mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-03-12T23:00:38.203641+00:00
This commit is contained in:
parent
1ff939d10a
commit
3fa311116c
20
CVE-2023/CVE-2023-423xx/CVE-2023-42307.json
Normal file
20
CVE-2023/CVE-2023-423xx/CVE-2023-42307.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42307",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-12T21:15:55.703",
|
||||
"lastModified": "2024-03-12T21:15:55.703",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting (XSS) vulnerability in Code-Projects Exam Form Submission 1.0 allows attackers to run arbitrary code via \"Subject Name\" and \"Subject Code\" section."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ASR511-OO7/CVE-2023-42307/blob/main/CVE-6",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-423xx/CVE-2023-42308.json
Normal file
20
CVE-2023/CVE-2023-423xx/CVE-2023-42308.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42308",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-12T21:15:55.787",
|
||||
"lastModified": "2024-03-12T21:15:55.787",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting (XSS) vulnerability in Manage Fastrack Subjects in Code-Projects Exam Form Submission 1.0 allows attackers to run arbitrary code via the \"Subject Name\" and \"Subject Code\" Section."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ASR511-OO7/CVE-2023-42308/blob/main/CVE-7",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-432xx/CVE-2023-43279.json
Normal file
20
CVE-2023/CVE-2023-432xx/CVE-2023-43279.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-43279",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-12T22:15:07.197",
|
||||
"lastModified": "2024-03-12T22:15:07.197",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Null Pointer Dereference in mask_cidr6 component at cidr.c in Tcpreplay 4.4.4 allows attackers to crash the application via crafted tcprewrite command."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/appneta/tcpreplay/issues/824",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-432xx/CVE-2023-43292.json
Normal file
20
CVE-2023/CVE-2023-432xx/CVE-2023-43292.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-43292",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-12T21:15:55.837",
|
||||
"lastModified": "2024-03-12T21:15:55.837",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in My Food Recipe Using PHP with Source Code v.1.0 allows a local attacker to execute arbitrary code via a crafted payload to the Recipe Name, Procedure, and ingredients parameters."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ASR511-OO7/CVE-2023-43292/blob/main/CVE-8",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48397",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:16.560",
|
||||
"lastModified": "2023-12-12T23:39:39.640",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:55.883",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Init of protocolcalladapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "In Init of protocolcalladapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48398",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:16.617",
|
||||
"lastModified": "2023-12-13T16:34:05.937",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:55.977",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ProtocolNetAcBarringInfo::ProtocolNetAcBarringInfo() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "In ProtocolNetAcBarringInfo::ProtocolNetAcBarringInfo() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48399",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:16.670",
|
||||
"lastModified": "2023-12-13T16:36:24.557",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:56.047",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ProtocolMiscATCommandAdapter::Init() of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "In ProtocolMiscATCommandAdapter::Init() of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48401",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:16.720",
|
||||
"lastModified": "2023-12-12T23:24:39.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:56.107",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In GetSizeOfEenlRecords of protocoladapter.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "In GetSizeOfEenlRecords of protocoladapter.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48402",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:16.933",
|
||||
"lastModified": "2023-12-12T23:21:11.557",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:56.173",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ppcfw_enable of ppcfw.c, there is a possible EoP due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "In ppcfw_enable of ppcfw.c, there is a possible EoP due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48403",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:17.120",
|
||||
"lastModified": "2023-12-12T19:51:22.450",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:56.243",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In sms_DecodeCodedTpMsg of sms_PduCodec.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure if the attacker is able to observe the behavior of the subsequent switch conditional with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "In sms_DecodeCodedTpMsg of sms_PduCodec.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure if the attacker is able to observe the behavior of the subsequent switch conditional with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48404",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:17.343",
|
||||
"lastModified": "2023-12-13T16:40:24.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:56.300",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ProtocolMiscCarrierConfigSimInfoIndAdapter of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "In ProtocolMiscCarrierConfigSimInfoIndAdapter of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48405",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:17.630",
|
||||
"lastModified": "2023-12-13T16:47:14.437",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:56.373",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "there is a possible way for the secure world to write to NS memory due to a logic error in the code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "there is a possible way for the secure world to write to NS memory due to a logic error in the code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48406",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:17.783",
|
||||
"lastModified": "2023-12-13T16:47:59.943",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:56.447",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "there is a possible permanent DoS or way for the modem to boot unverified firmware due to a logic error in the code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "there is a possible permanent DoS or way for the modem to boot unverified firmware due to a logic error in the code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48407",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:17.910",
|
||||
"lastModified": "2023-12-12T19:54:28.383",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:56.517",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "there is a possible DCK won't be deleted after factory reset due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "there is a possible DCK won't be deleted after factory reset due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48408",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:17.953",
|
||||
"lastModified": "2023-12-12T23:28:59.970",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:56.573",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ProtocolNetSimFileInfoAdapter() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "In ProtocolNetSimFileInfoAdapter() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48409",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:18.000",
|
||||
"lastModified": "2023-12-12T23:46:43.867",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:56.647",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In gpu_pixel_handle_buffer_liveness_update_ioctl of private/google-modules/gpu/mali_kbase/mali_kbase_core_linux.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "In gpu_pixel_handle_buffer_liveness_update_ioctl of private/google-modules/gpu/mali_kbase/mali_kbase_core_linux.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48410",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:18.050",
|
||||
"lastModified": "2023-12-12T23:48:00.343",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:56.713",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In cd_ParseMsg of cd_codec.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "In cd_ParseMsg of cd_codec.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48411",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:18.097",
|
||||
"lastModified": "2023-12-12T23:53:08.647",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:56.780",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In SignalStrengthAdapter::FillGsmSignalStrength() of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "In SignalStrengthAdapter::FillGsmSignalStrength() of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48412",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:18.150",
|
||||
"lastModified": "2023-12-12T23:56:00.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:56.847",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In private_handle_t of mali_gralloc_buffer.h, there is a possible information leak due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "In private_handle_t of mali_gralloc_buffer.h, there is a possible information leak due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48413",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:18.200",
|
||||
"lastModified": "2023-12-12T23:58:05.553",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:56.917",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Init of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "In Init of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48414",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:18.253",
|
||||
"lastModified": "2023-12-13T16:55:22.940",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:56.983",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Pixel Camera Driver, there is a possible use after free due to a logic error in the code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "In the Pixel Camera Driver, there is a possible use after free due to a logic error in the code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48415",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:18.307",
|
||||
"lastModified": "2023-12-13T16:55:04.633",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:57.050",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Init of protocolembmsadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "In Init of protocolembmsadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48416",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:18.360",
|
||||
"lastModified": "2023-12-13T16:54:45.200",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:57.120",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In multiple locations, there is a possible null dereference due to a missing null check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "In multiple locations, there is a possible null dereference due to a missing null check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48420",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:18.513",
|
||||
"lastModified": "2023-12-13T16:54:25.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:57.193",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48421",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:18.560",
|
||||
"lastModified": "2023-12-13T16:53:57.040",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:57.263",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In gpu_pixel_handle_buffer_liveness_update_ioctl of private/google-modules/gpu/mali_kbase/platform/pixel/pixel_gpu_slc.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "In gpu_pixel_handle_buffer_liveness_update_ioctl of private/google-modules/gpu/mali_kbase/platform/pixel/pixel_gpu_slc.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48422",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:18.607",
|
||||
"lastModified": "2023-12-13T16:53:03.923",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:57.330",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Init of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "In Init of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-48423",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:18.657",
|
||||
"lastModified": "2023-12-13T16:52:00.397",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:57.393",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In dhcp4_SetPDNAddress of dhcp4_Main.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "In dhcp4_SetPDNAddress of dhcp4_Main.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5178",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-11-01T17:15:11.920",
|
||||
"lastModified": "2024-03-12T15:15:47.210",
|
||||
"lastModified": "2024-03-12T21:15:57.457",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -281,6 +281,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1269",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1278",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-5178",
|
||||
"source": "secalert@redhat.com",
|
||||
|
47
CVE-2024/CVE-2024-03xx/CVE-2024-0386.json
Normal file
47
CVE-2024/CVE-2024-03xx/CVE-2024-0386.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-0386",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-12T22:15:07.250",
|
||||
"lastModified": "2024-03-12T22:15:07.250",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The weForms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Referer' HTTP header in all versions up to, and including, 1.6.21 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3047406%40weforms&new=3047406%40weforms&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f436ab65-a59c-4b2a-abc8-a7fc038678dd?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0646",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-17T16:15:47.190",
|
||||
"lastModified": "2024-03-12T15:15:47.500",
|
||||
"lastModified": "2024-03-12T21:15:57.700",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -185,6 +185,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1269",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1278",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-0646",
|
||||
"source": "secalert@redhat.com",
|
||||
|
47
CVE-2024/CVE-2024-21xx/CVE-2024-2107.json
Normal file
47
CVE-2024/CVE-2024-21xx/CVE-2024-2107.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-2107",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-12T22:15:07.470",
|
||||
"lastModified": "2024-03-12T22:15:07.470",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Blossom Spa theme for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.3.4 via generated source. This makes it possible for unauthenticated attackers to extract sensitive data including contents of password-protected or scheduled posts."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=220138%40blossom-spa&new=220138%40blossom-spa&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5e54dbf9-a5d1-413d-96ac-93dd499c21a4?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-22012",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-02-07T16:15:47.687",
|
||||
"lastModified": "2024-02-15T15:10:05.857",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-12T21:15:57.953",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In TBD of TBD, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
|
||||
"value": "there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
20
CVE-2024/CVE-2024-233xx/CVE-2024-23300.json
Normal file
20
CVE-2024/CVE-2024-233xx/CVE-2024-23300.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-23300",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-12T21:15:58.077",
|
||||
"lastModified": "2024-03-12T21:15:58.077",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in GarageBand 10.4.11. Processing a maliciously crafted file may lead to unexpected app termination or arbitrary code execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214090",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-23xx/CVE-2024-2395.json
Normal file
47
CVE-2024/CVE-2024-23xx/CVE-2024-2395.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-2395",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-12T22:15:07.640",
|
||||
"lastModified": "2024-03-12T22:15:07.640",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Bulgarisation for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.14. This is due to missing or incorrect nonce validation on several functions. This makes it possible for unauthenticated attackers to generate and delete labels via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034198%40bulgarisation-for-woocommerce&new=3034198%40bulgarisation-for-woocommerce&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4ff1d12e-1129-40d3-8c29-3a46ffc77872?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-240xx/CVE-2024-24092.json
Normal file
20
CVE-2024/CVE-2024-240xx/CVE-2024-24092.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-24092",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-12T21:15:58.217",
|
||||
"lastModified": "2024-03-12T21:15:58.217",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability in Code-projects.org Scholars Tracking System 1.0 allows attackers to run arbitrary code via login.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ASR511-OO7/CVE-2024-24092/blob/main/CVE-9",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-240xx/CVE-2024-24093.json
Normal file
20
CVE-2024/CVE-2024-240xx/CVE-2024-24093.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-24093",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-12T21:15:58.370",
|
||||
"lastModified": "2024-03-12T21:15:58.370",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability in Code-projects Scholars Tracking System 1.0 allows attackers to run arbitrary code via Personal Information Update information."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ASR511-OO7/CVE-2024-24093/blob/main/CVE-10",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-240xx/CVE-2024-24097.json
Normal file
20
CVE-2024/CVE-2024-240xx/CVE-2024-24097.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-24097",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-12T21:15:58.497",
|
||||
"lastModified": "2024-03-12T21:15:58.497",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting (XSS) vulnerability in Code-projects Scholars Tracking System 1.0 allows attackers to run arbitrary code via the News Feed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ASR511-OO7/CVE-2024-24097/blob/main/CVE-12",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-241xx/CVE-2024-24101.json
Normal file
20
CVE-2024/CVE-2024-241xx/CVE-2024-24101.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-24101",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-12T22:15:07.423",
|
||||
"lastModified": "2024-03-12T22:15:07.423",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Code-projects Scholars Tracking System 1.0 is vulnerable to SQL Injection under Eligibility Information Update."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ASR511-OO7/CVE-2024-24101/blob/main/CVE-14",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2024/CVE-2024-24xx/CVE-2024-2406.json
Normal file
88
CVE-2024/CVE-2024-24xx/CVE-2024-2406.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-2406",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-12T21:15:59.713",
|
||||
"lastModified": "2024-03-12T21:15:59.713",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in Gacjie Server up to 1.0. This affects the function index of the file /app/admin/controller/Upload.php. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256503."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 5.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 4.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://note.zhaoj.in/share/7kZiVRqSuiMx",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256503",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256503",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-273xx/CVE-2024-27305.json
Normal file
63
CVE-2024/CVE-2024-273xx/CVE-2024-27305.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-27305",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-12T21:15:58.630",
|
||||
"lastModified": "2024-03-12T21:15:58.630",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "aiosmtpd is a reimplementation of the Python stdlib smtpd.py based on asyncio. aiosmtpd is vulnerable to inbound SMTP smuggling. SMTP smuggling is a novel vulnerability based on not so novel interpretation differences of the SMTP protocol. By exploiting SMTP smuggling, an attacker may send smuggle/spoof e-mails with fake sender addresses, allowing advanced phishing attacks. This issue is also existed in other SMTP software like Postfix. With the right SMTP server constellation, an attacker can send spoofed e-mails to inbound/receiving aiosmtpd instances. This issue has been addressed in version 1.4.5. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-345"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/aio-libs/aiosmtpd/commit/24b6c79c8921cf1800e27ca144f4f37023982bbb",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/aio-libs/aiosmtpd/security/advisories/GHSA-pr2m-px7j-xg65",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.postfix.org/smtp-smuggling.html",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-282xx/CVE-2024-28236.json
Normal file
63
CVE-2024/CVE-2024-282xx/CVE-2024-28236.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-28236",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-12T21:15:59.027",
|
||||
"lastModified": "2024-03-12T21:15:59.027",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vela is a Pipeline Automation (CI/CD) framework built on Linux container technology written in Golang. Vela pipelines can use variable substitution combined with insensitive fields like `parameters`, `image` and `entrypoint` to inject secrets into a plugin/image and \u2014 by using common substitution string manipulation \u2014 can bypass log masking and expose secrets without the use of the commands block. This unexpected behavior primarily impacts secrets restricted by the \"no commands\" option. This can lead to unintended use of the secret value, and increased risk of exposing the secret during image execution bypassing log masking. **To exploit this** the pipeline author must be supplying the secrets to a plugin that is designed in such a way that will print those parameters in logs. Plugin parameters are not designed for sensitive values and are often intentionally printed throughout execution for informational/debugging purposes. Parameters should therefore be treated as insensitive. While Vela provides secrets masking, secrets exposure is not entirely solved by the masking process. A docker image (plugin) can easily expose secrets if they are not handled properly, or altered in some way. There is a responsibility on the end-user to understand how values injected into a plugin are used. This is a risk that exists for many CICD systems (like GitHub Actions) that handle sensitive runtime variables. Rather, the greater risk is that users who restrict a secret to the \"no commands\" option and use image restriction can still have their secret value exposed via substitution tinkering, which turns the image and command restrictions into a false sense of security. This issue has been addressed in version 0.23.2. Users are advised to upgrade. Users unable to upgrade should not provide sensitive values to plugins that can potentially expose them, especially in `parameters` that are not intended to be used for sensitive values, ensure plugins (especially those that utilize shared secrets) follow best practices to avoid logging parameters that are expected to be sensitive, minimize secrets with `pull_request` events enabled, as this allows users to change pipeline configurations and pull in secrets to steps not typically part of the CI process, make use of the build approval setting, restricting builds from untrusted users, and limit use of shared secrets, as they are less restrictive to access by nature."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-532"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/go-vela/worker/commit/e1572743b008e4fbce31ebb1dcd23bf6a1a30297",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/go-vela/worker/security/advisories/GHSA-pwx5-6wxg-px5h",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-282xx/CVE-2024-28238.json
Normal file
59
CVE-2024/CVE-2024-282xx/CVE-2024-28238.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-28238",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-12T21:15:59.297",
|
||||
"lastModified": "2024-03-12T21:15:59.297",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Directus is a real-time API and App dashboard for managing SQL database content. When reaching the /files page, a JWT is passed via GET request. Inclusion of session tokens in URLs poses a security risk as URLs are often logged in various places (e.g., web server logs, browser history). Attackers gaining access to these logs may hijack active user sessions, leading to unauthorized access to sensitive information or actions on behalf of the user. This issue has been addressed in version 10.10.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.3,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-598"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/directus/directus/security/advisories/GHSA-2ccr-g2rv-h677",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-282xx/CVE-2024-28239.json
Normal file
63
CVE-2024/CVE-2024-282xx/CVE-2024-28239.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-28239",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-12T21:15:59.513",
|
||||
"lastModified": "2024-03-12T21:15:59.513",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Directus is a real-time API and App dashboard for managing SQL database content. The authentication API has a `redirect` parameter that can be exploited as an open redirect vulnerability as the user tries to log in via the API URL. There's a redirect that is done after successful login via the Auth API GET request to `directus/auth/login/google?redirect=http://malicious-fishing-site.com`. While credentials don't seem to be passed to the attacker site, the user can be phished into clicking a legitimate directus site and be taken to a malicious site made to look like a an error message \"Your password needs to be updated\" to phish out the current password. Users who login via OAuth2 into Directus may be at risk. This issue has been addressed in version 10.10.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.directus.io/reference/authentication.html#login-using-sso-providers",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/directus/directus/commit/5477d7d61babd7ffc2f835d399bf79611b15b203",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/directus/directus/security/advisories/GHSA-fr3w-2p22-6w7p",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
67
README.md
67
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-12T21:00:38.064271+00:00
|
||||
2024-03-12T23:00:38.203641+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-12T20:15:08.853000+00:00
|
||||
2024-03-12T22:15:07.640000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,34 +29,61 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
241225
|
||||
241242
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `14`
|
||||
Recently added CVEs: `17`
|
||||
|
||||
* [CVE-2022-34321](CVE-2022/CVE-2022-343xx/CVE-2022-34321.json) (`2024-03-12T19:15:47.303`)
|
||||
* [CVE-2023-30968](CVE-2023/CVE-2023-309xx/CVE-2023-30968.json) (`2024-03-12T20:15:07.347`)
|
||||
* [CVE-2023-5410](CVE-2023/CVE-2023-54xx/CVE-2023-5410.json) (`2024-03-12T20:15:07.550`)
|
||||
* [CVE-2024-2031](CVE-2024/CVE-2024-20xx/CVE-2024-2031.json) (`2024-03-12T20:15:08.690`)
|
||||
* [CVE-2024-2130](CVE-2024/CVE-2024-21xx/CVE-2024-2130.json) (`2024-03-12T20:15:08.853`)
|
||||
* [CVE-2024-27135](CVE-2024/CVE-2024-271xx/CVE-2024-27135.json) (`2024-03-12T19:15:47.567`)
|
||||
* [CVE-2024-27317](CVE-2024/CVE-2024-273xx/CVE-2024-27317.json) (`2024-03-12T19:15:47.777`)
|
||||
* [CVE-2024-27894](CVE-2024/CVE-2024-278xx/CVE-2024-27894.json) (`2024-03-12T19:15:47.970`)
|
||||
* [CVE-2024-28098](CVE-2024/CVE-2024-280xx/CVE-2024-28098.json) (`2024-03-12T19:15:48.177`)
|
||||
* [CVE-2024-28112](CVE-2024/CVE-2024-281xx/CVE-2024-28112.json) (`2024-03-12T20:15:07.730`)
|
||||
* [CVE-2024-28113](CVE-2024/CVE-2024-281xx/CVE-2024-28113.json) (`2024-03-12T20:15:07.933`)
|
||||
* [CVE-2024-28114](CVE-2024/CVE-2024-281xx/CVE-2024-28114.json) (`2024-03-12T20:15:08.113`)
|
||||
* [CVE-2024-28121](CVE-2024/CVE-2024-281xx/CVE-2024-28121.json) (`2024-03-12T20:15:08.313`)
|
||||
* [CVE-2024-28186](CVE-2024/CVE-2024-281xx/CVE-2024-28186.json) (`2024-03-12T20:15:08.503`)
|
||||
* [CVE-2023-42307](CVE-2023/CVE-2023-423xx/CVE-2023-42307.json) (`2024-03-12T21:15:55.703`)
|
||||
* [CVE-2023-42308](CVE-2023/CVE-2023-423xx/CVE-2023-42308.json) (`2024-03-12T21:15:55.787`)
|
||||
* [CVE-2023-43279](CVE-2023/CVE-2023-432xx/CVE-2023-43279.json) (`2024-03-12T22:15:07.197`)
|
||||
* [CVE-2023-43292](CVE-2023/CVE-2023-432xx/CVE-2023-43292.json) (`2024-03-12T21:15:55.837`)
|
||||
* [CVE-2024-0386](CVE-2024/CVE-2024-03xx/CVE-2024-0386.json) (`2024-03-12T22:15:07.250`)
|
||||
* [CVE-2024-2107](CVE-2024/CVE-2024-21xx/CVE-2024-2107.json) (`2024-03-12T22:15:07.470`)
|
||||
* [CVE-2024-23300](CVE-2024/CVE-2024-233xx/CVE-2024-23300.json) (`2024-03-12T21:15:58.077`)
|
||||
* [CVE-2024-2395](CVE-2024/CVE-2024-23xx/CVE-2024-2395.json) (`2024-03-12T22:15:07.640`)
|
||||
* [CVE-2024-2406](CVE-2024/CVE-2024-24xx/CVE-2024-2406.json) (`2024-03-12T21:15:59.713`)
|
||||
* [CVE-2024-24092](CVE-2024/CVE-2024-240xx/CVE-2024-24092.json) (`2024-03-12T21:15:58.217`)
|
||||
* [CVE-2024-24093](CVE-2024/CVE-2024-240xx/CVE-2024-24093.json) (`2024-03-12T21:15:58.370`)
|
||||
* [CVE-2024-24097](CVE-2024/CVE-2024-240xx/CVE-2024-24097.json) (`2024-03-12T21:15:58.497`)
|
||||
* [CVE-2024-24101](CVE-2024/CVE-2024-241xx/CVE-2024-24101.json) (`2024-03-12T22:15:07.423`)
|
||||
* [CVE-2024-27305](CVE-2024/CVE-2024-273xx/CVE-2024-27305.json) (`2024-03-12T21:15:58.630`)
|
||||
* [CVE-2024-28236](CVE-2024/CVE-2024-282xx/CVE-2024-28236.json) (`2024-03-12T21:15:59.027`)
|
||||
* [CVE-2024-28238](CVE-2024/CVE-2024-282xx/CVE-2024-28238.json) (`2024-03-12T21:15:59.297`)
|
||||
* [CVE-2024-28239](CVE-2024/CVE-2024-282xx/CVE-2024-28239.json) (`2024-03-12T21:15:59.513`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `26`
|
||||
|
||||
* [CVE-2024-0044](CVE-2024/CVE-2024-00xx/CVE-2024-0044.json) (`2024-03-12T20:15:07.633`)
|
||||
* [CVE-2023-48398](CVE-2023/CVE-2023-483xx/CVE-2023-48398.json) (`2024-03-12T21:15:55.977`)
|
||||
* [CVE-2023-48399](CVE-2023/CVE-2023-483xx/CVE-2023-48399.json) (`2024-03-12T21:15:56.047`)
|
||||
* [CVE-2023-48401](CVE-2023/CVE-2023-484xx/CVE-2023-48401.json) (`2024-03-12T21:15:56.107`)
|
||||
* [CVE-2023-48402](CVE-2023/CVE-2023-484xx/CVE-2023-48402.json) (`2024-03-12T21:15:56.173`)
|
||||
* [CVE-2023-48403](CVE-2023/CVE-2023-484xx/CVE-2023-48403.json) (`2024-03-12T21:15:56.243`)
|
||||
* [CVE-2023-48404](CVE-2023/CVE-2023-484xx/CVE-2023-48404.json) (`2024-03-12T21:15:56.300`)
|
||||
* [CVE-2023-48405](CVE-2023/CVE-2023-484xx/CVE-2023-48405.json) (`2024-03-12T21:15:56.373`)
|
||||
* [CVE-2023-48406](CVE-2023/CVE-2023-484xx/CVE-2023-48406.json) (`2024-03-12T21:15:56.447`)
|
||||
* [CVE-2023-48407](CVE-2023/CVE-2023-484xx/CVE-2023-48407.json) (`2024-03-12T21:15:56.517`)
|
||||
* [CVE-2023-48408](CVE-2023/CVE-2023-484xx/CVE-2023-48408.json) (`2024-03-12T21:15:56.573`)
|
||||
* [CVE-2023-48409](CVE-2023/CVE-2023-484xx/CVE-2023-48409.json) (`2024-03-12T21:15:56.647`)
|
||||
* [CVE-2023-48410](CVE-2023/CVE-2023-484xx/CVE-2023-48410.json) (`2024-03-12T21:15:56.713`)
|
||||
* [CVE-2023-48411](CVE-2023/CVE-2023-484xx/CVE-2023-48411.json) (`2024-03-12T21:15:56.780`)
|
||||
* [CVE-2023-48412](CVE-2023/CVE-2023-484xx/CVE-2023-48412.json) (`2024-03-12T21:15:56.847`)
|
||||
* [CVE-2023-48413](CVE-2023/CVE-2023-484xx/CVE-2023-48413.json) (`2024-03-12T21:15:56.917`)
|
||||
* [CVE-2023-48414](CVE-2023/CVE-2023-484xx/CVE-2023-48414.json) (`2024-03-12T21:15:56.983`)
|
||||
* [CVE-2023-48415](CVE-2023/CVE-2023-484xx/CVE-2023-48415.json) (`2024-03-12T21:15:57.050`)
|
||||
* [CVE-2023-48416](CVE-2023/CVE-2023-484xx/CVE-2023-48416.json) (`2024-03-12T21:15:57.120`)
|
||||
* [CVE-2023-48420](CVE-2023/CVE-2023-484xx/CVE-2023-48420.json) (`2024-03-12T21:15:57.193`)
|
||||
* [CVE-2023-48421](CVE-2023/CVE-2023-484xx/CVE-2023-48421.json) (`2024-03-12T21:15:57.263`)
|
||||
* [CVE-2023-48422](CVE-2023/CVE-2023-484xx/CVE-2023-48422.json) (`2024-03-12T21:15:57.330`)
|
||||
* [CVE-2023-48423](CVE-2023/CVE-2023-484xx/CVE-2023-48423.json) (`2024-03-12T21:15:57.393`)
|
||||
* [CVE-2023-5178](CVE-2023/CVE-2023-51xx/CVE-2023-5178.json) (`2024-03-12T21:15:57.457`)
|
||||
* [CVE-2024-0646](CVE-2024/CVE-2024-06xx/CVE-2024-0646.json) (`2024-03-12T21:15:57.700`)
|
||||
* [CVE-2024-22012](CVE-2024/CVE-2024-220xx/CVE-2024-22012.json) (`2024-03-12T21:15:57.953`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
99
_state.csv
99
_state.csv
@ -200725,7 +200725,7 @@ CVE-2022-34318,0,0,ee2e04bf754c379b5816fa247af6d025f7d7fb33e5911e0d2b30dc09a960f
|
||||
CVE-2022-34319,0,0,f0c823501e5894965ac6d9ed57d1dd3ca0b8c4ec2d000e9681c588e734d58246,2023-11-07T03:48:32.310000
|
||||
CVE-2022-3432,0,0,ab6b85a47217749966be4e8c245fb6c573126e20d2b210ad8c76ad8b863a08aa,2023-02-03T18:24:45.757000
|
||||
CVE-2022-34320,0,0,f002d4c5af5d11d655c22a0753f56cd6a0c984815c5b1258572e0ec1ac87a2e4,2023-11-07T03:48:32.423000
|
||||
CVE-2022-34321,1,1,446cd9021328420505d05a208772a864fdb91c5d378e2dac68e3b2275050e7cc,2024-03-12T19:15:47.303000
|
||||
CVE-2022-34321,0,0,446cd9021328420505d05a208772a864fdb91c5d378e2dac68e3b2275050e7cc,2024-03-12T19:15:47.303000
|
||||
CVE-2022-34322,0,0,56d0797334231c8bcd93b681e8d2bda02e4b07471c6e2bc8568bc8d2e5bef264,2023-01-09T16:16:09.550000
|
||||
CVE-2022-34323,0,0,9c4360c159eb3e0e14ee838f5ac5709e7de891789deedc7a8e76d748a6394caa,2023-01-09T16:22:36.953000
|
||||
CVE-2022-34324,0,0,fffbb9155e0ad85a1f120c200fe341013895e51b23d2d39ac3ff8e5e2c0bda6a,2023-01-09T15:24:44.180000
|
||||
@ -221980,7 +221980,7 @@ CVE-2023-30961,0,0,8584a8dd87c1a1aaad34ee5a0f0aecc09be0b1e2709534bd00668442991f6
|
||||
CVE-2023-30962,0,0,6db7ed0fc76b123c7c348b8ad22a9d53a6758b482429ec94d4f6b7b94dfb6391,2023-11-07T04:14:09.340000
|
||||
CVE-2023-30963,0,0,08ee7dab2580679df1423c8057c0fad42f6b01e80febc0319fa9c5ca82aec511,2023-11-07T04:14:09.497000
|
||||
CVE-2023-30967,0,0,6246ee0f3c942a2c540e2140d832814330936adf9602b9a25b94ff0c0ea5ff12,2023-11-07T04:14:09.610000
|
||||
CVE-2023-30968,1,1,ea58e673f6861cb74af70a1011c0d65eeea28aeb052d97cb18b036435226e2ba,2024-03-12T20:15:07.347000
|
||||
CVE-2023-30968,0,0,ea58e673f6861cb74af70a1011c0d65eeea28aeb052d97cb18b036435226e2ba,2024-03-12T20:15:07.347000
|
||||
CVE-2023-30969,0,0,a59f750e5c2029dcd0d86cb77bfd7d8c64cc03777e913b0707ac5208406c2a4f,2023-11-07T04:14:09.777000
|
||||
CVE-2023-3097,0,0,6a1aaa0de8b3d9a71561ccbb3842a82101382d140be5defd58eed55410f84016,2024-02-29T01:40:22.320000
|
||||
CVE-2023-30970,0,0,d7e144174523a7ba80c8e3114e26f5372d070cfac9bf268ac369ee629791ba4d,2024-02-07T21:04:19.733000
|
||||
@ -229706,6 +229706,8 @@ CVE-2023-42295,0,0,76e92c5a31a1c38c774b96fb948b716fe550c55e664576533af49902b5cab
|
||||
CVE-2023-42298,0,0,007b09605f4ed7b0628f77a85d1e0a7fe95be1f19353799459bee4c90043a90b,2023-10-17T14:11:02.190000
|
||||
CVE-2023-42299,0,0,54772fa99a7414f8b4e9da566be57b517ecfcfc76d5e3020251730f7847cac7b,2023-11-10T04:12:40.023000
|
||||
CVE-2023-4230,0,0,6d7bd5e717f426a79420f1ddb6b096459a8fff7bab939f00eda6d67ab17f196e,2023-09-01T17:12:36.097000
|
||||
CVE-2023-42307,1,1,45d1a2df0f389c8fa63fbddc3d045032c99edf9943e2d0491d832e5c79e9d05d,2024-03-12T21:15:55.703000
|
||||
CVE-2023-42308,1,1,c573c8073614954132aaf9f45f54741450bc1aae5095c974a7532814e8b588d2,2024-03-12T21:15:55.787000
|
||||
CVE-2023-4231,0,0,9fe438b362e987e1bd5478fecc03b722cdeb47042c8b48f7f1a0c8b2252caa0f,2023-09-20T15:34:03.560000
|
||||
CVE-2023-42319,0,0,87c7f208f7b7fa9dd6600e58b74858fba05deaefd76c0c4895dbb2329a41e4f1,2023-10-25T17:39:00.483000
|
||||
CVE-2023-42320,0,0,3e7352de3aa6a2b56fea495ac18def69c814404eafb546927db3da5449ccca60,2023-09-21T17:37:44.687000
|
||||
@ -230339,11 +230341,13 @@ CVE-2023-43271,0,0,eed1b842f51121f55ac61b5e82eb82d797b3d3f51dfbd7f29fc145284b338
|
||||
CVE-2023-43274,0,0,9a76a4f96bdabc078eca25d6d30a731c62d6b0536040a8aceec7ed331b2ca0b6,2023-09-22T02:15:02.017000
|
||||
CVE-2023-43275,0,0,a66f26a59cf0c59ffad4695c3eab962513cd731b129f69d22d80e3df142a296d,2023-11-21T01:51:11.677000
|
||||
CVE-2023-43278,0,0,0f16c98f2e89fb91931050970b11d8655bc98d54c38b788f418cf003b78d9eeb,2023-09-26T14:38:05.117000
|
||||
CVE-2023-43279,1,1,2678cdcd59ab90e0f89a0665657286053085312598cfa175ef26706c460adaca,2024-03-12T22:15:07.197000
|
||||
CVE-2023-4328,0,0,371da3fc45b68a0efdcfc87a7f560b95fe448a3483245968bf37f1cf8be27bcb,2023-09-08T16:15:07.617000
|
||||
CVE-2023-43281,0,0,56d43eafc66518f898f0c81e127f487e22af687eefeb51260967c6407c7cc8cd,2023-11-07T04:21:19.967000
|
||||
CVE-2023-43284,0,0,653c4223aeac7f457d39a3cd2a7626ef038d14cf3e013b79b9dc69a51dc40b3f,2023-11-22T15:15:09.303000
|
||||
CVE-2023-4329,0,0,90fe3f782a7469dbb8dc6b664c1989f544ff51163f32a419f94813e920dd2bfb,2023-08-21T18:40:42.853000
|
||||
CVE-2023-43291,0,0,64cc543ad8e57e146c4c6543666077d8703324efdb6007c729232dedfd630bf7,2023-09-29T17:25:25.957000
|
||||
CVE-2023-43292,1,1,8984c00ed269eab5f777ec84581090cf0edba80b882ca9e4ec98608d4da6d92b,2024-03-12T21:15:55.837000
|
||||
CVE-2023-43295,0,0,d41dfbf2d27d545700ba100e9d0c77ed6c69cab56ee2253e8c0673d945370ad2,2023-11-08T18:29:14.447000
|
||||
CVE-2023-43297,0,0,374096ab4bf7ab967d0bbb01a3ffd5cc0aa9699b3cf19a9c8bc527d59afc2d82,2023-10-04T17:05:58.947000
|
||||
CVE-2023-43298,0,0,f801a5ee7a9cb995161a69130501b1f7660522a40ea1936619259f0399769d3a,2023-12-11T17:48:50.780000
|
||||
@ -233488,35 +233492,35 @@ CVE-2023-48392,0,0,8477dfef0ae02c8ac4ae7fb286fa250f75ccfcf4d82395707585be88def83
|
||||
CVE-2023-48393,0,0,eb2be5ce9484bf33d839a19d622d5eddc9bdd71b5929ac2b7d10360261b406c7,2023-12-22T15:43:05.987000
|
||||
CVE-2023-48394,0,0,f94761a9a5fbb3d781474d8e0613186d5590df306bf2d0244fbcea680aefe60d,2023-12-22T15:33:02.573000
|
||||
CVE-2023-48395,0,0,a9b9ed9a0819a6cf1c7799cd009229fdc89125af333a902c4dfe6e9500197b73,2023-12-22T15:28:27.923000
|
||||
CVE-2023-48397,0,0,bba85537bb9d9070a0e33a6c69719e5815c9555e87354c48c68658b985ce2bcd,2023-12-12T23:39:39.640000
|
||||
CVE-2023-48398,0,0,5bf57bd82696309ae4b2bebe6e0acdd24f2a98bd3c945886f1fcbf53438030fd,2023-12-13T16:34:05.937000
|
||||
CVE-2023-48399,0,0,2e4c05a9b13a7c9f1ebd1d1f2cd0c06aec9e4617a01d74bf7b535f19b30a0203,2023-12-13T16:36:24.557000
|
||||
CVE-2023-48397,0,1,0f40b74572849e3a169abd20f43288ffd47c3f304a447bf084f9f58d617acb69,2024-03-12T21:15:55.883000
|
||||
CVE-2023-48398,0,1,0ee13cfc0f74ebfbd120c2c41be8e19aea8f2631ca53a29a78c716d1509f071f,2024-03-12T21:15:55.977000
|
||||
CVE-2023-48399,0,1,cbe5d65fc5119cd7c6a033a21577a316806fd2afb315505e38b941aee68389e5,2024-03-12T21:15:56.047000
|
||||
CVE-2023-4840,0,0,3e4a9cf58aed2b9d885199221a18ba07ef8aca70c40e8bba027cbd3a3145be70,2023-11-07T04:23:01.510000
|
||||
CVE-2023-48401,0,0,c675ad2386d514e82edf6fd4692503b2f998f5dde4dd2df36b39f4659b5cccab,2023-12-12T23:24:39.517000
|
||||
CVE-2023-48402,0,0,b3ecf52195288f6dfaaa9722abd0327c04096a6c800ca4c8d1117467aa983f2e,2023-12-12T23:21:11.557000
|
||||
CVE-2023-48403,0,0,ec20f792698e5a903bcc6bd84537b5635d8ed90dd7cf9bbdd77528ad94e8fe61,2023-12-12T19:51:22.450000
|
||||
CVE-2023-48404,0,0,1bcbc2c18bbe73fb96cb5131151986d8ddd11d3cf85cab07ce71badb2394c54a,2023-12-13T16:40:24.357000
|
||||
CVE-2023-48405,0,0,fa677e9709a659ac6f4d769ec2887818b253ce43eb953d88566a8c0f479f2293,2023-12-13T16:47:14.437000
|
||||
CVE-2023-48406,0,0,2537b6662f98ac5591904779e53a04619ec3845937c4fb952336fd4ccd43cc3f,2023-12-13T16:47:59.943000
|
||||
CVE-2023-48407,0,0,171b877c11c322b1beb0640144dabef0f428accd1bafd230b4401d1f00ea0eb2,2023-12-12T19:54:28.383000
|
||||
CVE-2023-48408,0,0,7742e0ecddada067f5865249ba2ef27cf99d3692db06374c83bc97b5c27b3348,2023-12-12T23:28:59.970000
|
||||
CVE-2023-48409,0,0,e0cc6432fb901069befdb9d8ae030afaf3b1bfde21358ea92e76e57116e2a4b5,2023-12-12T23:46:43.867000
|
||||
CVE-2023-48401,0,1,08309828fbac2da2201c401c43351b14e965e5f974d316f85c266d41023d3ebc,2024-03-12T21:15:56.107000
|
||||
CVE-2023-48402,0,1,5642f525775a05cce3f6688725d6bd9fec34ae21e538fc2942fc156775ca6e99,2024-03-12T21:15:56.173000
|
||||
CVE-2023-48403,0,1,c5fb049993a5647af435807971a0e9f7ec05b718035f893d61577f72ae6ae723,2024-03-12T21:15:56.243000
|
||||
CVE-2023-48404,0,1,106e89599f75b51f1c079e853f148819bfaef1dab07de54623396392ed66dae4,2024-03-12T21:15:56.300000
|
||||
CVE-2023-48405,0,1,d42cb2b5604ced985b09b5cc8f78215d18ee8047294239cea09d9d315c6d324b,2024-03-12T21:15:56.373000
|
||||
CVE-2023-48406,0,1,b222d4050aa8bb3ddfc44b99e05d7440937d66769ed1400c1b83356ee3dce84a,2024-03-12T21:15:56.447000
|
||||
CVE-2023-48407,0,1,047ee1f6dcf289e28b372a9fd3234522d6750de34e8663f5573fb5a17bef8fb7,2024-03-12T21:15:56.517000
|
||||
CVE-2023-48408,0,1,db84ee177e1761fe6dd407a303c23e4a4ea3cd3f318d28cb89f7adf8ff1410ad,2024-03-12T21:15:56.573000
|
||||
CVE-2023-48409,0,1,c542d952c79013b65a101348b69eea108202aa6eae292a78e7bd258331562e32,2024-03-12T21:15:56.647000
|
||||
CVE-2023-4841,0,0,c770863e8c8f8968d3e90ab3f02dd981ac57a21e6f686867bd70194745191938,2023-11-07T04:23:01.670000
|
||||
CVE-2023-48410,0,0,523ee4c5c72c84e3164fbf4e54d8b6501372273d3150f8d25fe9510d4d913a62,2023-12-12T23:48:00.343000
|
||||
CVE-2023-48411,0,0,50747fa23a36e8d924d9dcd04a5cf55507824d79fed1599a664172f80a3984ef,2023-12-12T23:53:08.647000
|
||||
CVE-2023-48412,0,0,60e58744f5cd04e64b8ec8fead848556ca7523bbac836fb9ddee87244e71f7e3,2023-12-12T23:56:00.697000
|
||||
CVE-2023-48413,0,0,5c60b5744bb2abc983b2391aa69e0aae144cf80913e0e083824589eeb70c156b,2023-12-12T23:58:05.553000
|
||||
CVE-2023-48414,0,0,aaffd247b093dc1207a0589af67012db58f1729e6bd49231b3aa452de6873880,2023-12-13T16:55:22.940000
|
||||
CVE-2023-48415,0,0,342a4c028db4d1b82e30399c78695e05a4fa5c7f955b5403ef92520a59ee35ed,2023-12-13T16:55:04.633000
|
||||
CVE-2023-48416,0,0,9dcfb0c53fee115683b23d470baf2910f5d8d8f30ea746cfd8d280bc5eb39928,2023-12-13T16:54:45.200000
|
||||
CVE-2023-48410,0,1,af547016a9acdbd2cc71df01f11d24a9d232cfb119d903f7735b56065d62011b,2024-03-12T21:15:56.713000
|
||||
CVE-2023-48411,0,1,28da38c328b7fd06e522e25d33bb0143abd27f067c4280c7aea9dcf9056b0d02,2024-03-12T21:15:56.780000
|
||||
CVE-2023-48412,0,1,5d77528d725fc576b002cfcd485f4cea5cbafc1adc6bc648aaa7f141b5758deb,2024-03-12T21:15:56.847000
|
||||
CVE-2023-48413,0,1,be85476956d2ff1203c58a8c28c1a21f7cf6ba919b26c06f65d335b8b1b99fd7,2024-03-12T21:15:56.917000
|
||||
CVE-2023-48414,0,1,aed27422040af7906c3cb4e7da8c86a49146a1cff1cacfb5725755498be100b9,2024-03-12T21:15:56.983000
|
||||
CVE-2023-48415,0,1,208c823bbb6c1a60d9a3787f306baa165c814709fdf6b2a030c581bf2f86c4d3,2024-03-12T21:15:57.050000
|
||||
CVE-2023-48416,0,1,8841ef659ae8d9a6ce19a537c99726de55cc0b983b041fef8715df5295dfb688,2024-03-12T21:15:57.120000
|
||||
CVE-2023-48417,0,0,3b5b01174ef20cbdeb7aef20dd756cf66e388b326b198c4100edc6f4242694f7,2023-12-13T21:16:07.527000
|
||||
CVE-2023-48418,0,0,c2d39a4a01f517f1e3ac0ef4729d2e10af43f99c34b3251ecaa0d9ea8916f084,2024-01-10T23:15:09.053000
|
||||
CVE-2023-48419,0,0,70e7e5bfa1ffd05c08d649bd2b1327c23a0b8f490997849ec24a5c2cf66ada7c,2024-01-09T15:36:14.850000
|
||||
CVE-2023-4842,0,0,b6aa8e2fa6a834d6302178f9c141dd0d8500812afc3b1821e3cff82fa288a07d,2023-11-14T19:21:54.333000
|
||||
CVE-2023-48420,0,0,5ba6cc055366dc0a744d315ae7206f71f6ca698d3a01c8c9b74b817a63eab718,2023-12-13T16:54:25.547000
|
||||
CVE-2023-48421,0,0,28aa8e00b5bc4c098780b722650187d2c92fad2592bda35949ce9d51dad9aed6,2023-12-13T16:53:57.040000
|
||||
CVE-2023-48422,0,0,4a797f68a1a22382d7b4a63022610ba87505dddda142253cf526d9211b105f13,2023-12-13T16:53:03.923000
|
||||
CVE-2023-48423,0,0,b624dc33802dc84494be864ce98befb20fb033895998a4be0c5996d49bfafc25,2023-12-13T16:52:00.397000
|
||||
CVE-2023-48420,0,1,a219a7b8f8727fa51ccfd4b13f4034f207003e5a75f23fd03a821b8f894e986b,2024-03-12T21:15:57.193000
|
||||
CVE-2023-48421,0,1,0a65408bf8902031dae43f961f97729015ca806a846f5145d776e72499323a7c,2024-03-12T21:15:57.263000
|
||||
CVE-2023-48422,0,1,2265830fef50ee17d0cdb88ad1b0f725c4b672e431a26714116d00e7fa2593b6,2024-03-12T21:15:57.330000
|
||||
CVE-2023-48423,0,1,2592e57664f5009fd3555c0d2a8829a7ac77fb5cd27d61c148279d4e4418e21d,2024-03-12T21:15:57.393000
|
||||
CVE-2023-48424,0,0,d752209f4f9677c584126eabd07ea41d6bb8ff8455f63189bdf51949cb39720a,2023-12-13T21:16:23.030000
|
||||
CVE-2023-48425,0,0,10d95bc597f5358cb6e581ae2a0843df083fdc479dc30e50327f5f3a3887f611,2023-12-13T21:16:31.457000
|
||||
CVE-2023-48427,0,0,adee4e0ef84fd45ed140951044cc3843719374b6b3ccca3202590ca4c66a74c7,2023-12-14T20:07:17.240000
|
||||
@ -235431,7 +235435,7 @@ CVE-2023-51773,0,0,8f846ca150db66d0b80073ac6f518008babc62296a2b97f49439a329f7415
|
||||
CVE-2023-51774,0,0,fefdc22f78e7e05f25a3f4e35760275c17174e95fd4fc343f6a5c594077f56bb,2024-02-29T13:49:47.277000
|
||||
CVE-2023-51775,0,0,d19885f765b5b97855c2cc0c3f3642c970a937503b8bc204147850896ff7aeb9,2024-02-29T13:49:47.277000
|
||||
CVE-2023-51779,0,0,12b82d26e314364b82a1986c3c91216c9a108f09c5dc18b48ab69ac05149b4b3,2024-02-29T13:49:47.277000
|
||||
CVE-2023-5178,0,0,e2356912d3d1775d46fdb546e960d63b505f24bb763e701446a1e27acb754748,2024-03-12T15:15:47.210000
|
||||
CVE-2023-5178,0,1,86d12270da0d2773b51c729f3417bbdc491f365442b885cf65f79a69950fce2b,2024-03-12T21:15:57.457000
|
||||
CVE-2023-51780,0,0,a16a72c66560dfdcb72edd12fb9c9ab59947cff8de82bf627e84355dea3d28bf,2024-02-01T18:51:15.553000
|
||||
CVE-2023-51781,0,0,943dcd6bc9ca41b409437da8a4375ab31f17544ddbdf352ff447f72ff83a2193,2024-01-18T19:58:50.630000
|
||||
CVE-2023-51782,0,0,4b4197672003cf4578a2bf0f31c16f034d56fceca2a499cb095add5bbd47b401,2024-01-18T19:31:37.630000
|
||||
@ -236086,7 +236090,7 @@ CVE-2023-5399,0,0,2d6fd5d7032d3fde2b56bbe17324f865d32db5a9ef5d31298ecfc991427861
|
||||
CVE-2023-5402,0,0,d6ca0e0d138e7f0e18108bc80eb991912358210793d36b8686051b13c8765059,2023-10-11T19:19:54.037000
|
||||
CVE-2023-5408,0,0,443628942e473656420f67d7b7b9b3fa498d5d13f709544aa261b0e4696090c6,2024-01-21T01:48:09.767000
|
||||
CVE-2023-5409,0,0,fbd015e1d6485109c973409b573d46ee4742f3527e9f86b450178ea53a356496,2023-10-20T15:42:22.057000
|
||||
CVE-2023-5410,1,1,0284e238f9d9814a3572987bc4c5bf280dfeeba7f5b91c1b33a5bdaf6b68058c,2024-03-12T20:15:07.550000
|
||||
CVE-2023-5410,0,0,0284e238f9d9814a3572987bc4c5bf280dfeeba7f5b91c1b33a5bdaf6b68058c,2024-03-12T20:15:07.550000
|
||||
CVE-2023-5411,0,0,f4bcf198f04caf620b198f0ec2918fa9ded24d58a6bd16b2268e79d389820a85,2023-11-27T20:15:34.987000
|
||||
CVE-2023-5412,0,0,2f9efa39e9d561fae0d9329c540519d3815f404c05c03f1dd3e24b81dea0248f,2023-11-07T04:23:58.473000
|
||||
CVE-2023-5413,0,0,3a28d9238b6e8c0f4006a763334223fef1ed160db83bc352e308332373363a30,2023-12-22T19:50:32.857000
|
||||
@ -237592,7 +237596,7 @@ CVE-2024-0038,0,0,8798af074e75acf30506472783c98fe3ca6f9989b456036fb13460ce3a0660
|
||||
CVE-2024-0039,0,0,eef2053d277ee92cf2426457ee1c3166f51184d93b11850784119e4a32b8f532,2024-03-12T12:40:13.500000
|
||||
CVE-2024-0040,0,0,4afedb45d19d9a2df9a3ecdcf577c422a3b0751bcf061eb077253f060c2e8e31,2024-02-16T13:37:51.433000
|
||||
CVE-2024-0041,0,0,4dc5cf8202a81389ba1711e9ab4229bb6c315c100ad135fbbcb3e9e75477a4a9,2024-02-16T13:37:51.433000
|
||||
CVE-2024-0044,0,1,252052610b4ae0ffd4cf0806647555b0208a30970458880cb5d65b093fa59399,2024-03-12T20:15:07.633000
|
||||
CVE-2024-0044,0,0,252052610b4ae0ffd4cf0806647555b0208a30970458880cb5d65b093fa59399,2024-03-12T20:15:07.633000
|
||||
CVE-2024-0045,0,0,74be948ede2409dd1fced42dd7b971d5edcab5dd8de9a50e019ab3d0529aa80e,2024-03-12T12:40:13.500000
|
||||
CVE-2024-0046,0,0,559bea19cfab8f318d743976cea70838a7c0266c66f3f824e506f47669c918de,2024-03-12T12:40:13.500000
|
||||
CVE-2024-0047,0,0,04136819bdba13d79de536bc61d32ae3710c87bdb217042ab64bc2b648e573cf,2024-03-12T12:40:13.500000
|
||||
@ -237784,6 +237788,7 @@ CVE-2024-0380,0,0,3f3894f5083e9ad8feafa10eee28775174e246729c7af4fbf8093c7f923985
|
||||
CVE-2024-0381,0,0,cc404e9ab60526f4cfd2cba8d7ea8cb6a7e1eef465808eab04f8e02e2e2ed4df,2024-01-24T20:48:35.827000
|
||||
CVE-2024-0382,0,0,ab33ccbf2aeb6736aa9a498513aba9dba3b237c3d9fe3e776d686fd399098525,2024-02-07T23:32:02.143000
|
||||
CVE-2024-0384,0,0,5eba97ede5e4794d92f0b763409403bdfcbde410a2df433510faaeddc85a4fb3,2024-02-07T23:32:14.717000
|
||||
CVE-2024-0386,1,1,9924a53603d4063f6e8699ad337382287b8e5b405311999ccd3513eded448017,2024-03-12T22:15:07.250000
|
||||
CVE-2024-0387,0,0,23bc6e3476c46e45c0f1cab9e646ec38242c781b5838e9b0de1712412e6d8882,2024-02-26T16:32:25.577000
|
||||
CVE-2024-0389,0,0,72b9f5269adae6a8b489d96d3cadfcb14eda75cc21b32e2278bad2966709f2e2,2024-02-29T01:43:10.310000
|
||||
CVE-2024-0390,0,0,9f797e4a099c94c2da0407f1b9d4e4b6fb9f46975b208cacd9e42b322aa5198b,2024-02-15T14:28:31.380000
|
||||
@ -237990,7 +237995,7 @@ CVE-2024-0641,0,0,a011c2128d997633c3943566b2966020fb742742c755347ad42b0febd95e30
|
||||
CVE-2024-0642,0,0,a90bcf6571ee802087327f525ede816b704f8421563c66e3216693601bbf1072,2024-01-24T19:29:41.893000
|
||||
CVE-2024-0643,0,0,aa848a8e1b8cfe92b510534ff6e1f903f998e7f6bc6404cff677acb1bb355f8f,2024-01-24T19:27:40.553000
|
||||
CVE-2024-0645,0,0,e3ff0667dc75a2979d99db4153cc7d61b0ceb0c517f4cea54262eeab768eb5f4,2024-01-24T19:24:06.717000
|
||||
CVE-2024-0646,0,0,5b93560dc0c0c8396f3595849fb8d36ea15972a8e86d2ce05bdc314d3bd99591,2024-03-12T15:15:47.500000
|
||||
CVE-2024-0646,0,1,f2a78614a32819d4cbc20fc1d4755689f2378ca167d665ff617b66a50666d959,2024-03-12T21:15:57.700000
|
||||
CVE-2024-0647,0,0,0332e6d59eefdc64eb05b07e4fa46b058d042ccaea99c8f45f753fe35b015cbb,2024-02-29T01:43:23.930000
|
||||
CVE-2024-0648,0,0,a4f5a25e8c9710190b25da008c97da5d141e1a6619a4b29f822c0647da977a03,2024-02-29T01:43:24.013000
|
||||
CVE-2024-0649,0,0,1ed5652bc1679829cc2258e6f05d507deca75bc30838839b4d286f0055698888,2024-02-29T01:43:24.097000
|
||||
@ -238797,7 +238802,7 @@ CVE-2024-20292,0,0,bd2670c9582b587cdf9a7328c2351789f5b8997cab8f7bfcaca92954507c5
|
||||
CVE-2024-20294,0,0,1d3a9a3e9164827aaec419fc6a9a7d933913e3a790dc40da7ac082a33393bbf9,2024-02-29T13:49:29.390000
|
||||
CVE-2024-20301,0,0,5731f674f5ae2bcf96420fc328e70e5146901802d1ab3db25461c019cd20961d,2024-03-07T13:52:27.110000
|
||||
CVE-2024-20305,0,0,ab61a4ab7882e267880cc2c0e6b3ec1ab9c8b4d0dadf3a4832bdf14ae2ae012d,2024-02-15T19:56:38.910000
|
||||
CVE-2024-2031,1,1,5bfeb27967b53a767d4f0e66673d96688046f9d3e07a3759d7a758301037d76f,2024-03-12T20:15:08.690000
|
||||
CVE-2024-2031,0,0,5bfeb27967b53a767d4f0e66673d96688046f9d3e07a3759d7a758301037d76f,2024-03-12T20:15:08.690000
|
||||
CVE-2024-20321,0,0,6de34d7d404f536decd9f5a380e1c4f28760edee84d237a9b02d7c6e56d785b7,2024-03-04T22:45:23.647000
|
||||
CVE-2024-20325,0,0,dfe1f947bf6fc9efa452f1881c4faae47bd9e909bfa416f69baa534db16c5289,2024-02-22T19:07:27.197000
|
||||
CVE-2024-20328,0,0,f336e809226305b79cd50f26fae203aa1632211d86957dd92abacb2f83d51af6,2024-03-01T22:22:25.913000
|
||||
@ -239037,9 +239042,10 @@ CVE-2024-20984,0,0,585d056539d5b2a7ec102aa133531262bc58f31d6c087eb30a1c927656ef9
|
||||
CVE-2024-20985,0,0,1887d4efcd4074083ed6001311349bddeba13ac350578caa9144fb2633e7d1e2,2024-02-02T17:27:12.127000
|
||||
CVE-2024-20986,0,0,55fd916bbc66a048aba24029df1cdbff6d17cbdc5963bc85efdc3f349c48d99c,2024-02-20T19:50:53.960000
|
||||
CVE-2024-20987,0,0,e6a4199f934ca8909c51db00ae903048e2b51791ebdf6565c06b10750c7af3ef,2024-01-20T18:30:16.877000
|
||||
CVE-2024-2107,1,1,10d51b6595aaf59e536b37822b146f4fcc0220ec802d17f13fff42f31c495164,2024-03-12T22:15:07.470000
|
||||
CVE-2024-2127,0,0,7e732da9362123c901ed00a29dfcc3ca896b81c43d152f47d3b1708469785552,2024-03-08T14:02:57.420000
|
||||
CVE-2024-2128,0,0,b758ae1e45bbf3f98be89f21520e72433f96873d6cb56cc91a1f688f1fc159ac,2024-03-08T14:02:57.420000
|
||||
CVE-2024-2130,1,1,283fcf0cb4a654837bfd93e16223a37a8ecb981b76489657d60e28f66456292b,2024-03-12T20:15:08.853000
|
||||
CVE-2024-2130,0,0,283fcf0cb4a654837bfd93e16223a37a8ecb981b76489657d60e28f66456292b,2024-03-12T20:15:08.853000
|
||||
CVE-2024-21304,0,0,2e98a12f2b0e3643480c1614b35417778c5dac15f77eda4338c6776607aa2617,2024-02-27T18:04:06.027000
|
||||
CVE-2024-21305,0,0,add765edb797e1537c086895a6f6b6be7c9ee2d099bfe2aba1b67029d2679780,2024-01-12T18:48:04.967000
|
||||
CVE-2024-21306,0,0,416302ae665f6d7405fe0853b1869120a9e90d3549a767ac0c8683038e02649c,2024-01-12T18:47:54.860000
|
||||
@ -239368,7 +239374,7 @@ CVE-2024-22008,0,0,3d18c0dc072786f75e976395b39281f106a7571da48f79c0967f5ea6fc70f
|
||||
CVE-2024-22009,0,0,94a8a375b23d1ccd5295b6b266b887bb0fd4e6e4f398c4807361c57c45df8255,2024-03-12T12:40:13.500000
|
||||
CVE-2024-22010,0,0,c8be08522110436a9d4fa99d4021d5a2fb6c1481cb50733e6d40fe00f78adb8d,2024-03-12T12:40:13.500000
|
||||
CVE-2024-22011,0,0,0b600b1e31e74facb27c71d7c9b3f514c8b8b4c777fc0d39f1c7ce9fc8756817,2024-03-12T12:40:13.500000
|
||||
CVE-2024-22012,0,0,3496e1376faff79bfb913c3511ac976ce741484efad2ac0961c5ff3c4bf8d282,2024-02-15T15:10:05.857000
|
||||
CVE-2024-22012,0,1,6083637305fc19ea62a8c209ebe6bfac1cd035e045c787ca530a090291dc1971,2024-03-12T21:15:57.953000
|
||||
CVE-2024-22016,0,0,72bb3341c866069974fe863b6c9e848e25809f5f0697d51cda8a3c348c9671f4,2024-02-07T17:33:12.727000
|
||||
CVE-2024-22019,0,0,973223829547718a3f4f3bb4fa40a22f9bc1dc5683cd76da421f37d5d7095881,2024-02-20T19:50:53.960000
|
||||
CVE-2024-22021,0,0,ba38d4b86a2c5af951f989c7a28594b6207f0b19739ba3d580be6e4d49001bfb,2024-02-29T01:44:04.690000
|
||||
@ -239876,6 +239882,7 @@ CVE-2024-23295,0,0,11339cc0778c5660cfdfde02f62fcb9fc218757d722b581630970bfb87b76
|
||||
CVE-2024-23296,0,0,40713c04751a3ff20ec43f1ba5d9e1c3448f8a0ef399da497fbf74ec2a3b2647,2024-03-12T17:31:03.837000
|
||||
CVE-2024-23297,0,0,24ee6fcfdad75d10a074c7f7c8c3078e2c905d064d4f4a83f74c1bc6866f52d0,2024-03-08T14:02:57.420000
|
||||
CVE-2024-2330,0,0,0a9f9e37587f34158a3bf6f7d53eb1a5e641504fa11cf02eb4524614459dfa8a,2024-03-11T01:32:29.610000
|
||||
CVE-2024-23300,1,1,98c10e9369784f21fe476273caffc7e094632c37993a86bd197552d4249c5ab1,2024-03-12T21:15:58.077000
|
||||
CVE-2024-23301,0,0,95f1c4c0d3c3f56beb5ca2f43c481bd416943d89ac106cdf8ea6bddea7fc220a,2024-02-21T03:15:08.950000
|
||||
CVE-2024-23302,0,0,863344aa30e4660a85cb1dadb5cc739d77d5cca4411a54dffe0a3cc5e6d4c938,2024-02-29T13:49:29.390000
|
||||
CVE-2024-23304,0,0,f4bc63f089c081f8de89565719320483c4f38e3af47af8e7dc8d4d30748891c3,2024-02-13T22:49:18.687000
|
||||
@ -240174,6 +240181,7 @@ CVE-2024-2394,0,0,a1808c3e423b31a5f61767caea3e96f7bde3f2a439710708c637f27d2a25cf
|
||||
CVE-2024-23940,0,0,88f3246b7d729e9740dbc7accb734f511d890171cb976d7dde750494e61216dd,2024-02-06T19:19:33.920000
|
||||
CVE-2024-23941,0,0,12a475e2ca4f3cbb312854167865e0f548c636a650b921a0048a701032c53d0b,2024-02-06T21:37:12.433000
|
||||
CVE-2024-23946,0,0,32194d05d3f7a3a80cd0b416a872a66ff74b3120ea9e0897100b1fe32331e71d,2024-03-12T17:29:17.243000
|
||||
CVE-2024-2395,1,1,3e61f5ea9dfd95d1f92a83bc4c09098f523f65d957c9cf51405d198c92965824,2024-03-12T22:15:07.640000
|
||||
CVE-2024-23952,0,0,89289c4c1b03193a134cbe14ed609452617a970c4d8ae9dfbad6f91cd36db610,2024-02-14T14:16:07.460000
|
||||
CVE-2024-23976,0,0,c6327f87e3c19d6c46c6a7ff9e0644c74688322bbd7d7b77f1f15872b56e20b5,2024-02-14T18:04:45.380000
|
||||
CVE-2024-23978,0,0,dce24325560fbd2c8a4b55826a990c779123e234941d6c9decad894b94e084c1,2024-02-10T04:09:02.587000
|
||||
@ -240202,15 +240210,20 @@ CVE-2024-24034,0,0,f4e2cb1ad61decc8759fc1601847f210f2a72bb15bd38e4d1e3133a19621c
|
||||
CVE-2024-24035,0,0,77bbb29060dad0a4e27b56775f789e0b578831621d3fa9615a4c8def660cc461,2024-03-08T14:02:57.420000
|
||||
CVE-2024-24041,0,0,f96650c9700d93c943d8efc95d65c599a8e77cc1d7aaa4ba87820d6237153959,2024-02-07T17:14:41.607000
|
||||
CVE-2024-24059,0,0,3da8cffbcfd869f14b04835347f156c5cf1a6025fa9627a3ec1ec79a41a9d0be,2024-02-03T00:40:43.793000
|
||||
CVE-2024-2406,1,1,2dc07881b7a7b1d566b702e1421c92da2f7262c3d1879084e587fa3face0d9c6,2024-03-12T21:15:59.713000
|
||||
CVE-2024-24060,0,0,3a6250076b98d97024da5e52a26f1f0c29807ef38de327e60f431783e4f1deaa,2024-02-03T00:40:48.600000
|
||||
CVE-2024-24061,0,0,3ae0e78c2ecb0941fa62f48d1dc7792d4436b76ec841f1dbf3bf2317943894c3,2024-02-03T00:40:50.623000
|
||||
CVE-2024-24062,0,0,ce51fb5fa7f08b3262a47fca149a06dc25ea5ca7c584b3ae7210563fa9fd54c1,2024-02-03T00:40:52.877000
|
||||
CVE-2024-24091,0,0,6258a73a312c8c072d234b916137958d60ec77d8bc24aab7428a6677fc85f73a,2024-02-08T13:44:21.670000
|
||||
CVE-2024-24092,1,1,eed6a3631e4178460f4f36bc487ccb1e78d316a4b8d685cdaa9d0a74a6b4f388,2024-03-12T21:15:58.217000
|
||||
CVE-2024-24093,1,1,70dd2fe737fb8fe95e9f34b1d303380461466976aa8e6b7d5215bd00c384e772,2024-03-12T21:15:58.370000
|
||||
CVE-2024-24095,0,0,d1e50126ccf5fc32a5efb1c5a1b74cfade8c6c5361c56208004f892bd1f9b46e,2024-02-27T14:20:06.637000
|
||||
CVE-2024-24096,0,0,711acc667f5940cdd09a2785b5f63f7f2c3ede063ebd3b4223e93ee32bf7fb53,2024-02-27T14:20:06.637000
|
||||
CVE-2024-24097,1,1,1924697167b4b00ad4cb9be51226e06335a886fa1725d099ad5cce05903e8e2e,2024-03-12T21:15:58.497000
|
||||
CVE-2024-24098,0,0,278909d70f7cff296783b4b8a548916c6d64b22508219b62d702151781ea252e,2024-03-05T18:50:18.333000
|
||||
CVE-2024-24099,0,0,e75badf6651a6d84e33aa0d6378d82bf7383b7d186bb27d0ab0f05af5c87836c,2024-02-27T14:20:06.637000
|
||||
CVE-2024-24100,0,0,a27c32dc14c8987b127be9cd991f37144e95622920d0f3983f740c9f65a1ed81,2024-02-27T14:20:06.637000
|
||||
CVE-2024-24101,1,1,13476ed8eedd9aa22183297cb5f4ca7dd22cd417d2c9f709411f0c56b13a9fc2,2024-03-12T22:15:07.423000
|
||||
CVE-2024-24112,0,0,85e73cacfedc53adcf11f5f918fd045bef98237a7befd9901dcc9210924d64d7,2024-02-12T17:36:55.950000
|
||||
CVE-2024-24113,0,0,9eef336ce15946e031a73b26b3e239a7b6b89883c338eb5418a2161e5a5d4cfc,2024-02-15T03:07:46.013000
|
||||
CVE-2024-24115,0,0,14551eae0714aa949f3a2722e897b385606f2d79896bdde4df5b423d4061d078,2024-02-15T16:01:23.457000
|
||||
@ -241027,7 +241040,7 @@ CVE-2024-27103,0,0,ba41469ea697f39b66b49d222d300153b0a74c2fb1fbae161829f573b3ab9
|
||||
CVE-2024-27121,0,0,9ff77f57a33b5e7894f52bbf3c39c57fbfb06ac4fc9de183cada29d2e4e25cb4,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27132,0,0,3211e33e39363e184b8550fc16d833a0f590c8e4cd3ef270e1d091501b93f80e,2024-02-26T13:42:22.567000
|
||||
CVE-2024-27133,0,0,1abfe171f722b9df6ead5b24935068c395a52a06c146ec300701d2b7e86523ce,2024-02-26T13:42:22.567000
|
||||
CVE-2024-27135,1,1,5be2c010535362e0aa81ced8c2532ce28c48502a4bc4b6eaff764aa17ef9f50d,2024-03-12T19:15:47.567000
|
||||
CVE-2024-27135,0,0,5be2c010535362e0aa81ced8c2532ce28c48502a4bc4b6eaff764aa17ef9f50d,2024-03-12T19:15:47.567000
|
||||
CVE-2024-27138,0,0,1ec0ded3b41c12b07651e921188be783731716c54fb55c30f65f5b3e8197e8cc,2024-03-01T22:22:25.913000
|
||||
CVE-2024-27139,0,0,66ddd9efc34252e5e972ac0e5a31e042faa3995b86c5ae6f0f108c10e1d7b562,2024-03-01T22:22:25.913000
|
||||
CVE-2024-27140,0,0,34daddef6e0d13f2bea16bc1184887cdd01053137a36a3bc5699d2875c449127,2024-03-01T22:22:25.913000
|
||||
@ -241079,10 +241092,11 @@ CVE-2024-27298,0,0,1aaf802a3586818726ce977e3c4d8b52b79c9b45f43876bfaeae085dddddd
|
||||
CVE-2024-27302,0,0,f49f7cb8056f6127ae14fec0cfff2d0bf177dfba1318b206d31d7b548bf3e9f5,2024-03-06T21:42:48.053000
|
||||
CVE-2024-27303,0,0,5bf58561ed507a70ca73108a11218e0be9a2a377c18b42118ebe9af756d8ec79,2024-03-06T21:42:48.053000
|
||||
CVE-2024-27304,0,0,a58fd7f36bc322ab36f59f23fc0b881917cc0b6bb38909a990d60361c28f67b2,2024-03-06T21:42:48.053000
|
||||
CVE-2024-27305,1,1,b6c0d454d3ef629ab59b3ab481527c72c12308d3a6ae187431beed16c875a863,2024-03-12T21:15:58.630000
|
||||
CVE-2024-27307,0,0,b3e5647d01e692e99d0628de858f80e073a681ef610b737f1cd9e2cbd19d0a87,2024-03-06T21:42:48.053000
|
||||
CVE-2024-27308,0,0,49dd978921f33ae11ae51b9b406f93a1a4cbfa329fe8c55041f5f46036ef5baf,2024-03-06T21:42:48.053000
|
||||
CVE-2024-27315,0,0,1b06bd54abb4ee7969c3aca53e6bed402762ed42c4492d0ee8674e3fa0b42312,2024-02-28T15:15:09.670000
|
||||
CVE-2024-27317,1,1,89ab3da74e976306890048f4b6ea554dbd24e8ca4de3fa3edc17a0fa32902169,2024-03-12T19:15:47.777000
|
||||
CVE-2024-27317,0,0,89ab3da74e976306890048f4b6ea554dbd24e8ca4de3fa3edc17a0fa32902169,2024-03-12T19:15:47.777000
|
||||
CVE-2024-27318,0,0,31cd351dfd297129ad7eaad5463f641941f9f095dfce65183a940040c8e71a76,2024-02-23T19:31:25.817000
|
||||
CVE-2024-27319,0,0,bae163f4fbb8c727a5f96d6a2e9fade6279e85a3e2f58bd6b58e78425790acb1,2024-02-23T19:31:25.817000
|
||||
CVE-2024-27350,0,0,dcd7c665f1de1305fedd66ae5b35ce18719811fd40fe202fcd475df4fa80bd9e,2024-02-26T16:32:25.577000
|
||||
@ -241147,7 +241161,7 @@ CVE-2024-27758,0,0,6abe87e0a8905ac150ade2fec85250ff5e7fbf580c101c16b193b98f7d581
|
||||
CVE-2024-27764,0,0,a6da085213081f41482d74001d5b27250ddae1567bc465fa0f4b1023f8322f06,2024-03-06T15:18:08.093000
|
||||
CVE-2024-27765,0,0,c9283b485df441e5cf44e98a2bcaa6921e6b7ae7825314dc1fd3bb862197fb6e,2024-03-06T15:18:08.093000
|
||||
CVE-2024-27889,0,0,a24eb09c70fc8e243900497cf84a2002dc9fb9fdcf0cc7381ab2bee2e01200d8,2024-03-05T13:41:01.900000
|
||||
CVE-2024-27894,1,1,0e6c0963b0fcfa2d9f368e7425c9fc6bdbf3b68d454d8eef6739402db46e5f55,2024-03-12T19:15:47.970000
|
||||
CVE-2024-27894,0,0,0e6c0963b0fcfa2d9f368e7425c9fc6bdbf3b68d454d8eef6739402db46e5f55,2024-03-12T19:15:47.970000
|
||||
CVE-2024-27900,0,0,00f9885d5a06fec36b56a14fdc3be21ddc255c1561a408e91e09aee1b7ac8b37,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27902,0,0,7aa835c5c3cccf2434107e43a6dd21c3ee48d8e6664a62d49734964bcc016141,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27905,0,0,c7138ee734428b73e57ef70bc0c3a87d66350c09e2b81d6d3c89882bb51a7608,2024-02-28T14:07:00.563000
|
||||
@ -241169,15 +241183,15 @@ CVE-2024-28094,0,0,45821c38270b8552e50f50b73436d99164a20d22d9b4b8876276d92b2a0a8
|
||||
CVE-2024-28095,0,0,cc359d20cf58cf4c4e6a4bc345ac1d1135a557dfb7920f405bfe639456bcfe46,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28096,0,0,bd233bb77c2105c8f9ae41f3196895f407f421cf037a91cc0eb753e3f00e4372,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28097,0,0,ad0a3d7a6b96970687d28d32c41921c3200422c4265f25f269de512c4cb8079e,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28098,1,1,998118abb5151f2ca216c3416e6f1293d4b616825a40a48d114e25eb304f865b,2024-03-12T19:15:48.177000
|
||||
CVE-2024-28098,0,0,998118abb5151f2ca216c3416e6f1293d4b616825a40a48d114e25eb304f865b,2024-03-12T19:15:48.177000
|
||||
CVE-2024-28110,0,0,0aa63c709bee34101fee09332c67840fa8b7d5aea01ed58b7f238cd7f26f2f87,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28111,0,0,ef109000cb681b8950a504435d888106cd334990070bd9ca1f33bba165c1974a,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28112,1,1,c4745b7e1d25cb6cfc2c3729faa00eb215df73dfcfd0f87bb60f0feb6ed07e38,2024-03-12T20:15:07.730000
|
||||
CVE-2024-28113,1,1,e83bedfa5a1024a70fc3bac4baca17cfe73c68f5bee109cc54ebad50acd4c74c,2024-03-12T20:15:07.933000
|
||||
CVE-2024-28114,1,1,9cc712d5a4c4e6d8e7eaeb3f658683a2bb9cbf6b27cd7f0f8737b3aa3a5a174b,2024-03-12T20:15:08.113000
|
||||
CVE-2024-28112,0,0,c4745b7e1d25cb6cfc2c3729faa00eb215df73dfcfd0f87bb60f0feb6ed07e38,2024-03-12T20:15:07.730000
|
||||
CVE-2024-28113,0,0,e83bedfa5a1024a70fc3bac4baca17cfe73c68f5bee109cc54ebad50acd4c74c,2024-03-12T20:15:07.933000
|
||||
CVE-2024-28114,0,0,9cc712d5a4c4e6d8e7eaeb3f658683a2bb9cbf6b27cd7f0f8737b3aa3a5a174b,2024-03-12T20:15:08.113000
|
||||
CVE-2024-28115,0,0,3e0e705412ec4ecfb9fabefcb95634cd838a6bf7c9c03087d677ba199986f693,2024-03-08T14:02:57.420000
|
||||
CVE-2024-28120,0,0,1945ab744b479cd2a55b16e82913f94d84bcc236918a39e22cfe06aca7010c4c,2024-03-12T12:40:13.500000
|
||||
CVE-2024-28121,1,1,cd609f282f9eb616d165f98d953bd55546f26070be0dec9d4ea80dde264eafde,2024-03-12T20:15:08.313000
|
||||
CVE-2024-28121,0,0,cd609f282f9eb616d165f98d953bd55546f26070be0dec9d4ea80dde264eafde,2024-03-12T20:15:08.313000
|
||||
CVE-2024-28122,0,0,3209f9a611aea4804720e8e5b4eeb3a02772982f302e787ac8040299af464092,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28149,0,0,bb1327eb2ceb44ae2cc8e952fde2f54b109f1740591e1ece1b912c644025402b,2024-03-06T21:42:54.697000
|
||||
CVE-2024-28150,0,0,bd9c785686979f74fc956d3a9d80b65ba208ec849a10e17a7f0c9226761980a2,2024-03-06T21:42:54.697000
|
||||
@ -241199,7 +241213,7 @@ CVE-2024-28174,0,0,fa1674b985861bddf4d0ff5ab075ec0e4328a9665c668bfe339f9f0de580d
|
||||
CVE-2024-28176,0,0,5bb6d329167995170bd276a45554624691bdda8cbb6c83c2d08f42eba9f617aa,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28180,0,0,1e73ce45496cde15ab7710e8895a9f7d4caf4d2dcdb0d6de4d94afa753e9a64b,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28184,0,0,043b0bc7533d0fc96bb6df4be7b21b8477ffe807b0ac6ed0c4b06cf7d8241c3c,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28186,1,1,d09f5b367130ceb8ffca34e045c486310511570fff5782478a7ab9680fd86e0e,2024-03-12T20:15:08.503000
|
||||
CVE-2024-28186,0,0,d09f5b367130ceb8ffca34e045c486310511570fff5782478a7ab9680fd86e0e,2024-03-12T20:15:08.503000
|
||||
CVE-2024-28187,0,0,ac9aee9b90f5e80eaf35f8c7ff9228de1d46fc7e7981b3ae0d130073676ebc09,2024-03-12T12:40:13.500000
|
||||
CVE-2024-28197,0,0,e70c7d0bb2a78854377299eb50fe7994eaf82f7d86398ed826c936d249a753e2,2024-03-12T12:40:13.500000
|
||||
CVE-2024-28198,0,0,8816bcf1852d0abd4f85184964ff047a5ee5921e29485ae07c6ebc27fd66ef45,2024-03-12T12:40:13.500000
|
||||
@ -241214,6 +241228,9 @@ CVE-2024-28222,0,0,fc2bb6625872999de46c3fec787964c81811fbafba85fd6aa0a9c0c190c12
|
||||
CVE-2024-28228,0,0,fafeac90b4103ecc037c0d15d4376f652ba43048a680a73a3c13807568e40859,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28229,0,0,7bfc3b59e790a5126732ec4d8d480f9938166a41475488b32e066c1e064ccb9f,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28230,0,0,3036aa70102b53b9cc695265dc4a11e5a4f5b8d26f6120835dbd1a9c3d93e7ec,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28236,1,1,66388b84425c967b6086cd0e49b7fcb7722f8634684e8523b513de2540418adb,2024-03-12T21:15:59.027000
|
||||
CVE-2024-28238,1,1,392026f8d9c6964893634222ffe2dae70ae08f5ebc7afc8158b32c816c78c5fb,2024-03-12T21:15:59.297000
|
||||
CVE-2024-28239,1,1,200bf1ec0e96c73e0229c8588ffb32cc105d174ecb8c5382f1a77b80bf09a819,2024-03-12T21:15:59.513000
|
||||
CVE-2024-28338,0,0,9985a0b99abb928b9c829cb29ecce6039c07964aad6d9841c1477c6680f4f9b5,2024-03-12T17:46:17.273000
|
||||
CVE-2024-28339,0,0,06a7f15d55f22a965683bef17c82587bc073ddf9fa5edb33c38c4cd82d5f37f7,2024-03-12T17:46:17.273000
|
||||
CVE-2024-28340,0,0,89775fa07d73d115a7392603111ecb04f65799be74b8d41063e67ed0eb97d0cf,2024-03-12T17:46:17.273000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user