mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-04-22T16:00:38.206998+00:00
This commit is contained in:
parent
b014784987
commit
dd5be71ccf
24
CVE-2022/CVE-2022-345xx/CVE-2022-34560.json
Normal file
24
CVE-2022/CVE-2022-345xx/CVE-2022-34560.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2022-34560",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T15:15:46.420",
|
||||
"lastModified": "2024-04-22T15:15:46.420",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in PHPFox v4.8.9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the History parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cwe.mitre.org/data/definitions/79.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://mohammedshine.github.io/vulnresearch.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2022/CVE-2022-345xx/CVE-2022-34561.json
Normal file
24
CVE-2022/CVE-2022-345xx/CVE-2022-34561.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2022-34561",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T15:15:46.490",
|
||||
"lastModified": "2024-04-22T15:15:46.490",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in PHPFox v4.8.9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the video description parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mohammedshine.github.io/vulnresearch.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://v4.phpfox.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2022/CVE-2022-345xx/CVE-2022-34562.json
Normal file
24
CVE-2022/CVE-2022-345xx/CVE-2022-34562.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2022-34562",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T15:15:46.540",
|
||||
"lastModified": "2024-04-22T15:15:46.540",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in PHPFox v4.8.9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the status box."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mohammedshine.github.io/vulnresearch.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://v4.phpfox.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2022/CVE-2022-355xx/CVE-2022-35503.json
Normal file
24
CVE-2022/CVE-2022-355xx/CVE-2022-35503.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2022-35503",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T15:15:46.590",
|
||||
"lastModified": "2024-04-22T15:15:46.590",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper verification of a user input in Open Source MANO v7-v12 allows an authenticated attacker to execute arbitrary code within the LCM module container via a Virtual Network Function (VNF) descriptor. An attacker may be able execute code to change the normal execution of the OSM components, retrieve confidential information, or gain access other parts of a Telco Operator infrastructure other than OSM itself."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://osm.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://osm.etsi.org/news-events/blog/83-cve-2022-35503-disclosure",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-382xx/CVE-2023-38290.json
Normal file
20
CVE-2023/CVE-2023-382xx/CVE-2023-38290.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-38290",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T15:15:46.657",
|
||||
"lastModified": "2024-04-22T15:15:46.657",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Certain software builds for the BLU View 2 and Sharp Rouvo V Android devices contain a vulnerable pre-installed app with a package name of com.evenwell.fqc (versionCode='9020801', versionName='9.0208.01' ; versionCode='9020913', versionName='9.0209.13' ; versionCode='9021203', versionName='9.0212.03') that allows local third-party apps to execute arbitrary shell commands in its context (system user) due to inadequate access control. No permissions or special privileges are necessary to exploit the vulnerability in the com.evenwell.fqc app. No user interaction is required beyond installing and running a third-party app. The vulnerability allows local apps to access sensitive functionality that is generally restricted to pre-installed apps, such as programmatically performing the following actions: granting arbitrary permissions (which can be used to obtain sensitive user data), installing arbitrary apps, video recording the screen, wiping the device (removing the user's apps and data), injecting arbitrary input events, calling emergency phone numbers, disabling apps, accessing notifications, and much more. The software build fingerprints for each confirmed vulnerable device are as follows: BLU View 2 (BLU/B131DL/B130DL:11/RP1A.200720.011/1672046950:user/release-keys, BLU/B131DL/B130DL:11/RP1A.200720.011/1663816427:user/release-keys, BLU/B131DL/B130DL:11/RP1A.200720.011/1656476696:user/release-keys, BLU/B131DL/B130DL:11/RP1A.200720.011/1647856638:user/release-keys) and Sharp Rouvo V (SHARP/VZW_STTM21VAPP/STTM21VAPP:12/SP1A.210812.016/1KN0_0_460:user/release-keys and SHARP/VZW_STTM21VAPP/STTM21VAPP:12/SP1A.210812.016/1KN0_0_530:user/release-keys). This malicious app starts an exported activity named com.evenwell.fqc/.activity.ClickTest, crashes the com.evenwell.fqc app by sending an empty Intent (i.e., having not extras) to the com.evenwell.fqc/.FQCBroadcastReceiver receiver component, and then it sends command arbitrary shell commands to the com.evenwell.fqc/.FQCService service component which executes them with \"system\" privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-382xx/CVE-2023-38291.json
Normal file
20
CVE-2023/CVE-2023-382xx/CVE-2023-38291.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-38291",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T15:15:46.710",
|
||||
"lastModified": "2024-04-22T15:15:46.710",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in a third-party component related to ro.boot.wifimacaddr, shipped on devices from multiple device manufacturers. Various software builds for the following TCL devices (30Z and 10L) and Motorola devices (Moto G Pure and Moto G Power) leak the Wi-Fi MAC address to a system property that can be accessed by any local app on the device without any permissions or special privileges. Google restricted third-party apps from directly obtaining non-resettable device identifiers in Android 10 and higher, but in these instances they are leaked by a high-privilege process and can be obtained indirectly. The software build fingerprints for each confirmed vulnerable device are as follows: TCL A3X (TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAAZ:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAB3:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAB7:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABA:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABM:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABP:user/release-keys, and TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABS:user/release-keys); TCL 10L (TCL/T770B/T1_LITE:10/QKQ1.200329.002/3CJ0:user/release-keys and TCL/T770B/T1_LITE:11/RKQ1.210107.001/8BIC:user/release-keys); Motorola Moto G Pure (motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-2/74844:user/release-keys, motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-7/5cde8:user/release-keys, motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-10/d67faa:user/release-keys, motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-13/b4a29:user/release-keys, motorola/ellis_trac/ellis:12/S3RH32.20-42-10/1c2540:user/release-keys, motorola/ellis_trac/ellis:12/S3RHS32.20-42-13-2-1/6368dd:user/release-keys, motorola/ellis_a/ellis:11/RRH31.Q3-46-50-2/20fec:user/release-keys, motorola/ellis_vzw/ellis:11/RRH31.Q3-46-138/103bd:user/release-keys, motorola/ellis_vzw/ellis:11/RRHS31.Q3-46-138-2/e5502:user/release-keys, and motorola/ellis_vzw/ellis:12/S3RHS32.20-42-10-14-2/5e0b0:user/release-keys); and Motorola Moto G Power (motorola/tonga_g/tonga:11/RRQ31.Q3-68-16-2/e5877:user/release-keys and motorola/tonga_g/tonga:12/S3RQS32.20-42-10-6/f876d3:user/release-keys). This malicious app reads from the \"ro.boot.wifimacaddr\" system property to indirectly obtain the Wi-Fi MAC address."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-382xx/CVE-2023-38292.json
Normal file
20
CVE-2023/CVE-2023-382xx/CVE-2023-38292.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-38292",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T15:15:46.763",
|
||||
"lastModified": "2024-04-22T15:15:46.763",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Certain software builds for the TCL 20XE Android device contain a vulnerable, pre-installed app with a package name of com.tct.gcs.hiddenmenuproxy (versionCode='2', versionName='v11.0.1.0.0201.0') that allows local third-party apps to programmatically perform a factory reset due to inadequate access control. No permissions or special privileges are necessary to exploit the vulnerability in the com.tct.gcs.hiddenmenuproxy app. No user interaction is required beyond installing and running a third-party app. The software build fingerprints for each confirmed vulnerable build are as follows: TCL/5087Z_BO/Doha_TMO:11/RP1A.200720.011/PB7I-0:user/release-keys and TCL/5087Z_BO/Doha_TMO:11/RP1A.200720.011/PB83-0:user/release-keys. This malicious app sends a broadcast intent to the exported com.tct.gcs.hiddenmenuproxy/.rtn.FactoryResetReceiver receiver component, which initiates a programmatic factory reset."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-382xx/CVE-2023-38293.json
Normal file
20
CVE-2023/CVE-2023-382xx/CVE-2023-38293.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-38293",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T15:15:46.820",
|
||||
"lastModified": "2024-04-22T15:15:46.820",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Certain software builds for the Nokia C200 and Nokia C100 Android devices contain a vulnerable, pre-installed app with a package name of com.tracfone.tfstatus (versionCode='31', versionName='12') that allows local third-party apps to execute arbitrary AT commands in its context (radio user) via AT command injection due to inadequate access control and inadequate input filtering. No permissions or special privileges are necessary to exploit the vulnerability in the com.tracfone.tfstatus app. No user interaction is required beyond installing and running a third-party app. The software build fingerprints for each confirmed vulnerable device are as follows: Nokia C200 (Nokia/Drake_02US/DRK:12/SP1A.210812.016/02US_1_080:user/release-keys and Nokia/Drake_02US/DRK:12/SP1A.210812.016/02US_1_040:user/release-keys) and Nokia C100 (Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_270:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_190:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_130:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_110:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_080:user/release-keys, and Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_050:user/release-keys). This malicious app sends a broadcast Intent to the receiver component named com.tracfone.tfstatus/.TFStatus. This broadcast receiver extracts a string from the Intent and uses it as an extra when it starts the com.tracfone.tfstatus/.TFStatusActivity activity component which uses the externally controlled string as an input to execute an AT command. There are two different injection techniques to successfully inject arbitrary AT commands to execute."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-382xx/CVE-2023-38294.json
Normal file
24
CVE-2023/CVE-2023-382xx/CVE-2023-38294.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-38294",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T15:15:46.877",
|
||||
"lastModified": "2024-04-22T15:15:46.877",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Certain software builds for the Itel Vision 3 Turbo Android device contain a vulnerable pre-installed app with a package name of com.transsion.autotest.factory (versionCode='7', versionName='1.8.0(220310_1027)') that allows local third-party apps to execute arbitrary shell commands in its context (system user) due to inadequate access control. No permissions or special privileges are necessary to exploit the vulnerability in the com.transsion.autotest.factory app. No user interaction is required beyond installing and running a third-party app. The vulnerability allows local apps to access sensitive functionality that is generally restricted to pre-installed apps, such as programmatically performing the following actions: granting arbitrary permissions (which can be used to obtain sensitive user data), installing arbitrary apps, video recording the screen, wiping the device (removing the user's apps and data), injecting arbitrary input events, calling emergency phone numbers, disabling apps, accessing notifications, and much more. The confirmed vulnerable software build fingerprints for the Itel Vision 3 Turbo device are as follows: Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V92-20230105:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V86-20221118:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V78-20221101:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V64-20220803:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V61-20220721:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V58-20220712:user/release-keys, and Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V051-20220613:user/release-keys. This malicious app sends a broadcast Intent to the receiver component named com.transsion.autotest.factory/.broadcast.CommandReceiver with the path to a shell script that it creates in its scoped storage directory. Then the com.transsion.autotest.factory app will execute the shell script with \"system\" privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.tecno.com/SRC/blogdetail/99?lang=en_US",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-382xx/CVE-2023-38295.json
Normal file
20
CVE-2023/CVE-2023-382xx/CVE-2023-38295.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-38295",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T15:15:46.937",
|
||||
"lastModified": "2024-04-22T15:15:46.937",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Certain software builds for the TCL 30Z and TCL 10 Android devices contain a vulnerable, pre-installed app that relies on a missing permission that provides no protection at runtime. The missing permission is required as an access permission by components in various pre-installed apps. On the TCL 30Z device, the vulnerable app has a package name of com.tcl.screenrecorder (versionCode='1221092802', versionName='v5.2120.02.12008.1.T' ; versionCode='1221092805', versionName='v5.2120.02.12008.2.T'). On the TCL 10L device, the vulnerable app has a package name of com.tcl.sos (versionCode='2020102827', versionName='v3.2014.12.1012.B'). When a third-party app declares and requests the missing permission, it can interact with certain service components in the aforementioned apps (that execute with \"system\" privileges) to perform arbitrary files reads/writes in its context. An app exploiting this vulnerability only needs to declare and request the single missing permission and no user interaction is required beyond installing and running a third-party app. The software build fingerprints for each confirmed vulnerable device are as follows: TCL 10L (TCL/T770B/T1_LITE:11/RKQ1.210107.001/8BIC:user/release-keys) and TCL 30Z (TCL/4188R/Jetta_ATT:12/SP1A.210812.016/LV8E:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU5P:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU61:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU66:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU68:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6P:user/release-keys, and TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6X:user/release-keys). This malicious app declares the missing permission named com.tct.smart.switchphone.permission.SWITCH_DATA as a normal permission, requests the missing permission, and uses it to interact with the com.tct.smart.switchdata.DataService service component that is declared in vulnerable apps that execute with \"system\" privileges to perform arbitrary file reads/writes."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-382xx/CVE-2023-38296.json
Normal file
20
CVE-2023/CVE-2023-382xx/CVE-2023-38296.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-38296",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T15:15:46.990",
|
||||
"lastModified": "2024-04-22T15:15:46.990",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Various software builds for the following TCL 30Z and TCL A3X devices leak the ICCID to a system property that can be accessed by any local app on the device without any permissions or special privileges. Google restricted third-party apps from directly obtaining non-resettable device identifiers in Android 10 and higher, but in these instances they are leaked by a high-privilege process and can be obtained indirectly. The software build fingerprints for each confirmed vulnerable device are as follows: TCL 30Z (TCL/4188R/Jetta_ATT:12/SP1A.210812.016/LV8E:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU5P:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU61:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU66:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU68:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6P:user/release-keys, and TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6X:user/release-keys) and TCL A3X (TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAAZ:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAB3:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAB7:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABA:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABM:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABP:user/release-keys, and TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABS:user/release-keys). This malicious app reads from the \"persist.sys.tctPowerIccid\" system property to indirectly obtain the ICCID."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-382xx/CVE-2023-38297.json
Normal file
20
CVE-2023/CVE-2023-382xx/CVE-2023-38297.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-38297",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T15:15:47.043",
|
||||
"lastModified": "2024-04-22T15:15:47.043",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in a third-party com.factory.mmigroup component, shipped on devices from multiple device manufacturers. Certain software builds for various Android devices contain a vulnerable pre-installed app with a package name of com.factory.mmigroup (versionCode='3', versionName='2.1) that allows local third-party apps to perform various actions, due to inadequate access control, in its context (system user), but the functionalities exposed depend on the specific device. The following capabilities are exposed to zero-permission, third-party apps on the following devices: arbitrary AT command execution via AT command injection (T-Mobile Revvl 6 Pro 5G, T-Mobile Revvl V+ 5G, and Boost Mobile Celero 5G); programmatic factory reset (Samsung Galaxy A03S, T-Mobile Revvl 6 Pro 5G, T-Mobile Revvl V+ 5G, Boost Mobile Celero, Realme C25Y, and Lenovo Tab M8 HD), leaking IMEI (Samsung Galaxy A03S, T-Mobile Revvl 6 Pro 5G, T-Mobile Revvl V+ 5G, Boost Mobile Celero, and Realme C25Y); leaking serial number (Samsung Galaxy A03s, T-Mobile Revvl 6 Pro 5G, T-Mobile Revvl V+ 5G, Boost Mobile Celero, Realme C25Y, and Lenovo Tab M8 HD); powering off the device (Realme C25Y, Samsung Galaxy A03S, and T-Mobile Revvl 6 Pro 5G); and programmatically enabling/disabling airplane mode (Samsung Galaxy A03S, T-Mobile Revvl 6 Pro 5G, T-Mobile Revvl V+ 5G, Boost Mobile Celero, and Realme C25Y); and enabling Wi-Fi, Bluetooth, and GPS (Samsung Galaxy A03S, T-Mobile Revvl 6 Pro 5G, T-Mobile Revvl V+ 5G, Boost Mobile Celero, and Realme C25Y). No permissions or special privileges are necessary to exploit the vulnerabilities in the com.factory.mmigroup app. No user interaction is required beyond installing and running a third-party app. The software build fingerprints for each confirmed vulnerable device are as follows: Boost Mobile Celero 5G (Celero5G/Jupiter/Jupiter:11/RP1A.200720.011/SW_S98119AA1_V067:user/release-keys, Celero5G/Jupiter/Jupiter:11/RP1A.200720.011/SW_S98119AA1_V064:user/release-keys, Celero5G/Jupiter/Jupiter:11/RP1A.200720.011/SW_S98119AA1_V061:user/release-keys, and Celero5G/Jupiter/Jupiter:11/RP1A.200720.011/SW_S98119AA1_V052:user/release-keys); Samsung Galaxy A03S (samsung/a03sutfn/a03su:13/TP1A.220624.014/S134DLUDU6CWB6:user/release-keys and samsung/a03sutfn/a03su:12/SP1A.210812.016/S134DLUDS5BWA1:user/release-keys); Lenovo Tab M8 HD (Lenovo/LenovoTB-8505F/8505F:10/QP1A.190711.020/S300637_220706_BMP:user/release-keys and Lenovo/LenovoTB-8505F/8505F:10/QP1A.190711.020/S300448_220114_BMP:user/release-keys); T-Mobile Revvl 6 Pro 5G (T-Mobile/Augusta/Augusta:12/SP1A.210812.016/SW_S98121AA1_V070:user/release-keys and T-Mobile/Augusta/Augusta:12/SP1A.210812.016/SW_S98121AA1_V066:user/release-keys); T-Mobile Revvl V+ 5G (T-Mobile/Sprout/Sprout:11/RP1A.200720.011/SW_S98115AA1_V077:user/release-keys and T-Mobile/Sprout/Sprout:11/RP1A.200720.011/SW_S98115AA1_V060:user/release-keys); and Realme C25Y (realme/RMX3269/RED8F6:11/RP1A.201005.001/1675861640000:user/release-keys, realme/RMX3269/RED8F6:11/RP1A.201005.001/1664031768000:user/release-keys, realme/RMX3269/RED8F6:11/RP1A.201005.001/1652814687000:user/release-keys, and realme/RMX3269/RED8F6:11/RP1A.201005.001/1635785712000:user/release-keys). This malicious app sends a broadcast Intent to com.factory.mmigroup/.MMIGroupReceiver. This causes the com.factory.mmigroup app to dynamically register for various action strings. The malicious app can then send these strings, allowing it to perform various behaviors that the com.factory.mmigroup app exposes. The actual behaviors exposed by the com.factory.mmigroup app depend on device model and chipset. The com.factory.mmigroup app executes as the \"system\" user, allowing it to interact with the baseband processor and perform various other sensitive actions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-382xx/CVE-2023-38298.json
Normal file
20
CVE-2023/CVE-2023-382xx/CVE-2023-38298.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-38298",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T15:15:47.100",
|
||||
"lastModified": "2024-04-22T15:15:47.100",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Various software builds for the following TCL devices (30Z, A3X, 20XE, 10L) leak the device IMEI to a system property that can be accessed by any local app on the device without any permissions or special privileges. Google restricted third-party apps from directly obtaining non-resettable device identifiers in Android 10 and higher, but in these instances they are leaked by a high-privilege process and can be obtained indirectly. The software build fingerprints for each confirmed vulnerable device are as follows: TCL 30Z (TCL/4188R/Jetta_ATT:12/SP1A.210812.016/LV8E:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU5P:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU61:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU66:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU68:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6P:user/release-keys, and TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6X:user/release-keys); TCL A3X (TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAAZ:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAB3:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAB7:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABA:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABM:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABP:user/release-keys, and TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABS:user/release-keys); TCL 20XE (TCL/5087Z_BO/Doha_TMO:11/RP1A.200720.011/PB7I-0:user/release-keys and TCL/5087Z_BO/Doha_TMO:11/RP1A.200720.011/PB83-0:user/release-keys); and TCL 10L (TCL/T770B/T1_LITE:10/QKQ1.200329.002/3CJ0:user/release-keys and TCL/T770B/T1_LITE:11/RKQ1.210107.001/8BIC:user/release-keys). This malicious app reads from the \"gsm.device.imei0\" system property to indirectly obtain the device IMEI."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-382xx/CVE-2023-38299.json
Normal file
20
CVE-2023/CVE-2023-382xx/CVE-2023-38299.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-38299",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T15:15:47.157",
|
||||
"lastModified": "2024-04-22T15:15:47.157",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Various software builds for the AT&T Calypso, Nokia C100, Nokia C200, and BLU View 3 devices leak the device IMEI to a system property that can be accessed by any local app on the device without any permissions or special privileges. Google restricted third-party apps from directly obtaining non-resettable device identifiers in Android 10 and higher, but in these instances they are leaked by a high-privilege process and can be obtained indirectly. The software build fingerprints for each confirmed vulnerable device are as follows: AT&T Calypso (ATT/U318AA/U318AA:10/QP1A.190711.020/1632369780:user/release-keys); Nokia C100 (Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_190:user/release-keys and Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_270:user/release-keys); Nokia C200 (Nokia/Drake_02US/DRK:12/SP1A.210812.016/02US_1_080:user/release-keys); and BLU View 3 (BLU/B140DL/B140DL:11/RP1A.200720.011/1628014629:user/release-keys, BLU/B140DL/B140DL:11/RP1A.200720.011/1632535579:user/release-keys, BLU/B140DL/B140DL:11/RP1A.200720.011/1637325978:user/release-keys, BLU/B140DL/B140DL:11/RP1A.200720.011/1650073052:user/release-keys, BLU/B140DL/B140DL:11/RP1A.200720.011/1657087912:user/release-keys, BLU/B140DL/B140DL:11/RP1A.200720.011/1666316280:user/release-keys, and BLU/B140DL/B140DL:11/RP1A.200720.011/1672371162:user/release-keys). This malicious app reads from the \"persist.sys.imei1\" system property to indirectly obtain the device IMEI."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-383xx/CVE-2023-38300.json
Normal file
20
CVE-2023/CVE-2023-383xx/CVE-2023-38300.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-38300",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T15:15:47.210",
|
||||
"lastModified": "2024-04-22T15:15:47.210",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A certain software build for the Orbic Maui device (Orbic/RC545L/RC545L:10/ORB545L_V1.4.2_BVZPP/230106:user/release-keys) leaks the IMEI and the ICCID to system properties that can be accessed by any local app on the device without any permissions or special privileges. Google restricted third-party apps from directly obtaining non-resettable device identifiers in Android 10 and higher, but in this instance they are leaked by a high-privilege process and can be obtained indirectly. This malicious app reads from the \"persist.sys.verizon_test_plan_imei\" system property to indirectly obtain the IMEI and reads the \"persist.sys.verizon_test_plan_iccid\" system property to obtain the ICCID."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-383xx/CVE-2023-38301.json
Normal file
20
CVE-2023/CVE-2023-383xx/CVE-2023-38301.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-38301",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T15:15:47.257",
|
||||
"lastModified": "2024-04-22T15:15:47.257",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in a third-party component related to vendor.gsm.serial, shipped on devices from multiple device manufacturers. Various software builds for the BLU View 2, Boost Mobile Celero 5G, Sharp Rouvo V, Motorola Moto G Pure, Motorola Moto G Power, T-Mobile Revvl 6 Pro 5G, and T-Mobile Revvl V+ 5G devices leak the device serial number to a system property that can be accessed by any local app on the device without any permissions or special privileges. Google restricted third-party apps from directly obtaining non-resettable device identifiers in Android 10 and higher, but in these instances they are leaked by a high-privilege process and can be obtained indirectly. The software build fingerprints for each confirmed vulnerable device are as follows: BLU View 2 (BLU/B131DL/B130DL:11/RP1A.200720.011/1672046950:user/release-keys); Boost Mobile Celero 5G (Celero5G/Jupiter/Jupiter:11/RP1A.200720.011/SW_S98119AA1_V067:user/release-keys); Sharp Rouvo V (SHARP/VZW_STTM21VAPP/STTM21VAPP:12/SP1A.210812.016/1KN0_0_530:user/release-keys); Motorola Moto G Pure (motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-2/74844:user/release-keys, motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-7/5cde8:user/release-keys, motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-10/d67faa:user/release-keys, motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-13/b4a29:user/release-keys, motorola/ellis_trac/ellis:12/S3RH32.20-42-10/1c2540:user/release-keys, motorola/ellis_trac/ellis:12/S3RHS32.20-42-13-2-1/6368dd:user/release-keys, motorola/ellis_a/ellis:11/RRH31.Q3-46-50-2/20fec:user/release-keys, motorola/ellis_vzw/ellis:11/RRH31.Q3-46-138/103bd:user/release-keys, motorola/ellis_vzw/ellis:11/RRHS31.Q3-46-138-2/e5502:user/release-keys, and motorola/ellis_vzw/ellis:12/S3RHS32.20-42-10-14-2/5e0b0:user/release-keys); Motorola Moto G Power (motorola/tonga_g/tonga:11/RRQ31.Q3-68-16-2/e5877:user/release-keys and motorola/tonga_g/tonga:12/S3RQS32.20-42-10-6/f876d3:user/release-keys); T-Mobile Revvl 6 Pro 5G (T-Mobile/Augusta/Augusta:12/SP1A.210812.016/SW_S98121AA1_V070:user/release-keys); and T-Mobile Revvl V+ 5G (T-Mobile/Sprout/Sprout:11/RP1A.200720.011/SW_S98115AA1_V077:user/release-keys). This malicious app reads from the \"vendor.gsm.serial\" system property to indirectly obtain the device serial number."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-383xx/CVE-2023-38302.json
Normal file
20
CVE-2023/CVE-2023-383xx/CVE-2023-38302.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-38302",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T15:15:47.313",
|
||||
"lastModified": "2024-04-22T15:15:47.313",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A certain software build for the Sharp Rouvo V device (SHARP/VZW_STTM21VAPP/STTM21VAPP:12/SP1A.210812.016/1KN0_0_530:user/release-keys) leaks the Wi-Fi MAC address and the Bluetooth MAC address to system properties that can be accessed by any local app on the device without any permissions or special privileges. Google restricted third-party apps from directly obtaining non-resettable device identifiers in Android 10 and higher, but in this instance they are leaked by a high-privilege process and can be obtained indirectly. This malicious app reads from the \"ro.boot.wifi_mac\" system property to indirectly obtain the Wi-Fi MAC address and reads the \"ro.boot.bt_mac\" system property to obtain the Bluetooth MAC address."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21011",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:15.437",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-22T15:15:47.380",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21012",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:15.617",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-22T15:15:47.473",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21068",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:25.307",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-22T15:15:47.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21085",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:28.293",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-22T15:15:47.610",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21094",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:29.857",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-04-22T15:15:47.683",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
32
CVE-2024/CVE-2024-273xx/CVE-2024-27347.json
Normal file
32
CVE-2024/CVE-2024-273xx/CVE-2024-27347.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2024-27347",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-04-22T14:15:07.310",
|
||||
"lastModified": "2024-04-22T14:15:07.310",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Server-Side Request Forgery (SSRF) vulnerability in Apache HugeGraph-Hubble.This issue affects Apache HugeGraph-Hubble: from 1.0.0 before 1.3.0.\n\nUsers are recommended to upgrade to version 1.3.0, which fixes the issue.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/z0v71148slfkw60hsp35pl7ddjyvg01l",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-273xx/CVE-2024-27348.json
Normal file
24
CVE-2024/CVE-2024-273xx/CVE-2024-27348.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-27348",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-04-22T14:15:07.420",
|
||||
"lastModified": "2024-04-22T14:15:07.420",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "RCE-Remote Command Execution vulnerability in Apache HugeGraph-Server.This issue affects Apache HugeGraph-Server: from 1.0.0 before 1.3.0 in Java8 & Java11\n\nUsers are recommended to upgrade to version 1.3.0 with Java11 & enable the Auth system, which fixes the issue.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hugegraph.apache.org/docs/config/config-authentication/#configure-user-authentication",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/nx6g6htyhpgtzsocybm242781o8w5kq9",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2024/CVE-2024-273xx/CVE-2024-27349.json
Normal file
32
CVE-2024/CVE-2024-273xx/CVE-2024-27349.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2024-27349",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-04-22T14:15:07.470",
|
||||
"lastModified": "2024-04-22T14:15:07.470",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authentication Bypass by Spoofing vulnerability in Apache HugeGraph-Server.This issue affects Apache HugeGraph-Server: from 1.0.0 before 1.3.0.\n\nUsers are recommended to upgrade to version 1.3.0, which fixes the issue.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/dz9n9lndqfsf64t72o73r7sttrc6ocsd",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-286xx/CVE-2024-28699.json
Normal file
28
CVE-2024/CVE-2024-286xx/CVE-2024-28699.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-28699",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T15:15:47.757",
|
||||
"lastModified": "2024-04-22T15:15:47.757",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow vulnerability in pdf2json v0.70 allows a local attacker to execute arbitrary code via the GString::copy() and ImgOutputDev::ImgOutputDev function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://pdf2json.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/flexpaper/pdf2json",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/flexpaper/pdf2json/issues/52",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-323xx/CVE-2024-32368.json
Normal file
24
CVE-2024/CVE-2024-323xx/CVE-2024-32368.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-32368",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T14:15:07.560",
|
||||
"lastModified": "2024-04-22T14:15:07.560",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure Permission vulnerability in Agasta Sanketlife 2.0 Pocket 12-Lead ECG Monitor FW Version 3.0 allows a local attacker to cause a denial of service via the Bluetooth Low Energy (BLE) component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://en.wikipedia.org/wiki/Bluetooth_Low_Energy_denial_of_service_attacks/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Yashodhanvivek/Agasta-SanketLife-2.0-ECG-Monitor_-Vulnerability/tree/main",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-36xx/CVE-2024-3645.json
Normal file
47
CVE-2024/CVE-2024-36xx/CVE-2024-3645.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-3645",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-22T14:15:07.617",
|
||||
"lastModified": "2024-04-22T14:15:07.617",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Essential Addons for Elementor Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Counter widget in all versions up to, and including, 5.8.11 due to insufficient input sanitization and output escaping on user supplied attributes such as 'title_html_tag'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://essential-addons.com/changelog/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7fdad62e-d43a-4eb8-a637-0a257f3f18d4?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-4021",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-21T10:15:06.963",
|
||||
"lastModified": "2024-04-22T13:28:43.747",
|
||||
"lastModified": "2024-04-22T15:15:47.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Keenetic KN-1010, KN-1410, KN-1711, KN-1810 and KN-1910 up to 4.1.2.15. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /ndmComponents.js of the component Configuration Setting Handler. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261673 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
"value": "A vulnerability was found in Keenetic KN-1010, KN-1410, KN-1711, KN-1810 and KN-1910 up to 4.1.2.15. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /ndmComponents.js of the component Configuration Setting Handler. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261673 was assigned to this vulnerability. NOTE: The vendor is aware of this issue and plans to fix it by the end of 2024."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
74
README.md
74
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-22T14:00:38.302736+00:00
|
||||
2024-04-22T16:00:38.206998+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-22T13:28:50.310000+00:00
|
||||
2024-04-22T15:15:47.813000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,54 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
246468
|
||||
246491
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `10`
|
||||
Recently added CVEs: `23`
|
||||
|
||||
- [CVE-2024-22807](CVE-2024/CVE-2024-228xx/CVE-2024-22807.json) (`2024-04-22T12:15:07.240`)
|
||||
- [CVE-2024-22808](CVE-2024/CVE-2024-228xx/CVE-2024-22808.json) (`2024-04-22T12:15:07.313`)
|
||||
- [CVE-2024-22809](CVE-2024/CVE-2024-228xx/CVE-2024-22809.json) (`2024-04-22T12:15:07.370`)
|
||||
- [CVE-2024-22811](CVE-2024/CVE-2024-228xx/CVE-2024-22811.json) (`2024-04-22T12:15:07.427`)
|
||||
- [CVE-2024-22813](CVE-2024/CVE-2024-228xx/CVE-2024-22813.json) (`2024-04-22T12:15:07.497`)
|
||||
- [CVE-2024-22815](CVE-2024/CVE-2024-228xx/CVE-2024-22815.json) (`2024-04-22T12:15:07.550`)
|
||||
- [CVE-2024-22856](CVE-2024/CVE-2024-228xx/CVE-2024-22856.json) (`2024-04-22T12:15:07.610`)
|
||||
- [CVE-2024-28717](CVE-2024/CVE-2024-287xx/CVE-2024-28717.json) (`2024-04-22T12:15:07.663`)
|
||||
- [CVE-2024-29661](CVE-2024/CVE-2024-296xx/CVE-2024-29661.json) (`2024-04-22T12:15:07.720`)
|
||||
- [CVE-2024-4026](CVE-2024/CVE-2024-40xx/CVE-2024-4026.json) (`2024-04-22T12:15:07.780`)
|
||||
- [CVE-2022-34560](CVE-2022/CVE-2022-345xx/CVE-2022-34560.json) (`2024-04-22T15:15:46.420`)
|
||||
- [CVE-2022-34561](CVE-2022/CVE-2022-345xx/CVE-2022-34561.json) (`2024-04-22T15:15:46.490`)
|
||||
- [CVE-2022-34562](CVE-2022/CVE-2022-345xx/CVE-2022-34562.json) (`2024-04-22T15:15:46.540`)
|
||||
- [CVE-2022-35503](CVE-2022/CVE-2022-355xx/CVE-2022-35503.json) (`2024-04-22T15:15:46.590`)
|
||||
- [CVE-2023-38290](CVE-2023/CVE-2023-382xx/CVE-2023-38290.json) (`2024-04-22T15:15:46.657`)
|
||||
- [CVE-2023-38291](CVE-2023/CVE-2023-382xx/CVE-2023-38291.json) (`2024-04-22T15:15:46.710`)
|
||||
- [CVE-2023-38292](CVE-2023/CVE-2023-382xx/CVE-2023-38292.json) (`2024-04-22T15:15:46.763`)
|
||||
- [CVE-2023-38293](CVE-2023/CVE-2023-382xx/CVE-2023-38293.json) (`2024-04-22T15:15:46.820`)
|
||||
- [CVE-2023-38294](CVE-2023/CVE-2023-382xx/CVE-2023-38294.json) (`2024-04-22T15:15:46.877`)
|
||||
- [CVE-2023-38295](CVE-2023/CVE-2023-382xx/CVE-2023-38295.json) (`2024-04-22T15:15:46.937`)
|
||||
- [CVE-2023-38296](CVE-2023/CVE-2023-382xx/CVE-2023-38296.json) (`2024-04-22T15:15:46.990`)
|
||||
- [CVE-2023-38297](CVE-2023/CVE-2023-382xx/CVE-2023-38297.json) (`2024-04-22T15:15:47.043`)
|
||||
- [CVE-2023-38298](CVE-2023/CVE-2023-382xx/CVE-2023-38298.json) (`2024-04-22T15:15:47.100`)
|
||||
- [CVE-2023-38299](CVE-2023/CVE-2023-382xx/CVE-2023-38299.json) (`2024-04-22T15:15:47.157`)
|
||||
- [CVE-2023-38300](CVE-2023/CVE-2023-383xx/CVE-2023-38300.json) (`2024-04-22T15:15:47.210`)
|
||||
- [CVE-2023-38301](CVE-2023/CVE-2023-383xx/CVE-2023-38301.json) (`2024-04-22T15:15:47.257`)
|
||||
- [CVE-2023-38302](CVE-2023/CVE-2023-383xx/CVE-2023-38302.json) (`2024-04-22T15:15:47.313`)
|
||||
- [CVE-2024-27347](CVE-2024/CVE-2024-273xx/CVE-2024-27347.json) (`2024-04-22T14:15:07.310`)
|
||||
- [CVE-2024-27348](CVE-2024/CVE-2024-273xx/CVE-2024-27348.json) (`2024-04-22T14:15:07.420`)
|
||||
- [CVE-2024-27349](CVE-2024/CVE-2024-273xx/CVE-2024-27349.json) (`2024-04-22T14:15:07.470`)
|
||||
- [CVE-2024-28699](CVE-2024/CVE-2024-286xx/CVE-2024-28699.json) (`2024-04-22T15:15:47.757`)
|
||||
- [CVE-2024-32368](CVE-2024/CVE-2024-323xx/CVE-2024-32368.json) (`2024-04-22T14:15:07.560`)
|
||||
- [CVE-2024-3645](CVE-2024/CVE-2024-36xx/CVE-2024-3645.json) (`2024-04-22T14:15:07.617`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `43`
|
||||
Recently modified CVEs: `6`
|
||||
|
||||
- [CVE-2024-31994](CVE-2024/CVE-2024-319xx/CVE-2024-31994.json) (`2024-04-22T13:28:43.747`)
|
||||
- [CVE-2024-32391](CVE-2024/CVE-2024-323xx/CVE-2024-32391.json) (`2024-04-22T13:28:50.310`)
|
||||
- [CVE-2024-32392](CVE-2024/CVE-2024-323xx/CVE-2024-32392.json) (`2024-04-22T13:28:50.310`)
|
||||
- [CVE-2024-32418](CVE-2024/CVE-2024-324xx/CVE-2024-32418.json) (`2024-04-22T13:28:43.747`)
|
||||
- [CVE-2024-32652](CVE-2024/CVE-2024-326xx/CVE-2024-32652.json) (`2024-04-22T13:28:50.310`)
|
||||
- [CVE-2024-32681](CVE-2024/CVE-2024-326xx/CVE-2024-32681.json) (`2024-04-22T13:28:34.007`)
|
||||
- [CVE-2024-32682](CVE-2024/CVE-2024-326xx/CVE-2024-32682.json) (`2024-04-22T13:28:34.007`)
|
||||
- [CVE-2024-32684](CVE-2024/CVE-2024-326xx/CVE-2024-32684.json) (`2024-04-22T13:28:34.007`)
|
||||
- [CVE-2024-32687](CVE-2024/CVE-2024-326xx/CVE-2024-32687.json) (`2024-04-22T13:28:34.007`)
|
||||
- [CVE-2024-32688](CVE-2024/CVE-2024-326xx/CVE-2024-32688.json) (`2024-04-22T13:28:34.007`)
|
||||
- [CVE-2024-32690](CVE-2024/CVE-2024-326xx/CVE-2024-32690.json) (`2024-04-22T13:28:43.747`)
|
||||
- [CVE-2024-32691](CVE-2024/CVE-2024-326xx/CVE-2024-32691.json) (`2024-04-22T13:28:34.007`)
|
||||
- [CVE-2024-32693](CVE-2024/CVE-2024-326xx/CVE-2024-32693.json) (`2024-04-22T13:28:43.747`)
|
||||
- [CVE-2024-32694](CVE-2024/CVE-2024-326xx/CVE-2024-32694.json) (`2024-04-22T13:28:43.747`)
|
||||
- [CVE-2024-32695](CVE-2024/CVE-2024-326xx/CVE-2024-32695.json) (`2024-04-22T13:28:34.007`)
|
||||
- [CVE-2024-32696](CVE-2024/CVE-2024-326xx/CVE-2024-32696.json) (`2024-04-22T13:28:34.007`)
|
||||
- [CVE-2024-32697](CVE-2024/CVE-2024-326xx/CVE-2024-32697.json) (`2024-04-22T13:28:34.007`)
|
||||
- [CVE-2024-32698](CVE-2024/CVE-2024-326xx/CVE-2024-32698.json) (`2024-04-22T13:28:34.007`)
|
||||
- [CVE-2024-4014](CVE-2024/CVE-2024-40xx/CVE-2024-4014.json) (`2024-04-22T13:28:43.747`)
|
||||
- [CVE-2024-4017](CVE-2024/CVE-2024-40xx/CVE-2024-4017.json) (`2024-04-22T13:28:50.310`)
|
||||
- [CVE-2024-4018](CVE-2024/CVE-2024-40xx/CVE-2024-4018.json) (`2024-04-22T13:28:50.310`)
|
||||
- [CVE-2024-4019](CVE-2024/CVE-2024-40xx/CVE-2024-4019.json) (`2024-04-22T13:28:43.747`)
|
||||
- [CVE-2024-4020](CVE-2024/CVE-2024-40xx/CVE-2024-4020.json) (`2024-04-22T13:28:43.747`)
|
||||
- [CVE-2024-4021](CVE-2024/CVE-2024-40xx/CVE-2024-4021.json) (`2024-04-22T13:28:43.747`)
|
||||
- [CVE-2024-4022](CVE-2024/CVE-2024-40xx/CVE-2024-4022.json) (`2024-04-22T13:28:43.747`)
|
||||
- [CVE-2024-21011](CVE-2024/CVE-2024-210xx/CVE-2024-21011.json) (`2024-04-22T15:15:47.380`)
|
||||
- [CVE-2024-21012](CVE-2024/CVE-2024-210xx/CVE-2024-21012.json) (`2024-04-22T15:15:47.473`)
|
||||
- [CVE-2024-21068](CVE-2024/CVE-2024-210xx/CVE-2024-21068.json) (`2024-04-22T15:15:47.540`)
|
||||
- [CVE-2024-21085](CVE-2024/CVE-2024-210xx/CVE-2024-21085.json) (`2024-04-22T15:15:47.610`)
|
||||
- [CVE-2024-21094](CVE-2024/CVE-2024-210xx/CVE-2024-21094.json) (`2024-04-22T15:15:47.683`)
|
||||
- [CVE-2024-4021](CVE-2024/CVE-2024-40xx/CVE-2024-4021.json) (`2024-04-22T15:15:47.813`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
139
_state.csv
139
_state.csv
@ -74569,7 +74569,7 @@ CVE-2015-10129,0,0,755c8f09711ccfe9e4e53a36625543ee62c2dfc1935932dc459f38bf8ed00
|
||||
CVE-2015-1013,0,0,23f947ef2a14ceb5b694d30df996f8b07d473b30458159701da9568ed0c06853,2015-05-27T16:44:25.970000
|
||||
CVE-2015-10130,0,0,c9cd0bb1902f6b2922598f4ff9cb0b2bc2845ec1c78759c0478a96b36f83ddfe,2024-03-13T12:33:51.697000
|
||||
CVE-2015-10131,0,0,1fcef2b76049a886ad9d963ed69c1e4979e0a017d414b6472810d121d2773bc5,2024-04-11T00:53:09.873000
|
||||
CVE-2015-10132,0,1,8ae829b9c9d5d828c39a8669dfcb3a6fd5cbf2b7bbed40061f48a96956867a6a,2024-04-22T13:28:43.747000
|
||||
CVE-2015-10132,0,0,8ae829b9c9d5d828c39a8669dfcb3a6fd5cbf2b7bbed40061f48a96956867a6a,2024-04-22T13:28:43.747000
|
||||
CVE-2015-1014,0,0,bcef1257ddc4c4f77cf21cd284e8ee72e8a135c6962181cd5a3131a49fdfdb96,2019-10-09T23:13:03.937000
|
||||
CVE-2015-1015,0,0,956792c50ce2b78cf733dec45219e1d485d14d19c9547c307372ee3a9d399d12,2015-10-06T23:49:39.873000
|
||||
CVE-2015-1026,0,0,267d1aaec4f9d9694d71557c2fea9d2ff75e1a7f8f7e8d82ae922091bfb48756,2018-10-09T19:55:41.077000
|
||||
@ -121378,7 +121378,7 @@ CVE-2018-25097,0,0,347b569342894544d5b1688d12f00d8e5a46edd855e2fe6fe632b1cf81157
|
||||
CVE-2018-25098,0,0,ffbf532e396af68d9e068e3d9067d9f3bdabbc916aa9126b3546a85a032e6693,2024-04-11T01:02:05.707000
|
||||
CVE-2018-25099,0,0,4477c16cb5a3503e957873dbddbd3b50ffb7092ffd27acf2a352c93f686dfb7f,2024-03-18T12:38:25.490000
|
||||
CVE-2018-25100,0,0,26375a09020100e722ed36e37b25c669512cdaa2d61a780ec73480ee78db5d6b,2024-03-25T01:51:01.223000
|
||||
CVE-2018-25101,0,1,761fb6b9aead6e996134e5eb72fd41c720aa2aa6d48b025ce3bcec25d26934ab,2024-04-22T13:28:43.747000
|
||||
CVE-2018-25101,0,0,761fb6b9aead6e996134e5eb72fd41c720aa2aa6d48b025ce3bcec25d26934ab,2024-04-22T13:28:43.747000
|
||||
CVE-2018-2515,0,0,158f882e4275a7485a2b9ce17e7e57c4ea22cf74c55a78a9900c73a4caa327c0,2023-11-07T02:57:57.887000
|
||||
CVE-2018-2560,0,0,0bb1a26d6c05fddeb488697adb0bbe667a3dd77c1a5bc7af495c8721df5b1197,2020-08-24T17:37:01.140000
|
||||
CVE-2018-2561,0,0,b76feaa260e2f54fc8eeb8d50d578ffdd22b603f486ac4f8f5b3bc42df22fa45,2018-01-25T13:53:15.120000
|
||||
@ -201083,6 +201083,9 @@ CVE-2022-34556,0,0,aa52f6a5c659c290c408772b18dca6a09cecaa0bdb0a91b6b28d35825dfdf
|
||||
CVE-2022-34557,0,0,eecc8b4bc07828b9b1046bebce9f29c4e5bf4a70e8e91f5056094a302147e2b7,2022-08-04T13:13:11.320000
|
||||
CVE-2022-34558,0,0,fbe60d47fc8f6f689dbf168e606cdea671312f94d428e8ee9c8ecf061888f6d0,2022-08-04T18:14:00.777000
|
||||
CVE-2022-3456,0,0,b8ac2735d87fb3428674d1a6a5c18dac0738f373459ad6b97d466d7c80e95ab6,2022-10-14T09:18:29.033000
|
||||
CVE-2022-34560,1,1,b55cb5c828e5583a11ca3a4377bdfff9143213d217c11ebd1aba49832034fc74,2024-04-22T15:15:46.420000
|
||||
CVE-2022-34561,1,1,6ff737ce5dd95b8484fb56ed80160bad5d83dfd6174086db1f3a7926aed0847a,2024-04-22T15:15:46.490000
|
||||
CVE-2022-34562,1,1,3c98fb7d1b9051d0be3b772c75b3c9c1f71ab7683738783501cc9506a757e9db,2024-04-22T15:15:46.540000
|
||||
CVE-2022-34567,0,0,c7081cacbea5c4bf7e640ccd7be62566ef6f65f476c142672c62d14de0fec3d5,2022-08-09T15:16:01.133000
|
||||
CVE-2022-34568,0,0,7d7e21cf0f762a871ae8e12be991913f168ecf5cf382ff57f18f7a6cb3db8140,2023-08-08T14:21:49.707000
|
||||
CVE-2022-3457,0,0,9a924251aed79c69f1d1dd68238769c87841231341ac463480c5315265ce1509,2022-10-14T09:20:49.210000
|
||||
@ -201901,6 +201904,7 @@ CVE-2022-35493,0,0,3fbd6e82bbdf46b2fc6829f415a2cc90121509376addf5102172805f20f63
|
||||
CVE-2022-3550,0,0,756957ccd55359b7c0978f68036f94b6b7a1a89f37ba4fbd76e88b0c1375bad5,2023-11-07T03:51:25.593000
|
||||
CVE-2022-35500,0,0,e4a3e6aaf78e4048d7dd258306698c8f6c2483fa0c0e3adbb5e1e15607e82bd5,2022-11-28T15:26:40.780000
|
||||
CVE-2022-35501,0,0,0f02773590d7a16f97f67c931824c201f7e648389cd66dfda888e1343e91f455,2022-11-28T18:14:00.097000
|
||||
CVE-2022-35503,1,1,6cdecfe2846d2a4d52545cfaf49f8fe98e440fc788ea055e5ace37dcc4a6e170,2024-04-22T15:15:46.590000
|
||||
CVE-2022-35505,0,0,6c78edaa4497d167f87abd11a1b8b8aa506854460361fcf9259c1dc57318c246,2022-08-10T15:48:34.157000
|
||||
CVE-2022-35506,0,0,43651b2bf00b655a27022bdb0fe35c1cce7134fb3dcfbf8b5fc5c0c25002da17,2023-08-08T14:22:24.967000
|
||||
CVE-2022-35507,0,0,e86eac31135a1e76950fd89549b8296eb5af137be3ef8ade737d6ee342e0e457,2023-11-07T03:49:18.840000
|
||||
@ -227292,7 +227296,20 @@ CVE-2023-38286,0,0,2ea40158ec9818cea2c111e32a6cdb85ffdb6be90a0776aa260b7c62e0143
|
||||
CVE-2023-38288,0,0,4e09fe935b211d8976ac35865aa2db8a9a2746aebcba83a2a42f77442b554063,2023-11-07T04:17:14.293000
|
||||
CVE-2023-38289,0,0,393a3d2cd00bfa282df8ba81ff2cfa497d880c900a7962bc261a38de402aa26a,2023-11-07T04:17:14.330000
|
||||
CVE-2023-3829,0,0,11de827fa2f4f60302e922fe13b8c29fb210f9be0092546c6d8134dbf61befd4,2024-04-11T01:21:24.700000
|
||||
CVE-2023-38290,1,1,aa472fc82c5846ff66a4e0e23621a1b6af992286e83c1a61a34d693aad663d4b,2024-04-22T15:15:46.657000
|
||||
CVE-2023-38291,1,1,554e1de5dadfb116fd96cb5f4ed7396431b38933872662f42e8d4a880a80da2b,2024-04-22T15:15:46.710000
|
||||
CVE-2023-38292,1,1,307d0a9e2716b1d27f922d855521a3704c436d9cb62756d765612eb013dba5da,2024-04-22T15:15:46.763000
|
||||
CVE-2023-38293,1,1,6102d5113a1aa8f8f20810a6429122dd6894a6a27cc24e967811e40707d8efbe,2024-04-22T15:15:46.820000
|
||||
CVE-2023-38294,1,1,921d3df24da36f28fc21d91b444a521c477a44c1b388ed9bc8459a64561d952d,2024-04-22T15:15:46.877000
|
||||
CVE-2023-38295,1,1,78d0f56c9967f0236e1099c69001ccfeace035fd6786640e7bfdeae7cd850870,2024-04-22T15:15:46.937000
|
||||
CVE-2023-38296,1,1,ff695827b1e7e67bc58c145f7a84a49e8cbce61602ce810e2673cc2c0872b943,2024-04-22T15:15:46.990000
|
||||
CVE-2023-38297,1,1,0829990fa094439bb040922db90029644654b1d55f04db69ea5602758857d7cc,2024-04-22T15:15:47.043000
|
||||
CVE-2023-38298,1,1,36ba6c90893f57cd9ca6ca4ea5d136bfce804e7129cd15fa9d73901368a8ba5a,2024-04-22T15:15:47.100000
|
||||
CVE-2023-38299,1,1,d7adf4b6df80615c17353a0641b4697e179158c6dcb1ea1c29085b6b86a49fc9,2024-04-22T15:15:47.157000
|
||||
CVE-2023-3830,0,0,6d4ec217426ee9a3638671ac0f4ede6d6db3b4f622b64762d45397337db875e2,2024-04-11T01:21:24.783000
|
||||
CVE-2023-38300,1,1,06171492e338e0dc58404c19d789ad5ba20aa337ebdafff983dde72999086785,2024-04-22T15:15:47.210000
|
||||
CVE-2023-38301,1,1,c0bb77f81d8615f98cc6b8a7492e34dd25c47568b5a2f14e975b785cd82c397d,2024-04-22T15:15:47.257000
|
||||
CVE-2023-38302,1,1,434d7788bdd3a6f21e0ae9a99a6a89479147522a9c95deffb0aca138950d6cdf,2024-04-22T15:15:47.313000
|
||||
CVE-2023-38303,0,0,12954e6b7d49a5b662e015224c39000c66a3dd29e3015d088530a37f229066c7,2023-08-04T03:55:50.193000
|
||||
CVE-2023-38304,0,0,9e8d5aebcfc08be2edd64e8f958069ec67f79bd58d373fe39daf0d9a39b342c0,2023-08-04T03:55:41.383000
|
||||
CVE-2023-38305,0,0,1b49c2ace31bafd75cb93967b9e97913e0b9652debcea0de2ad5fd5ce8ae20f9,2023-08-04T12:57:27.330000
|
||||
@ -238303,7 +238320,7 @@ CVE-2023-7247,0,0,c2c23a7b7393abf86d5128d2c24b59326c78c84a35ee098ee0a06670d40df4
|
||||
CVE-2023-7248,0,0,73545909515ba9da671114a339e1418b83b4c4cb1fae4d9763595cd55045ee5e,2024-03-17T22:38:29.433000
|
||||
CVE-2023-7250,0,0,fa224a4f893e1e2e50282b2f218d1652024c983faf50d7c13dc5c8e5ec9643d3,2024-03-18T19:40:00.173000
|
||||
CVE-2023-7251,0,0,73fa31f7b11a2c8f7785ccd98b3beff89a3869cfbe5b74910fb2dd1341267135,2024-03-26T12:55:05.010000
|
||||
CVE-2023-7252,0,1,2392d7e3f3e585dc7390c0e965b0650ef11fa8ae2796aaf6e5db491d8ab57d29,2024-04-22T13:28:43.747000
|
||||
CVE-2023-7252,0,0,2392d7e3f3e585dc7390c0e965b0650ef11fa8ae2796aaf6e5db491d8ab57d29,2024-04-22T13:28:43.747000
|
||||
CVE-2024-0007,0,0,3bebeca11ed66b29340ad5b2f4a6fdda381d640f217ed7214dda7d3a471e9da1,2024-02-15T06:23:39.303000
|
||||
CVE-2024-0008,0,0,db70626ccf03b2491d218a1d6d38cb10870a351e02a617fba1e6e23a0ac8502b,2024-02-15T06:23:39.303000
|
||||
CVE-2024-0009,0,0,a481cbe6336f9e8c7286d10d3efcc3169667e3db231d83fec3fad506beda4652,2024-02-15T06:23:39.303000
|
||||
@ -239137,7 +239154,7 @@ CVE-2024-1052,0,0,cf5f5c6bda7a4876cbb6b2b3fc9e6319f0131320e8b68a9cc322eb9aae6817
|
||||
CVE-2024-1053,0,0,47a983161efc38cb28d2682fa08d2baacc5d0ed2824df2057fa217999f12681f,2024-02-22T19:07:27.197000
|
||||
CVE-2024-1054,0,0,4b761a967a3f90222e01c654cbefb06554641e418df54cc7b5146c275adfa7cd,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1055,0,0,97a62a6617bb3b286c4d4b3643aeb8f78fad886ecdafdfd8b3366af9abaa25ad,2024-02-14T18:59:33.780000
|
||||
CVE-2024-1057,0,1,bc2325bc6a68c0d44d023589d362ae89cc1ea47027a85188e1a7c73996460272,2024-04-22T13:28:43.747000
|
||||
CVE-2024-1057,0,0,bc2325bc6a68c0d44d023589d362ae89cc1ea47027a85188e1a7c73996460272,2024-04-22T13:28:43.747000
|
||||
CVE-2024-1058,0,0,80a5d2ee91b8c3ada73727957fcd82a05a735762aa11fd58991ea78d55e3405b,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1059,0,0,3ce9662c746bf2f12465a0b043cc52736ac7f03a00d65ac500ff02babc948f48,2024-02-05T20:50:26.783000
|
||||
CVE-2024-1060,0,0,947f187e18fc5925a95a10d5904537b397d57987c304e13aa92944e395ef1895,2024-02-05T20:49:55.413000
|
||||
@ -239493,7 +239510,7 @@ CVE-2024-1476,0,0,d66db5b934d457173411a6e7c87c116f96f98ca76565b282c78606f1c9c844
|
||||
CVE-2024-1477,0,0,b1175a71510fd842138862374f281c1bda7457d7b234a1bf81a7a2fcce39bd63,2024-03-20T13:00:16.367000
|
||||
CVE-2024-1478,0,0,54fc4d2d1af2d772e45f440cc01a56a5078a7b4f242f25febd2c561b4b9b409a,2024-03-05T13:41:01.900000
|
||||
CVE-2024-1479,0,0,75eecf66dbf69c578ea2f09e6e564cdf3b04311a1ae51ea49bee3724800fe960,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1480,0,1,e3c7fd19d7fe5ff43bf6f873c1d14cb0985599390e4107b8a61532a5f296336d,2024-04-22T13:28:43.747000
|
||||
CVE-2024-1480,0,0,e3c7fd19d7fe5ff43bf6f873c1d14cb0985599390e4107b8a61532a5f296336d,2024-04-22T13:28:43.747000
|
||||
CVE-2024-1481,0,0,9be0fdcf57b38b07a109c4217cf66bb00129c047018ee84a1da402a4636338fe,2024-04-11T12:47:44.137000
|
||||
CVE-2024-1482,0,0,61f1933d97f430ea5062371f54d100c6fb03c771024804bcdad5092bc2efbfc7,2024-02-15T06:23:39.303000
|
||||
CVE-2024-1483,0,0,1ba808cb1c0d1fdcf5723092c3904b20d4561fdb7083f3ee67b919f5196c5851,2024-04-16T13:24:07.103000
|
||||
@ -239636,7 +239653,7 @@ CVE-2024-1674,0,0,149a05d1fb99cd45cde6ef745b8b9b9e22a1fc2f3ec04b42f9d9bd60196bb1
|
||||
CVE-2024-1675,0,0,5f30a51f6df64259307e988bc84d5a52725068543b1ac51c6e60eb38234537d5,2024-02-26T16:27:52.870000
|
||||
CVE-2024-1676,0,0,75a25dbf1da186d6f531373499511171b06f00b3a04068d4f734276fb08847e7,2024-02-26T16:27:52.910000
|
||||
CVE-2024-1680,0,0,84c54ffc4a845d72d977f64fd9e3463dea2e8084066506d86ea0b1690c435926,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1681,0,1,3b5cef338a5b7a2238d5f3f0d2714a3eaa87bd7549ada34fc64b5b0cc6b90679,2024-04-22T13:28:50.310000
|
||||
CVE-2024-1681,0,0,3b5cef338a5b7a2238d5f3f0d2714a3eaa87bd7549ada34fc64b5b0cc6b90679,2024-04-22T13:28:50.310000
|
||||
CVE-2024-1683,0,0,7ecd19ae06c69275a37eebb7fa2847d878a0b37ebed5f2352a74c546e33c1b09,2024-02-23T02:42:54.547000
|
||||
CVE-2024-1684,0,0,fc25c96ed7c44e70ae89b409cf36671a8c2c9bfb5e5d2d52779f9f24c7b00664,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1685,0,0,8445feed0f23c24c027406dbf274ee8e68366861af592aeb58da42b6e5505410,2024-03-17T22:38:29.433000
|
||||
@ -239671,7 +239688,7 @@ CVE-2024-1725,0,0,d50733b72e0a7510fad89b9c9b7bf0d2638e14767cb02af892440874a7d930
|
||||
CVE-2024-1727,0,0,a7ba950431c841d63e5eda97447121909cf0b94a0e0f2a68d97b3e6ce11f4afe,2024-04-16T12:15:09.843000
|
||||
CVE-2024-1728,0,0,cc77f96c808327822a9f33d38543fe59887a1a70be257d5713ef1082e9fb55b5,2024-04-10T19:49:51.183000
|
||||
CVE-2024-1729,0,0,e89faa43e2aac352951c59ebd22691fbb83ea1dce43d3c94d1423497ec4f419a,2024-04-16T12:15:09.930000
|
||||
CVE-2024-1730,0,1,857f57a206560b77c6429eac4dad94d05861663f6ac47a2ad01d2f946b8c2572,2024-04-22T13:28:43.747000
|
||||
CVE-2024-1730,0,0,857f57a206560b77c6429eac4dad94d05861663f6ac47a2ad01d2f946b8c2572,2024-04-22T13:28:43.747000
|
||||
CVE-2024-1731,0,0,821cb90315cb9f4f7918b214fe3fccab28c34a154536cc83cdd6334afe7fa34e,2024-03-05T13:41:01.900000
|
||||
CVE-2024-1732,0,0,8ef28be53d93676ca4adde749fa15f7be0c9b44418d87a27465d25f0d08763cf,2024-04-02T12:50:42.233000
|
||||
CVE-2024-1733,0,0,0a3bd094d039e642acfbaf43d971fa4ffe129283e1d81d79ef06d054dffc1500,2024-03-17T22:38:29.433000
|
||||
@ -240335,8 +240352,8 @@ CVE-2024-21008,0,0,1f74aa2bfb98889c1bed8925030ffa9517c511fc8005172f7be9db4e39a2d
|
||||
CVE-2024-21009,0,0,af97e37904620b744b697a7c41a38f3bc0333ea61492fd7779760f5a79950296,2024-04-17T12:48:31.863000
|
||||
CVE-2024-2101,0,0,c8a12667f3958d332efb261f4cb3c420df5b094482122aff9dbb41fd78e244db,2024-04-17T12:48:07.510000
|
||||
CVE-2024-21010,0,0,0583ed22b473d6988a741927f390c519f270906aef73a2591d45e4735fe791d0,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21011,0,0,eb1e002eb792c1edefdbc682f58918f8ed609b1d759ff3c7281bc1fb7586fb46,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21012,0,0,08bd1c5d80c822a07ef05058c8c1689725bb2942d1f830ff4c7187562f3fc06a,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21011,0,1,8f8c368ee3f30b65341b77ece082caabad559cb8815d7702ed7d6231b225272a,2024-04-22T15:15:47.380000
|
||||
CVE-2024-21012,0,1,efcc536381b894205d2c997792afa24e2ccb5279bf98472cbea3d0304933b6da,2024-04-22T15:15:47.473000
|
||||
CVE-2024-21013,0,0,db21600de0498200b832ed44aabc58eb8b49c1d4a8d6c8cec7db7074ddb629ed,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21014,0,0,b080b2efe5f2fb3649d836e7607fe2a15a5965b7e113573ba21bc7eaa39a2434,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21015,0,0,f3158fa1ebc013f3ee7e3704ac259afbfadb34d45c753fdc5d90a070e709ed84,2024-04-17T12:48:31.863000
|
||||
@ -240395,7 +240412,7 @@ CVE-2024-21064,0,0,9f3d1dcc2da77fdbd8284a8907c4fea172ce50f42d0e165f15cd0a1ff6590
|
||||
CVE-2024-21065,0,0,5c383c00c861b9299dc3d8d083a6c7b2ef320b710a4f76187481f80141c2960a,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21066,0,0,de5f164f54f519fa892c56099d5df7cc21033da5ed96c3454d6c06c478b93607,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21067,0,0,a54cc3b06c3985193c6346b3dbabf214dd2faeed68c1d4b7f9a909ecc6ea6d17,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21068,0,0,e7d9522ca13576b208b08d4fd425a3f59939f919c2e5396bbec32f828b318699,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21068,0,1,90b056284ac67c84f3312caa17843414162f46147b609efb3ab8bcab9df91c74,2024-04-22T15:15:47.540000
|
||||
CVE-2024-21069,0,0,1356f0035f59f4ebe3cabf5fb137a1d458f1cefbb702a427e5d48bbf638d91b4,2024-04-17T12:48:31.863000
|
||||
CVE-2024-2107,0,0,b116f601239eee1477d732dcdf4bd402d2ca5c711c20a89df0a8e9dd54cd4cd1,2024-03-13T12:33:51.697000
|
||||
CVE-2024-21070,0,0,e8030e5c2290cb4930c1b97772fc5cd61f6499852535f41c7c876dacccf80408,2024-04-17T12:48:31.863000
|
||||
@ -240414,7 +240431,7 @@ CVE-2024-21081,0,0,8525b7c574e97940ea59e5c3f9b60a1dccb8ad8d7a8590b7c7a54ff25a5e4
|
||||
CVE-2024-21082,0,0,c26bfca8435f62f7a91a96e3ea3770988e364ed37b65c6e9e3c3fa331f2f9538,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21083,0,0,1bebe608617a7b6c263f2bd12f08aa2fed726df83e43e9cb80226396336525ef,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21084,0,0,1cb8a741188b441a8430ab8dada3a0d4db99599bc63794a25c2cddb40535089e,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21085,0,0,5c75a545bf417258ff0da52be43c2201a788dbf24bdb0529b936c35b6480cccb,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21085,0,1,7423bef7d293723948e7f7692336a4c4f435c8fc76c92741a8460985a7e7c3fc,2024-04-22T15:15:47.610000
|
||||
CVE-2024-21086,0,0,6225dbda94f0cf6447c5470d5f742e2b6c9860df4608d2672fbec36d7710ddae,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21087,0,0,a583c55d3bff66d9e8b3ea3e82126959d82631d9ebff26ed8c89dc44f6423327,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21088,0,0,0b47b6e6f749e55fe17c53a0cff2705786e752e1ca3d888cedabbece54b4b377,2024-04-17T12:48:31.863000
|
||||
@ -240423,7 +240440,7 @@ CVE-2024-21090,0,0,60f046f0a9c5304d80718309bd3f85c9cf0c6185072eb892eff16f11c4191
|
||||
CVE-2024-21091,0,0,44e6366ed6ec2fbfb62bb3aa882742738c04c1e25886d4262fb2f0c2b7a75b22,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21092,0,0,a96f28afb2f79eb08be708f78284cdf08500da8888a0d9699ed9e4b0d6e8e593,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21093,0,0,3d565421d62fe80376ef2125e9dfb06fdc2a836fda042dda6ad1a1534f2a4f7d,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21094,0,0,876c177a2adf738a018a4a0fe587e5ffec332f3d1d0d3e57dfe45071b19b0a59,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21094,0,1,aa2a61960fd4fa521e8a1ca2553d138d7964c870b77a3be8a092c2a795bdfda4,2024-04-22T15:15:47.683000
|
||||
CVE-2024-21095,0,0,5ad9583e4e50b36f664407f6f6164a53dc891483d679c27c4541f930caca17b4,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21096,0,0,ca67a44a0e0eaa923750522145c8947551bcd426be3766e54dffcdf25890c9ef,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21097,0,0,8349406a296787533db135239586ab1e354af73ee7e59b17b17098f82af1b697,2024-04-17T12:48:31.863000
|
||||
@ -241305,13 +241322,13 @@ CVE-2024-22780,0,0,7f3239e2db375f765f90f52543bdbcccb2a20757a7cd068a76d9a55c97657
|
||||
CVE-2024-2279,0,0,840779d3b8dde5a422cda59c3e85c02ce57b31f4846ea3c8574f9bd433ec61e7,2024-04-12T12:43:57.400000
|
||||
CVE-2024-22795,0,0,74ecb133836626bb2368eab49a74768ea23b2ee0b898200b84b5a979cafed20f,2024-02-15T17:53:54.680000
|
||||
CVE-2024-2280,0,0,b064f3feb8722910a4651d8fcd5aa5f1892c8cb4f5e0e1796b328260936ab591,2024-04-05T21:15:09.660000
|
||||
CVE-2024-22807,1,1,8db10dd8e7cfd45827efc498f5083ae2402aa6183b07533b22eb0bba2fa8be6d,2024-04-22T13:28:34.007000
|
||||
CVE-2024-22808,1,1,e892853d7e45804ff4b8420a14390907147a48d162272f56b22d86c13a952069,2024-04-22T13:28:34.007000
|
||||
CVE-2024-22809,1,1,1213100fcc3141cd8a323799d748f199b5095fc96d6acfac253f1ba653ee3e62,2024-04-22T13:28:34.007000
|
||||
CVE-2024-22807,0,0,8db10dd8e7cfd45827efc498f5083ae2402aa6183b07533b22eb0bba2fa8be6d,2024-04-22T13:28:34.007000
|
||||
CVE-2024-22808,0,0,e892853d7e45804ff4b8420a14390907147a48d162272f56b22d86c13a952069,2024-04-22T13:28:34.007000
|
||||
CVE-2024-22809,0,0,1213100fcc3141cd8a323799d748f199b5095fc96d6acfac253f1ba653ee3e62,2024-04-22T13:28:34.007000
|
||||
CVE-2024-2281,0,0,f3438c7ab7641dd719863e24482dbf8314b67feb70036f1e8b4e26133f1de72b,2024-04-11T01:25:21.293000
|
||||
CVE-2024-22811,1,1,780b24ab418fba23767e654465472b4e88d8b5068726c4c05b576b551f04b890,2024-04-22T13:28:34.007000
|
||||
CVE-2024-22813,1,1,90f4ed95adc18ff58534e2fb72046185cb29c561cab34ca67286486b185aa98a,2024-04-22T13:28:34.007000
|
||||
CVE-2024-22815,1,1,09b9b029e34aca0b588d70480e5c361cd6700cd278999cb9693d90ea2691b322,2024-04-22T13:28:34.007000
|
||||
CVE-2024-22811,0,0,780b24ab418fba23767e654465472b4e88d8b5068726c4c05b576b551f04b890,2024-04-22T13:28:34.007000
|
||||
CVE-2024-22813,0,0,90f4ed95adc18ff58534e2fb72046185cb29c561cab34ca67286486b185aa98a,2024-04-22T13:28:34.007000
|
||||
CVE-2024-22815,0,0,09b9b029e34aca0b588d70480e5c361cd6700cd278999cb9693d90ea2691b322,2024-04-22T13:28:34.007000
|
||||
CVE-2024-22817,0,0,eb15e92e9d0667f5c190034654618b8eeeb0dfc84cfb608c765282f0f5a04fcf,2024-01-23T14:23:18.990000
|
||||
CVE-2024-22818,0,0,cb135bb8e203bf8edbad428e88de582fd5c2ab18516529aab641b2e535a51f86,2024-01-23T14:23:46.073000
|
||||
CVE-2024-22819,0,0,0eb9b3434533fedaa8cbae17f2a15bb53110d617baacce71ff390d25b5e6cc78,2024-01-23T14:23:51.943000
|
||||
@ -241325,7 +241342,7 @@ CVE-2024-22851,0,0,e3b3a4173f66bde18bcde8b4d6e07ed058612b81ace293aa36efd8837ff83
|
||||
CVE-2024-22852,0,0,fba9226bfac500a19dd8b91a9788eed1682675a652e0b6dd1f0ee08e7df876f5,2024-02-13T18:16:51.790000
|
||||
CVE-2024-22853,0,0,ec6a06bd931391a16658f5323e2bffe5ddc884df4aacc34598a685bd3979b258,2024-02-12T17:50:31.950000
|
||||
CVE-2024-22854,0,0,8b8b90cd6c1c9786e2fb5396ca19284ddab9c4ff42eae4bf034495afa4860075,2024-02-16T13:37:51.433000
|
||||
CVE-2024-22856,1,1,213d31904e80643bb407e6a04df4ca51d71b3d3c5fddca041bc06b4b94f6e837,2024-04-22T13:28:34.007000
|
||||
CVE-2024-22856,0,0,213d31904e80643bb407e6a04df4ca51d71b3d3c5fddca041bc06b4b94f6e837,2024-04-22T13:28:34.007000
|
||||
CVE-2024-22857,0,0,dc8c498662e053f2e9a39f301d349f3ad8950912cf2843180c278fecc58efab5,2024-04-19T01:15:06.297000
|
||||
CVE-2024-22859,0,0,f21c1f55163f2e8148347c74f0ecf53a5beec677d1447140d631069d639d308a,2024-04-11T01:24:46.117000
|
||||
CVE-2024-2286,0,0,657861131740076699183211e8ffc4b18c067668bfd7d2635b81e0ec9c54a21c,2024-03-13T18:15:58.530000
|
||||
@ -241347,7 +241364,7 @@ CVE-2024-22900,0,0,254e082003561180ecd392f3a9c102fc841e1bde56aa59cbf964fe2817289
|
||||
CVE-2024-22901,0,0,8a50b23cdceca6b003b10fb1d10a0eb69c8b3f5c24256d493c5ce2629f318cde,2024-02-07T17:37:28.593000
|
||||
CVE-2024-22902,0,0,fbf1665f8a0c495bb4c5734518bdb188f14e0ba8d35feaea9e626f6d31bec387,2024-02-07T17:37:40.617000
|
||||
CVE-2024-22903,0,0,b065e43b3567286ff1c11abbe22fe1f66bcb052a0745b0d35654b96ab7e2d4be,2024-02-07T17:37:48.350000
|
||||
CVE-2024-22905,0,1,cfff96a7bd3fe64b5e210d15d7b0cb253e9ac8308b72b2526d9bd7beb7986173,2024-04-22T13:28:50.310000
|
||||
CVE-2024-22905,0,0,cfff96a7bd3fe64b5e210d15d7b0cb253e9ac8308b72b2526d9bd7beb7986173,2024-04-22T13:28:50.310000
|
||||
CVE-2024-2291,0,0,5a0d8dd1dccfcea1bdf6701723096db89286716c354b8745f8eab33b1e17acb9,2024-03-20T17:18:21.343000
|
||||
CVE-2024-22911,0,0,2c6bed04bf2f4f5833b6ceb73482cd6c764a8005f6b7e06026bae5b9181bc291,2024-01-25T15:26:07.957000
|
||||
CVE-2024-22912,0,0,f6bf556aaf07db2588cac5054f205bfcba2fbc32115a360994ef805c2fa463ec,2024-01-25T15:26:24.400000
|
||||
@ -243816,6 +243833,9 @@ CVE-2024-27343,0,0,45c7ed1c4eed9ea624ee8b5def6c8c375e3f0f3011b69d57beef7384d6bbc
|
||||
CVE-2024-27344,0,0,8aefe242670cc36dda0dce3798a7acb646a2bde29ffc66b45e4357a4348e3048,2024-04-03T17:24:18.150000
|
||||
CVE-2024-27345,0,0,fe911dc85212419c00cd206bd5ce379cb6ba140e18be3c5480a17f10aedd8eb1,2024-04-03T17:24:18.150000
|
||||
CVE-2024-27346,0,0,386b701029626639fdc143fc77e569108911d00594cd7781652dc458bf9d469e,2024-04-03T17:24:18.150000
|
||||
CVE-2024-27347,1,1,1b88983989e0d31819b45651d21a1258b36d997775b8610ccf32365340580424,2024-04-22T14:15:07.310000
|
||||
CVE-2024-27348,1,1,a980c111c4411e925968fa116acbecf63ed723ea5883f896a7e109bd13a0b986,2024-04-22T14:15:07.420000
|
||||
CVE-2024-27349,1,1,33f2dd6c9c189231645f2601e2d6c164e75ab277ceac1b42d3f50b843954a4a8,2024-04-22T14:15:07.470000
|
||||
CVE-2024-2735,0,0,0fc46982ae2bb65c79d893d71d43586449f915b196de8114a5c92c3c81993284,2024-04-10T13:23:38.787000
|
||||
CVE-2024-27350,0,0,5597abb0ceda36739a00afc67d358c9c0f6015c501af0eb35c72e1c96465f58f,2024-02-26T16:32:25.577000
|
||||
CVE-2024-27351,0,0,520ca3352966dfa67fe05df7be34472788802f7733d01bdf3c788fd202eaad5b,2024-04-20T03:15:06.900000
|
||||
@ -244370,13 +244390,14 @@ CVE-2024-28681,0,0,ab17b4fa17ebf8eb3957de6dd91fe40414f05e3821f3c9e15b7d517b0542f
|
||||
CVE-2024-28682,0,0,5152c6a3d71ef9256a4c100c1d46f03254aeda535ba4c982fc323d50132c0ded,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28683,0,0,5e05ced0c6e7903250735aacec4ea0453b4627030ef2e380ed47238db8bee0a9,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28684,0,0,5e8cf612c51178ce0b7db285e9479c0e753c1929aaa4babe1afc56000a57a8d5,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28699,1,1,48d6a2edadfcdeed21ae2731af60b3e334c291273f6fe5b0dde98deae2200e20,2024-04-22T15:15:47.757000
|
||||
CVE-2024-2871,0,0,e9558decb3cc4c54584df3eb06fe6d1bb0c12954fd3dc0d6fb0a6933455338ba,2024-04-10T13:23:38.787000
|
||||
CVE-2024-28713,0,0,beab16cae2dae6cd08028a095390b29624a6437ed474d84784c32091c71ece60,2024-03-28T20:53:20.813000
|
||||
CVE-2024-28714,0,0,05d12d8ac80645ded00d1ead25c51baa98cf4af4d5a078fc724fffec6f7925ec,2024-03-29T12:45:02.937000
|
||||
CVE-2024-28715,0,0,054dc6dc725c244acb835446cab8d82270f7d8ffd8311eb9aca1ba238d62a38d,2024-03-20T13:00:16.367000
|
||||
CVE-2024-28717,1,1,8c421a78182b478df2458664e4a4d7a91a5381c69c010d35ebfa2b713f2241a8,2024-04-22T13:28:34.007000
|
||||
CVE-2024-28717,0,0,8c421a78182b478df2458664e4a4d7a91a5381c69c010d35ebfa2b713f2241a8,2024-04-22T13:28:34.007000
|
||||
CVE-2024-28718,0,0,5f0a839ac4250fecd45af64be191fc810afd4c63b89d4fc0f63a8d6841ad970e,2024-04-15T13:15:51.577000
|
||||
CVE-2024-28722,0,1,9f3d9610dcb3a88962a775c4bceb1adf34898d2ad0bcbbf8f024b9f550b378b8,2024-04-22T13:28:43.747000
|
||||
CVE-2024-28722,0,0,9f3d9610dcb3a88962a775c4bceb1adf34898d2ad0bcbbf8f024b9f550b378b8,2024-04-22T13:28:43.747000
|
||||
CVE-2024-2873,0,0,38b44d61d3230fcaba1c551f8073fe8dda4eadd0cd50d8705b668e3c4529f628,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28732,0,0,ec5e6c9882e97cf45b4c95c1c5ffa7b0d32a1a92ed89d346b2a432d5adcd9a14,2024-04-08T18:48:40.217000
|
||||
CVE-2024-28734,0,0,f4687488b267ac163f3e0d4b9d3eb38f6f5a041c19b985a560624c627a7f4e16,2024-04-01T21:15:33.200000
|
||||
@ -244642,7 +244663,7 @@ CVE-2024-29203,0,0,132c3d83e906b655066bee1fc4d3f90e18def73beb9178e8cc6662be34f71
|
||||
CVE-2024-29204,0,0,ec859d0e8fa3a1772fb0be403427e1a00a2b3fa2a9c0decec9ddc0392ff924fb,2024-04-19T13:10:25.637000
|
||||
CVE-2024-2921,0,0,6f7f3b512cf8e7465b0aea1823cce56bf608a3c1f40869feddab084c3da126e6,2024-04-09T19:15:38.423000
|
||||
CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000
|
||||
CVE-2024-29217,0,1,6aea24c6a3b30090b34762347afd8fb6e2aa0ed6c7d8e921a0460a2ce19272af,2024-04-22T13:28:43.747000
|
||||
CVE-2024-29217,0,0,6aea24c6a3b30090b34762347afd8fb6e2aa0ed6c7d8e921a0460a2ce19272af,2024-04-22T13:28:43.747000
|
||||
CVE-2024-29218,0,0,671653d28334eb1b29de221436a2464edfec5acf42885adc45ca7b102375c361,2024-04-15T13:15:31.997000
|
||||
CVE-2024-29219,0,0,4481109cba1c43e8c57c43af416b7ffd0dce43a288900ab9b937cea0ab69c2a2,2024-04-15T13:15:31.997000
|
||||
CVE-2024-29220,0,0,1b65a8d6c350605472de3d4a64b6e0ccc843853d705695d9c55dd012b24dc815,2024-04-11T12:47:44.137000
|
||||
@ -244762,7 +244783,7 @@ CVE-2024-29640,0,0,87923c5f8022466da2d8ef6f4760770a9b5d77108f7ca786dd890e142c1a6
|
||||
CVE-2024-29644,0,0,39829980cc0c3cec42e83f1a7d1e74f651bed504f90005be4e46042a91527a65,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29650,0,0,8ad374bfabee755625e57dff59b85656db535734df280985070b11f8f0b8c3b6,2024-03-25T16:43:06.137000
|
||||
CVE-2024-2966,0,0,474ae2e5b1d6c6447ca9bee38c5e4dafcb7b2c2503070dea1f4351179cfe9798,2024-04-11T12:47:44.137000
|
||||
CVE-2024-29661,1,1,0af56c9e6c3f4789c6952b6fc2267b505cb820e8c95b985131711686eeb372e4,2024-04-22T13:28:34.007000
|
||||
CVE-2024-29661,0,0,0af56c9e6c3f4789c6952b6fc2267b505cb820e8c95b985131711686eeb372e4,2024-04-22T13:28:34.007000
|
||||
CVE-2024-29666,0,0,a8926fce030310567330d9b7c126003f732556a2ce979a6a3fd232707f8bbd99,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29667,0,0,1425649af0fe5303ac647a61948436bd641374e6a3c12789edb4485c777699d5,2024-04-01T01:12:59.077000
|
||||
CVE-2024-29672,0,0,1eb55fec3ce5ae998cf80be88c51c3b9d6ba2532b7f0accc6fb84646ec36fc57,2024-04-05T12:40:52.763000
|
||||
@ -244773,7 +244794,7 @@ CVE-2024-2969,0,0,6a92a8306d48d89fa5e78ba3ed0ad9ff22c73e6ed21c55f23493a4ccc01056
|
||||
CVE-2024-2970,0,0,55e4260b924ae12c92b2afb309e159a34e3ff23ffc5827039ee4146bc8707502,2024-03-29T12:45:02.937000
|
||||
CVE-2024-2971,0,0,898bc718d43d0c390c6d16657d6a8f74b1bed4195ca2be9f6e03b60807e37565,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29732,0,0,f91e9a53bb8c78b9eaa9a43eb2f41d18e7980ac57e838dd405b45ee97833017f,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29733,0,1,57292da3a62666831c1051ff842ae2b0d158365061ef113f38677b32f17b4e9e,2024-04-22T13:28:43.747000
|
||||
CVE-2024-29733,0,0,57292da3a62666831c1051ff842ae2b0d158365061ef113f38677b32f17b4e9e,2024-04-22T13:28:43.747000
|
||||
CVE-2024-29734,0,0,8d99461dc9b8889d99315bde49edbce5536e3a20b88b53095157d8f0afc148b5,2024-04-03T12:38:04.840000
|
||||
CVE-2024-29735,0,0,286fbba4f7cb1bbd32eae740efb468430068245735dc6c522579c415dcd44e18,2024-03-27T12:29:41.530000
|
||||
CVE-2024-29738,0,0,99465af485b39ff68e105b0428c69eb9adbd1c8e009fe9a3569be9db8bf56cc1,2024-04-08T18:49:25.863000
|
||||
@ -245414,7 +245435,7 @@ CVE-2024-30736,0,0,c9d1cbf13e640c6d0aad30d5b12c1d8e9eb4c675776ee84065ff7ca937010
|
||||
CVE-2024-30737,0,0,1c036a16278ee8ea2e333e89f0d66457a587f7e2e9da86fd57591a8972289c80,2024-04-17T02:15:12.117000
|
||||
CVE-2024-3077,0,0,df42d4a62ceb1c6a6275b9b1d36ac8da42c0ae3505d0e07beac8238605b5504b,2024-03-29T12:45:02.937000
|
||||
CVE-2024-3078,0,0,de9e294582cbb558bf2417239a323549d99f034f1b581828b43e34b1ad1f5683,2024-04-11T01:25:52.940000
|
||||
CVE-2024-30799,0,1,eae5bca102ad0c1fe3f236f7e51af89eca892740403953a6086f43b81ad7d92b,2024-04-22T13:28:43.747000
|
||||
CVE-2024-30799,0,0,eae5bca102ad0c1fe3f236f7e51af89eca892740403953a6086f43b81ad7d92b,2024-04-22T13:28:43.747000
|
||||
CVE-2024-30806,0,0,3c4bbd71defb52c4de24f9ad1626459edef6b60997b976e6d74aead4ee0b3b0f,2024-04-02T20:31:58.463000
|
||||
CVE-2024-30807,0,0,8463e04fd42dedab289dad3fe1621f8f66d69fb63942da8a4e7f4baade23226e,2024-04-02T20:31:58.463000
|
||||
CVE-2024-30808,0,0,3edb296009dfb16a5061a2505986b3903e36250320b7a7a1ea6af0d775f588e5,2024-04-02T20:31:58.463000
|
||||
@ -245477,7 +245498,7 @@ CVE-2024-30952,0,0,45f3818300706503aa11d9788e132ab06eaeaa5db69128a0c2116be2f61ad
|
||||
CVE-2024-30953,0,0,b6048a3223dd71969afb665512f3c96be52d96e721358fb67ff9cf9a8128e438,2024-04-17T20:08:21.887000
|
||||
CVE-2024-30965,0,0,0e44dd5d951a25ac3e8873a32678a3145da47d1060cb5312576a9c0471b643ad,2024-04-02T18:12:16.283000
|
||||
CVE-2024-3097,0,0,806f9356cc4622ff9b031006ecb4c94e90929f098cb7a0b907d59fb3d0d09798,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30974,0,1,fad1ff421513e997a755a646f437b1cf2946e8e72ed4701dccf29e92d3c1baae,2024-04-22T13:28:50.310000
|
||||
CVE-2024-30974,0,0,fad1ff421513e997a755a646f437b1cf2946e8e72ed4701dccf29e92d3c1baae,2024-04-22T13:28:50.310000
|
||||
CVE-2024-30977,0,0,0a99023cc49f8723c27525ea3fd6d09c0a18e0536fb7ad1e37e70ef0654b9714,2024-04-08T18:49:25.863000
|
||||
CVE-2024-30979,0,0,80ab36bca498e33975593d086ceeeedf107c2c6f87bef059b959bbe8c3731bf4,2024-04-17T16:51:07.347000
|
||||
CVE-2024-3098,0,0,6c9612ddcc0eabe1134a3c49c1d4f4b4a8fb99e39689761d9db9b207a4883fdf,2024-04-10T19:49:51.183000
|
||||
@ -245720,7 +245741,7 @@ CVE-2024-31442,0,0,bd0c0777ffd79341352bfaf4bac13513052ca764dc9351410c56fde55ac0f
|
||||
CVE-2024-31446,0,0,1a21e0c4eec911630e360128cbf20c658c7da3792258e417cd0bfcd4e43962d1,2024-04-17T12:48:31.863000
|
||||
CVE-2024-31447,0,0,1686ea065902cff688a9e0e72258f816c60304799af9644c7db6f9ae37572786,2024-04-08T18:48:40.217000
|
||||
CVE-2024-3145,0,0,30d7039ca4630abed1ac79b5e5068d170488eb4a6c9740ed0209e585b5eb2f84,2024-04-11T01:25:55.100000
|
||||
CVE-2024-31450,0,1,39c51ef3dbf7180860d74ae8e43591aa884e429980b1a235ef41f58df58087bc,2024-04-22T13:28:50.310000
|
||||
CVE-2024-31450,0,0,39c51ef3dbf7180860d74ae8e43591aa884e429980b1a235ef41f58df58087bc,2024-04-22T13:28:50.310000
|
||||
CVE-2024-31451,0,0,5cd63a7516500f280402302edc80f37e0a69defff35e484ff50f396618580060,2024-04-19T17:15:54.780000
|
||||
CVE-2024-31452,0,0,45e5c903cec7cbe18673da15b04f8c57c9e71a7a28162860a533aebab0360b95,2024-04-17T12:48:07.510000
|
||||
CVE-2024-31453,0,0,1b1ead27c6870d2affe09236bc3123473d08b6ddf2bca0a49b08400d4b48a120,2024-04-10T13:24:00.070000
|
||||
@ -245756,7 +245777,7 @@ CVE-2024-31580,0,0,e997e3f25c911fc04de779fa9168de4ebef90131449df2b2dfb57ff9ee6e6
|
||||
CVE-2024-31581,0,0,d4a48f7cd6a3f11d5bd7242e0dfac3a15852b862f2cf96a614cc33083f70d5cc,2024-04-17T20:08:21.887000
|
||||
CVE-2024-31582,0,0,fe103b3051ee1c8e8159af1dc183525df22a48d013c16c8b28c94f3527365cf7,2024-04-17T20:08:21.887000
|
||||
CVE-2024-31583,0,0,eec650b2d1a967bea49e6ce27fbd51a980897e8355103b69036a477d8192c36f,2024-04-17T20:08:21.887000
|
||||
CVE-2024-31584,0,1,7bd8b8c71b3cbc23e6db4c252c0ef145f85399e414092971d73799c932fbe46b,2024-04-22T13:28:50.310000
|
||||
CVE-2024-31584,0,0,7bd8b8c71b3cbc23e6db4c252c0ef145f85399e414092971d73799c932fbe46b,2024-04-22T13:28:50.310000
|
||||
CVE-2024-31585,0,0,ca870b59b85ac9b6cfa4a8fee4976da074575d82dd3c02566198bbf835617bd1,2024-04-17T20:08:21.887000
|
||||
CVE-2024-31587,0,0,6aaa189139b27b06a683c1dac5c91d5124a2971d077e3d9157f284239b68e61a,2024-04-19T16:19:49.043000
|
||||
CVE-2024-3159,0,0,372cd652e2632717ba4bd0c7aadd6df6465a25a12553b2fe9846988ffe1987d3,2024-04-19T23:15:11.687000
|
||||
@ -245860,10 +245881,10 @@ CVE-2024-31986,0,0,43afc54623bebf262d37dd906c7efd37eb56ded00de01504423bee1057bdc
|
||||
CVE-2024-31987,0,0,60d0bda711bcaaea27f455d1e392e029e767cb7013c9064db5359f058621c0df,2024-04-11T12:47:44.137000
|
||||
CVE-2024-31988,0,0,51c3ab0f42083010a6201d8c5e43ded78b92f566d0bca12748a99bba4a186fcd,2024-04-11T12:47:44.137000
|
||||
CVE-2024-31990,0,0,77ac4f6468312f14b2ffccf0214dd51bfa3f27166872b6029ecb265054e5d1ca,2024-04-16T13:24:07.103000
|
||||
CVE-2024-31991,0,1,084d7dd9d9efb52ebd37b0899dddb9aa3e6df4c2dec8b6459a0c084eed997c1b,2024-04-22T13:28:50.310000
|
||||
CVE-2024-31992,0,1,16f137e2cce79630840976201d80964696f3568c3892a903d39c3af6f94d1f69,2024-04-22T13:28:50.310000
|
||||
CVE-2024-31993,0,1,c52760b1434a3fd90288429257de75f706037011e72eaec78e8c6fea078d30da,2024-04-22T13:28:50.310000
|
||||
CVE-2024-31994,0,1,0bbd509bc505f57934a1390958b5deca30a5e56e0049f806caed65f3fe335c46,2024-04-22T13:28:43.747000
|
||||
CVE-2024-31991,0,0,084d7dd9d9efb52ebd37b0899dddb9aa3e6df4c2dec8b6459a0c084eed997c1b,2024-04-22T13:28:50.310000
|
||||
CVE-2024-31992,0,0,16f137e2cce79630840976201d80964696f3568c3892a903d39c3af6f94d1f69,2024-04-22T13:28:50.310000
|
||||
CVE-2024-31993,0,0,c52760b1434a3fd90288429257de75f706037011e72eaec78e8c6fea078d30da,2024-04-22T13:28:50.310000
|
||||
CVE-2024-31994,0,0,0bbd509bc505f57934a1390958b5deca30a5e56e0049f806caed65f3fe335c46,2024-04-22T13:28:43.747000
|
||||
CVE-2024-31995,0,0,66dfe11a273e9e10d102f877b390a578235479d84ca6da17689c27557fdb1258,2024-04-11T12:47:44.137000
|
||||
CVE-2024-31996,0,0,4bc228afb2f37b1ef8f323b1e059ab55f2f5ea66358ab4f20e2844a94396b7b8,2024-04-11T12:47:44.137000
|
||||
CVE-2024-31997,0,0,d95ca9b47538ea73a196934e9c1064ac6bfd03df35a75cfa6de5a54ba7f14856,2024-04-11T12:47:44.137000
|
||||
@ -246006,10 +246027,11 @@ CVE-2024-32343,0,0,862e8e3fbd92547c244c5be90d83e1339d7a18685f98ec207b76da84ef301
|
||||
CVE-2024-32344,0,0,47eb1a8da70bc975fdd4934340a6940373147153bf19749b3895ed5e2ae65a6e,2024-04-18T13:04:28.900000
|
||||
CVE-2024-32345,0,0,3c4abcf95580a888529432fa6af7f966006546429f30889ca33584d7f7f45c9a,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3235,0,0,87b194ac57d76e3164f790cf262b7f15e5577bfab72d12fd067ebb5070eb75e0,2024-04-10T13:23:38.787000
|
||||
CVE-2024-32391,0,1,b9d2ada2509e9e002fcf7fc50c30e5fa24f6bd077b7f0fab83dbe519d76755ce,2024-04-22T13:28:50.310000
|
||||
CVE-2024-32392,0,1,e9dc77721f231608117a79f151c9f1e6be5cd7530989658bd3dd67ce41889ce5,2024-04-22T13:28:50.310000
|
||||
CVE-2024-32368,1,1,320ba457a0782b53c00011fd3775e2202f9a5e70399db1c563cf9afd31fa33ba,2024-04-22T14:15:07.560000
|
||||
CVE-2024-32391,0,0,b9d2ada2509e9e002fcf7fc50c30e5fa24f6bd077b7f0fab83dbe519d76755ce,2024-04-22T13:28:50.310000
|
||||
CVE-2024-32392,0,0,e9dc77721f231608117a79f151c9f1e6be5cd7530989658bd3dd67ce41889ce5,2024-04-22T13:28:50.310000
|
||||
CVE-2024-32409,0,0,2cc0bf26ecd8938fd89992a98bae2541af2d19072f0bc8cdc919759b6ea980aa,2024-04-19T16:19:49.043000
|
||||
CVE-2024-32418,0,1,95e561b293359ffe96c6d53d8bd7aa5dba172944f2d114b653ec1a760700c5d9,2024-04-22T13:28:43.747000
|
||||
CVE-2024-32418,0,0,95e561b293359ffe96c6d53d8bd7aa5dba172944f2d114b653ec1a760700c5d9,2024-04-22T13:28:43.747000
|
||||
CVE-2024-32428,0,0,87a3edde2c4b0ace5bed90e6337013a3436ae0c663c6eeed3dbaf59e4e702dff,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32429,0,0,eb5275541e0171326bf869e836661a3d04172e6e7d4adfaa9657297147332796,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3243,0,0,c0b3d501de451bd25695181364b192f45772ac0c3be190b71ef36c93a88e910d,2024-04-16T13:24:07.103000
|
||||
@ -246166,25 +246188,25 @@ CVE-2024-32633,0,0,8ac8ce6a1ac201ef8dc36e7fab192ecb8b1b583d781df940a83a5707e3155
|
||||
CVE-2024-32634,0,0,399e2bba8e548c1c98770d2f478e96e69a60afbc020788dd69a365e3ae504be6,2024-04-16T13:24:07.103000
|
||||
CVE-2024-32644,0,0,1c6536d9b118a22e007df0508c4274faf4a9f6bb52ca2e5c9b157aa559740e67,2024-04-19T16:19:49.043000
|
||||
CVE-2024-32650,0,0,3ec938fa621d2b09851dc7c9c4a0bab9e06500eb12a687bac8f1323156efc6df,2024-04-19T16:19:49.043000
|
||||
CVE-2024-32652,0,1,507899e8cc0ef719a4df6a408b43b1aeaf42e8d25b41dcf9a35617406adccb9d,2024-04-22T13:28:50.310000
|
||||
CVE-2024-32652,0,0,507899e8cc0ef719a4df6a408b43b1aeaf42e8d25b41dcf9a35617406adccb9d,2024-04-22T13:28:50.310000
|
||||
CVE-2024-3266,0,0,254a5ba127b10ac48f062b62dbe4c90ef51eaba1ed741161e5a22416cbb32240,2024-04-10T13:23:38.787000
|
||||
CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000
|
||||
CVE-2024-32681,0,1,30385cf8415af0417b19f52d5eb22ace0b875cd333ead985847624dbf28043cd,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32682,0,1,58e88eb4e58693904e72af409db2b73d4765a2b0a2362496a490b92c932d2d60,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32681,0,0,30385cf8415af0417b19f52d5eb22ace0b875cd333ead985847624dbf28043cd,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32682,0,0,58e88eb4e58693904e72af409db2b73d4765a2b0a2362496a490b92c932d2d60,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32683,0,0,a0b9622e54426858713ec284b3b35f1e3398d7792b7ab5de8a29a6635c271abc,2024-04-19T13:10:25.637000
|
||||
CVE-2024-32684,0,1,45409a46b6c2aef394952cf53f9074a8fb5f677d47ff8e382f222436e5428b09,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32684,0,0,45409a46b6c2aef394952cf53f9074a8fb5f677d47ff8e382f222436e5428b09,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32686,0,0,852c454a1d3bbf27e69c45ac3a82e5061f231ff76a794447de0366c288490e9f,2024-04-18T13:04:28.900000
|
||||
CVE-2024-32687,0,1,f51b7763fb704912aead612d939613099fe226355e98a37ae798883bfd707667,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32688,0,1,6e59715667d9b15d5d174972819c691193d74d15b97cf6c6fe45f2bf4908f8ea,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32687,0,0,f51b7763fb704912aead612d939613099fe226355e98a37ae798883bfd707667,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32688,0,0,6e59715667d9b15d5d174972819c691193d74d15b97cf6c6fe45f2bf4908f8ea,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32689,0,0,16874a71c9e632f769995766bf2f4ed6e183b5fc555d1d7f129ab5a8c673df33,2024-04-18T13:04:28.900000
|
||||
CVE-2024-32690,0,1,a5c3efbe443cf42b8bcd8044eca65a720a8f83179f73ad11a935d5b1da69e0fc,2024-04-22T13:28:43.747000
|
||||
CVE-2024-32691,0,1,47a620e1c936aa6c98068b87aaef82dc660370cf405c37f50aedb6cd32c40c5e,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32693,0,1,e7339c8b84970dceb7f27fc70179e84265f9a92972682371e824a11db13ee997,2024-04-22T13:28:43.747000
|
||||
CVE-2024-32694,0,1,ff376270c0d03e4fa17c8b43797e107f0072f0908378ab1e963713a1158905af,2024-04-22T13:28:43.747000
|
||||
CVE-2024-32695,0,1,caed8267603babbb5835fd8eadf3f2dca399f066c74d00c0a4d5b64c1b57142d,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32696,0,1,e7758d11ccb79b8e8842b12077365c0f608e298b7aff71d6241568ff720ff6dd,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32697,0,1,080d53d42ba50cae897d0f614c32560b058087a597070d329674949eb0662dca,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32698,0,1,62d9323bbf42a20a367a2bf88d0f3ecbf462ca871e0485b99440a7338327b80d,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32690,0,0,a5c3efbe443cf42b8bcd8044eca65a720a8f83179f73ad11a935d5b1da69e0fc,2024-04-22T13:28:43.747000
|
||||
CVE-2024-32691,0,0,47a620e1c936aa6c98068b87aaef82dc660370cf405c37f50aedb6cd32c40c5e,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32693,0,0,e7339c8b84970dceb7f27fc70179e84265f9a92972682371e824a11db13ee997,2024-04-22T13:28:43.747000
|
||||
CVE-2024-32694,0,0,ff376270c0d03e4fa17c8b43797e107f0072f0908378ab1e963713a1158905af,2024-04-22T13:28:43.747000
|
||||
CVE-2024-32695,0,0,caed8267603babbb5835fd8eadf3f2dca399f066c74d00c0a4d5b64c1b57142d,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32696,0,0,e7758d11ccb79b8e8842b12077365c0f608e298b7aff71d6241568ff720ff6dd,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32697,0,0,080d53d42ba50cae897d0f614c32560b058087a597070d329674949eb0662dca,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32698,0,0,62d9323bbf42a20a367a2bf88d0f3ecbf462ca871e0485b99440a7338327b80d,2024-04-22T13:28:34.007000
|
||||
CVE-2024-3270,0,0,6f3801d6fa573f4a130c8a1ad393f7345008a6cf48547c2d9608d260a00cb3bb,2024-04-11T01:25:57.753000
|
||||
CVE-2024-3271,0,0,427448d66ebe59002a93ad233a5fbd2b2253db3687d924fc6f5652a183f66ed0,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3272,0,0,ef44e7e2e0d0ab3ec436a6ccc174b0a90f543a9a2cfa65f7a6d262da6c5446ee,2024-04-15T20:14:55.570000
|
||||
@ -246340,6 +246362,7 @@ CVE-2024-3618,0,0,4930954b63fbf1867ea6023e0e85abb5ce3c463a36dea55dc99465af5aaf25
|
||||
CVE-2024-3619,0,0,e46a3b263395cb61cb97e22d10d38e54d57de91c1d7f1832b85e56c338bf09fb,2024-04-11T12:47:44.137000
|
||||
CVE-2024-3620,0,0,a7eeb1bc049879e174341aab349252fb94be8452f8b1f4ee171cd19f6ef0b10d,2024-04-11T12:47:44.137000
|
||||
CVE-2024-3621,0,0,84afe5bfc8ac11b311e81571bedd8fcb4ae60929cf687215eae135d692582687,2024-04-11T12:47:44.137000
|
||||
CVE-2024-3645,1,1,bee980acfce5b6ddcb1616470edd36a9a4a84ca7bbfead0c0191d071e049a665,2024-04-22T14:15:07.617000
|
||||
CVE-2024-3646,0,0,acb9cfc5d5c2523df1f5225ae5c2cd01f196734634fe01108d948b04f61908e2,2024-04-19T16:19:49.043000
|
||||
CVE-2024-3652,0,0,a467de8b64f8147acdef48edc35752a89afb7d5856e17302ea9c57335ed0f61c,2024-04-11T12:47:44.137000
|
||||
CVE-2024-3654,0,0,7e2b4ab81bb1b43884c0db8e806df093bdf87a3fc5c587d83d67f54180b50daf,2024-04-19T16:19:49.043000
|
||||
@ -246459,11 +246482,11 @@ CVE-2024-3931,0,0,adc8a79b07f48b35a9681a97a568e852ba1ef2cbd3b7271f585750c2d2c421
|
||||
CVE-2024-3932,0,0,bce0f8b09e2fc4acc0cfce5940d57ce5f1e0384ac19f6c68ed218175688d8f12,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3948,0,0,427154a0226db385c08a1dc567a28e238ab290a5825189b73e5e958b25b296e5,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3979,0,0,9ef752ac5397ef4280bc4d9888fb417cb985331164bf90affafa759f391a2bfe,2024-04-19T18:29:53.040000
|
||||
CVE-2024-4014,0,1,321273114f78ac117c4f7a805b62a62926b23a5461c74b2705504b7b2e21d158,2024-04-22T13:28:43.747000
|
||||
CVE-2024-4017,0,1,9cc899b07e49c20d1d42511c9c41a533c695fd74b1701843b26490566c6e33e3,2024-04-22T13:28:50.310000
|
||||
CVE-2024-4018,0,1,b534838241485b84911a40a305fab0f06a9a1281f09d3d1140d27d7f52b1a84d,2024-04-22T13:28:50.310000
|
||||
CVE-2024-4019,0,1,4ced7c6540a74633018fd49c35c9e41874265303e22396ab90391c2405ff63d0,2024-04-22T13:28:43.747000
|
||||
CVE-2024-4020,0,1,fd9bedf3f2e4b41e8bc994bd6387cb7e34a5d92d9443a0588f231180a5be8980,2024-04-22T13:28:43.747000
|
||||
CVE-2024-4021,0,1,b9c31c9ddb04cfbc98ed2b7bcc3a8b279bda917775a5da2e55bd44974dd3912a,2024-04-22T13:28:43.747000
|
||||
CVE-2024-4022,0,1,ebd323c8f90bdf29bd6ff35ea1eff449874a3d962dc85b687039f47f7b416e73,2024-04-22T13:28:43.747000
|
||||
CVE-2024-4026,1,1,65bff2dba626fde0f88488c1e6df610a37e761e2e041855587a3bbcb3e849c23,2024-04-22T13:28:34.007000
|
||||
CVE-2024-4014,0,0,321273114f78ac117c4f7a805b62a62926b23a5461c74b2705504b7b2e21d158,2024-04-22T13:28:43.747000
|
||||
CVE-2024-4017,0,0,9cc899b07e49c20d1d42511c9c41a533c695fd74b1701843b26490566c6e33e3,2024-04-22T13:28:50.310000
|
||||
CVE-2024-4018,0,0,b534838241485b84911a40a305fab0f06a9a1281f09d3d1140d27d7f52b1a84d,2024-04-22T13:28:50.310000
|
||||
CVE-2024-4019,0,0,4ced7c6540a74633018fd49c35c9e41874265303e22396ab90391c2405ff63d0,2024-04-22T13:28:43.747000
|
||||
CVE-2024-4020,0,0,fd9bedf3f2e4b41e8bc994bd6387cb7e34a5d92d9443a0588f231180a5be8980,2024-04-22T13:28:43.747000
|
||||
CVE-2024-4021,0,1,21ca31bf18d88881f7a6cc1002b89ea9bbd51b89715a0adf7c08b2eb5ac210a6,2024-04-22T15:15:47.813000
|
||||
CVE-2024-4022,0,0,ebd323c8f90bdf29bd6ff35ea1eff449874a3d962dc85b687039f47f7b416e73,2024-04-22T13:28:43.747000
|
||||
CVE-2024-4026,0,0,65bff2dba626fde0f88488c1e6df610a37e761e2e041855587a3bbcb3e849c23,2024-04-22T13:28:34.007000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user