mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2024-03-13T03:00:30.459372+00:00
This commit is contained in:
parent
4ec2ee8527
commit
16234e03ed
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-36763",
|
||||
"sourceIdentifier": "infosec@edk2.groups.io",
|
||||
"published": "2024-01-09T16:15:43.053",
|
||||
"lastModified": "2024-01-16T17:22:15.790",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-13T02:15:49.857",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -106,6 +106,10 @@
|
||||
"Mitigation",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-36764",
|
||||
"sourceIdentifier": "infosec@edk2.groups.io",
|
||||
"published": "2024-01-09T16:15:43.327",
|
||||
"lastModified": "2024-01-16T18:04:14.283",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-13T02:15:49.983",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -105,6 +105,10 @@
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-36765",
|
||||
"sourceIdentifier": "infosec@edk2.groups.io",
|
||||
"published": "2024-01-09T16:15:43.500",
|
||||
"lastModified": "2024-01-16T18:21:33.387",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-13T02:15:50.063",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -105,6 +105,10 @@
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-45230",
|
||||
"sourceIdentifier": "infosec@edk2.groups.io",
|
||||
"published": "2024-01-16T16:15:11.727",
|
||||
"lastModified": "2024-03-07T17:15:10.133",
|
||||
"lastModified": "2024-03-13T02:15:50.157",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -121,6 +121,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-45231",
|
||||
"sourceIdentifier": "infosec@edk2.groups.io",
|
||||
"published": "2024-01-16T16:15:11.910",
|
||||
"lastModified": "2024-03-07T17:15:10.247",
|
||||
"lastModified": "2024-03-13T02:15:50.267",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -121,6 +121,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-45232",
|
||||
"sourceIdentifier": "infosec@edk2.groups.io",
|
||||
"published": "2024-01-16T16:15:12.090",
|
||||
"lastModified": "2024-03-07T17:15:10.340",
|
||||
"lastModified": "2024-03-13T02:15:50.347",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -121,6 +121,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-45233",
|
||||
"sourceIdentifier": "infosec@edk2.groups.io",
|
||||
"published": "2024-01-16T16:15:12.277",
|
||||
"lastModified": "2024-03-07T17:15:10.427",
|
||||
"lastModified": "2024-03-13T02:15:50.430",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -121,6 +121,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-45234",
|
||||
"sourceIdentifier": "infosec@edk2.groups.io",
|
||||
"published": "2024-01-16T16:15:12.460",
|
||||
"lastModified": "2024-03-07T17:15:10.510",
|
||||
"lastModified": "2024-03-13T02:15:50.513",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -121,6 +121,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-45235",
|
||||
"sourceIdentifier": "infosec@edk2.groups.io",
|
||||
"published": "2024-01-16T16:15:12.643",
|
||||
"lastModified": "2024-03-07T17:15:10.590",
|
||||
"lastModified": "2024-03-13T02:15:50.617",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -121,6 +121,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4522",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-08-30T08:15:52.673",
|
||||
"lastModified": "2023-12-28T14:50:15.647",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-13T02:15:50.700",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -108,6 +108,10 @@
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2023/CVE-2023-48xx/CVE-2023-4839.json
Normal file
47
CVE-2023/CVE-2023-48xx/CVE-2023-4839.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2023-4839",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-13T02:15:50.827",
|
||||
"lastModified": "2024-03-13T02:15:50.827",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP Go Maps for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 9.0.32 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3045434/wp-google-maps/trunk/legacy-core.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/208c5ed1-879f-45ea-833e-d2e54c4f063f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-15xx/CVE-2024-1582.json
Normal file
47
CVE-2024/CVE-2024-15xx/CVE-2024-1582.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-1582",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-13T02:15:51.000",
|
||||
"lastModified": "2024-03-13T02:15:51.000",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpgmza' shortcode in all versions up to, and including, 9.0.32 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3045434/wp-google-maps/trunk/includes/class.shortcodes.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/67f405d0-7139-4b5c-ab3c-cd1de5592866?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22099",
|
||||
"sourceIdentifier": "security@openanolis.org",
|
||||
"published": "2024-01-25T07:15:08.697",
|
||||
"lastModified": "2024-01-31T20:32:02.720",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-13T02:15:51.193",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -105,6 +105,10 @@
|
||||
"Issue Tracking",
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVVYSTEVMPYGF6GDSOD44MUXZXAZHOHB/",
|
||||
"source": "security@openanolis.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26622",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-04T07:15:11.063",
|
||||
"lastModified": "2024-03-11T18:15:19.673",
|
||||
"lastModified": "2024-03-13T02:15:51.293",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a23ac1788e2c828c097119e9a3178f0b7e503fee",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVVYSTEVMPYGF6GDSOD44MUXZXAZHOHB/",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27507",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-27T15:15:07.883",
|
||||
"lastModified": "2024-02-28T14:07:00.563",
|
||||
"lastModified": "2024-03-13T02:15:51.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,6 +19,10 @@
|
||||
{
|
||||
"url": "https://github.com/LuMingYinDetect/libLAS_defects/blob/main/libLAS_detect_1.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WVOY7E2QWQRVXZTJGI7Z4KXGSU6BGEKH/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
30
README.md
30
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-13T00:55:30.447618+00:00
|
||||
2024-03-13T03:00:30.459372+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-12T23:15:46.667000+00:00
|
||||
2024-03-13T02:15:51.353000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -23,28 +23,40 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2024-03-12T01:00:20.250337+00:00
|
||||
2024-03-13T01:00:20.248557+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
241245
|
||||
241247
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
* [CVE-2023-7072](CVE-2023/CVE-2023-70xx/CVE-2023-7072.json) (`2024-03-12T23:15:46.267`)
|
||||
* [CVE-2024-1397](CVE-2024/CVE-2024-13xx/CVE-2024-1397.json) (`2024-03-12T23:15:46.480`)
|
||||
* [CVE-2024-1421](CVE-2024/CVE-2024-14xx/CVE-2024-1421.json) (`2024-03-12T23:15:46.667`)
|
||||
* [CVE-2023-4839](CVE-2023/CVE-2023-48xx/CVE-2023-4839.json) (`2024-03-13T02:15:50.827`)
|
||||
* [CVE-2024-1582](CVE-2024/CVE-2024-15xx/CVE-2024-1582.json) (`2024-03-13T02:15:51.000`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `13`
|
||||
|
||||
* [CVE-2022-36763](CVE-2022/CVE-2022-367xx/CVE-2022-36763.json) (`2024-03-13T02:15:49.857`)
|
||||
* [CVE-2022-36764](CVE-2022/CVE-2022-367xx/CVE-2022-36764.json) (`2024-03-13T02:15:49.983`)
|
||||
* [CVE-2022-36765](CVE-2022/CVE-2022-367xx/CVE-2022-36765.json) (`2024-03-13T02:15:50.063`)
|
||||
* [CVE-2023-4522](CVE-2023/CVE-2023-45xx/CVE-2023-4522.json) (`2024-03-13T02:15:50.700`)
|
||||
* [CVE-2023-45230](CVE-2023/CVE-2023-452xx/CVE-2023-45230.json) (`2024-03-13T02:15:50.157`)
|
||||
* [CVE-2023-45231](CVE-2023/CVE-2023-452xx/CVE-2023-45231.json) (`2024-03-13T02:15:50.267`)
|
||||
* [CVE-2023-45232](CVE-2023/CVE-2023-452xx/CVE-2023-45232.json) (`2024-03-13T02:15:50.347`)
|
||||
* [CVE-2023-45233](CVE-2023/CVE-2023-452xx/CVE-2023-45233.json) (`2024-03-13T02:15:50.430`)
|
||||
* [CVE-2023-45234](CVE-2023/CVE-2023-452xx/CVE-2023-45234.json) (`2024-03-13T02:15:50.513`)
|
||||
* [CVE-2023-45235](CVE-2023/CVE-2023-452xx/CVE-2023-45235.json) (`2024-03-13T02:15:50.617`)
|
||||
* [CVE-2024-22099](CVE-2024/CVE-2024-220xx/CVE-2024-22099.json) (`2024-03-13T02:15:51.193`)
|
||||
* [CVE-2024-26622](CVE-2024/CVE-2024-266xx/CVE-2024-26622.json) (`2024-03-13T02:15:51.293`)
|
||||
* [CVE-2024-27507](CVE-2024/CVE-2024-275xx/CVE-2024-27507.json) (`2024-03-13T02:15:51.353`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
34
_state.csv
34
_state.csv
@ -202824,9 +202824,9 @@ CVE-2022-36757,0,0,99b2457e22242a51f120243c054b207129f684a9e5103e265e48622466ad1
|
||||
CVE-2022-36759,0,0,987ab3e2934d36391ec887186be11227f1f9de0dc58eabaccc00782239c2465d,2023-11-07T03:49:40.650000
|
||||
CVE-2022-3676,0,0,7c244257592a5da04a938c2bf7ebf52dbfa71500de6ad436865e08c1a0d06dc8,2022-10-25T14:28:27.270000
|
||||
CVE-2022-36760,0,0,78c5cd086a5921fa10a24eb45b4574e7f49359511281666cb03d664e1a3acd04,2023-09-08T22:15:10.133000
|
||||
CVE-2022-36763,0,0,204ac919fc3446902823dbb109d75555f747ee17889ad1bfdda69f44bb9a25c9,2024-01-16T17:22:15.790000
|
||||
CVE-2022-36764,0,0,cabe2474d78c15d37bb8bf7e4ce39399b33f557a22f94d094c7647087e2ec024,2024-01-16T18:04:14.283000
|
||||
CVE-2022-36765,0,0,828ff023a89a96c19935854992d263420d4dc6f0964affd3ea31666e5ae8574e,2024-01-16T18:21:33.387000
|
||||
CVE-2022-36763,0,1,58e28fe745417e1c07e5d15be2175a9c585bfaad59c2ab8e944f3321e4b565c4,2024-03-13T02:15:49.857000
|
||||
CVE-2022-36764,0,1,d1b5eff2741c0fcdd05c75033dcf8c60ae25cc92ff1cb26c5eb81efcde6ac521,2024-03-13T02:15:49.983000
|
||||
CVE-2022-36765,0,1,3c345cab626fb44223b4c789dc5a993f6ebbe31670dbf45f1926e146eb1c5291,2024-03-13T02:15:50.063000
|
||||
CVE-2022-36768,0,0,56e6e9f2a3adbd5e2e9a22aa337e26f469ba6753dc76a819d340832312ea1fec,2022-09-16T02:57:50.677000
|
||||
CVE-2022-36769,0,0,7c8f08c8ca8c03a8549a88fff51c53796c31c9bf95e4335a57fe099b73ff2860,2023-05-04T17:38:26.667000
|
||||
CVE-2022-3677,0,0,e846c14847121ba33c269f73a53a22410c84e7131401dac364ed0264047a9aec,2023-11-07T03:51:37.927000
|
||||
@ -231441,7 +231441,7 @@ CVE-2023-4521,0,0,b688f7ebb4a8ae05081b90dfc2d3e5aa63110c07fe8f0a8aec7d54e7490212
|
||||
CVE-2023-45210,0,0,015445c8d46db4b328a64a863b4689dd675056770aa7f333e4d9c645a082f231,2023-12-11T17:28:08.023000
|
||||
CVE-2023-45213,0,0,5e5f8b44ec699e511eefc924e74594a2ac49c3945938127d75baae964d9387a9,2024-02-12T16:44:57.010000
|
||||
CVE-2023-45219,0,0,270bb0600a3f55378c55b5ea38799f305c6eb8bb95c5b79f810dab4de3af729a,2023-10-18T01:32:45.897000
|
||||
CVE-2023-4522,0,0,0674b611dfdb94341815c24c525474f742f34ed4bc39082bcf1680814dd77cde,2023-12-28T14:50:15.647000
|
||||
CVE-2023-4522,0,1,21c51931efbb0b6a933132cf5b91fe4ef9967ce64c453416b56e884701256728,2024-03-13T02:15:50.700000
|
||||
CVE-2023-45220,0,0,89f02225b08d53cf6d2310d9295828baf1a8becf9542b9fbe85548c6da689aab,2023-11-06T14:42:32.330000
|
||||
CVE-2023-45222,0,0,54b7f389d9cdd14569950f307f88751c99f6c6155f7b671a74e1fb663cddd2c5,2024-02-12T16:45:27.167000
|
||||
CVE-2023-45223,0,0,6cbdf0069fab914c7609294f4a9579d32a8555dcc6cf247cd7b7f82694e9e004,2023-12-01T21:22:56.440000
|
||||
@ -231452,12 +231452,12 @@ CVE-2023-45227,0,0,4ffb0311b26c436ba20e67f324124acf224981c7f480b51fbf58a45a4e0a7
|
||||
CVE-2023-45228,0,0,d3ce09fbc0053d966a1c84575fc054963cc930f15296e011428d43b06e7ca000,2023-11-07T19:55:08.333000
|
||||
CVE-2023-45229,0,0,ba7df8658c821bb3ec61211859d4f1196e179fdd3ba514897a74ae64ee8462c4,2024-03-07T17:15:10
|
||||
CVE-2023-4523,0,0,7594ef971654e5b13b747bcbe0f6a98b28a2c227054ae0ac208549d4afc41901,2023-09-29T15:39:05.767000
|
||||
CVE-2023-45230,0,0,d519bd35b3993a3fb458dd365bcc37c4eee106c3eca5668477a2fcc497327eb1,2024-03-07T17:15:10.133000
|
||||
CVE-2023-45231,0,0,fbbeb2f22df3db01e4122b1157e36b4d7b87da56bc68a5632f68a25eae66323a,2024-03-07T17:15:10.247000
|
||||
CVE-2023-45232,0,0,05a1f11780c48729e8d559758265e57c5f802167eb837ee96a29259517e4a12d,2024-03-07T17:15:10.340000
|
||||
CVE-2023-45233,0,0,d6c63a70c57013bb00e0d0afb4aa82975835477d09cfbb9be6bd0718f2d7987b,2024-03-07T17:15:10.427000
|
||||
CVE-2023-45234,0,0,188a4ad340934a8970ceb47bfbb4e2e4ce2cb81c7a2e2832ff0b7a273b3407dd,2024-03-07T17:15:10.510000
|
||||
CVE-2023-45235,0,0,a56b315e0a90e532fb1b31e4bf7b5813e3bc8139eca7adc42725ce5cc5635c3d,2024-03-07T17:15:10.590000
|
||||
CVE-2023-45230,0,1,8d1b65601081d9f6a3f48fdd08b5f8f2264303a0239f33e8ee6fb7fc4c14d3ef,2024-03-13T02:15:50.157000
|
||||
CVE-2023-45231,0,1,fdca259a90f40bd71ab3892472a32b816f64dda71048091e88ec668a5e408779,2024-03-13T02:15:50.267000
|
||||
CVE-2023-45232,0,1,12ed148934a0b0fc802ded4dcae87f84efffca594b629e187b1291c960041747,2024-03-13T02:15:50.347000
|
||||
CVE-2023-45233,0,1,935822cd94e0c5da45274ed1b4f00d7b77414dd1f98abdaa637cfbcdd31fc6b2,2024-03-13T02:15:50.430000
|
||||
CVE-2023-45234,0,1,dd53231da171773cc705aedd5fa7c50ce14604dc928367345a241744dc2558f5,2024-03-13T02:15:50.513000
|
||||
CVE-2023-45235,0,1,4bf0b671c01bc2b38c45b73d852591de63b5fdb5a16c8b3ebfca7e6f0dc4491b,2024-03-13T02:15:50.617000
|
||||
CVE-2023-45236,0,0,525499e6b39416baf89ff249494efc66f2267491565e0b1d6266bb92beb48bd9,2024-03-07T17:15:10.670000
|
||||
CVE-2023-45237,0,0,b86309e9c318e2bf34954205b33e4af0526735c885502c1b3ed0bb23eefefa82,2024-03-07T17:15:10.760000
|
||||
CVE-2023-45239,0,0,ceec829d8bee367996c0f5c7e35bbe30b5631d6dfbec310aeef7b055c317044a,2023-11-07T04:21:43.770000
|
||||
@ -233487,6 +233487,7 @@ CVE-2023-48384,0,0,2bab1347f41c2a057fef2f7cd0fcfadd1b98db03fbdfba1cd9ca8cd1165a6
|
||||
CVE-2023-48387,0,0,9955b3d84b9077be3d2d63e882ec4ddd844a0c84695e65601fb70e69aa47868c,2024-01-31T03:15:08.213000
|
||||
CVE-2023-48388,0,0,2a26d36b3036fda1db696b612ebf767e25f4d12bf331a58f031651c9f6a05c8b,2023-12-22T16:07:01.780000
|
||||
CVE-2023-48389,0,0,40f57c393bc441d7534360ceb6491a81918bd1ce4cdf5309d5977cc1fc67037e,2023-12-22T16:12:50.417000
|
||||
CVE-2023-4839,1,1,407ccbb02a584246185e9851b2a573f693625fec922b212cfb578853d8b2c1b8,2024-03-13T02:15:50.827000
|
||||
CVE-2023-48390,0,0,97a1d2591c5c5e82fd35f60aec0cb181513d17049e4e5bae3e50085004531742,2023-12-22T16:05:04.157000
|
||||
CVE-2023-48392,0,0,8477dfef0ae02c8ac4ae7fb286fa250f75ccfcf4d82395707585be88def83009,2023-12-22T15:46:03.297000
|
||||
CVE-2023-48393,0,0,eb2be5ce9484bf33d839a19d622d5eddc9bdd71b5929ac2b7d10360261b406c7,2023-12-22T15:43:05.987000
|
||||
@ -237427,7 +237428,7 @@ CVE-2023-7068,0,0,ef1408f6c6fd79c5af19d0633c8238c454cea54fd087b8b89da5773f13dad9
|
||||
CVE-2023-7069,0,0,76accaf19ff7061689b623859471b6167bfd5be5c4040f161f8f881f1093dc5f,2024-02-07T16:28:40.250000
|
||||
CVE-2023-7070,0,0,6c8bd2c09a87f95a15301a389b593ff945e70de707293c37e60be3f2a98abc3d,2024-01-17T22:40:43.227000
|
||||
CVE-2023-7071,0,0,78f74dc912537e618118419b14904618dddacf09709f10c13e8f266737a05610,2024-01-18T17:36:11.930000
|
||||
CVE-2023-7072,1,1,a826a87bdece0c861eae1651958161a39eba36d8b53df243cac9b4c32796c8c8,2024-03-12T23:15:46.267000
|
||||
CVE-2023-7072,0,0,a826a87bdece0c861eae1651958161a39eba36d8b53df243cac9b4c32796c8c8,2024-03-12T23:15:46.267000
|
||||
CVE-2023-7074,0,0,8f1ea4c91bbed5f749e5ad5898f652b9d3535e567ecfe0485c584e8d36746192,2024-02-03T00:27:20.647000
|
||||
CVE-2023-7075,0,0,1e8d50856ed09dc2da0f090e53334c53e66b79bfe72d0c24b008411cda3483d1,2024-02-29T01:42:52.060000
|
||||
CVE-2023-7076,0,0,c0aa47ffdb1b11be4bad6ee96c7ad56a0a2e836463637688b25aa6c1ae2a5f68,2024-02-29T01:42:52.140000
|
||||
@ -238493,7 +238494,7 @@ CVE-2024-1382,0,0,eadf9bcf07f33f456d30153fea1d47c75e560cdef58bba2704e859f9e7013d
|
||||
CVE-2024-1388,0,0,9f4f35daf92433c068c4ad0e3cff9f0fc31d7e6b5e8f690807686322bd29d2ae,2024-02-28T14:06:45.783000
|
||||
CVE-2024-1389,0,0,62d171117c191cb5fc110201c06be5328bba09160ed0dc883ad2c72ee32b12f1,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1390,0,0,760bcdaac2db269a3249aaa20e58e1659b2977bdb995748ef5e46a1ecb85447f,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1397,1,1,d172b8d4f2cbfd2ed0f268b354eb7f89fac5acac137adde141be4e79233eae29,2024-03-12T23:15:46.480000
|
||||
CVE-2024-1397,0,0,d172b8d4f2cbfd2ed0f268b354eb7f89fac5acac137adde141be4e79233eae29,2024-03-12T23:15:46.480000
|
||||
CVE-2024-1398,0,0,7a7783e481aa897afa83bd125da0d53c431d5a5a9d43f1ade8b1e715449f59a0,2024-03-04T13:58:23.447000
|
||||
CVE-2024-1400,0,0,295a10f36c3e13d694d09cafc6872c0c48f9e2b4c87da0889327ecdac7abe4ac,2024-03-12T12:40:13.500000
|
||||
CVE-2024-1402,0,0,f5ee948d1697d1774361c2691c46c88d302c6ae408ab90a865a59173f66ccaae,2024-02-15T18:42:03.397000
|
||||
@ -238506,7 +238507,7 @@ CVE-2024-1410,0,0,79f004c8511409262522dfcd75d298b0bd4411c796b0c34ea3a9609af0d4a5
|
||||
CVE-2024-1411,0,0,030f897eed6e6219f0d1c0b9b3349832bbb4c8ad1dac44c5a94f383da8f08bf9,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1419,0,0,2c70f60b0f2ce39c1fb701bf4c4f420108cacd5e876318aed7a6153508e9a501,2024-03-07T13:52:27.110000
|
||||
CVE-2024-1420,0,0,63be6135cf11500708980f0eb6e023d1c00fd2eeb1aa055b1a9dd099f6d1d32a,2024-02-12T15:15:07.733000
|
||||
CVE-2024-1421,1,1,179cfea3877e72bd06f3056ed80aecaf7c6819365b5df1df754f3f625c08055c,2024-03-12T23:15:46.667000
|
||||
CVE-2024-1421,0,0,179cfea3877e72bd06f3056ed80aecaf7c6819365b5df1df754f3f625c08055c,2024-03-12T23:15:46.667000
|
||||
CVE-2024-1423,0,0,6e27005a2bc9cac940b744a08e145c97df4169105a5c6ac980f63cd4cfdbe785,2024-02-27T15:15:07.460000
|
||||
CVE-2024-1425,0,0,7bd23f13ec6e59c9c0cdfb4dd0d18d7583033ed33c6961c2f335253af10e4df9,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1430,0,0,1f7ad1f1bebbdcb3e1f4fca338921661a7ae2b45ce3f6720731a1be64c4b8668,2024-02-29T01:43:50.420000
|
||||
@ -238580,6 +238581,7 @@ CVE-2024-1566,0,0,fae18125d42af6480c1fb49e1e6428a52d2bf4f1074f21a5dfe482b2c8d870
|
||||
CVE-2024-1568,0,0,03adf0f94bdba0662cb278cdaa3b54a5cd3ae08b3ef89a1e89169605096fa6c9,2024-02-28T14:06:45.783000
|
||||
CVE-2024-1570,0,0,fa96633d08cf4f7a9a083fffefdd325991610013e77e1890328cb3b85d75e300,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1580,0,0,6b9c71428a5b96b2b7263dbf5be1dd103862465da9af91a11236ffbbfb0157cf,2024-02-20T19:50:53.960000
|
||||
CVE-2024-1582,1,1,fbb5d0750a639e886b92522c9bac2417ac2ed3fbd0663ea481308fd0414db2a6,2024-03-13T02:15:51
|
||||
CVE-2024-1586,0,0,0f7dcaaedeb3b15eee35c0b1fbce415960454d76b6eae4dff9a3ecfad1011e31,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1590,0,0,8cf7a30592711c236a58c08f65bffca938f2cb5ec79513db7f6cedfa37d0bfed,2024-02-23T16:14:43.447000
|
||||
CVE-2024-1591,0,0,813b185516fa7310825023c3e019d8a3dad8db3ac6e030a92367a91ad355f320,2024-02-16T19:26:55.393000
|
||||
@ -239406,7 +239408,7 @@ CVE-2024-22088,0,0,754170cc6c96efa135c7c7667ac8c5d4d79d7cd2abcaaf938446792b9a2bc
|
||||
CVE-2024-22093,0,0,0cbc4f486dd2eb1b48ce1c4e9d316887f7d468da5c83d93117f6d1b9d40365f0,2024-02-14T18:04:45.380000
|
||||
CVE-2024-22096,0,0,330d7fb3350f034a1e0c8805b47a2db6dbe2ceb88846f9ddfaaa7c652ddde766,2024-02-07T17:33:26.800000
|
||||
CVE-2024-22097,0,0,5fdbd89068c51850a0f66cf0b6ea41858c21ad70e4a6147f1a1147450ab1d4f9,2024-02-20T19:50:53.960000
|
||||
CVE-2024-22099,0,0,259bf2d8692df5aa5d39caac39d7aad2ce0920dc8cad6f694c8152bd0134be41,2024-01-31T20:32:02.720000
|
||||
CVE-2024-22099,0,1,e28d98dcddc1bbad57110bc31ee0b0986010b8d478f0726ad6cb85e9d2cbda39,2024-03-13T02:15:51.193000
|
||||
CVE-2024-22100,0,0,a6ff3a70b4f3071cb6edf59573e0a019914b2e075d17d6c1c64c20010521b0fb,2024-03-01T14:04:26.010000
|
||||
CVE-2024-22107,0,0,e3cca6041ab5ebaddd7412e3f1116f94d2eef4d2646eefe8a425a6cd027599ec,2024-02-09T19:44:32.497000
|
||||
CVE-2024-22108,0,0,cdaf61a2506aec5c5c15705bb009e8054dc2f9e9fadf39ff642fb65becdf0793,2024-02-09T19:39:12.853000
|
||||
@ -241022,7 +241024,7 @@ CVE-2024-26618,0,0,b4ee02e43411773445d9502213c0c8ee13dbb28e9adadb6062e2443b8f287
|
||||
CVE-2024-26619,0,0,4bc519bd153c025ad692ee69af117d5945ba0b94f5c3e5862c457953e2f5d4bd,2024-03-12T12:40:13.500000
|
||||
CVE-2024-26620,0,0,80563616408219b46d43eee5ccdc785e61822b56ce7e61a910cff65876874c46,2024-03-12T12:40:13.500000
|
||||
CVE-2024-26621,0,0,eba0c21ed3ef4cfa6360555e22a44f48e6f6b17a1f446df92f554dd254f62ab7,2024-03-06T23:15:07.297000
|
||||
CVE-2024-26622,0,0,0a20ab4397987085009b8061821a95b61d2693e95e945ba93e14b50217e13eb7,2024-03-11T18:15:19.673000
|
||||
CVE-2024-26622,0,1,0cfbcbd6e3151edc9130c758be3d89c2594195235582b9059a0e6ada55004a78,2024-03-13T02:15:51.293000
|
||||
CVE-2024-26623,0,0,5692b1c30d07fd10d73a2d8d099143935e519ebf33db10f9328fbf12228012a8,2024-03-06T15:18:08.093000
|
||||
CVE-2024-26624,0,0,82cf220baccdfd65eda3a6ccb02db7e03f66b3c3c4d80fe72e86ea4753067c0b,2024-03-06T15:18:08.093000
|
||||
CVE-2024-26625,0,0,29adc757db465c6ac28ab5a88b8651fe2f2af6ed70ecfb37d6743e85b92b5481,2024-03-06T15:18:08.093000
|
||||
@ -241114,7 +241116,7 @@ CVE-2024-27455,0,0,210c217f5a270a479508cb0bc44af7987316dd176b201dd0f52b07234beb3
|
||||
CVE-2024-27456,0,0,af8b9eeeffd0370c5237af64d481e919abc5d541ec3702413fff35287d9c8d37,2024-02-26T16:32:25.577000
|
||||
CVE-2024-27497,0,0,424da99af028e8bbc4e145cc3ed13014de56bcd76f9291f295253c8da6722a31,2024-03-01T15:23:36.177000
|
||||
CVE-2024-27499,0,0,2b5f4a1f9b18ceffc8606355dc4fd2934849f1f56bb5cf7799320a576c6c2b9e,2024-03-01T22:22:25.913000
|
||||
CVE-2024-27507,0,0,b5e65a7e92037ff788a080bc892fa0f80c7d9ef29fc4d0a37636022a6244d2a4,2024-02-28T14:07:00.563000
|
||||
CVE-2024-27507,0,1,529438be53bff7f57b0734455a84b70898cca3f6f033fcb5095c772a3f8f609c,2024-03-13T02:15:51.353000
|
||||
CVE-2024-27508,0,0,040c763fe5f3ce1aa685f7456be4b1599a5d1d348a6a3ea3969c861bb92ef9ee,2024-02-28T14:07:00.563000
|
||||
CVE-2024-27515,0,0,f99f7250526320b1e7250419a5b3dff4ee674d7e75fbaa06a1a665327078fcdc,2024-02-28T14:06:45.783000
|
||||
CVE-2024-27516,0,0,2f5c68154fe8166b9e5238a930fea497c25719295242fc84aef9deebdee06dfc,2024-02-29T13:49:29.390000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user