mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-03-27T19:00:37.713009+00:00
This commit is contained in:
parent
9ca3e5e641
commit
625ac53827
59
CVE-2023/CVE-2023-05xx/CVE-2023-0582.json
Normal file
59
CVE-2023/CVE-2023-05xx/CVE-2023-0582.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-0582",
|
||||
"sourceIdentifier": "psirt@forgerock.com",
|
||||
"published": "2024-03-27T18:15:08.237",
|
||||
"lastModified": "2024-03-27T18:15:08.237",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ForgeRock Access Management allows Authorization Bypass.\n\nThis issue affects access management: before 7.3.0, before 7.2.1, before 7.1.4, through 7.0.2.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@forgerock.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@forgerock.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://backstage.forgerock.com/downloads/browse/am/featured",
|
||||
"source": "psirt@forgerock.com"
|
||||
},
|
||||
{
|
||||
"url": "https://backstage.forgerock.com/knowledge/kb/article/a64088600",
|
||||
"source": "psirt@forgerock.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5189",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-11-14T23:15:12.290",
|
||||
"lastModified": "2023-12-13T10:15:10.110",
|
||||
"lastModified": "2024-03-27T18:15:08.710",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -97,6 +97,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2023:7773",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1536",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-5189",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1540",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-03-27T16:15:09.963",
|
||||
"lastModified": "2024-03-27T16:15:09.963",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1580",
|
||||
"sourceIdentifier": "cve-coordination@google.com",
|
||||
"published": "2024-02-19T11:15:08.817",
|
||||
"lastModified": "2024-03-26T00:15:08.497",
|
||||
"lastModified": "2024-03-27T18:15:09.063",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,6 +51,30 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/36",
|
||||
"source": "cve-coordination@google.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/37",
|
||||
"source": "cve-coordination@google.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/38",
|
||||
"source": "cve-coordination@google.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/39",
|
||||
"source": "cve-coordination@google.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/40",
|
||||
"source": "cve-coordination@google.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/41",
|
||||
"source": "cve-coordination@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://code.videolan.org/videolan/dav1d/-/blob/master/NEWS",
|
||||
"source": "cve-coordination@google.com"
|
||||
|
55
CVE-2024/CVE-2024-202xx/CVE-2024-20259.json
Normal file
55
CVE-2024/CVE-2024-202xx/CVE-2024-20259.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-20259",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-03-27T17:15:50.913",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to a crafted IPv4 DHCP request packet being mishandled when endpoint analytics are enabled. An attacker could exploit this vulnerability by sending a crafted DHCP request through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.\r\n\r Note: The attack vector is listed as network because a DHCP relay anywhere on the network could allow exploits from networks other than the adjacent one."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dhcp-dos-T3CXPO9z",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-202xx/CVE-2024-20265.json
Normal file
55
CVE-2024/CVE-2024-202xx/CVE-2024-20265.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-20265",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-03-27T17:15:51.113",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the boot process of Cisco Access Point (AP) Software could allow an unauthenticated, physical attacker to bypass the Cisco Secure Boot functionality and load a software image that has been tampered with on an affected device.\r\n\r This vulnerability exists because unnecessary commands are available during boot time at the physical console. An attacker could exploit this vulnerability by interrupting the boot process and executing specific commands to bypass the Cisco Secure Boot validation checks and load an image that has been tampered with. This image would have been previously downloaded onto the targeted device. A successful exploit could allow the attacker to load the image once. The Cisco Secure Boot functionality is not permanently compromised."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-501"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-secureboot-bypass-zT5vJkSD",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-202xx/CVE-2024-20271.json
Normal file
55
CVE-2024/CVE-2024-202xx/CVE-2024-20271.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-20271",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-03-27T17:15:51.320",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the IP packet processing of Cisco Access Point (AP) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to insufficient input validation of certain IPv4 packets. An attacker could exploit this vulnerability by sending a crafted IPv4 packet either to or through an affected device. A successful exploit could allow the attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition. To successfully exploit this vulnerability, the attacker does not need to be associated with the affected AP. This vulnerability cannot be exploited by sending IPv6 packets."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-dos-h9TGGX6W",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-202xx/CVE-2024-20276.json
Normal file
55
CVE-2024/CVE-2024-202xx/CVE-2024-20276.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-20276",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-03-27T17:15:51.513",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in Cisco IOS Software for Cisco Catalyst 6000 Series Switches could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly.\r\n\r This vulnerability is due to improper handling of process-switched traffic. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-248"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-dos-Hq4d3tZG",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-202xx/CVE-2024-20278.json
Normal file
55
CVE-2024/CVE-2024-202xx/CVE-2024-20278.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-20278",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-03-27T17:15:51.703",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the NETCONF feature of Cisco IOS XE Software could allow an authenticated, remote attacker to elevate privileges to root on an affected device.\r\n\r This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input over NETCONF to an affected device. A successful exploit could allow the attacker to elevate privileges from Administrator to root."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-184"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-seAx6NLX",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20303.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20303.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-20303",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-03-27T17:15:51.880",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the multicast DNS (mDNS) gateway feature of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper management of mDNS client entries. An attacker could exploit this vulnerability by connecting to the wireless network and sending a continuous stream of specific mDNS packets. A successful exploit could allow the attacker to cause the wireless controller to have high CPU utilization, which could lead to access points (APs) losing their connection to the controller and result in a DoS condition."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-459"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-mdns-dos-4hv6pBGf",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20306.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20306.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-20306",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-03-27T17:15:52.067",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the Unified Threat Defense (UTD) configuration CLI of Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying host operating system. To exploit this vulnerability, an attacker must have level 15 privileges on the affected device. \r\n\r This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by submitting a crafted CLI command to an affected device. A successful exploit could allow the attacker to execute arbitrary commands as root on the underlying operating system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-233"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-utd-cmd-JbL8KvHT",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20307.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20307.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-20307",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-03-27T18:15:09.357",
|
||||
"lastModified": "2024-03-27T18:15:09.357",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a heap overflow, resulting in an affected device reloading.\r\n\r This vulnerability exists because crafted, fragmented IKEv1 packets are not properly reassembled. An attacker could exploit this vulnerability by sending crafted UDP packets to an affected system. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.\r\n\r Note: Only traffic that is directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev1-NO2ccFWz",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2024/CVE-2024-203xx/CVE-2024-20308.json
Normal file
43
CVE-2024/CVE-2024-203xx/CVE-2024-20308.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2024-20308",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-03-27T18:15:09.853",
|
||||
"lastModified": "2024-03-27T18:15:09.853",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a heap underflow, resulting in an affected device reloading.\r\n\r This vulnerability exists because crafted, fragmented IKEv1 packets are not properly reassembled. An attacker could exploit this vulnerability by sending crafted UDP packets to an affected system. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.\r\n\r Note: Only traffic that is directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic.."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev1-NO2ccFWz",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20309.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20309.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-20309",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-03-27T17:15:52.260",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in auxiliary asynchronous port (AUX) functions of Cisco IOS XE Software could allow an authenticated, local attacker to cause an affected device to reload or stop responding.\r\n\r This vulnerability is due to the incorrect handling of specific ingress traffic when flow control hardware is enabled on the AUX port. An attacker could exploit this vulnerability by reverse telnetting to the AUX port and sending specific data after connecting. A successful exploit could allow the attacker to cause the device to reset or stop responding, resulting in a denial of service (DoS) condition."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.1,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-828"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aux-333WBz8f",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20311.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20311.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-20311",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-03-27T17:15:52.463",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the Locator ID Separation Protocol (LISP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload.\r\n\r This vulnerability is due to the incorrect handling of LISP packets. An attacker could exploit this vulnerability by sending a crafted LISP packet to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.\r\n\r Note: This vulnerability could be exploited over either IPv4 or IPv6 transport."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-674"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lisp-3gYXs3qP",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20312.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20312.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-20312",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-03-27T17:15:52.690",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) protocol of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to insufficient input validation when parsing an ingress IS-IS packet. An attacker could exploit this vulnerability by sending a crafted IS-IS packet to an affected device after forming an adjacency. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.\r\n\r Note: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2-adjacent to the affected device and have formed an adjacency."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-isis-sGjyOUHX",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20314.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20314.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-20314",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-03-27T17:15:52.920",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the IPv4 Software-Defined Access (SD-Access) fabric edge node feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause high CPU utilization and stop all traffic processing, resulting in a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to improper handling of certain IPv4 packets. An attacker could exploit this vulnerability by sending certain IPv4 packets to an affected device. A successful exploit could allow the attacker to cause the device to exhaust CPU resources and stop processing traffic, resulting in a DoS condition."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-783"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-sda-edge-dos-qZWuWXWG",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20316.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20316.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-20316",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-03-27T17:15:53.110",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the data model interface (DMI) services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to access resources that should have been protected by a configured IPv4 access control list (ACL).\r\n\r This vulnerability is due to improper handling of error conditions when a successfully authorized device administrator updates an IPv4 ACL using the NETCONF or RESTCONF protocol, and the update would reorder access control entries (ACEs) in the updated ACL. An attacker could exploit this vulnerability by accessing resources that should have been protected across an affected device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-390"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dmi-acl-bypass-Xv8FO8Vz",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20324.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20324.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-20324",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-03-27T17:15:53.293",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, low-privileged, local attacker to access WLAN configuration details including passwords.\r\n\r This vulnerability is due to improper privilege checks. An attacker could exploit this vulnerability by using the show and show tech wireless CLI commands to access configuration details, including passwords. A successful exploit could allow the attacker to access configuration details that they are not authorized to access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-274"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-wlc-privesc-RjSMrmPK",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20333.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20333.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-20333",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-03-27T17:15:53.480",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an authenticated, remote attacker to change specific data within the interface on an affected device.\r\n\r This vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to change a specific field within the web-based management interface, even though they should not have access to change that field."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccc-authz-bypass-5EKchJRb",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20354.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20354.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-20354",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-03-27T17:15:53.660",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the handling of encrypted wireless frames of Cisco Aironet Access Point (AP) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device.\r\n\r This vulnerability is due to incomplete cleanup of resources when dropping certain malformed frames. An attacker could exploit this vulnerability by connecting as a wireless client to an affected AP and sending specific malformed frames over the wireless connection. A successful exploit could allow the attacker to cause degradation of service to other clients, which could potentially lead to a complete DoS condition."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-460"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-ap-dos-PPPtcVW",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-234xx/CVE-2024-23450.json
Normal file
59
CVE-2024/CVE-2024-234xx/CVE-2024-23450.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-23450",
|
||||
"sourceIdentifier": "bressers@elastic.co",
|
||||
"published": "2024-03-27T17:15:53.857",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was discovered in Elasticsearch, where processing a document in a deeply nested pipeline on an ingest node could cause the Elasticsearch node to crash."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "bressers@elastic.co",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "bressers@elastic.co",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://discuss.elastic.co/t/elasticsearch-8-13-0-7-17-19-security-update-esa-2024-06/356314",
|
||||
"source": "bressers@elastic.co"
|
||||
},
|
||||
{
|
||||
"url": "https://www.elastic.co/community/security",
|
||||
"source": "bressers@elastic.co"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-234xx/CVE-2024-23451.json
Normal file
55
CVE-2024/CVE-2024-234xx/CVE-2024-23451.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-23451",
|
||||
"sourceIdentifier": "bressers@elastic.co",
|
||||
"published": "2024-03-27T18:15:10.330",
|
||||
"lastModified": "2024-03-27T18:15:10.330",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect Authorization issue exists in the API key based security model for Remote Cluster Security, which is currently in Beta, in Elasticsearch 8.10.0 and before 8.13.0. This allows a\u00a0malicious user with a valid API key for a remote cluster configured to use the new Remote Cluster Security to read arbitrary documents from any index on the remote cluster, and only if they use the Elasticsearch custom transport protocol to issue requests with the target index ID, the shard ID and the document ID. None of Elasticsearch REST API endpoints are affected by this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "bressers@elastic.co",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "bressers@elastic.co",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://discuss.elastic.co/t/elasticsearch-8-13-0-security-update-esa-2024-07/356315",
|
||||
"source": "bressers@elastic.co"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-299xx/CVE-2024-29945.json
Normal file
55
CVE-2024/CVE-2024-299xx/CVE-2024-29945.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-29945",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-03-27T17:15:54.087",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the software potentially exposes authentication tokens during the token validation process. This exposure happens when either Splunk Enterprise runs in debug mode or the JsonWebToken component has been configured to log its activity at the DEBUG logging level."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-532"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-0301",
|
||||
"source": "prodsec@splunk.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-299xx/CVE-2024-29946.json
Normal file
59
CVE-2024/CVE-2024-299xx/CVE-2024-29946.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-29946",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-03-27T17:15:54.273",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the Dashboard Examples Hub in the Splunk Dashboard Studio app lacks protections for risky SPL commands. This could let attackers bypass SPL safeguards for risky commands in the Hub. The vulnerability would require the attacker to phish the victim by tricking them into initiating a request within their browser."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-0302",
|
||||
"source": "prodsec@splunk.com"
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/",
|
||||
"source": "prodsec@splunk.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2982",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-27T16:15:10.210",
|
||||
"lastModified": "2024-03-27T16:15:10.210",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2983",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-27T16:15:10.450",
|
||||
"lastModified": "2024-03-27T16:15:10.450",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2984",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-27T16:15:10.713",
|
||||
"lastModified": "2024-03-27T16:15:10.713",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
92
CVE-2024/CVE-2024-29xx/CVE-2024-2985.json
Normal file
92
CVE-2024/CVE-2024-29xx/CVE-2024-2985.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-2985",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-27T17:15:54.460",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has been declared as critical. This vulnerability affects the function formQuickIndex of the file /goform/QuickIndex. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258154 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formQuickIndex.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.258154",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.258154",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.301276",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-29xx/CVE-2024-2986.json
Normal file
92
CVE-2024/CVE-2024-29xx/CVE-2024-2986.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-2986",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-27T17:15:54.693",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has been rated as critical. This issue affects the function formSetSpeedWan of the file /goform/SetSpeedWan. The manipulation of the argument speed_dir leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258155. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/SetSpeedWan.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.258155",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.258155",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.301284",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-29xx/CVE-2024-2987.json
Normal file
92
CVE-2024/CVE-2024-29xx/CVE-2024-2987.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-2987",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-27T17:15:54.917",
|
||||
"lastModified": "2024-03-27T17:48:21.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in Tenda FH1202 1.2.0.14(408). Affected is the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument mac leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258156. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/GetParentControlInfo.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.258156",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.258156",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.301285",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-29xx/CVE-2024-2988.json
Normal file
92
CVE-2024/CVE-2024-29xx/CVE-2024-2988.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-2988",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-27T18:15:10.757",
|
||||
"lastModified": "2024-03-27T18:15:10.757",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in Tenda FH1203 2.0.1.6. Affected by this vulnerability is the function fromSetRouteStatic of the file /goform/fromRouteStatic. The manipulation of the argument entrys leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258157 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromSetRouteStatic.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.258157",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.258157",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.301363",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-29xx/CVE-2024-2989.json
Normal file
92
CVE-2024/CVE-2024-29xx/CVE-2024-2989.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-2989",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-27T18:15:11.293",
|
||||
"lastModified": "2024-03-27T18:15:11.293",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in Tenda FH1203 2.0.1.6. Affected by this issue is the function fromNatStaticSetting of the file /goform/NatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-258158 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromNatStaticSetting.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.258158",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.258158",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.301364",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
72
README.md
72
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-27T17:00:39.052121+00:00
|
||||
2024-03-27T19:00:37.713009+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-27T16:15:10.713000+00:00
|
||||
2024-03-27T18:15:11.293000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,50 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
243015
|
||||
243042
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `27`
|
||||
|
||||
- [CVE-2024-1540](CVE-2024/CVE-2024-15xx/CVE-2024-1540.json) (`2024-03-27T16:15:09.963`)
|
||||
- [CVE-2024-2980](CVE-2024/CVE-2024-29xx/CVE-2024-2980.json) (`2024-03-27T15:15:48.420`)
|
||||
- [CVE-2024-2981](CVE-2024/CVE-2024-29xx/CVE-2024-2981.json) (`2024-03-27T15:15:48.643`)
|
||||
- [CVE-2024-2982](CVE-2024/CVE-2024-29xx/CVE-2024-2982.json) (`2024-03-27T16:15:10.210`)
|
||||
- [CVE-2024-2983](CVE-2024/CVE-2024-29xx/CVE-2024-2983.json) (`2024-03-27T16:15:10.450`)
|
||||
- [CVE-2024-2984](CVE-2024/CVE-2024-29xx/CVE-2024-2984.json) (`2024-03-27T16:15:10.713`)
|
||||
- [CVE-2024-20265](CVE-2024/CVE-2024-202xx/CVE-2024-20265.json) (`2024-03-27T17:15:51.113`)
|
||||
- [CVE-2024-20271](CVE-2024/CVE-2024-202xx/CVE-2024-20271.json) (`2024-03-27T17:15:51.320`)
|
||||
- [CVE-2024-20276](CVE-2024/CVE-2024-202xx/CVE-2024-20276.json) (`2024-03-27T17:15:51.513`)
|
||||
- [CVE-2024-20278](CVE-2024/CVE-2024-202xx/CVE-2024-20278.json) (`2024-03-27T17:15:51.703`)
|
||||
- [CVE-2024-20303](CVE-2024/CVE-2024-203xx/CVE-2024-20303.json) (`2024-03-27T17:15:51.880`)
|
||||
- [CVE-2024-20306](CVE-2024/CVE-2024-203xx/CVE-2024-20306.json) (`2024-03-27T17:15:52.067`)
|
||||
- [CVE-2024-20307](CVE-2024/CVE-2024-203xx/CVE-2024-20307.json) (`2024-03-27T18:15:09.357`)
|
||||
- [CVE-2024-20308](CVE-2024/CVE-2024-203xx/CVE-2024-20308.json) (`2024-03-27T18:15:09.853`)
|
||||
- [CVE-2024-20309](CVE-2024/CVE-2024-203xx/CVE-2024-20309.json) (`2024-03-27T17:15:52.260`)
|
||||
- [CVE-2024-20311](CVE-2024/CVE-2024-203xx/CVE-2024-20311.json) (`2024-03-27T17:15:52.463`)
|
||||
- [CVE-2024-20312](CVE-2024/CVE-2024-203xx/CVE-2024-20312.json) (`2024-03-27T17:15:52.690`)
|
||||
- [CVE-2024-20314](CVE-2024/CVE-2024-203xx/CVE-2024-20314.json) (`2024-03-27T17:15:52.920`)
|
||||
- [CVE-2024-20316](CVE-2024/CVE-2024-203xx/CVE-2024-20316.json) (`2024-03-27T17:15:53.110`)
|
||||
- [CVE-2024-20324](CVE-2024/CVE-2024-203xx/CVE-2024-20324.json) (`2024-03-27T17:15:53.293`)
|
||||
- [CVE-2024-20333](CVE-2024/CVE-2024-203xx/CVE-2024-20333.json) (`2024-03-27T17:15:53.480`)
|
||||
- [CVE-2024-20354](CVE-2024/CVE-2024-203xx/CVE-2024-20354.json) (`2024-03-27T17:15:53.660`)
|
||||
- [CVE-2024-23450](CVE-2024/CVE-2024-234xx/CVE-2024-23450.json) (`2024-03-27T17:15:53.857`)
|
||||
- [CVE-2024-23451](CVE-2024/CVE-2024-234xx/CVE-2024-23451.json) (`2024-03-27T18:15:10.330`)
|
||||
- [CVE-2024-2985](CVE-2024/CVE-2024-29xx/CVE-2024-2985.json) (`2024-03-27T17:15:54.460`)
|
||||
- [CVE-2024-2986](CVE-2024/CVE-2024-29xx/CVE-2024-2986.json) (`2024-03-27T17:15:54.693`)
|
||||
- [CVE-2024-2987](CVE-2024/CVE-2024-29xx/CVE-2024-2987.json) (`2024-03-27T17:15:54.917`)
|
||||
- [CVE-2024-2988](CVE-2024/CVE-2024-29xx/CVE-2024-2988.json) (`2024-03-27T18:15:10.757`)
|
||||
- [CVE-2024-2989](CVE-2024/CVE-2024-29xx/CVE-2024-2989.json) (`2024-03-27T18:15:11.293`)
|
||||
- [CVE-2024-29945](CVE-2024/CVE-2024-299xx/CVE-2024-29945.json) (`2024-03-27T17:15:54.087`)
|
||||
- [CVE-2024-29946](CVE-2024/CVE-2024-299xx/CVE-2024-29946.json) (`2024-03-27T17:15:54.273`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `106`
|
||||
Recently modified CVEs: `6`
|
||||
|
||||
- [CVE-2024-29777](CVE-2024/CVE-2024-297xx/CVE-2024-29777.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-2978](CVE-2024/CVE-2024-29xx/CVE-2024-2978.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-29788](CVE-2024/CVE-2024-297xx/CVE-2024-29788.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-29789](CVE-2024/CVE-2024-297xx/CVE-2024-29789.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-2979](CVE-2024/CVE-2024-29xx/CVE-2024-2979.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-29790](CVE-2024/CVE-2024-297xx/CVE-2024-29790.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-29791](CVE-2024/CVE-2024-297xx/CVE-2024-29791.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-29792](CVE-2024/CVE-2024-297xx/CVE-2024-29792.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-29793](CVE-2024/CVE-2024-297xx/CVE-2024-29793.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-29794](CVE-2024/CVE-2024-297xx/CVE-2024-29794.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-29795](CVE-2024/CVE-2024-297xx/CVE-2024-29795.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-29796](CVE-2024/CVE-2024-297xx/CVE-2024-29796.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-29797](CVE-2024/CVE-2024-297xx/CVE-2024-29797.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-29798](CVE-2024/CVE-2024-297xx/CVE-2024-29798.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-29799](CVE-2024/CVE-2024-297xx/CVE-2024-29799.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-29801](CVE-2024/CVE-2024-298xx/CVE-2024-29801.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-29802](CVE-2024/CVE-2024-298xx/CVE-2024-29802.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-29803](CVE-2024/CVE-2024-298xx/CVE-2024-29803.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-29804](CVE-2024/CVE-2024-298xx/CVE-2024-29804.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-29805](CVE-2024/CVE-2024-298xx/CVE-2024-29805.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-29806](CVE-2024/CVE-2024-298xx/CVE-2024-29806.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-29807](CVE-2024/CVE-2024-298xx/CVE-2024-29807.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-29811](CVE-2024/CVE-2024-298xx/CVE-2024-29811.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-29812](CVE-2024/CVE-2024-298xx/CVE-2024-29812.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2024-30238](CVE-2024/CVE-2024-302xx/CVE-2024-30238.json) (`2024-03-27T15:49:41.437`)
|
||||
- [CVE-2023-5189](CVE-2023/CVE-2023-51xx/CVE-2023-5189.json) (`2024-03-27T18:15:08.710`)
|
||||
- [CVE-2024-1540](CVE-2024/CVE-2024-15xx/CVE-2024-1540.json) (`2024-03-27T17:48:21.140`)
|
||||
- [CVE-2024-1580](CVE-2024/CVE-2024-15xx/CVE-2024-1580.json) (`2024-03-27T18:15:09.063`)
|
||||
- [CVE-2024-2982](CVE-2024/CVE-2024-29xx/CVE-2024-2982.json) (`2024-03-27T17:48:21.140`)
|
||||
- [CVE-2024-2983](CVE-2024/CVE-2024-29xx/CVE-2024-2983.json) (`2024-03-27T17:48:21.140`)
|
||||
- [CVE-2024-2984](CVE-2024/CVE-2024-29xx/CVE-2024-2984.json) (`2024-03-27T17:48:21.140`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
255
_state.csv
255
_state.csv
@ -137319,7 +137319,7 @@ CVE-2019-2045,0,0,1705229e4fec9bfd82aef2ac1bb1c2832b7fc423971d0092d9264e10cc6fd5
|
||||
CVE-2019-20451,0,0,4d0762291a44e046795f84a4a06312ecbbc433e327a7f1e0d5459472a5e8f6f6,2021-09-09T17:41:35.163000
|
||||
CVE-2019-20452,0,0,1f4817a23fd44e7988cfa9a7e5714919e1f832aa5a7fdf2840e96e68b57f31cb,2020-08-24T17:37:01.140000
|
||||
CVE-2019-20453,0,0,f7bfb81c36b8409e27bcfd752ebe01abba843256421a0d4b2f525ac7e95541d5,2020-08-24T17:37:01.140000
|
||||
CVE-2019-20454,0,1,c2543304793955f430a64b58f46bed16bf5f70f7299b4671d92d021d0fd8dc76,2024-03-27T16:05:17.853000
|
||||
CVE-2019-20454,0,0,c2543304793955f430a64b58f46bed16bf5f70f7299b4671d92d021d0fd8dc76,2024-03-27T16:05:17.853000
|
||||
CVE-2019-20455,0,0,020f23034a46cfcbb565c99a2d99878424784e7d74607830136b187ff274b046,2024-02-14T01:17:43.863000
|
||||
CVE-2019-20456,0,0,f5478a7543aa47e5bb933cc310b3647eb2820951f2995f375bdbe4dff39f90a0,2020-02-26T15:10:12.293000
|
||||
CVE-2019-2046,0,0,5a99507a8351f8e058070df1d46e5e4a8733b86f79bb1d0063ca3a86c67d1bff,2021-07-21T11:39:23.747000
|
||||
@ -137722,7 +137722,7 @@ CVE-2019-20834,0,0,2f046198ffab2ceb1fc7e73446b82a9822085609cdbb82469e2699c1c960f
|
||||
CVE-2019-20835,0,0,4e5523f899e61855d812ac2a1e43101d0993f92a1e0e689e05361cb59d2b2e6b,2020-06-05T16:28:06.647000
|
||||
CVE-2019-20836,0,0,884b3ca5bb0fe09112ce82a99226cd4cee13d30147b25af155e4811fdc80bdb3,2020-06-05T16:15:58.883000
|
||||
CVE-2019-20837,0,0,1327025412446e71b0bb00c2f3d6721de4beba338c3d8c9d7bf39b7f128a72d7,2020-06-05T16:29:52.857000
|
||||
CVE-2019-20838,0,1,ae85425ffe9a90e620e01fbb5f6fb3ec72934f3c2a72308ebfe16b79353d78e2,2024-03-27T16:05:46.553000
|
||||
CVE-2019-20838,0,0,ae85425ffe9a90e620e01fbb5f6fb3ec72934f3c2a72308ebfe16b79353d78e2,2024-03-27T16:05:46.553000
|
||||
CVE-2019-20839,0,0,fff52c25682d0f6d7e1c0e14768f63c2c904e37343a8044d7831bcbfd024b515,2023-11-07T03:09:13.630000
|
||||
CVE-2019-2084,0,0,5e601ed0ca8bcc9033586975ff4fc6e7b2f7b5d3ef91eec06b110cebd1d7ad51,2019-10-01T13:30:46.273000
|
||||
CVE-2019-20840,0,0,aefbc83031592623633897c2f9cdcd0ba991e172c26249b04dbed70dd6ecd9ed,2023-11-07T03:09:13.720000
|
||||
@ -148884,7 +148884,7 @@ CVE-2020-14151,0,0,9ffddf0999e3d6a8a75e114bd5964acf118fd9c17127d60bccf0e39641478
|
||||
CVE-2020-14152,0,0,57e3f0cecf7bf86bfe5da88a7620e56351963f06700f63c35b8f5171187e3849,2023-02-27T18:17:27.037000
|
||||
CVE-2020-14153,0,0,237e4355f1b9bc09eda761245741f1003a98ac0666084ce326343a58b8dbcc5e,2023-02-27T18:18:36.527000
|
||||
CVE-2020-14154,0,0,03dc2a851685fd84058c57da71b4b3e059b96f8634c99ac94cc109d7b722276a,2023-03-01T16:01:38.367000
|
||||
CVE-2020-14155,0,1,71383f8981e2e521d3a64705adf0ac7a332883e698a288bb87a7e3df9703cdba,2024-03-27T16:04:48.863000
|
||||
CVE-2020-14155,0,0,71383f8981e2e521d3a64705adf0ac7a332883e698a288bb87a7e3df9703cdba,2024-03-27T16:04:48.863000
|
||||
CVE-2020-14156,0,0,926f8b5c9a479e61c041a7ec2f5fb4b4fef427878be695f5f18dd7586db5dc89,2020-06-22T18:33:42.990000
|
||||
CVE-2020-14157,0,0,ec6714662b4fd251e84456bfdef37480a0d5b708cceace12ae5070f687b701b6,2021-07-21T11:39:23.747000
|
||||
CVE-2020-14158,0,0,257c62d2d59f801f636fda0a5316dad846b25cbce009f7e0efa72f1cac35ab1c,2020-08-05T14:37:36.397000
|
||||
@ -162959,7 +162959,7 @@ CVE-2020-8165,0,0,b90f56eef4d394caafda41afeb1888db8d9e5be27c35ede9be39154ac6db31
|
||||
CVE-2020-8166,0,0,47c3904ebbdd2a5d9a1995acdeafdcc0912b1b4a1c6f035b0f63ad505e021cdf,2020-11-20T17:47:47.463000
|
||||
CVE-2020-8167,0,0,6d3767d0ff1146a65240741c1692557c5e3379cf0dd5883c168490dc71b44892,2021-10-21T14:35:21.047000
|
||||
CVE-2020-8168,0,0,ccb8c7a6475759104f1711b3a83fc1942ad048ad01cf973341e84f4b01e9b3dd,2023-11-07T03:26:17.750000
|
||||
CVE-2020-8169,0,1,5c99b47230440422d8b435273484301a874fd5e619e3cc621c9255024327f19b,2024-03-27T16:04:23.890000
|
||||
CVE-2020-8169,0,0,5c99b47230440422d8b435273484301a874fd5e619e3cc621c9255024327f19b,2024-03-27T16:04:23.890000
|
||||
CVE-2020-8170,0,0,c93bdaef62335dd3a34e497b1610bbed4f1531f0cdc62596c702d97cf7316ed2,2020-05-28T20:03:07.140000
|
||||
CVE-2020-8171,0,0,645a1ab3b96b9928f218f2a9a5fca0f8e8167d5a980ea9eeeaf49fee58513164,2020-05-28T20:00:03.527000
|
||||
CVE-2020-8172,0,0,aa60f1cb50e023b6bcefad51394fa465cda46ac1817e5b5ccf939eaf3ce619c5,2022-05-12T15:01:02.140000
|
||||
@ -162967,7 +162967,7 @@ CVE-2020-8173,0,0,34ceedff128c979f4774d29c75bd8a1e6c39839074dee16b306c28f746c7ce
|
||||
CVE-2020-8174,0,0,ac6b23e6b056d5a60f6974c777b55f9bb43d28eb7261a72f0325944e6fa3d8f6,2022-05-12T15:01:21.717000
|
||||
CVE-2020-8175,0,0,7c8b3c608d62151b045b3bb4fdf28e38a67da6066b16b2a4582925c6150ce840,2020-07-27T17:54:05.343000
|
||||
CVE-2020-8176,0,0,4a4c8126c4dcf74ee9d176934e967067a7bb58ed770baed0696fedbbcf0cd9a3,2020-07-10T19:30:40.273000
|
||||
CVE-2020-8177,0,1,349339cb813587dce0e4231c21f8a34d831e8d889fe95ab7ae85eb5b183170d8,2024-03-27T16:04:20.437000
|
||||
CVE-2020-8177,0,0,349339cb813587dce0e4231c21f8a34d831e8d889fe95ab7ae85eb5b183170d8,2024-03-27T16:04:20.437000
|
||||
CVE-2020-8178,0,0,81183e0e8c36d4d786b7e3a77c245d153eb61d8171589dd60b01f990fe023e7b,2020-07-21T12:36:01.557000
|
||||
CVE-2020-8179,0,0,935857d37fccce66d998380d30e28774b93fb272a89f5be8703042a361a65e66,2020-07-08T15:18:11.680000
|
||||
CVE-2020-8180,0,0,8cb081c94bf954092880caba93d685420308ab45526f3938b72742d9685a0bb4,2020-06-11T18:10:23.393000
|
||||
@ -163021,7 +163021,7 @@ CVE-2020-8227,0,0,3b78fe266dffb4032d2b4e32d9ef3476c07b68b63646b25b0f1292cb88f6cc
|
||||
CVE-2020-8228,0,0,51f515d27850dd37c61ce5207f1b36b53947b36f17faa52faecdff4b8377a4a1,2020-10-20T18:56:06.573000
|
||||
CVE-2020-8229,0,0,08777f070fbcde0d30b96edeece4f672522bb23e5cbc11f4f79f873314073641,2022-09-27T16:00:41.497000
|
||||
CVE-2020-8230,0,0,2f0be1134ef3c6182aa36f6843e120f2dbc96fb6cf2b7c6eaaa30173af344e84,2022-09-27T15:55:38.753000
|
||||
CVE-2020-8231,0,1,9446a1e9744263543f370599c1337460d7eb0d0cefd89d7b92a552fc6be71363,2024-03-27T16:04:17.597000
|
||||
CVE-2020-8231,0,0,9446a1e9744263543f370599c1337460d7eb0d0cefd89d7b92a552fc6be71363,2024-03-27T16:04:17.597000
|
||||
CVE-2020-8232,0,0,a9c7f9a40f8c8864a7e3d701a0e990044acd6299147e74baf1d5d5f48bba2b7a,2021-09-23T13:57:02.790000
|
||||
CVE-2020-8233,0,0,a7c70cae7ff9ea797af45a8e6bf71362a6e567e5946f869c3d5abdb997855221,2022-05-24T17:03:55.223000
|
||||
CVE-2020-8234,0,0,0ecda2f78c5958b8d082e21a2aedcafa2a5797fa89f53e9fcdbc3e7f5b196655,2023-11-07T03:26:18.827000
|
||||
@ -163073,9 +163073,9 @@ CVE-2020-8280,0,0,8d5f0a3c05bd32b92e1a858a83594675a405cccfedeb61c86c6b0f4a117866
|
||||
CVE-2020-8281,0,0,7b0fbce8746c448976b5242155b86de40c6c79f6aef5f735ac25b73023022b1a,2021-01-11T17:39:01.227000
|
||||
CVE-2020-8282,0,0,8222c1643818edd8f6af8739cd00802cafdf09f4420f884c84232b750c7a9ce4,2020-12-16T15:41:49.850000
|
||||
CVE-2020-8283,0,0,27005cdc68403e5c13995e8fdafcca44a2c6dc4c7d8c8e52cb9054d9aec06275,2020-12-17T18:45:00.930000
|
||||
CVE-2020-8284,0,1,d48f38208932ba541cfea5b7fe90f4f148d2ce5c7905914cff47a907a00825af,2024-03-27T15:50:07.387000
|
||||
CVE-2020-8285,0,1,c3522f16bed2fee4b17164c0cd5d5a93552cd535d4c4756a633db3011ffa406c,2024-03-27T15:47:57.647000
|
||||
CVE-2020-8286,0,1,a02fcb8742fe23470beab7341e4d5bc8102e3b0e9656dfa9fa789b059c0b5ddf,2024-03-27T15:47:53.600000
|
||||
CVE-2020-8284,0,0,d48f38208932ba541cfea5b7fe90f4f148d2ce5c7905914cff47a907a00825af,2024-03-27T15:50:07.387000
|
||||
CVE-2020-8285,0,0,c3522f16bed2fee4b17164c0cd5d5a93552cd535d4c4756a633db3011ffa406c,2024-03-27T15:47:57.647000
|
||||
CVE-2020-8286,0,0,a02fcb8742fe23470beab7341e4d5bc8102e3b0e9656dfa9fa789b059c0b5ddf,2024-03-27T15:47:53.600000
|
||||
CVE-2020-8287,0,0,49a08588ed5b600c0a1dd7fd9f5faae9c0e4ddd142e8c3d1feda2c223f49818f,2023-11-07T03:26:19.870000
|
||||
CVE-2020-8288,0,0,b0824b7a38b5f17525fb96fd83bb8be5d6d553292e795764d879457314ab7a3e,2021-02-01T15:31:43.600000
|
||||
CVE-2020-8289,0,0,c14da3e86fd5ce60216301b1e5350cc462897aac50f7af592f55008c44fd2d61,2020-12-31T19:04:39.117000
|
||||
@ -168944,7 +168944,7 @@ CVE-2021-22872,0,0,b5374c75cf52173069742df9932b16f3b48df418bcc8bce07737040217b3d
|
||||
CVE-2021-22873,0,0,151b01066b491a5d4fdbb1cf5af054bb65ff50d7128e043ad61d55a2cb1dd4f5,2021-02-02T15:09:34.250000
|
||||
CVE-2021-22874,0,0,1ce3a63dfe6ef7545b98b97473516dd45fa986322bfe405209f2cfb2fff0f431,2021-01-29T00:33:14.217000
|
||||
CVE-2021-22875,0,0,5972e538cca49d2dab14de25fc021bd84962446b27e9e851f91860a6be14e55a,2021-01-29T00:34:11.237000
|
||||
CVE-2021-22876,0,1,635332ad1f2e8c939d1336401f65b12220e00ac3b929f0fc7f45bbf076316cbe,2024-03-27T15:47:49.590000
|
||||
CVE-2021-22876,0,0,635332ad1f2e8c939d1336401f65b12220e00ac3b929f0fc7f45bbf076316cbe,2024-03-27T15:47:49.590000
|
||||
CVE-2021-22877,0,0,d00f745ea4e6955be0d21c2b3581cc251c5387efdc342004d5fd1b051a534600,2023-11-07T03:30:27.240000
|
||||
CVE-2021-22878,0,0,a397005e6377fa8af698364fc7863f02965632978142467d10d498bfb5ec781b,2023-11-07T03:30:27.327000
|
||||
CVE-2021-22879,0,0,20824c00df9bf493afe91eb2a7b2a5f67eedca0b2dbccbe3e6d4b48552ed7023,2023-11-07T03:30:27.393000
|
||||
@ -168960,19 +168960,19 @@ CVE-2021-22887,0,0,b2fa7c63bdd19b54dc86ebdd10536c3f921ebb88d0726027644261e221041
|
||||
CVE-2021-22888,0,0,ddf077ad7028415ff9feadf75a6d2804bf094969bc5cd0965f8f5541a1a59d72,2021-03-27T02:44:16.250000
|
||||
CVE-2021-22889,0,0,86cd09cb795d6cf361c193c51bdba63af652cf09deac6863d564318021b9f94a,2021-03-27T02:46:12.017000
|
||||
CVE-2021-2289,0,0,a94497e362293b07d63c1e24b9ab43d924b97fff21751187f0d37f432ecc4f17,2021-04-29T20:48:33.577000
|
||||
CVE-2021-22890,0,1,6e90c8900d2275195296c2294321949788f61b3ba7e5b3a3553ee48037ff4897,2024-03-27T15:47:45.160000
|
||||
CVE-2021-22890,0,0,6e90c8900d2275195296c2294321949788f61b3ba7e5b3a3553ee48037ff4897,2024-03-27T15:47:45.160000
|
||||
CVE-2021-22891,0,0,62e457c672d7ef03c1a6c6a6be7d4775111c15248290645768bc2e5d4d8037bf,2021-08-12T20:50:40.970000
|
||||
CVE-2021-22892,0,0,cc16542affc64667468e45e7977166f203b89e17820ccc51cb3935248d38e4cb,2022-08-30T19:10:08.513000
|
||||
CVE-2021-22893,0,0,7ab02627a0e7b95efe96113aa2edf5623e1aa9b80d3d385fbff5c67735077340,2024-02-27T21:04:17.560000
|
||||
CVE-2021-22894,0,0,c9c58e1159876c6444311b72946002e4e5756fa16778959f63470df8d4f32431,2024-02-27T21:04:17.560000
|
||||
CVE-2021-22895,0,0,964c1af433e584d2cc6bc559959c01008e727d05833d888f72e1b680dca9164a,2021-12-02T21:19:58.540000
|
||||
CVE-2021-22896,0,0,93eac2f06ca1a31d34040275095383a0dc24b2782b510f11050b1bce250d645e,2021-06-22T01:03:15.073000
|
||||
CVE-2021-22897,0,1,8feb0e04bd9da8a3ba4a00d9981917dd470faaa8c0c8dea7518428c4a2a2ce49,2024-03-27T15:47:40.347000
|
||||
CVE-2021-22898,0,1,cb7aed26a2f0c6d972f5db58a0bf991ac14a9ade5c2e96dd169dd9a05a486826,2024-03-27T15:47:36.380000
|
||||
CVE-2021-22897,0,0,8feb0e04bd9da8a3ba4a00d9981917dd470faaa8c0c8dea7518428c4a2a2ce49,2024-03-27T15:47:40.347000
|
||||
CVE-2021-22898,0,0,cb7aed26a2f0c6d972f5db58a0bf991ac14a9ade5c2e96dd169dd9a05a486826,2024-03-27T15:47:36.380000
|
||||
CVE-2021-22899,0,0,7ccc1d6227bdfe11f58d4901d8af453098ec0e9ba60386fc44c5d290e6849d99,2024-02-27T21:04:17.560000
|
||||
CVE-2021-2290,0,0,e161d5970dbe21534ca8a58bed4dd6c1987c83e10878bb74e78478ffbc0f0ee0,2021-04-29T20:47:58.447000
|
||||
CVE-2021-22900,0,0,11a74ac18596a70d6c0516ae29fd70e796dabfbb34e2f92013099e700819c483,2024-02-27T21:04:17.560000
|
||||
CVE-2021-22901,0,1,2a1a7208fc9121c18a2c89b2042f15bd19d95e85ecb19178162498c4e0a4deac,2024-03-27T15:12:59.917000
|
||||
CVE-2021-22901,0,0,2a1a7208fc9121c18a2c89b2042f15bd19d95e85ecb19178162498c4e0a4deac,2024-03-27T15:12:59.917000
|
||||
CVE-2021-22902,0,0,a4a2f38d3c797c9517b7f337fa2d0e3e5b8d86adecf091a3702d7a01df0e157e,2021-08-18T19:13:08.357000
|
||||
CVE-2021-22903,0,0,d99c63747b80c7b228edad210ca49963f2a6a5d584bb06dc2d26f5bd0882cc38,2021-10-21T14:32:48.653000
|
||||
CVE-2021-22904,0,0,c7c7adf8c040783b0936d1c950d3c44f5a571a588ff5dd5f6c9de0c39943e2a1,2021-09-20T13:51:48.960000
|
||||
@ -168995,11 +168995,11 @@ CVE-2021-22919,0,0,5b87ea27363e05614e4a5485baeac7da5070817fc270c91e352c520206170
|
||||
CVE-2021-2292,0,0,aae95cf3c4655101628b7554f035b288cc5af5918aa24130f926447a2ca1222e,2021-04-29T20:47:34.503000
|
||||
CVE-2021-22920,0,0,60e418487b730f0bed1da720516f9512142293b89ddf82fee7fc1b233d082f08,2021-08-13T14:26:49.893000
|
||||
CVE-2021-22921,0,0,feb4fb83ce2bf5e935c6de933544186d50f0116ae15db7d20909d87724c99312,2022-04-06T14:30:09.710000
|
||||
CVE-2021-22922,0,1,2a6d6c53ceaa934818277b479285d90cbbc0a427dd59031c3bfba28a777b402b,2024-03-27T15:12:55.770000
|
||||
CVE-2021-22923,0,1,a82050eb038ef4e5284a2e0a6f950b794e78571ece5049ff8d206611a1b4e322,2024-03-27T15:11:51.407000
|
||||
CVE-2021-22924,0,1,72ff22a33290cc49cb2f521b2873a9b2f36f6b6688a5fea8c78dfcdea7bc8bfc,2024-03-27T15:11:45.923000
|
||||
CVE-2021-22925,0,1,10ffe09200017c9648adf7fa5be8f1caacf63435ae34ee4b2a1f93c7622d0586,2024-03-27T15:11:42.063000
|
||||
CVE-2021-22926,0,1,3efc635fa0235e65a9c189d16b56eea42ebb077237b16dedab9ddeabbf64bf9e,2024-03-27T15:11:38.047000
|
||||
CVE-2021-22922,0,0,2a6d6c53ceaa934818277b479285d90cbbc0a427dd59031c3bfba28a777b402b,2024-03-27T15:12:55.770000
|
||||
CVE-2021-22923,0,0,a82050eb038ef4e5284a2e0a6f950b794e78571ece5049ff8d206611a1b4e322,2024-03-27T15:11:51.407000
|
||||
CVE-2021-22924,0,0,72ff22a33290cc49cb2f521b2873a9b2f36f6b6688a5fea8c78dfcdea7bc8bfc,2024-03-27T15:11:45.923000
|
||||
CVE-2021-22925,0,0,10ffe09200017c9648adf7fa5be8f1caacf63435ae34ee4b2a1f93c7622d0586,2024-03-27T15:11:42.063000
|
||||
CVE-2021-22926,0,0,3efc635fa0235e65a9c189d16b56eea42ebb077237b16dedab9ddeabbf64bf9e,2024-03-27T15:11:38.047000
|
||||
CVE-2021-22927,0,0,1b8462bd45eb1b8bbb2dd622741a6b441c80899ff24289230174628fdcea5934,2021-08-16T20:14:39.867000
|
||||
CVE-2021-22928,0,0,eb0dcc242a46f18d3ecc4eb85eb326e9e33689232040f26456b27ab9e35bd837,2022-07-12T17:42:04.277000
|
||||
CVE-2021-22929,0,0,774cbc1647fc8fb32f6b2128bf970d90f5e640dadbb29ee069cbab5e2f5fb8bd,2021-09-10T14:11:28.307000
|
||||
@ -169020,9 +169020,9 @@ CVE-2021-22941,0,0,790f39177cb178344fc54a0bbb6992e1c74aac7fe2479d9a5090505eb5132
|
||||
CVE-2021-22942,0,0,1da3830a53259463f709f5ba4027ae9b3637d47628a0ea6018e6187c6cd82118,2024-02-02T14:15:53.073000
|
||||
CVE-2021-22943,0,0,a779577368528cbca69c94f741434f52bbd682ef6911362b85b82b3036804a5a,2021-09-09T00:23:55.950000
|
||||
CVE-2021-22944,0,0,eb9ced6a11b6750716f46ac3d98436723d8a1f88ede10032cc3bac0ddb1abd25,2022-07-12T17:42:04.277000
|
||||
CVE-2021-22945,0,1,c8b9b5f36257cd0029eca06a8c67ddac907a5238990f8a30330780d98bf902f2,2024-03-27T15:04:30.460000
|
||||
CVE-2021-22946,0,1,34c4886fd3ded8a81159779bf38e5eec423d3337f732456a04ae6127d219ee2b,2024-03-27T15:12:52.090000
|
||||
CVE-2021-22947,0,1,1f0d215e655ba698cf8c5924566d829a44a9033863a6cf777d890396311f0a45,2024-03-27T15:03:30.377000
|
||||
CVE-2021-22945,0,0,c8b9b5f36257cd0029eca06a8c67ddac907a5238990f8a30330780d98bf902f2,2024-03-27T15:04:30.460000
|
||||
CVE-2021-22946,0,0,34c4886fd3ded8a81159779bf38e5eec423d3337f732456a04ae6127d219ee2b,2024-03-27T15:12:52.090000
|
||||
CVE-2021-22947,0,0,1f0d215e655ba698cf8c5924566d829a44a9033863a6cf777d890396311f0a45,2024-03-27T15:03:30.377000
|
||||
CVE-2021-22948,0,0,3ae29b064ef956ec50546dd688fd9027239438584162735a1f0be84abdde7a16,2023-06-30T17:50:34.397000
|
||||
CVE-2021-22949,0,0,726df53d67307bd416ab1f5c561fc0aac2ca19398b535bd9686e823a2044b612,2021-10-19T16:47:45.690000
|
||||
CVE-2021-2295,0,0,02b76f640c5b0c546264dd7fe3019280895cc3f4c3d3c1ab1754e973bcd9757d,2021-04-29T20:46:25.240000
|
||||
@ -175457,7 +175457,7 @@ CVE-2021-31558,0,0,d6b7eca8b3661e1164cde3cafef1c266e2f8472859f6d02c98f0ee8c033dc
|
||||
CVE-2021-31559,0,0,960ef105b3161c8de185bc6fc58d26fca8236596b08b91f433c81abecf743c41,2022-10-25T16:42:38.307000
|
||||
CVE-2021-3156,0,0,f7e7c8ef1b0e324cf2ea0191a3cda9d24a63ed0693294ca151795598dc60b3ad,2024-02-04T09:15:08.010000
|
||||
CVE-2021-31562,0,0,797d186a32fce9d0031f33fb21467dc046abc2641f41f3a4eb668dae3bcade3e,2022-01-28T15:55:53.923000
|
||||
CVE-2021-31566,0,1,9f6729ca0b8caaeddd1206b928ad0457539959c073118fdcfd964b35f3aa80df,2024-03-27T16:04:30.260000
|
||||
CVE-2021-31566,0,0,9f6729ca0b8caaeddd1206b928ad0457539959c073118fdcfd964b35f3aa80df,2024-03-27T16:04:30.260000
|
||||
CVE-2021-31567,0,0,bca43f0db30fc722ddd2e9bd8fed1b110a7669196d896ae913f81e804a6662ff,2022-02-03T17:09:44.553000
|
||||
CVE-2021-31571,0,0,ac310b71da451791809abe07817b13f801603fe521103d861c539df6dddb4324,2021-06-02T18:34:27.147000
|
||||
CVE-2021-31572,0,0,4a0d1e85208db2b4aa6a27ae410c9ffbc5b5d32694228ebc0356df3d4f0ad164,2021-06-02T18:33:41.203000
|
||||
@ -178183,7 +178183,7 @@ CVE-2021-35196,0,0,3c93f00a18e99aace340d6044644723c83a7fc554c345131bd8f0eac840a8
|
||||
CVE-2021-35197,0,0,2ff79030327337ae3dee0c61c9baeb32fff891d83c78c592ce6d47974492f2a4,2023-11-07T03:36:30.150000
|
||||
CVE-2021-35198,0,0,e96990d62672cf02fa4cbfbf2e31fc75388b38d1e046810266a814dca0823507,2021-10-04T17:33:36.207000
|
||||
CVE-2021-35199,0,0,9f062618d9a6cdf8c10bd83760fab290dac75318dde871525dfe843905fa91aa,2021-10-04T17:34:23.810000
|
||||
CVE-2021-3520,0,1,60daddfb9f0bfc98507b64ef9c2c09b3106e89016024f6e140545c37e7343e5b,2024-03-27T16:12:07.343000
|
||||
CVE-2021-3520,0,0,60daddfb9f0bfc98507b64ef9c2c09b3106e89016024f6e140545c37e7343e5b,2024-03-27T16:12:07.343000
|
||||
CVE-2021-35200,0,0,aac4a0c49e39317db7297384a39c931b1b31e44af9c47b1b42addc5f5a769c5a,2021-10-04T17:34:51.317000
|
||||
CVE-2021-35201,0,0,c0e0431448d3ba12a3d72455869761436f021a172ba4e64a31d8fe9f90cdbb0e,2021-10-04T17:39:16.717000
|
||||
CVE-2021-35202,0,0,db5717bdc407832303592e1688309f0a7efc338fdecfe7ebb2ba8778dd1dc3a5,2022-07-12T17:42:04.277000
|
||||
@ -179322,7 +179322,7 @@ CVE-2021-36972,0,0,7f5d343ad41aad3817fa2bedd0395a3df6e9fecf214880f976d53a911b896
|
||||
CVE-2021-36973,0,0,ac2dc242541a2ee5ba49d79bf57e002c1a9b668a1f03222716899ff14ef45ffe,2023-12-28T20:15:57.900000
|
||||
CVE-2021-36974,0,0,c30cf6d5afa3e9f7a6e032f7b5f5299dda13609f19eee733b117b26d25d84367,2023-12-28T20:15:58.080000
|
||||
CVE-2021-36975,0,0,ce220aa95f2c890a8d4ff736efe2d9dfc0ea623ac7903ab52c4780e62b63d8a4,2023-12-28T20:15:58.270000
|
||||
CVE-2021-36976,0,1,11edc2c9d5ff54dd12fe221d4b1b2e9240999e37529e96d126a0df71db91805c,2024-03-27T16:04:33.757000
|
||||
CVE-2021-36976,0,0,11edc2c9d5ff54dd12fe221d4b1b2e9240999e37529e96d126a0df71db91805c,2024-03-27T16:04:33.757000
|
||||
CVE-2021-36977,0,0,7ecd05ff14517c69b8531d9df96b8b2d27de568c1702c608fa6bb1a478b2e3fb,2022-04-29T15:06:24.723000
|
||||
CVE-2021-36978,0,0,c092dc339b5081975b530efaad454d5fce3a66a1b72c84e10cddb2024985c236,2024-01-15T14:15:24.063000
|
||||
CVE-2021-36979,0,0,73adb542e1879400d086ac81162f560768e693d2fe0591e07a9d4d8e8ed4e8f9,2023-11-07T03:36:53.250000
|
||||
@ -191242,7 +191242,7 @@ CVE-2022-2257,0,0,dad20c73a2c2f0d659cc80938da21afb7f70013cf16b8dcc2003499bc089cc
|
||||
CVE-2022-22570,0,0,705979cc0a814572a0cd5c9e0662feac9cb14f55a7c65f73308c1223d21dd60a,2022-04-09T02:19:58.207000
|
||||
CVE-2022-22571,0,0,8cf67737c2cf76f5e72d366fed0fdef4b956f75d8f90492ab3949699e0044275,2022-04-15T13:59:11.807000
|
||||
CVE-2022-22572,0,0,6c69b74689b3da56cc5cd4ac07a6d48f8516d77a0d623ae20b558e21731dadf1,2022-04-18T16:48:20.967000
|
||||
CVE-2022-22576,0,1,5c200c3d4493404e43d751132cb6faac3af6609098c75a1fdfc162eb0900192c,2024-03-27T15:02:35.557000
|
||||
CVE-2022-22576,0,0,5c200c3d4493404e43d751132cb6faac3af6609098c75a1fdfc162eb0900192c,2024-03-27T15:02:35.557000
|
||||
CVE-2022-22577,0,0,2c7e6e442f1a2def91b5d39b63b26dbccbdeed76757f7c584ef306f58ed0c62d,2023-03-14T08:15:12.540000
|
||||
CVE-2022-22578,0,0,73b80115f4455669055d8343359cec891f19e3b0a3a3e4b5856a6807563a33ed,2022-03-28T16:44:22.473000
|
||||
CVE-2022-22579,0,0,d5ee72c4fe4d45872a66d282d7714d780c37d05ff42ee4a479e5f47abbb3fe46,2022-03-28T15:44:07.387000
|
||||
@ -195565,16 +195565,16 @@ CVE-2022-2776,0,0,91f9249f9762db987391c6f5fe8c27628dcd0a98ebf2a2f0d87620befd7093
|
||||
CVE-2022-2777,0,0,0391d02bd79913feea13c05d4ceee16b4c5d33425d0fc7c99ff2b86956b2f6f8,2022-08-15T18:47:59.257000
|
||||
CVE-2022-27772,0,0,19b630a50a6d4660f9e5f590ec103d80f3271aeaab0f1e28ab8117ec2c7a0a03,2024-03-21T02:42:31.680000
|
||||
CVE-2022-27773,0,0,091201079ac7882e9e194f3c9d8d1a4a6a54d2b5882895d61e7c68603566a544,2022-12-07T17:36:07.027000
|
||||
CVE-2022-27774,0,1,fb1147cbe33ccdcdad1fb4a673f329c1884c101fd45f17d9a031914a02dfdc32,2024-03-27T15:02:31.430000
|
||||
CVE-2022-27775,0,1,c1eadfce756295b3b6b28dd1721c814b989b792c83033617f3aa9ef1deada2c6,2024-03-27T15:02:27.427000
|
||||
CVE-2022-27776,0,1,f9d3880f8bd8996b45317c60d3f8b57e3dfa597ee089dd4449a011d1943a6eeb,2024-03-27T15:02:23.683000
|
||||
CVE-2022-27774,0,0,fb1147cbe33ccdcdad1fb4a673f329c1884c101fd45f17d9a031914a02dfdc32,2024-03-27T15:02:31.430000
|
||||
CVE-2022-27775,0,0,c1eadfce756295b3b6b28dd1721c814b989b792c83033617f3aa9ef1deada2c6,2024-03-27T15:02:27.427000
|
||||
CVE-2022-27776,0,0,f9d3880f8bd8996b45317c60d3f8b57e3dfa597ee089dd4449a011d1943a6eeb,2024-03-27T15:02:23.683000
|
||||
CVE-2022-27777,0,0,e53f0de9a226215bf6b68db8cc4fda72582d13893879270665b18291e9910ee7,2023-03-14T08:15:12.993000
|
||||
CVE-2022-27778,0,1,e68aa53c00ebd71e950de2e2de15f4dc3314d61497fb345b9ac5f9ffc19ac244,2024-03-27T15:02:14.720000
|
||||
CVE-2022-27779,0,1,624ab60dd56fc169eac4aa37ff3f5a59306663a86baea40df643b824b133432f,2024-03-27T15:02:07.080000
|
||||
CVE-2022-27778,0,0,e68aa53c00ebd71e950de2e2de15f4dc3314d61497fb345b9ac5f9ffc19ac244,2024-03-27T15:02:14.720000
|
||||
CVE-2022-27779,0,0,624ab60dd56fc169eac4aa37ff3f5a59306663a86baea40df643b824b133432f,2024-03-27T15:02:07.080000
|
||||
CVE-2022-2778,0,0,06de8b398c09429f19f0c3e3fe7de194f9df7821d3cffcbef711cd3616feb4da,2022-10-04T18:20:12.593000
|
||||
CVE-2022-27780,0,1,8a859689331e44c2f2d4915c7a406179db2ece5d9d9950ebd78fa4c7a131b090,2024-03-27T15:01:58.407000
|
||||
CVE-2022-27781,0,1,c3f7e062814594e95161cf77a64c2c1cf1b81ab8d54714f16da8ef5d4332164b,2024-03-27T15:01:53.060000
|
||||
CVE-2022-27782,0,1,8a58a7225be5f4a0725a4b892831f4fdea6cb48003542f266c6a715e2a18f87a,2024-03-27T15:01:49.180000
|
||||
CVE-2022-27780,0,0,8a859689331e44c2f2d4915c7a406179db2ece5d9d9950ebd78fa4c7a131b090,2024-03-27T15:01:58.407000
|
||||
CVE-2022-27781,0,0,c3f7e062814594e95161cf77a64c2c1cf1b81ab8d54714f16da8ef5d4332164b,2024-03-27T15:01:53.060000
|
||||
CVE-2022-27782,0,0,8a58a7225be5f4a0725a4b892831f4fdea6cb48003542f266c6a715e2a18f87a,2024-03-27T15:01:49.180000
|
||||
CVE-2022-27783,0,0,19dc1467106cf4d13c4cbca7b4d3d753aca29f021174cae3299962a01c8e40e4,2022-05-13T17:29:38.363000
|
||||
CVE-2022-27784,0,0,b7f32c2a04336f6a7e6280db469db0b1c9e818e53867bee1bbb46d1260bc8172,2023-01-24T15:40:03.220000
|
||||
CVE-2022-27785,0,0,815f6325247a3206bba95ff03c9af5bbe8be4931c2ab1a0696317b6c44469ad8,2023-11-07T03:45:23.953000
|
||||
@ -197511,7 +197511,7 @@ CVE-2022-30110,0,0,e9dd44f77ad831587ec4e39383c77b19970dfa79ea2836269377ed5e66ff8
|
||||
CVE-2022-30111,0,0,fd7ce5e1f36c9b6c8f614d5a82d13d60a0686a1b619f0786a8ee5c19809658f8,2022-05-26T16:24:35.227000
|
||||
CVE-2022-30113,0,0,db69ed943e1ef593f870b319436186438ef07a7d5150cabaae529fed6b3aa1a5,2022-07-20T14:03:39.717000
|
||||
CVE-2022-30114,0,0,42dd9ab35652e5702b947020cdff9115df4b404dbdaa5bb380da18fec15c5fe1,2023-09-21T22:15:09.740000
|
||||
CVE-2022-30115,0,1,092abca7773c8fc2c2cd84485613813b066cf454c73fa0db7b767c462abb36b3,2024-03-27T15:01:44.073000
|
||||
CVE-2022-30115,0,0,092abca7773c8fc2c2cd84485613813b066cf454c73fa0db7b767c462abb36b3,2024-03-27T15:01:44.073000
|
||||
CVE-2022-30117,0,0,33574de4664a2d386ce6045e061b1c748627576714c0165735a81caafad848ba,2022-07-05T18:05:54.507000
|
||||
CVE-2022-30118,0,0,213c2c2d84fe4379961dc11aa96d4e79201e7d1f9ec84b813d01a5493181bf54,2022-07-05T18:39:18.303000
|
||||
CVE-2022-30119,0,0,985ddc925894e6d93e1f83c0fa1b896227b46d2592b676030321ee11299fd8f4,2022-07-05T19:40:24.917000
|
||||
@ -199223,10 +199223,10 @@ CVE-2022-3220,0,0,631146846ce39a437d1ca5e831536fa4c835a6a44e107e799c6ab41eb6a3c0
|
||||
CVE-2022-32200,0,0,6a1e2ddcf6e11f75fddf89de9541431f41a9d459d4394ba83c378609e2b29803,2022-06-10T16:16:20.087000
|
||||
CVE-2022-32201,0,0,41e373400f3c5eb580922a9928f9240aff7ff160b5a59f6c054ca3d376e10daa,2022-06-10T16:18:35.690000
|
||||
CVE-2022-32202,0,0,d2e75bbd3c8ec7203fccfd537614f1837041af7a919f7f66ebd547b99b110d7b,2022-06-10T16:14:28.477000
|
||||
CVE-2022-32205,0,1,36d1f2c768ab18fa849fbb0196dcbd7ce761b5a6fbd2c79fe2418061b4439eaa,2024-03-27T15:01:05.383000
|
||||
CVE-2022-32206,0,1,95a472387799ef8f8393056737e78a46cd10cd43c0b52fc2809d3f4b772ae161,2024-03-27T15:00:54.267000
|
||||
CVE-2022-32207,0,1,76c3acd367c4b491ab1b8915dc9b7162aef765744ab96e118dcc2dd8860b637e,2024-03-27T15:00:46.637000
|
||||
CVE-2022-32208,0,1,854a09574eede661d6fcd781930e4022272ea24f63f9749d49ae1fb23ef1b69c,2024-03-27T15:00:41.657000
|
||||
CVE-2022-32205,0,0,36d1f2c768ab18fa849fbb0196dcbd7ce761b5a6fbd2c79fe2418061b4439eaa,2024-03-27T15:01:05.383000
|
||||
CVE-2022-32206,0,0,95a472387799ef8f8393056737e78a46cd10cd43c0b52fc2809d3f4b772ae161,2024-03-27T15:00:54.267000
|
||||
CVE-2022-32207,0,0,76c3acd367c4b491ab1b8915dc9b7162aef765744ab96e118dcc2dd8860b637e,2024-03-27T15:00:46.637000
|
||||
CVE-2022-32208,0,0,854a09574eede661d6fcd781930e4022272ea24f63f9749d49ae1fb23ef1b69c,2024-03-27T15:00:41.657000
|
||||
CVE-2022-32209,0,0,fad525a81bc1b9ee0d0345f2c1b1b664f3e12e7a15389ea71ebb61bdde77f886,2024-02-01T16:22:15.683000
|
||||
CVE-2022-3221,0,0,275d674547ffc29400f67559d3c8664d4bccd2f7c7c5cc0914b161b5d13d38e0,2022-09-18T01:29:18.213000
|
||||
CVE-2022-32210,0,0,9e0166b5a9c2173e071ae40a153be840b224b053a9221f7e9315a8d7bbb82718,2022-07-25T18:29:47.667000
|
||||
@ -199240,7 +199240,7 @@ CVE-2022-32218,0,0,0fac3e82cd2a8928892ed0557823b129d2ed0d18d92f79b5ccb401e684104
|
||||
CVE-2022-32219,0,0,ce0f6a2e7c8b2c1b75c33893a6089ec39040bca0900f6cfc8f7468907726a4ea,2022-09-27T14:06:46.800000
|
||||
CVE-2022-3222,0,0,212ba91fe1f852e9243096a789e5d2a1894879240e2e011179953511ea237565,2023-05-27T04:15:22.017000
|
||||
CVE-2022-32220,0,0,fd8431710aa17c0431d6dc891fe66b12ab5a39b6ac62c0ef31b0405c6cadc85a,2023-07-21T19:26:19.830000
|
||||
CVE-2022-32221,0,1,e0b9b99050dd15f817721346f60019d6b3ed4fd3a3a72fb36e3efae0a0f3af70,2024-03-27T15:00:28.423000
|
||||
CVE-2022-32221,0,0,e0b9b99050dd15f817721346f60019d6b3ed4fd3a3a72fb36e3efae0a0f3af70,2024-03-27T15:00:28.423000
|
||||
CVE-2022-32222,0,0,f6863d565197651f10e273293713647cea3e9589a5b34582984bacb0a3cf6013,2023-07-24T13:16:33.287000
|
||||
CVE-2022-32223,0,0,13371c7607369d44516921cc35bd568a13425936d43496b18a3ac8eaa07dc9b3,2022-10-28T18:29:55.297000
|
||||
CVE-2022-32224,0,0,c7e760846594e69e5ff3ec467a23094bdb9b067f54b82e4a845627fa9168b70a,2022-12-08T13:20:13.287000
|
||||
@ -201600,7 +201600,7 @@ CVE-2022-35249,0,0,4c6921f429d6bd1a292af5d1fd6f601f8709ef83cb0a62c1ab6499da12b96
|
||||
CVE-2022-3525,0,0,75561123723350358039f471247ec09372fff2a78b9c6e04483a8d98e0d06f04,2022-11-21T12:48:31.207000
|
||||
CVE-2022-35250,0,0,ec6109697f611365321a4135191e4ed4202eed0d67e5c4f88ed90ffaa0669a21,2022-09-27T14:01:56.857000
|
||||
CVE-2022-35251,0,0,8392cf117d9d355d6a9a22038422f8a6df683652ea7eff129e05eaeeeb56ba05,2022-09-26T18:57:30.417000
|
||||
CVE-2022-35252,0,1,a7acc1b310ed6164ff3b8361257c78a9d599d2a4812dc9bcba522c8334435bba,2024-03-27T15:00:36.607000
|
||||
CVE-2022-35252,0,0,a7acc1b310ed6164ff3b8361257c78a9d599d2a4812dc9bcba522c8334435bba,2024-03-27T15:00:36.607000
|
||||
CVE-2022-35253,0,0,e053b5a59154fa71549362ff1254aad5a17d795d5d576559056d101db6f096fc,2023-11-07T03:48:50.267000
|
||||
CVE-2022-35254,0,0,398e3c9e1641afa6350efff5fbea64706007f5b21fbfbd16f261842e0115b8da,2024-02-27T21:04:17.560000
|
||||
CVE-2022-35255,0,0,be61bc588357a04ca4532960eb00f68d2f25632d0ec56bd426356558ea4f8d18,2023-03-01T15:03:19.287000
|
||||
@ -201609,7 +201609,7 @@ CVE-2022-35257,0,0,2a29302a18d6bb048d135c2ed4575264b665bbe6abafe303c171598d03d9b
|
||||
CVE-2022-35258,0,0,db1b3249eaf132ed21cc153b92c2cd2eca5eb4b8c299e1af4a8e695fee0855ea,2024-02-27T21:04:17.560000
|
||||
CVE-2022-35259,0,0,1aeb15137064e3f4d1c3900c7f24a5d8ef5a4046b9b810c15cbf5e6650f837e5,2022-12-07T04:29:38.620000
|
||||
CVE-2022-3526,0,0,3ae96b98b67bb903279f9c95bb1f9d03c7340492162b12b023b5135599e06054,2023-11-07T03:51:22.083000
|
||||
CVE-2022-35260,0,1,ff918b3aed204b27a237bc271679ce911a0dd0f3e7eca4a401fc793d0896dfc1,2024-03-27T15:00:15.383000
|
||||
CVE-2022-35260,0,0,ff918b3aed204b27a237bc271679ce911a0dd0f3e7eca4a401fc793d0896dfc1,2024-03-27T15:00:15.383000
|
||||
CVE-2022-35261,0,0,e0a49de2aec7a5126bc065964afe0c6bc397cb86d75f0bd1921899e3409eb5e5,2023-04-26T19:17:33.857000
|
||||
CVE-2022-35262,0,0,67f31eae660ebbd628db1eead9eb4d1b767416d9a5115c5a9a1a5d8204ad06f6,2023-04-26T19:17:00.687000
|
||||
CVE-2022-35263,0,0,e96ef86312f89649a1f690d12e1343c6e2cef7a4ed4da7c595838f66cd735a61,2023-04-26T19:16:39.727000
|
||||
@ -201991,7 +201991,7 @@ CVE-2022-35730,0,0,d02cd3657a6ab2fdea42f1d139c507e9826c68abf50607d3ee6cd7f9529b9
|
||||
CVE-2022-35733,0,0,be53f5556df3a76705715263635913f30607949039453cda94fa44233963b354,2022-08-26T13:17:34.277000
|
||||
CVE-2022-35734,0,0,1023c438f5e4873a54369b93f7352270fb7fabdee2d21379bef4c8dc0ab450f7,2023-11-07T03:49:23.210000
|
||||
CVE-2022-35735,0,0,d17a4faa9fef2a8ec7968a5529a09aaeff8a9967ff28ac502b61a21ddb15417e,2022-08-10T19:26:57.143000
|
||||
CVE-2022-35737,0,1,5fb8e472436ae3d6667c73253b8c2e3ede3cff2a5d90ad9492a780730605885e,2024-03-27T16:05:26.360000
|
||||
CVE-2022-35737,0,0,5fb8e472436ae3d6667c73253b8c2e3ede3cff2a5d90ad9492a780730605885e,2024-03-27T16:05:26.360000
|
||||
CVE-2022-35739,0,0,688371722965873cfecda0dbf2e1d7ac964f4a29df90cab90a3cdd5199f55d74,2022-10-28T19:51:12.957000
|
||||
CVE-2022-3574,0,0,57e7551b871b46986e50c49a9481f07f2809cd0dc446b380d9e58de2f73309ba,2022-11-16T19:11:47.043000
|
||||
CVE-2022-35740,0,0,d1f07cec4539d195c6d930975815af939c2ace905dcba7b78b91706e8e72a92a,2022-11-15T20:35:35.397000
|
||||
@ -202459,7 +202459,7 @@ CVE-2022-36223,0,0,af713d64429debb696a606282b4196e159af605ab60fe15071aea1c7fae2f
|
||||
CVE-2022-36224,0,0,08d6bff510d0faac0e761e55f7111fca66e5d819a4007bb48d89793fa3523f3e,2022-08-22T16:26:22.077000
|
||||
CVE-2022-36225,0,0,bf3e137c686147aedd0a2f5e33321fcdcae3edae04b22a0da940ed7849985afc,2022-08-22T19:54:34.733000
|
||||
CVE-2022-36226,0,0,c15fa20a54d9581f15906ddda250ac3c5e168091f424408ef65541c2fc414c40,2022-08-31T16:27:39.307000
|
||||
CVE-2022-36227,0,1,41b76a9f24783b77e5f4675ed89258c2e29bf45423afe65aad37115594bd00c4,2024-03-27T16:04:27.210000
|
||||
CVE-2022-36227,0,0,41b76a9f24783b77e5f4675ed89258c2e29bf45423afe65aad37115594bd00c4,2024-03-27T16:04:27.210000
|
||||
CVE-2022-36228,0,0,2a8c144fa323e882ce8512ba86c4d448ea3607b0656403e02263245fc2a00697,2023-10-12T18:37:26.680000
|
||||
CVE-2022-3623,0,0,c3cca1c9d7e5c93f94099fe1f079e9625cabe3c9de9d85375d161d414b59c8fc,2023-08-18T18:55:40.750000
|
||||
CVE-2022-36231,0,0,bd266977b014f49f864962d37e36d14dd80315d917f63a9aca2024dc7d7ffd9c,2023-03-03T19:28:14.753000
|
||||
@ -209554,7 +209554,7 @@ CVE-2022-45842,0,0,9f25540ae216de5e80164f6a8f1c3e751daed0b834ae44796a3ade59d0323
|
||||
CVE-2022-45843,0,0,5509ae3d19ef873f9b0c2e5074f3bcf43a244b9d1d9d19239688ff5032b78ca9,2023-11-07T03:54:53.320000
|
||||
CVE-2022-45845,0,0,7c7b5704ec58a7e6b0b65bc99493616aff55a25ad9837751371510d52188a7b5,2024-01-25T22:19:41.890000
|
||||
CVE-2022-45846,0,0,8180d177894fabd765bd35647192f753aa5e8efd68ae118429536372bad2940b,2023-05-16T19:17:03.097000
|
||||
CVE-2022-45847,0,1,45dcccfedd863be101e19a66ccb58ff88331ff85555bb783dbc7441772d6b236,2024-03-27T15:49:41.437000
|
||||
CVE-2022-45847,0,0,45dcccfedd863be101e19a66ccb58ff88331ff85555bb783dbc7441772d6b236,2024-03-27T15:49:41.437000
|
||||
CVE-2022-45848,0,0,fad62e623651689ae95e2fc4f689ac1b8448d31b314d8c49c68285751fad7661,2023-11-07T03:54:53.547000
|
||||
CVE-2022-45849,0,0,705787250de6f0b2626b38d25516ea3dba7bf004e02dd10b4c9840c8901ce7b4,2023-04-21T04:17:06.770000
|
||||
CVE-2022-4585,0,0,dfc84e49b205895cb267e11431be1f335d9b1de0cfd68ee1a905558e4e7037c6,2023-11-07T03:58:14.437000
|
||||
@ -212065,6 +212065,7 @@ CVE-2023-0578,0,0,c2cf10d09529bf342567ff561ff5fc5b2abe259e50445b77cdf258d0a115db
|
||||
CVE-2023-0579,0,0,504b4338f864e933aa44e888a09084f9d604fd2edb1bc93c969428fcc9526d01,2023-11-07T04:00:52.513000
|
||||
CVE-2023-0580,0,0,496b4aaf459be8082f40af9709a8d52cae4c41b641bd7ca2e1f477b04712ed00,2023-11-07T04:00:52.727000
|
||||
CVE-2023-0581,0,0,80d4f5ae1b34ea0255629d958cda2cdcf146f8044343eecb0200e915f691c351,2023-11-07T04:00:52.963000
|
||||
CVE-2023-0582,1,1,b3d8f7c84b265316b7e893995a48113564e6ef297a2eb81dadb43454ece92941,2024-03-27T18:15:08.237000
|
||||
CVE-2023-0583,0,0,ce927582782be4db333475ecc49caef43ac381b8ee355357a8ae6188916854c1,2023-11-07T04:00:53.253000
|
||||
CVE-2023-0584,0,0,661ecf0e0e258efd0247b994949d777aeb58bd9b6fb3f10f25ebfe1d0595391a,2023-11-07T04:00:53.487000
|
||||
CVE-2023-0585,0,0,e90d02e3a14ec76a3f74d6f239a409836679ba4da0fdac7466ba614a8fa9d16d,2023-11-07T04:00:53.740000
|
||||
@ -224362,7 +224363,7 @@ CVE-2023-34013,0,0,500f8f8006bcf5c0893b8111c3bad0218a0838aa8f762361a0079a993f68b
|
||||
CVE-2023-34015,0,0,8d3ead4f06239d4e652b53ad320e486662a5f6043183f11384bd9be80285d7ee,2023-07-18T14:47:17.697000
|
||||
CVE-2023-34017,0,0,c870dbb656b8499b3cf2883461d680862292835cec64c41b6df87e8549c650aa,2023-07-31T18:00:08.770000
|
||||
CVE-2023-34018,0,0,8e3d0d9d918bf4729ce0fbb0a52f4bcea31d1b64524ed9bb7ad175834b2e3110,2023-12-06T00:34:10.727000
|
||||
CVE-2023-34020,0,1,6303b7365b6a78484b12527e5cee1750cfe83ba4c60e2b0cd3cee68978d12260,2024-03-27T15:49:41.437000
|
||||
CVE-2023-34020,0,0,6303b7365b6a78484b12527e5cee1750cfe83ba4c60e2b0cd3cee68978d12260,2024-03-27T15:49:41.437000
|
||||
CVE-2023-34021,0,0,3a3e2358a671ec1c445afbf616a746a1f517d1449b1bf5492bd59da42a46cff4,2023-06-28T07:24:29.103000
|
||||
CVE-2023-34022,0,0,17ce84d4577657f691cbf35839eb41895ae44b6198bae31ad30ea35e514fc1f2,2023-09-01T12:28:20.133000
|
||||
CVE-2023-34023,0,0,dda712b30f36d5187a63c35f5fe5aee61d09f88bac602b14d0474a131788a98a,2023-09-01T12:29:56.897000
|
||||
@ -227961,7 +227962,7 @@ CVE-2023-39303,0,0,d81a0865c899018b1bf357d592ab28d95ab5876f93fb600c5e62942433b06
|
||||
CVE-2023-39306,0,0,6fdea6e755ad3c897f08918d9c1d51ddc69d961346f27f39c6f47d3188ca876e,2024-03-27T12:29:30.307000
|
||||
CVE-2023-39307,0,0,7acef3cec93184c51474f9c31e2a1c837088af3bbc58f21a5e50dcf1d40254e9,2024-03-27T12:29:30.307000
|
||||
CVE-2023-39308,0,0,0a6368135905c51e4bfc8658e86115693ae2beb292d59faa84b5dcfe3424348f,2023-10-02T19:36:52.837000
|
||||
CVE-2023-39311,0,1,439e9e33a3292d2e437c686880384c336acf226575769e1b0c928b9e71ee51ff,2024-03-27T15:49:41.437000
|
||||
CVE-2023-39311,0,0,439e9e33a3292d2e437c686880384c336acf226575769e1b0c928b9e71ee51ff,2024-03-27T15:49:41.437000
|
||||
CVE-2023-39314,0,0,ea740e75552d6dc1c0cf1f6c4b3f96de5bf219ab1a6cac778aaf3dfb58fa2dc3,2023-08-15T00:14:54.643000
|
||||
CVE-2023-39316,0,0,bd233c030a147eb3f789ee38efc103e8bf004636997da3293bc77e895bbfe866,2024-01-11T18:05:52.470000
|
||||
CVE-2023-39317,0,0,326a3ff897e3724ba6821d5440b392c61a19aa276b4d83da4c1edff4078ddab6,2024-01-11T18:05:45.287000
|
||||
@ -231466,7 +231467,7 @@ CVE-2023-44995,0,0,2e692294cf4d62dc41e425947f979ee8c21d0e539d91dc7695b1ee7c8fc16
|
||||
CVE-2023-44996,0,0,8ad2f639c3253abbde238fd5a9cde75a13aa5bd5fd7ebe20480f9c9b35655ae0,2023-10-14T01:49:41.830000
|
||||
CVE-2023-44997,0,0,81ee87730db4999076f9ba13b533f7ee822bfab430b5bd9758fdc4dc99b355f8,2023-10-16T19:04:19.087000
|
||||
CVE-2023-44998,0,0,6cc3050d478119a51a717478faad92a6fd89b774c0150f63b5670fdc0d17544a,2023-10-17T18:19:41.770000
|
||||
CVE-2023-44999,0,1,084ce61dccbe80f3a147cccc676be8764a18056ded4deb616c3d87e37d87862a,2024-03-27T15:49:41.437000
|
||||
CVE-2023-44999,0,0,084ce61dccbe80f3a147cccc676be8764a18056ded4deb616c3d87e37d87862a,2024-03-27T15:49:41.437000
|
||||
CVE-2023-4500,0,0,1706dc981901fc97569eb9643727c2c6db6e12a4486c14d5471830d688bfe4cc,2023-11-07T04:22:40.307000
|
||||
CVE-2023-45001,0,0,7ae6d2a6a50d43f250007cb67a905b12b402783a75b5f34158cdfb57c3adcb31,2023-11-10T04:18:01.923000
|
||||
CVE-2023-45003,0,0,e4a647054cefc57f163934c624babd072f49088fb353601c09d173ca854ba7b2,2023-10-20T18:08:51.807000
|
||||
@ -235294,7 +235295,7 @@ CVE-2023-50951,0,0,ac9a2ba6b69cc6219b314f88f75f8d16d80977a7838c8861bc4cc4a5a90b3
|
||||
CVE-2023-50955,0,0,2dac25424bb634048955c93e845cd595a5737c34f7a73119031e8a018fd0e20a,2024-02-22T19:07:27.197000
|
||||
CVE-2023-50957,0,0,a38d290def706a6975d8b2902c3d1f58a6074172158e1685b40a6a512f9caf13,2024-02-15T04:37:53.297000
|
||||
CVE-2023-5096,0,0,1b0896fcd5a16a2bfc5ce288684748ddee835572b804e4af539b42517b79d371,2023-11-27T22:10:14.173000
|
||||
CVE-2023-50961,0,1,a9d9b75e02dfcfb3f65c9ff56b43527d188f145358242dce35d298fb3c8bb736,2024-03-27T15:49:51.300000
|
||||
CVE-2023-50961,0,0,a9d9b75e02dfcfb3f65c9ff56b43527d188f145358242dce35d298fb3c8bb736,2024-03-27T15:49:51.300000
|
||||
CVE-2023-50962,0,0,365daa63183eee3bc8e35da897e2163d0fc458ef66adb39b8eb249f4c8a968ff,2024-02-12T14:31:36.920000
|
||||
CVE-2023-50963,0,0,f8ab53d3916fdeb747721dbad810b91a4d8cca1f3447b9dedd0b7a0a236caf08,2024-01-24T21:22:22.293000
|
||||
CVE-2023-50965,0,0,7d1de52a11bce456c4c16ef773b97b5e53898c75617739b3525f486b2a63242b,2023-12-20T20:02:23.497000
|
||||
@ -235763,7 +235764,7 @@ CVE-2023-51886,0,0,57376d86734d9125cdefeefb78630aac114d6de1902e63e7e68f3a3c286da
|
||||
CVE-2023-51887,0,0,5ef2b724fc508a46d98e2525360ceec49832ad8963da68755a3ed1e998657e14,2024-02-05T17:29:49.697000
|
||||
CVE-2023-51888,0,0,0c26c76fa0194a6bf43f7b0d37b92c45dfae056622dc0b83d9eb4f0ea5ca00ab,2024-02-05T14:11:51.323000
|
||||
CVE-2023-51889,0,0,8818124c066a6fc089f0ca349b82501811306f8e10b0be4d7c4755f36976d478,2024-02-05T14:10:48.287000
|
||||
CVE-2023-5189,0,0,c147a09eb43ab25371513a32cca88515adb22676507348ad033296b8f2641894,2023-12-13T10:15:10.110000
|
||||
CVE-2023-5189,0,1,dd34534e185942a0e90badb41c5e213b21a944d47974c8c87a51609f819a599b,2024-03-27T18:15:08.710000
|
||||
CVE-2023-51890,0,0,781340432dbcfdc8e5dd47cf218a3ee83bd6eb1e3c9d4e385b3f27a1d7a54d20,2024-02-05T13:57:15.610000
|
||||
CVE-2023-51892,0,0,83e77db8e71e0f4c493aeecdca7dc8524049c5ad059bc3e1dc3f8c0291c22774,2024-01-26T17:12:58.500000
|
||||
CVE-2023-5190,0,0,4e5acd0b306f781670b3a54b1d1143953c2740e2d360008f138cc2e5de5de17a,2024-02-20T19:50:53.960000
|
||||
@ -237065,7 +237066,7 @@ CVE-2023-6149,0,0,43627cf55c1dbb5c825fba826743af0296f49d6a8c24065c1a631c49138b39
|
||||
CVE-2023-6150,0,0,1ea907d678f48f22ce30b6bad5c8da7daf76b35ef23c59476e04071a5892fe2e,2023-12-05T07:15:10.570000
|
||||
CVE-2023-6151,0,0,7559e2f33b50293cab689a38634ef34d917b527790c29a35f6155f6feef60ac3,2023-12-05T07:15:11.207000
|
||||
CVE-2023-6152,0,0,650857fc8203f2c7b3ce096d7962f1ec279cbc9f5ea52dff75397db33e06f18d,2024-02-14T13:59:35.580000
|
||||
CVE-2023-6153,0,1,5029d75c8c42e6df7abb880dd03acef9a43af5e3dd820aafdebb873d4b25b2d7,2024-03-27T15:49:51.300000
|
||||
CVE-2023-6153,0,0,5029d75c8c42e6df7abb880dd03acef9a43af5e3dd820aafdebb873d4b25b2d7,2024-03-27T15:49:51.300000
|
||||
CVE-2023-6155,0,0,3ade3aecef51d941d8061f8d0b14aa2df7731495ef3e1609ad30477044f4d6ff,2024-01-02T20:16:59.773000
|
||||
CVE-2023-6156,0,0,d7561fff0656f62c31cf7fed3e16d348c47083d2199659e3634f7ff4096281e1,2023-11-30T21:08:21.483000
|
||||
CVE-2023-6157,0,0,19feaf86781e5b84fd59f4c0155ffcd6eb44ba3b8740d1cd952fe7d4823f3848,2023-11-30T21:00:23.003000
|
||||
@ -237253,7 +237254,7 @@ CVE-2023-6395,0,0,ac793203a9dc0a042800eca54ed9e135226e7af456816d583effac8dcec849
|
||||
CVE-2023-6397,0,0,32328345f587e4af99f4aaa1bcc8b79a52413e2b10103761bed029c881877b7c,2024-02-20T19:50:53.960000
|
||||
CVE-2023-6398,0,0,6df96db5309a9e573369d025141b91026dcf883d56f38d0728e8a69e9f438402,2024-02-21T10:15:42.770000
|
||||
CVE-2023-6399,0,0,891fd568ed116fcad25bf9db62f014842821e1923047c86d46a6c2d8dab27f63,2024-02-21T10:15:42.900000
|
||||
CVE-2023-6400,0,1,707a8d108ff29e3f5ec9ab008205c7906004d1fc50c2cf7855d902b59313f0e8,2024-03-27T15:49:51.300000
|
||||
CVE-2023-6400,0,0,707a8d108ff29e3f5ec9ab008205c7906004d1fc50c2cf7855d902b59313f0e8,2024-03-27T15:49:51.300000
|
||||
CVE-2023-6401,0,0,411546d88eebf199d44e9988166ea5b8e6f2b675b6fe8a537c285170b3230267,2024-03-21T02:50:36.180000
|
||||
CVE-2023-6402,0,0,dd329c4dbc100bff910a0c70a7294dd06e33e9b2468f50cfcaf0604e5c4e1810,2024-03-21T02:50:36.267000
|
||||
CVE-2023-6407,0,0,fd3b1ec8c2350f5672df571bd288bbd2e9afe054b223cdc538cdef15170f355f,2023-12-18T19:34:53.843000
|
||||
@ -239048,7 +239049,7 @@ CVE-2024-1535,0,0,c2e452de4f130d0657f2ad52768b1d03d46cb2c5e636f4ca1b10840f9898bd
|
||||
CVE-2024-1536,0,0,3680c54e462a2a7edc1fc99438ddf2bbe56f66c6c70a4febe86757b7c0d77832,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1537,0,0,90084d772bcb3ecc6e07d74ed60eae5fe9aea59c6e1713f7863063d24965b57f,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1538,0,0,7710e1b546e09312497f0b9c9df24bcccbffd2cbc2e6cf10ad6aac7ce2ffe5db,2024-03-21T12:58:51.093000
|
||||
CVE-2024-1540,1,1,89cd06ed913bb19437dfd8dce4934b885739e3f5438ab021d31e6f934d45cd8e,2024-03-27T16:15:09.963000
|
||||
CVE-2024-1540,0,1,76005015a825567349150f82c72870d086e465eb518fb8c7a03f9bc7bf9bede1,2024-03-27T17:48:21.140000
|
||||
CVE-2024-1541,0,0,0b73186deefb215b3bbc0b2b970c4145b3ad229def4c224287b4e5a63ecff82c,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1546,0,0,d87548555f4c8992ddc193a435b01cbf450a34c4725a832074955ddd5326558a,2024-03-04T09:15:37.650000
|
||||
CVE-2024-1547,0,0,fc3de1ace81ccfdd8fbde9e6a6951be522c10c940115407bd01fd7d037e7d770,2024-03-04T09:15:37.740000
|
||||
@ -239069,7 +239070,7 @@ CVE-2024-1564,0,0,84875cf797fa64328b336ae33772e46886c72657e3c983b9d184a2a3d50ffd
|
||||
CVE-2024-1566,0,0,fae18125d42af6480c1fb49e1e6428a52d2bf4f1074f21a5dfe482b2c8d87086,2024-02-28T14:06:45.783000
|
||||
CVE-2024-1568,0,0,03adf0f94bdba0662cb278cdaa3b54a5cd3ae08b3ef89a1e89169605096fa6c9,2024-02-28T14:06:45.783000
|
||||
CVE-2024-1570,0,0,fa96633d08cf4f7a9a083fffefdd325991610013e77e1890328cb3b85d75e300,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1580,0,0,8ab013089e97147c04c4a5ef6b3954117d4a37f719c6f181dbd352698d2066ba,2024-03-26T00:15:08.497000
|
||||
CVE-2024-1580,0,1,4a10e63fa95d49470234e2661449f906487822e0aeb3a95c53a88e84627958f0,2024-03-27T18:15:09.063000
|
||||
CVE-2024-1582,0,0,5801086f12a7b25e0a24481309300eacfe3989ff6a37128452730610efa279b1,2024-03-13T12:33:51.697000
|
||||
CVE-2024-1585,0,0,e91f99f5d286c3afef1058be20d258b7aa9acfdf346cd5b86fd70de17ee7844a,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1586,0,0,0f7dcaaedeb3b15eee35c0b1fbce415960454d76b6eae4dff9a3ecfad1011e31,2024-02-29T13:49:29.390000
|
||||
@ -239362,13 +239363,18 @@ CVE-2024-20252,0,0,b3e7ab7affd116881816a7adc1b9a82671c5b4da83512a13f8133ebc1b35c
|
||||
CVE-2024-20253,0,0,d3a8e74c395d6dc3e7ac6947f74fcfd7abc559db9a2a5673b58b5d97e64fbd4a,2024-02-02T16:15:53.893000
|
||||
CVE-2024-20254,0,0,483b1bcc903a1f3fe5774e73017e3920b0d7ed3bc82e804e2d29798a514160f0,2024-02-15T15:54:33.153000
|
||||
CVE-2024-20255,0,0,4c8067b6b3b68c94894b4ecd8c182992b7e2d67f936be466104b1472a1d76a79,2024-02-15T15:54:19.960000
|
||||
CVE-2024-20259,1,1,320a14ee14d62aa5d17681a1efe29c443b0cdc7bc00d2121817f310cc495e59d,2024-03-27T17:48:21.140000
|
||||
CVE-2024-20262,0,0,a40254b410d0784e77864e44354a4b6d276cfd1ed801d8c8cea773abddaa6fdb,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20263,0,0,eee9d5be1e797577581d307b6debeb0e216dfa8c65e90aa4284e364da06d4b08,2024-02-06T19:23:20.600000
|
||||
CVE-2024-20265,1,1,3489362a547286567b228fe9ed8fabd87d542e719de273953f70320b8c723a6a,2024-03-27T17:48:21.140000
|
||||
CVE-2024-20266,0,0,7107175b332490e839d5721f467b6ded5bb175039dfd7bbdacb90e93b939405e,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20267,0,0,2716a642cdad532c3a4bd75fb20d5fecd6f79884b8ec8ad4d3b70c55b604b9c9,2024-03-04T22:45:43.893000
|
||||
CVE-2024-20270,0,0,e782cd7ba9de695c0ad1c66716422322472732a1f5415c3e41652abc7d8c0edc,2024-02-02T16:15:54.227000
|
||||
CVE-2024-20271,1,1,dfae8db584f1048f6a3c2c1977b24965cd6ce960b56141c77d166e3081815ee1,2024-03-27T17:48:21.140000
|
||||
CVE-2024-20272,0,0,185f140724efe06396f39e49d9628053efc8d5b0f336793319946b145d008ecc,2024-02-02T16:15:54.683000
|
||||
CVE-2024-20276,1,1,296a5bdd5467948ab48ce59d6adf71ce96a1b7c0465de9d78357fece032b5e4b,2024-03-27T17:48:21.140000
|
||||
CVE-2024-20277,0,0,c44de8c225b0707871143fcb06737e334d929dd5a0acde877fcecec9290acbf6,2024-02-02T16:15:54.787000
|
||||
CVE-2024-20278,1,1,3422bd62c0dbfc03ee503f488f9025cb4328d1a2c7b9cbaa4588ba28546b6550,2024-03-27T17:48:21.140000
|
||||
CVE-2024-2028,0,0,5879943042d614ba399bf0758e5dda45ae5ecb9ad367a59e13a5814f1ed688df,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20287,0,0,73801d80b462793a88b2af436ab77ac49555a7cb9634b8a2ccc26dc598e491a1,2024-02-02T16:15:54.887000
|
||||
CVE-2024-20290,0,0,057d5dfa7ca9ea45e2cb423f9faaf6e87f8f428206a3f34ecdd5587406e21147,2024-02-15T15:43:27.240000
|
||||
@ -239377,17 +239383,28 @@ CVE-2024-20292,0,0,bd2670c9582b587cdf9a7328c2351789f5b8997cab8f7bfcaca92954507c5
|
||||
CVE-2024-20294,0,0,1d3a9a3e9164827aaec419fc6a9a7d933913e3a790dc40da7ac082a33393bbf9,2024-02-29T13:49:29.390000
|
||||
CVE-2024-2030,0,0,1279e34f262b0c0064508219ec7b722bb72cd0ff45a7c2dd1c4bd367a96f5a52,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20301,0,0,5731f674f5ae2bcf96420fc328e70e5146901802d1ab3db25461c019cd20961d,2024-03-07T13:52:27.110000
|
||||
CVE-2024-20303,1,1,e5ac9d50052f4c4c8ef804ccaefc800a16509a09aa16e231d189818adcc2e3c2,2024-03-27T17:48:21.140000
|
||||
CVE-2024-20305,0,0,ab61a4ab7882e267880cc2c0e6b3ec1ab9c8b4d0dadf3a4832bdf14ae2ae012d,2024-02-15T19:56:38.910000
|
||||
CVE-2024-20306,1,1,7ce4ce882880d6a48a5bc5e41b86d2467b57bc87bd8f78243b3657e3eec48482,2024-03-27T17:48:21.140000
|
||||
CVE-2024-20307,1,1,6e057a049f344ad501317a246d37c6a97da44c74d43554b7afa1d19dde729fe3,2024-03-27T18:15:09.357000
|
||||
CVE-2024-20308,1,1,5982f15762a09863ecfc1c3105619d4c65dd988fdcec0e1b0f62fbfed1430f39,2024-03-27T18:15:09.853000
|
||||
CVE-2024-20309,1,1,e1a5a828e0a9998a91a0f24ce922d605b9c5494ea6372c8e56a89d1b0cae6848,2024-03-27T17:48:21.140000
|
||||
CVE-2024-2031,0,0,8c1bcd6bbcf916842768e08303dd42fc425614624a1e3216d105b6a1ddb5c8c0,2024-03-13T12:33:51.697000
|
||||
CVE-2024-20311,1,1,c693e0e2ebd0ccff4af9c3de016bddd629d8a55f7bab90eb59f830d5f1210bde,2024-03-27T17:48:21.140000
|
||||
CVE-2024-20312,1,1,c48be856a777b8fad526c083b489e4d8d6e24a6434163b12913e7e6d6bd387df,2024-03-27T17:48:21.140000
|
||||
CVE-2024-20314,1,1,25da68acd340edea4119f8cd36c690ff3a322aebd5bc20462f4be9eaaddee7e2,2024-03-27T17:48:21.140000
|
||||
CVE-2024-20315,0,0,831cd6ed54c2f6f2fd4097d9fc2e0953e1c74073f83cfb1960f6ad1247cec241,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20316,1,1,0facf79c751f7edbf8bf7eb947aeebd24e08d05d059114eedc01d842bfa7840d,2024-03-27T17:48:21.140000
|
||||
CVE-2024-20318,0,0,31b265ae70125be15efc925115276ad5f47aba03d611ad31fd59e0405ac987ce,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20319,0,0,fce820c860756da39956bcf24654b4c258181605332ce4ef4670a251a36856dc,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20320,0,0,f414732037b8e5e2b31a0c4322e496ff34c28ecfb3a724091e51a412efa51350,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20321,0,0,6de34d7d404f536decd9f5a380e1c4f28760edee84d237a9b02d7c6e56d785b7,2024-03-04T22:45:23.647000
|
||||
CVE-2024-20322,0,0,2b06b6a28ea98e3be45957586078049ced390e2bbb1013999023329f607687e9,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20324,1,1,4ceb90fa15b34b60a6093578287d94925925781fa75d2c106af71ed06f3f60fb,2024-03-27T17:48:21.140000
|
||||
CVE-2024-20325,0,0,dfe1f947bf6fc9efa452f1881c4faae47bd9e909bfa416f69baa534db16c5289,2024-02-22T19:07:27.197000
|
||||
CVE-2024-20327,0,0,99fc6b346e02158b3f4b7079ce29acef1779b3bc5057517cd2f663d4239946c0,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20328,0,0,f336e809226305b79cd50f26fae203aa1632211d86957dd92abacb2f83d51af6,2024-03-01T22:22:25.913000
|
||||
CVE-2024-20333,1,1,0fc0d9f2bb75be1d1f2fb11cd6f9cf26712193c623a9dcfd720083347398fc6f,2024-03-27T17:48:21.140000
|
||||
CVE-2024-20335,0,0,e7a578f13e250b46805a1e9177b3b5be279d06874d056b5f6fc5ebbcf99e61d7,2024-03-07T13:52:27.110000
|
||||
CVE-2024-20336,0,0,79e0816d77620de3a577cfb98875db786f37b5ccab0f43d45d78748499d8cbc3,2024-03-07T13:52:27.110000
|
||||
CVE-2024-20337,0,0,3b1a37d60fcaa85f947811f983b479d3e4900eee9d9299595cf069082e613c78,2024-03-07T13:52:27.110000
|
||||
@ -239395,6 +239412,7 @@ CVE-2024-20338,0,0,5566f1b7285f199c07a2500bed0125d8d757cef5cccae1c32214ac0d6cd53
|
||||
CVE-2024-20344,0,0,5701c086cd49552fb9b4e42b34522b298fb97269a26ec090e5fb132f538cd956,2024-02-29T13:49:29.390000
|
||||
CVE-2024-20345,0,0,3d1a51edca02a2407f1ed6f3ffcbd5d09253c77ae2ce2b00247da9ce4f441eef,2024-03-07T13:52:27.110000
|
||||
CVE-2024-20346,0,0,f967daadb6c5a5a55ae179293422d73f8c43ceb443c382f34755b3930e28b331,2024-03-06T21:42:54.697000
|
||||
CVE-2024-20354,1,1,d77b2c2498bd40063174d789072339810259d4fa0e4bc5c8d41a694f11a95e02,2024-03-27T17:48:21.140000
|
||||
CVE-2024-2042,0,0,f6d54c5204cd94c19a84e1963b44103dc197c946869366cb59a65e7a4114231d,2024-03-17T22:38:29.433000
|
||||
CVE-2024-2044,0,0,3d73c6b2cc04bd01f48c15467e360d6d6689d47e2b89d6d93430f2c98bfeca1a,2024-03-23T03:15:12.063000
|
||||
CVE-2024-2045,0,0,72838b74e2668b744754639ee1018477ba3696de5929605fbc709ccd12df2c15,2024-03-01T14:04:26.010000
|
||||
@ -240636,6 +240654,8 @@ CVE-2024-23441,0,0,821a9fc4779da9403532f4be71c4c0616cc5f4f7bdd56ecb83e25ef4a979d
|
||||
CVE-2024-23446,0,0,250d55c97e03f858281f4b571f5417bd7430f2eb75d812ec1a5460363cd232aa,2024-02-14T20:10:24.323000
|
||||
CVE-2024-23447,0,0,d914699914a1032e2f26c2be4fcf7737ff60c4d99dbe7a58145b0312508d8818,2024-02-14T20:02:00.753000
|
||||
CVE-2024-23448,0,0,9b1c1e9aca41646e9bc0b5aea887714df628a3eafb241e1a8858ac207b41bd27,2024-02-15T15:39:14.317000
|
||||
CVE-2024-23450,1,1,6ff242ba8621158a6fc5bf1e14cebaff80a919a65abf5fe5c94bac3fd2cfef43,2024-03-27T17:48:21.140000
|
||||
CVE-2024-23451,1,1,396a36e96f019a84ce41421d631ed0347d8e4d3267d4975e6f03c5a130a41249,2024-03-27T18:15:10.330000
|
||||
CVE-2024-23452,0,0,aaa529ca6e03eefd16006bb57cfd95647fc8b44bb3a3176fd8a83e06021cb7e9,2024-02-29T01:44:08.877000
|
||||
CVE-2024-23453,0,0,ab3a22284e10fea1933712f86026a2e7792304e1f83321557a4d02140679b266,2024-01-29T22:58:07.777000
|
||||
CVE-2024-23476,0,0,e3d84cdb88c20fc5ad4183c7e154fd4eb94d6574a64f56328103056889f0fc9e,2024-02-20T20:39:10.033000
|
||||
@ -240655,11 +240675,11 @@ CVE-2024-23506,0,0,1374ac637ee795ef76e472829586ea10162cf799e7f8facdf1ae775daa957
|
||||
CVE-2024-23507,0,0,5e40ce7b11a8b26bc0a529a8393436247da9b21902b7ceeec2a950c934f8cd05,2024-02-05T20:42:09.590000
|
||||
CVE-2024-23508,0,0,3a5d965b173789f90e04ab11d7235589e66f2e700d9aef01bbadb70d9def40c4,2024-02-05T20:27:29.570000
|
||||
CVE-2024-2351,0,0,db54bad65395196f0c1789f4e2b7b2565491796aeba8bcf50c97119ee330dc9b,2024-03-21T02:52:33.103000
|
||||
CVE-2024-23510,0,1,f7020632d5dbc868e99ae1897d50110782a9a2a4bc20759c8f8985d0284bfe7e,2024-03-27T15:49:41.437000
|
||||
CVE-2024-23510,0,0,f7020632d5dbc868e99ae1897d50110782a9a2a4bc20759c8f8985d0284bfe7e,2024-03-27T15:49:41.437000
|
||||
CVE-2024-23512,0,0,f774c1ac0cd010afc581062aca17eed5006d65805abf1bdf2daba7cd31140d9b,2024-02-12T14:19:54.330000
|
||||
CVE-2024-23513,0,0,6b5819940e0cbb5eaed45cc3f1856dd03cfd514bc33059a14b7ee124f7e640d4,2024-02-12T14:19:54.330000
|
||||
CVE-2024-23514,0,0,d7e3c284194c6ceaffde4175d0b48a010f01f7192801918385ee65be56400e43,2024-02-16T13:42:03.290000
|
||||
CVE-2024-23515,0,1,53bf497ae935ccecb307d1bdcdbad5772717f87289795b507399eb475ef84725,2024-03-27T15:49:41.437000
|
||||
CVE-2024-23515,0,0,53bf497ae935ccecb307d1bdcdbad5772717f87289795b507399eb475ef84725,2024-03-27T15:49:41.437000
|
||||
CVE-2024-23516,0,0,f908beaf0aef3ecf8a8819fae23d2c4559de7dc9d2df85df41316958d107a5e0,2024-02-16T13:41:48.350000
|
||||
CVE-2024-23517,0,0,e4bbedbc00468997609a0c9179822a4e7c082017c830cbf85558e35c31daa8f6,2024-02-16T13:41:33.563000
|
||||
CVE-2024-23519,0,0,323d9800215ce0c9e36032433bafa6695128989b60bb35cada524fbfda63857e,2024-02-29T13:49:29.390000
|
||||
@ -242114,8 +242134,8 @@ CVE-2024-26647,0,0,29bdc4340bafd301bcad34511ccc4699e791a96b6f9c94e00888fcdf9decc
|
||||
CVE-2024-26648,0,0,28db65aa9bed6961e64f3164f5e2671ea79deb15b882dd8229f6c9a5965d8f38,2024-03-27T12:29:41.530000
|
||||
CVE-2024-26649,0,0,86aeb2fae965a4a5332ed6f99e853d97c707f8eddf2b6cb0afb03f1458efaad0,2024-03-27T12:29:41.530000
|
||||
CVE-2024-26650,0,0,a6462e36b1dd6f69ddd876eed038a048534eb12e06d7671796e4cb5890514076,2024-03-27T12:29:41.530000
|
||||
CVE-2024-26651,0,1,a2e5e1171fae5cd37adc9c273beac8339c77df92cf6c9b2119d65e36bb3ce0f0,2024-03-27T15:49:41.437000
|
||||
CVE-2024-26652,0,1,ccc590b218f45c6bb9fa7fed88041733bb926c9879d519c1ffc1f038a0a8e977,2024-03-27T15:49:41.437000
|
||||
CVE-2024-26651,0,0,a2e5e1171fae5cd37adc9c273beac8339c77df92cf6c9b2119d65e36bb3ce0f0,2024-03-27T15:49:41.437000
|
||||
CVE-2024-26652,0,0,ccc590b218f45c6bb9fa7fed88041733bb926c9879d519c1ffc1f038a0a8e977,2024-03-27T15:49:41.437000
|
||||
CVE-2024-2668,0,0,d8e22e7bb795e8f8d48dc1ea67b8b3706e737c441fdb6e3cdf26dd6015682f9f,2024-03-21T02:52:41.070000
|
||||
CVE-2024-2669,0,0,4f5a2d5969b59448109cf022193bd2b7c88dc7ffa7ca03caa723fb0f374642a3,2024-03-21T02:52:41.157000
|
||||
CVE-2024-2670,0,0,51102bd696ec0a80433e00190a81242d0892d06afe5affb13dd51bd0c370ce65,2024-03-21T02:52:41.253000
|
||||
@ -242153,7 +242173,7 @@ CVE-2024-27087,0,0,797d68e52883598465cd96feb0df00e139da26d73f23e4ac2cae928dbfb41
|
||||
CVE-2024-27088,0,0,51e0e40780267d1754ef6fc0476358b31f9f3458dd54a6b66fef5c03c4a96208,2024-02-26T22:10:40.463000
|
||||
CVE-2024-27089,0,0,80888df8a8beb579eb58ecd8e5017bb9d7c0dad21161e687af8e50a608c5d017,2024-02-26T20:19:06.073000
|
||||
CVE-2024-2709,0,0,05c473f010934bdd2fa56f73920990168cacc8a107825196c2fa48c0e97716de,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27091,0,1,6c02da8a41fc8608262d0427db7fdd08eb03b81c66303da6889c1d90b51325a9,2024-03-27T15:49:51.300000
|
||||
CVE-2024-27091,0,0,6c02da8a41fc8608262d0427db7fdd08eb03b81c66303da6889c1d90b51325a9,2024-03-27T15:49:51.300000
|
||||
CVE-2024-27092,0,0,46c8a65175e30ca99bc1ca448e9739f5a9fd09a26b86761b076001350720e53c,2024-02-29T13:49:29.390000
|
||||
CVE-2024-27093,0,0,2adc536c19af535e2a03a5b98ba4818457cc5a617ec41b1d012943c718349d43,2024-02-27T14:20:06.637000
|
||||
CVE-2024-27094,0,0,5b44307768a1f51c7f559a6b28fd23c9fbc41c848843f808ad0625dfa254064d,2024-03-21T12:58:51.093000
|
||||
@ -242235,7 +242255,7 @@ CVE-2024-2726,0,0,670b2be162ea05000bb5b040a32b1dee9c94eee7d1b48ed8e7d2e78e98ae50
|
||||
CVE-2024-27265,0,0,caf2cbef481f9d0206d06f75a38ca052c5291ba0582e91875cea8f52e6d86a34,2024-03-19T16:52:02.767000
|
||||
CVE-2024-27266,0,0,f3ab0f27c5fbbc81843b4329fa53134d5b91174cad9bacbbc5dbf01cfacc3864,2024-03-19T16:52:35.400000
|
||||
CVE-2024-2727,0,0,89ce6b1f6bb0b4eb1c8d237648735f02e0931a62bd13bcc4638eefeb18037510,2024-03-22T15:34:43.663000
|
||||
CVE-2024-27270,0,1,1dd30dbb0e3fca00e54defbdce0f737f2baf29b2c8e90e62b85e02800e0e4451,2024-03-27T15:49:51.300000
|
||||
CVE-2024-27270,0,0,1dd30dbb0e3fca00e54defbdce0f737f2baf29b2c8e90e62b85e02800e0e4451,2024-03-27T15:49:51.300000
|
||||
CVE-2024-27277,0,0,eb365bab444835328458e82045190ce3a564e0755801fc1f65f8b5d9bbf59bcb,2024-03-21T19:47:03.943000
|
||||
CVE-2024-27278,0,0,2ef9546b6eb3a76ad70be700186038d995dd630654759ed72b9b3d10968f6d39,2024-03-06T15:18:08.093000
|
||||
CVE-2024-27279,0,0,a0a465925dfcee0f633443a4d3db070f2bf023c10d4135b020d1a0fbe76c5a4b,2024-03-12T12:40:13.500000
|
||||
@ -242678,7 +242698,7 @@ CVE-2024-28753,0,0,73ca850c1b6879daba607bc61d7d16457b56173a47004b8bff799b514a526
|
||||
CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3b2c,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28756,0,0,25c89ab9b64cbd69060fc1b1f68e4f1c76ee574185097dbf9146fc8b2b315bf5,2024-03-22T12:45:36.130000
|
||||
CVE-2024-28757,0,0,6f674e74da8b1d303f1997061736a8f7699c424c20f0aba68e441f140f441071,2024-03-23T03:15:11.920000
|
||||
CVE-2024-28784,0,1,2bc1ea2e712d4e90db6a7b931c77b9f29985433c42fe688e3c826f016a685898,2024-03-27T15:49:51.300000
|
||||
CVE-2024-28784,0,0,2bc1ea2e712d4e90db6a7b931c77b9f29985433c42fe688e3c826f016a685898,2024-03-27T15:49:51.300000
|
||||
CVE-2024-28815,0,0,f9ba7e38674697b7d17d51e7b24c9c896d5b8cd72333d8b6833bda1b0cb49c74,2024-03-27T12:29:30.307000
|
||||
CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000
|
||||
CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000
|
||||
@ -242692,8 +242712,8 @@ CVE-2024-28849,0,0,5e73d26630408070b9f2d0554aca63f533ce0044a2d97ed66eab06494ab2b
|
||||
CVE-2024-2885,0,0,cf50d0de63046c25a9c06aae6750e831b06cf13de0fd69058b9ce32d2d050ac0,2024-03-27T12:29:30.307000
|
||||
CVE-2024-28850,0,0,3f010e48b33d8f74ceb957fab8d6defaf56ad7dc42ab2eb1e3bf15c4cfbd82b3,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28851,0,0,f15187ac52243f1288d6dabed456ab5bd2287b2db60c97a538d0582f4f0ba12d,2024-03-17T22:38:29.433000
|
||||
CVE-2024-28852,0,1,81477f31a68a79cf239e62d41f0c7941d39269da2e1c0040b745dee79d9f52fb,2024-03-27T15:49:41.437000
|
||||
CVE-2024-28853,0,1,ea120d2b937113b211783fea6e205020383522b3385da9d8677cfced8a49293b,2024-03-27T15:49:41.437000
|
||||
CVE-2024-28852,0,0,81477f31a68a79cf239e62d41f0c7941d39269da2e1c0040b745dee79d9f52fb,2024-03-27T15:49:41.437000
|
||||
CVE-2024-28853,0,0,ea120d2b937113b211783fea6e205020383522b3385da9d8677cfced8a49293b,2024-03-27T15:49:41.437000
|
||||
CVE-2024-28854,0,0,8cb03aded6b194ffbf5e93b6a999bfbf01ac8f736343c4fc752b0e38a8bc9f90,2024-03-17T22:38:29.433000
|
||||
CVE-2024-28855,0,0,2384a3330fde47f752f152bfa13a6226cb6b236bb18ff2466f5e886c7d3e893c,2024-03-19T13:26:46
|
||||
CVE-2024-28859,0,0,2d0407c7b83f2786a493b842ae3fe3ce3f906494adee8b0e0f61c75557fcb17c,2024-03-17T22:38:29.433000
|
||||
@ -242867,56 +242887,56 @@ CVE-2024-29684,0,0,bf20e1eee3419c30e31b5c1e15077ebe4738914779e007adc0a6cf94ae841
|
||||
CVE-2024-2971,0,0,898bc718d43d0c390c6d16657d6a8f74b1bed4195ca2be9f6e03b60807e37565,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29732,0,0,3aff958eec55f5cf06538251c792be6423021bd21573f6f2f920d098c9ad37bd,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29735,0,0,286fbba4f7cb1bbd32eae740efb468430068245735dc6c522579c415dcd44e18,2024-03-27T12:29:41.530000
|
||||
CVE-2024-29758,0,1,850000367bf365fc67358722bd3f49f9e6efe1177fc04e28429703ce7619a3b6,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29759,0,1,604dde57e158ba268d6ad5edd22f6f9ee225a2c65d1a266897bc2dc328d431c0,2024-03-27T15:49:41.437000
|
||||
CVE-2024-2976,0,1,0b50db41b4280994d8ba65b62c091178f13c54aa94ca8ab9ef2147cb1970d8ea,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29760,0,1,7eb818a3c28c1f97de13ad72a84131f01130ec37e7142cdb428d023e4ce66871,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29761,0,1,cc5c3ba7815c601086b652c857d276cd318c49aa89a3c9384e9951044880487b,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29762,0,1,aaddd686bc3db71dabf4f7e85f42e6c46b97df4732f38ffb96878045fdd29b25,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29763,0,1,30323441c62e60ca33f6dd2c29898360453843790bcc6e91d33af1ae4fa17148,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29764,0,1,a7e034992ed1c63536559262a04804a84bd56ff02c9edb940bd6a052423afb08,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29765,0,1,98e82fd5fded6cd499e69c0f014328d69598d01afd9585e3714d45b0fbd70415,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29766,0,1,45c1da4cd021b137fe62f544f1028abb2098662c1dbd6348f454f93491c946b7,2024-03-27T15:49:51.300000
|
||||
CVE-2024-29767,0,1,3a1e80de1205c2b3c4e911ff057ffa52ee92306bf90fb66835329b42a0a4471c,2024-03-27T15:49:51.300000
|
||||
CVE-2024-29768,0,1,d9762da294a1ca22ea7a67aa43fe98efb43232a0a476c14841d2c754ac4a606b,2024-03-27T15:49:51.300000
|
||||
CVE-2024-29769,0,1,c9ab754c046c255443da858120ac7312f6c44f9137f47bb927c2d35cc00ea50c,2024-03-27T15:49:51.300000
|
||||
CVE-2024-2977,0,1,265a8e0885b275ccb8c8a7fb5d6b545c4848fc25e3d153bde1d499f0e11c2444,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29770,0,1,a49737f958ade2e568c6a268defe7fd245f9865b992e740d9c5f4c1b1df7cb94,2024-03-27T15:49:51.300000
|
||||
CVE-2024-29771,0,1,99eaaf300460484cb14da0ae3234fa8f436a97aa719f6da5c1afc3c68c088288,2024-03-27T15:49:51.300000
|
||||
CVE-2024-29772,0,1,a0fde1848c9f64fbc382c578c7e01c4c0ab620bd0ead0e612d021fe39802b51b,2024-03-27T15:49:51.300000
|
||||
CVE-2024-29773,0,1,acb085aed13af95bb8372ad0588f2261bd14f1251d46b2a953f7e9c206793454,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29774,0,1,ae6539860a62635b04f816c43ef0f8b274e7a885187931e27451e43c4732f9c1,2024-03-27T15:49:51.300000
|
||||
CVE-2024-29775,0,1,c579fdc00d77d197afe0af16c71be06b98b4f8e7314c1a2e1eb78f6992cd8305,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29776,0,1,41c24a7d916a74c4603a3edaaed2be0a1d06a9fb7a65c8c9e2ca59dc51827147,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29777,0,1,6ca2f9794500ac914681af47788da89b9c80d56e1876cb1f64975d9a66ffb8a4,2024-03-27T15:49:41.437000
|
||||
CVE-2024-2978,0,1,ccc57f57023ca7268aaa9e33e078721d1b8ed4cc2a9d5fba1402a5ae074e2103,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29788,0,1,2fb18370a76e5cb12562cdeaf4ac512430afc35aaba20836464a022117314d5a,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29789,0,1,527e862cf3490a2c7f0ebc13eb33a969d581e7c1ad36955ed4d6e199035cdaa6,2024-03-27T15:49:41.437000
|
||||
CVE-2024-2979,0,1,b48fa5c9d2f47bc4e52ee839def41fa08bbb2e05a711ae00ed5d25891030ebd0,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29790,0,1,33f7dab8aab944a64462c58246cf3a4aa8b3acf33d35f16594fcf0e9e0e49eec,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29791,0,1,da3ce5323fe0059f87050dffbd1c548157467ea6614ee9f88f6fe2389b7969ef,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29792,0,1,1cc3a43409e151a80fd012c5bec518b61fa90dc58697900f281dd38c77b3dedf,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29793,0,1,38990b7403b37a4b172e4b95aaa1873a77115e041022e69af6fe1a71828c57f7,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29794,0,1,4e1539afb130e7d8b5b602b4774a03d21365dcd87ac0b2851375a396e3a96328,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29795,0,1,f1a7c8c32a0c2edb61fe45efb42ecf6718606c318c61e81cc9ede03fc04a89d4,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29796,0,1,aaa707079b712de4c1539fc5342496e10082d2b15da68bddf8004c4d4177bb76,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29797,0,1,f4d0695be063b4aa93c639c7e7ecc9649ecb1f66cb10856f41ecc87aef7cdf89,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29798,0,1,e4cde7751e85b2aa0407fc3f0780fe5af2f13da8d8f278ca7bbe875863a7dcbd,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29799,0,1,f1281c50846b69e40773fdd85d2ac4c83e1c7a0539df9e80293cfe5915e9fe72,2024-03-27T15:49:41.437000
|
||||
CVE-2024-2980,1,1,f134107d0ff7e395a04515a053eb7eea89201a89938306b64df80e4ed25ab2ae,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29801,0,1,723ff24a22f5c35bfa87fba17edbd54dc3241a90618f7407842799030e337d3a,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29802,0,1,f0281d2f4c4f7b33e6995f73ab5f2da2dcad47bf02c650232bfa71db30f560d1,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29803,0,1,ec2d6e8b1de4f1b12189eb4f5f1b8889e432d71bec7878f196027a0271541134,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29804,0,1,e1a5eba48948258de92f35b86a197e4e3725bcb26472341e46a5d04fa4f155f9,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29805,0,1,bbcea86f7733f810b3280a0692ef470761110b7d55b9f4d7c96e636d1e3103b5,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29806,0,1,1fa0a4d7bcdf174f5850cd4be365ca5b2be71d8963cf745f412aed7bbc2ec06e,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29807,0,1,a70ed7c03cde5e433e6ebe101af7f7df5552bde53453625634bd6b408cd95fdb,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29758,0,0,850000367bf365fc67358722bd3f49f9e6efe1177fc04e28429703ce7619a3b6,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29759,0,0,604dde57e158ba268d6ad5edd22f6f9ee225a2c65d1a266897bc2dc328d431c0,2024-03-27T15:49:41.437000
|
||||
CVE-2024-2976,0,0,0b50db41b4280994d8ba65b62c091178f13c54aa94ca8ab9ef2147cb1970d8ea,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29760,0,0,7eb818a3c28c1f97de13ad72a84131f01130ec37e7142cdb428d023e4ce66871,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29761,0,0,cc5c3ba7815c601086b652c857d276cd318c49aa89a3c9384e9951044880487b,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29762,0,0,aaddd686bc3db71dabf4f7e85f42e6c46b97df4732f38ffb96878045fdd29b25,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29763,0,0,30323441c62e60ca33f6dd2c29898360453843790bcc6e91d33af1ae4fa17148,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29764,0,0,a7e034992ed1c63536559262a04804a84bd56ff02c9edb940bd6a052423afb08,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29765,0,0,98e82fd5fded6cd499e69c0f014328d69598d01afd9585e3714d45b0fbd70415,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29766,0,0,45c1da4cd021b137fe62f544f1028abb2098662c1dbd6348f454f93491c946b7,2024-03-27T15:49:51.300000
|
||||
CVE-2024-29767,0,0,3a1e80de1205c2b3c4e911ff057ffa52ee92306bf90fb66835329b42a0a4471c,2024-03-27T15:49:51.300000
|
||||
CVE-2024-29768,0,0,d9762da294a1ca22ea7a67aa43fe98efb43232a0a476c14841d2c754ac4a606b,2024-03-27T15:49:51.300000
|
||||
CVE-2024-29769,0,0,c9ab754c046c255443da858120ac7312f6c44f9137f47bb927c2d35cc00ea50c,2024-03-27T15:49:51.300000
|
||||
CVE-2024-2977,0,0,265a8e0885b275ccb8c8a7fb5d6b545c4848fc25e3d153bde1d499f0e11c2444,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29770,0,0,a49737f958ade2e568c6a268defe7fd245f9865b992e740d9c5f4c1b1df7cb94,2024-03-27T15:49:51.300000
|
||||
CVE-2024-29771,0,0,99eaaf300460484cb14da0ae3234fa8f436a97aa719f6da5c1afc3c68c088288,2024-03-27T15:49:51.300000
|
||||
CVE-2024-29772,0,0,a0fde1848c9f64fbc382c578c7e01c4c0ab620bd0ead0e612d021fe39802b51b,2024-03-27T15:49:51.300000
|
||||
CVE-2024-29773,0,0,acb085aed13af95bb8372ad0588f2261bd14f1251d46b2a953f7e9c206793454,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29774,0,0,ae6539860a62635b04f816c43ef0f8b274e7a885187931e27451e43c4732f9c1,2024-03-27T15:49:51.300000
|
||||
CVE-2024-29775,0,0,c579fdc00d77d197afe0af16c71be06b98b4f8e7314c1a2e1eb78f6992cd8305,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29776,0,0,41c24a7d916a74c4603a3edaaed2be0a1d06a9fb7a65c8c9e2ca59dc51827147,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29777,0,0,6ca2f9794500ac914681af47788da89b9c80d56e1876cb1f64975d9a66ffb8a4,2024-03-27T15:49:41.437000
|
||||
CVE-2024-2978,0,0,ccc57f57023ca7268aaa9e33e078721d1b8ed4cc2a9d5fba1402a5ae074e2103,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29788,0,0,2fb18370a76e5cb12562cdeaf4ac512430afc35aaba20836464a022117314d5a,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29789,0,0,527e862cf3490a2c7f0ebc13eb33a969d581e7c1ad36955ed4d6e199035cdaa6,2024-03-27T15:49:41.437000
|
||||
CVE-2024-2979,0,0,b48fa5c9d2f47bc4e52ee839def41fa08bbb2e05a711ae00ed5d25891030ebd0,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29790,0,0,33f7dab8aab944a64462c58246cf3a4aa8b3acf33d35f16594fcf0e9e0e49eec,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29791,0,0,da3ce5323fe0059f87050dffbd1c548157467ea6614ee9f88f6fe2389b7969ef,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29792,0,0,1cc3a43409e151a80fd012c5bec518b61fa90dc58697900f281dd38c77b3dedf,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29793,0,0,38990b7403b37a4b172e4b95aaa1873a77115e041022e69af6fe1a71828c57f7,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29794,0,0,4e1539afb130e7d8b5b602b4774a03d21365dcd87ac0b2851375a396e3a96328,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29795,0,0,f1a7c8c32a0c2edb61fe45efb42ecf6718606c318c61e81cc9ede03fc04a89d4,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29796,0,0,aaa707079b712de4c1539fc5342496e10082d2b15da68bddf8004c4d4177bb76,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29797,0,0,f4d0695be063b4aa93c639c7e7ecc9649ecb1f66cb10856f41ecc87aef7cdf89,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29798,0,0,e4cde7751e85b2aa0407fc3f0780fe5af2f13da8d8f278ca7bbe875863a7dcbd,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29799,0,0,f1281c50846b69e40773fdd85d2ac4c83e1c7a0539df9e80293cfe5915e9fe72,2024-03-27T15:49:41.437000
|
||||
CVE-2024-2980,0,0,f134107d0ff7e395a04515a053eb7eea89201a89938306b64df80e4ed25ab2ae,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29801,0,0,723ff24a22f5c35bfa87fba17edbd54dc3241a90618f7407842799030e337d3a,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29802,0,0,f0281d2f4c4f7b33e6995f73ab5f2da2dcad47bf02c650232bfa71db30f560d1,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29803,0,0,ec2d6e8b1de4f1b12189eb4f5f1b8889e432d71bec7878f196027a0271541134,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29804,0,0,e1a5eba48948258de92f35b86a197e4e3725bcb26472341e46a5d04fa4f155f9,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29805,0,0,bbcea86f7733f810b3280a0692ef470761110b7d55b9f4d7c96e636d1e3103b5,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29806,0,0,1fa0a4d7bcdf174f5850cd4be365ca5b2be71d8963cf745f412aed7bbc2ec06e,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29807,0,0,a70ed7c03cde5e433e6ebe101af7f7df5552bde53453625634bd6b408cd95fdb,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29808,0,0,1a083356e9d0f501470cdfed0d1c85987d8c8667e4684d7b2ae73ab2fb9e2d44,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29809,0,0,21a6514e4479b2af7c07059597ccbdef1cddc762bb223c6efd7d97d6a6cee8d3,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2981,1,1,63fba9d2c68cd2879c505cf8d50b9a3caeb150f5fed9881fb4066302e315473c,2024-03-27T15:49:41.437000
|
||||
CVE-2024-2981,0,0,63fba9d2c68cd2879c505cf8d50b9a3caeb150f5fed9881fb4066302e315473c,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29810,0,0,eff91a2f0d80ceae6d9d4c914195c5a044b82fbe1cafb4a26b6b9c2e1aa693cf,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29811,0,1,484b9a978cf4458e6a6cd3e1d014b1a9b41a0d8478a1a8ee658320929485e4c5,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29812,0,1,eea488bae5a3bc74c00dca82c435160bacb5f5ae567985445e1e1039cfede973,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29811,0,0,484b9a978cf4458e6a6cd3e1d014b1a9b41a0d8478a1a8ee658320929485e4c5,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29812,0,0,eea488bae5a3bc74c00dca82c435160bacb5f5ae567985445e1e1039cfede973,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29813,0,0,b92c8b4b8dc44fdf902974ed6bdae2df7d58513146055d3aee69855a4f40f773,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29814,0,0,066a243dd0997d380d27eb89de10396940c1484c7e51310d2de950a5d930462b,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29815,0,0,e474045fee5a994704d14c9b91da0090703e8eef80577b15658e4496608af879,2024-03-27T12:29:30.307000
|
||||
@ -242924,18 +242944,21 @@ CVE-2024-29816,0,0,26098ad42810abc782a6312323b3749848e728c068871f3a8e562ffd3827f
|
||||
CVE-2024-29817,0,0,b9d7d90bcba101b5bf99517f691b068a1efc5e5e388d754e386eca951d336d45,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29818,0,0,44af120b55fc277e2559e8317cff590953d75564f18e5cdb1a3adef98c7f6fa2,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29819,0,0,489085f50dbde78feed33cc0a68fd671c989aac2e872d0b30a126d7fff3447e6,2024-03-27T12:29:30.307000
|
||||
CVE-2024-2982,1,1,477f547330f0ab08e6d21faee4dc47be09f9639ddaea8955ea45d08f1c1fd24f,2024-03-27T16:15:10.210000
|
||||
CVE-2024-2982,0,1,dda049ea5d2486c6f2bdb234a1dfc5a467a2381ac2f931408cf9328cd77cd76d,2024-03-27T17:48:21.140000
|
||||
CVE-2024-29820,0,0,da81473ce6ac9b7a0c8169d0e94b81abe513c85a432f3965c234ec8d7d8b927f,2024-03-27T12:29:30.307000
|
||||
CVE-2024-2983,1,1,3798275594497c10345a0244007437a821bd5cea22741ef9c039b13c5b602bb7,2024-03-27T16:15:10.450000
|
||||
CVE-2024-2983,0,1,873ca2d79b54162cace8ca3da7294f22ebfacbb79289c971b5f392cd577e4689,2024-03-27T17:48:21.140000
|
||||
CVE-2024-29832,0,0,e21971089d12a8b67bd5dc57f7dea93be0cc79e81378beb3ae2f03d4ff6e4c14,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29833,0,0,4c9a8c532b47162f5aea1ac06e294c5bbf9e597d7d17a1d16e86b5dc1293a53a,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2984,1,1,82a30415ede29bd42a5fc32bfdc177889cae7d7e274f41d7b410438a4a7a2ef8,2024-03-27T16:15:10.713000
|
||||
CVE-2024-2984,0,1,2d375aee96f2c9f8a84e53391976f555aaa90b5661a5979b39e2ea2d3b374caf,2024-03-27T17:48:21.140000
|
||||
CVE-2024-2985,1,1,d2c440a5fe0f8e92f2900a5671fbef483e2af166b02191dac0aceb0548aa2911,2024-03-27T17:48:21.140000
|
||||
CVE-2024-29858,0,0,585719d860c91771e96e52d882eed744121f21e899f727afe6b381f4ffbb308d,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29859,0,0,6ebff5730a73f542ffebf0a56f74146bb69314ac3f95118519ec4b678666f245,2024-03-21T12:58:51.093000
|
||||
CVE-2024-2986,1,1,c77fe7aa4ac5882d2496045c16279acb6d3f21728c12d35e86b894b6435b955d,2024-03-27T17:48:21.140000
|
||||
CVE-2024-29862,0,0,78f62d6320f790cb50cb5767943bbca91d7f9763b83315a1495201af3fd41026,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29864,0,0,3c9560ffae0fa16acac4cf8327bf4ae3182996a8c684b25430908ed832b73c71,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29865,0,0,e24c5786380c2695525e4e2d9b0d8cb3d2e21b4351c584a8032e8ded5e6f9da9,2024-03-22T15:34:43.663000
|
||||
CVE-2024-29866,0,0,d3474a4cb7339082dcfbd889d056a2a906f051d7c933d6576013f44ee70632b2,2024-03-21T15:24:35.093000
|
||||
CVE-2024-2987,1,1,b4986bea0aba6f48be24f8f454c5e35bb2f698d582004b815160c33ab9e532b1,2024-03-27T17:48:21.140000
|
||||
CVE-2024-29870,0,0,04eec461d26d3928388aa1ebeda7f3889d70d7fb805b862b11fc37cdb9c73805,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29871,0,0,e7b820291fe87f3c68126b9e66a3cb2071635a1781039b23d1340b3ec50d7104,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29872,0,0,2ed0e31c2aeb7a79b11a328bd37ec6ac592cb7ae8ad49b21b1fd6587d921da01,2024-03-21T15:24:35.093000
|
||||
@ -242946,9 +242969,11 @@ CVE-2024-29876,0,0,81e9b92db68fe1869c86668a1e00f2a9ff624f59839df1fbe18d8e987774c
|
||||
CVE-2024-29877,0,0,5b6a7271e346dceec62c9141f9ae12b0e5342a31cc26366c653fe20c26c8bc21,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29878,0,0,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dda8d,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000
|
||||
CVE-2024-2988,1,1,44a505017c98ed38c8d5dc5d8e011605d3c9f7895e5eca811eae32b18fc8f7bb,2024-03-27T18:15:10.757000
|
||||
CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29881,0,0,7eaff78a6eecd508372203508f2ecab97ebc62cfd94b7af6101b5d7b6ca209b2,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29883,0,0,2444d321a867d6f4cdf63bf8a1bc6af3b407752f2134c1f64a1d02545242c426,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2989,1,1,28b7dcd865137d9f2b8b08b53206e10e337ffacc5ed400750f6a854bac66dab1,2024-03-27T18:15:11.293000
|
||||
CVE-2024-29906,0,0,5e6afa8dbe77b2ceaee29629c66d8bdf273caddf4f38f955d682aeefe9beab4c,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29907,0,0,95ebf1e66704307f93559559f18923b10f644f7f3c6486fedede31060b34f004,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29908,0,0,e8d16098eaf081188862f8dc959904187f56568ff6eac559fa0228e1e293cd7d,2024-03-27T12:29:30.307000
|
||||
@ -242982,6 +243007,8 @@ CVE-2024-29935,0,0,be0415ab39e2424d7707b3e026043937bddf40f9f881b75f312fe4db29a75
|
||||
CVE-2024-29936,0,0,a0aa951ea6a61ca1da8503010b43db132d71646708e0e57d95e11fe2a44ec10b,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29943,0,0,39d573a490fc5d2b219e8af270d3feeff9aa72e4341ddd52f10b0ddfa677f78e,2024-03-22T15:34:43.663000
|
||||
CVE-2024-29944,0,0,4d21f9c7c1ab1ff30cce77b261f7b06b8e28526248b968d986726dab452f24fc,2024-03-25T17:15:51.670000
|
||||
CVE-2024-29945,1,1,97b7c829f41e6375bb757d6df21152ea8c651e9cee7b85bf8ce197c3feb776e6,2024-03-27T17:48:21.140000
|
||||
CVE-2024-29946,1,1,1dcd38a0ed008144b587f71b29e9f0373aec4787ad19668521370ecc593e8a2d,2024-03-27T17:48:21.140000
|
||||
CVE-2024-30156,0,0,aff0cd27a6d4ebd55e03f44f61cc23ee9163e094843acbac5af736e684ab9391,2024-03-25T01:51:01.223000
|
||||
CVE-2024-30161,0,0,f6d00094643508d05d1e5626fca4ef83c82ab69ba4696adb329c49eff6d0ab4a,2024-03-25T01:51:01.223000
|
||||
CVE-2024-30177,0,0,ce7cec2fca67508ea4a8b86ac0339410ad9c9cb05c2afad1960db626913e7789,2024-03-27T12:29:30.307000
|
||||
@ -243013,4 +243040,4 @@ CVE-2024-30232,0,0,f91ac1a16b6560e63a231b2b02f73b0e579de91231d5661b2fdb0493e2d31
|
||||
CVE-2024-30233,0,0,4c2695d2f3b076c7408bd91fee17c2a607f64636c8c0001f359b0796de1d2054,2024-03-26T17:09:53.043000
|
||||
CVE-2024-30234,0,0,a6be244378f8a1646e756d1cd111fc8fb568601f74deb65508c56b004a03b137,2024-03-26T17:09:53.043000
|
||||
CVE-2024-30235,0,0,ef6f7f84deca979173abd2d122dde5dfb4f5568a80e848e8fa95eae1319c946f,2024-03-26T17:09:53.043000
|
||||
CVE-2024-30238,0,1,33e85580fdd0a4e3fa2eff1ee3b65f63c015d9c54bc4af4192eb2ee2204281b7,2024-03-27T15:49:41.437000
|
||||
CVE-2024-30238,0,0,33e85580fdd0a4e3fa2eff1ee3b65f63c015d9c54bc4af4192eb2ee2204281b7,2024-03-27T15:49:41.437000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user