Auto-Update: 2024-02-11T23:00:24.865777+00:00

This commit is contained in:
cad-safe-bot 2024-02-11 23:00:28 +00:00
parent eae04d4fd4
commit db20ad6df5
68 changed files with 247 additions and 131 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28077",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-02-10T03:15:07.680",
"lastModified": "2024-02-10T03:15:07.680",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45696",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-02-10T03:15:07.907",
"lastModified": "2024-02-10T03:15:07.907",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45698",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-02-10T04:15:07.280",
"lastModified": "2024-02-10T04:15:07.280",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45716",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-02-09T22:15:07.993",
"lastModified": "2024-02-09T22:15:07.993",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45718",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-02-09T22:15:08.167",
"lastModified": "2024-02-09T22:15:08.167",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50291",
"sourceIdentifier": "security@apache.org",
"published": "2024-02-09T18:15:08.240",
"lastModified": "2024-02-09T19:15:11.070",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50292",
"sourceIdentifier": "security@apache.org",
"published": "2024-02-09T18:15:08.363",
"lastModified": "2024-02-09T19:15:11.147",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50298",
"sourceIdentifier": "security@apache.org",
"published": "2024-02-09T18:15:08.457",
"lastModified": "2024-02-09T19:15:11.210",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50349",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-02-09T21:15:07.840",
"lastModified": "2024-02-09T21:15:07.840",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50386",
"sourceIdentifier": "security@apache.org",
"published": "2024-02-09T18:15:08.540",
"lastModified": "2024-02-09T19:15:11.277",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50957",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-10T16:15:07.857",
"lastModified": "2024-02-10T16:15:07.857",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51404",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-02-10T09:15:07.480",
"lastModified": "2024-02-10T09:15:07.480",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51415",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-02-10T09:15:07.740",
"lastModified": "2024-02-10T09:15:07.740",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51480",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-02-10T09:15:07.990",
"lastModified": "2024-02-10T09:15:07.990",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51485",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-02-10T09:15:08.183",
"lastModified": "2024-02-10T09:15:08.183",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51488",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-02-10T09:15:08.390",
"lastModified": "2024-02-10T09:15:08.390",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51492",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-02-10T09:15:08.597",
"lastModified": "2024-02-10T09:15:08.597",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51493",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-02-10T09:15:08.803",
"lastModified": "2024-02-10T09:15:08.803",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52427",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-11T04:15:08.100",
"lastModified": "2024-02-11T04:15:08.100",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52428",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-11T05:15:08.383",
"lastModified": "2024-02-11T05:15:08.383",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6935",
"sourceIdentifier": "facts@wolfssl.com",
"published": "2024-02-09T23:15:08.030",
"lastModified": "2024-02-09T23:15:08.030",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0594",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-02-10T07:15:07.600",
"lastModified": "2024-02-10T07:15:07.600",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0595",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-02-10T07:15:08.220",
"lastModified": "2024-02-10T07:15:08.220",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0596",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-02-10T07:15:08.700",
"lastModified": "2024-02-10T07:15:08.700",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1151",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-02-11T15:15:07.890",
"lastModified": "2024-02-11T15:15:07.890",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1245",
"sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
"published": "2024-02-09T20:15:54.370",
"lastModified": "2024-02-09T22:15:08.337",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1246",
"sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
"published": "2024-02-09T20:15:54.573",
"lastModified": "2024-02-09T22:15:08.420",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1247",
"sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
"published": "2024-02-09T19:15:24.183",
"lastModified": "2024-02-09T20:15:54.770",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1404",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-09T23:15:08.243",
"lastModified": "2024-02-09T23:15:08.243",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1405",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-10T06:15:46.170",
"lastModified": "2024-02-10T06:15:46.170",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1406",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-10T08:15:07.170",
"lastModified": "2024-02-10T08:15:07.170",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1430",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-11T01:15:07.750",
"lastModified": "2024-02-11T01:15:07.750",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1431",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-11T03:15:07.733",
"lastModified": "2024-02-11T03:15:07.733",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1432",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-11T03:15:08.930",
"lastModified": "2024-02-11T03:15:08.930",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21490",
"sourceIdentifier": "report@snyk.io",
"published": "2024-02-10T05:15:08.650",
"lastModified": "2024-02-10T05:15:08.650",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21624",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-09T23:15:08.553",
"lastModified": "2024-02-09T23:15:08.553",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21875",
"sourceIdentifier": "csirt@divd.nl",
"published": "2024-02-11T09:15:07.633",
"lastModified": "2024-02-11T09:15:07.633",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22312",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-10T16:15:08.153",
"lastModified": "2024-02-10T16:15:08.153",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22313",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-10T16:15:08.360",
"lastModified": "2024-02-10T16:15:08.360",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22361",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-10T15:15:35.667",
"lastModified": "2024-02-10T15:15:35.667",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23322",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-09T23:15:08.747",
"lastModified": "2024-02-09T23:15:08.747",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23323",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-09T23:15:08.977",
"lastModified": "2024-02-09T23:15:08.977",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23324",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-09T23:15:09.223",
"lastModified": "2024-02-09T23:15:09.223",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23325",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-09T23:15:09.437",
"lastModified": "2024-02-09T23:15:09.437",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23327",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-09T23:15:09.647",
"lastModified": "2024-02-09T23:15:09.647",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23514",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-02-10T09:15:09.010",
"lastModified": "2024-02-10T09:15:09.010",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23516",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-02-10T09:15:09.203",
"lastModified": "2024-02-10T09:15:09.203",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23517",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-02-10T09:15:09.393",
"lastModified": "2024-02-10T09:15:09.393",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23724",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-11T01:15:08.080",
"lastModified": "2024-02-11T01:15:08.080",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24712",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-02-10T08:15:07.570",
"lastModified": "2024-02-10T08:15:07.570",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24713",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-02-10T08:15:07.860",
"lastModified": "2024-02-10T08:15:07.860",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24717",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-02-10T08:15:08.223",
"lastModified": "2024-02-10T08:15:08.223",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24801",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-02-10T08:15:08.463",
"lastModified": "2024-02-10T08:15:08.463",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24803",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-02-10T08:15:08.743",
"lastModified": "2024-02-10T08:15:08.743",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24804",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-02-10T08:15:08.983",
"lastModified": "2024-02-10T08:15:08.983",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-24806",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-07T22:15:10.173",
"lastModified": "2024-02-08T22:15:09.200",
"lastModified": "2024-02-11T21:15:45.980",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -55,6 +55,10 @@
"url": "http://www.openwall.com/lists/oss-security/2024/02/08/2",
"source": "security-advisories@github.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/02/11/1",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/libuv/libuv/commit/0f2d7e784a256b54b2385043438848047bc2a629",
"source": "security-advisories@github.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24828",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-09T23:15:09.837",
"lastModified": "2024-02-09T23:15:09.837",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24831",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-02-10T08:15:09.333",
"lastModified": "2024-02-10T08:15:09.333",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25109",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-09T23:15:10.057",
"lastModified": "2024-02-09T23:15:10.057",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-25417",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-11T21:15:46.200",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /core/tools/add_translation.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Carl0724/cms/blob/main/3.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-25418",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-11T21:15:46.253",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /core/tools/delete_menu.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Carl0724/cms/blob/main/2.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-25419",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-11T21:15:46.310",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /core/tools/update_menu.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Carl0724/cms/blob/main/1.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25714",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-11T03:15:09.393",
"lastModified": "2024-02-11T03:15:09.393",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25715",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-11T03:15:09.453",
"lastModified": "2024-02-11T03:15:09.453",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25718",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-11T05:15:08.463",
"lastModified": "2024-02-11T05:15:08.463",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25722",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-11T05:15:08.523",
"lastModified": "2024-02-11T05:15:08.523",
"vulnStatus": "Received",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-25728",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-11T22:15:08.360",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "ExpressVPN before 12.73.0 on Windows, when split tunneling is used, sends DNS requests according to the Windows configuration (e.g., sends them to DNS servers operated by the user's ISP instead of to the ExpressVPN DNS servers), which may allow remote attackers to obtain sensitive information about websites visited by VPN users."
}
],
"metrics": {},
"references": [
{
"url": "https://www.bleepingcomputer.com/news/security/expressvpn-bug-has-been-leaking-some-dns-requests-for-years/",
"source": "cve@mitre.org"
},
{
"url": "https://www.expressvpn.com/blog/windows-app-dns-requests/",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-02-11T17:00:24.702525+00:00
2024-02-11T23:00:24.865777+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-02-11T15:15:07.890000+00:00
2024-02-11T22:29:15.837000+00:00
```
### Last Data Feed Release
@ -29,20 +29,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
238120
238124
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `4`
* [CVE-2024-1151](CVE-2024/CVE-2024-11xx/CVE-2024-1151.json) (`2024-02-11T15:15:07.890`)
* [CVE-2024-25417](CVE-2024/CVE-2024-254xx/CVE-2024-25417.json) (`2024-02-11T21:15:46.200`)
* [CVE-2024-25418](CVE-2024/CVE-2024-254xx/CVE-2024-25418.json) (`2024-02-11T21:15:46.253`)
* [CVE-2024-25419](CVE-2024/CVE-2024-254xx/CVE-2024-25419.json) (`2024-02-11T21:15:46.310`)
* [CVE-2024-25728](CVE-2024/CVE-2024-257xx/CVE-2024-25728.json) (`2024-02-11T22:15:08.360`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `63`
* [CVE-2024-0596](CVE-2024/CVE-2024-05xx/CVE-2024-0596.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-1406](CVE-2024/CVE-2024-14xx/CVE-2024-1406.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-24712](CVE-2024/CVE-2024-247xx/CVE-2024-24712.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-24713](CVE-2024/CVE-2024-247xx/CVE-2024-24713.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-24717](CVE-2024/CVE-2024-247xx/CVE-2024-24717.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-24801](CVE-2024/CVE-2024-248xx/CVE-2024-24801.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-24803](CVE-2024/CVE-2024-248xx/CVE-2024-24803.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-24804](CVE-2024/CVE-2024-248xx/CVE-2024-24804.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-24831](CVE-2024/CVE-2024-248xx/CVE-2024-24831.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-23514](CVE-2024/CVE-2024-235xx/CVE-2024-23514.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-23516](CVE-2024/CVE-2024-235xx/CVE-2024-23516.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-23517](CVE-2024/CVE-2024-235xx/CVE-2024-23517.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-22361](CVE-2024/CVE-2024-223xx/CVE-2024-22361.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-22312](CVE-2024/CVE-2024-223xx/CVE-2024-22312.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-22313](CVE-2024/CVE-2024-223xx/CVE-2024-22313.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-1430](CVE-2024/CVE-2024-14xx/CVE-2024-1430.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-23724](CVE-2024/CVE-2024-237xx/CVE-2024-23724.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-1431](CVE-2024/CVE-2024-14xx/CVE-2024-1431.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-1432](CVE-2024/CVE-2024-14xx/CVE-2024-1432.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-25714](CVE-2024/CVE-2024-257xx/CVE-2024-25714.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-25715](CVE-2024/CVE-2024-257xx/CVE-2024-25715.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-25718](CVE-2024/CVE-2024-257xx/CVE-2024-25718.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-25722](CVE-2024/CVE-2024-257xx/CVE-2024-25722.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-21875](CVE-2024/CVE-2024-218xx/CVE-2024-21875.json) (`2024-02-11T22:29:15.837`)
* [CVE-2024-1151](CVE-2024/CVE-2024-11xx/CVE-2024-1151.json) (`2024-02-11T22:29:15.837`)
## Download and Usage