mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-05-22T18:00:31.735085+00:00
This commit is contained in:
parent
b8f14ea268
commit
02fd38e17e
55
CVE-2023/CVE-2023-202xx/CVE-2023-20239.json
Normal file
55
CVE-2023/CVE-2023-202xx/CVE-2023-20239.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-20239",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-05-22T17:16:02.760",
|
||||
"lastModified": "2024-05-22T17:16:02.760",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability exists because the web-based management interface does not adequately validate user input. An attacker could exploit this vulnerability by authenticating to the application and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain any data from the database, execute arbitrary commands on the underlying operating system, and elevate privileges to root. To exploit this vulnerability, an attacker would need at least Read Only user credentials."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sqli-WFFDnNOs",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3255",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-09-13T17:15:09.877",
|
||||
"lastModified": "2024-04-30T14:15:08.737",
|
||||
"lastModified": "2024-05-22T17:16:03.847",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -138,6 +138,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2135",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2962",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-3255",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3567",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T16:15:12.990",
|
||||
"lastModified": "2024-04-30T14:15:08.910",
|
||||
"lastModified": "2024-05-22T17:16:04.100",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -220,6 +220,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2394",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2950",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3138",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-3567",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-39189",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-10-09T18:15:10.160",
|
||||
"lastModified": "2024-04-30T14:15:07.967",
|
||||
"lastModified": "2024-05-22T17:16:03.030",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -138,6 +138,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2394",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2950",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3138",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-39189",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-39192",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-10-09T18:15:10.233",
|
||||
"lastModified": "2024-01-11T19:15:09.757",
|
||||
"lastModified": "2024-05-22T17:16:03.250",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -129,6 +129,14 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2950",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3138",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-39192",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-39193",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-10-09T18:15:10.303",
|
||||
"lastModified": "2024-04-30T14:15:08.127",
|
||||
"lastModified": "2024-05-22T17:16:03.400",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -138,6 +138,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2394",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2950",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3138",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-39193",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-39194",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-10-09T18:15:10.367",
|
||||
"lastModified": "2024-04-30T14:15:08.267",
|
||||
"lastModified": "2024-05-22T17:16:03.547",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -168,6 +168,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2394",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2950",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3138",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-39194",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-39198",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-11-09T20:15:08.730",
|
||||
"lastModified": "2024-04-30T14:15:08.383",
|
||||
"lastModified": "2024-05-22T17:16:03.690",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -168,6 +168,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2394",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2950",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3138",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-39198",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4133",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-08-03T15:15:33.940",
|
||||
"lastModified": "2024-04-30T14:15:10.420",
|
||||
"lastModified": "2024-05-22T17:16:05.990",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -134,6 +134,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2394",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2950",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3138",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-4133",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-42754",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-10-05T19:15:11.413",
|
||||
"lastModified": "2024-04-30T14:15:09.100",
|
||||
"lastModified": "2024-05-22T17:16:04.360",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -158,6 +158,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2394",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2950",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3138",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-42754",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-42755",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-10-05T19:15:11.497",
|
||||
"lastModified": "2024-01-11T19:15:11.317",
|
||||
"lastModified": "2024-05-22T17:16:04.537",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -129,6 +129,14 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2950",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3138",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-42755",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-43785",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-10-10T13:15:21.877",
|
||||
"lastModified": "2024-04-30T14:15:09.453",
|
||||
"lastModified": "2024-05-22T17:16:04.760",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -138,6 +138,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2145",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2973",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-43785",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-43786",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-10-10T13:15:22.023",
|
||||
"lastModified": "2024-04-30T14:15:09.613",
|
||||
"lastModified": "2024-05-22T17:16:04.927",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -142,6 +142,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2145",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2973",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-43786",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-43787",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-10-10T13:15:22.083",
|
||||
"lastModified": "2024-04-30T14:15:09.810",
|
||||
"lastModified": "2024-05-22T17:16:05.057",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -142,6 +142,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2145",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2973",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-43787",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-43788",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-10-10T13:15:22.137",
|
||||
"lastModified": "2024-04-30T14:15:09.963",
|
||||
"lastModified": "2024-05-22T17:16:05.223",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -152,6 +152,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2217",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2974",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3022",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-43788",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-43789",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-10-12T12:15:10.710",
|
||||
"lastModified": "2024-04-30T14:15:10.103",
|
||||
"lastModified": "2024-05-22T17:16:05.443",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -142,6 +142,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2217",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2974",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3022",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-43789",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4692",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-10-25T18:17:41.743",
|
||||
"lastModified": "2024-05-03T03:16:02.210",
|
||||
"lastModified": "2024-05-22T17:16:06.140",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -123,6 +123,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2456",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3184",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-4692",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4693",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-10-25T18:17:41.817",
|
||||
"lastModified": "2024-05-03T03:16:02.370",
|
||||
"lastModified": "2024-05-22T17:16:06.530",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -123,6 +123,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2456",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3184",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-4693",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-47038",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-12-18T14:15:08.933",
|
||||
"lastModified": "2024-04-30T14:15:10.257",
|
||||
"lastModified": "2024-05-22T17:16:05.677",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -119,6 +119,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2228",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3128",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-47038",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5088",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-11-03T14:15:08.560",
|
||||
"lastModified": "2024-04-30T14:15:10.953",
|
||||
"lastModified": "2024-05-22T17:16:06.710",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -128,6 +128,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2135",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2962",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-5088",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5367",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-10-25T20:15:18.323",
|
||||
"lastModified": "2024-04-30T14:15:11.280",
|
||||
"lastModified": "2024-05-22T17:16:07.050",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -295,6 +295,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2170",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2995",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2996",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-5367",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5380",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-10-25T20:15:18.503",
|
||||
"lastModified": "2024-04-30T14:15:11.513",
|
||||
"lastModified": "2024-05-22T17:16:07.540",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -190,6 +190,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2298",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2995",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3067",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-5380",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6004",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-03T17:15:11.623",
|
||||
"lastModified": "2024-04-30T15:15:51.593",
|
||||
"lastModified": "2024-05-22T17:16:07.773",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -136,6 +136,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2504",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3233",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-6004",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6121",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-11-16T15:15:11.197",
|
||||
"lastModified": "2024-04-30T14:15:11.823",
|
||||
"lastModified": "2024-05-22T17:16:08.007",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -117,6 +117,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2394",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2950",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3138",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-6121",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6176",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-11-16T18:15:07.483",
|
||||
"lastModified": "2024-04-30T14:15:11.960",
|
||||
"lastModified": "2024-05-22T17:16:08.200",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -116,6 +116,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2394",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2950",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3138",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-6176",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6377",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-12-13T07:15:30.030",
|
||||
"lastModified": "2024-04-30T14:15:12.063",
|
||||
"lastModified": "2024-05-22T17:16:08.530",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -299,6 +299,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2170",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2995",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2996",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-6377",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6478",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-12-13T07:15:31.213",
|
||||
"lastModified": "2024-04-30T14:15:12.263",
|
||||
"lastModified": "2024-05-22T17:16:08.797",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -299,6 +299,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2170",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2995",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2996",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-6478",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6622",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-12-08T18:15:07.163",
|
||||
"lastModified": "2024-04-30T14:15:12.790",
|
||||
"lastModified": "2024-05-22T17:16:09.020",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -143,6 +143,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2394",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2950",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3138",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-6622",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6681",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-02-12T14:15:08.003",
|
||||
"lastModified": "2024-04-18T18:15:08.993",
|
||||
"lastModified": "2024-05-22T17:16:09.207",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,6 +51,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3267",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-6681",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6683",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-12T19:15:11.480",
|
||||
"lastModified": "2024-04-30T14:15:12.930",
|
||||
"lastModified": "2024-05-22T17:16:09.600",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -124,6 +124,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2135",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2962",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-6683",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6693",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-02T10:15:08.930",
|
||||
"lastModified": "2024-03-08T17:57:54.067",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-05-22T17:16:09.817",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -139,6 +139,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2962",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-6693",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6816",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-18T05:15:08.607",
|
||||
"lastModified": "2024-04-30T14:15:13.080",
|
||||
"lastModified": "2024-05-22T17:16:09.970",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -219,6 +219,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2170",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2996",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-6816",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6915",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-15T10:15:26.627",
|
||||
"lastModified": "2024-04-30T14:15:13.277",
|
||||
"lastModified": "2024-05-22T17:16:10.197",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -133,6 +133,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2394",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2950",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3138",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-6915",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6918",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-12-19T00:15:08.460",
|
||||
"lastModified": "2024-04-30T15:15:51.930",
|
||||
"lastModified": "2024-05-22T17:16:10.383",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -141,6 +141,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2504",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3233",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-6918",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-7008",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-12-23T13:15:07.573",
|
||||
"lastModified": "2024-04-30T14:15:13.513",
|
||||
"lastModified": "2024-05-22T17:16:10.830",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -119,6 +119,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2463",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3203",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-7008",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0229",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-02-09T07:16:00.107",
|
||||
"lastModified": "2024-04-30T14:15:13.677",
|
||||
"lastModified": "2024-05-22T17:16:11.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -99,6 +99,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2170",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2995",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2996",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-0229",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0408",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-18T16:15:08.380",
|
||||
"lastModified": "2024-04-30T14:15:13.800",
|
||||
"lastModified": "2024-05-22T17:16:11.160",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -196,6 +196,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2170",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2995",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2996",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-0408",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0409",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-18T16:15:08.593",
|
||||
"lastModified": "2024-04-30T14:15:13.917",
|
||||
"lastModified": "2024-05-22T17:16:11.320",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -196,6 +196,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2170",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2995",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2996",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-0409",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0690",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-02-06T12:15:55.530",
|
||||
"lastModified": "2024-04-30T14:15:14.177",
|
||||
"lastModified": "2024-05-22T17:16:11.487",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -196,6 +196,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2246",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3043",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-0690",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0841",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-28T12:15:52.737",
|
||||
"lastModified": "2024-04-30T14:15:14.350",
|
||||
"lastModified": "2024-05-22T17:16:11.667",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -112,6 +112,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2394",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2950",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3138",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-0841",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1048",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-02-06T18:15:59.250",
|
||||
"lastModified": "2024-04-30T14:15:14.463",
|
||||
"lastModified": "2024-05-22T17:16:11.850",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -145,6 +145,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2456",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3184",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-1048",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1062",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-02-12T13:15:09.210",
|
||||
"lastModified": "2024-03-19T17:15:09.707",
|
||||
"lastModified": "2024-05-22T17:16:12.023",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1372",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3047",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-1062",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1394",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-03-21T13:00:08.037",
|
||||
"lastModified": "2024-04-30T20:15:07.090",
|
||||
"lastModified": "2024-05-22T17:16:12.157",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -123,6 +123,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2569",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3265",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-1394",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1481",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-10T21:15:06.313",
|
||||
"lastModified": "2024-04-30T14:15:14.617",
|
||||
"lastModified": "2024-05-22T17:16:12.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,6 +55,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2147",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3044",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-1481",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1753",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-03-18T15:15:41.170",
|
||||
"lastModified": "2024-05-16T23:15:47.573",
|
||||
"lastModified": "2024-05-22T17:16:12.620",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -111,6 +111,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2784",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3254",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-1753",
|
||||
"source": "secalert@redhat.com"
|
||||
|
55
CVE-2024/CVE-2024-202xx/CVE-2024-20261.json
Normal file
55
CVE-2024/CVE-2024-202xx/CVE-2024-20261.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-20261",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-05-22T17:16:12.873",
|
||||
"lastModified": "2024-05-22T17:16:12.873",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the file policy feature that is used to inspect encrypted archive files of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured file policy to block an encrypted archive file. This vulnerability exists because of a logic error when a specific class of encrypted archive files is inspected. An attacker could exploit this vulnerability by sending a crafted, encrypted archive file through the affected device. A successful exploit could allow the attacker to send an encrypted archive file, which could contain malware and should have been blocked and dropped at the Cisco FTD device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-archive-bypass-z4wQjwcN",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-202xx/CVE-2024-20293.json
Normal file
55
CVE-2024/CVE-2024-202xx/CVE-2024-20293.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-20293",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-05-22T17:16:13.167",
|
||||
"lastModified": "2024-05-22T17:16:13.167",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the activation of an access control list (ACL) on Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the protection that is offered by a configured ACL on an affected device. This vulnerability is due to a logic error that occurs when an ACL changes from inactive to active in the running configuration of an affected device. An attacker could exploit this vulnerability by sending traffic through the affected device that should be denied by the configured ACL. The reverse condition is also true\u2014traffic that should be permitted could be denied by the configured ACL. A successful exploit could allow the attacker to bypass configured ACL protections on the affected device, allowing the attacker to access trusted networks that the device might be protecting. Note: This vulnerability applies to both IPv4 and IPv6 traffic as well as dual-stack ACL configurations in which both IPv4 and IPv6 ACLs are configured on an interface."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-436"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ogsnsg-aclbyp-3XB8q6jX",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20355.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20355.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-20355",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-05-22T17:16:13.477",
|
||||
"lastModified": "2024-05-22T17:16:13.477",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the implementation of SAML 2.0 single sign-on (SSO) for remote access VPN services in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to successfully establish a VPN session on an affected device. This vulnerability is due to improper separation of authorization domains when using SAML authentication. An attacker could exploit this vulnerability by using valid credentials to successfully authenticate using their designated connection profile (tunnel group), intercepting the SAML SSO token that is sent back from the Cisco ASA device, and then submitting the same SAML SSO token to a different tunnel group for authentication. A successful exploit could allow the attacker to establish a remote access VPN session using a connection profile that they are not authorized to use and connect to secured networks behind the affected device that they are not authorized to access. For successful exploitation, the attacker must have valid remote access VPN user credentials."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-saml-bypass-KkNvXyKW",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20361.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20361.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-20361",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-05-22T17:16:13.733",
|
||||
"lastModified": "2024-05-22T17:16:13.733",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the Object Groups for Access Control Lists (ACLs) feature of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass configured access controls on managed devices that are running Cisco Firepower Threat Defense (FTD) Software. This vulnerability is due to the incorrect deployment of the Object Groups for ACLs feature from Cisco FMC Software to managed FTD devices in high-availability setups. After an affected device is rebooted following Object Groups for ACLs deployment, an attacker can exploit this vulnerability by sending traffic through the affected device. A successful exploit could allow the attacker to bypass configured access controls and successfully send traffic to devices that are expected to be protected by the affected device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-264"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-object-bypass-fTH8tDjq",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20363.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20363.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-20363",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-05-22T17:16:13.950",
|
||||
"lastModified": "2024-05-22T17:16:13.950",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple Cisco products are affected by a vulnerability in the Snort Intrusion Prevention System (IPS) rule engine that could allow an unauthenticated, remote attacker to bypass the configured rules on an affected system. This vulnerability is due to incorrect HTTP packet handling. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass configured IPS rules and allow uninspected traffic onto the network."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-ips-bypass-uE69KBMd",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21885",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-02-28T13:15:08.197",
|
||||
"lastModified": "2024-05-03T13:15:21.410",
|
||||
"lastModified": "2024-05-22T17:16:14.187",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -99,6 +99,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2170",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2995",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2996",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-21885",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21886",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-02-28T13:15:08.440",
|
||||
"lastModified": "2024-04-30T14:15:14.867",
|
||||
"lastModified": "2024-05-22T17:16:14.343",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -99,6 +99,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2170",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2995",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2996",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-21886",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-2307",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-03-19T17:15:12.520",
|
||||
"lastModified": "2024-04-30T14:15:15.160",
|
||||
"lastModified": "2024-05-22T17:16:14.610",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,6 +55,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2119",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2961",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-2307",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-2494",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-03-21T14:15:10.350",
|
||||
"lastModified": "2024-04-30T20:15:08.067",
|
||||
"lastModified": "2024-05-22T17:16:14.740",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,6 +55,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2560",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3253",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-2494",
|
||||
"source": "secalert@redhat.com"
|
||||
|
20
CVE-2024/CVE-2024-293xx/CVE-2024-29392.json
Normal file
20
CVE-2024/CVE-2024-293xx/CVE-2024-29392.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29392",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-22T16:15:09.590",
|
||||
"lastModified": "2024-05-22T16:15:09.590",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Silverpeas Core 6.3 is vulnerable to Cross Site Scripting (XSS) via ClipboardSessionController."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/phulelouch/48ee63a7c46078574f3b3dc9a739052c",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-2912",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-04-16T00:15:11.427",
|
||||
"lastModified": "2024-04-16T13:24:07.103",
|
||||
"lastModified": "2024-05-22T16:15:09.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,26 +15,26 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-3019",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-03-28T19:15:49.160",
|
||||
"lastModified": "2024-04-30T20:15:08.733",
|
||||
"lastModified": "2024-05-22T17:16:15.600",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,6 +55,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2566",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3264",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-3019",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-31080",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-04T14:15:10.330",
|
||||
"lastModified": "2024-05-01T18:15:22.810",
|
||||
"lastModified": "2024-05-22T17:16:14.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -99,6 +99,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2616",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3258",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3261",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-31080",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-31081",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-04T14:15:10.593",
|
||||
"lastModified": "2024-05-01T18:15:22.920",
|
||||
"lastModified": "2024-05-22T17:16:15.070",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -99,6 +99,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2616",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3258",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3261",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-31081",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-31083",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-05T12:15:37.577",
|
||||
"lastModified": "2024-05-01T18:15:23.127",
|
||||
"lastModified": "2024-05-22T17:16:15.223",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -99,6 +99,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2616",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3258",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3261",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-31083",
|
||||
"source": "secalert@redhat.com"
|
||||
|
20
CVE-2024/CVE-2024-332xx/CVE-2024-33222.json
Normal file
20
CVE-2024/CVE-2024-332xx/CVE-2024-33222.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-33222",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-22T16:15:09.960",
|
||||
"lastModified": "2024-05-22T16:15:09.960",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the component ATSZIO64.sys of ASUSTeK Computer Inc ASUS ATSZIO Driver v0.2.1.7 allows attackers to escalate privileges and execute arbitrary code via sending crafted IOCTL requests."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33222",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-332xx/CVE-2024-33223.json
Normal file
20
CVE-2024/CVE-2024-332xx/CVE-2024-33223.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-33223",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-22T16:15:10.043",
|
||||
"lastModified": "2024-05-22T16:15:10.043",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the component IOMap64.sys of ASUSTeK Computer Inc ASUS GPU TweakII v1.4.5.2 allows attackers to escalate privileges and execute arbitrary code via sending crafted IOCTL requests."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33223",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-332xx/CVE-2024-33224.json
Normal file
20
CVE-2024/CVE-2024-332xx/CVE-2024-33224.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-33224",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-22T16:15:10.140",
|
||||
"lastModified": "2024-05-22T16:15:10.140",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the component rtkio64.sys of Realtek Semiconductor Corp Realtek lO Driver v1.008.0823.2017 allows attackers to escalate privileges and execute arbitrary code via sending crafted IOCTL requests."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33224",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-332xx/CVE-2024-33225.json
Normal file
20
CVE-2024/CVE-2024-332xx/CVE-2024-33225.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-33225",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-22T16:15:10.220",
|
||||
"lastModified": "2024-05-22T16:15:10.220",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the component RTKVHD64.sys of Realtek Semiconductor Corp Realtek(r) High Definition Audio Function Driver v6.0.9549.1 allows attackers to escalate privileges and execute arbitrary code via sending crafted IOCTL requests."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33225",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-332xx/CVE-2024-33226.json
Normal file
20
CVE-2024/CVE-2024-332xx/CVE-2024-33226.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-33226",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-22T16:15:10.317",
|
||||
"lastModified": "2024-05-22T16:15:10.317",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the component Access64.sys of Wistron Corporation TBT Force Power Control v1.0.0.0 allows attackers to escalate privileges and execute arbitrary code via sending crafted IOCTL requests."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33226",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-332xx/CVE-2024-33227.json
Normal file
20
CVE-2024/CVE-2024-332xx/CVE-2024-33227.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-33227",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-22T16:15:10.403",
|
||||
"lastModified": "2024-05-22T16:15:10.403",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the component ddcdrv.sys of Nicomsoft WinI2C/DDC v3.7.4.0 allows attackers to escalate privileges and execute arbitrary code via sending crafted IOCTL requests."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33227",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-332xx/CVE-2024-33228.json
Normal file
20
CVE-2024/CVE-2024-332xx/CVE-2024-33228.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-33228",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-22T16:15:10.490",
|
||||
"lastModified": "2024-05-22T16:15:10.490",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the component segwindrvx64.sys of Insyde Software Corp SEG Windows Driver v100.00.07.02 allows attackers to escalate privileges and execute arbitrary code via sending crafted IOCTL requests."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33228",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-344xx/CVE-2024-34448.json
Normal file
20
CVE-2024/CVE-2024-344xx/CVE-2024-34448.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-34448",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-22T16:15:10.580",
|
||||
"lastModified": "2024-05-22T16:15:10.580",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Ghost before 5.82.0 allows CSV Injection during a member CSV export."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/phulelouch/CVEs/blob/main/CVE-2024-34448.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-353xx/CVE-2024-35362.json
Normal file
20
CVE-2024/CVE-2024-353xx/CVE-2024-35362.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-35362",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-22T16:15:10.687",
|
||||
"lastModified": "2024-05-22T16:15:10.687",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Ecshop 3.6 is vulnerable to Cross Site Scripting (XSS) via ecshop/article_cat.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/shopex/ecshop/issues/6",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,24 @@
|
||||
"id": "CVE-2024-36050",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-18T22:15:07.460",
|
||||
"lastModified": "2024-05-20T13:00:04.957",
|
||||
"lastModified": "2024-05-22T16:15:10.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nix through 2.22.1 mishandles certain usage of hash caches, which makes it easier for attackers to replace current source code with attacker-controlled source code by luring a maintainer into accepting a malicious pull request."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Nix hasta 2.22.1 maneja mal cierto uso de cach\u00e9s hash, lo que facilita que los atacantes reemplacen el c\u00f3digo fuente actual con c\u00f3digo fuente controlado por el atacante al atraer a un mantenedor para que acepte una solicitud de extracci\u00f3n maliciosa."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://discourse.nixos.org/t/nixpkgs-supply-chain-security-project/34345",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/NixOS/nix/issues/969",
|
||||
"source": "cve@mitre.org"
|
||||
|
43
CVE-2024/CVE-2024-360xx/CVE-2024-36077.json
Normal file
43
CVE-2024/CVE-2024-360xx/CVE-2024-36077.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2024-36077",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-22T17:16:15.377",
|
||||
"lastModified": "2024-05-22T17:16:15.377",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Qlik Sense Enterprise for Windows before 14.187.4 allows a remote attacker to elevate their privilege due to improper validation. The attacker can elevate their privilege to the internal system role, which allows them to execute commands on the server. This affects February 2024 Patch 3 (14.173.3 through 14.173.7), November 2023 Patch 8 (14.159.4 through 14.159.13), August 2023 Patch 13 (14.139.3 through 14.139.20), May 2023 Patch 15 (14.129.3 through 14.129.22), February 2023 Patch 13 (14.113.1 through 14.113.18), November 2022 Patch 13 (14.97.2 through 14.97.18), August 2022 Patch 16 (14.78.3 through 14.78.23), and May 2022 Patch 17 (14.67.7 through 14.67.31). This has been fixed in May 2024 (14.187.4), February 2024 Patch 4 (14.173.8), November 2023 Patch 9 (14.159.14), August 2023 Patch 14 (14.139.21), May 2023 Patch 16 (14.129.23), February 2023 Patch 14 (14.113.19), November 2022 Patch 14 (14.97.19), August 2022 Patch 17 (14.78.25), and May 2022 Patch 18 (14.67.34)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.qlik.com/t5/Official-Support-Articles/High-Severity-Security-fixes-for-Qlik-Sense-Enterprise-for/ta-p/2452509",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-45xx/CVE-2024-4563.json
Normal file
59
CVE-2024/CVE-2024-45xx/CVE-2024-4563.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-4563",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-05-22T17:16:15.730",
|
||||
"lastModified": "2024-05-22T17:16:15.730",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Progress MOVEit Automation configuration export function prior to 2024.0.1 uses a cryptographic method with insufficient bit length."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-327"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/MOVEit-Automation-Vulnerability-CVE-2024-4563-May-22-2024",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.progress.com/moveit",
|
||||
"source": "security@progress.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-51xx/CVE-2024-5157.json
Normal file
24
CVE-2024/CVE-2024-51xx/CVE-2024-5157.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-5157",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-05-22T16:15:10.863",
|
||||
"lastModified": "2024-05-22T16:15:10.863",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use after free in Scheduling in Google Chrome prior to 125.0.6422.76 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/336012573",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-51xx/CVE-2024-5158.json
Normal file
24
CVE-2024/CVE-2024-51xx/CVE-2024-5158.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-5158",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-05-22T16:15:10.947",
|
||||
"lastModified": "2024-05-22T16:15:10.947",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Type Confusion in V8 in Google Chrome prior to 125.0.6422.76 allowed a remote attacker to potentially perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/338908243",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-51xx/CVE-2024-5159.json
Normal file
24
CVE-2024/CVE-2024-51xx/CVE-2024-5159.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-5159",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-05-22T16:15:11.013",
|
||||
"lastModified": "2024-05-22T16:15:11.013",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Heap buffer overflow in ANGLE in Google Chrome prior to 125.0.6422.76 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/335613092",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-51xx/CVE-2024-5160.json
Normal file
24
CVE-2024/CVE-2024-51xx/CVE-2024-5160.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-5160",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-05-22T16:15:11.087",
|
||||
"lastModified": "2024-05-22T16:15:11.087",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Heap buffer overflow in Dawn in Google Chrome prior to 125.0.6422.76 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/338161969",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-51xx/CVE-2024-5166.json
Normal file
55
CVE-2024/CVE-2024-51xx/CVE-2024-5166.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-5166",
|
||||
"sourceIdentifier": "cve-coordination@google.com",
|
||||
"published": "2024-05-22T17:16:15.957",
|
||||
"lastModified": "2024-05-22T17:16:15.957",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Insecure Direct Object Reference in Google Cloud's Looker allowed metadata exposure across authenticated Looker users sharing the same LookML model."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@google.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@google.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cloud.google.com/looker/docs/best-practices/query-id-update-instructions",
|
||||
"source": "cve-coordination@google.com"
|
||||
}
|
||||
]
|
||||
}
|
78
README.md
78
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-05-22T16:00:48.870660+00:00
|
||||
2024-05-22T18:00:31.735085+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-05-22T15:15:28.967000+00:00
|
||||
2024-05-22T17:16:15.957000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,39 +33,67 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
251467
|
||||
251490
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `19`
|
||||
Recently added CVEs: `23`
|
||||
|
||||
- [CVE-2024-33218](CVE-2024/CVE-2024-332xx/CVE-2024-33218.json) (`2024-05-22T15:15:28.550`)
|
||||
- [CVE-2024-33219](CVE-2024/CVE-2024-332xx/CVE-2024-33219.json) (`2024-05-22T15:15:28.680`)
|
||||
- [CVE-2024-33220](CVE-2024/CVE-2024-332xx/CVE-2024-33220.json) (`2024-05-22T15:15:28.780`)
|
||||
- [CVE-2024-33221](CVE-2024/CVE-2024-332xx/CVE-2024-33221.json) (`2024-05-22T15:15:28.870`)
|
||||
- [CVE-2024-35409](CVE-2024/CVE-2024-354xx/CVE-2024-35409.json) (`2024-05-22T14:15:08.760`)
|
||||
- [CVE-2024-35475](CVE-2024/CVE-2024-354xx/CVE-2024-35475.json) (`2024-05-22T14:15:08.860`)
|
||||
- [CVE-2024-35550](CVE-2024/CVE-2024-355xx/CVE-2024-35550.json) (`2024-05-22T14:15:08.947`)
|
||||
- [CVE-2024-35551](CVE-2024/CVE-2024-355xx/CVE-2024-35551.json) (`2024-05-22T14:15:09.040`)
|
||||
- [CVE-2024-35552](CVE-2024/CVE-2024-355xx/CVE-2024-35552.json) (`2024-05-22T14:15:09.133`)
|
||||
- [CVE-2024-35553](CVE-2024/CVE-2024-355xx/CVE-2024-35553.json) (`2024-05-22T14:15:09.223`)
|
||||
- [CVE-2024-35554](CVE-2024/CVE-2024-355xx/CVE-2024-35554.json) (`2024-05-22T14:15:09.307`)
|
||||
- [CVE-2024-35555](CVE-2024/CVE-2024-355xx/CVE-2024-35555.json) (`2024-05-22T14:15:09.390`)
|
||||
- [CVE-2024-35556](CVE-2024/CVE-2024-355xx/CVE-2024-35556.json) (`2024-05-22T14:15:09.467`)
|
||||
- [CVE-2024-35557](CVE-2024/CVE-2024-355xx/CVE-2024-35557.json) (`2024-05-22T14:15:09.563`)
|
||||
- [CVE-2024-35558](CVE-2024/CVE-2024-355xx/CVE-2024-35558.json) (`2024-05-22T14:15:09.653`)
|
||||
- [CVE-2024-35559](CVE-2024/CVE-2024-355xx/CVE-2024-35559.json) (`2024-05-22T14:15:09.750`)
|
||||
- [CVE-2024-35560](CVE-2024/CVE-2024-355xx/CVE-2024-35560.json) (`2024-05-22T14:15:09.833`)
|
||||
- [CVE-2024-35561](CVE-2024/CVE-2024-355xx/CVE-2024-35561.json) (`2024-05-22T14:15:09.917`)
|
||||
- [CVE-2024-3926](CVE-2024/CVE-2024-39xx/CVE-2024-3926.json) (`2024-05-22T15:15:28.967`)
|
||||
- [CVE-2023-20239](CVE-2023/CVE-2023-202xx/CVE-2023-20239.json) (`2024-05-22T17:16:02.760`)
|
||||
- [CVE-2024-20261](CVE-2024/CVE-2024-202xx/CVE-2024-20261.json) (`2024-05-22T17:16:12.873`)
|
||||
- [CVE-2024-20293](CVE-2024/CVE-2024-202xx/CVE-2024-20293.json) (`2024-05-22T17:16:13.167`)
|
||||
- [CVE-2024-20355](CVE-2024/CVE-2024-203xx/CVE-2024-20355.json) (`2024-05-22T17:16:13.477`)
|
||||
- [CVE-2024-20361](CVE-2024/CVE-2024-203xx/CVE-2024-20361.json) (`2024-05-22T17:16:13.733`)
|
||||
- [CVE-2024-20363](CVE-2024/CVE-2024-203xx/CVE-2024-20363.json) (`2024-05-22T17:16:13.950`)
|
||||
- [CVE-2024-29392](CVE-2024/CVE-2024-293xx/CVE-2024-29392.json) (`2024-05-22T16:15:09.590`)
|
||||
- [CVE-2024-33222](CVE-2024/CVE-2024-332xx/CVE-2024-33222.json) (`2024-05-22T16:15:09.960`)
|
||||
- [CVE-2024-33223](CVE-2024/CVE-2024-332xx/CVE-2024-33223.json) (`2024-05-22T16:15:10.043`)
|
||||
- [CVE-2024-33224](CVE-2024/CVE-2024-332xx/CVE-2024-33224.json) (`2024-05-22T16:15:10.140`)
|
||||
- [CVE-2024-33225](CVE-2024/CVE-2024-332xx/CVE-2024-33225.json) (`2024-05-22T16:15:10.220`)
|
||||
- [CVE-2024-33226](CVE-2024/CVE-2024-332xx/CVE-2024-33226.json) (`2024-05-22T16:15:10.317`)
|
||||
- [CVE-2024-33227](CVE-2024/CVE-2024-332xx/CVE-2024-33227.json) (`2024-05-22T16:15:10.403`)
|
||||
- [CVE-2024-33228](CVE-2024/CVE-2024-332xx/CVE-2024-33228.json) (`2024-05-22T16:15:10.490`)
|
||||
- [CVE-2024-34448](CVE-2024/CVE-2024-344xx/CVE-2024-34448.json) (`2024-05-22T16:15:10.580`)
|
||||
- [CVE-2024-35362](CVE-2024/CVE-2024-353xx/CVE-2024-35362.json) (`2024-05-22T16:15:10.687`)
|
||||
- [CVE-2024-36077](CVE-2024/CVE-2024-360xx/CVE-2024-36077.json) (`2024-05-22T17:16:15.377`)
|
||||
- [CVE-2024-4563](CVE-2024/CVE-2024-45xx/CVE-2024-4563.json) (`2024-05-22T17:16:15.730`)
|
||||
- [CVE-2024-5157](CVE-2024/CVE-2024-51xx/CVE-2024-5157.json) (`2024-05-22T16:15:10.863`)
|
||||
- [CVE-2024-5158](CVE-2024/CVE-2024-51xx/CVE-2024-5158.json) (`2024-05-22T16:15:10.947`)
|
||||
- [CVE-2024-5159](CVE-2024/CVE-2024-51xx/CVE-2024-5159.json) (`2024-05-22T16:15:11.013`)
|
||||
- [CVE-2024-5160](CVE-2024/CVE-2024-51xx/CVE-2024-5160.json) (`2024-05-22T16:15:11.087`)
|
||||
- [CVE-2024-5166](CVE-2024/CVE-2024-51xx/CVE-2024-5166.json) (`2024-05-22T17:16:15.957`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `54`
|
||||
|
||||
- [CVE-2024-4261](CVE-2024/CVE-2024-42xx/CVE-2024-4261.json) (`2024-05-22T14:30:41.953`)
|
||||
- [CVE-2023-6693](CVE-2023/CVE-2023-66xx/CVE-2023-6693.json) (`2024-05-22T17:16:09.817`)
|
||||
- [CVE-2023-6816](CVE-2023/CVE-2023-68xx/CVE-2023-6816.json) (`2024-05-22T17:16:09.970`)
|
||||
- [CVE-2023-6915](CVE-2023/CVE-2023-69xx/CVE-2023-6915.json) (`2024-05-22T17:16:10.197`)
|
||||
- [CVE-2023-6918](CVE-2023/CVE-2023-69xx/CVE-2023-6918.json) (`2024-05-22T17:16:10.383`)
|
||||
- [CVE-2023-7008](CVE-2023/CVE-2023-70xx/CVE-2023-7008.json) (`2024-05-22T17:16:10.830`)
|
||||
- [CVE-2024-0229](CVE-2024/CVE-2024-02xx/CVE-2024-0229.json) (`2024-05-22T17:16:11.003`)
|
||||
- [CVE-2024-0408](CVE-2024/CVE-2024-04xx/CVE-2024-0408.json) (`2024-05-22T17:16:11.160`)
|
||||
- [CVE-2024-0409](CVE-2024/CVE-2024-04xx/CVE-2024-0409.json) (`2024-05-22T17:16:11.320`)
|
||||
- [CVE-2024-0690](CVE-2024/CVE-2024-06xx/CVE-2024-0690.json) (`2024-05-22T17:16:11.487`)
|
||||
- [CVE-2024-0841](CVE-2024/CVE-2024-08xx/CVE-2024-0841.json) (`2024-05-22T17:16:11.667`)
|
||||
- [CVE-2024-1048](CVE-2024/CVE-2024-10xx/CVE-2024-1048.json) (`2024-05-22T17:16:11.850`)
|
||||
- [CVE-2024-1062](CVE-2024/CVE-2024-10xx/CVE-2024-1062.json) (`2024-05-22T17:16:12.023`)
|
||||
- [CVE-2024-1394](CVE-2024/CVE-2024-13xx/CVE-2024-1394.json) (`2024-05-22T17:16:12.157`)
|
||||
- [CVE-2024-1481](CVE-2024/CVE-2024-14xx/CVE-2024-1481.json) (`2024-05-22T17:16:12.480`)
|
||||
- [CVE-2024-1753](CVE-2024/CVE-2024-17xx/CVE-2024-1753.json) (`2024-05-22T17:16:12.620`)
|
||||
- [CVE-2024-21885](CVE-2024/CVE-2024-218xx/CVE-2024-21885.json) (`2024-05-22T17:16:14.187`)
|
||||
- [CVE-2024-21886](CVE-2024/CVE-2024-218xx/CVE-2024-21886.json) (`2024-05-22T17:16:14.343`)
|
||||
- [CVE-2024-2307](CVE-2024/CVE-2024-23xx/CVE-2024-2307.json) (`2024-05-22T17:16:14.610`)
|
||||
- [CVE-2024-2494](CVE-2024/CVE-2024-24xx/CVE-2024-2494.json) (`2024-05-22T17:16:14.740`)
|
||||
- [CVE-2024-2912](CVE-2024/CVE-2024-29xx/CVE-2024-2912.json) (`2024-05-22T16:15:09.713`)
|
||||
- [CVE-2024-3019](CVE-2024/CVE-2024-30xx/CVE-2024-3019.json) (`2024-05-22T17:16:15.600`)
|
||||
- [CVE-2024-31080](CVE-2024/CVE-2024-310xx/CVE-2024-31080.json) (`2024-05-22T17:16:14.877`)
|
||||
- [CVE-2024-31081](CVE-2024/CVE-2024-310xx/CVE-2024-31081.json) (`2024-05-22T17:16:15.070`)
|
||||
- [CVE-2024-31083](CVE-2024/CVE-2024-310xx/CVE-2024-31083.json) (`2024-05-22T17:16:15.223`)
|
||||
- [CVE-2024-36050](CVE-2024/CVE-2024-360xx/CVE-2024-36050.json) (`2024-05-22T16:15:10.777`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
171
_state.csv
171
_state.csv
@ -214169,6 +214169,7 @@ CVE-2023-20235,0,0,5dba974f1c210cf2a03787c3d3e9c441feee75819526969b64e2f4a80cd00
|
||||
CVE-2023-20236,0,0,c6a29bb276fa53045a1d5dbdcd5f535a774cb8c2b4a2da6d6d6378ae41d08dd7,2024-01-25T17:15:39.850000
|
||||
CVE-2023-20237,0,0,f975d459d3015a3f408e596ac215a6d75cfb23fa7b1171a2fa054590faa43dfe,2024-01-25T17:15:39.970000
|
||||
CVE-2023-20238,0,0,79a23b4efc590566cd58d4cbff45d13d4f3db09516083d401270e6b9d775efcf,2024-01-25T17:15:40.067000
|
||||
CVE-2023-20239,1,1,10e4a140a3ffae749ab815dfde5493ff244c0f4f1fc28bfae49c110261f5f26c,2024-05-22T17:16:02.760000
|
||||
CVE-2023-2024,0,0,a3df09772ebf731a0c1b5b6db5674d9bb51b9794a600088bf32d2d3c6a061d68,2023-05-25T18:10:24.590000
|
||||
CVE-2023-20240,0,0,015a0e0281847d8e48d2582559aafcb4c3d1269bf49b1b0162dcef443724c650,2024-01-25T17:15:40.187000
|
||||
CVE-2023-20241,0,0,96357ec1544a3578befd4c4e9e8f2d0182f6d55009c374e33215ccb07ff2801f,2024-01-25T17:15:40.280000
|
||||
@ -223915,7 +223916,7 @@ CVE-2023-32546,0,0,665d9129e0e347a36e749da4b8d53e8bebd7d18c176bac364a888746ede56
|
||||
CVE-2023-32547,0,0,06f6f48ba9323f321263234c84a342e6bff123cf62eb73f242befaa147422a4d,2023-11-07T04:14:35.013000
|
||||
CVE-2023-32548,0,0,a16e449d1f0bab46f0011d17490cd9aa4edd258373182d8bc0003ead78f7cd26,2023-06-21T18:01:26.320000
|
||||
CVE-2023-32549,0,0,86a621d5357840ed31a1d879e4de53834177e0a1427934485b2e0348417930c0,2023-06-16T18:03:12.987000
|
||||
CVE-2023-3255,0,0,85a054c3b8635aa99adcfd54182dba30b288bc91cb3f459bac6bec6bd79db216,2024-04-30T14:15:08.737000
|
||||
CVE-2023-3255,0,1,41fbcfb37dfa4c3b0834a65b73f30ce055a932467de10dca9baf3922a75dd346,2024-05-22T17:16:03.847000
|
||||
CVE-2023-32550,0,0,47b738e17a288cb4c22f721e6228054b9c9ae5787190e4fdd06eabb94672e12c,2023-06-15T12:17:00.833000
|
||||
CVE-2023-32551,0,0,443d57cf76d9105e4d639feced6c3947a5914e87298af0ebd678126fc0260ea5,2023-06-14T19:58:43.870000
|
||||
CVE-2023-32552,0,0,c3efda43b57ed64d2444cdff522a34d5bf3dff3337343cab12c1ac5e1f55bad5,2023-06-30T14:36:57.970000
|
||||
@ -226065,7 +226066,7 @@ CVE-2023-35666,0,0,53fa5681a0ffd4f59577e321c9410c7e5c2bb36ad17096381f39ddae0e721
|
||||
CVE-2023-35667,0,0,1c033222b158ae4bfaf73076cfaae21a04b2d6372df4adf4783a5885d7c2cd7a,2023-09-14T01:46:29.760000
|
||||
CVE-2023-35668,0,0,152170c25c110ac8137118a45ed07c046e2b901f1120a358bb320b69ac5d58c3,2023-12-22T01:15:09.230000
|
||||
CVE-2023-35669,0,0,68be5bf79f120c4e9467b3b3c6e735f50946ac3e32ea6ef719c6fcc01bdb09c1,2023-09-14T01:44:54.843000
|
||||
CVE-2023-3567,0,0,b2e879bb0f24ad81ed20956c07c02005b8d19b19b423307ee5a97c28b160dd15,2024-04-30T14:15:08.910000
|
||||
CVE-2023-3567,0,1,8090a8eff6f1a2b13664851d268d60669adfce2de258f4fe81539ec3e2ac0fba,2024-05-22T17:16:04.100000
|
||||
CVE-2023-35670,0,0,a042d6a6876adc683c79cb8f4e4baa9db950394328ac85f0895d8df7979da623,2023-09-14T01:41:38.713000
|
||||
CVE-2023-35671,0,0,2a653a31122a5fd2273cb2f89fde48d9318d783ed7eccb38896aca4325dd9a45,2023-09-14T01:31:36.297000
|
||||
CVE-2023-35673,0,0,20cb8331c4dc96079ba50ec513083126d41fdfb7ad25179cd0b222550fb1546d,2023-09-14T01:30:16.627000
|
||||
@ -228814,16 +228815,16 @@ CVE-2023-39185,0,0,28d9e19d33b0612e6e1ec860671c81ccf79cecce7e8d83a122e0416b3cd59
|
||||
CVE-2023-39186,0,0,6065cf87db3e22b7d63940f29e199d5ffb7c987544541ffdfe424581268b20c3,2023-08-10T15:48:42.793000
|
||||
CVE-2023-39187,0,0,b5d43a8b88bfca7a0386931fe0fbd6997124e465c659e19e6be7d838ab432971,2023-08-10T15:49:15.690000
|
||||
CVE-2023-39188,0,0,6c54311338150c35e8e9bbe4de9d416872b6c20b983f4fb43db032f2228b72f7,2023-08-10T15:29:47.423000
|
||||
CVE-2023-39189,0,0,36b25b5f042a6cf9b10b3df62fefb4381e4a3a1fe925929d83f8c42c6e7d7bf2,2024-04-30T14:15:07.967000
|
||||
CVE-2023-39189,0,1,08c1f7cbbdfaaafd2374ad1e0100aa4022a7403887c406ee4a8c094d0c907639,2024-05-22T17:16:03.030000
|
||||
CVE-2023-39190,0,0,294ec25d0875a3dc3b2be951374f197676d2ecfd582a852fc6d89c14f47ac2cf,2023-11-07T04:17:27.090000
|
||||
CVE-2023-39191,0,0,6115a8c9d2bca67a2486507ff6d08b348ac5e483b67aa16f1430f7016afeb1f0,2024-01-25T20:15:35.643000
|
||||
CVE-2023-39192,0,0,43217c2ceb0e9133c22b5b41f8bb6a3be2ed3d580e8d02984da5ccbef3390e09,2024-01-11T19:15:09.757000
|
||||
CVE-2023-39193,0,0,59db87b0f35cd6bbc002d970cb0ba2fda30655a430412baf33c9defad87e9749,2024-04-30T14:15:08.127000
|
||||
CVE-2023-39194,0,0,b2a8c28b690e3e596e73be645e903f93575fa45d284d374293bd985509886fbd,2024-04-30T14:15:08.267000
|
||||
CVE-2023-39192,0,1,024ff39f9d9a082d0c25019b1b63ff49c348e031750b1f252085df0be02d5e64,2024-05-22T17:16:03.250000
|
||||
CVE-2023-39193,0,1,a342d09c4bc351116ad140347816f1de166b79176f83d46c0a3c10a84696a5e9,2024-05-22T17:16:03.400000
|
||||
CVE-2023-39194,0,1,5bd71bcc43d5a18446b2c8475ade560918e51fe04217df7c819715e3184500d5,2024-05-22T17:16:03.547000
|
||||
CVE-2023-39195,0,0,4a74042bbdfee1d1806bd136f49fea407a5d6b8e84816d9c0bba20d1497cb759,2023-11-07T04:17:28.610000
|
||||
CVE-2023-39196,0,0,68bbbd4377c1be11a1c6c168945f806a14a0dfdc03d45e7c3e29dc9a97520981,2024-02-16T20:57:44.050000
|
||||
CVE-2023-39197,0,0,1fe5a41b58a85dec6897f2c2856cad21fa2e9ce5c3de4464f2368602c9bb1aa3,2024-01-30T02:04:00.813000
|
||||
CVE-2023-39198,0,0,688247c3fe5f5029a2937bd18f6f3c54f3745b201593447970f54a5a28414b71,2024-04-30T14:15:08.383000
|
||||
CVE-2023-39198,0,1,6e5b71713839f1451686518c674aecaed911a1660a48c60681cf79fd0a871ea7,2024-05-22T17:16:03.690000
|
||||
CVE-2023-39199,0,0,2d2727d51815e553bcc0363fb5a0705ccae7e19da005921e4129350986854a00,2023-11-21T00:57:16.017000
|
||||
CVE-2023-3920,0,0,802d09a48e99b7fd43b4d09849bcf63441a04816985afadad5eef2e398755686,2023-10-03T15:30:56.607000
|
||||
CVE-2023-39201,0,0,7fa2fd39c17c958ad3684904f1a83422d3def8637c069ef0c43ac43dc5c81b9e,2023-09-16T03:30:00.390000
|
||||
@ -230520,7 +230521,7 @@ CVE-2023-41326,0,0,0366fd5abfad6a21e7da8ab609017977ce06de2576b71d33c63535b8ca179
|
||||
CVE-2023-41327,0,0,99db21f154eb5db0a0673ca028174d03c88c66524a4462372f7777970c610fbf,2023-09-12T20:43:26.803000
|
||||
CVE-2023-41328,0,0,18b6cfdc74ca9eb9a3f78be9ddb8bc0c9971d1a077f6093def0f6bafe4bd8440,2023-09-11T18:05:46.093000
|
||||
CVE-2023-41329,0,0,3aebc6795d938340fcd444469c8e391c4475b21ea62437d69534aa5dae912778,2023-09-12T20:45:24.907000
|
||||
CVE-2023-4133,0,0,0fe02618fdada417879c2c77ad2f4aa7b36b4ba7cbb151920dfdf9f8b34e3b3e,2024-04-30T14:15:10.420000
|
||||
CVE-2023-4133,0,1,dce221d6cb627b18ff3a90431ca50c41c9d83f3c03cc3f4b6b4ae4c9a5dea8e1,2024-05-22T17:16:05.990000
|
||||
CVE-2023-41330,0,0,f332845bb46bf60c5a51a58c63deb892b1ee20e8a7a566efc0e1f98c975395d0,2023-09-12T20:42:58.853000
|
||||
CVE-2023-41331,0,0,4735e7f30e6fa00bc81696af0475448ee644526a281445e4ab89b736a63ff67e,2023-09-15T19:23:35.937000
|
||||
CVE-2023-41332,0,0,90f32252cb99e05a0041ea0bbe80c1e2a16936a5a3ae314976c52461cd57ec5d,2023-09-29T13:56:15.203000
|
||||
@ -231486,8 +231487,8 @@ CVE-2023-42750,0,0,70915e69cb60a6858dbd84484c73098e7c4a56bec317368a9d9f671192cfc
|
||||
CVE-2023-42751,0,0,3edf2721c6602bf3ab2e99be75103e77d59adc53efacaff628c3139c2459824f,2023-12-07T16:22:08.860000
|
||||
CVE-2023-42752,0,0,e64b1ff8733ea3c590d85e1bd2ff7516a242f750086dca7dc68d90d5f7b28fc9,2023-11-29T15:15:08.590000
|
||||
CVE-2023-42753,0,0,3e5b4cb61c42d83c57e20f29810d886d9cfc778a0d313ec6b46dde1aeec06f64,2024-02-27T21:15:46.810000
|
||||
CVE-2023-42754,0,0,385ac85e8b9e34a6e29bf6651c886452a8d94e9325c94492288863b633585dc4,2024-04-30T14:15:09.100000
|
||||
CVE-2023-42755,0,0,f9f274dd994494562ece75367509a2592bb162c3b24a6866560b893bf0ab5cbe,2024-01-11T19:15:11.317000
|
||||
CVE-2023-42754,0,1,55476c044cc3bb964d92c3897c4c72eb7de4aedaa6aa8e5cfb35de27f7eeb8f6,2024-05-22T17:16:04.360000
|
||||
CVE-2023-42755,0,1,7a86f3a569c70622ae1cea891d915eb97bfc9f08632fef0a949a20ea6e7e2546,2024-05-22T17:16:04.537000
|
||||
CVE-2023-42756,0,0,1791119cd49d1f819b757c7a73ec49ac86914ba524bc67f6888a58dd72ac15ca,2024-04-30T14:15:09.243000
|
||||
CVE-2023-42757,0,0,f46e3894d2e12ec0442a7829f3dc5951255bcdedeca7dc7903e2fea24af4c1ee,2024-05-07T20:07:58.737000
|
||||
CVE-2023-4276,0,0,ba81376334b317afdb94ddec1b24db97dd7a21c1b03cf9fb7c1f4917c56320c0,2023-11-07T04:22:23.843000
|
||||
@ -232149,11 +232150,11 @@ CVE-2023-4378,0,0,1073659ca12d39c66816d534ddaec9f9afb571d44ac0a2a97ba27debcccfeb
|
||||
CVE-2023-43782,0,0,ceecdefb3ca0fa2d3f555f17dcd4461d1d6a6b2e2eb0dd0b222c507700c8d6ed,2023-10-26T17:59:42.910000
|
||||
CVE-2023-43783,0,0,1999ee6518be9435805a19a243ead15c7aec42c5c117bb8151815611a70cb1d8,2023-10-26T17:59:35.273000
|
||||
CVE-2023-43784,0,0,a08390a02a39d1b29ca1473845b2bbe8e79091cfdebbdcf12f74ac23833789ba,2024-05-17T02:29:18.553000
|
||||
CVE-2023-43785,0,0,c3c740475b222f7f401d798dfb6f881e7ce396ed8b0da3b660ddbb2326a0ee7d,2024-04-30T14:15:09.453000
|
||||
CVE-2023-43786,0,0,bb210225a172ec5af5061cf8ac20f217a3da3f5b41b280a0b56d53d0996f8cd0,2024-04-30T14:15:09.613000
|
||||
CVE-2023-43787,0,0,8f5f21b4dfde77b9d00ffc1687ef1a08d5b72420d017ee615a045a7db3cc2274,2024-04-30T14:15:09.810000
|
||||
CVE-2023-43788,0,0,06e87cff6152bbd2138ac03e422b76e850cb56aaaee00ca936f33cd976e58c7f,2024-04-30T14:15:09.963000
|
||||
CVE-2023-43789,0,0,4dc05e537d4a85f2b2d85151f0d008604abd5e7c625167b31c437c2de767823b,2024-04-30T14:15:10.103000
|
||||
CVE-2023-43785,0,1,ee401c5908628458a72a22ef0af239eeaa6bc534ec2e7f00d91e1aff38c5e247,2024-05-22T17:16:04.760000
|
||||
CVE-2023-43786,0,1,de094cb131460e5dce39655dda5f4504f4f0197ffaddd16f977162909c255603,2024-05-22T17:16:04.927000
|
||||
CVE-2023-43787,0,1,c40c610c8759339734d3d0ab6c267d05e37180423f144ab867dd6e1c63e9cbb4,2024-05-22T17:16:05.057000
|
||||
CVE-2023-43788,0,1,7523a25a418d85513c2ff533b1634921643f4ce23beb7312f140b34cd5392ff9,2024-05-22T17:16:05.223000
|
||||
CVE-2023-43789,0,1,32d727641a99e39dc6456e53621b96cea1e3b49b48912290b25ab4575db872d7,2024-05-22T17:16:05.443000
|
||||
CVE-2023-4379,0,0,3d7c1a3a693facbb427b84d3e31f361b0100f9358df2eb8e78c0a3c9e7722a70,2023-11-16T19:24:36.240000
|
||||
CVE-2023-43790,0,0,dc04c69ad573fbcc9e2e3e500057f73f594b156236e9d8ba0d308d312b307e03,2024-04-15T19:12:25.887000
|
||||
CVE-2023-43791,0,0,026e86f342b4cfcebc1170b1da4308bc54a73c5fddb94d2ae0a580f5d845ba9b,2023-11-18T00:55:15.610000
|
||||
@ -234232,12 +234233,12 @@ CVE-2023-46914,0,0,c59adb74e4c80e2986f7cbf12bded831271a227b08fb4bcf358c8a2151c16
|
||||
CVE-2023-46916,0,0,807dec74b0b6302aa78a9b1a564deb8dae9da79985c10fc5f40f549edd1dd100,2023-12-12T17:03:51.163000
|
||||
CVE-2023-46918,0,0,778a5b7a17f93ea048ea10d26e5870dcbb0e2ebfe6cf90309ef7420272b8cd33,2024-01-05T17:24:42.153000
|
||||
CVE-2023-46919,0,0,483dbc1ac50d3d8abd2c60ae86d8ddee9660e752ace819201c59dbd8b27520f8,2024-01-05T18:35:20.857000
|
||||
CVE-2023-4692,0,0,5fe0f1b3701f9245403ba0991d040ff9c2b81873476829d82e1af8caba46db7c,2024-05-03T03:16:02.210000
|
||||
CVE-2023-4692,0,1,31eb32079b6ff912ee9cb4d2b7756fa0b45c3687150e4e20d0c89e236ddae406,2024-05-22T17:16:06.140000
|
||||
CVE-2023-46925,0,0,474049e6d20eb13bc575b65561ef84204e608a738f0064cb996ff655202f4db6,2023-11-09T17:46:52.517000
|
||||
CVE-2023-46927,0,0,456f3b68c111783341a61120a7d7e73c89200952dbed58aeb4bf5bca9eb4478b,2023-11-08T19:35:56.783000
|
||||
CVE-2023-46928,0,0,dbfacac533f97d8c2bde499ce6922d40d78d9f3b0bb57ad0be92dbe4894d1239,2023-11-08T19:31:58.797000
|
||||
CVE-2023-46929,0,0,4b9a36b63210b5bf3fec4e65cc498ed3b2577a322d91bc8ef6e07cb6de32caa5,2024-01-10T19:26:28.647000
|
||||
CVE-2023-4693,0,0,1d877dfa1477bc1ba7b828f43272ca1ef3f2fcafdee7965063c431702783487e,2024-05-03T03:16:02.370000
|
||||
CVE-2023-4693,0,1,414c8cdd83714eaa108372a5c0d90154090147f2cfd4e257bcd63e424303a8e5,2024-05-22T17:16:06.530000
|
||||
CVE-2023-46930,0,0,443982cf4f9c9d9211b72c7a5eeec2189c4d88d6928a4ab3098294f9b9d79991,2023-11-08T19:41:01.493000
|
||||
CVE-2023-46931,0,0,dc0c5aeb658231ecdb137544de7e966d78b050885917a9eabad5feda7e19db03,2023-11-08T19:36:49.673000
|
||||
CVE-2023-46932,0,0,1e42f5d6f78dc1da5f70ec6553388859dad53ed5da3358f8c3a1cfe520573e36,2023-12-12T22:32:26.197000
|
||||
@ -234296,7 +234297,7 @@ CVE-2023-47033,0,0,9f64afaaad6656e35f51a7e5c20ba55e9da6ae915e60dc5ef4045963b8f11
|
||||
CVE-2023-47034,0,0,5e669df5a7ad32eb8b097886efddff48819f84fb4b955cc5aca9e920a6102637,2024-01-30T16:48:28.163000
|
||||
CVE-2023-47035,0,0,770b2e98d600ebf26f2028e8928b35898574cd25900dfff88aadc984966168b6,2024-01-30T14:46:19.023000
|
||||
CVE-2023-47037,0,0,7537eb40b8d544ac01e36c22cc628ccdde46b3e4b0580bdd6819812169448211,2023-11-20T19:31:24.707000
|
||||
CVE-2023-47038,0,0,24c45b876ed53c2439709907e519110e04feb22ef7725a116f0d4cb205d987fe,2024-04-30T14:15:10.257000
|
||||
CVE-2023-47038,0,1,7241a4674a31ffc7cebc9c4aa252e73560ae18af5f7f46bdf04801cf3560314c,2024-05-22T17:16:05.677000
|
||||
CVE-2023-47039,0,0,437d789d3a627731735caace9623309c9997b0d4bbe85d9712e8d1e5008fe7f0,2024-03-28T14:15:13.467000
|
||||
CVE-2023-4704,0,0,ef1dffcc0f22d52fa11eb133e9bcccdda232bc0ffa1c621782c23e03920914ca,2023-09-07T17:36:22.737000
|
||||
CVE-2023-47040,0,0,5b7ddb0234f2c1ae36901d0eadf5328e97fc25f2ac070aca211e4b7da01950d1,2023-11-22T15:19:16.977000
|
||||
@ -236824,7 +236825,7 @@ CVE-2023-50874,0,0,bcacd6fc18a6a7384f9e3410fc219a27fd51425023bb3ea76f15234acd5bd
|
||||
CVE-2023-50875,0,0,1106938097fb18960ed1f89813982d05ff2f39c25d4530bc17f1d69fd9b36d68,2024-02-16T19:28:59.943000
|
||||
CVE-2023-50878,0,0,09d9775c521beb2bdbe6a10e9cce75ea90abd897c23ddc9c0ed036fdb98e2785,2024-01-05T16:21:46.253000
|
||||
CVE-2023-50879,0,0,e7f635ec835f8af6e68324c638f96c217e373f3a3af9c80d6a7d36cc1662f020,2024-01-05T17:35:04.347000
|
||||
CVE-2023-5088,0,0,949602bb613cda52cd3d8706067d7ac77f9553f85e8c12e9aa40646017d4d698,2024-04-30T14:15:10.953000
|
||||
CVE-2023-5088,0,1,692ebf645f02e064fac01cf45ee953588a13ff0d56000f2ae18bc74dad40523a,2024-05-22T17:16:06.710000
|
||||
CVE-2023-50880,0,0,45dfc20edf873b6f54c033b90d8b745bc998db6f75a866db44cd1e8a384e14b7,2024-01-05T17:36:02.743000
|
||||
CVE-2023-50881,0,0,21fc9e5f06f2216fa2395fe2689d924b63b36b0b4cdf8b0f9c5260d788c328af,2024-01-05T17:37:29.017000
|
||||
CVE-2023-50885,0,0,17f409a54bfb2cee48d72ca19d76c6e56cca390a1fd7e5561bf19af5236e5f64,2024-04-18T13:04:28.900000
|
||||
@ -238383,7 +238384,7 @@ CVE-2023-5362,0,0,6cd099dc73752b5bcdc030e8564f8c4aba80acdf0fb96fce3d91c9ff3f5d2f
|
||||
CVE-2023-5363,0,0,6a84e1ed87b432e258be5e3ec9a32c477ec3bb340639f5c743fbe72c8b18eea9,2024-02-01T17:15:08.743000
|
||||
CVE-2023-5365,0,0,577825a78eb7d4bb43b379c489e9f14e156cfa284569015c1587d1a539aba1f0,2023-10-13T18:13:11.037000
|
||||
CVE-2023-5366,0,0,f32b6bbb139ec2cd1c647ce9b082b43ba44af0c55e8725ca09746158629457d8,2024-03-23T03:15:10.327000
|
||||
CVE-2023-5367,0,0,c1ad203899f553a03f705fa4893432dd66e16bf0fe906443f1e13e8deb2acf51,2024-04-30T14:15:11.280000
|
||||
CVE-2023-5367,0,1,4d81f740eaccdc48ec446af211733bec69ab6a08511baebde2fb40381b63d6f4,2024-05-22T17:16:07.050000
|
||||
CVE-2023-5368,0,0,593db1a54f590a459e9c1c53282073288a9ea58f12b3af280fa3c63997ab333f,2023-11-29T21:15:07.940000
|
||||
CVE-2023-5369,0,0,bc2976d0fb3797202330d53bdd93d5704730b182a0590b9be7094369289431c7,2023-11-24T09:15:09.607000
|
||||
CVE-2023-5370,0,0,0b8bae34575fb174114a0e06ac582228a49abd871a52b1621f872fe44bc92ee8,2023-11-24T09:15:09.677000
|
||||
@ -238396,7 +238397,7 @@ CVE-2023-5376,0,0,d25adbf13134c0f536650c34727c0a90e481346ff93626806c106fdb8d3cb2
|
||||
CVE-2023-5377,0,0,8010d6fe5a92d90535c9f3d1843bbe6dab5b2e1f13255a074cdcfd35cd5284d3,2023-10-05T17:07:40.813000
|
||||
CVE-2023-5378,0,0,45892ac35553604338d229afb6d2f05944b5562bd675022643b73b5d5512fb1d,2024-02-19T12:15:43.980000
|
||||
CVE-2023-5379,0,0,0034d7dc633bdb9d87977a5f843846a9f44bd21275dc1f4e4d2e9917e83b93f0,2023-12-20T18:39:19.120000
|
||||
CVE-2023-5380,0,0,373a2571a6c29c7d5b85c9d0d1564dc8ff1cf8686447cddb350009574acaac63,2024-04-30T14:15:11.513000
|
||||
CVE-2023-5380,0,1,1f65028cbd0908a06fb194fb255c3b9682548b8122ba91198ecaeffae13570c1,2024-05-22T17:16:07.540000
|
||||
CVE-2023-5381,0,0,3040b0b8dc0beb606dbd7fc1a2584e032c76067b2e99361a9eafb184c22c46aa,2023-11-21T02:45:00.847000
|
||||
CVE-2023-5382,0,0,4ac4fb28dfaf2bd508d6b1747b3034fa74511f17b7c43f28ba39ba9d8efd9058,2023-11-27T20:11:42.213000
|
||||
CVE-2023-5383,0,0,2ea2edb67bde66ba9622c0ceef1e79a842adcb3e1623c297ceb8cace44689a78,2023-11-27T20:12:46.017000
|
||||
@ -238974,7 +238975,7 @@ CVE-2023-5999,0,0,cc3f84b8a121613045dcc518b5ffbe450102082afadb4f9fe390442e821198
|
||||
CVE-2023-6000,0,0,3aa74437938a42933034b068e628b90507b17eb642603203f20688873749410b,2024-01-08T15:14:56.640000
|
||||
CVE-2023-6001,0,0,0004a90ef8f8e6fad0ab4cc41788654ec826936eb050cdfff2de6feb3bfa7f8e,2023-11-16T16:15:23.077000
|
||||
CVE-2023-6002,0,0,c3b9bdc640ae3682cef47895b9f5d6946ff8267a3110d3bffaa44f0a504f48cc,2023-11-15T15:16:24.487000
|
||||
CVE-2023-6004,0,0,86f825cda40d825e1e7b13f060d02113e69e321f4c59dd420b61b5aba9543fbb,2024-04-30T15:15:51.593000
|
||||
CVE-2023-6004,0,1,2ae037f82039fddc9236fe2dee50364527d943ca3f81f5de6f95d488bbd167b7,2024-05-22T17:16:07.773000
|
||||
CVE-2023-6005,0,0,00888b4dc87d6058c5028522956f7d9e46995f7cc9c2c82d660558853b9c1656,2024-01-19T14:27:45.383000
|
||||
CVE-2023-6006,0,0,be4e5abcc056403ed35b668305e316c0b5aef75563c8b172a30640a88309631a,2023-11-21T16:12:34.167000
|
||||
CVE-2023-6007,0,0,2e6620a06aa2e6960845c6b171034cdf81bbf52a94cdbf5952cfa44bfe66101e,2023-11-29T19:01:54.823000
|
||||
@ -239077,7 +239078,7 @@ CVE-2023-6117,0,0,23ffc5f4c90a279ac244adcf67ed121b77f5bce3b75efa2fc7c1f1221d790e
|
||||
CVE-2023-6118,0,0,185b02f0f82d3669ee7d955ce632c2e7e3f4b765df0085b453c9c70d7373b586,2023-11-30T21:03:09.543000
|
||||
CVE-2023-6119,0,0,6fa8c2bdfe58774c0eadb834ea8a4a17c61f17e55241a9e2b26790316447df0e,2023-11-29T19:32:07.657000
|
||||
CVE-2023-6120,0,0,0785d4897c202d5f2b347af27cbafc0a0d08d1e19422e6fe1e80f9bcb520d992,2023-12-12T22:33:35.077000
|
||||
CVE-2023-6121,0,0,3341803019ea381f906b75dd6784dfcbd0ab23c775263043d0c749c1b68299ad,2024-04-30T14:15:11.823000
|
||||
CVE-2023-6121,0,1,38c6196fcfe238ace1965f28fe108d3e81c64c99cf763a79cc1022679e26bd86,2024-05-22T17:16:08.007000
|
||||
CVE-2023-6122,0,0,fdb1bbd36685ab367ece39630fa32b987ab22a57945287b655756d875986b449,2024-02-29T01:42:33.153000
|
||||
CVE-2023-6123,0,0,e991291cd701d4dfdcf4ef1fc4f630d1e850086076bcf3c7627a88aee80a1c5a,2024-02-16T13:38:00.047000
|
||||
CVE-2023-6124,0,0,664f05c4fc3295964d19e1f2a73fe5f7112fa0b432430271a916027b76a6d242,2023-11-17T18:11:01.837000
|
||||
@ -239125,7 +239126,7 @@ CVE-2023-6166,0,0,2fd4bf06e126a4915eb1ab58cebba98130a30b69f07d42815f1b2e81d82c3c
|
||||
CVE-2023-6173,0,0,242a0bd36c1e795d0aad7af13a95461d2bfc7a072b05e504d57ab20bea7dde21,2024-03-27T12:29:30.307000
|
||||
CVE-2023-6174,0,0,928079b5ea0b0accaee0b058dd1e51b2239c85cbf846cb8e8f6e42d77fa72bf4,2024-02-11T06:15:11.437000
|
||||
CVE-2023-6175,0,0,2b124284380d6ffe6e5a9191b487503d085349de86f7dce936d08d6c075067fc,2024-03-26T12:55:05.010000
|
||||
CVE-2023-6176,0,0,6312ab0755307f0091dcd2480de5f036847b0b9a79ef19d05bac9b1047c3bdc2,2024-04-30T14:15:11.960000
|
||||
CVE-2023-6176,0,1,81332f975e9c0f773631a30e5d38b90c704362c9e9210b77ffe0d99ee808cfa9,2024-05-22T17:16:08.200000
|
||||
CVE-2023-6178,0,0,bc2dd876d4e2450fc2e4921925d21f55e35f2d54fd22329e9e9989f0337a5274,2023-11-29T18:01:19.947000
|
||||
CVE-2023-6179,0,0,67fdae7ef2e90483db8da897354f3ca786f508d0b8b5db8b16163ed452bd226b,2023-11-25T02:13:16.920000
|
||||
CVE-2023-6180,0,0,d0542d25835b09da9849c6c849c3b120a5a7798d30dff1391e0aa703c583ed17,2023-12-12T15:49:29.317000
|
||||
@ -239296,7 +239297,7 @@ CVE-2023-6373,0,0,a10fe1678f097b67682eb6e67a72a1021bf42a53e82b8bb51a4ee66761c5f0
|
||||
CVE-2023-6374,0,0,3df87b1115878a0fbaf2d96e786890a09b465249bc2a8a350e3f2e465a22bfca,2024-02-06T18:50:48.063000
|
||||
CVE-2023-6375,0,0,9bccfab4c5b2344bb3b0f32e66ed1fda00e58ee8ec3197ae7b64885c17c939ec,2023-12-06T17:11:21.693000
|
||||
CVE-2023-6376,0,0,6685af42b31cc5beddc512cc60689ce87ba925566f36538c57a368005120e095,2023-12-11T15:12:41.477000
|
||||
CVE-2023-6377,0,0,b1bc5f38ac5b9db8c543e8c179214789f2da5120a3471db19e815fe5edfadc11,2024-04-30T14:15:12.063000
|
||||
CVE-2023-6377,0,1,337e9143b65cbfbb0651232e7741e740bbdad26680256d9edd8b430a27c494c8,2024-05-22T17:16:08.530000
|
||||
CVE-2023-6378,0,0,4e5c95a250705e0dd6a8bbc06b93d64ed77669aa10d8e08cf26322a24f2351d4,2023-12-05T21:00:10.557000
|
||||
CVE-2023-6379,0,0,b7a577bc70f83785aa29bf1c30ba879dfd82bc67d666c7986d31270d7af1419f,2023-12-15T20:33:49.850000
|
||||
CVE-2023-6380,0,0,392e06acbd089517e78f47acec46283d5c2952e9063d6ec241117f7f2010ba21,2023-12-15T20:22:40.343000
|
||||
@ -239379,7 +239380,7 @@ CVE-2023-6473,0,0,a4a550bbe30c352e142ae34ea4ba451637f31051baf6f097a159f1a1cf6b90
|
||||
CVE-2023-6474,0,0,9d3a7a55078375b81a96c9feef4df32b7d5b88345f09d3d8c481615db5d42fc4,2024-05-17T02:33:44.370000
|
||||
CVE-2023-6476,0,0,57308171427109f5ee78843a9c1ee207dddbd4e402603c66ed9179abaced4ebe,2024-02-04T20:15:46.327000
|
||||
CVE-2023-6477,0,0,30e717357969ce1a3d7c54ee50b2f4eea236fbdd42e3aefd85764f8f4b0bf0eb,2024-03-04T20:25:04.490000
|
||||
CVE-2023-6478,0,0,96e23fdb0a5be1fbb58e45e442baf11e970a8c7e14720b2a4a345f2a894ba750,2024-04-30T14:15:12.263000
|
||||
CVE-2023-6478,0,1,fde3d8c9214a6e680946c69a80a38349bf8d40ea03c4322cb420daffd335313e,2024-05-22T17:16:08.797000
|
||||
CVE-2023-6481,0,0,7bf3f957b787a6827701226e0ca3372c64cd44f2ab0cfcaeb6091c2fdc472edd,2023-12-07T19:57:46.020000
|
||||
CVE-2023-6482,0,0,4d9c5a1788fe7dfbaf4eca53c69fe7a1ffbc45cd5b295a4cce9c5f95cb7c7755,2024-02-01T04:14:20.480000
|
||||
CVE-2023-6483,0,0,4d97a6b64ab24b94d49daa44a79554fbeead9ae7d46cd7c731ffa4efefc4885f,2023-12-22T20:23:00.340000
|
||||
@ -239500,7 +239501,7 @@ CVE-2023-6618,0,0,9193a13bda46e6f2f96e9aec2ce94a36a4e687c4c90b1bb0d5df487eeb40d4
|
||||
CVE-2023-6619,0,0,a5b75610a82bb8b562cc8db9bca6c72c82215b3c894dcb77669b75fe51f2b888,2024-05-17T02:33:49.277000
|
||||
CVE-2023-6620,0,0,bf62d55272d0e4ae1790760873f5b282ec1f6dc35b3d222e88e2e51bcc6144fc,2024-01-19T18:30:31.280000
|
||||
CVE-2023-6621,0,0,e7ba8fa0053a52555cc28777e20191f84d428674efb2a150ff053fd62ca17b8a,2024-01-09T18:47:39.187000
|
||||
CVE-2023-6622,0,0,3a2720f61be18ae45f1a5ce867e34a2518acf9557925c363ea2d40c9ed0737c4,2024-04-30T14:15:12.790000
|
||||
CVE-2023-6622,0,1,52b25e1bb39cbf05e4d82eb7dd801bf6b128762b3177d49b48fe33d5df6adf3f,2024-05-22T17:16:09.020000
|
||||
CVE-2023-6623,0,0,442e364c6248e0d8a48d3ff5e9e4f9e011eed522a4ac57fef79d2e649dc595cf,2024-01-19T18:33:55.500000
|
||||
CVE-2023-6624,0,0,4ce3823144bd1928535c6c397482e9986264d8bd9d2ab1741fa88186f7a3ff71,2024-01-17T21:20:31.500000
|
||||
CVE-2023-6625,0,0,3a2eb9baff2b129c466df66193517b7d682f051468b4a2e9d2189d029f714585,2024-01-26T19:47:43.497000
|
||||
@ -239542,16 +239543,16 @@ CVE-2023-6677,0,0,744a169fed7afef9bc3172a4dc3cf72705f47913c3dd4cf21ecc0bce335262
|
||||
CVE-2023-6678,0,0,ffe600c6920a412c0c5bee4f237e93b3d55c2795b206acbd920087166a0b3a61,2024-04-12T12:43:57.400000
|
||||
CVE-2023-6679,0,0,bae6ec8bc351030c039d4ccc17068a0f99c26b2fae4af82d5e4c0f67264c3cff,2024-02-06T15:15:08.397000
|
||||
CVE-2023-6680,0,0,a016be60c670891f603e4cb6a7d1db9323a658919f6e5464005acbd77a09d39e,2023-12-19T20:51:03.237000
|
||||
CVE-2023-6681,0,0,1e81bac5d4abde6b2d2aa3cac2e26b8c260fd0d2cc649b18b690f3f83d9c312f,2024-04-18T18:15:08.993000
|
||||
CVE-2023-6681,0,1,d15aa67412474232bfb8e3a5b87ad8bbd618499aee386c53d7448b7be7aa82b9,2024-05-22T17:16:09.207000
|
||||
CVE-2023-6682,0,0,90940cb62c4c46886bb788e061b6553ac12f0ac5a6c8c09c3082acd9ca7c8bb1,2024-05-14T16:13:02.773000
|
||||
CVE-2023-6683,0,0,6399c52717426ffadc7c348d85ecd2e981ff00d98029a8d3303cd8ed5a962d2c,2024-04-30T14:15:12.930000
|
||||
CVE-2023-6683,0,1,4f24afc48059e357c68edeedf92bd9da8f320a705126436e9bd3b6f9189b2385,2024-05-22T17:16:09.600000
|
||||
CVE-2023-6684,0,0,c1525cadf00c690a98e25ddc5cec16c0dbf4d4d58e3765f415661e1c07ec88e8,2024-01-17T20:41:05.143000
|
||||
CVE-2023-6687,0,0,815f0c1fb11575859202e4f8339ba0c892dff8a36cd30b831f453e8fce3948dd,2023-12-19T15:20:04.910000
|
||||
CVE-2023-6688,0,0,d261de4de637dc0e80af432f70bd6cacdd348e8805fcc1ab5b8afb55a49ce527,2024-05-14T16:13:02.773000
|
||||
CVE-2023-6689,0,0,94832909555ff59b567516253441b2d84f7ab3411369d6764bc6cdff465466c7,2023-12-29T19:29:33.807000
|
||||
CVE-2023-6690,0,0,4a0a71b1ead07e18f281fc4661b8ad9c1c5894485cf3fc449f0f62ac342ca884,2023-12-29T19:21:45.180000
|
||||
CVE-2023-6691,0,0,a11890938c81fde945a58f158b8b20210e60d65408972177cf95e97613dae836,2023-12-28T18:28:00.493000
|
||||
CVE-2023-6693,0,0,6873a264484b094c8ce71cc1218181d85ec7b1708eb4e4c0806f70e884fa33d8,2024-03-08T17:57:54.067000
|
||||
CVE-2023-6693,0,1,cf628307c1964a00995a1e6a5134d1eb338281166ebf99b3dd57917a16a1b948,2024-05-22T17:16:09.817000
|
||||
CVE-2023-6694,0,0,74888c6061f5995c1ece9e256c949c745db7a28c9fae546822fe2bdd37077360,2024-04-10T13:24:00.070000
|
||||
CVE-2023-6695,0,0,c350585c288709484fa2c4ed5afca55376ce388211fecd421637a541eb8ceb4d,2024-04-10T13:24:00.070000
|
||||
CVE-2023-6697,0,0,e4339138bfdad4a40ac5f595e1eff8e88fb25ea1f60bcfd83302475d5a5a44cb,2024-01-30T20:25:21.367000
|
||||
@ -239650,7 +239651,7 @@ CVE-2023-6811,0,0,0ae434dca3175548a9ca9dc42c6f8d10f94870a185713460da5dc58ca1a03a
|
||||
CVE-2023-6812,0,0,1361f65d99954b70532606b17569527f5effc0868c2105952fcff6b7c6c97e71,2024-05-14T19:18:31.490000
|
||||
CVE-2023-6814,0,0,f914980738323f0d89710adfa1af6d51adf8e3bc868f5019d57b30c5b4448cc4,2024-04-16T03:15:06.230000
|
||||
CVE-2023-6815,0,0,2907a8b4ff24102c477c46109fb1fabfce42d3c6fd03f18fcb9bbd39f14ee3a0,2024-02-14T04:15:08.497000
|
||||
CVE-2023-6816,0,0,34622146e83120c2a6e5886baba87406860404acf36665dbf4cdde0b5533c8f3,2024-04-30T14:15:13.080000
|
||||
CVE-2023-6816,0,1,cca41eda4debf1a60ab4b1843bc845963914c04ca252d62c2bb38527b5d55418,2024-05-22T17:16:09.970000
|
||||
CVE-2023-6817,0,0,15a873d76f1c7613f3959855e73f950459b6718d3731740781c6b052a6a56c9a,2024-02-08T16:15:47.270000
|
||||
CVE-2023-6821,0,0,7a1488e17f3bfb388d3613a98d9caa7a07e3ab101b584211d6f51caaa11e140f,2024-03-18T19:40:00.173000
|
||||
CVE-2023-6824,0,0,8c6e875229d872169eb2bfb9390a02ca75cb4bc4bc222093fdb4ebb6a0125835,2024-01-23T15:35:27.123000
|
||||
@ -239738,10 +239739,10 @@ CVE-2023-6910,0,0,f842ee2aa98f61ed47c83f356656747bb82d09c00eb8f1511f9921c454b7dc
|
||||
CVE-2023-6911,0,0,e60f5f34dfc2f467e48316efdd3e3f3dabe3cbdb000a0094576ed3c7945a3ae4,2023-12-22T17:31:09.707000
|
||||
CVE-2023-6912,0,0,6d27b9ffaa85f66eac0058ecbe841883376c17e80f5cbeb4cb4c650bca6a8ec4,2023-12-28T20:21:13.940000
|
||||
CVE-2023-6913,0,0,d3f21b5758e8702bf2289fbf7ccbf480d8685a2dc08808c8b8d18a35c8d7aa6f,2023-12-28T19:03:17.600000
|
||||
CVE-2023-6915,0,0,b308f64fde2669288909ec1ea67b3a4e7bc1b4a483b46e740172957000744aec,2024-04-30T14:15:13.277000
|
||||
CVE-2023-6915,0,1,e2a0fd6c734a851fd4dd14eed7cde737b91291892d875d0d01460616139a79ea,2024-05-22T17:16:10.197000
|
||||
CVE-2023-6916,0,0,506ca081fad9ad2394374425c07440832a4ee51e583bf2ac63a805b332c6f8e2,2024-04-10T19:49:51.183000
|
||||
CVE-2023-6917,0,0,72d90b1b285b224e730badbaf26efca581ab8f0fadb041219fbe00e64a1f30f3,2024-04-30T14:15:13.417000
|
||||
CVE-2023-6918,0,0,ae87a3d3e74bd1765210025bc8667dfda168868b6be3fd723f2501409ee3e6cf,2024-04-30T15:15:51.930000
|
||||
CVE-2023-6918,0,1,9bbb2594fd736e6da65a527ce557bc623488cf0972d935e5571ffede28de719b,2024-05-22T17:16:10.383000
|
||||
CVE-2023-6919,0,0,c5861db2cdf00a205a7573e7dcea32f254a23d6c543064294759efd099a2276c,2024-02-01T19:43:35.653000
|
||||
CVE-2023-6920,0,0,9f1e69d2c13cb07d8d718e2d591d2015a72911331b809e4164229c0e420474c9,2023-12-18T17:15:11.673000
|
||||
CVE-2023-6921,0,0,952e34754f9ce702fb33c80800b749aad8c05be68472bdb7c7764fc8d1184437,2024-01-11T20:57:37.320000
|
||||
@ -239818,7 +239819,7 @@ CVE-2023-7003,0,0,c2f67685caafc56100d1d2a37ad4d98cbab0dde58c7d186a42f1e45043a47a
|
||||
CVE-2023-7004,0,0,3e9a2bc9909d36e2af7dddeb28517498d215f6e0ede14782acb4def06a55a403,2024-03-17T22:38:29.433000
|
||||
CVE-2023-7006,0,0,803fcc04a45419c90766afaee3cae76aa704c03c33dcaa6fab9236b4ab6e6263,2024-03-17T22:38:29.433000
|
||||
CVE-2023-7007,0,0,16031198d1127e86f366c2cd57986c69c3bb40bfa4438638842fed7a5553573e,2024-03-17T22:38:29.433000
|
||||
CVE-2023-7008,0,0,b87c7b587b46f66e5930354ca9f0ce2eb368c8a4d89a7615d01a0f72cc109d10,2024-04-30T14:15:13.513000
|
||||
CVE-2023-7008,0,1,3723c9b4e7479d9407a1d934d913d3e89f8965e4cf019a3479ec067a6c1dcc17,2024-05-22T17:16:10.830000
|
||||
CVE-2023-7009,0,0,3cd9b260095619f078d9124475c918cdfab00bed93a7d74ee3b33c22a302d112,2024-03-17T22:38:29.433000
|
||||
CVE-2023-7014,0,0,873dd0a51ae8f440703328d4c3435a1c07218aebd2ebb2d1a46bc2ca046b3736,2024-02-15T15:07:55.347000
|
||||
CVE-2023-7015,0,0,b1ea9995d91ca9bed0782a3b0caa0e63e46b6b6bfabb58f27c829fc5fb5c037e,2024-03-13T18:16:18.563000
|
||||
@ -240161,7 +240162,7 @@ CVE-2024-0225,0,0,7271e667ef495355eff72b02b9b3b74f5c9ea735115ad03036da50eae85eb1
|
||||
CVE-2024-0226,0,0,e9fe0cef48b7ede56b193a37200026b8d590ab7a37bf0c9ba820a5fea0cd07ab,2024-01-12T20:04:24.130000
|
||||
CVE-2024-0227,0,0,46001c131f6e8b3e1b6b2c76df780095dc7e34f8a17e1dac19dc23c36182f6ba,2024-03-18T14:15:07.283000
|
||||
CVE-2024-0228,0,0,ce6c89afac41f61c47db4c38fe10e22e0a81a5c45ffdb1b44ab12c9bd9185c4b,2024-01-09T17:15:12.223000
|
||||
CVE-2024-0229,0,0,c872cfc01e16de0c17d02d79bbe3246d5506272d9dced8383625cc948a537d44,2024-04-30T14:15:13.677000
|
||||
CVE-2024-0229,0,1,4457c758ddf442382824bb53b61fed0f7dd055c53cd4bbbc3d9366c86171c5a3,2024-05-22T17:16:11.003000
|
||||
CVE-2024-0230,0,0,945645e249458ee7c8becb91fae6787497b42be1a583180fc0e4b622c782d77e,2024-01-19T18:35:52.493000
|
||||
CVE-2024-0232,0,0,cc0880bd0343b8160892da7b4e37c3089d940d3ddc268fdf06f6a8f527fd9f25,2024-03-15T11:15:08.560000
|
||||
CVE-2024-0233,0,0,5dc41a8872508ea2109cbef39ae4ca35aea786fff68fbcd8d1e30c28d52ef8b5,2024-01-19T14:28:14.077000
|
||||
@ -240320,8 +240321,8 @@ CVE-2024-0404,0,0,f66e4aae55250898f4ea41fe8e33c7b9d8158214afcab6aefc212b1ddf85c6
|
||||
CVE-2024-0405,0,0,efdadcc35fc4ed87224ff4e930a96f9ee86e8b4ccb1a79f084616e91b90070e3,2024-01-24T17:23:09.773000
|
||||
CVE-2024-0406,0,0,4de5d4ab88b41346d6a48c20921cbb8ae5c4852e44406dfa1d2b986bdcdbe033,2024-04-08T18:48:40.217000
|
||||
CVE-2024-0407,0,0,f3bc2895be8ea5b6951b82e45fc670b2af282e8da3ab8846004c7a5f8a8e92ad,2024-02-22T19:07:37.840000
|
||||
CVE-2024-0408,0,0,bb6d1500ff3596585f953ce252c6dfe4e10a0245b14476b838bc8ad553ae28d3,2024-04-30T14:15:13.800000
|
||||
CVE-2024-0409,0,0,22d6e01aa2a0997b1086a1ca5fcc52f1aed794aa6d5be41b8e2c31b4135d7c6c,2024-04-30T14:15:13.917000
|
||||
CVE-2024-0408,0,1,566f3b27a0af7215a34bebb59fe952f1b05be3006da62f1ed2407d7d550e58f5,2024-05-22T17:16:11.160000
|
||||
CVE-2024-0409,0,1,d11a853014e56a17bbbc94ae61d9700c29e195812007c8f7e92f480335c21163,2024-05-22T17:16:11.320000
|
||||
CVE-2024-0410,0,0,b7c9980392b1e84c96745fa2196deb8831d9dc73822058dbf4e5c03728818e2f,2024-03-04T20:25:41.347000
|
||||
CVE-2024-0411,0,0,b124578bc64e3555db57a9cc4a7d10fd91900a5de3600d2f9b7c0efe01bd4565,2024-05-17T02:34:35.600000
|
||||
CVE-2024-0412,0,0,f2f651f5c48df8c4b00d7ebc32ee15d85c647bcb6d664f8f90955c06e9091783,2024-05-17T02:34:35.707000
|
||||
@ -240581,7 +240582,7 @@ CVE-2024-0686,0,0,e2395a9a6bfad8e6b532409ed23be32a655dbdc8b37702eb0b5a7e38bca816
|
||||
CVE-2024-0687,0,0,df138584ca0880cf283cf7783484df0698f216eaf6db4efcf6d87ab38b28d9b5,2024-03-13T18:16:18.563000
|
||||
CVE-2024-0688,0,0,7eaac9a2de6d69f1cb58283e226002ce225f7b8e6f1ac3cc910e6b5444d44cb9,2024-01-31T19:13:36.847000
|
||||
CVE-2024-0689,0,0,2e2dc6df22a148b6e72d6ddc61b9cb1042dff6b3ef7d504351e9a82631b4aadc,2024-02-29T13:49:29.390000
|
||||
CVE-2024-0690,0,0,350157446ad1c5d50c15f5ba2aaa6bba919bc19e8799837ac4957e1722324b30,2024-04-30T14:15:14.177000
|
||||
CVE-2024-0690,0,1,c68ef23a51c870b6b01e0fdac214117af8c481c5d952691677a8abe9a91430ed,2024-05-22T17:16:11.487000
|
||||
CVE-2024-0691,0,0,dcd6fedff2b7131fa30fddfeac5357e44b78288895a283e8a3b6f80a3ec21a38,2024-02-13T16:57:26.083000
|
||||
CVE-2024-0692,0,0,14598c1e40058a86803764efa3f5d8d09586eecd49ec73a2131e7c9f7e9d8a44,2024-03-01T14:04:04.827000
|
||||
CVE-2024-0693,0,0,f2fab4a8027c22282623dcc0a555346eaec8137ad55f32053d7be57aa124dd8a,2024-05-17T02:34:52.010000
|
||||
@ -240722,7 +240723,7 @@ CVE-2024-0837,0,0,08ea2858b44c859160b5e7601679d5f88e4bcd7ba45fb013205c71e5573704
|
||||
CVE-2024-0838,0,0,b1a45d9214599736981fe661bf6957238c139cf88032a3f72350936cbbc3a303,2024-02-29T13:49:29.390000
|
||||
CVE-2024-0839,0,0,bd365bbcd47eb1d5ecdb6b882d6ba9cbc257ff82a5c7f036954df4f3dba15f0d,2024-03-13T18:16:18.563000
|
||||
CVE-2024-0840,0,0,a29fd729ffdb30a11acea1b506301229e907e8ea6ce7fdfdd44e196863c8988c,2024-04-30T13:11:16.690000
|
||||
CVE-2024-0841,0,0,c873f2f7ddc6bf0b13c3e6edbafb1ae0c24e3e5de6b1efc6df07580302b91e04,2024-04-30T14:15:14.350000
|
||||
CVE-2024-0841,0,1,9e65cbfff7725abca8b3bb8d47238fadc1759ba27b260df301bbf9206f25aa46,2024-05-22T17:16:11.667000
|
||||
CVE-2024-0842,0,0,2d4febcc0a5bd3f6b5f6eeeb222e1bdadfd7499df5c95fd0f9cc7e2a10a87dbd,2024-02-15T19:11:14.253000
|
||||
CVE-2024-0844,0,0,9b0ede7ee0379ed34aa516e6f2cba464e96d05ae45278d47c03f7b0b4baaf7d5,2024-02-08T16:15:39.903000
|
||||
CVE-2024-0847,0,0,2423a45a83c68ee77ea1657795a6b4f742f1b905ef7ab47fbb7c37fbc6c3b67d,2024-05-02T18:00:37.360000
|
||||
@ -240896,7 +240897,7 @@ CVE-2024-1043,0,0,b25ebe81211528c764a166d703b4d746eaf91f405ce1938d3f2e7d17971a1c
|
||||
CVE-2024-1044,0,0,6f7b0e82deadcfa67f18486b93a7911031cae5b34d2ea63a1991d5191d89e6fc,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1046,0,0,04593d809e4dc181ec893504bde5771d15890d7d13ac640142c747dade4cf5a5,2024-02-13T19:44:34.880000
|
||||
CVE-2024-1047,0,0,e96e7a026577614e85a9cd48b2c7dde028c96bb69e07a747ad9c4e24f36cb0c3,2024-02-08T14:20:23.387000
|
||||
CVE-2024-1048,0,0,495c8467c0a7d4a693fb459e641fac11f8ccad823f21cf005924b6f372488011,2024-04-30T14:15:14.463000
|
||||
CVE-2024-1048,0,1,f73cea99c8fda6a6b57abc1276e87f2844d1da4dcbf068c5b028189b4a8564e3,2024-05-22T17:16:11.850000
|
||||
CVE-2024-1049,0,0,702f1183a27878b714f97a3e0cfdf1563c3306eb8a17f785c7b1a1586e029403,2024-03-25T01:51:01.223000
|
||||
CVE-2024-1050,0,0,4afeff68cbf1ca8e080c4ee497287425ecde98ece0d1d057779f329dd8bcb3de,2024-05-06T12:44:56.377000
|
||||
CVE-2024-1051,0,0,9345c0a6e775599660e2c0fec1004a4350e5763beb3848cc0939db67ee25aa7d,2024-04-01T01:12:59.077000
|
||||
@ -240909,7 +240910,7 @@ CVE-2024-1058,0,0,80a5d2ee91b8c3ada73727957fcd82a05a735762aa11fd58991ea78d55e340
|
||||
CVE-2024-1059,0,0,3ce9662c746bf2f12465a0b043cc52736ac7f03a00d65ac500ff02babc948f48,2024-02-05T20:50:26.783000
|
||||
CVE-2024-1060,0,0,947f187e18fc5925a95a10d5904537b397d57987c304e13aa92944e395ef1895,2024-02-05T20:49:55.413000
|
||||
CVE-2024-1061,0,0,947e75b14694e9a11f0f1cc99c5910bdfa7e7bd5faa6e5b7b033897e8f48ab9f,2024-02-05T18:21:08.577000
|
||||
CVE-2024-1062,0,0,8960ea5ac871ec4d88d885a3ffdbce0b097548ed5c3a8f8769fb85ac78cfe9aa,2024-03-19T17:15:09.707000
|
||||
CVE-2024-1062,0,1,02b7eee677925718e322bbbd376cd672a91efd1f797ed6768b4fd3bca3bf4bd8,2024-05-22T17:16:12.023000
|
||||
CVE-2024-1063,0,0,9f783a34601f62d19b147f2fe9fbb48179f2e91e414b112cc308b0e641d38b87,2024-02-05T18:25:57.167000
|
||||
CVE-2024-1064,0,0,54ebccd3b0484c776a35abc0a579ad4dfe5016d375ba9d7ccf7a7253f76d1013,2024-02-12T18:42:14.777000
|
||||
CVE-2024-1065,0,0,07c6b023634593680b772042b06337ebc58e33ca2032ca3f9810f92b441f4c8b,2024-04-19T13:10:25.637000
|
||||
@ -241201,7 +241202,7 @@ CVE-2024-1390,0,0,71eb0c49e1915160a890c9df4d2040fa529dd6e699ca4bdcf3f6829a9c0e60
|
||||
CVE-2024-1391,0,0,95159e2513e9127a66f6050cbc2679326245e87281e8aee9653919649cc97f74,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1392,0,0,0948736f211221c32ddb432668205bccae67223b950d877ef11c76bff68a1c8f,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1393,0,0,d7662d0cf4655f5dc37cac1727274e85c0d695350e85be99fa06d400366cbddc,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1394,0,0,3c65d3e8fd0844435ba6ceeb902629f5b980dfa76bac2c50d4bc4f04ebd6ba76,2024-04-30T20:15:07.090000
|
||||
CVE-2024-1394,0,1,b9291470de8f5430a0efce828f0fb93d2fbd512feaf0ea4e95de91da35c98bc3,2024-05-22T17:16:12.157000
|
||||
CVE-2024-1395,0,0,bc906c24f3b97a1f76fb28d9eb27a1438a7ca78483d0c0a7452e9b7efa2da958,2024-05-03T14:17:53.690000
|
||||
CVE-2024-1396,0,0,c2c7f8124754e0c20b02f3a3637cca1d95a3c2b253208efd7a2814f2d0550bd5,2024-05-02T18:00:37.360000
|
||||
CVE-2024-1397,0,0,e6d8c9c2beca75d3fdc5f918cb423cf21913a9c807f46126d5b49c29c7bd60f0,2024-03-13T12:33:51.697000
|
||||
@ -241282,7 +241283,7 @@ CVE-2024-1477,0,0,b1175a71510fd842138862374f281c1bda7457d7b234a1bf81a7a2fcce39bd
|
||||
CVE-2024-1478,0,0,54fc4d2d1af2d772e45f440cc01a56a5078a7b4f242f25febd2c561b4b9b409a,2024-03-05T13:41:01.900000
|
||||
CVE-2024-1479,0,0,75eecf66dbf69c578ea2f09e6e564cdf3b04311a1ae51ea49bee3724800fe960,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1480,0,0,e3c7fd19d7fe5ff43bf6f873c1d14cb0985599390e4107b8a61532a5f296336d,2024-04-22T13:28:43.747000
|
||||
CVE-2024-1481,0,0,dfbcc219e64e2cbb0745363bf8c9204c02d7e807eb078f031b2f2a7f7a785820,2024-04-30T14:15:14.617000
|
||||
CVE-2024-1481,0,1,39658db33ff193649ef5bddea8422c536fa95b98350c448c159b5f17a6e66544,2024-05-22T17:16:12.480000
|
||||
CVE-2024-1482,0,0,61f1933d97f430ea5062371f54d100c6fb03c771024804bcdad5092bc2efbfc7,2024-02-15T06:23:39.303000
|
||||
CVE-2024-1483,0,0,1ba808cb1c0d1fdcf5723092c3904b20d4561fdb7083f3ee67b919f5196c5851,2024-04-16T13:24:07.103000
|
||||
CVE-2024-1484,0,0,2816ffb064ebf87ebca44e6afd6928df4e130e61997f3bc50802157887bafe8f,2024-03-13T18:15:58.530000
|
||||
@ -241497,7 +241498,7 @@ CVE-2024-1749,0,0,60848b9fe8e314552386aa9c14aa482bff9335de768784b14d1a7df50a1f35
|
||||
CVE-2024-1750,0,0,656fce037334c637bfbad9d662c7e3d3e09717bfd06a6312eb238663a446265a,2024-05-17T02:35:35.177000
|
||||
CVE-2024-1751,0,0,7aa616bef5e27ed13b371ce9dacd4080fc5ffa6154b1e45a0ce11f0de1f1df9e,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1752,0,0,3b691eb63c202be2eb926d4c3601a8229a1e699fd5812dcaec474adfd9c6bd05,2024-04-08T18:48:40.217000
|
||||
CVE-2024-1753,0,0,03949c1a6b1a0dad16ccddc50c7e4944b804b505fae960542a96b1291eeb1ac2,2024-05-16T23:15:47.573000
|
||||
CVE-2024-1753,0,1,ef4b9715950b3021ed511bd76fe4b78f8b6797003f2bf756a74c31daed59be5e,2024-05-22T17:16:12.620000
|
||||
CVE-2024-1754,0,0,bb1af71458eba5bdfb6b90e382cbcddd60b96fb9bcb7aef4fa5483aa2a532c8d,2024-04-15T13:15:31.997000
|
||||
CVE-2024-1755,0,0,c4c00c2e9213cda2dc6708362bc52ae20ba1dfc3c894f2897c9375b229ad840b,2024-04-15T13:15:31.997000
|
||||
CVE-2024-1756,0,0,62e52d79aae78b309e4cd5e4ccf86fb8ee93e230c568d1d0b7a63a1cf36aba4f,2024-04-24T13:39:42.883000
|
||||
@ -241792,6 +241793,7 @@ CVE-2024-20257,0,0,76ffe9a92c93a06325edca86ddf0d31564fbc213598c5ddb9861c39151597
|
||||
CVE-2024-20258,0,0,86668eb2a14f93ae58cca9d4779b12b7223791a7316a5480eeeb82e1669b4fc2,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20259,0,0,73ab78da8d0a510423d7dde4580b3cd86ea36933046212658a9baf6cc1c10b54,2024-03-27T17:48:21.140000
|
||||
CVE-2024-2026,0,0,5071705b646dd74094af5cbedc0c8f83ed6481f03743c4a8c8e638254d8625b5,2024-04-10T13:23:38.787000
|
||||
CVE-2024-20261,1,1,48ef452ac044106281a7157af492d1d508fb44dad40ce930c4c28c1d602801ea,2024-05-22T17:16:12.873000
|
||||
CVE-2024-20262,0,0,0f454f18496ee5ef2600ffeec90b1f623047ba774ff76b9352de48c47d8ed167,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20263,0,0,e2b898d887c646815ae9f81fc2d94bb44bf5048bae0bf50a4ca3ec5baeb42436,2024-02-06T19:23:20.600000
|
||||
CVE-2024-20265,0,0,fbaf861e98006a5b6737fd0e8bab7fd09d0628199afba5baf3a37aa186d05d2d,2024-03-27T17:48:21.140000
|
||||
@ -241813,6 +241815,7 @@ CVE-2024-2029,0,0,8373bec1763a4514bbbcb69ac2f237a035a9f03f21660a36f059b41030fd51
|
||||
CVE-2024-20290,0,0,057d5dfa7ca9ea45e2cb423f9faaf6e87f8f428206a3f34ecdd5587406e21147,2024-02-15T15:43:27.240000
|
||||
CVE-2024-20291,0,0,8b3a799684ad77921390bf93ffe13565898bd7b11a64255da0ed7a22936da619,2024-02-29T13:49:29.390000
|
||||
CVE-2024-20292,0,0,487f367f547f807e9f94987f5696131d7f2dbcf85eef97db7117ebc922f8f0a8,2024-03-07T13:52:27.110000
|
||||
CVE-2024-20293,1,1,bf21d9271df2af8efbbae220a61329f6a685cdce31afe6ee8b1d6fe8ee8aee6d,2024-05-22T17:16:13.167000
|
||||
CVE-2024-20294,0,0,4fadb13db160be71a050b8cad86cc6a11a54187dbc8f5c1f128a04f8688febd3,2024-02-29T13:49:29.390000
|
||||
CVE-2024-20295,0,0,15daf48dd7dc82ddbbc6711ac40fe791a25c5cf42c57f7cb10c68c2d97bee3a8,2024-04-25T13:18:20.370000
|
||||
CVE-2024-2030,0,0,d28975d328a4fff677c165e5077b942b01b9ea45f41d0c27e4794a5e9083ea52,2024-03-13T18:15:58.530000
|
||||
@ -241858,12 +241861,15 @@ CVE-2024-20348,0,0,0302f1e9485b44e49fee557bce04f55ca5d1a83abb8a531d325f6a707ff9d
|
||||
CVE-2024-20352,0,0,0a21aaf855f5e2dfa6cf8a0de7df15d8d9ce0063ea679dcbc607b17583312064,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20353,0,0,0ad32ee557f52a7b8ada270f35945efb8e6756e485c22be736fc9eb0d9c4e4e0,2024-04-26T15:22:27.803000
|
||||
CVE-2024-20354,0,0,77dad3524fb09cfda3488dd6cb6801d1cbef489cb4a9c5ad1ce0cd080b146730,2024-03-27T17:48:21.140000
|
||||
CVE-2024-20355,1,1,44466ec396582e1f3a9585aa71dff26a978b89a875459857e13c0bbb7c429824,2024-05-22T17:16:13.477000
|
||||
CVE-2024-20356,0,0,520a5229b5523a4caebc12a2a13fabbd3ee32baa429880796f24d4f599838cb8,2024-04-25T13:18:20.370000
|
||||
CVE-2024-20357,0,0,3a1d2757f67674d091902d27d845115a7046a8d266fe0b3daa6615e60c820655,2024-05-01T19:50:25.633000
|
||||
CVE-2024-20358,0,0,a08433ecd9375b9385be343adba44e1b907ae2f57b9c630ccf362a5c87517062,2024-04-30T14:47:57.753000
|
||||
CVE-2024-20359,0,0,103c2bc1c6783d5aa055ed80504c27ea24cb5bf5556deb17c85950666ec17e99,2024-04-26T15:25:02.773000
|
||||
CVE-2024-2036,0,0,bcfdbdd174510ba0864b0e6171969e1a6500d4f97dc7bcf3ab34f7b2bf61efef,2024-05-22T12:46:53.887000
|
||||
CVE-2024-20361,1,1,70dc72c8f7d2d61dc04fbd568188c6f9ef922857e920758d364e06dc87658d88,2024-05-22T17:16:13.733000
|
||||
CVE-2024-20362,0,0,0e125a5f57daca09b3a31c24c5285918bb46201f033defe636102ce0379b9ecc,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20363,1,1,8e842516d76724c4b0573dd67e87756c7fc165b87ee350684f942f23c9cd928a,2024-05-22T17:16:13.950000
|
||||
CVE-2024-20366,0,0,847482c81cd89b351ccec66c9f3c8d8074954a0de68a5d98d408eebff09cee32,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20367,0,0,e44fa9dcd83189ac4bb0284b57ce6be9f7d161e3fd46e74e477fe5fd623ca1b7,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20368,0,0,4814a8127430faf4ae61ecb30b9f4c874f54598057d22bcc8b2ca14f1fefa88a,2024-04-03T17:24:18.150000
|
||||
@ -242753,8 +242759,8 @@ CVE-2024-21870,0,0,eb93ddaf02bbc4698ce65f000ac66cf4bffe10c9c37f8f4faeecaca1a0400
|
||||
CVE-2024-21872,0,0,1f8fabf09d1871ce9f5dba61318c59e087780cfd147e9342fc379104db212e44,2024-04-19T13:10:25.637000
|
||||
CVE-2024-21875,0,0,d88c7fa028650d8c38c644c89741f5c8883fbb1f9fa5219cf2c447a4b53bf374,2024-04-12T07:15:08.283000
|
||||
CVE-2024-2188,0,0,50073fcb971d8d943a63e1f3e232811ec9a11d1acf3f48e9da561ed8964c30e8,2024-03-05T13:41:01.900000
|
||||
CVE-2024-21885,0,0,3a8555aba848a763891301ea45be2dc447cf6e91c8980c7f8fb662d07f448edc,2024-05-03T13:15:21.410000
|
||||
CVE-2024-21886,0,0,51c64b750a7fa30c4151f47347eefcb19a07d8afc937f6dd2165654f59623a1b,2024-04-30T14:15:14.867000
|
||||
CVE-2024-21885,0,1,4c0a37c40fd97a6227c8ac231d63d8978b27ea4cc3663dac441d0237ba7c4585,2024-05-22T17:16:14.187000
|
||||
CVE-2024-21886,0,1,9d88c691c44df7e3c56c69da8cca3e89baff037b02f5cb7b18f748891d376c22,2024-05-22T17:16:14.343000
|
||||
CVE-2024-21887,0,0,27308d07d43795d3f4289d79a64af5933e89a71cf679d41be9d0c5a30a308379,2024-01-22T17:15:09.523000
|
||||
CVE-2024-21888,0,0,9de3f75608c2ffa998f0bcfa0dcc7f6af68bb755862afa34798392c7baa192b3,2024-01-31T19:53:06.303000
|
||||
CVE-2024-2189,0,0,c2544e4d9801646df1c7503255caee5a562299b04680b76ea4290b2d833dec2f,2024-05-21T12:37:59.687000
|
||||
@ -243365,7 +243371,7 @@ CVE-2024-23059,0,0,1ae620a0d7759193ae34540a4455aa9c0a81f947f508fbecbd634aa926d83
|
||||
CVE-2024-2306,0,0,9f487c2d8209218621d1d76cdabca18f6ed784cc183269f450c7ace110fb436e,2024-04-10T13:23:38.787000
|
||||
CVE-2024-23060,0,0,293f3db63669f513fdf6243d872feab4a40014b3abd2eff3b8edca7a0ed1b3d3,2024-01-18T15:17:35.587000
|
||||
CVE-2024-23061,0,0,d40b225d92d8f0f0d47201622b24e50bc3550ed3e56a2682a133a8aeae5027e3,2024-01-18T15:18:14.357000
|
||||
CVE-2024-2307,0,0,af89ad04cf757177709a8494eb4cf8523c94e75b3454852ae90f53cf97a082fb,2024-04-30T14:15:15.160000
|
||||
CVE-2024-2307,0,1,8e3ae62c96d50ac8e1cef763d15987fd4edb9ca5fef913572175d621539da2cb,2024-05-22T17:16:14.610000
|
||||
CVE-2024-23076,0,0,c0204d5498e830636e4b113382f28f47ea760047509babca48525e6995d1e1c9,2024-05-17T02:36:28.137000
|
||||
CVE-2024-23077,0,0,9d92319df99a412231f2dd25ec714f431ff32a6a426769436bcb54fe968b9903,2024-05-17T02:36:28.210000
|
||||
CVE-2024-23078,0,0,ff5c34647fdff037d6fa3258c1a93b17acbceacd56eb90daf6eaba129c204052,2024-05-17T02:36:28.270000
|
||||
@ -244451,7 +244457,7 @@ CVE-2024-24936,0,0,b40cba45486310464826445db58797cda9708090ef629993d6b65c1322a94
|
||||
CVE-2024-24937,0,0,c158a1376665515fcdd077ebbbc61196266e17dfca3642cdd3f2b284922e7576,2024-02-09T01:05:30.783000
|
||||
CVE-2024-24938,0,0,919f0844348072e68674027ea0a3644c0c8fc392a786b352b8f3abde920f1f60,2024-02-09T01:05:13.527000
|
||||
CVE-2024-24939,0,0,b2b5d03f9e7db36f290b4e039454a0e87440b3b4044776d74739544bb234180a,2024-02-09T01:04:16.577000
|
||||
CVE-2024-2494,0,0,ca619baa8fd230df6a39fee3cda8883da0fdecdca74c197bc27d803e06927aaa,2024-04-30T20:15:08.067000
|
||||
CVE-2024-2494,0,1,fbbd0a69b53835f4959f3652f703a2e6217baf25e1862ffc8b789880958ffe4f,2024-05-22T17:16:14.740000
|
||||
CVE-2024-24940,0,0,3b807f9711835fcb1381b61d94808660dccf6fdaaa44b568b18928314f306783,2024-02-07T23:45:31.493000
|
||||
CVE-2024-24941,0,0,3ce7539cc2c00ca21eaf8843bb8dfa494f8daac6c677d25fe85a072b680aec63,2024-02-09T01:05:05.250000
|
||||
CVE-2024-24942,0,0,98967e5f253d2f0e2d6c9adde01d5feb324664bac3fce3b7b875de585c5550eb,2024-02-09T01:03:13.453000
|
||||
@ -247105,7 +247111,7 @@ CVE-2024-29115,0,0,142414ad4545b27307ef892525e38d2bb8c83878ba7d3b929a558d2d8f461
|
||||
CVE-2024-29116,0,0,22312ff0fec960bf6bd22c8e8f459c2262200779b53186c3b1d0f522ebc154df,2024-03-19T16:33:58.680000
|
||||
CVE-2024-29117,0,0,4796a230809f99a49ee05655b5187418907ba301781386f31aa5927b23559ddb,2024-03-19T16:33:58.680000
|
||||
CVE-2024-29118,0,0,6ac5e6cd6ee7b43d8431dc316e005ede5cf4637a65ec75ca3c6a90cc83910dc3,2024-03-19T16:33:58.680000
|
||||
CVE-2024-2912,0,0,7853e1850da1df1a9d27e654a4679904ce21be5712661c93d1293795d88290f3,2024-04-16T13:24:07.103000
|
||||
CVE-2024-2912,0,1,6be4a48f5007324ba127b8d48e301648067c3d0d8e25731ab08452810c4247ef,2024-05-22T16:15:09.713000
|
||||
CVE-2024-29121,0,0,93c4eed4f19d6c35e5794bebf3078da12779b20c5796aea61af6820f2f1f0547,2024-03-19T16:33:58.680000
|
||||
CVE-2024-29122,0,0,354c54b8c87b5aa75aed35dae5dd6c47ba1694327d8aa600a98403368348e018,2024-03-19T16:33:58.680000
|
||||
CVE-2024-29123,0,0,e3fdcac69f03cdf2056f95a7639e6d970705398d9baf4f730c7daff4391b483c,2024-03-19T16:33:58.680000
|
||||
@ -247245,6 +247251,7 @@ CVE-2024-29385,0,0,8759a5732499ce248301d7321fb10ac2a0ff45ccfb82ec638dc2ec07b2660
|
||||
CVE-2024-29386,0,0,46150b3636ce7f0c25cb166967d8e2ffb59b578767fa72331e04f23b7ba93e5f,2024-04-05T12:40:52.763000
|
||||
CVE-2024-29387,0,0,64dc77a900c3b36a10f003711c44947a360d31708081f08c65915c82f4e2f15d,2024-04-05T12:40:52.763000
|
||||
CVE-2024-2939,0,0,8d288c5421907c18561d6a467f0e78e7e78afcae942dcb9d7c160f3050babf32,2024-05-17T02:38:38.230000
|
||||
CVE-2024-29392,1,1,da1ab179d03c780bc51413a8ae8bb5096c375b6f62863f42bd442249cbf7be0a,2024-05-22T16:15:09.590000
|
||||
CVE-2024-29399,0,0,1f0a560642c5bcb6053c3eb35cf9c158aa499897c937eeb4d73efac983ff0857,2024-04-11T12:47:44.137000
|
||||
CVE-2024-2940,0,0,bdac3de755ddba1fc10ba9f0b54c2d288bf5bbaaa5fc7e8b4cdd60093fb3f65d,2024-05-17T02:38:38.323000
|
||||
CVE-2024-29400,0,0,7c7ba10951f85314b8517e4af19bc97a8e02a4fb9c2ebd30adadcdfaed825d5b,2024-04-12T12:43:46.210000
|
||||
@ -247657,7 +247664,7 @@ CVE-2024-30185,0,0,a781b9014abd19a00a8d62f1c673ab43addf79eb808bed01ac8422942c39f
|
||||
CVE-2024-30186,0,0,fb11f40c5a3e049b4173bd5ffb37b55dd352f80bf009d46c6a7e0ed4bd19ac71,2024-03-27T12:29:30.307000
|
||||
CVE-2024-30187,0,0,f8d37ff5304c8d102184c9586047a497264eab63488a1192b60bf85807ce2976,2024-03-25T13:47:14.087000
|
||||
CVE-2024-30189,0,0,3f4990ace311ce3f5f501a6dcf406cbed1780f0c03c898c2001b2eab67f70f47,2024-04-09T12:48:04.090000
|
||||
CVE-2024-3019,0,0,26781c9df250110b6a509bf87d739e51c2ab01078faac5b13ae615535afe533e,2024-04-30T20:15:08.733000
|
||||
CVE-2024-3019,0,1,b85ad020b3d00262d0df2bb978c3f5361041e08453f8ee7c90ad1b47480644cc,2024-05-22T17:16:15.600000
|
||||
CVE-2024-30190,0,0,51fa3b61b1a89cc1e5bfc291b48055ea6ae2c46214176899850afb7f6a1c269a,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30191,0,0,ebc6f15da39286087c5d03b22d2078cfcc767238c4f5e6e7ea4485533eac454d,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30192,0,0,c058935b45ae3c1c682d0c8091f1486b6546bc2f278e4ebfa792d597067b45ed,2024-03-27T12:29:30.307000
|
||||
@ -248235,10 +248242,10 @@ CVE-2024-3107,0,0,8567b8b8d2bb62063ead5812f7765e864af3f68fdbb051cf4e93b652388b31
|
||||
CVE-2024-31077,0,0,cf1dae6bdc673263e7fd88f3fafa76996295a3cc4f001c878e21a09e0714f3a7,2024-04-23T12:52:09.397000
|
||||
CVE-2024-31078,0,0,12059b4643db1f23db61cb234ce054c5e189af8320b848468c77237912b37117,2024-05-07T13:39:32.710000
|
||||
CVE-2024-3108,0,0,070c476c8b05a00833385189351777843e2f39cc6aadaede33e4faa3018d9caf,2024-05-03T14:17:53.690000
|
||||
CVE-2024-31080,0,0,f054913239e9fff00b61da9bc96b207964c9acbdd383172b674082b38bf77b8e,2024-05-01T18:15:22.810000
|
||||
CVE-2024-31081,0,0,136635ec06154c204154356b9c36d8a3fc773c3e25bcb66a4a971f2dbdc8623f,2024-05-01T18:15:22.920000
|
||||
CVE-2024-31080,0,1,cdbc4f09eb8eac5cf25cb51d2f02f17c8ee5ca9bcdeaeaf63cd9cb2120b0eb17,2024-05-22T17:16:14.877000
|
||||
CVE-2024-31081,0,1,14003613401dae123802c908d5eb27168372470521f72dfb8c084b577a194f7b,2024-05-22T17:16:15.070000
|
||||
CVE-2024-31082,0,0,bdfcb057f85f6187632044603f1e26424250c3da20937699f7c7969b7292b011,2024-05-01T18:15:23.040000
|
||||
CVE-2024-31083,0,0,76dc21ce06953d3a10e999f11f9dd01e726d5ca49ee8fc785c75cf3d6666d197,2024-05-01T18:15:23.127000
|
||||
CVE-2024-31083,0,1,16c7b028efca45ca344e47a88e4c970f46b0f17eb6e326dd5dae586cc2c8984e,2024-05-22T17:16:15.223000
|
||||
CVE-2024-31084,0,0,7e7f6ad60462c421140a8806edcef098f25e94de0014c2ff06256ca8e21d3894,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31085,0,0,159d63f28600902a854d5dada2c0b5fba89225c71015785af44f46e211303b47,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31086,0,0,3a59132be6de96612b5e7dbc7323f59f175814cf3bfa0c8c82639a22898b6c14,2024-04-15T13:15:31.997000
|
||||
@ -249396,10 +249403,17 @@ CVE-2024-33213,0,0,b148497f8be1950a6fa46d58723de7904955cc78b66d2d908246ba324bd2f
|
||||
CVE-2024-33214,0,0,e8bb1a89ed9a6fe57462cf7839328d6243261c99698249abe128719bc3054c5f,2024-04-24T13:39:42.883000
|
||||
CVE-2024-33215,0,0,c8be43358325b8e905d28304a9339956d17f1418e85498fcb8a7134416d3977f,2024-04-24T13:39:42.883000
|
||||
CVE-2024-33217,0,0,4e1e2d2adceccdbe12f057aebeef0a19faff919f64d3f29d52997e302777a311,2024-04-24T13:39:42.883000
|
||||
CVE-2024-33218,1,1,7249c988adc5d92dff0cae553abb8648ded282aea872d62c483942008ba68f7b,2024-05-22T15:15:28.550000
|
||||
CVE-2024-33219,1,1,ab0239815682c3d07bc6e2f9c341ab35d7339d9c39a5b59852ebae318851b719,2024-05-22T15:15:28.680000
|
||||
CVE-2024-33220,1,1,e15e19deb9a14dd926f1035841a5ddba85c3924b031e6183c438d7c9103db44b,2024-05-22T15:15:28.780000
|
||||
CVE-2024-33221,1,1,2f03c69b304ebec2914274e33dde50ff262402355507b26c38535ee0c9666379,2024-05-22T15:15:28.870000
|
||||
CVE-2024-33218,0,0,7249c988adc5d92dff0cae553abb8648ded282aea872d62c483942008ba68f7b,2024-05-22T15:15:28.550000
|
||||
CVE-2024-33219,0,0,ab0239815682c3d07bc6e2f9c341ab35d7339d9c39a5b59852ebae318851b719,2024-05-22T15:15:28.680000
|
||||
CVE-2024-33220,0,0,e15e19deb9a14dd926f1035841a5ddba85c3924b031e6183c438d7c9103db44b,2024-05-22T15:15:28.780000
|
||||
CVE-2024-33221,0,0,2f03c69b304ebec2914274e33dde50ff262402355507b26c38535ee0c9666379,2024-05-22T15:15:28.870000
|
||||
CVE-2024-33222,1,1,0b1e03decf069da78d521b13cb17604ad1461c59294efb3488a032ea6d5df370,2024-05-22T16:15:09.960000
|
||||
CVE-2024-33223,1,1,d66245c069881d095af7ac33767a4b4f26a623e505ac53f8d4b37c47db3629e4,2024-05-22T16:15:10.043000
|
||||
CVE-2024-33224,1,1,bb54e90510527cddc3dcde5a789e80f669e8c6710c35e8756a3483226471f212,2024-05-22T16:15:10.140000
|
||||
CVE-2024-33225,1,1,c588d947ca5b888e51da8e331d68186d09171017d678e0d3fc50990ff4434328,2024-05-22T16:15:10.220000
|
||||
CVE-2024-33226,1,1,de05c51ab10fcf999afc9d39b1714e6a73d2505cf4e557762b4be78d32f49294,2024-05-22T16:15:10.317000
|
||||
CVE-2024-33227,1,1,03386191d710962d0e9e1e794a4f07c97fd992f81932fe29f94b8fcd9c76405d,2024-05-22T16:15:10.403000
|
||||
CVE-2024-33228,1,1,758a8de4a85b30b77f90b3d1ff313ad1ee08b1e76b2d5c0d5da2fa46cdb70c39,2024-05-22T16:15:10.490000
|
||||
CVE-2024-3323,0,0,5322a19626f9d41fbc85f0f073b4efac313efc9902bda6b2387f115ed4ea09c7,2024-04-17T20:08:21.887000
|
||||
CVE-2024-33247,0,0,66af889d7e6ada10bf314bd53454c582a1455dd661c7cb5b07f6d9cd6d1d400f,2024-04-25T13:18:02.660000
|
||||
CVE-2024-33250,0,0,80f5075a1ccdf0bbe31bc42b408e98f86c2ee0faa43a99a4e3de76f2fa1f2732,2024-05-14T16:12:23.490000
|
||||
@ -249998,6 +250012,7 @@ CVE-2024-34441,0,0,30a4318e62907426b3ab700c3b20e4f834f59441ac7ba3bdfe737a2f99871
|
||||
CVE-2024-34445,0,0,5ae9c8efe1aaf47848c5b15a6687968aa01604c93efb870985c96be2737d2fc7,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34446,0,0,b445bdbcee2357cb0b4db1ab10e64a435c89bc8ae1d2fa2a306f3117c07625d0,2024-05-03T15:32:19.637000
|
||||
CVE-2024-34447,0,0,7d0c1160e9ad74b2f0d138c65d27109e83600e38ed8d60bf74a510fb61e6f980,2024-05-14T15:39:08.297000
|
||||
CVE-2024-34448,1,1,2a939ae96b37c4bc51d7e0f7c82396c53fdcec382109ead546212b66ef511612,2024-05-22T16:15:10.580000
|
||||
CVE-2024-34449,0,0,28da5cfb8215143a3847fc37f7163047e3e2e183b8d6abcf511553c3cec5bb16,2024-05-17T02:39:35.457000
|
||||
CVE-2024-3445,0,0,2031eee497e177f244890449ab10d2f196dd08d103f846fc9b20779b1f74d465,2024-05-17T02:39:56.830000
|
||||
CVE-2024-34453,0,0,9363deaf6a5ec68194d671cadb0973a2ba23402d3e2800c4f9eea6dbd677c5cd,2024-05-06T12:44:56.377000
|
||||
@ -250263,6 +250278,7 @@ CVE-2024-3534,0,0,3f1920931444a20406a7f610b0b64ebb830986df38b69b0c0bee94b2ffa95f
|
||||
CVE-2024-3535,0,0,f574fcdaa266eb8da2fb53308d734bd66c33a13c49e8b4335f6bdaf83f11e9c6,2024-05-17T02:39:59.803000
|
||||
CVE-2024-3536,0,0,b63dbc7abf49c7babee61877e5b2a8e70e35b7a32ec432c7d29371fbe78ff8a5,2024-05-17T02:39:59.897000
|
||||
CVE-2024-35361,0,0,981fcbfd9f4303bd43de5df85c3e320402b0db2b2b55c36fbcead39aa2c6a55b,2024-05-21T16:54:35.880000
|
||||
CVE-2024-35362,1,1,ea2753e7639e7c52029775eee0f7bfe15bf7d0ef604ec552f722a78009a737ad,2024-05-22T16:15:10.687000
|
||||
CVE-2024-3537,0,0,a991188dca9ef4640adf7a802695a0fa207bb0c024fcd7aac535d47c4720436f,2024-05-17T02:39:59.987000
|
||||
CVE-2024-3538,0,0,f8cabe6328eaf87ba6d9a024b15cf0edff2e3f1ab108489ec3ba849f1bf7e980,2024-05-17T02:40:00.087000
|
||||
CVE-2024-35384,0,0,d21dcb965b72196df94f0bb7eb7aa18a6c33135d9d1348ad106df5e9cb4ecf63,2024-05-21T16:54:26.047000
|
||||
@ -250270,7 +250286,7 @@ CVE-2024-35385,0,0,21597def780ca6884558067b51483acdca600d8be33898c67abdcdef1ba10
|
||||
CVE-2024-35386,0,0,63a53517daf1d5aaac9a967daf19124c43ab7a94d47ed1840eb2a25a89bf0357,2024-05-21T16:54:26.047000
|
||||
CVE-2024-3539,0,0,60c05123a1e373dc128a0b3a0504b80a20c5ae87d598ef1e28e77594da7f3a50,2024-05-17T02:40:00.187000
|
||||
CVE-2024-3540,0,0,c58fda32eb76563ef2ccd0b9c389537d6cfae50422ab18b8dbb1bd1161d40701,2024-05-17T02:40:00.280000
|
||||
CVE-2024-35409,1,1,8f7fe211171092bc9f721e49d41c7d59a7f5ed33f974c0543542b2249ac93411,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35409,0,0,8f7fe211171092bc9f721e49d41c7d59a7f5ed33f974c0543542b2249ac93411,2024-05-22T14:30:41.953000
|
||||
CVE-2024-3541,0,0,4678afe637b96076af7a5175ea4b3f0b09c929a839eb19db5485fd9bba275844,2024-05-17T02:40:00.373000
|
||||
CVE-2024-3542,0,0,51b6d50efd1b210d7db5947c3dd204f04f701b4bbaf819f3c8cb9ee3b17490e4,2024-05-17T02:40:00.463000
|
||||
CVE-2024-3543,0,0,fcdce76ee9f664c4051d70ca4d8408961eb7768c8664bc2d390108d6130755df,2024-05-02T18:00:37.360000
|
||||
@ -250278,25 +250294,25 @@ CVE-2024-3544,0,0,9c89c629785658109b56b96c611d48bc2c812cfaf631fdfc3e653cecb7fc80
|
||||
CVE-2024-3545,0,0,5bce2ec2b9cfe5866e6246067691b4f478da11354be249c7fe197f29a14875e8,2024-04-10T13:23:38.787000
|
||||
CVE-2024-3546,0,0,b7d401512e71f405610f26682a516af89f926e43ff4e75a0c9aadb49aa034713,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3547,0,0,fedd03df736ec1706076663d75a5df99f3108b401b2cf8280bfcd344106c9920,2024-05-14T16:11:39.510000
|
||||
CVE-2024-35475,1,1,daed0b1c028d37a4b84db07ca0cfe64c43d18fffdfd6604041b14733e87830df,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35475,0,0,daed0b1c028d37a4b84db07ca0cfe64c43d18fffdfd6604041b14733e87830df,2024-05-22T14:30:41.953000
|
||||
CVE-2024-3548,0,0,e23424ba819983ac2599fe48852cbfc904a10db222c55ccac010f7ec55b39028,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3550,0,0,be0f7ed1cc8c69e2fefc881c953115f1247b844866a37cfd3935f1cbe0fa2b81,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3551,0,0,707951f769b10080ccfb0e7ec01d2b664cd8f0bbbe9c53d60fa858f7750b27d7,2024-05-17T18:36:05.263000
|
||||
CVE-2024-3553,0,0,35fab26edb78f51246dfea40a1da2d2c641df3766aad72a071763d4720020731,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3554,0,0,b4c32859301bcc314e2dd2301d5e454826bca59cac4e6957d0f808d223349460,2024-05-02T18:00:37.360000
|
||||
CVE-2024-35550,1,1,37f092ffd3479b49a17a3f1e0b59c5eb78c37c7f630f220f7d9da2f87aa31c70,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35551,1,1,55348e3e9b91019d2da6672295479fd69fa625e27aec5015db688469eae4d28b,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35552,1,1,d29f0b3c09feb8f421981bd791ddf8677627e74d3b97b0e96f76b0caeb4eb522,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35553,1,1,5cacc76057b5383052abf0edcc1ef075364591ebb50b0ebbfe4575a5f816f884,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35554,1,1,c9fb199f520c9b3540bda40b78f438d49a82428657df7edaf25fab5788e959aa,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35555,1,1,6fa171af592d3c23af2e31e5853d7ad35c26e1019a331f0ec65b474920644aa8,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35556,1,1,5dab83cfcdff3e508077c4205f919095654014396a21c674bd4ae0c0aeda07cc,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35557,1,1,8f0056946231aa3e1883a87ac4342cf756bc743823031d082d99bb86849e21f2,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35558,1,1,ef2c6ac3d24a10327d510beae9693416f9c600012d96241e00bb733f56fd10da,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35559,1,1,0e0ce300b73ed62ad8a51cb05e5d24371bbac77caf688feb79ef16ffd51847b1,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35550,0,0,37f092ffd3479b49a17a3f1e0b59c5eb78c37c7f630f220f7d9da2f87aa31c70,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35551,0,0,55348e3e9b91019d2da6672295479fd69fa625e27aec5015db688469eae4d28b,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35552,0,0,d29f0b3c09feb8f421981bd791ddf8677627e74d3b97b0e96f76b0caeb4eb522,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35553,0,0,5cacc76057b5383052abf0edcc1ef075364591ebb50b0ebbfe4575a5f816f884,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35554,0,0,c9fb199f520c9b3540bda40b78f438d49a82428657df7edaf25fab5788e959aa,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35555,0,0,6fa171af592d3c23af2e31e5853d7ad35c26e1019a331f0ec65b474920644aa8,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35556,0,0,5dab83cfcdff3e508077c4205f919095654014396a21c674bd4ae0c0aeda07cc,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35557,0,0,8f0056946231aa3e1883a87ac4342cf756bc743823031d082d99bb86849e21f2,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35558,0,0,ef2c6ac3d24a10327d510beae9693416f9c600012d96241e00bb733f56fd10da,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35559,0,0,0e0ce300b73ed62ad8a51cb05e5d24371bbac77caf688feb79ef16ffd51847b1,2024-05-22T14:30:41.953000
|
||||
CVE-2024-3556,0,0,3585ee5c92a9c3d529b040dd670fbfee3d6182484f87bd29638348adaae5ce9a,2024-04-09T22:15:07.470000
|
||||
CVE-2024-35560,1,1,597dd8543549aa3918a7c198c5233aa0b7527be9ddf9110727da0897342b10aa,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35561,1,1,8de74913deeb82bc0c13bc3d399d98340f8983a7e0aea38e829e82b55ca5ac91,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35560,0,0,597dd8543549aa3918a7c198c5233aa0b7527be9ddf9110727da0897342b10aa,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35561,0,0,8de74913deeb82bc0c13bc3d399d98340f8983a7e0aea38e829e82b55ca5ac91,2024-05-22T14:30:41.953000
|
||||
CVE-2024-35571,0,0,67f76ae9f90c9f57899e4b508cc3f136e4d8caf290ab8a02ecec3dd8d722ed10,2024-05-20T19:34:58.277000
|
||||
CVE-2024-35576,0,0,6cb958bfbb2aa8f28dc30b2057abfc4520624058806f8d23062e42f766a7e31c,2024-05-20T19:34:58.277000
|
||||
CVE-2024-35578,0,0,9b6af24900c97b8c8fceb2460e2cf2035a5639481f86d7f4da562c9cc2c3932d,2024-05-20T19:34:58.277000
|
||||
@ -250557,13 +250573,14 @@ CVE-2024-36010,0,0,6f643d760193939acd403776f35d8094295a237f49299303e96b8a627d329
|
||||
CVE-2024-36039,0,0,7819448caea04349894603b655b7a026f4a20175e41e6c559f30343634b66d20,2024-05-21T16:53:56.550000
|
||||
CVE-2024-36043,0,0,8d68423d5fd19f184b1028d7213d8202af063db8832c1e9d8a6916cceea3f12f,2024-05-20T13:00:04.957000
|
||||
CVE-2024-36048,0,0,b5cb97f8eb2dd5aaf745035f8a3442137591158895420be0c263c765fd00e4a2,2024-05-20T13:00:04.957000
|
||||
CVE-2024-36050,0,0,c79fc89a48ed89dcf4d15eeef3d834fb7c79d060d7834770c6d234944bbaaa4c,2024-05-20T13:00:04.957000
|
||||
CVE-2024-36050,0,1,4c307008c713c918a6e3b84da1e5e49b2b2247354b7102850872f2f1076c6edc,2024-05-22T16:15:10.777000
|
||||
CVE-2024-36052,0,0,a63d7bb2074a4a528ba25d1f94374ebf75880c4428a5213e9c4d314234666c24,2024-05-22T12:46:53.887000
|
||||
CVE-2024-36053,0,0,fef1cd5ec117c37d553d30976d7cdcb88e8779793eaefe814dd4e91dcea20b01,2024-05-20T13:00:04.957000
|
||||
CVE-2024-3606,0,0,aad549bdf5ff1831d91b9701456650bb1ccc1938c3f938f0c7eb426394ab8356,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3607,0,0,af4721086df8378a380a0243b924575fce7196863af6b8319186a0a7c6039e9f,2024-05-02T18:00:37.360000
|
||||
CVE-2024-36070,0,0,19c2fc8fdc41593f53c176f18e743efa8020d50d8ffdbcbf1475257d2bfa8428,2024-05-20T13:00:04.957000
|
||||
CVE-2024-36076,0,0,7bd178b56b4ea91c0d10da16861cc8958caaaa1d0561d3821785629a0cb379df,2024-05-21T20:15:08.970000
|
||||
CVE-2024-36077,1,1,1e20afe8f11cd7adc739bc407caccf40ce84fa39af5192cb7db769a973dc0f52,2024-05-22T17:16:15.377000
|
||||
CVE-2024-36078,0,0,033f7985523b33a9cd47ae7b39c65b68fc3ef0710dcf434d451eae182ed35127,2024-05-20T13:00:04.957000
|
||||
CVE-2024-36080,0,0,57481f5a54f68f6f7f09dded26dd0588b050980d38ac9c78940318892c2197a1,2024-05-20T13:00:04.957000
|
||||
CVE-2024-36081,0,0,0aabc3d5ec0a35d1482a2ee38b1087a1798092236c6b1a2ef029f3cd7c35526c,2024-05-20T13:00:04.957000
|
||||
@ -250801,7 +250818,7 @@ CVE-2024-3914,0,0,4e5bf7e4bbf357662295118acaf46c6e90e6b4b9830d6a3e29a74e49dd1420
|
||||
CVE-2024-3915,0,0,a29a2abe3549638b7baa29d25d43b9e7f1e9b70435ac870f9f426e12fb2f2812,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3916,0,0,67c028ed5cffa81651cfdb7590d8583ba32a4964953feede869ed8c9f6426eef,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3923,0,0,dcd7a979944a34edd9f4dd960691916feb4f3b194c37e215c41a761a1e13cac2,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3926,1,1,cb339a98e87185eb47ae9e44f7eb46b88833711568c7150447215eeb823999c4,2024-05-22T15:15:28.967000
|
||||
CVE-2024-3926,0,0,cb339a98e87185eb47ae9e44f7eb46b88833711568c7150447215eeb823999c4,2024-05-22T15:15:28.967000
|
||||
CVE-2024-3927,0,0,7829cb310d77178b7eeb75814db111ab7836f1cd335248ee93c84ada4720d633,2024-05-22T12:46:53.887000
|
||||
CVE-2024-3928,0,0,537f117f8c3572d036e1aa43e9ee1a226723d4a5980268ff58c8876839ea31b2,2024-05-17T02:40:11.687000
|
||||
CVE-2024-3929,0,0,31d0a734bfd88727a2a61deb7a29595ac9c8ac4a930ee35c31639990489d025d,2024-04-25T13:18:13.537000
|
||||
@ -250986,7 +251003,7 @@ CVE-2024-4252,0,0,3896f5ee238bad3d7e0a938dc110cad0a34521ba589448d2dc895a14fc5112
|
||||
CVE-2024-4255,0,0,fe667b23218914fa44fee4b4c2a7be125396fae9094659c59aa2ca90b0b1e450,2024-05-17T02:40:21.147000
|
||||
CVE-2024-4256,0,0,f01b9b3012ce7ea24c9894def6f3f1cef49ac09bb4f57d3ed8f552e5b1070b71,2024-05-17T02:40:21.240000
|
||||
CVE-2024-4257,0,0,0f6d2313bd719b89d901deefe2dc2f87463055c189b3c018795a055e61e9ea45,2024-05-17T02:40:21.330000
|
||||
CVE-2024-4261,0,1,c2224f2306443d2b306e68003a35b6477d4e0aa1b3074bee3268e0ea9deb3145,2024-05-22T14:30:41.953000
|
||||
CVE-2024-4261,0,0,c2224f2306443d2b306e68003a35b6477d4e0aa1b3074bee3268e0ea9deb3145,2024-05-22T14:30:41.953000
|
||||
CVE-2024-4262,0,0,48de03b038c3a9950f1b2d36329d9f6a6297e28f8023eb3afff323d082fd07dd,2024-05-22T12:46:53.887000
|
||||
CVE-2024-4263,0,0,b1f2b30077721ef2ca6e11fb6bda0f0973b13bae19df9c4c6804c151ec0ef6fb,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4264,0,0,900b6e21a73808decad0bbd9ff6caa01ca608bdbd52b2ff79e0e58d7828f5894,2024-05-20T13:00:34.807000
|
||||
@ -251155,6 +251172,7 @@ CVE-2024-4559,0,0,04253977f1b3aac9c2c8228f67b55a5d97f0f228a3fd1b3fdffeaf9dbbc176
|
||||
CVE-2024-4560,0,0,01330bc30e6abf90cd0e894076fd4822775b90946ecfbbe71c3855f1f2c00212,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4561,0,0,419f075cb470fc0bcbe1e02ad47a96fd3735721568a3ea0b27d92242ea08e526,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4562,0,0,4b41dac3b3dc0160472fa769fd66d4820687adcd6a603b6680aeb5866557430b,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4563,1,1,57acef1c5d1c9a053c99dc74be3ef8002736b576d71b424d5374b4ea0fbda9ef,2024-05-22T17:16:15.730000
|
||||
CVE-2024-4566,0,0,56d6dff8001ced0ac379df1540d8c705e1cb0415cd6a569faf0604bdd4ed8dc7,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4567,0,0,bff521ec958712c348010a89da0e0aec519b6a717613a798e9a8fee426de5e74,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4568,0,0,79c6e65478e2e86d702896e792fead76bbebdb118f8c0f66e6390a241a22321a,2024-05-07T13:39:32.710000
|
||||
@ -251461,6 +251479,11 @@ CVE-2024-5136,0,0,7e1453b58a6b8cdb889318a17e467bc4887e911147f2bbd5898eefe5c0fc0f
|
||||
CVE-2024-5137,0,0,9ef636c571a0277ac03884ccb19a37de0ac2ceab7c0195ff8a91e587e734c012,2024-05-20T13:00:04.957000
|
||||
CVE-2024-5145,0,0,779a53179978014855de22e41604c12feef2bb6901d36d253a629d55b7b44ab6,2024-05-21T12:37:59.687000
|
||||
CVE-2024-5147,0,0,f786cdd04c7e64ee05dc3a502a4fef5436dd8390bfdc70803ca93e4405d481a0,2024-05-22T12:46:53.887000
|
||||
CVE-2024-5157,1,1,04ebc9442b1c80ffa0dc60d2577cbe7978be2624ce08688ce3f01b984bd25d6e,2024-05-22T16:15:10.863000
|
||||
CVE-2024-5158,1,1,a9c18c9b6c25698a66146c7b4d6323d152494bd2e2d9c667b0869e006f7d2fd0,2024-05-22T16:15:10.947000
|
||||
CVE-2024-5159,1,1,99c9971f3a1075bf94db8dcfabdb2b5e95a362d2273c1f3b36e7008161857ef6,2024-05-22T16:15:11.013000
|
||||
CVE-2024-5160,1,1,b69866da66290415d8426d0a84016d2481bc653e74865d8dd8f61b1fce439920,2024-05-22T16:15:11.087000
|
||||
CVE-2024-5166,1,1,c5647a6d803dd352ef54e3847221a913a10c8f1aa155cfee1c20c0eb77c72363,2024-05-22T17:16:15.957000
|
||||
CVE-2024-5190,0,0,e11755e15485ad7d65ed59ac9abe5cac7f4b4c3e2591d1a6c69b4386ed9dea65,2024-05-22T03:15:08.273000
|
||||
CVE-2024-5193,0,0,10c68e7444190b04603fe41121d5ca46f60a4a86754539b9aa3d12094e724599,2024-05-22T12:46:53.887000
|
||||
CVE-2024-5194,0,0,449708a9669696a9d45dc12d62d0dd60618e438564c2c2163a0a40f19cb2695e,2024-05-22T12:46:53.887000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user