679d1c28c7be3c33a25056dfbdb8aa41d98bff972405e02ba4eb33f3cb0dab3b,2024-04-05T08:15:07.853000
|
||||
CVE-2024-3217,0,1,4de075781ed27d9af99ed393e165df2d285dc08a6ed9934e378886c989fa51ff,2024-04-05T12:40:52.763000
|
||||
CVE-2024-3218,0,0,2efa792f2f422ae3d499fd8bd729cdb1e057c75ae9cfbaccf7a66bc466210399,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3221,0,0,265e838721fb682684198a7086d104f84e57519a8c4d6ef772db38592eb6bf44,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3222,0,0,b37821a3e0768163f96b2bee06bee09f327b52e150bd3dc09c830a3634a1e6b2,2024-04-03T12:38:04.840000
|
||||
@ -244177,12 +244183,12 @@ CVE-2024-3270,0,0,06803f1697053009ed748b01b78c6c9cfb2903b8272aa543347ffd9d7a62c6
|
||||
CVE-2024-3272,0,0,32d3ad93a54dc7dcb0170715c810c40dd0605ff3f1d2f7f8a6ff591782374412,2024-04-05T05:15:07.580000
|
||||
CVE-2024-3273,0,0,1ae2eaf61f98318aed8ff92c4b5febb2d8229962f8b7b2bc67bc40cbaea73f73,2024-04-05T05:15:07.747000
|
||||
CVE-2024-3274,0,0,64bfe86321ec1e05b957bdddb515317b23c7b94e70b2d69aa950c222026c2d4b,2024-04-05T05:15:07.843000
|
||||
CVE-2024-3296,0,0,166fd19b54c7f066a468db032b1192efadbbddbd2bd126df3550e4cdc8bb66bf,2024-04-04T16:33:06.610000
|
||||
CVE-2024-3296,0,1,bcc39314c1e9f6d53aa0ccc8e7e7cac7c279f7f6ee5a27f19287b128ea2ed6c7,2024-04-05T12:15:37.777000
|
||||
CVE-2024-3298,0,0,56186a0c5d2e3bcaa6b6bd1b394585c42533a8f19e8ba33fa08b025b47b84ed1,2024-04-04T16:33:06.610000
|
||||
CVE-2024-3299,0,0,e27ead5ec50888cbdeacdd9f017ce3d5215207dea15a19473541db1dd6d943fd,2024-04-04T16:33:06.610000
|
||||
CVE-2024-3311,0,0,aa7fc1deae3f232a19fb15f73746be3e8b5bdfb16344ac194a9778a38a36d502,2024-04-04T21:15:16.957000
|
||||
CVE-2024-3314,0,0,92d4bf971d9d793b8beffddc0437396a7128d83d27097a782b33fe476e5a79c0,2024-04-04T21:15:17.203000
|
||||
CVE-2024-3315,0,0,17d09e074eb10ede9f7c310480abb639bee1cdd7c753516a84c89a3dd7d1dc28,2024-04-04T21:15:17.430000
|
||||
CVE-2024-3316,0,0,496578d334aeef18643bc7c87251f0adbce19e341ca837c7de563b8b7302373a,2024-04-04T22:15:09.420000
|
||||
CVE-2024-3320,0,0,61949eb200cfcf307cf3670b344aa4460c284a0d1eb9c45cc5c9d9521bae735a,2024-04-05T00:15:08.147000
|
||||
CVE-2024-3321,0,0,99daf7bab74755b93d5229da76327f6e1862554d58dff72b09f28543f99e3f0c,2024-04-05T01:15:51.747000
|
||||
CVE-2024-3311,0,1,fdae3a838ab8d7960174e896ed4df4f0220eb58d7d9e06edfb8bc48c78cfd124,2024-04-05T12:40:52.763000
|
||||
CVE-2024-3314,0,1,1bf793748b7ca2d665b157bc1b2bc90ac99fa8b35d4a0447ad9f365652349fa7,2024-04-05T12:40:52.763000
|
||||
CVE-2024-3315,0,1,0420f58b267bbc99aea4d213036324de5dcedffd2eceb50b924a336f387693ef,2024-04-05T12:40:52.763000
|
||||
CVE-2024-3316,0,1,1444bd7ef3d37273f79650663feec303d5173a142d9c7212c8d3d49e93eb50e1,2024-04-05T12:40:52.763000
|
||||
CVE-2024-3320,0,1,95054a6af32d4d5be645ff1a865e77fad3dc94a1c0e3c1eb556113e9b46031a4,2024-04-05T12:40:52.763000
|
||||
CVE-2024-3321,0,1,749354b1bf7d6ff99646046beb4c99e5e46cc0546c732c8138afab8d9cdc9733,2024-04-05T12:40:52.763000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user