mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-04-13T14:00:38.133526+00:00
This commit is contained in:
parent
83e684e916
commit
31b4a39fc2
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48627",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-02T22:15:46.930",
|
||||
"lastModified": "2024-03-04T13:58:23.447",
|
||||
"lastModified": "2024-04-13T12:15:10.870",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -28,9 +28,17 @@
|
||||
"url": "https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/815be99d934e3292906536275f2b8d5131cdf52c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c8686c014b5e872ba7e334f33ca553f14446fc29",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52458",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-23T15:15:08.340",
|
||||
"lastModified": "2024-02-23T16:14:43.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-04-13T12:15:11.020",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -24,6 +24,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/6f64f866aa1ae6975c95d805ed51d7e9433a0016",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8f6dfa1f1efe6dcca2d43e575491d8fcbe922f62",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bcdc288e7bc008daf38ef0401b53e4a8bb61bbe5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52482",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-29T06:15:46.103",
|
||||
"lastModified": "2024-02-29T13:49:29.390",
|
||||
"lastModified": "2024-04-13T12:15:11.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -28,6 +28,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e7ea043bc3f19473561c08565047b3f1671bf35d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52488",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-11T18:15:16.603",
|
||||
"lastModified": "2024-04-10T15:16:03.963",
|
||||
"lastModified": "2024-04-13T12:15:11.160",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -24,6 +24,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4e37416e4ee1b1bc17364a68973e0c63be89e611",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52620",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-21T11:15:28.230",
|
||||
"lastModified": "2024-03-21T12:58:51.093",
|
||||
"lastModified": "2024-04-13T12:15:11.230",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -20,6 +20,18 @@
|
||||
"url": "https://git.kernel.org/stable/c/00b19ee0dcc1aef06294471ab489bae26d94524e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/116b0e8e4673a5faa8a739a19b467010c4d3058c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/49ce99ae43314d887153e07cec8bb6a647a19268",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6f3ae02bbb62f151b19162d5fdc9fe3d48450323",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b7be6c737a179a76901c872f6b4c1d00552d9a1b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26642",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-21T11:15:28.293",
|
||||
"lastModified": "2024-04-10T15:16:04.360",
|
||||
"lastModified": "2024-04-13T12:15:11.297",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -35,6 +35,18 @@
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c0c2176d1814b92ea4c8e7eb7c9cd94cd99c1b12",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e4988d8415bd0294d6f9f4a1e7095f8b50a97ca9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e9a0d3f376eb356d54ffce36e7cc37514cbfbd6f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fe40ffbca19dc70d7c6b1e3c77b9ccb404c57351",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26643",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-21T11:15:28.340",
|
||||
"lastModified": "2024-04-10T15:16:04.420",
|
||||
"lastModified": "2024-04-13T12:15:11.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -35,6 +35,14 @@
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b2d6f9a5b1cf968f1eaa71085ceeb09c2cb276b1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e2d45f467096e931044f0ab7634499879d851a5c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/edcf1a3f182ecf8b6b805f0ce90570ea98c5f6bf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26654",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-01T09:15:51.063",
|
||||
"lastModified": "2024-04-10T15:16:04.467",
|
||||
"lastModified": "2024-04-13T12:15:11.400",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -24,6 +24,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/3c907bf56905de7d27b329afaf59c2fb35d17b04",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4206ad65a0ee76920041a755bd3c17c6ba59bba2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/61d4787692c1fccdc268ffa7a891f9c149f50901",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
@ -36,9 +40,17 @@
|
||||
"url": "https://git.kernel.org/stable/c/9d66ae0e7bb78b54e1e0525456c6b54e1d132046",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/aa39e6878f61f50892ee2dd9d2176f72020be845",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e955e8a7f38a856fc6534ba4e6bffd4d5cc80ac3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/eeb2a2ca0b8de7e1c66afaf719529154e7dc60b2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26687",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-03T15:15:52.313",
|
||||
"lastModified": "2024-04-10T15:16:04.520",
|
||||
"lastModified": "2024-04-13T12:15:11.463",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0fc88aeb2e32b76db3fe6a624b8333dbe621b8fd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/20980195ec8d2e41653800c45c8c367fa1b1f2b4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
@ -24,6 +28,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/585a344af6bcac222608a158fc2830ff02712af5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9470f5b2503cae994098dea9682aee15b313fa44",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9be71aa12afa91dfe457b3fb4a444c42b1ee036b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26810",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-05T09:15:09.230",
|
||||
"lastModified": "2024-04-10T15:16:04.580",
|
||||
"lastModified": "2024-04-13T12:15:11.527",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -24,6 +24,14 @@
|
||||
"url": "https://git.kernel.org/stable/c/04a4a017b9ffd7b0f427b8c376688d14cb614651",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1e71b6449d55179170efc8dee8664510bb813b42",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3dd9be6cb55e0f47544e7cdda486413f7134e3b3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3fe0ac10bd117df847c93408a9d428a453cd60e5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26812",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-05T09:15:09.283",
|
||||
"lastModified": "2024-04-10T15:16:04.683",
|
||||
"lastModified": "2024-04-13T12:15:11.580",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -24,6 +24,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/18c198c96a815c962adc2b9b77909eec0be7df4d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/27d40bf72dd9a6600b76ad05859176ea9a1b4897",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4c089cefe30924fbe20dd1ee92774ea1f5eca834",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
@ -39,6 +43,10 @@
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7d29d4c72c1e196cce6969c98072a272d1a703b3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b18fa894d615c8527e15d96b76c7448800e13899",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26813",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-05T09:15:09.340",
|
||||
"lastModified": "2024-04-10T15:16:04.730",
|
||||
"lastModified": "2024-04-13T12:15:11.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,14 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/07afdfd8a68f9eea8db0ddc4626c874f29d2ac5e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/09452c8fcbd7817c06e8e3212d99b45917e603a5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0f8d8f9c2173a541812dd750529f4a415117eb29",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26814",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-05T09:15:09.393",
|
||||
"lastModified": "2024-04-10T15:16:04.777",
|
||||
"lastModified": "2024-04-13T12:15:11.683",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/7447d911af699a15f8d050dfcb7c680a86f87012",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a563fc18583ca4f42e2fdd0c70c7c618288e7ede",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/de87511fb0404d23b6da5f4660383b6ed095e28d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
44
CVE-2024/CVE-2024-268xx/CVE-2024-26817.json
Normal file
44
CVE-2024/CVE-2024-268xx/CVE-2024-26817.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-26817",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-13T12:15:11.730",
|
||||
"lastModified": "2024-04-13T12:15:11.730",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\namdkfd: use calloc instead of kzalloc to avoid integer overflow\n\nThis uses calloc instead of doing the multiplication which might\noverflow."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0c33d11153949310d76631d8f4a4736519eacd3a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/315eb3c2df7e4cb18e3eacfa18a53a46f2bf0ef7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8b0564704255c6b3c6a7188e86939f754e1577c0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cbac7de1d9901521e78cdc34e15451df3611f2ad",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e6721ea845fcb93a764a92bd40f1afc0d6c69751",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e6768c6737f4c02cba193a3339f0cc2907f0b86a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fcbd99b3c73309107e3be71f20dff9414df64f91",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27437",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-05T09:15:09.443",
|
||||
"lastModified": "2024-04-10T15:16:04.823",
|
||||
"lastModified": "2024-04-13T12:15:11.793",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -20,6 +20,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/139dfcc4d723ab13469881200c7d80f49d776060",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/26389925d6c2126fb777821a0a983adca7ee6351",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2a4a666c45107206605b7b5bc20545f8aabc4fa2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
@ -28,6 +32,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/3b3491ad0f80d913e7d255941d4470f4a4d9bfda",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/561d5e1998d58b54ce2bbbb3e843b669aa0b3db5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b7a2f0955ffceffadfe098b40b50307431f45438",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
92
CVE-2024/CVE-2024-37xx/CVE-2024-3720.json
Normal file
92
CVE-2024/CVE-2024-37xx/CVE-2024-3720.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3720",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-13T12:15:11.843",
|
||||
"lastModified": "2024-04-13T12:15:11.843",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in Tianwell Fire Intelligent Command Platform 1.1.1.1 and classified as critical. This vulnerability affects unknown code of the file /mfsNotice/page of the component API Interface. The manipulation of the argument gsdwid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-260572."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/scausoft/cve/blob/main/sql.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.260572",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.260572",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.314922",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-37xx/CVE-2024-3721.json
Normal file
92
CVE-2024/CVE-2024-37xx/CVE-2024-3721.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3721",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-13T12:15:12.087",
|
||||
"lastModified": "2024-04-13T12:15:12.087",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in TBK DVR-4104 and DVR-4216 up to 20240412 and classified as critical. This issue affects some unknown processing of the file /device.rsp?opt=sys&cmd=___S_O_S_T_R_E_A_MAX___. The manipulation of the argument mdb/mdc leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-260573 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/netsecfish/tbk_dvr_command_injection",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.260573",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.260573",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.314969",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-37xx/CVE-2024-3735.json
Normal file
92
CVE-2024/CVE-2024-37xx/CVE-2024-3735.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3735",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-13T13:15:46.600",
|
||||
"lastModified": "2024-04-13T13:15:46.600",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Smart Office up to 20240405. It has been classified as problematic. Affected is an unknown function of the file Main.aspx. The manipulation of the argument New Password/Confirm Password with the input 1 leads to weak password requirements. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB-260574 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "HIGH",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.6
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 4.9,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-521"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mega.nz/file/3MUjTIiB#gMuogm3Vaqk-QLRXMtSS2dqlEJlnBhKal6CjeC-dIF8",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.260574",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.260574",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.311153",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
29
README.md
29
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-13T12:00:37.911025+00:00
|
||||
2024-04-13T14:00:38.133526+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-13T11:15:46.447000+00:00
|
||||
2024-04-13T13:15:46.600000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,20 +33,37 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
245406
|
||||
245410
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2024-3719](CVE-2024/CVE-2024-37xx/CVE-2024-3719.json) (`2024-04-13T11:15:46.447`)
|
||||
- [CVE-2024-26817](CVE-2024/CVE-2024-268xx/CVE-2024-26817.json) (`2024-04-13T12:15:11.730`)
|
||||
- [CVE-2024-3720](CVE-2024/CVE-2024-37xx/CVE-2024-3720.json) (`2024-04-13T12:15:11.843`)
|
||||
- [CVE-2024-3721](CVE-2024/CVE-2024-37xx/CVE-2024-3721.json) (`2024-04-13T12:15:12.087`)
|
||||
- [CVE-2024-3735](CVE-2024/CVE-2024-37xx/CVE-2024-3735.json) (`2024-04-13T13:15:46.600`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `14`
|
||||
|
||||
- [CVE-2022-48627](CVE-2022/CVE-2022-486xx/CVE-2022-48627.json) (`2024-04-13T12:15:10.870`)
|
||||
- [CVE-2023-52458](CVE-2023/CVE-2023-524xx/CVE-2023-52458.json) (`2024-04-13T12:15:11.020`)
|
||||
- [CVE-2023-52482](CVE-2023/CVE-2023-524xx/CVE-2023-52482.json) (`2024-04-13T12:15:11.103`)
|
||||
- [CVE-2023-52488](CVE-2023/CVE-2023-524xx/CVE-2023-52488.json) (`2024-04-13T12:15:11.160`)
|
||||
- [CVE-2023-52620](CVE-2023/CVE-2023-526xx/CVE-2023-52620.json) (`2024-04-13T12:15:11.230`)
|
||||
- [CVE-2024-26642](CVE-2024/CVE-2024-266xx/CVE-2024-26642.json) (`2024-04-13T12:15:11.297`)
|
||||
- [CVE-2024-26643](CVE-2024/CVE-2024-266xx/CVE-2024-26643.json) (`2024-04-13T12:15:11.353`)
|
||||
- [CVE-2024-26654](CVE-2024/CVE-2024-266xx/CVE-2024-26654.json) (`2024-04-13T12:15:11.400`)
|
||||
- [CVE-2024-26687](CVE-2024/CVE-2024-266xx/CVE-2024-26687.json) (`2024-04-13T12:15:11.463`)
|
||||
- [CVE-2024-26810](CVE-2024/CVE-2024-268xx/CVE-2024-26810.json) (`2024-04-13T12:15:11.527`)
|
||||
- [CVE-2024-26812](CVE-2024/CVE-2024-268xx/CVE-2024-26812.json) (`2024-04-13T12:15:11.580`)
|
||||
- [CVE-2024-26813](CVE-2024/CVE-2024-268xx/CVE-2024-26813.json) (`2024-04-13T12:15:11.633`)
|
||||
- [CVE-2024-26814](CVE-2024/CVE-2024-268xx/CVE-2024-26814.json) (`2024-04-13T12:15:11.683`)
|
||||
- [CVE-2024-27437](CVE-2024/CVE-2024-274xx/CVE-2024-27437.json) (`2024-04-13T12:15:11.793`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
34
_state.csv
34
_state.csv
@ -211464,7 +211464,7 @@ CVE-2022-48623,0,0,35796016b2974df38876f788a8262118276143c1be8b81a53a3c19ad98585
|
||||
CVE-2022-48624,0,0,3443005982091900e80529213830120f211c919372f2b4459da27a12e635ec55,2024-02-20T19:50:53.960000
|
||||
CVE-2022-48625,0,0,7bc403b36bf8fdca3e98a9856c6ae990f3da4d13f0f27b5e9dd4164789f34420,2024-02-20T19:50:53.960000
|
||||
CVE-2022-48626,0,0,608fe8fe0e144c1aea3964bfcdd2e2be8bbf971aefa8586dbe4b24c8faaa462a,2024-02-26T16:32:25.577000
|
||||
CVE-2022-48627,0,0,8d95c491eedc721f046531e8435a67c19c4a0a49cbfee863756b7b01a283d860,2024-03-04T13:58:23.447000
|
||||
CVE-2022-48627,0,1,22229bbcfc221c1a66d57361893659703193a672850e59d004737cb18434f698,2024-04-13T12:15:10.870000
|
||||
CVE-2022-48628,0,0,53833f4c493a0dc2eadce20e074749d0beda4aee81d045b4d048c848f17d5c49,2024-03-04T13:58:23.447000
|
||||
CVE-2022-48629,0,0,fa048196d2bfc6b10ff3d7f516159c362398b51507f15ab4e218ad5e1ec3c673,2024-03-21T02:44:43.813000
|
||||
CVE-2022-4863,0,0,5b47f8c32121fc9ba1e1299b8649a0bce6cf67f9d99ee5110f7455ebd1e4dead,2023-01-10T15:19:48.147000
|
||||
@ -236316,7 +236316,7 @@ CVE-2023-52454,0,0,22ebb0b0075370b9ddd1f11dacb5857dfa819e1c67bf8f66b5199dda2b146
|
||||
CVE-2023-52455,0,0,50387c03b1888e13e7e7ba3d95a1c5309a79f1bdc75211d85b07758cabd70d1a,2024-02-23T16:14:43.447000
|
||||
CVE-2023-52456,0,0,e421d9f482810945cd720df8f922a5cf6f052a7c1f0af7e67ffc8a9733b6670c,2024-02-23T16:14:43.447000
|
||||
CVE-2023-52457,0,0,ee1d4e46d28ff504e5b2edea46299d5e9a6be3c5358266e0cb2ffc7fa57e470a,2024-02-23T16:14:43.447000
|
||||
CVE-2023-52458,0,0,088ff46505a656dd22ac8c403b847a5ae6ad379c0f4b53f78f2a0aa21f49e088,2024-02-23T16:14:43.447000
|
||||
CVE-2023-52458,0,1,4179a61058bc469d80baf47d1fe4bca0075a62207d9346d1e8d88a1c46056860,2024-04-13T12:15:11.020000
|
||||
CVE-2023-52459,0,0,ff4a750420417f6e1a73adecde2dedfab2306c936ad4e31af5077c218978412a,2024-02-23T16:14:43.447000
|
||||
CVE-2023-5246,0,0,efc93f05f4d6576c2fefda617ffc50a2cd42a25ecc2a7e9c2794376627e129e7,2023-10-31T11:58:05.363000
|
||||
CVE-2023-52460,0,0,3580a9c6cf57f915a3439bb097f6bfb87395e4435a6db3a971756930a69e16c5,2024-02-23T16:14:43.447000
|
||||
@ -236342,13 +236342,13 @@ CVE-2023-52478,0,0,e7727b47f781bd974caa00b0f17b0f1c13e7b2a080779429ca2db703defab
|
||||
CVE-2023-52479,0,0,74e2a4bc0c2ca4077d2ba42f02481f36f59211372d90954643ec8581193ebb36,2024-02-29T13:49:29.390000
|
||||
CVE-2023-52480,0,0,ae847da01f42b5bfc89505a8246fa13305c2c1a89124f6e4930380aeb4378e88,2024-02-29T13:49:29.390000
|
||||
CVE-2023-52481,0,0,fa57f638dfd8fd8a3eb6d480cf6a0080dd1e7d1971c3bd58c998fc883d6b29cc,2024-02-29T13:49:29.390000
|
||||
CVE-2023-52482,0,0,d9db5f8b040cf022e5cde81df037e8b3728670f3ad42e773d11b877171a467e6,2024-02-29T13:49:29.390000
|
||||
CVE-2023-52482,0,1,79cd047ac2f7665e8b7c1f7855c547f0515c0f302331a5325f8d75f58688909a,2024-04-13T12:15:11.103000
|
||||
CVE-2023-52483,0,0,2a4ebb0c9b1f8206c0612e11bb23dd9226ede2d27e2d0d82dac525d0a27fbaad,2024-02-29T13:49:29.390000
|
||||
CVE-2023-52484,0,0,d5ee2bf5164023741424c58784b9debb4274eef9f1dfe6d2acf7ec42fe245e94,2024-02-29T13:49:29.390000
|
||||
CVE-2023-52485,0,0,22360ef1db3deb325545b1fee92ee4427b382b34368b25bc35165fa19272ea40,2024-02-29T18:06:42.010000
|
||||
CVE-2023-52486,0,0,0d2686cf8d6517410fd567e4f0f862a863cfed944d136f8ff9cc52a527c2a7fb,2024-03-12T12:40:13.500000
|
||||
CVE-2023-52487,0,0,3a3e78ea084186adb0371544efb8f82f408d5369c2752062166753139b8af6aa,2024-03-12T12:40:13.500000
|
||||
CVE-2023-52488,0,0,df56a842e50a7c4a63c98ee3c1e33d83d97b43f72bb5f0b19773232cf92946af,2024-04-10T15:16:03.963000
|
||||
CVE-2023-52488,0,1,bdadbb58bed08ad7e670b79f6e3f0a04334f23098c0a49abd270995749aa84e0,2024-04-13T12:15:11.160000
|
||||
CVE-2023-52489,0,0,592d10c491e88d73f2647fc1cfbd5d6025b5f6441289b918e3a1be0a9b637f92,2024-03-12T12:40:13.500000
|
||||
CVE-2023-5249,0,0,c9a9a73292b795eaae901259118258ec7b799bf56b78d4d6d33ce623b44e08f3,2024-02-13T00:37:35.327000
|
||||
CVE-2023-52490,0,0,622c560311948d3ead282b4c85e1584dfa5c2a8b7f9863e5b3204916300680b6,2024-03-12T12:40:13.500000
|
||||
@ -236492,7 +236492,7 @@ CVE-2023-52617,0,0,0af55b403517bed7905346887f3a1061bb99bf76dd43932b8429b5d4200ff
|
||||
CVE-2023-52618,0,0,140362ac707afd65a2d2b4e8d63e0c86c60c3017e34a4d1e40b3e8d76d4596ad,2024-03-18T12:38:25.490000
|
||||
CVE-2023-52619,0,0,af9aacad25e5d44645425bb3e7286e581cb4e42ee1fef053b65f380d7170e82a,2024-03-18T12:38:25.490000
|
||||
CVE-2023-5262,0,0,188b2795723dd5e5ae42bbb999595af1aab6c08724e9b373f642a4ab4a741811,2024-04-11T01:22:55.800000
|
||||
CVE-2023-52620,0,0,0c767b0256b6a9e35ed2ec5153bd3b41dccada4d8e3f3331f8719fa323b783a9,2024-03-21T12:58:51.093000
|
||||
CVE-2023-52620,0,1,7a6fc9d5b1f3cbf67f69788956145dc89560f1bc4b8e284c6163b68df1cc14ca,2024-04-13T12:15:11.230000
|
||||
CVE-2023-52621,0,0,ee5b542ece925ad3f74b71dba6e811ed8d9ebeb5c23794b8204db003b8fe3ee6,2024-03-27T12:29:41.530000
|
||||
CVE-2023-52622,0,0,579ab7014f8c6573772e7ed059bdd8afab598f9cb719550a5713275580c212f7,2024-04-11T01:22:50.037000
|
||||
CVE-2023-52623,0,0,ce611f60fd27441a502d3a5b8b3168b7a072a59f6f5a448bd9ef5dd3d084a137,2024-03-27T12:29:41.530000
|
||||
@ -242978,8 +242978,8 @@ CVE-2024-26639,0,0,8a473c1426f4ebb022f445f83a8e03ee2f46b4cc924d5c9a8fc1fa54d3a52
|
||||
CVE-2024-2664,0,0,76c2eb15b1304e4432d81aae6c6052bc244d87ac501c2510e16c4e1099abfb8d,2024-04-10T13:23:38.787000
|
||||
CVE-2024-26640,0,0,5cc6b5e042a5b441f74784080591c7d359381cd13aba12bdf63d6c89fc714c33,2024-03-18T12:38:25.490000
|
||||
CVE-2024-26641,0,0,d0ed2cdfb0ff7417cb869a8d4b0f844e96cb33626fa12ef7a8d145f64e7e59f2,2024-03-18T12:38:25.490000
|
||||
CVE-2024-26642,0,0,bf0969833bfd11dc3f95e376c10af1cd463650608dc60f11b1260323f56e9494,2024-04-10T15:16:04.360000
|
||||
CVE-2024-26643,0,0,978bdba67151907cc593b843fbc2080a642bbd3a1d4be71d4f5fc245ffce2203,2024-04-10T15:16:04.420000
|
||||
CVE-2024-26642,0,1,d2e0d803edae72f0bb1df72459245605f31020a70778e2d10c78ed3e6034ddef,2024-04-13T12:15:11.297000
|
||||
CVE-2024-26643,0,1,f3033c3c242f84f7533e65a76128d85d2c549faebd8eca1b20134f170dd88f8a,2024-04-13T12:15:11.353000
|
||||
CVE-2024-26644,0,0,203b33e2c785276e8ae6a3405a7b76860ccc0558fe64b57245d958339598b5ba,2024-03-26T17:09:53.043000
|
||||
CVE-2024-26645,0,0,93d3fc1aa57b86af8386fdfc2bdcc657fc74a8d167576501c1bf6825fbf9da41,2024-03-26T17:09:53.043000
|
||||
CVE-2024-26646,0,0,dccd3fb042f624b294392888bd78f3cb643c796b96f3f1a01e194aa7fd56d552,2024-03-27T12:29:41.530000
|
||||
@ -242991,7 +242991,7 @@ CVE-2024-26650,0,0,a6462e36b1dd6f69ddd876eed038a048534eb12e06d7671796e4cb5890514
|
||||
CVE-2024-26651,0,0,664bc67b3020a550d402c968ae917bf5e5ca3e46c2b2c739e7380a7f1a9e1448,2024-04-03T04:15:11.563000
|
||||
CVE-2024-26652,0,0,83433335e001013ce7fac31bffa4d9f6c5d9ac03e3150fd567d8288efd087e28,2024-03-27T15:49:41.437000
|
||||
CVE-2024-26653,0,0,d049a2565dfb8e2d40a03bd3cfe4e1ae5290c810bf6ab13cfbe1970fbbfbb37e,2024-04-03T14:15:16.520000
|
||||
CVE-2024-26654,0,0,22eeb4eccd6a9bc61afe90968d844d5c15c024c94e9a548769404a198cdc2ac0,2024-04-10T15:16:04.467000
|
||||
CVE-2024-26654,0,1,655669df8bbb0a0a0a6d50bbee0568a816c547a90f8178c8f5523076baacd350,2024-04-13T12:15:11.400000
|
||||
CVE-2024-26655,0,0,ac0b7c61eb26a3582ca4d638572b761a96d74326d8ddfef7479705aa04b577b6,2024-04-03T14:15:16.860000
|
||||
CVE-2024-26656,0,0,5337c8b618800d7ae076a65ae658288f2225d153cd5a33d44f7af43e0758d01a,2024-04-03T14:15:17
|
||||
CVE-2024-26657,0,0,5dc4a9c95210d3424ad527963550b1460b63acfba87b6d5e9086dc26cb8bd63d,2024-04-03T14:15:17.153000
|
||||
@ -243026,7 +243026,7 @@ CVE-2024-26683,0,0,6c5f44f4e0a996eee17bab8d16a07d09ac59770d962422611b733c6dc302b
|
||||
CVE-2024-26684,0,0,8a54aaa18a77dc2662ce76183d24e3ad5d44d55136a6048d03ebfafcb9d4c252,2024-04-02T12:50:42.233000
|
||||
CVE-2024-26685,0,0,016b6b194f23c0215c4c10c671b48cce91aa30d4b98db471a5171101074501c8,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26686,0,0,0734bd058534992a65fc91e2031545067c67a938d385e2881322919d7c691c5a,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26687,0,0,30d517ef6d9e8b23ecf8b5358fc69f99effcdf7a5d6e4d5a96c2377b76b9f450,2024-04-10T15:16:04.520000
|
||||
CVE-2024-26687,0,1,aa18db196af0c39c6f45cd43a623a636988a7e6883cd5d045186df5d09844ef7,2024-04-13T12:15:11.463000
|
||||
CVE-2024-26688,0,0,766d60cb464cd092ce7144bde9a00914f29320c6999063b526311d20ebde8ab8,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26689,0,0,a2a9e05c28c08c98125906b04c7be06a12087a9d28f60436fc33e2bbbd1a8dda,2024-04-03T17:24:18.150000
|
||||
CVE-2024-2669,0,0,dcca6b8e7c3a4b3ccf8ba0024a034ae1918cd94f5317fa98732f03837dbf34df,2024-04-11T01:25:31.210000
|
||||
@ -243162,13 +243162,14 @@ CVE-2024-26807,0,0,dd58971be5b2b7ae4d4d293dc140016766895ff28462656c96a25f4364a4b
|
||||
CVE-2024-26808,0,0,4f31bc304a07232a3baf91061957b820ea1892642e797b2566eb9414b09af675,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26809,0,0,9fe73261a4fc78e6c4eacdd5a51592c430457963a39614d59847053f3066f6fb,2024-04-04T12:48:22.650000
|
||||
CVE-2024-2681,0,0,cb05086c2c8d183d14408cf45e04435cc7af702ab8c219dc1bd4df4ce50beae6,2024-04-11T01:25:32.153000
|
||||
CVE-2024-26810,0,0,8258d06b87c2ee0865663681013faa6f86b788a0534c70735d33ebe3382a5082,2024-04-10T15:16:04.580000
|
||||
CVE-2024-26810,0,1,1b304a2ab8dd45b7f8b668d3ded5617945895b32843d6ccf223d08b5069900cd,2024-04-13T12:15:11.527000
|
||||
CVE-2024-26811,0,0,cee29b2b278372d159ec8640ea5ad6aca2c80b1bf221aa5dbd03d1b241f20b51,2024-04-13T04:15:09.577000
|
||||
CVE-2024-26812,0,0,a664584a1298bea5471d70ccbf705e6ceec4d310a83d2767afd1b5c2c1bf40b8,2024-04-10T15:16:04.683000
|
||||
CVE-2024-26813,0,0,4c4f638ce8eee2493d635f8fa9fa2dcfa78bcffda2b95c03bd9897a64272ebf6,2024-04-10T15:16:04.730000
|
||||
CVE-2024-26814,0,0,be227a06b909e3857d6aa06ff8430a4cb98fc8ed8c299e693a9519701c6ff75a,2024-04-10T15:16:04.777000
|
||||
CVE-2024-26812,0,1,a42c8187b68beb1cc0b158f76e6d556e04202cce9b8d74f10baf062b3b08439c,2024-04-13T12:15:11.580000
|
||||
CVE-2024-26813,0,1,e26d7e44e13f3412bd160f19d0ae99bd36159f47f75a2e8fb78ec9249e2769c3,2024-04-13T12:15:11.633000
|
||||
CVE-2024-26814,0,1,cc1f4c4ee0ddb8caf435f1369c8b74e01b83a1ebb078466c399be2b768271bff,2024-04-13T12:15:11.683000
|
||||
CVE-2024-26815,0,0,133c840a93190196251e236a7b756ae7e6a7f81da1230a3aaac98b433b5182c6,2024-04-10T13:23:38.787000
|
||||
CVE-2024-26816,0,0,38ad8d2b936736e6fe0dcde7d0e9aedff6e9f3f061cfb35587215b4681f05ebb,2024-04-10T19:49:51.183000
|
||||
CVE-2024-26817,1,1,6e7d1b607f6e6ef65a746f02838707f99fa04c3cdd12da2ca45bbcf97004348f,2024-04-13T12:15:11.730000
|
||||
CVE-2024-2682,0,0,0f2a052c92797c0b9eb2b669278d840d43bd9a849bc2ac56884f6083311e897c,2024-04-11T01:25:32.230000
|
||||
CVE-2024-2683,0,0,104be48708f7d1d402bdc35a78c18c31fd0a8b7272f17cf78ee82a1b2a0cf430,2024-04-11T01:25:32.320000
|
||||
CVE-2024-2684,0,0,d200307488a4c53cb6bfcb4610ac70041447f2a6624ac7a8a3daddb966843e8f,2024-04-11T01:25:32.403000
|
||||
@ -243363,7 +243364,7 @@ CVE-2024-2738,0,0,5fb35d0c0d41e4dd44983039c78a20b6332083777e4c71d6cf4c3c9c68efe1
|
||||
CVE-2024-2740,0,0,d811151885dcf4f2b77a4d174a11ca3affaa40577de972dcb33bdeeea321a401,2024-04-11T12:47:44.137000
|
||||
CVE-2024-2741,0,0,72a13180f65eaa34946651eb5c88084bf0e961149a90b72b29d8dddde47c3326,2024-04-11T12:47:44.137000
|
||||
CVE-2024-2742,0,0,0e25f52f0731b3f58f04025755ec9a85b24de4601bb22e58141a1505898ffdb7,2024-04-11T12:47:44.137000
|
||||
CVE-2024-27437,0,0,f1af51868a29781b7162a75b6046cf628cfb350decc8e7e20efcb5961b8fea1f,2024-04-10T15:16:04.823000
|
||||
CVE-2024-27437,0,1,e9cee712db29e34fd6b108aaf7cb3be80806e942c7d7482e1157dfdc051de49f,2024-04-13T12:15:11.793000
|
||||
CVE-2024-27438,0,0,2aea60b4a1b2c2b9fbe16a013c293c52cf237fb88e8c577aa1b3bbbfc664d4e7,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27439,0,0,124ffecc940e3b1aff5b6c15ba45628af60d45a457d4c32687f284efa16b3296,2024-03-19T13:26:46
|
||||
CVE-2024-27440,0,0,f656cf3f867b554b4acbc17eee670f16835e4e41b3c8da203b1b487ef7d6f2b3,2024-03-13T12:33:51.697000
|
||||
@ -245404,4 +245405,7 @@ CVE-2024-3704,0,0,e8b6557f07c3fe3c16a11f9907fbc87710993b702f6563c7d85b780932cbd3
|
||||
CVE-2024-3705,0,0,2bc387e0e063040ff9997a85917ee5054e5d8ff6aa4452dfa552c1e99ffec9f1,2024-04-12T14:15:08.957000
|
||||
CVE-2024-3706,0,0,b84e37b2c552516ee4a0f32cf3830dbd2c73a09095547957d50af0151fcc5c1c,2024-04-12T14:15:09.160000
|
||||
CVE-2024-3707,0,0,eb352789e04f524e5cbaa3cc32eede86c9d34c43271df46831f4e1e1d4795e81,2024-04-12T14:15:09.383000
|
||||
CVE-2024-3719,1,1,e03d656995dfe66b93bd173c249fb6db0bdcf8d2feacbd437303d338aebacf3e,2024-04-13T11:15:46.447000
|
||||
CVE-2024-3719,0,0,e03d656995dfe66b93bd173c249fb6db0bdcf8d2feacbd437303d338aebacf3e,2024-04-13T11:15:46.447000
|
||||
CVE-2024-3720,1,1,dba75910906ed47d630b151ff160ba5a019881e51814ef725d73a0a7704a96f7,2024-04-13T12:15:11.843000
|
||||
CVE-2024-3721,1,1,f5d3d35f427dc34124966606b24ea155040ebf2d0b35e4bf3cb18f4df58428f2,2024-04-13T12:15:12.087000
|
||||
CVE-2024-3735,1,1,b2831ba3b6fcb767a758ece94000c144d7a6ec1aa7a38dd0f665375e75c00d80,2024-04-13T13:15:46.600000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user