mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2024-04-05T10:00:38.649160+00:00
This commit is contained in:
parent
73ee117432
commit
1b6432e81f
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-34357",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-26T16:27:45.427",
|
||||
"lastModified": "2024-02-26T16:32:25.577",
|
||||
"lastModified": "2024-04-05T09:15:08.060",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,6 +55,10 @@
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/230510",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240405-0001/",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7123154",
|
||||
"source": "psirt@us.ibm.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-22655",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-03-14T17:15:49.930",
|
||||
"lastModified": "2024-03-14T18:11:35.910",
|
||||
"lastModified": "2024-04-05T09:15:08.203",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,6 +51,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240405-0006/",
|
||||
"source": "secure@intel.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00960.html",
|
||||
"source": "secure@intel.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-30996",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-26T16:27:46.017",
|
||||
"lastModified": "2024-02-26T16:32:25.577",
|
||||
"lastModified": "2024-04-05T09:15:08.317",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,6 +55,10 @@
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/254290",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240405-0004/",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7123154",
|
||||
"source": "psirt@us.ibm.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-32344",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-26T16:27:46.313",
|
||||
"lastModified": "2024-02-26T16:32:25.577",
|
||||
"lastModified": "2024-04-05T09:15:08.407",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,6 +55,10 @@
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/255898",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240405-0002/",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7123154",
|
||||
"source": "psirt@us.ibm.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-32666",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-03-14T17:15:51.140",
|
||||
"lastModified": "2024-03-14T18:11:35.910",
|
||||
"lastModified": "2024-04-05T09:15:08.497",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,6 +51,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240405-0010/",
|
||||
"source": "secure@intel.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00986.html",
|
||||
"source": "secure@intel.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-35191",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-03-14T17:15:51.333",
|
||||
"lastModified": "2024-03-14T18:11:35.910",
|
||||
"lastModified": "2024-04-05T09:15:08.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,6 +51,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240405-0005/",
|
||||
"source": "secure@intel.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00923.html",
|
||||
"source": "secure@intel.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-38359",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-26T16:27:46.633",
|
||||
"lastModified": "2024-02-26T16:32:25.577",
|
||||
"lastModified": "2024-04-05T09:15:08.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,6 +55,10 @@
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260744",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240405-0003/",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7123154",
|
||||
"source": "psirt@us.ibm.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-38575",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-03-14T17:15:51.527",
|
||||
"lastModified": "2024-03-14T18:11:35.910",
|
||||
"lastModified": "2024-04-05T09:15:08.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,6 +51,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240405-0008/",
|
||||
"source": "secure@intel.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00982.html",
|
||||
"source": "secure@intel.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-39368",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-03-14T17:15:51.713",
|
||||
"lastModified": "2024-03-14T18:11:35.910",
|
||||
"lastModified": "2024-04-05T09:15:08.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,6 +51,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240405-0007/",
|
||||
"source": "secure@intel.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00972.html",
|
||||
"source": "secure@intel.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-43490",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-03-14T17:15:51.910",
|
||||
"lastModified": "2024-03-14T18:11:35.910",
|
||||
"lastModified": "2024-04-05T09:15:08.930",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,6 +51,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240405-0009/",
|
||||
"source": "secure@intel.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01045.html",
|
||||
"source": "secure@intel.com"
|
||||
|
55
CVE-2024/CVE-2024-218xx/CVE-2024-21848.json
Normal file
55
CVE-2024/CVE-2024-218xx/CVE-2024-21848.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-21848",
|
||||
"sourceIdentifier": "responsibledisclosure@mattermost.com",
|
||||
"published": "2024-04-05T09:15:09.017",
|
||||
"lastModified": "2024-04-05T09:15:09.017",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Access Control in Mattermost Server versions 8.1.x before 8.1.11 allows an attacker that is in a channel with an active call to keep participating in the call even if they are removed from the channel\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mattermost.com/security-updates",
|
||||
"source": "responsibledisclosure@mattermost.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-21xx/CVE-2024-2115.json
Normal file
47
CVE-2024/CVE-2024-21xx/CVE-2024-2115.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-2115",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-05T08:15:07.470",
|
||||
"lastModified": "2024-04-05T08:15:07.470",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The LearnPress \u2013 WordPress LMS Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.0.0. This is due to missing or incorrect nonce validation on the filter_users functions. This makes it possible for unauthenticated attackers to elevate their privileges to that of a teacher via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3061953/learnpress/tags/4.0.1/inc/admin/class-lp-admin.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/342a4482-f5d3-4cc9-a998-e3abac7142cf?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-24xx/CVE-2024-2447.json
Normal file
55
CVE-2024/CVE-2024-24xx/CVE-2024-2447.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-2447",
|
||||
"sourceIdentifier": "responsibledisclosure@mattermost.com",
|
||||
"published": "2024-04-05T09:15:09.860",
|
||||
"lastModified": "2024-04-05T09:15:09.860",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mattermost versions 8.1.x before 8.1.11, 9.3.x before 9.3.3, 9.4.x before 9.4.4, and 9.5.x before 9.5.2 fail to authenticate the source of certain types of post actions, allowing an authenticated attacker to create posts as other users via a crafted post action.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mattermost.com/security-updates",
|
||||
"source": "responsibledisclosure@mattermost.com"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2024/CVE-2024-268xx/CVE-2024-26810.json
Normal file
36
CVE-2024/CVE-2024-268xx/CVE-2024-26810.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-26810",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-05T09:15:09.230",
|
||||
"lastModified": "2024-04-05T09:15:09.230",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Lock external INTx masking ops\n\nMask operations through config space changes to DisINTx may race INTx\nconfiguration changes via ioctl. Create wrappers that add locking for\npaths outside of the core interrupt code.\n\nIn particular, irq_type is updated holding igate, therefore testing\nis_intx() requires holding igate. For example clearing DisINTx from\nconfig space can otherwise race changes of the interrupt configuration.\n\nThis aligns interfaces which may trigger the INTx eventfd into two\ncamps, one side serialized by igate and the other only enabled while\nINTx is configured. A subsequent patch introduces synchronization for\nthe latter flows."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/03505e3344b0576fd619416793a31eae9c5b73bf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/04a4a017b9ffd7b0f427b8c376688d14cb614651",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3fe0ac10bd117df847c93408a9d428a453cd60e5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6fe478d855b20ac1eb5da724afe16af5a2aaaa40",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/810cd4bb53456d0503cc4e7934e063835152c1b7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2024/CVE-2024-268xx/CVE-2024-26812.json
Normal file
36
CVE-2024/CVE-2024-268xx/CVE-2024-26812.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-26812",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-05T09:15:09.283",
|
||||
"lastModified": "2024-04-05T09:15:09.283",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Create persistent INTx handler\n\nA vulnerability exists where the eventfd for INTx signaling can be\ndeconfigured, which unregisters the IRQ handler but still allows\neventfds to be signaled with a NULL context through the SET_IRQS ioctl\nor through unmask irqfd if the device interrupt is pending.\n\nIdeally this could be solved with some additional locking; the igate\nmutex serializes the ioctl and config space accesses, and the interrupt\nhandler is unregistered relative to the trigger, but the irqfd path\nruns asynchronous to those. The igate mutex cannot be acquired from the\natomic context of the eventfd wake function. Disabling the irqfd\nrelative to the eventfd registration is potentially incompatible with\nexisting userspace.\n\nAs a result, the solution implemented here moves configuration of the\nINTx interrupt handler to track the lifetime of the INTx context object\nand irq_type configuration, rather than registration of a particular\ntrigger eventfd. Synchronization is added between the ioctl path and\neventfd_signal() wrapper such that the eventfd trigger can be\ndynamically updated relative to in-flight interrupts or irqfd callbacks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0e09cf81959d9f12b75ad5c6dd53d237432ed034",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/18c198c96a815c962adc2b9b77909eec0be7df4d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4c089cefe30924fbe20dd1ee92774ea1f5eca834",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/69276a555c740acfbff13fb5769ee9c92e1c828e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7d29d4c72c1e196cce6969c98072a272d1a703b3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2024/CVE-2024-268xx/CVE-2024-26813.json
Normal file
36
CVE-2024/CVE-2024-268xx/CVE-2024-26813.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-26813",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-05T09:15:09.340",
|
||||
"lastModified": "2024-04-05T09:15:09.340",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/platform: Create persistent IRQ handlers\n\nThe vfio-platform SET_IRQS ioctl currently allows loopback triggering of\nan interrupt before a signaling eventfd has been configured by the user,\nwhich thereby allows a NULL pointer dereference.\n\nRather than register the IRQ relative to a valid trigger, register all\nIRQs in a disabled state in the device open path. This allows mask\noperations on the IRQ to nest within the overall enable state governed\nby a valid eventfd signal. This decouples @masked, protected by the\n@locked spinlock from @trigger, protected via the @igate mutex.\n\nIn doing so, it's guaranteed that changes to @trigger cannot race the\nIRQ handlers because the IRQ handler is synchronously disabled before\nmodifying the trigger, and loopback triggering of the IRQ via ioctl is\nsafe due to serialization with trigger changes via igate.\n\nFor compatibility, request_irq() failures are maintained to be local to\nthe SET_IRQS ioctl rather than a fatal error in the open device path.\nThis allows, for example, a userspace driver with polling mode support\nto continue to work regardless of moving the request_irq() call site.\nThis necessarily blocks all SET_IRQS access to the failed index."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0f8d8f9c2173a541812dd750529f4a415117eb29",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/62d4e43a569b67929eb3319780be5359694c8086",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/675daf435e9f8e5a5eab140a9864dfad6668b375",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7932db06c82c5b2f42a4d1a849d97dba9ce4a362",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d6bedd6acc0bcb1e7e010bc046032e47f08d379f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2024/CVE-2024-268xx/CVE-2024-26814.json
Normal file
36
CVE-2024/CVE-2024-268xx/CVE-2024-26814.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-26814",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-05T09:15:09.393",
|
||||
"lastModified": "2024-04-05T09:15:09.393",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/fsl-mc: Block calling interrupt handler without trigger\n\nThe eventfd_ctx trigger pointer of the vfio_fsl_mc_irq object is\ninitially NULL and may become NULL if the user sets the trigger\neventfd to -1. The interrupt handler itself is guaranteed that\ntrigger is always valid between request_irq() and free_irq(), but\nthe loopback testing mechanisms to invoke the handler function\nneed to test the trigger. The triggering and setting ioctl paths\nboth make use of igate and are therefore mutually exclusive.\n\nThe vfio-fsl-mc driver does not make use of irqfds, nor does it\nsupport any sort of masking operations, therefore unlike vfio-pci\nand vfio-platform, the flow can remain essentially unchanged."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/083e750c9f5f4c3bf61161330fb84d7c8e8bb417",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6ec0d88166dac43f29e96801c0927d514f17add9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7447d911af699a15f8d050dfcb7c680a86f87012",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/de87511fb0404d23b6da5f4660383b6ed095e28d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ee0bd4ad780dfbb60355b99f25063357ab488267",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2024/CVE-2024-274xx/CVE-2024-27437.json
Normal file
36
CVE-2024/CVE-2024-274xx/CVE-2024-27437.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-27437",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-05T09:15:09.443",
|
||||
"lastModified": "2024-04-05T09:15:09.443",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Disable auto-enable of exclusive INTx IRQ\n\nCurrently for devices requiring masking at the irqchip for INTx, ie.\ndevices without DisINTx support, the IRQ is enabled in request_irq()\nand subsequently disabled as necessary to align with the masked status\nflag. This presents a window where the interrupt could fire between\nthese events, resulting in the IRQ incrementing the disable depth twice.\nThis would be unrecoverable for a user since the masked flag prevents\nnested enables through vfio.\n\nInstead, invert the logic using IRQF_NO_AUTOEN such that exclusive INTx\nis never auto-enabled, then unmask as required."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/139dfcc4d723ab13469881200c7d80f49d776060",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2a4a666c45107206605b7b5bc20545f8aabc4fa2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3b3491ad0f80d913e7d255941d4470f4a4d9bfda",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bf0bc84a20e6109ab07d5dc072067bd01eb931ec",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fe9a7082684eb059b925c535682e68c34d487d43",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-289xx/CVE-2024-28949.json
Normal file
55
CVE-2024/CVE-2024-289xx/CVE-2024-28949.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-28949",
|
||||
"sourceIdentifier": "responsibledisclosure@mattermost.com",
|
||||
"published": "2024-04-05T09:15:09.497",
|
||||
"lastModified": "2024-04-05T09:15:09.497",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mattermost Server versions 9.5.x before 9.5.2, 9.4.x before 9.4.4, 9.3.x before 9.3.3, 8.1.x before 8.1.11 don't limit the number of user preferences which allows an attacker to send a large number of user preferences potentially causing denial of service.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mattermost.com/security-updates",
|
||||
"source": "responsibledisclosure@mattermost.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-292xx/CVE-2024-29221.json
Normal file
55
CVE-2024/CVE-2024-292xx/CVE-2024-29221.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-29221",
|
||||
"sourceIdentifier": "responsibledisclosure@mattermost.com",
|
||||
"published": "2024-04-05T09:15:09.680",
|
||||
"lastModified": "2024-04-05T09:15:09.680",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Access Control in Mattermost Server versions 9.5.x before 9.5.2, 9.4.x before 9.4.4, 9.3.x before 9.3.3, 8.1.x before 8.1.11 lacked proper access control in the `/api/v4/users/me/teams` endpoint\u00a0allowing\u00a0a team admin to get the invite ID of their team, thus allowing them to invite users, even if the \"Add Members\" permission was explicitly removed from team admins. \n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mattermost.com/security-updates",
|
||||
"source": "responsibledisclosure@mattermost.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-308xx/CVE-2024-30849.json
Normal file
20
CVE-2024/CVE-2024-308xx/CVE-2024-30849.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-30849",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-05T08:15:07.733",
|
||||
"lastModified": "2024-04-05T08:15:07.733",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Arbitrary file upload vulnerability in Sourcecodester Complete E-Commerce Site v1.0, allows remote attackers to execute arbitrary code via filename parameter in admin/products_photo.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wkeyi0x1/vul-report/issues/3",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-308xx/CVE-2024-30891.json
Normal file
20
CVE-2024/CVE-2024-308xx/CVE-2024-30891.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-30891",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-05T08:15:07.800",
|
||||
"lastModified": "2024-04-05T08:15:07.800",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A command injection vulnerability exists in /goform/exeCommand in Tenda AC18 v15.03.05.05, which allows attackers to construct cmdinput parameters for arbitrary command execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Lantern-r/IoT-vuln/blob/main/Tenda/AC18/formexeCommand.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
51
CVE-2024/CVE-2024-32xx/CVE-2024-3217.json
Normal file
51
CVE-2024/CVE-2024-32xx/CVE-2024-3217.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2024-3217",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-05T08:15:07.853",
|
||||
"lastModified": "2024-04-05T08:15:07.853",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP Directory Kit plugin for WordPress is vulnerable to SQL Injection via the 'attribute_value' and 'attribute_id' parameters in all versions up to, and including, 1.3.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wpdirectorykit/trunk/application/controllers/Wdk_frontendajax.php#L72",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3064842/wpdirectorykit/trunk/application/controllers/Wdk_frontendajax.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/09b315e6-d973-467d-8b8d-4b7b4a7ca3f8?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
39
README.md
39
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-05T08:00:42.996477+00:00
|
||||
2024-04-05T10:00:38.649160+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-05T07:15:11.110000+00:00
|
||||
2024-04-05T09:15:09.860000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,25 +33,42 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
244174
|
||||
244187
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `13`
|
||||
|
||||
- [CVE-2023-52235](CVE-2023/CVE-2023-522xx/CVE-2023-52235.json) (`2024-04-05T06:15:10.060`)
|
||||
- [CVE-2024-22363](CVE-2024/CVE-2024-223xx/CVE-2024-22363.json) (`2024-04-05T06:15:10.200`)
|
||||
- [CVE-2024-26329](CVE-2024/CVE-2024-263xx/CVE-2024-26329.json) (`2024-04-05T07:15:10.970`)
|
||||
- [CVE-2024-27448](CVE-2024/CVE-2024-274xx/CVE-2024-27448.json) (`2024-04-05T06:15:10.263`)
|
||||
- [CVE-2024-29672](CVE-2024/CVE-2024-296xx/CVE-2024-29672.json) (`2024-04-05T06:15:10.323`)
|
||||
- [CVE-2024-29863](CVE-2024/CVE-2024-298xx/CVE-2024-29863.json) (`2024-04-05T07:15:11.110`)
|
||||
- [CVE-2024-2115](CVE-2024/CVE-2024-21xx/CVE-2024-2115.json) (`2024-04-05T08:15:07.470`)
|
||||
- [CVE-2024-21848](CVE-2024/CVE-2024-218xx/CVE-2024-21848.json) (`2024-04-05T09:15:09.017`)
|
||||
- [CVE-2024-2447](CVE-2024/CVE-2024-24xx/CVE-2024-2447.json) (`2024-04-05T09:15:09.860`)
|
||||
- [CVE-2024-26810](CVE-2024/CVE-2024-268xx/CVE-2024-26810.json) (`2024-04-05T09:15:09.230`)
|
||||
- [CVE-2024-26812](CVE-2024/CVE-2024-268xx/CVE-2024-26812.json) (`2024-04-05T09:15:09.283`)
|
||||
- [CVE-2024-26813](CVE-2024/CVE-2024-268xx/CVE-2024-26813.json) (`2024-04-05T09:15:09.340`)
|
||||
- [CVE-2024-26814](CVE-2024/CVE-2024-268xx/CVE-2024-26814.json) (`2024-04-05T09:15:09.393`)
|
||||
- [CVE-2024-27437](CVE-2024/CVE-2024-274xx/CVE-2024-27437.json) (`2024-04-05T09:15:09.443`)
|
||||
- [CVE-2024-28949](CVE-2024/CVE-2024-289xx/CVE-2024-28949.json) (`2024-04-05T09:15:09.497`)
|
||||
- [CVE-2024-29221](CVE-2024/CVE-2024-292xx/CVE-2024-29221.json) (`2024-04-05T09:15:09.680`)
|
||||
- [CVE-2024-30849](CVE-2024/CVE-2024-308xx/CVE-2024-30849.json) (`2024-04-05T08:15:07.733`)
|
||||
- [CVE-2024-30891](CVE-2024/CVE-2024-308xx/CVE-2024-30891.json) (`2024-04-05T08:15:07.800`)
|
||||
- [CVE-2024-3217](CVE-2024/CVE-2024-32xx/CVE-2024-3217.json) (`2024-04-05T08:15:07.853`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `10`
|
||||
|
||||
- [CVE-2022-34357](CVE-2022/CVE-2022-343xx/CVE-2022-34357.json) (`2024-04-05T09:15:08.060`)
|
||||
- [CVE-2023-22655](CVE-2023/CVE-2023-226xx/CVE-2023-22655.json) (`2024-04-05T09:15:08.203`)
|
||||
- [CVE-2023-30996](CVE-2023/CVE-2023-309xx/CVE-2023-30996.json) (`2024-04-05T09:15:08.317`)
|
||||
- [CVE-2023-32344](CVE-2023/CVE-2023-323xx/CVE-2023-32344.json) (`2024-04-05T09:15:08.407`)
|
||||
- [CVE-2023-32666](CVE-2023/CVE-2023-326xx/CVE-2023-32666.json) (`2024-04-05T09:15:08.497`)
|
||||
- [CVE-2023-35191](CVE-2023/CVE-2023-351xx/CVE-2023-35191.json) (`2024-04-05T09:15:08.583`)
|
||||
- [CVE-2023-38359](CVE-2023/CVE-2023-383xx/CVE-2023-38359.json) (`2024-04-05T09:15:08.677`)
|
||||
- [CVE-2023-38575](CVE-2023/CVE-2023-385xx/CVE-2023-38575.json) (`2024-04-05T09:15:08.763`)
|
||||
- [CVE-2023-39368](CVE-2023/CVE-2023-393xx/CVE-2023-39368.json) (`2024-04-05T09:15:08.850`)
|
||||
- [CVE-2023-43490](CVE-2023/CVE-2023-434xx/CVE-2023-43490.json) (`2024-04-05T09:15:08.930`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
45
_state.csv
45
_state.csv
@ -200854,7 +200854,7 @@ CVE-2022-34352,0,0,1e1d4fbb5a377507f21a2bed94d2ebc5281a09581aee987536370e13d6395
|
||||
CVE-2022-34354,0,0,02584ee6b8cb0bff7f27c7009429134f0b39fd1a6b1116c23548e4adeee7b542,2023-11-07T03:48:33.893000
|
||||
CVE-2022-34355,0,0,c113b0077901660ecb6420de68116b847470d756b400e1b61d0de5945949d9a8,2023-10-10T20:41:30.020000
|
||||
CVE-2022-34356,0,0,2ae14f15be104cb235faa8a6ab8ed3afc398f20d7225fc326f5247476834ae64,2022-09-16T02:56:48.280000
|
||||
CVE-2022-34357,0,0,e6eea0bc8e960f902bc180c6933bded4926e63ccf044b18451b8c0995f3fe9f8,2024-02-26T16:32:25.577000
|
||||
CVE-2022-34357,0,1,af87a974bbeca9e2d6e7bafe81283ee0f5421ac9d7cafc5f56a460dca06db348,2024-04-05T09:15:08.060000
|
||||
CVE-2022-34358,0,0,c81aeda061a6e1c39a5ea95bf08044fe1aed3523aa70c0f131fd41eb0542b8c2,2022-07-27T23:07:58.250000
|
||||
CVE-2022-3436,0,0,628499c3069d5d4d40a6545fab742a3d0bedd629a4e56c085297ef7620ea4d2d,2023-11-30T14:15:08.173000
|
||||
CVE-2022-34361,0,0,62e052216474f4951eeb4a3cb3acba62f053ad7d01461ecc470cfb339c52d99a,2023-11-07T03:48:34.060000
|
||||
@ -215730,7 +215730,7 @@ CVE-2023-22651,0,0,71c4ad22d720a14f556cbdbb0dfeae4cea5ba5bc7c522362e29fd79de49a8
|
||||
CVE-2023-22652,0,0,22b310772038f08a4e58450ff2cc11ade814694d9e643598182c60a0305bcac8,2023-09-13T03:15:07.693000
|
||||
CVE-2023-22653,0,0,a51dcac8d7628283af317fae95110ee2fc893a6c8b2b6ebf1624613b419371fc,2023-08-02T15:34:59.683000
|
||||
CVE-2023-22654,0,0,5b1a8feee98010e65bed848785e61db9d7b8c5ab9fbbb79f8736b9741ba8db64,2023-05-30T22:22:43.403000
|
||||
CVE-2023-22655,0,0,c5ae50c4ec0e53175b67f12928703a05d68084546570470362665fd64b66f04f,2024-03-14T18:11:35.910000
|
||||
CVE-2023-22655,0,1,4014795b5db8a78148a9a1e089cc32279c6823fb131fc7bb94f4872889f6e033,2024-04-05T09:15:08.203000
|
||||
CVE-2023-22657,0,0,50aba77e7826f44f75fd8eca9cdefd06087e1b24472024d8ed2ae2967b0f87b1,2023-11-07T04:07:12.750000
|
||||
CVE-2023-22659,0,0,71d1f10cbb6b53df610f190613167a6c75fa7f817c0f72a1094380595ddd5133,2023-07-13T17:17:26.230000
|
||||
CVE-2023-2266,0,0,21c36958639008dc9b075634492f4955ca2430a255612c0db16c56bae462bdf1,2023-12-06T00:35:24.197000
|
||||
@ -222139,7 +222139,7 @@ CVE-2023-30991,0,0,d2cd3864d4d0c1e0346308db047da023695d9d74eb35ca6206a98aedc11f1
|
||||
CVE-2023-30993,0,0,03bf4ae9dfc255a68d7e0f8c0d83b167e401827066b7281a4017436cb44acd16,2023-07-05T18:47:03.063000
|
||||
CVE-2023-30994,0,0,50f2536b42ff1c52ec44103505245abc9de1d3604cb0eec34abbe616f409e899,2023-10-18T20:48:41.863000
|
||||
CVE-2023-30995,0,0,52e1bdffb80c2cd6a5585042ac96f61096b1fdd1a66207a01a6edf115e2cc942,2023-10-10T20:15:09.650000
|
||||
CVE-2023-30996,0,0,e23629ef1de07170db706882aae827991fcc7aa9f928a227ee877bff74158354,2024-02-26T16:32:25.577000
|
||||
CVE-2023-30996,0,1,0cbc5199ab8703e9e1e8f5db93dac42c6c5c4fbde7a4c589a63ada853499569d,2024-04-05T09:15:08.317000
|
||||
CVE-2023-30999,0,0,1ddc78f54cf0c47e9336bc540c859356a71014614a888d063a16c4ae23a656c0,2024-02-06T21:31:55.033000
|
||||
CVE-2023-3100,0,0,178f8cfb72823422aea10e7ffea4194c7bfad6260e8286d491b815750e8a8864,2024-03-21T02:48:24.370000
|
||||
CVE-2023-31001,0,0,c53512fa1496d57027073df272050bde089a391b1726720adc054c5082b0bad7,2024-01-18T17:06:28.277000
|
||||
@ -223041,7 +223041,7 @@ CVE-2023-32339,0,0,cb517b5b344e935e47f6fa2b5d4d177564da71d9c5673af6029fc8ae03edb
|
||||
CVE-2023-3234,0,0,a73a9cbedb7f5d4c8e9c6e64bd0603a581ffe38a404e785fa8e0687b891ef8df,2024-03-21T02:48:28.063000
|
||||
CVE-2023-32341,0,0,1ddf31eafe868585a40c30471b117fdf8bc01f015bb58b603e688577fc61bd21,2024-02-15T04:40:13.650000
|
||||
CVE-2023-32342,0,0,718b739606ceddf8e116cda5b49dc56f9002b527775d566e068e3f50abde9e5c,2023-06-06T18:18:41.097000
|
||||
CVE-2023-32344,0,0,50c886312fd589bac5b16cd18d547770e144a41ace1d65686371d5709ce97205,2024-02-26T16:32:25.577000
|
||||
CVE-2023-32344,0,1,a97deba342fd58800328e47f88083826c0a2753dea8ce966e07e7c270b69e45e,2024-04-05T09:15:08.407000
|
||||
CVE-2023-32346,0,0,1720a4f1887d300a5a8abe90d8a81fa98e2566da8b280c128fac5c7393e4f6c4,2023-05-31T20:17:36.940000
|
||||
CVE-2023-32347,0,0,8e4f4f9285f7dd35eb61db76d54965657bbc3f0a44cb8d351372ee30c4f36a96,2023-05-31T20:18:22.233000
|
||||
CVE-2023-32348,0,0,8c439649256e002f4389c48d462357d3b5521993f6f3fda6e5a636fc0d57887a,2023-06-01T14:26:59.373000
|
||||
@ -223361,7 +223361,7 @@ CVE-2023-32662,0,0,e6ecfd432d8093b5086df379db0b57cdf40d1685dba2c7fabe307bec0ed72
|
||||
CVE-2023-32663,0,0,3e7ef52ee8898923e5c75493bfae74a9e09e3258bba72eb62046ef7118b9edb7,2023-08-21T17:15:47.183000
|
||||
CVE-2023-32664,0,0,eb42d87345b4b74142e9d98b628cc63fc43d215142fe85e83066ebee2586bda4,2023-09-15T19:15:07.340000
|
||||
CVE-2023-32665,0,0,31f6fbb04d38e24ef8a8bd7c7b632bd8e055665c900cbecbc4c539e406f2b02a,2023-11-27T14:15:07.820000
|
||||
CVE-2023-32666,0,0,334f13ee79a481802971684a0dba755bfe92bac8542d6f23b179cba5f308384e,2024-03-14T18:11:35.910000
|
||||
CVE-2023-32666,0,1,9e4cb6a8ebc3b9a62bc711210afb6752a4df60b12745e2e1ba1c7436db1cb9d9,2024-04-05T09:15:08.497000
|
||||
CVE-2023-32668,0,0,6870504f63fd451347fe0c331096f1e45ff8f6811229f296b8ba61f0b4142f10,2023-05-23T17:31:45.217000
|
||||
CVE-2023-32669,0,0,0f9d4ef16e2f26deb90011f7c395852feb44144b8263c413043ff4187727c7dd,2023-10-04T21:07:05.703000
|
||||
CVE-2023-3267,0,0,2d4c8daf423de31384ed6303e8fbed7365844c7d43ecaa98d82b4375b3aba328,2023-08-22T16:15:46.067000
|
||||
@ -225157,7 +225157,7 @@ CVE-2023-35187,0,0,726f3d269c3fc4ab0e4f8bf02f0782a65d9f79c8f65fbe320311a563e2133
|
||||
CVE-2023-35188,0,0,dc2d51582b0c40a1a991431e82dc96ea83b69d4b6cd75cf2797291ed1d48e8fe,2024-02-13T20:36:01.653000
|
||||
CVE-2023-35189,0,0,727918a3b8004e51f12292fde6090cd74f994ad6d97365addee6dbdc84715391,2023-07-27T17:43:17.170000
|
||||
CVE-2023-3519,0,0,7329bec3703bdc39aea3e59a1cc85b2341feb74f79ed91f9be508e94879784da,2023-08-04T18:15:17.077000
|
||||
CVE-2023-35191,0,0,647a4cf9ed112e0b5dfd3a6d9b3cda4c92afed64190c1baacb9fc0d972964833,2024-03-14T18:11:35.910000
|
||||
CVE-2023-35191,0,1,c31c71c496abdb7f6b10202e2976b8f837d4c71b7eaa2c4113c2b95cf33357cf,2024-04-05T09:15:08.583000
|
||||
CVE-2023-35193,0,0,35d999215ee0714de627ba46454d683b144c8672ad7068fc25e9877364a0d4d5,2023-10-18T14:59:29.847000
|
||||
CVE-2023-35194,0,0,f1422d8c09e7347a9549c0a032c4e17cf30f4016d4503b676ff325c6bb8df1e1,2023-10-18T14:59:10.533000
|
||||
CVE-2023-3520,0,0,03168a3d34c4551d3f89d5576703d3fa9269c779a40ea50d5fa229233446f0fa,2023-07-12T15:34:13.653000
|
||||
@ -227261,7 +227261,7 @@ CVE-2023-38354,0,0,d1e8aae350b3efaa7d933d306935881b296a663e5e0dd367535a6a3341ed7
|
||||
CVE-2023-38355,0,0,249d62dea42b65c43f485337cf2b025ca84978994be22a87ed6e3b2716c3280d,2023-10-13T01:14:34.023000
|
||||
CVE-2023-38356,0,0,c55e6df572a7ad6a09d93d8bf024b6549d086d1593f311c0dcd9f5f419a32e73,2023-09-22T16:45:59.370000
|
||||
CVE-2023-38357,0,0,f899c24b9076099671d7a5c797705766cb7feaa772c69dc54fed2a6af7ab8b59,2023-08-04T18:43:48.817000
|
||||
CVE-2023-38359,0,0,6d37e1d7592cad48f05824582199416e60c4ae2241989a8d6c26dd8e6cea5139,2024-02-26T16:32:25.577000
|
||||
CVE-2023-38359,0,1,8e809a2260654b54c4b5a8d307cfb00bbc63342d56d8255c4f45147077ddfa79,2024-04-05T09:15:08.677000
|
||||
CVE-2023-3836,0,0,8354a50233ed3d7b2f0f73c2e8a8f66f78bb8f5bae55abc92ae927e41b4b7142,2024-03-21T02:48:47.537000
|
||||
CVE-2023-38360,0,0,79486c66229a0fa5a2154e2865bfba1395d11138731e5917b327ce675040bb76,2024-03-05T13:41:01.900000
|
||||
CVE-2023-38361,0,0,c6e79c96c692623eff2910c3872ad8af4e3692fed7acdbdf474970bee66927f0,2023-11-29T20:52:28.337000
|
||||
@ -227458,7 +227458,7 @@ CVE-2023-38571,0,0,59422f4a140d130cd11989d6215360f540ea5ce2d1940f49a1884661bcc08
|
||||
CVE-2023-38572,0,0,d548f53924cef1c9fed50ca54f02dd79c795d64a5950d4afb21f0974051e6ecc,2024-01-05T14:15:47.123000
|
||||
CVE-2023-38573,0,0,473858576dcb468ddb455cbd057d8489cb45e9be3d5a82dde3da1329775f6312,2023-12-01T20:52:57.627000
|
||||
CVE-2023-38574,0,0,b5446bdb7033f5711e00ad3535ee9383e878f8f0159bc3255c479d6656c1d4a4,2023-09-11T12:50:00.413000
|
||||
CVE-2023-38575,0,0,d79b549e6be36be999d6405aacf44a0d2d852798b1af57712030c2b4eed5a656,2024-03-14T18:11:35.910000
|
||||
CVE-2023-38575,0,1,4e79fe8d2ce008298825516df254661a63b525dae6fedee20e49c3138e848b6a,2024-04-05T09:15:08.763000
|
||||
CVE-2023-38576,0,0,af8fe57eb812ce53861c61345d0fee8b81c4f54d4d6d4bf17791b20b4197fa51,2023-08-24T18:26:00.547000
|
||||
CVE-2023-38579,0,0,d675649c63083678f4f6251f8e7bc0f6b675249c8aaa3432eda8a193ed725f0c,2024-02-13T21:56:17.013000
|
||||
CVE-2023-3858,0,0,b0181383daef6c4e2640c077649efa29542f55d1afd5014233b3c6c43dd98b7b,2024-03-21T02:48:49.360000
|
||||
@ -228048,7 +228048,7 @@ CVE-2023-39363,0,0,3b5e03600cf70b560e94452186ae68035e14537be8e3ab0775f4768bbd4e3
|
||||
CVE-2023-39364,0,0,c3c94f3ad4cb220374e3d08f341ea50d15ec66dff6a2b9cc99e74f26a2402284,2024-03-18T20:15:07.727000
|
||||
CVE-2023-39365,0,0,e973380538b25f82f11649a42c0b64ff80692ed5ec34a2c9828c426b7e157e90,2024-03-18T20:15:07.827000
|
||||
CVE-2023-39366,0,0,ec1d63cbca61e10ab8a85d0a3e36a9a8f98189047df6aef06ced93f8760dd051,2023-11-09T05:15:10.317000
|
||||
CVE-2023-39368,0,0,a6bbe32de750fa366848dbea046a634c140a10db4f89a62a011e509da7d270ba,2024-03-14T18:11:35.910000
|
||||
CVE-2023-39368,0,1,80c88d98cccc8fda18cc4ce42c7e61c86543eb9a5fed9f7febed87a045c89328,2024-04-05T09:15:08.850000
|
||||
CVE-2023-39369,0,0,e8aa62682a22aacbf757723c98e0bd960e9af84f36a645dc487bf02ca20fc2a4,2023-09-07T17:44:36.470000
|
||||
CVE-2023-3937,0,0,1b9c2edef5222aa8070478842961fb82be451273a242472108ff086c86dfad93,2023-08-18T14:30:09.183000
|
||||
CVE-2023-39370,0,0,c3e1bdce95fcb360380a5bb3623ace17d0c7e5b2b109774631c738473e281f23,2023-09-08T06:42:31.750000
|
||||
@ -230679,7 +230679,7 @@ CVE-2023-43484,0,0,0e3fd100d8cdabff15f5388cc7ad52bc20ee89b047f07e3d1be0d5fe0a15a
|
||||
CVE-2023-43485,0,0,56e06eecce10771793782bda7486bdc0abaf33406a8b34746335ac307311004e,2023-10-17T20:31:53.560000
|
||||
CVE-2023-43488,0,0,73963ff8fac3febe7fcf1226608d7faad6241fb5160a15c4381098ef0daabd52,2023-11-06T14:41:18.393000
|
||||
CVE-2023-4349,0,0,7bcfa9d15cfc992ac2e945aa6e7aec95ce86c568d8f15fb3ba2380084473c42f,2024-01-31T17:15:14.370000
|
||||
CVE-2023-43490,0,0,e303399ece1b4efa44819e1302eca502b519f9d69f3ea92111976fb33fb34ff8,2024-03-14T18:11:35.910000
|
||||
CVE-2023-43490,0,1,9855c56390f04a7d3184cf28686e801bde9b11bfcd2582fd5bccb6e92bdd6f36,2024-04-05T09:15:08.930000
|
||||
CVE-2023-43492,0,0,42b5f695dc2a37dd6c1424d01d87bfa34fecc8146eed1f8b9a6b38bb9493ae43,2023-10-30T14:33:25.570000
|
||||
CVE-2023-43493,0,0,c9ba762920ceac7459278a5fd1ff76127d128352a3279e28d59d1b8b275a2639,2023-09-27T20:51:26.677000
|
||||
CVE-2023-43494,0,0,a5e1abcb0e0cbdd68150bd25ed5f4171fce3829cb775e04ccec60c9f09070438,2023-09-25T13:43:35.503000
|
||||
@ -236058,7 +236058,7 @@ CVE-2023-52229,0,0,ea00ad4e0597affd30c31fe4f98a420e37e7ad7335b14877a8e6dc8a42c24
|
||||
CVE-2023-5223,0,0,89e8c184d21745a264c9fc9e444990021f80eaf45de773e9b410a22e5226ce45,2024-03-21T02:50:11.113000
|
||||
CVE-2023-52231,0,0,b5d4f82f731fe2c9cd0c678c3b61a598c79c626b8e6400879ca4a307d29966f3,2024-03-28T12:42:56.150000
|
||||
CVE-2023-52234,0,0,1fff4c9561934a3ed1e9215004c9ee935ccd38ea2e79cd4cda085a56cc775bc1,2024-03-28T12:42:56.150000
|
||||
CVE-2023-52235,1,1,f4252331265cbed47d565e61c2d6af947ae9657df278785c08221b7895baa311,2024-04-05T06:15:10.060000
|
||||
CVE-2023-52235,0,0,f4252331265cbed47d565e61c2d6af947ae9657df278785c08221b7895baa311,2024-04-05T06:15:10.060000
|
||||
CVE-2023-52239,0,0,53232ab6cc2fc288fa443c530cf5456f2ca2ee6e47506bdc07862ff96f4b1242,2024-02-13T22:50:50.313000
|
||||
CVE-2023-52240,0,0,e12239f2302ca733fadb51e07b144a2ef6f5c195fb579e55287a44a10e77cb78,2024-01-08T14:32:47.203000
|
||||
CVE-2023-52251,0,0,37b652e51a7c39e57b6fb6d1511e1d015580821275c80dc97e7e00b5102f4597,2024-02-29T01:42:07.630000
|
||||
@ -239873,6 +239873,7 @@ CVE-2024-2108,0,0,c2fa70d90e7c92604d37599b63a68c51b88c7a208a94e63da1f79da8e05cb6
|
||||
CVE-2024-2110,0,0,1d85de629a97570a97242f5d089550bba2e60a5923838c39c1151e294a5fdcf3,2024-03-28T12:42:56.150000
|
||||
CVE-2024-2111,0,0,bb223011165a425455ec8ad438d31acdc69716e592665db5e015c6e3c7a0ad9a,2024-03-28T12:42:56.150000
|
||||
CVE-2024-2113,0,0,1af2e189d0f766a4a77361c625e87ddcd239476cacd0eaf00d619a2d2d68e8de,2024-03-29T12:45:02.937000
|
||||
CVE-2024-2115,1,1,958070a5428d52f8ec76429e64306fbbf091a0766862fcf468e218b71279864a,2024-04-05T08:15:07.470000
|
||||
CVE-2024-2116,0,0,0a8927d2c3af56415377e26a49eef636f1c80d9f9b3374c561d3bce1d3a48066,2024-03-29T12:45:02.937000
|
||||
CVE-2024-2120,0,0,d869e2d6a05f40fd099ef5d11b57f9e00d7f0b266e38148b71c8a447ce60ab1d,2024-03-27T12:29:30.307000
|
||||
CVE-2024-2121,0,0,4e86b6ec3433d288b50b9e9c9587d6707962f4c2d7ff92215a6366c5fd16dc6b,2024-03-27T12:29:30.307000
|
||||
@ -240201,6 +240202,7 @@ CVE-2024-21838,0,0,2e87184ffbd37f09fc02bbbce38359315ed0c01cd7f2541a39d089530736b
|
||||
CVE-2024-2184,0,0,b7ea4f5ba4c2bd608dff608bfe2a87def706e3fb064d33fdd3c3733ae6e79e4b,2024-03-11T01:32:29.610000
|
||||
CVE-2024-21840,0,0,ba783d6125c59c9321abeb19e4ad3c65376e311d48c8d637117e60a3ad69607f,2024-02-06T18:32:20.340000
|
||||
CVE-2024-21845,0,0,c3c19550dac060de10c39d04cca7b66f65b34853e3fc2412b58fd540397606b8,2024-02-07T18:23:06.690000
|
||||
CVE-2024-21848,1,1,4034ab55412051bd5498ab10b360fcb8e191d5ee68b1a2843a65c4f1c9ab4ae1,2024-04-05T09:15:09.017000
|
||||
CVE-2024-21849,0,0,777d92a1c4bb7f79ad58de292d7b92c84e7bc7c1bbc5ad80d97c5d175c6259e9,2024-02-14T18:04:45.380000
|
||||
CVE-2024-21851,0,0,854dd5d2aabc832591989b715d43ec08aeafe79b0e7fb2b7b8e58485d72989a1,2024-02-07T18:15:48.700000
|
||||
CVE-2024-21852,0,0,3082fd3c592fa6da1ceb030e60633f5be1a3b7d2adb2434a27465175a4927608,2024-02-07T17:15:05.653000
|
||||
@ -240468,7 +240470,7 @@ CVE-2024-2236,0,0,1caa0e5cdfb424662cbf6124414533e4ab1dd9ca210ea89ecd59ad25abc68f
|
||||
CVE-2024-22360,0,0,dde3d7768ad1c8bc414b134384042470a384d3453ec0b0a0aa751c2a96e1b961,2024-04-03T17:24:18.150000
|
||||
CVE-2024-22361,0,0,2cb34447b61b8680c66e6f142987700b31f9f16d4e9b8d748c59e5b8ad5a9a29,2024-02-16T21:35:31.953000
|
||||
CVE-2024-22362,0,0,194d4da61fd0e172838ae5e875415deb5a10e6ec31fc18ececc7e4c5ad8228c4,2024-03-21T02:52:03.063000
|
||||
CVE-2024-22363,1,1,a2fd052c0c680128839144798c1421a18aa4438b9681bf79d0004d695dacd4dd,2024-04-05T06:15:10.200000
|
||||
CVE-2024-22363,0,0,a2fd052c0c680128839144798c1421a18aa4438b9681bf79d0004d695dacd4dd,2024-04-05T06:15:10.200000
|
||||
CVE-2024-22365,0,0,b09f0e3dd0fc2bf60706805e33c1f78b209416e9ed2aa43cb1cfb00b1fe90d17,2024-02-14T00:27:40.143000
|
||||
CVE-2024-22366,0,0,430ca6193adfaa0b9afcb94c1ccbb70fbf418a97a177252da5823216c0a609df,2024-01-30T22:15:32.033000
|
||||
CVE-2024-22368,0,0,6b22b40b8e4884565fa5c7d8677cdf0e0ae6419db0baf589179542cd6fadbd26,2024-02-27T04:15:06.767000
|
||||
@ -241357,6 +241359,7 @@ CVE-2024-2445,0,0,2f855bbcb84a342093922fd73320bfe19138d60313d23c629da4de19e559d7
|
||||
CVE-2024-2446,0,0,42e5c66ebcf58bc3242675333cd3d5679a04b8d2c648c26027e5a47b9ff8b42a,2024-03-15T12:53:06.423000
|
||||
CVE-2024-24468,0,0,2ffe0e787add87754da9d28139dd49fe0df5af62f9576796ac86e102fb215c8b,2024-02-07T22:03:09.897000
|
||||
CVE-2024-24469,0,0,4f6c0d02ab780395cc2795972f5ccd070037d1f155bb48f88977ff7315e7ceab,2024-02-07T22:02:57.743000
|
||||
CVE-2024-2447,1,1,a48cc78008d5334dfa13937b2dfd060f6e97d4807995da04c53d98553bc8065e,2024-04-05T09:15:09.860000
|
||||
CVE-2024-24470,0,0,0ed64df001bff16a393bf92778dffdaa6681f7af33a9a33c77cdaa83290d7947,2024-02-06T21:07:34.547000
|
||||
CVE-2024-24474,0,0,7ff84388b8a92907ef716e1ca2c29ef338e5f699b29d362e7b2c54bbc2735acd,2024-02-21T01:15:07.857000
|
||||
CVE-2024-24475,0,0,da128c239114738663c22cbcb468c90723f598d143228b589356daf6901317f8,2024-02-21T01:15:07.890000
|
||||
@ -242321,7 +242324,7 @@ CVE-2024-26318,0,0,5a8434e81e693bc0f90a66d9a6d8655df17a4e5f3f1f4a63075d970f5e64f
|
||||
CVE-2024-2632,0,0,ea393f116b0cce8559537657b6b48805c98531cb8a651d292d9e39cc33b1c1ca,2024-03-19T13:26:46
|
||||
CVE-2024-26327,0,0,ed8d19077e03f59789fd57e15d79ebd6fa2e85738782585f472f97265da3d970,2024-02-20T19:50:53.960000
|
||||
CVE-2024-26328,0,0,483204e568c37ddd385ae6419587f3cba8922820a5f3e4626565041a8ff87314,2024-02-20T19:50:53.960000
|
||||
CVE-2024-26329,1,1,abe0338d3180af0be53532b1668c2fb2a7dc77c306bc74aac5adb05a928048ec,2024-04-05T07:15:10.970000
|
||||
CVE-2024-26329,0,0,abe0338d3180af0be53532b1668c2fb2a7dc77c306bc74aac5adb05a928048ec,2024-04-05T07:15:10.970000
|
||||
CVE-2024-2633,0,0,d6d619ede14eb7136c8ee12cb2cd0efea8cc18b4fa44aa46ef5af23251d75954,2024-03-19T13:26:46
|
||||
CVE-2024-26333,0,0,72ddcf1e5079d4095fb63f71d350456e693bb97135c81208eeffa24430bb0b2f,2024-03-05T13:41:01.900000
|
||||
CVE-2024-26334,0,0,561e27fe6d2eae55228bd8cfd4e061bf762c84a8f4fc571dc41629b9250a54d4,2024-03-05T13:41:01.900000
|
||||
@ -242631,6 +242634,10 @@ CVE-2024-26807,0,0,dd58971be5b2b7ae4d4d293dc140016766895ff28462656c96a25f4364a4b
|
||||
CVE-2024-26808,0,0,811c6dcfe9e097a1e05a422eed27dc92a175aa2bf6a558020423935445f2e0d3,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26809,0,0,d8b70b9ed098155a50a0b82965aa5ef8be6d2e172d92379b17e564e5b8017a02,2024-04-04T12:48:22.650000
|
||||
CVE-2024-2681,0,0,211b9a75c4368c46da39324b5885baab82086ddd4b191379e2bc3298587cc094,2024-03-21T02:52:42.143000
|
||||
CVE-2024-26810,1,1,619461e7c161084dbce3405d57c92829428e68e5077dd6f12f741fa63c1ba5fe,2024-04-05T09:15:09.230000
|
||||
CVE-2024-26812,1,1,a16f4ec13ccedd393f7841277e07984befb70b54a45d192608d189ddc454eaa9,2024-04-05T09:15:09.283000
|
||||
CVE-2024-26813,1,1,be7dd918da8f885ffa1fdfa97ab2c9a28b6c6fe4e40508eea87dc59bb9ef1fb4,2024-04-05T09:15:09.340000
|
||||
CVE-2024-26814,1,1,2ae796bc8d6711c6ab5953ca1946cf5304e495f4f0de3b5061a3b39de7ac3e14,2024-04-05T09:15:09.393000
|
||||
CVE-2024-2682,0,0,a085f90f84cb4770a2a70d67fe3862306cc151ef177a765e07fccc3d6343039b,2024-03-21T02:52:42.233000
|
||||
CVE-2024-2683,0,0,788c441aaf8a379a9ab516c0ce7daee2808d93b02ac7acef8c96a67609395231,2024-03-21T02:52:42.310000
|
||||
CVE-2024-2684,0,0,5b5a341f7bbb8bdeccb5899b1d3a7c9eda23994ff0a4743b71e098a891662295,2024-03-21T02:52:42.383000
|
||||
@ -242808,13 +242815,14 @@ CVE-2024-27354,0,0,3ace96f0cae30cfccef0c08e69f46a230792c5572ff398d91aa2a719b3624
|
||||
CVE-2024-27355,0,0,f69927749d318ce3d471850deb21bc77767a9c94b5f501be3a1713c1109a5c66,2024-03-21T02:52:19.970000
|
||||
CVE-2024-27356,0,0,2464f4bdc7cd759969915038df7055199f0bd02c6d9b1a8ceb85c7588507e9ba,2024-02-27T14:20:06.637000
|
||||
CVE-2024-27359,0,0,d9efe9852d793e4ebe4144d07c8562893d90ae6614ba783353ad624a692629dc,2024-02-26T16:32:25.577000
|
||||
CVE-2024-27437,1,1,bda9c439214cca7315752c7e4c1d89e20a7e8bdbee0a1e19cad2d8dde55dbb93,2024-04-05T09:15:09.443000
|
||||
CVE-2024-27438,0,0,2aea60b4a1b2c2b9fbe16a013c293c52cf237fb88e8c577aa1b3bbbfc664d4e7,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27439,0,0,124ffecc940e3b1aff5b6c15ba45628af60d45a457d4c32687f284efa16b3296,2024-03-19T13:26:46
|
||||
CVE-2024-27440,0,0,f656cf3f867b554b4acbc17eee670f16835e4e41b3c8da203b1b487ef7d6f2b3,2024-03-13T12:33:51.697000
|
||||
CVE-2024-27441,0,0,e840685b8600bbca2bd5265ffc2375dd0e1834727afca845fa72402578217a21,2024-03-13T15:15:52.083000
|
||||
CVE-2024-27444,0,0,e4b72098e3b1a45c8b94b724b5aa67a3c5d7a627e3b85b33a53ae8fca137be64,2024-02-26T16:32:25.577000
|
||||
CVE-2024-27447,0,0,0ad05b799b801710378617c3e979150b26491a5a3c175938d5888d52afd14aa3,2024-02-26T16:32:25.577000
|
||||
CVE-2024-27448,1,1,be24d2577b4483025f569d831033ddf830d10a5290591dcc6bd6ba289f63fd5b,2024-04-05T06:15:10.263000
|
||||
CVE-2024-27448,0,0,be24d2577b4483025f569d831033ddf830d10a5290591dcc6bd6ba289f63fd5b,2024-04-05T06:15:10.263000
|
||||
CVE-2024-2745,0,0,21dd83e50808577458b12385abb6a5e6bc2a585cd70ef551295012e31869f5dd,2024-04-02T12:50:42.233000
|
||||
CVE-2024-27454,0,0,6d3a09532b89ef204254e66da503964dcbafd450b5bdda0990f449d144c8e54b,2024-02-26T16:32:25.577000
|
||||
CVE-2024-27455,0,0,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000
|
||||
@ -243326,6 +243334,7 @@ CVE-2024-28916,0,0,84c072546ea410ea13293f0749492a9c6fc43f88cd890d2ffd9bf253bd04a
|
||||
CVE-2024-2892,0,0,68731cecf8a220eab24c534e33692124a7488fde840638ea320037b01630a7ff,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2893,0,0,63faf4ffcc4fb1d866004561f401a900492be39dd72829ee9d2ea13386dae33b,2024-03-27T12:29:41.530000
|
||||
CVE-2024-2894,0,0,fe5793bc2f37c037f66adaaa9d347995617de1caef61563c1e61d5c7a1ea58be,2024-03-27T12:29:41.530000
|
||||
CVE-2024-28949,1,1,e1b2e05a7bdf7038f29dd0d6b29a3c6d8008bcaa0e8b3bc61536543928ab0363,2024-04-05T09:15:09.497000
|
||||
CVE-2024-2895,0,0,4e78767633bce48ab1dc77c80a270eff03b05a18553fcf7f775b3399e9d28d88,2024-03-27T12:29:41.530000
|
||||
CVE-2024-28951,0,0,c59d22693a6783914cb02db5be2e1a6f5b0c6277d54a6ec5614d046ef86ffa02,2024-04-02T12:50:42.233000
|
||||
CVE-2024-2896,0,0,4ba95787c6889a3eb868a106c99e2b979e5226eabc78640ebaa42c934eab2ab2,2024-03-27T12:29:41.530000
|
||||
@ -243450,6 +243459,7 @@ CVE-2024-29202,0,0,2407457fd23b926dc515687b0bc64391303eb3a1899c8635138115822d248
|
||||
CVE-2024-29203,0,0,132c3d83e906b655066bee1fc4d3f90e18def73beb9178e8cc6662be34f71a9c,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2921,0,0,c022f783cf261e367ca963516715cb4a81bead64a9c47249d0bf651e034f5912,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000
|
||||
CVE-2024-29221,1,1,2f586d9fe2b7f2c29ef1c4cbe3cf77d28a6fba9f7916246ff73247bae23f244d,2024-04-05T09:15:09.680000
|
||||
CVE-2024-29225,0,0,ebfd9b0992193d61aef178f6206711ffe8f1fc7ffd12fdaca779e58e62421cb3,2024-04-04T12:48:41.700000
|
||||
CVE-2024-29227,0,0,f6ae69390655a5f3b8c2022246ade0c8e664001b7471a757ba66feb751afa8e1,2024-03-28T12:42:56.150000
|
||||
CVE-2024-29228,0,0,c25efa24257cb2397a0d93759c26652d6dbbd7283b577526be7a83acca6ea890,2024-03-28T12:42:56.150000
|
||||
@ -243537,7 +243547,7 @@ CVE-2024-29644,0,0,39829980cc0c3cec42e83f1a7d1e74f651bed504f90005be4e46042a91527
|
||||
CVE-2024-29650,0,0,8ad374bfabee755625e57dff59b85656db535734df280985070b11f8f0b8c3b6,2024-03-25T16:43:06.137000
|
||||
CVE-2024-29666,0,0,a8926fce030310567330d9b7c126003f732556a2ce979a6a3fd232707f8bbd99,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29667,0,0,1425649af0fe5303ac647a61948436bd641374e6a3c12789edb4485c777699d5,2024-04-01T01:12:59.077000
|
||||
CVE-2024-29672,1,1,6d7c3144a7c4f0335a7d56a16d1b970f3c8dfd1e397b4170b5f91cc4aa856463,2024-04-05T06:15:10.323000
|
||||
CVE-2024-29672,0,0,6d7c3144a7c4f0335a7d56a16d1b970f3c8dfd1e397b4170b5f91cc4aa856463,2024-04-05T06:15:10.323000
|
||||
CVE-2024-2968,0,0,bb1433aeb37408aced09cd0721b3e3c51d5f43d4ee9668f91f68b12504b22dc7,2024-03-29T12:45:02.937000
|
||||
CVE-2024-29684,0,0,cda7b88ce861488cce375da0c97c96f4e8ca98f9272907d42a882870472a7fa4,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29686,0,0,3fe58549e83b02ecfa4305dc0559466a6aba26f966980b7f6cfaa89fef3c5836,2024-04-01T02:15:07.663000
|
||||
@ -243616,7 +243626,7 @@ CVE-2024-29858,0,0,ec21ad079a83cd076ada45f6eaa6cdca3318bb07ab260d892702dff1f9c09
|
||||
CVE-2024-29859,0,0,1a3bc8759fdc8c10e013f96dddd14f2ff64d6c749aade8e9054f9e130df1726e,2024-03-21T12:58:51.093000
|
||||
CVE-2024-2986,0,0,2e8b76dcc13c2c0ef53bfba5513dd96506aae0980f1810e28f63c6a33c67f33f,2024-03-27T17:48:21.140000
|
||||
CVE-2024-29862,0,0,a716ba813aa67ee5575393b9d0a0602e3eeaba0f3c15482bf8b9bf774b2f14bb,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29863,1,1,464d1b384d2a13b48267b12cb30c1c0bb3380f5fff95f7b0465f3639fc2cc0f1,2024-04-05T07:15:11.110000
|
||||
CVE-2024-29863,0,0,464d1b384d2a13b48267b12cb30c1c0bb3380f5fff95f7b0465f3639fc2cc0f1,2024-04-05T07:15:11.110000
|
||||
CVE-2024-29864,0,0,a6ff60d6eca0eec860cad03d4ebcf6ddb2a8ce1d06f7fbda3179547925ea7c1b,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29865,0,0,c71ea820e322882cfd10f1c29db59e00803f8a609d75b87f5e2466dff384d5b6,2024-03-22T15:34:43.663000
|
||||
CVE-2024-29866,0,0,2169c0f3fed16be1069cbb5502128dfabe18fe6fbc7db4f274cc3c93caea8ddd,2024-03-21T15:24:35.093000
|
||||
@ -244002,6 +244012,7 @@ CVE-2024-30808,0,0,3edb296009dfb16a5061a2505986b3903e36250320b7a7a1ea6af0d775f58
|
||||
CVE-2024-30809,0,0,40751d191f9ee13ea0defe4c96fc4834cb0c82544cd8de5e25d1d000018428a9,2024-04-02T20:31:58.463000
|
||||
CVE-2024-3081,0,0,866ce1fc3c293e10fe34bf8200fad33ced51ccecfb774a7b3540f6fe2adb2cfa,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3084,0,0,c1c38fe5a209c672b804078473ede419a8e761fb44d3cb82a215c5c8a2e1ea16,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30849,1,1,4aabb9bd1031c9de63789df6a4eecf7c5eb5cf5b1d28121f46f8cb27e6112f78,2024-04-05T08:15:07.733000
|
||||
CVE-2024-3085,0,0,fded51d53dc12d3d7ee965d316f419f95e091e314414485b8200db89663fd527,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30858,0,0,16878632bf0dd21efb8a79fb907fb3fd610dae344e4207e4821dadfd05b70fba,2024-04-02T12:50:42.233000
|
||||
CVE-2024-30859,0,0,07863108200ea1214b143e037da0e726261ba3163514cc96b0c60d438d3489a3,2024-04-02T12:50:42.233000
|
||||
@ -244021,6 +244032,7 @@ CVE-2024-30871,0,0,d803e8a22e3cb0ffc63ce535e7477c16423f4c13198cbe4b49e5311fcca22
|
||||
CVE-2024-30872,0,0,f945e56669ed547eb36a2b5a674eaf51c6f019a23fe630e2694f76da90849356,2024-04-01T15:53:18.060000
|
||||
CVE-2024-3088,0,0,8e3ac933024cbca067c1e71fbcd05cd16f007cceadb9e395d1a7912e6d4c4a98,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3089,0,0,ecb913d4389f70cc5019c633a263616e8c2eb0cbfbc9caeb5e20ebcc84dd91c1,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30891,1,1,e12281cb1191ffa9096f2fd71c8ce450f0aa6b4ad8005e3588610e44c1c03829,2024-04-05T08:15:07.800000
|
||||
CVE-2024-3090,0,0,6efcf7101cc09e49c5b79d9f2d4752051b90babce57580f4f3b9d28367ffa945,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3091,0,0,4af5b5d1eaeb5dcee2b11f765f7e4e07712d76dbe9222ddb5cfc716c8e60d042,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3094,0,0,502febf68b0d02803300ecc80fd5edf81a987966a53e4a71d6dd7ef4cc670f65,2024-04-03T06:15:07.873000
|
||||
@ -244139,6 +244151,7 @@ CVE-2024-3204,0,0,a9dea1ca01b499632a34af3ee57c461ecd8a21787537da790c2ae8f833a611
|
||||
CVE-2024-3205,0,0,b2f3ceb1bf38a09a954460b526a18eba5a5a22a0c7181b9f1de158755c6153d4,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3207,0,0,5c9ae7819818cf69391317769652edafe7eb5058db1623e7c6299d6d13471791,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3209,0,0,30868cdb47dd928f589dfe2abcfe897db3e1f5f5372f4956ca12525c6828bcc3,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3217,1,1,679d1c28c7be3c33a25056dfbdb8aa41d98bff972405e02ba4eb33f3cb0dab3b,2024-04-05T08:15:07.853000
|
||||
CVE-2024-3218,0,0,2efa792f2f422ae3d499fd8bd729cdb1e057c75ae9cfbaccf7a66bc466210399,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3221,0,0,265e838721fb682684198a7086d104f84e57519a8c4d6ef772db38592eb6bf44,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3222,0,0,b37821a3e0768163f96b2bee06bee09f327b52e150bd3dc09c830a3634a1e6b2,2024-04-03T12:38:04.840000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user