mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2024-03-26T23:00:38.368914+00:00
This commit is contained in:
parent
ee94619998
commit
ea5e5d6b36
67
CVE-2023/CVE-2023-286xx/CVE-2023-28687.json
Normal file
67
CVE-2023/CVE-2023-286xx/CVE-2023-28687.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2023-28687",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T21:15:50.477",
|
||||
"lastModified": "2024-03-26T21:15:50.477",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in perfectwpthemes Glaze Blog Lite, themebeez Fascinate, themebeez Cream Blog, themebeez Cream Magazine allows Reflected XSS.This issue affects Glaze Blog Lite: from n/a through <= 1.1.4; Fascinate: from n/a through 1.0.8; Cream Blog: from n/a through 2.1.3; Cream Magazine: from n/a through 2.1.4.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/cream-blog/wordpress-cream-blog-theme-2-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/cream-magazine/wordpress-cream-magazine-theme-2-1-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/fascinate/wordpress-fascinate-theme-1-0-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/glaze-blog-lite/wordpress-glaze-blog-lite-theme-1-1-4-cross-site-scripting-xss-vulnerability",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-287xx/CVE-2023-28787.json
Normal file
55
CVE-2023/CVE-2023-287xx/CVE-2023-28787.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-28787",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T21:15:50.693",
|
||||
"lastModified": "2024-03-26T21:15:50.693",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ExpressTech Quiz And Survey Master.This issue affects Quiz And Survey Master: from n/a through 8.1.4.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/quiz-master-next/wordpress-quiz-and-survey-master-plugin-8-1-4-unauthenticated-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-293xx/CVE-2023-29386.json
Normal file
55
CVE-2023/CVE-2023-293xx/CVE-2023-29386.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-29386",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T21:15:50.900",
|
||||
"lastModified": "2024-03-26T21:15:50.900",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in Julien Crego Manager for Icomoon.This issue affects Manager for Icomoon: from n/a through 2.0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/manager-for-icomoon/wordpress-manager-for-icommon-plugin-2-0-arbitrary-file-upload-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-383xx/CVE-2023-38388.json
Normal file
55
CVE-2023/CVE-2023-383xx/CVE-2023-38388.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-38388",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T21:15:51.113",
|
||||
"lastModified": "2024-03-26T21:15:51.113",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in Artbees JupiterX Core.This issue affects JupiterX Core: from n/a through 3.3.5.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/jupiterx-core/wordpress-jupiter-x-core-plugin-3-3-0-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-393xx/CVE-2023-39307.json
Normal file
55
CVE-2023/CVE-2023-393xx/CVE-2023-39307.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-39307",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T21:15:51.330",
|
||||
"lastModified": "2024-03-26T21:15:51.330",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in ThemeFusion Avada.This issue affects Avada: from n/a through 7.11.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/avada/wordpress-avada-theme-7-11-1-authenticated-arbitrary-file-upload-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-478xx/CVE-2023-47842.json
Normal file
55
CVE-2023/CVE-2023-478xx/CVE-2023-47842.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-47842",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T21:15:51.530",
|
||||
"lastModified": "2024-03-26T21:15:51.530",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in Zachary Segal CataBlog.This issue affects CataBlog: from n/a through 1.7.0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/catablog/wordpress-catablog-plugin-1-7-0-arbitrary-file-upload-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-478xx/CVE-2023-47846.json
Normal file
55
CVE-2023/CVE-2023-478xx/CVE-2023-47846.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-47846",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T21:15:51.737",
|
||||
"lastModified": "2024-03-26T21:15:51.737",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in Terry Lin WP Githuber MD.This issue affects WP Githuber MD: from n/a through 1.16.2.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-githuber-md/wordpress-wp-githuber-md-plugin-1-16-2-arbitrary-file-upload-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-478xx/CVE-2023-47873.json
Normal file
55
CVE-2023/CVE-2023-478xx/CVE-2023-47873.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-47873",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T21:15:51.933",
|
||||
"lastModified": "2024-03-26T21:15:51.933",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in WEN Solutions WP Child Theme Generator.This issue affects WP Child Theme Generator: from n/a through 1.0.9.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-child-theme-generator/wordpress-wp-child-theme-generator-plugin-1-0-8-arbitrary-file-upload-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-482xx/CVE-2023-48275.json
Normal file
55
CVE-2023/CVE-2023-482xx/CVE-2023-48275.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-48275",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T21:15:52.143",
|
||||
"lastModified": "2024-03-26T21:15:52.143",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in Trustindex.Io Widgets for Google Reviews.This issue affects Widgets for Google Reviews: from n/a through 11.0.2.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-reviews-plugin-for-google/wordpress-widgets-for-google-reviews-plugin-11-0-2-arbitrary-file-upload-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-487xx/CVE-2023-48777.json
Normal file
55
CVE-2023/CVE-2023-487xx/CVE-2023-48777.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-48777",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T21:15:52.350",
|
||||
"lastModified": "2024-03-26T21:15:52.350",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in Elementor.Com Elementor Website Builder.This issue affects Elementor Website Builder: from 3.3.0 through 3.18.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.9,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/elementor/wordpress-elementor-plugin-3-18-0-arbitrary-file-upload-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-511xx/CVE-2023-51146.json
Normal file
20
CVE-2023/CVE-2023-511xx/CVE-2023-51146.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-51146",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-26T22:15:07.677",
|
||||
"lastModified": "2024-03-26T22:15:07.677",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in TRENDnet AC1200 TEW-821DAP with firmware version 3.00b06 allows an attacker to execute arbitrary code via the adm_add_user action."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/SpikeReply/advisories/blob/main/cve/trendnet/cve-2023-51146.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-511xx/CVE-2023-51147.json
Normal file
20
CVE-2023/CVE-2023-511xx/CVE-2023-51147.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-51147",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-26T22:15:07.747",
|
||||
"lastModified": "2024-03-26T22:15:07.747",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in TRENDnet Trendnet AC1200 TEW-821DAP with firmware version 3.00b06 allows an attacker to execute arbitrary code via the adm_mod_pwd action."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/SpikeReply/advisories/blob/main/cve/trendnet/cve-2023-51147.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-511xx/CVE-2023-51148.json
Normal file
24
CVE-2023/CVE-2023-511xx/CVE-2023-51148.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-51148",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-26T21:15:52.557",
|
||||
"lastModified": "2024-03-26T21:15:52.557",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in TRENDnet Trendnet AC1200 Dual Band PoE Indoor Wireless Access Point TEW-821DAP v.3.00b06 allows an attacker to execute arbitrary code via the 'mycli' command-line interface component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://trendnet.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/SpikeReply/advisories/blob/main/cve/trendnet/cve-2023-51148.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-254xx/CVE-2024-25420.json
Normal file
28
CVE-2024/CVE-2024-254xx/CVE-2024-25420.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-25420",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-26T21:15:52.710",
|
||||
"lastModified": "2024-03-26T21:15:52.710",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Ignite Realtime Openfire v.4.9.0 and before allows a remote attacker to escalate privileges via the admin.authorizedJIDs system property component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/igniterealtime/Openfire/blob/main/xmppserver/src/main/java/org/jivesoftware/openfire/admin/AdminManager.java",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.hackthebox.com/blog/openfire-cves-explained-CVE-2024-25420-CVE-2024-25421",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.igniterealtime.org/projects/openfire/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-254xx/CVE-2024-25421.json
Normal file
28
CVE-2024/CVE-2024-254xx/CVE-2024-25421.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-25421",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-26T21:15:52.773",
|
||||
"lastModified": "2024-03-26T21:15:52.773",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Ignite Realtime Openfire v.4.9.0 and before allows a remote attacker to escalate privileges via the ROOM_CACHE component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/igniterealtime/Openfire/blob/main/xmppserver/src/main/java/org/jivesoftware/openfire/muc/spi/LocalMUCRoomManager.java",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.hackthebox.com/blog/openfire-cves-explained-CVE-2024-25420-CVE-2024-25421",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.igniterealtime.org/projects/openfire/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2024/CVE-2024-263xx/CVE-2024-26303.json
Normal file
43
CVE-2024/CVE-2024-263xx/CVE-2024-26303.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2024-26303",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-03-26T21:15:52.827",
|
||||
"lastModified": "2024-03-26T21:15:52.827",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authenticated Denial of Service Vulnerability in ArubaOS-Switch SSH Daemon\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-003.txt",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-275xx/CVE-2024-27521.json
Normal file
24
CVE-2024/CVE-2024-275xx/CVE-2024-27521.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-27521",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-26T21:15:53.013",
|
||||
"lastModified": "2024-03-26T21:15:53.013",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain an unauthenticated remote command execution (RCE) vulnerability via multiple parameters in the \"setOpModeCfg\" function. This security issue allows an attacker to take complete control of the device. In detail, exploitation allows unauthenticated, remote attackers to execute arbitrary system commands with administrative privileges (i.e., as user \"root\")."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/SpikeReply/advisories/blob/main/cve/totolink/cve-2024-27521.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://m.totolink.net/portal/article/index/id/410.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-285xx/CVE-2024-28545.json
Normal file
20
CVE-2024/CVE-2024-285xx/CVE-2024-28545.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-28545",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-26T21:15:53.070",
|
||||
"lastModified": "2024-03-26T21:15:53.070",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda AC18 V15.03.05.05 contains a command injection vulnerablility in the deviceName parameter of formsetUsbUnload function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/setUsbUnload.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-285xx/CVE-2024-28551.json
Normal file
20
CVE-2024/CVE-2024-285xx/CVE-2024-28551.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-28551",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-26T21:15:53.123",
|
||||
"lastModified": "2024-03-26T21:15:53.123",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda AC18 V15.03.05.05 has a stack overflow vulnerability in the ssid parameter of form_fast_setting_wifi_set function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/form_fast_setting_wifi_set.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-28xx/CVE-2024-2883.json
Normal file
24
CVE-2024/CVE-2024-28xx/CVE-2024-2883.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-2883",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-03-26T21:15:53.173",
|
||||
"lastModified": "2024-03-26T21:15:53.173",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use after free in ANGLE in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/327807820",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-28xx/CVE-2024-2885.json
Normal file
24
CVE-2024/CVE-2024-28xx/CVE-2024-2885.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-2885",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-03-26T21:15:53.220",
|
||||
"lastModified": "2024-03-26T21:15:53.220",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use after free in Dawn in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/328958020",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-28xx/CVE-2024-2886.json
Normal file
24
CVE-2024/CVE-2024-28xx/CVE-2024-2886.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-2886",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-03-26T21:15:53.260",
|
||||
"lastModified": "2024-03-26T21:15:53.260",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use after free in WebCodecs in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/330575496",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-28xx/CVE-2024-2887.json
Normal file
24
CVE-2024/CVE-2024-28xx/CVE-2024-2887.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-2887",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-03-26T21:15:53.300",
|
||||
"lastModified": "2024-03-26T21:15:53.300",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Type Confusion in WebAssembly in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/330588502",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-29xx/CVE-2024-2903.json
Normal file
92
CVE-2024/CVE-2024-29xx/CVE-2024-2903.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-2903",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-26T21:15:53.343",
|
||||
"lastModified": "2024-03-26T21:15:53.343",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tenda AC7 15.03.06.44. It has been classified as critical. Affected is the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument mac leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-257946 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/GetParentControlInfo.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257946",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257946",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.300452",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-29xx/CVE-2024-2909.json
Normal file
92
CVE-2024/CVE-2024-29xx/CVE-2024-2909.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-2909",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-26T21:15:53.613",
|
||||
"lastModified": "2024-03-26T21:15:53.613",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in Ruijie RG-EG350 up to 20240318. Affected by this vulnerability is the function setAction of the file /itbox_pi/networksafe.php?a=set of the component HTTP POST Request Handler. The manipulation of the argument bandwidth leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257977 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://h0e4a0r1t.github.io/2024/vulns/Ruijie%20EG350%20Easy%20Gateway%20Management%20System%20Exists%20Remote%20Code%20Execution%20Vulnerability%20networksafe.php.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257977",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257977",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.300368",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-29xx/CVE-2024-2910.json
Normal file
92
CVE-2024/CVE-2024-29xx/CVE-2024-2910.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-2910",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-26T21:15:53.880",
|
||||
"lastModified": "2024-03-26T21:15:53.880",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in Ruijie RG-EG350 up to 20240318. Affected by this issue is the function vpnAction of the file /itbox_pi/vpn_quickset_service.php?a=set_vpn of the component HTTP POST Request Handler. The manipulation of the argument ip/port/user/pass/dns/startIp leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-257978 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://h0e4a0r1t.github.io/2024/vulns/Ruijie%20EG350%20Easy%20Gateway%20Management%20System%20Exists%20Remote%20Code%20Execution%20Vulnerability_vpn_quickset_service.php.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257978",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257978",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.300372",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-29xx/CVE-2024-2911.json
Normal file
92
CVE-2024/CVE-2024-29xx/CVE-2024-2911.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-2911",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-26T22:15:07.823",
|
||||
"lastModified": "2024-03-26T22:15:07.823",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, was found in Tianjin PubliCMS 4.0.202302.e. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257979. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/sweatxi/BugHub/blob/main/publiccms_csrf.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257979",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257979",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.300339",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-29xx/CVE-2024-2971.json
Normal file
55
CVE-2024/CVE-2024-29xx/CVE-2024-2971.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-2971",
|
||||
"sourceIdentifier": "xpdf@xpdfreader.com",
|
||||
"published": "2024-03-26T22:15:08.190",
|
||||
"lastModified": "2024-03-26T22:15:08.190",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Out-of-bounds array write in Xpdf 4.05 and earlier, triggered by negative object number in indirect reference in the input PDF file.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "xpdf@xpdfreader.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 2.9,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.4,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "xpdf@xpdfreader.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.xpdfreader.com/security-bug/CVE-2024-2971.html",
|
||||
"source": "xpdf@xpdfreader.com"
|
||||
}
|
||||
]
|
||||
}
|
55
README.md
55
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-26T21:00:38.651774+00:00
|
||||
2024-03-26T23:00:38.368914+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-26T20:15:11.710000+00:00
|
||||
2024-03-26T22:15:08.190000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,39 +33,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
242756
|
||||
242784
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `15`
|
||||
Recently added CVEs: `28`
|
||||
|
||||
\* [CVE-2023-23656](CVE-2023/CVE-2023-236xx/CVE-2023-23656.json) (`2024-03-26T20:15:08.067`)
|
||||
\* [CVE-2023-25965](CVE-2023/CVE-2023-259xx/CVE-2023-25965.json) (`2024-03-26T20:15:08.280`)
|
||||
\* [CVE-2023-27440](CVE-2023/CVE-2023-274xx/CVE-2023-27440.json) (`2024-03-26T20:15:08.483`)
|
||||
\* [CVE-2023-27459](CVE-2023/CVE-2023-274xx/CVE-2023-27459.json) (`2024-03-26T20:15:08.737`)
|
||||
\* [CVE-2023-27630](CVE-2023/CVE-2023-276xx/CVE-2023-27630.json) (`2024-03-26T20:15:08.953`)
|
||||
\* [CVE-2023-6091](CVE-2023/CVE-2023-60xx/CVE-2023-6091.json) (`2024-03-26T20:15:09.167`)
|
||||
\* [CVE-2024-22436](CVE-2024/CVE-2024-224xx/CVE-2024-22436.json) (`2024-03-26T19:15:48.550`)
|
||||
\* [CVE-2024-28442](CVE-2024/CVE-2024-284xx/CVE-2024-28442.json) (`2024-03-26T20:15:09.670`)
|
||||
\* [CVE-2024-2897](CVE-2024/CVE-2024-28xx/CVE-2024-2897.json) (`2024-03-26T19:15:48.857`)
|
||||
\* [CVE-2024-2898](CVE-2024/CVE-2024-28xx/CVE-2024-2898.json) (`2024-03-26T19:15:49.130`)
|
||||
\* [CVE-2024-2899](CVE-2024/CVE-2024-28xx/CVE-2024-2899.json) (`2024-03-26T19:15:49.410`)
|
||||
\* [CVE-2024-2900](CVE-2024/CVE-2024-29xx/CVE-2024-2900.json) (`2024-03-26T20:15:10.500`)
|
||||
\* [CVE-2024-2901](CVE-2024/CVE-2024-29xx/CVE-2024-2901.json) (`2024-03-26T20:15:10.933`)
|
||||
\* [CVE-2024-2902](CVE-2024/CVE-2024-29xx/CVE-2024-2902.json) (`2024-03-26T20:15:11.203`)
|
||||
\* [CVE-2024-2955](CVE-2024/CVE-2024-29xx/CVE-2024-2955.json) (`2024-03-26T20:15:11.710`)
|
||||
\* [CVE-2023-38388](CVE-2023/CVE-2023-383xx/CVE-2023-38388.json) (`2024-03-26T21:15:51.113`)
|
||||
\* [CVE-2023-39307](CVE-2023/CVE-2023-393xx/CVE-2023-39307.json) (`2024-03-26T21:15:51.330`)
|
||||
\* [CVE-2023-47842](CVE-2023/CVE-2023-478xx/CVE-2023-47842.json) (`2024-03-26T21:15:51.530`)
|
||||
\* [CVE-2023-47846](CVE-2023/CVE-2023-478xx/CVE-2023-47846.json) (`2024-03-26T21:15:51.737`)
|
||||
\* [CVE-2023-47873](CVE-2023/CVE-2023-478xx/CVE-2023-47873.json) (`2024-03-26T21:15:51.933`)
|
||||
\* [CVE-2023-48275](CVE-2023/CVE-2023-482xx/CVE-2023-48275.json) (`2024-03-26T21:15:52.143`)
|
||||
\* [CVE-2023-48777](CVE-2023/CVE-2023-487xx/CVE-2023-48777.json) (`2024-03-26T21:15:52.350`)
|
||||
\* [CVE-2023-51146](CVE-2023/CVE-2023-511xx/CVE-2023-51146.json) (`2024-03-26T22:15:07.677`)
|
||||
\* [CVE-2023-51147](CVE-2023/CVE-2023-511xx/CVE-2023-51147.json) (`2024-03-26T22:15:07.747`)
|
||||
\* [CVE-2023-51148](CVE-2023/CVE-2023-511xx/CVE-2023-51148.json) (`2024-03-26T21:15:52.557`)
|
||||
\* [CVE-2024-25420](CVE-2024/CVE-2024-254xx/CVE-2024-25420.json) (`2024-03-26T21:15:52.710`)
|
||||
\* [CVE-2024-25421](CVE-2024/CVE-2024-254xx/CVE-2024-25421.json) (`2024-03-26T21:15:52.773`)
|
||||
\* [CVE-2024-26303](CVE-2024/CVE-2024-263xx/CVE-2024-26303.json) (`2024-03-26T21:15:52.827`)
|
||||
\* [CVE-2024-27521](CVE-2024/CVE-2024-275xx/CVE-2024-27521.json) (`2024-03-26T21:15:53.013`)
|
||||
\* [CVE-2024-28545](CVE-2024/CVE-2024-285xx/CVE-2024-28545.json) (`2024-03-26T21:15:53.070`)
|
||||
\* [CVE-2024-28551](CVE-2024/CVE-2024-285xx/CVE-2024-28551.json) (`2024-03-26T21:15:53.123`)
|
||||
\* [CVE-2024-2883](CVE-2024/CVE-2024-28xx/CVE-2024-2883.json) (`2024-03-26T21:15:53.173`)
|
||||
\* [CVE-2024-2885](CVE-2024/CVE-2024-28xx/CVE-2024-2885.json) (`2024-03-26T21:15:53.220`)
|
||||
\* [CVE-2024-2886](CVE-2024/CVE-2024-28xx/CVE-2024-2886.json) (`2024-03-26T21:15:53.260`)
|
||||
\* [CVE-2024-2887](CVE-2024/CVE-2024-28xx/CVE-2024-2887.json) (`2024-03-26T21:15:53.300`)
|
||||
\* [CVE-2024-2903](CVE-2024/CVE-2024-29xx/CVE-2024-2903.json) (`2024-03-26T21:15:53.343`)
|
||||
\* [CVE-2024-2909](CVE-2024/CVE-2024-29xx/CVE-2024-2909.json) (`2024-03-26T21:15:53.613`)
|
||||
\* [CVE-2024-2910](CVE-2024/CVE-2024-29xx/CVE-2024-2910.json) (`2024-03-26T21:15:53.880`)
|
||||
\* [CVE-2024-2911](CVE-2024/CVE-2024-29xx/CVE-2024-2911.json) (`2024-03-26T22:15:07.823`)
|
||||
\* [CVE-2024-2971](CVE-2024/CVE-2024-29xx/CVE-2024-2971.json) (`2024-03-26T22:15:08.190`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `5`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
\* [CVE-2023-39340](CVE-2023/CVE-2023-393xx/CVE-2023-39340.json) (`2024-03-26T19:18:28.943`)
|
||||
\* [CVE-2023-41719](CVE-2023/CVE-2023-417xx/CVE-2023-41719.json) (`2024-03-26T19:26:49.713`)
|
||||
\* [CVE-2023-41720](CVE-2023/CVE-2023-417xx/CVE-2023-41720.json) (`2024-03-26T19:27:41.727`)
|
||||
\* [CVE-2024-23252](CVE-2024/CVE-2024-232xx/CVE-2024-23252.json) (`2024-03-26T19:15:48.757`)
|
||||
\* [CVE-2024-2485](CVE-2024/CVE-2024-24xx/CVE-2024-2485.json) (`2024-03-26T20:15:09.860`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
68
_state.csv
68
_state.csv
@ -216438,7 +216438,7 @@ CVE-2023-2365,0,0,2b641966f73da1c03bac76f197cc25cdb025794330e95137c224f9ed081938
|
||||
CVE-2023-23650,0,0,bdb43282ea7d888f54eeb4c029ba9e5c1a406d2afa563b42e6a7548e68ecb093,2023-11-07T04:07:51.107000
|
||||
CVE-2023-23651,0,0,67236451a80b9f55a14752d0a0b34135a6cd3e5bc4be1a75484ace6a6c1a0cd3,2023-10-14T02:21:03.983000
|
||||
CVE-2023-23654,0,0,6d31dd903ef9ef9379174f7a720524fd14097fdb73f792d32eb91eccd0b45b6c,2023-05-22T17:08:57.177000
|
||||
CVE-2023-23656,1,1,a75dffc16686b4ea09f1d724c758ef992b2e0514e587812eb9d757ab758e97ff,2024-03-26T20:15:08.067000
|
||||
CVE-2023-23656,0,0,a75dffc16686b4ea09f1d724c758ef992b2e0514e587812eb9d757ab758e97ff,2024-03-26T20:15:08.067000
|
||||
CVE-2023-23657,0,0,f9c995611939bee80b60fce69760b00f7d14fc21835d54b0d99400a290e44b44,2023-05-23T18:54:10.007000
|
||||
CVE-2023-23659,0,0,cdef213e979c790c823e596ef73ecdade9b047293b4aa108b66a27bc2cad5371,2023-11-07T04:07:51.230000
|
||||
CVE-2023-2366,0,0,ed15702be74cf809ce5d75fa41ed676adc877c6d79d7c35130d7ba1ed1c651d5,2024-03-21T02:47:07.970000
|
||||
@ -218308,7 +218308,7 @@ CVE-2023-25961,0,0,31e0a6732f540f6917a1b6b5d3508a68522e67ae0de03ce13bbd138d765f8
|
||||
CVE-2023-25962,0,0,4b86764ac537e69027b956317cbcf9c9fc22f8f441c355a28f72aebfd340b8b0,2023-05-10T02:29:05.977000
|
||||
CVE-2023-25963,0,0,9327aafe21090ee3e0080b9c6ae99110509f70c0997007468a111a8ed1dde950,2023-06-22T19:48:48.483000
|
||||
CVE-2023-25964,0,0,7b22724b55e21a391c842995faf0e67fccd6411b05e064deea6e494a18b5d976,2023-06-20T14:45:48.997000
|
||||
CVE-2023-25965,1,1,8a98b7afd07e87af087c49e75154db0cf3bec9684dcadbbb2fa42a8a5051eacd,2024-03-26T20:15:08.280000
|
||||
CVE-2023-25965,0,0,8a98b7afd07e87af087c49e75154db0cf3bec9684dcadbbb2fa42a8a5051eacd,2024-03-26T20:15:08.280000
|
||||
CVE-2023-25967,0,0,9c3dc755573ab57072330583684d5a0ccfafd1682f61498b0546de78bdaef7bd,2023-05-08T13:44:41.297000
|
||||
CVE-2023-25968,0,0,fea5f7ad1565ee9cbedd5c1ceb3cfee62c0a455aa81f74dc9b60952c3c0aae39,2023-11-07T04:09:16.290000
|
||||
CVE-2023-2597,0,0,6cc8e290e260e4840e41efc9aaeddabe788a6e7ccac7fda76a06f95efa4bdb4c,2023-05-30T21:32:32.543000
|
||||
@ -219326,7 +219326,7 @@ CVE-2023-27436,0,0,b0caec624f07aa2674ca9cf73465606bd64f5388b6c821e66d91e5649c784
|
||||
CVE-2023-27438,0,0,5be0f579772e68b81f545a98e4ef90f61e8a2d38cccc27e3ec3103a8d20b96e0,2023-11-15T19:12:13.987000
|
||||
CVE-2023-27439,0,0,e78320b1d1cd6cd11ce4f0b7074e10ed4bb0a9d26bddd73278d8796f5cb702c5,2023-06-27T20:54:24.717000
|
||||
CVE-2023-2744,0,0,52d31477da03b6d03cb7cbec9b1fb880499c8f8304e18c6a878c67a90a6d440a,2023-11-07T04:13:15.560000
|
||||
CVE-2023-27440,1,1,f7b148d3b7aed705a7bcc4ec8cd78d0dcd052ec5a116e3310c04812a3d277560,2024-03-26T20:15:08.483000
|
||||
CVE-2023-27440,0,0,f7b148d3b7aed705a7bcc4ec8cd78d0dcd052ec5a116e3310c04812a3d277560,2024-03-26T20:15:08.483000
|
||||
CVE-2023-27441,0,0,ebfa08ad136b1620df5e502d2f427908beb2416e3e07d1bcf8c575dbe0f1d40c,2023-11-15T19:15:28.277000
|
||||
CVE-2023-27442,0,0,65446bf943eed43ba92190c90858cfd42d8caed68c959a6123994e47e8202f09,2023-11-27T22:08:45.050000
|
||||
CVE-2023-27443,0,0,e70a6b1c796ac11415e202ca17f07dcc6233dc38e7b06100261f3e321ddddcbb,2023-06-28T16:01:26.587000
|
||||
@ -219343,7 +219343,7 @@ CVE-2023-27453,0,0,ee071e586fd895bda9aadad5e737702076d121a85b852525dba6f456b0e0f
|
||||
CVE-2023-27455,0,0,7e32e8ad48a7824fd11c180849e8ede25b549547ecace669f4090b4f566ed004,2023-05-16T21:43:52.443000
|
||||
CVE-2023-27457,0,0,6a6b95f6e1965667d65b9ab16b546fc7c64c0640a898b8db40aaceb9a901aff5,2023-11-30T19:44:39.023000
|
||||
CVE-2023-27458,0,0,8f4bf85bfa600ead504bb2798ec3dc271ef7cc4efe1718deebe7ef63f402ef8d,2023-11-30T19:41:51.770000
|
||||
CVE-2023-27459,1,1,c28b3e932c1aec22594bc80dd4a57b72c28d826de344bf5086b48bab6c6e24ce,2024-03-26T20:15:08.737000
|
||||
CVE-2023-27459,0,0,c28b3e932c1aec22594bc80dd4a57b72c28d826de344bf5086b48bab6c6e24ce,2024-03-26T20:15:08.737000
|
||||
CVE-2023-2746,0,0,189d0393932e2d9dc55b6f912ad82e4a97a7e551c0597cdf074171620345d1e2,2023-07-18T19:26:41.327000
|
||||
CVE-2023-27461,0,0,820e9f8cdace996b5a4700f4726e6326898ef3adb42497085b1aae66b21c3ae3,2023-11-30T15:26:18.103000
|
||||
CVE-2023-27462,0,0,61fd4f9772445cd7d5c02748d8dadac37d825a79bed367257ae702b32ea75e04,2023-03-17T17:08:26.373000
|
||||
@ -219498,7 +219498,7 @@ CVE-2023-27627,0,0,9a15daa7472d5aaf33aca757cd7d1a633dc6cb30118d7b7951fbbab74ec99
|
||||
CVE-2023-27628,0,0,6821355c8ee1dd2c2bac02a7bd738a2a4ca0c2ac34c6a239588410041d688ab4,2023-09-29T18:38:01.643000
|
||||
CVE-2023-27629,0,0,c7bdbf7f70e7ff884f174fbcaf472262dd344c8876ffc6bcbd454b2e4d8c35cb,2023-06-28T03:28:24.817000
|
||||
CVE-2023-2763,0,0,902c2a829b97eeb5cdb5ef73f11e8cac31787b838427aeff2459e6cf73fb5649,2023-07-20T01:56:00.570000
|
||||
CVE-2023-27630,1,1,a461f215e620df29e38ad686c7d2f5a2aebe4286c233d2fc877e60edf20c53e1,2024-03-26T20:15:08.953000
|
||||
CVE-2023-27630,0,0,a461f215e620df29e38ad686c7d2f5a2aebe4286c233d2fc877e60edf20c53e1,2024-03-26T20:15:08.953000
|
||||
CVE-2023-27631,0,0,243c34486db3b62aaccae00faaedfdf15aca3fc5e1c8f960ee009b611a3ba79c,2023-06-28T03:27:49.077000
|
||||
CVE-2023-27632,0,0,c0f75ba197626880fad4e5bd26d8ec95adffab87af57cc725356c0d01e9a9e0e,2023-11-17T19:29:14.953000
|
||||
CVE-2023-27633,0,0,46dbf1daeb8d87e6e0cea8b6b6068c1b297802da2f2d7b505dbc71c6acb74609,2023-11-30T19:19:27.577000
|
||||
@ -220440,6 +220440,7 @@ CVE-2023-28683,0,0,1733b26d2cdf5a7bd82da3f30166803dd12e37b31dad64f72c0c417886c46
|
||||
CVE-2023-28684,0,0,52e458c0997ebfa4b20c4438f3ae0ee693ec6734f07e98e9c3601f11e52a37fa,2023-04-09T01:39:27.213000
|
||||
CVE-2023-28685,0,0,e0c53e4d57fbbe9363125daac9bbea48b9f569285b626c82aa9179387e96130c,2023-03-24T20:29:16.710000
|
||||
CVE-2023-28686,0,0,ff0f81c3808b267f1168e84a1b7f6568ae99144e544141691c65bb9332d832c4,2023-11-07T04:10:48.177000
|
||||
CVE-2023-28687,1,1,c4917f4a91e2dba4646f41ec34881b6ea2b095284f549e68b1b411f721d5f039,2024-03-26T21:15:50.477000
|
||||
CVE-2023-2869,0,0,83553b82bf3815b48b9963a130e6249e5c327eac582c2d1bb40f5c08c7922d57,2023-11-07T04:13:27.033000
|
||||
CVE-2023-28690,0,0,d6f4066692a313db06779ad080208a8a77b53b35431f2a3194e0e3a9774a7efe,2023-08-23T14:37:43.853000
|
||||
CVE-2023-28692,0,0,2eac38bd971b0deca5fb5c3ca9afabc90e5401629f9dd7513fa908109af5ddee,2023-09-01T12:06:48.337000
|
||||
@ -220537,6 +220538,7 @@ CVE-2023-28783,0,0,e4c28333c63d896a6dc1ea6c8187784dc3c3ca1e3bc214dc379b95f415b17
|
||||
CVE-2023-28784,0,0,29cdcdd3bc5507bc4d53dd65d7f1e38f826588b263e9e74689bd5af44bd699a8,2023-06-28T07:16:11.527000
|
||||
CVE-2023-28785,0,0,17b3419351958dcb6281c0c7b61ce71cd15d14e0831bf2f0d915b7adc8ec13cc,2023-06-01T03:53:04.007000
|
||||
CVE-2023-28786,0,0,f9e06605c0fd16a90753e36a648b3b280d8079e30c1ac0bf77a72f5c69889c25,2024-01-10T19:27:54.720000
|
||||
CVE-2023-28787,1,1,4c615d7e636962e317801ff25b0344a479a208a233a2df7998a91d47db5055ae,2024-03-26T21:15:50.693000
|
||||
CVE-2023-28788,0,0,17e2028e1fc2374a1fa9f52d26e1ad3fd4714947a2df331bdaf2d8d947a993af,2023-12-27T15:04:40.417000
|
||||
CVE-2023-28789,0,0,1f2c73f47a1cbc214f389d7f5befcba08b4db6006e669fddc19a4562c69da497,2023-11-07T04:10:54.090000
|
||||
CVE-2023-2879,0,0,5bc69743d5fb9a107ed6b1d66b72862cd1695c7112d0d395c95f138b25f17969,2023-10-20T17:52:45.083000
|
||||
@ -221039,6 +221041,7 @@ CVE-2023-29382,0,0,85e4295ac4892fd7ccf01715e0068bf61079e02658153ad107806b168baff
|
||||
CVE-2023-29383,0,0,8013620007555caf82fb95e58995ea6168ae836387103f7e8a04f762ed02d6e3,2023-04-24T18:05:30.313000
|
||||
CVE-2023-29384,0,0,9a489d28cc6ab1408ae57d3cf7990767e7bb1769ecbc71eccb1fc726d788c4e2,2023-12-28T13:34:45.667000
|
||||
CVE-2023-29385,0,0,0caec3d51cd9fb8894e51725a4068abeec6d5436e3ab36ed98317f64012693e5,2023-06-16T03:57:35.310000
|
||||
CVE-2023-29386,1,1,287eb706c77a59567a3f21b059a2930a0358e405edd355fe510a48ce63958456,2024-03-26T21:15:50.900000
|
||||
CVE-2023-29387,0,0,ed00151bb5609ce481cb305b72e41d715ca3d8145030d4ad83d11188ebf72faf,2023-08-22T23:22:36.473000
|
||||
CVE-2023-29388,0,0,cedb7e8cd22d8e7c03665a218d69ad6009d176cbbb758b47f852d52b220862fc,2023-11-07T04:11:10.300000
|
||||
CVE-2023-29389,0,0,e2e59fa269c64b0c4c3c8a6a07a365712c3d14cfeda8282033c47134e3fce270,2023-04-14T16:03:43.527000
|
||||
@ -227237,6 +227240,7 @@ CVE-2023-38381,0,0,580e87b333e058d175503c85ff5b2c721d6b8ea39eca9d994a48ef8de7325
|
||||
CVE-2023-38382,0,0,95233def5985e85c0df5206014d24c06949c4b4bc39503e9f9d91f0c02293126,2023-11-10T04:19:37.937000
|
||||
CVE-2023-38384,0,0,a2ec4d64fe4cdf3d4501234addd0ab1c03265aad8ceda5fd8d3665c9c7fc3ef9,2023-08-10T03:49:13.217000
|
||||
CVE-2023-38387,0,0,c4c528bf05b8cb8ec536fe16db68e8c5b50c07d822a650a8e987dee0e2444378,2023-09-08T14:39:10.543000
|
||||
CVE-2023-38388,1,1,00ca38b0449e6b3650b86cf2c68a7a4db34c9eafe89c8d9b062dda396eca11b6,2024-03-26T21:15:51.113000
|
||||
CVE-2023-3839,0,0,c17e4be0a7daa4d01e33f457772e1f4edb268cb14ad6c2f748878e8a404781bd,2024-03-21T02:48:47.827000
|
||||
CVE-2023-38390,0,0,a8ddb08e6640474b7c20c14af215057166b935398c10611e08cf7ad2b1521ce6,2023-10-04T19:58:33.723000
|
||||
CVE-2023-38391,0,0,344147f660134030bcbbaa890dae6516b557e6ede35f44154d334296e9591473,2023-11-09T20:07:33.613000
|
||||
@ -227947,6 +227951,7 @@ CVE-2023-39299,0,0,4a4fe470a2bcfff30902e0b9d0b07fed9c3238f5a3ae755d2d216adf6ed07
|
||||
CVE-2023-39301,0,0,f99ca5c14f2281e592a0eb5c38c92820cdd533a72f6c4acb102a1e81f6e4c87e,2023-11-14T15:29:43.047000
|
||||
CVE-2023-39302,0,0,db9cae95c32f91811eb0f0ecdd3b63c519262646f87f4bc925e27b437fe46983,2024-02-06T19:54:10.380000
|
||||
CVE-2023-39303,0,0,d81a0865c899018b1bf357d592ab28d95ab5876f93fb600c5e62942433b060c9,2024-02-06T19:57:03.963000
|
||||
CVE-2023-39307,1,1,9c5bb6bcaa0e4070eaada5953d292b439b97b8adf03b545b0ad50aa15f9f843a,2024-03-26T21:15:51.330000
|
||||
CVE-2023-39308,0,0,0a6368135905c51e4bfc8658e86115693ae2beb292d59faa84b5dcfe3424348f,2023-10-02T19:36:52.837000
|
||||
CVE-2023-39314,0,0,ea740e75552d6dc1c0cf1f6c4b3f96de5bf219ab1a6cac778aaf3dfb58fa2dc3,2023-08-15T00:14:54.643000
|
||||
CVE-2023-39316,0,0,bd233c030a147eb3f789ee38efc103e8bf004636997da3293bc77e895bbfe866,2024-01-11T18:05:52.470000
|
||||
@ -227967,7 +227972,7 @@ CVE-2023-39335,0,0,de59ab60bb008cb37e35574265db4c70c7230619b6903b4fa71f9b7575236
|
||||
CVE-2023-39336,0,0,b977d6f2b7c9b0fd92c0a178a796d6d1f323429aaee5398b0e65e7fe7b72e509,2024-01-12T18:56:43.137000
|
||||
CVE-2023-39337,0,0,7360ad9ae1e4772f326d77e9e9c1e47262f5e3a444a43e8bfca2327242053227,2023-11-22T15:06:22.787000
|
||||
CVE-2023-3934,0,0,6345841b35fbbcfefb4a859ac4c6d40f27ac65e6bcc5a003199d21257c6bfebf,2024-01-31T06:15:45.870000
|
||||
CVE-2023-39340,0,1,3368dfefc612854e047c3fc5ef638ab44c0909626506bac01853af02cbaf8d7c,2024-03-26T19:18:28.943000
|
||||
CVE-2023-39340,0,0,3368dfefc612854e047c3fc5ef638ab44c0909626506bac01853af02cbaf8d7c,2024-03-26T19:18:28.943000
|
||||
CVE-2023-39341,0,0,42681de016b238b4476c42354bb83127e65376d05d62332b44e95e6a83861c6d,2023-11-07T04:17:30.083000
|
||||
CVE-2023-39342,0,0,962ce35ed3734feb09c3ddb7acfe108cdc33245badc292e940d62e0398cd2c0d,2023-08-16T15:35:33.843000
|
||||
CVE-2023-39343,0,0,fe019f2f6fc1ba334aef3b124ee735ef2454159d53a9821fbdd909e44d21861b,2023-08-08T18:55:13.367000
|
||||
@ -229572,9 +229577,9 @@ CVE-2023-41713,0,0,8de855d49c465f8aca52c2c0d301e3860de25752ca68f69195e8b754f1aec
|
||||
CVE-2023-41715,0,0,5d0463fe232efdccd6d5a3222f2209f2b7e7333636d080892cfe530119500012,2023-10-19T16:43:38.577000
|
||||
CVE-2023-41717,0,0,01ab6cc0acc3f6331aa80f1a1cfcf962a04bcc42f841936e5d005f2b62f9e241,2023-09-07T19:11:38.933000
|
||||
CVE-2023-41718,0,0,740b343c56aaea285c5d63967d3064cda8f011d6fe6a98f69d68bdab33bfac12,2023-11-22T15:06:11.117000
|
||||
CVE-2023-41719,0,1,08dc2fbc37647af52cf5c58a206c6f44f65b6fd78dd6ef69aecc648638392ed7,2024-03-26T19:26:49.713000
|
||||
CVE-2023-41719,0,0,08dc2fbc37647af52cf5c58a206c6f44f65b6fd78dd6ef69aecc648638392ed7,2024-03-26T19:26:49.713000
|
||||
CVE-2023-4172,0,0,7d864af5899760e5fd916de8d5b7cb4c836384b557d17d8798fea9491ff22d5a,2024-03-21T02:49:41.560000
|
||||
CVE-2023-41720,0,1,8e9fc1420effd6ecd9db2851fddc14d3419717893d5acef5b2ea72a58b50524c,2024-03-26T19:27:41.727000
|
||||
CVE-2023-41720,0,0,8e9fc1420effd6ecd9db2851fddc14d3419717893d5acef5b2ea72a58b50524c,2024-03-26T19:27:41.727000
|
||||
CVE-2023-41721,0,0,b8fe1a9595e9621301ef0bca4addee7da64b2a00520a510a37f29d2e79188e54,2023-10-31T20:02:00.777000
|
||||
CVE-2023-41723,0,0,2c6f443b87b008a8a9e627848e133dd59ab18ee4f518502f55e24551d97a1e0a,2023-11-14T20:30:54.470000
|
||||
CVE-2023-41725,0,0,ef65a845340b2e5995978b7ff227127be0d8e07ed7a8d62bd421fd7106110973,2023-11-09T20:48:01.590000
|
||||
@ -233378,7 +233383,9 @@ CVE-2023-47834,0,0,920967a055b2bc21ff0798aa9e7d238eed9616b66b2486f71c8817a961673
|
||||
CVE-2023-47835,0,0,7a712355ce5c48eadcb9e26f4f27778335f03b4bfa9861aa3fd9d0cda8b8d8fa,2023-11-28T20:21:32.220000
|
||||
CVE-2023-47839,0,0,7480547339b9b3ac3798f9c06e00c706f49ca35ebe73ec8189117729e422f769,2023-11-28T21:07:29.180000
|
||||
CVE-2023-47840,0,0,7e24f7bfe5242765e69f6a2a237de2196af9eb411219ff1fe89053605cf27eb0,2024-01-04T21:27:45.337000
|
||||
CVE-2023-47842,1,1,d3507476c0f89b7eb81a25b2c1827d0dfa222b33d68c90cf76009153bb746256,2024-03-26T21:15:51.530000
|
||||
CVE-2023-47844,0,0,741d209d5f9025e6891615bc08c4470c63d9aa75d230c481c60846b322e1cd21,2023-12-05T22:05:16.770000
|
||||
CVE-2023-47846,1,1,b940e213e4172039d976637ec7d4871f520eae9864fec94d82c58a2bceb09d1b,2024-03-26T21:15:51.737000
|
||||
CVE-2023-47848,0,0,21fbbbf4e86fa9dec45730eda9a909888845fbee735e966e936dc57fecf04f7d,2023-12-05T22:04:43.287000
|
||||
CVE-2023-4785,0,0,f96e6528e6daa35443c5249dce1ce895d9db73477dc922f40615878f59aeec17,2023-09-19T16:02:53.477000
|
||||
CVE-2023-47850,0,0,4e30d6342a01ec31cf4caaa45a8bc6148a7b39f98e1d311620e4bf661def1ca7,2023-12-05T18:43:19.487000
|
||||
@ -233394,6 +233401,7 @@ CVE-2023-47865,0,0,32fa35a5f49e53820f0f3e7e18baa49e7d1a42f1ea968b0971bedfa95dd76
|
||||
CVE-2023-47867,0,0,f0daeea1876f3aa3ee56ae4ce7d7661f589dadc3080e71dc64c8d64873856975,2024-03-21T02:49:28.240000
|
||||
CVE-2023-47870,0,0,3ef3a3cb3a2fda83b71ba119ab1f1059e42a472e888c4548e4b65f20b1078ab2,2023-12-06T15:21:19.540000
|
||||
CVE-2023-47872,0,0,550c4b6c5a7977fe1c0956c9594b5fd895299230fa3f6c497e2343527689fbfb,2023-12-06T02:44:27.170000
|
||||
CVE-2023-47873,1,1,a02bcbad7c96f462b94d211431945c7b5d743c5335348d8246159f6e196fbee6,2024-03-26T21:15:51.933000
|
||||
CVE-2023-47874,0,0,d3d8a772c5fdbc6315a3e7634808399ae50d5a644d3ff497877112fdbb85c10b,2024-02-29T13:49:29.390000
|
||||
CVE-2023-47875,0,0,75c1548edb875fa8f906ef110d5c91faf3a0d0d074f683de789b85b1a121a6c5,2023-12-06T02:48:34.940000
|
||||
CVE-2023-47876,0,0,7c97d9a50607cd23bf47f8ee7a04359ad4dbf465ccc017db28473d0e6347533a,2023-12-06T02:55:08.670000
|
||||
@ -233576,6 +233584,7 @@ CVE-2023-48266,0,0,d6f171231beb0ee1180aa8d7b71e94eefc1322fbdfbaea0d5770850886438
|
||||
CVE-2023-48268,0,0,7fbc38e1f3021e6f57ddbb59802c5c032dea61c9b04627258986c5e024d76a9e,2023-12-01T21:30:14.497000
|
||||
CVE-2023-4827,0,0,660cb613242cf8fb9cab965004afed839f4beeb124259e7181eab5017ac3219d,2023-11-07T04:23:00.800000
|
||||
CVE-2023-48272,0,0,6b4df1e347c87fa206b94499a385869f076cd0e708e56b463683f8e1d53c3c9b,2023-12-06T03:01:23.517000
|
||||
CVE-2023-48275,1,1,0454ac7ec5ed5768dd0b9a53097121220b63beb9c68852b412f948f7b39211b0,2024-03-26T21:15:52.143000
|
||||
CVE-2023-48278,0,0,b8b615ff398a78f2adcd1913a459812b30de22df732a4689ed336a4365900549,2023-12-06T03:09:04.530000
|
||||
CVE-2023-48279,0,0,677bb12e80f04b87e5ac81a35a4d9bd35cc895da5798b0a5048d841cd32d97ee,2023-12-05T20:02:01.297000
|
||||
CVE-2023-4828,0,0,de71ddef24d1de419c259578328ce0906fdc3b49b667c2f893d38ed7e21b3702,2023-10-13T22:15:10.717000
|
||||
@ -234057,6 +234066,7 @@ CVE-2023-48770,0,0,6c816255ef32856561403ee946964a1334c6ea4b20c017dd01ad793fa1d5d
|
||||
CVE-2023-48771,0,0,c3aa1b504f72498da7a69fcf6a31e6ac6c25e045f2b6b038ed9880c9730ae16f,2023-12-19T02:39:37.777000
|
||||
CVE-2023-48772,0,0,51bd166fc46eaec2256d292949fc7c1fffbe58afcdeee9dafb9515859c364e06,2023-12-22T09:49:18.993000
|
||||
CVE-2023-48773,0,0,d9b8ea1beb8af0a39107f0247c63f63cd08c23650a0d149c69ac4052bd7174a3,2023-12-22T09:48:23.130000
|
||||
CVE-2023-48777,1,1,5b92f5fc5ddfe4b34aca867ee8c0d866fbeb9668c615a115633e3c47cac77890,2024-03-26T21:15:52.350000
|
||||
CVE-2023-48778,0,0,f85ca09064426197f94634dc326db73c0a5834f3817de960e68c36d9f8a7afd9,2023-12-22T09:48:10.170000
|
||||
CVE-2023-4878,0,0,1fe826e0162bbd8607eac5c8754ffeeacc160bcce353137db7175d21b5c9afcb,2023-09-19T01:16:52.127000
|
||||
CVE-2023-48780,0,0,81a46aadc83bef693702f0587720fb307d57733c38a40b0e9a0adbf977d5c943,2023-12-19T17:54:07.470000
|
||||
@ -235358,6 +235368,9 @@ CVE-2023-51133,0,0,d4cbab034ce8105e49fc17df3288ec6653237538f125fb29562b759ab1355
|
||||
CVE-2023-51135,0,0,d5dfa726f5577ba7508ce233e276424bad2252ba782866f323d5eaf18aca14e7,2024-01-05T18:31:15.977000
|
||||
CVE-2023-51136,0,0,2ca511da0623e4727922981a3a33dc85c47c0550d43a47bc34e3bca00a268bc6,2024-01-05T18:30:58.837000
|
||||
CVE-2023-5114,0,0,4dc648ab97c5eb644a86e5f721a5758a4aff62f3c04184e8d35bd31381edc6f3,2023-11-13T17:48:55.993000
|
||||
CVE-2023-51146,1,1,71895b9bd64dfaa01eef4516d118aab0edfeaa522f9a575a21302192a8cd2112,2024-03-26T22:15:07.677000
|
||||
CVE-2023-51147,1,1,beb2c86fbbce6339d956bc36da6f24d399db592b55de8d5bc92c6c9ebe77dad9,2024-03-26T22:15:07.747000
|
||||
CVE-2023-51148,1,1,d719546cb851478f4718f8cd8cc41bdeb643e81b4b58768466274f8fc577b0ce,2024-03-26T21:15:52.557000
|
||||
CVE-2023-5115,0,0,cfd83bdfc62ea6a4db87d1b30a892254d6139791be4cc4c9f6b956be56be0deb,2023-12-29T17:57:50.077000
|
||||
CVE-2023-51154,0,0,c0c1d5a118a8aca4530efcd110e61e63479b767365ec9d0e207af20fa04dc96f,2024-01-10T15:58:18.733000
|
||||
CVE-2023-5116,0,0,8c93aca719da557b19846fd94520f46b1652d53677bb8ae463252688e7b2bb43,2023-11-07T04:23:28.397000
|
||||
@ -236956,7 +236969,7 @@ CVE-2023-6087,0,0,e865af7ea935fc22144ce6a037d1e9eedb83e9943260f825273789b70edc8f
|
||||
CVE-2023-6088,0,0,844257b81940c854c48827db2cfdd5ff63d458427ad4781ef82ad295558ee290,2023-11-14T00:15:09.027000
|
||||
CVE-2023-6089,0,0,73d6dfb1d97c3ceb536cf08d930057b79a5ca0369be397c478f41bcf571d0256,2023-11-14T00:15:09.073000
|
||||
CVE-2023-6090,0,0,a9eb342d355ca2f60d72c77ce67482d1115896f2d9c4ca3a7c9993e7419f4bc1,2024-02-29T13:49:29.390000
|
||||
CVE-2023-6091,1,1,e4583415d0de8e3eeacb935758369a1cf2e141875316b2af617b7897d781cc6d,2024-03-26T20:15:09.167000
|
||||
CVE-2023-6091,0,0,e4583415d0de8e3eeacb935758369a1cf2e141875316b2af617b7897d781cc6d,2024-03-26T20:15:09.167000
|
||||
CVE-2023-6092,0,0,29d6c12d74742133215ae81895362e8792ffaeaedc68872f3a97584c78958e27,2023-11-14T00:15:09.117000
|
||||
CVE-2023-6093,0,0,cdcbd1e1997de9b83295e1322a460ec7a9df4b733c53160638c79ab78836ce70,2024-01-08T19:09:29.700000
|
||||
CVE-2023-6094,0,0,fe64a29ca809dd77087aaa4828738c31a5bbe16b56c0195785a6e8bedba08bc7,2024-01-09T14:55:23.847000
|
||||
@ -240187,7 +240200,7 @@ CVE-2024-22428,0,0,d92a5a80e616f72d015e3df366132cde5205daf6f1415ae7d5800097348c1
|
||||
CVE-2024-22430,0,0,2e5779ce610960aa54065a985f7d7b4d5fc66005f09960beaac23d15bb28ba31,2024-02-03T00:30:48.593000
|
||||
CVE-2024-22432,0,0,a5ce1013533b36d94c95ad06d489dc2a6480ecc8fe7741cd230ce585b643d9e0,2024-02-01T17:00:46.647000
|
||||
CVE-2024-22433,0,0,15060e68251742f26417bd26381576269dfd06519ddd1ac4517720d4b647a719,2024-02-13T22:51:37.293000
|
||||
CVE-2024-22436,1,1,1a6ca03e82f15ba09d256dc4d1cfbe8c473cd6ccbc09b8293ead87668477e67b,2024-03-26T19:15:48.550000
|
||||
CVE-2024-22436,0,0,1a6ca03e82f15ba09d256dc4d1cfbe8c473cd6ccbc09b8293ead87668477e67b,2024-03-26T19:15:48.550000
|
||||
CVE-2024-22445,0,0,874153d1fc6b93fe9f1bc951c0a860f76df46d0b4a1da0ccdd296d9b31c66c08,2024-02-27T16:51:44.013000
|
||||
CVE-2024-22449,0,0,bbda7843d9766542fd731dac4991558c835fbecfc00731f79a512d8c0e63a23d,2024-02-03T00:30:30.737000
|
||||
CVE-2024-2245,0,0,691730e073363309cbbedda1561ea8c86cfdfccb1b6917a0eaaacd61f92e651b,2024-03-07T13:52:27.110000
|
||||
@ -240463,7 +240476,7 @@ CVE-2024-23247,0,0,8cedc356a5f40bb739283e8e4d0d6f8d8deae5a1378794e92c4d7ce373c0a
|
||||
CVE-2024-23248,0,0,3b100f3348e9ddca065d4f3fd478aec1907931fa96a4ed3377d05be33d175a96,2024-03-13T21:15:56.690000
|
||||
CVE-2024-23249,0,0,e0d7f2aee237d26c7b0c8ad64668a6a03d87d4b0174d6e350f019a0b7d59e493,2024-03-13T21:15:56.730000
|
||||
CVE-2024-23250,0,0,23972341b564827ce5b9505c9a1f83d7e8d72dc9e37716cac001382a6c566edd,2024-03-13T22:15:10.157000
|
||||
CVE-2024-23252,0,1,0664eeb2c9608aca7ada566c98a3c55b1e928a3feb65097958db8fb31b3c0f73,2024-03-26T19:15:48.757000
|
||||
CVE-2024-23252,0,0,0664eeb2c9608aca7ada566c98a3c55b1e928a3feb65097958db8fb31b3c0f73,2024-03-26T19:15:48.757000
|
||||
CVE-2024-23253,0,0,236890f266aeb2a0ef621837a0a5e82d7bb89a3a03220dfe0920fc94f8f6fd50,2024-03-13T21:15:56.870000
|
||||
CVE-2024-23254,0,0,31cb2ca8b372067663ff19288cb5bb0509a8c85018595f64afd9fcbbb0601b82,2024-03-13T23:15:46.657000
|
||||
CVE-2024-23255,0,0,50d24cf515724bff8276e52606e9845d547a501552c168c6d0b36213b6b0f202,2024-03-13T21:15:56.963000
|
||||
@ -241179,7 +241192,7 @@ CVE-2024-24846,0,0,6890a12a2a75edd735a365e4f936d5236ba568d73a773641099ac2fe0c58d
|
||||
CVE-2024-24847,0,0,b4fa9a61260da316bc833192464fabd12095e29ea013df2a2fb0faf16c78be6a,2024-02-07T23:30:27.567000
|
||||
CVE-2024-24848,0,0,40caff22a3243fb89666855618bfb8dcbc9fcd477abdaa3c19527de1aee97a51,2024-02-07T23:30:36.817000
|
||||
CVE-2024-24849,0,0,7310ea40ba14819a766bfed2718d0ae7c9bf655c4a04b330968acbdb73d5a918,2024-02-22T19:07:27.197000
|
||||
CVE-2024-2485,0,1,91d591c098e21e60f32736bf3e0fbe05d2390dc55eb3613eaaabf8a0a461a1ee,2024-03-26T20:15:09.860000
|
||||
CVE-2024-2485,0,0,91d591c098e21e60f32736bf3e0fbe05d2390dc55eb3613eaaabf8a0a461a1ee,2024-03-26T20:15:09.860000
|
||||
CVE-2024-24855,0,0,53926eea6176e5ec7dac755182b92f74698401115acbca0c88724948db080e51,2024-02-10T04:06:40.840000
|
||||
CVE-2024-24857,0,0,bd0a671ef627655a534b97d40879c56dc0a8ee5f900294aaa10a2d6428455f4e,2024-02-10T04:06:50.263000
|
||||
CVE-2024-24858,0,0,249d6bf347d8c64c978bec670161d1545cd8d4294041793438e8d2c55804ba1b,2024-02-10T04:06:20.077000
|
||||
@ -241445,6 +241458,8 @@ CVE-2024-25415,0,0,bbea7e03f98d3ff090986796c578947b874b9a857b6b9b0efb421dfb81e37
|
||||
CVE-2024-25417,0,0,ce0d2fee8c5d9d7e51d76e43f6a312ae4efb9da0c42980a6b1e85c18318f17f3,2024-02-12T21:39:48.423000
|
||||
CVE-2024-25418,0,0,35d59f7ff89650ff446db0ea3767d5b73417e01c12581b05b798d1e230ed55f5,2024-02-12T21:39:57.963000
|
||||
CVE-2024-25419,0,0,401cee772789e651c957846e5c67785cb38697dc7bb6f05ffb07d4d6143c7033,2024-02-12T21:40:04.610000
|
||||
CVE-2024-25420,1,1,e91990fd238309df03a12a63b362ace404adf96b87ac3e0559e09894783aadff,2024-03-26T21:15:52.710000
|
||||
CVE-2024-25421,1,1,df25e1245f8afad7f6b93f3480e4caf70a63ca9c65773203adbb70af83aeb3ee,2024-03-26T21:15:52.773000
|
||||
CVE-2024-25422,0,0,cb343876745657927a9a3aa4eefb40458b43d13348692326da3da2bb97c73701,2024-02-29T13:49:47.277000
|
||||
CVE-2024-25423,0,0,33cd9c56ae4cfa1d6cc2435a00a829df789b80150b430b34308e45329f20c67c,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25428,0,0,c9a4a68822ce56f9f70c0633568698e7786e1f54738d13d0ca759099f302c24e,2024-02-22T19:07:37.840000
|
||||
@ -241861,6 +241876,7 @@ CVE-2024-2630,0,0,4ae7a7f3ab879de5be47b2ccdb73f467c2c129b3bdab1f916d00784469083d
|
||||
CVE-2024-26300,0,0,957ff2fceea083c23710802994700a4cf17bc21a9f298857e1101271f2e4ee8e,2024-02-28T14:06:45.783000
|
||||
CVE-2024-26301,0,0,ca5ba4fc82d74473f58bbb8ab53e52870805c492ae0704dcd3113ae9fe8a11a4,2024-02-28T14:06:45.783000
|
||||
CVE-2024-26302,0,0,af4ef1bb4da1c0ac0e7b0a0b03804bb031d31d0e464ca3573002ab0828a12d88,2024-02-28T14:06:45.783000
|
||||
CVE-2024-26303,1,1,3ed42bba35456c98692a2027d790eeedffd8e917aeec7efbcf133ea6941c281e,2024-03-26T21:15:52.827000
|
||||
CVE-2024-26307,0,0,9bdd86f1164e19b9b7e171833e6f17ecff380db1e609df57649c593081a62eb2,2024-03-21T12:58:51.093000
|
||||
CVE-2024-26308,0,0,2ba9e28d3969717f6516b4803ddc13ceecd3ad2f69b64fd95ab4756f662bdfa5,2024-03-21T19:54:03.230000
|
||||
CVE-2024-26309,0,0,f36b82bfd58135529029d2dbb3557eae73d94f3c7d43b34f799072bc28e25580,2024-03-08T14:02:57.420000
|
||||
@ -242177,6 +242193,7 @@ CVE-2024-27508,0,0,040c763fe5f3ce1aa685f7456be4b1599a5d1d348a6a3ea3969c861bb92ef
|
||||
CVE-2024-27515,0,0,f99f7250526320b1e7250419a5b3dff4ee674d7e75fbaa06a1a665327078fcdc,2024-02-28T14:06:45.783000
|
||||
CVE-2024-27516,0,0,bc77d943dca3237cfc969969b912fe04cfc9a7bb141bbb351e6e03a84319d787,2024-03-22T03:15:07.923000
|
||||
CVE-2024-27517,0,0,97c5c6df0e60dd69b6d0aac6af969ac4b47e672031be447025dad2dd6eb96394,2024-02-29T13:49:29.390000
|
||||
CVE-2024-27521,1,1,5f6f1563f42c1644e0814ed1590cd75d5c4166565946e2848454985e9240a0a6,2024-03-26T21:15:53.013000
|
||||
CVE-2024-2754,0,0,085e82c1a95661c61fef6d127ca8d427c59ef0abe344921cba5cdafc9ab6e1f3,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27558,0,0,9eb3609e180b0082ba997e86c85d07a5ab4b31705e8b33d9a86b38769d49fa33,2024-03-01T22:22:25.913000
|
||||
CVE-2024-27559,0,0,197a94c92d57823a11d32d7ab09a8d3a649d2150b43720db8b2e13739dd842b7,2024-03-01T22:22:25.913000
|
||||
@ -242475,7 +242492,7 @@ CVE-2024-28432,0,0,4bc8c3df18623e8712ef966fb24c80f6754436b2eb6a0c14d5d3c56f5a161
|
||||
CVE-2024-28434,0,0,9ce149b3f63fd248825bfe2b0448af1d6b935cc8ea03a3087e8dd17d0b451340,2024-03-25T16:43:06.137000
|
||||
CVE-2024-28435,0,0,528401926238753caeca6996705f7f059321761f7aa1e186f9618f4c79a626b5,2024-03-25T16:43:06.137000
|
||||
CVE-2024-28441,0,0,5f38f329aa34d3551b4435a62b00ae0d72806d981cac257e26fcd8895c19c6be,2024-03-22T12:45:36.130000
|
||||
CVE-2024-28442,1,1,e6da2a2c25c8561aa3f7d720b8d50ce6f798b21adf3c0f255188b1236bf2d476,2024-03-26T20:15:09.670000
|
||||
CVE-2024-28442,0,0,e6da2a2c25c8561aa3f7d720b8d50ce6f798b21adf3c0f255188b1236bf2d476,2024-03-26T20:15:09.670000
|
||||
CVE-2024-28446,0,0,e3b0d814ee24ce9a2740eda808696f714c3071d6722fa7bd76f62923d12a194d,2024-03-19T13:26:46
|
||||
CVE-2024-28447,0,0,729795bf39bd106c71b5b798b10fa8f526cc5d6a6eb2785b0edfa8459a535a4c,2024-03-19T13:26:46
|
||||
CVE-2024-2849,0,0,689f01009061efff1ee0cd29db14c96053c4b561f68402f2590b4aaf791eded8,2024-03-26T09:15:11.360000
|
||||
@ -242487,9 +242504,11 @@ CVE-2024-2853,0,0,e510059736f729514b8634c28eabbedda89b99502b90c04b4a57c0f56252c1
|
||||
CVE-2024-28535,0,0,174c70ce71a26af929a40c7b6a103a5242ac3321f34f35a982d598e918b67152,2024-03-21T20:58:46.217000
|
||||
CVE-2024-28537,0,0,ff6bf2a37289dca28bccb57e311acb6479e1a577841d298af6b3b484403dfc2c,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2854,0,0,4d9650c5f6f9a8e97a81ecdc5d981ff248ee9a6c0a655eb847d3bd000f194314,2024-03-26T03:15:56.933000
|
||||
CVE-2024-28545,1,1,2b629ff94069f81548093cb36371ebc63186c415c2c9e7006893b419dfee7eef,2024-03-26T21:15:53.070000
|
||||
CVE-2024-28547,0,0,a2de8a258b087cbf7c5442c921d96afce5895db417e9c628fe7656334d2bb7cc,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2855,0,0,e69353ff45d51e90ba00dbf38253e3bd4d6755a4bd9fc7e219558fd74c8029a5,2024-03-26T03:15:59.320000
|
||||
CVE-2024-28550,0,0,55b413fc03c0e6dbaa5c4b6ccf0c8e244ea995bce860e043c8086ce78f470aae,2024-03-18T19:40:00.173000
|
||||
CVE-2024-28551,1,1,ea74e28ea826c7c3cffa423b78f72a17850e9734674f6b0184e1546a76f685ed,2024-03-26T21:15:53.123000
|
||||
CVE-2024-28553,0,0,f74a5d2edd657e610cfc2b884ed1530d128afd106cc0a285c1f4868830f65cd2,2024-03-21T20:58:52.357000
|
||||
CVE-2024-28559,0,0,0614f972b1018fef175a5be020062e1808da1307fa27e18c6ccd6df48da36c98,2024-03-22T12:45:36.130000
|
||||
CVE-2024-2856,0,0,15fc8ee8643f2d738e004abc8e00d4040db42ff6c4333ea56bb7e74735fedf8b,2024-03-26T03:16:09.907000
|
||||
@ -242561,22 +242580,26 @@ CVE-2024-28757,0,0,6f674e74da8b1d303f1997061736a8f7699c424c20f0aba68e441f140f441
|
||||
CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000
|
||||
CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000
|
||||
CVE-2024-28824,0,0,29abf61aa992ee5bcede73dcd8363195f5ccb0f240073ed24aaff3a2acefaab4,2024-03-22T12:45:36.130000
|
||||
CVE-2024-2883,1,1,df7e0047c4d867af976c2e6c4f6b5534e142ec8c85e89c002da04adf61ef9f55,2024-03-26T21:15:53.173000
|
||||
CVE-2024-28834,0,0,841718fd8fddff124f231102263dad7d394e02b19e9697b20d411d85f567df2c,2024-03-21T15:24:35.093000
|
||||
CVE-2024-28835,0,0,807354fa6b4609be92d801df299988ca81259642594a0e94cba8cafe4de90346,2024-03-21T12:58:51.093000
|
||||
CVE-2024-28847,0,0,77ca7298b6799783b77992e414cebfaaf69a1bd2c05124cbdf6b914d3e0bb310,2024-03-17T22:38:29.433000
|
||||
CVE-2024-28848,0,0,f738fe56a5bc4cdb728fabdb4b9cb52618afbf9827db3dbc12ec3f1fb91169bf,2024-03-21T02:52:25.197000
|
||||
CVE-2024-28849,0,0,5e73d26630408070b9f2d0554aca63f533ce0044a2d97ed66eab06494ab2be18,2024-03-23T03:15:11.970000
|
||||
CVE-2024-2885,1,1,3a2c72f79961f6885820c2d07909d3c34e1314254b05fccc7d5bfa0f002492ad,2024-03-26T21:15:53.220000
|
||||
CVE-2024-28850,0,0,3f010e48b33d8f74ceb957fab8d6defaf56ad7dc42ab2eb1e3bf15c4cfbd82b3,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28851,0,0,f15187ac52243f1288d6dabed456ab5bd2287b2db60c97a538d0582f4f0ba12d,2024-03-17T22:38:29.433000
|
||||
CVE-2024-28854,0,0,8cb03aded6b194ffbf5e93b6a999bfbf01ac8f736343c4fc752b0e38a8bc9f90,2024-03-17T22:38:29.433000
|
||||
CVE-2024-28855,0,0,2384a3330fde47f752f152bfa13a6226cb6b236bb18ff2466f5e886c7d3e893c,2024-03-19T13:26:46
|
||||
CVE-2024-28859,0,0,2d0407c7b83f2786a493b842ae3fe3ce3f906494adee8b0e0f61c75557fcb17c,2024-03-17T22:38:29.433000
|
||||
CVE-2024-2886,1,1,6f6de4d41e33ef78cdf3b87c6b292fa0e20948e924ded5bb329feafe8d50fa23,2024-03-26T21:15:53.260000
|
||||
CVE-2024-28861,0,0,614b056391803730ffc563205182a9ac310eb6811e0e407400ba2dc4b494f050,2024-03-22T19:02:10.300000
|
||||
CVE-2024-28862,0,0,b0dc40150b0e5f15633ecb26c2614b37fe6eefbb423911349887989b36d78640,2024-03-17T22:38:29.433000
|
||||
CVE-2024-28863,0,0,ad7818a88579939a8a2c9b467548624411262308646c7865759640aa6d437826,2024-03-22T12:45:36.130000
|
||||
CVE-2024-28864,0,0,6556868d08f3b43cf56ee8c0e31629a1275e8137bc2387bf2430488f9854bd36,2024-03-19T13:26:46
|
||||
CVE-2024-28865,0,0,346bb195552b29118071ab302fbe331daaaa3a5da7b31ab976886613f922d084,2024-03-19T13:26:46
|
||||
CVE-2024-28868,0,0,4e3489f3c96f97bc271ff7282115c7f5d25e2aa392efe0c1c5842c72ee9986bf,2024-03-21T12:58:51.093000
|
||||
CVE-2024-2887,1,1,8301c59ddd2e5b007e4a2882dc311ef700088a092929c47e0ed332b00192ddb6,2024-03-26T21:15:53.300000
|
||||
CVE-2024-2888,0,0,e48cc71bf8d96ab718c88bf59dd81f25047204b13c0446dd48014e6c60fc42d9,2024-03-26T12:55:05.010000
|
||||
CVE-2024-2889,0,0,047900621574a9797901d8767443e859750a2765d7b4c1f50c805ec45928b2d3,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28891,0,0,0aa614d18123b6bc2c76e9c8b5d356a2e7d71bba766bbf9db36fdc818df4c91d,2024-03-22T12:45:36.130000
|
||||
@ -242587,17 +242610,18 @@ CVE-2024-2893,0,0,03454b4172a384fcf754d0a79af98f544b770efe10848787fa0a66006ffb73
|
||||
CVE-2024-2894,0,0,e073a098f20ecf49044bd1b363f575a8cb2f6afd9229aa92873c84f5fd988e53,2024-03-26T17:15:48.080000
|
||||
CVE-2024-2895,0,0,3be1a99c99a4512208e842577cd86ecfd7359e00911a74bb22c4751a2f381f34,2024-03-26T18:15:10.893000
|
||||
CVE-2024-2896,0,0,cfbae6b125dd4e36298bfaaddfd49990d3493209156cf15c0e63037d046146fd,2024-03-26T18:15:11.543000
|
||||
CVE-2024-2897,1,1,ad01d017a25110de8970822d9921238dcd790b222bbb80d82ac43c0dc53c025f,2024-03-26T19:15:48.857000
|
||||
CVE-2024-2898,1,1,87df37fcfe48f1aa9b590a0f55927986b314c2d86ef25f89b8f5c428581cecd3,2024-03-26T19:15:49.130000
|
||||
CVE-2024-2899,1,1,8122b6e975e018f925621598511eec50c3812b50d5007cda33a4d177dfbb51c0,2024-03-26T19:15:49.410000
|
||||
CVE-2024-2900,1,1,d115b7c840fbf40f81e7406139e772f1410c77a036e7285e8293f5b757832ed7,2024-03-26T20:15:10.500000
|
||||
CVE-2024-2897,0,0,ad01d017a25110de8970822d9921238dcd790b222bbb80d82ac43c0dc53c025f,2024-03-26T19:15:48.857000
|
||||
CVE-2024-2898,0,0,87df37fcfe48f1aa9b590a0f55927986b314c2d86ef25f89b8f5c428581cecd3,2024-03-26T19:15:49.130000
|
||||
CVE-2024-2899,0,0,8122b6e975e018f925621598511eec50c3812b50d5007cda33a4d177dfbb51c0,2024-03-26T19:15:49.410000
|
||||
CVE-2024-2900,0,0,d115b7c840fbf40f81e7406139e772f1410c77a036e7285e8293f5b757832ed7,2024-03-26T20:15:10.500000
|
||||
CVE-2024-29009,0,0,e428945e790b35d2116d11f320908f919961bf6f75e41d300d21cf55f5bcc19c,2024-03-25T13:47:14.087000
|
||||
CVE-2024-2901,1,1,f29845d6342234dfa356914b26f6a628832a5a3d04e20111376a6c8f9d708a18,2024-03-26T20:15:10.933000
|
||||
CVE-2024-2901,0,0,f29845d6342234dfa356914b26f6a628832a5a3d04e20111376a6c8f9d708a18,2024-03-26T20:15:10.933000
|
||||
CVE-2024-29018,0,0,996b521b7d9365d8d41596984cc4ea0a166d70f0fc41d183b4857a8a3632cdd4,2024-03-21T12:58:51.093000
|
||||
CVE-2024-2902,1,1,01b35f4082170cd7419a16a45739130bbbca7c354bb59bfd011375069556ec32,2024-03-26T20:15:11.203000
|
||||
CVE-2024-2902,0,0,01b35f4082170cd7419a16a45739130bbbca7c354bb59bfd011375069556ec32,2024-03-26T20:15:11.203000
|
||||
CVE-2024-29025,0,0,2135a02640a8fe43b6f6ca4c5bc68a475f73ee669a9a1a5af697f30fa738d887,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29026,0,0,ae12b0436e3ecdf28001034b69d1ac66de23f0f8b6b646a25aa4e89d5c652db8,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29027,0,0,0443c0a5c3d136c6828a405e5e82a90c05a4f9edd7fbc1d30ba3bd5c5a4c0f72,2024-03-20T13:00:16.367000
|
||||
CVE-2024-2903,1,1,3ab5553087fed81f734dfb07aaad6dd258ac68a362d67025b789a476fcc6002f,2024-03-26T21:15:53.343000
|
||||
CVE-2024-29031,0,0,7f58d37a0fe973dfcea39547446f82cfc81d56a030b41fe804de053f1e911236,2024-03-22T12:45:36.130000
|
||||
CVE-2024-29032,0,0,fb02d2202c95545e773ec7caf494a1bc4414b85dfda56ba00a602bc4c558e262,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29033,0,0,3da47380cd3a71a38fcec215b864d4658478d80ec3a2925a5a05224fec9ea170,2024-03-21T12:58:51.093000
|
||||
@ -242612,6 +242636,7 @@ CVE-2024-29059,0,0,18e37be1e0df9e20dcfce0ba40125ed6c1baf91c43e1478b2c45015a44378
|
||||
CVE-2024-2906,0,0,d03107f75ca563c85caee3d034c6f17690ce56543ec4f09885b1b99f97ccb0d6,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29071,0,0,5ff903755374c23b025a98d3cc2b0f06ea188aa4151e3658c02fd385bc8b4fa8,2024-03-25T13:47:14.087000
|
||||
CVE-2024-29089,0,0,e5fbae925c9da8d587d9573cbc1c34db123c4510c1c1616d472538493a08c59e,2024-03-20T13:00:16.367000
|
||||
CVE-2024-2909,1,1,d774f0eba6a82e24841b3622fb0e5b97c218f955536b9b122fba2480dd38d2b8,2024-03-26T21:15:53.613000
|
||||
CVE-2024-29091,0,0,b1cb764a2082d02939e32c22f722543dd831cf608e6c39b51eb933f990788962,2024-03-20T13:00:16.367000
|
||||
CVE-2024-29092,0,0,beafae19b6703c9fc1f01dec7ad304174a985adb5a44a4613a96bd5d1cef6a8d,2024-03-20T13:00:16.367000
|
||||
CVE-2024-29093,0,0,79ec9f256e974df7e73dc7cee3806e2485cdbcd390ebff34178dc3162a3ed589,2024-03-20T13:00:16.367000
|
||||
@ -242621,6 +242646,7 @@ CVE-2024-29096,0,0,116dfe6880c4f9de1507cd397cd58f062c158d0a94a613f54efd8ba1f5f87
|
||||
CVE-2024-29097,0,0,19e0d13440c8d4b80f3bdee731a0c184e36f3f74135496da4c924c8079480570,2024-03-19T16:33:58.680000
|
||||
CVE-2024-29098,0,0,6298ff15ef67a327cc7f09a990f243f97487c434df63b2f34caf6bd6d79a29d9,2024-03-19T16:33:58.680000
|
||||
CVE-2024-29099,0,0,fb7d05ccd29d430018c79f33648232d07e2e28e598c3b96b6e110a9f5c781c4c,2024-03-19T16:33:58.680000
|
||||
CVE-2024-2910,1,1,da0e0d1a3036195e9576a35b88b5b216adc8a407bb7bd2e1e83c06c926d5af4f,2024-03-26T21:15:53.880000
|
||||
CVE-2024-29101,0,0,aae744ac7158d50069829e5caf84d067c3dd8ecd9940ca7cc779be2b3f5e5cc2,2024-03-19T16:33:58.680000
|
||||
CVE-2024-29102,0,0,c51ef308d73116b171941fde12ca2b3f8fde36f60fd9119976adb1e11a03868f,2024-03-19T16:33:58.680000
|
||||
CVE-2024-29103,0,0,671b864013cb97ebbea3122f0d47ea141dd69487a47a821fe9a7e85dba7e47df,2024-03-19T16:33:58.680000
|
||||
@ -242630,6 +242656,7 @@ CVE-2024-29106,0,0,83a576d463cccd6deacc066448ac54071af2bfaaf1076d70000d82cc7cb72
|
||||
CVE-2024-29107,0,0,a187741135a88848718c34f6dccc8248e03658bddfdc49d370bc1b2de775f48c,2024-03-19T16:33:58.680000
|
||||
CVE-2024-29108,0,0,8eb459781eb5f89e2b382dd14b29ac49aac4b50fff525b97f95d5c7b388766ea,2024-03-19T16:33:58.680000
|
||||
CVE-2024-29109,0,0,61deeebcc74310db0c65cb3af24b8cf99717898306ca7ff466d1330d2d71a7fe,2024-03-19T16:33:58.680000
|
||||
CVE-2024-2911,1,1,04e3fcc11d51580683b537e7f00bac46be78fb934eb21a6a572da06cfbf0dc30,2024-03-26T22:15:07.823000
|
||||
CVE-2024-29110,0,0,9fac9429f62fbdd2684f1ecf29789b4257a7ad8d88c0d9ecb165d126b89b6b45,2024-03-19T16:33:58.680000
|
||||
CVE-2024-29111,0,0,50597b6873634ca7f4144bc214b5ecf041752d2993e614727c346db8869f6277,2024-03-19T16:33:58.680000
|
||||
CVE-2024-29112,0,0,adcd7a79fc3a5910eb52664004103335276eb2ab35a0c50663e93130b0b2a493,2024-03-19T16:33:58.680000
|
||||
@ -242709,11 +242736,12 @@ CVE-2024-29474,0,0,cd74b93fedbacc13ab911c0f2a2b89e07d9e578953f3b262ce40503b72930
|
||||
CVE-2024-29499,0,0,bc8db29a97bf5517e5213278d0d5f5ecdec4b51f00adea3262848d25f6e735bc,2024-03-22T19:02:10.300000
|
||||
CVE-2024-2951,0,0,196d384afa50e4915b3f7f1abd72164195ad83bb49221af960f012f0ea91cf3f,2024-03-26T18:15:12.160000
|
||||
CVE-2024-29515,0,0,79c9f65757e49bdb19c4dcff88d6ba2d524b1951e790ac90d5ffb4f302abcf45,2024-03-26T12:55:05.010000
|
||||
CVE-2024-2955,1,1,434af8129d851694dcadd562a7be8c132241e357c2c6c3abcd25089475e2299a,2024-03-26T20:15:11.710000
|
||||
CVE-2024-2955,0,0,434af8129d851694dcadd562a7be8c132241e357c2c6c3abcd25089475e2299a,2024-03-26T20:15:11.710000
|
||||
CVE-2024-29644,0,0,386d9404cd9a66783fab4191d99526a9e5bea1176409bc071a51d532c36af3ad,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29650,0,0,3de71c7e130cece9a4956a25a7008efc5004a21e047c073aea3bd083423d5a0e,2024-03-25T16:43:06.137000
|
||||
CVE-2024-29666,0,0,a8926fce030310567330d9b7c126003f732556a2ce979a6a3fd232707f8bbd99,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29684,0,0,bf20e1eee3419c30e31b5c1e15077ebe4738914779e007adc0a6cf94ae84179f,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2971,1,1,9ebf0b5524df5787e891001d0b2d7ed41fec1467c00a445a7f37172414b586af,2024-03-26T22:15:08.190000
|
||||
CVE-2024-29732,0,0,3aff958eec55f5cf06538251c792be6423021bd21573f6f2f920d098c9ad37bd,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29735,0,0,1640123dfaaf4d3d57b29169fabd73ad7d0d319282e875da918e047f8134410f,2024-03-26T17:15:47.380000
|
||||
CVE-2024-29808,0,0,1a083356e9d0f501470cdfed0d1c85987d8c8667e4684d7b2ae73ab2fb9e2d44,2024-03-26T17:09:53.043000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user