mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-03-19T13:00:38.498523+00:00
This commit is contained in:
parent
497a89a06b
commit
5cb342ecb7
24
CVE-2023/CVE-2023-402xx/CVE-2023-40278.json
Normal file
24
CVE-2023/CVE-2023-402xx/CVE-2023-40278.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-40278",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-19T12:15:07.473",
|
||||
"lastModified": "2024-03-19T12:15:07.473",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in OpenClinic GA 5.247.01. An Information Disclosure vulnerability has been identified in the printAppointmentPdf.jsp component of OpenClinic GA. By changing the AppointmentUid parameter, an attacker can determine whether a specific appointment exists based on the error message."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/BugBountyHunterCVE/CVE-2023-40278/blob/main/CVE-2023-40278_Information-Disclosure_OpenClinic-GA_5.247.01_Report.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://sourceforge.net/projects/open-clinic/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-53xx/CVE-2023-5388.json
Normal file
32
CVE-2023/CVE-2023-53xx/CVE-2023-5388.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-5388",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:07.537",
|
||||
"lastModified": "2024-03-19T12:15:07.537",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1780432",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-0743",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-01-23T14:15:38.280",
|
||||
"lastModified": "2024-03-11T06:15:06.283",
|
||||
"lastModified": "2024-03-19T12:15:07.607",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unchecked return value in TLS handshake code could have caused a potentially exploitable crash. This vulnerability affects Firefox < 122."
|
||||
"value": "An unchecked return value in TLS handshake code could have caused a potentially exploitable crash. This vulnerability affects Firefox < 122, Firefox ESR < 115.9, and Thunderbird < 115.9."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -87,6 +87,14 @@
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-11xx/CVE-2024-1144.json
Normal file
55
CVE-2024/CVE-2024-11xx/CVE-2024-1144.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-1144",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-19T12:15:07.910",
|
||||
"lastModified": "2024-03-19T12:15:07.910",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper access control vulnerability in Devklan's Alma Blog that affects versions 2.1.10 and earlier. This vulnerability could allow an unauthenticated user to access the application's functionalities without the need for credentials."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-alma-devklan-blog",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-11xx/CVE-2024-1145.json
Normal file
55
CVE-2024/CVE-2024-11xx/CVE-2024-1145.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-1145",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-19T12:15:08.177",
|
||||
"lastModified": "2024-03-19T12:15:08.177",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "User enumeration vulnerability in Devklan's Alma Blog that affects versions 2.1.10 and earlier. This vulnerability could allow a remote user to retrieve all valid users registered in the application just by looking at the request response."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-204"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-alma-devklan-blog",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-11xx/CVE-2024-1146.json
Normal file
55
CVE-2024/CVE-2024-11xx/CVE-2024-1146.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-1146",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-19T12:15:08.443",
|
||||
"lastModified": "2024-03-19T12:15:08.443",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Scripting vulnerability in Devklan's Alma Blog that affects versions 2.1.10 and earlier. This vulnerability could allow an attacker to store a malicious JavaScript payload within the application by adding the payload to 'Community Description' or 'Community Rules'."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-alma-devklan-blog",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
@ -8,6 +8,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Input Validation vulnerability in Apache Hop Engine.This issue affects Apache Hop Engine: before 2.8.0.\n\nUsers are recommended to upgrade to version 2.8.0, which fixes the issue.\n\nWhen Hop Server writes links to the\u00a0PrepareExecutionPipelineServlet page one of the parameters provided to the user was not properly escaped.\nThe variable not properly escaped is the \"id\", which is not directly accessible by users creating pipelines making the risk of exploiting this low.\n\nThis issue only affects users using the Hop Server component and does not directly affect the client."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de validaci\u00f3n de entrada incorrecta en Apache Hop Engine. Este problema afecta a Apache Hop Engine: anterior a 2.8.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.8.0, que soluciona el problema. Cuando Hop Server escribe enlaces a la p\u00e1gina PrepareExecutionPipelineServlet, uno de los par\u00e1metros proporcionados al usuario no se escap\u00f3 correctamente. La variable que no se escap\u00f3 correctamente es la \"id\", a la que los usuarios que crean canalizaciones no pueden acceder directamente, lo que hace que el riesgo de explotaci\u00f3n sea bajo. Este problema solo afecta a los usuarios que utilizan el componente Hop Server y no afecta directamente al cliente."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
32
CVE-2024/CVE-2024-26xx/CVE-2024-2605.json
Normal file
32
CVE-2024/CVE-2024-26xx/CVE-2024-2605.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2024-2605",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:08.690",
|
||||
"lastModified": "2024-03-19T12:15:08.690",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An attacker could have leveraged the Windows Error Reporter to run arbitrary code on the system escaping the sandbox. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1872920",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-26xx/CVE-2024-2606.json
Normal file
24
CVE-2024/CVE-2024-26xx/CVE-2024-2606.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-2606",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:08.740",
|
||||
"lastModified": "2024-03-19T12:15:08.740",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Passing invalid data could have led to invalid wasm values being created, such as arbitrary integers turning into pointer values. This vulnerability affects Firefox < 124."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1879237",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2024/CVE-2024-26xx/CVE-2024-2607.json
Normal file
32
CVE-2024/CVE-2024-26xx/CVE-2024-2607.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2024-2607",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:08.790",
|
||||
"lastModified": "2024-03-19T12:15:08.790",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Return registers were overwritten which could have allowed an attacker to execute arbitrary code. *Note:* This issue only affected Armv7-A systems. Other operating systems are unaffected. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1879939",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2024/CVE-2024-26xx/CVE-2024-2608.json
Normal file
32
CVE-2024/CVE-2024-26xx/CVE-2024-2608.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2024-2608",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:08.843",
|
||||
"lastModified": "2024-03-19T12:15:08.843",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "`AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding()` and `AppendEncodedCharacters()` could have experienced integer overflows, causing underallocation of an output buffer leading to an out of bounds write. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1880692",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-26xx/CVE-2024-2609.json
Normal file
24
CVE-2024/CVE-2024-26xx/CVE-2024-2609.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-2609",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:08.910",
|
||||
"lastModified": "2024-03-19T12:15:08.910",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The permission prompt input delay could have expired while the window is not in focus, which made the prompt vulnerable to clickjacking by malicious websites. This vulnerability affects Firefox < 124."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1866100",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2024/CVE-2024-26xx/CVE-2024-2610.json
Normal file
32
CVE-2024/CVE-2024-26xx/CVE-2024-2610.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2024-2610",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:08.957",
|
||||
"lastModified": "2024-03-19T12:15:08.957",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Using a markup injection an attacker could have stolen nonce values. This could have been used to bypass strict content security policies. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871112",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2024/CVE-2024-26xx/CVE-2024-2611.json
Normal file
32
CVE-2024/CVE-2024-26xx/CVE-2024-2611.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2024-2611",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:09.007",
|
||||
"lastModified": "2024-03-19T12:15:09.007",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A missing delay on when pointer lock was used could have allowed a malicious page to trick a user into granting permissions. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1876675",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2024/CVE-2024-26xx/CVE-2024-2612.json
Normal file
32
CVE-2024/CVE-2024-26xx/CVE-2024-2612.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2024-2612",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:09.063",
|
||||
"lastModified": "2024-03-19T12:15:09.063",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "If an attacker could find a way to trigger a particular code path in `SafeRefPtr`, it could have triggered a crash or potentially be leveraged to achieve code execution. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1879444",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-26xx/CVE-2024-2613.json
Normal file
24
CVE-2024/CVE-2024-26xx/CVE-2024-2613.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-2613",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:09.113",
|
||||
"lastModified": "2024-03-19T12:15:09.113",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Data was not properly sanitized when decoding a QUIC ACK frame; this could have led to unrestricted memory consumption and a crash. This vulnerability affects Firefox < 124."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1875701",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2024/CVE-2024-26xx/CVE-2024-2614.json
Normal file
32
CVE-2024/CVE-2024-26xx/CVE-2024-2614.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2024-2614",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:09.160",
|
||||
"lastModified": "2024-03-19T12:15:09.160",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory safety bugs present in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1685358%2C1861016%2C1880405%2C1881093",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-26xx/CVE-2024-2615.json
Normal file
24
CVE-2024/CVE-2024-26xx/CVE-2024-2615.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-2615",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:09.210",
|
||||
"lastModified": "2024-03-19T12:15:09.210",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory safety bugs present in Firefox 123. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 124."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1881074%2C1882438",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-26xx/CVE-2024-2616.json
Normal file
28
CVE-2024/CVE-2024-26xx/CVE-2024-2616.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-2616",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:09.260",
|
||||
"lastModified": "2024-03-19T12:15:09.260",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "To harden ICU against exploitation, the behavior for out-of-memory conditions was changed to crash instead of attempt to continue. This vulnerability affects Firefox ESR < 115.9 and Thunderbird < 115.9."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846197",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-26xx/CVE-2024-2632.json
Normal file
55
CVE-2024/CVE-2024-26xx/CVE-2024-2632.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-2632",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-19T12:15:09.307",
|
||||
"lastModified": "2024-03-19T12:15:09.307",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Information Exposure Vulnerability has been found on Meta4 HR. This vulnerability allows an attacker to obtain a lot of information about the application such as the variables set in the process, the Tomcat versions, library versions and underlying operation system via HTTP GET '/sitetest/english/dumpenv.jsp'."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-meta4-hr-cegid",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-26xx/CVE-2024-2633.json
Normal file
55
CVE-2024/CVE-2024-26xx/CVE-2024-2633.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-2633",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-19T12:15:09.530",
|
||||
"lastModified": "2024-03-19T12:15:09.530",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Cross-Site Scripting Vulnerability has been found on Meta4 HR affecting version 819.001.022 and earlier. The endpoint '/sitetest/english/dumpenv.jsp' is vulnerable to XSS attack by 'lang' query, i.e. '/sitetest/english/dumpenv.jsp?snoop=yes&lang=%27%3Cimg%20src/onerror=alert(1)%3E¶ms'."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-meta4-hr-cegid",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-26xx/CVE-2024-2634.json
Normal file
55
CVE-2024/CVE-2024-26xx/CVE-2024-2634.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-2634",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-19T12:15:09.773",
|
||||
"lastModified": "2024-03-19T12:15:09.773",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Cross-Site Scripting Vulnerability has been found on Meta4 HR affecting version 819.001.022 and earlier. The endpoint '/sse_generico/generico_login.jsp' is vulnerable to XSS attack via 'lang' query, i.e. '/sse_generico/generico_login.jsp?lang=%27%3balert(%27BLEUSS%27)%2f%2f¶ms='."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-meta4-hr-cegid",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-26xx/CVE-2024-2635.json
Normal file
55
CVE-2024/CVE-2024-26xx/CVE-2024-2635.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-2635",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-19T12:15:09.993",
|
||||
"lastModified": "2024-03-19T12:15:09.993",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been discovered in Cegid Meta4 HR that consists of execution after redirect. This vulnerability could allow an attacker to bypass the security measures of the applications by accessing the webappconfig.jsp file directly and canceling the redirect request, leading to the configuration file inside the application, in which an attacker could modify different parameters. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-698"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cegid.com/global/meta4-es-joins-cegid/",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2024/CVE-2024-274xx/CVE-2024-27439.json
Normal file
36
CVE-2024/CVE-2024-274xx/CVE-2024-27439.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-27439",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-03-19T11:15:06.537",
|
||||
"lastModified": "2024-03-19T11:15:06.537",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An error in the evaluation of the fetch metadata headers could allow a bypass of the CSRF protection in Apache Wicket.\nThis issue affects Apache Wicket: from 9.1.0 through 9.16.0, and the milestone releases for the 10.0 series.\nApache Wicket 8.x does not support CSRF protection via the fetch metadata headers and as such is not affected.\n\nUsers are recommended to upgrade to version 9.17.0 or 10.0.0, which fixes the issue.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-444"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/o825rvjjtmz3qv21ps5k7m2w9193g1lo",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
35
README.md
35
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-19T11:00:38.574098+00:00
|
||||
2024-03-19T13:00:38.498523+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-19T09:15:06.630000+00:00
|
||||
2024-03-19T12:15:09.993000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,20 +29,43 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
241963
|
||||
241985
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `22`
|
||||
|
||||
* [CVE-2024-24683](CVE-2024/CVE-2024-246xx/CVE-2024-24683.json) (`2024-03-19T09:15:06.630`)
|
||||
* [CVE-2023-40278](CVE-2023/CVE-2023-402xx/CVE-2023-40278.json) (`2024-03-19T12:15:07.473`)
|
||||
* [CVE-2023-5388](CVE-2023/CVE-2023-53xx/CVE-2023-5388.json) (`2024-03-19T12:15:07.537`)
|
||||
* [CVE-2024-1144](CVE-2024/CVE-2024-11xx/CVE-2024-1144.json) (`2024-03-19T12:15:07.910`)
|
||||
* [CVE-2024-1145](CVE-2024/CVE-2024-11xx/CVE-2024-1145.json) (`2024-03-19T12:15:08.177`)
|
||||
* [CVE-2024-1146](CVE-2024/CVE-2024-11xx/CVE-2024-1146.json) (`2024-03-19T12:15:08.443`)
|
||||
* [CVE-2024-2605](CVE-2024/CVE-2024-26xx/CVE-2024-2605.json) (`2024-03-19T12:15:08.690`)
|
||||
* [CVE-2024-2606](CVE-2024/CVE-2024-26xx/CVE-2024-2606.json) (`2024-03-19T12:15:08.740`)
|
||||
* [CVE-2024-2607](CVE-2024/CVE-2024-26xx/CVE-2024-2607.json) (`2024-03-19T12:15:08.790`)
|
||||
* [CVE-2024-2608](CVE-2024/CVE-2024-26xx/CVE-2024-2608.json) (`2024-03-19T12:15:08.843`)
|
||||
* [CVE-2024-2609](CVE-2024/CVE-2024-26xx/CVE-2024-2609.json) (`2024-03-19T12:15:08.910`)
|
||||
* [CVE-2024-2610](CVE-2024/CVE-2024-26xx/CVE-2024-2610.json) (`2024-03-19T12:15:08.957`)
|
||||
* [CVE-2024-2611](CVE-2024/CVE-2024-26xx/CVE-2024-2611.json) (`2024-03-19T12:15:09.007`)
|
||||
* [CVE-2024-2612](CVE-2024/CVE-2024-26xx/CVE-2024-2612.json) (`2024-03-19T12:15:09.063`)
|
||||
* [CVE-2024-2613](CVE-2024/CVE-2024-26xx/CVE-2024-2613.json) (`2024-03-19T12:15:09.113`)
|
||||
* [CVE-2024-2614](CVE-2024/CVE-2024-26xx/CVE-2024-2614.json) (`2024-03-19T12:15:09.160`)
|
||||
* [CVE-2024-2615](CVE-2024/CVE-2024-26xx/CVE-2024-2615.json) (`2024-03-19T12:15:09.210`)
|
||||
* [CVE-2024-2616](CVE-2024/CVE-2024-26xx/CVE-2024-2616.json) (`2024-03-19T12:15:09.260`)
|
||||
* [CVE-2024-2632](CVE-2024/CVE-2024-26xx/CVE-2024-2632.json) (`2024-03-19T12:15:09.307`)
|
||||
* [CVE-2024-2633](CVE-2024/CVE-2024-26xx/CVE-2024-2633.json) (`2024-03-19T12:15:09.530`)
|
||||
* [CVE-2024-2634](CVE-2024/CVE-2024-26xx/CVE-2024-2634.json) (`2024-03-19T12:15:09.773`)
|
||||
* [CVE-2024-2635](CVE-2024/CVE-2024-26xx/CVE-2024-2635.json) (`2024-03-19T12:15:09.993`)
|
||||
* [CVE-2024-27439](CVE-2024/CVE-2024-274xx/CVE-2024-27439.json) (`2024-03-19T11:15:06.537`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
* [CVE-2024-0743](CVE-2024/CVE-2024-07xx/CVE-2024-0743.json) (`2024-03-19T12:15:07.607`)
|
||||
* [CVE-2024-24683](CVE-2024/CVE-2024-246xx/CVE-2024-24683.json) (`2024-03-19T09:15:06.630`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
26
_state.csv
26
_state.csv
@ -228523,6 +228523,7 @@ CVE-2023-40274,0,0,a87703ce0cec9b2f71f145b4ad6930a4558be41188f81bc5cadeaf5b92764
|
||||
CVE-2023-40275,0,0,6355574985198dc6e7f85aa6c98fde8df05fe38075e6e6447f453afea16b7034,2024-03-19T01:15:44.743000
|
||||
CVE-2023-40276,0,0,81528dffb63509adc0a167e771fb055fcc7b8625a14356190751a6ed7fde0eb7,2024-03-19T01:15:44.807000
|
||||
CVE-2023-40277,0,0,1649d36ee5744da7853e6f63a529e8568ec9bb7f13c5f96607f0f1dacda93a70,2024-03-19T01:15:44.850000
|
||||
CVE-2023-40278,1,1,7fc796a9c8a4b86b281e82f24dbfcfc7f15ce8d00cd7c187936bcb2d2f119d44,2024-03-19T12:15:07.473000
|
||||
CVE-2023-4028,0,0,3df4ea134e3bc2993759c7fd73fca43c7cce7bc86509f2d520d8c4274d249028,2023-08-24T17:53:34.333000
|
||||
CVE-2023-40280,0,0,0a6158d8927adeba96545304d54666c1db28ebdd9babb20c813ed6077a34edb8,2024-03-19T01:15:44.900000
|
||||
CVE-2023-40281,0,0,9151ee58e4e34a5d0e50b7a1455975136c3b0ec7392bd5aeea0e6461170746f4,2023-08-23T15:27:41.540000
|
||||
@ -236194,6 +236195,7 @@ CVE-2023-5384,0,0,441f1b8a30756cc9b5f3117d86e72f400495bdf444d07abaff550854597f23
|
||||
CVE-2023-5385,0,0,9ae213cb30ffb83a1a2cc696047d7aba4caab30c852d1ef2dcb64596a9208adb,2023-11-27T20:13:07.160000
|
||||
CVE-2023-5386,0,0,bfe87044f02046ad817ff7d54d504256b17a835afbb668f0ba9ab1d54dcdd82f,2023-11-27T20:14:47.710000
|
||||
CVE-2023-5387,0,0,45867b8235da7c9a90990530159b5190e5bd4e4eb429c6ce43ac3327afc64eac,2023-11-27T20:15:21.673000
|
||||
CVE-2023-5388,1,1,697e009ac3688cb2f69b444c49a93c510d3e6aa1329ac0f96fc092bbce7b3e17,2024-03-19T12:15:07.537000
|
||||
CVE-2023-5389,0,0,07d2db5823402611439109f7f34a4853364795f9958639185189e21209a9cfea,2024-02-08T15:20:04.057000
|
||||
CVE-2023-5390,0,0,7ebaee5947d3e1f1edd0aa63aeb1bb5e132bc79873105ca039e3fefbf61f0d4e,2024-02-08T17:18:46.787000
|
||||
CVE-2023-5391,0,0,e65a9210280128a68a8a49095d5446b17a62134416876921dbd7f459dcc8b6e5,2024-02-01T00:49:46.897000
|
||||
@ -238239,7 +238241,7 @@ CVE-2024-0738,0,0,e180008c6191582af8846975460523b38bf746526c1330b21eec59d5ba0663
|
||||
CVE-2024-0739,0,0,92b1abf635667968fc6fc797839e0df67043fa3679af54f39fb17a879e4f027e,2024-02-29T01:43:27.693000
|
||||
CVE-2024-0741,0,0,a9fda7b42aa854b426665305c7828769c163150b209cbb19ab9d616db9041a98,2024-02-02T17:19:30.117000
|
||||
CVE-2024-0742,0,0,1ae741d10e1bed36bf34ad7f16caeaf1531efb403a5a51e45593c25df5bee474,2024-02-02T17:19:23.497000
|
||||
CVE-2024-0743,0,0,1e3106514b83a3ec85879ce51d0a8504c81591e73c89d2da5c893f5c6b902372,2024-03-11T06:15:06.283000
|
||||
CVE-2024-0743,0,1,10e6de3ff74d2fe6d808f7772622f8bf9b8141c31ffaa09133123be56fedc9c1,2024-03-19T12:15:07.607000
|
||||
CVE-2024-0744,0,0,e96805dde96bfb723552d652089a0f0d2e0f936866d1fca2d8bc36dda88ad35c,2024-01-29T22:47:40.353000
|
||||
CVE-2024-0745,0,0,e95f46af45f166ba44148aad2d02421e51785e292696d491c32d77e99976a28a,2024-01-30T16:08:53.497000
|
||||
CVE-2024-0746,0,0,86e154f7304b77b0253dd3ebca2a1985a3fb1b8ae7973ed11288f18ffe31e532,2024-02-02T17:19:10.737000
|
||||
@ -238543,6 +238545,9 @@ CVE-2024-1138,0,0,0bb26866b03e9dd351d8284004467140fe2cfdfbd72af071fda864e5a2dc9e
|
||||
CVE-2024-1140,0,0,113ab98fbbd3f38fc36026b5aef44eb4b38cd7d347ba07fcabb6b9d9a69118a5,2024-02-27T19:17:32.253000
|
||||
CVE-2024-1141,0,0,48ded67d016daf0f3b16719f5ccedb465e548a958cef24ce4f350672f3d23e36,2024-02-09T20:22:03.893000
|
||||
CVE-2024-1143,0,0,0e1cc50dc6fadb90e5e9f42ce552c5269c71acc03717875a86d6ea10d7db2994,2024-02-09T19:08:27.423000
|
||||
CVE-2024-1144,1,1,46ba07079959d0bc5a1bd80131fbc31b6ec1add882bbb171f0d9910b026f00f7,2024-03-19T12:15:07.910000
|
||||
CVE-2024-1145,1,1,f0d0e965634c237c0bfc88fd7f3d047f78ebffe6c269b0c22cd127ca447dd95f,2024-03-19T12:15:08.177000
|
||||
CVE-2024-1146,1,1,0e5bfb2c890fa993042df6fb1eeb1edf7e276838e73c72f55376d2188650bb35,2024-03-19T12:15:08.443000
|
||||
CVE-2024-1149,0,0,e12aca11c49edcecd68e875fe82a5687fd0ed0bd531ab2619a9a9843b555ddd2,2024-02-15T17:52:08.970000
|
||||
CVE-2024-1150,0,0,254c78737835be39b8538afdba98acb889151a71de178f55236b85ab77801784,2024-02-15T17:42:08.113000
|
||||
CVE-2024-1151,0,0,9228ed7d5915ff157a1f719259771d692c1e75b64670d2aac60410feae41cc91,2024-02-22T04:15:08.477000
|
||||
@ -240751,7 +240756,7 @@ CVE-2024-24594,0,0,2d1d6ef3edb6eea27d760a77187cf0f21d8b0e3aa5e2b1e9eb45515b37617
|
||||
CVE-2024-24595,0,0,53aa45116d4573f7c0b646b17e4787137c5ab03b6e722457f3ddd917489c99e4,2024-02-13T14:08:55.650000
|
||||
CVE-2024-24680,0,0,00c6b06cbd399fac9a1cb69a45fdeee991ea9572aae73c195704c3555b436eb7,2024-02-15T18:46:48.693000
|
||||
CVE-2024-24681,0,0,705110c1a0575ef95794934b23101ccc4a6f384f7c61c4db9f4dbf9a8c528dd4,2024-02-26T13:42:22.567000
|
||||
CVE-2024-24683,1,1,14d1db8c42c1af073346b05caabd28a87136e12e5c900ba32df4dea78d909acf,2024-03-19T09:15:06.630000
|
||||
CVE-2024-24683,0,1,83867e1d338460bbfdf92b236075e9d9bb5ed3b017b9bdb0c57d93bffd7eb55d,2024-03-19T09:15:06.630000
|
||||
CVE-2024-24690,0,0,4249963fcab3f64839ca35be1a62d20e5da7a24ba0a47ce2bf9c0d2ae28ac410,2024-02-14T13:59:35.580000
|
||||
CVE-2024-24691,0,0,87a55408e5efa0a4e3ce695995ae48834f0ce6baa0932acdc26c28bc7459ff4b,2024-02-14T13:59:35.580000
|
||||
CVE-2024-24692,0,0,96b263e11e7ffd264e5e6330a524d4e167d94ed5d670d61f6bb2c4bb8b02f370,2024-03-14T12:52:21.763000
|
||||
@ -241386,11 +241391,13 @@ CVE-2024-26042,0,0,927f70a352d7c944271929f8711b34e89bf0c26c9040985cbf997f7bb85f1
|
||||
CVE-2024-26043,0,0,77ce18daefee0fb24763d2de04c9f4ff1f3fc9c499267ef23cade7defef226a1,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26044,0,0,f556d4225ae31cf4a75b95323be404b6e96c152dafd030c24bdb1036f337da08,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26045,0,0,12a76916f2e3fabe11f0da4acd8c315d84502c254bb0159c5076b8a08d2bf1f8,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2605,1,1,5811c2b58ce546bf0c49dc0fbf1dce8b3c4eb5f9e17aaef658dcdcdc4734323e,2024-03-19T12:15:08.690000
|
||||
CVE-2024-26050,0,0,aef0a31966034fb7cad23737b141d0ec896d58774ba8eff9ccccd20d65bf9701,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26051,0,0,27f4a4cc55152422e98812c372f02a9a52ea0edc20866d873d003a2f46e2c392,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26052,0,0,4afe062ef50e3846cb25cfceaebb6f1cb55d0294a22d349f7d6dc8aa00db6a18,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26056,0,0,60712556392fbef8788174cb4444764b1e98f110de0c08a36a1c6d35b38a27f4,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26059,0,0,4c713ebfa874c9051e3b2fefbe42e45a5f50df79fbce0963b1f0497ba00efe5b,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2606,1,1,9ff42d2fc52c3bc81bc08c599167d0a35be9768ac3e3188167457c840c15b7c0,2024-03-19T12:15:08.740000
|
||||
CVE-2024-26061,0,0,e5d349ee86366a82d94cc4ffc66dadaca867fab96cb64cbab8974800307976f5,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26062,0,0,87ec57cf947d718a02d0ed767da86d3295cd5451b81149c31cd2bbba6395c4cb,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26063,0,0,1ba9efc90459d106edfffaf83d96a3b240f0673b88e00cd157d3f6e90cfb5a06,2024-03-18T19:40:00.173000
|
||||
@ -241398,10 +241405,14 @@ CVE-2024-26064,0,0,ff144dd493cab1ed761f56b7eed61318aa93a620b7f1f749119957a2f49a9
|
||||
CVE-2024-26065,0,0,f05434d986097dd89c414a15c420cdddc61d6433e66c11de1a1a2441f62c78a5,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26067,0,0,771feae423c61b47115f901b11f3c3dcf0abf651e532228608443b53ddaf898b,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26069,0,0,816c3bf702e981a32d8f2cbc8f4ffc747fd5bb2fd9e85087b9348ecbb0d6a22b,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2607,1,1,2a51d58380efb4b0abbeb30113b40ef6253ceca1431c6e4fa157343902b1fccd,2024-03-19T12:15:08.790000
|
||||
CVE-2024-26073,0,0,6888cf6593fb4013d9ac96b5e0e04253a32891793ba0fc6b5d0f9bb6acf56fbf,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2608,1,1,265015116837e37458e64280395c041002aedf2a19b7256cf1fbfbcf6084e197,2024-03-19T12:15:08.843000
|
||||
CVE-2024-26080,0,0,4c7f5e68dedcd9fba242c25344b93a9a82fec0775eb26628d32eb9d1bc78f44c,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2609,1,1,ab9ccaacfd11661e2827774717e08fca08dd1f13b7681e453ae2280448511152,2024-03-19T12:15:08.910000
|
||||
CVE-2024-26094,0,0,85e3ce7a818102789382308d4aee284348d003fd2b7cf5cdd2a80c2099ce4bab,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26096,0,0,7149acbb034794a59086aa3fa6e989a4571021a73871d6ede0203941e15d68d8,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2610,1,1,c2824264a0b7fa729f2018b8d31f48f12673d361a8beae7110486d68ec2187e4,2024-03-19T12:15:08.957000
|
||||
CVE-2024-26101,0,0,a99024df1b18b54a773096b0beb63b24fd79a9e9974023773ae59f2a37feed95,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26102,0,0,238e693f3e2d466bc8d2c153335d74273ddf22aee27378fc2288011848995267,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26103,0,0,d8456b4083613d4d8db27a085dde20a49ef73abb0168ef69a30fce12bb31e1c6,2024-03-18T19:40:00.173000
|
||||
@ -241409,13 +241420,16 @@ CVE-2024-26104,0,0,26fa5e620c52b2c3f13956dc7ddff142e7a4604a5ec9b5dd0aa8139e69f91
|
||||
CVE-2024-26105,0,0,11537b15eb4cc2020a0de2c2950a0ccff35f84e7097158552d59dda934784eba,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26106,0,0,1bcf517c10e9d03e04f36309423fea2ee998c751ee4d56005c66807def8df1c2,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26107,0,0,08a7d4a713d69f5e9264f33bf201cb0a984991aa907bf9c03d1e9d80640879b3,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2611,1,1,161fc729524d5c4c7e1cea9579661e2b0572b8abf0724e013fb128173f26f902,2024-03-19T12:15:09.007000
|
||||
CVE-2024-26118,0,0,7c64ac890dd2a49d6d942d5500b1240c8fe85648327d773fcda60ffa1a5badd7,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26119,0,0,d15b90520fefb7812fc1dd26c7161c951db5fa8c9a1a7a8a2878ce59a176d881,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2612,1,1,5436126de8edea12a1ddfdb3c820de0b5da83895b0cac3aa1025993b67aecb80,2024-03-19T12:15:09.063000
|
||||
CVE-2024-26120,0,0,1657b6d18890514d9af3eeebc8c2352500124f93d0e64bb8ac66ddfc251885ca,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26124,0,0,82c27b96a9dc28b3e1fb2de7ffef79a19fe8428577dd4db99bfdfe3e5dd7dcb3,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26125,0,0,b8e9f2510a0a2d65e00221b700c4ebf67290c396472beeb55853dce893354627,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26128,0,0,487fd4a47ca7d01d688a4160da954eb7676a1080733cdfedc265ac6cf53a8666,2024-02-23T02:42:54.547000
|
||||
CVE-2024-26129,0,0,968e60f64e57be6f8f2df784210f5788e81353ced4a4f4353953a10484d71d0a,2024-02-20T19:50:53.960000
|
||||
CVE-2024-2613,1,1,09a2410e4a908ae17a48f75b6026fd314ec15c2f5a707e707d45947f3caac53e,2024-03-19T12:15:09.113000
|
||||
CVE-2024-26130,0,0,a100f31d14662694d3f6ac3371aa0aa02486ee73cfbe5beddc735c4f540ce1d4,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26131,0,0,1fe68deeaaca58bb492ce63c50849cc8b6db7b3677668061d7c8d3bfdc8a7612,2024-02-29T13:49:29.390000
|
||||
CVE-2024-26132,0,0,efcbc1c03bc7ecd913f4cad008d19857c5246eca6426cc18f4f717c65825e8a0,2024-02-29T13:49:29.390000
|
||||
@ -241424,6 +241438,7 @@ CVE-2024-26134,0,0,c48fec61bdbea71825089d60ba10afed6847a83574a5b8775f63985c4fd7b
|
||||
CVE-2024-26135,0,0,59fe0ab8843c555cfe91a706ee16a0503bc6707525e2af12cfc8995ef8319782,2024-02-20T21:52:55.187000
|
||||
CVE-2024-26136,0,0,bc3bbfc3e7ddd7f5422807ceb3e66f18b225baf2ed7e74657a084b480c15c1ff,2024-02-22T19:07:37.840000
|
||||
CVE-2024-26138,0,0,4d4da9f47e13e4c424c52e5eff6306f34e02033e2d2c801866f22decefe9c2c2,2024-02-22T19:07:27.197000
|
||||
CVE-2024-2614,1,1,d6a3ef07a512fa4deeabdae9e4baad12c27d9b864bda179f5d8eeff8439a6acc,2024-03-19T12:15:09.160000
|
||||
CVE-2024-26140,0,0,6de2d0c9ebf70d5d176c18f61310d4c12ab2f9c1ae885cf141ebe9307850ffc6,2024-02-22T19:07:37.840000
|
||||
CVE-2024-26141,0,0,9df246c55a4395e8557802daf50823ee55f3169dd101c749aaebaef21dae00c2,2024-02-29T13:49:47.277000
|
||||
CVE-2024-26142,0,0,edb6243c44774fbfc22b55927ba153d435243b85e5fd0fb08002baf86f2fdeda,2024-02-28T14:07:00.563000
|
||||
@ -241434,10 +241449,12 @@ CVE-2024-26146,0,0,bd024c90d4aeed8e0a6d50c3aa07c3200c9424641413cfb8168503eefdab2
|
||||
CVE-2024-26147,0,0,13addf1c8834f3ea67c55cec0f4c0eb059c8c47b1e8094df62594b8de41f2fde,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26148,0,0,05337c7b03b0d1ad121194c9ea9b96c7e58591b109aa2163af845b513f2c72fe,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26149,0,0,518a6e749fa42da9b701c9605e92313b609e16a6573a8caa383f380b0cdfc77a,2024-02-26T22:10:40.463000
|
||||
CVE-2024-2615,1,1,06ff763470f86e8717af3f3d8547f9cc00284b1673a49d507c12215ad9268687,2024-03-19T12:15:09.210000
|
||||
CVE-2024-26150,0,0,8ea3c18b0fb78100fc3632066a5c3403e90a7daa780b43e6f9240c2ed9fee7b2,2024-02-23T19:31:25.817000
|
||||
CVE-2024-26151,0,0,23d71c73b4a2821ea019a978d698b1910ca82d8c9eb2d93a0500cf52583cbf84,2024-02-23T02:42:54.547000
|
||||
CVE-2024-26152,0,0,7e68ad422883506103ec46c3174c4872da8a983d075ae50a3e01c580804f4253,2024-02-23T02:42:54.547000
|
||||
CVE-2024-26159,0,0,8db8f42d5662b161251586cebfdfad3ac7119bf59dcefc0ce4412d5330cc45ab,2024-03-12T17:46:17.273000
|
||||
CVE-2024-2616,1,1,8126975d85b4cb7a7a7fb49ad4920bfe7c96700c000dd06a81157986baefc930,2024-03-19T12:15:09.260000
|
||||
CVE-2024-26160,0,0,fa9ab77966a6520f6fd48a75b259529e6a68bdc5f72bc11ac282a7c57a6be71f,2024-03-12T17:46:17.273000
|
||||
CVE-2024-26161,0,0,179c500caa38708835a1de408543085e57586fd097d7453a1bf1888d48f494e3,2024-03-12T17:46:17.273000
|
||||
CVE-2024-26162,0,0,abe9736aa1712017432f5ac3cb4f9e06d55b8e6b2899e4fcc1a691ec906deb0c,2024-03-12T17:46:17.273000
|
||||
@ -241502,15 +241519,19 @@ CVE-2024-26310,0,0,cdf3231f7a059b92520dd591ab7449fe300f81e89c81c63cb479e44416fa6
|
||||
CVE-2024-26311,0,0,c10525456294b75c6b4919ba396921719972a7cc08a82934dcff79f6c0deabee,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26313,0,0,307927a31aa9525f579ecee601093796b34c0481bc031cf5fc7cd7d3e73f1218,2024-03-08T14:02:57.420000
|
||||
CVE-2024-26318,0,0,5a8434e81e693bc0f90a66d9a6d8655df17a4e5f3f1f4a63075d970f5e64fed9,2024-02-20T19:50:53.960000
|
||||
CVE-2024-2632,1,1,e58563df22e3d97655720bc6889c7505eb99503ec7bfd5ec4b415994d426fd60,2024-03-19T12:15:09.307000
|
||||
CVE-2024-26327,0,0,ed8d19077e03f59789fd57e15d79ebd6fa2e85738782585f472f97265da3d970,2024-02-20T19:50:53.960000
|
||||
CVE-2024-26328,0,0,483204e568c37ddd385ae6419587f3cba8922820a5f3e4626565041a8ff87314,2024-02-20T19:50:53.960000
|
||||
CVE-2024-2633,1,1,6434744162cbeb882ce57c72de5c0b3cd92363ae9edc6a42446efe9c5667361e,2024-03-19T12:15:09.530000
|
||||
CVE-2024-26333,0,0,694ee07e9a9eebd54e976b1efdfcd9c1e5579c307624f1b176728a9b5ec66620,2024-03-05T13:41:01.900000
|
||||
CVE-2024-26334,0,0,a2c81f8955be04bed36d435c0180176ac51a579e96e04b4d72eb87b607366d07,2024-03-05T13:41:01.900000
|
||||
CVE-2024-26335,0,0,b13dcfefb7d44684fbd7bca27c28b61eaa6fdca68532cea06942a84065f07fea,2024-03-05T13:41:01.900000
|
||||
CVE-2024-26337,0,0,3a4c73678ac95a037d1d40acba24ef87be9086770b788876de82a51522b533c6,2024-03-05T13:41:01.900000
|
||||
CVE-2024-26339,0,0,7eb4f269852f486a1ab2b0d193aa159613957884ae1cd1b107a1c58ebf743408,2024-03-05T13:41:01.900000
|
||||
CVE-2024-2634,1,1,44624de763c6269a817a3b532a5bc58740e20dcc28154e4e1394f06b4cb8da17,2024-03-19T12:15:09.773000
|
||||
CVE-2024-26342,0,0,872e5b33eb7a5e55045de887e3aa3885f68eb96ab7b6c872c9c6b04465e64391,2024-02-29T13:49:47.277000
|
||||
CVE-2024-26349,0,0,01186c28ef719dd0149527c4abd8d67b60279349307693d6719ba1d7ab32ddce,2024-02-22T19:07:27.197000
|
||||
CVE-2024-2635,1,1,75845e77e5ff781129814c7f5910ce2b4cbe828aa358218b6ea6f6fd62509504,2024-03-19T12:15:09.993000
|
||||
CVE-2024-26350,0,0,1f62ec8cd425e84b1282a5e55493461489796820c50a425af585677fa2bae43e,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26351,0,0,61b98d66760f09ba8a0757ca890b9ad836349a62d566c880c0eb8336d14dbb04,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26352,0,0,ed876b320273da7c752d57a08640f2d98ce80b026324bdf46d0712ec0097ce54,2024-02-22T19:07:27.197000
|
||||
@ -241709,6 +241730,7 @@ CVE-2024-27354,0,0,3316a11ae03e51007e09710a76a22632e619f5d31d833e6569bcace78ce3c
|
||||
CVE-2024-27355,0,0,0b9031e2eb548ad12d2d9e0065d270364951139eb9b910f1e5678f52ec43857a,2024-03-04T13:58:23.447000
|
||||
CVE-2024-27356,0,0,2464f4bdc7cd759969915038df7055199f0bd02c6d9b1a8ceb85c7588507e9ba,2024-02-27T14:20:06.637000
|
||||
CVE-2024-27359,0,0,45c452c4a5013555c154282328f794ae0e5bd9c68f52a53f3747792eec7b2661,2024-02-26T16:32:25.577000
|
||||
CVE-2024-27439,1,1,e6f57a14fb97cb51d4de95859548ccf9f7adfd2c4d52695146e9929ca36f2fc9,2024-03-19T11:15:06.537000
|
||||
CVE-2024-27440,0,0,f656cf3f867b554b4acbc17eee670f16835e4e41b3c8da203b1b487ef7d6f2b3,2024-03-13T12:33:51.697000
|
||||
CVE-2024-27441,0,0,e840685b8600bbca2bd5265ffc2375dd0e1834727afca845fa72402578217a21,2024-03-13T15:15:52.083000
|
||||
CVE-2024-27444,0,0,a237f36c45a82911cb697384887c7b89bc1c2ea038ffd45f33470a0acaad42ea,2024-02-26T16:32:25.577000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user