mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-03-27T23:00:38.345675+00:00
This commit is contained in:
parent
d5ea2304b5
commit
dc03ae4b0d
20
CVE-2023/CVE-2023-474xx/CVE-2023-47438.json
Normal file
20
CVE-2023/CVE-2023-474xx/CVE-2023-47438.json
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-47438",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-03-27T22:15:07.607",
|
||||||
|
"lastModified": "2024-03-27T22:15:07.607",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "SQL Injection vulnerability in Reportico Till 8.1.0 allows attackers to obtain sensitive information or other system information via the project parameter."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/reportico-web/reportico/issues/52",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-50447",
|
"id": "CVE-2023-50447",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-01-19T20:15:11.870",
|
"published": "2024-01-19T20:15:11.870",
|
||||||
"lastModified": "2024-02-15T03:18:46.687",
|
"lastModified": "2024-03-27T21:15:48.783",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -100,12 +100,8 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://duartecsantos.github.io/2023-01-02-CVE-2023-50447/",
|
"url": "https://duartecsantos.github.io/2024-01-02-CVE-2023-50447/",
|
||||||
"source": "cve@mitre.org",
|
"source": "cve@mitre.org"
|
||||||
"tags": [
|
|
||||||
"Exploit",
|
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/python-pillow/Pillow/releases",
|
"url": "https://github.com/python-pillow/Pillow/releases",
|
||||||
|
55
CVE-2024/CVE-2024-00xx/CVE-2024-0071.json
Normal file
55
CVE-2024/CVE-2024-00xx/CVE-2024-0071.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-0071",
|
||||||
|
"sourceIdentifier": "psirt@nvidia.com",
|
||||||
|
"published": "2024-03-27T22:15:07.667",
|
||||||
|
"lastModified": "2024-03-27T22:15:07.667",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVIDIA GPU Display Driver for Windows contains a vulnerability in the user mode layer, where an unprivileged regular user can cause an out-of-bounds write. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@nvidia.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@nvidia.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-125"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5520",
|
||||||
|
"source": "psirt@nvidia.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-00xx/CVE-2024-0073.json
Normal file
55
CVE-2024/CVE-2024-00xx/CVE-2024-0073.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-0073",
|
||||||
|
"sourceIdentifier": "psirt@nvidia.com",
|
||||||
|
"published": "2024-03-27T22:15:08.133",
|
||||||
|
"lastModified": "2024-03-27T22:15:08.133",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer when the driver is performing an operation at a privilege level that is higher than the minimum level required. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@nvidia.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@nvidia.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-250"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5520",
|
||||||
|
"source": "psirt@nvidia.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-00xx/CVE-2024-0074.json
Normal file
55
CVE-2024/CVE-2024-00xx/CVE-2024-0074.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-0074",
|
||||||
|
"sourceIdentifier": "psirt@nvidia.com",
|
||||||
|
"published": "2024-03-27T22:15:08.617",
|
||||||
|
"lastModified": "2024-03-27T22:15:08.617",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVIDIA GPU Display Driver for Linux contains a vulnerability where an attacker may access a memory location after the end of the buffer. A successful exploit of this vulnerability may lead to denial of service and data tampering."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@nvidia.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@nvidia.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-788"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5520",
|
||||||
|
"source": "psirt@nvidia.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-00xx/CVE-2024-0075.json
Normal file
55
CVE-2024/CVE-2024-00xx/CVE-2024-0075.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-0075",
|
||||||
|
"sourceIdentifier": "psirt@nvidia.com",
|
||||||
|
"published": "2024-03-27T22:15:09.140",
|
||||||
|
"lastModified": "2024-03-27T22:15:09.140",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where a user may cause a NULL-pointer dereference by accessing passed parameters the validity of which has not been checked. A successful exploit of this vulnerability may lead to denial of service and limited information disclosure."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@nvidia.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 4.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@nvidia.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5520",
|
||||||
|
"source": "psirt@nvidia.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-00xx/CVE-2024-0077.json
Normal file
55
CVE-2024/CVE-2024-00xx/CVE-2024-0077.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-0077",
|
||||||
|
"sourceIdentifier": "psirt@nvidia.com",
|
||||||
|
"published": "2024-03-27T22:15:09.510",
|
||||||
|
"lastModified": "2024-03-27T22:15:09.510",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, where it allows a guest OS to allocate resources for which the guest OS is not authorized. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@nvidia.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@nvidia.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-285"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5520",
|
||||||
|
"source": "psirt@nvidia.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-00xx/CVE-2024-0078.json
Normal file
55
CVE-2024/CVE-2024-00xx/CVE-2024-0078.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-0078",
|
||||||
|
"sourceIdentifier": "psirt@nvidia.com",
|
||||||
|
"published": "2024-03-27T22:15:09.700",
|
||||||
|
"lastModified": "2024-03-27T22:15:09.700",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a user in a guest can cause a NULL-pointer dereference in the host, which may lead to denial of service."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@nvidia.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.0,
|
||||||
|
"impactScore": 4.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@nvidia.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5520",
|
||||||
|
"source": "psirt@nvidia.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-00xx/CVE-2024-0079.json
Normal file
55
CVE-2024/CVE-2024-00xx/CVE-2024-0079.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-0079",
|
||||||
|
"sourceIdentifier": "psirt@nvidia.com",
|
||||||
|
"published": "2024-03-27T22:15:09.897",
|
||||||
|
"lastModified": "2024-03-27T22:15:09.897",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a user in a guest VM can cause a NULL-pointer dereference in the host. A successful exploit of this vulnerability may lead to denial of service."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@nvidia.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.0,
|
||||||
|
"impactScore": 4.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@nvidia.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5520",
|
||||||
|
"source": "psirt@nvidia.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
20
CVE-2024/CVE-2024-253xx/CVE-2024-25354.json
Normal file
20
CVE-2024/CVE-2024-253xx/CVE-2024-25354.json
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-25354",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-03-27T22:15:10.093",
|
||||||
|
"lastModified": "2024-03-27T22:15:10.093",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "RegEx Denial of Service in domain-suffix 1.0.8 allows attackers to crash the application via crafted input to the parse function."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://gist.github.com/6en6ar/c3b11b4058b8e2bc54717408d451fb79",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-29xx/CVE-2024-2997.json
Normal file
92
CVE-2024/CVE-2024-29xx/CVE-2024-2997.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2997",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-03-27T21:15:48.897",
|
||||||
|
"lastModified": "2024-03-27T21:15:48.897",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in Bdtask Multi-Store Inventory Management System up to 20240320. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument Category Name/Model Name/Brand Name/Unit Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258199. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 2.4,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "MULTIPLE",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 3.3
|
||||||
|
},
|
||||||
|
"baseSeverity": "LOW",
|
||||||
|
"exploitabilityScore": 6.4,
|
||||||
|
"impactScore": 2.9,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://drive.google.com/file/d/1Zx_JnAf6QArTtfoSuzESkBasZSrNzmFF/view?usp=drivesdk",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.258199",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.258199",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.301380",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-29xx/CVE-2024-2998.json
Normal file
92
CVE-2024/CVE-2024-29xx/CVE-2024-2998.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2998",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-03-27T21:15:49.127",
|
||||||
|
"lastModified": "2024-03-27T21:15:49.127",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in Bdtask Multi-Store Inventory Management System up to 20240320. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Store Update Page. The manipulation of the argument Store Name/Store Address leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258200. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 2.4,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "MULTIPLE",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 3.3
|
||||||
|
},
|
||||||
|
"baseSeverity": "LOW",
|
||||||
|
"exploitabilityScore": 6.4,
|
||||||
|
"impactScore": 2.9,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://drive.google.com/file/d/1cE1gmFmPCjomWmHbBEvWCYg0dPEWkFoR/view?usp=drivesdk",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.258200",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.258200",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.301381",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-29xx/CVE-2024-2999.json
Normal file
92
CVE-2024/CVE-2024-29xx/CVE-2024-2999.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2999",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-03-27T21:15:49.407",
|
||||||
|
"lastModified": "2024-03-27T21:15:49.407",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability classified as critical has been found in Campcodes Online Art Gallery Management System 1.0. This affects an unknown part of the file /admin/adminHome.php. The manipulation of the argument uname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258201 was assigned to this vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"baseScore": 6.5
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Art%20Gallery%20Management%20System%20-%20vuln%201.pdf",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.258201",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.258201",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.304765",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-30xx/CVE-2024-3000.json
Normal file
92
CVE-2024/CVE-2024-30xx/CVE-2024-3000.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-3000",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-03-27T22:15:10.150",
|
||||||
|
"lastModified": "2024-03-27T22:15:10.150",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability classified as critical was found in code-projects Online Book System 1.0. This vulnerability affects unknown code of the file /index.php. The manipulation of the argument username/password/login_username/login_password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258202 is the identifier assigned to this vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 7.3,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"baseScore": 7.5
|
||||||
|
},
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"exploitabilityScore": 10.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Authentication%20Bypass.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.258202",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.258202",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.305052",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-30xx/CVE-2024-3001.json
Normal file
92
CVE-2024/CVE-2024-30xx/CVE-2024-3001.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-3001",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-03-27T22:15:10.673",
|
||||||
|
"lastModified": "2024-03-27T22:15:10.673",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability, which was classified as critical, has been found in code-projects Online Book System 1.0. This issue affects some unknown processing of the file /Product.php. The manipulation of the argument value leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258203."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"baseScore": 6.5
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%203.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.258203",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.258203",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.305055",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-30xx/CVE-2024-3002.json
Normal file
92
CVE-2024/CVE-2024-30xx/CVE-2024-3002.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-3002",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-03-27T22:15:11.300",
|
||||||
|
"lastModified": "2024-03-27T22:15:11.300",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability, which was classified as critical, was found in code-projects Online Book System 1.0. Affected is an unknown function of the file /description.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258204."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"baseScore": 6.5
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%204.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.258204",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.258204",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.305056",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-30xx/CVE-2024-3003.json
Normal file
92
CVE-2024/CVE-2024-30xx/CVE-2024-3003.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-3003",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-03-27T22:15:11.880",
|
||||||
|
"lastModified": "2024-03-27T22:15:11.880",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability has been found in code-projects Online Book System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /cart.php. The manipulation of the argument quantity/remove leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258205 was assigned to this vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"baseScore": 6.5
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%205.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.258205",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.258205",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.305057",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
40
README.md
40
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-03-27T21:00:38.583660+00:00
|
2024-03-27T23:00:38.345675+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-03-27T20:15:10.507000+00:00
|
2024-03-27T22:15:11.880000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,36 +33,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
243058
|
243074
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `16`
|
Recently added CVEs: `16`
|
||||||
|
|
||||||
- [CVE-2024-28085](CVE-2024/CVE-2024-280xx/CVE-2024-28085.json) (`2024-03-27T19:15:48.367`)
|
- [CVE-2023-47438](CVE-2023/CVE-2023-474xx/CVE-2023-47438.json) (`2024-03-27T22:15:07.607`)
|
||||||
- [CVE-2024-28233](CVE-2024/CVE-2024-282xx/CVE-2024-28233.json) (`2024-03-27T19:15:48.430`)
|
- [CVE-2024-0071](CVE-2024/CVE-2024-00xx/CVE-2024-0071.json) (`2024-03-27T22:15:07.667`)
|
||||||
- [CVE-2024-28247](CVE-2024/CVE-2024-282xx/CVE-2024-28247.json) (`2024-03-27T19:15:48.637`)
|
- [CVE-2024-0073](CVE-2024/CVE-2024-00xx/CVE-2024-0073.json) (`2024-03-27T22:15:08.133`)
|
||||||
- [CVE-2024-28860](CVE-2024/CVE-2024-288xx/CVE-2024-28860.json) (`2024-03-27T19:15:48.827`)
|
- [CVE-2024-0074](CVE-2024/CVE-2024-00xx/CVE-2024-0074.json) (`2024-03-27T22:15:08.617`)
|
||||||
- [CVE-2024-29886](CVE-2024/CVE-2024-298xx/CVE-2024-29886.json) (`2024-03-27T19:15:49.023`)
|
- [CVE-2024-0075](CVE-2024/CVE-2024-00xx/CVE-2024-0075.json) (`2024-03-27T22:15:09.140`)
|
||||||
- [CVE-2024-29887](CVE-2024/CVE-2024-298xx/CVE-2024-29887.json) (`2024-03-27T19:15:49.230`)
|
- [CVE-2024-0077](CVE-2024/CVE-2024-00xx/CVE-2024-0077.json) (`2024-03-27T22:15:09.510`)
|
||||||
- [CVE-2024-29888](CVE-2024/CVE-2024-298xx/CVE-2024-29888.json) (`2024-03-27T19:15:49.410`)
|
- [CVE-2024-0078](CVE-2024/CVE-2024-00xx/CVE-2024-0078.json) (`2024-03-27T22:15:09.700`)
|
||||||
- [CVE-2024-29891](CVE-2024/CVE-2024-298xx/CVE-2024-29891.json) (`2024-03-27T20:15:07.780`)
|
- [CVE-2024-0079](CVE-2024/CVE-2024-00xx/CVE-2024-0079.json) (`2024-03-27T22:15:09.897`)
|
||||||
- [CVE-2024-29892](CVE-2024/CVE-2024-298xx/CVE-2024-29892.json) (`2024-03-27T20:15:08.303`)
|
- [CVE-2024-25354](CVE-2024/CVE-2024-253xx/CVE-2024-25354.json) (`2024-03-27T22:15:10.093`)
|
||||||
- [CVE-2024-2990](CVE-2024/CVE-2024-29xx/CVE-2024-2990.json) (`2024-03-27T19:15:49.710`)
|
- [CVE-2024-2997](CVE-2024/CVE-2024-29xx/CVE-2024-2997.json) (`2024-03-27T21:15:48.897`)
|
||||||
- [CVE-2024-2991](CVE-2024/CVE-2024-29xx/CVE-2024-2991.json) (`2024-03-27T19:15:49.940`)
|
- [CVE-2024-2998](CVE-2024/CVE-2024-29xx/CVE-2024-2998.json) (`2024-03-27T21:15:49.127`)
|
||||||
- [CVE-2024-2992](CVE-2024/CVE-2024-29xx/CVE-2024-2992.json) (`2024-03-27T19:15:50.173`)
|
- [CVE-2024-2999](CVE-2024/CVE-2024-29xx/CVE-2024-2999.json) (`2024-03-27T21:15:49.407`)
|
||||||
- [CVE-2024-2993](CVE-2024/CVE-2024-29xx/CVE-2024-2993.json) (`2024-03-27T20:15:08.780`)
|
- [CVE-2024-3000](CVE-2024/CVE-2024-30xx/CVE-2024-3000.json) (`2024-03-27T22:15:10.150`)
|
||||||
- [CVE-2024-2994](CVE-2024/CVE-2024-29xx/CVE-2024-2994.json) (`2024-03-27T20:15:09.337`)
|
- [CVE-2024-3001](CVE-2024/CVE-2024-30xx/CVE-2024-3001.json) (`2024-03-27T22:15:10.673`)
|
||||||
- [CVE-2024-2995](CVE-2024/CVE-2024-29xx/CVE-2024-2995.json) (`2024-03-27T20:15:09.903`)
|
- [CVE-2024-3002](CVE-2024/CVE-2024-30xx/CVE-2024-3002.json) (`2024-03-27T22:15:11.300`)
|
||||||
- [CVE-2024-2996](CVE-2024/CVE-2024-29xx/CVE-2024-2996.json) (`2024-03-27T20:15:10.507`)
|
- [CVE-2024-3003](CVE-2024/CVE-2024-30xx/CVE-2024-3003.json) (`2024-03-27T22:15:11.880`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `1`
|
Recently modified CVEs: `1`
|
||||||
|
|
||||||
- [CVE-2024-29945](CVE-2024/CVE-2024-299xx/CVE-2024-29945.json) (`2024-03-27T19:15:49.607`)
|
- [CVE-2023-50447](CVE-2023/CVE-2023-504xx/CVE-2023-50447.json) (`2024-03-27T21:15:48.783`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
52
_state.csv
52
_state.csv
@ -233151,6 +233151,7 @@ CVE-2023-47422,0,0,53e4ba62d7fd0242ce1870b57522bcebcee34260151a2b5b738b7621b64d4
|
|||||||
CVE-2023-4743,0,0,7bfbdabe8b9425296f1d631d292f0a9fb2f878bdfac9a0c89327f6098a11bb34,2024-03-21T02:49:52.253000
|
CVE-2023-4743,0,0,7bfbdabe8b9425296f1d631d292f0a9fb2f878bdfac9a0c89327f6098a11bb34,2024-03-21T02:49:52.253000
|
||||||
CVE-2023-47430,0,0,e6a5754bab3f4151de611d77cd2c885bddd03b736d05dd3ab604542d22404cc3,2024-03-26T12:55:05.010000
|
CVE-2023-47430,0,0,e6a5754bab3f4151de611d77cd2c885bddd03b736d05dd3ab604542d22404cc3,2024-03-26T12:55:05.010000
|
||||||
CVE-2023-47437,0,0,6e79bd1227b77bbb4f11ccfeeaa138eb5ff31bfe22e27fcab2f47ad374baaeca,2023-12-01T19:48:29.537000
|
CVE-2023-47437,0,0,6e79bd1227b77bbb4f11ccfeeaa138eb5ff31bfe22e27fcab2f47ad374baaeca,2023-12-01T19:48:29.537000
|
||||||
|
CVE-2023-47438,1,1,522d6ee1fc05d0946ab2173f13d638b091448082f51d8de059dae7edd97b3bd1,2024-03-27T22:15:07.607000
|
||||||
CVE-2023-4744,0,0,f33e2f57712194685c3dca3e1493ab9255a824e0935438d389efcbddb6e95f44,2024-03-21T02:49:52.340000
|
CVE-2023-4744,0,0,f33e2f57712194685c3dca3e1493ab9255a824e0935438d389efcbddb6e95f44,2024-03-21T02:49:52.340000
|
||||||
CVE-2023-47440,0,0,b65a22d6ec75b9b58933b07ceb717cde5ccdee4dab3cc2632d1662455c5a9b4d,2023-12-12T18:06:36.190000
|
CVE-2023-47440,0,0,b65a22d6ec75b9b58933b07ceb717cde5ccdee4dab3cc2632d1662455c5a9b4d,2023-12-12T18:06:36.190000
|
||||||
CVE-2023-47444,0,0,75fffcc4c2ccad6cbd523a225547a38913fed508632c010f0070b3ffb755f791,2023-11-21T01:02:43.800000
|
CVE-2023-47444,0,0,75fffcc4c2ccad6cbd523a225547a38913fed508632c010f0070b3ffb755f791,2023-11-21T01:02:43.800000
|
||||||
@ -235044,7 +235045,7 @@ CVE-2023-50443,0,0,274542200fff426927a34d0d27b8cdb3042965648a1dcf389e5eb13576a3b
|
|||||||
CVE-2023-50444,0,0,38c1ada4e0572d58fe6354b6dd2e3bb6174f3b1abe52517e3be8703c30a907d4,2023-12-20T18:31:52.980000
|
CVE-2023-50444,0,0,38c1ada4e0572d58fe6354b6dd2e3bb6174f3b1abe52517e3be8703c30a907d4,2023-12-20T18:31:52.980000
|
||||||
CVE-2023-50445,0,0,7a604b081e823bee49d0d27792c321266fe92039a5885322b7bf92373e986a01,2024-01-24T16:15:08.313000
|
CVE-2023-50445,0,0,7a604b081e823bee49d0d27792c321266fe92039a5885322b7bf92373e986a01,2024-01-24T16:15:08.313000
|
||||||
CVE-2023-50446,0,0,b695f5a12568e4d1dcada2df1460b60525412989181e3c9caace1cac4b258d09,2023-12-13T19:46:58.377000
|
CVE-2023-50446,0,0,b695f5a12568e4d1dcada2df1460b60525412989181e3c9caace1cac4b258d09,2023-12-13T19:46:58.377000
|
||||||
CVE-2023-50447,0,0,5a1b8303e94a5767eba29ea0db30f5b9201de94a279ac4a0659ca2a0f27a063e,2024-02-15T03:18:46.687000
|
CVE-2023-50447,0,1,4274e15463a664271f217c6353494295c4741fbda8ce5043605a4d94e5999dab,2024-03-27T21:15:48.783000
|
||||||
CVE-2023-50448,0,0,42b0c812ec7d1de171876fa730dde3f7cb36fefe88b892e58aa2486acba50cc7,2024-01-04T23:56:47.930000
|
CVE-2023-50448,0,0,42b0c812ec7d1de171876fa730dde3f7cb36fefe88b892e58aa2486acba50cc7,2024-01-04T23:56:47.930000
|
||||||
CVE-2023-50449,0,0,235dda88e8a57ba28adfce27750f6069d8940cf622a7f419f926de90c6ede5ce,2023-12-13T16:02:58.210000
|
CVE-2023-50449,0,0,235dda88e8a57ba28adfce27750f6069d8940cf622a7f419f926de90c6ede5ce,2023-12-13T16:02:58.210000
|
||||||
CVE-2023-5045,0,0,510f27d726c8960a080b3da25d0076392ef7ce42085c534970e9fd03d64fd913,2023-11-30T09:15:07.950000
|
CVE-2023-5045,0,0,510f27d726c8960a080b3da25d0076392ef7ce42085c534970e9fd03d64fd913,2023-11-30T09:15:07.950000
|
||||||
@ -237959,6 +237960,13 @@ CVE-2024-0057,0,0,e4dc663a42ac696d9f4ea85b4eec7c26c470f055092858eb6ffdd99343f4d6
|
|||||||
CVE-2024-0068,0,0,29054351872f671ffd0afada76da136d48518b88acaefb639ccc6c169ead07a3,2024-03-01T14:04:26.010000
|
CVE-2024-0068,0,0,29054351872f671ffd0afada76da136d48518b88acaefb639ccc6c169ead07a3,2024-03-01T14:04:26.010000
|
||||||
CVE-2024-0069,0,0,fcda9c827a68481a563f617244a09b1d788f56c62c31734c572fbfe1a75ea718,2023-11-28T00:15:07.140000
|
CVE-2024-0069,0,0,fcda9c827a68481a563f617244a09b1d788f56c62c31734c572fbfe1a75ea718,2023-11-28T00:15:07.140000
|
||||||
CVE-2024-0070,0,0,f5edfa828dbd64ca40da0463d8d67355f807a2f6d8ea2e049578dd15434f1821,2023-11-28T00:15:07.183000
|
CVE-2024-0070,0,0,f5edfa828dbd64ca40da0463d8d67355f807a2f6d8ea2e049578dd15434f1821,2023-11-28T00:15:07.183000
|
||||||
|
CVE-2024-0071,1,1,30a428905c67c7adb95d2412a9689eb89a21c088a6addc56bfe101ff63aadc6e,2024-03-27T22:15:07.667000
|
||||||
|
CVE-2024-0073,1,1,880cf04fc43f0cfad9e2d59cff6705bb4a9889733cf925e4ff2ffdb354927c7e,2024-03-27T22:15:08.133000
|
||||||
|
CVE-2024-0074,1,1,75bd56d00f0ec411ef82bce7d8ebe09e0783e167c1f0d15a390a1d7b477ad2e2,2024-03-27T22:15:08.617000
|
||||||
|
CVE-2024-0075,1,1,a4a1cddb3e5e73443b6db68fcdc803a1d517a7ec139e4f9fd304639e870d9ce9,2024-03-27T22:15:09.140000
|
||||||
|
CVE-2024-0077,1,1,c78e3005696d3d73c5dab0fe61f2c93ea360e3ee2dac536997251669e079dfc1,2024-03-27T22:15:09.510000
|
||||||
|
CVE-2024-0078,1,1,cbef8e60b1078c0b436b75294924dc6c05ec75db357c01d5117d20285417c736,2024-03-27T22:15:09.700000
|
||||||
|
CVE-2024-0079,1,1,c2d3ae39b02554c9afe92817ff9cd9f4e84911e27a55abdf769773a6746f8f33,2024-03-27T22:15:09.897000
|
||||||
CVE-2024-0154,0,0,503aed517e3c557edd7cd4a234585f8e223bdcb46afc8dd52a7284b4bb324992,2024-03-13T18:15:58.530000
|
CVE-2024-0154,0,0,503aed517e3c557edd7cd4a234585f8e223bdcb46afc8dd52a7284b4bb324992,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-0155,0,0,a75d6b44d8976b9f082fed092efd11db077fc0559b3b5c46ef337c5d8f761d3f,2024-03-04T13:58:23.447000
|
CVE-2024-0155,0,0,a75d6b44d8976b9f082fed092efd11db077fc0559b3b5c46ef337c5d8f761d3f,2024-03-04T13:58:23.447000
|
||||||
CVE-2024-0156,0,0,978a8cd7f1acaeac5930d83f177d0fbfbff728a7123e5197399066e9731cb1b4,2024-03-04T13:58:23.447000
|
CVE-2024-0156,0,0,978a8cd7f1acaeac5930d83f177d0fbfbff728a7123e5197399066e9731cb1b4,2024-03-04T13:58:23.447000
|
||||||
@ -241535,6 +241543,7 @@ CVE-2024-25344,0,0,5140bac0aef452b65d54f79c6217b05ec44dd1a460f10a2ceaa1e65877e2e
|
|||||||
CVE-2024-2535,0,0,0dd9e1bc0e1cb89bd4d5eca9981e8a4999a84b5f3fcccfdbdcf3cfa421537713,2024-03-21T02:52:37.310000
|
CVE-2024-2535,0,0,0dd9e1bc0e1cb89bd4d5eca9981e8a4999a84b5f3fcccfdbdcf3cfa421537713,2024-03-21T02:52:37.310000
|
||||||
CVE-2024-25350,0,0,3b5e1a464fb4fcd28f6d7166045a369486403df18ae61c0e2fab4e4e5871d428,2024-02-29T13:49:47.277000
|
CVE-2024-25350,0,0,3b5e1a464fb4fcd28f6d7166045a369486403df18ae61c0e2fab4e4e5871d428,2024-02-29T13:49:47.277000
|
||||||
CVE-2024-25351,0,0,28c4ca40865cd756499ab4d2ad9d55bb73b890cae2259528816b47b2a536dca5,2024-02-29T13:49:47.277000
|
CVE-2024-25351,0,0,28c4ca40865cd756499ab4d2ad9d55bb73b890cae2259528816b47b2a536dca5,2024-02-29T13:49:47.277000
|
||||||
|
CVE-2024-25354,1,1,8ffa14e65dad44e455c11c6e3bac91e7d99dc2f81dd850ad2377a545aef5694f,2024-03-27T22:15:10.093000
|
||||||
CVE-2024-25359,0,0,9c7e950ef54f547e29dbfe7e3905d1cbbbe8e0be6e3cf6f262ec35911e4dc9e2,2024-03-21T12:58:51.093000
|
CVE-2024-25359,0,0,9c7e950ef54f547e29dbfe7e3905d1cbbbe8e0be6e3cf6f262ec35911e4dc9e2,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-25360,0,0,3e224bc7b3e9e14e80fd4bf018fb256496be6af2f44b523d9f71f67e98675039,2024-02-12T17:31:21.670000
|
CVE-2024-25360,0,0,3e224bc7b3e9e14e80fd4bf018fb256496be6af2f44b523d9f71f67e98675039,2024-02-12T17:31:21.670000
|
||||||
CVE-2024-25366,0,0,dee495aa8a0f0bbcbead8039fddcd3f716b7e5ed2944c5a0aca4a92e1be3c151,2024-02-20T19:50:53.960000
|
CVE-2024-25366,0,0,dee495aa8a0f0bbcbead8039fddcd3f716b7e5ed2944c5a0aca4a92e1be3c151,2024-02-20T19:50:53.960000
|
||||||
@ -242458,7 +242467,7 @@ CVE-2024-2807,0,0,47b8a7021ebbb15acc350203dd3081726f7b96c650b8d998414fd135c1027f
|
|||||||
CVE-2024-28070,0,0,d9b3309fdc4db05937449ae85d6df93a299898f40c2c79f5bb7988f4ebb25838,2024-03-17T22:38:29.433000
|
CVE-2024-28070,0,0,d9b3309fdc4db05937449ae85d6df93a299898f40c2c79f5bb7988f4ebb25838,2024-03-17T22:38:29.433000
|
||||||
CVE-2024-2808,0,0,a0621aec3e17f906967cd04e2f75551ea2d13f29c3ece6e8f56dccb94d17afe1,2024-03-26T03:13:36.183000
|
CVE-2024-2808,0,0,a0621aec3e17f906967cd04e2f75551ea2d13f29c3ece6e8f56dccb94d17afe1,2024-03-26T03:13:36.183000
|
||||||
CVE-2024-28084,0,0,e855eaf3201adbee7f29bca688e63324787cf32844050753a9cd1965f8c4b542,2024-03-23T03:15:11.583000
|
CVE-2024-28084,0,0,e855eaf3201adbee7f29bca688e63324787cf32844050753a9cd1965f8c4b542,2024-03-23T03:15:11.583000
|
||||||
CVE-2024-28085,1,1,98bf8795c0110d4df8052feb8dcd9584d06668c2d76d6af8803048daa3592c71,2024-03-27T19:15:48.367000
|
CVE-2024-28085,0,0,98bf8795c0110d4df8052feb8dcd9584d06668c2d76d6af8803048daa3592c71,2024-03-27T19:15:48.367000
|
||||||
CVE-2024-28088,0,0,d2f20b1069b24ba10d21e8bf3b61c2c6a1c6b345ff59786676752b80abbde7a4,2024-03-13T21:16:00.380000
|
CVE-2024-28088,0,0,d2f20b1069b24ba10d21e8bf3b61c2c6a1c6b345ff59786676752b80abbde7a4,2024-03-13T21:16:00.380000
|
||||||
CVE-2024-28089,0,0,830991c1dd5898b6a817a3f8bb8784922af3636f20b8b62ba1c918d5d83f6f10,2024-03-11T01:32:29.610000
|
CVE-2024-28089,0,0,830991c1dd5898b6a817a3f8bb8784922af3636f20b8b62ba1c918d5d83f6f10,2024-03-11T01:32:29.610000
|
||||||
CVE-2024-2809,0,0,16a24c41619de5ba8d47e944f4573d2f7981695d1c5bec0e5f48dbb2fc9c9b69,2024-03-26T03:13:47.830000
|
CVE-2024-2809,0,0,16a24c41619de5ba8d47e944f4573d2f7981695d1c5bec0e5f48dbb2fc9c9b69,2024-03-26T03:13:47.830000
|
||||||
@ -242551,7 +242560,7 @@ CVE-2024-28229,0,0,7bfc3b59e790a5126732ec4d8d480f9938166a41475488b32e066c1e064cc
|
|||||||
CVE-2024-2823,0,0,1867dc09c5e833da359a0c14ac91c9482d72bb78f2ce80c84c0309fdaa923bfc,2024-03-22T19:02:10.300000
|
CVE-2024-2823,0,0,1867dc09c5e833da359a0c14ac91c9482d72bb78f2ce80c84c0309fdaa923bfc,2024-03-22T19:02:10.300000
|
||||||
CVE-2024-28230,0,0,3036aa70102b53b9cc695265dc4a11e5a4f5b8d26f6120835dbd1a9c3d93e7ec,2024-03-07T13:52:27.110000
|
CVE-2024-28230,0,0,3036aa70102b53b9cc695265dc4a11e5a4f5b8d26f6120835dbd1a9c3d93e7ec,2024-03-07T13:52:27.110000
|
||||||
CVE-2024-28231,0,0,f41f4c1605399e97b52547261c763ca0d059815d5c55e921912a149cd091acde,2024-03-21T12:58:51.093000
|
CVE-2024-28231,0,0,f41f4c1605399e97b52547261c763ca0d059815d5c55e921912a149cd091acde,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-28233,1,1,6e7adbfcda365f18ba124f94907710cd713a299e802391a71f30620ea74e66ca,2024-03-27T19:15:48.430000
|
CVE-2024-28233,0,0,6e7adbfcda365f18ba124f94907710cd713a299e802391a71f30620ea74e66ca,2024-03-27T19:15:48.430000
|
||||||
CVE-2024-28236,0,0,ea7d34bffb060eb0191757ceb4c446ee8bfa4166cb7d1e0d8e67e75c651ba966,2024-03-13T12:33:51.697000
|
CVE-2024-28236,0,0,ea7d34bffb060eb0191757ceb4c446ee8bfa4166cb7d1e0d8e67e75c651ba966,2024-03-13T12:33:51.697000
|
||||||
CVE-2024-28237,0,0,e54564ebce9f53fbf47a1a617d4c2539d1d06a16522000543afac14f934cf25f,2024-03-19T13:26:46
|
CVE-2024-28237,0,0,e54564ebce9f53fbf47a1a617d4c2539d1d06a16522000543afac14f934cf25f,2024-03-19T13:26:46
|
||||||
CVE-2024-28238,0,0,38219e010007b7fe5426826144cd2eabd2e22d36d31c50aa8471901674b524b3,2024-03-13T12:33:51.697000
|
CVE-2024-28238,0,0,38219e010007b7fe5426826144cd2eabd2e22d36d31c50aa8471901674b524b3,2024-03-13T12:33:51.697000
|
||||||
@ -242562,7 +242571,7 @@ CVE-2024-28243,0,0,b62121443f467a21df9a72e6de805a7094f659c79fc9b69ca113c6cd74783
|
|||||||
CVE-2024-28244,0,0,8a0b0822374c9608b1ee3be4ddc31140538b510b0fd28061fd05bdbdf794fae2,2024-03-26T12:55:05.010000
|
CVE-2024-28244,0,0,8a0b0822374c9608b1ee3be4ddc31140538b510b0fd28061fd05bdbdf794fae2,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-28245,0,0,ad5a09bb643469edf06f460630cbf65a15180867ced005dc01d0df0098be8f11,2024-03-26T12:55:05.010000
|
CVE-2024-28245,0,0,ad5a09bb643469edf06f460630cbf65a15180867ced005dc01d0df0098be8f11,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-28246,0,0,cd369a06f7ae7fd9ab35271cb07a672352ca99976424cd04633d8a0d97406151,2024-03-26T12:55:05.010000
|
CVE-2024-28246,0,0,cd369a06f7ae7fd9ab35271cb07a672352ca99976424cd04633d8a0d97406151,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-28247,1,1,4c1010e8b1387a3575ae9cc58499c5ad2d20c679556fbdf0aedbea77747fa924,2024-03-27T19:15:48.637000
|
CVE-2024-28247,0,0,4c1010e8b1387a3575ae9cc58499c5ad2d20c679556fbdf0aedbea77747fa924,2024-03-27T19:15:48.637000
|
||||||
CVE-2024-28248,0,0,b617812c524b85d27f2a46b3a739648463fa9ffb5a6e46ea47ba0c68bd3fa409,2024-03-19T13:26:46
|
CVE-2024-28248,0,0,b617812c524b85d27f2a46b3a739648463fa9ffb5a6e46ea47ba0c68bd3fa409,2024-03-19T13:26:46
|
||||||
CVE-2024-28249,0,0,7f01b3731d6ed3594265964b9061da88eb89dfe99b6d59bfec8413859c3ac454,2024-03-19T13:26:46
|
CVE-2024-28249,0,0,7f01b3731d6ed3594265964b9061da88eb89dfe99b6d59bfec8413859c3ac454,2024-03-19T13:26:46
|
||||||
CVE-2024-2825,0,0,731d564e18c15016bfac25b783d866bfc2b3073e42c4b54f0ca736209097bfbb,2024-03-25T01:51:01.223000
|
CVE-2024-2825,0,0,731d564e18c15016bfac25b783d866bfc2b3073e42c4b54f0ca736209097bfbb,2024-03-25T01:51:01.223000
|
||||||
@ -242721,7 +242730,7 @@ CVE-2024-28854,0,0,8cb03aded6b194ffbf5e93b6a999bfbf01ac8f736343c4fc752b0e38a8bc9
|
|||||||
CVE-2024-28855,0,0,2384a3330fde47f752f152bfa13a6226cb6b236bb18ff2466f5e886c7d3e893c,2024-03-19T13:26:46
|
CVE-2024-28855,0,0,2384a3330fde47f752f152bfa13a6226cb6b236bb18ff2466f5e886c7d3e893c,2024-03-19T13:26:46
|
||||||
CVE-2024-28859,0,0,2d0407c7b83f2786a493b842ae3fe3ce3f906494adee8b0e0f61c75557fcb17c,2024-03-17T22:38:29.433000
|
CVE-2024-28859,0,0,2d0407c7b83f2786a493b842ae3fe3ce3f906494adee8b0e0f61c75557fcb17c,2024-03-17T22:38:29.433000
|
||||||
CVE-2024-2886,0,0,6e2c93ce5d4e26c4d3323ffd43f5daeef03c7e577cbecbc4edf8fb5cb68f2687,2024-03-27T12:29:30.307000
|
CVE-2024-2886,0,0,6e2c93ce5d4e26c4d3323ffd43f5daeef03c7e577cbecbc4edf8fb5cb68f2687,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-28860,1,1,8530891db4a7f991deeb8743eda677f9aafce06f98a8d822a07506287d8e28eb,2024-03-27T19:15:48.827000
|
CVE-2024-28860,0,0,8530891db4a7f991deeb8743eda677f9aafce06f98a8d822a07506287d8e28eb,2024-03-27T19:15:48.827000
|
||||||
CVE-2024-28861,0,0,614b056391803730ffc563205182a9ac310eb6811e0e407400ba2dc4b494f050,2024-03-22T19:02:10.300000
|
CVE-2024-28861,0,0,614b056391803730ffc563205182a9ac310eb6811e0e407400ba2dc4b494f050,2024-03-22T19:02:10.300000
|
||||||
CVE-2024-28862,0,0,b0dc40150b0e5f15633ecb26c2614b37fe6eefbb423911349887989b36d78640,2024-03-17T22:38:29.433000
|
CVE-2024-28862,0,0,b0dc40150b0e5f15633ecb26c2614b37fe6eefbb423911349887989b36d78640,2024-03-17T22:38:29.433000
|
||||||
CVE-2024-28863,0,0,ad7818a88579939a8a2c9b467548624411262308646c7865759640aa6d437826,2024-03-22T12:45:36.130000
|
CVE-2024-28863,0,0,ad7818a88579939a8a2c9b467548624411262308646c7865759640aa6d437826,2024-03-22T12:45:36.130000
|
||||||
@ -242977,18 +242986,18 @@ CVE-2024-2988,0,0,44a505017c98ed38c8d5dc5d8e011605d3c9f7895e5eca811eae32b18fc8f7
|
|||||||
CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000
|
CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000
|
||||||
CVE-2024-29881,0,0,7eaff78a6eecd508372203508f2ecab97ebc62cfd94b7af6101b5d7b6ca209b2,2024-03-26T17:09:53.043000
|
CVE-2024-29881,0,0,7eaff78a6eecd508372203508f2ecab97ebc62cfd94b7af6101b5d7b6ca209b2,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29883,0,0,2444d321a867d6f4cdf63bf8a1bc6af3b407752f2134c1f64a1d02545242c426,2024-03-26T17:09:53.043000
|
CVE-2024-29883,0,0,2444d321a867d6f4cdf63bf8a1bc6af3b407752f2134c1f64a1d02545242c426,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29886,1,1,1adbb5073cba9b65593ecf8998a22e2a5d29436a3607268c528bf401c023cbf4,2024-03-27T19:15:49.023000
|
CVE-2024-29886,0,0,1adbb5073cba9b65593ecf8998a22e2a5d29436a3607268c528bf401c023cbf4,2024-03-27T19:15:49.023000
|
||||||
CVE-2024-29887,1,1,d4e3377385744fa243f8c752377b78d10fb04f6b3cf56c3bd0fe2bd96f11984d,2024-03-27T19:15:49.230000
|
CVE-2024-29887,0,0,d4e3377385744fa243f8c752377b78d10fb04f6b3cf56c3bd0fe2bd96f11984d,2024-03-27T19:15:49.230000
|
||||||
CVE-2024-29888,1,1,816e1902566b12dbf24377b613baef5b79a414fcea833a258cf044d46f30bd51,2024-03-27T19:15:49.410000
|
CVE-2024-29888,0,0,816e1902566b12dbf24377b613baef5b79a414fcea833a258cf044d46f30bd51,2024-03-27T19:15:49.410000
|
||||||
CVE-2024-2989,0,0,28b7dcd865137d9f2b8b08b53206e10e337ffacc5ed400750f6a854bac66dab1,2024-03-27T18:15:11.293000
|
CVE-2024-2989,0,0,28b7dcd865137d9f2b8b08b53206e10e337ffacc5ed400750f6a854bac66dab1,2024-03-27T18:15:11.293000
|
||||||
CVE-2024-29891,1,1,7f9df39928cbbf99e5030accf6dd8020531a4366a49ed903a14fbbd277432a72,2024-03-27T20:15:07.780000
|
CVE-2024-29891,0,0,7f9df39928cbbf99e5030accf6dd8020531a4366a49ed903a14fbbd277432a72,2024-03-27T20:15:07.780000
|
||||||
CVE-2024-29892,1,1,11a2de43764af3b9fd0910af9f11c950352c98e69bb104177454ad296186dea9,2024-03-27T20:15:08.303000
|
CVE-2024-29892,0,0,11a2de43764af3b9fd0910af9f11c950352c98e69bb104177454ad296186dea9,2024-03-27T20:15:08.303000
|
||||||
CVE-2024-2990,1,1,29d47249dc9edae8b71b72a27ada065a3a8487192facbacb3019e2adced6a348,2024-03-27T19:15:49.710000
|
CVE-2024-2990,0,0,29d47249dc9edae8b71b72a27ada065a3a8487192facbacb3019e2adced6a348,2024-03-27T19:15:49.710000
|
||||||
CVE-2024-29906,0,0,5e6afa8dbe77b2ceaee29629c66d8bdf273caddf4f38f955d682aeefe9beab4c,2024-03-27T12:29:30.307000
|
CVE-2024-29906,0,0,5e6afa8dbe77b2ceaee29629c66d8bdf273caddf4f38f955d682aeefe9beab4c,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29907,0,0,95ebf1e66704307f93559559f18923b10f644f7f3c6486fedede31060b34f004,2024-03-27T12:29:30.307000
|
CVE-2024-29907,0,0,95ebf1e66704307f93559559f18923b10f644f7f3c6486fedede31060b34f004,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29908,0,0,e8d16098eaf081188862f8dc959904187f56568ff6eac559fa0228e1e293cd7d,2024-03-27T12:29:30.307000
|
CVE-2024-29908,0,0,e8d16098eaf081188862f8dc959904187f56568ff6eac559fa0228e1e293cd7d,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29909,0,0,e35d692490bf4e850bd9c44310b2bcdc71d1e19ea89b9513c3662fc2e536f1c8,2024-03-27T12:29:30.307000
|
CVE-2024-29909,0,0,e35d692490bf4e850bd9c44310b2bcdc71d1e19ea89b9513c3662fc2e536f1c8,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-2991,1,1,014fa0679cec95d7a2a8ad346f5e226ee43d3aeec7d3d19682b1d957d0dafc70,2024-03-27T19:15:49.940000
|
CVE-2024-2991,0,0,014fa0679cec95d7a2a8ad346f5e226ee43d3aeec7d3d19682b1d957d0dafc70,2024-03-27T19:15:49.940000
|
||||||
CVE-2024-29910,0,0,95e0ced080c2415c20a79532702b8302d4b33d6cd325a6b1a825844244f8d827,2024-03-27T12:29:30.307000
|
CVE-2024-29910,0,0,95e0ced080c2415c20a79532702b8302d4b33d6cd325a6b1a825844244f8d827,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29911,0,0,4092008a0663d92018dc076934d26b4252495c9f0c609c40c7a0a9cb7408115c,2024-03-27T12:29:30.307000
|
CVE-2024-29911,0,0,4092008a0663d92018dc076934d26b4252495c9f0c609c40c7a0a9cb7408115c,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29912,0,0,d4e137e215b0b00b25a8930ce0d0657c6dd7b00bfc0db6a92606d9a19e62f5d7,2024-03-27T12:29:30.307000
|
CVE-2024-29912,0,0,d4e137e215b0b00b25a8930ce0d0657c6dd7b00bfc0db6a92606d9a19e62f5d7,2024-03-27T12:29:30.307000
|
||||||
@ -242999,7 +243008,7 @@ CVE-2024-29916,0,0,dd300e18b662f862d3dd0881eace85d81be3f3aaeb79c908bcef100a80a89
|
|||||||
CVE-2024-29917,0,0,95c3e445522199a26b83d938184afd90a1d9b3b2a8bc319b5dd0b9abf802413e,2024-03-27T12:29:30.307000
|
CVE-2024-29917,0,0,95c3e445522199a26b83d938184afd90a1d9b3b2a8bc319b5dd0b9abf802413e,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29918,0,0,c4d24a04c4f4c9971aa2b61b2b16b6699727fc3170e99022d4d427890c1308f4,2024-03-27T12:29:30.307000
|
CVE-2024-29918,0,0,c4d24a04c4f4c9971aa2b61b2b16b6699727fc3170e99022d4d427890c1308f4,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29919,0,0,817229c260cd52d55a65e42df611e748e6f73b9a57660f2c28863f6cf3622c00,2024-03-27T12:29:30.307000
|
CVE-2024-29919,0,0,817229c260cd52d55a65e42df611e748e6f73b9a57660f2c28863f6cf3622c00,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-2992,1,1,2d65220d2b906672bb98850be6a500c5b6a513172eb7363240df1e5290ef793c,2024-03-27T19:15:50.173000
|
CVE-2024-2992,0,0,2d65220d2b906672bb98850be6a500c5b6a513172eb7363240df1e5290ef793c,2024-03-27T19:15:50.173000
|
||||||
CVE-2024-29920,0,0,ef33728d425fa66d6d618e2c1f88f50e442af75e655f18f6b3eeb620b9fc8dc0,2024-03-27T12:29:30.307000
|
CVE-2024-29920,0,0,ef33728d425fa66d6d618e2c1f88f50e442af75e655f18f6b3eeb620b9fc8dc0,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29921,0,0,d005f56290a07c8d41af4f88ae2cfe5cc38df315cb7fe36491d361da55105483,2024-03-27T12:29:30.307000
|
CVE-2024-29921,0,0,d005f56290a07c8d41af4f88ae2cfe5cc38df315cb7fe36491d361da55105483,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29922,0,0,43b2a415461fb932606c7e442074762fc1c7f75ddb5f3011fe888c9d97612372,2024-03-27T12:29:30.307000
|
CVE-2024-29922,0,0,43b2a415461fb932606c7e442074762fc1c7f75ddb5f3011fe888c9d97612372,2024-03-27T12:29:30.307000
|
||||||
@ -243010,7 +243019,7 @@ CVE-2024-29926,0,0,a774ce80509ca41dda348dca084b78d2d28da05a59a7cf4caade3a676403d
|
|||||||
CVE-2024-29927,0,0,be07820d91f38299d9fb6d4df08336e2d6d59401fb34adcc97e6c8bfc54c88ce,2024-03-27T12:29:30.307000
|
CVE-2024-29927,0,0,be07820d91f38299d9fb6d4df08336e2d6d59401fb34adcc97e6c8bfc54c88ce,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29928,0,0,af15186b7473fc265776521d890548138671a1bf67efd8d69ad310a551d30c19,2024-03-27T12:29:30.307000
|
CVE-2024-29928,0,0,af15186b7473fc265776521d890548138671a1bf67efd8d69ad310a551d30c19,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29929,0,0,27716aabdc6516c3ef94065c2b993ed5b5982de82d07dca6a414e351d3ba3758,2024-03-27T12:29:30.307000
|
CVE-2024-29929,0,0,27716aabdc6516c3ef94065c2b993ed5b5982de82d07dca6a414e351d3ba3758,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-2993,1,1,4a6a8a4998f75a6ef469a63cfb2c694f28f2ad841535ff48deca75494d13eed3,2024-03-27T20:15:08.780000
|
CVE-2024-2993,0,0,4a6a8a4998f75a6ef469a63cfb2c694f28f2ad841535ff48deca75494d13eed3,2024-03-27T20:15:08.780000
|
||||||
CVE-2024-29930,0,0,6fcc220221700641e9da16e849b0714ef9f33840931a344748681165e2c7f58e,2024-03-27T12:29:30.307000
|
CVE-2024-29930,0,0,6fcc220221700641e9da16e849b0714ef9f33840931a344748681165e2c7f58e,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29931,0,0,5fa913a409729523af37223992622bba3903bd19b9d545f7af9b777e9cbf348b,2024-03-27T12:29:30.307000
|
CVE-2024-29931,0,0,5fa913a409729523af37223992622bba3903bd19b9d545f7af9b777e9cbf348b,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29932,0,0,5d75cdd8ba02e2819991be48064230f949a31f4f4858cf3f43a7fca421016a8e,2024-03-27T12:29:30.307000
|
CVE-2024-29932,0,0,5d75cdd8ba02e2819991be48064230f949a31f4f4858cf3f43a7fca421016a8e,2024-03-27T12:29:30.307000
|
||||||
@ -243018,13 +243027,20 @@ CVE-2024-29933,0,0,dedf4a0436c982230abe9b7179ec1be71724b7f64030e788ba0f8ea6283ee
|
|||||||
CVE-2024-29934,0,0,ca29550acd62f197f05fb73019cfe7d9a35aa76590a642b08535ea1b8d4c335b,2024-03-27T12:29:30.307000
|
CVE-2024-29934,0,0,ca29550acd62f197f05fb73019cfe7d9a35aa76590a642b08535ea1b8d4c335b,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29935,0,0,be0415ab39e2424d7707b3e026043937bddf40f9f881b75f312fe4db29a7520f,2024-03-27T12:29:30.307000
|
CVE-2024-29935,0,0,be0415ab39e2424d7707b3e026043937bddf40f9f881b75f312fe4db29a7520f,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29936,0,0,a0aa951ea6a61ca1da8503010b43db132d71646708e0e57d95e11fe2a44ec10b,2024-03-27T12:29:30.307000
|
CVE-2024-29936,0,0,a0aa951ea6a61ca1da8503010b43db132d71646708e0e57d95e11fe2a44ec10b,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-2994,1,1,9187e6071eddb36de6c79beb98a55c89d0ec8e6a41098ca1d49256ced96f9544,2024-03-27T20:15:09.337000
|
CVE-2024-2994,0,0,9187e6071eddb36de6c79beb98a55c89d0ec8e6a41098ca1d49256ced96f9544,2024-03-27T20:15:09.337000
|
||||||
CVE-2024-29943,0,0,39d573a490fc5d2b219e8af270d3feeff9aa72e4341ddd52f10b0ddfa677f78e,2024-03-22T15:34:43.663000
|
CVE-2024-29943,0,0,39d573a490fc5d2b219e8af270d3feeff9aa72e4341ddd52f10b0ddfa677f78e,2024-03-22T15:34:43.663000
|
||||||
CVE-2024-29944,0,0,4d21f9c7c1ab1ff30cce77b261f7b06b8e28526248b968d986726dab452f24fc,2024-03-25T17:15:51.670000
|
CVE-2024-29944,0,0,4d21f9c7c1ab1ff30cce77b261f7b06b8e28526248b968d986726dab452f24fc,2024-03-25T17:15:51.670000
|
||||||
CVE-2024-29945,0,1,d468839ff8eda4d8c6f46306d679b186fb3a35cb164da7996268d3c3b56c2c95,2024-03-27T19:15:49.607000
|
CVE-2024-29945,0,0,d468839ff8eda4d8c6f46306d679b186fb3a35cb164da7996268d3c3b56c2c95,2024-03-27T19:15:49.607000
|
||||||
CVE-2024-29946,0,0,1dcd38a0ed008144b587f71b29e9f0373aec4787ad19668521370ecc593e8a2d,2024-03-27T17:48:21.140000
|
CVE-2024-29946,0,0,1dcd38a0ed008144b587f71b29e9f0373aec4787ad19668521370ecc593e8a2d,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-2995,1,1,4626bf177e733f40a1ea9f83594ae62ce4072729d8dd6b6a61f3df0501cb44a7,2024-03-27T20:15:09.903000
|
CVE-2024-2995,0,0,4626bf177e733f40a1ea9f83594ae62ce4072729d8dd6b6a61f3df0501cb44a7,2024-03-27T20:15:09.903000
|
||||||
CVE-2024-2996,1,1,e21e31a1014d7574fca474fe1e8c11dded480086d1946ee193f1b733f7350546,2024-03-27T20:15:10.507000
|
CVE-2024-2996,0,0,e21e31a1014d7574fca474fe1e8c11dded480086d1946ee193f1b733f7350546,2024-03-27T20:15:10.507000
|
||||||
|
CVE-2024-2997,1,1,5c3b6b4ce06af38af512caba97a7c7ae74fa11b39083401d1d2075e5a6abd3a5,2024-03-27T21:15:48.897000
|
||||||
|
CVE-2024-2998,1,1,cd5705d6b026d396871ca4e95d4b7f9a86838b3d78e397cd9761907425fce04e,2024-03-27T21:15:49.127000
|
||||||
|
CVE-2024-2999,1,1,afb3d73c91581365be63fa5ad0aeb88c569b47d42295c65beb15f1f5f4da51b8,2024-03-27T21:15:49.407000
|
||||||
|
CVE-2024-3000,1,1,9b22952ee64e5e87fc79d5099df1aa4069802e8b7a1f4268d0cc87031d41285f,2024-03-27T22:15:10.150000
|
||||||
|
CVE-2024-3001,1,1,682d2044f9a3a30255eeea942d0bec4a353ff887fcb100216ed3c8742fc3f068,2024-03-27T22:15:10.673000
|
||||||
|
CVE-2024-3002,1,1,55dfa15a59deb16ce7a61101429cb6a8191bd094bf0dd573efdf4afe24cfc945,2024-03-27T22:15:11.300000
|
||||||
|
CVE-2024-3003,1,1,56f5a4cff6fc6f04e203cdc8d50b76613ad1ba3c8ec74b96104c067150748f8c,2024-03-27T22:15:11.880000
|
||||||
CVE-2024-30156,0,0,aff0cd27a6d4ebd55e03f44f61cc23ee9163e094843acbac5af736e684ab9391,2024-03-25T01:51:01.223000
|
CVE-2024-30156,0,0,aff0cd27a6d4ebd55e03f44f61cc23ee9163e094843acbac5af736e684ab9391,2024-03-25T01:51:01.223000
|
||||||
CVE-2024-30161,0,0,f6d00094643508d05d1e5626fca4ef83c82ab69ba4696adb329c49eff6d0ab4a,2024-03-25T01:51:01.223000
|
CVE-2024-30161,0,0,f6d00094643508d05d1e5626fca4ef83c82ab69ba4696adb329c49eff6d0ab4a,2024-03-25T01:51:01.223000
|
||||||
CVE-2024-30177,0,0,ce7cec2fca67508ea4a8b86ac0339410ad9c9cb05c2afad1960db626913e7789,2024-03-27T12:29:30.307000
|
CVE-2024-30177,0,0,ce7cec2fca67508ea4a8b86ac0339410ad9c9cb05c2afad1960db626913e7789,2024-03-27T12:29:30.307000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user