Auto-Update: 2024-03-12T23:00:38.203641+00:00

This commit is contained in:
cad-safe-bot 2024-03-12 23:03:26 +00:00
parent 1ff939d10a
commit 3fa311116c
45 changed files with 844 additions and 135 deletions

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42307",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-12T21:15:55.703",
"lastModified": "2024-03-12T21:15:55.703",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting (XSS) vulnerability in Code-Projects Exam Form Submission 1.0 allows attackers to run arbitrary code via \"Subject Name\" and \"Subject Code\" section."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ASR511-OO7/CVE-2023-42307/blob/main/CVE-6",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42308",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-12T21:15:55.787",
"lastModified": "2024-03-12T21:15:55.787",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting (XSS) vulnerability in Manage Fastrack Subjects in Code-Projects Exam Form Submission 1.0 allows attackers to run arbitrary code via the \"Subject Name\" and \"Subject Code\" Section."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ASR511-OO7/CVE-2023-42308/blob/main/CVE-7",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-43279",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-12T22:15:07.197",
"lastModified": "2024-03-12T22:15:07.197",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Null Pointer Dereference in mask_cidr6 component at cidr.c in Tcpreplay 4.4.4 allows attackers to crash the application via crafted tcprewrite command."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/appneta/tcpreplay/issues/824",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-43292",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-12T21:15:55.837",
"lastModified": "2024-03-12T21:15:55.837",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in My Food Recipe Using PHP with Source Code v.1.0 allows a local attacker to execute arbitrary code via a crafted payload to the Recipe Name, Procedure, and ingredients parameters."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ASR511-OO7/CVE-2023-43292/blob/main/CVE-8",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48397",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:16.560",
"lastModified": "2023-12-12T23:39:39.640",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:55.883",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In Init of protocolcalladapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation.\n\n"
"value": "In Init of protocolcalladapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48398",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:16.617",
"lastModified": "2023-12-13T16:34:05.937",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:55.977",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In ProtocolNetAcBarringInfo::ProtocolNetAcBarringInfo() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.\n\n"
"value": "In ProtocolNetAcBarringInfo::ProtocolNetAcBarringInfo() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48399",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:16.670",
"lastModified": "2023-12-13T16:36:24.557",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:56.047",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In ProtocolMiscATCommandAdapter::Init() of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.\n\n"
"value": "In ProtocolMiscATCommandAdapter::Init() of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48401",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:16.720",
"lastModified": "2023-12-12T23:24:39.517",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:56.107",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In GetSizeOfEenlRecords of protocoladapter.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
"value": "In GetSizeOfEenlRecords of protocoladapter.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48402",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:16.933",
"lastModified": "2023-12-12T23:21:11.557",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:56.173",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In ppcfw_enable of ppcfw.c, there is a possible EoP due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
"value": "In ppcfw_enable of ppcfw.c, there is a possible EoP due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48403",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:17.120",
"lastModified": "2023-12-12T19:51:22.450",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:56.243",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In sms_DecodeCodedTpMsg of sms_PduCodec.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure if the attacker is able to observe the behavior of the subsequent switch conditional with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
"value": "In sms_DecodeCodedTpMsg of sms_PduCodec.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure if the attacker is able to observe the behavior of the subsequent switch conditional with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48404",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:17.343",
"lastModified": "2023-12-13T16:40:24.357",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:56.300",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In ProtocolMiscCarrierConfigSimInfoIndAdapter of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
"value": "In ProtocolMiscCarrierConfigSimInfoIndAdapter of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48405",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:17.630",
"lastModified": "2023-12-13T16:47:14.437",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:56.373",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "there is a possible way for the secure world to write to NS memory due to a logic error in the code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.\n\n"
"value": "there is a possible way for the secure world to write to NS memory due to a logic error in the code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48406",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:17.783",
"lastModified": "2023-12-13T16:47:59.943",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:56.447",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "there is a possible permanent DoS or way for the modem to boot unverified firmware due to a logic error in the code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.\n\n"
"value": "there is a possible permanent DoS or way for the modem to boot unverified firmware due to a logic error in the code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48407",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:17.910",
"lastModified": "2023-12-12T19:54:28.383",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:56.517",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "there is a possible DCK won't be deleted after factory reset due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
"value": "there is a possible DCK won't be deleted after factory reset due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48408",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:17.953",
"lastModified": "2023-12-12T23:28:59.970",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:56.573",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In ProtocolNetSimFileInfoAdapter() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.\n\n"
"value": "In ProtocolNetSimFileInfoAdapter() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48409",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:18.000",
"lastModified": "2023-12-12T23:46:43.867",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:56.647",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In gpu_pixel_handle_buffer_liveness_update_ioctl of private/google-modules/gpu/mali_kbase/mali_kbase_core_linux.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
"value": "In gpu_pixel_handle_buffer_liveness_update_ioctl of private/google-modules/gpu/mali_kbase/mali_kbase_core_linux.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48410",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:18.050",
"lastModified": "2023-12-12T23:48:00.343",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:56.713",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In cd_ParseMsg of cd_codec.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
"value": "In cd_ParseMsg of cd_codec.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48411",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:18.097",
"lastModified": "2023-12-12T23:53:08.647",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:56.780",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In SignalStrengthAdapter::FillGsmSignalStrength() of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.\n\n"
"value": "In SignalStrengthAdapter::FillGsmSignalStrength() of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48412",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:18.150",
"lastModified": "2023-12-12T23:56:00.697",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:56.847",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In private_handle_t of mali_gralloc_buffer.h, there is a possible information leak due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
"value": "In private_handle_t of mali_gralloc_buffer.h, there is a possible information leak due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48413",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:18.200",
"lastModified": "2023-12-12T23:58:05.553",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:56.917",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In Init of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation.\n\n"
"value": "In Init of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48414",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:18.253",
"lastModified": "2023-12-13T16:55:22.940",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:56.983",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In the Pixel Camera Driver, there is a possible use after free due to a logic error in the code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.\n\n"
"value": "In the Pixel Camera Driver, there is a possible use after free due to a logic error in the code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48415",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:18.307",
"lastModified": "2023-12-13T16:55:04.633",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:57.050",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In Init of protocolembmsadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
"value": "In Init of protocolembmsadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48416",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:18.360",
"lastModified": "2023-12-13T16:54:45.200",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:57.120",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In multiple locations, there is a possible null dereference due to a missing null check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
"value": "In multiple locations, there is a possible null dereference due to a missing null check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48420",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:18.513",
"lastModified": "2023-12-13T16:54:25.547",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:57.193",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.\n\n"
"value": "there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48421",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:18.560",
"lastModified": "2023-12-13T16:53:57.040",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:57.263",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In gpu_pixel_handle_buffer_liveness_update_ioctl of private/google-modules/gpu/mali_kbase/platform/pixel/pixel_gpu_slc.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
"value": "In gpu_pixel_handle_buffer_liveness_update_ioctl of private/google-modules/gpu/mali_kbase/platform/pixel/pixel_gpu_slc.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48422",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:18.607",
"lastModified": "2023-12-13T16:53:03.923",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:57.330",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In Init of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
"value": "In Init of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-48423",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:18.657",
"lastModified": "2023-12-13T16:52:00.397",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:57.393",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In dhcp4_SetPDNAddress of dhcp4_Main.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
"value": "In dhcp4_SetPDNAddress of dhcp4_Main.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5178",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-11-01T17:15:11.920",
"lastModified": "2024-03-12T15:15:47.210",
"lastModified": "2024-03-12T21:15:57.457",
"vulnStatus": "Modified",
"descriptions": [
{
@ -281,6 +281,10 @@
"url": "https://access.redhat.com/errata/RHSA-2024:1269",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1278",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-5178",
"source": "secalert@redhat.com",

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-0386",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-12T22:15:07.250",
"lastModified": "2024-03-12T22:15:07.250",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The weForms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Referer' HTTP header in all versions up to, and including, 1.6.21 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3047406%40weforms&new=3047406%40weforms&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f436ab65-a59c-4b2a-abc8-a7fc038678dd?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0646",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-17T16:15:47.190",
"lastModified": "2024-03-12T15:15:47.500",
"lastModified": "2024-03-12T21:15:57.700",
"vulnStatus": "Modified",
"descriptions": [
{
@ -185,6 +185,10 @@
"url": "https://access.redhat.com/errata/RHSA-2024:1269",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1278",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-0646",
"source": "secalert@redhat.com",

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-2107",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-12T22:15:07.470",
"lastModified": "2024-03-12T22:15:07.470",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Blossom Spa theme for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.3.4 via generated source. This makes it possible for unauthenticated attackers to extract sensitive data including contents of password-protected or scheduled posts."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=220138%40blossom-spa&new=220138%40blossom-spa&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5e54dbf9-a5d1-413d-96ac-93dd499c21a4?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-22012",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-02-07T16:15:47.687",
"lastModified": "2024-02-15T15:10:05.857",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-12T21:15:57.953",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In TBD of TBD, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
"value": "there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
},
{
"lang": "es",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-23300",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-12T21:15:58.077",
"lastModified": "2024-03-12T21:15:58.077",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in GarageBand 10.4.11. Processing a maliciously crafted file may lead to unexpected app termination or arbitrary code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214090",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-2395",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-12T22:15:07.640",
"lastModified": "2024-03-12T22:15:07.640",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Bulgarisation for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.14. This is due to missing or incorrect nonce validation on several functions. This makes it possible for unauthenticated attackers to generate and delete labels via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034198%40bulgarisation-for-woocommerce&new=3034198%40bulgarisation-for-woocommerce&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4ff1d12e-1129-40d3-8c29-3a46ffc77872?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-24092",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-12T21:15:58.217",
"lastModified": "2024-03-12T21:15:58.217",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in Code-projects.org Scholars Tracking System 1.0 allows attackers to run arbitrary code via login.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ASR511-OO7/CVE-2024-24092/blob/main/CVE-9",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-24093",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-12T21:15:58.370",
"lastModified": "2024-03-12T21:15:58.370",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in Code-projects Scholars Tracking System 1.0 allows attackers to run arbitrary code via Personal Information Update information."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ASR511-OO7/CVE-2024-24093/blob/main/CVE-10",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-24097",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-12T21:15:58.497",
"lastModified": "2024-03-12T21:15:58.497",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting (XSS) vulnerability in Code-projects Scholars Tracking System 1.0 allows attackers to run arbitrary code via the News Feed."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ASR511-OO7/CVE-2024-24097/blob/main/CVE-12",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-24101",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-12T22:15:07.423",
"lastModified": "2024-03-12T22:15:07.423",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Code-projects Scholars Tracking System 1.0 is vulnerable to SQL Injection under Eligibility Information Update."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ASR511-OO7/CVE-2024-24101/blob/main/CVE-14",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2406",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-12T21:15:59.713",
"lastModified": "2024-03-12T21:15:59.713",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in Gacjie Server up to 1.0. This affects the function index of the file /app/admin/controller/Upload.php. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256503."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://note.zhaoj.in/share/7kZiVRqSuiMx",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.256503",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.256503",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-27305",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-12T21:15:58.630",
"lastModified": "2024-03-12T21:15:58.630",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "aiosmtpd is a reimplementation of the Python stdlib smtpd.py based on asyncio. aiosmtpd is vulnerable to inbound SMTP smuggling. SMTP smuggling is a novel vulnerability based on not so novel interpretation differences of the SMTP protocol. By exploiting SMTP smuggling, an attacker may send smuggle/spoof e-mails with fake sender addresses, allowing advanced phishing attacks. This issue is also existed in other SMTP software like Postfix. With the right SMTP server constellation, an attacker can send spoofed e-mails to inbound/receiving aiosmtpd instances. This issue has been addressed in version 1.4.5. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-345"
}
]
}
],
"references": [
{
"url": "https://github.com/aio-libs/aiosmtpd/commit/24b6c79c8921cf1800e27ca144f4f37023982bbb",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/aio-libs/aiosmtpd/security/advisories/GHSA-pr2m-px7j-xg65",
"source": "security-advisories@github.com"
},
{
"url": "https://www.postfix.org/smtp-smuggling.html",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-28236",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-12T21:15:59.027",
"lastModified": "2024-03-12T21:15:59.027",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Vela is a Pipeline Automation (CI/CD) framework built on Linux container technology written in Golang. Vela pipelines can use variable substitution combined with insensitive fields like `parameters`, `image` and `entrypoint` to inject secrets into a plugin/image and \u2014 by using common substitution string manipulation \u2014 can bypass log masking and expose secrets without the use of the commands block. This unexpected behavior primarily impacts secrets restricted by the \"no commands\" option. This can lead to unintended use of the secret value, and increased risk of exposing the secret during image execution bypassing log masking. **To exploit this** the pipeline author must be supplying the secrets to a plugin that is designed in such a way that will print those parameters in logs. Plugin parameters are not designed for sensitive values and are often intentionally printed throughout execution for informational/debugging purposes. Parameters should therefore be treated as insensitive. While Vela provides secrets masking, secrets exposure is not entirely solved by the masking process. A docker image (plugin) can easily expose secrets if they are not handled properly, or altered in some way. There is a responsibility on the end-user to understand how values injected into a plugin are used. This is a risk that exists for many CICD systems (like GitHub Actions) that handle sensitive runtime variables. Rather, the greater risk is that users who restrict a secret to the \"no commands\" option and use image restriction can still have their secret value exposed via substitution tinkering, which turns the image and command restrictions into a false sense of security. This issue has been addressed in version 0.23.2. Users are advised to upgrade. Users unable to upgrade should not provide sensitive values to plugins that can potentially expose them, especially in `parameters` that are not intended to be used for sensitive values, ensure plugins (especially those that utilize shared secrets) follow best practices to avoid logging parameters that are expected to be sensitive, minimize secrets with `pull_request` events enabled, as this allows users to change pipeline configurations and pull in secrets to steps not typically part of the CI process, make use of the build approval setting, restricting builds from untrusted users, and limit use of shared secrets, as they are less restrictive to access by nature."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
},
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://github.com/go-vela/worker/commit/e1572743b008e4fbce31ebb1dcd23bf6a1a30297",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/go-vela/worker/security/advisories/GHSA-pwx5-6wxg-px5h",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-28238",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-12T21:15:59.297",
"lastModified": "2024-03-12T21:15:59.297",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Directus is a real-time API and App dashboard for managing SQL database content. When reaching the /files page, a JWT is passed via GET request. Inclusion of session tokens in URLs poses a security risk as URLs are often logged in various places (e.g., web server logs, browser history). Attackers gaining access to these logs may hijack active user sessions, leading to unauthorized access to sensitive information or actions on behalf of the user. This issue has been addressed in version 10.10.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
},
{
"lang": "en",
"value": "CWE-598"
}
]
}
],
"references": [
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-2ccr-g2rv-h677",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-28239",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-12T21:15:59.513",
"lastModified": "2024-03-12T21:15:59.513",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Directus is a real-time API and App dashboard for managing SQL database content. The authentication API has a `redirect` parameter that can be exploited as an open redirect vulnerability as the user tries to log in via the API URL. There's a redirect that is done after successful login via the Auth API GET request to `directus/auth/login/google?redirect=http://malicious-fishing-site.com`. While credentials don't seem to be passed to the attacker site, the user can be phished into clicking a legitimate directus site and be taken to a malicious site made to look like a an error message \"Your password needs to be updated\" to phish out the current password. Users who login via OAuth2 into Directus may be at risk. This issue has been addressed in version 10.10.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://docs.directus.io/reference/authentication.html#login-using-sso-providers",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/directus/directus/commit/5477d7d61babd7ffc2f835d399bf79611b15b203",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-fr3w-2p22-6w7p",
"source": "security-advisories@github.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-12T21:00:38.064271+00:00
2024-03-12T23:00:38.203641+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-12T20:15:08.853000+00:00
2024-03-12T22:15:07.640000+00:00
```
### Last Data Feed Release
@ -29,34 +29,61 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
241225
241242
```
### CVEs added in the last Commit
Recently added CVEs: `14`
Recently added CVEs: `17`
* [CVE-2022-34321](CVE-2022/CVE-2022-343xx/CVE-2022-34321.json) (`2024-03-12T19:15:47.303`)
* [CVE-2023-30968](CVE-2023/CVE-2023-309xx/CVE-2023-30968.json) (`2024-03-12T20:15:07.347`)
* [CVE-2023-5410](CVE-2023/CVE-2023-54xx/CVE-2023-5410.json) (`2024-03-12T20:15:07.550`)
* [CVE-2024-2031](CVE-2024/CVE-2024-20xx/CVE-2024-2031.json) (`2024-03-12T20:15:08.690`)
* [CVE-2024-2130](CVE-2024/CVE-2024-21xx/CVE-2024-2130.json) (`2024-03-12T20:15:08.853`)
* [CVE-2024-27135](CVE-2024/CVE-2024-271xx/CVE-2024-27135.json) (`2024-03-12T19:15:47.567`)
* [CVE-2024-27317](CVE-2024/CVE-2024-273xx/CVE-2024-27317.json) (`2024-03-12T19:15:47.777`)
* [CVE-2024-27894](CVE-2024/CVE-2024-278xx/CVE-2024-27894.json) (`2024-03-12T19:15:47.970`)
* [CVE-2024-28098](CVE-2024/CVE-2024-280xx/CVE-2024-28098.json) (`2024-03-12T19:15:48.177`)
* [CVE-2024-28112](CVE-2024/CVE-2024-281xx/CVE-2024-28112.json) (`2024-03-12T20:15:07.730`)
* [CVE-2024-28113](CVE-2024/CVE-2024-281xx/CVE-2024-28113.json) (`2024-03-12T20:15:07.933`)
* [CVE-2024-28114](CVE-2024/CVE-2024-281xx/CVE-2024-28114.json) (`2024-03-12T20:15:08.113`)
* [CVE-2024-28121](CVE-2024/CVE-2024-281xx/CVE-2024-28121.json) (`2024-03-12T20:15:08.313`)
* [CVE-2024-28186](CVE-2024/CVE-2024-281xx/CVE-2024-28186.json) (`2024-03-12T20:15:08.503`)
* [CVE-2023-42307](CVE-2023/CVE-2023-423xx/CVE-2023-42307.json) (`2024-03-12T21:15:55.703`)
* [CVE-2023-42308](CVE-2023/CVE-2023-423xx/CVE-2023-42308.json) (`2024-03-12T21:15:55.787`)
* [CVE-2023-43279](CVE-2023/CVE-2023-432xx/CVE-2023-43279.json) (`2024-03-12T22:15:07.197`)
* [CVE-2023-43292](CVE-2023/CVE-2023-432xx/CVE-2023-43292.json) (`2024-03-12T21:15:55.837`)
* [CVE-2024-0386](CVE-2024/CVE-2024-03xx/CVE-2024-0386.json) (`2024-03-12T22:15:07.250`)
* [CVE-2024-2107](CVE-2024/CVE-2024-21xx/CVE-2024-2107.json) (`2024-03-12T22:15:07.470`)
* [CVE-2024-23300](CVE-2024/CVE-2024-233xx/CVE-2024-23300.json) (`2024-03-12T21:15:58.077`)
* [CVE-2024-2395](CVE-2024/CVE-2024-23xx/CVE-2024-2395.json) (`2024-03-12T22:15:07.640`)
* [CVE-2024-2406](CVE-2024/CVE-2024-24xx/CVE-2024-2406.json) (`2024-03-12T21:15:59.713`)
* [CVE-2024-24092](CVE-2024/CVE-2024-240xx/CVE-2024-24092.json) (`2024-03-12T21:15:58.217`)
* [CVE-2024-24093](CVE-2024/CVE-2024-240xx/CVE-2024-24093.json) (`2024-03-12T21:15:58.370`)
* [CVE-2024-24097](CVE-2024/CVE-2024-240xx/CVE-2024-24097.json) (`2024-03-12T21:15:58.497`)
* [CVE-2024-24101](CVE-2024/CVE-2024-241xx/CVE-2024-24101.json) (`2024-03-12T22:15:07.423`)
* [CVE-2024-27305](CVE-2024/CVE-2024-273xx/CVE-2024-27305.json) (`2024-03-12T21:15:58.630`)
* [CVE-2024-28236](CVE-2024/CVE-2024-282xx/CVE-2024-28236.json) (`2024-03-12T21:15:59.027`)
* [CVE-2024-28238](CVE-2024/CVE-2024-282xx/CVE-2024-28238.json) (`2024-03-12T21:15:59.297`)
* [CVE-2024-28239](CVE-2024/CVE-2024-282xx/CVE-2024-28239.json) (`2024-03-12T21:15:59.513`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `26`
* [CVE-2024-0044](CVE-2024/CVE-2024-00xx/CVE-2024-0044.json) (`2024-03-12T20:15:07.633`)
* [CVE-2023-48398](CVE-2023/CVE-2023-483xx/CVE-2023-48398.json) (`2024-03-12T21:15:55.977`)
* [CVE-2023-48399](CVE-2023/CVE-2023-483xx/CVE-2023-48399.json) (`2024-03-12T21:15:56.047`)
* [CVE-2023-48401](CVE-2023/CVE-2023-484xx/CVE-2023-48401.json) (`2024-03-12T21:15:56.107`)
* [CVE-2023-48402](CVE-2023/CVE-2023-484xx/CVE-2023-48402.json) (`2024-03-12T21:15:56.173`)
* [CVE-2023-48403](CVE-2023/CVE-2023-484xx/CVE-2023-48403.json) (`2024-03-12T21:15:56.243`)
* [CVE-2023-48404](CVE-2023/CVE-2023-484xx/CVE-2023-48404.json) (`2024-03-12T21:15:56.300`)
* [CVE-2023-48405](CVE-2023/CVE-2023-484xx/CVE-2023-48405.json) (`2024-03-12T21:15:56.373`)
* [CVE-2023-48406](CVE-2023/CVE-2023-484xx/CVE-2023-48406.json) (`2024-03-12T21:15:56.447`)
* [CVE-2023-48407](CVE-2023/CVE-2023-484xx/CVE-2023-48407.json) (`2024-03-12T21:15:56.517`)
* [CVE-2023-48408](CVE-2023/CVE-2023-484xx/CVE-2023-48408.json) (`2024-03-12T21:15:56.573`)
* [CVE-2023-48409](CVE-2023/CVE-2023-484xx/CVE-2023-48409.json) (`2024-03-12T21:15:56.647`)
* [CVE-2023-48410](CVE-2023/CVE-2023-484xx/CVE-2023-48410.json) (`2024-03-12T21:15:56.713`)
* [CVE-2023-48411](CVE-2023/CVE-2023-484xx/CVE-2023-48411.json) (`2024-03-12T21:15:56.780`)
* [CVE-2023-48412](CVE-2023/CVE-2023-484xx/CVE-2023-48412.json) (`2024-03-12T21:15:56.847`)
* [CVE-2023-48413](CVE-2023/CVE-2023-484xx/CVE-2023-48413.json) (`2024-03-12T21:15:56.917`)
* [CVE-2023-48414](CVE-2023/CVE-2023-484xx/CVE-2023-48414.json) (`2024-03-12T21:15:56.983`)
* [CVE-2023-48415](CVE-2023/CVE-2023-484xx/CVE-2023-48415.json) (`2024-03-12T21:15:57.050`)
* [CVE-2023-48416](CVE-2023/CVE-2023-484xx/CVE-2023-48416.json) (`2024-03-12T21:15:57.120`)
* [CVE-2023-48420](CVE-2023/CVE-2023-484xx/CVE-2023-48420.json) (`2024-03-12T21:15:57.193`)
* [CVE-2023-48421](CVE-2023/CVE-2023-484xx/CVE-2023-48421.json) (`2024-03-12T21:15:57.263`)
* [CVE-2023-48422](CVE-2023/CVE-2023-484xx/CVE-2023-48422.json) (`2024-03-12T21:15:57.330`)
* [CVE-2023-48423](CVE-2023/CVE-2023-484xx/CVE-2023-48423.json) (`2024-03-12T21:15:57.393`)
* [CVE-2023-5178](CVE-2023/CVE-2023-51xx/CVE-2023-5178.json) (`2024-03-12T21:15:57.457`)
* [CVE-2024-0646](CVE-2024/CVE-2024-06xx/CVE-2024-0646.json) (`2024-03-12T21:15:57.700`)
* [CVE-2024-22012](CVE-2024/CVE-2024-220xx/CVE-2024-22012.json) (`2024-03-12T21:15:57.953`)
## Download and Usage

View File

@ -200725,7 +200725,7 @@ CVE-2022-34318,0,0,ee2e04bf754c379b5816fa247af6d025f7d7fb33e5911e0d2b30dc09a960f
CVE-2022-34319,0,0,f0c823501e5894965ac6d9ed57d1dd3ca0b8c4ec2d000e9681c588e734d58246,2023-11-07T03:48:32.310000
CVE-2022-3432,0,0,ab6b85a47217749966be4e8c245fb6c573126e20d2b210ad8c76ad8b863a08aa,2023-02-03T18:24:45.757000
CVE-2022-34320,0,0,f002d4c5af5d11d655c22a0753f56cd6a0c984815c5b1258572e0ec1ac87a2e4,2023-11-07T03:48:32.423000
CVE-2022-34321,1,1,446cd9021328420505d05a208772a864fdb91c5d378e2dac68e3b2275050e7cc,2024-03-12T19:15:47.303000
CVE-2022-34321,0,0,446cd9021328420505d05a208772a864fdb91c5d378e2dac68e3b2275050e7cc,2024-03-12T19:15:47.303000
CVE-2022-34322,0,0,56d0797334231c8bcd93b681e8d2bda02e4b07471c6e2bc8568bc8d2e5bef264,2023-01-09T16:16:09.550000
CVE-2022-34323,0,0,9c4360c159eb3e0e14ee838f5ac5709e7de891789deedc7a8e76d748a6394caa,2023-01-09T16:22:36.953000
CVE-2022-34324,0,0,fffbb9155e0ad85a1f120c200fe341013895e51b23d2d39ac3ff8e5e2c0bda6a,2023-01-09T15:24:44.180000
@ -221980,7 +221980,7 @@ CVE-2023-30961,0,0,8584a8dd87c1a1aaad34ee5a0f0aecc09be0b1e2709534bd00668442991f6
CVE-2023-30962,0,0,6db7ed0fc76b123c7c348b8ad22a9d53a6758b482429ec94d4f6b7b94dfb6391,2023-11-07T04:14:09.340000
CVE-2023-30963,0,0,08ee7dab2580679df1423c8057c0fad42f6b01e80febc0319fa9c5ca82aec511,2023-11-07T04:14:09.497000
CVE-2023-30967,0,0,6246ee0f3c942a2c540e2140d832814330936adf9602b9a25b94ff0c0ea5ff12,2023-11-07T04:14:09.610000
CVE-2023-30968,1,1,ea58e673f6861cb74af70a1011c0d65eeea28aeb052d97cb18b036435226e2ba,2024-03-12T20:15:07.347000
CVE-2023-30968,0,0,ea58e673f6861cb74af70a1011c0d65eeea28aeb052d97cb18b036435226e2ba,2024-03-12T20:15:07.347000
CVE-2023-30969,0,0,a59f750e5c2029dcd0d86cb77bfd7d8c64cc03777e913b0707ac5208406c2a4f,2023-11-07T04:14:09.777000
CVE-2023-3097,0,0,6a1aaa0de8b3d9a71561ccbb3842a82101382d140be5defd58eed55410f84016,2024-02-29T01:40:22.320000
CVE-2023-30970,0,0,d7e144174523a7ba80c8e3114e26f5372d070cfac9bf268ac369ee629791ba4d,2024-02-07T21:04:19.733000
@ -229706,6 +229706,8 @@ CVE-2023-42295,0,0,76e92c5a31a1c38c774b96fb948b716fe550c55e664576533af49902b5cab
CVE-2023-42298,0,0,007b09605f4ed7b0628f77a85d1e0a7fe95be1f19353799459bee4c90043a90b,2023-10-17T14:11:02.190000
CVE-2023-42299,0,0,54772fa99a7414f8b4e9da566be57b517ecfcfc76d5e3020251730f7847cac7b,2023-11-10T04:12:40.023000
CVE-2023-4230,0,0,6d7bd5e717f426a79420f1ddb6b096459a8fff7bab939f00eda6d67ab17f196e,2023-09-01T17:12:36.097000
CVE-2023-42307,1,1,45d1a2df0f389c8fa63fbddc3d045032c99edf9943e2d0491d832e5c79e9d05d,2024-03-12T21:15:55.703000
CVE-2023-42308,1,1,c573c8073614954132aaf9f45f54741450bc1aae5095c974a7532814e8b588d2,2024-03-12T21:15:55.787000
CVE-2023-4231,0,0,9fe438b362e987e1bd5478fecc03b722cdeb47042c8b48f7f1a0c8b2252caa0f,2023-09-20T15:34:03.560000
CVE-2023-42319,0,0,87c7f208f7b7fa9dd6600e58b74858fba05deaefd76c0c4895dbb2329a41e4f1,2023-10-25T17:39:00.483000
CVE-2023-42320,0,0,3e7352de3aa6a2b56fea495ac18def69c814404eafb546927db3da5449ccca60,2023-09-21T17:37:44.687000
@ -230339,11 +230341,13 @@ CVE-2023-43271,0,0,eed1b842f51121f55ac61b5e82eb82d797b3d3f51dfbd7f29fc145284b338
CVE-2023-43274,0,0,9a76a4f96bdabc078eca25d6d30a731c62d6b0536040a8aceec7ed331b2ca0b6,2023-09-22T02:15:02.017000
CVE-2023-43275,0,0,a66f26a59cf0c59ffad4695c3eab962513cd731b129f69d22d80e3df142a296d,2023-11-21T01:51:11.677000
CVE-2023-43278,0,0,0f16c98f2e89fb91931050970b11d8655bc98d54c38b788f418cf003b78d9eeb,2023-09-26T14:38:05.117000
CVE-2023-43279,1,1,2678cdcd59ab90e0f89a0665657286053085312598cfa175ef26706c460adaca,2024-03-12T22:15:07.197000
CVE-2023-4328,0,0,371da3fc45b68a0efdcfc87a7f560b95fe448a3483245968bf37f1cf8be27bcb,2023-09-08T16:15:07.617000
CVE-2023-43281,0,0,56d43eafc66518f898f0c81e127f487e22af687eefeb51260967c6407c7cc8cd,2023-11-07T04:21:19.967000
CVE-2023-43284,0,0,653c4223aeac7f457d39a3cd2a7626ef038d14cf3e013b79b9dc69a51dc40b3f,2023-11-22T15:15:09.303000
CVE-2023-4329,0,0,90fe3f782a7469dbb8dc6b664c1989f544ff51163f32a419f94813e920dd2bfb,2023-08-21T18:40:42.853000
CVE-2023-43291,0,0,64cc543ad8e57e146c4c6543666077d8703324efdb6007c729232dedfd630bf7,2023-09-29T17:25:25.957000
CVE-2023-43292,1,1,8984c00ed269eab5f777ec84581090cf0edba80b882ca9e4ec98608d4da6d92b,2024-03-12T21:15:55.837000
CVE-2023-43295,0,0,d41dfbf2d27d545700ba100e9d0c77ed6c69cab56ee2253e8c0673d945370ad2,2023-11-08T18:29:14.447000
CVE-2023-43297,0,0,374096ab4bf7ab967d0bbb01a3ffd5cc0aa9699b3cf19a9c8bc527d59afc2d82,2023-10-04T17:05:58.947000
CVE-2023-43298,0,0,f801a5ee7a9cb995161a69130501b1f7660522a40ea1936619259f0399769d3a,2023-12-11T17:48:50.780000
@ -233488,35 +233492,35 @@ CVE-2023-48392,0,0,8477dfef0ae02c8ac4ae7fb286fa250f75ccfcf4d82395707585be88def83
CVE-2023-48393,0,0,eb2be5ce9484bf33d839a19d622d5eddc9bdd71b5929ac2b7d10360261b406c7,2023-12-22T15:43:05.987000
CVE-2023-48394,0,0,f94761a9a5fbb3d781474d8e0613186d5590df306bf2d0244fbcea680aefe60d,2023-12-22T15:33:02.573000
CVE-2023-48395,0,0,a9b9ed9a0819a6cf1c7799cd009229fdc89125af333a902c4dfe6e9500197b73,2023-12-22T15:28:27.923000
CVE-2023-48397,0,0,bba85537bb9d9070a0e33a6c69719e5815c9555e87354c48c68658b985ce2bcd,2023-12-12T23:39:39.640000
CVE-2023-48398,0,0,5bf57bd82696309ae4b2bebe6e0acdd24f2a98bd3c945886f1fcbf53438030fd,2023-12-13T16:34:05.937000
CVE-2023-48399,0,0,2e4c05a9b13a7c9f1ebd1d1f2cd0c06aec9e4617a01d74bf7b535f19b30a0203,2023-12-13T16:36:24.557000
CVE-2023-48397,0,1,0f40b74572849e3a169abd20f43288ffd47c3f304a447bf084f9f58d617acb69,2024-03-12T21:15:55.883000
CVE-2023-48398,0,1,0ee13cfc0f74ebfbd120c2c41be8e19aea8f2631ca53a29a78c716d1509f071f,2024-03-12T21:15:55.977000
CVE-2023-48399,0,1,cbe5d65fc5119cd7c6a033a21577a316806fd2afb315505e38b941aee68389e5,2024-03-12T21:15:56.047000
CVE-2023-4840,0,0,3e4a9cf58aed2b9d885199221a18ba07ef8aca70c40e8bba027cbd3a3145be70,2023-11-07T04:23:01.510000
CVE-2023-48401,0,0,c675ad2386d514e82edf6fd4692503b2f998f5dde4dd2df36b39f4659b5cccab,2023-12-12T23:24:39.517000
CVE-2023-48402,0,0,b3ecf52195288f6dfaaa9722abd0327c04096a6c800ca4c8d1117467aa983f2e,2023-12-12T23:21:11.557000
CVE-2023-48403,0,0,ec20f792698e5a903bcc6bd84537b5635d8ed90dd7cf9bbdd77528ad94e8fe61,2023-12-12T19:51:22.450000
CVE-2023-48404,0,0,1bcbc2c18bbe73fb96cb5131151986d8ddd11d3cf85cab07ce71badb2394c54a,2023-12-13T16:40:24.357000
CVE-2023-48405,0,0,fa677e9709a659ac6f4d769ec2887818b253ce43eb953d88566a8c0f479f2293,2023-12-13T16:47:14.437000
CVE-2023-48406,0,0,2537b6662f98ac5591904779e53a04619ec3845937c4fb952336fd4ccd43cc3f,2023-12-13T16:47:59.943000
CVE-2023-48407,0,0,171b877c11c322b1beb0640144dabef0f428accd1bafd230b4401d1f00ea0eb2,2023-12-12T19:54:28.383000
CVE-2023-48408,0,0,7742e0ecddada067f5865249ba2ef27cf99d3692db06374c83bc97b5c27b3348,2023-12-12T23:28:59.970000
CVE-2023-48409,0,0,e0cc6432fb901069befdb9d8ae030afaf3b1bfde21358ea92e76e57116e2a4b5,2023-12-12T23:46:43.867000
CVE-2023-48401,0,1,08309828fbac2da2201c401c43351b14e965e5f974d316f85c266d41023d3ebc,2024-03-12T21:15:56.107000
CVE-2023-48402,0,1,5642f525775a05cce3f6688725d6bd9fec34ae21e538fc2942fc156775ca6e99,2024-03-12T21:15:56.173000
CVE-2023-48403,0,1,c5fb049993a5647af435807971a0e9f7ec05b718035f893d61577f72ae6ae723,2024-03-12T21:15:56.243000
CVE-2023-48404,0,1,106e89599f75b51f1c079e853f148819bfaef1dab07de54623396392ed66dae4,2024-03-12T21:15:56.300000
CVE-2023-48405,0,1,d42cb2b5604ced985b09b5cc8f78215d18ee8047294239cea09d9d315c6d324b,2024-03-12T21:15:56.373000
CVE-2023-48406,0,1,b222d4050aa8bb3ddfc44b99e05d7440937d66769ed1400c1b83356ee3dce84a,2024-03-12T21:15:56.447000
CVE-2023-48407,0,1,047ee1f6dcf289e28b372a9fd3234522d6750de34e8663f5573fb5a17bef8fb7,2024-03-12T21:15:56.517000
CVE-2023-48408,0,1,db84ee177e1761fe6dd407a303c23e4a4ea3cd3f318d28cb89f7adf8ff1410ad,2024-03-12T21:15:56.573000
CVE-2023-48409,0,1,c542d952c79013b65a101348b69eea108202aa6eae292a78e7bd258331562e32,2024-03-12T21:15:56.647000
CVE-2023-4841,0,0,c770863e8c8f8968d3e90ab3f02dd981ac57a21e6f686867bd70194745191938,2023-11-07T04:23:01.670000
CVE-2023-48410,0,0,523ee4c5c72c84e3164fbf4e54d8b6501372273d3150f8d25fe9510d4d913a62,2023-12-12T23:48:00.343000
CVE-2023-48411,0,0,50747fa23a36e8d924d9dcd04a5cf55507824d79fed1599a664172f80a3984ef,2023-12-12T23:53:08.647000
CVE-2023-48412,0,0,60e58744f5cd04e64b8ec8fead848556ca7523bbac836fb9ddee87244e71f7e3,2023-12-12T23:56:00.697000
CVE-2023-48413,0,0,5c60b5744bb2abc983b2391aa69e0aae144cf80913e0e083824589eeb70c156b,2023-12-12T23:58:05.553000
CVE-2023-48414,0,0,aaffd247b093dc1207a0589af67012db58f1729e6bd49231b3aa452de6873880,2023-12-13T16:55:22.940000
CVE-2023-48415,0,0,342a4c028db4d1b82e30399c78695e05a4fa5c7f955b5403ef92520a59ee35ed,2023-12-13T16:55:04.633000
CVE-2023-48416,0,0,9dcfb0c53fee115683b23d470baf2910f5d8d8f30ea746cfd8d280bc5eb39928,2023-12-13T16:54:45.200000
CVE-2023-48410,0,1,af547016a9acdbd2cc71df01f11d24a9d232cfb119d903f7735b56065d62011b,2024-03-12T21:15:56.713000
CVE-2023-48411,0,1,28da38c328b7fd06e522e25d33bb0143abd27f067c4280c7aea9dcf9056b0d02,2024-03-12T21:15:56.780000
CVE-2023-48412,0,1,5d77528d725fc576b002cfcd485f4cea5cbafc1adc6bc648aaa7f141b5758deb,2024-03-12T21:15:56.847000
CVE-2023-48413,0,1,be85476956d2ff1203c58a8c28c1a21f7cf6ba919b26c06f65d335b8b1b99fd7,2024-03-12T21:15:56.917000
CVE-2023-48414,0,1,aed27422040af7906c3cb4e7da8c86a49146a1cff1cacfb5725755498be100b9,2024-03-12T21:15:56.983000
CVE-2023-48415,0,1,208c823bbb6c1a60d9a3787f306baa165c814709fdf6b2a030c581bf2f86c4d3,2024-03-12T21:15:57.050000
CVE-2023-48416,0,1,8841ef659ae8d9a6ce19a537c99726de55cc0b983b041fef8715df5295dfb688,2024-03-12T21:15:57.120000
CVE-2023-48417,0,0,3b5b01174ef20cbdeb7aef20dd756cf66e388b326b198c4100edc6f4242694f7,2023-12-13T21:16:07.527000
CVE-2023-48418,0,0,c2d39a4a01f517f1e3ac0ef4729d2e10af43f99c34b3251ecaa0d9ea8916f084,2024-01-10T23:15:09.053000
CVE-2023-48419,0,0,70e7e5bfa1ffd05c08d649bd2b1327c23a0b8f490997849ec24a5c2cf66ada7c,2024-01-09T15:36:14.850000
CVE-2023-4842,0,0,b6aa8e2fa6a834d6302178f9c141dd0d8500812afc3b1821e3cff82fa288a07d,2023-11-14T19:21:54.333000
CVE-2023-48420,0,0,5ba6cc055366dc0a744d315ae7206f71f6ca698d3a01c8c9b74b817a63eab718,2023-12-13T16:54:25.547000
CVE-2023-48421,0,0,28aa8e00b5bc4c098780b722650187d2c92fad2592bda35949ce9d51dad9aed6,2023-12-13T16:53:57.040000
CVE-2023-48422,0,0,4a797f68a1a22382d7b4a63022610ba87505dddda142253cf526d9211b105f13,2023-12-13T16:53:03.923000
CVE-2023-48423,0,0,b624dc33802dc84494be864ce98befb20fb033895998a4be0c5996d49bfafc25,2023-12-13T16:52:00.397000
CVE-2023-48420,0,1,a219a7b8f8727fa51ccfd4b13f4034f207003e5a75f23fd03a821b8f894e986b,2024-03-12T21:15:57.193000
CVE-2023-48421,0,1,0a65408bf8902031dae43f961f97729015ca806a846f5145d776e72499323a7c,2024-03-12T21:15:57.263000
CVE-2023-48422,0,1,2265830fef50ee17d0cdb88ad1b0f725c4b672e431a26714116d00e7fa2593b6,2024-03-12T21:15:57.330000
CVE-2023-48423,0,1,2592e57664f5009fd3555c0d2a8829a7ac77fb5cd27d61c148279d4e4418e21d,2024-03-12T21:15:57.393000
CVE-2023-48424,0,0,d752209f4f9677c584126eabd07ea41d6bb8ff8455f63189bdf51949cb39720a,2023-12-13T21:16:23.030000
CVE-2023-48425,0,0,10d95bc597f5358cb6e581ae2a0843df083fdc479dc30e50327f5f3a3887f611,2023-12-13T21:16:31.457000
CVE-2023-48427,0,0,adee4e0ef84fd45ed140951044cc3843719374b6b3ccca3202590ca4c66a74c7,2023-12-14T20:07:17.240000
@ -235431,7 +235435,7 @@ CVE-2023-51773,0,0,8f846ca150db66d0b80073ac6f518008babc62296a2b97f49439a329f7415
CVE-2023-51774,0,0,fefdc22f78e7e05f25a3f4e35760275c17174e95fd4fc343f6a5c594077f56bb,2024-02-29T13:49:47.277000
CVE-2023-51775,0,0,d19885f765b5b97855c2cc0c3f3642c970a937503b8bc204147850896ff7aeb9,2024-02-29T13:49:47.277000
CVE-2023-51779,0,0,12b82d26e314364b82a1986c3c91216c9a108f09c5dc18b48ab69ac05149b4b3,2024-02-29T13:49:47.277000
CVE-2023-5178,0,0,e2356912d3d1775d46fdb546e960d63b505f24bb763e701446a1e27acb754748,2024-03-12T15:15:47.210000
CVE-2023-5178,0,1,86d12270da0d2773b51c729f3417bbdc491f365442b885cf65f79a69950fce2b,2024-03-12T21:15:57.457000
CVE-2023-51780,0,0,a16a72c66560dfdcb72edd12fb9c9ab59947cff8de82bf627e84355dea3d28bf,2024-02-01T18:51:15.553000
CVE-2023-51781,0,0,943dcd6bc9ca41b409437da8a4375ab31f17544ddbdf352ff447f72ff83a2193,2024-01-18T19:58:50.630000
CVE-2023-51782,0,0,4b4197672003cf4578a2bf0f31c16f034d56fceca2a499cb095add5bbd47b401,2024-01-18T19:31:37.630000
@ -236086,7 +236090,7 @@ CVE-2023-5399,0,0,2d6fd5d7032d3fde2b56bbe17324f865d32db5a9ef5d31298ecfc991427861
CVE-2023-5402,0,0,d6ca0e0d138e7f0e18108bc80eb991912358210793d36b8686051b13c8765059,2023-10-11T19:19:54.037000
CVE-2023-5408,0,0,443628942e473656420f67d7b7b9b3fa498d5d13f709544aa261b0e4696090c6,2024-01-21T01:48:09.767000
CVE-2023-5409,0,0,fbd015e1d6485109c973409b573d46ee4742f3527e9f86b450178ea53a356496,2023-10-20T15:42:22.057000
CVE-2023-5410,1,1,0284e238f9d9814a3572987bc4c5bf280dfeeba7f5b91c1b33a5bdaf6b68058c,2024-03-12T20:15:07.550000
CVE-2023-5410,0,0,0284e238f9d9814a3572987bc4c5bf280dfeeba7f5b91c1b33a5bdaf6b68058c,2024-03-12T20:15:07.550000
CVE-2023-5411,0,0,f4bcf198f04caf620b198f0ec2918fa9ded24d58a6bd16b2268e79d389820a85,2023-11-27T20:15:34.987000
CVE-2023-5412,0,0,2f9efa39e9d561fae0d9329c540519d3815f404c05c03f1dd3e24b81dea0248f,2023-11-07T04:23:58.473000
CVE-2023-5413,0,0,3a28d9238b6e8c0f4006a763334223fef1ed160db83bc352e308332373363a30,2023-12-22T19:50:32.857000
@ -237592,7 +237596,7 @@ CVE-2024-0038,0,0,8798af074e75acf30506472783c98fe3ca6f9989b456036fb13460ce3a0660
CVE-2024-0039,0,0,eef2053d277ee92cf2426457ee1c3166f51184d93b11850784119e4a32b8f532,2024-03-12T12:40:13.500000
CVE-2024-0040,0,0,4afedb45d19d9a2df9a3ecdcf577c422a3b0751bcf061eb077253f060c2e8e31,2024-02-16T13:37:51.433000
CVE-2024-0041,0,0,4dc5cf8202a81389ba1711e9ab4229bb6c315c100ad135fbbcb3e9e75477a4a9,2024-02-16T13:37:51.433000
CVE-2024-0044,0,1,252052610b4ae0ffd4cf0806647555b0208a30970458880cb5d65b093fa59399,2024-03-12T20:15:07.633000
CVE-2024-0044,0,0,252052610b4ae0ffd4cf0806647555b0208a30970458880cb5d65b093fa59399,2024-03-12T20:15:07.633000
CVE-2024-0045,0,0,74be948ede2409dd1fced42dd7b971d5edcab5dd8de9a50e019ab3d0529aa80e,2024-03-12T12:40:13.500000
CVE-2024-0046,0,0,559bea19cfab8f318d743976cea70838a7c0266c66f3f824e506f47669c918de,2024-03-12T12:40:13.500000
CVE-2024-0047,0,0,04136819bdba13d79de536bc61d32ae3710c87bdb217042ab64bc2b648e573cf,2024-03-12T12:40:13.500000
@ -237784,6 +237788,7 @@ CVE-2024-0380,0,0,3f3894f5083e9ad8feafa10eee28775174e246729c7af4fbf8093c7f923985
CVE-2024-0381,0,0,cc404e9ab60526f4cfd2cba8d7ea8cb6a7e1eef465808eab04f8e02e2e2ed4df,2024-01-24T20:48:35.827000
CVE-2024-0382,0,0,ab33ccbf2aeb6736aa9a498513aba9dba3b237c3d9fe3e776d686fd399098525,2024-02-07T23:32:02.143000
CVE-2024-0384,0,0,5eba97ede5e4794d92f0b763409403bdfcbde410a2df433510faaeddc85a4fb3,2024-02-07T23:32:14.717000
CVE-2024-0386,1,1,9924a53603d4063f6e8699ad337382287b8e5b405311999ccd3513eded448017,2024-03-12T22:15:07.250000
CVE-2024-0387,0,0,23bc6e3476c46e45c0f1cab9e646ec38242c781b5838e9b0de1712412e6d8882,2024-02-26T16:32:25.577000
CVE-2024-0389,0,0,72b9f5269adae6a8b489d96d3cadfcb14eda75cc21b32e2278bad2966709f2e2,2024-02-29T01:43:10.310000
CVE-2024-0390,0,0,9f797e4a099c94c2da0407f1b9d4e4b6fb9f46975b208cacd9e42b322aa5198b,2024-02-15T14:28:31.380000
@ -237990,7 +237995,7 @@ CVE-2024-0641,0,0,a011c2128d997633c3943566b2966020fb742742c755347ad42b0febd95e30
CVE-2024-0642,0,0,a90bcf6571ee802087327f525ede816b704f8421563c66e3216693601bbf1072,2024-01-24T19:29:41.893000
CVE-2024-0643,0,0,aa848a8e1b8cfe92b510534ff6e1f903f998e7f6bc6404cff677acb1bb355f8f,2024-01-24T19:27:40.553000
CVE-2024-0645,0,0,e3ff0667dc75a2979d99db4153cc7d61b0ceb0c517f4cea54262eeab768eb5f4,2024-01-24T19:24:06.717000
CVE-2024-0646,0,0,5b93560dc0c0c8396f3595849fb8d36ea15972a8e86d2ce05bdc314d3bd99591,2024-03-12T15:15:47.500000
CVE-2024-0646,0,1,f2a78614a32819d4cbc20fc1d4755689f2378ca167d665ff617b66a50666d959,2024-03-12T21:15:57.700000
CVE-2024-0647,0,0,0332e6d59eefdc64eb05b07e4fa46b058d042ccaea99c8f45f753fe35b015cbb,2024-02-29T01:43:23.930000
CVE-2024-0648,0,0,a4f5a25e8c9710190b25da008c97da5d141e1a6619a4b29f822c0647da977a03,2024-02-29T01:43:24.013000
CVE-2024-0649,0,0,1ed5652bc1679829cc2258e6f05d507deca75bc30838839b4d286f0055698888,2024-02-29T01:43:24.097000
@ -238797,7 +238802,7 @@ CVE-2024-20292,0,0,bd2670c9582b587cdf9a7328c2351789f5b8997cab8f7bfcaca92954507c5
CVE-2024-20294,0,0,1d3a9a3e9164827aaec419fc6a9a7d933913e3a790dc40da7ac082a33393bbf9,2024-02-29T13:49:29.390000
CVE-2024-20301,0,0,5731f674f5ae2bcf96420fc328e70e5146901802d1ab3db25461c019cd20961d,2024-03-07T13:52:27.110000
CVE-2024-20305,0,0,ab61a4ab7882e267880cc2c0e6b3ec1ab9c8b4d0dadf3a4832bdf14ae2ae012d,2024-02-15T19:56:38.910000
CVE-2024-2031,1,1,5bfeb27967b53a767d4f0e66673d96688046f9d3e07a3759d7a758301037d76f,2024-03-12T20:15:08.690000
CVE-2024-2031,0,0,5bfeb27967b53a767d4f0e66673d96688046f9d3e07a3759d7a758301037d76f,2024-03-12T20:15:08.690000
CVE-2024-20321,0,0,6de34d7d404f536decd9f5a380e1c4f28760edee84d237a9b02d7c6e56d785b7,2024-03-04T22:45:23.647000
CVE-2024-20325,0,0,dfe1f947bf6fc9efa452f1881c4faae47bd9e909bfa416f69baa534db16c5289,2024-02-22T19:07:27.197000
CVE-2024-20328,0,0,f336e809226305b79cd50f26fae203aa1632211d86957dd92abacb2f83d51af6,2024-03-01T22:22:25.913000
@ -239037,9 +239042,10 @@ CVE-2024-20984,0,0,585d056539d5b2a7ec102aa133531262bc58f31d6c087eb30a1c927656ef9
CVE-2024-20985,0,0,1887d4efcd4074083ed6001311349bddeba13ac350578caa9144fb2633e7d1e2,2024-02-02T17:27:12.127000
CVE-2024-20986,0,0,55fd916bbc66a048aba24029df1cdbff6d17cbdc5963bc85efdc3f349c48d99c,2024-02-20T19:50:53.960000
CVE-2024-20987,0,0,e6a4199f934ca8909c51db00ae903048e2b51791ebdf6565c06b10750c7af3ef,2024-01-20T18:30:16.877000
CVE-2024-2107,1,1,10d51b6595aaf59e536b37822b146f4fcc0220ec802d17f13fff42f31c495164,2024-03-12T22:15:07.470000
CVE-2024-2127,0,0,7e732da9362123c901ed00a29dfcc3ca896b81c43d152f47d3b1708469785552,2024-03-08T14:02:57.420000
CVE-2024-2128,0,0,b758ae1e45bbf3f98be89f21520e72433f96873d6cb56cc91a1f688f1fc159ac,2024-03-08T14:02:57.420000
CVE-2024-2130,1,1,283fcf0cb4a654837bfd93e16223a37a8ecb981b76489657d60e28f66456292b,2024-03-12T20:15:08.853000
CVE-2024-2130,0,0,283fcf0cb4a654837bfd93e16223a37a8ecb981b76489657d60e28f66456292b,2024-03-12T20:15:08.853000
CVE-2024-21304,0,0,2e98a12f2b0e3643480c1614b35417778c5dac15f77eda4338c6776607aa2617,2024-02-27T18:04:06.027000
CVE-2024-21305,0,0,add765edb797e1537c086895a6f6b6be7c9ee2d099bfe2aba1b67029d2679780,2024-01-12T18:48:04.967000
CVE-2024-21306,0,0,416302ae665f6d7405fe0853b1869120a9e90d3549a767ac0c8683038e02649c,2024-01-12T18:47:54.860000
@ -239368,7 +239374,7 @@ CVE-2024-22008,0,0,3d18c0dc072786f75e976395b39281f106a7571da48f79c0967f5ea6fc70f
CVE-2024-22009,0,0,94a8a375b23d1ccd5295b6b266b887bb0fd4e6e4f398c4807361c57c45df8255,2024-03-12T12:40:13.500000
CVE-2024-22010,0,0,c8be08522110436a9d4fa99d4021d5a2fb6c1481cb50733e6d40fe00f78adb8d,2024-03-12T12:40:13.500000
CVE-2024-22011,0,0,0b600b1e31e74facb27c71d7c9b3f514c8b8b4c777fc0d39f1c7ce9fc8756817,2024-03-12T12:40:13.500000
CVE-2024-22012,0,0,3496e1376faff79bfb913c3511ac976ce741484efad2ac0961c5ff3c4bf8d282,2024-02-15T15:10:05.857000
CVE-2024-22012,0,1,6083637305fc19ea62a8c209ebe6bfac1cd035e045c787ca530a090291dc1971,2024-03-12T21:15:57.953000
CVE-2024-22016,0,0,72bb3341c866069974fe863b6c9e848e25809f5f0697d51cda8a3c348c9671f4,2024-02-07T17:33:12.727000
CVE-2024-22019,0,0,973223829547718a3f4f3bb4fa40a22f9bc1dc5683cd76da421f37d5d7095881,2024-02-20T19:50:53.960000
CVE-2024-22021,0,0,ba38d4b86a2c5af951f989c7a28594b6207f0b19739ba3d580be6e4d49001bfb,2024-02-29T01:44:04.690000
@ -239876,6 +239882,7 @@ CVE-2024-23295,0,0,11339cc0778c5660cfdfde02f62fcb9fc218757d722b581630970bfb87b76
CVE-2024-23296,0,0,40713c04751a3ff20ec43f1ba5d9e1c3448f8a0ef399da497fbf74ec2a3b2647,2024-03-12T17:31:03.837000
CVE-2024-23297,0,0,24ee6fcfdad75d10a074c7f7c8c3078e2c905d064d4f4a83f74c1bc6866f52d0,2024-03-08T14:02:57.420000
CVE-2024-2330,0,0,0a9f9e37587f34158a3bf6f7d53eb1a5e641504fa11cf02eb4524614459dfa8a,2024-03-11T01:32:29.610000
CVE-2024-23300,1,1,98c10e9369784f21fe476273caffc7e094632c37993a86bd197552d4249c5ab1,2024-03-12T21:15:58.077000
CVE-2024-23301,0,0,95f1c4c0d3c3f56beb5ca2f43c481bd416943d89ac106cdf8ea6bddea7fc220a,2024-02-21T03:15:08.950000
CVE-2024-23302,0,0,863344aa30e4660a85cb1dadb5cc739d77d5cca4411a54dffe0a3cc5e6d4c938,2024-02-29T13:49:29.390000
CVE-2024-23304,0,0,f4bc63f089c081f8de89565719320483c4f38e3af47af8e7dc8d4d30748891c3,2024-02-13T22:49:18.687000
@ -240174,6 +240181,7 @@ CVE-2024-2394,0,0,a1808c3e423b31a5f61767caea3e96f7bde3f2a439710708c637f27d2a25cf
CVE-2024-23940,0,0,88f3246b7d729e9740dbc7accb734f511d890171cb976d7dde750494e61216dd,2024-02-06T19:19:33.920000
CVE-2024-23941,0,0,12a475e2ca4f3cbb312854167865e0f548c636a650b921a0048a701032c53d0b,2024-02-06T21:37:12.433000
CVE-2024-23946,0,0,32194d05d3f7a3a80cd0b416a872a66ff74b3120ea9e0897100b1fe32331e71d,2024-03-12T17:29:17.243000
CVE-2024-2395,1,1,3e61f5ea9dfd95d1f92a83bc4c09098f523f65d957c9cf51405d198c92965824,2024-03-12T22:15:07.640000
CVE-2024-23952,0,0,89289c4c1b03193a134cbe14ed609452617a970c4d8ae9dfbad6f91cd36db610,2024-02-14T14:16:07.460000
CVE-2024-23976,0,0,c6327f87e3c19d6c46c6a7ff9e0644c74688322bbd7d7b77f1f15872b56e20b5,2024-02-14T18:04:45.380000
CVE-2024-23978,0,0,dce24325560fbd2c8a4b55826a990c779123e234941d6c9decad894b94e084c1,2024-02-10T04:09:02.587000
@ -240202,15 +240210,20 @@ CVE-2024-24034,0,0,f4e2cb1ad61decc8759fc1601847f210f2a72bb15bd38e4d1e3133a19621c
CVE-2024-24035,0,0,77bbb29060dad0a4e27b56775f789e0b578831621d3fa9615a4c8def660cc461,2024-03-08T14:02:57.420000
CVE-2024-24041,0,0,f96650c9700d93c943d8efc95d65c599a8e77cc1d7aaa4ba87820d6237153959,2024-02-07T17:14:41.607000
CVE-2024-24059,0,0,3da8cffbcfd869f14b04835347f156c5cf1a6025fa9627a3ec1ec79a41a9d0be,2024-02-03T00:40:43.793000
CVE-2024-2406,1,1,2dc07881b7a7b1d566b702e1421c92da2f7262c3d1879084e587fa3face0d9c6,2024-03-12T21:15:59.713000
CVE-2024-24060,0,0,3a6250076b98d97024da5e52a26f1f0c29807ef38de327e60f431783e4f1deaa,2024-02-03T00:40:48.600000
CVE-2024-24061,0,0,3ae0e78c2ecb0941fa62f48d1dc7792d4436b76ec841f1dbf3bf2317943894c3,2024-02-03T00:40:50.623000
CVE-2024-24062,0,0,ce51fb5fa7f08b3262a47fca149a06dc25ea5ca7c584b3ae7210563fa9fd54c1,2024-02-03T00:40:52.877000
CVE-2024-24091,0,0,6258a73a312c8c072d234b916137958d60ec77d8bc24aab7428a6677fc85f73a,2024-02-08T13:44:21.670000
CVE-2024-24092,1,1,eed6a3631e4178460f4f36bc487ccb1e78d316a4b8d685cdaa9d0a74a6b4f388,2024-03-12T21:15:58.217000
CVE-2024-24093,1,1,70dd2fe737fb8fe95e9f34b1d303380461466976aa8e6b7d5215bd00c384e772,2024-03-12T21:15:58.370000
CVE-2024-24095,0,0,d1e50126ccf5fc32a5efb1c5a1b74cfade8c6c5361c56208004f892bd1f9b46e,2024-02-27T14:20:06.637000
CVE-2024-24096,0,0,711acc667f5940cdd09a2785b5f63f7f2c3ede063ebd3b4223e93ee32bf7fb53,2024-02-27T14:20:06.637000
CVE-2024-24097,1,1,1924697167b4b00ad4cb9be51226e06335a886fa1725d099ad5cce05903e8e2e,2024-03-12T21:15:58.497000
CVE-2024-24098,0,0,278909d70f7cff296783b4b8a548916c6d64b22508219b62d702151781ea252e,2024-03-05T18:50:18.333000
CVE-2024-24099,0,0,e75badf6651a6d84e33aa0d6378d82bf7383b7d186bb27d0ab0f05af5c87836c,2024-02-27T14:20:06.637000
CVE-2024-24100,0,0,a27c32dc14c8987b127be9cd991f37144e95622920d0f3983f740c9f65a1ed81,2024-02-27T14:20:06.637000
CVE-2024-24101,1,1,13476ed8eedd9aa22183297cb5f4ca7dd22cd417d2c9f709411f0c56b13a9fc2,2024-03-12T22:15:07.423000
CVE-2024-24112,0,0,85e73cacfedc53adcf11f5f918fd045bef98237a7befd9901dcc9210924d64d7,2024-02-12T17:36:55.950000
CVE-2024-24113,0,0,9eef336ce15946e031a73b26b3e239a7b6b89883c338eb5418a2161e5a5d4cfc,2024-02-15T03:07:46.013000
CVE-2024-24115,0,0,14551eae0714aa949f3a2722e897b385606f2d79896bdde4df5b423d4061d078,2024-02-15T16:01:23.457000
@ -241027,7 +241040,7 @@ CVE-2024-27103,0,0,ba41469ea697f39b66b49d222d300153b0a74c2fb1fbae161829f573b3ab9
CVE-2024-27121,0,0,9ff77f57a33b5e7894f52bbf3c39c57fbfb06ac4fc9de183cada29d2e4e25cb4,2024-03-12T12:40:13.500000
CVE-2024-27132,0,0,3211e33e39363e184b8550fc16d833a0f590c8e4cd3ef270e1d091501b93f80e,2024-02-26T13:42:22.567000
CVE-2024-27133,0,0,1abfe171f722b9df6ead5b24935068c395a52a06c146ec300701d2b7e86523ce,2024-02-26T13:42:22.567000
CVE-2024-27135,1,1,5be2c010535362e0aa81ced8c2532ce28c48502a4bc4b6eaff764aa17ef9f50d,2024-03-12T19:15:47.567000
CVE-2024-27135,0,0,5be2c010535362e0aa81ced8c2532ce28c48502a4bc4b6eaff764aa17ef9f50d,2024-03-12T19:15:47.567000
CVE-2024-27138,0,0,1ec0ded3b41c12b07651e921188be783731716c54fb55c30f65f5b3e8197e8cc,2024-03-01T22:22:25.913000
CVE-2024-27139,0,0,66ddd9efc34252e5e972ac0e5a31e042faa3995b86c5ae6f0f108c10e1d7b562,2024-03-01T22:22:25.913000
CVE-2024-27140,0,0,34daddef6e0d13f2bea16bc1184887cdd01053137a36a3bc5699d2875c449127,2024-03-01T22:22:25.913000
@ -241079,10 +241092,11 @@ CVE-2024-27298,0,0,1aaf802a3586818726ce977e3c4d8b52b79c9b45f43876bfaeae085dddddd
CVE-2024-27302,0,0,f49f7cb8056f6127ae14fec0cfff2d0bf177dfba1318b206d31d7b548bf3e9f5,2024-03-06T21:42:48.053000
CVE-2024-27303,0,0,5bf58561ed507a70ca73108a11218e0be9a2a377c18b42118ebe9af756d8ec79,2024-03-06T21:42:48.053000
CVE-2024-27304,0,0,a58fd7f36bc322ab36f59f23fc0b881917cc0b6bb38909a990d60361c28f67b2,2024-03-06T21:42:48.053000
CVE-2024-27305,1,1,b6c0d454d3ef629ab59b3ab481527c72c12308d3a6ae187431beed16c875a863,2024-03-12T21:15:58.630000
CVE-2024-27307,0,0,b3e5647d01e692e99d0628de858f80e073a681ef610b737f1cd9e2cbd19d0a87,2024-03-06T21:42:48.053000
CVE-2024-27308,0,0,49dd978921f33ae11ae51b9b406f93a1a4cbfa329fe8c55041f5f46036ef5baf,2024-03-06T21:42:48.053000
CVE-2024-27315,0,0,1b06bd54abb4ee7969c3aca53e6bed402762ed42c4492d0ee8674e3fa0b42312,2024-02-28T15:15:09.670000
CVE-2024-27317,1,1,89ab3da74e976306890048f4b6ea554dbd24e8ca4de3fa3edc17a0fa32902169,2024-03-12T19:15:47.777000
CVE-2024-27317,0,0,89ab3da74e976306890048f4b6ea554dbd24e8ca4de3fa3edc17a0fa32902169,2024-03-12T19:15:47.777000
CVE-2024-27318,0,0,31cd351dfd297129ad7eaad5463f641941f9f095dfce65183a940040c8e71a76,2024-02-23T19:31:25.817000
CVE-2024-27319,0,0,bae163f4fbb8c727a5f96d6a2e9fade6279e85a3e2f58bd6b58e78425790acb1,2024-02-23T19:31:25.817000
CVE-2024-27350,0,0,dcd7c665f1de1305fedd66ae5b35ce18719811fd40fe202fcd475df4fa80bd9e,2024-02-26T16:32:25.577000
@ -241147,7 +241161,7 @@ CVE-2024-27758,0,0,6abe87e0a8905ac150ade2fec85250ff5e7fbf580c101c16b193b98f7d581
CVE-2024-27764,0,0,a6da085213081f41482d74001d5b27250ddae1567bc465fa0f4b1023f8322f06,2024-03-06T15:18:08.093000
CVE-2024-27765,0,0,c9283b485df441e5cf44e98a2bcaa6921e6b7ae7825314dc1fd3bb862197fb6e,2024-03-06T15:18:08.093000
CVE-2024-27889,0,0,a24eb09c70fc8e243900497cf84a2002dc9fb9fdcf0cc7381ab2bee2e01200d8,2024-03-05T13:41:01.900000
CVE-2024-27894,1,1,0e6c0963b0fcfa2d9f368e7425c9fc6bdbf3b68d454d8eef6739402db46e5f55,2024-03-12T19:15:47.970000
CVE-2024-27894,0,0,0e6c0963b0fcfa2d9f368e7425c9fc6bdbf3b68d454d8eef6739402db46e5f55,2024-03-12T19:15:47.970000
CVE-2024-27900,0,0,00f9885d5a06fec36b56a14fdc3be21ddc255c1561a408e91e09aee1b7ac8b37,2024-03-12T12:40:13.500000
CVE-2024-27902,0,0,7aa835c5c3cccf2434107e43a6dd21c3ee48d8e6664a62d49734964bcc016141,2024-03-12T12:40:13.500000
CVE-2024-27905,0,0,c7138ee734428b73e57ef70bc0c3a87d66350c09e2b81d6d3c89882bb51a7608,2024-02-28T14:07:00.563000
@ -241169,15 +241183,15 @@ CVE-2024-28094,0,0,45821c38270b8552e50f50b73436d99164a20d22d9b4b8876276d92b2a0a8
CVE-2024-28095,0,0,cc359d20cf58cf4c4e6a4bc345ac1d1135a557dfb7920f405bfe639456bcfe46,2024-03-07T13:52:27.110000
CVE-2024-28096,0,0,bd233bb77c2105c8f9ae41f3196895f407f421cf037a91cc0eb753e3f00e4372,2024-03-07T13:52:27.110000
CVE-2024-28097,0,0,ad0a3d7a6b96970687d28d32c41921c3200422c4265f25f269de512c4cb8079e,2024-03-07T13:52:27.110000
CVE-2024-28098,1,1,998118abb5151f2ca216c3416e6f1293d4b616825a40a48d114e25eb304f865b,2024-03-12T19:15:48.177000
CVE-2024-28098,0,0,998118abb5151f2ca216c3416e6f1293d4b616825a40a48d114e25eb304f865b,2024-03-12T19:15:48.177000
CVE-2024-28110,0,0,0aa63c709bee34101fee09332c67840fa8b7d5aea01ed58b7f238cd7f26f2f87,2024-03-07T13:52:27.110000
CVE-2024-28111,0,0,ef109000cb681b8950a504435d888106cd334990070bd9ca1f33bba165c1974a,2024-03-07T13:52:27.110000
CVE-2024-28112,1,1,c4745b7e1d25cb6cfc2c3729faa00eb215df73dfcfd0f87bb60f0feb6ed07e38,2024-03-12T20:15:07.730000
CVE-2024-28113,1,1,e83bedfa5a1024a70fc3bac4baca17cfe73c68f5bee109cc54ebad50acd4c74c,2024-03-12T20:15:07.933000
CVE-2024-28114,1,1,9cc712d5a4c4e6d8e7eaeb3f658683a2bb9cbf6b27cd7f0f8737b3aa3a5a174b,2024-03-12T20:15:08.113000
CVE-2024-28112,0,0,c4745b7e1d25cb6cfc2c3729faa00eb215df73dfcfd0f87bb60f0feb6ed07e38,2024-03-12T20:15:07.730000
CVE-2024-28113,0,0,e83bedfa5a1024a70fc3bac4baca17cfe73c68f5bee109cc54ebad50acd4c74c,2024-03-12T20:15:07.933000
CVE-2024-28114,0,0,9cc712d5a4c4e6d8e7eaeb3f658683a2bb9cbf6b27cd7f0f8737b3aa3a5a174b,2024-03-12T20:15:08.113000
CVE-2024-28115,0,0,3e0e705412ec4ecfb9fabefcb95634cd838a6bf7c9c03087d677ba199986f693,2024-03-08T14:02:57.420000
CVE-2024-28120,0,0,1945ab744b479cd2a55b16e82913f94d84bcc236918a39e22cfe06aca7010c4c,2024-03-12T12:40:13.500000
CVE-2024-28121,1,1,cd609f282f9eb616d165f98d953bd55546f26070be0dec9d4ea80dde264eafde,2024-03-12T20:15:08.313000
CVE-2024-28121,0,0,cd609f282f9eb616d165f98d953bd55546f26070be0dec9d4ea80dde264eafde,2024-03-12T20:15:08.313000
CVE-2024-28122,0,0,3209f9a611aea4804720e8e5b4eeb3a02772982f302e787ac8040299af464092,2024-03-11T01:32:39.697000
CVE-2024-28149,0,0,bb1327eb2ceb44ae2cc8e952fde2f54b109f1740591e1ece1b912c644025402b,2024-03-06T21:42:54.697000
CVE-2024-28150,0,0,bd9c785686979f74fc956d3a9d80b65ba208ec849a10e17a7f0c9226761980a2,2024-03-06T21:42:54.697000
@ -241199,7 +241213,7 @@ CVE-2024-28174,0,0,fa1674b985861bddf4d0ff5ab075ec0e4328a9665c668bfe339f9f0de580d
CVE-2024-28176,0,0,5bb6d329167995170bd276a45554624691bdda8cbb6c83c2d08f42eba9f617aa,2024-03-11T01:32:39.697000
CVE-2024-28180,0,0,1e73ce45496cde15ab7710e8895a9f7d4caf4d2dcdb0d6de4d94afa753e9a64b,2024-03-11T01:32:39.697000
CVE-2024-28184,0,0,043b0bc7533d0fc96bb6df4be7b21b8477ffe807b0ac6ed0c4b06cf7d8241c3c,2024-03-11T01:32:39.697000
CVE-2024-28186,1,1,d09f5b367130ceb8ffca34e045c486310511570fff5782478a7ab9680fd86e0e,2024-03-12T20:15:08.503000
CVE-2024-28186,0,0,d09f5b367130ceb8ffca34e045c486310511570fff5782478a7ab9680fd86e0e,2024-03-12T20:15:08.503000
CVE-2024-28187,0,0,ac9aee9b90f5e80eaf35f8c7ff9228de1d46fc7e7981b3ae0d130073676ebc09,2024-03-12T12:40:13.500000
CVE-2024-28197,0,0,e70c7d0bb2a78854377299eb50fe7994eaf82f7d86398ed826c936d249a753e2,2024-03-12T12:40:13.500000
CVE-2024-28198,0,0,8816bcf1852d0abd4f85184964ff047a5ee5921e29485ae07c6ebc27fd66ef45,2024-03-12T12:40:13.500000
@ -241214,6 +241228,9 @@ CVE-2024-28222,0,0,fc2bb6625872999de46c3fec787964c81811fbafba85fd6aa0a9c0c190c12
CVE-2024-28228,0,0,fafeac90b4103ecc037c0d15d4376f652ba43048a680a73a3c13807568e40859,2024-03-07T13:52:27.110000
CVE-2024-28229,0,0,7bfc3b59e790a5126732ec4d8d480f9938166a41475488b32e066c1e064ccb9f,2024-03-07T13:52:27.110000
CVE-2024-28230,0,0,3036aa70102b53b9cc695265dc4a11e5a4f5b8d26f6120835dbd1a9c3d93e7ec,2024-03-07T13:52:27.110000
CVE-2024-28236,1,1,66388b84425c967b6086cd0e49b7fcb7722f8634684e8523b513de2540418adb,2024-03-12T21:15:59.027000
CVE-2024-28238,1,1,392026f8d9c6964893634222ffe2dae70ae08f5ebc7afc8158b32c816c78c5fb,2024-03-12T21:15:59.297000
CVE-2024-28239,1,1,200bf1ec0e96c73e0229c8588ffb32cc105d174ecb8c5382f1a77b80bf09a819,2024-03-12T21:15:59.513000
CVE-2024-28338,0,0,9985a0b99abb928b9c829cb29ecce6039c07964aad6d9841c1477c6680f4f9b5,2024-03-12T17:46:17.273000
CVE-2024-28339,0,0,06a7f15d55f22a965683bef17c82587bc073ddf9fa5edb33c38c4cd82d5f37f7,2024-03-12T17:46:17.273000
CVE-2024-28340,0,0,89775fa07d73d115a7392603111ecb04f65799be74b8d41063e67ed0eb97d0cf,2024-03-12T17:46:17.273000

Can't render this file because it is too large.