Auto-Update: 2024-03-11T17:00:53.042690+00:00

This commit is contained in:
cad-safe-bot 2024-03-11 17:03:41 +00:00
parent 581ce96ded
commit 58168b052a
11 changed files with 376 additions and 36 deletions

View File

@ -2,27 +2,14 @@
"id": "CVE-2023-52514",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-02T22:15:47.777",
"lastModified": "2024-03-04T13:58:23.447",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-11T16:15:07.720",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/reboot: VMCLEAR active VMCSes before emergency reboot\n\nVMCLEAR active VMCSes before any emergency reboot, not just if the kernel\nmay kexec into a new kernel after a crash. Per Intel's SDM, the VMX\narchitecture doesn't require the CPU to flush the VMCS cache on INIT. If\nan emergency reboot doesn't RESET CPUs, cached VMCSes could theoretically\nbe kept and only be written back to memory after the new kernel is booted,\ni.e. could effectively corrupt memory after reboot.\n\nOpportunistically remove the setting of the global pointer to NULL to make\ncheckpatch happy."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/1375d9600c38c231163de584656b07aef9a27b0d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/65edea77d7006140c6290e7f46009d75e02d3273",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b23c83ad2c638420ec0608a9de354507c41bec29",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
"references": []
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-0670",
"sourceIdentifier": "security@checkmk.com",
"published": "2024-03-11T15:15:47.267",
"lastModified": "2024-03-11T15:15:47.267",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Privilege escalation in windows agent plugin in Checkmk before 2.2.0p23, 2.1.0p40 and 2.0.0 (EOL) allows local user to escalate privileges"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@checkmk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security@checkmk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"references": [
{
"url": "https://checkmk.com/werk/16361",
"source": "security@checkmk.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23608",
"sourceIdentifier": "security@ni.com",
"published": "2024-03-11T16:15:07.897",
"lastModified": "2024-03-11T16:15:07.897",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An out of bounds write due to a missing bounds check in LabVIEW may result in remote code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@ni.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@ni.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-write-due-to-missing-bounds-check-in-labview.html",
"source": "security@ni.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23609",
"sourceIdentifier": "security@ni.com",
"published": "2024-03-11T16:15:08.157",
"lastModified": "2024-03-11T16:15:08.157",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An improper error handling vulnerability in LabVIEW may result in remote code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@ni.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@ni.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"references": [
{
"url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/improper-error-handling-issues-in-labview.html",
"source": "security@ni.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23610",
"sourceIdentifier": "security@ni.com",
"published": "2024-03-11T16:15:08.370",
"lastModified": "2024-03-11T16:15:08.370",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An out of bounds write due to a missing bounds check in LabVIEW may result in remote code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions.\n\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@ni.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@ni.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-write-due-to-missing-bounds-check-in-labview.html",
"source": "security@ni.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23611",
"sourceIdentifier": "security@ni.com",
"published": "2024-03-11T16:15:08.557",
"lastModified": "2024-03-11T16:15:08.557",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An out of bounds write due to a missing bounds check in LabVIEW may result in remote code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@ni.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@ni.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-write-due-to-missing-bounds-check-in-labview.html",
"source": "security@ni.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23612",
"sourceIdentifier": "security@ni.com",
"published": "2024-03-11T16:15:08.743",
"lastModified": "2024-03-11T16:15:08.743",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An improper error handling vulnerability in LabVIEW may result in remote code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@ni.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@ni.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"references": [
{
"url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/improper-error-handling-issues-in-labview.html",
"source": "security@ni.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27198",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-03-04T18:15:09.040",
"lastModified": "2024-03-08T02:00:01.667",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-11T15:15:47.483",
"vulnStatus": "Modified",
"cisaExploitAdd": "2024-03-07",
"cisaActionDue": "2024-03-28",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
@ -103,6 +103,10 @@
}
],
"references": [
{
"url": "https://www.darkreading.com/cyberattacks-data-breaches/jetbrains-teamcity-mass-exploitation-underway-rogue-accounts-thrive",
"source": "cve@jetbrains.com"
},
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-27199",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-03-04T18:15:09.377",
"lastModified": "2024-03-05T13:41:01.900",
"lastModified": "2024-03-11T15:15:47.663",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible"
},
{
"lang": "es",
"value": "En JetBrains TeamCity antes de 2023.11.4 era posible un path traversal permitiendo realizar acciones administrativas limitadas"
}
],
"metrics": {
@ -47,6 +51,10 @@
}
],
"references": [
{
"url": "https://www.darkreading.com/cyberattacks-data-breaches/jetbrains-teamcity-mass-exploitation-underway-rogue-accounts-thrive",
"source": "cve@jetbrains.com"
},
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-11T15:00:45.148845+00:00
2024-03-11T17:00:53.042690+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-11T14:15:06.917000+00:00
2024-03-11T16:15:08.743000+00:00
```
### Last Data Feed Release
@ -29,23 +29,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
240956
240962
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `6`
* [CVE-2024-1441](CVE-2024/CVE-2024-14xx/CVE-2024-1441.json) (`2024-03-11T14:15:06.917`)
* [CVE-2024-2370](CVE-2024/CVE-2024-23xx/CVE-2024-2370.json) (`2024-03-11T13:15:52.920`)
* [CVE-2024-0670](CVE-2024/CVE-2024-06xx/CVE-2024-0670.json) (`2024-03-11T15:15:47.267`)
* [CVE-2024-23608](CVE-2024/CVE-2024-236xx/CVE-2024-23608.json) (`2024-03-11T16:15:07.897`)
* [CVE-2024-23609](CVE-2024/CVE-2024-236xx/CVE-2024-23609.json) (`2024-03-11T16:15:08.157`)
* [CVE-2024-23610](CVE-2024/CVE-2024-236xx/CVE-2024-23610.json) (`2024-03-11T16:15:08.370`)
* [CVE-2024-23611](CVE-2024/CVE-2024-236xx/CVE-2024-23611.json) (`2024-03-11T16:15:08.557`)
* [CVE-2024-23612](CVE-2024/CVE-2024-236xx/CVE-2024-23612.json) (`2024-03-11T16:15:08.743`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `3`
* [CVE-2023-3576](CVE-2023/CVE-2023-35xx/CVE-2023-3576.json) (`2024-03-11T13:15:52.550`)
* [CVE-2023-52356](CVE-2023/CVE-2023-523xx/CVE-2023-52356.json) (`2024-03-11T13:15:52.753`)
* [CVE-2023-52514](CVE-2023/CVE-2023-525xx/CVE-2023-52514.json) (`2024-03-11T16:15:07.720`)
* [CVE-2024-27198](CVE-2024/CVE-2024-271xx/CVE-2024-27198.json) (`2024-03-11T15:15:47.483`)
* [CVE-2024-27199](CVE-2024/CVE-2024-271xx/CVE-2024-27199.json) (`2024-03-11T15:15:47.663`)
## Download and Usage

View File

@ -225207,7 +225207,7 @@ CVE-2023-3573,0,0,49b7f2d44d94282fd92e4e51fd75140c6d27fd1eb60b043bb5658c6909308f
CVE-2023-3574,0,0,c46f3ebebeb50c74076f9bdd903b2401894ef2646196eb960c08c98cd128d220,2023-07-19T15:58:24.693000
CVE-2023-3575,0,0,cb418c109da6ae5c3db4c1cfd49867dd6bedc2e2b3460bc932b1f4a8938017b2,2023-11-07T04:19:05.260000
CVE-2023-35759,0,0,737d089372a13d311d938b6f73fbc87604835ac5d6e732c4dc0dc97aa37b299e,2024-02-05T17:15:08.490000
CVE-2023-3576,0,1,afc3943dafc3dce0b127a1fe6f63cb13cec0d0d4331467a034b7ea0ef34bb624,2024-03-11T13:15:52.550000
CVE-2023-3576,0,0,afc3943dafc3dce0b127a1fe6f63cb13cec0d0d4331467a034b7ea0ef34bb624,2024-03-11T13:15:52.550000
CVE-2023-35762,0,0,d3d58c95cdc44cd1c3674a8efa00d524d00379a36ec6dd9b457951306765e9b9,2023-11-29T20:52:44.790000
CVE-2023-35763,0,0,d967a50d80e9fca1c8b396011c9adaeb43d2582130d44fa236f81f07f6cc7468,2023-11-07T04:15:57.230000
CVE-2023-35765,0,0,c9d756b3cf84f57072c1ddad827e0ca15c83ffcc92755c9945c039f52d670aa0,2023-07-13T22:38:39.083000
@ -235718,7 +235718,7 @@ CVE-2023-5235,0,0,501d70ffe62054b2f34e569922209bc8c97e72f29972137f98206c72df307e
CVE-2023-52353,0,0,51c95c68b53b17ae5c9383b4fb7643d2f698c0a7aeb9527a084925d0123ca2a0,2024-01-29T15:53:20.917000
CVE-2023-52354,0,0,15087b81bcfb8f0a08f98300e2d3a8a3cc0e673259e9dc08373afde8da8bc3a6,2024-01-29T16:56:40.830000
CVE-2023-52355,0,0,30175535bfde6e66be6dce4a86bb0177b08047eb9e1fb2db9c326dc5f918982b,2024-02-04T20:15:45.900000
CVE-2023-52356,0,1,f4861a9c0008839a2b5ec1f2513aaa75cc90ea85b18808e65d7bc888af5c1638,2024-03-11T13:15:52.753000
CVE-2023-52356,0,0,f4861a9c0008839a2b5ec1f2513aaa75cc90ea85b18808e65d7bc888af5c1638,2024-03-11T13:15:52.753000
CVE-2023-52357,0,0,b1d8671149392ba36552d2d7975d95dd19f0db4f65b14e0cfedba761dce5c034,2024-02-20T19:50:53.960000
CVE-2023-52358,0,0,0b53d52db0f0a147bc8902c908a4bfab00aea8420e8b8fd20902eb5f941687f3,2024-02-20T19:50:53.960000
CVE-2023-5236,0,0,dca46a86e45346118bf2a7ab84eba7b576d6badd3032b0dee15268882dfcf4cc,2024-01-25T14:15:26.617000
@ -235841,7 +235841,7 @@ CVE-2023-52510,0,0,39bb20f902ce77c6c2cc24fdd471414543682dc6368dd71901ad66ceeb858
CVE-2023-52511,0,0,96ad6a250685bb1f1b043d2d9629c3703274f2a26b2172e6f2f583cb342aa7f7,2024-03-04T13:58:23.447000
CVE-2023-52512,0,0,6b0934a2f05e016672719445c73a46d1beddc36452fb6794d32bde3c681e15b5,2024-03-04T13:58:23.447000
CVE-2023-52513,0,0,c3f6403d0bd91c1256183cc63f5a42ed5e32a237d5cc51f6ef463aa0f44f6a2a,2024-03-04T13:58:23.447000
CVE-2023-52514,0,0,9718b62edb9b3397ceaaab8c6770546bfedf23c9b5b59b29e4816c31e0aac68d,2024-03-04T13:58:23.447000
CVE-2023-52514,0,1,2a9bbaa87d5c1eab9d9277a12e928b1961b3fc1968dd1c401d6d2c797142906a,2024-03-11T16:15:07.720000
CVE-2023-52515,0,0,7ed1681a7c6a3267a3342d453126aab09b934cffe5e0a5e93e54c0492dd6af3d,2024-03-04T13:58:23.447000
CVE-2023-52516,0,0,a2d74778820fd67a3143b965286178ba729cfdcbf87ce7c74d33fa89175e0a71,2024-03-04T13:58:23.447000
CVE-2023-52517,0,0,43af2c38c9abb65135989190406e737cf4a1757d3e820b8a9ce0cd8ea74c6d05,2024-03-04T13:58:23.447000
@ -237959,6 +237959,7 @@ CVE-2024-0665,0,0,4f11c74d31ee400b4dead80ad52f0a187a0b330f44c457216c2744da6f3597
CVE-2024-0667,0,0,2681b7becac6d5374ec2219687491519adea78bdc5162cd2d7253f0786abc5ef,2024-02-01T04:15:17.817000
CVE-2024-0668,0,0,3db9a5de6e4dca9e79ecb9554115ef410935372b559bc145d7ca0c6d374ebafc,2024-02-13T16:24:26.927000
CVE-2024-0669,0,0,476d8f93fcd7134fc732a1bd0cd06cc03563cad47067b8fa5ebf76f58a942cc6,2024-01-26T18:52:05.550000
CVE-2024-0670,1,1,96f0c0f86d7d60e941c6ad942ddc9516bfeba336a67759b22368dff441aebf7b,2024-03-11T15:15:47.267000
CVE-2024-0674,0,0,9139aa9ed68295af11e7b8aed5b715e6e747bd34139c805f237fd0a45d0b36ba,2024-02-08T16:39:59.450000
CVE-2024-0675,0,0,8bea4fa993c9477b8fb58d2ccef75bd1eb1d23abf07c79567a0ddce8b0191850,2024-02-08T16:39:42.950000
CVE-2024-0676,0,0,8035a70d9b2fb746a1bd04ffd363a65316fee85917c37a6970742638f1f2186e,2024-02-08T16:39:00.907000
@ -238442,7 +238443,7 @@ CVE-2024-1435,0,0,3d9157bea425ae0ccbf8fb80f8804820a71722fe736e6d6583f664e8ae632d
CVE-2024-1436,0,0,89cc5ea7a7e1178a29adf59c2f4cf429bb9957790ab8a0265c3119401c784ce0,2024-02-26T16:32:25.577000
CVE-2024-1437,0,0,95b845910a840a20b7fa4620989917eab09ec6f88cd90b7d076b0bb6f7afcc4a,2024-02-29T13:49:29.390000
CVE-2024-1439,0,0,0872453f826d79b5bb50df9535aa030a513837aff169f1535b08260848c8b609,2024-02-12T14:19:54.330000
CVE-2024-1441,1,1,779b128d5e6dbaccc3e862d37e1f7b9cbeae4c7d0f84d699ae8ad4489da37214,2024-03-11T14:15:06.917000
CVE-2024-1441,0,0,779b128d5e6dbaccc3e862d37e1f7b9cbeae4c7d0f84d699ae8ad4489da37214,2024-03-11T14:15:06.917000
CVE-2024-1442,0,0,d5be8c6d2acf818787220c68cc096ecac92494a9aeb2f3b78b57d2953e31d3e2,2024-03-08T14:02:57.420000
CVE-2024-1443,0,0,715b4f1b1b036595e816d480c22f0394bab184a4b61631c3489044453d5f3bfb,2024-03-07T13:52:27.110000
CVE-2024-1444,0,0,56d4978632986301b509a1a8d65f888b9f13fd4ebe8f88db05c849bbae5ae999,2024-02-16T17:15:08.710000
@ -239823,6 +239824,11 @@ CVE-2024-23603,0,0,fa877b171423c355baa3228ce2c605e41edbf822a3508567d7754cb447355
CVE-2024-23605,0,0,6357ef47a85c4e22049db0926cbddeb8bbc82cdf2a1a81b5a28ca15d9cbb7aa0,2024-02-26T18:15:07.673000
CVE-2024-23606,0,0,598e3aff4ae1bfd2aada0c773944509bbb201f8071a41b1a5b9e3c7372eb5aae,2024-02-20T19:50:53.960000
CVE-2024-23607,0,0,8fbc2564c100ed17fa897212d565c049df0409466e1eb4358411ecb3ce547801,2024-02-14T18:04:45.380000
CVE-2024-23608,1,1,c98de50f4e8b973dad8f1d54c5df75c409c8b04702a613e588947dbe5d7e1073,2024-03-11T16:15:07.897000
CVE-2024-23609,1,1,19a21d0e98904f29c5d0adf7e8c9ed6e794486d28b167a48186898accac1dd49,2024-03-11T16:15:08.157000
CVE-2024-23610,1,1,27c772e96c2f354c984e3aa4b85ca26a8e6005fd4d4dd2fc8250a636b5c8e2a7,2024-03-11T16:15:08.370000
CVE-2024-23611,1,1,c03fa71964a3d81dc6f1eb12a354aa4c86e804a5415aadd4646c131e3c8dc6b0,2024-03-11T16:15:08.557000
CVE-2024-23612,1,1,0875aa7379f496dc1516588cb14ef4d3721dd4c67c8e3b96216bd2de56c83a6b,2024-03-11T16:15:08.743000
CVE-2024-23613,0,0,a6caa42c068605a90eb5a5d2a146a2e76fb38281e14d3e07f037d267becbaa2b,2024-01-31T19:22:48.627000
CVE-2024-23614,0,0,64dd22961f50564212ca1f64f5062c8108f1d059ef6d673b05a943850d4463e6,2024-01-31T19:54:08.847000
CVE-2024-23615,0,0,eafd7ffa6180e2fc03ed45df24f769fecb2bae7a56932300e20ffd987e061483,2024-01-31T23:46:44.913000
@ -239882,7 +239888,7 @@ CVE-2024-23686,0,0,ed98c70a3681e7ffc9688a2b700aefef53fbafafcbc0cbfe3bff77d9af067
CVE-2024-23687,0,0,888c703c13765b4aadeca06043a7e3dd693e14ab5fbf0ceb683a371be24cfabd,2024-01-26T16:54:13.900000
CVE-2024-23688,0,0,07f47d429f26f5d25558115321368745a1af1492969a475a8855a8882844f455,2024-01-26T15:53:31.397000
CVE-2024-23689,0,0,d7d4e018343e45ab929852f091e2e71006911f05a5c0cdd59769a6f5a80fdcee,2024-01-26T14:50:45.023000
CVE-2024-2370,1,1,16f988ff46fdfe91c440b55eb7c64364d5f6cdcb167f09fe7bf66f636001f14e,2024-03-11T13:15:52.920000
CVE-2024-2370,0,0,16f988ff46fdfe91c440b55eb7c64364d5f6cdcb167f09fe7bf66f636001f14e,2024-03-11T13:15:52.920000
CVE-2024-23724,0,0,ce25237b1b8be392e772c83f957fdb1e42b10b520f1a3f65fb6dea0241ad88c3,2024-02-11T22:29:15.837000
CVE-2024-23725,0,0,e7109aa5ed154918326c3254d584acf7e8190c7c6acd985ea1145474ef362350,2024-01-29T15:25:48.110000
CVE-2024-23726,0,0,1e6b5838c3bbe1bdea4cff85e0dab09275e17fdbeddbc74981e476f308132713,2024-01-29T15:25:36.090000
@ -240816,8 +240822,8 @@ CVE-2024-27133,0,0,1abfe171f722b9df6ead5b24935068c395a52a06c146ec300701d2b7e8652
CVE-2024-27138,0,0,1ec0ded3b41c12b07651e921188be783731716c54fb55c30f65f5b3e8197e8cc,2024-03-01T22:22:25.913000
CVE-2024-27139,0,0,66ddd9efc34252e5e972ac0e5a31e042faa3995b86c5ae6f0f108c10e1d7b562,2024-03-01T22:22:25.913000
CVE-2024-27140,0,0,34daddef6e0d13f2bea16bc1184887cdd01053137a36a3bc5699d2875c449127,2024-03-01T22:22:25.913000
CVE-2024-27198,0,0,3a98d8062dafc1de24ad12b403b71c3094aa343c0c581a4abb34664c413ba43b,2024-03-08T02:00:01.667000
CVE-2024-27199,0,0,d457ea54ebb9c29f640aac2e6f43f7c47fbeea8723f871e1cde0ce0fe82e1907,2024-03-05T13:41:01.900000
CVE-2024-27198,0,1,e4259fe3d4611134ab5dfb0d4f88f5b563c21b8238f30b4253811838ad004753,2024-03-11T15:15:47.483000
CVE-2024-27199,0,1,3dd3bfb58b796a8c7735f0a6f342852f32998fc13795786d35eb3d4375df0417,2024-03-11T15:15:47.663000
CVE-2024-27215,0,0,651ced2c4948681508a9ad090546fd018840608eea0c7482bdd7848315ac417f,2024-02-21T18:15:52.060000
CVE-2024-27255,0,0,07d4523d50b3b6ceec1ed85c31e8859376bfd63a9732f2f4d2cf6e5b4c34b76b,2024-03-04T13:58:23.447000
CVE-2024-27278,0,0,2ef9546b6eb3a76ad70be700186038d995dd630654759ed72b9b3d10968f6d39,2024-03-06T15:18:08.093000

Can't render this file because it is too large.