mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-04-26T06:00:37.570677+00:00
This commit is contained in:
parent
8a7a988f79
commit
e4fa4f849f
20
CVE-2024/CVE-2024-09xx/CVE-2024-0905.json
Normal file
20
CVE-2024/CVE-2024-09xx/CVE-2024-0905.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-0905",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-04-26T05:15:49.907",
|
||||
"lastModified": "2024-04-26T05:15:49.907",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Fancy Product Designer WordPress plugin before 6.1.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against unauthenticated and admin-level users"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/3b9eba0d-29aa-47e4-b17f-4cf4bbf8b690/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-21xx/CVE-2024-2159.json
Normal file
20
CVE-2024/CVE-2024-21xx/CVE-2024-2159.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-2159",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-04-26T05:15:50.000",
|
||||
"lastModified": "2024-04-26T05:15:50.000",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Social Sharing Plugin WordPress plugin before 3.3.61 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/d7fa9849-c82a-4efd-84b6-9245053975ba/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-226xx/CVE-2024-22632.json
Normal file
20
CVE-2024/CVE-2024-226xx/CVE-2024-22632.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-22632",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-26T04:15:08.830",
|
||||
"lastModified": "2024-04-26T04:15:08.830",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Setor Informatica Sistema Inteligente para Laboratorios (S.I.L.) 388 was discovered to contain a remote code execution (RCE) vulnerability via the hmsg parameter. This vulnerability is triggered via a crafted POST request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://tomiodarim.io/posts/cve-2024-22632-3/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-226xx/CVE-2024-22633.json
Normal file
20
CVE-2024/CVE-2024-226xx/CVE-2024-22633.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-22633",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-26T04:15:08.910",
|
||||
"lastModified": "2024-04-26T04:15:08.910",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Setor Informatica Sistema Inteligente para Laboratorios (S.I.L.) 388 was discovered to contain a remote code execution (RCE) vulnerability via the hprinter parameter. This vulnerability is triggered via a crafted POST request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://tomiodarim.io/posts/cve-2024-22632-3/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-23xx/CVE-2024-2310.json
Normal file
20
CVE-2024/CVE-2024-23xx/CVE-2024-2310.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-2310",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-04-26T05:15:50.040",
|
||||
"lastModified": "2024-04-26T05:15:50.040",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP Google Review Slider WordPress plugin before 13.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/7a2c173c-19e3-4f48-b3af-14790b5b8e94/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-24xx/CVE-2024-2429.json
Normal file
20
CVE-2024/CVE-2024-24xx/CVE-2024-2429.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-2429",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-04-26T05:15:50.083",
|
||||
"lastModified": "2024-04-26T05:15:50.083",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Salon booking system WordPress plugin through 9.6.5 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/1c6812d8-a218-4c15-9e2d-d43f3f3b0e78/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-24xx/CVE-2024-2439.json
Normal file
20
CVE-2024/CVE-2024-24xx/CVE-2024-2439.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-2439",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-04-26T05:15:50.127",
|
||||
"lastModified": "2024-04-26T05:15:50.127",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Salon booking system WordPress plugin through 9.6.5 does not sanitise and escape some of its settings, which could allow high privilege users such as Editor to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/7a375077-fc70-4389-b109-28fce3db2aef/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-26xx/CVE-2024-2603.json
Normal file
20
CVE-2024/CVE-2024-26xx/CVE-2024-2603.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-2603",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-04-26T05:15:50.163",
|
||||
"lastModified": "2024-04-26T05:15:50.163",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Salon booking system WordPress plugin through 9.6.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin (or editor depending on Salon booking system WordPress plugin through 9.6.5 configuration) to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/b4186c03-99ee-4297-85c0-83b7053afc1c/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-28xx/CVE-2024-2837.json
Normal file
20
CVE-2024/CVE-2024-28xx/CVE-2024-2837.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-2837",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-04-26T05:15:50.200",
|
||||
"lastModified": "2024-04-26T05:15:50.200",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP Chat App WordPress plugin before 3.6.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admins to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/91058c48-f262-4fcc-9390-472d59d61115/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-29xx/CVE-2024-2908.json
Normal file
20
CVE-2024/CVE-2024-29xx/CVE-2024-2908.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-2908",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-04-26T05:15:50.240",
|
||||
"lastModified": "2024-04-26T05:15:50.240",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Call Now Button WordPress plugin before 1.4.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/58c9e088-ed74-461a-b305-e217679f26c1/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30564",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-18T15:15:30.220",
|
||||
"lastModified": "2024-04-18T18:25:55.267",
|
||||
"lastModified": "2024-04-26T04:15:09.020",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue inandrei-tatar nora-firebase-common between v.1.0.41 and v.1.12.2 allows a remote attacker to execute arbitrary code via a crafted script to the updateState parameter of the updateStateInternal method."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en andrei-tatar nora-firebase-common entre v.1.0.41 y v.1.12.2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado en el par\u00e1metro updateState del m\u00e9todo updateStateInternal."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
@ -19,10 +23,6 @@
|
||||
{
|
||||
"url": "https://github.com/andrei-tatar/nora-firebase-common/commit/bf30b75d51be04f6c1f884561a223226c890f01b",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/andrei-tatar/nora-firebase-common/issues/9",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-30xx/CVE-2024-3048.json
Normal file
20
CVE-2024/CVE-2024-30xx/CVE-2024-3048.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-3048",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-04-26T05:15:50.280",
|
||||
"lastModified": "2024-04-26T05:15:50.280",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Bannerlid WordPress plugin through 1.1.0 does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as administrators"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/e179ff7d-137c-48bf-8b18-e874e3f876f4/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-30xx/CVE-2024-3058.json
Normal file
20
CVE-2024/CVE-2024-30xx/CVE-2024-3058.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-3058",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-04-26T05:15:50.320",
|
||||
"lastModified": "2024-04-26T05:15:50.320",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The ENL Newsletter WordPress plugin through 1.0.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/fc33c79d-ad24-4d55-973a-25280995a2ab/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-30xx/CVE-2024-3059.json
Normal file
20
CVE-2024/CVE-2024-30xx/CVE-2024-3059.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-3059",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-04-26T05:15:50.360",
|
||||
"lastModified": "2024-04-26T05:15:50.360",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The ENL Newsletter WordPress plugin through 1.0.1 does not have CSRF checks in some places, which could allow attackers to make logged in admins delete arbitrary Campaigns via a CSRF attack"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/e154096d-e9b7-43ba-9a34-81a6c431025c/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-30xx/CVE-2024-3060.json
Normal file
20
CVE-2024/CVE-2024-30xx/CVE-2024-3060.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-3060",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-04-26T05:15:50.397",
|
||||
"lastModified": "2024-04-26T05:15:50.397",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The ENL Newsletter WordPress plugin through 1.0.1 does not sanitize and escape a parameter before using it in a SQL statement, allowing admin+ to perform SQL injection attacks"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-30xx/CVE-2024-3075.json
Normal file
20
CVE-2024/CVE-2024-30xx/CVE-2024-3075.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-3075",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-04-26T05:15:50.433",
|
||||
"lastModified": "2024-04-26T05:15:50.433",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The MM-email2image WordPress plugin through 0.2.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/450375f6-a9d4-49f6-8bab-867774372795/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
71
CVE-2024/CVE-2024-31xx/CVE-2024-3154.json
Normal file
71
CVE-2024/CVE-2024-31xx/CVE-2024-3154.json
Normal file
@ -0,0 +1,71 @@
|
||||
{
|
||||
"id": "CVE-2024-3154",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-26T04:15:09.217",
|
||||
"lastModified": "2024-04-26T04:15:09.217",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in cri-o, where an arbitrary systemd property can be injected via a Pod annotation. Any user who can create a pod with an arbitrary annotation may perform an arbitrary action on the host system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-3154",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272532",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cri-o/cri-o/security/advisories/GHSA-2cgq-h8xw-2v5j",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/opencontainers/runc/pull/4217",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/opencontainers/runtime-spec/blob/main/features.md#unsafe-annotations-in-configjson",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-31xx/CVE-2024-3188.json
Normal file
20
CVE-2024/CVE-2024-31xx/CVE-2024-3188.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-3188",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-04-26T05:15:50.477",
|
||||
"lastModified": "2024-04-26T05:15:50.477",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP Shortcodes Plugin \u2014 Shortcodes Ultimate WordPress plugin before 7.1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/bc273e75-7faf-4eaf-8ebd-efc5d6e9261f/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-324xx/CVE-2024-32404.json
Normal file
20
CVE-2024/CVE-2024-324xx/CVE-2024-32404.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-32404",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-26T04:15:09.107",
|
||||
"lastModified": "2024-04-26T04:15:09.107",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Server-Side Template Injection (SSTI) vulnerability in inducer relate before v.2024.1, allows remote attackers to execute arbitrary code via a crafted payload to the Markup Sandbox feature."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/2404-exploits/rlts-sstexec.txt",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-324xx/CVE-2024-32406.json
Normal file
20
CVE-2024/CVE-2024-324xx/CVE-2024-32406.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-32406",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-26T04:15:09.163",
|
||||
"lastModified": "2024-04-26T04:15:09.163",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Server-Side Template Injection (SSTI) vulnerability in inducer relate before v.2024.1 allows a remote attacker to execute arbitrary code via a crafted payload to the Batch-Issue Exam Tickets function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/178251/Relate-Learning-And-Teaching-System-SSTI-Remote-Code-Execution.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
38
README.md
38
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-26T04:00:38.059778+00:00
|
||||
2024-04-26T06:00:37.570677+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-26T03:15:06.740000+00:00
|
||||
2024-04-26T05:15:50.477000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,27 +33,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
246824
|
||||
246843
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `19`
|
||||
|
||||
- [CVE-2023-47252](CVE-2023/CVE-2023-472xx/CVE-2023-47252.json) (`2024-04-26T03:15:06.617`)
|
||||
- [CVE-2024-31755](CVE-2024/CVE-2024-317xx/CVE-2024-31755.json) (`2024-04-26T03:15:06.690`)
|
||||
- [CVE-2024-33671](CVE-2024/CVE-2024-336xx/CVE-2024-33671.json) (`2024-04-26T02:15:06.410`)
|
||||
- [CVE-2024-33672](CVE-2024/CVE-2024-336xx/CVE-2024-33672.json) (`2024-04-26T02:15:06.607`)
|
||||
- [CVE-2024-33673](CVE-2024/CVE-2024-336xx/CVE-2024-33673.json) (`2024-04-26T02:15:06.790`)
|
||||
- [CVE-2024-4163](CVE-2024/CVE-2024-41xx/CVE-2024-4163.json) (`2024-04-26T03:15:06.740`)
|
||||
- [CVE-2024-0905](CVE-2024/CVE-2024-09xx/CVE-2024-0905.json) (`2024-04-26T05:15:49.907`)
|
||||
- [CVE-2024-2159](CVE-2024/CVE-2024-21xx/CVE-2024-2159.json) (`2024-04-26T05:15:50.000`)
|
||||
- [CVE-2024-22632](CVE-2024/CVE-2024-226xx/CVE-2024-22632.json) (`2024-04-26T04:15:08.830`)
|
||||
- [CVE-2024-22633](CVE-2024/CVE-2024-226xx/CVE-2024-22633.json) (`2024-04-26T04:15:08.910`)
|
||||
- [CVE-2024-2310](CVE-2024/CVE-2024-23xx/CVE-2024-2310.json) (`2024-04-26T05:15:50.040`)
|
||||
- [CVE-2024-2429](CVE-2024/CVE-2024-24xx/CVE-2024-2429.json) (`2024-04-26T05:15:50.083`)
|
||||
- [CVE-2024-2439](CVE-2024/CVE-2024-24xx/CVE-2024-2439.json) (`2024-04-26T05:15:50.127`)
|
||||
- [CVE-2024-2603](CVE-2024/CVE-2024-26xx/CVE-2024-2603.json) (`2024-04-26T05:15:50.163`)
|
||||
- [CVE-2024-2837](CVE-2024/CVE-2024-28xx/CVE-2024-2837.json) (`2024-04-26T05:15:50.200`)
|
||||
- [CVE-2024-2908](CVE-2024/CVE-2024-29xx/CVE-2024-2908.json) (`2024-04-26T05:15:50.240`)
|
||||
- [CVE-2024-3048](CVE-2024/CVE-2024-30xx/CVE-2024-3048.json) (`2024-04-26T05:15:50.280`)
|
||||
- [CVE-2024-3058](CVE-2024/CVE-2024-30xx/CVE-2024-3058.json) (`2024-04-26T05:15:50.320`)
|
||||
- [CVE-2024-3059](CVE-2024/CVE-2024-30xx/CVE-2024-3059.json) (`2024-04-26T05:15:50.360`)
|
||||
- [CVE-2024-3060](CVE-2024/CVE-2024-30xx/CVE-2024-3060.json) (`2024-04-26T05:15:50.397`)
|
||||
- [CVE-2024-3075](CVE-2024/CVE-2024-30xx/CVE-2024-3075.json) (`2024-04-26T05:15:50.433`)
|
||||
- [CVE-2024-3154](CVE-2024/CVE-2024-31xx/CVE-2024-3154.json) (`2024-04-26T04:15:09.217`)
|
||||
- [CVE-2024-3188](CVE-2024/CVE-2024-31xx/CVE-2024-3188.json) (`2024-04-26T05:15:50.477`)
|
||||
- [CVE-2024-32404](CVE-2024/CVE-2024-324xx/CVE-2024-32404.json) (`2024-04-26T04:15:09.107`)
|
||||
- [CVE-2024-32406](CVE-2024/CVE-2024-324xx/CVE-2024-32406.json) (`2024-04-26T04:15:09.163`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2024-31497](CVE-2024/CVE-2024-314xx/CVE-2024-31497.json) (`2024-04-26T02:15:06.197`)
|
||||
- [CVE-2024-3772](CVE-2024/CVE-2024-37xx/CVE-2024-3772.json) (`2024-04-26T02:15:06.983`)
|
||||
- [CVE-2024-30564](CVE-2024/CVE-2024-305xx/CVE-2024-30564.json) (`2024-04-26T04:15:09.020`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
37
_state.csv
37
_state.csv
@ -233275,7 +233275,7 @@ CVE-2023-47249,0,0,588609ccc6bec02a404ce20559ef14e4186adae4632c04e95b8afe3f76e9f
|
||||
CVE-2023-4725,0,0,04164ede04550b9698eb48a780e218da3cc662c0ab120fa603ad1bfd469e0c8d,2023-11-07T04:22:54.047000
|
||||
CVE-2023-47250,0,0,797794357be142015cae6ecf62d3ef166201b7faf38b79ac29c86b5211586e03,2023-11-30T20:55:39.480000
|
||||
CVE-2023-47251,0,0,334ed573018069c019e1a512b4215ed53ff35e3afe580c8dea578498d7671511,2023-11-30T20:49:57.593000
|
||||
CVE-2023-47252,1,1,cf1020f0dcb2dbe11a4582076d2c7eaa7051168d2cdbb1d0025f59a97ebc0365,2024-04-26T03:15:06.617000
|
||||
CVE-2023-47252,0,0,cf1020f0dcb2dbe11a4582076d2c7eaa7051168d2cdbb1d0025f59a97ebc0365,2024-04-26T03:15:06.617000
|
||||
CVE-2023-47253,0,0,ba8811cc3b5e7eeab51338b3370421a30d297b58dee68080760ae2c3fe084981,2023-11-14T20:03:09.900000
|
||||
CVE-2023-47254,0,0,2ceaabea8b552c825ee67e0a4275d459a09167965723aa94a10b6aef1023ef84,2023-12-12T22:33:48.820000
|
||||
CVE-2023-47256,0,0,135dc3a37d912e8d13804a14befd28f178538ec0146ffeff245bc9a355e0e147,2024-02-15T07:15:08.250000
|
||||
@ -239069,6 +239069,7 @@ CVE-2024-0900,0,0,0df16b48e073462cef0a451a68261119942789edbcc049ef43c079272fea0e
|
||||
CVE-2024-0901,0,0,8395d055c39a2ded7a6676d9f91e364a6c601b11f066a458c7ff4909044d580a,2024-03-26T12:55:05.010000
|
||||
CVE-2024-0902,0,0,c022af4b73cd366b52a576af13eecfefbd72fc877962e0376aba015f72537ab5,2024-04-15T13:15:31.997000
|
||||
CVE-2024-0903,0,0,4e5a944405938a6def0adf008001af709d311e38e0572265081d65abf85ff9fb,2024-02-22T19:07:27.197000
|
||||
CVE-2024-0905,1,1,ab0f00ace4634cf46546f03ef2187eb2efee78d0c9c6991d1f77098256ca3ee6,2024-04-26T05:15:49.907000
|
||||
CVE-2024-0906,0,0,2cb73c39a2e6fe8ef5222442ed25db55924374576f26540dbc47cb2f830bdc5d,2024-03-12T12:40:13.500000
|
||||
CVE-2024-0907,0,0,736d9a373e93547114922fac343df53c487c280e59648bef9a3cecc6379f908e,2024-02-29T13:49:29.390000
|
||||
CVE-2024-0909,0,0,7864e9d833556eb295eb67e87cebb39c8d9b11d41ed1f5327a80b30fe013438c,2024-02-08T20:07:51.410000
|
||||
@ -240741,6 +240742,7 @@ CVE-2024-21584,0,0,d66fedfad76e69bf70f964d573fe608d89f94eedd1312d57b206120486115
|
||||
CVE-2024-21585,0,0,6e8206f1fdf94b37b9dcf7444e5790dcbe04c3a87e39f8bb6c4b0625dfa3058a,2024-01-31T00:15:45.920000
|
||||
CVE-2024-21587,0,0,00caf8e0dd355879f913af1e174cfaccf48910da74261d4402cf2eff2334cffc,2024-01-19T17:44:35.830000
|
||||
CVE-2024-21589,0,0,68b0ee433e5dc2a6e0c5986e659a2299beb8087cc670f80d46b90c5ac3b4a35f,2024-01-19T17:41:50.160000
|
||||
CVE-2024-2159,1,1,883cc321624467b2747138051422660297556524b31fdcbd1e60e9defa30d5dc,2024-04-26T05:15:50
|
||||
CVE-2024-21590,0,0,1a5cfa0442f6700627b14500caafe3edf870ae95e41f632c8a8e9b6ad0acd506,2024-04-15T13:15:51.577000
|
||||
CVE-2024-21591,0,0,77ced40d9ea71de7e0f4aa61db192f300bee1246d7e33e78b4e3a0dcf328f916,2024-02-10T00:15:07.937000
|
||||
CVE-2024-21593,0,0,21335c213d77ca1dd069c4b30e9c76b53a2abbe3782fa324a2bf1c217bae5a20,2024-04-15T13:15:51.577000
|
||||
@ -241327,6 +241329,8 @@ CVE-2024-22626,0,0,fc707ee8f5c412b901c3f24bd4c3662a5fd9b8a23f261dbe38ea261f2f9fa
|
||||
CVE-2024-22627,0,0,946da3d0fb3c8b21c74e447c6bf66b7afc411456e784a137e7dc02c86f83a2ae,2024-01-19T14:38:53.237000
|
||||
CVE-2024-22628,0,0,788480fa6919f601646c68f9f25325c618d05969ba2c7889243829bc40d9ae3f,2024-01-19T14:33:00.143000
|
||||
CVE-2024-2263,0,0,df8d6f616c06d7efbf230a22645526f71cba2b5d98ac7477968fae54aee3855c,2024-04-01T12:49:00.877000
|
||||
CVE-2024-22632,1,1,7e26945b84870bf44d673d88ce129d6d5f1547560fd517b5854ed3288bd7b804,2024-04-26T04:15:08.830000
|
||||
CVE-2024-22633,1,1,f2ba128eb9e1780c0fa52511b259b429c5eba6314d087c1365fb504e978d6069,2024-04-26T04:15:08.910000
|
||||
CVE-2024-22635,0,0,4862506d4e37fbac04654e9c145033c5c19772547553e0905cdb496418310552,2024-01-29T15:57:23.770000
|
||||
CVE-2024-22636,0,0,d2329967243db7b2d90664e4db5aafab2eefb2c63c9125405da2b73ddd46c40f,2024-01-29T15:57:32.540000
|
||||
CVE-2024-22637,0,0,26b297452537f73426f9b1e1c51d8375cdf08e35ab6ae3bee9824c37bc50f94b,2024-02-15T15:19:44.187000
|
||||
@ -241493,6 +241497,7 @@ CVE-2024-23085,0,0,27d0f44875030ba128821d0a5604f24565f110d196fa9a9783c10c633bc8b
|
||||
CVE-2024-23086,0,0,84287977eab241265f69ad39dd1efe49fbc488d3bee216c68604fc835c00c346,2024-04-11T19:15:16.670000
|
||||
CVE-2024-2309,0,0,5e7d16d6f71f2f007544bcbcc47dd8107c18e2714e36b52143e4572bbdc63440,2024-04-17T12:48:07.510000
|
||||
CVE-2024-23094,0,0,8b7fd2c37601b9f636934db44ed8e567ef20eff4d921df465afdbb6ef925a041,2024-02-22T19:07:27.197000
|
||||
CVE-2024-2310,1,1,e3ae48c0cf9cfa7bc858090bd42f98b62df334575b3a7f45d9324f7ca852b5db,2024-04-26T05:15:50.040000
|
||||
CVE-2024-23108,0,0,4bd66ae4e2150cd9c3073e095bacf489de77af9a273b611e130c3e3fa4edf7ea,2024-02-07T15:02:00.203000
|
||||
CVE-2024-23109,0,0,c2686a38cd2651bfef8ab0e98ee0dbcce98e98fd7c1f1805290cb9df9c03fe78,2024-02-07T15:04:28.237000
|
||||
CVE-2024-2311,0,0,738ffcbe7f411809b0dd04835f3243a6f3350cd455230e0887015d402141b408,2024-04-10T13:23:38.787000
|
||||
@ -242137,6 +242142,7 @@ CVE-2024-24276,0,0,c0b996f05c041cdec9f97004ccc67bd94d1c66cbf22b8df3dba73751978ab
|
||||
CVE-2024-24278,0,0,3f7eb60b847e1971c5f65cb683e6174dee6547147c3195ceb2f7499f12bdbd36,2024-03-06T15:18:08.093000
|
||||
CVE-2024-24279,0,0,d350732cc4ca29b60cc89e1436f10a4364ab08631ecd4190bd1db7c1d3d102d3,2024-04-09T12:48:04.090000
|
||||
CVE-2024-2428,0,0,a12acd196e6489491150ab75ad9922280151d93b658bfb481d4c1c66079cd163,2024-04-10T13:23:38.787000
|
||||
CVE-2024-2429,1,1,a8ae1602d0825f267a3efaaa88009eadee829935b7f4a78d1649807b21ba88f7,2024-04-26T05:15:50.083000
|
||||
CVE-2024-24291,0,0,ed81ca1f7d07ab5682e5dc3e12510be85bd8028a8e8a8fb1a80b96c7b9ae97e4,2024-02-13T20:13:26.593000
|
||||
CVE-2024-24300,0,0,a8dc475a562e17ac269ab87541d5cc3de5e8b25ad6f69c16a9e202ce4fe0a524,2024-02-15T06:23:39.303000
|
||||
CVE-2024-24301,0,0,eea9ef656f8457ca391649537e978f0d3e4722722df26eae84433b0c4b119a98,2024-02-15T06:23:39.303000
|
||||
@ -242178,6 +242184,7 @@ CVE-2024-2438,0,0,c00f0172cf7ab8467da2d5d83a23b794d6f6a7817b3440d3b686b7132bf26b
|
||||
CVE-2024-24386,0,0,7f40633635579a6e57b93f4e362e7ec6b3a2af9b3c5c8050723583bf6d085ce4,2024-02-15T14:28:31.380000
|
||||
CVE-2024-24388,0,0,3f3d5731a0be4e881fd82d2a190d75a64cc3a7cfd8c995358dcecccf32a929bb,2024-02-08T20:04:04.027000
|
||||
CVE-2024-24389,0,0,fc2f959521db6beb1a64904c90b55c43557e2fa9885e5140ef9962701e570aba,2024-03-07T13:52:27.110000
|
||||
CVE-2024-2439,1,1,26e7ef28c5038284b9838e609ebacc969e3c2c2e7fccdfb99fde0bb1edc80470,2024-04-26T05:15:50.127000
|
||||
CVE-2024-24393,0,0,90dfcf43d684735b8235a3326fe419899f2f2a761b862d82b04f2c974933d9fe,2024-02-15T18:13:59.327000
|
||||
CVE-2024-24396,0,0,490bf819c482001abd1dcba25c4c319f8da0b154dd54e7da19b5736b32d31753,2024-02-14T17:58:05.850000
|
||||
CVE-2024-24397,0,0,c42f6e3d95ec1079046817a9a19cbab9b7268b0d74721cd48822bbfd3065325f,2024-02-22T03:39:02.803000
|
||||
@ -243066,6 +243073,7 @@ CVE-2024-26018,0,0,f0a23aadd063ff7c7efa65bdfb2fba637cb4053fe19b3da7278a7f893beab
|
||||
CVE-2024-26019,0,0,fbe6a7f77deb15cc085d52bc5fe2b39474b81c363a3a1755ab2818a8be2623e5,2024-04-11T12:47:44.137000
|
||||
CVE-2024-26023,0,0,03df4473c85ab0c8247169f36cdaabb6d0ade251a86d2a476e4dede57424f28c,2024-04-15T13:15:31.997000
|
||||
CVE-2024-26028,0,0,f0eeab6f00388b393e9761660fb13451fd75e54f8248c45c23f5d18cc79809b2,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2603,1,1,1e8d89cc2521a0c4429de58f66d903edaef0e2256285ff6550acdda1c55699ba,2024-04-26T05:15:50.163000
|
||||
CVE-2024-26030,0,0,6e3023416b037dd092fe7b5e942072e3533649d1b2cfd157142cc39338fedbad,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26031,0,0,ed002faaad586ba4ca84a6198e87a403fdacf5cc79e96297a7527ff0ace203b7,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26032,0,0,d12b1deafb7f503f2da2b6f08ed3ffc2b0c3783c86e2506252b03bfbb01459b8,2024-03-18T19:40:00.173000
|
||||
@ -244364,6 +244372,7 @@ CVE-2024-28345,0,0,9f53096e64fde0bd9e67c2ba1058971494111a4dba7285ed04f98db5747f2
|
||||
CVE-2024-28353,0,0,f5d0b12a1e8a931f5519e51563d18b142745d332ff192847a7afb495f17e2dd3,2024-03-15T12:53:06.423000
|
||||
CVE-2024-28354,0,0,b6680336ce24c3665bbea7456a49c23f2010021d3a256de9fa063452e0cf7d3a,2024-03-15T12:53:06.423000
|
||||
CVE-2024-2836,0,0,9acd34fc60cb65ba9cd271e5ec35a02f0cd82360d653d80e871f78f2c63ee537,2024-04-15T13:15:31.997000
|
||||
CVE-2024-2837,1,1,3d167bd22657690bed669dc6a1f5948fad53db1d85da4f5a1dc02a945d281e16,2024-04-26T05:15:50.200000
|
||||
CVE-2024-28383,0,0,4ebb5b688ac785b11132be45898bb9d7934c49dcd0ae78bf745a27cbe4cf3c09,2024-03-14T14:21:20.217000
|
||||
CVE-2024-28386,0,0,babe8ca097e0c09213bc5c6af798d9ab75b1906fe65d8568532f7dfbcdf59f5c,2024-03-25T16:43:06.137000
|
||||
CVE-2024-28387,0,0,50317bd50b8bed7df4714df1431ccc5e21589c7d6b48de3eead147adffba9438,2024-03-25T16:43:06.137000
|
||||
@ -244678,6 +244687,7 @@ CVE-2024-29066,0,0,b033dec16249c47216f72affbb210c8ed478f17a804b8c831619777a2cc5b
|
||||
CVE-2024-2907,0,0,0de4eaf582874a4e5ac2ae24af0fa8e609e58802e166fffc037ff11637779bab,2024-04-25T13:18:13.537000
|
||||
CVE-2024-29071,0,0,5ff903755374c23b025a98d3cc2b0f06ea188aa4151e3658c02fd385bc8b4fa8,2024-03-25T13:47:14.087000
|
||||
CVE-2024-29074,0,0,9e8f322269475ed9cf88d107d6401cb08d7756267afe6b14bb883cfb51c03588,2024-04-02T12:50:42.233000
|
||||
CVE-2024-2908,1,1,d718b42a8221eb5044b0ae58c8139cc5d0bade869224164c9bfe63e40dcbe081,2024-04-26T05:15:50.240000
|
||||
CVE-2024-29086,0,0,1ba59cf7e266064553649d504d13e7bbef5ec69a70b08610439516755a245119,2024-04-02T12:50:42.233000
|
||||
CVE-2024-29089,0,0,d048736b15469f0b39e3b876166869fc2f8a5b0a20328918b1229acf18e4ac1f,2024-03-20T13:00:16.367000
|
||||
CVE-2024-2909,0,0,59396b4bac4e29599b0f55c9fd39d8de81b55a6d460fef5a9da71e54c2be2d49,2024-04-11T01:25:40.947000
|
||||
@ -245368,6 +245378,7 @@ CVE-2024-30468,0,0,97a9b2808fcc8915cd24bfaf7f54deaceab99abf59bf935a157c8b40f4b70
|
||||
CVE-2024-30469,0,0,27281734a967c544466176225d5b748c65afaa34ac64dbc81f344b0ba4360d31,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30477,0,0,e57a5e6fa510ec9057ebfdd86316546dd94e1dabae4fad5cc81ff907e6cfb50c,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30478,0,0,7d7533c1a9dedc51f4ca6100785aae3de1530d7d091146af0639adfb42b6a065,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3048,1,1,5d30fdc6436314adb2b70e805f6b11714943f230c89053322061b1887b39feb9,2024-04-26T05:15:50.280000
|
||||
CVE-2024-30482,0,0,570bede6c16b4a7f5e8b36059aeda7f1a299c81f1153ac528a60791c716caf63,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30483,0,0,6c48131c3767e81f61ec34b0bc223a59e072c0c0b055c8c0e04f20b2876077ea,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30486,0,0,3b668ae931cda4b6a387bfa69ea17dffa696817ef5a0dd2b2ba0b8d1d89d01a9,2024-04-01T01:12:59.077000
|
||||
@ -245430,7 +245441,7 @@ CVE-2024-30558,0,0,c487b7e520828364fad2b07b74e7c881d68876bac73b13b5c83e0dfd99fed
|
||||
CVE-2024-30559,0,0,30881b502a00e1f0b4af436d9e17ecd66ddff7c4f60889245892c374e2f0a5b2,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30560,0,0,ccfcb6a4f1b36743251fe438eda9434abbf3461c0ab9481afa870f06016b12e2,2024-04-25T13:18:13.537000
|
||||
CVE-2024-30561,0,0,03bc43de8aff9caae9f72d908884b596acdfb45cf5a607bf3a61d00b78d408af,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30564,0,0,5f976284dee8adc6f867c668cd15b1659935b33cf9e4e2c130b09997500e7317,2024-04-18T18:25:55.267000
|
||||
CVE-2024-30564,0,1,16170f1b4edbcf40cdf248a17b71e43d461e76a64078b4672c7fb05d4886d5dc,2024-04-26T04:15:09.020000
|
||||
CVE-2024-30565,0,0,3c10663ebaef8c263e29a3b4fcd5ce9f26a98e5c4788e4f23a40d6624f566f6b,2024-04-04T12:48:41.700000
|
||||
CVE-2024-30567,0,0,447b4353e8045b75e32e568c5da0f40429816963a76cd7c63967e8f0beeca893,2024-04-16T13:24:07.103000
|
||||
CVE-2024-30568,0,0,31ce5d7ef83a345bc485099d3705d8788459cf828ab7d0b94885f7bc40a70cff,2024-04-03T17:24:18.150000
|
||||
@ -245438,6 +245449,7 @@ CVE-2024-30569,0,0,d548955a85cf80696d15b1d4c46cd6662c11d8d9f149868bdc5b584ae206e
|
||||
CVE-2024-30570,0,0,47165afd2a0337ae9b15921264ed392e129dcb0a5824d82a2839f88c9ccbe5b6,2024-04-03T17:24:18.150000
|
||||
CVE-2024-30571,0,0,c50a42ed59a362d8828984df3d937cebc0fc1cd6656b81bbcd45275d74d7547a,2024-04-03T17:24:18.150000
|
||||
CVE-2024-30572,0,0,57e1fe75a16162fb8db4aa9b45ee46c9d7b33cf4be8983bf1e85c221316c95ba,2024-04-03T17:24:18.150000
|
||||
CVE-2024-3058,1,1,3416b567a1e7f348f139f1351dcf9f2f0c9d4a564d2f273dc57b385c6d53cd9f,2024-04-26T05:15:50.320000
|
||||
CVE-2024-30583,0,0,8d4c098fc02cad68349435331fb2990e298cb57ef90e4427b47a624cfd49c5b8,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30584,0,0,62ee47c2440175729b0276209a6459be7534b11d3abd207c43def002781888ca,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30585,0,0,a40a5c456ca36791f55ae1311c37edecc8f5c126bc2ac7d2154551e2396c6dc1,2024-03-28T16:07:30.893000
|
||||
@ -245445,6 +245457,7 @@ CVE-2024-30586,0,0,a186fb979ed65c88ce62a290e6f855128163c9fa77c5355abfb2bb731e824
|
||||
CVE-2024-30587,0,0,23c200ae4001630b29710efdd8698d85648712273d7372a752920032f4d947e3,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30588,0,0,a78cc1e723dc7738ea3aa122a4b45c10693faddfd2183ab3270fc6b1c4499964,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30589,0,0,7f3bd7ec901fe014af7dcf666935ddd3d39c0fc2ff28ac8eaf8d31eadbb90b80,2024-03-28T16:07:30.893000
|
||||
CVE-2024-3059,1,1,5382269796faa9d6a68738ae10b82000a96a7b3b805c7966a93d46edac15d983,2024-04-26T05:15:50.360000
|
||||
CVE-2024-30590,0,0,b29e37400568bf3ef1858eef7769bf083a47c61a106f27df4b8173fc1d40814d,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30591,0,0,fccd0ace4239a30fa0ef4b9ee775d5e196ef1d9d76c1e5f2b5d345c8f64facf1,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30592,0,0,a707460e8e70159424b4543df18a9eb4f29ee9778a40f23b0bd8a216605d05a0,2024-03-28T16:07:30.893000
|
||||
@ -245455,6 +245468,7 @@ CVE-2024-30596,0,0,7cd0dbe59c07e524347269d6ad600edbf2ce3681f61fcb58b1ea4be53950c
|
||||
CVE-2024-30597,0,0,c2c4d6014cd4a690dc2be3f521581455ed497747d3319329dc997bfbd14251ff,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30598,0,0,3455a65bcba40de15b293f4cbe7609b01a090d4c25ed20ab971f6a106299dc77,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30599,0,0,45a9c2ef0bb4943ce0d3dab897bfaa7a787bb1701760e2b34a4aad8235e0de1c,2024-03-28T16:07:30.893000
|
||||
CVE-2024-3060,1,1,ca226a008152d4708b553d73b83f69895eb2387b6bb2cd368f27a5288134552d,2024-04-26T05:15:50.397000
|
||||
CVE-2024-30600,0,0,07f8767eef19dd08d9e1cc3d0874edfb6bacf2e635173b62a3bbb7f77a1747c3,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30601,0,0,0a2e428cbc485c5623cbc301ff44e1cd676c3b7c2d6d8ce0571a55030f7e4cf8,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30602,0,0,2727b743b2e56903f7e801a28994556ef283545dd501da199ae6f2fa143c24cf,2024-03-28T16:07:30.893000
|
||||
@ -245546,6 +245560,7 @@ CVE-2024-30733,0,0,c5f2692725b7484d3295bdbcc0eb2f4284901a52625827130c32bc53d3159
|
||||
CVE-2024-30735,0,0,31045ca311cf80431efdddff43e24e114183e9ef2bff5c33a722b80a956aa850,2024-04-17T02:15:12
|
||||
CVE-2024-30736,0,0,c9d1cbf13e640c6d0aad30d5b12c1d8e9eb4c675776ee84065ff7ca937010735,2024-04-17T02:15:12.057000
|
||||
CVE-2024-30737,0,0,1c036a16278ee8ea2e333e89f0d66457a587f7e2e9da86fd57591a8972289c80,2024-04-17T02:15:12.117000
|
||||
CVE-2024-3075,1,1,b5fbb609dfe8cbb6c3d81c044aae2d0872f56fc2acec51133419c1556ceda4b7,2024-04-26T05:15:50.433000
|
||||
CVE-2024-3077,0,0,df42d4a62ceb1c6a6275b9b1d36ac8da42c0ae3505d0e07beac8238605b5504b,2024-03-29T12:45:02.937000
|
||||
CVE-2024-3078,0,0,de9e294582cbb558bf2417239a323549d99f034f1b581828b43e34b1ad1f5683,2024-04-11T01:25:52.940000
|
||||
CVE-2024-30799,0,0,eae5bca102ad0c1fe3f236f7e51af89eca892740403953a6086f43b81ad7d92b,2024-04-22T13:28:43.747000
|
||||
@ -245880,12 +245895,13 @@ CVE-2024-3147,0,0,f05061e9d718b866336ceef3f83885c168403f8d387cf11dbe00ac736df358
|
||||
CVE-2024-3148,0,0,12b6e15e00d964ce79c059c99a6c4df70691a740ad2056657f2d4843c78fc654,2024-04-11T01:25:55.337000
|
||||
CVE-2024-31487,0,0,ffef7fcdc05bb476a1f2c02c71de4a76075ea7f0301d6a8889db629ce9b194c6,2024-04-10T13:24:22.187000
|
||||
CVE-2024-31492,0,0,a251126d380ad734bdcae40155276c0c8cd0f78c057d6c232814179759c90bf9,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31497,0,1,d90ff9b470753606034a89c278aa6cbdbffa031df39311cca8f7c7aaa4f69cec,2024-04-26T02:15:06.197000
|
||||
CVE-2024-31497,0,0,d90ff9b470753606034a89c278aa6cbdbffa031df39311cca8f7c7aaa4f69cec,2024-04-26T02:15:06.197000
|
||||
CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08
|
||||
CVE-2024-31503,0,0,a2a7c8d9eaf4775895950c76302a02326a8d6e67bb7d5ec85d9e8a8516e17053,2024-04-17T12:48:07.510000
|
||||
CVE-2024-31506,0,0,8be7ef5b3e9d65e4bba9dd63e2b7475f0658a4b183369094a98038d4eee40099,2024-04-10T13:24:00.070000
|
||||
CVE-2024-31507,0,0,8a4d05957463fb55563022c4622a2463374ff774a0631f4c63214875a7c78bee,2024-04-10T13:24:00.070000
|
||||
CVE-2024-3151,0,0,2dd1cf236cf7e4dbb7d9720cf950d856f9b652cd7c08d701ecc784bea1322bb1,2024-04-11T01:25:55.410000
|
||||
CVE-2024-3154,1,1,fe05a185b3092b9d5ad3b4e9b1bd6e4a6ce72927c50f51e292982d2607e4f773,2024-04-26T04:15:09.217000
|
||||
CVE-2024-31544,0,0,bc835e0f71240df22cec22617fbfab2cab4d97b1f555eabe4ef7c23231d6357c,2024-04-10T13:24:22.187000
|
||||
CVE-2024-31545,0,0,8e5326bf13231003bc10db7b31c44d418956837c538cbd6727e4f72cee368bee,2024-04-22T19:24:06.727000
|
||||
CVE-2024-31546,0,0,a44eabd912524c4138628ddf21812907bc4989788589b1a0788ce24b3eac282c,2024-04-19T18:29:53.040000
|
||||
@ -245926,7 +245942,7 @@ CVE-2024-31680,0,0,9cd3893ac983fae5e4213584fc439ab2d2b21e3e6bebab8790c0104ed80c7
|
||||
CVE-2024-31744,0,0,7de9e0ac4d1881e8e6a1c9cabea807c4b59ffea44a7ce9a28f0f69a4b5f1eba8,2024-04-19T16:19:49.043000
|
||||
CVE-2024-31745,0,0,a3bdd0cf6c191f4f752a70ac6769fb5b2d5c89636eeffe60e00827ad5ab48d32,2024-04-25T16:15:11.227000
|
||||
CVE-2024-31750,0,0,ef2fe441e5dcedf0cb2da823df8fe57e9b7ada67d4a5ac9a3c649524c0ed2fa2,2024-04-19T13:10:25.637000
|
||||
CVE-2024-31755,1,1,d287be4f9d10515dbc056d5fe33489659b0c55b002e962bb9d63b119136d9bda,2024-04-26T03:15:06.690000
|
||||
CVE-2024-31755,0,0,d287be4f9d10515dbc056d5fe33489659b0c55b002e962bb9d63b119136d9bda,2024-04-26T03:15:06.690000
|
||||
CVE-2024-31759,0,0,7081cd22df5b9e4148ecc914176fc1f6cc04366073f8b1e4eccd8dfe4f2b7d73,2024-04-17T12:48:07.510000
|
||||
CVE-2024-31760,0,0,7b1e0b53a94a63e7f108110799c5f85524efc23136fc5608e680b8482e690959,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3177,0,0,7ac29b234ae819e7e031e3cd5f5b542db573e269bf19234225624f7ae92277ac,2024-04-25T06:16:00.237000
|
||||
@ -245975,6 +245991,7 @@ CVE-2024-31871,0,0,2e9cb20a8839296f42d6bc6aa4eee6ec286fed065eef42e4971f116c0f81a
|
||||
CVE-2024-31872,0,0,7d09da772d85c1598253bebf81c543077ef995af0f84d1cf088132605a2400f9,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31873,0,0,30397559953deb34a9ae192149473632dc6b2334245e920787a4c5e14fc76375,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31874,0,0,1770e58d0ae5591eb931a8cdfdb054fb4d854f81849d14af250c71db6caf553c,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3188,1,1,a3e78b53dd736aee67f7e5fd889e7ce08a213c37b0eac8860bcc5d9ece31430a,2024-04-26T05:15:50.477000
|
||||
CVE-2024-31887,0,0,e951c215b0e12b882bcc7244c98d7631ee4f4b7a3271b5f24e369f1a635cd3e5,2024-04-17T12:48:07.510000
|
||||
CVE-2024-31920,0,0,3c0045dbbecad7d78d5b9eb044589c2fc290e421e2d5accb9391890092efc90f,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31921,0,0,732b3dfcff7f3c38928ece374bd7708cd93eb00a4dc0a7d5ac8e2f115b9d7217,2024-04-15T13:15:31.997000
|
||||
@ -246177,7 +246194,9 @@ CVE-2024-32391,0,0,b9d2ada2509e9e002fcf7fc50c30e5fa24f6bd077b7f0fab83dbe519d7675
|
||||
CVE-2024-32392,0,0,e9dc77721f231608117a79f151c9f1e6be5cd7530989658bd3dd67ce41889ce5,2024-04-22T13:28:50.310000
|
||||
CVE-2024-32394,0,0,5f3cc70e4b86c8028147d2489cef40fa6c9285878a28bdb0855878990e97443a,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32399,0,0,881ee2dd975bc6f828957c741f38d2e9a20065eb3fba67ea84e4e0b7e3e06627,2024-04-23T12:52:30.940000
|
||||
CVE-2024-32404,1,1,379eeeb7ce0150ce8ed5e5178eabfcd140f9bcf91f2f9768fb2acb41633837ca,2024-04-26T04:15:09.107000
|
||||
CVE-2024-32405,0,0,3981342fdb5111e1ad684c404fe5fa643bf161596abde4f7fd085ddcbb79a5d7,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32406,1,1,d7cdd496727b7ce774d9810e2af1f89527b4b5f33c65c9cea0d253695a92e30e,2024-04-26T04:15:09.163000
|
||||
CVE-2024-32407,0,0,04bdb1c21d2d45016e5f7565a6490533ba649bcc5c4dc99b7e34c030532cab3a,2024-04-22T19:24:06.727000
|
||||
CVE-2024-32409,0,0,2cc0bf26ecd8938fd89992a98bae2541af2d19072f0bc8cdc919759b6ea980aa,2024-04-19T16:19:49.043000
|
||||
CVE-2024-32418,0,0,95e561b293359ffe96c6d53d8bd7aa5dba172944f2d114b653ec1a760700c5d9,2024-04-22T13:28:43.747000
|
||||
@ -246516,9 +246535,9 @@ CVE-2024-33668,0,0,8da888c6401255c0c4958767ca43922f13e05cfeec1c5c848466d82307049
|
||||
CVE-2024-33669,0,0,1522cc0a6c328fb054da83ef1ecb8c08791177bf581ecdfbfa103e01e97a15cf,2024-04-26T01:15:46.383000
|
||||
CVE-2024-3367,0,0,960603a26ef6b142509321d49e151f94a19b335f6f238fbeac2ae8c02d482fbe,2024-04-24T12:15:07.093000
|
||||
CVE-2024-33670,0,0,1ae33a04b0d72eb2f80de09211415dcfdc89470e3b8eb1ca2da5bd532883aa7f,2024-04-26T01:15:46.573000
|
||||
CVE-2024-33671,1,1,94c5ba868729f131bbe6616f303ecfe5a326f0d8ec8c18320b1f0ed76e51fcb0,2024-04-26T02:15:06.410000
|
||||
CVE-2024-33672,1,1,0597d74eb088ac66173d2fa177cfb99da233fb0f2e857f3ff4ab477ed1e8a4f8,2024-04-26T02:15:06.607000
|
||||
CVE-2024-33673,1,1,7599bff580786a855ff11051fe3633c9ad802f6c36361c12bc5e5401e22f1d4b,2024-04-26T02:15:06.790000
|
||||
CVE-2024-33671,0,0,94c5ba868729f131bbe6616f303ecfe5a326f0d8ec8c18320b1f0ed76e51fcb0,2024-04-26T02:15:06.410000
|
||||
CVE-2024-33672,0,0,0597d74eb088ac66173d2fa177cfb99da233fb0f2e857f3ff4ab477ed1e8a4f8,2024-04-26T02:15:06.607000
|
||||
CVE-2024-33673,0,0,7599bff580786a855ff11051fe3633c9ad802f6c36361c12bc5e5401e22f1d4b,2024-04-26T02:15:06.790000
|
||||
CVE-2024-3369,0,0,943fbc9826beb11428b980e60e48ec152ecf5fda97b5d1c26bb0e96c030079eb,2024-04-11T01:26:00.317000
|
||||
CVE-2024-3371,0,0,ae16aca12e0ef96a1d50fe21e3e29226b9c681d9170bad90bc7de166f5de9586,2024-04-24T17:16:50.397000
|
||||
CVE-2024-3376,0,0,f944ee3af49afac066405b13bcc14ad1a3aba304f57c015d653c31ce71a21bf1,2024-04-11T01:26:00.397000
|
||||
@ -246683,7 +246702,7 @@ CVE-2024-3768,0,0,d4b4a9423503f9d3968bacedbc99e37436f81a4617cd5e1bab83d119b6df54
|
||||
CVE-2024-3769,0,0,0ad881f8596d4990c3771ff9a5d54d312e61117735de979ba399c5ec741a2429,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3770,0,0,a0e70333c7522428b816fd36d13aa498a9e0d573335af8812ebdec4541bca04d,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3771,0,0,f1b61f13329d2e1b043d30b1afc5857f95e3c932a47e6f6f675e3698c5c90d95,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3772,0,1,184d29c2faf230c27e7c42ad45c478e7862cbffdde795ec4220824e36861b510,2024-04-26T02:15:06.983000
|
||||
CVE-2024-3772,0,0,184d29c2faf230c27e7c42ad45c478e7862cbffdde795ec4220824e36861b510,2024-04-26T02:15:06.983000
|
||||
CVE-2024-3774,0,0,430454733381ff5a96eb00158d8d932d4c087496720223836bce2968611b5152,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b0a,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3776,0,0,55056178a3d988ca6f5c349416a81e65818f1f748e962aa89ca62657bc61cdbb,2024-04-15T13:15:31.997000
|
||||
@ -246810,7 +246829,7 @@ CVE-2024-4127,0,0,4364ebf3636399a6b862124e1d4818af14c41cdffb5c73435c8a8f0aa84db1
|
||||
CVE-2024-4141,0,0,cc9e710826c489d0ee22d4c7d9dd610e35e7eaed543a00c568b5470b560db2a2,2024-04-24T19:58:40.710000
|
||||
CVE-2024-4159,0,0,cf0daf8ecd317ce4288e8a4812364c59b3b10d10c0c5945533667d40be8a71fc,2024-04-25T23:15:47.087000
|
||||
CVE-2024-4161,0,0,8c35858b76cabcd8cf78ed758e4c9d58e5dffa2b20a32ec25b41a43a372b2218,2024-04-25T13:18:13.537000
|
||||
CVE-2024-4163,1,1,aa6e311ebc165b43efa8b0a4c994abdb6e44a83bd22443b60ae5371da4ee97d9,2024-04-26T03:15:06.740000
|
||||
CVE-2024-4163,0,0,aa6e311ebc165b43efa8b0a4c994abdb6e44a83bd22443b60ae5371da4ee97d9,2024-04-26T03:15:06.740000
|
||||
CVE-2024-4164,0,0,7b7ecf5ffdac8e07bc810bf656b6cf192bcaa27389ac9c35a4c16da54cd22ade,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4165,0,0,a68d30c2f16ca15cad9feb895c57b9da5fa63a2685b199108e4aaf56d8ac6f56,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4166,0,0,1d36f4647aa764fd2919ea2db750b25d40ec10634804f6daa695a02c9b64475c,2024-04-25T13:18:02.660000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user