Auto-Update: 2024-03-13T19:00:38.269700+00:00

This commit is contained in:
cad-safe-bot 2024-03-13 19:03:28 +00:00
parent f47efd1c90
commit db4bf2526e
163 changed files with 1684 additions and 484 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-17144",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-09-19T08:29:00.333",
"lastModified": "2020-08-24T17:37:01.140",
"vulnStatus": "Modified",
"lastModified": "2024-03-13T17:05:04.843",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -84,24 +84,24 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bitcoincore:bitcoin_core:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.14.0",
"versionEndExcluding": "0.14.3",
"matchCriteriaId": "6E678D05-A246-47C6-B96A-8E092A17F822"
"matchCriteriaId": "4B631450-47D0-4BE4-8A80-CBAC0ED15B79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bitcoincore:bitcoin_core:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.15.0",
"versionEndExcluding": "0.15.2",
"matchCriteriaId": "F765D057-4EB1-4757-90ED-13961C236436"
"matchCriteriaId": "7644C16B-2B66-4A66-BAB3-923D7BB1A9A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bitcoincore:bitcoin_core:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.16.0",
"versionEndExcluding": "0.16.3",
"matchCriteriaId": "6B76C3CD-A998-463D-9D59-EF778780DD41"
"matchCriteriaId": "8C5F1D9C-B758-4A43-B59E-D9E436804EC0"
},
{
"vulnerable": true,
@ -132,7 +132,10 @@
},
{
"url": "https://github.com/JinBean/CVE-Extension",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/bitcoin/bitcoin/blob/v0.16.3/doc/release-notes.md",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5663",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:08.110",
"lastModified": "2024-03-13T16:15:08.110",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6785",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:08.407",
"lastModified": "2024-03-13T16:15:08.407",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6809",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:08.640",
"lastModified": "2024-03-13T16:15:08.640",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6825",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:08.850",
"lastModified": "2024-03-13T16:15:08.850",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6880",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:09.093",
"lastModified": "2024-03-13T16:15:09.093",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6954",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:09.300",
"lastModified": "2024-03-13T16:15:09.300",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6957",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:09.517",
"lastModified": "2024-03-13T16:15:09.517",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6969",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:09.703",
"lastModified": "2024-03-13T16:15:09.703",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7015",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:09.900",
"lastModified": "2024-03-13T16:15:09.900",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-0154",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-03-13T17:15:46.400",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain an improper parameter initialization vulnerability. A local low privileged attacker could potentially exploit this vulnerability to read the contents of non-SMM stack memory."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.0,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-788"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000222898/dsa-2024-034-security-update-for-dell-poweredge-server-bios-for-an-improper-parameter-initialization-vulnerability",
"source": "security_alert@emc.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0161",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-03-13T16:15:10.143",
"lastModified": "2024-03-13T16:15:10.143",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-0162",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-03-13T17:15:46.617",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain an Improper SMM communication buffer verification vulnerability. A local low privileged attacker could potentially exploit this vulnerability leading to out-of-bound read/writes to SMRAM."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.1,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000222812/dsa-2024-004-security-update-for-dell-poweredge-server-bios-for-an-improper-smm-communication-buffer-verification-vulnerability",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-0163",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-03-13T17:15:46.807",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain a TOCTOU race condition vulnerability. A local low privileged attacker could potentially exploit this vulnerability to gain access to otherwise unauthorized resources."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.1,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000222756/dsa-2024-003-security-update-for-dell-poweredge-server-bios-for-a-time-of-check-time-of-use-toctou-vulnerability",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-0173",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-03-13T17:15:47.000",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain an improper parameter initialization vulnerability. A local low privileged attacker could potentially exploit this vulnerability to read the contents of non-SMM stack memory."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.0,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-788"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000222898/dsa-2024-034-security-update-for-dell-poweredge-server-bios-for-an-improper-parameter-initialization-vulnerability",
"source": "security_alert@emc.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0326",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:10.410",
"lastModified": "2024-03-13T16:15:10.410",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0368",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:10.623",
"lastModified": "2024-03-13T16:15:10.623",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0369",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:10.837",
"lastModified": "2024-03-13T16:15:10.837",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0377",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:11.070",
"lastModified": "2024-03-13T16:15:11.070",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0385",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:11.293",
"lastModified": "2024-03-13T16:15:11.293",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0447",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:11.483",
"lastModified": "2024-03-13T16:15:11.483",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0449",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:11.707",
"lastModified": "2024-03-13T16:15:11.707",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0591",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:11.917",
"lastModified": "2024-03-13T16:15:11.917",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0592",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:12.147",
"lastModified": "2024-03-13T16:15:12.147",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0614",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:12.357",
"lastModified": "2024-03-13T16:15:12.357",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0631",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:12.573",
"lastModified": "2024-03-13T16:15:12.573",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0681",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:12.767",
"lastModified": "2024-03-13T16:15:12.767",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0683",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:12.973",
"lastModified": "2024-03-13T16:15:12.973",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0687",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:13.203",
"lastModified": "2024-03-13T16:15:13.203",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0700",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:13.403",
"lastModified": "2024-03-13T16:15:13.403",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0827",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:13.610",
"lastModified": "2024-03-13T16:15:13.610",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0828",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:13.833",
"lastModified": "2024-03-13T16:15:13.833",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0829",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:14.067",
"lastModified": "2024-03-13T16:15:14.067",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0830",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:14.307",
"lastModified": "2024-03-13T16:15:14.307",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0839",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:14.537",
"lastModified": "2024-03-13T16:15:14.537",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0871",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:14.750",
"lastModified": "2024-03-13T16:15:14.750",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0896",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:14.943",
"lastModified": "2024-03-13T16:15:14.943",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0897",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:15.343",
"lastModified": "2024-03-13T16:15:15.343",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0898",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:15.593",
"lastModified": "2024-03-13T16:15:15.593",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0976",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:15.827",
"lastModified": "2024-03-13T16:15:15.827",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1038",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:16.050",
"lastModified": "2024-03-13T16:15:16.050",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1071",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:16.293",
"lastModified": "2024-03-13T16:15:16.293",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1074",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:16.503",
"lastModified": "2024-03-13T16:15:16.503",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1080",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:16.717",
"lastModified": "2024-03-13T16:15:16.717",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1083",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:16.940",
"lastModified": "2024-03-13T16:15:16.940",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1126",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:17.267",
"lastModified": "2024-03-13T16:15:17.267",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1127",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:17.507",
"lastModified": "2024-03-13T16:15:17.507",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1158",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:17.740",
"lastModified": "2024-03-13T16:15:17.740",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1176",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:17.933",
"lastModified": "2024-03-13T16:15:17.933",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1203",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:18.150",
"lastModified": "2024-03-13T16:15:18.150",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1234",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:18.390",
"lastModified": "2024-03-13T16:15:18.390",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1237",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:18.617",
"lastModified": "2024-03-13T16:15:18.617",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1291",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:18.807",
"lastModified": "2024-03-13T16:15:18.807",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1293",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:19.043",
"lastModified": "2024-03-13T16:15:19.043",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1296",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:19.257",
"lastModified": "2024-03-13T16:15:19.257",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1311",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:19.450",
"lastModified": "2024-03-13T16:15:19.450",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1321",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:19.663",
"lastModified": "2024-03-13T16:15:19.663",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1358",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:19.870",
"lastModified": "2024-03-13T16:15:19.870",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1363",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:20.130",
"lastModified": "2024-03-13T16:15:20.130",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1365",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:20.417",
"lastModified": "2024-03-13T16:15:20.417",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1370",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:20.687",
"lastModified": "2024-03-13T16:15:20.687",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:16:18.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1380",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:20.903",
"lastModified": "2024-03-13T16:15:20.903",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1383",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:21.163",
"lastModified": "2024-03-13T16:15:21.163",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1391",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:21.387",
"lastModified": "2024-03-13T16:15:21.387",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1392",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:21.590",
"lastModified": "2024-03-13T16:15:21.590",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1393",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:21.770",
"lastModified": "2024-03-13T16:15:21.770",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1409",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:21.947",
"lastModified": "2024-03-13T16:15:21.947",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1413",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:22.113",
"lastModified": "2024-03-13T16:15:22.113",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1414",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:22.287",
"lastModified": "2024-03-13T16:15:22.287",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1422",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:22.457",
"lastModified": "2024-03-13T16:15:22.457",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1452",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:22.643",
"lastModified": "2024-03-13T16:15:22.643",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1462",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:22.830",
"lastModified": "2024-03-13T16:15:22.830",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1479",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:23.013",
"lastModified": "2024-03-13T16:15:23.013",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1484",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:23.203",
"lastModified": "2024-03-13T16:15:23.203",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1489",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:23.377",
"lastModified": "2024-03-13T16:15:23.377",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1497",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:23.547",
"lastModified": "2024-03-13T16:15:23.547",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1499",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:23.723",
"lastModified": "2024-03-13T16:15:23.723",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1505",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:23.893",
"lastModified": "2024-03-13T16:15:23.893",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1535",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:24.090",
"lastModified": "2024-03-13T16:15:24.090",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1536",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:24.270",
"lastModified": "2024-03-13T16:15:24.270",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1537",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:24.440",
"lastModified": "2024-03-13T16:15:24.440",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1541",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:24.600",
"lastModified": "2024-03-13T16:15:24.600",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1585",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:24.780",
"lastModified": "2024-03-13T16:15:24.780",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1640",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:24.957",
"lastModified": "2024-03-13T16:15:24.957",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1642",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:25.127",
"lastModified": "2024-03-13T16:15:25.127",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1668",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:25.510",
"lastModified": "2024-03-13T16:15:25.510",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1680",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:25.773",
"lastModified": "2024-03-13T16:15:25.773",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1684",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:25.947",
"lastModified": "2024-03-13T16:15:25.947",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1690",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:26.127",
"lastModified": "2024-03-13T16:15:26.127",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1691",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:26.333",
"lastModified": "2024-03-13T16:15:26.333",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1723",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:26.510",
"lastModified": "2024-03-13T16:15:26.510",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1751",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:26.683",
"lastModified": "2024-03-13T16:15:26.683",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1763",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:26.863",
"lastModified": "2024-03-13T16:15:26.863",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1772",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:27.040",
"lastModified": "2024-03-13T16:15:27.040",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1793",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:27.207",
"lastModified": "2024-03-13T16:15:27.207",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1806",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:27.380",
"lastModified": "2024-03-13T16:15:27.380",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1843",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:27.550",
"lastModified": "2024-03-13T16:15:27.550",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1854",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:27.717",
"lastModified": "2024-03-13T16:15:27.717",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1862",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:27.893",
"lastModified": "2024-03-13T16:15:27.893",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1894",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:28.067",
"lastModified": "2024-03-13T16:15:28.067",
"vulnStatus": "Received",
"lastModified": "2024-03-13T18:15:58.530",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

Some files were not shown because too many files have changed in this diff Show More