mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-03-26T21:00:38.651774+00:00
This commit is contained in:
parent
afa2f7c07b
commit
ee94619998
55
CVE-2023/CVE-2023-236xx/CVE-2023-23656.json
Normal file
55
CVE-2023/CVE-2023-236xx/CVE-2023-23656.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-23656",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T20:15:08.067",
|
||||
"lastModified": "2024-03-26T20:15:08.067",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in MainWP MainWP File Uploader Extension.This issue affects MainWP File Uploader Extension: from n/a through 4.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/mainwp-file-uploader-extension/wordpress-mainwp-file-uploader-extension-plugin-4-1-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-259xx/CVE-2023-25965.json
Normal file
55
CVE-2023/CVE-2023-259xx/CVE-2023-25965.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-25965",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T20:15:08.280",
|
||||
"lastModified": "2024-03-26T20:15:08.280",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in mbbhatti Upload Resume.This issue affects Upload Resume: from n/a through 1.2.0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/resume-upload-form/wordpress-upload-resume-plugin-1-2-0-sensitive-data-exposure-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-274xx/CVE-2023-27440.json
Normal file
55
CVE-2023/CVE-2023-274xx/CVE-2023-27440.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-27440",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T20:15:08.483",
|
||||
"lastModified": "2024-03-26T20:15:08.483",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in OnTheGoSystems Types.This issue affects Types: from n/a through 3.4.17.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/types/wordpress-toolset-types-plugin-3-4-17-authenticated-arbitrary-file-upload-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-274xx/CVE-2023-27459.json
Normal file
55
CVE-2023/CVE-2023-274xx/CVE-2023-27459.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-27459",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T20:15:08.737",
|
||||
"lastModified": "2024-03-26T20:15:08.737",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of Untrusted Data vulnerability in WPEverest User Registration.This issue affects User Registration: from n/a through 2.3.2.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/user-registration/wordpress-user-registration-plugin-2-3-2-1-authenticated-php-object-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-276xx/CVE-2023-27630.json
Normal file
55
CVE-2023/CVE-2023-276xx/CVE-2023-27630.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-27630",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T20:15:08.953",
|
||||
"lastModified": "2024-03-26T20:15:08.953",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in PeepSo Community by PeepSo.This issue affects Community by PeepSo: from n/a through 6.0.9.0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/peepso-core/wordpress-community-by-peepso-plugin-6-0-9-0-server-information-disclosure?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-39340",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-12-16T02:15:07.453",
|
||||
"lastModified": "2023-12-20T17:33:22.220",
|
||||
"lastModified": "2024-03-26T19:18:28.943",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -79,36 +79,6 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "97D046F5-FF1A-41A7-8EDE-2C93E335906E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r15:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE228FBD-5AD1-4BC6-AF63-5248E671B04F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r16:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44C26423-8621-4F6D-A45B-0A6B6E873AB6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r16.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC391EB5-C457-459C-8EAA-EA0043487C0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:21.9:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD52B87C-4BED-44AE-A959-A316DAF895EC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:21.12:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8CA29F12-36DE-4FBF-9EE7-7CE4B75AFA61"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.1:r1:*:*:*:*:*:*",
|
||||
@ -148,11 +118,286 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.5:r2.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "001E117B-E8EE-4C20-AEBF-34FF5EB5051E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4B21C181-DC49-4EBD-9932-DBB337151FF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r1.0:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "130C8955-BDA4-4518-8EBA-740EB08FC3E4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A3A93FE-41BF-43F2-9EFC-89656182329F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r10.0:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5AA4B39F-2FB9-4752-B1F1-18812B0990B4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r10.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "232BAB6C-D318-4F80-8F49-4E700C21F535"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r11:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D5F47BA-DE6D-443D-95C3-A45F80EDC71E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r11.0:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABD840BF-944E-4F4C-96DC-0256286338F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r11.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A1995F34-AE75-47C4-9A9D-DBB1D3E130E5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r11.3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366EF5B8-0233-49B8-806A-E54F60410ADE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r11.4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6F2A7F5C-1D78-4D19-B8ED-5822FDF5DA63"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r11.5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2DDDA231-2A5E-4C70-8620-535C7F9027A4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r12:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "32E0B425-A9BA-4D00-84A9-46268072D696"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r12.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BBC724E8-195B-4CB4-AC2A-63E184AED4F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r12.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7162C24D-D181-49CC-B8C2-9EE3E0CDF846"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r13:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "65435A96-EF7A-439A-AA6C-CB7EAEF0A963"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r13.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3027A9CE-849E-4CAE-A1C4-170DEAF4FE86"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r14:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C132BA26-BCA0-43E6-9511-34ACFFA136A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r14.4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06520C75-9326-4C21-8AD6-6DE1ED031959"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r15:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE228FBD-5AD1-4BC6-AF63-5248E671B04F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r15.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7DBCD6B-B7AA-4AB0-852F-563A2EC85DB4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r16:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44C26423-8621-4F6D-A45B-0A6B6E873AB6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r16.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC391EB5-C457-459C-8EAA-EA0043487C0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r17:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB6CEA16-F422-48F1-9473-3931B1BFA63F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r17.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E238AB9F-99C1-4F0D-B442-D390065D35D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r17.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8971445A-D65F-4C0E-906F-7AC4953C5689"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r18:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "28FDE909-711C-41EC-8BA6-AC4DE05EA27E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r18.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "080CD832-3324-4158-A4CD-3A2E49B7BC74"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4FEFC4B1-7350-46F9-80C1-42F5AE06142F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r2.0:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E2D041D-9BDD-416D-B658-1C517C854104"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB7A6D62-6576-4713-9BF4-11068A72E8B7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r3.0:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7155EB34-E8E0-49AF-BDA2-FB4BFA44662E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "843BC1B9-50CC-4F8F-A454-A0CEC6E92290"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r4.0:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "25EE614A-5F32-4CA9-998A-4FAF16DC100C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r4.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D5355372-03EA-46D7-9104-A2785C29B664"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r4.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3DE32A0C-8944-4F51-A286-266055CA4B2F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r4.3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0349A0CC-A372-4E51-899E-D7BA67876F4B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93D1A098-BD77-4A7B-9070-A764FB435981"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r5.0:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F49EE829-A2CD-491E-BFC3-7888491D7C58"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CCC2D7B-F835-45EC-A316-2F0C5F2CF565"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r6.0:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2254DDF1-7FF3-49E1-8826-91F49A6794F8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD812596-C77C-4129-982F-C22A25B52126"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r7.0:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8EA4DA8-CD09-41AC-ADCB-27CF771C016B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9FA0B20D-3FA1-42AE-BDC5-93D8A182927C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r8.0:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D6CECCB-18BA-4219-95A2-2525A2BDCE36"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r8.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BFFA0B02-7F6D-4434-B1E7-EB8520FD68A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r8.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DFE8FA87-9622-4D5B-99C7-D8EE230C0AA9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r8.4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07AB853D-5A3F-4142-8417-1C9FB729A89E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r9:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16DAA769-8F0D-4C54-A8D9-9902995605B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r9.0:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B7006C07-0E3F-4890-A1B3-533E10924D49"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r9.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2C10C89-1DBC-4E91-BD28-D5097B589CA9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.6:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C383863-1E90-4B72-A500-4326782BC92F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.6:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AB9A5868-34FB-446E-817F-6701CC5DE923"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-41719",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-12-14T02:15:12.460",
|
||||
"lastModified": "2023-12-19T01:41:56.543",
|
||||
"lastModified": "2024-03-26T19:26:49.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -79,21 +79,6 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r15:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE228FBD-5AD1-4BC6-AF63-5248E671B04F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r16:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44C26423-8621-4F6D-A45B-0A6B6E873AB6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r16.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC391EB5-C457-459C-8EAA-EA0043487C0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:21.9:r1:*:*:*:*:*:*",
|
||||
@ -128,11 +113,21 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.4:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E9F55E7B-7B38-4AEC-A015-D8CB9DE5E72C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.4:r2.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D3DF17AC-EC26-4B76-8989-B7880C9EF73E"
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.5:r1.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5CF1705D-BE88-4B19-BE66-6628D8D8B688"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -142,6 +137,246 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.6:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C383863-1E90-4B72-A500-4326782BC92F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.6:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AB9A5868-34FB-446E-817F-6701CC5DE923"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4B21C181-DC49-4EBD-9932-DBB337151FF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A3A93FE-41BF-43F2-9EFC-89656182329F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r10.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "232BAB6C-D318-4F80-8F49-4E700C21F535"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r11:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D5F47BA-DE6D-443D-95C3-A45F80EDC71E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r11.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A1995F34-AE75-47C4-9A9D-DBB1D3E130E5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r11.3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366EF5B8-0233-49B8-806A-E54F60410ADE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r11.4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6F2A7F5C-1D78-4D19-B8ED-5822FDF5DA63"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r11.5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2DDDA231-2A5E-4C70-8620-535C7F9027A4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r12:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "32E0B425-A9BA-4D00-84A9-46268072D696"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r12.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BBC724E8-195B-4CB4-AC2A-63E184AED4F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r12.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7162C24D-D181-49CC-B8C2-9EE3E0CDF846"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r13:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "65435A96-EF7A-439A-AA6C-CB7EAEF0A963"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r13.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3027A9CE-849E-4CAE-A1C4-170DEAF4FE86"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r14:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C132BA26-BCA0-43E6-9511-34ACFFA136A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r14.4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06520C75-9326-4C21-8AD6-6DE1ED031959"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r15:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE228FBD-5AD1-4BC6-AF63-5248E671B04F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r15.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7DBCD6B-B7AA-4AB0-852F-563A2EC85DB4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r16:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44C26423-8621-4F6D-A45B-0A6B6E873AB6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r16.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC391EB5-C457-459C-8EAA-EA0043487C0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r17:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB6CEA16-F422-48F1-9473-3931B1BFA63F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r17.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E238AB9F-99C1-4F0D-B442-D390065D35D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r17.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8971445A-D65F-4C0E-906F-7AC4953C5689"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r18:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "28FDE909-711C-41EC-8BA6-AC4DE05EA27E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r18.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "080CD832-3324-4158-A4CD-3A2E49B7BC74"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r18.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB2B8165-E9D4-4549-B16E-A62810BDAF8D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r18.3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "014C7627-F211-48B1-80FA-3A7F608B4F23"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4FEFC4B1-7350-46F9-80C1-42F5AE06142F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB7A6D62-6576-4713-9BF4-11068A72E8B7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "843BC1B9-50CC-4F8F-A454-A0CEC6E92290"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r4.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D5355372-03EA-46D7-9104-A2785C29B664"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r4.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3DE32A0C-8944-4F51-A286-266055CA4B2F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r4.3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0349A0CC-A372-4E51-899E-D7BA67876F4B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93D1A098-BD77-4A7B-9070-A764FB435981"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CCC2D7B-F835-45EC-A316-2F0C5F2CF565"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD812596-C77C-4129-982F-C22A25B52126"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9FA0B20D-3FA1-42AE-BDC5-93D8A182927C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r8.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BFFA0B02-7F6D-4434-B1E7-EB8520FD68A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r8.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DFE8FA87-9622-4D5B-99C7-D8EE230C0AA9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r8.4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07AB853D-5A3F-4142-8417-1C9FB729A89E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r9:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16DAA769-8F0D-4C54-A8D9-9902995605B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r9.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2C10C89-1DBC-4E91-BD28-D5097B589CA9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r9.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F54753D0-6275-4F82-B874-55438D2983B3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-41720",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-12-14T02:15:12.670",
|
||||
"lastModified": "2023-12-19T01:44:28.233",
|
||||
"lastModified": "2024-03-26T19:27:41.727",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -79,31 +79,6 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r15:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE228FBD-5AD1-4BC6-AF63-5248E671B04F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r16:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44C26423-8621-4F6D-A45B-0A6B6E873AB6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.1:r16.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC391EB5-C457-459C-8EAA-EA0043487C0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:21.9:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD52B87C-4BED-44AE-A959-A316DAF895EC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:21.12:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8CA29F12-36DE-4FBF-9EE7-7CE4B75AFA61"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.1:r1:*:*:*:*:*:*",
|
||||
@ -114,6 +89,11 @@
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.1:r6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6564FE9E-7D96-4226-8378-DAC25525CDD1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.2:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "361FAA47-52FF-4B36-96B0-9C178A4E031B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.2:r1:*:*:*:*:*:*",
|
||||
@ -134,6 +114,16 @@
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.4:r2.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D3DF17AC-EC26-4B76-8989-B7880C9EF73E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.4:r2.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4F6AA81-68BC-40B1-9062-DD678B52AAC7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.5:r1.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5CF1705D-BE88-4B19-BE66-6628D8D8B688"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.5:r2.1:*:*:*:*:*:*",
|
||||
@ -142,6 +132,26 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.6:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C383863-1E90-4B72-A500-4326782BC92F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.6:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AB9A5868-34FB-446E-817F-6701CC5DE923"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
55
CVE-2023/CVE-2023-60xx/CVE-2023-6091.json
Normal file
55
CVE-2023/CVE-2023-60xx/CVE-2023-6091.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-6091",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T20:15:09.167",
|
||||
"lastModified": "2024-03-26T20:15:09.167",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in mndpsingh287 Theme Editor.This issue affects Theme Editor: from n/a through 2.7.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/theme-editor/wordpress-theme-editor-plugin-2-7-1-arbitrary-file-upload-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2024/CVE-2024-224xx/CVE-2024-22436.json
Normal file
43
CVE-2024/CVE-2024-224xx/CVE-2024-22436.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2024-22436",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-03-26T19:15:48.550",
|
||||
"lastModified": "2024-03-26T19:15:48.550",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A security vulnerability in HPE IceWall Agent products could be exploited remotely to cause a denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbmu04626en_us",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,39 +2,14 @@
|
||||
"id": "CVE-2024-23252",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-08T02:15:48.573",
|
||||
"lastModified": "2024-03-13T21:15:56.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-26T19:15:48.757",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved memory handling. This issue is fixed in Safari 17.4, iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4. Processing web content may lead to a denial-of-service."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en Safari 17.4, iOS 17.4 y iPadOS 17.4, macOS Sonoma 14.4. El procesamiento de contenido web puede dar lugar a una denegaci\u00f3n de servicio."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/20",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214081",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214084",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214089",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,9 +2,8 @@
|
||||
"id": "CVE-2024-2485",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-15T07:15:13.790",
|
||||
"lastModified": "2024-03-21T02:52:34.970",
|
||||
"lastModified": "2024-03-26T20:15:09.860",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -81,6 +80,10 @@
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/SetSpeedWan.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/setUsbUnload.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256892",
|
||||
"source": "cna@vuldb.com"
|
||||
|
24
CVE-2024/CVE-2024-284xx/CVE-2024-28442.json
Normal file
24
CVE-2024/CVE-2024-284xx/CVE-2024-28442.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-28442",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-26T20:15:09.670",
|
||||
"lastModified": "2024-03-26T20:15:09.670",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Directory Traversal vulnerability in Yealink VP59 v.91.15.0.118 allows a physically proximate attacker to obtain sensitive information via terms of use function in the company portal component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://medium.com/%40deepsahu1/cve-2024-28442-yealink-ip-phone-webview-escape-leads-to-sensitive-file-disclosure-via-directory-686ef8f80227",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.yealink.com/en/product-detail/ip-phone-vp59",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-28xx/CVE-2024-2897.json
Normal file
92
CVE-2024/CVE-2024-28xx/CVE-2024-2897.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-2897",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-26T19:15:48.857",
|
||||
"lastModified": "2024-03-26T19:15:48.857",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in Tenda AC7 15.03.06.44. Affected is the function formWriteFacMac of the file /goform/WriteFacMac. The manipulation of the argument mac leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257940. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formWriteFacMac.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257940",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257940",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.300360",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-28xx/CVE-2024-2898.json
Normal file
92
CVE-2024/CVE-2024-28xx/CVE-2024-2898.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-2898",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-26T19:15:49.130",
|
||||
"lastModified": "2024-03-26T19:15:49.130",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in Tenda AC7 15.03.06.44. Affected by this vulnerability is the function fromSetRouteStatic of the file /goform/SetStaticRouteCfg. The manipulation of the argument list leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257941 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetRouteStatic.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257941",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257941",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.300361",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-28xx/CVE-2024-2899.json
Normal file
92
CVE-2024/CVE-2024-28xx/CVE-2024-2899.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-2899",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-26T19:15:49.410",
|
||||
"lastModified": "2024-03-26T19:15:49.410",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in Tenda AC7 15.03.06.44. Affected by this issue is the function fromSetWirelessRepeat of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-257942 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetWirelessRepeat.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257942",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257942",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.300362",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-29xx/CVE-2024-2900.json
Normal file
92
CVE-2024/CVE-2024-29xx/CVE-2024-2900.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-2900",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-26T20:15:10.500",
|
||||
"lastModified": "2024-03-26T20:15:10.500",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in Tenda AC7 15.03.06.44. This affects the function saveParentControlInfo of the file /goform/saveParentControlInfo. The manipulation of the argument deviceId/time/urls leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257943. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/saveParentControlInfo_deviceId.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257943",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257943",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.300364",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-29xx/CVE-2024-2901.json
Normal file
92
CVE-2024/CVE-2024-29xx/CVE-2024-2901.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-2901",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-26T20:15:10.933",
|
||||
"lastModified": "2024-03-26T20:15:10.933",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in Tenda AC7 15.03.06.44 and classified as critical. This vulnerability affects the function setSchedWifi of the file /goform/openSchedWifi. The manipulation of the argument schedEndTime leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257944. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/setSchedWifi.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257944",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257944",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.300367",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-29xx/CVE-2024-2902.json
Normal file
92
CVE-2024/CVE-2024-29xx/CVE-2024-2902.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-2902",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-26T20:15:11.203",
|
||||
"lastModified": "2024-03-26T20:15:11.203",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tenda AC7 15.03.06.44 and classified as critical. This issue affects the function fromSetWifiGusetBasic of the file /goform/WifiGuestSet. The manipulation of the argument shareSpeed leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257945 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetWifiGusetBasic.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257945",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257945",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.300449",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-29xx/CVE-2024-2955.json
Normal file
59
CVE-2024/CVE-2024-29xx/CVE-2024-2955.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-2955",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-03-26T20:15:11.710",
|
||||
"lastModified": "2024-03-26T20:15:11.710",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "T.38 dissector crash in Wireshark 4.2.0 to 4.0.3 and 4.0.0 to 4.0.13 allows denial of service via packet injection or crafted capture file"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-762"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/wireshark/wireshark/-/issues/19695",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wireshark.org/security/wnpa-sec-2024-06.html",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
75
README.md
75
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-26T19:00:30.705758+00:00
|
||||
2024-03-26T21:00:38.651774+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-26T18:15:12.160000+00:00
|
||||
2024-03-26T20:15:11.710000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,64 +33,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
242741
|
||||
242756
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `20`
|
||||
Recently added CVEs: `15`
|
||||
|
||||
\* [CVE-2023-44989](CVE-2023/CVE-2023-449xx/CVE-2023-44989.json) (`2024-03-26T18:15:08.273`)
|
||||
\* [CVE-2023-52621](CVE-2023/CVE-2023-526xx/CVE-2023-52621.json) (`2024-03-26T18:15:08.817`)
|
||||
\* [CVE-2023-52622](CVE-2023/CVE-2023-526xx/CVE-2023-52622.json) (`2024-03-26T18:15:08.873`)
|
||||
\* [CVE-2023-52623](CVE-2023/CVE-2023-526xx/CVE-2023-52623.json) (`2024-03-26T18:15:08.930`)
|
||||
\* [CVE-2023-52624](CVE-2023/CVE-2023-526xx/CVE-2023-52624.json) (`2024-03-26T18:15:08.990`)
|
||||
\* [CVE-2023-52625](CVE-2023/CVE-2023-526xx/CVE-2023-52625.json) (`2024-03-26T18:15:09.040`)
|
||||
\* [CVE-2023-52626](CVE-2023/CVE-2023-526xx/CVE-2023-52626.json) (`2024-03-26T18:15:09.087`)
|
||||
\* [CVE-2023-52627](CVE-2023/CVE-2023-526xx/CVE-2023-52627.json) (`2024-03-26T18:15:09.140`)
|
||||
\* [CVE-2024-1313](CVE-2024/CVE-2024-13xx/CVE-2024-1313.json) (`2024-03-26T18:15:09.350`)
|
||||
\* [CVE-2024-26646](CVE-2024/CVE-2024-266xx/CVE-2024-26646.json) (`2024-03-26T18:15:09.910`)
|
||||
\* [CVE-2024-26647](CVE-2024/CVE-2024-266xx/CVE-2024-26647.json) (`2024-03-26T18:15:10.063`)
|
||||
\* [CVE-2024-26648](CVE-2024/CVE-2024-266xx/CVE-2024-26648.json) (`2024-03-26T18:15:10.220`)
|
||||
\* [CVE-2024-26649](CVE-2024/CVE-2024-266xx/CVE-2024-26649.json) (`2024-03-26T18:15:10.370`)
|
||||
\* [CVE-2024-26650](CVE-2024/CVE-2024-266xx/CVE-2024-26650.json) (`2024-03-26T18:15:10.530`)
|
||||
\* [CVE-2024-2893](CVE-2024/CVE-2024-28xx/CVE-2024-2893.json) (`2024-03-26T17:15:47.810`)
|
||||
\* [CVE-2024-2894](CVE-2024/CVE-2024-28xx/CVE-2024-2894.json) (`2024-03-26T17:15:48.080`)
|
||||
\* [CVE-2024-2895](CVE-2024/CVE-2024-28xx/CVE-2024-2895.json) (`2024-03-26T18:15:10.893`)
|
||||
\* [CVE-2024-2896](CVE-2024/CVE-2024-28xx/CVE-2024-2896.json) (`2024-03-26T18:15:11.543`)
|
||||
\* [CVE-2024-2951](CVE-2024/CVE-2024-29xx/CVE-2024-2951.json) (`2024-03-26T18:15:12.160`)
|
||||
\* [CVE-2024-29735](CVE-2024/CVE-2024-297xx/CVE-2024-29735.json) (`2024-03-26T17:15:47.380`)
|
||||
\* [CVE-2023-23656](CVE-2023/CVE-2023-236xx/CVE-2023-23656.json) (`2024-03-26T20:15:08.067`)
|
||||
\* [CVE-2023-25965](CVE-2023/CVE-2023-259xx/CVE-2023-25965.json) (`2024-03-26T20:15:08.280`)
|
||||
\* [CVE-2023-27440](CVE-2023/CVE-2023-274xx/CVE-2023-27440.json) (`2024-03-26T20:15:08.483`)
|
||||
\* [CVE-2023-27459](CVE-2023/CVE-2023-274xx/CVE-2023-27459.json) (`2024-03-26T20:15:08.737`)
|
||||
\* [CVE-2023-27630](CVE-2023/CVE-2023-276xx/CVE-2023-27630.json) (`2024-03-26T20:15:08.953`)
|
||||
\* [CVE-2023-6091](CVE-2023/CVE-2023-60xx/CVE-2023-6091.json) (`2024-03-26T20:15:09.167`)
|
||||
\* [CVE-2024-22436](CVE-2024/CVE-2024-224xx/CVE-2024-22436.json) (`2024-03-26T19:15:48.550`)
|
||||
\* [CVE-2024-28442](CVE-2024/CVE-2024-284xx/CVE-2024-28442.json) (`2024-03-26T20:15:09.670`)
|
||||
\* [CVE-2024-2897](CVE-2024/CVE-2024-28xx/CVE-2024-2897.json) (`2024-03-26T19:15:48.857`)
|
||||
\* [CVE-2024-2898](CVE-2024/CVE-2024-28xx/CVE-2024-2898.json) (`2024-03-26T19:15:49.130`)
|
||||
\* [CVE-2024-2899](CVE-2024/CVE-2024-28xx/CVE-2024-2899.json) (`2024-03-26T19:15:49.410`)
|
||||
\* [CVE-2024-2900](CVE-2024/CVE-2024-29xx/CVE-2024-2900.json) (`2024-03-26T20:15:10.500`)
|
||||
\* [CVE-2024-2901](CVE-2024/CVE-2024-29xx/CVE-2024-2901.json) (`2024-03-26T20:15:10.933`)
|
||||
\* [CVE-2024-2902](CVE-2024/CVE-2024-29xx/CVE-2024-2902.json) (`2024-03-26T20:15:11.203`)
|
||||
\* [CVE-2024-2955](CVE-2024/CVE-2024-29xx/CVE-2024-2955.json) (`2024-03-26T20:15:11.710`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `50`
|
||||
Recently modified CVEs: `5`
|
||||
|
||||
\* [CVE-2024-25957](CVE-2024/CVE-2024-259xx/CVE-2024-25957.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-25958](CVE-2024/CVE-2024-259xx/CVE-2024-25958.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-26644](CVE-2024/CVE-2024-266xx/CVE-2024-26644.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-26645](CVE-2024/CVE-2024-266xx/CVE-2024-26645.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-27756](CVE-2024/CVE-2024-277xx/CVE-2024-27756.json) (`2024-03-26T18:15:10.693`)
|
||||
\* [CVE-2024-2891](CVE-2024/CVE-2024-28xx/CVE-2024-2891.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-2892](CVE-2024/CVE-2024-28xx/CVE-2024-2892.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-2906](CVE-2024/CVE-2024-29xx/CVE-2024-2906.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-2915](CVE-2024/CVE-2024-29xx/CVE-2024-2915.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-29197](CVE-2024/CVE-2024-291xx/CVE-2024-29197.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-29203](CVE-2024/CVE-2024-292xx/CVE-2024-29203.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-2921](CVE-2024/CVE-2024-29xx/CVE-2024-2921.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-2929](CVE-2024/CVE-2024-29xx/CVE-2024-2929.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-29401](CVE-2024/CVE-2024-294xx/CVE-2024-29401.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-29684](CVE-2024/CVE-2024-296xx/CVE-2024-29684.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-29808](CVE-2024/CVE-2024-298xx/CVE-2024-29808.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-29809](CVE-2024/CVE-2024-298xx/CVE-2024-29809.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-29810](CVE-2024/CVE-2024-298xx/CVE-2024-29810.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-29832](CVE-2024/CVE-2024-298xx/CVE-2024-29832.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-29833](CVE-2024/CVE-2024-298xx/CVE-2024-29833.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-29881](CVE-2024/CVE-2024-298xx/CVE-2024-29881.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-29883](CVE-2024/CVE-2024-298xx/CVE-2024-29883.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-30233](CVE-2024/CVE-2024-302xx/CVE-2024-30233.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-30234](CVE-2024/CVE-2024-302xx/CVE-2024-30234.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-30235](CVE-2024/CVE-2024-302xx/CVE-2024-30235.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2023-39340](CVE-2023/CVE-2023-393xx/CVE-2023-39340.json) (`2024-03-26T19:18:28.943`)
|
||||
\* [CVE-2023-41719](CVE-2023/CVE-2023-417xx/CVE-2023-41719.json) (`2024-03-26T19:26:49.713`)
|
||||
\* [CVE-2023-41720](CVE-2023/CVE-2023-417xx/CVE-2023-41720.json) (`2024-03-26T19:27:41.727`)
|
||||
\* [CVE-2024-23252](CVE-2024/CVE-2024-232xx/CVE-2024-23252.json) (`2024-03-26T19:15:48.757`)
|
||||
\* [CVE-2024-2485](CVE-2024/CVE-2024-24xx/CVE-2024-2485.json) (`2024-03-26T20:15:09.860`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
165
_state.csv
165
_state.csv
@ -216438,6 +216438,7 @@ CVE-2023-2365,0,0,2b641966f73da1c03bac76f197cc25cdb025794330e95137c224f9ed081938
|
||||
CVE-2023-23650,0,0,bdb43282ea7d888f54eeb4c029ba9e5c1a406d2afa563b42e6a7548e68ecb093,2023-11-07T04:07:51.107000
|
||||
CVE-2023-23651,0,0,67236451a80b9f55a14752d0a0b34135a6cd3e5bc4be1a75484ace6a6c1a0cd3,2023-10-14T02:21:03.983000
|
||||
CVE-2023-23654,0,0,6d31dd903ef9ef9379174f7a720524fd14097fdb73f792d32eb91eccd0b45b6c,2023-05-22T17:08:57.177000
|
||||
CVE-2023-23656,1,1,a75dffc16686b4ea09f1d724c758ef992b2e0514e587812eb9d757ab758e97ff,2024-03-26T20:15:08.067000
|
||||
CVE-2023-23657,0,0,f9c995611939bee80b60fce69760b00f7d14fc21835d54b0d99400a290e44b44,2023-05-23T18:54:10.007000
|
||||
CVE-2023-23659,0,0,cdef213e979c790c823e596ef73ecdade9b047293b4aa108b66a27bc2cad5371,2023-11-07T04:07:51.230000
|
||||
CVE-2023-2366,0,0,ed15702be74cf809ce5d75fa41ed676adc877c6d79d7c35130d7ba1ed1c651d5,2024-03-21T02:47:07.970000
|
||||
@ -218307,6 +218308,7 @@ CVE-2023-25961,0,0,31e0a6732f540f6917a1b6b5d3508a68522e67ae0de03ce13bbd138d765f8
|
||||
CVE-2023-25962,0,0,4b86764ac537e69027b956317cbcf9c9fc22f8f441c355a28f72aebfd340b8b0,2023-05-10T02:29:05.977000
|
||||
CVE-2023-25963,0,0,9327aafe21090ee3e0080b9c6ae99110509f70c0997007468a111a8ed1dde950,2023-06-22T19:48:48.483000
|
||||
CVE-2023-25964,0,0,7b22724b55e21a391c842995faf0e67fccd6411b05e064deea6e494a18b5d976,2023-06-20T14:45:48.997000
|
||||
CVE-2023-25965,1,1,8a98b7afd07e87af087c49e75154db0cf3bec9684dcadbbb2fa42a8a5051eacd,2024-03-26T20:15:08.280000
|
||||
CVE-2023-25967,0,0,9c3dc755573ab57072330583684d5a0ccfafd1682f61498b0546de78bdaef7bd,2023-05-08T13:44:41.297000
|
||||
CVE-2023-25968,0,0,fea5f7ad1565ee9cbedd5c1ceb3cfee62c0a455aa81f74dc9b60952c3c0aae39,2023-11-07T04:09:16.290000
|
||||
CVE-2023-2597,0,0,6cc8e290e260e4840e41efc9aaeddabe788a6e7ccac7fda76a06f95efa4bdb4c,2023-05-30T21:32:32.543000
|
||||
@ -219324,6 +219326,7 @@ CVE-2023-27436,0,0,b0caec624f07aa2674ca9cf73465606bd64f5388b6c821e66d91e5649c784
|
||||
CVE-2023-27438,0,0,5be0f579772e68b81f545a98e4ef90f61e8a2d38cccc27e3ec3103a8d20b96e0,2023-11-15T19:12:13.987000
|
||||
CVE-2023-27439,0,0,e78320b1d1cd6cd11ce4f0b7074e10ed4bb0a9d26bddd73278d8796f5cb702c5,2023-06-27T20:54:24.717000
|
||||
CVE-2023-2744,0,0,52d31477da03b6d03cb7cbec9b1fb880499c8f8304e18c6a878c67a90a6d440a,2023-11-07T04:13:15.560000
|
||||
CVE-2023-27440,1,1,f7b148d3b7aed705a7bcc4ec8cd78d0dcd052ec5a116e3310c04812a3d277560,2024-03-26T20:15:08.483000
|
||||
CVE-2023-27441,0,0,ebfa08ad136b1620df5e502d2f427908beb2416e3e07d1bcf8c575dbe0f1d40c,2023-11-15T19:15:28.277000
|
||||
CVE-2023-27442,0,0,65446bf943eed43ba92190c90858cfd42d8caed68c959a6123994e47e8202f09,2023-11-27T22:08:45.050000
|
||||
CVE-2023-27443,0,0,e70a6b1c796ac11415e202ca17f07dcc6233dc38e7b06100261f3e321ddddcbb,2023-06-28T16:01:26.587000
|
||||
@ -219340,6 +219343,7 @@ CVE-2023-27453,0,0,ee071e586fd895bda9aadad5e737702076d121a85b852525dba6f456b0e0f
|
||||
CVE-2023-27455,0,0,7e32e8ad48a7824fd11c180849e8ede25b549547ecace669f4090b4f566ed004,2023-05-16T21:43:52.443000
|
||||
CVE-2023-27457,0,0,6a6b95f6e1965667d65b9ab16b546fc7c64c0640a898b8db40aaceb9a901aff5,2023-11-30T19:44:39.023000
|
||||
CVE-2023-27458,0,0,8f4bf85bfa600ead504bb2798ec3dc271ef7cc4efe1718deebe7ef63f402ef8d,2023-11-30T19:41:51.770000
|
||||
CVE-2023-27459,1,1,c28b3e932c1aec22594bc80dd4a57b72c28d826de344bf5086b48bab6c6e24ce,2024-03-26T20:15:08.737000
|
||||
CVE-2023-2746,0,0,189d0393932e2d9dc55b6f912ad82e4a97a7e551c0597cdf074171620345d1e2,2023-07-18T19:26:41.327000
|
||||
CVE-2023-27461,0,0,820e9f8cdace996b5a4700f4726e6326898ef3adb42497085b1aae66b21c3ae3,2023-11-30T15:26:18.103000
|
||||
CVE-2023-27462,0,0,61fd4f9772445cd7d5c02748d8dadac37d825a79bed367257ae702b32ea75e04,2023-03-17T17:08:26.373000
|
||||
@ -219494,6 +219498,7 @@ CVE-2023-27627,0,0,9a15daa7472d5aaf33aca757cd7d1a633dc6cb30118d7b7951fbbab74ec99
|
||||
CVE-2023-27628,0,0,6821355c8ee1dd2c2bac02a7bd738a2a4ca0c2ac34c6a239588410041d688ab4,2023-09-29T18:38:01.643000
|
||||
CVE-2023-27629,0,0,c7bdbf7f70e7ff884f174fbcaf472262dd344c8876ffc6bcbd454b2e4d8c35cb,2023-06-28T03:28:24.817000
|
||||
CVE-2023-2763,0,0,902c2a829b97eeb5cdb5ef73f11e8cac31787b838427aeff2459e6cf73fb5649,2023-07-20T01:56:00.570000
|
||||
CVE-2023-27630,1,1,a461f215e620df29e38ad686c7d2f5a2aebe4286c233d2fc877e60edf20c53e1,2024-03-26T20:15:08.953000
|
||||
CVE-2023-27631,0,0,243c34486db3b62aaccae00faaedfdf15aca3fc5e1c8f960ee009b611a3ba79c,2023-06-28T03:27:49.077000
|
||||
CVE-2023-27632,0,0,c0f75ba197626880fad4e5bd26d8ec95adffab87af57cc725356c0d01e9a9e0e,2023-11-17T19:29:14.953000
|
||||
CVE-2023-27633,0,0,46dbf1daeb8d87e6e0cea8b6b6068c1b297802da2f2d7b505dbc71c6acb74609,2023-11-30T19:19:27.577000
|
||||
@ -224194,7 +224199,7 @@ CVE-2023-3385,0,0,e241d0523cea3c6af9c190fdb70f25425341aeb1b1a2cdae19227875cb149f
|
||||
CVE-2023-33850,0,0,72b12baa890a1451753888aa71bc88912c5010ac8efb5d0093b5e4b0d1bf044b,2023-08-28T19:51:25.020000
|
||||
CVE-2023-33851,0,0,8db788edf6a5198f3e8e5896114b0940f7896f676a9d0dab45d0b9995fc2f580,2024-02-12T19:54:23.117000
|
||||
CVE-2023-33852,0,0,523da9d9b75e64b7c746506e149f7a515a45762485db47beb2ace64d6f3001ae,2023-08-29T04:43:06.033000
|
||||
CVE-2023-33855,0,1,443fd33951f00d06bb83303d8e13b972c9c28876bf8ac2ed146d87d772451327,2024-03-26T17:09:53.043000
|
||||
CVE-2023-33855,0,0,443fd33951f00d06bb83303d8e13b972c9c28876bf8ac2ed146d87d772451327,2024-03-26T17:09:53.043000
|
||||
CVE-2023-33857,0,0,009b629a678d495b5ca76bd9ed766e57d21f04b1fd5cac55c82232f187a28b80,2023-07-26T20:04:15.373000
|
||||
CVE-2023-3386,0,0,ca1c2f8eabd2a8ccc5353bf76dd6b68e5e018805b86e6999cd336196f7670718,2023-08-11T16:11:22.257000
|
||||
CVE-2023-33863,0,0,bcc6ceec655946e02a491efce99a4793246bd9fa7abf6fe4628bce4c635fc35b,2023-11-25T11:15:17.060000
|
||||
@ -227962,7 +227967,7 @@ CVE-2023-39335,0,0,de59ab60bb008cb37e35574265db4c70c7230619b6903b4fa71f9b7575236
|
||||
CVE-2023-39336,0,0,b977d6f2b7c9b0fd92c0a178a796d6d1f323429aaee5398b0e65e7fe7b72e509,2024-01-12T18:56:43.137000
|
||||
CVE-2023-39337,0,0,7360ad9ae1e4772f326d77e9e9c1e47262f5e3a444a43e8bfca2327242053227,2023-11-22T15:06:22.787000
|
||||
CVE-2023-3934,0,0,6345841b35fbbcfefb4a859ac4c6d40f27ac65e6bcc5a003199d21257c6bfebf,2024-01-31T06:15:45.870000
|
||||
CVE-2023-39340,0,0,b670a50be510018e978e46b963b9901ab8727ebc9bc8f65cd1f48471deaafd68,2023-12-20T17:33:22.220000
|
||||
CVE-2023-39340,0,1,3368dfefc612854e047c3fc5ef638ab44c0909626506bac01853af02cbaf8d7c,2024-03-26T19:18:28.943000
|
||||
CVE-2023-39341,0,0,42681de016b238b4476c42354bb83127e65376d05d62332b44e95e6a83861c6d,2023-11-07T04:17:30.083000
|
||||
CVE-2023-39342,0,0,962ce35ed3734feb09c3ddb7acfe108cdc33245badc292e940d62e0398cd2c0d,2023-08-16T15:35:33.843000
|
||||
CVE-2023-39343,0,0,fe019f2f6fc1ba334aef3b124ee735ef2454159d53a9821fbdd909e44d21861b,2023-08-08T18:55:13.367000
|
||||
@ -229567,9 +229572,9 @@ CVE-2023-41713,0,0,8de855d49c465f8aca52c2c0d301e3860de25752ca68f69195e8b754f1aec
|
||||
CVE-2023-41715,0,0,5d0463fe232efdccd6d5a3222f2209f2b7e7333636d080892cfe530119500012,2023-10-19T16:43:38.577000
|
||||
CVE-2023-41717,0,0,01ab6cc0acc3f6331aa80f1a1cfcf962a04bcc42f841936e5d005f2b62f9e241,2023-09-07T19:11:38.933000
|
||||
CVE-2023-41718,0,0,740b343c56aaea285c5d63967d3064cda8f011d6fe6a98f69d68bdab33bfac12,2023-11-22T15:06:11.117000
|
||||
CVE-2023-41719,0,0,d9611cbf025ea6f4f80dc18ebf1bab55b2f21246b7b831ec415c4394abfefce9,2023-12-19T01:41:56.543000
|
||||
CVE-2023-41719,0,1,08dc2fbc37647af52cf5c58a206c6f44f65b6fd78dd6ef69aecc648638392ed7,2024-03-26T19:26:49.713000
|
||||
CVE-2023-4172,0,0,7d864af5899760e5fd916de8d5b7cb4c836384b557d17d8798fea9491ff22d5a,2024-03-21T02:49:41.560000
|
||||
CVE-2023-41720,0,0,2f23d94dd481e1221a59e47b55ced2fc1b2f1e2f21a8077f7632f990d150b3da,2023-12-19T01:44:28.233000
|
||||
CVE-2023-41720,0,1,8e9fc1420effd6ecd9db2851fddc14d3419717893d5acef5b2ea72a58b50524c,2024-03-26T19:27:41.727000
|
||||
CVE-2023-41721,0,0,b8fe1a9595e9621301ef0bca4addee7da64b2a00520a510a37f29d2e79188e54,2023-10-31T20:02:00.777000
|
||||
CVE-2023-41723,0,0,2c6f443b87b008a8a9e627848e133dd59ab18ee4f518502f55e24551d97a1e0a,2023-11-14T20:30:54.470000
|
||||
CVE-2023-41725,0,0,ef65a845340b2e5995978b7ff227127be0d8e07ed7a8d62bd421fd7106110973,2023-11-09T20:48:01.590000
|
||||
@ -229761,10 +229766,10 @@ CVE-2023-41965,0,0,819d10b57b506bddb9951f918fc98fbd0b8a91d148804e4f285468fbd9d32
|
||||
CVE-2023-41966,0,0,fa827770b589d95b7355015bd98bf88afd7826564ca5f72e6f3c89942fecdd86,2023-11-07T18:33:13.163000
|
||||
CVE-2023-41967,0,0,8e02dbae31e5167552a8965141c33a2e264759fb6dbab0897ce89326a49ec280,2024-01-05T17:59:28.783000
|
||||
CVE-2023-41968,0,0,1248c9df7ecfb3920853d876ba26e870eae54e3bdcb4167f52b0214e6558ef25,2023-11-07T04:21:11.093000
|
||||
CVE-2023-41969,0,1,29e94a4ba4cfe3727abfed65d25b13858512057feb987f4bf212f0615c9ad6b5,2024-03-26T17:09:53.043000
|
||||
CVE-2023-41969,0,0,29e94a4ba4cfe3727abfed65d25b13858512057feb987f4bf212f0615c9ad6b5,2024-03-26T17:09:53.043000
|
||||
CVE-2023-4197,0,0,f146d2ff6232fd5933bf8142dd157ce30d6c6646be201da9229ef783e3b9cbfb,2023-11-08T19:47:53.387000
|
||||
CVE-2023-41972,0,1,e6bd46328b86f6eb60a17a1d077353a063296843a0cd61509134ea6a235f1e9b,2024-03-26T17:09:53.043000
|
||||
CVE-2023-41973,0,1,24c8e08508313bc504a5e8115a035bae26e0aac9371d4155eb384dcf9a0b0548,2024-03-26T17:09:53.043000
|
||||
CVE-2023-41972,0,0,e6bd46328b86f6eb60a17a1d077353a063296843a0cd61509134ea6a235f1e9b,2024-03-26T17:09:53.043000
|
||||
CVE-2023-41973,0,0,24c8e08508313bc504a5e8115a035bae26e0aac9371d4155eb384dcf9a0b0548,2024-03-26T17:09:53.043000
|
||||
CVE-2023-41974,0,0,ec7dd2b6702f5a8bbc562cadb789ab42ea352cdfbc62d11784bae6116e1e8ab4,2024-01-17T21:17:26.303000
|
||||
CVE-2023-41975,0,0,307c3809d415b29d4366c7e0ea292a20dbce25ae704d534682230c6d89427017,2023-11-02T15:22:55.217000
|
||||
CVE-2023-41976,0,0,b44526aa36fb3f3d93fc90ad2e1fd48460d30f0e861bda5ba98a7a12c2a8aed3,2023-12-07T20:15:37.807000
|
||||
@ -231428,7 +231433,7 @@ CVE-2023-44984,0,0,0f4ed06f1b5ac0b548c3e2d9f0d9f3f0cbd98c53b4eee334baff070264749
|
||||
CVE-2023-44985,0,0,dfb696d5215b943e30a7373978ec95a4f1b73957eb031473531ba106a6046f85,2023-10-19T13:48:52.637000
|
||||
CVE-2023-44986,0,0,dde8c0b4f7af4dc5c9e767ceedcd42c76156fba6640bda1b12d18c0c1d529774,2023-10-19T13:49:39.247000
|
||||
CVE-2023-44987,0,0,1d0940c6c1116a8bd1e99725f710bdd942e9b5e0f435a1ad89ade226716b3915,2023-10-19T20:54:21.393000
|
||||
CVE-2023-44989,1,1,e7e20dc1d114e542c553e6ef6f19736758eb8e49d1dab2eca9751cbbc66e25cd,2024-03-26T18:15:08.273000
|
||||
CVE-2023-44989,0,0,e7e20dc1d114e542c553e6ef6f19736758eb8e49d1dab2eca9751cbbc66e25cd,2024-03-26T18:15:08.273000
|
||||
CVE-2023-4499,0,0,2221e124504cf2ae1b924d444e1f8b4a1bda09ce3dcf640a68a8c7f8ffe55b09,2023-10-19T20:18:31.937000
|
||||
CVE-2023-44990,0,0,ab429a48d2179fdf171bbbe4e2b53f60ef9a3671555e07b6733f9ca5f6ef987c,2023-10-24T17:56:46.373000
|
||||
CVE-2023-44991,0,0,229523c1ca4b7df2290ad3404ea2bc7a11a7180706108c99bc4a3b631c9b7132,2023-12-28T19:55:16.063000
|
||||
@ -232942,7 +232947,7 @@ CVE-2023-47145,0,0,620ae7f5678047a8c4108d9fbdf5fa18578054841b939f4838b425b9745ba
|
||||
CVE-2023-47146,0,0,20e69829653fae8f4b2686a3902570d251dd86f6502cbd24bd7e7bddd7d52e98,2023-12-27T17:50:55.147000
|
||||
CVE-2023-47147,0,0,aa39e297601bc950529f92cdf2bd8439447f01312c2edd499306ed4ebc349c17,2024-03-19T17:31:22.997000
|
||||
CVE-2023-47148,0,0,b288941dfe3b1bf420ecb81fb3f06fe48a4281a820ff4a84a19d97a629ab7c25,2024-02-08T19:58:30.023000
|
||||
CVE-2023-47150,0,1,fd78c089e6cfc2cc360595668fe16eb44dbc84f78e53c634e23776b310571458,2024-03-26T17:09:53.043000
|
||||
CVE-2023-47150,0,0,fd78c089e6cfc2cc360595668fe16eb44dbc84f78e53c634e23776b310571458,2024-03-26T17:09:53.043000
|
||||
CVE-2023-47152,0,0,21eae157a0c14eb599c0d65626b59a59bd4bef9c2fca5d41f60c8cae56283468,2024-03-07T17:15:11.063000
|
||||
CVE-2023-47158,0,0,846f95a2725be32047541f14ae8c358ff876d7b2eaf417c4327cad289f3b21cd,2024-03-07T17:15:11.147000
|
||||
CVE-2023-4716,0,0,19a8e4bcfef050287a950063ecd9c6c3a76d47aa7d1ec3543611c805970cc149,2023-11-07T04:22:53.527000
|
||||
@ -235200,8 +235205,8 @@ CVE-2023-5089,0,0,cddae8cd7907847e037d2a072115a2d298d26ef8e69ec53058c1c3b486a685
|
||||
CVE-2023-50891,0,0,bb600fee959bc0c70bc3812b31f851a727133cb965ac9f397fefe731a21c9727,2024-01-05T18:37:38.957000
|
||||
CVE-2023-50892,0,0,b0a5df3a0991deeddc21aba073d59e844033efac16fe6402bc12f130e340ebd2,2024-01-05T19:43:06.133000
|
||||
CVE-2023-50893,0,0,9e2a79008bb70c571f7956df8d783d4f37d38fd17c2b6ce3c5ce4f3a295c4404,2024-01-05T18:33:07.640000
|
||||
CVE-2023-50894,0,1,6eed329f67138d2f2e627602146cd43f0801dd418258af7b9bf418e3974e55dd,2024-03-26T17:09:53.043000
|
||||
CVE-2023-50895,0,1,1f927ab35258aecd3c8a00c2d421efb443c9113305b6571381658536cbf62a0b,2024-03-26T17:09:53.043000
|
||||
CVE-2023-50894,0,0,6eed329f67138d2f2e627602146cd43f0801dd418258af7b9bf418e3974e55dd,2024-03-26T17:09:53.043000
|
||||
CVE-2023-50895,0,0,1f927ab35258aecd3c8a00c2d421efb443c9113305b6571381658536cbf62a0b,2024-03-26T17:09:53.043000
|
||||
CVE-2023-50896,0,0,32a10544fdac61db8a171df746dccf1d232f13684a47de05af905306e155cf06,2024-01-05T17:32:59.937000
|
||||
CVE-2023-50898,0,0,8aff62c643d7aeddc95a67a99b868adeecf42b7f0720ae7af339a4744e3e221f,2024-03-15T16:26:49.320000
|
||||
CVE-2023-5090,0,0,ada81fac99e019d87a6cff7c251f38065497d67cafeddaf348ee3fa109b9d32b,2023-12-13T08:15:51.483000
|
||||
@ -235903,7 +235908,7 @@ CVE-2023-52207,0,0,8811a262457d47a928522c6d4c018a091faaddd37faf85fb909e774e66447
|
||||
CVE-2023-52208,0,0,9ed351f5d9cad0471fed88b06cec98b8cea6e1cb366c882b7648760856f996f0,2024-01-11T19:01:44.920000
|
||||
CVE-2023-5221,0,0,e94a56c9d66474b5a160e0651ef9dc4824c1649580fd0ea943a206b242eec447,2024-03-21T02:50:10.947000
|
||||
CVE-2023-52213,0,0,c567e205c61b5b287735b8f3f6708ba72962cb7ab86a1661d42ad149b5793151,2024-01-11T19:58:54.940000
|
||||
CVE-2023-52214,0,1,162d55d4b2fb0d9d44b6b2d1d34d863c999143afcae381fb31e139c85347084e,2024-03-26T17:09:53.043000
|
||||
CVE-2023-52214,0,0,162d55d4b2fb0d9d44b6b2d1d34d863c999143afcae381fb31e139c85347084e,2024-03-26T17:09:53.043000
|
||||
CVE-2023-52215,0,0,09e0a9efe106868b4fd9c2063e3947d919ee70f494a812fa7c8f77418249d5e9,2024-02-02T15:20:39.863000
|
||||
CVE-2023-52216,0,0,0abddcd9cec3889c982561204259a4fbd6d1dbd4b2cc9d289f548ce07e0b2e7c,2024-01-11T19:59:02.337000
|
||||
CVE-2023-52218,0,0,7b665670ae49b9a55269793dbdbcff40e383cda41d548bb50d0820fbba3ce68a,2024-01-11T18:43:19.067000
|
||||
@ -236206,13 +236211,13 @@ CVE-2023-52618,0,0,140362ac707afd65a2d2b4e8d63e0c86c60c3017e34a4d1e40b3e8d76d459
|
||||
CVE-2023-52619,0,0,af9aacad25e5d44645425bb3e7286e581cb4e42ee1fef053b65f380d7170e82a,2024-03-18T12:38:25.490000
|
||||
CVE-2023-5262,0,0,1ed01c8e585c4d5b79de4709507eb451699baf1354e5ae8ae335221297d368d6,2024-03-21T02:50:11.880000
|
||||
CVE-2023-52620,0,0,f7b393e21bf3ad043d90e1d475675ddea17fbe9622a70ee0a12525f78fd3e3ac,2024-03-21T12:58:51.093000
|
||||
CVE-2023-52621,1,1,7e192a0f6ea9e2b2841aae08b6a79d53702740aeb515024045625bd4c7ef1dcc,2024-03-26T18:15:08.817000
|
||||
CVE-2023-52622,1,1,7ee9703fdc669762674088f1f751f9cf97ea86ef4dfd07b925733a3c156bac3e,2024-03-26T18:15:08.873000
|
||||
CVE-2023-52623,1,1,88aa9f694fb78f8430087fa7fc3db7f21f957543babe6cc6d366a5f07e7b79be,2024-03-26T18:15:08.930000
|
||||
CVE-2023-52624,1,1,7dd895582e4f1ca5c5328afe2c412ce0b321201d2bba2e1f44989db1c247662c,2024-03-26T18:15:08.990000
|
||||
CVE-2023-52625,1,1,62d27316ba3122bd775cdac8246f40faae862b9012e1dba86705ccc7999af1e5,2024-03-26T18:15:09.040000
|
||||
CVE-2023-52626,1,1,96301513fb4628223a0d9cf24e12092c9ef87789d201953062e2609f6e9dd7f7,2024-03-26T18:15:09.087000
|
||||
CVE-2023-52627,1,1,b114ffb83498e204ad4a858e973defb51aa9188fed7556a99daec636d52f6227,2024-03-26T18:15:09.140000
|
||||
CVE-2023-52621,0,0,7e192a0f6ea9e2b2841aae08b6a79d53702740aeb515024045625bd4c7ef1dcc,2024-03-26T18:15:08.817000
|
||||
CVE-2023-52622,0,0,7ee9703fdc669762674088f1f751f9cf97ea86ef4dfd07b925733a3c156bac3e,2024-03-26T18:15:08.873000
|
||||
CVE-2023-52623,0,0,88aa9f694fb78f8430087fa7fc3db7f21f957543babe6cc6d366a5f07e7b79be,2024-03-26T18:15:08.930000
|
||||
CVE-2023-52624,0,0,7dd895582e4f1ca5c5328afe2c412ce0b321201d2bba2e1f44989db1c247662c,2024-03-26T18:15:08.990000
|
||||
CVE-2023-52625,0,0,62d27316ba3122bd775cdac8246f40faae862b9012e1dba86705ccc7999af1e5,2024-03-26T18:15:09.040000
|
||||
CVE-2023-52626,0,0,96301513fb4628223a0d9cf24e12092c9ef87789d201953062e2609f6e9dd7f7,2024-03-26T18:15:09.087000
|
||||
CVE-2023-52627,0,0,b114ffb83498e204ad4a858e973defb51aa9188fed7556a99daec636d52f6227,2024-03-26T18:15:09.140000
|
||||
CVE-2023-5263,0,0,e845c03e875c19af6b2a1acb5c3778ba87234ae866c1118fe5cb806e675403c4,2024-03-21T02:50:11.963000
|
||||
CVE-2023-5264,0,0,7347eec07eb374fa71498dcb5baa16d40eadd7796ae58c56cb5542f911c08d00,2024-03-21T02:50:12.043000
|
||||
CVE-2023-5265,0,0,a2593868cc8025edeae179a722294beacfae058f7c712cda49462fbdc5096bf5,2024-03-21T02:50:12.123000
|
||||
@ -236951,6 +236956,7 @@ CVE-2023-6087,0,0,e865af7ea935fc22144ce6a037d1e9eedb83e9943260f825273789b70edc8f
|
||||
CVE-2023-6088,0,0,844257b81940c854c48827db2cfdd5ff63d458427ad4781ef82ad295558ee290,2023-11-14T00:15:09.027000
|
||||
CVE-2023-6089,0,0,73d6dfb1d97c3ceb536cf08d930057b79a5ca0369be397c478f41bcf571d0256,2023-11-14T00:15:09.073000
|
||||
CVE-2023-6090,0,0,a9eb342d355ca2f60d72c77ce67482d1115896f2d9c4ca3a7c9993e7419f4bc1,2024-02-29T13:49:29.390000
|
||||
CVE-2023-6091,1,1,e4583415d0de8e3eeacb935758369a1cf2e141875316b2af617b7897d781cc6d,2024-03-26T20:15:09.167000
|
||||
CVE-2023-6092,0,0,29d6c12d74742133215ae81895362e8792ffaeaedc68872f3a97584c78958e27,2023-11-14T00:15:09.117000
|
||||
CVE-2023-6093,0,0,cdcbd1e1997de9b83295e1322a460ec7a9df4b733c53160638c79ab78836ce70,2024-01-08T19:09:29.700000
|
||||
CVE-2023-6094,0,0,fe64a29ca809dd77087aaa4828738c31a5bbe16b56c0195785a6e8bedba08bc7,2024-01-09T14:55:23.847000
|
||||
@ -238656,7 +238662,7 @@ CVE-2024-1082,0,0,ae3ce9e9137f48bb8ed6e73705e5e3d60bc52b901f04050c52fd85d44a0026
|
||||
CVE-2024-1083,0,0,74c0722677f7c332b863607291b77a242fa9b468686591b078a5d2cf9d851301,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1084,0,0,51b7424ad38af0869b092fa36e3eaa18924349738a3af48c112cd79935a58280,2024-02-13T19:45:42.327000
|
||||
CVE-2024-1085,0,0,649a4a278db01305790c1d25d5fb8d26a8b328f3c410af99f7747f493230845c,2024-02-05T20:41:40.513000
|
||||
CVE-2024-1086,0,1,4219eb562264c7419d4a48158a3ea86843f6e837cf59fa776b23affde3923b44,2024-03-26T18:15:09.193000
|
||||
CVE-2024-1086,0,0,4219eb562264c7419d4a48158a3ea86843f6e837cf59fa776b23affde3923b44,2024-03-26T18:15:09.193000
|
||||
CVE-2024-1087,0,0,bfb73beeec450e6da5995b5f21712b59848b559e03cbbae3eab10a626379de00,2024-01-31T13:15:11.030000
|
||||
CVE-2024-1088,0,0,8282ed6326b4aa943e52bd688c1d72f7651b610e6d05d8f8f49cf63347f834ea,2024-03-05T13:41:01.900000
|
||||
CVE-2024-1089,0,0,32c5e60a3ddccafd89864debb2075c8e84bae9d4cf9e9019da73e9abcb27d415,2024-02-29T13:49:29.390000
|
||||
@ -238825,7 +238831,7 @@ CVE-2024-1304,0,0,23d5e2bb07c854af4ae93b68007adeaedc627b6e96a90278cd036489c69942
|
||||
CVE-2024-1309,0,0,37b1e0c9fe9df0fc7a03a06970b38a07b0edfe094c103b528d7941f417bdf8c0,2024-03-19T21:15:07.570000
|
||||
CVE-2024-1311,0,0,b6ff5a5c389b1970ebb3e727e75412706e999440266a856adc2134f819f2c52f,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1312,0,0,663659c34940a4e82708fc60c7161257042c7f9bd582badd425cca624f8b6adc,2024-02-15T05:03:16.077000
|
||||
CVE-2024-1313,1,1,fc2312805b89f80f01187b78a9b1055f41a1d07dff423a1c1d9453cd7d74aef4,2024-03-26T18:15:09.350000
|
||||
CVE-2024-1313,0,0,fc2312805b89f80f01187b78a9b1055f41a1d07dff423a1c1d9453cd7d74aef4,2024-03-26T18:15:09.350000
|
||||
CVE-2024-1316,0,0,71137ee023059efde9ea6dfce3b572409e6580b9426330a66bdb1f551ebc3e20,2024-03-05T13:41:01.900000
|
||||
CVE-2024-1317,0,0,677d2e22c876d1f8a2362f14eec614350ca5518b287bd87de6939bf8afc48e88,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1318,0,0,422c230b919b2aed39d902af5834079d78461435b9de398b39e0ef988ed8aaa2,2024-02-29T13:49:29.390000
|
||||
@ -238931,7 +238937,7 @@ CVE-2024-1451,0,0,3f6435be1eda5f484a72686d969060594b556ef09b071072e8b2c55917874d
|
||||
CVE-2024-1452,0,0,f3f7356621b3de0beb4bcd77b5b0c290368d3f5194eed14a4a3d86741756591b,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1453,0,0,e11f7c6a5ca684a7ed72821317f7b1247eb4a0454b5116cf4686bee193c0189b,2024-03-01T22:22:25.913000
|
||||
CVE-2024-1454,0,0,cc63bfc078899c3bc2d22b3e00f458fc4bbbae1bbb587edc98f331b0cecc8681,2024-03-23T03:15:10.633000
|
||||
CVE-2024-1455,0,1,5d5551bfd568878b597f20296517afbe3046f129fd87b0b33dac914b992d4d1a,2024-03-26T17:09:53.043000
|
||||
CVE-2024-1455,0,0,5d5551bfd568878b597f20296517afbe3046f129fd87b0b33dac914b992d4d1a,2024-03-26T17:09:53.043000
|
||||
CVE-2024-1459,0,0,11d2cc6cb4f85209b5f6836b3ad08354090d0f8d1b51c2b33235c6338b29d8d2,2024-02-27T16:55:31.430000
|
||||
CVE-2024-1460,0,0,cff087352bb23bf663ab2e822f0f3fe258f454a6ba829a2496758fccaa0c2c9b,2024-03-07T13:52:27.110000
|
||||
CVE-2024-1462,0,0,2f9d4051c4c161902f27eca436b6d8219798c451263796f27a47d4849d7fecd7,2024-03-13T18:15:58.530000
|
||||
@ -239204,7 +239210,7 @@ CVE-2024-1927,0,0,b3c20609db9c70af07026707de6d8f4fc11b95fea553636b448fb3a99c9e68
|
||||
CVE-2024-1928,0,0,7c620b7f4b1ec6939393c022b1469f24a2d6fc0dcca332e7bbe9c97be0a7c0c1,2024-03-21T02:51:49.690000
|
||||
CVE-2024-1931,0,0,2c035e986439878fc41e4d57f10dd1dfaa67d4c99fcd2a57828e8789ee7b279b,2024-03-07T13:52:27.110000
|
||||
CVE-2024-1932,0,0,5d8d8b3bcbb6e1458b966532c64c8c15a68eb67ca9de3e9c3d113ec944ac23a6,2024-02-28T14:06:45.783000
|
||||
CVE-2024-1933,0,1,a87f7af555f25d5511c6c95f7980a7b12009c62b31ac68af7b5bb4b0c784ec57,2024-03-26T17:09:53.043000
|
||||
CVE-2024-1933,0,0,a87f7af555f25d5511c6c95f7980a7b12009c62b31ac68af7b5bb4b0c784ec57,2024-03-26T17:09:53.043000
|
||||
CVE-2024-1935,0,0,acd55fcede8b48a7898ea42523d7c01336ae5958dd58d0fd5fb3924b804c3e4b,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1936,0,0,7b3792457d5905a49db010db7b736af0c923e8894b5bdd1a854744f20603a17d,2024-03-23T12:15:08.453000
|
||||
CVE-2024-1938,0,0,24dc90499c61d902708c3560ef4b72bc4a3172c10dbf5b005bb9075fcee4ff4b,2024-03-07T23:15:07.177000
|
||||
@ -239916,15 +239922,15 @@ CVE-2024-21908,0,0,329abb805b48ea46c40d9625a0e5a18857ae42d6b89a82f5c3cf797095821
|
||||
CVE-2024-21909,0,0,1862a33cb8cb7c096543042cface003ed2658c185ec7603674a262510a57f13e,2024-02-08T02:15:40.883000
|
||||
CVE-2024-21910,0,0,43ca7fc1e52b2bce376dbad269237609f1115a9e3e85611002acd3d35f8eee88,2024-01-08T19:46:25.757000
|
||||
CVE-2024-21911,0,0,30b0952621022b198f37c9fc7c47e2aaa3233be56e7cd5684ca7f588e4860d48,2024-01-08T19:46:14.513000
|
||||
CVE-2024-21912,0,1,313191073cb481d296be147cee1b1c3c466102564b95957afb404eb1dff60483,2024-03-26T17:09:53.043000
|
||||
CVE-2024-21913,0,1,76e233c2fa7c0db7fe5e09ad44bdf3a4d23e6acfac5fbb342b58e4c08d6d66fd,2024-03-26T17:09:53.043000
|
||||
CVE-2024-21912,0,0,313191073cb481d296be147cee1b1c3c466102564b95957afb404eb1dff60483,2024-03-26T17:09:53.043000
|
||||
CVE-2024-21913,0,0,76e233c2fa7c0db7fe5e09ad44bdf3a4d23e6acfac5fbb342b58e4c08d6d66fd,2024-03-26T17:09:53.043000
|
||||
CVE-2024-21914,0,0,8362c524df4a22c5c99212051acce4ea80772b52bceeb8a39755408986c0153c,2024-03-26T12:55:05.010000
|
||||
CVE-2024-21915,0,0,37ba536bf668637545b4dc7be0d8e2b8dd5a196f32352bf8da3b31f0b239e591,2024-02-16T19:26:55.393000
|
||||
CVE-2024-21916,0,0,9f2b20d343ff64e569a6727c28d35277f9cb0ae2a13059d88274004570b48dd2,2024-02-08T01:34:49.067000
|
||||
CVE-2024-21917,0,0,f716c6e174b4d85e6dd9ac9a5c0d15320474c17d34b338ef8fe8fa8f22be68b7,2024-02-08T01:29:32.367000
|
||||
CVE-2024-21918,0,1,c4bb4ede38f9a16f499bf46a4bcaca94354f369eab31adef6a15454baea87f5d,2024-03-26T17:09:53.043000
|
||||
CVE-2024-21919,0,1,7384b6246d42d878ee1ee3f98ce4c9dd34e38080d524d07b908a686735c4af16,2024-03-26T17:09:53.043000
|
||||
CVE-2024-21920,0,1,ffdb9272381cfcb69d90b4c240807d8dc09161c70ea55d1400487f7b10cae5cd,2024-03-26T17:09:53.043000
|
||||
CVE-2024-21918,0,0,c4bb4ede38f9a16f499bf46a4bcaca94354f369eab31adef6a15454baea87f5d,2024-03-26T17:09:53.043000
|
||||
CVE-2024-21919,0,0,7384b6246d42d878ee1ee3f98ce4c9dd34e38080d524d07b908a686735c4af16,2024-03-26T17:09:53.043000
|
||||
CVE-2024-21920,0,0,ffdb9272381cfcb69d90b4c240807d8dc09161c70ea55d1400487f7b10cae5cd,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2193,0,0,34e7209142ece07ff319851094293418a65cb348ac85d6085a8bcc354475b1e0,2024-03-23T03:15:12.450000
|
||||
CVE-2024-2194,0,0,e66d1886576950c3cc2788bd7fbc7cf127b4cc7097217924653f49641c7f6c67,2024-03-13T18:15:58.530000
|
||||
CVE-2024-2197,0,0,c2754f239c7fee6e20f805eadb33174245eb70dd54a6a864c7dcc801422fac42,2024-03-20T13:00:16.367000
|
||||
@ -239989,7 +239995,7 @@ CVE-2024-22108,0,0,cdaf61a2506aec5c5c15705bb009e8054dc2f9e9fadf39ff642fb65becdf0
|
||||
CVE-2024-2211,0,0,5f96d32ca4af544c9f2c4c41d1cca4c75a0898cccdbc38ab9840e28c52771346,2024-03-06T15:18:08.093000
|
||||
CVE-2024-22113,0,0,73fc9153b57dfc99829524f1c872775af20e562fcc4a87613efb3eb112b8fe49,2024-01-29T14:23:46.600000
|
||||
CVE-2024-22119,0,0,d25acc4f5f2224943f2feaeb837e6d77f51fb63d8c6b5945b3415b9f2d10bb25,2024-02-15T19:35:45.447000
|
||||
CVE-2024-2212,0,1,1efd8738d0df499a6210a5cbcdbcb2236e5d3b323e83389672544412107c41b4,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2212,0,0,1efd8738d0df499a6210a5cbcdbcb2236e5d3b323e83389672544412107c41b4,2024-03-26T17:09:53.043000
|
||||
CVE-2024-22124,0,0,35999c882bc6d44ddc45a9b1e3e882ba4227533058bc07c120048ab393e82eb5,2024-01-22T19:17:13.050000
|
||||
CVE-2024-22125,0,0,09efd17c32a694e6a723ff7a2a9eaeeb4bc062e9a25db0f7cad8d3d4b4874464,2024-01-12T19:42:36.637000
|
||||
CVE-2024-22126,0,0,21fbc349f898f1250de5f7f39ca68cc7afccec8ff42d81c72dbf786571fc9040,2024-02-13T14:01:40.577000
|
||||
@ -240004,7 +240010,7 @@ CVE-2024-22134,0,0,3be6b7702224117203e25cf98307e352d45c22327a969b8a5d10317e76a95
|
||||
CVE-2024-22135,0,0,7025eeb4417e68d70b1ebd56dbf2904b38773b2370d9f15dd4e72daa19dcfb0c,2024-01-30T17:34:58.917000
|
||||
CVE-2024-22136,0,0,ffae1822b85f323446ecd7154230713998c5b43341d8cf75c26e20b18cf0dd08,2024-02-05T22:08:24.077000
|
||||
CVE-2024-22137,0,0,2f754fd6309f47fb06b4590cc899dcf8d9510a064415a4a45699e620bffecf24,2024-01-19T20:02:08.340000
|
||||
CVE-2024-2214,0,1,67f09108a7f626515ff9607f3c75e511fcc384b5aee9ec997a4926f909682874,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2214,0,0,67f09108a7f626515ff9607f3c75e511fcc384b5aee9ec997a4926f909682874,2024-03-26T17:09:53.043000
|
||||
CVE-2024-22140,0,0,7531d09a0f968b5d2b1e4e11b41757eb318c7a2cf822561fb39f6b355e958506,2024-02-03T00:18:43.417000
|
||||
CVE-2024-22141,0,0,82c169c1dd57a019cf6b1fa659a8204ad1d91b953c7a71671ed9e1905b8d4a0f,2024-01-30T20:18:38.460000
|
||||
CVE-2024-22142,0,0,8637a6c60024e32494bb4696b4c838486f6176e902ea0c9e3d4b4fb3a1805b63,2024-01-19T19:59:49.717000
|
||||
@ -240017,7 +240023,7 @@ CVE-2024-22150,0,0,73a6449bdd862cb4aceb7dfcabf00926f0730684d1b40796cd1922a1d8912
|
||||
CVE-2024-22152,0,0,77741f5ed7ba0cff2726117ba8b408bddeb0ad8028c0019d800ba91134fb10eb,2024-01-30T17:36:20.533000
|
||||
CVE-2024-22153,0,0,183cafa541cc9d6796e6f60d4f84cc3fefe9e93bd9495a8b813ab36c05739148,2024-02-06T15:43:49.957000
|
||||
CVE-2024-22154,0,0,c5d6f5ccc259910245679ed3525d0fea5ed728e2e4ec972b00aa2e1bbd5206eb,2024-01-31T20:20:56.647000
|
||||
CVE-2024-22156,0,1,0470690498e3075fd4f3771d852ea946c7ab23ccbac27ad083940b547295f710,2024-03-26T17:09:53.043000
|
||||
CVE-2024-22156,0,0,0470690498e3075fd4f3771d852ea946c7ab23ccbac27ad083940b547295f710,2024-03-26T17:09:53.043000
|
||||
CVE-2024-22158,0,0,be5acba9413a4f0452950024099977323786ffce7bb9629de27484705b832f92,2024-02-06T15:25:24.303000
|
||||
CVE-2024-22159,0,0,af65d98e1fc14c93d259c6b50b292b96d1dcf8bdc170ccb9c7a80ba7229999dc,2024-02-06T15:37:01.700000
|
||||
CVE-2024-2216,0,0,7a28c5762b5cda60e66bc68be4edb6e0097feb56dd7f05add8be107a9a5cdc2a,2024-03-06T21:42:54.697000
|
||||
@ -240126,7 +240132,7 @@ CVE-2024-22337,0,0,9a674fac9bc4716d61a028d3be9473027552f3c1c11335efca4b4ddefd1e1
|
||||
CVE-2024-22346,0,0,638ee4e9687c7c28032b432c317662713c057110b08b4b27024e81eb8453bf9e,2024-03-19T16:50:10.570000
|
||||
CVE-2024-22352,0,0,52b9cf66a5f4972c051208c662d7f56e462da827c07f4b0e55a14efcee339e76,2024-03-21T12:58:51.093000
|
||||
CVE-2024-22355,0,0,90575169d286b28c7ce02c7d947a264d77a6f25776530138b50b2f2dbc394220,2024-03-04T13:58:23.447000
|
||||
CVE-2024-22356,0,1,bcc46874c9752933a72230517b74ad7a7a0d54dc67e233e91127533dfceeba1c,2024-03-26T17:09:53.043000
|
||||
CVE-2024-22356,0,0,bcc46874c9752933a72230517b74ad7a7a0d54dc67e233e91127533dfceeba1c,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2236,0,0,17401211af38608097c003c3b08d6e3d90e3570b70699d89a2e396d5b72c602a,2024-03-07T13:52:27.110000
|
||||
CVE-2024-22361,0,0,2cb34447b61b8680c66e6f142987700b31f9f16d4e9b8d748c59e5b8ad5a9a29,2024-02-16T21:35:31.953000
|
||||
CVE-2024-22362,0,0,826381d745a7bfa89e56ba8a6fed4317ed24204ea30e248bcffb2a9894398594,2024-03-21T02:52:03.063000
|
||||
@ -240181,6 +240187,7 @@ CVE-2024-22428,0,0,d92a5a80e616f72d015e3df366132cde5205daf6f1415ae7d5800097348c1
|
||||
CVE-2024-22430,0,0,2e5779ce610960aa54065a985f7d7b4d5fc66005f09960beaac23d15bb28ba31,2024-02-03T00:30:48.593000
|
||||
CVE-2024-22432,0,0,a5ce1013533b36d94c95ad06d489dc2a6480ecc8fe7741cd230ce585b643d9e0,2024-02-01T17:00:46.647000
|
||||
CVE-2024-22433,0,0,15060e68251742f26417bd26381576269dfd06519ddd1ac4517720d4b647a719,2024-02-13T22:51:37.293000
|
||||
CVE-2024-22436,1,1,1a6ca03e82f15ba09d256dc4d1cfbe8c473cd6ccbc09b8293ead87668477e67b,2024-03-26T19:15:48.550000
|
||||
CVE-2024-22445,0,0,874153d1fc6b93fe9f1bc951c0a860f76df46d0b4a1da0ccdd296d9b31c66c08,2024-02-27T16:51:44.013000
|
||||
CVE-2024-22449,0,0,bbda7843d9766542fd731dac4991558c835fbecfc00731f79a512d8c0e63a23d,2024-02-03T00:30:30.737000
|
||||
CVE-2024-2245,0,0,691730e073363309cbbedda1561ea8c86cfdfccb1b6917a0eaaacd61f92e651b,2024-03-07T13:52:27.110000
|
||||
@ -240456,7 +240463,7 @@ CVE-2024-23247,0,0,8cedc356a5f40bb739283e8e4d0d6f8d8deae5a1378794e92c4d7ce373c0a
|
||||
CVE-2024-23248,0,0,3b100f3348e9ddca065d4f3fd478aec1907931fa96a4ed3377d05be33d175a96,2024-03-13T21:15:56.690000
|
||||
CVE-2024-23249,0,0,e0d7f2aee237d26c7b0c8ad64668a6a03d87d4b0174d6e350f019a0b7d59e493,2024-03-13T21:15:56.730000
|
||||
CVE-2024-23250,0,0,23972341b564827ce5b9505c9a1f83d7e8d72dc9e37716cac001382a6c566edd,2024-03-13T22:15:10.157000
|
||||
CVE-2024-23252,0,0,485f4878208f7e97c20d494e316477f7840826442c34f4032299c6b2f07d58be,2024-03-13T21:15:56.817000
|
||||
CVE-2024-23252,0,1,0664eeb2c9608aca7ada566c98a3c55b1e928a3feb65097958db8fb31b3c0f73,2024-03-26T19:15:48.757000
|
||||
CVE-2024-23253,0,0,236890f266aeb2a0ef621837a0a5e82d7bb89a3a03220dfe0920fc94f8f6fd50,2024-03-13T21:15:56.870000
|
||||
CVE-2024-23254,0,0,31cb2ca8b372067663ff19288cb5bb0509a8c85018595f64afd9fcbbb0601b82,2024-03-13T23:15:46.657000
|
||||
CVE-2024-23255,0,0,50d24cf515724bff8276e52606e9845d547a501552c168c6d0b36213b6b0f202,2024-03-13T21:15:56.963000
|
||||
@ -240557,7 +240564,7 @@ CVE-2024-23476,0,0,e3d84cdb88c20fc5ad4183c7e154fd4eb94d6574a64f56328103056889f0f
|
||||
CVE-2024-23477,0,0,87ea55eb7f1d47398644b7f37685a8d0eb8352c36d1b14165a017d7f9ea764c8,2024-02-20T20:38:43.587000
|
||||
CVE-2024-23478,0,0,b3a2615dbe854f9cd6f6758ce3a7c085bf544d3fb8c18446bd16ed76b713d059,2024-02-20T20:39:52.377000
|
||||
CVE-2024-23479,0,0,347fa1fab90846375f3cbda9f21578cf079b96a3697a975655102d71cb94c108,2024-02-20T20:17:31.460000
|
||||
CVE-2024-23482,0,1,a1a2b00555a591fe7110a566438c570a2dca6a03e77aa4e75cc2cbc4e9c0af62,2024-03-26T17:09:53.043000
|
||||
CVE-2024-23482,0,0,a1a2b00555a591fe7110a566438c570a2dca6a03e77aa4e75cc2cbc4e9c0af62,2024-03-26T17:09:53.043000
|
||||
CVE-2024-23488,0,0,57450458303c48f58f7accf28de637666e8c4b38b2ec58f4dc15eb09b92be21a,2024-02-29T13:49:29.390000
|
||||
CVE-2024-23492,0,0,7ac211a2a1c5c083cd2cd2691020edf3a51548a70085e44c956a49351fc4de8b,2024-03-21T02:52:07.353000
|
||||
CVE-2024-23493,0,0,91cbf193a715aa0c526237151c4d36164df1ccaf1f366a7cf8bdf551267e12ba,2024-02-29T13:49:29.390000
|
||||
@ -240665,7 +240672,7 @@ CVE-2024-2370,0,0,b4d60e1047325278ac8b0d4698ddbabcf9cce9ef3d3d19d6f7eb18094f8266
|
||||
CVE-2024-2371,0,0,3cb4c1ed0c9b08d07eacc5252cd2248e3436e0fe77ed1216887d9a3f973c7f13,2024-03-12T12:40:13.500000
|
||||
CVE-2024-23717,0,0,6124f28576b39881108c8f8a6a5c6f0e66ec8c6ba51a289d578374ba7fe9cba6,2024-03-12T12:40:13.500000
|
||||
CVE-2024-23721,0,0,4dd09af0f810413f4d72b4868c20ebef4c48ec34bdb053307d4a26aae377efc3,2024-03-21T12:58:51.093000
|
||||
CVE-2024-23722,0,1,38e4afcdeed536b1189b96cd2e826d0a0039b5151073f4df55924a643f5fb03d,2024-03-26T17:09:53.043000
|
||||
CVE-2024-23722,0,0,38e4afcdeed536b1189b96cd2e826d0a0039b5151073f4df55924a643f5fb03d,2024-03-26T17:09:53.043000
|
||||
CVE-2024-23724,0,0,47401decfa65f84dd047eaa15adb1a17aa44914fc15b5198b908ecf69c381f70,2024-03-21T02:52:08.230000
|
||||
CVE-2024-23725,0,0,e7109aa5ed154918326c3254d584acf7e8190c7c6acd985ea1145474ef362350,2024-01-29T15:25:48.110000
|
||||
CVE-2024-23726,0,0,1e6b5838c3bbe1bdea4cff85e0dab09275e17fdbeddbc74981e476f308132713,2024-01-29T15:25:36.090000
|
||||
@ -241001,7 +241008,7 @@ CVE-2024-24499,0,0,f3fa195f99d03c816961a79dfcc5225a65897f0a2c13286167d69ca586129
|
||||
CVE-2024-2450,0,0,00768fb37fabbe59aaa05a2b15e979f5b194f2b002bbfb5602d5ad6df849f0ce,2024-03-15T12:53:06.423000
|
||||
CVE-2024-24511,0,0,c2a15768e4699e22cbf5e8595792dbc9bf48071b723d524443a4f83d9a5c3ab8,2024-03-04T13:58:23.447000
|
||||
CVE-2024-24512,0,0,03c51f88444f0be6fcfaff8e371681e3a1a1d007832a9bf8fa7088f13cfe5d40,2024-03-04T13:58:23.447000
|
||||
CVE-2024-2452,0,1,dc7f1023137a78f11f48bc3cf8f72ec03aa67efff74760d3d778cb44b3110a19,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2452,0,0,dc7f1023137a78f11f48bc3cf8f72ec03aa67efff74760d3d778cb44b3110a19,2024-03-26T17:09:53.043000
|
||||
CVE-2024-24520,0,0,1c17a865e2018472844eee3eeb32382c844b7628a24e3ba8ccf07a6f4355df2d,2024-03-21T12:58:51.093000
|
||||
CVE-2024-24524,0,0,40ecb02cd326bdc34833c61cf5eb3e9f45f526d45502f51591361c36d1938c63,2024-02-09T16:30:43.830000
|
||||
CVE-2024-24525,0,0,13b50b322b70c1ba78c523473a9882b44cc13b59455e3e47dd336806a91a1148,2024-02-29T13:49:29.390000
|
||||
@ -241172,7 +241179,7 @@ CVE-2024-24846,0,0,6890a12a2a75edd735a365e4f936d5236ba568d73a773641099ac2fe0c58d
|
||||
CVE-2024-24847,0,0,b4fa9a61260da316bc833192464fabd12095e29ea013df2a2fb0faf16c78be6a,2024-02-07T23:30:27.567000
|
||||
CVE-2024-24848,0,0,40caff22a3243fb89666855618bfb8dcbc9fcd477abdaa3c19527de1aee97a51,2024-02-07T23:30:36.817000
|
||||
CVE-2024-24849,0,0,7310ea40ba14819a766bfed2718d0ae7c9bf655c4a04b330968acbdb73d5a918,2024-02-22T19:07:27.197000
|
||||
CVE-2024-2485,0,0,2068a565aa77096e4094bcbc3258b5b9f56d5cb8969e26cd95b2e22f266bd2cf,2024-03-21T02:52:34.970000
|
||||
CVE-2024-2485,0,1,91d591c098e21e60f32736bf3e0fbe05d2390dc55eb3613eaaabf8a0a461a1ee,2024-03-26T20:15:09.860000
|
||||
CVE-2024-24855,0,0,53926eea6176e5ec7dac755182b92f74698401115acbca0c88724948db080e51,2024-02-10T04:06:40.840000
|
||||
CVE-2024-24857,0,0,bd0a671ef627655a534b97d40879c56dc0a8ee5f900294aaa10a2d6428455f4e,2024-02-10T04:06:50.263000
|
||||
CVE-2024-24858,0,0,249d6bf347d8c64c978bec670161d1545cd8d4294041793438e8d2c55804ba1b,2024-02-10T04:06:20.077000
|
||||
@ -241465,7 +241472,7 @@ CVE-2024-25469,0,0,96be9bcc7fde8f9b63f103d576b0d22a9c84a3c5935374af13a2466b2f2f5
|
||||
CVE-2024-2547,0,0,029ea713e81efe24d9f23f45896ca40700b7682fd29e8eeae6ea82eb3ee0c23f,2024-03-21T02:52:37.487000
|
||||
CVE-2024-25501,0,0,bac5c3eafbac38d2c6b4da329ce2a075da938dd8ce1ff1c471fff3fb2b0c91ae,2024-03-11T01:32:29.610000
|
||||
CVE-2024-25502,0,0,50331b6b298e51ff1fb5155b43730c3887534f74eacaa5eabfebdbefa930be85,2024-02-16T13:38:00.047000
|
||||
CVE-2024-2553,0,1,51096ed0b78dd956151349bc7a00fa14b68c357d7181cd6178d0a156f537f6e1,2024-03-26T17:15:47.490000
|
||||
CVE-2024-2553,0,0,51096ed0b78dd956151349bc7a00fa14b68c357d7181cd6178d0a156f537f6e1,2024-03-26T17:15:47.490000
|
||||
CVE-2024-2554,0,0,4ac6ec86a9eca45e0959ee11cb19788a3b6ae4ad6b565e671b8b1c5afcc85576,2024-03-21T02:52:37.647000
|
||||
CVE-2024-2555,0,0,f916e80b2ed7e85f0a04674a605eaa0368f77f318b267584d88e76e9119ef8a7,2024-03-21T02:52:37.723000
|
||||
CVE-2024-25551,0,0,08dea6730d2a3539d15dd516547ab3c25a1bf59710632ae63632a88cbff77b71,2024-03-04T13:58:23.447000
|
||||
@ -241668,9 +241675,9 @@ CVE-2024-25941,0,0,ca1cef65d30f17057b47421c2700ecf50e418e7bf4da35eb3fcc2989f17ef
|
||||
CVE-2024-25942,0,0,f61fbc9a4d226989af6c7dbccbce6eac1bf08e9ecba7753f027f3c66eedf16fc,2024-03-19T13:26:46
|
||||
CVE-2024-2595,0,0,2deb54d18ba7636df2c2b5e2f14f094eeefaa5b876ae68e9d3b6166f648310d6,2024-03-18T19:40:00.173000
|
||||
CVE-2024-25951,0,0,4cab9db546da1535e7f7aa83987aad28b8aa7aeb3328d636aa2cd78c27a2b2c1,2024-03-11T01:32:39.697000
|
||||
CVE-2024-25956,0,1,dfd2802b1c736e1761ed07520e628719c89334b257da6b0a5713ad322e0dae27,2024-03-26T17:09:53.043000
|
||||
CVE-2024-25957,0,1,fbfd85de3920e2efe608621ddb5f2aee192a8ffd0e6708b05a61970ec8670fe3,2024-03-26T17:09:53.043000
|
||||
CVE-2024-25958,0,1,428a097e4eb3bbb89a8c80ee3860a38967cf51a7e50b2ade8df4bf3874041ad6,2024-03-26T17:09:53.043000
|
||||
CVE-2024-25956,0,0,dfd2802b1c736e1761ed07520e628719c89334b257da6b0a5713ad322e0dae27,2024-03-26T17:09:53.043000
|
||||
CVE-2024-25957,0,0,fbfd85de3920e2efe608621ddb5f2aee192a8ffd0e6708b05a61970ec8670fe3,2024-03-26T17:09:53.043000
|
||||
CVE-2024-25958,0,0,428a097e4eb3bbb89a8c80ee3860a38967cf51a7e50b2ade8df4bf3874041ad6,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2596,0,0,978865da9be9e1fb873a9c434a053f33d1f0c5219abdf12becebd1212242ea79,2024-03-18T19:40:00.173000
|
||||
CVE-2024-25964,0,0,b5ec0f6d98c78318f65547134d8b33b81ca3c6769a2c110d8679aa993806ef56,2024-03-25T13:47:14.087000
|
||||
CVE-2024-2597,0,0,822c3604000d58768ff79975222ee5716f9ff927beed042444c7c308ac1b28bf,2024-03-18T19:40:00.173000
|
||||
@ -241990,13 +241997,13 @@ CVE-2024-26640,0,0,5cc6b5e042a5b441f74784080591c7d359381cd13aba12bdf63d6c89fc714
|
||||
CVE-2024-26641,0,0,d0ed2cdfb0ff7417cb869a8d4b0f844e96cb33626fa12ef7a8d145f64e7e59f2,2024-03-18T12:38:25.490000
|
||||
CVE-2024-26642,0,0,2030c36d17cf3955028a3c8cf70b58662419898c5eb4245b6345fdb4fa4667cf,2024-03-21T12:58:51.093000
|
||||
CVE-2024-26643,0,0,76e88a10e1b7ae620b3b2f807c32687dfa488694b94b88072cd31ad829305fec,2024-03-21T12:58:51.093000
|
||||
CVE-2024-26644,0,1,e5196539d0d7d2426b70f5c3d7b2262aa5f8e671e6361172395eb0ace801b5d7,2024-03-26T17:09:53.043000
|
||||
CVE-2024-26645,0,1,fe3f1a6f358cce09c9a7d8315812702f5784843255df1b174247cd1e300a4c71,2024-03-26T17:09:53.043000
|
||||
CVE-2024-26646,1,1,6eac3a1f251037baca9015e731d75055b325c9652d7a6f256f509f462ef91c49,2024-03-26T18:15:09.910000
|
||||
CVE-2024-26647,1,1,c1685e9c5a3bbb47aa3ade7623a183c0a043377118f54afb727855828b03a371,2024-03-26T18:15:10.063000
|
||||
CVE-2024-26648,1,1,36d3fa2a15ff79ad7c0626e4e63083b151bd153667a960246460ad1dbb4b8422,2024-03-26T18:15:10.220000
|
||||
CVE-2024-26649,1,1,acca5e9b7f92cbd209bcc468a216ebd6864e5465e46b0a5729ad466b6f9e5db4,2024-03-26T18:15:10.370000
|
||||
CVE-2024-26650,1,1,614e20037042219ab8e7db2eca3f7d1f724e3785feb5dfac89364a948cb05366,2024-03-26T18:15:10.530000
|
||||
CVE-2024-26644,0,0,e5196539d0d7d2426b70f5c3d7b2262aa5f8e671e6361172395eb0ace801b5d7,2024-03-26T17:09:53.043000
|
||||
CVE-2024-26645,0,0,fe3f1a6f358cce09c9a7d8315812702f5784843255df1b174247cd1e300a4c71,2024-03-26T17:09:53.043000
|
||||
CVE-2024-26646,0,0,6eac3a1f251037baca9015e731d75055b325c9652d7a6f256f509f462ef91c49,2024-03-26T18:15:09.910000
|
||||
CVE-2024-26647,0,0,c1685e9c5a3bbb47aa3ade7623a183c0a043377118f54afb727855828b03a371,2024-03-26T18:15:10.063000
|
||||
CVE-2024-26648,0,0,36d3fa2a15ff79ad7c0626e4e63083b151bd153667a960246460ad1dbb4b8422,2024-03-26T18:15:10.220000
|
||||
CVE-2024-26649,0,0,acca5e9b7f92cbd209bcc468a216ebd6864e5465e46b0a5729ad466b6f9e5db4,2024-03-26T18:15:10.370000
|
||||
CVE-2024-26650,0,0,614e20037042219ab8e7db2eca3f7d1f724e3785feb5dfac89364a948cb05366,2024-03-26T18:15:10.530000
|
||||
CVE-2024-2668,0,0,d8e22e7bb795e8f8d48dc1ea67b8b3706e737c441fdb6e3cdf26dd6015682f9f,2024-03-21T02:52:41.070000
|
||||
CVE-2024-2669,0,0,4f5a2d5969b59448109cf022193bd2b7c88dc7ffa7ca03caa723fb0f374642a3,2024-03-21T02:52:41.157000
|
||||
CVE-2024-2670,0,0,51102bd696ec0a80433e00190a81242d0892d06afe5affb13dd51bd0c370ce65,2024-03-21T02:52:41.253000
|
||||
@ -242224,7 +242231,7 @@ CVE-2024-27744,0,0,c100d4ba8f49a307e8f166c43dcf72396c641c27bc5c30f424e004f4b4c33
|
||||
CVE-2024-27746,0,0,6f3ddced2e2b26bef51987507b4e7466957a803a9da415c8c1c8b245cafe1423,2024-03-13T07:15:36.470000
|
||||
CVE-2024-27747,0,0,eff635f872515818dfe20352d610bb047327d7f6971e953c63bc92feb6bf3ebe,2024-03-13T07:15:36.523000
|
||||
CVE-2024-2775,0,0,324304d3daf3f8232d8549c8aac7991bd17ad8e74cddabbe779660d692eff015,2024-03-22T12:45:36.130000
|
||||
CVE-2024-27756,0,1,a0b7876d1bcd508f42c19e34f906c00ccf4c6d4fd282b64eb52f33eb0c45850b,2024-03-26T18:15:10.693000
|
||||
CVE-2024-27756,0,0,a0b7876d1bcd508f42c19e34f906c00ccf4c6d4fd282b64eb52f33eb0c45850b,2024-03-26T18:15:10.693000
|
||||
CVE-2024-27757,0,0,758da8d428041fb55cda5e8ed49e42184e30c0310dfccc74e01819218179190e,2024-03-18T12:38:25.490000
|
||||
CVE-2024-27758,0,0,6abe87e0a8905ac150ade2fec85250ff5e7fbf580c101c16b193b98f7d58141f,2024-03-12T17:46:17.273000
|
||||
CVE-2024-2776,0,0,a2dca86eeda4163cb75b40ad2e671bae21e52f796052ecc38e114bfa3f2fcc33,2024-03-22T12:45:36.130000
|
||||
@ -242468,6 +242475,7 @@ CVE-2024-28432,0,0,4bc8c3df18623e8712ef966fb24c80f6754436b2eb6a0c14d5d3c56f5a161
|
||||
CVE-2024-28434,0,0,9ce149b3f63fd248825bfe2b0448af1d6b935cc8ea03a3087e8dd17d0b451340,2024-03-25T16:43:06.137000
|
||||
CVE-2024-28435,0,0,528401926238753caeca6996705f7f059321761f7aa1e186f9618f4c79a626b5,2024-03-25T16:43:06.137000
|
||||
CVE-2024-28441,0,0,5f38f329aa34d3551b4435a62b00ae0d72806d981cac257e26fcd8895c19c6be,2024-03-22T12:45:36.130000
|
||||
CVE-2024-28442,1,1,e6da2a2c25c8561aa3f7d720b8d50ce6f798b21adf3c0f255188b1236bf2d476,2024-03-26T20:15:09.670000
|
||||
CVE-2024-28446,0,0,e3b0d814ee24ce9a2740eda808696f714c3071d6722fa7bd76f62923d12a194d,2024-03-19T13:26:46
|
||||
CVE-2024-28447,0,0,729795bf39bd106c71b5b798b10fa8f526cc5d6a6eb2785b0edfa8459a535a4c,2024-03-19T13:26:46
|
||||
CVE-2024-2849,0,0,689f01009061efff1ee0cd29db14c96053c4b561f68402f2590b4aaf791eded8,2024-03-26T09:15:11.360000
|
||||
@ -242572,15 +242580,21 @@ CVE-2024-28868,0,0,4e3489f3c96f97bc271ff7282115c7f5d25e2aa392efe0c1c5842c72ee998
|
||||
CVE-2024-2888,0,0,e48cc71bf8d96ab718c88bf59dd81f25047204b13c0446dd48014e6c60fc42d9,2024-03-26T12:55:05.010000
|
||||
CVE-2024-2889,0,0,047900621574a9797901d8767443e859750a2765d7b4c1f50c805ec45928b2d3,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28891,0,0,0aa614d18123b6bc2c76e9c8b5d356a2e7d71bba766bbf9db36fdc818df4c91d,2024-03-22T12:45:36.130000
|
||||
CVE-2024-2891,0,1,94b70830417014ebd0a88424b38e7910314b41261ea6ef22ebae730d401e569a,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2891,0,0,94b70830417014ebd0a88424b38e7910314b41261ea6ef22ebae730d401e569a,2024-03-26T17:09:53.043000
|
||||
CVE-2024-28916,0,0,3588de3801d3f24953276fa6b57f2d684fb38fc8b3ed3ad7d8613e127e6022b7,2024-03-21T12:58:51.093000
|
||||
CVE-2024-2892,0,1,e53fd1216c4b22efebd0b743da5712b8a2bbb649ec50cef3f19c8170626057cb,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2893,1,1,03454b4172a384fcf754d0a79af98f544b770efe10848787fa0a66006ffb73c1,2024-03-26T17:15:47.810000
|
||||
CVE-2024-2894,1,1,e073a098f20ecf49044bd1b363f575a8cb2f6afd9229aa92873c84f5fd988e53,2024-03-26T17:15:48.080000
|
||||
CVE-2024-2895,1,1,3be1a99c99a4512208e842577cd86ecfd7359e00911a74bb22c4751a2f381f34,2024-03-26T18:15:10.893000
|
||||
CVE-2024-2896,1,1,cfbae6b125dd4e36298bfaaddfd49990d3493209156cf15c0e63037d046146fd,2024-03-26T18:15:11.543000
|
||||
CVE-2024-2892,0,0,e53fd1216c4b22efebd0b743da5712b8a2bbb649ec50cef3f19c8170626057cb,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2893,0,0,03454b4172a384fcf754d0a79af98f544b770efe10848787fa0a66006ffb73c1,2024-03-26T17:15:47.810000
|
||||
CVE-2024-2894,0,0,e073a098f20ecf49044bd1b363f575a8cb2f6afd9229aa92873c84f5fd988e53,2024-03-26T17:15:48.080000
|
||||
CVE-2024-2895,0,0,3be1a99c99a4512208e842577cd86ecfd7359e00911a74bb22c4751a2f381f34,2024-03-26T18:15:10.893000
|
||||
CVE-2024-2896,0,0,cfbae6b125dd4e36298bfaaddfd49990d3493209156cf15c0e63037d046146fd,2024-03-26T18:15:11.543000
|
||||
CVE-2024-2897,1,1,ad01d017a25110de8970822d9921238dcd790b222bbb80d82ac43c0dc53c025f,2024-03-26T19:15:48.857000
|
||||
CVE-2024-2898,1,1,87df37fcfe48f1aa9b590a0f55927986b314c2d86ef25f89b8f5c428581cecd3,2024-03-26T19:15:49.130000
|
||||
CVE-2024-2899,1,1,8122b6e975e018f925621598511eec50c3812b50d5007cda33a4d177dfbb51c0,2024-03-26T19:15:49.410000
|
||||
CVE-2024-2900,1,1,d115b7c840fbf40f81e7406139e772f1410c77a036e7285e8293f5b757832ed7,2024-03-26T20:15:10.500000
|
||||
CVE-2024-29009,0,0,e428945e790b35d2116d11f320908f919961bf6f75e41d300d21cf55f5bcc19c,2024-03-25T13:47:14.087000
|
||||
CVE-2024-2901,1,1,f29845d6342234dfa356914b26f6a628832a5a3d04e20111376a6c8f9d708a18,2024-03-26T20:15:10.933000
|
||||
CVE-2024-29018,0,0,996b521b7d9365d8d41596984cc4ea0a166d70f0fc41d183b4857a8a3632cdd4,2024-03-21T12:58:51.093000
|
||||
CVE-2024-2902,1,1,01b35f4082170cd7419a16a45739130bbbca7c354bb59bfd011375069556ec32,2024-03-26T20:15:11.203000
|
||||
CVE-2024-29025,0,0,2135a02640a8fe43b6f6ca4c5bc68a475f73ee669a9a1a5af697f30fa738d887,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29026,0,0,ae12b0436e3ecdf28001034b69d1ac66de23f0f8b6b646a25aa4e89d5c652db8,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29027,0,0,0443c0a5c3d136c6828a405e5e82a90c05a4f9edd7fbc1d30ba3bd5c5a4c0f72,2024-03-20T13:00:16.367000
|
||||
@ -242595,7 +242609,7 @@ CVE-2024-29041,0,0,062cd423858e5d93d3fcaca6dd38a28eee29d2cae2776de71c0c9845b66bb
|
||||
CVE-2024-29042,0,0,94be04c88512f8801f1a0b7e8a0fe44bc1e2661493f643835e5309c09e2ba389,2024-03-22T19:02:10.300000
|
||||
CVE-2024-29057,0,0,1a7d236424310c38bf79fff65250ee548fa2fb68d692d6ba086f9244a484a161,2024-03-26T03:18:48.760000
|
||||
CVE-2024-29059,0,0,18e37be1e0df9e20dcfce0ba40125ed6c1baf91c43e1478b2c45015a443784c5,2024-03-25T01:51:01.223000
|
||||
CVE-2024-2906,0,1,d03107f75ca563c85caee3d034c6f17690ce56543ec4f09885b1b99f97ccb0d6,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2906,0,0,d03107f75ca563c85caee3d034c6f17690ce56543ec4f09885b1b99f97ccb0d6,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29071,0,0,5ff903755374c23b025a98d3cc2b0f06ea188aa4151e3658c02fd385bc8b4fa8,2024-03-25T13:47:14.087000
|
||||
CVE-2024-29089,0,0,e5fbae925c9da8d587d9573cbc1c34db123c4510c1c1616d472538493a08c59e,2024-03-20T13:00:16.367000
|
||||
CVE-2024-29091,0,0,b1cb764a2082d02939e32c22f722543dd831cf608e6c39b51eb933f990788962,2024-03-20T13:00:16.367000
|
||||
@ -242647,7 +242661,7 @@ CVE-2024-29140,0,0,81b0188b02ec97eea25ba71e207c764caac64152b7cc837d2aa82b57919f9
|
||||
CVE-2024-29141,0,0,0c36d86235af1b05ffdd671977b0a9f1efad4a89eb52195bc0218075263f9454,2024-03-19T14:31:27.883000
|
||||
CVE-2024-29142,0,0,aa64581089439270488fd3ec7318d50f51fe018a933a4c7619fcc03f33e8f61b,2024-03-19T14:31:27.883000
|
||||
CVE-2024-29143,0,0,a3f92e2c9ae6aaf4168f841be16c13a544cace199faa049656661980aa53e607,2024-03-19T13:26:46
|
||||
CVE-2024-2915,0,1,ec24e1259461cfa4ad3d33658319541b7ef90e5a07f7652d9577315748dcb123,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2915,0,0,ec24e1259461cfa4ad3d33658319541b7ef90e5a07f7652d9577315748dcb123,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24c8f,2024-03-18T12:38:25.490000
|
||||
CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000
|
||||
CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000
|
||||
@ -242663,10 +242677,10 @@ CVE-2024-29190,0,0,06fd81282a65c29bad2a807438b949724256368bd8f788b06f116f9ca54b1
|
||||
CVE-2024-29194,0,0,61bcf80dc8c33623e289063809985cd69cc66b52cb236ef7d952a2c24a0c4127,2024-03-25T01:51:01.223000
|
||||
CVE-2024-29195,0,0,12b6fcead703f320c2faaa3dbf933701901e834c51cbd479cd70a3447afc3114,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29196,0,0,e02aa4919ed0d6b8af5e1fbc5257465a64fdae2f23d9b9aaabfbc3da2c0d39fa,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29197,0,1,48cfe2d0e00e1d6e9f018548b8b920adc8f1c35c8c8d2a08e4bc3b3e003f90af,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29197,0,0,48cfe2d0e00e1d6e9f018548b8b920adc8f1c35c8c8d2a08e4bc3b3e003f90af,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29199,0,0,78313b772930e0d3c119e70c910c05a3509fc574028745b1b9c80a0f992c34f5,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29203,0,1,85853d1d6c0b7cff8ded9ca779662219e1e7d461c7c9aed96ad32295a032c6f6,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2921,0,1,a7048ceb487f73059844764517da213b04f370019c5cc0c6fe2153431d1dd6cb,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29203,0,0,85853d1d6c0b7cff8ded9ca779662219e1e7d461c7c9aed96ad32295a032c6f6,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2921,0,0,a7048ceb487f73059844764517da213b04f370019c5cc0c6fe2153431d1dd6cb,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000
|
||||
CVE-2024-29243,0,0,80b3eab65af2d9fbeb7b6048e074697688a19de63e1138c377d0b826523dd7db,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29244,0,0,ab4dadc4ff7b45a2c285edb922de956bae0828f007627c62339f15145e95a7b7,2024-03-21T15:24:35.093000
|
||||
@ -242674,7 +242688,7 @@ CVE-2024-29271,0,0,86d82853285296d2653b2954b1f865b89755729787a00c9a08bf8b4da2a10
|
||||
CVE-2024-29272,0,0,bb3421cdf283ecf2f8722dd79d31aa3f3d26bad518191ad6f8ea2a70c28d47bf,2024-03-22T12:45:36.130000
|
||||
CVE-2024-29273,0,0,5734858efc895a99d71a292d9b9fd87dc375f872fc9b4f17b1a24399e248cfbf,2024-03-22T12:45:36.130000
|
||||
CVE-2024-29275,0,0,402f5150501d1ad43199a2c93810407cb4bc9ca968149bb7f55410637d08465b,2024-03-22T12:45:36.130000
|
||||
CVE-2024-2929,0,1,1e2a5388b53705944df52e04f4649418a900b7d3e866b67a8f41dcdb88a45e50,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2929,0,0,1e2a5388b53705944df52e04f4649418a900b7d3e866b67a8f41dcdb88a45e50,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29301,0,0,154c6ea8f36ae553114269a1e880d159b7e9b09b869cc177af921f11e043c79a,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29302,0,0,befca4baa09da55c6ccc652e95ace012df1b1e2aab7ec33ac183ae5971911acf,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29303,0,0,9fc5b63681179dd34090ab25180fdf1128a0a8fe7fe2b044acdbb780ed8094f7,2024-03-26T12:55:05.010000
|
||||
@ -242682,7 +242696,7 @@ CVE-2024-29338,0,0,17a24f10f7d0496e7fcb2400fc6c6af48717728349b99b9f4dc4f19499bc4
|
||||
CVE-2024-29366,0,0,970a4db6ccd44fa8fff843a083b23c4276fdabe942805276e1033f4579523e8f,2024-03-22T19:02:10.300000
|
||||
CVE-2024-29374,0,0,f8a146770d52182e0c10b15b21ebc5da7e22091690385e976078b28de6736be7,2024-03-21T19:47:03.943000
|
||||
CVE-2024-29385,0,0,77dce7c3f8675f81eb6a00c8f1d149f72619312873eb8bb6e829225e587309f5,2024-03-22T19:02:10.300000
|
||||
CVE-2024-29401,0,1,89656cc9e9a7fef85aec3d184bc9af149e9114d584510da9b248a092c84a80e6,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29401,0,0,89656cc9e9a7fef85aec3d184bc9af149e9114d584510da9b248a092c84a80e6,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000
|
||||
CVE-2024-29440,0,0,b41dbba691936eb263a6e48ee2f4c3b0c65bf928cbb922caedd1e0f5f03baacf,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29442,0,0,7905121fe561461f75c739d09685b7ffc46a6e6f08464603a503f7d567bf4eab,2024-03-26T12:55:05.010000
|
||||
@ -242693,19 +242707,20 @@ CVE-2024-29472,0,0,8914457096a81cfec257e1932986907f8b2f25a966f10c0d7629905ec24b0
|
||||
CVE-2024-29473,0,0,2dcbe7e94767e08f46a9353b62d8f30da500a221f5affb32fc9ef958cfff985b,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29474,0,0,cd74b93fedbacc13ab911c0f2a2b89e07d9e578953f3b262ce40503b72930e98,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29499,0,0,bc8db29a97bf5517e5213278d0d5f5ecdec4b51f00adea3262848d25f6e735bc,2024-03-22T19:02:10.300000
|
||||
CVE-2024-2951,1,1,196d384afa50e4915b3f7f1abd72164195ad83bb49221af960f012f0ea91cf3f,2024-03-26T18:15:12.160000
|
||||
CVE-2024-2951,0,0,196d384afa50e4915b3f7f1abd72164195ad83bb49221af960f012f0ea91cf3f,2024-03-26T18:15:12.160000
|
||||
CVE-2024-29515,0,0,79c9f65757e49bdb19c4dcff88d6ba2d524b1951e790ac90d5ffb4f302abcf45,2024-03-26T12:55:05.010000
|
||||
CVE-2024-2955,1,1,434af8129d851694dcadd562a7be8c132241e357c2c6c3abcd25089475e2299a,2024-03-26T20:15:11.710000
|
||||
CVE-2024-29644,0,0,386d9404cd9a66783fab4191d99526a9e5bea1176409bc071a51d532c36af3ad,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29650,0,0,3de71c7e130cece9a4956a25a7008efc5004a21e047c073aea3bd083423d5a0e,2024-03-25T16:43:06.137000
|
||||
CVE-2024-29666,0,0,a8926fce030310567330d9b7c126003f732556a2ce979a6a3fd232707f8bbd99,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29684,0,1,bf20e1eee3419c30e31b5c1e15077ebe4738914779e007adc0a6cf94ae84179f,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29684,0,0,bf20e1eee3419c30e31b5c1e15077ebe4738914779e007adc0a6cf94ae84179f,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29732,0,0,3aff958eec55f5cf06538251c792be6423021bd21573f6f2f920d098c9ad37bd,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29735,1,1,1640123dfaaf4d3d57b29169fabd73ad7d0d319282e875da918e047f8134410f,2024-03-26T17:15:47.380000
|
||||
CVE-2024-29808,0,1,1a083356e9d0f501470cdfed0d1c85987d8c8667e4684d7b2ae73ab2fb9e2d44,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29809,0,1,21a6514e4479b2af7c07059597ccbdef1cddc762bb223c6efd7d97d6a6cee8d3,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29810,0,1,eff91a2f0d80ceae6d9d4c914195c5a044b82fbe1cafb4a26b6b9c2e1aa693cf,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29832,0,1,e21971089d12a8b67bd5dc57f7dea93be0cc79e81378beb3ae2f03d4ff6e4c14,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29833,0,1,4c9a8c532b47162f5aea1ac06e294c5bbf9e597d7d17a1d16e86b5dc1293a53a,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29735,0,0,1640123dfaaf4d3d57b29169fabd73ad7d0d319282e875da918e047f8134410f,2024-03-26T17:15:47.380000
|
||||
CVE-2024-29808,0,0,1a083356e9d0f501470cdfed0d1c85987d8c8667e4684d7b2ae73ab2fb9e2d44,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29809,0,0,21a6514e4479b2af7c07059597ccbdef1cddc762bb223c6efd7d97d6a6cee8d3,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29810,0,0,eff91a2f0d80ceae6d9d4c914195c5a044b82fbe1cafb4a26b6b9c2e1aa693cf,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29832,0,0,e21971089d12a8b67bd5dc57f7dea93be0cc79e81378beb3ae2f03d4ff6e4c14,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29833,0,0,4c9a8c532b47162f5aea1ac06e294c5bbf9e597d7d17a1d16e86b5dc1293a53a,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29858,0,0,585719d860c91771e96e52d882eed744121f21e899f727afe6b381f4ffbb308d,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29859,0,0,6ebff5730a73f542ffebf0a56f74146bb69314ac3f95118519ec4b678666f245,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29862,0,0,78f62d6320f790cb50cb5767943bbca91d7f9763b83315a1495201af3fd41026,2024-03-21T12:58:51.093000
|
||||
@ -242723,8 +242738,8 @@ CVE-2024-29877,0,0,5b6a7271e346dceec62c9141f9ae12b0e5342a31cc26366c653fe20c26c8b
|
||||
CVE-2024-29878,0,0,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dda8d,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29881,0,1,7eaff78a6eecd508372203508f2ecab97ebc62cfd94b7af6101b5d7b6ca209b2,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29883,0,1,2444d321a867d6f4cdf63bf8a1bc6af3b407752f2134c1f64a1d02545242c426,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29881,0,0,7eaff78a6eecd508372203508f2ecab97ebc62cfd94b7af6101b5d7b6ca209b2,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29883,0,0,2444d321a867d6f4cdf63bf8a1bc6af3b407752f2134c1f64a1d02545242c426,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29916,0,0,dd300e18b662f862d3dd0881eace85d81be3f3aaeb79c908bcef100a80a89dd1,2024-03-21T19:47:03.943000
|
||||
CVE-2024-29943,0,0,39d573a490fc5d2b219e8af270d3feeff9aa72e4341ddd52f10b0ddfa677f78e,2024-03-22T15:34:43.663000
|
||||
CVE-2024-29944,0,0,4d21f9c7c1ab1ff30cce77b261f7b06b8e28526248b968d986726dab452f24fc,2024-03-25T17:15:51.670000
|
||||
@ -242737,6 +242752,6 @@ CVE-2024-30204,0,0,bf1cbd8aaa2b36eb1f7808443cd1dc94c2d123df04230a458090af1180122
|
||||
CVE-2024-30205,0,0,d8d475f93d08b2037de38fb56b8f07beb7b6f1c5b446fee65bfc13f5246e2c4e,2024-03-25T16:43:06.137000
|
||||
CVE-2024-30231,0,0,00dcdf5dcba695175163cca9e56ccfae3d920c15ab7bb0fd4524c1a6b2477280,2024-03-26T12:55:05.010000
|
||||
CVE-2024-30232,0,0,f91ac1a16b6560e63a231b2b02f73b0e579de91231d5661b2fdb0493e2d31192,2024-03-26T12:55:05.010000
|
||||
CVE-2024-30233,0,1,4c2695d2f3b076c7408bd91fee17c2a607f64636c8c0001f359b0796de1d2054,2024-03-26T17:09:53.043000
|
||||
CVE-2024-30234,0,1,a6be244378f8a1646e756d1cd111fc8fb568601f74deb65508c56b004a03b137,2024-03-26T17:09:53.043000
|
||||
CVE-2024-30235,0,1,ef6f7f84deca979173abd2d122dde5dfb4f5568a80e848e8fa95eae1319c946f,2024-03-26T17:09:53.043000
|
||||
CVE-2024-30233,0,0,4c2695d2f3b076c7408bd91fee17c2a607f64636c8c0001f359b0796de1d2054,2024-03-26T17:09:53.043000
|
||||
CVE-2024-30234,0,0,a6be244378f8a1646e756d1cd111fc8fb568601f74deb65508c56b004a03b137,2024-03-26T17:09:53.043000
|
||||
CVE-2024-30235,0,0,ef6f7f84deca979173abd2d122dde5dfb4f5568a80e848e8fa95eae1319c946f,2024-03-26T17:09:53.043000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user