mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-05-17T12:00:38.798003+00:00
This commit is contained in:
parent
55e97d1f4a
commit
fd756bffc2
55
CVE-2024/CVE-2024-221xx/CVE-2024-22120.json
Normal file
55
CVE-2024/CVE-2024-221xx/CVE-2024-22120.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-22120",
|
||||
"sourceIdentifier": "security@zabbix.com",
|
||||
"published": "2024-05-17T10:15:07.363",
|
||||
"lastModified": "2024-05-17T10:15:07.363",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Zabbix server can perform command execution for configured scripts. After command is executed, audit entry is added to \"Audit Log\". Due to \"clientip\" field is not sanitized, it is possible to injection SQL into \"clientip\" and exploit time based blind SQL injection."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@zabbix.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@zabbix.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.zabbix.com/browse/ZBX-24505",
|
||||
"source": "security@zabbix.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26900",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-17T11:15:10.917",
|
||||
"lastModified": "2024-04-29T19:38:23.120",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-05-17T11:15:07.867",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -97,6 +97,22 @@
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9fd0198f7ef06ae0d6636fb0578560857dead995",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/beaf11969fd5cbe6f09cefaa34df1ce8578e8dd9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f3a1787dc48213f6caea5ba7d47e0222e7fa34a9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fb5b347efd1bda989846ffc74679d181222fb123",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26923",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-25T06:15:57.160",
|
||||
"lastModified": "2024-05-03T06:15:10.053",
|
||||
"lastModified": "2024-05-17T11:15:08.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/507cc232ffe53a352847893f8177d276c3b532a9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a36ae0ec2353015f0f6762e59f4c2dbc0c906423",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b75722be422c276b699200de90527d01c602ea7c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26936",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-01T06:15:08.833",
|
||||
"lastModified": "2024-05-01T13:02:20.750",
|
||||
"lastModified": "2024-05-17T11:15:08.257",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -31,6 +31,10 @@
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5c20b242d4fed73a93591e48bfd9772e2322fb11",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8f3d0bf1d0c62b539d54c5b9108a845cff619b99",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26980",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-01T06:15:15.423",
|
||||
"lastModified": "2024-05-13T08:15:10.660",
|
||||
"lastModified": "2024-05-17T11:15:08.357",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -31,6 +31,10 @@
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c119f4ede3fa90a9463f50831761c28f989bfb20",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/da21401372607c49972ea87a6edaafb36a17c325",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,51 @@
|
||||
"id": "CVE-2024-27398",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-14T15:12:28.623",
|
||||
"lastModified": "2024-05-14T16:13:02.773",
|
||||
"lastModified": "2024-05-17T11:15:08.450",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix use-after-free bugs caused by sco_sock_timeout\n\nWhen the sco connection is established and then, the sco socket\nis releasing, timeout_work will be scheduled to judge whether\nthe sco disconnection is timeout. The sock will be deallocated\nlater, but it is dereferenced again in sco_sock_timeout. As a\nresult, the use-after-free bugs will happen. The root cause is\nshown below:\n\n Cleanup Thread | Worker Thread\nsco_sock_release |\n sco_sock_close |\n __sco_sock_close |\n sco_sock_set_timer |\n schedule_delayed_work |\n sco_sock_kill | (wait a time)\n sock_put(sk) //FREE | sco_sock_timeout\n | sock_hold(sk) //USE\n\nThe KASAN report triggered by POC is shown below:\n\n[ 95.890016] ==================================================================\n[ 95.890496] BUG: KASAN: slab-use-after-free in sco_sock_timeout+0x5e/0x1c0\n[ 95.890755] Write of size 4 at addr ffff88800c388080 by task kworker/0:0/7\n...\n[ 95.890755] Workqueue: events sco_sock_timeout\n[ 95.890755] Call Trace:\n[ 95.890755] <TASK>\n[ 95.890755] dump_stack_lvl+0x45/0x110\n[ 95.890755] print_address_description+0x78/0x390\n[ 95.890755] print_report+0x11b/0x250\n[ 95.890755] ? __virt_addr_valid+0xbe/0xf0\n[ 95.890755] ? sco_sock_timeout+0x5e/0x1c0\n[ 95.890755] kasan_report+0x139/0x170\n[ 95.890755] ? update_load_avg+0xe5/0x9f0\n[ 95.890755] ? sco_sock_timeout+0x5e/0x1c0\n[ 95.890755] kasan_check_range+0x2c3/0x2e0\n[ 95.890755] sco_sock_timeout+0x5e/0x1c0\n[ 95.890755] process_one_work+0x561/0xc50\n[ 95.890755] worker_thread+0xab2/0x13c0\n[ 95.890755] ? pr_cont_work+0x490/0x490\n[ 95.890755] kthread+0x279/0x300\n[ 95.890755] ? pr_cont_work+0x490/0x490\n[ 95.890755] ? kthread_blkcg+0xa0/0xa0\n[ 95.890755] ret_from_fork+0x34/0x60\n[ 95.890755] ? kthread_blkcg+0xa0/0xa0\n[ 95.890755] ret_from_fork_asm+0x11/0x20\n[ 95.890755] </TASK>\n[ 95.890755]\n[ 95.890755] Allocated by task 506:\n[ 95.890755] kasan_save_track+0x3f/0x70\n[ 95.890755] __kasan_kmalloc+0x86/0x90\n[ 95.890755] __kmalloc+0x17f/0x360\n[ 95.890755] sk_prot_alloc+0xe1/0x1a0\n[ 95.890755] sk_alloc+0x31/0x4e0\n[ 95.890755] bt_sock_alloc+0x2b/0x2a0\n[ 95.890755] sco_sock_create+0xad/0x320\n[ 95.890755] bt_sock_create+0x145/0x320\n[ 95.890755] __sock_create+0x2e1/0x650\n[ 95.890755] __sys_socket+0xd0/0x280\n[ 95.890755] __x64_sys_socket+0x75/0x80\n[ 95.890755] do_syscall_64+0xc4/0x1b0\n[ 95.890755] entry_SYSCALL_64_after_hwframe+0x67/0x6f\n[ 95.890755]\n[ 95.890755] Freed by task 506:\n[ 95.890755] kasan_save_track+0x3f/0x70\n[ 95.890755] kasan_save_free_info+0x40/0x50\n[ 95.890755] poison_slab_object+0x118/0x180\n[ 95.890755] __kasan_slab_free+0x12/0x30\n[ 95.890755] kfree+0xb2/0x240\n[ 95.890755] __sk_destruct+0x317/0x410\n[ 95.890755] sco_sock_release+0x232/0x280\n[ 95.890755] sock_close+0xb2/0x210\n[ 95.890755] __fput+0x37f/0x770\n[ 95.890755] task_work_run+0x1ae/0x210\n[ 95.890755] get_signal+0xe17/0xf70\n[ 95.890755] arch_do_signal_or_restart+0x3f/0x520\n[ 95.890755] syscall_exit_to_user_mode+0x55/0x120\n[ 95.890755] do_syscall_64+0xd1/0x1b0\n[ 95.890755] entry_SYSCALL_64_after_hwframe+0x67/0x6f\n[ 95.890755]\n[ 95.890755] The buggy address belongs to the object at ffff88800c388000\n[ 95.890755] which belongs to the cache kmalloc-1k of size 1024\n[ 95.890755] The buggy address is located 128 bytes inside of\n[ 95.890755] freed 1024-byte region [ffff88800c388000, ffff88800c388400)\n[ 95.890755]\n[ 95.890755] The buggy address belongs to the physical page:\n[ 95.890755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800c38a800 pfn:0xc388\n[ 95.890755] head: order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 95.890755] ano\n---truncated---"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: corrige errores de use-after-free causados por sco_sock_timeout Cuando se establece la conexi\u00f3n con sco y luego se libera el socket de sco, se programar\u00e1 timeout_work para juzgar si la desconexi\u00f3n de sco es se acab\u00f3 el tiempo. El calcet\u00edn se desasignar\u00e1 m\u00e1s tarde, pero se eliminar\u00e1 la referencia nuevamente en sco_sock_timeout. Como resultado, se producir\u00e1n errores de use-after-free. La causa ra\u00edz se muestra a continuaci\u00f3n: Hilo de limpieza | Hilo de trabajo sco_sock_release | sco_sock_close | __sco_sock_close | sco_sock_set_timer | horario_trabajo_retrasado | sco_sock_kill | (espera un momento) sock_put(sk) //GRATIS | sco_sock_timeout | sock_hold(sk) //USE El informe KASAN activado por POC se muestra a continuaci\u00f3n: [ 95.890016] =============================== ==================================== [95.890496] ERROR: KASAN: uso de losa despu\u00e9s de la liberaci\u00f3n en sco_sock_timeout+0x5e/0x1c0 [95.890755] Escritura de tama\u00f1o 4 en la direcci\u00f3n ffff88800c388080 por tarea kworker/0:0/7... [95.890755] Cola de trabajo: eventos sco_sock_timeout [95.890755] Seguimiento de llamadas: [95.890755] [95.890755] dump_stack_lvl+0x45/0x110 [ 95.890755] print_address_description+0x78/0x390 [ 95.890755] print_report+0x11b/0x250 [ 95.890755] ? __virt_addr_valid+0xbe/0xf0 [95.890755]? sco_sock_timeout+0x5e/0x1c0 [ 95.890755] kasan_report+0x139/0x170 [ 95.890755] ? update_load_avg+0xe5/0x9f0 [95.890755]? sco_sock_timeout+0x5e/0x1c0 [ 95.890755] kasan_check_range+0x2c3/0x2e0 [ 95.890755] sco_sock_timeout+0x5e/0x1c0 [ 95.890755] Process_one_work+0x561/0xc50 [ 95.890755] hilo+0xab2/0x13c0 [95.890755]? pr_cont_work+0x490/0x490 [ 95.890755] kthread+0x279/0x300 [ 95.890755] ? pr_cont_work+0x490/0x490 [95.890755]? kthread_blkcg+0xa0/0xa0 [95.890755] ret_from_fork+0x34/0x60 [95.890755]? kthread_blkcg+0xa0/0xa0 [ 95.890755] ret_from_fork_asm+0x11/0x20 [ 95.890755] [ 95.890755] [ 95.890755] Asignado por la tarea 506: [ 95.890755] /0x70 [ 95.890755] __kasan_kmalloc+0x86/0x90 [ 95.890755] __kmalloc+0x17f/0x360 [ 95.890755] sk_prot_alloc+0xe1/0x1a0 [ 95.890755] sk_alloc+0x31/0x4e0 [ 95.890755] bt_sock_alloc+0x2b/0x2a0 [ sco_s ock_create+0xad/0x320 [ 95.890755] bt_sock_create+0x145/0x320 [ 95.890755] __sock_create+ 0x2e1/0x650 [ 95.890755] __sys_socket+0xd0/0x280 [ 95.890755] __x64_sys_socket+0x75/0x80 [ 95.890755] do_syscall_64+0xc4/0x1b0 [ 95.890755] SYSCALL_64_after_hwframe+0x67/0x6f [ 95.890755] [ 95.890755] Liberado por la tarea 506: [ 95.890755] kasan_save_track +0x3f/0x70 [ 95.890755] kasan_save_free_info+0x40/0x50 [ 95.890755] veneno_slab_object+0x118/0x180 [ 95.890755] __kasan_slab_free+0x12/0x30 [ 95.890755] 0x240 [95.890755] __sk_destruct+0x317/0x410 [95.890755] sco_sock_release+0x232 /0x280 [ 95.890755] sock_close+0xb2/0x210 [ 95.890755] __fput+0x37f/0x770 [ 95.890755] task_work_run+0x1ae/0x210 [ 95.890755] get_signal+0xe17/0xf70 [ 95.8 90755] arch_do_signal_or_restart+0x3f/0x520 [ 95.890755] syscall_exit_to_user_mode+0x55/0x120 [ 95.890755] do_syscall_64+0xd1/0x1b0 [ 95.890755] Entry_SYSCALL_64_after_hwframe+0x67/0x6f [ 95.890755] [ 95.890755] La direcci\u00f3n con errores pertenece al objeto en ffff88800c388000 [ 95.89 0755] que pertenece al cach\u00e9 kmalloc-1k de tama\u00f1o 1024 [ 95.890755] El buggy La direcci\u00f3n se encuentra a 128 bytes dentro de [95.890755] regi\u00f3n liberada de 1024 bytes [ffff88800c388000, ffff88800c388400) [95.890755] [95.890755] La direcci\u00f3n con errores pertenece a la p\u00e1gina f\u00edsica: [95.890755] p\u00e1gina: refcount:1 mapcount:0 mapeo: 0000000000000000 \u00edndice :0xffff88800c38a800 pfn:0xc388 [ 95.890755] head: orden:3 entero_mapcount:0 nr_pages_mapped:0 pincount:0 [ 95.890755] a\u00f1o ---truncado---"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/012363cb1bec5f33a7b94629ab2c1086f30280f2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1b33d55fb7355e27f8c82cd4ecd560f162469249",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3212afd00e3cda790fd0583cb3eaef8f9575a014",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/33a6e92161a78c1073d90e27abe28d746feb0a53",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/483bc08181827fc475643272ffb69c533007e546",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/50c2037fc28df870ef29d9728c770c8955d32178",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6a18eeb1b3bbc67c20d9609c31dca6a69b4bcde5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bfab2c1f7940a232cd519e82fff137e308abfd93",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,51 @@
|
||||
"id": "CVE-2024-27399",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-14T15:12:28.977",
|
||||
"lastModified": "2024-05-14T16:13:02.773",
|
||||
"lastModified": "2024-05-17T11:15:08.543",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout\n\nThere is a race condition between l2cap_chan_timeout() and\nl2cap_chan_del(). When we use l2cap_chan_del() to delete the\nchannel, the chan->conn will be set to null. But the conn could\nbe dereferenced again in the mutex_lock() of l2cap_chan_timeout().\nAs a result the null pointer dereference bug will happen. The\nKASAN report triggered by POC is shown below:\n\n[ 472.074580] ==================================================================\n[ 472.075284] BUG: KASAN: null-ptr-deref in mutex_lock+0x68/0xc0\n[ 472.075308] Write of size 8 at addr 0000000000000158 by task kworker/0:0/7\n[ 472.075308]\n[ 472.075308] CPU: 0 PID: 7 Comm: kworker/0:0 Not tainted 6.9.0-rc5-00356-g78c0094a146b #36\n[ 472.075308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu4\n[ 472.075308] Workqueue: events l2cap_chan_timeout\n[ 472.075308] Call Trace:\n[ 472.075308] <TASK>\n[ 472.075308] dump_stack_lvl+0x137/0x1a0\n[ 472.075308] print_report+0x101/0x250\n[ 472.075308] ? __virt_addr_valid+0x77/0x160\n[ 472.075308] ? mutex_lock+0x68/0xc0\n[ 472.075308] kasan_report+0x139/0x170\n[ 472.075308] ? mutex_lock+0x68/0xc0\n[ 472.075308] kasan_check_range+0x2c3/0x2e0\n[ 472.075308] mutex_lock+0x68/0xc0\n[ 472.075308] l2cap_chan_timeout+0x181/0x300\n[ 472.075308] process_one_work+0x5d2/0xe00\n[ 472.075308] worker_thread+0xe1d/0x1660\n[ 472.075308] ? pr_cont_work+0x5e0/0x5e0\n[ 472.075308] kthread+0x2b7/0x350\n[ 472.075308] ? pr_cont_work+0x5e0/0x5e0\n[ 472.075308] ? kthread_blkcg+0xd0/0xd0\n[ 472.075308] ret_from_fork+0x4d/0x80\n[ 472.075308] ? kthread_blkcg+0xd0/0xd0\n[ 472.075308] ret_from_fork_asm+0x11/0x20\n[ 472.075308] </TASK>\n[ 472.075308] ==================================================================\n[ 472.094860] Disabling lock debugging due to kernel taint\n[ 472.096136] BUG: kernel NULL pointer dereference, address: 0000000000000158\n[ 472.096136] #PF: supervisor write access in kernel mode\n[ 472.096136] #PF: error_code(0x0002) - not-present page\n[ 472.096136] PGD 0 P4D 0\n[ 472.096136] Oops: 0002 [#1] PREEMPT SMP KASAN NOPTI\n[ 472.096136] CPU: 0 PID: 7 Comm: kworker/0:0 Tainted: G B 6.9.0-rc5-00356-g78c0094a146b #36\n[ 472.096136] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu4\n[ 472.096136] Workqueue: events l2cap_chan_timeout\n[ 472.096136] RIP: 0010:mutex_lock+0x88/0xc0\n[ 472.096136] Code: be 08 00 00 00 e8 f8 23 1f fd 4c 89 f7 be 08 00 00 00 e8 eb 23 1f fd 42 80 3c 23 00 74 08 48 88\n[ 472.096136] RSP: 0018:ffff88800744fc78 EFLAGS: 00000246\n[ 472.096136] RAX: 0000000000000000 RBX: 1ffff11000e89f8f RCX: ffffffff8457c865\n[ 472.096136] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff88800744fc78\n[ 472.096136] RBP: 0000000000000158 R08: ffff88800744fc7f R09: 1ffff11000e89f8f\n[ 472.096136] R10: dffffc0000000000 R11: ffffed1000e89f90 R12: dffffc0000000000\n[ 472.096136] R13: 0000000000000158 R14: ffff88800744fc78 R15: ffff888007405a00\n[ 472.096136] FS: 0000000000000000(0000) GS:ffff88806d200000(0000) knlGS:0000000000000000\n[ 472.096136] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 472.096136] CR2: 0000000000000158 CR3: 000000000da32000 CR4: 00000000000006f0\n[ 472.096136] Call Trace:\n[ 472.096136] <TASK>\n[ 472.096136] ? __die_body+0x8d/0xe0\n[ 472.096136] ? page_fault_oops+0x6b8/0x9a0\n[ 472.096136] ? kernelmode_fixup_or_oops+0x20c/0x2a0\n[ 472.096136] ? do_user_addr_fault+0x1027/0x1340\n[ 472.096136] ? _printk+0x7a/0xa0\n[ 472.096136] ? mutex_lock+0x68/0xc0\n[ 472.096136] ? add_taint+0x42/0xd0\n[ 472.096136] ? exc_page_fault+0x6a/0x1b0\n[ 472.096136] ? asm_exc_page_fault+0x26/0x30\n[ 472.096136] ? mutex_lock+0x75/0xc0\n[ 472.096136] ? mutex_lock+0x88/0xc0\n[ 472.096136] ? mutex_lock+0x75/0xc0\n[ 472.096136] l2cap_chan_timeo\n---truncated---"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: l2cap: corrige null-ptr-deref en l2cap_chan_timeout Existe una condici\u00f3n de ejecuci\u00f3n entre l2cap_chan_timeout() y l2cap_chan_del(). Cuando usamos l2cap_chan_del() para eliminar el canal, chan->conn se establecer\u00e1 en nulo. Pero se podr\u00eda desreferenciar la conexi\u00f3n nuevamente en mutex_lock() de l2cap_chan_timeout(). Como resultado, se producir\u00e1 el error de desreferencia del puntero nulo. El informe KASAN activado por POC se muestra a continuaci\u00f3n: [472.074580] ====================================== ============================= [472.075284] ERROR: KASAN: null-ptr-deref en mutex_lock+0x68/0xc0 [472.075308] Escritura de tama\u00f1o 8 en la direcci\u00f3n 0000000000000158 mediante tarea kworker/0:0/7 [ 472.075308] [ 472.075308] CPU: 0 PID: 7 Comm: kworker/0:0 Not tainted 6.9.0-rc5-00356-g78c0094a146b #36 [ 472. 075308 ] Nombre del hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu4 [ 472.075308] Cola de trabajo: eventos l2cap_chan_timeout [ 472.075308] Seguimiento de llamadas: [ 472.075308] [ 4 72.075308 ] dump_stack_lvl+0x137/0x1a0 [ 472.075308] print_report+0x101/0x250 [ 472.075308] ? __virt_addr_valid+0x77/0x160 [472.075308] ? mutex_lock+0x68/0xc0 [ 472.075308] kasan_report+0x139/0x170 [ 472.075308] ? mutex_lock+0x68/0xc0 [ 472.075308] kasan_check_range+0x2c3/0x2e0 [ 472.075308] mutex_lock+0x68/0xc0 [ 472.075308] l2cap_chan_timeout+0x181/0x300 [ 472.075308] +0x5d2/0xe00 [ 472.075308] hilo_trabajador+0xe1d/0x1660 [ 472.075308] ? pr_cont_work+0x5e0/0x5e0 [ 472.075308] kthread+0x2b7/0x350 [ 472.075308] ? pr_cont_work+0x5e0/0x5e0 [472.075308]? kthread_blkcg+0xd0/0xd0 [ 472.075308] ret_from_fork+0x4d/0x80 [ 472.075308] ? kthread_blkcg+0xd0/0xd0 [ 472.075308] ret_from_fork_asm+0x11/0x20 [ 472.075308] [ 472.075308] ============================ ======================================= [ 472.094860] Deshabilitar la depuraci\u00f3n de bloqueo debido a la corrupci\u00f3n del kernel [ 472.096136] ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000158 [ 472.096136] #PF: acceso de escritura del supervisor en modo kernel [ 472.096136] #PF: error_code(0x0002) - p\u00e1gina no presente [ 472.096136] PGD 0 P4D 0 [ 4 72.096136] Ups : 0002 [#1] PREEMPT SMP KASAN NOPTI [ 472.096136] CPU: 0 PID: 7 Comm: kworker/0:0 Contaminado: GB 6.9.0-rc5-00356-g78c0094a146b #36 [ 472.096136] Nombre de hardware: PC est\u00e1ndar QEMU ( i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu4 [ 472.096136] Cola de trabajo: eventos l2cap_chan_timeout [ 472.096136] RIP: 0010:mutex_lock+0x88/0xc0 [ 472.09613 6] C\u00f3digo: ser 08 00 00 00 e8 f8 23 1f fd 4c 89 f7 be 08 00 00 00 e8 eb 23 1f fd 42 80 3c 23 00 74 08 48 88 [ 472.096136] RSP: 0018:ffff88800744fc78 EFLAGS: 00000246 [ 472.096136] RAX: 0000000000000000 RBX: 1ffff11000e89f8f RCX: ffffffff8457c865 [ 472.096136] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff88800744fc78 [ 472.096136] RBP: 0000000000000158 R08: ffff88800744fc7 f R09: 1ffff11000e89f8f [ 472.096136] R10: dffffc0000000000 R11: ffffed1000e89f90 R12: dffffc0000000000 [ 472.096136] R13: 0000000000000158 : ffff88800744fc78 R15: ffff888007405a00 [ 472.096136 ] FS: 0000000000000000(0000) GS:ffff88806d200000(0000) knlGS:0000000000000000 [ 472.096136] CS: 0010 DS: 0000 ES: 0000 CR0: 00000000800500 33 [ 472.096136] CR2: 0000000000000158 CR3: 000000000da32000 CR4: 00000000000006f0 [ 472.096136] Seguimiento de llamadas: [ 472.096136] [ 472.096136] ? __die_body+0x8d/0xe0 [ 472.096136] ? page_fault_oops+0x6b8/0x9a0 [472.096136]? kernelmode_fixup_or_oops+0x20c/0x2a0 [472.096136]? do_user_addr_fault+0x1027/0x1340 [472.096136]? _printk+0x7a/0xa0 [ 472.096136] ? mutex_lock+0x68/0xc0 [472.096136]? add_taint+0x42/0xd0 [472.096136]? exc_page_fault+0x6a/0x1b0 [472.096136]? asm_exc_page_fault+0x26/0x30 [472.096136]? mutex_lock+0x75/0xc0 [472.096136]? mutex_lock+0x88/0xc0 [472.096136]? mutex_lock+0x75/0xc0 [472.096136] l2cap_chan_timeo ---truncado---"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/06acb75e7ed600d0bbf7bff5628aa8f24a97978c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6466ee65e5b27161c846c73ef407f49dfa1bd1d9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8960ff650aec70485b40771cd8e6e8c4cb467d33",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/955b5b6c54d95b5e7444dfc81c95c8e013f27ac0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/adf0398cee86643b8eacde95f17d073d022f782c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e137e2ba96e51902dc2878131823a96bf8e638ae",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e97e16433eb4533083b096a3824b93a5ca3aee79",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/eb86f955488c39526534211f2610e48a5cf8ead4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,32 @@
|
||||
"id": "CVE-2024-27400",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-14T15:12:29.260",
|
||||
"lastModified": "2024-05-14T16:13:02.773",
|
||||
"lastModified": "2024-05-17T11:15:08.637",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2\n\nThis reverts drm/amdgpu: fix ftrace event amdgpu_bo_move always move\non same heap. The basic problem here is that after the move the old\nlocation is simply not available any more.\n\nSome fixes were suggested, but essentially we should call the move\nnotification before actually moving things because only this way we have\nthe correct order for DMA-buf and VM move notifications as well.\n\nAlso rework the statistic handling so that we don't update the eviction\ncounter before the move.\n\nv2: add missing NULL check"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: una vez m\u00e1s corrige la llamada oder en amdgpu_ttm_move() v2. Esto revierte drm/amdgpu: corrige el evento ftrace amdgpu_bo_move siempre se mueve en el mismo mont\u00f3n. El problema b\u00e1sico aqu\u00ed es que despu\u00e9s de la mudanza, la antigua ubicaci\u00f3n simplemente ya no est\u00e1 disponible. Se sugirieron algunas correcciones, pero esencialmente deber\u00edamos llamar a la notificaci\u00f3n de movimiento antes de mover cosas porque solo as\u00ed tenemos el orden correcto para las notificaciones de movimiento de DMA-buf y VM tambi\u00e9n. Tambi\u00e9n modifique el manejo de estad\u00edsticas para que no actualicemos el contador de desalojo antes de la mudanza. v2: agregar verificaci\u00f3n NULL faltante"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0c7ed3ed35eec9138b88d42217b5a6b9a62bda4d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5c25b169f9a0b34ee410891a96bc9d7b9ed6f9be",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9a4f6e138720b6e9adf7b82a71d0292f3f276480",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d3a9331a6591e9df64791e076f6591f440af51c3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,19 +2,51 @@
|
||||
"id": "CVE-2024-27401",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-14T15:12:29.623",
|
||||
"lastModified": "2024-05-14T16:13:02.773",
|
||||
"lastModified": "2024-05-17T11:15:08.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirewire: nosy: ensure user_length is taken into account when fetching packet contents\n\nEnsure that packet_buffer_get respects the user_length provided. If\nthe length of the head packet exceeds the user_length, packet_buffer_get\nwill now return 0 to signify to the user that no data were read\nand a larger buffer size is required. Helps prevent user space overflows."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: firewire: nosy: aseg\u00farese de que se tenga en cuenta la longitud de usuario al recuperar el contenido del paquete. Aseg\u00farese de que paquete_buffer_get respete la longitud de usuario proporcionada. Si la longitud del paquete principal excede la longitud del usuario, paquete_buffer_get ahora devolver\u00e1 0 para indicarle al usuario que no se leyeron datos y que se requiere un tama\u00f1o de b\u00fafer mayor. Ayuda a evitar el desbordamiento del espacio del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1fe60ee709436550f8cfbab01295936b868d5baa",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/38762a0763c10c24a4915feee722d7aa6e73eb98",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4ee0941da10e8fdcdb34756b877efd3282594c1f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/539d51ac48bcfcfa1b3d4a85f8df92fa22c1d41c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/67f34f093c0f7bf33f5b4ae64d3d695a3b978285",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/79f988d3ffc1aa778fc5181bdfab312e57956c6b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7b8c7bd2296e95b38a6ff346242356a2e7190239",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cca330c59c54207567a648357835f59df9a286bb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-326xx/CVE-2024-32692.json
Normal file
55
CVE-2024/CVE-2024-326xx/CVE-2024-32692.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32692",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-17T10:15:08.800",
|
||||
"lastModified": "2024-05-17T10:15:08.800",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in QuanticaLabs Chauffeur Taxi Booking System for WordPress allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Chauffeur Taxi Booking System for WordPress: from n/a through 6.9."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/chauffeur-booking-system/wordpress-chauffeur-taxi-booking-system-for-wordpress-plugin-6-9-broken-authentication-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-327xx/CVE-2024-32708.json
Normal file
55
CVE-2024/CVE-2024-327xx/CVE-2024-32708.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32708",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-17T10:15:09.203",
|
||||
"lastModified": "2024-05-17T10:15:09.203",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authentication Bypass by Spoofing vulnerability in helderk Maintenance Mode allows Functionality Bypass.This issue affects Maintenance Mode: from n/a through 3.0.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/hkdev-maintenance-mode/wordpress-maintenance-mode-plugin-3-0-1-ip-bypass-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-327xx/CVE-2024-32720.json
Normal file
55
CVE-2024/CVE-2024-327xx/CVE-2024-32720.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32720",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-17T10:15:09.643",
|
||||
"lastModified": "2024-05-17T10:15:09.643",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Restriction of Excessive Authentication Attempts vulnerability in CodePeople Appointment Hour Booking allows Removing Important Client Functionality.This issue affects Appointment Hour Booking: from n/a through 1.4.56."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/appointment-hour-booking/wordpress-appointment-hour-booking-plugin-1-4-56-captcha-bypass-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-327xx/CVE-2024-32774.json
Normal file
55
CVE-2024/CVE-2024-327xx/CVE-2024-32774.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32774",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-17T10:15:10.020",
|
||||
"lastModified": "2024-05-17T10:15:10.020",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Restriction of Excessive Authentication Attempts vulnerability in Metagauss ProfileGrid allows Removing Important Client Functionality.This issue affects ProfileGrid : from n/a through 5.8.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/profilegrid-user-profiles-groups-and-communities/wordpress-profilegrid-plugin-5-8-2-group-members-limit-bypass-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-327xx/CVE-2024-32786.json
Normal file
55
CVE-2024/CVE-2024-327xx/CVE-2024-32786.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32786",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-17T10:15:10.387",
|
||||
"lastModified": "2024-05-17T10:15:10.387",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authentication Bypass by Spoofing vulnerability in WP Royal Royal Elementor Addons allows Functionality Bypass.This issue affects Royal Elementor Addons: from n/a through 1.3.93."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/royal-elementor-addons/wordpress-royal-elementor-addons-and-templates-plugin-1-3-93-ip-bypass-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-328xx/CVE-2024-32802.json
Normal file
55
CVE-2024/CVE-2024-328xx/CVE-2024-32802.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32802",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-17T10:15:10.690",
|
||||
"lastModified": "2024-05-17T10:15:10.690",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in WordPlus BP Better Messages allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects BP Better Messages: from n/a through 2.4.32."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/bp-better-messages/wordpress-better-messages-plugin-2-4-32-broken-authentication-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-32807",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-06T18:15:07.647",
|
||||
"lastModified": "2024-05-06T19:53:38.797",
|
||||
"lastModified": "2024-05-17T10:15:10.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Brevo for WooCommerce Sendinblue for WooCommerce.This issue affects Sendinblue for WooCommerce: from n/a through 4.0.17.\n\n"
|
||||
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Brevo Sendinblue for WooCommerce allows Relative Path Traversal, Manipulating Web Input to File System Calls.This issue affects Sendinblue for WooCommerce: from n/a through 4.0.17."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
55
CVE-2024/CVE-2024-328xx/CVE-2024-32809.json
Normal file
55
CVE-2024/CVE-2024-328xx/CVE-2024-32809.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32809",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-17T10:15:11.183",
|
||||
"lastModified": "2024-05-17T10:15:11.183",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in JumpDEMAND Inc. ActiveDEMAND allows Using Malicious Files.This issue affects ActiveDEMAND: from n/a through 0.2.41."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/activedemand/wordpress-activedemand-plugin-0-2-41-arbitrary-file-upload-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-328xx/CVE-2024-32827.json
Normal file
55
CVE-2024/CVE-2024-328xx/CVE-2024-32827.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32827",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-17T10:15:11.540",
|
||||
"lastModified": "2024-05-17T10:15:11.540",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authentication Bypass by Spoofing vulnerability in RafflePress Giveaways and Contests allows Functionality Bypass.This issue affects Giveaways and Contests: from n/a through 1.12.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/rafflepress/wordpress-giveaways-and-contests-by-rafflepress-plugin-1-12-7-ip-restriction-bypass-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-328xx/CVE-2024-32830.json
Normal file
55
CVE-2024/CVE-2024-328xx/CVE-2024-32830.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32830",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-17T10:15:11.907",
|
||||
"lastModified": "2024-05-17T10:15:11.907",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ThemeKraft BuddyForms allows Server Side Request Forgery, Relative Path Traversal.This issue affects BuddyForms: from n/a through 2.8.8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/buddyforms/wordpress-buddyforms-plugin-2-8-8-arbitrary-file-read-and-ssrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-329xx/CVE-2024-32959.json
Normal file
55
CVE-2024/CVE-2024-329xx/CVE-2024-32959.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32959",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-17T10:15:12.267",
|
||||
"lastModified": "2024-05-17T10:15:12.267",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Privilege Management vulnerability in Sirv allows Privilege Escalation.This issue affects Sirv: from n/a through 7.2.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/sirv/wordpress-sirv-plugin-7-2-2-arbitrary-option-update-to-privilege-escalation-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-329xx/CVE-2024-32960.json
Normal file
55
CVE-2024/CVE-2024-329xx/CVE-2024-32960.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32960",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-17T10:15:12.640",
|
||||
"lastModified": "2024-05-17T10:15:12.640",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Privilege Management vulnerability in Booking Ultra Pro allows Privilege Escalation.This issue affects Booking Ultra Pro: from n/a through 1.1.12."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/booking-ultra-pro/wordpress-booking-ultra-pro-plugin-1-1-12-privilege-escalation-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-347xx/CVE-2024-34755.json
Normal file
55
CVE-2024/CVE-2024-347xx/CVE-2024-34755.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-34755",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-17T10:15:12.980",
|
||||
"lastModified": "2024-05-17T10:15:12.980",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in CRM Perks Integration for Contact Form 7 and Salesforce.This issue affects Integration for Contact Form 7 and Salesforce: from n/a through 1.3.9."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/cf7-salesforce/wordpress-integration-for-salesforce-and-contact-form-7-wpforms-elementor-formidable-ninja-forms-plugin-1-3-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-347xx/CVE-2024-34756.json
Normal file
55
CVE-2024/CVE-2024-347xx/CVE-2024-34756.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-34756",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-17T10:15:13.283",
|
||||
"lastModified": "2024-05-17T10:15:13.283",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in CRM Perks Integration for Contact Form 7 HubSpot.This issue affects Integration for Contact Form 7 HubSpot: from n/a through 1.3.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/cf7-hubspot/wordpress-integration-for-hubspot-and-contact-form-7-plugin-1-3-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-348xx/CVE-2024-34806.json
Normal file
55
CVE-2024/CVE-2024-348xx/CVE-2024-34806.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-34806",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-17T10:15:13.597",
|
||||
"lastModified": "2024-05-17T10:15:13.597",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Creative Motion Clearfy Cache.This issue affects Clearfy Cache: from n/a through 2.2.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/clearfy/wordpress-clearfy-cache-plugin-2-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-348xx/CVE-2024-34807.json
Normal file
55
CVE-2024/CVE-2024-348xx/CVE-2024-34807.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-34807",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-17T10:15:13.900",
|
||||
"lastModified": "2024-05-17T10:15:13.900",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in CodeBard Fast Custom Social Share by CodeBard.This issue affects Fast Custom Social Share by CodeBard: from n/a through 1.1.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/fast-custom-social-share-by-codebard/wordpress-fast-custom-social-share-by-codebard-plugin-1-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-348xx/CVE-2024-34809.json
Normal file
55
CVE-2024/CVE-2024-348xx/CVE-2024-34809.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-34809",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-17T10:15:14.260",
|
||||
"lastModified": "2024-05-17T10:15:14.260",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Extend Themes EmpowerWP.This issue affects EmpowerWP: from n/a through 1.0.21."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/empowerwp/wordpress-empowerwp-theme-1-0-21-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-351xx/CVE-2024-35173.json
Normal file
55
CVE-2024/CVE-2024-351xx/CVE-2024-35173.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-35173",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-17T11:15:08.947",
|
||||
"lastModified": "2024-05-17T11:15:08.947",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in PluginEver Serial Numbers for WooCommerce \u2013 License Manager.This issue affects Serial Numbers for WooCommerce \u2013 License Manager: from n/a through 1.7.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wc-serial-numbers/wordpress-wc-serial-numbers-plugin-1-7-2-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-351xx/CVE-2024-35174.json
Normal file
55
CVE-2024/CVE-2024-351xx/CVE-2024-35174.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-35174",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-17T11:15:09.253",
|
||||
"lastModified": "2024-05-17T11:15:09.253",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Flothemes Flo Forms.This issue affects Flo Forms: from n/a through 1.0.42."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/flo-forms/wordpress-flo-forms-plugin-1-0-42-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-50xx/CVE-2024-5052.json
Normal file
55
CVE-2024/CVE-2024-50xx/CVE-2024-5052.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-5052",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-05-17T10:15:14.620",
|
||||
"lastModified": "2024-05-17T10:15:14.620",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Denial of Service (DoS) vulnerability for Cerberus Enterprise 8.0.10.3 web administration. The vulnerability exists when the web server, default port 10001, attempts to process a large number of incomplete HTTP requests."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/resource-consumption-vulnerability-cerberus-ftp-enterprise",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
66
README.md
66
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-05-17T10:00:48.893555+00:00
|
||||
2024-05-17T12:00:38.798003+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-05-17T09:15:45.300000+00:00
|
||||
2024-05-17T11:15:09.253000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,46 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
250407
|
||||
250427
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `77`
|
||||
Recently added CVEs: `20`
|
||||
|
||||
- [CVE-2024-31290](CVE-2024/CVE-2024-312xx/CVE-2024-31290.json) (`2024-05-17T09:15:33.800`)
|
||||
- [CVE-2024-31295](CVE-2024/CVE-2024-312xx/CVE-2024-31295.json) (`2024-05-17T09:15:34.327`)
|
||||
- [CVE-2024-31300](CVE-2024/CVE-2024-313xx/CVE-2024-31300.json) (`2024-05-17T09:15:34.867`)
|
||||
- [CVE-2024-31341](CVE-2024/CVE-2024-313xx/CVE-2024-31341.json) (`2024-05-17T09:15:35.247`)
|
||||
- [CVE-2024-32131](CVE-2024/CVE-2024-321xx/CVE-2024-32131.json) (`2024-05-17T09:15:35.797`)
|
||||
- [CVE-2024-32507](CVE-2024/CVE-2024-325xx/CVE-2024-32507.json) (`2024-05-17T09:15:36.303`)
|
||||
- [CVE-2024-32511](CVE-2024/CVE-2024-325xx/CVE-2024-32511.json) (`2024-05-17T09:15:36.740`)
|
||||
- [CVE-2024-32512](CVE-2024/CVE-2024-325xx/CVE-2024-32512.json) (`2024-05-17T09:15:37.233`)
|
||||
- [CVE-2024-32521](CVE-2024/CVE-2024-325xx/CVE-2024-32521.json) (`2024-05-17T09:15:37.740`)
|
||||
- [CVE-2024-32523](CVE-2024/CVE-2024-325xx/CVE-2024-32523.json) (`2024-05-17T09:15:38.163`)
|
||||
- [CVE-2024-32680](CVE-2024/CVE-2024-326xx/CVE-2024-32680.json) (`2024-05-17T09:15:38.820`)
|
||||
- [CVE-2024-32685](CVE-2024/CVE-2024-326xx/CVE-2024-32685.json) (`2024-05-17T09:15:39.283`)
|
||||
- [CVE-2024-32790](CVE-2024/CVE-2024-327xx/CVE-2024-32790.json) (`2024-05-17T09:15:40.023`)
|
||||
- [CVE-2024-33549](CVE-2024/CVE-2024-335xx/CVE-2024-33549.json) (`2024-05-17T09:15:40.490`)
|
||||
- [CVE-2024-33550](CVE-2024/CVE-2024-335xx/CVE-2024-33550.json) (`2024-05-17T09:15:40.983`)
|
||||
- [CVE-2024-33552](CVE-2024/CVE-2024-335xx/CVE-2024-33552.json) (`2024-05-17T09:15:41.367`)
|
||||
- [CVE-2024-33567](CVE-2024/CVE-2024-335xx/CVE-2024-33567.json) (`2024-05-17T09:15:41.880`)
|
||||
- [CVE-2024-33569](CVE-2024/CVE-2024-335xx/CVE-2024-33569.json) (`2024-05-17T09:15:42.353`)
|
||||
- [CVE-2024-33644](CVE-2024/CVE-2024-336xx/CVE-2024-33644.json) (`2024-05-17T09:15:42.743`)
|
||||
- [CVE-2024-33917](CVE-2024/CVE-2024-339xx/CVE-2024-33917.json) (`2024-05-17T09:15:43.250`)
|
||||
- [CVE-2024-34370](CVE-2024/CVE-2024-343xx/CVE-2024-34370.json) (`2024-05-17T09:15:43.753`)
|
||||
- [CVE-2024-34434](CVE-2024/CVE-2024-344xx/CVE-2024-34434.json) (`2024-05-17T09:15:44.170`)
|
||||
- [CVE-2024-35110](CVE-2024/CVE-2024-351xx/CVE-2024-35110.json) (`2024-05-17T08:15:06.073`)
|
||||
- [CVE-2024-4214](CVE-2024/CVE-2024-42xx/CVE-2024-4214.json) (`2024-05-17T09:15:44.610`)
|
||||
- [CVE-2024-4789](CVE-2024/CVE-2024-47xx/CVE-2024-4789.json) (`2024-05-17T09:15:45.300`)
|
||||
- [CVE-2024-22120](CVE-2024/CVE-2024-221xx/CVE-2024-22120.json) (`2024-05-17T10:15:07.363`)
|
||||
- [CVE-2024-32692](CVE-2024/CVE-2024-326xx/CVE-2024-32692.json) (`2024-05-17T10:15:08.800`)
|
||||
- [CVE-2024-32708](CVE-2024/CVE-2024-327xx/CVE-2024-32708.json) (`2024-05-17T10:15:09.203`)
|
||||
- [CVE-2024-32720](CVE-2024/CVE-2024-327xx/CVE-2024-32720.json) (`2024-05-17T10:15:09.643`)
|
||||
- [CVE-2024-32774](CVE-2024/CVE-2024-327xx/CVE-2024-32774.json) (`2024-05-17T10:15:10.020`)
|
||||
- [CVE-2024-32786](CVE-2024/CVE-2024-327xx/CVE-2024-32786.json) (`2024-05-17T10:15:10.387`)
|
||||
- [CVE-2024-32802](CVE-2024/CVE-2024-328xx/CVE-2024-32802.json) (`2024-05-17T10:15:10.690`)
|
||||
- [CVE-2024-32809](CVE-2024/CVE-2024-328xx/CVE-2024-32809.json) (`2024-05-17T10:15:11.183`)
|
||||
- [CVE-2024-32827](CVE-2024/CVE-2024-328xx/CVE-2024-32827.json) (`2024-05-17T10:15:11.540`)
|
||||
- [CVE-2024-32830](CVE-2024/CVE-2024-328xx/CVE-2024-32830.json) (`2024-05-17T10:15:11.907`)
|
||||
- [CVE-2024-32959](CVE-2024/CVE-2024-329xx/CVE-2024-32959.json) (`2024-05-17T10:15:12.267`)
|
||||
- [CVE-2024-32960](CVE-2024/CVE-2024-329xx/CVE-2024-32960.json) (`2024-05-17T10:15:12.640`)
|
||||
- [CVE-2024-34755](CVE-2024/CVE-2024-347xx/CVE-2024-34755.json) (`2024-05-17T10:15:12.980`)
|
||||
- [CVE-2024-34756](CVE-2024/CVE-2024-347xx/CVE-2024-34756.json) (`2024-05-17T10:15:13.283`)
|
||||
- [CVE-2024-34806](CVE-2024/CVE-2024-348xx/CVE-2024-34806.json) (`2024-05-17T10:15:13.597`)
|
||||
- [CVE-2024-34807](CVE-2024/CVE-2024-348xx/CVE-2024-34807.json) (`2024-05-17T10:15:13.900`)
|
||||
- [CVE-2024-34809](CVE-2024/CVE-2024-348xx/CVE-2024-34809.json) (`2024-05-17T10:15:14.260`)
|
||||
- [CVE-2024-35173](CVE-2024/CVE-2024-351xx/CVE-2024-35173.json) (`2024-05-17T11:15:08.947`)
|
||||
- [CVE-2024-35174](CVE-2024/CVE-2024-351xx/CVE-2024-35174.json) (`2024-05-17T11:15:09.253`)
|
||||
- [CVE-2024-5052](CVE-2024/CVE-2024-50xx/CVE-2024-5052.json) (`2024-05-17T10:15:14.620`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `9`
|
||||
|
||||
- [CVE-2024-32676](CVE-2024/CVE-2024-326xx/CVE-2024-32676.json) (`2024-05-17T09:15:38.620`)
|
||||
- [CVE-2024-32700](CVE-2024/CVE-2024-327xx/CVE-2024-32700.json) (`2024-05-17T09:15:39.783`)
|
||||
- [CVE-2024-26900](CVE-2024/CVE-2024-269xx/CVE-2024-26900.json) (`2024-05-17T11:15:07.867`)
|
||||
- [CVE-2024-26923](CVE-2024/CVE-2024-269xx/CVE-2024-26923.json) (`2024-05-17T11:15:08.140`)
|
||||
- [CVE-2024-26936](CVE-2024/CVE-2024-269xx/CVE-2024-26936.json) (`2024-05-17T11:15:08.257`)
|
||||
- [CVE-2024-26980](CVE-2024/CVE-2024-269xx/CVE-2024-26980.json) (`2024-05-17T11:15:08.357`)
|
||||
- [CVE-2024-27398](CVE-2024/CVE-2024-273xx/CVE-2024-27398.json) (`2024-05-17T11:15:08.450`)
|
||||
- [CVE-2024-27399](CVE-2024/CVE-2024-273xx/CVE-2024-27399.json) (`2024-05-17T11:15:08.543`)
|
||||
- [CVE-2024-27400](CVE-2024/CVE-2024-274xx/CVE-2024-27400.json) (`2024-05-17T11:15:08.637`)
|
||||
- [CVE-2024-27401](CVE-2024/CVE-2024-274xx/CVE-2024-27401.json) (`2024-05-17T11:15:08.783`)
|
||||
- [CVE-2024-32807](CVE-2024/CVE-2024-328xx/CVE-2024-32807.json) (`2024-05-17T10:15:10.997`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
196
_state.csv
196
_state.csv
@ -232404,7 +232404,7 @@ CVE-2023-44474,0,0,906c16b458f6396badf347b8626690f11ce844c55596d85f29232e2ffaca4
|
||||
CVE-2023-44475,0,0,708b5c32369c471fc4e211ff1c1662f1ff9edd336e0cb60d14f1fa0bbbd0bda8,2023-10-12T19:42:15.347000
|
||||
CVE-2023-44476,0,0,82f6c69af3cb2bf0cf278bfa8a0569f1850c3a2ef1621351b93d74e9642e44a0,2023-10-12T19:26:41.407000
|
||||
CVE-2023-44477,0,0,78406c6b6850f67f3b15a2946b95eb7506fb5fcf6bdfe7397203495599cc52c5,2023-10-03T21:08:10.020000
|
||||
CVE-2023-44478,1,1,9d9a660d3bf01259bbaf12711272d00e9178d318503f174f76a9508e1217d05a,2024-05-17T09:15:07.923000
|
||||
CVE-2023-44478,0,0,9d9a660d3bf01259bbaf12711272d00e9178d318503f174f76a9508e1217d05a,2024-05-17T09:15:07.923000
|
||||
CVE-2023-44479,0,0,64f93b007e0a638ae97645d2200fc69daff4174a73c852b8726b1936510d7e3e,2023-10-04T02:19:00.777000
|
||||
CVE-2023-4448,0,0,2298bfb65e9cef917f24fd2b172be00b6e0d868f48f27a6065d3922da6a1d97f,2024-05-17T02:31:34.873000
|
||||
CVE-2023-44480,0,0,e657afa4a3c4714278a3429e0e8955994bb8ad11a7fa11b861fa786303a68ea8,2023-11-08T16:15:09.607000
|
||||
@ -232985,7 +232985,7 @@ CVE-2023-45648,0,0,2ce1650a5ad84a003327145dd1e95acaad922f0b8931f62a9005cd79e6adc
|
||||
CVE-2023-4565,0,0,f507437a4bf315d5d5f78ae5f152f50807cf0a9438aecd5a51435557389ffe5c,2023-09-29T19:48:19.453000
|
||||
CVE-2023-45650,0,0,d29bc0a4bb51fcd21278115b410401d195852a6805bc43c1e9fc1ed8a33e6675,2023-10-18T20:53:00.570000
|
||||
CVE-2023-45651,0,0,15e64110aa556e229de38766d7790175d50ebceedee5fee33314843c5c912a04,2023-10-19T17:30:00.853000
|
||||
CVE-2023-45652,1,1,bb6d8b47e75f4708c61437895086449d3aa5a5df4c8de6736fc01d296b360b84,2024-05-17T09:15:08.493000
|
||||
CVE-2023-45652,0,0,bb6d8b47e75f4708c61437895086449d3aa5a5df4c8de6736fc01d296b360b84,2024-05-17T09:15:08.493000
|
||||
CVE-2023-45653,0,0,02e6b84094cc8a18954e8c903f97d13dcc4d334b9119f705dc862314e650f8c6,2023-10-19T17:37:04.863000
|
||||
CVE-2023-45654,0,0,14e88a4b5268c9d4c04bc136c1aabbb60d4c48be7be5d19bf745091c19b77153,2023-10-19T17:30:30.677000
|
||||
CVE-2023-45655,0,0,6785178d3d55fb51b982f0e19603e95453ea23c9e1a432e183fc7017b86c8616,2023-10-19T17:56:36.927000
|
||||
@ -233357,7 +233357,7 @@ CVE-2023-46141,0,0,d9c3c7a5c695748db7cfa1a3da88989666d64cf36736c4b44f16f54c5e767
|
||||
CVE-2023-46142,0,0,fffdf8db2a1e21cdd20b9a4bc2cde9885e15c25f48bffcbef4b6fdce4f8b5b9d,2023-12-21T17:15:15.170000
|
||||
CVE-2023-46143,0,0,25bb9c16ccfca7530cd488db3d1da3e1721e11c1f85ba98f540871c4296e6262,2023-12-21T17:15:46.577000
|
||||
CVE-2023-46144,0,0,c42def9ab73ddd702574473b1d854b708c78aff77837daf04a7e63505abf2916,2023-12-21T17:16:11.880000
|
||||
CVE-2023-46145,1,1,ba0de893a52ca017f409f4ae5f708cf4f61e501b0041a94e572cc543bcf84614,2024-05-17T09:15:08.910000
|
||||
CVE-2023-46145,0,0,ba0de893a52ca017f409f4ae5f708cf4f61e501b0041a94e572cc543bcf84614,2024-05-17T09:15:08.910000
|
||||
CVE-2023-46147,0,0,c26e36737b6c1ff20521a85c1e9e2b22fe6d487b63d4cc598b5cf78d09ff94fc,2023-12-28T20:04:49.337000
|
||||
CVE-2023-46149,0,0,9c86dc35a2f27029ab17b861a2fb6b193a2728a00adf9640c3dc56830e66e26e,2023-12-28T13:44:32.593000
|
||||
CVE-2023-4615,0,0,0d33e2796458b011ab0a9d487405a989f5de3989db0de38c0c7d53c54bcdaa35,2023-09-08T14:14:45.633000
|
||||
@ -233390,7 +233390,7 @@ CVE-2023-46191,0,0,0c1d400ecd40d6d678ac4574f0c662a5976f16a1bf182ed896c1cb73729a2
|
||||
CVE-2023-46192,0,0,6fb32e7ce15528a29be77427fe96e2678f0e12726a26fd425c3f2c694ec9f72f,2023-11-03T21:04:21.103000
|
||||
CVE-2023-46193,0,0,e4717ffd08867ff6400e7c4416ea739b6f4aa2ab8d173bb63b029e9aa7b2923e,2023-11-01T17:54:04.163000
|
||||
CVE-2023-46194,0,0,8c2f33b7b23ad41574b5ea448e64361521b2176edd87706496ceaf2513492c61,2023-11-03T20:55:05.450000
|
||||
CVE-2023-46197,1,1,daacae42310c70b4351abb939066ee3bab2310fd705880c603f8f41ef44be523,2024-05-17T09:15:09.377000
|
||||
CVE-2023-46197,0,0,daacae42310c70b4351abb939066ee3bab2310fd705880c603f8f41ef44be523,2024-05-17T09:15:09.377000
|
||||
CVE-2023-46198,0,0,8a12560c2c1dfd41e1aaf98f24f852fe464514e5a86c3cff9449d37c3096c1d8,2023-11-01T17:59:19.383000
|
||||
CVE-2023-46199,0,0,00eea4292d96f576bac42a9b2728487d1e78cac40a49eca84c6f1d89b4dbd618,2023-11-03T20:54:07.940000
|
||||
CVE-2023-4620,0,0,9aa87f8d48c26d85e6240258c2ef636b3da5bda9270964b9dffbad24d60c2c3f,2023-11-07T04:22:47.757000
|
||||
@ -233398,7 +233398,7 @@ CVE-2023-46200,0,0,a415edb18a744d18c39c642155cee98ba8ca2e6dadff98b33fc948ac84a13
|
||||
CVE-2023-46201,0,0,778060a13e7f3888c580bcdb37cf38caf23f9bd0358ac68c9e88a7e8a6c4f1d5,2023-11-16T18:15:29.130000
|
||||
CVE-2023-46202,0,0,5e82e5412157f720b58dbeec59208d2002e068904b5d7e82744189f685b91040,2023-11-01T18:07:01.340000
|
||||
CVE-2023-46204,0,0,3be354ba7f6891ad877e8c3617d68df1bc1f0e4dee1b922c8ddb85cace6e7184,2023-11-01T18:07:49.873000
|
||||
CVE-2023-46205,1,1,fd7026d9cbdd26ff3d116238eb3913d95cad2409319c54e55b707cead6098dd5,2024-05-17T09:15:09.890000
|
||||
CVE-2023-46205,0,0,fd7026d9cbdd26ff3d116238eb3913d95cad2409319c54e55b707cead6098dd5,2024-05-17T09:15:09.890000
|
||||
CVE-2023-46207,0,0,44c52655a1117d170541aebbe817079d8cf0edaa87f8fde2ea387d66bc6960a5,2023-11-16T23:47:25.980000
|
||||
CVE-2023-46208,0,0,139f913690fd0d17629807f81ac67bf12f2645fea9a69c1964ad5cab77892844,2023-10-31T15:23:46.123000
|
||||
CVE-2023-46209,0,0,7559f9b4b88a2dda1f57f330999b860b70416788732b31b40d6f0566f0c30fd7,2023-10-31T15:23:52.213000
|
||||
@ -233854,7 +233854,7 @@ CVE-2023-46780,0,0,51a8c915f7ddae67207aa5521535d6686630bdf5ebe38bef73faa37ac5698
|
||||
CVE-2023-46781,0,0,4803e8f65ca035fc8e625e5ef760e21cbd3b015e6b68fb5ecf2833680bcbb366,2023-11-14T16:23:15.617000
|
||||
CVE-2023-46782,0,0,7bd476472c108bde241b2872436935b9d2fe30289a8ba125771adafb9c6d360e,2023-11-14T15:27:33.713000
|
||||
CVE-2023-46783,0,0,45d2051ccb08481028382c17ac2a7e483cf6442412ba0516892b2e735c5f28bd,2023-11-14T15:27:27.733000
|
||||
CVE-2023-46784,1,1,0fc686da4f7f54e33f95019d49b1717e712d640b4cfd2f24c19ca35e5d2a1a27,2024-05-17T09:15:10.403000
|
||||
CVE-2023-46784,0,0,0fc686da4f7f54e33f95019d49b1717e712d640b4cfd2f24c19ca35e5d2a1a27,2024-05-17T09:15:10.403000
|
||||
CVE-2023-46785,0,0,f6bbfd6750d9e0391f17119f265f305e35c05c236ca9dee0aee452b21a1329d1,2023-11-13T17:57:21.990000
|
||||
CVE-2023-46786,0,0,507159a8eadf2f196f9c76fd0506d127f595a54297b5eb5059e36d056562570c,2024-01-02T22:15:08.210000
|
||||
CVE-2023-46787,0,0,6943ed898b2d8fa8e382d0893c330ad39ab2b0961a606f95a3233915e1ac3fca,2023-11-13T18:00:08.857000
|
||||
@ -234125,7 +234125,7 @@ CVE-2023-47172,0,0,e6f130f0901d1476a705ea8aeacecc36f6d28d5ab136906ac411a2c4447ed
|
||||
CVE-2023-47174,0,0,882c82c806ec10ada26ac3c47afa6169f80dea93a5d1695fcc88f35c91fd85cc,2023-11-08T17:55:32.253000
|
||||
CVE-2023-47175,0,0,22e23bfa295cff897c052f5603e4614fd876c385bd8bbec7850ac641132f2c40,2023-11-25T02:22:43.580000
|
||||
CVE-2023-47177,0,0,9b24e6222db051b1c03ce097667777b59eb58cf7d66afa2ffe0478054bb399b8,2023-11-14T17:05:04.880000
|
||||
CVE-2023-47178,1,1,d1ec505c0bfa1677416ff188b7443742cad6bc617939eae6ba76b3a1ada35233,2024-05-17T09:15:10.853000
|
||||
CVE-2023-47178,0,0,d1ec505c0bfa1677416ff188b7443742cad6bc617939eae6ba76b3a1ada35233,2024-05-17T09:15:10.853000
|
||||
CVE-2023-4718,0,0,4a4b94c9c94ad66643aaa08a022129b3e36018cfb247ba241971004eb0f167d3,2023-11-07T04:22:53.677000
|
||||
CVE-2023-47181,0,0,11e79461e03dda11501c1a78ab5fea92faa303690ddc83ecf83c81f5dfb513db,2023-11-15T17:31:40.323000
|
||||
CVE-2023-47182,0,0,eee2b9dfe6778e43d4732644b2e34d2afd4c49bd2f627bf97c8e8b049e269d46,2023-11-14T17:04:32.890000
|
||||
@ -234459,11 +234459,11 @@ CVE-2023-47673,0,0,97e8bfa3ac10c2246cef6a5031c56b0303fd0cfb3720ff012a9707e2cea87
|
||||
CVE-2023-47674,0,0,eff3cb202c68310b2428576f99bc8606e52e60dd39a497438300d3052e8e1a2c,2023-12-05T19:11:17.703000
|
||||
CVE-2023-47675,0,0,b5d30eba1ecc4a944b40987d9ab273e9dbd8543d3842a7a31559cdd3ffabaf24,2023-11-22T00:05:28.373000
|
||||
CVE-2023-47678,0,0,4faec322e1eaa68ff1fde539c703ac68d99ad33f56a56043d137b50761646cd9,2024-05-17T02:30:34.450000
|
||||
CVE-2023-47679,1,1,d8182c2a17f832233a497a8f84079af5f40cacd0441f40728b90b188c96ae14f,2024-05-17T09:15:11.370000
|
||||
CVE-2023-47679,0,0,d8182c2a17f832233a497a8f84079af5f40cacd0441f40728b90b188c96ae14f,2024-05-17T09:15:11.370000
|
||||
CVE-2023-4768,0,0,4a45b9a26a63dda75c659ff661d20422bc870280687842f9433a1cb52a94b57e,2023-11-13T18:28:18.260000
|
||||
CVE-2023-47680,0,0,92ee1efbc9cf057b2aac6bfa02d096a8847a00df5987488cef44359cea582925,2023-11-17T14:50:40.710000
|
||||
CVE-2023-47682,1,1,ef1d312a6221de9124ff760b064fd49eadd4f882e922eb03a39c18c9a858d3fb,2024-05-17T09:15:11.870000
|
||||
CVE-2023-47683,1,1,635c6bc3b45b9ddf254fe94626abd880d1ad6dcf97169ec41020f614a11e8ca7,2024-05-17T09:15:12.350000
|
||||
CVE-2023-47682,0,0,ef1d312a6221de9124ff760b064fd49eadd4f882e922eb03a39c18c9a858d3fb,2024-05-17T09:15:11.870000
|
||||
CVE-2023-47683,0,0,635c6bc3b45b9ddf254fe94626abd880d1ad6dcf97169ec41020f614a11e8ca7,2024-05-17T09:15:12.350000
|
||||
CVE-2023-47684,0,0,344355a4110d06a3a3634ba5cda34986b5edbf49247188a19d364543c2e16afd,2023-11-17T14:12:47.883000
|
||||
CVE-2023-47685,0,0,ca5d76f2694458635264df1f25e81124251e3b619b43943ff5ec9d5dcc9df21d,2023-11-24T19:31:48.237000
|
||||
CVE-2023-47686,0,0,e2424ef479127edf30fbbfac93f8fd1e0d38b43c1dacdc8ab610e769e0db0a1e,2023-11-22T17:56:36.503000
|
||||
@ -234525,7 +234525,7 @@ CVE-2023-47777,0,0,88c3783d2ecf1551fcee9c3ebbdc3fb1ef316ff890e0a69fb4899959e368f
|
||||
CVE-2023-47779,0,0,e33b31dee126d69530344f86a60a47d5dbf814838ea8214bf0cd86723f480c2c,2023-12-12T16:53:31.067000
|
||||
CVE-2023-4778,0,0,e65fab7481708587195b5e350d3f009b8640975d4929f3b2e66e02fe1dda1fbb,2023-09-07T19:34:34.170000
|
||||
CVE-2023-47781,0,0,16866f547dc98b65098b773d73122eee723050e0e14ea3d1c9c2badc6ca9763f,2024-02-06T13:15:08.093000
|
||||
CVE-2023-47782,1,1,951177f5115ba964c8f36840342d1d47421fb9485eba2710c342e2b83bf121ef,2024-05-17T09:15:12.803000
|
||||
CVE-2023-47782,0,0,951177f5115ba964c8f36840342d1d47421fb9485eba2710c342e2b83bf121ef,2024-05-17T09:15:12.803000
|
||||
CVE-2023-47784,0,0,44747aae2dc814d1ef6b101b6ae809ce116e4131b48b9709891d91491260f95f,2023-12-27T20:05:27.610000
|
||||
CVE-2023-47785,0,0,c9c8d82d65cd6e3171f1f40377c08c985db93e6d2b2b25315d6f39f19ddcbd11,2023-11-27T21:37:43.020000
|
||||
CVE-2023-47786,0,0,bff92b3ebcc6fa82dc70f2726260d0ae6c85084d9db8e923406bc718d8bbced7,2023-11-30T04:55:18.567000
|
||||
@ -234587,7 +234587,7 @@ CVE-2023-47861,0,0,4fd921b485db2d424a7a691a138e8b5dee29a00435d1b3cd996751d746a4b
|
||||
CVE-2023-47862,0,0,57287fb89cca240e4082d72ee51a2d82f645feca4c69e8f4a4184f1f7b407482,2024-01-17T15:21:15.080000
|
||||
CVE-2023-47865,0,0,32fa35a5f49e53820f0f3e7e18baa49e7d1a42f1ea968b0971bedfa95dd7626d,2023-12-01T20:38:33.720000
|
||||
CVE-2023-47867,0,0,e3007bae1b8f989d1d66bb08768ab11ed216cceefd037a659266e6261bd1da97,2024-05-17T02:30:37.343000
|
||||
CVE-2023-47868,1,1,be6de59f2357d79a19e5123d274cfdd2129200659f7d3d36038f4d886d1438be,2024-05-17T09:15:13.333000
|
||||
CVE-2023-47868,0,0,be6de59f2357d79a19e5123d274cfdd2129200659f7d3d36038f4d886d1438be,2024-05-17T09:15:13.333000
|
||||
CVE-2023-47870,0,0,3ef3a3cb3a2fda83b71ba119ab1f1059e42a472e888c4548e4b65f20b1078ab2,2023-12-06T15:21:19.540000
|
||||
CVE-2023-47872,0,0,550c4b6c5a7977fe1c0956c9594b5fd895299230fa3f6c497e2343527689fbfb,2023-12-06T02:44:27.170000
|
||||
CVE-2023-47873,0,0,6869213f7f29c26519bbaa48e4c4b84cd64d4574021f9d1471f0807b6b147be0,2024-03-27T12:29:30.307000
|
||||
@ -234815,7 +234815,7 @@ CVE-2023-48314,0,0,9faec629ee42cb2d239fc27af92843fe8286afd13377596097cb188be12b6
|
||||
CVE-2023-48315,0,0,b5df8c75d4323e7134f44169a32c9df27b1253f0ff5a8201e03343cd29e61c28,2023-12-08T19:04:07.240000
|
||||
CVE-2023-48316,0,0,857bf20f41fa7a3be7807df7bb8e38c1def4778751697190e5b9f3a21242ff65,2023-12-08T19:11:52.763000
|
||||
CVE-2023-48317,0,0,7792e8cbc097ce577ab5b895a0b0f250d15b4f382f87fdd999ddce58d5d46587,2023-12-06T03:11:49.693000
|
||||
CVE-2023-48319,1,1,8c087bc464e61b4bbe6774e83118df42b077325a0b3b9dc4c2ff1d2c625cc382,2024-05-17T09:15:13.873000
|
||||
CVE-2023-48319,0,0,8c087bc464e61b4bbe6774e83118df42b077325a0b3b9dc4c2ff1d2c625cc382,2024-05-17T09:15:13.873000
|
||||
CVE-2023-4832,0,0,94f20a83da1f90d8e1573598745a404568d383a7c6bb0d697ca18c3852df9ac1,2023-09-19T02:20:05.197000
|
||||
CVE-2023-48320,0,0,3a6fc5517ddbc74cc8db16fff59b8cf108a7136e6d86351f82a35efe62af93be,2023-12-06T03:16:01.150000
|
||||
CVE-2023-48321,0,0,aed63093b55524d08be6c9eabca06f78d771bd24b6c7573eb3b9dc29023ec19c,2023-12-06T03:23:01.210000
|
||||
@ -235257,7 +235257,7 @@ CVE-2023-48752,0,0,6617438a452311d1c3b3c4464f90889ea0bbee28b49f83519f60c00eab926
|
||||
CVE-2023-48754,0,0,0569193cd78a4efadd60bf838471661ca63bd091c9aeb68b7a8fe14fbc81daf8,2023-12-06T00:38:46.417000
|
||||
CVE-2023-48755,0,0,89f1a2b9527257064e17a247159ee4cc7befcc939c8ab5a8c446ef85da2287a4,2023-12-20T21:09:32.063000
|
||||
CVE-2023-48756,0,0,8c30dc5020c654f585a0d5dd735951cb2629fc1084a1290d46751808b441b84a,2023-12-18T19:06:14.257000
|
||||
CVE-2023-48757,1,1,e94dbfc87b50abcd9575e85b75c2c34532e7c9db554ff5a15555eab31504713c,2024-05-17T09:15:14.440000
|
||||
CVE-2023-48757,0,0,e94dbfc87b50abcd9575e85b75c2c34532e7c9db554ff5a15555eab31504713c,2024-05-17T09:15:14.440000
|
||||
CVE-2023-4876,0,0,f9eb648217df9ea8ed21ac789d432af1f675ced46338af1975413764e6a6289a,2023-09-13T13:36:42.887000
|
||||
CVE-2023-48762,0,0,18f0655500b77fe229f0c05382318285d69aa564e93bd9e38484c2464ac06f2c,2023-12-20T04:17:13.577000
|
||||
CVE-2023-48763,0,0,9db41c6ca700a44d4c80c503f3741328ff596bfaa13c55f7f62ae0d5eb3dc389,2024-04-24T17:16:50.397000
|
||||
@ -235875,7 +235875,7 @@ CVE-2023-4975,0,0,8746de5a5b3e758d2eb01465a0483347d84f3de15eb42458491766dbe13375
|
||||
CVE-2023-49750,0,0,d8056be5916469b0d9e94f40417ace5cb8a17b4b964d872989008fc697c814a7,2023-12-22T12:14:32.417000
|
||||
CVE-2023-49751,0,0,cda7994afa96cd789270a379e3536ff68290f9766ba6a524f25eae8c035a3f00,2023-12-20T04:20:54.357000
|
||||
CVE-2023-49752,0,0,98617cb258f306f38d708eb9ad84fae1d0d1406b9f5acf081fc900d64ecaea16,2023-12-30T03:13:36.437000
|
||||
CVE-2023-49753,1,1,b8068e7526155e755184592e75a03d3fc065a19c647e302efc13e1742b74dfc4,2024-05-17T09:15:14.897000
|
||||
CVE-2023-49753,0,0,b8068e7526155e755184592e75a03d3fc065a19c647e302efc13e1742b74dfc4,2024-05-17T09:15:14.897000
|
||||
CVE-2023-49759,0,0,44df3cc64431fac1d21a2c51940a192bce824725b841ae9030116c25c9c5701c,2023-12-21T04:56:56.160000
|
||||
CVE-2023-49760,0,0,b9011bb95e93080004f8ca456fad808a28fc48c07dbf017b5fb9cea6a5f3c179,2023-12-21T04:57:19.577000
|
||||
CVE-2023-49761,0,0,0b8d4b5e7b3c15430e2d7dfc62a88f5a7b9941e75caaa47a16a9f2d86f2896df,2023-12-21T04:55:01.263000
|
||||
@ -236531,7 +236531,7 @@ CVE-2023-50885,0,0,17f409a54bfb2cee48d72ca19d76c6e56cca390a1fd7e5561bf19af5236e5
|
||||
CVE-2023-50886,0,0,7792f347cde4c420b06e643a12a04ca1bbbaf32b14e20bdefdd360583db86f82,2024-03-15T16:26:49.320000
|
||||
CVE-2023-50889,0,0,c1ad7d35b6d5afc074175b11fcf31e66a1f88510cc63a735f12500e424605271,2024-01-05T17:39:22.253000
|
||||
CVE-2023-5089,0,0,cddae8cd7907847e037d2a072115a2d298d26ef8e69ec53058c1c3b486a685c8,2023-11-07T04:23:26.960000
|
||||
CVE-2023-50890,1,1,7f1f1475acad8f2423543cd619b2b81570e333587d71262b68744a166d285694,2024-05-17T09:15:15.437000
|
||||
CVE-2023-50890,0,0,7f1f1475acad8f2423543cd619b2b81570e333587d71262b68744a166d285694,2024-05-17T09:15:15.437000
|
||||
CVE-2023-50891,0,0,bb600fee959bc0c70bc3812b31f851a727133cb965ac9f397fefe731a21c9727,2024-01-05T18:37:38.957000
|
||||
CVE-2023-50892,0,0,b0a5df3a0991deeddc21aba073d59e844033efac16fe6402bc12f130e340ebd2,2024-01-05T19:43:06.133000
|
||||
CVE-2023-50893,0,0,9e2a79008bb70c571f7956df8d783d4f37d38fd17c2b6ce3c5ce4f3a295c4404,2024-01-05T18:33:07.640000
|
||||
@ -236741,7 +236741,7 @@ CVE-2023-5134,0,0,57e239c917374b13e6e681f9f8bf19b424220441089f119f49064533f35068
|
||||
CVE-2023-5135,0,0,d973f8045e9e7f542a00cdac01c8fa27ecbeeafe5e92b8ff46f4ddee1550f26e,2023-11-07T04:23:30.050000
|
||||
CVE-2023-51350,0,0,0c65f1084700242fb274f8877e5855b4c49cb06cb0b9633647a949ae324925b7,2024-01-18T19:31:11.157000
|
||||
CVE-2023-51354,0,0,9053034fc2b71cca2ab3be4bbaea22ebed58eb960aca7470afef0d81b2328f17,2024-01-05T16:21:13.340000
|
||||
CVE-2023-51356,1,1,2102faaa2f46fafdcc663f3ca21f3f17adc05fbda5493b7292a7761695b37f7f,2024-05-17T09:15:15.960000
|
||||
CVE-2023-51356,0,0,2102faaa2f46fafdcc663f3ca21f3f17adc05fbda5493b7292a7761695b37f7f,2024-05-17T09:15:15.960000
|
||||
CVE-2023-51358,0,0,991bf413d729d852acfcb22a561d128cc06a2b0e585af808f675e35b49ec7bf4,2024-01-05T16:20:52.507000
|
||||
CVE-2023-5136,0,0,542c9990597e005ab5ca65b7a86e27fe0f3f215c1dc42121e44283f07d331415,2023-11-15T18:42:41.643000
|
||||
CVE-2023-51361,0,0,d203221b2b4576465e000a1694621bcdd79b1ef4d46ebfa7152ed021a51efcac,2024-01-05T04:52:30.367000
|
||||
@ -236775,10 +236775,10 @@ CVE-2023-51394,0,0,71b2bd989998d21aa0bbb95271be09edc08ce6d20103c2e6bcee8ea1c20c9
|
||||
CVE-2023-51395,0,0,5a8fabcd60d172cea2a2d72abbe62e81a05d3ff601e1c15baeacb16779135a8e,2024-03-07T13:52:27.110000
|
||||
CVE-2023-51396,0,0,5b152b77ead5f7d354680c12b1877d8d445409720e008cf7b19598b82a79a30d,2024-01-05T04:53:57.677000
|
||||
CVE-2023-51397,0,0,caf4a26a8c6501d968035986b57cf41d8096275f3cc59582bc374d2db68b7af1,2024-01-05T04:54:05.133000
|
||||
CVE-2023-51398,1,1,f9035a8c3e4b3f44bf40205c17f21f82b2af5e217fde10ac5032a172555ca1af,2024-05-17T09:15:16.383000
|
||||
CVE-2023-51398,0,0,f9035a8c3e4b3f44bf40205c17f21f82b2af5e217fde10ac5032a172555ca1af,2024-05-17T09:15:16.383000
|
||||
CVE-2023-51399,0,0,3ddad6d6b3257c332a776bcae332fa73e8f6ff1ee372a231b1cd64087381deb0,2024-01-05T04:54:13.920000
|
||||
CVE-2023-5140,0,0,3ec6594027f575159d22b01048384eb528f1d471d53c6f9af29497647322bcf1,2023-11-24T18:49:51.220000
|
||||
CVE-2023-51401,1,1,4badd1970367039f08281db2fccfac507bc7ee9bb1dc74b802fd971a476d8203,2024-05-17T09:15:16.893000
|
||||
CVE-2023-51401,0,0,4badd1970367039f08281db2fccfac507bc7ee9bb1dc74b802fd971a476d8203,2024-05-17T09:15:16.893000
|
||||
CVE-2023-51402,0,0,a57bc01437652f0b664bd9de5ec6b70d712b0034778c7006f57758c3720945a3,2024-01-05T18:24:53.843000
|
||||
CVE-2023-51403,0,0,6ce6a9519c03c9a7713a39896aee81f83e08d9abc889b212c63185e6ad296de7,2024-02-12T14:20:03.287000
|
||||
CVE-2023-51404,0,0,03d659e63c7409b258b7617a5989915831e2a15185b68340b70dcd93bb9b462d,2024-02-15T06:26:06.387000
|
||||
@ -236802,7 +236802,7 @@ CVE-2023-51420,0,0,a8f45b3eb1ea2cf9afe294bb3606e3b612924bea9360ee1dec22fa6e45eab
|
||||
CVE-2023-51421,0,0,96d969e75bcb70531ca4a8968d96d902d086ee61af125b186e898f3e240597b9,2024-01-08T15:02:55.727000
|
||||
CVE-2023-51422,0,0,2ee0b517b22ec16ea1ede2fb0cb6d1bad60bce5c4b8fc8fa988cfe6a8258f607,2024-01-05T16:18:43.920000
|
||||
CVE-2023-51423,0,0,ea90275cb2847a667c92c0cf6b3a98ac0ef87d7fda3992b317ba27624bd233a2,2024-01-05T22:21:01.370000
|
||||
CVE-2023-51424,1,1,1125388c0c9bff1a7c1814c588a8cf53810f1635ddf4a214377c466670136d75,2024-05-17T09:15:17.440000
|
||||
CVE-2023-51424,0,0,1125388c0c9bff1a7c1814c588a8cf53810f1635ddf4a214377c466670136d75,2024-05-17T09:15:17.440000
|
||||
CVE-2023-51425,0,0,fa57d46abdcc5b844a111129da2004c9467e75e54176fe8a6e16cfabd9b4783f,2024-04-24T17:16:50.397000
|
||||
CVE-2023-51426,0,0,d664a7d70994d866b5c049f50628f1b5864e0c411462f2cadb486d47392f8cb4,2024-01-04T23:42:36.860000
|
||||
CVE-2023-51427,0,0,bed6944c28c50a4335511db3909dd3498e029b6d64a26c3a75fb6aeff51566a2,2024-01-04T23:40:05.267000
|
||||
@ -236856,15 +236856,15 @@ CVE-2023-51472,0,0,948696bba551d0b17675715ce8b32c7f4c1ee19d2a44d60c4875049d9c280
|
||||
CVE-2023-51473,0,0,c717b541715384069e4e1f234809a3353cecd65454fe611c8ad98ac99f14bd4f,2024-01-05T18:22:36.607000
|
||||
CVE-2023-51474,0,0,f6ae408c3a922cfdfc785e0a99ab0da323d66aa2473d9214f464f168abaf8486,2024-03-17T22:38:29.433000
|
||||
CVE-2023-51475,0,0,3b22b7562ec7c62760bcb36076150336b816419fb1f4781f9eda477c8bacc5ab,2024-01-08T17:09:53.473000
|
||||
CVE-2023-51476,1,1,e0fff664d0cbef2d1377f3911dbb8df4e47567c23845f5093de7d3600a2e0b48,2024-05-17T09:15:17.920000
|
||||
CVE-2023-51476,0,0,e0fff664d0cbef2d1377f3911dbb8df4e47567c23845f5093de7d3600a2e0b48,2024-05-17T09:15:17.920000
|
||||
CVE-2023-51477,0,0,eb93e490041dd5460c8bbfbfb1c014e3f2bba31c2aee183e6098b0e5822afbbb,2024-04-24T17:16:50.397000
|
||||
CVE-2023-51478,0,0,ab39b07318c585093d88a3a0e586c24bd83f72b4d212d1c431d26c4feb71ae69,2024-04-25T13:18:13.537000
|
||||
CVE-2023-51479,1,1,d872afb80cc70f46a4cbbde0c45e08b12b43d15e59447ad0367ec513e96e5eaa,2024-05-17T09:15:18.393000
|
||||
CVE-2023-51479,0,0,d872afb80cc70f46a4cbbde0c45e08b12b43d15e59447ad0367ec513e96e5eaa,2024-05-17T09:15:18.393000
|
||||
CVE-2023-5148,0,0,af67408e66478452b86bed112fc0fbf281aa394c6b50976a4155e6722ba18b8b,2024-05-17T02:32:51.630000
|
||||
CVE-2023-51480,0,0,f8823f539951e34f7db1aecf23364bc135467d8a0c59ff2384ab35a6a58cc37b,2024-02-15T21:06:20.197000
|
||||
CVE-2023-51481,1,1,587e530a219e95f692de1f78a6f99c1876c0092a3376d859f4149cd4ebac5212,2024-05-17T09:15:18.933000
|
||||
CVE-2023-51481,0,0,587e530a219e95f692de1f78a6f99c1876c0092a3376d859f4149cd4ebac5212,2024-05-17T09:15:18.933000
|
||||
CVE-2023-51482,0,0,16d4301a198e0e828087672870a098bf0ce8e807ba466a51352e7aff9c83fdbf,2024-04-25T13:18:13.537000
|
||||
CVE-2023-51483,1,1,a6709322663a6e6d0d776ac80cef0062393f0364fd8c4dceedc3175d8ec891b2,2024-05-17T09:15:19.460000
|
||||
CVE-2023-51483,0,0,a6709322663a6e6d0d776ac80cef0062393f0364fd8c4dceedc3175d8ec891b2,2024-05-17T09:15:19.460000
|
||||
CVE-2023-51484,0,0,d457f486c919e89674a56199096880f9884b5e3195f0355c134cc8770ae7693d,2024-04-25T13:18:13.537000
|
||||
CVE-2023-51485,0,0,b45b2ac9de0fefa98f7d5095938cdcfb38d785140d230b3d93a0e5b7be6e9281,2024-02-15T06:26:27.350000
|
||||
CVE-2023-51486,0,0,9229ace1c5a78534c4a29354f69eed7eb15a32aa9ba93f26a4ff614b16fec211,2024-03-17T22:38:29.433000
|
||||
@ -236916,7 +236916,7 @@ CVE-2023-5154,0,0,a99c59508426987620982876617160c47179b836a93c4355f648aeed6078c4
|
||||
CVE-2023-51540,0,0,4fb8cacaaec655ca39d5ac85ca2324b1623f919eb27ed5943f1e12c52d59db00,2024-02-07T17:05:59.580000
|
||||
CVE-2023-51541,0,0,cf9fd5251982ae34f9d1a6c7ef7137712140adac1b14b66e98b30f5cf2d4cd8e,2024-02-29T01:42:04.593000
|
||||
CVE-2023-51545,0,0,a4142e2ca4ce5852b08d515f5a62a78fc16a002d435f2b6b5d7f079a888f8b26,2024-01-05T18:05:04.407000
|
||||
CVE-2023-51546,1,1,5df523285adbb1914a5356416137496085d598c369f325ecc5c619b6bdd5a69f,2024-05-17T09:15:19.853000
|
||||
CVE-2023-51546,0,0,5df523285adbb1914a5356416137496085d598c369f325ecc5c619b6bdd5a69f,2024-05-17T09:15:19.853000
|
||||
CVE-2023-51547,0,0,c982f4b046496a731b5048a632534aea5fe458955a1b974571191fb8d5f7c885,2024-01-05T20:49:25.943000
|
||||
CVE-2023-51548,0,0,f14e09f9b0319b100605ca6a47b33f9ff0d4223d5e7c2d3789466c41cdde68a1,2024-02-07T17:06:15.167000
|
||||
CVE-2023-51549,0,0,7d68f07cd5879e0375024bb850870fafe5f2809321262ce083a522d3d76e7b98,2024-05-03T12:48:41.067000
|
||||
@ -242150,7 +242150,7 @@ CVE-2024-2174,0,0,02677fb92d9ec9e938d433dc80bb7dba037bdfac0e28c902361565b0379425
|
||||
CVE-2024-21742,0,0,f05425c22b68eed9b18152111fdcbba099b7d5c68b9f0b2090a8077e4941bea6,2024-02-29T01:44:04.040000
|
||||
CVE-2024-21744,0,0,75da6a88047b7dd10fd2808157b826b0359816427c478b970c1329b6cad90830,2024-01-11T18:45:53.040000
|
||||
CVE-2024-21745,0,0,bf3a505c3e58c8e06145ffd7ba2bd556421c95bc4b61cb5874ba3a8a81e74cc4,2024-01-11T18:45:19.053000
|
||||
CVE-2024-21746,1,1,8abc84aaa0c0d6160a07aab2283d4ce4b7f3187265dee6a31f4c879bc27789da,2024-05-17T09:15:20.363000
|
||||
CVE-2024-21746,0,0,8abc84aaa0c0d6160a07aab2283d4ce4b7f3187265dee6a31f4c879bc27789da,2024-05-17T09:15:20.363000
|
||||
CVE-2024-21747,0,0,35403744e7ef40fd68d659ac75e691394b3bec12407204459bb0ee7326018ec4,2024-01-11T18:45:06.960000
|
||||
CVE-2024-21749,0,0,977e78c03c745b3f2715cc5017eb627860eddebef9d26895b59c2bc8df042370,2024-02-29T13:49:47.277000
|
||||
CVE-2024-21750,0,0,3e8fbe0cb62c8e56d68418bdaca88bd6a5a9359bd561d57e9822bcdabaea5468,2024-02-03T00:41:15.460000
|
||||
@ -242350,6 +242350,7 @@ CVE-2024-2211,0,0,f252c5769fd953dc08095bc92fa002da1e59442805565547bd754c92279eb0
|
||||
CVE-2024-22113,0,0,73fc9153b57dfc99829524f1c872775af20e562fcc4a87613efb3eb112b8fe49,2024-01-29T14:23:46.600000
|
||||
CVE-2024-22119,0,0,5b93a7483a14e92ab36c876bee1e8e43e9c2b3e6838b0de5fe264e02197c4f9d,2024-04-28T20:15:45.757000
|
||||
CVE-2024-2212,0,0,9993c1ff31aba6edade97f517906c249717ed8226492f2ab033b82cc9620000b,2024-03-26T17:09:53.043000
|
||||
CVE-2024-22120,1,1,9b928e66cf653aca1abd1c43edcdf11644c773ead1cb1d7db8b8ebe74ef0cf1f,2024-05-17T10:15:07.363000
|
||||
CVE-2024-22124,0,0,35999c882bc6d44ddc45a9b1e3e882ba4227533058bc07c120048ab393e82eb5,2024-01-22T19:17:13.050000
|
||||
CVE-2024-22125,0,0,09efd17c32a694e6a723ff7a2a9eaeeb4bc062e9a25db0f7cad8d3d4b4874464,2024-01-12T19:42:36.637000
|
||||
CVE-2024-22126,0,0,21fbc349f898f1250de5f7f39ca68cc7afccec8ff42d81c72dbf786571fc9040,2024-02-13T14:01:40.577000
|
||||
@ -242365,14 +242366,14 @@ CVE-2024-22135,0,0,7025eeb4417e68d70b1ebd56dbf2904b38773b2370d9f15dd4e72daa19dcf
|
||||
CVE-2024-22136,0,0,ffae1822b85f323446ecd7154230713998c5b43341d8cf75c26e20b18cf0dd08,2024-02-05T22:08:24.077000
|
||||
CVE-2024-22137,0,0,2f754fd6309f47fb06b4590cc899dcf8d9510a064415a4a45699e620bffecf24,2024-01-19T20:02:08.340000
|
||||
CVE-2024-22138,0,0,2094852f624515a7a1ef1337ae1b3ba67b8f516d573cde455586f2ed7cd76afb,2024-03-28T12:42:56.150000
|
||||
CVE-2024-22139,1,1,70baae4331d0f202dfb33a3fb98ffdeeded29fe62bd520ef7c3a89e5e2669846,2024-05-17T09:15:20.930000
|
||||
CVE-2024-22139,0,0,70baae4331d0f202dfb33a3fb98ffdeeded29fe62bd520ef7c3a89e5e2669846,2024-05-17T09:15:20.930000
|
||||
CVE-2024-2214,0,0,417600d92b319cde7a14d2e2ae085387debacc2ea06bc8c32661151ab9deb9e7,2024-03-26T17:09:53.043000
|
||||
CVE-2024-22140,0,0,7531d09a0f968b5d2b1e4e11b41757eb318c7a2cf822561fb39f6b355e958506,2024-02-03T00:18:43.417000
|
||||
CVE-2024-22141,0,0,82c169c1dd57a019cf6b1fa659a8204ad1d91b953c7a71671ed9e1905b8d4a0f,2024-01-30T20:18:38.460000
|
||||
CVE-2024-22142,0,0,8637a6c60024e32494bb4696b4c838486f6176e902ea0c9e3d4b4fb3a1805b63,2024-01-19T19:59:49.717000
|
||||
CVE-2024-22143,0,0,adccc14524111072286cffd424e6560dcad4b1e2e3b7161d3a46107433633930,2024-02-03T00:24:07.510000
|
||||
CVE-2024-22144,0,0,6685ad651b22dda7fa27deedc33908d99acf5d0f59f6f045cd21779897d80ec6,2024-04-25T13:18:13.537000
|
||||
CVE-2024-22145,1,1,1740f0e0b5f66c674a4349ed69d7180ee3675a3248dc4e63571917a32e50189c,2024-05-17T09:15:21.410000
|
||||
CVE-2024-22145,0,0,1740f0e0b5f66c674a4349ed69d7180ee3675a3248dc4e63571917a32e50189c,2024-05-17T09:15:21.410000
|
||||
CVE-2024-22146,0,0,8a44d2f783f8546b1d5e9fc855a9089455ad2fafc8ab97139269e47d5d414f01,2024-02-06T15:51:01.533000
|
||||
CVE-2024-22147,0,0,0b0e8745bfea72bbfa1b747625dc2bbdeefcf97593cd8b6f4d26d36641e1e2b9,2024-02-01T04:13:36.740000
|
||||
CVE-2024-22148,0,0,eb4d4a193f2153f5fe3df79c79a6ba27f52e6d1edc409f8c9f4419f061b12f8c,2024-02-03T00:30:56.520000
|
||||
@ -242384,7 +242385,7 @@ CVE-2024-22153,0,0,183cafa541cc9d6796e6f60d4f84cc3fefe9e93bd9495a8b813ab36c05739
|
||||
CVE-2024-22154,0,0,c5d6f5ccc259910245679ed3525d0fea5ed728e2e4ec972b00aa2e1bbd5206eb,2024-01-31T20:20:56.647000
|
||||
CVE-2024-22155,0,0,249395905f9a3791f2667b0808e06d155c230275c56cbfbdf6e21760df928e13,2024-04-08T18:48:40.217000
|
||||
CVE-2024-22156,0,0,68e46e7ffbddadf814e0490a96df34ae26c80a5e219194d86915e32aa69a13ea,2024-03-26T17:09:53.043000
|
||||
CVE-2024-22157,1,1,b2d9f29b7325a46aa63fe88aefa3c9e982dfe2244e4c75842996aa6e160868ef,2024-05-17T09:15:21.860000
|
||||
CVE-2024-22157,0,0,b2d9f29b7325a46aa63fe88aefa3c9e982dfe2244e4c75842996aa6e160868ef,2024-05-17T09:15:21.860000
|
||||
CVE-2024-22158,0,0,be5acba9413a4f0452950024099977323786ffce7bb9629de27484705b832f92,2024-02-06T15:25:24.303000
|
||||
CVE-2024-22159,0,0,af65d98e1fc14c93d259c6b50b292b96d1dcf8bdc170ccb9c7a80ba7229999dc,2024-02-06T15:37:01.700000
|
||||
CVE-2024-2216,0,0,95d780c0265ee07ab7abdfab54d1e330c367f764625ff7d0a2819a5415a56e26,2024-05-01T18:15:19.170000
|
||||
@ -243121,7 +243122,7 @@ CVE-2024-23517,0,0,e4bbedbc00468997609a0c9179822a4e7c082017c830cbf85558e35c31daa
|
||||
CVE-2024-23519,0,0,4d28ec0c6447c5e765bfd28438ace7e6750c3a1e16dfeea04dd8418971fdb577,2024-02-29T13:49:29.390000
|
||||
CVE-2024-2352,0,0,57630273c197eaed8b3c3f6d93ff32d48d806b15015e610cf5486ce468752335,2024-05-17T02:38:11.410000
|
||||
CVE-2024-23520,0,0,6231203085a20b2d4cba5048549458f88829476b5e6533d86ed85baf0d8a6576,2024-03-26T12:55:05.010000
|
||||
CVE-2024-23522,1,1,12e3bd70e9d74cecbe12843b256c3241681959c84e5aaa6e955579d2985d03b4,2024-05-17T09:15:22.410000
|
||||
CVE-2024-23522,0,0,12e3bd70e9d74cecbe12843b256c3241681959c84e5aaa6e955579d2985d03b4,2024-05-17T09:15:22.410000
|
||||
CVE-2024-23523,0,0,13316361d7846e6bf749bdea54d907de9d96954e12edb4899346015be33f686c,2024-03-17T22:38:29.433000
|
||||
CVE-2024-23525,0,0,c9ea3f9f05986326992f0c2128558f249961ba75cda273f72dbac98591a6932d,2024-05-05T15:15:49.067000
|
||||
CVE-2024-23526,0,0,30d606f0eba5761919592b8a5008d0e69ca508d137995732983dadd8b2152fdd,2024-04-19T13:10:25.637000
|
||||
@ -243721,7 +243722,7 @@ CVE-2024-24711,0,0,0d048c3822039d008612960507a20bcb0af4972abb0e8757f981885d0a598
|
||||
CVE-2024-24712,0,0,3eb883409ceb5cd8ab7cfb2c23165937e7138a0fdba93206148a8d8c39991d81,2024-02-16T14:48:04.207000
|
||||
CVE-2024-24713,0,0,016796105eec4ced1aaab79578ed2b6dc8b6c4a64b21f9341804bb78b76a15f2,2024-02-16T15:48:04.237000
|
||||
CVE-2024-24714,0,0,d617ec82ff3658c728f436f5c87a6a276f2d9050b0f9f382d24881c4c8a62a0e,2024-02-26T16:32:25.577000
|
||||
CVE-2024-24715,1,1,b6ed580c8efb6cbbcd472b7e48bc76630c9163c965dbe31d35f71f547b4dc410,2024-05-17T09:15:22.970000
|
||||
CVE-2024-24715,0,0,b6ed580c8efb6cbbcd472b7e48bc76630c9163c965dbe31d35f71f547b4dc410,2024-05-17T09:15:22.970000
|
||||
CVE-2024-24717,0,0,147b72859f44e71d91234d2c3714411052617c05a0596c74544e6604ed4559a3,2024-02-16T15:52:02.283000
|
||||
CVE-2024-24718,0,0,2395ab18411838ec546d4c3f172ab2648b8bbab2becc81c1d1d378407035be33,2024-03-26T12:55:05.010000
|
||||
CVE-2024-24719,0,0,5ddfa362f830a2279ba9f58c10d4ddc6202965de7281d667863ad96f042f01d2,2024-03-26T12:55:05.010000
|
||||
@ -243855,13 +243856,13 @@ CVE-2024-24865,0,0,69d1d9e6b7dcdc1a41fcca26c5c38135753d56b8f5d02ca0d16d1408ab64d
|
||||
CVE-2024-24866,0,0,7234eb10c2179098475da368126463933a93e4c44ee1e87fac56ce5cbea64b85,2024-02-13T19:48:45.207000
|
||||
CVE-2024-24867,0,0,90b88303fe79f64328e373805da2de44191a13520f6754199858d09a29c49390,2024-03-17T22:38:29.433000
|
||||
CVE-2024-24868,0,0,e7f14abb86f06eb8a849fd232ff7f12dc608d17b75bfc6f64f2c0bbfd51ed1c7,2024-02-28T14:06:45.783000
|
||||
CVE-2024-24869,1,1,9210ce4090342ce5ab4291501e417741a91537443599e5f1b327c86b91ef50a2,2024-05-17T09:15:23.480000
|
||||
CVE-2024-24869,0,0,9210ce4090342ce5ab4291501e417741a91537443599e5f1b327c86b91ef50a2,2024-05-17T09:15:23.480000
|
||||
CVE-2024-2487,0,0,45d8024d8c9e2590268aec3baf47c39b13834f9f3ecf67c0677082d931bcb204,2024-05-17T02:38:15.320000
|
||||
CVE-2024-24870,0,0,b39acdcce0711487a9081cc9665d4882378e31aa9603afc2ce7a407d6eacb9c6,2024-02-13T19:48:35.953000
|
||||
CVE-2024-24871,0,0,7929bd8570e26f9c39d1231b81e0525120c731b0a1415309e5364f8936da12a6,2024-02-15T02:49:29.963000
|
||||
CVE-2024-24872,0,0,fa2594fdb5d0746614a8f20c8074f7685479685549755908db43da65febaf141,2024-02-22T19:07:27.197000
|
||||
CVE-2024-24873,1,1,d7f01e8f58d427177ef3752b8059dafa7430ca51e021251a9342efebad4c6692,2024-05-17T09:15:23.933000
|
||||
CVE-2024-24874,1,1,8c7e4c276949fa091c74d2d85036519b9d8619850edcff6b49cd87e25e81200b,2024-05-17T09:15:24.480000
|
||||
CVE-2024-24873,0,0,d7f01e8f58d427177ef3752b8059dafa7430ca51e021251a9342efebad4c6692,2024-05-17T09:15:23.933000
|
||||
CVE-2024-24874,0,0,8c7e4c276949fa091c74d2d85036519b9d8619850edcff6b49cd87e25e81200b,2024-05-17T09:15:24.480000
|
||||
CVE-2024-24875,0,0,8754b245efd2541d5f9f7de26bd061551850380072e273f4e5050ddc64edab62,2024-02-12T14:19:54.330000
|
||||
CVE-2024-24876,0,0,3412ec71bdbeb06b31836d557387c0bc905744144ffe50082b3b5bf66ccb5109,2024-02-22T19:07:27.197000
|
||||
CVE-2024-24877,0,0,2ca89fda7db1c8f959b87a956aa7f8eb617785e1c531dd6e92fe052410c661a6,2024-02-15T02:53:41.823000
|
||||
@ -243870,7 +243871,7 @@ CVE-2024-24879,0,0,5b5b5bf87620f8667e3d64f2e68df998d5ed1de826612ab2b7e1a8ef88d68
|
||||
CVE-2024-2488,0,0,563090b70f13f8ba5a7f34a263e011c2d6aa5d8808bc8fd94cdee6df02323714,2024-05-17T02:38:15.413000
|
||||
CVE-2024-24880,0,0,c09c072607ab4886f4a9aad9bd3a049d854086280fee035d43332e78f56fd75c,2024-02-08T13:44:11.750000
|
||||
CVE-2024-24881,0,0,0139359b4adb91c8a74807ed4668ec8c28b6f35ffbdc8bdb558ebcdf79f694ee,2024-02-08T13:44:11.750000
|
||||
CVE-2024-24882,1,1,6eb24954b8c0b8d5ecdfa33e9d8dee690d4119c9a2419c93ca8aded0f0ce29de,2024-05-17T09:15:24.940000
|
||||
CVE-2024-24882,0,0,6eb24954b8c0b8d5ecdfa33e9d8dee690d4119c9a2419c93ca8aded0f0ce29de,2024-05-17T09:15:24.940000
|
||||
CVE-2024-24883,0,0,89b865c170ff506259989c86c7ed6b578928bea2f28bd435fc14acaaefafa48e,2024-04-11T12:47:44.137000
|
||||
CVE-2024-24884,0,0,3be547ad02d5edafd16cdb3e30d3f558c78e079d502479e596507065efaa12b6,2024-02-12T14:19:54.330000
|
||||
CVE-2024-24885,0,0,cf96828bd1e0d8642b5bc72ae1a103792f29d8f132a4d58681b5d711c4fbe61a,2024-02-29T01:44:14.037000
|
||||
@ -243913,7 +243914,7 @@ CVE-2024-24930,0,0,fcd1d34f13943d1262f56fac388a51cc622b565da8178878c89844bdd4fe9
|
||||
CVE-2024-24931,0,0,78eddbcbbbfa8c6976ef00426867f55edd6e7bf66e82c01969653d70a2e2ef2e,2024-02-16T21:33:29.340000
|
||||
CVE-2024-24932,0,0,b2f44460390b42f56a628f2eb2dc294afc8ce430fc863f2d6f9f1973cdcede3b,2024-02-16T21:35:59.587000
|
||||
CVE-2024-24933,0,0,c920c04771492dbac4eb2a66712d82aef34d570f62f2f9d9617626404930b799,2024-02-16T19:29:53.437000
|
||||
CVE-2024-24934,1,1,54502b1b1fe1c63686141e33bacbafd3485481647347696fd05136b8d4b0b8c6,2024-05-17T09:15:25.403000
|
||||
CVE-2024-24934,0,0,54502b1b1fe1c63686141e33bacbafd3485481647347696fd05136b8d4b0b8c6,2024-05-17T09:15:25.403000
|
||||
CVE-2024-24935,0,0,17c47c86cccdb3c495a2e4de800cc9cccca5a3c33b4ca1cb2323bacb0fd1e07f,2024-02-12T14:19:54.330000
|
||||
CVE-2024-24936,0,0,b40cba45486310464826445db58797cda9708090ef629993d6b65c1322a94593,2024-02-09T01:06:20.053000
|
||||
CVE-2024-24937,0,0,c158a1376665515fcdd077ebbbc61196266e17dfca3642cdd3f2b284922e7576,2024-02-09T01:05:30.783000
|
||||
@ -244270,7 +244271,7 @@ CVE-2024-25591,0,0,c65f01ca63ad0801e05905a469f348aac6155e03a8ca96328b00fe29f06ee
|
||||
CVE-2024-25592,0,0,3bf77ce6c0d5ce69c3b2d29d57784babd24dff1d07ed5b59dadd6cc7feeb66a0,2024-03-15T16:26:49.320000
|
||||
CVE-2024-25593,0,0,57ec7761a4397c76264a03e9971e99a1954cc79efdad1e4b61952ebd2b88e0ba,2024-03-15T16:26:49.320000
|
||||
CVE-2024-25594,0,0,041a8f1098ea8eb68537c88dc97c5b5bc81f29a13cfba102c394bd754ead05ca,2024-02-29T13:49:29.390000
|
||||
CVE-2024-25595,1,1,009c34ed5463d4855395d2226b19cb084bfa2e631fab93b27b93b694c66dbc32,2024-05-17T09:15:25.920000
|
||||
CVE-2024-25595,0,0,009c34ed5463d4855395d2226b19cb084bfa2e631fab93b27b93b694c66dbc32,2024-05-17T09:15:25.920000
|
||||
CVE-2024-25596,0,0,643e123ad4497f4337dc738367894e43e7e6a9909c709359b42f68a9b876e338,2024-03-15T16:26:49.320000
|
||||
CVE-2024-25597,0,0,995a42bb5448cb09cb985e0b42e6cccd2cae6222c241291d138853f854550330,2024-03-15T16:26:49.320000
|
||||
CVE-2024-25598,0,0,43981dc647595567427079648c996df524b855802acc767a53f000d4ab2b6b3f,2024-03-15T16:26:49.320000
|
||||
@ -244457,7 +244458,7 @@ CVE-2024-25902,0,0,236bf8debc0ae08f316e50d56ce86f0bb5b477845b162f0db1d908c2d82ec
|
||||
CVE-2024-25903,0,0,4b3beb26a12b5915a7f62ad2ba2f7e72e0dea2d50c33407f1c5a02886f84f3c6,2024-03-17T22:38:29.433000
|
||||
CVE-2024-25904,0,0,23057eb868fb6ef813adb121f092708ae4c9eb590cc6f60a0c49f9da8fc586df,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25905,0,0,de6faa22e80faff2b843a7c54255948d4a317197f60d39a73386687f34e33de1,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25906,1,1,7f09340e40982b35ecc33fb803cbf4071c4c6cbfba4e95ea11539b2392059189,2024-05-17T09:15:26.370000
|
||||
CVE-2024-25906,0,0,7f09340e40982b35ecc33fb803cbf4071c4c6cbfba4e95ea11539b2392059189,2024-05-17T09:15:26.370000
|
||||
CVE-2024-25907,0,0,df5629dfd56a4b623791f33248f09ae03bde17e27fbe7a930bc588a652b7c527,2024-04-11T12:47:44.137000
|
||||
CVE-2024-25908,0,0,7ebe84bbb2a09cb3aa50499f551812833cee11c31a88168ddec35ef01857401f,2024-04-11T12:47:44.137000
|
||||
CVE-2024-25909,0,0,1729ac59cd735cb9e10bf43959a450c2c5b8d4775b01f1386f05e50cd4f058ed,2024-02-26T16:32:25.577000
|
||||
@ -245231,7 +245232,7 @@ CVE-2024-26897,0,0,7117225cc4b14afb8e215f34178f2e7fbbf7d760b8f5cf9bb5a56de8ddd95
|
||||
CVE-2024-26898,0,0,11438ca3b6b7ed75959b716d5ff927d1fe069b1feaf141bfe2a772f39ce3f70c,2024-04-29T19:31:26.940000
|
||||
CVE-2024-26899,0,0,021eca8ea6a81120cb7c81a3d3bdb18e09f0d17f90de09091ca22a9d038b6b84,2024-04-29T19:34:10.080000
|
||||
CVE-2024-2690,0,0,682e90950d5d23f9278f907fd1ed959e6c3f4066e498fda12d4576d9e1062ca4,2024-05-17T02:38:25.710000
|
||||
CVE-2024-26900,0,0,218bd95cc07631f86632a83f3296a8afd4b02246a0d45903a7e067d55f7ac8f6,2024-04-29T19:38:23.120000
|
||||
CVE-2024-26900,0,1,7d396e2f9d436e2b737a24c012d00c80957fc0ed041765143888d895b983c8f2,2024-05-17T11:15:07.867000
|
||||
CVE-2024-26901,0,0,0b69a2bddc7a89f4a9274440cdd8336560c75256cb438cb50cf8b2c1d8036b52,2024-04-29T19:38:34.730000
|
||||
CVE-2024-26902,0,0,79dd09d64774289a294bba37c7616f62083466aaf39eb549f12f6f728e6a3fa4,2024-04-29T19:40:05.897000
|
||||
CVE-2024-26903,0,0,21a53434b791da4ce02d5af7f605d1d70b522d70f04ff414b8e2a7f15b1fa47a,2024-04-29T19:41:09.400000
|
||||
@ -245255,7 +245256,7 @@ CVE-2024-2692,0,0,aefc05ddca23ffc90de039367cc7fed9a06f50bd32c460cfe2bbf1c8645c8f
|
||||
CVE-2024-26920,0,0,21e54f7cffce25f076f12e61f0ebb2408a05fa58f844d6d62f7a9b8a454f9f45,2024-05-03T06:15:09.207000
|
||||
CVE-2024-26921,0,0,76d623900726b55efb66263c05dcf2e665a9ce9fb4f9ecc19bf3b35e90cf98c7,2024-04-18T13:04:28.900000
|
||||
CVE-2024-26922,0,0,af76b1b0f3ab9ee10956791f730bd4870f5c1e7911748c677fba653e48abc0dc,2024-05-03T06:15:09.570000
|
||||
CVE-2024-26923,0,0,da4573b83844f36cbecbdc77d107c82583a707415e7aff11d2f41c3052c0b580,2024-05-03T06:15:10.053000
|
||||
CVE-2024-26923,0,1,09d8ae012f0ad43b8dd9ee32e6c06b6cc913017b0122eeed24c123aaebda35f3,2024-05-17T11:15:08.140000
|
||||
CVE-2024-26924,0,0,f1745d5b13e99b2b6fe2577e278513d3ec9c9776eb98248608246c98329d345c,2024-05-03T06:15:10.280000
|
||||
CVE-2024-26925,0,0,3e0df7ca369bcd903549430fe02ebe9b39bccde1336ed5f518c1ebc22ada4a80,2024-05-13T08:15:10.057000
|
||||
CVE-2024-26926,0,0,a92f86f9d106171e65901edda1c9fe34c87217de61e4b80a80c2e7bdcc5c3e47,2024-05-03T06:15:10.483000
|
||||
@ -245269,7 +245270,7 @@ CVE-2024-26932,0,0,801165a8b51bf8428beb57f9200d92bf418f388db57d0009e84bef8f2f88a
|
||||
CVE-2024-26933,0,0,e6ef33bdd396b7f48076f91ddfb93ccbcb4d2ce58a6d789f480a396fdfb98873,2024-05-01T13:02:20.750000
|
||||
CVE-2024-26934,0,0,45f8ccdcbbda45386fdb76897c2baa198b3dfafcf193890242e0b71150332226,2024-05-01T13:02:20.750000
|
||||
CVE-2024-26935,0,0,a9c0e2abd03fa3d8de13e2349e28616c172d5e3135b028177bbdd2eefe05a6a7,2024-05-01T13:02:20.750000
|
||||
CVE-2024-26936,0,0,009acf72485ef9c22bae312f46d52cfd4609faba04f4df881d96fdd29bd6eed7,2024-05-01T13:02:20.750000
|
||||
CVE-2024-26936,0,1,ac3611a024cce1dc29fc377a7f2aca0292c14e6592911fdbd080f60f2117c044,2024-05-17T11:15:08.257000
|
||||
CVE-2024-26937,0,0,36b677f52afa0378e54cd008f023ce299f437d5a5d13d3654c2238611aeddc13,2024-05-01T13:02:20.750000
|
||||
CVE-2024-26938,0,0,321e927ef910319074b978288ce15e9ebcbbcafa9b2849cd294ce5472307acb5,2024-05-01T13:02:20.750000
|
||||
CVE-2024-26939,0,0,85eb64cbd7ee938c6394d3981a444b673e98017b7758d5c581c06bdedc9d8308,2024-05-01T13:02:20.750000
|
||||
@ -245314,7 +245315,7 @@ CVE-2024-26976,0,0,7f3160fd993055d2d086205203ac721ed6cf29a59d28518fd22c6db2c5d69
|
||||
CVE-2024-26977,0,0,7f4303ba7265fe68f47a9d9801d011f3d78c2b9c80b2b80c869116171921f0d6,2024-05-01T13:02:20.750000
|
||||
CVE-2024-26978,0,0,5172cc85cece67dcf9c674206b1d787aa5f16a296b6c0e5a89a82549de8ab630,2024-05-01T13:02:20.750000
|
||||
CVE-2024-26979,0,0,71ac697cdce0d8256ad73695d7bb5e579fe9a4574299812ac2744eb0e8205095,2024-05-01T13:02:20.750000
|
||||
CVE-2024-26980,0,0,73a19c971d210c54b5fedd046a83ea7be2487bcdee9984b526bfcf2d89936c86,2024-05-13T08:15:10.660000
|
||||
CVE-2024-26980,0,1,ec5b812a8dbedf3c6e27cceb9a929403fd6e62291ad747f9f2a67748a6189d95,2024-05-17T11:15:08.357000
|
||||
CVE-2024-26981,0,0,3038c3174fa5069e42a0db4274374d74c2b5066ad475e921f47c4589915379cd,2024-05-03T06:15:10.663000
|
||||
CVE-2024-26982,0,0,71a4b88e652ac72451ef2b1c06677d2a8721eacfd6194887bc3cbe1ed1aa0fda,2024-05-03T06:15:10.953000
|
||||
CVE-2024-26983,0,0,d3d7f9f5caf4e079a71f70f8bc14c3d32922ad02f616d250213454d5ce4002ce,2024-05-13T08:15:10.750000
|
||||
@ -245631,11 +245632,11 @@ CVE-2024-27394,0,0,5e7a53f590b5162088e2f62ede530021c62c6049f050fb3503134b753a19d
|
||||
CVE-2024-27395,0,0,5df70f1b3ff6d2af9f73904349b430ca10a163b94e717b4cdd44173061587a43,2024-05-14T16:13:02.773000
|
||||
CVE-2024-27396,0,0,9b0ffd161e6acaac876e97925d1ac1ee2a01fb836e45785ecc9b37d74a7d4d45,2024-05-14T16:13:02.773000
|
||||
CVE-2024-27397,0,0,fbe802dfed1a8f47bf9bc4f71f43f7ab41aac00164efe31ee399fb904042b8ff,2024-05-14T16:13:02.773000
|
||||
CVE-2024-27398,0,0,b28254e91ec3ea9bbecf0dd682cf2766853be243f80e067c1e0c954823b93cd6,2024-05-14T16:13:02.773000
|
||||
CVE-2024-27399,0,0,cc008bf10962d7c2aef15140a560513d9009902a2f3b9d5b92f2d05d6af4b41f,2024-05-14T16:13:02.773000
|
||||
CVE-2024-27398,0,1,4e6eb809f38a4676c4681cc2d699d6ba4c9040f9cfcdef58532988c152e68067,2024-05-17T11:15:08.450000
|
||||
CVE-2024-27399,0,1,9a99e00043d2fd89f125d757421d31a05236f4d2b21b7e9d9f3a5faa41bb0888,2024-05-17T11:15:08.543000
|
||||
CVE-2024-2740,0,0,d811151885dcf4f2b77a4d174a11ca3affaa40577de972dcb33bdeeea321a401,2024-04-11T12:47:44.137000
|
||||
CVE-2024-27400,0,0,d36d2b11e941d3c2fa033851e667b6f2093d79559465d02e8b602560198462bc,2024-05-14T16:13:02.773000
|
||||
CVE-2024-27401,0,0,7f93537c1690f82a8d268ff4b002296e001f82ef4b31ed297acfb8a7560cdca7,2024-05-14T16:13:02.773000
|
||||
CVE-2024-27400,0,1,c7f8de5ac5c7527a48b00c8eceb94f08e50ea38b4e33e5651ac84bc6d6dc7295,2024-05-17T11:15:08.637000
|
||||
CVE-2024-27401,0,1,43248d8231ad423507aae571e28b2d44b475bd88924b008914b2ea99216e6e54,2024-05-17T11:15:08.783000
|
||||
CVE-2024-2741,0,0,72a13180f65eaa34946651eb5c88084bf0e961149a90b72b29d8dddde47c3326,2024-04-11T12:47:44.137000
|
||||
CVE-2024-2742,0,0,0e25f52f0731b3f58f04025755ec9a85b24de4601bb22e58141a1505898ffdb7,2024-04-11T12:47:44.137000
|
||||
CVE-2024-27437,0,0,e9cee712db29e34fd6b108aaf7cb3be80806e942c7d7482e1157dfdc051de49f,2024-04-13T12:15:11.793000
|
||||
@ -245872,8 +245873,8 @@ CVE-2024-27950,0,0,56d632dad56c45d949d3327de16e5b70b08683cea8ce7876ca8c59cc37ee8
|
||||
CVE-2024-27951,0,0,fb648e7b48d01c386d90ab877e0e6e5ad9ac54d7f9cf31355978050c72eaffef,2024-04-03T12:38:04.840000
|
||||
CVE-2024-27952,0,0,fe624616809d2b08e76659d4d30a802797c8b1dea609a0360dcd8752b7d9cac9,2024-03-13T18:15:58.530000
|
||||
CVE-2024-27953,0,0,2a6d5a1801b407ff03c3610ff9d51f6689bbe6434fd00573a417d8c900d7386a,2024-03-13T18:15:58.530000
|
||||
CVE-2024-27954,1,1,d7960cc1a6d19d54e57d8964972732680dfa8e44b8dd346bb0a5682ee8c6092a,2024-05-17T09:15:26.810000
|
||||
CVE-2024-27955,1,1,46f6e952012b27fbbe098e5a935a8bd476df5003937945695626003b10c01f77,2024-05-17T09:15:27.330000
|
||||
CVE-2024-27954,0,0,d7960cc1a6d19d54e57d8964972732680dfa8e44b8dd346bb0a5682ee8c6092a,2024-05-17T09:15:26.810000
|
||||
CVE-2024-27955,0,0,46f6e952012b27fbbe098e5a935a8bd476df5003937945695626003b10c01f77,2024-05-17T09:15:27.330000
|
||||
CVE-2024-27956,0,0,194fe594f0f82199e60d61684a1f7c8db8c04bdf57c93a45e71af1bb25f7851a,2024-04-29T09:15:07.387000
|
||||
CVE-2024-27957,0,0,3bb51417dd78fa81cd8d3e079ab9ae6ed1b9709468847cb623b9c9568eef40f4,2024-03-17T22:38:29.433000
|
||||
CVE-2024-27958,0,0,3c69427bef710d3f7bb781ce81b405984dd58d08367be619f590c223ad730fd4,2024-03-17T22:38:29.433000
|
||||
@ -245891,7 +245892,7 @@ CVE-2024-27968,0,0,81cf818ff4c52a717cdd4ac78ff685291ab11ee5a0785fe2aaaed4be1173d
|
||||
CVE-2024-27969,0,0,eb302d2058dff500ab911479996ba4d74069db5175238a6a6a178ecc6d1e3ac9,2024-04-11T12:47:44.137000
|
||||
CVE-2024-2797,0,0,4945231fbbb39124ec99614aa8c835c0baa1873650e162e3055ee01241653f61,2024-05-02T18:00:37.360000
|
||||
CVE-2024-27970,0,0,400f0279b55b3a379ae4cb2321b0f7168d543425d3ae3678bf6361a1a4e68ba1,2024-04-11T12:47:44.137000
|
||||
CVE-2024-27971,1,1,850c6cb8ce26353addd8e5cb444ab1d18e3eb42bdca21c24a1d6554562eb3499,2024-05-17T09:15:27.850000
|
||||
CVE-2024-27971,0,0,850c6cb8ce26353addd8e5cb444ab1d18e3eb42bdca21c24a1d6554562eb3499,2024-05-17T09:15:27.850000
|
||||
CVE-2024-27972,0,0,e0f7933a8078741e5e2cdbc1c8aaffaa42eca2ccffc4cf4f10a410272b4fcf47,2024-04-03T12:38:04.840000
|
||||
CVE-2024-27974,0,0,c5d12161a6a294fb4d33a068888d07d2dec693f9073d8d47f06182bf4fe2779a,2024-03-18T12:38:25.490000
|
||||
CVE-2024-27975,0,0,5e723b988881d768c48479414306df95a821f21a86f27f09cadd1c6d52236353,2024-04-19T13:10:25.637000
|
||||
@ -247330,9 +247331,9 @@ CVE-2024-30469,0,0,27281734a967c544466176225d5b748c65afaa34ac64dbc81f344b0ba4360
|
||||
CVE-2024-3047,0,0,7a704b46e98cc1708bf08d4299ad99a8dad9a0911b940d1f5fbcb78bdd933ce2,2024-05-02T18:00:37.360000
|
||||
CVE-2024-30477,0,0,e57a5e6fa510ec9057ebfdd86316546dd94e1dabae4fad5cc81ff907e6cfb50c,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30478,0,0,7d7533c1a9dedc51f4ca6100785aae3de1530d7d091146af0639adfb42b6a065,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30479,1,1,4f87ff8a40dd5be0c37407d5aebae3cd8ad6da7759a54bb6a4213b683a5e9b3f,2024-05-17T09:15:28.283000
|
||||
CVE-2024-30479,0,0,4f87ff8a40dd5be0c37407d5aebae3cd8ad6da7759a54bb6a4213b683a5e9b3f,2024-05-17T09:15:28.283000
|
||||
CVE-2024-3048,0,0,4dcedcaa78b591cdd60323c2fe1598a52cf4e06ae133e6cc58809008ef557edf,2024-04-26T12:58:17.720000
|
||||
CVE-2024-30480,1,1,b2cb09808686b4b88cdbb18936e957e0ca61ba4b5adfa4801b4040bbc385f24e,2024-05-17T09:15:28.807000
|
||||
CVE-2024-30480,0,0,b2cb09808686b4b88cdbb18936e957e0ca61ba4b5adfa4801b4040bbc385f24e,2024-05-17T09:15:28.807000
|
||||
CVE-2024-30482,0,0,570bede6c16b4a7f5e8b36059aeda7f1a299c81f1153ac528a60791c716caf63,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30483,0,0,6c48131c3767e81f61ec34b0bc223a59e072c0c0b055c8c0e04f20b2876077ea,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30486,0,0,3b668ae931cda4b6a387bfa69ea17dffa696817ef5a0dd2b2ba0b8d1d89d01a9,2024-04-01T01:12:59.077000
|
||||
@ -247358,7 +247359,7 @@ CVE-2024-30505,0,0,e3a1623c70480645d7435d235c55cbfe6315e866cb0d6b0f4746946349a6a
|
||||
CVE-2024-30506,0,0,c05e76d2257717876a74bdef23833433be5442543f2708d7016e5393bc439246,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30507,0,0,0be298b6c722996f3c9bca1b274ff1f6b87feb3b0e0c481ae73ee51466f24be1,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30508,0,0,3060ef2ae86660ef47372d56d58005971c1e5f17b0f99fb0115ce3dcce5bb03b,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30509,1,1,7e1c9f797b4b11e16582b59dbc7011490179878cb7e90e0b322ff15c67176d6f,2024-05-17T09:15:29.330000
|
||||
CVE-2024-30509,0,0,7e1c9f797b4b11e16582b59dbc7011490179878cb7e90e0b322ff15c67176d6f,2024-05-17T09:15:29.330000
|
||||
CVE-2024-3051,0,0,75704a1433dc2891570ee18e5534da76e15486abbfe9247250e965aaaff3a212,2024-04-29T12:42:03.667000
|
||||
CVE-2024-30510,0,0,5a644950940e50ac60667456ae9d7008d354df976d23b70ea88670750248c7fb,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30511,0,0,d0cc98a9fcd4b29c047f03054ac8aade5a24634c83857c79161193efdb1adfcd,2024-04-01T01:12:59.077000
|
||||
@ -247369,11 +247370,11 @@ CVE-2024-30519,0,0,3b4b984b21c18b55e830dd1af8315299dc669c0add51934a0cf87347bc021
|
||||
CVE-2024-3052,0,0,0b5788255484802b4039a7afc4d8af6d1c6fd000b39f03ec18c276a79786be6e,2024-04-29T12:42:03.667000
|
||||
CVE-2024-30520,0,0,40fe415caf2a4bab823960caa71aef7f92917db961b860a15eda04176938dd5f,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30521,0,0,831f25d28a4eccbee0c9a477ea2d8542d4b6a09da45b2ed1bac270363725b502,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30522,1,1,f8e1640977af494f1a9f9e661a4cd9401cde2cd5493bd5b7357c7d1c90706e39,2024-05-17T09:15:29.813000
|
||||
CVE-2024-30522,0,0,f8e1640977af494f1a9f9e661a4cd9401cde2cd5493bd5b7357c7d1c90706e39,2024-05-17T09:15:29.813000
|
||||
CVE-2024-30523,0,0,0cef256089f66b1e0cf2f5994c8e2a08b4afb817483e2b78f98835367339d575,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30524,0,0,3f617e1e45b1122d6b1034d70f29ff7cb7551f904c4e8a57e14430a05ec497b2,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30526,0,0,104d793a66172acd99ba27a22d83ba8e2d51aa54cd9b15f3bc6afe8a835c5254,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30527,1,1,67ce0b94c9f3d722978b5d6f2da1052f223b86a367ad25df69a3090cd9404f75,2024-05-17T09:15:30.263000
|
||||
CVE-2024-30527,0,0,67ce0b94c9f3d722978b5d6f2da1052f223b86a367ad25df69a3090cd9404f75,2024-05-17T09:15:30.263000
|
||||
CVE-2024-3053,0,0,229c354cd3a0cecb51dd999b0e615993d2b674b0536a00d5050bf9c52ceb3ac1,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30530,0,0,dbaedca63c2d0063e70329af2f2e13f2d8eb98748a64909895cfdcfc37f36d33,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30531,0,0,b09c54bc9b690b21f0b4a0d96b7e8e1d6291d5af0953063c3755ba446b38cd3e,2024-04-02T20:31:58.463000
|
||||
@ -247382,9 +247383,9 @@ CVE-2024-30533,0,0,79210a276c197ef0c96ad47c4fb12b67135bbfbac578e6cbb91cd58ced290
|
||||
CVE-2024-30535,0,0,44cf559c2f239523454379743fc839df0944a89751d0feea3aa49546c20c2f6f,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30536,0,0,8b71121133ca2bd2e4e447453aa973175f5a1f5afa02099ef20cc2e88af30470,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3054,0,0,926125286f908d4e62beb1186f52b352009c6bf9873091ee97e35e312c717661,2024-04-12T12:43:46.210000
|
||||
CVE-2024-30540,1,1,762b2c201ee594e76c050496b0269d5b6ec80301d28df33138735852f74b6c22,2024-05-17T09:15:30.807000
|
||||
CVE-2024-30540,0,0,762b2c201ee594e76c050496b0269d5b6ec80301d28df33138735852f74b6c22,2024-05-17T09:15:30.807000
|
||||
CVE-2024-30541,0,0,d78a79d3d88afd14cd20c527bfe41ab0fe37668194e235410187bd48d18e8829,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30542,1,1,660917b6c297536713dfb46b17fb1eb46e8a407b6ce688ba455961e17b2d4874,2024-05-17T09:15:31.340000
|
||||
CVE-2024-30542,0,0,660917b6c297536713dfb46b17fb1eb46e8a407b6ce688ba455961e17b2d4874,2024-05-17T09:15:31.340000
|
||||
CVE-2024-30543,0,0,de59888ed56e637b17c319241a16835129df317d943b40d1e6d9bcfa3e0bf401,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30545,0,0,6038867d67c995e883a86525490f0f271cb5fc6f4f0e3fedf213a3bc0350dc09,2024-04-15T13:15:31.997000
|
||||
CVE-2024-30546,0,0,4af9d439135e31aee32061977c70bc8d2bc207778dce4d3c2778c470fee78f79,2024-04-15T13:15:31.997000
|
||||
@ -247725,13 +247726,13 @@ CVE-2024-31225,0,0,5752a2a442fe279bccc3b7ddc7819796c22970000c602eb85a11b0aa1dc0b
|
||||
CVE-2024-31226,0,0,5d2e1bd63cac78da73afcaed47732ff66f01b4e240888cf7e7fbd301f9b2a43e,2024-05-16T19:15:49.560000
|
||||
CVE-2024-31229,0,0,7de33a876b6efca66be6426e83eb27e50104659e2ffe406707b9d46bf22d8ac4,2024-04-18T13:04:28.900000
|
||||
CVE-2024-31230,0,0,52cfa4cc0c105e0f4a014468a390d1fae46fb176c8f9a3fd8a419c5888fe92a6,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31231,1,1,d3e411f23b6c98c9cc70bdd66cea89a83ca33b789c5a4761584ac7f8b44e664d,2024-05-17T09:15:31.837000
|
||||
CVE-2024-31232,1,1,6081793c36b58c04f4f4dcab45c86998b9e614497368c28aeb32664edd3cef3f,2024-05-17T09:15:32.297000
|
||||
CVE-2024-31231,0,0,d3e411f23b6c98c9cc70bdd66cea89a83ca33b789c5a4761584ac7f8b44e664d,2024-05-17T09:15:31.837000
|
||||
CVE-2024-31232,0,0,6081793c36b58c04f4f4dcab45c86998b9e614497368c28aeb32664edd3cef3f,2024-05-17T09:15:32.297000
|
||||
CVE-2024-31233,0,0,d489633661459fa8fba7247a4e042c4067793ed99651e43e0cd0674db1c81416,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31234,0,0,e2afc7f2f1012ca63d202c441d893de0eb7415294dc8692e4b069bf731411329,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31235,0,0,c7be38a2d9985ae62f960ffac37f6dbb2463ae70fb4b24f91b6536b85e68efd9,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31236,0,0,4b0cdd02fafdfde515330764d02c46af5491731224a8f9b9bb3d6752fb30357a,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31237,1,1,bbb651d3667b5afa7f4aa149b18b9456e410be3078478bbdb292468017f63d17,2024-05-17T09:15:32.830000
|
||||
CVE-2024-31237,0,0,bbb651d3667b5afa7f4aa149b18b9456e410be3078478bbdb292468017f63d17,2024-05-17T09:15:32.830000
|
||||
CVE-2024-31238,0,0,035e91a2ffd96ddaac7205c8304b76edca5a3cfca8e521f269887f2674758725,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31239,0,0,f1a7e05bdfa068e6b58c0d6e9081d2a7ebd399f194fe9a78253db8afb243d29a,2024-04-15T13:15:51.577000
|
||||
CVE-2024-3124,0,0,ebf325dc123548345ec29d3ab9de8cb6e8774aebd06c17ddc5ace254cac029ea,2024-05-17T02:39:43.733000
|
||||
@ -247768,7 +247769,7 @@ CVE-2024-31278,0,0,5fca286ba4fb85e19d6f2aa20a43535dfb21ddcf27d77966f978512669140
|
||||
CVE-2024-31279,0,0,c6d8bd339bd2ef8cd38712a588298a0f78c3dc186c2fc6521788bff4f268fee2,2024-04-15T13:15:51.577000
|
||||
CVE-2024-3128,0,0,f39d99f2e7d2dabe7ec55277ccd5294314e54f0a06e3a55cf6f87ea7b8435dee,2024-05-17T02:39:43.933000
|
||||
CVE-2024-31280,0,0,9e9b815bd712cdeca69ca5173415a6797e0b892c1fe0c623b9d101db7359150a,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31281,1,1,98b31660bac93aa23a390dfd5e4e072a67799d07f1682c1c9987e8b2f0b814c6,2024-05-17T09:15:33.290000
|
||||
CVE-2024-31281,0,0,98b31660bac93aa23a390dfd5e4e072a67799d07f1682c1c9987e8b2f0b814c6,2024-05-17T09:15:33.290000
|
||||
CVE-2024-31282,0,0,5936d2319178c50c30843c7ee4db925608db08d53e49d6aed7a5d5b8f4adeca5,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31285,0,0,fbfb894bd06ff971ae688901838c64fa61bd6d98fae23eaccff9aa0a03fb58f3,2024-04-11T13:30:38
|
||||
CVE-2024-31286,0,0,e1da10ca58ecb94e30ee69cf28bc9450f2f10eb7f9a84a3b3e2823a17dee6482,2024-04-08T18:48:40.217000
|
||||
@ -247776,17 +247777,17 @@ CVE-2024-31287,0,0,d3b9f66c99b69110f7dd9854d4eaa18fbf3158907931625a02e30c57de0c4
|
||||
CVE-2024-31288,0,0,13535f8dee937d7662ab695698374962ab0e6755720cafc69b6c10df5e8fa97c,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31289,0,0,f2b8efb7104db01ed3455b5ab11475f41ce294bd7075c52a9b4981984f88d3c3,2024-04-15T13:15:51.577000
|
||||
CVE-2024-3129,0,0,7b41d9b52e1dd1d170a1e49f6fb13c6a010e4cf497961bc3f18d2f6bca4fed17,2024-05-17T02:39:44.023000
|
||||
CVE-2024-31290,1,1,48e2592148a105d437b0ec75122dd4acd8e424dbab49749de25a5a9e222580a5,2024-05-17T09:15:33.800000
|
||||
CVE-2024-31290,0,0,48e2592148a105d437b0ec75122dd4acd8e424dbab49749de25a5a9e222580a5,2024-05-17T09:15:33.800000
|
||||
CVE-2024-31291,0,0,0650af4fe4b6cc0120edec2cb58310f5b2a57c0e765ec2df7495db5e8150ac38,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31292,0,0,c70d462af6bc2404bf991c897ce5371715c148323bb7e37fc83e7d154cd03a36,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31293,0,0,d0aa21216c294f55a61097e89d25c48783b0b8c11d0c131295216d0930c76390,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31295,1,1,1d9c4df1050d26a8d637e0fbe50ab6eec7fffa1e7508835bb7fc24deaefe5348,2024-05-17T09:15:34.327000
|
||||
CVE-2024-31295,0,0,1d9c4df1050d26a8d637e0fbe50ab6eec7fffa1e7508835bb7fc24deaefe5348,2024-05-17T09:15:34.327000
|
||||
CVE-2024-31296,0,0,47134b63bac7f8af797ca504db1cf6e76dc826da8fa665ee8c7ed1c27292df1b,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31297,0,0,88f6848587565ccdefc9d08a51c388afa534b4f0ce7911a5a1799f7110c82c1d,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31298,0,0,75f0543a46ec047f4866e7cbe527aff341f7aebbe53d7e9c6d154aad7568ac61,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31299,0,0,3cd097454f2af8d7dbd4b37b7e30458e12157596eadc5450d37a4ce6cc09ad60,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3130,0,0,f68ffdb025359112b42b29b07959a49895dfaeeef79aecb0f7981acd1536b04b,2024-04-01T12:49:00.877000
|
||||
CVE-2024-31300,1,1,06b34e9f0cfc6bb13773e27c711b91e9c5509814c0d2ed817e25d252dc8b637a,2024-05-17T09:15:34.867000
|
||||
CVE-2024-31300,0,0,06b34e9f0cfc6bb13773e27c711b91e9c5509814c0d2ed817e25d252dc8b637a,2024-05-17T09:15:34.867000
|
||||
CVE-2024-31301,0,0,e8b5a65c9bef0175cce9b38c58156669c86eda140a6de06960e3677447078479,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31302,0,0,ad7b89f44c563df0fab516a81ccb333cd5bd91cc34eabce911e6630db7354401,2024-04-26T15:55:30.873000
|
||||
CVE-2024-31303,0,0,d19e52c3a72788fe575094c8a039fb48a18dd4ce5551eec3595ac2f9937f5778,2024-04-15T13:15:51.577000
|
||||
@ -247796,7 +247797,7 @@ CVE-2024-31308,0,0,5e2ae5593f1ea9760ae6e8cbc575821053a6196641c6e6bb427e79b97acb4
|
||||
CVE-2024-31309,0,0,fffcb118c29828b67d952cb185f5d9b9c1e5391db0b01186447338db555819d8,2024-05-01T18:15:23.233000
|
||||
CVE-2024-3131,0,0,c743c524a4c8650f09bc83876c03caf128d010267bf94a845848caa55c9a8038,2024-05-17T02:39:44.143000
|
||||
CVE-2024-3134,0,0,d410135097f49f6e2015b04558109d5f2f6eec140e4e8da33f796bc3936e35da,2024-05-16T22:15:09.660000
|
||||
CVE-2024-31341,1,1,b03b807025ff6a41ee5e5d5d06b89084668e86e8fa7ea67fdd5033fde1e36802,2024-05-17T09:15:35.247000
|
||||
CVE-2024-31341,0,0,b03b807025ff6a41ee5e5d5d06b89084668e86e8fa7ea67fdd5033fde1e36802,2024-05-17T09:15:35.247000
|
||||
CVE-2024-31342,0,0,3dcf837177f2ee22dd479f7dc441eb8e323a27e9d61f77326ada203aab00e68b,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31343,0,0,07130367d283f095e3c4a097fcb374b7f0ee04a0481c3dc18f14571141420df5,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31344,0,0,e0ca2da61833234a90b054de95f2f160bbebd4a497bc87a3e17ec60ef242d468,2024-04-08T18:48:40.217000
|
||||
@ -248207,7 +248208,7 @@ CVE-2024-32128,0,0,cb935dc8078553e54335e879bd7502243cd9a625b79c1c1dfceb4bfba45b9
|
||||
CVE-2024-32129,0,0,836d2bd4732456c79c79f4c8efead95083abe0bdcddc45563d15237fa265590b,2024-04-29T09:15:07.803000
|
||||
CVE-2024-3213,0,0,ea3f20ff836368484318fafaf2de028dfc4fe493b01551892e8e53b852a2d76e,2024-04-10T13:23:38.787000
|
||||
CVE-2024-32130,0,0,c3815df651bee8fabb39b6ee1601a12e78be3e64615a56410b03d7d3217c5c2f,2024-04-17T12:48:07.510000
|
||||
CVE-2024-32131,1,1,dec39d9e27777e1fbe2c1c6359b7032fd18d7f476427fb7f9488e60fd9e6962a,2024-05-17T09:15:35.797000
|
||||
CVE-2024-32131,0,0,dec39d9e27777e1fbe2c1c6359b7032fd18d7f476427fb7f9488e60fd9e6962a,2024-05-17T09:15:35.797000
|
||||
CVE-2024-32132,0,0,b8f2c67a5eb9317d71844e548f7098002fd937824ef3f3cc031dff8cdf6f8053,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32133,0,0,b6bd118a7271f523d04d92bcbd31e3ed3647e43ddffd398663c764e095286abb,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32134,0,0,37485526d4a1d331ce70e420eb227ca2fc8b2b4a19af534e5a8caa5ed85a6cde,2024-04-15T13:15:31.997000
|
||||
@ -248390,13 +248391,13 @@ CVE-2024-32493,0,0,99ad93b821b9120b3f9479fdbc637b6bf229eed0c91d108f68192b4be876e
|
||||
CVE-2024-3250,0,0,42d0527e4e3750c8dcbea25ddc3c02af060082636d586aa4581df30dc613d6b8,2024-04-04T22:15:09.350000
|
||||
CVE-2024-32505,0,0,f00ba1bea0fed936bba09a3ddc8367be797652510d4b08d45ee56a08717b6629,2024-04-17T12:48:07.510000
|
||||
CVE-2024-32506,0,0,58fedc2d03a3103f2000181847e0d82ef0a337b365a3707fbe423487ceb945e1,2024-04-17T12:48:07.510000
|
||||
CVE-2024-32507,1,1,f5b1d4cc0cc600868b39698865d583548c8d3105cbbc20e1c4ddacbd28c2ed6f,2024-05-17T09:15:36.303000
|
||||
CVE-2024-32507,0,0,f5b1d4cc0cc600868b39698865d583548c8d3105cbbc20e1c4ddacbd28c2ed6f,2024-05-17T09:15:36.303000
|
||||
CVE-2024-32508,0,0,8701ba6ae9f0b82134ef4dc34a5d7bf9328fa3c3c8d5a6a1500f16bbdd6750da,2024-04-17T12:48:07.510000
|
||||
CVE-2024-32509,0,0,1a322d9a1fcd77ac1cf32605af3f78293da8774089da32cac7593b4a6cd15013,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3251,0,0,df68d625a5320e912d677a4e711c53f76ad97513a91980d43aa17296c617f35c,2024-05-17T02:39:48.383000
|
||||
CVE-2024-32510,0,0,c0f59560c67078688b096f210bd7fa8c2664407e349f9f6d3cad0c68613752cf,2024-04-17T12:48:07.510000
|
||||
CVE-2024-32511,1,1,34436e7fd0c1d73ff51c564e382df7e93f42a8b3c8005d28ddffdd3d6420e280,2024-05-17T09:15:36.740000
|
||||
CVE-2024-32512,1,1,6aef1b7183152767fda015f64aaff52416a4af8f9c778a3bb26fc4fc4c2f4f99,2024-05-17T09:15:37.233000
|
||||
CVE-2024-32511,0,0,34436e7fd0c1d73ff51c564e382df7e93f42a8b3c8005d28ddffdd3d6420e280,2024-05-17T09:15:36.740000
|
||||
CVE-2024-32512,0,0,6aef1b7183152767fda015f64aaff52416a4af8f9c778a3bb26fc4fc4c2f4f99,2024-05-17T09:15:37.233000
|
||||
CVE-2024-32513,0,0,eb6296b1450028710e0787e1e0c573a9ac8ff63cde78da2e16afb4c48c3f781f,2024-04-17T12:48:07.510000
|
||||
CVE-2024-32514,0,0,33588f7db663992d6ba8473bc3f597e6c7b575c52e3686424ff20c357fb37b86,2024-04-17T12:48:07.510000
|
||||
CVE-2024-32515,0,0,a28455a8165bab28a7277d9f7384b7fd31c74d3531f1b35e0523f2e72630af6d,2024-04-17T12:48:07.510000
|
||||
@ -248406,9 +248407,9 @@ CVE-2024-32518,0,0,859438c5a95200f084fe5baf95f84ccc8b7dabd3bf05ab756deeb841b764a
|
||||
CVE-2024-32519,0,0,03b36b71b4c0551641155230c40db88e8c4a8ac5801c1bfd385230b37ff5f7ca,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3252,0,0,f19b2e5de9a85d2253c3d8567662370e5f9a2b72dcd6e07a84644abcee233e7a,2024-05-17T02:39:48.477000
|
||||
CVE-2024-32520,0,0,2d1befaa5f43fa176e3549ba39287946f28f4db6750ccad38fb60a940e81702c,2024-04-17T12:48:07.510000
|
||||
CVE-2024-32521,1,1,240ab47cba300fbe9505d1c5d15c1d8bc29f213f869e0dc3e15fafe5f0a19a59,2024-05-17T09:15:37.740000
|
||||
CVE-2024-32521,0,0,240ab47cba300fbe9505d1c5d15c1d8bc29f213f869e0dc3e15fafe5f0a19a59,2024-05-17T09:15:37.740000
|
||||
CVE-2024-32522,0,0,41fba1f78ab0ff112a0ef6fd1534d776bbd25a6a89ee3e1b25a5fe9fdbfd0ccc,2024-04-17T12:48:07.510000
|
||||
CVE-2024-32523,1,1,396bd03dec2c37c0219dec6bb1c36b7d92134c59f504244c8343f11928b81076,2024-05-17T09:15:38.163000
|
||||
CVE-2024-32523,0,0,396bd03dec2c37c0219dec6bb1c36b7d92134c59f504244c8343f11928b81076,2024-05-17T09:15:38.163000
|
||||
CVE-2024-32524,0,0,afce93695733ada46482d59939465873430c33deae0fc2e4c525017a2b740ba1,2024-04-17T12:48:07.510000
|
||||
CVE-2024-32525,0,0,76bbbb8a183d20ff524d1a4d1d07d58f767e268041fbd35adf90b7944044d004,2024-04-17T12:48:07.510000
|
||||
CVE-2024-32526,0,0,3db44baaaf9731dc0174236e3b33f2bcc856cdf539448e6f2a80e2752cde34f9,2024-04-17T12:48:07.510000
|
||||
@ -248553,22 +248554,23 @@ CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2
|
||||
CVE-2024-32672,0,0,78593f9c773ac875a6a2e98801218bcf401113d3ab1c390eed3f1dae9ec41b7a,2024-05-14T16:12:23.490000
|
||||
CVE-2024-32674,0,0,96f59a78cffb2c821be18a303b9da0d3f816839c22dca4209a77529199edce40,2024-05-08T13:15:00.690000
|
||||
CVE-2024-32675,0,0,87b463967c2204618d7e556d0f9b434f519dfbe770ec74ef985201062de7ccc7,2024-04-24T17:16:50.397000
|
||||
CVE-2024-32676,0,1,c48bb61830c9720695f0f8b0e8d63e64e27e7902456d765223bd42b42ebc2759,2024-05-17T09:15:38.620000
|
||||
CVE-2024-32676,0,0,c48bb61830c9720695f0f8b0e8d63e64e27e7902456d765223bd42b42ebc2759,2024-05-17T09:15:38.620000
|
||||
CVE-2024-32677,0,0,b2d5b21c6c0b64a6ef3d2bb5d4a7fb394174b9e010ebfad39ee101d085a71d44,2024-04-25T11:15:46.440000
|
||||
CVE-2024-32678,0,0,7a21dc47063bd1d6772659880a61cac2625401ac7a969a273c598570345b04fc,2024-04-24T17:16:50.397000
|
||||
CVE-2024-32679,0,0,47f25b53322dabb6e1a721a9caf70ab58f695c8ffaee75067972f951cb497019,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32680,1,1,78f895c14a733b0210e87dfdade3c9f6912d005722289469341d41112eb7fabb,2024-05-17T09:15:38.820000
|
||||
CVE-2024-32680,0,0,78f895c14a733b0210e87dfdade3c9f6912d005722289469341d41112eb7fabb,2024-05-17T09:15:38.820000
|
||||
CVE-2024-32681,0,0,efbbc39bf43196521be7c89817df89ccc6c5796780cae8464764359fb9f9e9a1,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32682,0,0,926b198cadc06d872c5c661fd5aa87b7b8f1b928ef05934778226415bebf3353,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32683,0,0,31c8b1040ae1684a753d0084169a570a568e4d0623cbc35ed6cea0f444159fb7,2024-04-19T13:10:25.637000
|
||||
CVE-2024-32684,0,0,42c6d5383ebe07664bd16137dcf98d87706442200266e5f40d657839494e84dc,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32685,1,1,c76a36b2523368b9f25d891b0d1d51da18a2e4670a5da9326e5400b49a12df4d,2024-05-17T09:15:39.283000
|
||||
CVE-2024-32685,0,0,c76a36b2523368b9f25d891b0d1d51da18a2e4670a5da9326e5400b49a12df4d,2024-05-17T09:15:39.283000
|
||||
CVE-2024-32686,0,0,852c454a1d3bbf27e69c45ac3a82e5061f231ff76a794447de0366c288490e9f,2024-04-18T13:04:28.900000
|
||||
CVE-2024-32687,0,0,a086d5b324c1fb3e15319d9ade5180576e51b429460cf8b16542df9ee987dffc,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32688,0,0,7f41951b1eb13319bfb8b893fa89901a983c98497ebd74b7a49d01c4670e5fb3,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32689,0,0,16874a71c9e632f769995766bf2f4ed6e183b5fc555d1d7f129ab5a8c673df33,2024-04-18T13:04:28.900000
|
||||
CVE-2024-32690,0,0,a5c3efbe443cf42b8bcd8044eca65a720a8f83179f73ad11a935d5b1da69e0fc,2024-04-22T13:28:43.747000
|
||||
CVE-2024-32691,0,0,6bf77f40ecd5cf4c30ab2ae6de9b94e9df1ad90bb17dd1fa390b1b8ff8545003,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32692,1,1,f1392f7c8d50422ef59e2170f515af98f6df3060e7eda48205fe0aa7d92d984c,2024-05-17T10:15:08.800000
|
||||
CVE-2024-32693,0,0,e7339c8b84970dceb7f27fc70179e84265f9a92972682371e824a11db13ee997,2024-04-22T13:28:43.747000
|
||||
CVE-2024-32694,0,0,ff376270c0d03e4fa17c8b43797e107f0072f0908378ab1e963713a1158905af,2024-04-22T13:28:43.747000
|
||||
CVE-2024-32695,0,0,caed8267603babbb5835fd8eadf3f2dca399f066c74d00c0a4d5b64c1b57142d,2024-04-22T13:28:34.007000
|
||||
@ -248577,10 +248579,11 @@ CVE-2024-32697,0,0,080d53d42ba50cae897d0f614c32560b058087a597070d329674949eb0662
|
||||
CVE-2024-32698,0,0,62d9323bbf42a20a367a2bf88d0f3ecbf462ca871e0485b99440a7338327b80d,2024-04-22T13:28:34.007000
|
||||
CVE-2024-32699,0,0,445360642dcc3c18004d28d0ff54224d5a41bfbc1025e36f7cf78bff1b611ad5,2024-04-24T17:16:50.397000
|
||||
CVE-2024-3270,0,0,8f52a439b6114fc5656a05f2074671df643abe1d20ce495cfa3394c4b7de8953,2024-05-17T02:39:49.333000
|
||||
CVE-2024-32700,0,1,caed05a04983af36ff140bfd42f0359a8f0bc1fe1dabbe14d8ce714eb93bd6d4,2024-05-17T09:15:39.783000
|
||||
CVE-2024-32700,0,0,caed05a04983af36ff140bfd42f0359a8f0bc1fe1dabbe14d8ce714eb93bd6d4,2024-05-17T09:15:39.783000
|
||||
CVE-2024-32702,0,0,a51d1cb9ee0b7ca832367fdb4d887937602e0f0784d18168b73c7a071f5fa689,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32706,0,0,9f6db51b735605006291209028eca5f51b85019537d505dd70563bfd14c13c71,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32707,0,0,2f5093e1b05e825471c887dbea123536d43bfdc5a1a93c0402748a653810ca35,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32708,1,1,4e4e029cd58700d1b62a48c8c21a2a6a3df3a84617eef0e4655272fc3262d4f3,2024-05-17T10:15:09.203000
|
||||
CVE-2024-32709,0,0,738cacd65d655b2805f1c4c13fa23300f98e074add5614d4b51ea183dacf392f,2024-04-24T13:39:42.883000
|
||||
CVE-2024-3271,0,0,427448d66ebe59002a93ad233a5fbd2b2253db3687d924fc6f5652a183f66ed0,2024-04-16T13:24:07.103000
|
||||
CVE-2024-32710,0,0,236cf5fb5048c92da0e9da0c7a79872306efe3e5c78f334943a650b31b0ee8be,2024-04-24T13:39:42.883000
|
||||
@ -248591,6 +248594,7 @@ CVE-2024-32717,0,0,6f443988d12986a9c06fca167d1a19877b007bb7d42a9a89d7cd44c11baf8
|
||||
CVE-2024-32718,0,0,ac6094c004934613811f62cb54322c782e73ecaf784adcb8253ff40feadd2cda,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32719,0,0,a757cd3dee2c5a2c91f006c8b07b4c41bfae6de5ace7586315c52f801258eca4,2024-05-14T16:12:23.490000
|
||||
CVE-2024-3272,0,0,53315e6ff0949a2288d2932fc520586215357ee9bd09d7b6961de364b4add901,2024-05-17T02:39:49.447000
|
||||
CVE-2024-32720,1,1,d6e63ea1ff76a38144b2a95d7836e2227448aec29978c00852fd235481f8e19a,2024-05-17T10:15:09.643000
|
||||
CVE-2024-32721,0,0,a2233fe9c4251c9373094548c77926df84a412b40d9b22eb54dd2e4b2b2e5a97,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32722,0,0,48ae26859b2b5b55014d7a0adb8477f1ef5dfb94d230cd27ad810ef0567e4392,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32723,0,0,9cf77ce32aed9923f5362ddd9820f0128e11fb90d86d1e685c774c7fb3a6e464,2024-04-24T13:39:42.883000
|
||||
@ -248620,15 +248624,17 @@ CVE-2024-32764,0,0,bc3d072b957e003e653de0b420ab306da82665736b4d7b512b364e6134049
|
||||
CVE-2024-32766,0,0,7119553a94fda386a48677f0171c3a85e12acf48042d943380d9db048f166a25,2024-04-26T15:32:22.523000
|
||||
CVE-2024-32772,0,0,2d4fb680b13b3176b160b34c5ead370c8635624f7414f557ffce882457014cd9,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32773,0,0,cdf6d9113130bad9f64f16e6cbf7c73f3f39d2ec19b8de9aad6ed1b2402687f3,2024-04-24T17:16:50.397000
|
||||
CVE-2024-32774,1,1,515303420ebe2d03846f01d65b9a3e30f2fb99306ccfc45e051dee94ad54c74d,2024-05-17T10:15:10.020000
|
||||
CVE-2024-32775,0,0,37dedaafb650bebb75327fea5ba2a27c54c577e91b0c51ca0d898dd371b5ccab,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32776,0,0,3fcbab61829e25edd06442f50c9e1a8939f2f6dd040b3c5e00388331603f1a7f,2024-05-14T16:12:23.490000
|
||||
CVE-2024-32780,0,0,66e44fad8bdb872c2274e72c5213a72ef34d54727d02bc1b1f1a1a335313231f,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32781,0,0,0e777347533e2077e1078a0dd7c0d760b6e0f82cc39355f8acadd0fb9da12509,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32782,0,0,9ec78dd5ef99c97e9bd446cd4a5709ed6ac5c37449c7bad3c270185caf860b2d,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32785,0,0,b6060f7f8115223b269269600f9e784cd416198a918cdea5ea6d6623216b8d99,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32786,1,1,b55e633ec6d8223bea83545aa80dfad4f006bc9bfcca15a0836ea6501109dfee,2024-05-17T10:15:10.387000
|
||||
CVE-2024-32788,0,0,40adc8e4342d17d4dd92f3e20596b481f8f7b0b217541f7120bbbb0f8563da80,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32789,0,0,d6d2a0c6913de061e27dd5514b174461b07e3cc5ce6f4242e09febc129eac204,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32790,1,1,53adcc9201afc28cbba891cfdcfa34837770bad8afb9d59d881042dae5e6c958,2024-05-17T09:15:40.023000
|
||||
CVE-2024-32790,0,0,53adcc9201afc28cbba891cfdcfa34837770bad8afb9d59d881042dae5e6c958,2024-05-17T09:15:40.023000
|
||||
CVE-2024-32791,0,0,93d288963714079cbbe2f8f1bb007e9bc98008a2cb8fe490f528dec52fa65b9e,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32793,0,0,0401f7dd95b92b4af3dcee32342e29d30d2d3f61cc7363bc65938bb767c3da36,2024-04-24T17:16:50.397000
|
||||
CVE-2024-32794,0,0,af04326430aa58ca3538b2b06900d7134dad884debf7c66f895129df101dc2a3,2024-04-24T17:16:50.397000
|
||||
@ -248637,10 +248643,12 @@ CVE-2024-32796,0,0,843f023f5500c45cf310f05263a796673694f0181757f7df75501ca87d8b0
|
||||
CVE-2024-3280,0,0,a593231181bad985211047015b79d1b3afd500294c5ded065b21b48713244c73,2024-05-02T13:27:25.103000
|
||||
CVE-2024-32800,0,0,27f6ef88cb441dabf2861e7c91acc4400304ab694f3501f535cc6c00a4616c7e,2024-05-17T06:15:51.670000
|
||||
CVE-2024-32801,0,0,4be65ed820d72048b16cb83f60ce532f34668282312680f5d997e7dd9ae65c7e,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32802,1,1,dda455f9b6af15ad741414e73ad8151560f379e544def5870862bdecba67780d,2024-05-17T10:15:10.690000
|
||||
CVE-2024-32803,0,0,87ef628ed36a01981de6b24a9a46f4b15174f60f02a3679855347999c2d8f373,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32806,0,0,d8037ba4bbb861d02087bc0e815d7d332fc801a9609bcadd59a9397c35ec5a94,2024-04-24T17:16:50.397000
|
||||
CVE-2024-32807,0,0,07a98b86c380183d52da116a62f208fa8e4746a38c50c422cf000209df1624d0,2024-05-06T19:53:38.797000
|
||||
CVE-2024-32807,0,1,8b98e3a6e24cd05e90f910439a7d317947749b7724e6ac17f8b88447230c616a,2024-05-17T10:15:10.997000
|
||||
CVE-2024-32808,0,0,4a82bef92c296d86caf3ed2592cda4e11078b8b017423c1d319584391f5d5ff2,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32809,1,1,dc6c89c57da07c74327652b5ea96cf68d41dea996eee81a63fd7261718962c6b,2024-05-17T10:15:11.183000
|
||||
CVE-2024-3281,0,0,b3c51db3aca3b371ad4faa3c1c4537d2c54d8323123f7ae9b26414cd9ee432a6,2024-04-10T13:24:22.187000
|
||||
CVE-2024-32810,0,0,21d5bc478b6b1dadc923c44303dad9380b4ebf0e9d604a299a3dd25386429d87,2024-05-03T12:48:41.067000
|
||||
CVE-2024-32812,0,0,a6c0140cb5875c5619d43acc5c77a24a0f3ff7202fb936829a583061f4a5590b,2024-04-24T13:39:42.883000
|
||||
@ -248652,9 +248660,11 @@ CVE-2024-32822,0,0,c011242a4753695f6a12d712d4490f93ca7eb5fae16fc890abc140c5e4633
|
||||
CVE-2024-32823,0,0,3cea81c981168df73712e1cbd404f5efa836c789021936f81f7632d48e1a6203,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32825,0,0,004eee12f4f1b22c4e428c7ab0e0229e0137f723f36fa7ab2cf6c1cdf7bdb1bc,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32826,0,0,0d7c35c38998736930e8124de26137dd3edb154046638c71583ab2454604a929,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32827,1,1,163a068cf69896d9af525dd15c5d0d4965f23636bc927cc57229a29c24a8e671,2024-05-17T10:15:11.540000
|
||||
CVE-2024-32828,0,0,e98a289b3626e9e97ee2c25450e252107ac1631ec54c8e821ef6379945d6166a,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32829,0,0,af974fc6efe469e422423920d456ebe47e66f08b752628aef0bab2a184975ddc,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3283,0,0,8b1939d21df3d4399a3bf874e70470053c1a0ae20421841ad51c79aca5727c56,2024-04-10T19:49:51.183000
|
||||
CVE-2024-32830,1,1,029d739ab57eba82888dcf4f7075b2a4a10fae7903fb531fc7272ed42ec706c7,2024-05-17T10:15:11.907000
|
||||
CVE-2024-32831,0,0,8ab7bb59fdb31628ac31fcceca4532da8f99c9b8ba8c2aab35121290c9a986a9,2024-05-03T12:48:41.067000
|
||||
CVE-2024-32833,0,0,75a734274df361ea9a3f6b3015d66d3525b2c570f6f2524ded71781e2b6ac99a,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32834,0,0,d2ed9ea40163afd5f111e44be27b5edfb4cb8a8dd0234c49fdc13943a21fbf2d,2024-04-24T13:39:42.883000
|
||||
@ -248695,7 +248705,9 @@ CVE-2024-32955,0,0,4110c217be7c8e99337e07561aafd3b44e4ea4a473b206cd84ab63a5159eb
|
||||
CVE-2024-32956,0,0,d66d4590ba60a597e1a04a825f1bc4c4665719511bc6e488154ea811617d794b,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32957,0,0,346b5f65dd888f3e9cb1b26dea7ac5e5c32edd9cfc4549cda79654054cc98b7b,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32958,0,0,6e18b56f26294982072f644e4fa58f1addf07815dbbad1f52ebebe6c09cb7d66,2024-04-24T17:16:50.397000
|
||||
CVE-2024-32959,1,1,31a3d57d0317d328141367eecfdd43ef8e1765d3be00cc8d8d82497cfd5fd6b9,2024-05-17T10:15:12.267000
|
||||
CVE-2024-3296,0,0,bcc39314c1e9f6d53aa0ccc8e7e7cac7c279f7f6ee5a27f19287b128ea2ed6c7,2024-04-05T12:15:37.777000
|
||||
CVE-2024-32960,1,1,3aebdbc7a26a49ef23e2c7bf5c60154a02cbe53966e118668b2ce5c9ab871228,2024-05-17T10:15:12.640000
|
||||
CVE-2024-32961,0,0,37957fa4fcdb7f781bae6e07abfae16d232866e70e85a1248b96c2770b0e66b0,2024-04-25T13:18:13.537000
|
||||
CVE-2024-32962,0,0,9c0ea0a6abc34912a3690ea1be79761403687cdc3688c4a5cd52a57ca4e7e47a,2024-05-02T13:27:25.103000
|
||||
CVE-2024-32963,0,0,bfb070d929b50e1ac470143e5291198a6c563dbaaafd6a3fe2b1d05755e4dc76,2024-05-01T13:01:51.263000
|
||||
@ -248901,11 +248913,11 @@ CVE-2024-33542,0,0,5cebfa7c22f12a6aa2675dd4ec6e19e1966575adb9d6e6e73c2f3dcae54db
|
||||
CVE-2024-33544,0,0,6e4ff4d9102a5d0f999b74773217097beffc904dc7d907863d8222867af3d336,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33546,0,0,b169a469c02b39c7428e1081bafd0bce76a92a565897fda0bd0e3619ddaf047f,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33548,0,0,77517ef36052fd5da5d8593285e56cc1fd6d7fc769c21993c4b43685f53c1b16,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33549,1,1,ab00c9c63df8988f01cdfc8fac70f22d07d9bc93b8d289a701e3e1f28b80e122,2024-05-17T09:15:40.490000
|
||||
CVE-2024-33549,0,0,ab00c9c63df8988f01cdfc8fac70f22d07d9bc93b8d289a701e3e1f28b80e122,2024-05-17T09:15:40.490000
|
||||
CVE-2024-3355,0,0,261f5e790bb8ed0cc80994fb2b85557e08f93592b2e3e3daaccf1cfebbaecebd,2024-05-17T02:39:52.060000
|
||||
CVE-2024-33550,1,1,551e8f5cb96189dc7f52a6ba5f753f3e626e8522b896cf522fd6589571fc7080,2024-05-17T09:15:40.983000
|
||||
CVE-2024-33550,0,0,551e8f5cb96189dc7f52a6ba5f753f3e626e8522b896cf522fd6589571fc7080,2024-05-17T09:15:40.983000
|
||||
CVE-2024-33551,0,0,e3c8a7805d48a6724ffde81afa219ca071021e06c31bcfbe95e7eb6246451332,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33552,1,1,5467c8723af46b8dfbc56d5cc5d1cd4193505dfd54f38160e189afba475d3de7,2024-05-17T09:15:41.367000
|
||||
CVE-2024-33552,0,0,5467c8723af46b8dfbc56d5cc5d1cd4193505dfd54f38160e189afba475d3de7,2024-05-17T09:15:41.367000
|
||||
CVE-2024-33553,0,0,a63cd25e668e51ecdb575a6c39c2fdd900060fbc8acd7ddcf7e42aae11fc033a,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33554,0,0,2fa44634a105abf41bf64ae29b253ae6fabbadcb928bf62199eae71c375589ab,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33556,0,0,cbfbe97a91a1c2864ddce4e3678c42d8d804826c74dd78acd5b0ce860fe9ad6e,2024-05-17T07:16:01.450000
|
||||
@ -248914,8 +248926,8 @@ CVE-2024-33559,0,0,7cbd898a0eece080f97fc20fdacdba598f6fa88c2c0ecdd34006e14d646ba
|
||||
CVE-2024-3356,0,0,cd18273ede30de9828727c0da7510b9e37ba44a42d6203a51ac948e77f776d06,2024-05-17T02:39:52.150000
|
||||
CVE-2024-33562,0,0,27fac541d1d64e11476c3268a849af55b6413283c20341e42235e842aff36652,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33566,0,0,46d17e7fcf76ea9cc29b76ef68ee9038fd04b7d980a772b2f399515ebb8e8216,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33567,1,1,47feb3ee11f6ebf89841d0d68bf33919957e1abe08c4d9ae8a754b5f057cbb99,2024-05-17T09:15:41.880000
|
||||
CVE-2024-33569,1,1,d4f3c1a65916402cd610d90020652160590e7bf9ba2a103c033938dc669e4c7d,2024-05-17T09:15:42.353000
|
||||
CVE-2024-33567,0,0,47feb3ee11f6ebf89841d0d68bf33919957e1abe08c4d9ae8a754b5f057cbb99,2024-05-17T09:15:41.880000
|
||||
CVE-2024-33569,0,0,d4f3c1a65916402cd610d90020652160590e7bf9ba2a103c033938dc669e4c7d,2024-05-17T09:15:42.353000
|
||||
CVE-2024-3357,0,0,8e1ce75ce4550715379c40489d32bb9922798f2d408cbe81aaffbd73849bdb5b,2024-05-17T02:39:52.243000
|
||||
CVE-2024-33570,0,0,0537b9c72bfbf1655961ce253b4489c4b95e74d24416659de6615e2bf1c6b703,2024-05-07T13:39:32.710000
|
||||
CVE-2024-33571,0,0,7491ee4b5721aac2bfd880f448bc941e8fa61c24acdbbd5222ab9b2cea79a689,2024-04-29T12:42:03.667000
|
||||
@ -248972,7 +248984,7 @@ CVE-2024-33640,0,0,ed7e429b190ef451efc9bd786e0196ce523a563f6a38e036a809a8aecac0f
|
||||
CVE-2024-33641,0,0,f24e94755262cb27a68f572656a803fa53214f10f589c72b0a1068b18f928c3d,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33642,0,0,7569707402e488c170fb19233ca774daa51c8f856e1cd5f3428c5b203d123531,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33643,0,0,70972ae1315cb72d4765f97de5655f9b5c64ebde5892f83a57087e70dee8ec99,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33644,1,1,16af58a48836a3fdc2fbb4aeaf8272dff23549ad922eb60e8641b23af9b33c0e,2024-05-17T09:15:42.743000
|
||||
CVE-2024-33644,0,0,16af58a48836a3fdc2fbb4aeaf8272dff23549ad922eb60e8641b23af9b33c0e,2024-05-17T09:15:42.743000
|
||||
CVE-2024-33645,0,0,1ee0aba719b8c01b9da473a0c881d95f0dd7128ebcd3af2c29aeb657d57e3778,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33646,0,0,0dde641104af636027863c4b31dcb27b7553e6bc85f77c61a5f8ddcf834bc897,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33647,0,0,932c125a8ad33ec24667d3563b26379825cf17f44df355e8dee7abbeaf343ac1,2024-05-14T19:17:55.627000
|
||||
@ -249097,7 +249109,7 @@ CVE-2024-33913,0,0,695cb40bc8737effb3a7c407ce2fe076821d48f0fe98ab1e6d1e2f56a372b
|
||||
CVE-2024-33914,0,0,f9c3df9ad75c75974cb57549ac9ce67bc517f8180ea8e3d1e0840d044975688d,2024-05-03T12:48:41.067000
|
||||
CVE-2024-33915,0,0,69bef6d280506f84283c6aada6ac2d52f19bf5991c6c26bc45b53ef6cf7f8b37,2024-05-03T12:48:41.067000
|
||||
CVE-2024-33916,0,0,584f4cb59de588f70c533786aa854076453ee5ebfa43fb3811ac3c3d49436e11,2024-05-03T12:48:41.067000
|
||||
CVE-2024-33917,1,1,20941080c0d90802c084cdd344310d6c1a631b368f17cb550c44dc29d205d204,2024-05-17T09:15:43.250000
|
||||
CVE-2024-33917,0,0,20941080c0d90802c084cdd344310d6c1a631b368f17cb550c44dc29d205d204,2024-05-17T09:15:43.250000
|
||||
CVE-2024-33918,0,0,8a56cc68e47191b32a6bc816a6b7c5779ade283341901cb3b3a2eb41cdb13517,2024-05-03T12:48:41.067000
|
||||
CVE-2024-33919,0,0,f5b693752165b3a79b18da05cff2a33a29f840362a7c49911f79648629949684,2024-05-03T12:48:41.067000
|
||||
CVE-2024-33920,0,0,f47f5ba8839ca3704c559cd05c06db651636f4d9ede2c482e8db8719a79dd7bf,2024-05-03T12:48:41.067000
|
||||
@ -249291,7 +249303,7 @@ CVE-2024-34367,0,0,71d4be6198e4635d1e3c7d4a37f4152439ba7ccd61f31e7e76f4c81875c26
|
||||
CVE-2024-34368,0,0,4903b79ce8f618d0b1d0d013639d45a4b6153544dfe155bf918623d214d25e20,2024-05-06T19:53:38.797000
|
||||
CVE-2024-34369,0,0,43ae6e229d2787fd10cd297ec9e349b88579a4bb4535eedd72dead9653248f3c,2024-05-06T19:53:38.797000
|
||||
CVE-2024-3437,0,0,a8455c6ec73ec4b28146267eb8bc8bcebef11156b28339dbc3a0817cad1e2f02,2024-05-17T02:39:56.097000
|
||||
CVE-2024-34370,1,1,566454648a6f3a68eade8c30c6e7b8acaa57968bc1a3824f6b6d6438ba1c296f,2024-05-17T09:15:43.753000
|
||||
CVE-2024-34370,0,0,566454648a6f3a68eade8c30c6e7b8acaa57968bc1a3824f6b6d6438ba1c296f,2024-05-17T09:15:43.753000
|
||||
CVE-2024-34371,0,0,221cb018c67b2ca9bbf34009d8128ce932e1ca2cdc202136c2419b8ed0256afb,2024-05-06T19:53:38.797000
|
||||
CVE-2024-34372,0,0,e4943efa5e4e5fb2e57655cdebc39d5c23b50034b23eb8f2d018eb8338330daf,2024-05-06T19:53:38.797000
|
||||
CVE-2024-34373,0,0,2790768d65511df8c6c270f3cdcd69fb7192c7b009968f3a895ae6cd024342d7,2024-05-06T19:53:38.797000
|
||||
@ -249349,7 +249361,7 @@ CVE-2024-34430,0,0,928e9171c307111a5f1e236e8cf95357b9d4dcc1f5e9b7446df9bb6d83532
|
||||
CVE-2024-34431,0,0,6ae97cdbad9e6308f5d7402a0dfdcd76cf4d325e2e896f480bb0e882ec9137c6,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34432,0,0,70ad33bec17bff33461fb8a9a3d1a67d7de4f956b1cd19b4ef90eb71b276ec81,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34433,0,0,b52f57cfb55035f17aa15cc7a4c35d69b48a8d00e5a3d7b605f9ae6395e94b7f,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34434,1,1,267932d097330120924756049a4b4ba6ecf8a0596225202f2750c14f8a4aa038,2024-05-17T09:15:44.170000
|
||||
CVE-2024-34434,0,0,267932d097330120924756049a4b4ba6ecf8a0596225202f2750c14f8a4aa038,2024-05-17T09:15:44.170000
|
||||
CVE-2024-34436,0,0,c3716eb2461b23b7dc321ab2aa6ac8d637c77aefb4a72ae47551dd8baaa8b926,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34437,0,0,8d7aba2c38c8058526b8adbcbf2690f5ae135dbeadb597e1b7504d962be60a6f,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34439,0,0,42f85bd75318fcafa659103b7afac9d537ea087e1c3ef6497f011d2e09d61190,2024-05-14T16:12:23.490000
|
||||
@ -249474,6 +249486,8 @@ CVE-2024-34749,0,0,a26a9cdaa6b9cdd859ea0f8895bc1e27a45773d0dd4321619e9dcf295b3f2
|
||||
CVE-2024-3475,0,0,e528ec7d5c8727ea0d98d659186b040308d5844df7467319e5b573505cdc6e7c,2024-05-02T13:27:25.103000
|
||||
CVE-2024-34751,0,0,8113ec9d74486529d98525f7f13b459cfebfce76ff832f754e6a9d508547accc,2024-05-16T16:15:08.700000
|
||||
CVE-2024-34752,0,0,d5eaafd0c04f60ffd68a3be927388986ee3a826109615f2edb4cfb305ed53518,2024-05-17T06:15:52.620000
|
||||
CVE-2024-34755,1,1,068b2e99f145dec6c84322de5d1b979faa2246b5a64ec8ba1648a787148db55d,2024-05-17T10:15:12.980000
|
||||
CVE-2024-34756,1,1,d5b0e7868d0d581bb6686b9f77f1755f0e1faea3d03e3cb7c3473393033eb3b3,2024-05-17T10:15:13.283000
|
||||
CVE-2024-34757,0,0,b70f665d63d0f518334b28673643bf4377ad760e7a16d496fda0101eb85360fb,2024-05-17T06:15:52.890000
|
||||
CVE-2024-3476,0,0,8d55e08f53225fd62245e2332fbccfcb740f72480e60e1d515618aab26b24582,2024-05-02T13:27:25.103000
|
||||
CVE-2024-34760,0,0,afb190aff88a84d79459743b17147a23c0824aeab8045f9cd14ac8be6d58a221,2024-05-16T16:15:08.987000
|
||||
@ -249485,7 +249499,10 @@ CVE-2024-3478,0,0,ae882595ac6fe06ab517c1e505d55eeeed4b5c0450cbd6b83825ab78d9e88f
|
||||
CVE-2024-3479,0,0,fd58a9eee7829eb22d6cfb17d87e6b7652b13a6666535069e70c5a2768e8dce6,2024-05-03T15:32:19.637000
|
||||
CVE-2024-3480,0,0,efd268116762f9a268444b69dedc6b75682706697867d3d93c2c71f376810267,2024-05-03T15:32:19.637000
|
||||
CVE-2024-34805,0,0,4381f266dac4260ac9f71061626b0a72f5cc458df63e2282f56c31ed52a5de96,2024-05-16T16:15:09.227000
|
||||
CVE-2024-34806,1,1,e031b6bd8ec80e4004c8d79d15341036b643605c0beee76f93d5c35a7fe90d1e,2024-05-17T10:15:13.597000
|
||||
CVE-2024-34807,1,1,424ac7f0a97c07b7d0e1c14294ab89bdecff275e310a1cb2403366b348bd1238,2024-05-17T10:15:13.900000
|
||||
CVE-2024-34808,0,0,c94c0f4dfde2fa42c19447df026adc3f4ebac591d5e9390064572104e9d07702,2024-05-16T16:15:09.470000
|
||||
CVE-2024-34809,1,1,9d589398b345aa9c75f94ed083ba0c70e421a7f852823d448fed1a1fddbad01e,2024-05-17T10:15:14.260000
|
||||
CVE-2024-3481,0,0,c3f70551c1becffb0a9b407cad9be5595273e7df315c7008e09a7f27bc6e1d73,2024-05-02T13:27:25.103000
|
||||
CVE-2024-34811,0,0,0c99d9ceaba49af4d1f91582399e87d14248824ebd6f05f6e71eac805e738b51,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34812,0,0,8b7fb80033e541126695a114a7e8848676429650f2437ff26c280b51d33eee16,2024-05-14T16:12:23.490000
|
||||
@ -249543,7 +249560,7 @@ CVE-2024-35099,0,0,93e942b92f9cdfe43455da9473fe46e57ccc0e6f1660402d8f3a7786b97c7
|
||||
CVE-2024-35102,0,0,781492c1bcdcbb91cc24f5b5ff3eacf4542faa6544199a3dcb435c0e7da31a06,2024-05-16T13:03:05.353000
|
||||
CVE-2024-35108,0,0,3f3dd71c8bba83e52560608eda839ceb07358fe0eac2940e38801ea6c4f52fe7,2024-05-15T16:40:19.330000
|
||||
CVE-2024-35109,0,0,22ca550b25f858548d0753bd84153c4f353fa8f289d5d5402f105e17ad6c273f,2024-05-15T16:40:19.330000
|
||||
CVE-2024-35110,1,1,561970514a27e439233ec2271fe2c345c99525f46897412b17d06f1ee43a7993,2024-05-17T08:15:06.073000
|
||||
CVE-2024-35110,0,0,561970514a27e439233ec2271fe2c345c99525f46897412b17d06f1ee43a7993,2024-05-17T08:15:06.073000
|
||||
CVE-2024-3512,0,0,7186c9ec3829c2082fd68b5fc8e23caed587fdf0f4e68c2974db5f41b90fb514,2024-04-25T13:15:51.663000
|
||||
CVE-2024-3514,0,0,fd39bbcd0f0890f4d85c4ccfb46694b71dc6efa7f8c56852e1f4fd99d58e20d2,2024-04-24T17:15:47.423000
|
||||
CVE-2024-3515,0,0,5591c01553945d08e143bb397e7b7011721b53594a14b5bacff6fedc69b36f26,2024-04-19T23:15:11.963000
|
||||
@ -249556,6 +249573,8 @@ CVE-2024-3517,0,0,0f60638f190828e04eaf5395050e0e077de3e2fcadeb116eb7a438acde5d10
|
||||
CVE-2024-35170,0,0,1fd20c8c545f1ab27e8d0d5df24af3924cc528ef8b7c75f44f5d735f6f4c749c,2024-05-14T16:11:39.510000
|
||||
CVE-2024-35171,0,0,4de8630e1bf094fb4a1152804e48c3dc58f770e96c7438fb408daec36dac0f26,2024-05-14T16:11:39.510000
|
||||
CVE-2024-35172,0,0,618cb47da87cf9e4af4d56e1768459895814dd5f5800a2fcf0693eda1c64c373,2024-05-14T16:11:39.510000
|
||||
CVE-2024-35173,1,1,0c9510f48e4d4e34c6369fb8a23838b4cf77843f96b6c81d670e8b92ab1d0e74,2024-05-17T11:15:08.947000
|
||||
CVE-2024-35174,1,1,12bf0bec50ea9bb632c3b9e82f63e2342a10bc5fa5f719ab23e2ef82122a767c,2024-05-17T11:15:09.253000
|
||||
CVE-2024-35175,0,0,30316f8adabe4b77ff55cf2c3104d884482b10f6e8ef0ea78ba2a92e169ff280,2024-05-15T16:40:19.330000
|
||||
CVE-2024-35176,0,0,702d5fced493daec69fafab2695ee8f0e739f6614fd9a4e168ee753e65f0ecaa,2024-05-16T16:15:09.707000
|
||||
CVE-2024-35179,0,0,4433fc22ade8274a4e17f50ac56484b62a8701a589dbfa040c3c094fd870b93d,2024-05-15T16:40:19.330000
|
||||
@ -249998,7 +250017,7 @@ CVE-2024-4204,0,0,c27793085a177b89ad62fd90bcfa4d25908eda61d93924765821db7b56e9cb
|
||||
CVE-2024-4208,0,0,011160616b763d0a5081c6e2be131e6e753a26d85dcf1b2bacf647a83ceef05b,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4209,0,0,d8400e0dd8f4909c53290c35079fb7499a08d2e56ed4f79281678d4505414506,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4213,0,0,33db088b2047cab4402e24074b0626ffc423161f2f205cab9408ae51552f548f,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4214,1,1,da5f25a59bcf2b146e5fcebb2af848ec23a84dcef0869b9200d018bd7f3b431c,2024-05-17T09:15:44.610000
|
||||
CVE-2024-4214,0,0,da5f25a59bcf2b146e5fcebb2af848ec23a84dcef0869b9200d018bd7f3b431c,2024-05-17T09:15:44.610000
|
||||
CVE-2024-4215,0,0,0d7dbfaf8275e9ff6c32259712a00cedd32b92104e92991d7893f67c59faf7d0,2024-05-03T12:50:34.250000
|
||||
CVE-2024-4216,0,0,80b76898bbc4459141293c47297450a985b668060a3a6e72db0d9ef898a4d417,2024-05-03T12:50:34.250000
|
||||
CVE-2024-4222,0,0,baaf2be5207361c5cdba494834d7fd0e14922c0bb0c21401ff4dac917c12e3a7,2024-05-16T13:03:05.353000
|
||||
@ -250300,7 +250319,7 @@ CVE-2024-4775,0,0,1dbdcf8cd7d6eb9146fcda6784269901ba3a3cfb7587cea76c3c3abecb31b8
|
||||
CVE-2024-4776,0,0,cd6c647cbede42282cd78da49cd3783e3dd3a165b01ce202e7f86cad7dc18bb8,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4777,0,0,8f39cdbba7da2f5c064a0bd3944496dfb5f1f03424e867e54942092405b4e9a3,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4778,0,0,28b867178e189f0ce62f01d3f79c9a29bf74b9eb95105c5375c5002e0753e846,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4789,1,1,3e6ce45a6e4bfcd45ba131740a062e75bb9a1c1ed981f86130836b3174d46c24,2024-05-17T09:15:45.300000
|
||||
CVE-2024-4789,0,0,3e6ce45a6e4bfcd45ba131740a062e75bb9a1c1ed981f86130836b3174d46c24,2024-05-17T09:15:45.300000
|
||||
CVE-2024-4790,0,0,9ca82e19e832a950283217f2bfd1db7efd6838c8a8bf54a7d78165e2752eb0b9,2024-05-17T02:40:36.990000
|
||||
CVE-2024-4791,0,0,bc4ba581266356fcb662bc273060193bcd7412d6015907e518b3ebb2854be230,2024-05-17T02:40:37.090000
|
||||
CVE-2024-4792,0,0,292b78650d3b1c0c2c4f32d0b3786a9277f0ab4e93adef2b70f1443e82a8bd3d,2024-05-17T02:40:37.183000
|
||||
@ -250406,3 +250425,4 @@ CVE-2024-4992,0,0,504a91a45451c38d9b5beed8f2c88cac747dfe187af29754ed23c5e4839295
|
||||
CVE-2024-4993,0,0,54558f9e3463a1500143cda3bf9ee67127625c6afa1872d34f1d786cf2569f73,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4999,0,0,1bac5cc77e7ceb1bce6c078fbd59e76f5556984ef2124d365e8638bfa6b6fdfa,2024-05-16T15:44:44.683000
|
||||
CVE-2024-5023,0,0,2ec8fb48fc0968e3246f5839b4410c1afc197554db97195a132dae37a74821ca,2024-05-16T19:15:49.953000
|
||||
CVE-2024-5052,1,1,0142f3183db401ea1f9c3f5b751220ca4574e10271128c955fdf36071f9ab94e,2024-05-17T10:15:14.620000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user