Auto-Update: 2024-03-21T23:00:37.275720+00:00

This commit is contained in:
cad-safe-bot 2024-03-21 23:03:27 +00:00
parent f8f94515cf
commit 24aa31ab21
27 changed files with 1761 additions and 96 deletions

View File

@ -2,30 +2,57 @@
"id": "CVE-2023-36483",
"sourceIdentifier": "productsecurity@carrier.com",
"published": "2024-03-16T05:15:18.577",
"lastModified": "2024-03-21T02:48:02.037",
"lastModified": "2024-03-21T22:15:10.573",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "productsecurity@carrier.com",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An authorization bypass was discovered in the Carrier MASmobile Classic application through 1.16.18 for Android, MASmobile Classic app through 1.7.24 for iOS, and MAS ASP.Net Services through 1.9. It can be achieved via session ID prediction, allowing remote attackers to retrieve sensitive data including customer data, security system status, and event history. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. The affected products cannot simply be updated; they must be removed, but can be replaced by other Carrier software as explained in the Carrier advisory."
"value": "Authorization bypass can be achieved by session ID prediction in MASmobile Classic Android\u00a0 version 1.16.18 and earlier and \n\nMASmobile Classic iOS version 1.7.24 and earlier\n\nwhich allows remote attackers to retrieve sensitive data\u00a0 including customer data, security system status, and event history.\n"
},
{
"lang": "es",
"value": "Se descubri\u00f3 una omisi\u00f3n de autorizaci\u00f3n en la aplicaci\u00f3n Carrier MASmobile Classic hasta la versi\u00f3n 1.16.18 para Android, la aplicaci\u00f3n MASmobile Classic hasta la 1.7.24 para iOS y los servicios MAS ASP.Net hasta la 1.9. Esto se puede lograr mediante la predicci\u00f3n de ID de sesi\u00f3n, lo que permite a atacantes remotos recuperar datos confidenciales, incluidos datos de clientes, estado del sistema de seguridad e historial de eventos. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante. Los productos afectados no pueden simplemente actualizarse; deben eliminarse, pero pueden reemplazarse por otro software de Carrier como se explica en el aviso de Carrier."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "productsecurity@carrier.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "productsecurity@carrier.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://www.corporate.carrier.com/Images/CARR-PSA-MASMobile%20Classic%20Authorization%20Bypass-012-0623_tcm558-203964.pdf",
"url": "https://www.corporate.carrier.com/product-security/advisories-resources/",
"source": "productsecurity@carrier.com"
}
]

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-41842",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-03-12T15:15:45.920",
"lastModified": "2024-03-12T16:02:33.900",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-21T21:04:13.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A use of externally-controlled format string vulnerability [CWE-134] in Fortinet FortiManager version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer-BigData before 7.2.5 and Fortinet FortiPortal version 6.0 all versions and version 5.3 all versions allows a privileged attacker to execute unauthorized code or commands via specially crafted command arguments."
},
{
"lang": "es",
"value": "Un uso de vulnerabilidad de cadena de formato controlada externamente [CWE-134] en Fortinet FortiManager versi\u00f3n 7.4.0 a 7.4.1, versi\u00f3n 7.2.0 a 7.2.3 y anteriores a 7.0.10, Fortinet FortiAnalyzer versi\u00f3n 7.4.0 a 7.4.1 , versi\u00f3n 7.2.0 a 7.2.3 y anteriores a 7.0.10, Fortinet FortiAnalyzer-BigData anterior a 7.2.5 y Fortinet FortiPortal versi\u00f3n 6.0 todas las versiones y la versi\u00f3n 5.3 todas las versiones permite a un atacante privilegiado ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de argumentos de comando especialmente manipulados."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -46,10 +70,100 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "7.0.10",
"matchCriteriaId": "18205067-639E-4A90-AF8C-DA71FB65AEFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.4",
"matchCriteriaId": "8E0D5DF6-69C6-4325-94D3-D7A44862F62C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.2",
"matchCriteriaId": "CB15106A-8295-4A9E-B5C8-FA9654636B15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer_bigdata:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.5",
"versionEndIncluding": "6.4.7",
"matchCriteriaId": "7299FC61-369D-4F07-B0E1-1FD9E2E371A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer_bigdata:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.1",
"versionEndIncluding": "7.0.6",
"matchCriteriaId": "9417A7DF-F260-45C2-A224-D6FB08792C58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer_bigdata:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.6",
"matchCriteriaId": "A06370D3-3917-4D9E-980D-52621794A671"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer_bigdata:6.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "11815CDE-B157-457A-AB0D-DA73A0F4656C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "7.0.10",
"matchCriteriaId": "BBD0FF48-FC1A-4406-B939-7E83ED65A57E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.4",
"matchCriteriaId": "5BC35BBC-5F0C-4802-8F00-643D465D43E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.2",
"matchCriteriaId": "83316FAF-C5DE-4603-B3B2-6796E2FAF1A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.3.0",
"versionEndIncluding": "6.0.14",
"matchCriteriaId": "CC626329-3FCF-45BE-955B-82A495B10FA6"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-304",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-46717",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-03-12T15:15:46.487",
"lastModified": "2024-03-12T16:02:33.900",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-21T21:04:18.200",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An improper authentication vulnerability [CWE-287] in FortiOS versions 7.4.1 and below, versions 7.2.6 and below, and versions 7.0.12 and below when configured with FortiAuthenticator in HA may allow a readonly user to gain read-write access via successive login attempts."
},
{
"lang": "es",
"value": "Una vulnerabilidad de autenticaci\u00f3n incorrecta [CWE-287] en las versiones 7.4.1 y anteriores de FortiOS, las versiones 7.2.6 y siguientes y las versiones 7.0.12 y siguientes cuando se configura con FortiAuthenticator en HA puede permitir que un usuario de solo lectura obtenga acceso de lectura y escritura a trav\u00e9s de intentos sucesivos de inicio de sesi\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -46,10 +70,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.0.13",
"matchCriteriaId": "D25F9C04-C7FD-4B1F-A194-CA69E5DE903C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.7",
"matchCriteriaId": "553C4BA9-953B-4017-8498-785BDA7A3006"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.2",
"matchCriteriaId": "4316C2EA-3D6E-4A0C-B81D-ADCE040E03E0"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-424",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-21390",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-03-12T17:15:49.470",
"lastModified": "2024-03-12T17:46:17.273",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-21T21:04:32.570",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Authenticator Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Microsoft Authenticator"
}
],
"metrics": {
@ -34,10 +38,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:authenticator:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2401.0617",
"matchCriteriaId": "9C73B95C-FBE2-4911-AA5D-59F448D04A2A"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21390",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-21407",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-03-12T17:15:49.957",
"lastModified": "2024-03-12T17:46:17.273",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-21T21:06:06.530",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Windows Hyper-V Remote Code Execution Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Windows Hyper-V"
}
],
"metrics": {
@ -34,10 +38,120 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.10240.20526",
"matchCriteriaId": "FAE3130D-C88C-42C1-89EF-A8F86254E04D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.14393.6796",
"matchCriteriaId": "EA2CA05A-8688-45D6-BC96-627DEB1962E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.17763.5576",
"matchCriteriaId": "4C9B0826-AE47-44B1-988F-6B5CEFB45BD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.19044.4170",
"matchCriteriaId": "8680C6F7-3E4F-4AE6-914E-D95E571AF70A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.19045.4170",
"matchCriteriaId": "C86ACE06-BA02-49BA-B274-441E74F98FB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.2836",
"matchCriteriaId": "D08CEC8B-343C-486E-B6FA-F4D60ACF7E63"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.3296",
"matchCriteriaId": "4DBD4A55-729C-4F86-AE29-6067F62FD03A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.22631.3296",
"matchCriteriaId": "20DF4699-31FA-404B-BDEA-FE418854F538"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.6796",
"matchCriteriaId": "2545664A-E87B-40F7-9C19-53AEC8198B81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.5576",
"matchCriteriaId": "FFF3EE72-52DE-4CB2-8D42-74809CD7B292"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2333",
"matchCriteriaId": "5F08760C-CF31-4507-8CBD-21A2FEAE478C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.763",
"matchCriteriaId": "0AD05A2D-BA23-4B63-8B75-1395F74C36CB"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21407",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-21408",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-03-12T17:15:50.127",
"lastModified": "2024-03-12T17:46:17.273",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-21T21:06:09.543",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Windows Hyper-V Denial of Service Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de denegaci\u00f3n de servicio de Windows Hyper-V"
}
],
"metrics": {
@ -34,10 +38,116 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.10240.20526",
"matchCriteriaId": "FAE3130D-C88C-42C1-89EF-A8F86254E04D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.14393.6796",
"matchCriteriaId": "EA2CA05A-8688-45D6-BC96-627DEB1962E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.17763.5576",
"matchCriteriaId": "54A84FB6-B0C7-437B-B95A-F2B4CF18F853"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.19044.4170",
"matchCriteriaId": "26CD5681-7CC7-42C3-AF89-D6A2C2A5591B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.19045.4170",
"matchCriteriaId": "68AF6C08-77D6-4786-B476-90D106F02DF0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.19045.4170",
"matchCriteriaId": "C86ACE06-BA02-49BA-B274-441E74F98FB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.2836",
"matchCriteriaId": "D08CEC8B-343C-486E-B6FA-F4D60ACF7E63"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.3296",
"matchCriteriaId": "4DBD4A55-729C-4F86-AE29-6067F62FD03A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.3296",
"matchCriteriaId": "A332CC68-568F-406B-8463-9FEF359BEA4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.6796",
"matchCriteriaId": "2545664A-E87B-40F7-9C19-53AEC8198B81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.5576",
"matchCriteriaId": "FFF3EE72-52DE-4CB2-8D42-74809CD7B292"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2333",
"matchCriteriaId": "5F08760C-CF31-4507-8CBD-21A2FEAE478C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.763",
"matchCriteriaId": "0AD05A2D-BA23-4B63-8B75-1395F74C36CB"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21408",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-21761",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-03-12T15:15:48.740",
"lastModified": "2024-03-12T16:02:33.900",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-21T21:04:27.653",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An improper authorization vulnerability [CWE-285] in FortiPortal version 7.2.0, and versions 7.0.6 and below reports may allow a user to download other organizations reports via modification in the request payload."
},
{
"lang": "es",
"value": "Una vulnerabilidad de autorizaci\u00f3n inadecuada [CWE-285] en los informes de FortiPortal versi\u00f3n 7.2.0 y versiones 7.0.6 e inferiores puede permitir a un usuario descargar informes de otras organizaciones mediante modificaciones en el payload de la solicitud."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -46,10 +70,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.0.7",
"matchCriteriaId": "281311DE-FCED-4AB9-8D54-EBD0C8FE53B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiportal:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7F7D4E-DE62-491A-9C00-EAD2595BF2D7"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-24-016",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-24272",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-21T22:15:10.850",
"lastModified": "2024-03-21T22:15:10.850",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue in iTop DualSafe Password Manager & Digital Vault before 1.4.24 allows a local attacker to obtain sensitive information via leaked credentials as plaintext in a log file that can be accessed by the local user without knowledge of the master secret."
}
],
"metrics": {},
"references": [
{
"url": "https://research.hisolutions.com/2024/03/cve-2024-24272-dualsafe-password-manager-leaks-credentials/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24692",
"sourceIdentifier": "security@zoom.us",
"published": "2024-03-13T20:15:07.273",
"lastModified": "2024-03-14T12:52:21.763",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-21T21:06:13.123",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
},
{
"source": "security@zoom.us",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
},
{
"source": "security@zoom.us",
"type": "Secondary",
@ -50,10 +80,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "5.17.5",
"matchCriteriaId": "C55B10D9-2F21-4C29-A71E-0B8757029F16"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24009/",
"source": "security@zoom.us"
"source": "security@zoom.us",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-25937",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-03-21T22:15:10.910",
"lastModified": "2024-03-21T22:15:10.910",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nSQL injection vulnerability exists in the script DIAE_tagHandler.ashx.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-12",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-27921",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-21T22:15:11.137",
"lastModified": "2024-03-21T22:15:11.137",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Grav is an open-source, flat-file content management system. A file upload path traversal vulnerability has been identified in the application prior to version 1.7.45, enabling attackers to replace or create files with extensions like .json, .zip, .css, .gif, etc. This critical security flaw poses severe risks, that can allow attackers to inject arbitrary code on the server, undermine integrity of backup files by overwriting existing files or creating new ones, and exfiltrate sensitive data using CSS exfiltration techniques. Upgrading to patched version 1.7.45 can mitigate the issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/getgrav/grav/commit/5928411b86bab05afca2b33db4e7386a44858e99",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/getgrav/grav/security/advisories/GHSA-m7hx-hw6h-mqmc",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2763",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-21T21:15:10.790",
"lastModified": "2024-03-21T21:15:10.790",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in Tenda AC10U 15.03.06.48. Affected by this issue is the function formSetCfm of the file goform/setcfm. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257600. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetCfm.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257600",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257600",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2764",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-21T21:15:11.177",
"lastModified": "2024-03-21T21:15:11.177",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in Tenda AC10U 15.03.06.48. This affects the function formSetPPTPServer of the file /goform/SetPptpServerCfg. The manipulation of the argument endIP leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257601 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetPPTPServer.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257601",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257601",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2766",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-21T21:15:11.407",
"lastModified": "2024-03-21T21:15:11.407",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Campcodes Complete Online Beauty Parlor Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/index.php. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257602 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Beauty%20Parlor%20Management%20System/Complete%20Online%20Beauty%20Parlor%20Management%20System%20-%20vuln%201.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257602",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257602",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2767",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-21T21:15:11.693",
"lastModified": "2024-03-21T21:15:11.693",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Complete Online Beauty Parlor Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/forgot-password.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257603."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Beauty%20Parlor%20Management%20System/Complete%20Online%20Beauty%20Parlor%20Management%20System%20-%20vuln%202.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257603",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257603",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2768",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-21T22:15:12.710",
"lastModified": "2024-03-21T22:15:12.710",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Complete Online Beauty Parlor Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/edit-services.php. The manipulation of the argument editid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257604."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Beauty%20Parlor%20Management%20System/Complete%20Online%20Beauty%20Parlor%20Management%20System%20-%20vuln%203.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257604",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257604",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2769",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-21T22:15:12.943",
"lastModified": "2024-03-21T22:15:12.943",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Complete Online Beauty Parlor Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/admin-profile.php. The manipulation of the argument adminname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257605 was assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Beauty%20Parlor%20Management%20System/Complete%20Online%20Beauty%20Parlor%20Management%20System%20-%20vuln%205.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257605",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257605",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-28029",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-03-21T22:15:11.353",
"lastModified": "2024-03-21T22:15:11.353",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nPrivileges are not fully verified server-side, which can be abused by a user with limited privileges to bypass authorization and access privileged functionality.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-12",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-28116",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-21T22:15:11.577",
"lastModified": "2024-03-21T22:15:11.577",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Grav is an open-source, flat-file content management system. Grav CMS prior to version 1.7.45 is vulnerable to a Server-Side Template Injection (SSTI), which allows any authenticated user (editor permissions are sufficient) to execute arbitrary code on the remote server bypassing the existing security sandbox. Version 1.7.45 contains a patch for this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1336"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/getgrav/grav/commit/4149c81339274130742831422de2685f298f3a6e",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/getgrav/grav/security/advisories/GHSA-c9gp-64c4-2rrh",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-28117",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-21T22:15:11.820",
"lastModified": "2024-03-21T22:15:11.820",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Grav is an open-source, flat-file content management system. Prior to version 1.7.45, Grav validates accessible functions through the Utils::isDangerousFunction function, but does not impose restrictions on twig functions like twig_array_map, allowing attackers to bypass the validation and execute arbitrary commands. Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages. As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance. Upgrading to patched version 1.7.45 can mitigate this issue.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/getgrav/grav/commit/de1ccfa12dbcbf526104d68c1a6bc202a98698fe",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/getgrav/grav/security/advisories/GHSA-qfv4-q44r-g7rv",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-28118",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-21T22:15:12.037",
"lastModified": "2024-03-21T22:15:12.037",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Grav is an open-source, flat-file content management system. Prior to version 1.7.45, due to the unrestricted access to twig extension class from Grav context, an attacker can redefine config variable. As a result, attacker can bypass a previous SSTI mitigation. Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages. As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance. Version 1.7.45 contains a fix for this issue.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/getgrav/grav/commit/de1ccfa12dbcbf526104d68c1a6bc202a98698fe",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/getgrav/grav/security/advisories/GHSA-r6vw-8v8r-pmp4",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-28119",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-21T22:15:12.233",
"lastModified": "2024-03-21T22:15:12.233",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Grav is an open-source, flat-file content management system. Prior to version 1.7.45, due to the unrestricted access to twig extension class from grav context, an attacker can redefine the escape function and execute arbitrary commands. Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages. As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance. Version 1.7.45 contains a patch for this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/getgrav/grav/commit/de1ccfa12dbcbf526104d68c1a6bc202a98698fe",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/getgrav/grav/security/advisories/GHSA-2m7x-c7px-hp58",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/twigphp/Twig/blob/3.x/src/Extension/EscaperExtension.php#L99",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-28521",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-21T22:15:12.457",
"lastModified": "2024-03-21T22:15:12.457",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in Netcome NS-ASG Application Security Gateway v.6.3.1 allows a local attacker to execute arbitrary code and obtain sensitive information via a crafted script to the loginid parameter of the /singlelogin.php component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/aknbg1thub/cve/blob/main/sql.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-28756",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-21T21:15:10.550",
"lastModified": "2024-03-21T21:15:10.550",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The SolarEdge mySolarEdge application before 2.20.1 for Android has a certificate verification issue that allows a Machine-in-the-middle (MitM) attacker to read and alter all network traffic between the application and the server."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 4.2
}
]
},
"references": [
{
"url": "https://www.solaredge.com/coordinated-vulnerability-disclosure-policy/advisories/sedg-2024-1",
"source": "cve@mitre.org"
},
{
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-012.txt",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-28891",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-03-21T22:15:12.510",
"lastModified": "2024-03-21T22:15:12.510",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nSQL injection vulnerability exists in the script Handler_CFG.ashx.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-12",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-21T21:00:30.860215+00:00
2024-03-21T23:00:37.275720+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-21T20:58:52.357000+00:00
2024-03-21T22:15:12.943000+00:00
```
### Last Data Feed Release
@ -29,44 +29,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
242364
242381
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `17`
* [CVE-2024-1727](CVE-2024/CVE-2024-17xx/CVE-2024-1727.json) (`2024-03-21T20:15:07.620`)
* [CVE-2024-29374](CVE-2024/CVE-2024-293xx/CVE-2024-29374.json) (`2024-03-21T19:15:09.377`)
* [CVE-2024-24272](CVE-2024/CVE-2024-242xx/CVE-2024-24272.json) (`2024-03-21T22:15:10.850`)
* [CVE-2024-25937](CVE-2024/CVE-2024-259xx/CVE-2024-25937.json) (`2024-03-21T22:15:10.910`)
* [CVE-2024-2763](CVE-2024/CVE-2024-27xx/CVE-2024-2763.json) (`2024-03-21T21:15:10.790`)
* [CVE-2024-2764](CVE-2024/CVE-2024-27xx/CVE-2024-2764.json) (`2024-03-21T21:15:11.177`)
* [CVE-2024-2766](CVE-2024/CVE-2024-27xx/CVE-2024-2766.json) (`2024-03-21T21:15:11.407`)
* [CVE-2024-2767](CVE-2024/CVE-2024-27xx/CVE-2024-2767.json) (`2024-03-21T21:15:11.693`)
* [CVE-2024-2768](CVE-2024/CVE-2024-27xx/CVE-2024-2768.json) (`2024-03-21T22:15:12.710`)
* [CVE-2024-2769](CVE-2024/CVE-2024-27xx/CVE-2024-2769.json) (`2024-03-21T22:15:12.943`)
* [CVE-2024-27921](CVE-2024/CVE-2024-279xx/CVE-2024-27921.json) (`2024-03-21T22:15:11.137`)
* [CVE-2024-28029](CVE-2024/CVE-2024-280xx/CVE-2024-28029.json) (`2024-03-21T22:15:11.353`)
* [CVE-2024-28116](CVE-2024/CVE-2024-281xx/CVE-2024-28116.json) (`2024-03-21T22:15:11.577`)
* [CVE-2024-28117](CVE-2024/CVE-2024-281xx/CVE-2024-28117.json) (`2024-03-21T22:15:11.820`)
* [CVE-2024-28118](CVE-2024/CVE-2024-281xx/CVE-2024-28118.json) (`2024-03-21T22:15:12.037`)
* [CVE-2024-28119](CVE-2024/CVE-2024-281xx/CVE-2024-28119.json) (`2024-03-21T22:15:12.233`)
* [CVE-2024-28521](CVE-2024/CVE-2024-285xx/CVE-2024-28521.json) (`2024-03-21T22:15:12.457`)
* [CVE-2024-28756](CVE-2024/CVE-2024-287xx/CVE-2024-28756.json) (`2024-03-21T21:15:10.550`)
* [CVE-2024-28891](CVE-2024/CVE-2024-288xx/CVE-2024-28891.json) (`2024-03-21T22:15:12.510`)
### CVEs modified in the last Commit
Recently modified CVEs: `23`
Recently modified CVEs: `8`
* [CVE-2021-1262](CVE-2021/CVE-2021-12xx/CVE-2021-1262.json) (`2024-03-21T20:02:29.753`)
* [CVE-2021-1513](CVE-2021/CVE-2021-15xx/CVE-2021-1513.json) (`2024-03-21T20:02:24.913`)
* [CVE-2021-34452](CVE-2021/CVE-2021-344xx/CVE-2021-34452.json) (`2024-03-21T20:02:17.453`)
* [CVE-2022-44595](CVE-2022/CVE-2022-445xx/CVE-2022-44595.json) (`2024-03-21T19:47:03.943`)
* [CVE-2023-49837](CVE-2023/CVE-2023-498xx/CVE-2023-49837.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-1394](CVE-2024/CVE-2024-13xx/CVE-2024-1394.json) (`2024-03-21T19:15:09.063`)
* [CVE-2024-2578](CVE-2024/CVE-2024-25xx/CVE-2024-2578.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-2579](CVE-2024/CVE-2024-25xx/CVE-2024-2579.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-2580](CVE-2024/CVE-2024-25xx/CVE-2024-2580.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-26308](CVE-2024/CVE-2024-263xx/CVE-2024-26308.json) (`2024-03-21T19:54:03.230`)
* [CVE-2024-27190](CVE-2024/CVE-2024-271xx/CVE-2024-27190.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-27277](CVE-2024/CVE-2024-272xx/CVE-2024-27277.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-27956](CVE-2024/CVE-2024-279xx/CVE-2024-27956.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-27962](CVE-2024/CVE-2024-279xx/CVE-2024-27962.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-27963](CVE-2024/CVE-2024-279xx/CVE-2024-27963.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-27964](CVE-2024/CVE-2024-279xx/CVE-2024-27964.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-27965](CVE-2024/CVE-2024-279xx/CVE-2024-27965.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-27968](CVE-2024/CVE-2024-279xx/CVE-2024-27968.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-28252](CVE-2024/CVE-2024-282xx/CVE-2024-28252.json) (`2024-03-21T20:15:08.050`)
* [CVE-2024-28535](CVE-2024/CVE-2024-285xx/CVE-2024-28535.json) (`2024-03-21T20:58:46.217`)
* [CVE-2024-28553](CVE-2024/CVE-2024-285xx/CVE-2024-28553.json) (`2024-03-21T20:58:52.357`)
* [CVE-2024-29180](CVE-2024/CVE-2024-291xx/CVE-2024-29180.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-29916](CVE-2024/CVE-2024-299xx/CVE-2024-29916.json) (`2024-03-21T19:47:03.943`)
* [CVE-2023-36483](CVE-2023/CVE-2023-364xx/CVE-2023-36483.json) (`2024-03-21T22:15:10.573`)
* [CVE-2023-41842](CVE-2023/CVE-2023-418xx/CVE-2023-41842.json) (`2024-03-21T21:04:13.000`)
* [CVE-2023-46717](CVE-2023/CVE-2023-467xx/CVE-2023-46717.json) (`2024-03-21T21:04:18.200`)
* [CVE-2024-21390](CVE-2024/CVE-2024-213xx/CVE-2024-21390.json) (`2024-03-21T21:04:32.570`)
* [CVE-2024-21407](CVE-2024/CVE-2024-214xx/CVE-2024-21407.json) (`2024-03-21T21:06:06.530`)
* [CVE-2024-21408](CVE-2024/CVE-2024-214xx/CVE-2024-21408.json) (`2024-03-21T21:06:09.543`)
* [CVE-2024-21761](CVE-2024/CVE-2024-217xx/CVE-2024-21761.json) (`2024-03-21T21:04:27.653`)
* [CVE-2024-24692](CVE-2024/CVE-2024-246xx/CVE-2024-24692.json) (`2024-03-21T21:06:13.123`)
## Download and Usage

View File

@ -165559,7 +165559,7 @@ CVE-2021-1258,0,0,d82f969dd17a5f3e524dde57860640835b4905edecd5741b078ad84534dab3
CVE-2021-1259,0,0,86531ec5550e6433a46b99fb6d5bcd5925dbbdba36287f07609b01bda56864ca,2021-01-29T15:15:23.147000
CVE-2021-1260,0,0,e0a128c880244e947036b72a88f6608409f654ea2383b7f657439480f4add5e0,2023-10-06T16:24:48.993000
CVE-2021-1261,0,0,22c0ca0c0b5235b43b736d4096137afa27d44452ab54e4d1dab67ebb5af5720b,2023-10-06T16:24:48.993000
CVE-2021-1262,0,1,2027020efb31a45ccae93610730595f2a2566a853fd41b2f4858f48375d4988c,2024-03-21T20:02:29.753000
CVE-2021-1262,0,0,2027020efb31a45ccae93610730595f2a2566a853fd41b2f4858f48375d4988c,2024-03-21T20:02:29.753000
CVE-2021-1263,0,0,4d45bea273c6e884177db62427337cdba8f80b38b26845af660d0d1789b1234f,2023-10-06T16:24:48.993000
CVE-2021-1264,0,0,81dee8876bb986a4e952a03935bd850b263032e2b547b9deacbe69c2ec8035c7,2023-11-07T03:27:49.183000
CVE-2021-1265,0,0,17a5f7ace4ccaca3dcf0661bf9760d365aaec23c6a53804524a3d586a17e43fc,2021-01-27T16:50:57.907000
@ -165791,7 +165791,7 @@ CVE-2021-1509,0,0,d7c71f1ff07c1b27324eabc6b9d1a6fbcbda43f97498e911954c3001754a12
CVE-2021-1510,0,0,2f58f05cc4ff52f87d306aef8bc3a557aaf35d7a662a15484ffc84e5b6934c1c,2023-11-07T03:28:28.943000
CVE-2021-1511,0,0,aeefe7aba6f9c34abab2d952a73403182e551eccc92674708ff7ce2e21c0f45e,2023-11-07T03:28:29.133000
CVE-2021-1512,0,0,d1a586e26565035cda4fcdffed8eb0875987f0590191ac617865b1a21c37f3a4,2023-10-16T16:35:25.220000
CVE-2021-1513,0,1,a25a72c26181f8fcbf0e33ec57924341e0321a71266ff29164cc87d405dbc811,2024-03-21T20:02:24.913000
CVE-2021-1513,0,0,a25a72c26181f8fcbf0e33ec57924341e0321a71266ff29164cc87d405dbc811,2024-03-21T20:02:24.913000
CVE-2021-1514,0,0,166408dda482a95a3a4ae776cae748fec8ae0d6b29c3957ccdc7b2a10f62bd96,2023-10-16T16:35:25.220000
CVE-2021-1515,0,0,253ce2bc5373e3293a647b374083917e36279af569fd90975a8c1532c1f055e0,2023-11-07T03:28:29.533000
CVE-2021-1516,0,0,6cc3a90009fb0506c584e09732edd1f63833843c653985397edf96a1a45e75e0,2023-11-07T03:28:29.697000
@ -177528,7 +177528,7 @@ CVE-2021-34449,0,0,06602504c62be8f7c935030bea3d43a76bd231bcc6562014ab1969fb30782
CVE-2021-3445,0,0,8326494930b3f9272a5d8cd4b20ff9f890de64bd49463e9c8e25e5f9e2931b60,2023-11-07T03:38:00.453000
CVE-2021-34450,0,0,334a2ffa2eaaa26e8560ce439661f9c6b84b7e0ab039d5a580e2fd6e4be420fe,2023-12-28T23:15:28.100000
CVE-2021-34451,0,0,5671a1bcbcdeba6d0e8fed6ef4bc65187dc6749bd883cacb387b5a5293e87d22,2023-12-28T23:15:28.327000
CVE-2021-34452,0,1,3ac14191585a0bf73f46587a035f3eeaee23a188c7eed305de107944cb616e82,2024-03-21T20:02:17.453000
CVE-2021-34452,0,0,3ac14191585a0bf73f46587a035f3eeaee23a188c7eed305de107944cb616e82,2024-03-21T20:02:17.453000
CVE-2021-34453,0,0,a1235b920860a9483cd53339ebc839647ae1115c38baa50c187aece5bbbb241b,2023-08-01T23:15:16.173000
CVE-2021-34454,0,0,78ff2f699dd5f4805aa53889d7c557dce2028518698297993c91bddae55e2c44,2023-12-28T23:15:28.783000
CVE-2021-34455,0,0,e4116877d5ca41f8e5bd3999b1f5c62630dd6589628f6d82e4bd4a7375a4ea19,2023-12-28T23:15:29
@ -208693,7 +208693,7 @@ CVE-2022-4459,0,0,841d23cd2517ff134527c70acbac864bd1798efca5741cdb40fc1b914c6b61
CVE-2022-44590,0,0,34e1f96684be246af4d115d74d6ad86d1677f25db158e219a386c9a7b2c1f0fd,2022-11-10T19:23:14.800000
CVE-2022-44591,0,0,8de73acec656de193157bdf7e48ae245affcf919e7ad24e4c08dfb89e483fd5f,2022-11-18T19:28:56.420000
CVE-2022-44594,0,0,b7dc479f0e8562d2f1e10e9b8c859c387aa51f72d918e1c729d08c2404508fbd,2023-04-28T03:44:57.940000
CVE-2022-44595,0,1,00f838a23a694da460800d3c10ececb250288d2ecf59a66ab6ab9d3bc830695e,2024-03-21T19:47:03.943000
CVE-2022-44595,0,0,00f838a23a694da460800d3c10ececb250288d2ecf59a66ab6ab9d3bc830695e,2024-03-21T19:47:03.943000
CVE-2022-4460,0,0,549234db110e5b693f52fad78d6358b8e08ccb9d9c9d7ca9e6118d72a7d6c30e,2023-11-07T03:57:52.710000
CVE-2022-44606,0,0,dd9357b8301dbd8c44e690a2844baf8bea2bcc5c8cc5dc8addb6ac09082694a0,2022-12-09T21:18:22.850000
CVE-2022-44608,0,0,f6323b139a76646c7c7a6763944abd4b79185adca516d6c4f40e939231a6cbf5,2022-12-09T00:49:39.090000
@ -225789,7 +225789,7 @@ CVE-2023-3648,0,0,8bf5cd21bebe1f009df0402614d81a95820d19c16313c13f13bdcb02328016
CVE-2023-36480,0,0,f0e3aa211de5a0c3a2168b2a645f7f1ce9f836925dc20f7850d265cdf7a9931f,2023-08-09T17:36:23.510000
CVE-2023-36481,0,0,ed19945a7c741bdf97f28bcf17a78a3c0f8cfd9233338beba86126916a433c39,2023-08-31T19:03:24.843000
CVE-2023-36482,0,0,bd0e44899481ac6efbee59d652b2b8b189bc1f6d78c19ba81f50dfea1a1c5269,2023-08-15T00:14:42.947000
CVE-2023-36483,0,0,622a63b11c7fd34225b7b6128371ed45341c5284c2c200f5335bb5663afb152e,2024-03-21T02:48:02.037000
CVE-2023-36483,0,1,ca9b2dc6d298ab63800fddba4a7dc256cf2831b05a618f8514438575bb02006e,2024-03-21T22:15:10.573000
CVE-2023-36484,0,0,5479ebcd0542fb121cd7096c70c765143b3bb0c91e4266390a7bded3446284e3,2023-07-07T16:46:54.217000
CVE-2023-36485,0,0,2bdacaafe7fb04293b23a19f5c28650551985db5d0c95b626556e9d589f9568a,2024-02-14T00:22:22.397000
CVE-2023-36486,0,0,8414dc9b0aaf87e7ce90ac48aa30bf6201949c225518eacfb4b7a55183491347,2024-02-14T00:22:06.447000
@ -229588,7 +229588,7 @@ CVE-2023-41838,0,0,3e0f7fbfa7e646d9e6b24c4454d47991fb7a054ff52e26fd2383c30218801
CVE-2023-4184,0,0,a743c17ab8cdeaa1e8ab3b1f8348605243a078383c1fc0de2815b38f2022b933,2024-03-21T02:49:42.503000
CVE-2023-41840,0,0,058b38dd93d31544026ceac10c3746a380bb4b893ffc4ec7ff6d3fdfced84fd9,2023-11-21T01:38:25.570000
CVE-2023-41841,0,0,c396e283e8f417b0327e4e699914f5888ace1adc808bd88f6a80513363ef91d4,2023-11-07T04:21:06.727000
CVE-2023-41842,0,0,d902985df39e90e0a870b3fe352f2bc3214aa532e6a2efd7f16fe54be83b07fd,2024-03-12T16:02:33.900000
CVE-2023-41842,0,1,847be07d8abd62089f270be62daebc8531ff542cf1d25f8b1c5095516f84e1b3,2024-03-21T21:04:13
CVE-2023-41843,0,0,b76e4a753371cb69a8b1f35f87d6e61096da25b6a5129b71ec9d3f9352cd868a,2023-11-07T04:21:06.847000
CVE-2023-41844,0,0,6027f1b10751980796006b3e2c00169910ba55a7276f222e3506a44e3f919093,2023-12-15T19:34:33.480000
CVE-2023-41846,0,0,305ed2ac81853899e9689d428004fcebea9ca9cfc1cb19e8fcbe87953034cd73,2023-09-14T18:00:49.853000
@ -232544,7 +232544,7 @@ CVE-2023-4671,0,0,ad1f968edfe36b5f1d6decd4caedc1c73ef3ae935fd3b1d84fb345aca578c5
CVE-2023-46711,0,0,1c36566bf77c88f8f580bee5807cda4cdab1040c046625d658316f3bf04fa201,2024-01-04T02:45:03.603000
CVE-2023-46712,0,0,d169d9deb918d86ddb3fd6f8a9da309e3ff3aef24d01eaf742dfc995e5cc9e07,2024-01-17T18:25:21.613000
CVE-2023-46713,0,0,651ba252a50beb076dbcd77eed9416207ba8847f69703fbd84a4801e460be956,2023-12-19T18:59:02.837000
CVE-2023-46717,0,0,5d886e4d7527822336c2043d5c7b6413373143e08ca6b66775084525e04609bc,2024-03-12T16:02:33.900000
CVE-2023-46717,0,1,aa258f839ea40a78ca0a10de84d911caccb021bd36a6a7345f56d9a2b06d9ab0,2024-03-21T21:04:18.200000
CVE-2023-4672,0,0,e7f018e5b00d8caa2cd6326fde538c208ac0fc901cdb1bcffceb003eeac57c07,2024-01-04T20:09:31.050000
CVE-2023-46722,0,0,ee1e20585c3fd0a1d9c68641566f4a09ec3ae4d7392bafc4c6a7ed95aa18cb3f,2023-11-08T17:53:25.937000
CVE-2023-46723,0,0,9c1b68305de266ad60fde647a9c434b64a6cf34ec6368f51178a40235644e6a3,2023-11-08T17:54:38.240000
@ -234617,7 +234617,7 @@ CVE-2023-49830,0,0,95c8e8a920bc6a550dd8fced96adfc49615ef3b8f6aec68dfdcf2d26ab1f8
CVE-2023-49833,0,0,75834fff665b59f3c4fb0b4b03558d32fc91b3efab25cbdeefafb0192b012059,2023-12-18T19:14:15.050000
CVE-2023-49834,0,0,f01e2730dc0b95d1b7f32c812dba24237147f33301308210a31bf1cc47cc7d0b,2023-12-20T04:26:25.007000
CVE-2023-49836,0,0,d1eaaf088ac1e6696c52a64c2e3dbfdfe00102afdcfa4bf3951b57aa3483333c,2023-12-18T18:19:51.903000
CVE-2023-49837,0,1,efabe1e704e190a47962d97e791147336566f4b472138d57ed70012cd72df24c,2024-03-21T19:47:03.943000
CVE-2023-49837,0,0,efabe1e704e190a47962d97e791147336566f4b472138d57ed70012cd72df24c,2024-03-21T19:47:03.943000
CVE-2023-4984,0,0,b568e92dbfdfa933d741a561994c5a187fe494f7ce09795a2b3a70d20f02c757,2024-03-21T02:49:56.543000
CVE-2023-49840,0,0,3007b22f6bc63fefba1a05b48a48deee17ae057500c4d492f77e27d9c865a34d,2023-12-20T04:28:39.197000
CVE-2023-49841,0,0,ad3a17229bd01d0c2bf491b86a58b899c006843c79bea01aae5bd3ff930dd743,2023-12-18T19:03:16.533000
@ -238777,7 +238777,7 @@ CVE-2024-1390,0,0,760bcdaac2db269a3249aaa20e58e1659b2977bdb995748ef5e46a1ecb8544
CVE-2024-1391,0,0,d263861df201411e95604a0f8dea4a32aa5aa465f14e9d3ee26c7cf1dddcea30,2024-03-13T18:15:58.530000
CVE-2024-1392,0,0,854e6aa0a85eb7f6e01984f9f2b39f09c3e464c67a90f670cafc735773e56736,2024-03-13T18:15:58.530000
CVE-2024-1393,0,0,139d32a27df25f29abc2bcda3159db69b338e05c68d7680abed80afd815e8ff5,2024-03-13T18:15:58.530000
CVE-2024-1394,0,1,7c73506bdd53fd1dc2a1d94144983d2673f2dc3fe5d07e0b6a723a3ea487359f,2024-03-21T19:15:09.063000
CVE-2024-1394,0,0,7c73506bdd53fd1dc2a1d94144983d2673f2dc3fe5d07e0b6a723a3ea487359f,2024-03-21T19:15:09.063000
CVE-2024-1397,0,0,e6d8c9c2beca75d3fdc5f918cb423cf21913a9c807f46126d5b49c29c7bd60f0,2024-03-13T12:33:51.697000
CVE-2024-1398,0,0,7a7783e481aa897afa83bd125da0d53c431d5a5a9d43f1ade8b1e715449f59a0,2024-03-04T13:58:23.447000
CVE-2024-1400,0,0,295a10f36c3e13d694d09cafc6872c0c48f9e2b4c87da0889327ecdac7abe4ac,2024-03-12T12:40:13.500000
@ -238965,7 +238965,7 @@ CVE-2024-1720,0,0,3f534b1db2e7b75966562da6fb1d468afac7b86b23a312961b1d896997e21d
CVE-2024-1722,0,0,bbfa2fe804b85c8f73b8225a9811c290a6a29ddc6e06b05c51fd071f985f9060,2024-02-29T13:49:29.390000
CVE-2024-1723,0,0,7e337e59dda9fcfb03cb2d0ee4f7926bbc1a4aeb3afb375b3ac4508c9e5d97e9,2024-03-13T18:15:58.530000
CVE-2024-1725,0,0,ee1fb8cd83e91b3cc554ef61ba8506273bf384217121fa2160f3c7c69e57a993,2024-03-08T14:02:57.420000
CVE-2024-1727,1,1,a5fa7c92f81c10c1ceddf980b8b24e0215a1f2778b409140ec0db41816e38d59,2024-03-21T20:15:07.620000
CVE-2024-1727,0,0,a5fa7c92f81c10c1ceddf980b8b24e0215a1f2778b409140ec0db41816e38d59,2024-03-21T20:15:07.620000
CVE-2024-1731,0,0,a54dfdadfcd6666506c62883f073482e904182fadeecad8ff7a349f271e0661b,2024-03-05T13:41:01.900000
CVE-2024-1733,0,0,d9cf8004467e67497b484a605a620c0a0db32312b35f534ec3be854a6ce160fc,2024-03-17T22:38:29.433000
CVE-2024-1735,0,0,fef99247045161df3b08e17c74949b5db371420b96202703c89efa90d1969060,2024-02-26T16:32:25.577000
@ -239543,7 +239543,7 @@ CVE-2024-21386,0,0,903a512cc32d9e4674dc7d86977b04859925aeeaf4bf144d775c4ac6c4cba
CVE-2024-21387,0,0,7fed095f12199f3e674e290d01dbfe98907c805a81347bcb7dfa229268485bdc,2024-01-31T20:08:28.943000
CVE-2024-21388,0,0,4689f3e5a25df77d38bba630c81581b1866b09926bc1df9fc34e5bb70ce254f6,2024-02-06T18:21:15.953000
CVE-2024-21389,0,0,c1dff7495d1f41d9f906c3a6839e9f5bbde84314db35a5d04f2a4417ef658156,2024-02-23T17:39:57.703000
CVE-2024-21390,0,0,45ae7e7ebd33d183faf4f836d7c5c503902720ae8038e0d197357034103904aa,2024-03-12T17:46:17.273000
CVE-2024-21390,0,1,8219a434145bfe7959ea8e4741bf30daf6b14c92574a93fe04a1803ca76b16a0,2024-03-21T21:04:32.570000
CVE-2024-21391,0,0,bf2070d05137e38bbe24d5d76cf0717ede5add506f6e523e54ee2b337b0573d0,2024-03-07T19:27:15.807000
CVE-2024-21392,0,0,f8c347c372addecafd969a8402f74415361262f568cd324d75d3354da9caa2f8,2024-03-12T17:46:17.273000
CVE-2024-21393,0,0,85e9457ccc636d7e822717ab1f6fd1f3599931eedaff743fcc5a8bcb0835033e,2024-02-23T17:40:29.097000
@ -239559,8 +239559,8 @@ CVE-2024-21403,0,0,6f0e70b7784f3aad29df29de72a29f5e8a4bc0827d2b946bbf47745bab084
CVE-2024-21404,0,0,8aba03ed666ffd23124b08c87a2acd614c58649f26fe48e08bdfdea134622c02,2024-02-22T18:23:55.787000
CVE-2024-21405,0,0,7b2bcd85f8b75e36055a51e8d6e50e620fbb5da00673d7a82956b2dcc3d7e6dd,2024-02-22T17:57:19.810000
CVE-2024-21406,0,0,4926f610f67020e143f717a8966dfc594abc79953c895df1691f78cfff880f19,2024-03-01T22:57:15.940000
CVE-2024-21407,0,0,30479147bec2a3c21c4aa5dfb1c87fcd9352eaa553440e3e992a0f5812889808,2024-03-12T17:46:17.273000
CVE-2024-21408,0,0,0aa1ba0b8e600e9468b94728ede9d63896f951b14bd37d8025fed0b72dca0697,2024-03-12T17:46:17.273000
CVE-2024-21407,0,1,13806882df1727e3bbc8e26b8c7dd4da4315e03da171f9dbf0647863a4d47218,2024-03-21T21:06:06.530000
CVE-2024-21408,0,1,5325218009ff3c8f10a3b9269e4b1c5ec312eb3ea56b73f6a728479c1bad3635,2024-03-21T21:06:09.543000
CVE-2024-21410,0,0,bd862af63cde79d77d3d96c08b20eb8ee12ef6b46d7738e8f98c5d9c8af65aee,2024-02-26T21:10:38.713000
CVE-2024-21411,0,0,752b3d730293c266885035a1f030073e3f7456710c29851319bdadbb6794b6d6,2024-03-12T17:46:17.273000
CVE-2024-21412,0,0,6df500642ad441e157d67f1fe17b6dc5155211f5565d89e1eed7797770fe5407,2024-03-07T17:48:58.173000
@ -239729,7 +239729,7 @@ CVE-2024-21749,0,0,229191a90250f78e7aa746c2ca4de6c3be31a5d2f4672cbc80ebde5848a38
CVE-2024-21750,0,0,3e8fbe0cb62c8e56d68418bdaca88bd6a5a9359bd561d57e9822bcdabaea5468,2024-02-03T00:41:15.460000
CVE-2024-21752,0,0,80a5a3aff28e680d194d956f222c96b3f36d11392adc2ff7fd485136323ef565,2024-02-29T13:49:29.390000
CVE-2024-2176,0,0,d54596f8e5752379438e249000547ff3a83df464c2a08554886046d39f2d50e4,2024-03-06T21:42:48.053000
CVE-2024-21761,0,0,744da343deb6ef5cda8d70ea751b4bb02f0ef16aa3befb042547405bbfbdf7f4,2024-03-12T16:02:33.900000
CVE-2024-21761,0,1,8ab59e75152f9d6936d0a5e25258149f4630555ed80a24ba673592c858a212ca,2024-03-21T21:04:27.653000
CVE-2024-21762,0,0,0b64c1e53b9988082cc4d4d5e4617e40dc5892047d7c058b50bd69b94b2061c8,2024-02-13T18:21:14.607000
CVE-2024-21763,0,0,e8a94692e80752e5b1d3ea2f8db6894556c45d4c446bc2036ad4bdc6519e2437,2024-02-14T18:04:45.380000
CVE-2024-21764,0,0,6a104de5d97cb4f3a858343729857223fff5cb50c4e9c48631f456ff6696c0b7,2024-02-07T17:15:22.520000
@ -240778,6 +240778,7 @@ CVE-2024-24263,0,0,a7faff23323264f34f9c62262fa3f03aa668fa6eb0738632fbcd67b53dcba
CVE-2024-24265,0,0,af394545ccd1a804e78a325f17868ed02a0d7133b6c62faa71b15705be7c579e,2024-02-07T23:06:25.303000
CVE-2024-24266,0,0,af2222be5080c2bad50dea6cff249c7d07d0b0a9a7e6f3a785220071b883839d,2024-02-07T23:28:17.213000
CVE-2024-24267,0,0,95558cbe9d72e85c3d366ac9b6c161da57c7f083ab6736f7e86204c7be33f1c7,2024-02-07T23:28:24.530000
CVE-2024-24272,1,1,e575de58bb9e66a994ee5c7d2673bfc5bad02f41a3b3853df57444dfb9c978b3,2024-03-21T22:15:10.850000
CVE-2024-24275,0,0,5ee5552d1ccdff1349c63c1ee819e4122e7275d9cd64505362d94567de774ca6,2024-03-06T15:18:08.093000
CVE-2024-24276,0,0,c0b996f05c041cdec9f97004ccc67bd94d1c66cbf22b8df3dba73751978abd1f,2024-03-06T15:18:08.093000
CVE-2024-24278,0,0,3f7eb60b847e1971c5f65cb683e6174dee6547147c3195ceb2f7499f12bdbd36,2024-03-06T15:18:08.093000
@ -240895,7 +240896,7 @@ CVE-2024-24683,0,0,5dcfcb131b936f6ead6cae5418b28b2fe1bb1011c1c921fe73c5d9bd261bf
CVE-2024-2469,0,0,bbb4acc770dce2c80eeef638c741188cf4cc5adc1821a89a4b4d8155ca8fe893,2024-03-21T12:58:51.093000
CVE-2024-24690,0,0,4249963fcab3f64839ca35be1a62d20e5da7a24ba0a47ce2bf9c0d2ae28ac410,2024-02-14T13:59:35.580000
CVE-2024-24691,0,0,87a55408e5efa0a4e3ce695995ae48834f0ce6baa0932acdc26c28bc7459ff4b,2024-02-14T13:59:35.580000
CVE-2024-24692,0,0,96b263e11e7ffd264e5e6330a524d4e167d94ed5d670d61f6bb2c4bb8b02f370,2024-03-14T12:52:21.763000
CVE-2024-24692,0,1,580d11b018a5e4d4bbd8e658047778e9899568d414cc4a0fa08655ce5029182d,2024-03-21T21:06:13.123000
CVE-2024-24693,0,0,5948992e2aa56bf9230af7bcdfd2c9a8d3e9ce95b4c0f6ada002a4f7d2439c11,2024-03-14T12:52:21.763000
CVE-2024-24695,0,0,f7b489372675997f3018702f3166f9e3d390c6d5bf9cde9b8e59b33dbe31e943,2024-02-14T13:59:35.580000
CVE-2024-24696,0,0,340219d088caaa9660211943b96c2739fe7ed93b849c938b38d29441b9ee779b,2024-02-14T13:59:35.580000
@ -241407,9 +241408,9 @@ CVE-2024-25767,0,0,5e5d85efb5a949e2d407dc5470a1026f931741e6d3d19a638a7a6f425b54d
CVE-2024-25768,0,0,80ced9e42f994d6a00a0057cb00581829176f61a4dfa1e97abbae3afb8561c8a,2024-02-26T22:10:40.463000
CVE-2024-2577,0,0,c843620e43b4656c06ef8ee9254a21713fc5cfa1bda4a16ceabcb16830382f60,2024-03-21T02:52:39.510000
CVE-2024-25770,0,0,d105bd95abb6afbf92cef5c1765f81d4416c38d2a6067fe6216eb1ee17388748,2024-02-26T22:10:40.463000
CVE-2024-2578,0,1,8067579b1ebf336ee1daf98516c926ae1ffceb32460cd545b41c51aab9076f37,2024-03-21T19:47:03.943000
CVE-2024-2579,0,1,82ab7736c7cd2bae37cca14333922f5ac036820dddbd265831a9ea551e48aa62,2024-03-21T19:47:03.943000
CVE-2024-2580,0,1,17c770530b9c88c0a0bc27203561d8211df9836f86fe3343fde81a78a162c0d5,2024-03-21T19:47:03.943000
CVE-2024-2578,0,0,8067579b1ebf336ee1daf98516c926ae1ffceb32460cd545b41c51aab9076f37,2024-03-21T19:47:03.943000
CVE-2024-2579,0,0,82ab7736c7cd2bae37cca14333922f5ac036820dddbd265831a9ea551e48aa62,2024-03-21T19:47:03.943000
CVE-2024-2580,0,0,17c770530b9c88c0a0bc27203561d8211df9836f86fe3343fde81a78a162c0d5,2024-03-21T19:47:03.943000
CVE-2024-25801,0,0,86d0a2f88d637a38d728e68507deae5ad1ee66b74383784e4b403b33b5149a86,2024-02-22T19:07:27.197000
CVE-2024-25802,0,0,cb029cdbf03ee0051152f36415381bb55ee304fcb50819490e22f017c52403c6,2024-02-22T19:07:27.197000
CVE-2024-2581,0,0,6eca5564f5891085eb56e7f4cce8a941d50b5c5d945724a4654e0a645ab887e7,2024-03-21T02:52:39.600000
@ -241484,6 +241485,7 @@ CVE-2024-25932,0,0,b47ba5ecf2a19427a2d0c7404d84cf9b82c7d738bc913534568255e831392
CVE-2024-25933,0,0,093a19179e6e045a94069a9cabb14922ac900e3b53f12387034c6f0b19d4fd7f,2024-03-17T22:38:29.433000
CVE-2024-25934,0,0,abf29b2c8bd2941b97b5a50ee19174b7389e9c0ccc1df25f4fdb8e591190b306,2024-03-15T16:26:49.320000
CVE-2024-25936,0,0,8effd82663b8db2d960ef33e023d14a22fda9a759a9ee34ebfd84341bfced171,2024-03-15T16:26:49.320000
CVE-2024-25937,1,1,c4a907f1a69461947e2422aeb6ed7c212ded96be6d6c8008dd85083f4cdce300,2024-03-21T22:15:10.910000
CVE-2024-2594,0,0,62f22797cf1e847607c0f48ec8428fa7570128cbcbde2cadf780cc6697bdf9c5,2024-03-18T19:40:00.173000
CVE-2024-25940,0,0,81faf8084be28ad3443bfad1349de788b40c215e318cb61e901b3079aac1c24e,2024-02-15T06:23:39.303000
CVE-2024-25941,0,0,ca1cef65d30f17057b47421c2700ecf50e418e7bf4da35eb3fcc2989f17ef1eb,2024-02-15T06:23:39.303000
@ -241671,7 +241673,7 @@ CVE-2024-26300,0,0,957ff2fceea083c23710802994700a4cf17bc21a9f298857e1101271f2e4e
CVE-2024-26301,0,0,ca5ba4fc82d74473f58bbb8ab53e52870805c492ae0704dcd3113ae9fe8a11a4,2024-02-28T14:06:45.783000
CVE-2024-26302,0,0,af4ef1bb4da1c0ac0e7b0a0b03804bb031d31d0e464ca3573002ab0828a12d88,2024-02-28T14:06:45.783000
CVE-2024-26307,0,0,9bdd86f1164e19b9b7e171833e6f17ecff380db1e609df57649c593081a62eb2,2024-03-21T12:58:51.093000
CVE-2024-26308,0,1,2ba9e28d3969717f6516b4803ddc13ceecd3ad2f69b64fd95ab4756f662bdfa5,2024-03-21T19:54:03.230000
CVE-2024-26308,0,0,2ba9e28d3969717f6516b4803ddc13ceecd3ad2f69b64fd95ab4756f662bdfa5,2024-03-21T19:54:03.230000
CVE-2024-26309,0,0,f36b82bfd58135529029d2dbb3557eae73d94f3c7d43b34f799072bc28e25580,2024-03-08T14:02:57.420000
CVE-2024-2631,0,0,4ce8c252c50d2a4573b6db6829ce390aacb977173215dab753e6b59d6e346a30,2024-03-20T17:18:21.343000
CVE-2024-26310,0,0,cdf3231f7a059b92520dd591ab7449fe300f81e89c81c63cb479e44416fa612e,2024-02-22T19:07:27.197000
@ -241872,7 +241874,7 @@ CVE-2024-2717,0,0,60956d204776e8fc2f79250d188a534a8f231639d58b0eebc608181972adc9
CVE-2024-2718,0,0,69219abfd430b6a0a0008d330dbe89494263528e572419109c92a9fc419b6f63,2024-03-21T12:58:51.093000
CVE-2024-27189,0,0,515e61fa1831b3fd92525b0004dfafde618646c72fb29e4527e0a2fb9466806f,2024-03-15T16:26:49.320000
CVE-2024-2719,0,0,a4ab17264d9d4de02148162ae470cd2b2fdd972306f561edebd77c0e41dd9d7a,2024-03-21T12:58:51.093000
CVE-2024-27190,0,1,1aa0bf9b04d8ad0cd0d83da443ced72d3db96666d7e8636691ac4635aaeee635,2024-03-21T19:47:03.943000
CVE-2024-27190,0,0,1aa0bf9b04d8ad0cd0d83da443ced72d3db96666d7e8636691ac4635aaeee635,2024-03-21T19:47:03.943000
CVE-2024-27192,0,0,0ff7a489a9c185cda73564233ae30b76c3279bb0d352bc83dbf6b8e10c6212e5,2024-03-15T16:26:49.320000
CVE-2024-27193,0,0,1a2f1126258ed9b0f5281770f95fad5056f0f1e4993150f3d871f6ef458a3533,2024-03-15T16:26:49.320000
CVE-2024-27194,0,0,b8200fea2f0a79d9b8f1fbf40aca3e6d111a7a732357978a250e1964deaa7251,2024-03-17T22:38:29.433000
@ -241915,7 +241917,7 @@ CVE-2024-27237,0,0,952387726c7567ea2371af0e500cab297b027867a108431eaa82a39745a31
CVE-2024-27255,0,0,07d4523d50b3b6ceec1ed85c31e8859376bfd63a9732f2f4d2cf6e5b4c34b76b,2024-03-04T13:58:23.447000
CVE-2024-27265,0,0,caf2cbef481f9d0206d06f75a38ca052c5291ba0582e91875cea8f52e6d86a34,2024-03-19T16:52:02.767000
CVE-2024-27266,0,0,f3ab0f27c5fbbc81843b4329fa53134d5b91174cad9bacbbc5dbf01cfacc3864,2024-03-19T16:52:35.400000
CVE-2024-27277,0,1,eb365bab444835328458e82045190ce3a564e0755801fc1f65f8b5d9bbf59bcb,2024-03-21T19:47:03.943000
CVE-2024-27277,0,0,eb365bab444835328458e82045190ce3a564e0755801fc1f65f8b5d9bbf59bcb,2024-03-21T19:47:03.943000
CVE-2024-27278,0,0,2ef9546b6eb3a76ad70be700186038d995dd630654759ed72b9b3d10968f6d39,2024-03-06T15:18:08.093000
CVE-2024-27279,0,0,a0a465925dfcee0f633443a4d3db070f2bf023c10d4135b020d1a0fbe76c5a4b,2024-03-12T12:40:13.500000
CVE-2024-27283,0,0,d0d6cc69e38ce7977029c4d3a011dff4f743808fa73bec6f0327124024522ffa,2024-02-22T19:07:27.197000
@ -241987,18 +241989,24 @@ CVE-2024-27623,0,0,335934f06c4afd03c24d8ea0f13e9520a06db4e45dc99de31e76f91b777e3
CVE-2024-27625,0,0,e1c123c7cbb72c1152f10bec7c5db687cd4b211c6f1247bce688ef0105bc5f48,2024-03-05T14:27:46.090000
CVE-2024-27626,0,0,06fb1dce28f844815c1d8334673afd42b5ad67647a67d11a7a830eb63a50770e,2024-03-21T12:58:51.093000
CVE-2024-27627,0,0,2adc4718290b7f1d1d408d1d5d79989d398cde78693706b86dff52f1322eb9c4,2024-03-05T14:27:46.090000
CVE-2024-2763,1,1,bee65eeea6878adcac23397bc71d98831879058eb4882e87835c22b7e843d724,2024-03-21T21:15:10.790000
CVE-2024-2764,1,1,69a14a2a0dd965472714b67d7985952064e30264a89aaecdc982ea5bd5630546,2024-03-21T21:15:11.177000
CVE-2024-27655,0,0,65a637f75a188da438b32cc13f4600329f3f424dcd0f437c9989c4c9314e002f,2024-03-01T14:04:26.010000
CVE-2024-27656,0,0,2f731c51e226b6152416f771e826d74f69590b91bf713c56222b4fac3d8f2331,2024-03-01T14:04:26.010000
CVE-2024-27657,0,0,6c517d302d2c56a9786119bf2465fe9b50134a18e449436c88637119f49f73a6,2024-03-01T14:04:26.010000
CVE-2024-27658,0,0,de292d8f17e3b6a4b54092716a03244494548bb536dcb3cbcaab392d9ac50e07,2024-03-01T14:04:26.010000
CVE-2024-27659,0,0,490ce783956f55fbb1652cd0208e0f99fff65361983f109fc8e1a66b3e797355,2024-03-01T14:04:26.010000
CVE-2024-2766,1,1,2f03b47b16b3a18f059f9f66de634e5f6ef9cec3878390ee1e98999cc5468b98,2024-03-21T21:15:11.407000
CVE-2024-27660,0,0,ebc867d9e8ab77866712caf2c77523ce69fe475473038494b2e093ce6c793b8c,2024-03-01T14:04:26.010000
CVE-2024-27661,0,0,86da8e187830fd36888e5a846b7303cd63252f868f903b0bf7eaad6fbe1ac85e,2024-03-01T14:04:26.010000
CVE-2024-27662,0,0,3251284bf234434361d463758a344d1bc61b65e736c70ed013176b4fc1a3abef,2024-03-01T14:04:26.010000
CVE-2024-27668,0,0,255f8ec9db75a1b2656a5d8885c3aab9aaa34449ee65d35c3a707a7e7b8d15ff,2024-03-04T15:35:25.673000
CVE-2024-2767,1,1,ffaabea37af308423f4f6840702d67970e3cfd3bcc6ef79f88efa2eb1d7cf735,2024-03-21T21:15:11.693000
CVE-2024-2768,1,1,fb02be4ca45dc8f116c47a8d602d92c4e05c6f4d0713bc6b3fe2be20242866bc,2024-03-21T22:15:12.710000
CVE-2024-27680,0,0,96c9e2b516bb3c42b6c5a857a748e4b2bf1f8d01976f5c4ab9824d25b192009b,2024-03-04T15:35:25.673000
CVE-2024-27684,0,0,265733b871b65fcd052263479536d66d42340f95cd723628ecb5857c3bcfe5a9,2024-03-04T15:35:25.673000
CVE-2024-27689,0,0,f4ebc1e59160fdab518bfa3aa9af1f1ba832ce6045359e8a975bb23df8ccddfc,2024-03-01T22:22:25.913000
CVE-2024-2769,1,1,95797766df7972b86cd52a83630965b27434dfbd9e9798ad1c8a81ad8866d2c7,2024-03-21T22:15:12.943000
CVE-2024-27692,0,0,96cf609944e6476718d8d1c519869d6f251f131a1b19ff614e15f00c454cdd33,2024-03-01T17:15:07.617000
CVE-2024-27694,0,0,f3214413fbbba6e4989cb23c7682c51f2973a0b48d2e319f7c34a38e30c11001,2024-03-05T13:41:01.900000
CVE-2024-27698,0,0,ac54888b0a03034871f07f7d36cab166990ef3007932a85c3ddd7d9b6a6ab747,2024-03-09T23:15:49.403000
@ -242038,6 +242046,7 @@ CVE-2024-27916,0,0,57603b4ae0cd7b53b3d4b7465c5e0da26ce7f8961f1ab6e4b1173461736f1
CVE-2024-27917,0,0,af242c2d21e7486c1314f58994d4b13c43efcfe28649da8aeb5e5a5a818348df,2024-03-06T21:42:48.053000
CVE-2024-27918,0,0,3664ec04f7d9a719220c7fe5f6ddc241af99de6538768ed6a6d6b43526064a3c,2024-03-21T12:58:51.093000
CVE-2024-27920,0,0,f0490af99419d039a483091f0cc2cfbd25508df9b9a1d7fb05a10eecef5acab6,2024-03-17T22:38:29.433000
CVE-2024-27921,1,1,9fc575ed87e20a35126bff846e3aa31cccec44ae44f1cb9a7f799d6b974dde7b,2024-03-21T22:15:11.137000
CVE-2024-27922,0,0,d5b1b9b28631478cfaa086e0b605c7345d21c041c30a4843fe35c87fffd7f1e1,2024-03-21T12:58:51.093000
CVE-2024-27923,0,0,e143436c1fef289cd65d521e6631dc8531653f791ec9727bdb454c80c71c0113,2024-03-21T12:58:51.093000
CVE-2024-27926,0,0,437c3e91ee05045eaf3d785b863914fe91cf5cded7548ad0feea1f658c0072c4,2024-03-21T12:58:51.093000
@ -242057,17 +242066,17 @@ CVE-2024-27949,0,0,12ee9b935394b527d1677a59b517c94d0df067a0b32bfff31d7cb2be5b4b5
CVE-2024-27950,0,0,56d632dad56c45d949d3327de16e5b70b08683cea8ce7876ca8c59cc37ee8062,2024-03-01T14:04:04.827000
CVE-2024-27952,0,0,184c933cd3d4f7d9f291de87daadba6c6d2dcb57a0cab449b4798a27658d2d98,2024-03-13T18:15:58.530000
CVE-2024-27953,0,0,9606a5ea342585cc8ea605f674c63e8d870327e37e1ba285dba38be6126632a2,2024-03-13T18:15:58.530000
CVE-2024-27956,0,1,eeea096f0e7e7487ea049c194ac62702e3efa47a3d999d9e69a572f09e5c15e8,2024-03-21T19:47:03.943000
CVE-2024-27956,0,0,eeea096f0e7e7487ea049c194ac62702e3efa47a3d999d9e69a572f09e5c15e8,2024-03-21T19:47:03.943000
CVE-2024-27957,0,0,5098f1a90cb829431de95b5de6e60aa2ea5ee4aedd8c9f7d7d4297d6dc37ff37,2024-03-17T22:38:29.433000
CVE-2024-27958,0,0,2ee086fb447798c561fd1c831c754d734514f619f6ebb04cf96679cb78dfef40,2024-03-17T22:38:29.433000
CVE-2024-27959,0,0,e2d4c3e5066dc506643038067fab6e9f26070ced2f7f327a18ffcd82b243c593,2024-03-17T22:38:29.433000
CVE-2024-27960,0,0,6ff911c5617586aebae672070284633e223cb5b14cbbc3b1801f17c292900f46,2024-03-17T22:38:29.433000
CVE-2024-27961,0,0,3162bfbc67900a83a9b4114dba265e7189f0bad8c0ddf2d85f6724674d13510a,2024-03-17T22:38:29.433000
CVE-2024-27962,0,1,1c94df9110462a34df55d8f671d128860266ccb77dd29f389b2324600ca07680,2024-03-21T19:47:03.943000
CVE-2024-27963,0,1,1fe8e45c3046e4191d77b36670840383914d58f1ba31efb184b266de4ae6b144,2024-03-21T19:47:03.943000
CVE-2024-27964,0,1,f723b903bea75dee5cd9d094fb735ccf35df44ec2a2fe82d8cd63bd7e33ad323,2024-03-21T19:47:03.943000
CVE-2024-27965,0,1,07b2c962b6af72a3fa4d6e0cca49f1bed68d7474aaf9839141a5bebbc2988945,2024-03-21T19:47:03.943000
CVE-2024-27968,0,1,62d1484625b8ff1b6da2393031085b35a7b07168c520f9d4ac0420345380cdc9,2024-03-21T19:47:03.943000
CVE-2024-27962,0,0,1c94df9110462a34df55d8f671d128860266ccb77dd29f389b2324600ca07680,2024-03-21T19:47:03.943000
CVE-2024-27963,0,0,1fe8e45c3046e4191d77b36670840383914d58f1ba31efb184b266de4ae6b144,2024-03-21T19:47:03.943000
CVE-2024-27964,0,0,f723b903bea75dee5cd9d094fb735ccf35df44ec2a2fe82d8cd63bd7e33ad323,2024-03-21T19:47:03.943000
CVE-2024-27965,0,0,07b2c962b6af72a3fa4d6e0cca49f1bed68d7474aaf9839141a5bebbc2988945,2024-03-21T19:47:03.943000
CVE-2024-27968,0,0,62d1484625b8ff1b6da2393031085b35a7b07168c520f9d4ac0420345380cdc9,2024-03-21T19:47:03.943000
CVE-2024-27974,0,0,c5d12161a6a294fb4d33a068888d07d2dec693f9073d8d47f06182bf4fe2779a,2024-03-18T12:38:25.490000
CVE-2024-27986,0,0,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000
CVE-2024-27987,0,0,ce6fd0b1730cd837f285c0aaaa1258cf6aa8505469e7f313401adb363ee7f395,2024-03-15T12:53:06.423000
@ -242077,6 +242086,7 @@ CVE-2024-27995,0,0,31db9c3046ef3b6826fd04aab15586376d26e0b529bdf84ce7eba17bac569
CVE-2024-27996,0,0,79cff30308b011c07df476cb18acc5ff1830e7bf17b14d1ca5a0d9446fa716b8,2024-03-20T13:00:16.367000
CVE-2024-27997,0,0,b42c7cf4751e4a11a6e5eeb90c0df264fce89958ee556b8b06894cd2e68b11ce,2024-03-20T13:00:16.367000
CVE-2024-27998,0,0,325b1a8419d02931fcb08c1286afe5c33e53c5bf8527e201a365155e360914cf,2024-03-20T13:00:16.367000
CVE-2024-28029,1,1,9e484b8439861147fdb6b933336d3af06d5e28282f7bbd62426d313102246715,2024-03-21T22:15:11.353000
CVE-2024-28039,0,0,9ef35c96ff38e007b2fd4f37c3f1f5b6d35461c4eaa69f2b36faccd438b26411,2024-03-18T12:38:25.490000
CVE-2024-28053,0,0,e281ed045d826247c32c0ccef204d2c431b80f755e75c928bfd444d7e8497772,2024-03-15T12:53:06.423000
CVE-2024-28054,0,0,fd5e34ddafff629285a62ddb2d3b6251633211261857e076506fc9aaf016b6b2,2024-03-18T19:40:00.173000
@ -242099,6 +242109,10 @@ CVE-2024-28112,0,0,13394bf321439a7b80b31ae63012fb69faf271f01573bdf4d69e6f1d90267
CVE-2024-28113,0,0,4285de229101312bf59190b9237f9b0ffa56ca0930f139097955359a41ebcab5,2024-03-13T12:33:51.697000
CVE-2024-28114,0,0,7da8b099613e387d1a8ac16fa6023879524d5796fc9bbb4a91069a4438dcd4dc,2024-03-13T12:33:51.697000
CVE-2024-28115,0,0,3e0e705412ec4ecfb9fabefcb95634cd838a6bf7c9c03087d677ba199986f693,2024-03-08T14:02:57.420000
CVE-2024-28116,1,1,85286e6845f2beac119052857d56d51860d6038aa133c3b458a86cdf9924834b,2024-03-21T22:15:11.577000
CVE-2024-28117,1,1,50af41bcf40f5c97cffed5e4d7915b2e6e4dbf663e644e7a567040eb1c3709c8,2024-03-21T22:15:11.820000
CVE-2024-28118,1,1,e61cb89fdfd67653460541c5789b2ee8ade691ef725d261698f974fd285a2753,2024-03-21T22:15:12.037000
CVE-2024-28119,1,1,ba119101a2f9a5bd2f2f9133840523bad66cb58d06fb55e6c9c926ee00725610,2024-03-21T22:15:12.233000
CVE-2024-28120,0,0,1945ab744b479cd2a55b16e82913f94d84bcc236918a39e22cfe06aca7010c4c,2024-03-12T12:40:13.500000
CVE-2024-28121,0,0,6ad3b99e4c8dd1459c44e51d2edc62f08f0aa4d5ffd25ea4a2fe7aa5af2916e8,2024-03-13T21:16:00.460000
CVE-2024-28122,0,0,3209f9a611aea4804720e8e5b4eeb3a02772982f302e787ac8040299af464092,2024-03-11T01:32:39.697000
@ -242158,7 +242172,7 @@ CVE-2024-28248,0,0,b617812c524b85d27f2a46b3a739648463fa9ffb5a6e46ea47ba0c68bd3fa
CVE-2024-28249,0,0,7f01b3731d6ed3594265964b9061da88eb89dfe99b6d59bfec8413859c3ac454,2024-03-19T13:26:46
CVE-2024-28250,0,0,dacc68b6e843dc808e1d498d69054a425a6f10e258af235d9a1256f74372900d,2024-03-19T13:26:46
CVE-2024-28251,0,0,19fc23d56f5d00fa3c69d993b0deb280b2d4a1df9b73eb3d828c9ec8b6104ec4,2024-03-14T12:52:16.723000
CVE-2024-28252,0,1,ef5b49a93a934440796c2d3d79cb29d26eeed77accae4ad9797588db77e6bd30,2024-03-21T20:15:08.050000
CVE-2024-28252,0,0,ef5b49a93a934440796c2d3d79cb29d26eeed77accae4ad9797588db77e6bd30,2024-03-21T20:15:08.050000
CVE-2024-28253,0,0,b0d1b906324ecf48e7bcfd3c9d0c313a69a8c6ff9baa313b92164ce1f64f0b92,2024-03-17T22:38:29.433000
CVE-2024-28254,0,0,ba6384e5d24a90ea0036dcbe7f89cd48d629aea12c2d3808708fa9f619d07a5b,2024-03-21T02:52:24.507000
CVE-2024-28255,0,0,abc37b2c1df4d41f872020a3754e2ae86c707a3247848b9d32abc1bd5f67bb13,2024-03-17T22:38:29.433000
@ -242196,11 +242210,12 @@ CVE-2024-28431,0,0,148c6be422e12f315897bdd57f5208c74e8137e452c7019eafe29f97f527c
CVE-2024-28432,0,0,4bc8c3df18623e8712ef966fb24c80f6754436b2eb6a0c14d5d3c56f5a161090,2024-03-13T14:28:45.217000
CVE-2024-28446,0,0,e3b0d814ee24ce9a2740eda808696f714c3071d6722fa7bd76f62923d12a194d,2024-03-19T13:26:46
CVE-2024-28447,0,0,729795bf39bd106c71b5b798b10fa8f526cc5d6a6eb2785b0edfa8459a535a4c,2024-03-19T13:26:46
CVE-2024-28535,0,1,174c70ce71a26af929a40c7b6a103a5242ac3321f34f35a982d598e918b67152,2024-03-21T20:58:46.217000
CVE-2024-28521,1,1,fd105cbcd479edb3fdca1735a5056fe2779ff0a030566d3c18a1d1881e0e5b20,2024-03-21T22:15:12.457000
CVE-2024-28535,0,0,174c70ce71a26af929a40c7b6a103a5242ac3321f34f35a982d598e918b67152,2024-03-21T20:58:46.217000
CVE-2024-28537,0,0,ff6bf2a37289dca28bccb57e311acb6479e1a577841d298af6b3b484403dfc2c,2024-03-18T19:40:00.173000
CVE-2024-28547,0,0,a2de8a258b087cbf7c5442c921d96afce5895db417e9c628fe7656334d2bb7cc,2024-03-18T19:40:00.173000
CVE-2024-28550,0,0,55b413fc03c0e6dbaa5c4b6ccf0c8e244ea995bce860e043c8086ce78f470aae,2024-03-18T19:40:00.173000
CVE-2024-28553,0,1,f74a5d2edd657e610cfc2b884ed1530d128afd106cc0a285c1f4868830f65cd2,2024-03-21T20:58:52.357000
CVE-2024-28553,0,0,f74a5d2edd657e610cfc2b884ed1530d128afd106cc0a285c1f4868830f65cd2,2024-03-21T20:58:52.357000
CVE-2024-28562,0,0,91433a4c4f462713402770533ad7f25e56b67cc00fab70587df3692124b0273d,2024-03-20T13:00:16.367000
CVE-2024-28563,0,0,a656ef0aa8710291541ea7c711ec135274e970f2c247f821eefbeaee78f8b4d1,2024-03-20T13:00:16.367000
CVE-2024-28564,0,0,2abccbe60536fbfc04ad1cc3dd03bdffb43e6097953ebe8e099f5edfe9491595,2024-03-20T13:00:16.367000
@ -242257,6 +242272,7 @@ CVE-2024-28746,0,0,4e08f19b517756fb15fbaf966494c1aeec3b9803b4e2b615b4d5a557eb48c
CVE-2024-28752,0,0,b6856abb589c0fed02798f341901c4f3025e287fced11706e9fa0c89b392cd6a,2024-03-15T12:53:06.423000
CVE-2024-28753,0,0,73ca850c1b6879daba607bc61d7d16457b56173a47004b8bff799b514a526c36,2024-03-11T01:32:39.697000
CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3b2c,2024-03-11T01:32:39.697000
CVE-2024-28756,1,1,72fb373f05075b509bde4da42c8f1b37f875b3bfa2ed5ad286fd8af7cac37faa,2024-03-21T21:15:10.550000
CVE-2024-28757,0,0,83cb6aefc1d6f4ccc5441198cdfc19ec27b4e109d2bc2864c936baa137f8e197,2024-03-19T03:15:06.893000
CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000
CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000
@ -242273,6 +242289,7 @@ CVE-2024-28862,0,0,b0dc40150b0e5f15633ecb26c2614b37fe6eefbb423911349887989b36d78
CVE-2024-28864,0,0,6556868d08f3b43cf56ee8c0e31629a1275e8137bc2387bf2430488f9854bd36,2024-03-19T13:26:46
CVE-2024-28865,0,0,346bb195552b29118071ab302fbe331daaaa3a5da7b31ab976886613f922d084,2024-03-19T13:26:46
CVE-2024-28868,0,0,4e3489f3c96f97bc271ff7282115c7f5d25e2aa392efe0c1c5842c72ee9986bf,2024-03-21T12:58:51.093000
CVE-2024-28891,1,1,f405320dab5b2a31ad98c52f834cfeea6b90287b02c5ba48d14ebaf161736ecb,2024-03-21T22:15:12.510000
CVE-2024-28916,0,0,3588de3801d3f24953276fa6b57f2d684fb38fc8b3ed3ad7d8613e127e6022b7,2024-03-21T12:58:51.093000
CVE-2024-29018,0,0,996b521b7d9365d8d41596984cc4ea0a166d70f0fc41d183b4857a8a3632cdd4,2024-03-21T12:58:51.093000
CVE-2024-29026,0,0,ae12b0436e3ecdf28001034b69d1ac66de23f0f8b6b646a25aa4e89d5c652db8,2024-03-21T12:58:51.093000
@ -242334,10 +242351,10 @@ CVE-2024-29143,0,0,a3f92e2c9ae6aaf4168f841be16c13a544cace199faa049656661980aa53e
CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24c8f,2024-03-18T12:38:25.490000
CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000
CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000
CVE-2024-29180,0,1,e32bebc90fbd05fe3a3edfae9506df906c8ca56e295fcb3cc3f3f384d12528c8,2024-03-21T19:47:03.943000
CVE-2024-29180,0,0,e32bebc90fbd05fe3a3edfae9506df906c8ca56e295fcb3cc3f3f384d12528c8,2024-03-21T19:47:03.943000
CVE-2024-29243,0,0,80b3eab65af2d9fbeb7b6048e074697688a19de63e1138c377d0b826523dd7db,2024-03-21T15:24:35.093000
CVE-2024-29244,0,0,ab4dadc4ff7b45a2c285edb922de956bae0828f007627c62339f15145e95a7b7,2024-03-21T15:24:35.093000
CVE-2024-29374,1,1,f8a146770d52182e0c10b15b21ebc5da7e22091690385e976078b28de6736be7,2024-03-21T19:47:03.943000
CVE-2024-29374,0,0,f8a146770d52182e0c10b15b21ebc5da7e22091690385e976078b28de6736be7,2024-03-21T19:47:03.943000
CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000
CVE-2024-29469,0,0,acf93e04574e9669a29498319a75720c9b5a03ff4de2c06070b1f52ac9f365b7,2024-03-21T12:58:51.093000
CVE-2024-29470,0,0,ec8cc83a60b9ef7edaa49e0605acc097203825f31a2e1ca35494b606ac2473df,2024-03-21T12:58:51.093000
@ -242362,4 +242379,4 @@ CVE-2024-29877,0,0,5b6a7271e346dceec62c9141f9ae12b0e5342a31cc26366c653fe20c26c8b
CVE-2024-29878,0,0,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dda8d,2024-03-21T15:24:35.093000
CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000
CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000
CVE-2024-29916,0,1,dd300e18b662f862d3dd0881eace85d81be3f3aaeb79c908bcef100a80a89dd1,2024-03-21T19:47:03.943000
CVE-2024-29916,0,0,dd300e18b662f862d3dd0881eace85d81be3f3aaeb79c908bcef100a80a89dd1,2024-03-21T19:47:03.943000

Can't render this file because it is too large.