mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-03-09T11:00:37.027821+00:00
This commit is contained in:
parent
7b5aab7d74
commit
e1d4f55473
51
CVE-2024/CVE-2024-18xx/CVE-2024-1870.json
Normal file
51
CVE-2024/CVE-2024-18xx/CVE-2024-1870.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2024-1870",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-09T10:15:06.370",
|
||||
"lastModified": "2024-03-09T10:15:06.370",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Colibri Page Builder plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the callActivateLicenseEndpoint function in all versions up to, and including, 1.0.260. This makes it possible for authenticated attackers, with subscriber access or higher, to update the license key."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/colibri-page-builder/trunk/src/License/ActivationForm.php#L356",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3045582/colibri-page-builder/trunk/src/License/ActivationForm.php?contextall=1&old=2888093&old_path=%2Fcolibri-page-builder%2Ftrunk%2Fsrc%2FLicense%2FActivationForm.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/130637ce-d70a-4831-8b88-a2a6e8a95c42?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2024/CVE-2024-23xx/CVE-2024-2330.json
Normal file
88
CVE-2024/CVE-2024-23xx/CVE-2024-2330.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-2330",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-09T09:15:05.977",
|
||||
"lastModified": "2024-03-09T09:15:05.977",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been classified as critical. This affects an unknown part of the file /protocol/index.php. The manipulation of the argument IPAddr leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-256281 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jikedaodao/cve/blob/main/NS-ASG-sql-addmacbind.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256281",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256281",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2024/CVE-2024-23xx/CVE-2024-2331.json
Normal file
88
CVE-2024/CVE-2024-23xx/CVE-2024-2331.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-2331",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-09T10:15:06.570",
|
||||
"lastModified": "2024-03-09T10:15:06.570",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Tourist Reservation System 1.0. It has been declared as critical. This vulnerability affects the function ad_writedata of the file System.cpp. The manipulation of the argument ad_code leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-256282 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wkeyi0x1/vul-report/blob/main/Tourist%20Reservation%20System%20using%20C%2B%2B%20with%20Free%20Source%20Code/buffer-overflow-1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256282",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256282",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
22
README.md
22
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-09T09:00:30.600417+00:00
|
||||
2024-03-09T11:00:37.027821+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-09T08:15:06.217000+00:00
|
||||
2024-03-09T10:15:06.570000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,28 +29,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
240933
|
||||
240936
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `8`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
* [CVE-2024-1123](CVE-2024/CVE-2024-11xx/CVE-2024-1123.json) (`2024-03-09T07:15:07.233`)
|
||||
* [CVE-2024-1124](CVE-2024/CVE-2024-11xx/CVE-2024-1124.json) (`2024-03-09T07:15:08.000`)
|
||||
* [CVE-2024-1125](CVE-2024/CVE-2024-11xx/CVE-2024-1125.json) (`2024-03-09T07:15:08.313`)
|
||||
* [CVE-2024-1320](CVE-2024/CVE-2024-13xx/CVE-2024-1320.json) (`2024-03-09T07:15:08.730`)
|
||||
* [CVE-2024-1767](CVE-2024/CVE-2024-17xx/CVE-2024-1767.json) (`2024-03-09T07:15:09.173`)
|
||||
* [CVE-2024-2329](CVE-2024/CVE-2024-23xx/CVE-2024-2329.json) (`2024-03-09T08:15:06.217`)
|
||||
* [CVE-2024-25501](CVE-2024/CVE-2024-255xx/CVE-2024-25501.json) (`2024-03-09T08:15:05.973`)
|
||||
* [CVE-2024-28089](CVE-2024/CVE-2024-280xx/CVE-2024-28089.json) (`2024-03-09T07:15:09.577`)
|
||||
* [CVE-2024-1870](CVE-2024/CVE-2024-18xx/CVE-2024-1870.json) (`2024-03-09T10:15:06.370`)
|
||||
* [CVE-2024-2330](CVE-2024/CVE-2024-23xx/CVE-2024-2330.json) (`2024-03-09T09:15:05.977`)
|
||||
* [CVE-2024-2331](CVE-2024/CVE-2024-23xx/CVE-2024-2331.json) (`2024-03-09T10:15:06.570`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
* [CVE-2024-26450](CVE-2024/CVE-2024-264xx/CVE-2024-26450.json) (`2024-03-09T08:15:06.120`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
21
_state.csv
21
_state.csv
@ -238277,9 +238277,9 @@ CVE-2024-1118,0,0,e3fd11a546344333b8c35c35f5363b92eb521f87d371ac843fa5cdbb7cbfe4
|
||||
CVE-2024-1120,0,0,936dd6469f361472c41cbe255905233eb8909005bcef59399cb5fdd735d69c83,2024-03-01T14:04:04.827000
|
||||
CVE-2024-1121,0,0,5242fbff2542109039f2dccd3ecf577228b85d96ab3ffc6d3c7465fcd094d166,2024-02-13T19:42:57.107000
|
||||
CVE-2024-1122,0,0,e3c7c1ad4304e630c1635693614bd197bceba74362044ae36b2d3b19524aad38,2024-02-15T19:17:26.630000
|
||||
CVE-2024-1123,1,1,9c107b33a9c78598b6d4cb189216c41a312253dd82554088b5fbe1fa2959b535,2024-03-09T07:15:07.233000
|
||||
CVE-2024-1124,1,1,7fd45c0257b35bfcb0a9a5ecc477af859ebdfa79e92eb86f8c8346309497e24d,2024-03-09T07:15:08
|
||||
CVE-2024-1125,1,1,f75fef907260e226bd45211b8eae777e3186081c448fde49a6bbc5cb8adea772,2024-03-09T07:15:08.313000
|
||||
CVE-2024-1123,0,0,9c107b33a9c78598b6d4cb189216c41a312253dd82554088b5fbe1fa2959b535,2024-03-09T07:15:07.233000
|
||||
CVE-2024-1124,0,0,7fd45c0257b35bfcb0a9a5ecc477af859ebdfa79e92eb86f8c8346309497e24d,2024-03-09T07:15:08
|
||||
CVE-2024-1125,0,0,f75fef907260e226bd45211b8eae777e3186081c448fde49a6bbc5cb8adea772,2024-03-09T07:15:08.313000
|
||||
CVE-2024-1128,0,0,23e0a7ac2eb24205bc0e57b1035d2ffc364cb8e77360b281fd3875c8acaa6717,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1129,0,0,9e26e4f963c1529e8b107dd7310b33bd78874e7f902263578d3990ceccc8167b,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1130,0,0,66f1630830ed1d095eb852a3f063099a0dc3b2263f9c4f8743191411b15cbd61,2024-02-29T13:49:29.390000
|
||||
@ -238380,7 +238380,7 @@ CVE-2024-1316,0,0,71137ee023059efde9ea6dfce3b572409e6580b9426330a66bdb1f551ebc3e
|
||||
CVE-2024-1317,0,0,677d2e22c876d1f8a2362f14eec614350ca5518b287bd87de6939bf8afc48e88,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1318,0,0,422c230b919b2aed39d902af5834079d78461435b9de398b39e0ef988ed8aaa2,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1319,0,0,4e669b4210ff650707325897da6b55c2caa5cb41a85cef69c41685513463c6d1,2024-03-05T13:41:01.900000
|
||||
CVE-2024-1320,1,1,1ec4c9d7ddd78591eeb95f58f24f0c9de688126a662923fad0897d041207c299,2024-03-09T07:15:08.730000
|
||||
CVE-2024-1320,0,0,1ec4c9d7ddd78591eeb95f58f24f0c9de688126a662923fad0897d041207c299,2024-03-09T07:15:08.730000
|
||||
CVE-2024-1322,0,0,55eb557d746bd5b316565e48cf52968ab1ba8b0aa245d5ad47a485b7878e6771,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1323,0,0,f857e29b0540aed96943a25b1179a5166e6aff501672f2c505f52ee84f4e77cb,2024-02-27T14:20:06.637000
|
||||
CVE-2024-1329,0,0,c251ab89131ed5db620ce7b9371daf5508a26377e3f0f0d0996003e3074e8cd1,2024-02-15T18:27:28.837000
|
||||
@ -238560,7 +238560,7 @@ CVE-2024-1758,0,0,6de6dd43b2bb9af7fe1358bc4934bd64904e9488104279e3470618b288cbda
|
||||
CVE-2024-1760,0,0,0a20f47041faa81845898be9ba0faa3a27a19a140e382ff1058d2f999acd0fd1,2024-03-06T15:18:08.093000
|
||||
CVE-2024-1761,0,0,9e36bbb76f5c2b7f4a9f5c6274a1f378aa86f86f618e6f962a515dfe593dc5f7,2024-03-07T13:52:27.110000
|
||||
CVE-2024-1764,0,0,c434e7eb3867d4e9c121215628110f61b78b54be2a078e3d4abbb0d2595e2437,2024-03-06T15:18:08.093000
|
||||
CVE-2024-1767,1,1,af9b58271fe2cff932396ea250a3d29b3f8069abd3d5a9539a5dfec0d691577f,2024-03-09T07:15:09.173000
|
||||
CVE-2024-1767,0,0,af9b58271fe2cff932396ea250a3d29b3f8069abd3d5a9539a5dfec0d691577f,2024-03-09T07:15:09.173000
|
||||
CVE-2024-1769,0,0,4b17a6efe485c004cbf1cc71fd32ae864ff319587ea6998c7a1ad28d6dff65e5,2024-03-05T13:41:01.900000
|
||||
CVE-2024-1771,0,0,cc7280a085dd6f03eb9687c2eff5425926f2bc0e4a81dde799379b7786c7a87e,2024-03-06T15:18:08.093000
|
||||
CVE-2024-1773,0,0,eea85e1a4bb87da89a486d39c94ff7ae4042032c41aee54c0645824074a798c9,2024-03-08T14:02:57.420000
|
||||
@ -238606,6 +238606,7 @@ CVE-2024-1864,0,0,797c711e6b44e5bc5fc07b8a96b3914e190ffab8282378f1e76f968098d889
|
||||
CVE-2024-1865,0,0,72c248580cf80b6b26359b857531fc6d6bafece63af2cd2d90fccedf68d28d3b,2024-02-27T22:15:14.847000
|
||||
CVE-2024-1866,0,0,c996e8524f8bc688a87621835a946e6cc299eedbf430cec590d1bba5d1e5a6d0,2024-02-27T22:15:14.887000
|
||||
CVE-2024-1869,0,0,cff6c8f0755d6d4ba55d7545c106c11346669d86f984fb79783c8f1f4307c285,2024-03-01T22:22:25.913000
|
||||
CVE-2024-1870,1,1,76546a68428ba841f53ec4dee04b600b2576be6162e8fd5d6eacdf81d67c7e03,2024-03-09T10:15:06.370000
|
||||
CVE-2024-1871,0,0,c60dbb1c934e80a64fb33a6e2c256794451ba2b4a16b3deb27a47189bebba050,2024-02-29T09:15:06.190000
|
||||
CVE-2024-1875,0,0,6b658f389b536cea98293568c7ee6644587a9b1bef069f774207e95c99ee5146,2024-02-29T01:43:56.130000
|
||||
CVE-2024-1876,0,0,82560fab1f4fbe2b28673412a54026b5c1806e6e970cf396594ce5608059f917,2024-02-29T09:15:06.320000
|
||||
@ -239726,7 +239727,7 @@ CVE-2024-23286,0,0,3a3ac4fe44c85fe94cea0225e0a064200cd84c6a8d195e01d14bfa256f0d1
|
||||
CVE-2024-23287,0,0,c58ae62f6494d2a94d4353ea0420ad2d83bdf90a920ca47b31647814cce0d864,2024-03-08T14:02:57.420000
|
||||
CVE-2024-23288,0,0,2220ac70f77367cd88bd84f6b11703e03e7de54d6801f402f025b7c5ef4a9069,2024-03-08T14:02:57.420000
|
||||
CVE-2024-23289,0,0,74d35dbe495c7642f763a5758de5555020e63f0e9c4c7fb71c0a62313b1a48a1,2024-03-08T14:02:57.420000
|
||||
CVE-2024-2329,1,1,9c8e65a4fd5d602fe14cf87a0b1612d024c6a1ed1e9c03669d8d941edd5ca8c1,2024-03-09T08:15:06.217000
|
||||
CVE-2024-2329,0,0,9c8e65a4fd5d602fe14cf87a0b1612d024c6a1ed1e9c03669d8d941edd5ca8c1,2024-03-09T08:15:06.217000
|
||||
CVE-2024-23290,0,0,ae16c7bd64254777e8ec093a5acaa858f7d0f54b3f14d450d5952c05173f9f60,2024-03-08T14:02:57.420000
|
||||
CVE-2024-23291,0,0,04df7ee4b5e53fb596d12b117323f7b0b3bbb5f6de58ae6aeeee1ebbd555c499,2024-03-08T14:02:57.420000
|
||||
CVE-2024-23292,0,0,52f99bdd63acae4b605d2ded28155ff671a22b372187b5bb34f67711a2b6ca46,2024-03-08T14:02:57.420000
|
||||
@ -239735,6 +239736,7 @@ CVE-2024-23294,0,0,57c91e91a2082dfe96663ac4b06553ebfe4af3f38ebcc64fc4b91852476bd
|
||||
CVE-2024-23295,0,0,11339cc0778c5660cfdfde02f62fcb9fc218757d722b581630970bfb87b76f02,2024-03-08T14:02:57.420000
|
||||
CVE-2024-23296,0,0,70f66a07da76489183592b282c10bccbbe2df9dbdd0480c70367e69713458ad2,2024-03-07T19:15:11.687000
|
||||
CVE-2024-23297,0,0,24ee6fcfdad75d10a074c7f7c8c3078e2c905d064d4f4a83f74c1bc6866f52d0,2024-03-08T14:02:57.420000
|
||||
CVE-2024-2330,1,1,f750c6de0b993e7ca0cb7ea32ed94526e38e9a42251838f7fc8de884202b9223,2024-03-09T09:15:05.977000
|
||||
CVE-2024-23301,0,0,95f1c4c0d3c3f56beb5ca2f43c481bd416943d89ac106cdf8ea6bddea7fc220a,2024-02-21T03:15:08.950000
|
||||
CVE-2024-23302,0,0,863344aa30e4660a85cb1dadb5cc739d77d5cca4411a54dffe0a3cc5e6d4c938,2024-02-29T13:49:29.390000
|
||||
CVE-2024-23304,0,0,f4bc63f089c081f8de89565719320483c4f38e3af47af8e7dc8d4d30748891c3,2024-02-13T22:49:18.687000
|
||||
@ -239742,6 +239744,7 @@ CVE-2024-23305,0,0,b70f6c5806a40ee812b208fff2ce28f5f3b7f49be205944ff9372794cc2b6
|
||||
CVE-2024-23306,0,0,b32b8210ccda58dcc1f1ee55cd283a062221bce6519a58fb2184ccff58dcc4fc,2024-02-14T18:04:45.380000
|
||||
CVE-2024-23307,0,0,82ea106241eb58ab4d192216f2f5a2d110882416a201ecd04c1f9cfb732634bc,2024-01-31T20:38:12.743000
|
||||
CVE-2024-23308,0,0,0eaa9f4723448107ead01ec4175db96e103411e07435a0e191d2a95ba6f22d1e,2024-02-14T18:04:45.380000
|
||||
CVE-2024-2331,1,1,1a09ed5ec8fc305c8d02b62047dc395bbc7b828d7dec62d39cd89e1cf9121aa6,2024-03-09T10:15:06.570000
|
||||
CVE-2024-23310,0,0,c7355a50b4bca7bc3b633f9707105f29200f0be36a2fd5cfb29df38b858909c7,2024-02-20T19:50:53.960000
|
||||
CVE-2024-23313,0,0,ca34781688f7e9926dc7e3cf4b6af4657420b9da713475de2ea189c35b7183d1,2024-02-20T19:50:53.960000
|
||||
CVE-2024-23314,0,0,b1c4a7acc71e147348da30d8a66dbeab4342e6585976e49de7252a67ae54f62d,2024-02-14T18:04:45.380000
|
||||
@ -240502,7 +240505,7 @@ CVE-2024-25461,0,0,ff9c7389dbf883803b3d7ff0b96f823d8c83a19a6abab9dd2ebda71c398b5
|
||||
CVE-2024-25466,0,0,c4ed87974de177e036ba4c046a8b808bfb2e5d37116e1f3dbea09f35fe2aed68,2024-02-16T13:37:51.433000
|
||||
CVE-2024-25468,0,0,689cbd3de116ed2f097be6892186e0dd30daa2bde9afea2c256b5d624b13afab,2024-02-20T19:50:53.960000
|
||||
CVE-2024-25469,0,0,96be9bcc7fde8f9b63f103d576b0d22a9c84a3c5935374af13a2466b2f2f5aa2,2024-02-26T13:42:22.567000
|
||||
CVE-2024-25501,1,1,0b5a69cce4f8803c71ec78b9ab7cd2cf9ae54c805ca80db0c8cc815c858b5a95,2024-03-09T08:15:05.973000
|
||||
CVE-2024-25501,0,0,0b5a69cce4f8803c71ec78b9ab7cd2cf9ae54c805ca80db0c8cc815c858b5a95,2024-03-09T08:15:05.973000
|
||||
CVE-2024-25502,0,0,50331b6b298e51ff1fb5155b43730c3887534f74eacaa5eabfebdbefa930be85,2024-02-16T13:38:00.047000
|
||||
CVE-2024-25551,0,0,08dea6730d2a3539d15dd516547ab3c25a1bf59710632ae63632a88cbff77b71,2024-03-04T13:58:23.447000
|
||||
CVE-2024-25552,0,0,d883aeb50248972b9f86293464fb83b3894fa14aa0a35cda83456c82f7157e6f,2024-03-01T14:04:26.010000
|
||||
@ -240716,7 +240719,7 @@ CVE-2024-26350,0,0,1f62ec8cd425e84b1282a5e55493461489796820c50a425af585677fa2bae
|
||||
CVE-2024-26351,0,0,61b98d66760f09ba8a0757ca890b9ad836349a62d566c880c0eb8336d14dbb04,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26352,0,0,ed876b320273da7c752d57a08640f2d98ce80b026324bdf46d0712ec0097ce54,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26445,0,0,3735cabd04dab3a1baa3e135ef467df65425520025be25bd7cf66dc1b1b0bf61,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26450,0,1,e70e1c7044e1447bb73bfa4a556135e1953f1916a7225089ba5c38735bf8ee34,2024-03-09T08:15:06.120000
|
||||
CVE-2024-26450,0,0,e70e1c7044e1447bb73bfa4a556135e1953f1916a7225089ba5c38735bf8ee34,2024-03-09T08:15:06.120000
|
||||
CVE-2024-26455,0,0,b8d798122eed5fa7dc5e81852b3374f7f4b40339c21e80b998d09e1a756fc71d,2024-02-26T22:10:40.463000
|
||||
CVE-2024-26458,0,0,4b2bac12846011765db5a8d92c99fed71bd0c8fd706ee4d4f4c7e419547c7ad4,2024-02-29T13:49:29.390000
|
||||
CVE-2024-26461,0,0,904046a1bdb8d57e836285398ec79f3a5f035120c749bfa545aeddc73ebaca7d,2024-02-29T13:49:29.390000
|
||||
@ -240892,7 +240895,7 @@ CVE-2024-27949,0,0,12ee9b935394b527d1677a59b517c94d0df067a0b32bfff31d7cb2be5b4b5
|
||||
CVE-2024-27950,0,0,56d632dad56c45d949d3327de16e5b70b08683cea8ce7876ca8c59cc37ee8062,2024-03-01T14:04:04.827000
|
||||
CVE-2024-28084,0,0,2ea238298cc724e9290d5587502d4eedb8db15dd1861547724435b977511956c,2024-03-04T13:58:23.447000
|
||||
CVE-2024-28088,0,0,9a10dd503198550e89a078bdf745e1ea7de71394ab5735ab0f1469895e72b20d,2024-03-04T13:58:23.447000
|
||||
CVE-2024-28089,1,1,86c02185c28f01854145b18859cb689806d221e7f2a4a66edfd83a90b723ef69,2024-03-09T07:15:09.577000
|
||||
CVE-2024-28089,0,0,86c02185c28f01854145b18859cb689806d221e7f2a4a66edfd83a90b723ef69,2024-03-09T07:15:09.577000
|
||||
CVE-2024-28094,0,0,45821c38270b8552e50f50b73436d99164a20d22d9b4b8876276d92b2a0a88d9,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28095,0,0,cc359d20cf58cf4c4e6a4bc345ac1d1135a557dfb7920f405bfe639456bcfe46,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28096,0,0,bd233bb77c2105c8f9ae41f3196895f407f421cf037a91cc0eb753e3f00e4372,2024-03-07T13:52:27.110000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user