mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-03-14T13:00:40.736016+00:00
This commit is contained in:
parent
8402de0a4b
commit
df66da7977
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2020-11862",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-03-13T22:15:07.517",
|
||||
"lastModified": "2024-03-13T22:15:07.517",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:16.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Allocation of Resources Without Limits or Throttling vulnerability in OpenText NetIQ Privileged Account Manager on Linux, Windows, 64 bit allows Flooding.This issue affects NetIQ Privileged Account Manager: before 3.7.0.2.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Asignaci\u00f3n de recursos sin l\u00edmites o vulnerabilidad de limitaci\u00f3n en OpenText NetIQ Privileged Account Manager en Linux, Windows, 64 bits permite inundaciones. Este problema afecta a NetIQ Privileged Account Manager: versiones anteriores a 3.7.0.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-36238",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-13T21:15:53.813",
|
||||
"lastModified": "2024-03-13T21:15:53.813",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:21.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure Direct Object Reference (IDOR) in Bagisto v.1.5.1 allows an attacker to obtain sensitive information via the invoice ID parameter."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La referencia directa a objetos inseguros (IDOR) en Bagisto v.1.5.1 permite a un atacante obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro ID de factura."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-38534",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-03-13T22:15:08.197",
|
||||
"lastModified": "2024-03-13T22:15:08.197",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:16.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper authentication vulnerability in\u00a0OpenText\u2122\u00a0Exceed Turbo X affecting versions 12.5.0 and 12.5.1. The vulnerability could allow disclosure of restricted information in unauthenticated RPC.\u00a0"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autenticaci\u00f3n incorrecta en OpenText\u2122 Exceed Turbo X que afecta a las versiones 12.5.0 y 12.5.1. La vulnerabilidad podr\u00eda permitir la divulgaci\u00f3n de informaci\u00f3n restringida en RPC no autenticado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-38535",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-03-13T22:15:08.463",
|
||||
"lastModified": "2024-03-13T22:15:08.463",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:16.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use of Hard-coded Cryptographic Key vulnerability in\u00a0OpenText\u2122\u00a0Exceed Turbo X affecting versions 12.5.1 and 12.5.2. The vulnerability could compromise the cryptographic keys.\u00a0\u00a0"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Uso de vulnerabilidad de clave criptogr\u00e1fica codificada en OpenText\u2122 Exceed Turbo X que afecta a las versiones 12.5.1 y 12.5.2. La vulnerabilidad podr\u00eda comprometer las claves criptogr\u00e1ficas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-38536",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-03-13T22:15:08.710",
|
||||
"lastModified": "2024-03-13T22:15:08.710",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:16.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HTML injection in\u00a0OpenText\u2122\u00a0Exceed Turbo X affecting version 12.5.1. The vulnerability could result in Cross site scripting.\u00a0\u00a0"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Inyecci\u00f3n de HTML en OpenText\u2122 Exceed Turbo X que afecta a la versi\u00f3n 12.5.1. La vulnerabilidad podr\u00eda provocar Cross Site Scripting."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-41504",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-13T21:15:53.863",
|
||||
"lastModified": "2024-03-13T21:15:53.863",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:21.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability in Student Enrollment In PHP 1.0 allows attackers to run arbitrary code via the Student Search function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de inyecci\u00f3n SQL en Student Enrollment en PHP 1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n de b\u00fasqueda de estudiantes."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-41505",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-13T21:15:53.910",
|
||||
"lastModified": "2024-03-13T21:15:53.910",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:21.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability in the Add Student's Profile Picture function of Student Enrollment In PHP v1.0 allows attackers to execute arbitrary code via uploading a crafted PHP file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de carga de archivos arbitrarios en la funci\u00f3n Agregar imagen de perfil del estudiante de Student Enrollment In PHP v1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PHP manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-50726",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-13T21:15:54.797",
|
||||
"lastModified": "2024-03-13T21:15:54.797",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:21.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. \"Local sync\" is an Argo CD feature that allows developers to temporarily override an Application's manifests with locally-defined manifests. Use of the feature should generally be limited to highly-trusted users, since it allows the user to bypass any merge protections in git. An improper validation bug allows users who have `create` privileges but not `override` privileges to sync local manifests on app creation. All other restrictions, including AppProject restrictions are still enforced. The only restriction which is not enforced is that the manifests come from some approved git/Helm/OCI source. The bug was introduced in 1.2.0-rc1 when the local manifest sync feature was added. The bug has been patched in Argo CD versions 2.10.3, 2.9.8, and 2.8.12. Users are advised to upgrade. Users unable to upgrade may mitigate the risk of branch protection bypass by removing `applications, create` RBAC access. The only way to eliminate the issue without removing RBAC access is to upgrade to a patched version."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. La \"sincronizaci\u00f3n local\" es una caracter\u00edstica de Argo CD que permite a los desarrolladores anular temporalmente los manifiestos de una aplicaci\u00f3n con manifiestos definidos localmente. El uso de la funci\u00f3n generalmente debe limitarse a usuarios de alta confianza, ya que permite al usuario evitar cualquier protecci\u00f3n de combinaci\u00f3n en git. Un error de validaci\u00f3n inadecuado permite a los usuarios que tienen privilegios de \"crear\" pero no privilegios de \"anular\" sincronizar manifiestos locales al crear la aplicaci\u00f3n. Todas las dem\u00e1s restricciones, incluidas las de AppProject, a\u00fan se aplican. La \u00fanica restricci\u00f3n que no se aplica es que los manifiestos provengan de alguna fuente aprobada de git/Helm/OCI. El error se introdujo en 1.2.0-rc1 cuando se agreg\u00f3 la funci\u00f3n de sincronizaci\u00f3n del manifiesto local. El error se ha solucionado en las versiones 2.10.3, 2.9.8 y 2.8.12 de Argo CD. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar pueden mitigar el riesgo de eludir la protecci\u00f3n de sucursal eliminando el acceso RBAC \"aplicaciones, creaci\u00f3n\". La \u00fanica forma de eliminar el problema sin eliminar el acceso a RBAC es actualizar a una versi\u00f3n parcheada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0311",
|
||||
"sourceIdentifier": "trellixpsirt@trellix.com",
|
||||
"published": "2024-03-14T09:15:46.580",
|
||||
"lastModified": "2024-03-14T09:15:46.580",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0312",
|
||||
"sourceIdentifier": "trellixpsirt@trellix.com",
|
||||
"published": "2024-03-14T09:15:46.943",
|
||||
"lastModified": "2024-03-14T09:15:46.943",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0313",
|
||||
"sourceIdentifier": "trellixpsirt@trellix.com",
|
||||
"published": "2024-03-14T09:15:47.153",
|
||||
"lastModified": "2024-03-14T09:15:47.153",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-0799",
|
||||
"sourceIdentifier": "vulnreport@tenable.com",
|
||||
"published": "2024-03-13T19:15:46.510",
|
||||
"lastModified": "2024-03-13T19:15:46.510",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:21.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An authentication bypass vulnerability exists in Arcserve Unified Data Protection 9.2 and 8.1 in the edge-app-base-webui.jar!com.ca.arcserve.edge.app.base.ui.server.EdgeLoginServiceImpl.doLogin() function within wizardLogin."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n en Arcserve Unified Data Protection 9.2 y 8.1 en la funci\u00f3n edge-app-base-webui.jar!com.ca.arcserve.edge.app.base.ui.server.EdgeLoginServiceImpl.doLogin() dentro de WizardLogin."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-0800",
|
||||
"sourceIdentifier": "vulnreport@tenable.com",
|
||||
"published": "2024-03-13T19:15:46.757",
|
||||
"lastModified": "2024-03-13T19:15:46.757",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:21.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A path traversal vulnerability exists in Arcserve Unified Data Protection 9.2 and 8.1 in edge-app-base-webui.jar!com.ca.arcserve.edge.app.base.ui.server.servlet.ImportNodeServlet."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de path traversal en Arcserve Unified Data Protection 9.2 y 8.1 en edge-app-base-webui.jar!com.ca.arcserve.edge.app.base.ui.server.servlet.ImportNodeServlet."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-0801",
|
||||
"sourceIdentifier": "vulnreport@tenable.com",
|
||||
"published": "2024-03-13T19:15:46.943",
|
||||
"lastModified": "2024-03-13T19:15:46.943",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:21.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A denial of service vulnerability exists in Arcserve Unified Data Protection 9.2 and 8.1 in ASNative.dll."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio en Arcserve Unified Data Protection 9.2 y 8.1 en ASNative.dll."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1221",
|
||||
"sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
|
||||
"published": "2024-03-14T03:15:06.607",
|
||||
"lastModified": "2024-03-14T03:15:06.607",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:16.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1222",
|
||||
"sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
|
||||
"published": "2024-03-14T03:15:07.090",
|
||||
"lastModified": "2024-03-14T03:15:07.090",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:16.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1223",
|
||||
"sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
|
||||
"published": "2024-03-14T03:15:07.580",
|
||||
"lastModified": "2024-03-14T03:15:07.580",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1654",
|
||||
"sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
|
||||
"published": "2024-03-14T03:15:08.033",
|
||||
"lastModified": "2024-03-14T03:15:08.033",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1882",
|
||||
"sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
|
||||
"published": "2024-03-14T04:15:08.003",
|
||||
"lastModified": "2024-03-14T04:15:08.003",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1883",
|
||||
"sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
|
||||
"published": "2024-03-14T04:15:08.353",
|
||||
"lastModified": "2024-03-14T04:15:08.353",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1884",
|
||||
"sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
|
||||
"published": "2024-03-14T04:15:08.697",
|
||||
"lastModified": "2024-03-14T04:15:08.697",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2079",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-13T22:15:11.910",
|
||||
"lastModified": "2024-03-13T22:15:11.910",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:16.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WPBakery Page Builder Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'per_line_mobile' shortcode in all versions up to, and including, 3.8.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento WPBakery Page Builder Addons de Livemesh para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'per_line_mobile' del complemento en todas las versiones hasta la 3.8.1 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-22167",
|
||||
"sourceIdentifier": "psirt@wdc.com",
|
||||
"published": "2024-03-13T21:15:55.343",
|
||||
"lastModified": "2024-03-13T21:15:55.343",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:21.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A potential DLL hijacking vulnerability in the SanDisk PrivateAccess application for Windows that could lead to arbitrary code execution in the context of the system user. This vulnerability is only exploitable locally if an attacker has access to a copy of the user's vault or has already gained access into a user's system. This attack is limited to the system in context and cannot be propagated.\u00a0\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una posible vulnerabilidad de secuestro de DLL en la aplicaci\u00f3n SanDisk PrivateAccess para Windows que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario del sistema. Esta vulnerabilidad solo se puede explotar localmente si un atacante tiene acceso a una copia de la b\u00f3veda del usuario o ya ha obtenido acceso al sistema de un usuario. Este ataque se limita al sistema en contexto y no se puede propagar."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22396",
|
||||
"sourceIdentifier": "PSIRT@sonicwall.com",
|
||||
"published": "2024-03-14T04:15:09.080",
|
||||
"lastModified": "2024-03-14T04:15:09.080",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22397",
|
||||
"sourceIdentifier": "PSIRT@sonicwall.com",
|
||||
"published": "2024-03-14T04:15:09.297",
|
||||
"lastModified": "2024-03-14T04:15:09.297",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22398",
|
||||
"sourceIdentifier": "PSIRT@sonicwall.com",
|
||||
"published": "2024-03-14T04:15:09.417",
|
||||
"lastModified": "2024-03-14T04:15:09.417",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2242",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-13T22:15:12.173",
|
||||
"lastModified": "2024-03-13T22:15:12.173",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:16.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Contact Form 7 plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018active-tab\u2019 parameter in all versions up to, and including, 5.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Contact Form 7 para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro 'active-tab' en todas las versiones hasta la 5.9 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-24105",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-13T21:15:58.870",
|
||||
"lastModified": "2024-03-13T21:15:58.870",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:16.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability in Code-projects Computer Science Time Table System 1.0 allows attackers to run arbitrary code via adminFormvalidation.php."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de inyecci\u00f3n SQL en Code-projects Computer Science Time Table System 1.0 permite a atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de adminFormvalidation.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-24692",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2024-03-13T20:15:07.273",
|
||||
"lastModified": "2024-03-13T20:15:07.273",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:21.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Race condition in the installer for Zoom Rooms Client for Windows before version 5.17.5 may allow an authenticated user to conduct a denial of service via local access."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La condici\u00f3n de ejecuci\u00f3n en el instalador de Zoom Rooms Client para Windows anterior a la versi\u00f3n 5.17.5 puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso local."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-24693",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2024-03-13T20:15:07.760",
|
||||
"lastModified": "2024-03-13T20:15:07.760",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:21.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper access control in the installer for Zoom Rooms Client for Windows before version 5.17.5 may allow an authenticated user to conduct a denial of service via local access.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un control de acceso inadecuado en el instalador de Zoom Rooms Client para Windows anterior a la versi\u00f3n 5.17.5 puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso local."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25228",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-14T02:15:50.613",
|
||||
"lastModified": "2024-03-14T02:15:50.613",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:16.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-25250",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-13T21:15:58.943",
|
||||
"lastModified": "2024-03-13T21:15:58.943",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:16.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability in code-projects Agro-School Management System 1.0 allows attackers to run arbitrary code via the Login page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de inyecci\u00f3n SQL en code-projects Agro-School Management System 1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de la p\u00e1gina de inicio de sesi\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25649",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-14T03:15:08.540",
|
||||
"lastModified": "2024-03-14T03:15:08.540",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25650",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-14T02:15:50.690",
|
||||
"lastModified": "2024-03-14T02:15:50.690",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:16.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25651",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-14T03:15:08.727",
|
||||
"lastModified": "2024-03-14T03:15:08.727",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25652",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-14T03:15:08.877",
|
||||
"lastModified": "2024-03-14T03:15:08.877",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25653",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-14T03:15:09.017",
|
||||
"lastModified": "2024-03-14T03:15:09.017",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-27097",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-13T21:15:58.993",
|
||||
"lastModified": "2024-03-13T21:15:58.993",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:16.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A user endpoint didn't perform filtering on an incoming parameter, which was added directly to the application log. This could lead to an attacker injecting false log entries or corrupt the log file format. This has been fixed in the CKAN versions 2.9.11 and 2.10.4. Users are advised to upgrade. Users unable to upgrade should override the `/user/reset` endpoint to filter the `id` parameter in order to exclude newlines.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un endpoint de usuario no realiz\u00f3 el filtrado de un par\u00e1metro entrante, que se agreg\u00f3 directamente al registro de la aplicaci\u00f3n. Esto podr\u00eda provocar que un atacante inyecte entradas de registro falsas o corrompa el formato del archivo de registro. Esto se ha solucionado en las versiones 2.9.11 y 2.10.4 de CKAN. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deben anular el endpoint `/user/reset` para filtrar el par\u00e1metro `id` y excluir las nuevas l\u00edneas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-27102",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-13T21:15:59.590",
|
||||
"lastModified": "2024-03-13T21:15:59.590",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:16.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Wings is the server control plane for Pterodactyl Panel. This vulnerability impacts anyone running the affected versions of Wings. The vulnerability can potentially be used to access files and directories on the host system. The full scope of impact is exactly unknown, but reading files outside of a server's base directory (sandbox root) is possible. In order to use this exploit, an attacker must have an existing \"server\" allocated and controlled by Wings. Details on the exploitation of this vulnerability are embargoed until March 27th, 2024 at 18:00 UTC. In order to mitigate this vulnerability, a full rewrite of the entire server filesystem was necessary. Because of this, the size of the patch is massive, however effort was made to reduce the amount of breaking changes. Users are advised to update to version 1.11.9. There are no known workarounds for this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Wings es el plano de control del servidor de Pterodactyl Panel. Esta vulnerabilidad afecta a cualquiera que ejecute las versiones afectadas de Wings. La vulnerabilidad puede usarse potencialmente para acceder a archivos y directorios en el sistema host. Se desconoce exactamente el alcance total del impacto, pero es posible leer archivos fuera del directorio base de un servidor (ra\u00edz de la zona de pruebas). Para utilizar este exploit, un atacante debe tener un \"servidor\" existente asignado y controlado por Wings. Los detalles sobre la explotaci\u00f3n de esta vulnerabilidad est\u00e1n embargados hasta el 27 de marzo de 2024 a las 18:00 UTC. Para mitigar esta vulnerabilidad, fue necesaria una reescritura completa de todo el sistema de archivos del servidor. Debido a esto, el tama\u00f1o del parche es enorme, sin embargo, se hizo un esfuerzo para reducir la cantidad de cambios importantes. Se recomienda a los usuarios que actualicen a la versi\u00f3n 1.11.9. No se conocen workarounds para esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-27703",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-13T22:15:11.843",
|
||||
"lastModified": "2024-03-13T22:15:11.843",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:16.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in Leantime 3.0.6 allows a remote attacker to execute arbitrary code via the to-do title parameter."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de Cross Site Scripting en Leantime 3.0.6 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de t\u00edtulo de tareas pendientes."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-27986",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-14T09:15:47.363",
|
||||
"lastModified": "2024-03-14T09:15:47.363",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Livemesh Elementor Addons by Livemesh allows Stored XSS.This issue affects Elementor Addons by Livemesh: from n/a through 8.3.5.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Livemesh Elementor Addons de Livemesh permite almacenar XSS. Este problema afecta a Elementor Addons de Livemesh: desde n/a hasta 8.3.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-28175",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-13T21:16:00.570",
|
||||
"lastModified": "2024-03-13T21:16:00.570",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:16.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Due to the improper URL protocols filtering of links specified in the `link.argocd.argoproj.io` annotations in the application summary component, an attacker can achieve cross-site scripting with elevated permissions. All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to a cross-site scripting (XSS) bug allowing a malicious user to inject a javascript: link in the UI. When clicked by a victim user, the script will execute with the victim's permissions (up to and including admin). This vulnerability allows an attacker to perform arbitrary actions on behalf of the victim via the API, such as creating, modifying, and deleting Kubernetes resources. A patch for this vulnerability has been released in Argo CD versions v2.10.3 v2.9.8, and v2.8.12. There are no completely-safe workarounds besides upgrading. The safest alternative, if upgrading is not possible, would be to create a Kubernetes admission controller to reject any resources with an annotation starting with link.argocd.argoproj.io or reject the resource if the value use an improper URL protocol. This validation will need to be applied in all clusters managed by ArgoCD.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Debido al filtrado inadecuado de los protocolos URL de los enlaces especificados en las anotaciones `link.argocd.argoproj.io` en el componente de resumen de la aplicaci\u00f3n, un atacante puede lograr Cross Site Scripting con permisos elevados. Todas las versiones sin parches de Argo CD que comienzan con v1.0.0 son vulnerables a un error de Cross Site Scripting (XSS) que permite a un usuario malintencionado inyectar un enlace javascript: en la interfaz de usuario. Cuando un usuario v\u00edctima hace clic en \u00e9l, el script se ejecutar\u00e1 con los permisos de la v\u00edctima (hasta administrador incluido). Esta vulnerabilidad permite a un atacante realizar acciones arbitrarias en nombre de la v\u00edctima a trav\u00e9s de la API, como crear, modificar y eliminar recursos de Kubernetes. Se lanz\u00f3 un parche para esta vulnerabilidad en las versiones de Argo CD v2.10.3 v2.9.8 y v2.8.12. No existen soluciones alternativas completamente seguras adem\u00e1s de actualizar. La alternativa m\u00e1s segura, si no es posible la actualizaci\u00f3n, ser\u00eda crear un controlador de admisi\u00f3n de Kubernetes para rechazar cualquier recurso con una anotaci\u00f3n que comience con link.argocd.argoproj.io o rechazar el recurso si el valor utiliza un protocolo URL inadecuado. Esta validaci\u00f3n deber\u00e1 aplicarse en todos los cl\u00fasteres gestionados por ArgoCD."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-28192",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-13T21:16:00.823",
|
||||
"lastModified": "2024-03-13T21:16:00.823",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:16.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "your_spotify is an open source, self hosted Spotify tracking dashboard. YourSpotify version <1.8.0 is vulnerable to NoSQL injection in the public access token processing logic. Attackers can fully bypass the public token authentication mechanism, regardless if a public token has been generated before or not, without any user interaction or prerequisite knowledge. This vulnerability allows an attacker to fully bypass the public token authentication mechanism, regardless if a public token has been generated before or not, without any user interaction or prerequisite knowledge. This issue has been addressed in version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "your_spotify es un panel de seguimiento de Spotify autohospedado y de c\u00f3digo abierto. La versi\u00f3n de YourSpotify <1.8.0 es vulnerable a la inyecci\u00f3n NoSQL en la l\u00f3gica de procesamiento del token de acceso p\u00fablico. Los atacantes pueden eludir por completo el mecanismo de autenticaci\u00f3n de token p\u00fablico, independientemente de si se ha generado un token p\u00fablico antes o no, sin ninguna interacci\u00f3n del usuario ni conocimiento previo. Esta vulnerabilidad permite a un atacante eludir por completo el mecanismo de autenticaci\u00f3n de token p\u00fablico, independientemente de si se ha generado un token p\u00fablico antes o no, sin ninguna interacci\u00f3n del usuario ni conocimiento previo. Este problema se solucion\u00f3 en la versi\u00f3n 1.8.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-28193",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-13T21:16:01.077",
|
||||
"lastModified": "2024-03-13T21:16:01.077",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:16.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "your_spotify is an open source, self hosted Spotify tracking dashboard. YourSpotify version <1.8.0 allows users to create a public token in the settings, which can be used to provide guest-level access to the information of that specific user in YourSpotify. The /me API endpoint discloses Spotify API access and refresh tokens to guest users. Attackers with access to a public token for guest access to YourSpotify can therefore obtain access to Spotify API tokens of YourSpotify users. As a consequence, attackers may extract profile information, information about listening habits, playlists and other information from the corresponding Spotify profile. In addition, the attacker can pause and resume playback in the Spotify app at will. This issue has been resolved in version 1.8.0. Users are advised to upgrade. There are no known workarounds for this issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "your_spotify es un panel de seguimiento de Spotify autohospedado y de c\u00f3digo abierto. La versi\u00f3n <1.8.0 de YourSpotify permite a los usuarios crear un token p\u00fablico en la configuraci\u00f3n, que se puede utilizar para proporcionar acceso a nivel de invitado a la informaci\u00f3n de ese usuario espec\u00edfico en YourSpotify. El punto final de la API /me revela el acceso a la API de Spotify y los tokens de actualizaci\u00f3n a los usuarios invitados. Por lo tanto, los atacantes con acceso a un token p\u00fablico para el acceso de invitados a YourSpotify pueden obtener acceso a los tokens API de Spotify de los usuarios de YourSpotify. Como consecuencia, los atacantes pueden extraer informaci\u00f3n de perfil, informaci\u00f3n sobre h\u00e1bitos de escucha, listas de reproducci\u00f3n y otra informaci\u00f3n del perfil de Spotify correspondiente. Adem\u00e1s, el atacante puede pausar y reanudar la reproducci\u00f3n en la aplicaci\u00f3n Spotify a voluntad. Este problema se resolvi\u00f3 en la versi\u00f3n 1.8.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-28194",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-13T19:15:47.110",
|
||||
"lastModified": "2024-03-13T19:15:47.110",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:21.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "your_spotify is an open source, self hosted Spotify tracking dashboard. YourSpotify versions < 1.8.0 use a hardcoded JSON Web Token (JWT) secret to sign authentication tokens. Attackers can use this well-known value to forge valid authentication tokens for arbitrary users. This vulnerability allows attackers to bypass authentication and authenticate as arbitrary YourSpotify users, including admin users. This issue has been addressed in version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "your_spotify es un panel de seguimiento de Spotify autohospedado y de c\u00f3digo abierto. Las versiones de YourSpotify < 1.8.0 utilizan un secreto JSON Web Token (JWT) codificado para firmar tokens de autenticaci\u00f3n. Los atacantes pueden utilizar este valor conocido para falsificar tokens de autenticaci\u00f3n v\u00e1lidos para usuarios arbitrarios. Esta vulnerabilidad permite a los atacantes eludir la autenticaci\u00f3n y autenticarse como usuarios arbitrarios de YourSpotify, incluidos los usuarios administradores. Este problema se solucion\u00f3 en la versi\u00f3n 1.8.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-28251",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-14T00:15:33.630",
|
||||
"lastModified": "2024-03-14T00:15:33.630",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:16.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Querybook is a Big Data Querying UI, combining collocated table metadata and a simple notebook interface. Querybook's datadocs functionality works by using a Websocket Server. The client talks to this WSS whenever updating/deleting/reading any cells as well as for watching the live status of query executions. Currently the CORS setting allows all origins, which could result in cross-site websocket hijacking and allow attackers to read/edit/remove datadocs of the user. This issue has been addressed in version 3.32.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Querybook es una interfaz de usuario de consulta de Big Data que combina metadatos de tablas colocadas y una interfaz de cuaderno simple. La funcionalidad de documentos de datos de Querybook funciona mediante un servidor Websocket. El cliente habla con este WSS cada vez que actualiza, elimina o lee cualquier celda, as\u00ed como para observar el estado en vivo de las ejecuciones de consultas. Actualmente, la configuraci\u00f3n CORS permite todos los or\u00edgenes, lo que podr\u00eda resultar en el secuestro de websocket entre sitios y permitir a los atacantes leer/editar/eliminar documentos de datos del usuario. Este problema se solucion\u00f3 en la versi\u00f3n 3.32.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28388",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-14T03:15:09.173",
|
||||
"lastModified": "2024-03-14T03:15:09.173",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28390",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-14T04:15:09.640",
|
||||
"lastModified": "2024-03-14T04:15:09.640",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28391",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-14T04:15:09.697",
|
||||
"lastModified": "2024-03-14T04:15:09.697",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-28662",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-13T21:16:01.357",
|
||||
"lastModified": "2024-03-13T21:16:01.357",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:16.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Cross Site Scripting vulnerability exists in Piwigo before 14.3.0 script because of missing sanitization in create_tag in admin/include/functions.php."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de Cross Site Scripting en Piwigo anterior a la versi\u00f3n 14.3.0 debido a la falta de sanitizaci\u00f3n en create_tag en admin/include/functions.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28746",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-03-14T09:15:47.577",
|
||||
"lastModified": "2024-03-14T09:15:47.577",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
41
README.md
41
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-14T11:00:43.303062+00:00
|
||||
2024-03-14T13:00:40.736016+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-14T10:15:07.027000+00:00
|
||||
2024-03-14T12:52:21.763000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -34,22 +34,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `0`
|
||||
|
||||
* [CVE-2024-0311](CVE-2024/CVE-2024-03xx/CVE-2024-0311.json) (`2024-03-14T09:15:46.580`)
|
||||
* [CVE-2024-0312](CVE-2024/CVE-2024-03xx/CVE-2024-0312.json) (`2024-03-14T09:15:46.943`)
|
||||
* [CVE-2024-0313](CVE-2024/CVE-2024-03xx/CVE-2024-0313.json) (`2024-03-14T09:15:47.153`)
|
||||
* [CVE-2024-2437](CVE-2024/CVE-2024-24xx/CVE-2024-2437.json) (`2024-03-14T09:15:47.690`)
|
||||
* [CVE-2024-2438](CVE-2024/CVE-2024-24xx/CVE-2024-2438.json) (`2024-03-14T09:15:47.820`)
|
||||
* [CVE-2024-27986](CVE-2024/CVE-2024-279xx/CVE-2024-27986.json) (`2024-03-14T09:15:47.363`)
|
||||
* [CVE-2024-28746](CVE-2024/CVE-2024-287xx/CVE-2024-28746.json) (`2024-03-14T09:15:47.577`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `51`
|
||||
|
||||
* [CVE-2024-2247](CVE-2024/CVE-2024-22xx/CVE-2024-2247.json) (`2024-03-14T10:15:07.027`)
|
||||
* [CVE-2024-2242](CVE-2024/CVE-2024-22xx/CVE-2024-2242.json) (`2024-03-14T12:52:16.723`)
|
||||
* [CVE-2024-24105](CVE-2024/CVE-2024-241xx/CVE-2024-24105.json) (`2024-03-14T12:52:16.723`)
|
||||
* [CVE-2024-24692](CVE-2024/CVE-2024-246xx/CVE-2024-24692.json) (`2024-03-14T12:52:21.763`)
|
||||
* [CVE-2024-24693](CVE-2024/CVE-2024-246xx/CVE-2024-24693.json) (`2024-03-14T12:52:21.763`)
|
||||
* [CVE-2024-25228](CVE-2024/CVE-2024-252xx/CVE-2024-25228.json) (`2024-03-14T12:52:16.723`)
|
||||
* [CVE-2024-25250](CVE-2024/CVE-2024-252xx/CVE-2024-25250.json) (`2024-03-14T12:52:16.723`)
|
||||
* [CVE-2024-25649](CVE-2024/CVE-2024-256xx/CVE-2024-25649.json) (`2024-03-14T12:52:09.877`)
|
||||
* [CVE-2024-25650](CVE-2024/CVE-2024-256xx/CVE-2024-25650.json) (`2024-03-14T12:52:16.723`)
|
||||
* [CVE-2024-25651](CVE-2024/CVE-2024-256xx/CVE-2024-25651.json) (`2024-03-14T12:52:09.877`)
|
||||
* [CVE-2024-25652](CVE-2024/CVE-2024-256xx/CVE-2024-25652.json) (`2024-03-14T12:52:09.877`)
|
||||
* [CVE-2024-25653](CVE-2024/CVE-2024-256xx/CVE-2024-25653.json) (`2024-03-14T12:52:09.877`)
|
||||
* [CVE-2024-27097](CVE-2024/CVE-2024-270xx/CVE-2024-27097.json) (`2024-03-14T12:52:16.723`)
|
||||
* [CVE-2024-27102](CVE-2024/CVE-2024-271xx/CVE-2024-27102.json) (`2024-03-14T12:52:16.723`)
|
||||
* [CVE-2024-27703](CVE-2024/CVE-2024-277xx/CVE-2024-27703.json) (`2024-03-14T12:52:16.723`)
|
||||
* [CVE-2024-27986](CVE-2024/CVE-2024-279xx/CVE-2024-27986.json) (`2024-03-14T12:52:09.877`)
|
||||
* [CVE-2024-28175](CVE-2024/CVE-2024-281xx/CVE-2024-28175.json) (`2024-03-14T12:52:16.723`)
|
||||
* [CVE-2024-28192](CVE-2024/CVE-2024-281xx/CVE-2024-28192.json) (`2024-03-14T12:52:16.723`)
|
||||
* [CVE-2024-28193](CVE-2024/CVE-2024-281xx/CVE-2024-28193.json) (`2024-03-14T12:52:16.723`)
|
||||
* [CVE-2024-28194](CVE-2024/CVE-2024-281xx/CVE-2024-28194.json) (`2024-03-14T12:52:21.763`)
|
||||
* [CVE-2024-28251](CVE-2024/CVE-2024-282xx/CVE-2024-28251.json) (`2024-03-14T12:52:16.723`)
|
||||
* [CVE-2024-28388](CVE-2024/CVE-2024-283xx/CVE-2024-28388.json) (`2024-03-14T12:52:09.877`)
|
||||
* [CVE-2024-28390](CVE-2024/CVE-2024-283xx/CVE-2024-28390.json) (`2024-03-14T12:52:09.877`)
|
||||
* [CVE-2024-28391](CVE-2024/CVE-2024-283xx/CVE-2024-28391.json) (`2024-03-14T12:52:09.877`)
|
||||
* [CVE-2024-28662](CVE-2024/CVE-2024-286xx/CVE-2024-28662.json) (`2024-03-14T12:52:16.723`)
|
||||
* [CVE-2024-28746](CVE-2024/CVE-2024-287xx/CVE-2024-28746.json) (`2024-03-14T12:52:09.877`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
108
_state.csv
108
_state.csv
@ -146788,7 +146788,7 @@ CVE-2020-11858,0,0,e3751d93c39dc561e0bc014198f20f581fa176040cbe2ea7da77c24143260
|
||||
CVE-2020-1186,0,0,0bc344b7a1e570a78333d69ceac2d0e453b6f57ae3a2cd74454233da741990bb,2021-07-21T11:39:23.747000
|
||||
CVE-2020-11860,0,0,75322e26c7491537aebd8a29e900e9c7093fe15733010eee9c9bb3e4be14f63c,2023-11-07T03:15:13.847000
|
||||
CVE-2020-11861,0,0,6fe965776441227f6a4587f66e1c2005727acd5006d43c90cf9c94883158ac29,2023-11-07T03:15:14.130000
|
||||
CVE-2020-11862,0,0,1f3cddb225446d39cd27a51f1958cc66e80677058ac55835d58ffe3d43bff11d,2024-03-13T22:15:07.517000
|
||||
CVE-2020-11862,0,1,c62137152cdb9ff06f3922dab06b4cc639191abf194594e48039b10ffadc9fe5,2024-03-14T12:52:16.723000
|
||||
CVE-2020-11863,0,0,71da40a557b18027054a68368cb3351ac18462c9781299077036f23bc721afe6,2023-11-07T03:15:14.393000
|
||||
CVE-2020-11864,0,0,193466154f3750bc68a987368ac71b7ab3853cb0095d413aacf07fec9914b853,2023-11-07T03:15:14.453000
|
||||
CVE-2020-11865,0,0,1324746ebce0e369b7b9c89137e732152abdf01264749d369f2083e99700e5f5,2023-11-07T03:15:14.523000
|
||||
@ -225564,7 +225564,7 @@ CVE-2023-36234,0,0,973b7234bf394d41440796898f5347122468df9850574084c231db2df301e
|
||||
CVE-2023-36235,0,0,5540886c332c02c9f9daa7ee2d25e6b259f3a1d56e1899fba23de10080f667ab,2024-01-24T18:17:24.737000
|
||||
CVE-2023-36236,0,0,68a4110dbc6185eaae8ba23285e9202d2867e74ac1d26edb597597898cff0d0a,2024-01-20T18:46:09.557000
|
||||
CVE-2023-36237,0,0,6af9cb38c947543e7f1e44734eae902360e21435f871f5b61e9845d77f1324b1,2024-02-27T14:20:06.637000
|
||||
CVE-2023-36238,0,0,b39c394ad332b2bb954dfec51378c9f7ded276f271a857567ea0021a0ef9f6fe,2024-03-13T21:15:53.813000
|
||||
CVE-2023-36238,0,1,6e1da8dbdfd9138aa72b8c59c4ec0940fa128ec282eae77e954f0f22ffc73304,2024-03-14T12:52:21.763000
|
||||
CVE-2023-36239,0,0,fc89aa2439f680352e63beab2cf34bdec6b034d4732f59c386f4aef3fe1c4d69,2023-06-29T20:58:32.827000
|
||||
CVE-2023-3624,0,0,6a652e107ad82aabfc202398a7fad51559957fe592a3bbc8e886e1dde4232ef2,2024-02-29T01:40:37.163000
|
||||
CVE-2023-36243,0,0,79214c4423a5bdbb534e2cceebb1996c4a0cb127d02b7df848796e5e3e60eca4,2023-06-29T21:02:42.490000
|
||||
@ -227246,9 +227246,9 @@ CVE-2023-3853,0,0,2e2f95d4d18ecd974c9e9668bd9aad5d3272d8b384c563a307e610826b1c64
|
||||
CVE-2023-38530,0,0,f3d85729456a1be906aa691bb39e4fab14e628b80eac64a0d841010ee9fadf74,2024-01-21T03:02:12.170000
|
||||
CVE-2023-38531,0,0,1eaf3ff39bdf83e578d5519ad4678d67a1b669b605f325e9b473a722aadc02ff,2023-12-27T19:09:56.817000
|
||||
CVE-2023-38532,0,0,8d2765379d0a48190c4a0355f977b5f3c3481b6f3c0e372c2189aec2fff3111c,2023-12-22T15:16:50.043000
|
||||
CVE-2023-38534,0,0,a5e99d032bb1525454c20d4c36d3314a7740b22a90a6f6091162e83604dc56e5,2024-03-13T22:15:08.197000
|
||||
CVE-2023-38535,0,0,d15c0f1b6265b83f42c200be93fa57f558961c4555b71051139aa623f52cedef,2024-03-13T22:15:08.463000
|
||||
CVE-2023-38536,0,0,7b2c891a25ad4a2546daca003ec0bb2fe59e97c78f95472b28fd6084fb3ab0df,2024-03-13T22:15:08.710000
|
||||
CVE-2023-38534,0,1,bdcb44fedb3e74680416becd9b75e16d6a1d2f82387d8415e85ece49170184a6,2024-03-14T12:52:16.723000
|
||||
CVE-2023-38535,0,1,de8f978974df2f2ee4719e5c40ebb0188b6419d640395c585cb1a75b0e6b8a78,2024-03-14T12:52:16.723000
|
||||
CVE-2023-38536,0,1,2f791f2772663f383e0571d4fe237e98726462cbd43b2f90613d9684caf738ed,2024-03-14T12:52:16.723000
|
||||
CVE-2023-38537,0,0,058af9a745864bcd589467c7b4d6902729400b28c16b75c86c3d3ec1b1935a56,2023-11-07T04:17:20.823000
|
||||
CVE-2023-38538,0,0,aa5068e5cb5f7f9514149a9c201f88ab13f21f5373f3332bad9247612a115f87,2023-11-07T04:17:20.903000
|
||||
CVE-2023-3854,0,0,a22124eaeda0afe0c7f815ef48ca157fa6c9e2271214c276e9926d6b3d1d1123,2024-02-29T01:40:47.670000
|
||||
@ -229295,8 +229295,8 @@ CVE-2023-41484,0,0,2021d5253fe16579ccf445b51d808cfc47dfe42287dae5d3335d5a80034f6
|
||||
CVE-2023-4149,0,0,d79a219615c62d1aa33587a0a183788c3846b9f93f1519a47c404003cfe7ade4,2023-11-29T17:09:20.563000
|
||||
CVE-2023-4150,0,0,7cbcb166ff389d32932e7e5aef6351f41a08c447edc0d75faa72b6226be84764,2023-11-07T04:22:11.360000
|
||||
CVE-2023-41503,0,0,8a03f2b23621815253996faeef4dedff8337be56b914569062e8fc959e5a4fa0,2024-03-07T13:52:27.110000
|
||||
CVE-2023-41504,0,0,54b2159f0554f7743a765d2cec880aec06b95e436420a6d7ff3b58081fbadffc,2024-03-13T21:15:53.863000
|
||||
CVE-2023-41505,0,0,de7abadf617bc0392a95429c4574053c93e90adff6427fc61e67508e70308310,2024-03-13T21:15:53.910000
|
||||
CVE-2023-41504,0,1,34741b4f7dba9baeb5198f6b35a56d79bf4f50336b665d18b061906ee69d6b68,2024-03-14T12:52:21.763000
|
||||
CVE-2023-41505,0,1,6ba46d255a238ffeabec9750e39fdc186100d3795ff4307cea4f9e84aae87ed8,2024-03-14T12:52:21.763000
|
||||
CVE-2023-41506,0,0,8ea3b02ada1155accd3add0c28958c6e0a97fd9c34e102f201e62b41077dfb62,2024-02-27T14:20:06.637000
|
||||
CVE-2023-41507,0,0,2f5df285845ec35d22e06c44e84f6a93efee8f6951ed77da531971db01c7dcfb,2023-09-08T16:51:07.547000
|
||||
CVE-2023-41508,0,0,8a35ce4a62b9631a655302fdf3166d2699322e97463890228046721e6f29a14f,2023-09-11T18:53:12.833000
|
||||
@ -234895,7 +234895,7 @@ CVE-2023-50722,0,0,fbd1cced3be8f08f72fd640e7299d2239764c6a12913a16fc9db72aecedbe
|
||||
CVE-2023-50723,0,0,5f758664f83d029b94878ae2f70dfed031014274ec993637af2df376c33c4c37,2023-12-19T20:33:39.183000
|
||||
CVE-2023-50724,0,0,4912ff5166b1fd07e6e136d001fee1e9eb1d851472eb38638577d23853b5103d,2024-01-02T18:40:50.497000
|
||||
CVE-2023-50725,0,0,0fc438df98d96b10da1a8c0dc83ac1e83157e0edf5fb21735adea9bb7acb9c12,2024-01-03T03:20:02.863000
|
||||
CVE-2023-50726,0,0,7e87bae830b24cd107e7eb1c2f0862d27fe65f2f09ebd0057e5b6dc04bd7b7c8,2024-03-13T21:15:54.797000
|
||||
CVE-2023-50726,0,1,c773e75851083afa4d8135e740d956fc9588d8b1a86bbf3bf172ff777acce7d7,2024-03-14T12:52:21.763000
|
||||
CVE-2023-50727,0,0,3c7cb702f8185b19b43358a1154f05cdf87449c6807deb38307fed4330add83e,2024-01-03T03:25:51.337000
|
||||
CVE-2023-50728,0,0,d5a2db73d5e1c297536c48081b3f95fefbd8844770b9bb75e3b4e060b538caad,2023-12-19T20:43:55.837000
|
||||
CVE-2023-50729,0,0,dca406d2463a99487bc2f647850c1e6acc924ae37882d23abaea265fc5cbc987,2024-01-19T18:03:25.383000
|
||||
@ -237769,9 +237769,9 @@ CVE-2024-0306,0,0,b16f92c4a57a78580a52f72a84126778ebdaa3c536bd7e40b62367d789d467
|
||||
CVE-2024-0307,0,0,966cba6a906cf8576b3e22074f9068ff5de1957049fe57d9d5cbc37ee44349fd,2024-02-29T01:43:07.687000
|
||||
CVE-2024-0308,0,0,9b374c4831c1d7e4a01993ec95f413541808b94d3287b12ae8901324a0a5069f,2024-02-29T01:43:07.777000
|
||||
CVE-2024-0310,0,0,0c2885511923199ef6e03dac11102e56161395771a2afd9522cbb1c995a0879b,2024-01-17T20:33:20.540000
|
||||
CVE-2024-0311,1,1,3d442843b5e7608c6bb2d77d9dcb114de76282fb17e1ce6c84f71c9f13b56353,2024-03-14T09:15:46.580000
|
||||
CVE-2024-0312,1,1,69d12d721f795cc0d22cd17188a5b39718b4865bc47a526252bc99e0123e85cd,2024-03-14T09:15:46.943000
|
||||
CVE-2024-0313,1,1,a469c3f2b32bec348f652dac84f522f30364e2e85c51d95d77fb481340e1f3de,2024-03-14T09:15:47.153000
|
||||
CVE-2024-0311,0,1,5db40c4bfc5c09ae2debaff4128c7a78d58419561313ee8a104fb6848ce89c41,2024-03-14T12:52:09.877000
|
||||
CVE-2024-0312,0,1,5ec0d1d30fe5c772c361d16941ba1aaba9383fd412be8a8cac420e99f9c5b90f,2024-03-14T12:52:09.877000
|
||||
CVE-2024-0313,0,1,059c0df495eb4715b3d0741f3cc647dfc993e8e7529bac0523f689831427c68b,2024-03-14T12:52:09.877000
|
||||
CVE-2024-0314,0,0,cb39f430188fa2205e666e0316f77a35baf49f032cd18aa7e33289fa487d3fcc,2024-01-19T18:49:31.097000
|
||||
CVE-2024-0315,0,0,a788da88ec4ebc0bdd26d80fefc9882fdad32f8f7dd4b621291efc32f023b296,2024-01-19T18:16:37.743000
|
||||
CVE-2024-0316,0,0,00ac14550b7d60d3281c01b35600da830ada0f25e388579ccb4be08b0f546755,2024-01-19T18:16:51.523000
|
||||
@ -238169,9 +238169,9 @@ CVE-2024-0795,0,0,9387b7114acb61252d200ea553a236502abf8b7b27e1d3c3681a13f5f3022c
|
||||
CVE-2024-0796,0,0,117654d8458e901616b5dcc51586c0e623b4d624a6f0f01cf88de01da401d097,2024-02-13T19:40:50.223000
|
||||
CVE-2024-0797,0,0,009aa845f9ae5bde1b4c5995aa015349e7f6ec6f8f0f63bfb450e718f9300e52,2024-02-13T19:40:35.397000
|
||||
CVE-2024-0798,0,0,2f1b0b827ba8873a7b25770613534b3f8d6a0f026296e59c448002f514407704,2024-02-26T16:32:25.577000
|
||||
CVE-2024-0799,0,0,ef16ef0273fd8c1ec75c42c368b11d7f2c68564b13b362dc9617462a82ec82c6,2024-03-13T19:15:46.510000
|
||||
CVE-2024-0800,0,0,d04df57780e77fe713036b62c2ed37ea9f9600cc051743a8354a61549e035ca4,2024-03-13T19:15:46.757000
|
||||
CVE-2024-0801,0,0,473fec6aee21dae8f195e1c6b4892dba7567bc4612a820b1485748dc9fb87ada,2024-03-13T19:15:46.943000
|
||||
CVE-2024-0799,0,1,565bc32cefccc7b54c8a2a9ae87b575853af295d8bcf02c26770d29b4f9124c3,2024-03-14T12:52:21.763000
|
||||
CVE-2024-0800,0,1,d01951efcbc246e656d94cfc618f67e25f655df800a6a24c24ab44bafa9ef9ed,2024-03-14T12:52:21.763000
|
||||
CVE-2024-0801,0,1,a89dd8886cf81b019461340c433bdec2c4bcb02d2b385117b1316445faec54f0,2024-03-14T12:52:21.763000
|
||||
CVE-2024-0804,0,0,70935988ae140dfc2a5adfcb943faf94a39f18e0935f58c282d47a399ed09108,2024-01-29T14:29:25.953000
|
||||
CVE-2024-0805,0,0,479c25c464f6a328d6731c12cfc75b50b35f0f2dec0194359c3aeae6dde0d30d,2024-01-29T14:24:19.087000
|
||||
CVE-2024-0806,0,0,9c93ca7b1341b35e16a22cdbbee1fe7fe1f2eaf26781f684014c115afdc39972,2024-01-29T14:24:48.090000
|
||||
@ -238470,9 +238470,9 @@ CVE-2024-1216,0,0,cf8cbc681fab31a82a726030cd7e5b2697f90ed7fc6fe37a66dad5c3cedfca
|
||||
CVE-2024-1217,0,0,2f3a9888a6fbf53051bf3e1d713109419f2670877e27546924b2618e93987f41,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1218,0,0,f7a43c3097a98a76412fe9c1af1feb423b6a534d59f1a1be753dd55ce0e5155c,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1220,0,0,7fc61962f6d2075b07bb030435da96def1b153ddab02d3c5264f2409e74faa58,2024-03-06T15:18:08.093000
|
||||
CVE-2024-1221,0,0,72683792ce9c283255541d5ac660fa78f64a38a1637cf2ed82ea089144c05781,2024-03-14T03:15:06.607000
|
||||
CVE-2024-1222,0,0,5b097491b98908ff7e6db3da1f90d0bc5e62019a19484337138401f19c65b843,2024-03-14T03:15:07.090000
|
||||
CVE-2024-1223,0,0,bcce03f069a230840b65a318aed8fc83e8f3977b6a931636a215c3e057bb8175,2024-03-14T03:15:07.580000
|
||||
CVE-2024-1221,0,1,2772ab118d345973bb70102156f0a9ba23f65bc7e69fb6c97b531ae7aa018395,2024-03-14T12:52:16.723000
|
||||
CVE-2024-1222,0,1,c69564e36b074aff06c51d10d4b5b8189a6729bdb1e1b9c14b8e40846e06e2f0,2024-03-14T12:52:16.723000
|
||||
CVE-2024-1223,0,1,a7a9e1c05adae7a81659ba2ff7caa10eb2d1a06107f9b31e93f51bb9dd1a9e91,2024-03-14T12:52:09.877000
|
||||
CVE-2024-1224,0,0,f5377a59802b4c28898eed36128680d24ab17fb508c502610abb50cb4d44c2e5,2024-03-06T15:18:08.093000
|
||||
CVE-2024-1225,0,0,48e8aaacf87c1f1ce817a462226bd45c66b45e1434a262109b41e4c91072a987,2024-02-29T01:43:44.277000
|
||||
CVE-2024-1226,0,0,866d071ad8625704064a7fde58b7b8a2a90c5873a4eb7f372776142f1a28cf32,2024-03-12T16:02:33.900000
|
||||
@ -238719,7 +238719,7 @@ CVE-2024-1650,0,0,3020ece11ffdddeeec0030da948830348e1867089b2578f18d2a470b71bf8a
|
||||
CVE-2024-1651,0,0,b5a1bc561b4d7ae4d1ca2ccf7f79068fb2afa7b09c9ad49805a75edae57e0400,2024-02-20T19:50:53.960000
|
||||
CVE-2024-1652,0,0,713b08425ff0d91e3a1f6c5fcc742628e562c3c90970b08c1ec718d504f2db3c,2024-02-27T14:19:41.650000
|
||||
CVE-2024-1653,0,0,875a0ad46333e774de4f895ea6a9ead74cdbdb6ae6c4ddb02a960bfb85513ae4,2024-02-27T14:19:41.650000
|
||||
CVE-2024-1654,0,0,b67f7c776b64097c757a87a6d7d22a8df21e2be37384f31188a789970302a42e,2024-03-14T03:15:08.033000
|
||||
CVE-2024-1654,0,1,eb9626fce310149d4ccf57ea81b4c034dcaf62686ee2c7ca822dc0fc8ca870d9,2024-03-14T12:52:09.877000
|
||||
CVE-2024-1661,0,0,24db83c92b829dc6c3c4aa1496bd15ce44d311aaea85d91d099cbad064ada2b4,2024-02-29T01:43:53.173000
|
||||
CVE-2024-1668,0,0,9fe479fb08a9c3e6acaa42b32d642c1a77a4b3afa3c06ca8b35741f02d9dd1bf,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1669,0,0,3362eeabf5b6399fda046d3f728ab967509d79cc74a91c5ce260a94031135ec7,2024-02-26T16:27:52.577000
|
||||
@ -238826,9 +238826,9 @@ CVE-2024-1875,0,0,6b658f389b536cea98293568c7ee6644587a9b1bef069f774207e95c99ee51
|
||||
CVE-2024-1876,0,0,82560fab1f4fbe2b28673412a54026b5c1806e6e970cf396594ce5608059f917,2024-02-29T09:15:06.320000
|
||||
CVE-2024-1877,0,0,dc0df84bf200c26187720f27a43e69dca821743a88d60bdf70024e88eda285b4,2024-02-29T09:15:06.407000
|
||||
CVE-2024-1878,0,0,c55652da9052ae10c0f5815143b64799f9a5b82eb1a20210e8e29c385eb1c149,2024-02-29T09:15:06.490000
|
||||
CVE-2024-1882,0,0,10c6e74771347b67fa3c838c9d71cc234ab54d67925ce262fed28d8f9bb44513,2024-03-14T04:15:08.003000
|
||||
CVE-2024-1883,0,0,e5e91ae0abed696d1abc51c06539334ac29fcc9a9edcb560d2084b7e2dc68356,2024-03-14T04:15:08.353000
|
||||
CVE-2024-1884,0,0,0cbc4b22c13954feaf9f0861216bee59fd3068f748b376e760b0221e0a5f2091,2024-03-14T04:15:08.697000
|
||||
CVE-2024-1882,0,1,65b682ecafe7582e463d65be737c66a5d812d02dc7c05e20f6941ab4cabca590,2024-03-14T12:52:09.877000
|
||||
CVE-2024-1883,0,1,f33d1f2bdfe0bff5bee1086cef77aed78bc7ffb15d776f93d56481c80868277c,2024-03-14T12:52:09.877000
|
||||
CVE-2024-1884,0,1,d5ca467ddd2d583a9a4003273c17763dc88a755dd4a6a44afd561a754155e761,2024-03-14T12:52:09.877000
|
||||
CVE-2024-1885,0,0,502b33ef4dbb909774fc1ef1eb02e9b9fbffdbeee1e2971953e7a0c92a37628d,2024-02-29T07:15:06.293000
|
||||
CVE-2024-1886,0,0,092cf7a21972f581040984f11ef7d5c93e369371178904eaee065bef71ec984b,2024-02-29T07:15:06.520000
|
||||
CVE-2024-1887,0,0,c4ea1f30b4ee64401ec471c46007c0919b3d087c3cc77ec486ec75f252891a28,2024-02-29T13:49:29.390000
|
||||
@ -239074,7 +239074,7 @@ CVE-2024-2076,0,0,e7f4f1eb9d4801b159e19e6958b03336e4a3f4c5f2daffd2429350dcc008ce
|
||||
CVE-2024-20765,0,0,0bc0d6bebc7d0e3e5238fdf4ab0750cdcca06992066d14fdc4f2a56816d15cff,2024-02-29T18:06:42.010000
|
||||
CVE-2024-2077,0,0,9a4b96c976de73d6d8f579a225f4ba6e55c8a8791cc5d9d9f141b958b0074a4a,2024-03-01T22:22:25.913000
|
||||
CVE-2024-2078,0,0,c5cf1f8224dc1437cc5c72b4c20f193ca60f923ea1195c1e3b8d6f13446a32c9,2024-03-01T14:04:04.827000
|
||||
CVE-2024-2079,0,0,43a14cd4db7b214a5c8f3e3fb2bda119325b028ae522653b0bd01ff60a3a3c34,2024-03-13T22:15:11.910000
|
||||
CVE-2024-2079,0,1,d19df912ca8f24c4783570207f7ead00a2f333eee11795e142007ff6a5180cfc,2024-03-14T12:52:16.723000
|
||||
CVE-2024-20802,0,0,09b0e538ab7892d37fab32a8e5c61289f6ef8af3dfbdfbb048a6512fa7396094,2024-01-10T16:14:57.787000
|
||||
CVE-2024-20803,0,0,6c415e68c0cc04850639517c5e65b145b62c937ecdd266efbaf3b8a7e936e490,2024-01-10T16:11:26.313000
|
||||
CVE-2024-20804,0,0,f961cce5ac55cac12f82f1b9af1706ecad8b5889d74e0d2cb7f3ec9a86f51549,2024-01-10T16:10:45.437000
|
||||
@ -239606,7 +239606,7 @@ CVE-2024-22162,0,0,3c2cb36f32a60ca693f81b961c287d758c19ce669967ae728e78b13e00efd
|
||||
CVE-2024-22163,0,0,c83e1ba1846b1fce21c84865fbae3a4da5f3738a4cbae342d708ebb4390dbfc8,2024-02-06T14:57:33.760000
|
||||
CVE-2024-22164,0,0,477ce475db07f491f945e658dfba7270a678f1c9f9986653d1cf70ab7be3b709,2024-01-16T17:40:17.057000
|
||||
CVE-2024-22165,0,0,e5745c0914c304a6a883c5cbbe12f7d3b628ffd9c8f1f4447610dc31781824ee,2024-01-16T18:30:58.893000
|
||||
CVE-2024-22167,0,0,4efa3f0953388985e35aa0fc7cde3e5468f1d8536829035d4e70933f25b2971a,2024-03-13T21:15:55.343000
|
||||
CVE-2024-22167,0,1,66eeaa7802a03d7220e8e4d342cc2b136735ca1b12a8df28a329ae7f7fc30d01,2024-03-14T12:52:21.763000
|
||||
CVE-2024-22182,0,0,907bb5baf28273d3fccc2bf9f187fdb84f5fc8c1f9e9a557acec183fdb8a4a41,2024-03-01T22:22:25.913000
|
||||
CVE-2024-22188,0,0,c925f824384b59eea62dc4af4666ddb75fd12e09a6bf8db8c7f8ccf3dffad485,2024-03-05T13:41:01.900000
|
||||
CVE-2024-22190,0,0,b6052bec184e44f4bdb37913f09378ade6ba357d503aeeeace40339b578d1a46,2024-01-18T13:48:07.553000
|
||||
@ -239718,9 +239718,9 @@ CVE-2024-2239,0,0,8a25d7fd7eaacb8ebf85fc00694a049e7ce7420bfb6cf416c5b42d50c5d1d4
|
||||
CVE-2024-22393,0,0,baae8029e1587725a02d8ccb1fb298e540bb69b478da7728d31a9731926e8718,2024-02-22T19:07:27.197000
|
||||
CVE-2024-22394,0,0,fdf2846817bf0321d479c4aa67f29d797db24255733cd4d946cc68e44bfccdc7,2024-02-14T21:46:40.537000
|
||||
CVE-2024-22395,0,0,b21f811c39a8757d126ad039f30ef550a4161900f4b964d1876a739d59a87644,2024-02-26T13:42:22.567000
|
||||
CVE-2024-22396,0,0,f31a8478611f246e75e3189d21bf9ef362e314a74863dafebff2c53a0d093433,2024-03-14T04:15:09.080000
|
||||
CVE-2024-22397,0,0,dd628a66d8f0ca8bd03cdfa506d1cfa64763356d779eb356796a3ef2aa6831cb,2024-03-14T04:15:09.297000
|
||||
CVE-2024-22398,0,0,c77e5448cb612df458a655c23f75acac1504b30f42bbfcca524271c814d3eb63,2024-03-14T04:15:09.417000
|
||||
CVE-2024-22396,0,1,3abb46e50ad636b49fa1626720ec980896bc78f9c45d1bcf1eda8e9ee80c033c,2024-03-14T12:52:09.877000
|
||||
CVE-2024-22397,0,1,a9450283301e1e49819d3862b657193585bbce3c8f221b0f8c811f63f9e45af0,2024-03-14T12:52:09.877000
|
||||
CVE-2024-22398,0,1,6274168717eaf1c1ad5c0ba9993d9a14d19f9de051ef1a9ae7c30d936f0a8aff,2024-03-14T12:52:09.877000
|
||||
CVE-2024-22400,0,0,75e98c1f1edd6beccc5653abbccb406114df98ae36ae20c7db97671271c6d967,2024-01-26T20:55:37.543000
|
||||
CVE-2024-22401,0,0,66adbef511b1833a5b0f5721c3bf92cfe438dfd63a9ac9655aa7c9dea6d9ded0,2024-01-26T14:42:35.147000
|
||||
CVE-2024-22402,0,0,6c66fef7245df59e63379f6d488e03f20fc7beed00d8afe188d68ca1b49ff0b2,2024-01-26T14:11:30.677000
|
||||
@ -239739,7 +239739,7 @@ CVE-2024-22416,0,0,4743c834e9f721c7d271903d375817b56210d75d85a6318060ff428a321c4
|
||||
CVE-2024-22417,0,0,cbffb89ddefa4461a2c9ab3f4209af97f2fbed0e034b82012b430c49f1cc363d,2024-02-15T03:17:08.090000
|
||||
CVE-2024-22418,0,0,0253a6086c2436c05752e6e58a0d383294b9f59fbd83ecf7515ed514c42aca8d,2024-01-25T22:20:11.087000
|
||||
CVE-2024-22419,0,0,c565baa116d24bde7e5de7a0d128d511dc0e0f3e4161069cbe6da43b0f53182f,2024-01-26T18:10:24.747000
|
||||
CVE-2024-2242,0,0,b2e12ba2d852f23d46dc99a1c46baefdd04f84d51d9c86db5512a78bff567268,2024-03-13T22:15:12.173000
|
||||
CVE-2024-2242,0,1,39d308e366a51cd5a7be9e3c4a03c92cd8109861f94356873beae64a70ef5519,2024-03-14T12:52:16.723000
|
||||
CVE-2024-22420,0,0,dcbfe647d1443cce2b795eae483259c958c0472084bb1bb4ee3374c4670666da,2024-02-10T02:51:45.717000
|
||||
CVE-2024-22421,0,0,58c7848effa15c2f45cae3a355504d85dac425537d9bac99b99330760ff84e0c,2024-02-10T02:51:03.987000
|
||||
CVE-2024-22422,0,0,cafc60081059c38b5fbf7c4dc43db8e59eaafdb89fe8cc5c7225f1844e49fce8,2024-01-25T22:19:52.030000
|
||||
@ -239761,7 +239761,7 @@ CVE-2024-22458,0,0,fab0847e92bbf727c5b27aa7c362cf6e8ac33445a67dace1537122f2ef005
|
||||
CVE-2024-22459,0,0,0f6e55dd5e86a1ba38a08c9c7a4fb2896872d396522db79869b212894fff2ef6,2024-02-28T14:06:45.783000
|
||||
CVE-2024-22463,0,0,5b884681f5c1cb31ebf38842df7c3075a8e9d98da101d1e4ec4faa1ef09b6ce2,2024-03-04T15:35:25.673000
|
||||
CVE-2024-22464,0,0,890f63b91e1207e51dc2d0fc686f763deb067d6410c523bfc64d52071d75be15,2024-02-15T05:03:27.617000
|
||||
CVE-2024-2247,0,1,b52dba6f68142dbeca56f2f1bf8b23a5401066ec4f0585445fe0cb42ba284eff,2024-03-14T10:15:07.027000
|
||||
CVE-2024-2247,0,0,b52dba6f68142dbeca56f2f1bf8b23a5401066ec4f0585445fe0cb42ba284eff,2024-03-14T10:15:07.027000
|
||||
CVE-2024-22473,0,0,ba695bcad0bbe2cba422f3053697429916506f0f0ce55f150fe9af4a818e1f6b,2024-02-22T19:07:27.197000
|
||||
CVE-2024-22490,0,0,36caaa8caefc70cd3fb65a62a9488b2446e68d14844d0a61d7baf757d2000caa,2024-01-29T22:48:35.493000
|
||||
CVE-2024-22491,0,0,99c25b0ff8de89fe3ebd04368e499e7fe9b3820707560bd21fed90048934c0ad,2024-01-23T14:28:45.890000
|
||||
@ -240400,7 +240400,7 @@ CVE-2024-24098,0,0,278909d70f7cff296783b4b8a548916c6d64b22508219b62d702151781ea2
|
||||
CVE-2024-24099,0,0,e75badf6651a6d84e33aa0d6378d82bf7383b7d186bb27d0ab0f05af5c87836c,2024-02-27T14:20:06.637000
|
||||
CVE-2024-24100,0,0,a27c32dc14c8987b127be9cd991f37144e95622920d0f3983f740c9f65a1ed81,2024-02-27T14:20:06.637000
|
||||
CVE-2024-24101,0,0,465610d11fbea3a63202ee4b992dde1745c78e4f43267fcf6791260a204c8347,2024-03-13T12:33:51.697000
|
||||
CVE-2024-24105,0,0,c756102406536d18d5b7587cc76c52c0b7d345ddea22d625cd43256cc77708da,2024-03-13T21:15:58.870000
|
||||
CVE-2024-24105,0,1,f380e262c8dd655f8c2a2aaab705945e3e53d934f43a99a8988c2679e64d26e6,2024-03-14T12:52:16.723000
|
||||
CVE-2024-24112,0,0,85e73cacfedc53adcf11f5f918fd045bef98237a7befd9901dcc9210924d64d7,2024-02-12T17:36:55.950000
|
||||
CVE-2024-24113,0,0,9eef336ce15946e031a73b26b3e239a7b6b89883c338eb5418a2161e5a5d4cfc,2024-02-15T03:07:46.013000
|
||||
CVE-2024-24115,0,0,14551eae0714aa949f3a2722e897b385606f2d79896bdde4df5b423d4061d078,2024-02-15T16:01:23.457000
|
||||
@ -240478,10 +240478,10 @@ CVE-2024-24332,0,0,e8ff48d8d559b64b9ab6ad7cafcefb37d4d80401868f386c665115c6aeb40
|
||||
CVE-2024-24333,0,0,01fbda1675f098d1cc7c6d19f4f3e61befb0126ec79fb324ab3d3ab060b94378,2024-02-01T04:50:09.707000
|
||||
CVE-2024-24337,0,0,aea724cce42152cfbca31af56ebea4b4144a07dac6916cd215f4a89a5f259b76,2024-02-13T14:01:49.147000
|
||||
CVE-2024-24350,0,0,9134767962641c17d78d439bf5ad6b0040b309c747242ef118ff001480ea18e9,2024-02-14T21:53:21.057000
|
||||
CVE-2024-2437,1,1,e2a2bd9bd0dcdea0cc630f9078b3e3fd0d505d341534c09f27e2d7feb3fe79ac,2024-03-14T09:15:47.690000
|
||||
CVE-2024-2437,0,0,e2a2bd9bd0dcdea0cc630f9078b3e3fd0d505d341534c09f27e2d7feb3fe79ac,2024-03-14T09:15:47.690000
|
||||
CVE-2024-24375,0,0,6d93bed7b91eebe0279780e7942da5d713b2770f2037688e2705f8e5250bec6b,2024-03-07T13:52:27.110000
|
||||
CVE-2024-24377,0,0,4fd82afd92a47ec9c215e71594b94e69e50289be89a362cbe08c09e263cd1ed7,2024-02-16T13:37:51.433000
|
||||
CVE-2024-2438,1,1,c00f0172cf7ab8467da2d5d83a23b794d6f6a7817b3440d3b686b7132bf26b21,2024-03-14T09:15:47.820000
|
||||
CVE-2024-2438,0,0,c00f0172cf7ab8467da2d5d83a23b794d6f6a7817b3440d3b686b7132bf26b21,2024-03-14T09:15:47.820000
|
||||
CVE-2024-24386,0,0,b3790fe661cff8a8634891f10d13cf244a8c2db222c1d3928967cefd661b68bf,2024-02-15T14:28:31.380000
|
||||
CVE-2024-24388,0,0,3f3d5731a0be4e881fd82d2a190d75a64cc3a7cfd8c995358dcecccf32a929bb,2024-02-08T20:04:04.027000
|
||||
CVE-2024-24389,0,0,2c9b678e90ca811a5e4fb1d9cfec1c17129f5ec175674cc0051b26f5da267c13,2024-03-07T13:52:27.110000
|
||||
@ -240547,8 +240547,8 @@ CVE-2024-24680,0,0,00c6b06cbd399fac9a1cb69a45fdeee991ea9572aae73c195704c3555b436
|
||||
CVE-2024-24681,0,0,705110c1a0575ef95794934b23101ccc4a6f384f7c61c4db9f4dbf9a8c528dd4,2024-02-26T13:42:22.567000
|
||||
CVE-2024-24690,0,0,4249963fcab3f64839ca35be1a62d20e5da7a24ba0a47ce2bf9c0d2ae28ac410,2024-02-14T13:59:35.580000
|
||||
CVE-2024-24691,0,0,87a55408e5efa0a4e3ce695995ae48834f0ce6baa0932acdc26c28bc7459ff4b,2024-02-14T13:59:35.580000
|
||||
CVE-2024-24692,0,0,8f35977ecb1fc63a3e79e626900b547600a6f147bb5e4fe2307611edc881f8eb,2024-03-13T20:15:07.273000
|
||||
CVE-2024-24693,0,0,384ba36041e0e5352c63befbbfbd1143d3360cb9d0a88f62cf73f43813fae147,2024-03-13T20:15:07.760000
|
||||
CVE-2024-24692,0,1,96b263e11e7ffd264e5e6330a524d4e167d94ed5d670d61f6bb2c4bb8b02f370,2024-03-14T12:52:21.763000
|
||||
CVE-2024-24693,0,1,5948992e2aa56bf9230af7bcdfd2c9a8d3e9ce95b4c0f6ada002a4f7d2439c11,2024-03-14T12:52:21.763000
|
||||
CVE-2024-24695,0,0,f7b489372675997f3018702f3166f9e3d390c6d5bf9cde9b8e59b33dbe31e943,2024-02-14T13:59:35.580000
|
||||
CVE-2024-24696,0,0,340219d088caaa9660211943b96c2739fe7ed93b849c938b38d29441b9ee779b,2024-02-14T13:59:35.580000
|
||||
CVE-2024-24697,0,0,61551c1d57df2d326f3c36bc68e06a9320623a0f54e789a8374a92406f147d56,2024-02-14T13:59:35.580000
|
||||
@ -240803,11 +240803,11 @@ CVE-2024-25223,0,0,fed0ee1c93d4da13aa94c11be23fd7ce47331585823cc1398816a42e972c6
|
||||
CVE-2024-25224,0,0,60a033d8e8f6de71de20eba59193ebdd929b6bf393aa49baa96edb59007a6ae2,2024-02-14T16:13:16.563000
|
||||
CVE-2024-25225,0,0,b00e13f44ac0134f1fc7e8ea7aab2c5dcadd2e02f8582f1036d69738d9332b6f,2024-02-14T16:13:16.563000
|
||||
CVE-2024-25226,0,0,97ea8fb758b8c513c8e72ae3403e9f8a56bb02ec88e94afe18fc9fb3fc39daf2,2024-02-14T16:13:16.563000
|
||||
CVE-2024-25228,0,0,874aa05e1a272a25a83a650ac8d7cced0f21348e2881b87b6589a4012112af12,2024-03-14T02:15:50.613000
|
||||
CVE-2024-25228,0,1,0239fa4a0a2fc4eb6bb0a1d2903e89a077f9c73228502ccb53d8cf7f226021ad,2024-03-14T12:52:16.723000
|
||||
CVE-2024-25247,0,0,1833ae291fb426e6ea03731a73288e6521c4f877eb6214fb79e6117118a15f59,2024-02-27T14:20:06.637000
|
||||
CVE-2024-25248,0,0,ab3d2a3b38abc9eda04104b8736bee6722a7b783d7f7311f9358790a48b160f2,2024-02-27T14:20:06.637000
|
||||
CVE-2024-25249,0,0,e626f7804fc8e3e2331820b9aeb548c245c405719ff0d76dcfa04a8ec8a29acb,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25250,0,0,3cc334e2050b6a9eaa97416427fbea02322921755fe268fbb09b55a56f03777a,2024-03-13T21:15:58.943000
|
||||
CVE-2024-25250,0,1,50921ad09828430a91a170dee03070c033f5594e850effa2946a4512e5f222cf,2024-03-14T12:52:16.723000
|
||||
CVE-2024-25251,0,0,1d2a5a9a4b66e0916ca3d01dc7a497fd6f413128e5f9cf23b916246f32337d74,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25260,0,0,a963ef502694ae6000774c93857ccef97ccb95aa054d7c962bcf481c9eca61da,2024-02-20T19:50:53.960000
|
||||
CVE-2024-25262,0,0,e9e8a281108082e2fe38cf1f84c8b0462ae4f78a51833715d231a5f9854a6582,2024-02-29T13:49:29.390000
|
||||
@ -240928,11 +240928,11 @@ CVE-2024-25642,0,0,bf91eeb1502dedca60fe6c035b93d7dfc5a440bc6932322c6ae4d128b4c7c
|
||||
CVE-2024-25643,0,0,08f3e6c0d454841d4e4dc84aae81812246ffbd96bb71cc2e9e4566cd4077e910,2024-02-13T14:01:07.747000
|
||||
CVE-2024-25644,0,0,cad748db94c87605f745ac8efbb54ef36e9bf866e1bcdbdf96bff9a05dfcf738,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25645,0,0,611af6391fb4617a6b65e5d2ff91bac5a4003873b65f133d0cd2495d911bd094,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25649,0,0,218331cab7c62b05eb4d39dac1a79ad7ac8b83af2eb750388e434f7637a774f7,2024-03-14T03:15:08.540000
|
||||
CVE-2024-25650,0,0,642f2a97fcbb295131b088a5341f3b030499ec647a2ae701e0541ed64c8cf428,2024-03-14T02:15:50.690000
|
||||
CVE-2024-25651,0,0,2248b9010081da7da6b627ee680afeedcd3d4b945ee538337f832cfc007fb085,2024-03-14T03:15:08.727000
|
||||
CVE-2024-25652,0,0,295dd2978154c1bf9b2c6a87719cce6733bb755cf3cd8c6462372fddfcabd618,2024-03-14T03:15:08.877000
|
||||
CVE-2024-25653,0,0,288666ab37b8b1bd826f20b5520fe1bf046ca6dbd75973955552561e56a31a42,2024-03-14T03:15:09.017000
|
||||
CVE-2024-25649,0,1,ff4005c5bc448d78f7be592b75e982f7bf99b3c972c3f93072e448020f36c7cd,2024-03-14T12:52:09.877000
|
||||
CVE-2024-25650,0,1,86db7f9cd2961887ed39c6b63b2949a71fabae22076ac99000118f6e3ecf601e,2024-03-14T12:52:16.723000
|
||||
CVE-2024-25651,0,1,4935c44deda83694ae7a33c550d78c8ec02d262dfb7e7f44dbd503c93d5109ae,2024-03-14T12:52:09.877000
|
||||
CVE-2024-25652,0,1,1684edbbe6a032e904cd3d9da8c2e3b5d162c7d94708a30170c5b1a8fdc4de06,2024-03-14T12:52:09.877000
|
||||
CVE-2024-25653,0,1,cf0ab93d3f68bfc65ae7a6e2836e0f599b295638c5107d23ca26fba04d235e4d,2024-03-14T12:52:09.877000
|
||||
CVE-2024-25674,0,0,880844ace2ad9fa6a214f1eff7f46e3beaded8f86ef202dfc09585e1e07ca21c,2024-02-12T14:30:40.343000
|
||||
CVE-2024-25675,0,0,7eb120f8543ce89181641a0a8c791e82666c8e07d23577075c360f9dbf73d233,2024-02-12T14:30:28.640000
|
||||
CVE-2024-25677,0,0,1d7f4f51208daa48b27418602ba1484337c537523201080701287445cfed0006,2024-02-15T19:43:24.983000
|
||||
@ -241241,10 +241241,10 @@ CVE-2024-27088,0,0,51e0e40780267d1754ef6fc0476358b31f9f3458dd54a6b66fef5c03c4a96
|
||||
CVE-2024-27089,0,0,80888df8a8beb579eb58ecd8e5017bb9d7c0dad21161e687af8e50a608c5d017,2024-02-26T20:19:06.073000
|
||||
CVE-2024-27092,0,0,46c8a65175e30ca99bc1ca448e9739f5a9fd09a26b86761b076001350720e53c,2024-02-29T13:49:29.390000
|
||||
CVE-2024-27093,0,0,2adc536c19af535e2a03a5b98ba4818457cc5a617ec41b1d012943c718349d43,2024-02-27T14:20:06.637000
|
||||
CVE-2024-27097,0,0,50f3cf107f797e136114db4659f36aab4dcc1ed2c483d15d9f0c1870a1b504ca,2024-03-13T21:15:58.993000
|
||||
CVE-2024-27097,0,1,119cd9ece0e90261671b57d6900026bac78dfbf4d2981ae69a65322120d02a50,2024-03-14T12:52:16.723000
|
||||
CVE-2024-27099,0,0,175d10b027dcaefa30f4f3d08f108961158696c2e68858dfb01ba6e05070217d,2024-02-28T14:06:45.783000
|
||||
CVE-2024-27101,0,0,5e1cdb7fd021f767632e89261ae8cd71ddf2db43a5c2430745ab100b28a7d944,2024-03-01T22:22:25.913000
|
||||
CVE-2024-27102,0,0,cdefde17ac223bb0751d25dccaf6c69d2607e40a6e858e378aacf4409db4940a,2024-03-13T21:15:59.590000
|
||||
CVE-2024-27102,0,1,efafee84c11a7d42b73e32ffc69d4688f19605eb4ecc6d6cf419aaba4f0fed2f,2024-03-14T12:52:16.723000
|
||||
CVE-2024-27103,0,0,ba41469ea697f39b66b49d222d300153b0a74c2fb1fbae161829f573b3ab98cc,2024-02-29T13:49:47.277000
|
||||
CVE-2024-27121,0,0,9ff77f57a33b5e7894f52bbf3c39c57fbfb06ac4fc9de183cada29d2e4e25cb4,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27132,0,0,3211e33e39363e184b8550fc16d833a0f590c8e4cd3ef270e1d091501b93f80e,2024-02-26T13:42:22.567000
|
||||
@ -241360,7 +241360,7 @@ CVE-2024-27689,0,0,f4ebc1e59160fdab518bfa3aa9af1f1ba832ce6045359e8a975bb23df8ccd
|
||||
CVE-2024-27692,0,0,96cf609944e6476718d8d1c519869d6f251f131a1b19ff614e15f00c454cdd33,2024-03-01T17:15:07.617000
|
||||
CVE-2024-27694,0,0,f3214413fbbba6e4989cb23c7682c51f2973a0b48d2e319f7c34a38e30c11001,2024-03-05T13:41:01.900000
|
||||
CVE-2024-27698,0,0,ac54888b0a03034871f07f7d36cab166990ef3007932a85c3ddd7d9b6a6ab747,2024-03-09T23:15:49.403000
|
||||
CVE-2024-27703,0,0,3d640aed93e1dabbc4abed834a7b198ee41005d217fc00b5cf782d6d45969a06,2024-03-13T22:15:11.843000
|
||||
CVE-2024-27703,0,1,2b79380c63baf4bc3c9abfadfdc13a8325f8dae30b340951dc89a1b9f1e8f730,2024-03-14T12:52:16.723000
|
||||
CVE-2024-27707,0,0,bd4780ccfe95d75b10e00a8c73b93480b3348a16006d364b38b5efca7ebc67cb,2024-03-08T14:02:57.420000
|
||||
CVE-2024-27718,0,0,1278a2a8cee5a68342beae95f220d454fcd35e5e3853b311cb50bcc440948ebc,2024-03-05T13:41:01.900000
|
||||
CVE-2024-27733,0,0,8d363cf969790e7f98247f28db2e0a162d296bdeea0f77bb77693ca2f7a6137e,2024-03-08T14:02:57.420000
|
||||
@ -241390,7 +241390,7 @@ CVE-2024-27949,0,0,12ee9b935394b527d1677a59b517c94d0df067a0b32bfff31d7cb2be5b4b5
|
||||
CVE-2024-27950,0,0,56d632dad56c45d949d3327de16e5b70b08683cea8ce7876ca8c59cc37ee8062,2024-03-01T14:04:04.827000
|
||||
CVE-2024-27952,0,0,184c933cd3d4f7d9f291de87daadba6c6d2dcb57a0cab449b4798a27658d2d98,2024-03-13T18:15:58.530000
|
||||
CVE-2024-27953,0,0,9606a5ea342585cc8ea605f674c63e8d870327e37e1ba285dba38be6126632a2,2024-03-13T18:15:58.530000
|
||||
CVE-2024-27986,1,1,01528b706c9f06c52d7790b2237645f819afb573bee6a27e89a4eeb7a8b9eee6,2024-03-14T09:15:47.363000
|
||||
CVE-2024-27986,0,1,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000
|
||||
CVE-2024-28084,0,0,2ea238298cc724e9290d5587502d4eedb8db15dd1861547724435b977511956c,2024-03-04T13:58:23.447000
|
||||
CVE-2024-28088,0,0,d2f20b1069b24ba10d21e8bf3b61c2c6a1c6b345ff59786676752b80abbde7a4,2024-03-13T21:16:00.380000
|
||||
CVE-2024-28089,0,0,830991c1dd5898b6a817a3f8bb8784922af3636f20b8b62ba1c918d5d83f6f10,2024-03-11T01:32:29.610000
|
||||
@ -241425,15 +241425,15 @@ CVE-2024-28162,0,0,9f95dea899a301f3d7e776202ce6567032bc57cf37ea2c387cd5d210ccf05
|
||||
CVE-2024-28163,0,0,e6f158d88c83d394762ccab484b2ad85c85d5028e78ed16fd0744829e8f59484,2024-03-12T12:40:13.500000
|
||||
CVE-2024-28173,0,0,e0fed71b03fa1080cdfc47a71a0b80da5e87b19e624557c11c0e172f4b2c098a,2024-03-06T21:42:54.697000
|
||||
CVE-2024-28174,0,0,fa1674b985861bddf4d0ff5ab075ec0e4328a9665c668bfe339f9f0de580d6b1,2024-03-06T21:42:54.697000
|
||||
CVE-2024-28175,0,0,ca58d29ef32983b33c62a2fd7b345268439a050ce23af1d5c40aa6dd749ccdb8,2024-03-13T21:16:00.570000
|
||||
CVE-2024-28175,0,1,c8f25bff8e97476e2963865ef2e9cf777aae8f2ef724b2ba6f372c990cea8179,2024-03-14T12:52:16.723000
|
||||
CVE-2024-28176,0,0,5bb6d329167995170bd276a45554624691bdda8cbb6c83c2d08f42eba9f617aa,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28180,0,0,1e73ce45496cde15ab7710e8895a9f7d4caf4d2dcdb0d6de4d94afa753e9a64b,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28184,0,0,043b0bc7533d0fc96bb6df4be7b21b8477ffe807b0ac6ed0c4b06cf7d8241c3c,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28186,0,0,bd19020fb98c7e49f4ae9534406a8116ce29f7f2cd9253fb5db74e8880c2331b,2024-03-13T12:33:51.697000
|
||||
CVE-2024-28187,0,0,ac9aee9b90f5e80eaf35f8c7ff9228de1d46fc7e7981b3ae0d130073676ebc09,2024-03-12T12:40:13.500000
|
||||
CVE-2024-28192,0,0,d78776cf653c920d1bae9feaacfd4e597f46ef67fbab546c6df435d4a69b5aa0,2024-03-13T21:16:00.823000
|
||||
CVE-2024-28193,0,0,1de78db701b48770c7b9ad6a4c3de8efe483bea9ec41e293cd7a32a5e150762c,2024-03-13T21:16:01.077000
|
||||
CVE-2024-28194,0,0,2994e8524191af9bad4e70397807a2f8e6e4543df62f104fe5234d833150c067,2024-03-13T19:15:47.110000
|
||||
CVE-2024-28192,0,1,b174fe16c8c5d79ad271f4d2c9a4367f27378fbad36778038489438c03ab1c5e,2024-03-14T12:52:16.723000
|
||||
CVE-2024-28193,0,1,8c1ca4c11484246f93cc5d645c632e9426b6a7357ef642cc72cfc1bf4fa0ff90,2024-03-14T12:52:16.723000
|
||||
CVE-2024-28194,0,1,bbf543bd49e731dd9f0390cae255c29b8ec19d1f801fcc500577e5449dd9092a,2024-03-14T12:52:21.763000
|
||||
CVE-2024-28195,0,0,1b19b29658de96e47ddbe7fe6d42c1a696986a3c5eec359089bbbbbc5a058164,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28196,0,0,7046367e0acd02e985287d11a90605d3f19a7e35578ad5f9a01507573328c7a9,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28197,0,0,e70c7d0bb2a78854377299eb50fe7994eaf82f7d86398ed826c936d249a753e2,2024-03-12T12:40:13.500000
|
||||
@ -241452,13 +241452,13 @@ CVE-2024-28230,0,0,3036aa70102b53b9cc695265dc4a11e5a4f5b8d26f6120835dbd1a9c3d93e
|
||||
CVE-2024-28236,0,0,ea7d34bffb060eb0191757ceb4c446ee8bfa4166cb7d1e0d8e67e75c651ba966,2024-03-13T12:33:51.697000
|
||||
CVE-2024-28238,0,0,38219e010007b7fe5426826144cd2eabd2e22d36d31c50aa8471901674b524b3,2024-03-13T12:33:51.697000
|
||||
CVE-2024-28239,0,0,faccbe471f1ae24e1ff85c8426d7d0f8447bb8e496567a24af19b5962ca5e940,2024-03-13T12:33:51.697000
|
||||
CVE-2024-28251,0,0,fb8bb85433bd3b41ad1d143c946985fc64b58ab7659a617713f0e321c9f0e8ae,2024-03-14T00:15:33.630000
|
||||
CVE-2024-28251,0,1,19fc23d56f5d00fa3c69d993b0deb280b2d4a1df9b73eb3d828c9ec8b6104ec4,2024-03-14T12:52:16.723000
|
||||
CVE-2024-28338,0,0,9985a0b99abb928b9c829cb29ecce6039c07964aad6d9841c1477c6680f4f9b5,2024-03-12T17:46:17.273000
|
||||
CVE-2024-28339,0,0,06a7f15d55f22a965683bef17c82587bc073ddf9fa5edb33c38c4cd82d5f37f7,2024-03-12T17:46:17.273000
|
||||
CVE-2024-28340,0,0,89775fa07d73d115a7392603111ecb04f65799be74b8d41063e67ed0eb97d0cf,2024-03-12T17:46:17.273000
|
||||
CVE-2024-28388,0,0,f17eaaccd231d77546d7899d1df3085348280bec8337c1a366c3d44c86452404,2024-03-14T03:15:09.173000
|
||||
CVE-2024-28390,0,0,1da0808737c64cfb1966175097fd2c66620ce27fb357d642515e15877a4acd6d,2024-03-14T04:15:09.640000
|
||||
CVE-2024-28391,0,0,2cf4d2f98732c7b04ac1c5926873543ea38367c981d16dbe8f52fbe309920f7c,2024-03-14T04:15:09.697000
|
||||
CVE-2024-28388,0,1,f20800f07aee245fbf5408ead00cec9bf5c1f6fde0c58ac0833a4f3740a134d7,2024-03-14T12:52:09.877000
|
||||
CVE-2024-28390,0,1,c59fe44ce5898e034e8253a1c3bd017a5eae7c1708d584b45d3cdcaf6b6ab3d0,2024-03-14T12:52:09.877000
|
||||
CVE-2024-28391,0,1,b1444c24f7ecf1ab52e2ae0fbb735e6665eab4acbe77c214aa4859db21cb1963,2024-03-14T12:52:09.877000
|
||||
CVE-2024-28429,0,0,caaa64487b84149266e9e941a72e13f93e6070c94b1fe7355fb56db4eb5b2161,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28430,0,0,bf34fb49e742ebf9176808c1e05b7467ed1662a29a5c18afe29f976454928e37,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28431,0,0,148c6be422e12f315897bdd57f5208c74e8137e452c7019eafe29f97f527c418,2024-03-13T14:28:45.217000
|
||||
@ -241466,7 +241466,7 @@ CVE-2024-28432,0,0,4bc8c3df18623e8712ef966fb24c80f6754436b2eb6a0c14d5d3c56f5a161
|
||||
CVE-2024-28535,0,0,05b59fc574e3ec1a67ffae1023c5999e94849ce19d6ee2f539dda71a994d8b6c,2024-03-12T16:02:33.900000
|
||||
CVE-2024-28553,0,0,805b633f3af1b0b015d2f8e90520174ed99391ad33f4ee744bfc3e783d7c9257,2024-03-12T16:02:33.900000
|
||||
CVE-2024-28623,0,0,81bda7f177219bd08e3dc69b11f4157e89434624cca7692be3ee54e609ec67e1,2024-03-13T12:33:51.697000
|
||||
CVE-2024-28662,0,0,e05f096e93e919099c24f0e445269f4c69c3d2dbb3c321cfc964ec75534bdaff,2024-03-13T21:16:01.357000
|
||||
CVE-2024-28662,0,1,69ece6d6842931df6f24b49f57aa09e3d2ee5159729500803e8b5fa3837da086,2024-03-14T12:52:16.723000
|
||||
CVE-2024-28665,0,0,15ff1802f077648abfb71685745562ccf344af547e52cbd5425e81cbe36cae7e,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28666,0,0,5e800cca159186be28f29e1824df7439f0dc92c267c794010b9aa154f3d0c123,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28667,0,0,8609dc77a902b440c3c0b00b00f201e51c1c73cdced91bd71fb67881bef0f7c4,2024-03-13T14:28:45.217000
|
||||
@ -241486,7 +241486,7 @@ CVE-2024-28681,0,0,ed8a4fd064b6b3346412990e6226cbe04bee8a6bd2aaad4671fdcd0478ce5
|
||||
CVE-2024-28682,0,0,2c53ed716809a76ded005fd10ac6d93891dbf2dd9f02238c66f1445af60cb8e7,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28683,0,0,14fce1fb8fe5dd3fb68153125dd387047f48de59cd587ce41acfe8b0e8fa04c2,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28684,0,0,df89c702874c46527da5dc5bf33ec252c05a69f53466623f5ca04f0566a6cd25,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28746,1,1,68b127d8baa050906fc806d29eb629eac7d2be78c059e66496ad730631b35b73,2024-03-14T09:15:47.577000
|
||||
CVE-2024-28746,0,1,4e08f19b517756fb15fbaf966494c1aeec3b9803b4e2b615b4d5a557eb48c84a,2024-03-14T12:52:09.877000
|
||||
CVE-2024-28753,0,0,73ca850c1b6879daba607bc61d7d16457b56173a47004b8bff799b514a526c36,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3b2c,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28757,0,0,2ea8a9bd701b62a4c7d927e860f5361b09b4376e3bc3bbb014ff5d4ca725cec6,2024-03-11T01:32:29.610000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user