Auto-Update: 2024-03-22T07:00:41.796339+00:00

This commit is contained in:
cad-safe-bot 2024-03-22 07:03:30 +00:00
parent 69e38ac728
commit 0c933d5ea4
9 changed files with 575 additions and 22 deletions

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2806",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-22T05:15:48.480",
"lastModified": "2024-03-22T05:15:48.480",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Tenda AC15 15.03.05.18/15.03.20_multi. This affects the function addWifiMacFilter of the file /goform/addWifiMacFilter. The manipulation of the argument deviceId/deviceMac leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257661 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/addWifiMacFilter_deviceId.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257661",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257661",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2807",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-22T05:15:48.807",
"lastModified": "2024-03-22T05:15:48.807",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in Tenda AC15 15.03.05.18/15.03.20_multi. This vulnerability affects the function formExpandDlnaFile of the file /goform/expandDlnaFile. The manipulation of the argument filePath leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257662 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formExpandDlnaFile.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257662",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257662",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2808",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-22T05:15:49.017",
"lastModified": "2024-03-22T05:15:49.017",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in Tenda AC15 15.03.05.18/15.03.20_multi. This issue affects the function formQuickIndex of the file /goform/QuickIndex. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257663. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formQuickIndex.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257663",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257663",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2809",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-22T06:15:08.747",
"lastModified": "2024-03-22T06:15:08.747",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in Tenda AC15 15.03.05.18/15.03.20_multi. Affected is the function formSetFirewallCfg of the file /goform/SetFirewallCfg. The manipulation of the argument firewallEn leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257664. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formSetFirewallCfg.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257664",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257664",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2810",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-22T06:15:10.800",
"lastModified": "2024-03-22T06:15:10.800",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Tenda AC15 15.03.05.18/15.03.20_multi and classified as critical. Affected by this vulnerability is the function formWifiWpsOOB of the file /goform/WifiWpsOOB. The manipulation of the argument index leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257665 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formWifiWpsOOB.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257665",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257665",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2811",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-22T06:15:11.803",
"lastModified": "2024-03-22T06:15:11.803",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Tenda AC15 15.03.20_multi and classified as critical. Affected by this issue is the function formWifiWpsStart of the file /goform/WifiWpsStart. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-257666 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formWifiWpsStart.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257666",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257666",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29275",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-22T05:15:47.583",
"lastModified": "2024-03-22T05:15:47.583",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in SeaCMS version 12.9, allows remote unauthenticated attackers to execute arbitrary code and obtain sensitive information via the id parameter in class.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/seacms-net/CMS/issues/15",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-22T05:00:38.060537+00:00
2024-03-22T07:00:41.796339+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-22T04:15:11.857000+00:00
2024-03-22T06:15:11.803000+00:00
```
### Last Data Feed Release
@ -29,28 +29,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
242412
242419
```
### CVEs added in the last Commit
Recently added CVEs: `7`
* [CVE-2024-25807](CVE-2024/CVE-2024-258xx/CVE-2024-25807.json) (`2024-03-22T03:15:07.763`)
* [CVE-2024-25808](CVE-2024/CVE-2024-258xx/CVE-2024-25808.json) (`2024-03-22T04:15:11.087`)
* [CVE-2024-26557](CVE-2024/CVE-2024-265xx/CVE-2024-26557.json) (`2024-03-22T03:15:07.877`)
* [CVE-2024-2805](CVE-2024/CVE-2024-28xx/CVE-2024-2805.json) (`2024-03-22T03:15:08.130`)
* [CVE-2024-29271](CVE-2024/CVE-2024-292xx/CVE-2024-29271.json) (`2024-03-22T04:15:11.573`)
* [CVE-2024-29272](CVE-2024/CVE-2024-292xx/CVE-2024-29272.json) (`2024-03-22T04:15:11.663`)
* [CVE-2024-29273](CVE-2024/CVE-2024-292xx/CVE-2024-29273.json) (`2024-03-22T04:15:11.857`)
* [CVE-2024-2806](CVE-2024/CVE-2024-28xx/CVE-2024-2806.json) (`2024-03-22T05:15:48.480`)
* [CVE-2024-2807](CVE-2024/CVE-2024-28xx/CVE-2024-2807.json) (`2024-03-22T05:15:48.807`)
* [CVE-2024-2808](CVE-2024/CVE-2024-28xx/CVE-2024-2808.json) (`2024-03-22T05:15:49.017`)
* [CVE-2024-2809](CVE-2024/CVE-2024-28xx/CVE-2024-2809.json) (`2024-03-22T06:15:08.747`)
* [CVE-2024-2810](CVE-2024/CVE-2024-28xx/CVE-2024-2810.json) (`2024-03-22T06:15:10.800`)
* [CVE-2024-2811](CVE-2024/CVE-2024-28xx/CVE-2024-2811.json) (`2024-03-22T06:15:11.803`)
* [CVE-2024-29275](CVE-2024/CVE-2024-292xx/CVE-2024-29275.json) (`2024-03-22T05:15:47.583`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `0`
* [CVE-2024-2182](CVE-2024/CVE-2024-21xx/CVE-2024-2182.json) (`2024-03-22T03:15:07.997`)
* [CVE-2024-27516](CVE-2024/CVE-2024-275xx/CVE-2024-27516.json) (`2024-03-22T03:15:07.923`)
## Download and Usage

View File

@ -239756,7 +239756,7 @@ CVE-2024-21805,0,0,a52828f65b6509bde8b488130919a2fdb0ba808c102ed9f4fd4334d154ad0
CVE-2024-21812,0,0,e8811106b26eef69a6b44b9c940e0d21e06bed50f525e5b4df36936c24830bd9,2024-02-20T19:50:53.960000
CVE-2024-21815,0,0,77643bc01852fedba42660856307ea92e48bb3e3a61f220c84686194810010fe,2024-03-05T13:41:01.900000
CVE-2024-21816,0,0,1c59ad824873b45e692308f55039674fb26186a48eef31c5167e14b30ad2d48e,2024-03-04T13:58:23.447000
CVE-2024-2182,0,1,66971398293306652cc8fb48ccd51a0db8756289e6518df65d3cb6ff96948bab,2024-03-22T03:15:07.997000
CVE-2024-2182,0,0,66971398293306652cc8fb48ccd51a0db8756289e6518df65d3cb6ff96948bab,2024-03-22T03:15:07.997000
CVE-2024-21821,0,0,4c3f841f13791c81362ea564b3fbf92012289121b1ae208771ab4f8c8efda3a4,2024-01-18T17:08:35.830000
CVE-2024-21824,0,0,3bddb01433a875d84e1ff57d3fa88062c16a6aea3448fe5a7afcbbae2986da28,2024-03-18T12:38:25.490000
CVE-2024-21825,0,0,863f3bb0e32138d36771cc5631b2bee7f6404deacea520723a59336b368d85d0,2024-02-26T18:15:07.390000
@ -241422,8 +241422,8 @@ CVE-2024-2579,0,0,82ab7736c7cd2bae37cca14333922f5ac036820dddbd265831a9ea551e48aa
CVE-2024-2580,0,0,17c770530b9c88c0a0bc27203561d8211df9836f86fe3343fde81a78a162c0d5,2024-03-21T19:47:03.943000
CVE-2024-25801,0,0,86d0a2f88d637a38d728e68507deae5ad1ee66b74383784e4b403b33b5149a86,2024-02-22T19:07:27.197000
CVE-2024-25802,0,0,cb029cdbf03ee0051152f36415381bb55ee304fcb50819490e22f017c52403c6,2024-02-22T19:07:27.197000
CVE-2024-25807,1,1,56c3bab355182029ade88aac3717c440569ae27a44867efe2bdd3a688e492e9d,2024-03-22T03:15:07.763000
CVE-2024-25808,1,1,f869c05624ad59cef5cb90a8ad8c213b25b61084488336c2759597bc44972079,2024-03-22T04:15:11.087000
CVE-2024-25807,0,0,56c3bab355182029ade88aac3717c440569ae27a44867efe2bdd3a688e492e9d,2024-03-22T03:15:07.763000
CVE-2024-25808,0,0,f869c05624ad59cef5cb90a8ad8c213b25b61084488336c2759597bc44972079,2024-03-22T04:15:11.087000
CVE-2024-2581,0,0,6eca5564f5891085eb56e7f4cce8a941d50b5c5d945724a4654e0a645ab887e7,2024-03-21T02:52:39.600000
CVE-2024-25811,0,0,17589bbc78cc5e463e6c2e2c6ba06158f5e6effb7ffe3523769d8c6653c9997a,2024-03-21T12:58:51.093000
CVE-2024-25817,0,0,8244c17ffec667dd25976664571f96aed86930fb569e330976ea19223cb10648,2024-03-06T15:18:08.093000
@ -241751,7 +241751,7 @@ CVE-2024-26529,0,0,ceb7dffe95e5cd49d7bba0e418c1f06e328c8386f0796095312ed90a87d2d
CVE-2024-26540,0,0,617635ef0e8a400c648ca8f83ffa7f30619dec90da8a875f959e523aa0d1f776,2024-03-15T12:53:06.423000
CVE-2024-26542,0,0,84bcc676050237f7706e936cd8d9d490aa0a127cdccddbe7afe739c073267e25,2024-02-28T14:06:45.783000
CVE-2024-26548,0,0,7b31129407d10e539a4174451b23a0f83a48cdb246d6dd13af61036fdc95df1c,2024-03-01T14:04:26.010000
CVE-2024-26557,1,1,db7ef20e8e7d8eb51e3dafa53d142f51469c2b3d28e39ac45b02948b59f64f01,2024-03-22T03:15:07.877000
CVE-2024-26557,0,0,db7ef20e8e7d8eb51e3dafa53d142f51469c2b3d28e39ac45b02948b59f64f01,2024-03-22T03:15:07.877000
CVE-2024-26559,0,0,3b7b5127dd0e422a83fadfb79310bdd57e4fb71532d47a597a5aa1449637c0ce,2024-02-29T13:49:47.277000
CVE-2024-26566,0,0,c84607e263dfbb2bafdffa5f1605a228a50fe6eb3d5c21b9f493cf56aab5c61a,2024-03-07T13:52:27.110000
CVE-2024-26578,0,0,631d617cd0985d9923eed32b0cb4b9e9025809830b6a3ca2ef1a468d4f2a7124,2024-02-22T19:07:27.197000
@ -241979,7 +241979,7 @@ CVE-2024-27499,0,0,2b5f4a1f9b18ceffc8606355dc4fd2934849f1f56bb5cf7799320a576c6c2
CVE-2024-27507,0,0,38774793c327b7b0161189b1707b6bfcc10d8d33e882e9c59caf6979390f0dbc,2024-03-13T03:15:06.537000
CVE-2024-27508,0,0,040c763fe5f3ce1aa685f7456be4b1599a5d1d348a6a3ea3969c861bb92ef9ee,2024-02-28T14:07:00.563000
CVE-2024-27515,0,0,f99f7250526320b1e7250419a5b3dff4ee674d7e75fbaa06a1a665327078fcdc,2024-02-28T14:06:45.783000
CVE-2024-27516,0,1,bc77d943dca3237cfc969969b912fe04cfc9a7bb141bbb351e6e03a84319d787,2024-03-22T03:15:07.923000
CVE-2024-27516,0,0,bc77d943dca3237cfc969969b912fe04cfc9a7bb141bbb351e6e03a84319d787,2024-03-22T03:15:07.923000
CVE-2024-27517,0,0,97c5c6df0e60dd69b6d0aac6af969ac4b47e672031be447025dad2dd6eb96394,2024-02-29T13:49:29.390000
CVE-2024-2754,0,0,085e82c1a95661c61fef6d127ca8d427c59ef0abe344921cba5cdafc9ab6e1f3,2024-03-21T12:58:51.093000
CVE-2024-27558,0,0,9eb3609e180b0082ba997e86c85d07a5ab4b31705e8b33d9a86b38769d49fa33,2024-03-01T22:22:25.913000
@ -242111,22 +242111,28 @@ CVE-2024-28029,0,0,9e484b8439861147fdb6b933336d3af06d5e28282f7bbd62426d313102246
CVE-2024-28039,0,0,9ef35c96ff38e007b2fd4f37c3f1f5b6d35461c4eaa69f2b36faccd438b26411,2024-03-18T12:38:25.490000
CVE-2024-28040,0,0,4720f9e7e303f29d5b0ca1b313b08051167d79c82107eceb24ad5f16e327583c,2024-03-21T23:15:10.250000
CVE-2024-28045,0,0,6792565e45071cf20a10fab80a7ba7b229853f3cfe3132fa4d97b62afe40eaa5,2024-03-21T23:15:10.467000
CVE-2024-2805,1,1,c1663a5680443d2b4a3923fd2fef5475c632f7bc73f63d8c15ce5ffd55d89828,2024-03-22T03:15:08.130000
CVE-2024-2805,0,0,c1663a5680443d2b4a3923fd2fef5475c632f7bc73f63d8c15ce5ffd55d89828,2024-03-22T03:15:08.130000
CVE-2024-28053,0,0,e281ed045d826247c32c0ccef204d2c431b80f755e75c928bfd444d7e8497772,2024-03-15T12:53:06.423000
CVE-2024-28054,0,0,fd5e34ddafff629285a62ddb2d3b6251633211261857e076506fc9aaf016b6b2,2024-03-18T19:40:00.173000
CVE-2024-2806,1,1,56b2d554ca397a7f98b95597823883fe293fb830f3c5c465bb255f69f294d583,2024-03-22T05:15:48.480000
CVE-2024-28069,0,0,bc55065fc354d40d7b16dc028d30e9ac9c120daebe64d1e74cc55e5aec96ab01,2024-03-17T22:38:29.433000
CVE-2024-2807,1,1,61e2187fa5a2ba1a43313042e40c262f681f059db45d28e95c31839aae932ca8,2024-03-22T05:15:48.807000
CVE-2024-28070,0,0,d9b3309fdc4db05937449ae85d6df93a299898f40c2c79f5bb7988f4ebb25838,2024-03-17T22:38:29.433000
CVE-2024-2808,1,1,2291c74755d14464570db6ed94722cb6d7c1f14bb4f2a6865a9b551657a4ff55,2024-03-22T05:15:49.017000
CVE-2024-28084,0,0,82d4f9747e3f13eb0c41724a23d451f171722689bff23fc05fa8397eb3709338,2024-03-16T02:15:09.157000
CVE-2024-28088,0,0,d2f20b1069b24ba10d21e8bf3b61c2c6a1c6b345ff59786676752b80abbde7a4,2024-03-13T21:16:00.380000
CVE-2024-28089,0,0,830991c1dd5898b6a817a3f8bb8784922af3636f20b8b62ba1c918d5d83f6f10,2024-03-11T01:32:29.610000
CVE-2024-2809,1,1,d51c1cadaa372964aa25c478d7da8595c3faeaa216103db1ea38d8e91303309d,2024-03-22T06:15:08.747000
CVE-2024-28092,0,0,67823fb0fbf08abafb7c7a38f47eac7c626c2d2412f357d855f86b0f67fb9779,2024-03-20T13:00:16.367000
CVE-2024-28094,0,0,45821c38270b8552e50f50b73436d99164a20d22d9b4b8876276d92b2a0a88d9,2024-03-07T13:52:27.110000
CVE-2024-28095,0,0,cc359d20cf58cf4c4e6a4bc345ac1d1135a557dfb7920f405bfe639456bcfe46,2024-03-07T13:52:27.110000
CVE-2024-28096,0,0,bd233bb77c2105c8f9ae41f3196895f407f421cf037a91cc0eb753e3f00e4372,2024-03-07T13:52:27.110000
CVE-2024-28097,0,0,ad0a3d7a6b96970687d28d32c41921c3200422c4265f25f269de512c4cb8079e,2024-03-07T13:52:27.110000
CVE-2024-28098,0,0,e6bafc5c1852b134e115137ad3427dd38b064af4ce40b8aa45bfc1cdd7573337,2024-03-13T12:33:51.697000
CVE-2024-2810,1,1,87ceb22a094d1fdca9175871006b8c1490b53fe12a1729683d2ae76fc2bccdac,2024-03-22T06:15:10.800000
CVE-2024-28101,0,0,e11a50d18e90b930590d2818b294820a502a44e40046d3b082407cc261fb1fa1,2024-03-21T12:58:51.093000
CVE-2024-28102,0,0,5173038e442300ac4f9841553f79acc51f599800474c7e2979929429acf935f8,2024-03-21T12:58:51.093000
CVE-2024-2811,1,1,c6a56c4335428b7bee83a7278f7da8368a2606c3c085082dd0debf7f14d724d1,2024-03-22T06:15:11.803000
CVE-2024-28110,0,0,0aa63c709bee34101fee09332c67840fa8b7d5aea01ed58b7f238cd7f26f2f87,2024-03-07T13:52:27.110000
CVE-2024-28111,0,0,ef109000cb681b8950a504435d888106cd334990070bd9ca1f33bba165c1974a,2024-03-07T13:52:27.110000
CVE-2024-28112,0,0,13394bf321439a7b80b31ae63012fb69faf271f01573bdf4d69e6f1d90267eaa,2024-03-13T12:33:51.697000
@ -242382,9 +242388,10 @@ CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2
CVE-2024-29180,0,0,e32bebc90fbd05fe3a3edfae9506df906c8ca56e295fcb3cc3f3f384d12528c8,2024-03-21T19:47:03.943000
CVE-2024-29243,0,0,80b3eab65af2d9fbeb7b6048e074697688a19de63e1138c377d0b826523dd7db,2024-03-21T15:24:35.093000
CVE-2024-29244,0,0,ab4dadc4ff7b45a2c285edb922de956bae0828f007627c62339f15145e95a7b7,2024-03-21T15:24:35.093000
CVE-2024-29271,1,1,8f3f4c2f095342ce5006c5dd915025eb52c99aac668772b964c6ccc6ea7b6f54,2024-03-22T04:15:11.573000
CVE-2024-29272,1,1,286d057b92faa2c0f98e79bf55ed6de88858aea974d2cff95dcf053fb5e59b85,2024-03-22T04:15:11.663000
CVE-2024-29273,1,1,fe87872c57210783e357d837999b1453ec44efdd22c90150313e35d8399de8c6,2024-03-22T04:15:11.857000
CVE-2024-29271,0,0,8f3f4c2f095342ce5006c5dd915025eb52c99aac668772b964c6ccc6ea7b6f54,2024-03-22T04:15:11.573000
CVE-2024-29272,0,0,286d057b92faa2c0f98e79bf55ed6de88858aea974d2cff95dcf053fb5e59b85,2024-03-22T04:15:11.663000
CVE-2024-29273,0,0,fe87872c57210783e357d837999b1453ec44efdd22c90150313e35d8399de8c6,2024-03-22T04:15:11.857000
CVE-2024-29275,1,1,7485e8e2cdbf7b9794a165ec8d3b30a10093f40cdcf5e44c74bca400aa7984c5,2024-03-22T05:15:47.583000
CVE-2024-29374,0,0,f8a146770d52182e0c10b15b21ebc5da7e22091690385e976078b28de6736be7,2024-03-21T19:47:03.943000
CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000
CVE-2024-29469,0,0,acf93e04574e9669a29498319a75720c9b5a03ff4de2c06070b1f52ac9f365b7,2024-03-21T12:58:51.093000

Can't render this file because it is too large.