Auto-Update: 2024-03-27T19:00:37.713009+00:00

This commit is contained in:
cad-safe-bot 2024-03-27 19:03:28 +00:00
parent 9ca3e5e641
commit 625ac53827
35 changed files with 1885 additions and 160 deletions

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-0582",
"sourceIdentifier": "psirt@forgerock.com",
"published": "2024-03-27T18:15:08.237",
"lastModified": "2024-03-27T18:15:08.237",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ForgeRock Access Management allows Authorization Bypass.\n\nThis issue affects access management: before 7.3.0, before 7.2.1, before 7.1.4, through 7.0.2.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@forgerock.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "psirt@forgerock.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://backstage.forgerock.com/downloads/browse/am/featured",
"source": "psirt@forgerock.com"
},
{
"url": "https://backstage.forgerock.com/knowledge/kb/article/a64088600",
"source": "psirt@forgerock.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5189",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-11-14T23:15:12.290",
"lastModified": "2023-12-13T10:15:10.110",
"lastModified": "2024-03-27T18:15:08.710",
"vulnStatus": "Modified",
"descriptions": [
{
@ -97,6 +97,10 @@
"url": "https://access.redhat.com/errata/RHSA-2023:7773",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1536",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-5189",
"source": "secalert@redhat.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1540",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-03-27T16:15:09.963",
"lastModified": "2024-03-27T16:15:09.963",
"vulnStatus": "Received",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1580",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2024-02-19T11:15:08.817",
"lastModified": "2024-03-26T00:15:08.497",
"lastModified": "2024-03-27T18:15:09.063",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -51,6 +51,30 @@
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/36",
"source": "cve-coordination@google.com"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/37",
"source": "cve-coordination@google.com"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/38",
"source": "cve-coordination@google.com"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/39",
"source": "cve-coordination@google.com"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/40",
"source": "cve-coordination@google.com"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/41",
"source": "cve-coordination@google.com"
},
{
"url": "https://code.videolan.org/videolan/dav1d/-/blob/master/NEWS",
"source": "cve-coordination@google.com"

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-20259",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-03-27T17:15:50.913",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to a crafted IPv4 DHCP request packet being mishandled when endpoint analytics are enabled. An attacker could exploit this vulnerability by sending a crafted DHCP request through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.\r\n\r Note: The attack vector is listed as network because a DHCP relay anywhere on the network could allow exploits from networks other than the adjacent one."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dhcp-dos-T3CXPO9z",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-20265",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-03-27T17:15:51.113",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the boot process of Cisco Access Point (AP) Software could allow an unauthenticated, physical attacker to bypass the Cisco Secure Boot functionality and load a software image that has been tampered with on an affected device.\r\n\r This vulnerability exists because unnecessary commands are available during boot time at the physical console. An attacker could exploit this vulnerability by interrupting the boot process and executing specific commands to bypass the Cisco Secure Boot validation checks and load an image that has been tampered with. This image would have been previously downloaded onto the targeted device. A successful exploit could allow the attacker to load the image once. The Cisco Secure Boot functionality is not permanently compromised."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-501"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-secureboot-bypass-zT5vJkSD",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-20271",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-03-27T17:15:51.320",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the IP packet processing of Cisco Access Point (AP) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to insufficient input validation of certain IPv4 packets. An attacker could exploit this vulnerability by sending a crafted IPv4 packet either to or through an affected device. A successful exploit could allow the attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition. To successfully exploit this vulnerability, the attacker does not need to be associated with the affected AP. This vulnerability cannot be exploited by sending IPv6 packets."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-dos-h9TGGX6W",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-20276",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-03-27T17:15:51.513",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Cisco IOS Software for Cisco Catalyst 6000 Series Switches could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly.\r\n\r This vulnerability is due to improper handling of process-switched traffic. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-248"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-dos-Hq4d3tZG",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-20278",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-03-27T17:15:51.703",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the NETCONF feature of Cisco IOS XE Software could allow an authenticated, remote attacker to elevate privileges to root on an affected device.\r\n\r This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input over NETCONF to an affected device. A successful exploit could allow the attacker to elevate privileges from Administrator to root."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-184"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-seAx6NLX",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-20303",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-03-27T17:15:51.880",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the multicast DNS (mDNS) gateway feature of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper management of mDNS client entries. An attacker could exploit this vulnerability by connecting to the wireless network and sending a continuous stream of specific mDNS packets. A successful exploit could allow the attacker to cause the wireless controller to have high CPU utilization, which could lead to access points (APs) losing their connection to the controller and result in a DoS condition."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-459"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-mdns-dos-4hv6pBGf",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-20306",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-03-27T17:15:52.067",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Unified Threat Defense (UTD) configuration CLI of Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying host operating system. To exploit this vulnerability, an attacker must have level 15 privileges on the affected device. \r\n\r This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by submitting a crafted CLI command to an affected device. A successful exploit could allow the attacker to execute arbitrary commands as root on the underlying operating system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-233"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-utd-cmd-JbL8KvHT",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-20307",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-03-27T18:15:09.357",
"lastModified": "2024-03-27T18:15:09.357",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a heap overflow, resulting in an affected device reloading.\r\n\r This vulnerability exists because crafted, fragmented IKEv1 packets are not properly reassembled. An attacker could exploit this vulnerability by sending crafted UDP packets to an affected system. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.\r\n\r Note: Only traffic that is directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev1-NO2ccFWz",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-20308",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-03-27T18:15:09.853",
"lastModified": "2024-03-27T18:15:09.853",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a heap underflow, resulting in an affected device reloading.\r\n\r This vulnerability exists because crafted, fragmented IKEv1 packets are not properly reassembled. An attacker could exploit this vulnerability by sending crafted UDP packets to an affected system. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.\r\n\r Note: Only traffic that is directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic.."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev1-NO2ccFWz",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-20309",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-03-27T17:15:52.260",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in auxiliary asynchronous port (AUX) functions of Cisco IOS XE Software could allow an authenticated, local attacker to cause an affected device to reload or stop responding.\r\n\r This vulnerability is due to the incorrect handling of specific ingress traffic when flow control hardware is enabled on the AUX port. An attacker could exploit this vulnerability by reverse telnetting to the AUX port and sending specific data after connecting. A successful exploit could allow the attacker to cause the device to reset or stop responding, resulting in a denial of service (DoS) condition."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.1,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-828"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aux-333WBz8f",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-20311",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-03-27T17:15:52.463",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Locator ID Separation Protocol (LISP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload.\r\n\r This vulnerability is due to the incorrect handling of LISP packets. An attacker could exploit this vulnerability by sending a crafted LISP packet to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.\r\n\r Note: This vulnerability could be exploited over either IPv4 or IPv6 transport."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-674"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lisp-3gYXs3qP",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-20312",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-03-27T17:15:52.690",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) protocol of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to insufficient input validation when parsing an ingress IS-IS packet. An attacker could exploit this vulnerability by sending a crafted IS-IS packet to an affected device after forming an adjacency. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.\r\n\r Note: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2-adjacent to the affected device and have formed an adjacency."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-isis-sGjyOUHX",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-20314",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-03-27T17:15:52.920",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the IPv4 Software-Defined Access (SD-Access) fabric edge node feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause high CPU utilization and stop all traffic processing, resulting in a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to improper handling of certain IPv4 packets. An attacker could exploit this vulnerability by sending certain IPv4 packets to an affected device. A successful exploit could allow the attacker to cause the device to exhaust CPU resources and stop processing traffic, resulting in a DoS condition."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-783"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-sda-edge-dos-qZWuWXWG",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-20316",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-03-27T17:15:53.110",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the data model interface (DMI) services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to access resources that should have been protected by a configured IPv4 access control list (ACL).\r\n\r This vulnerability is due to improper handling of error conditions when a successfully authorized device administrator updates an IPv4 ACL using the NETCONF or RESTCONF protocol, and the update would reorder access control entries (ACEs) in the updated ACL. An attacker could exploit this vulnerability by accessing resources that should have been protected across an affected device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-390"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dmi-acl-bypass-Xv8FO8Vz",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-20324",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-03-27T17:15:53.293",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, low-privileged, local attacker to access WLAN configuration details including passwords.\r\n\r This vulnerability is due to improper privilege checks. An attacker could exploit this vulnerability by using the show and show tech wireless CLI commands to access configuration details, including passwords. A successful exploit could allow the attacker to access configuration details that they are not authorized to access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-274"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-wlc-privesc-RjSMrmPK",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-20333",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-03-27T17:15:53.480",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an authenticated, remote attacker to change specific data within the interface on an affected device.\r\n\r This vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to change a specific field within the web-based management interface, even though they should not have access to change that field."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccc-authz-bypass-5EKchJRb",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-20354",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-03-27T17:15:53.660",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the handling of encrypted wireless frames of Cisco Aironet Access Point (AP) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device.\r\n\r This vulnerability is due to incomplete cleanup of resources when dropping certain malformed frames. An attacker could exploit this vulnerability by connecting as a wireless client to an affected AP and sending specific malformed frames over the wireless connection. A successful exploit could allow the attacker to cause degradation of service to other clients, which could potentially lead to a complete DoS condition."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-460"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-ap-dos-PPPtcVW",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-23450",
"sourceIdentifier": "bressers@elastic.co",
"published": "2024-03-27T17:15:53.857",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A flaw was discovered in Elasticsearch, where processing a document in a deeply nested pipeline on an ingest node could cause the Elasticsearch node to crash."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "bressers@elastic.co",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "bressers@elastic.co",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://discuss.elastic.co/t/elasticsearch-8-13-0-7-17-19-security-update-esa-2024-06/356314",
"source": "bressers@elastic.co"
},
{
"url": "https://www.elastic.co/community/security",
"source": "bressers@elastic.co"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23451",
"sourceIdentifier": "bressers@elastic.co",
"published": "2024-03-27T18:15:10.330",
"lastModified": "2024-03-27T18:15:10.330",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Incorrect Authorization issue exists in the API key based security model for Remote Cluster Security, which is currently in Beta, in Elasticsearch 8.10.0 and before 8.13.0. This allows a\u00a0malicious user with a valid API key for a remote cluster configured to use the new Remote Cluster Security to read arbitrary documents from any index on the remote cluster, and only if they use the Elasticsearch custom transport protocol to issue requests with the target index ID, the shard ID and the document ID. None of Elasticsearch REST API endpoints are affected by this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "bressers@elastic.co",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "bressers@elastic.co",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://discuss.elastic.co/t/elasticsearch-8-13-0-security-update-esa-2024-07/356315",
"source": "bressers@elastic.co"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-29945",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-03-27T17:15:54.087",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the software potentially exposes authentication tokens during the token validation process. This exposure happens when either Splunk Enterprise runs in debug mode or the JsonWebToken component has been configured to log its activity at the DEBUG logging level."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-0301",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-29946",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-03-27T17:15:54.273",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the Dashboard Examples Hub in the Splunk Dashboard Studio app lacks protections for risky SPL commands. This could let attackers bypass SPL safeguards for risky commands in the Hub. The vulnerability would require the attacker to phish the victim by tricking them into initiating a request within their browser."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-0302",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2982",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-27T16:15:10.210",
"lastModified": "2024-03-27T16:15:10.210",
"vulnStatus": "Received",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2983",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-27T16:15:10.450",
"lastModified": "2024-03-27T16:15:10.450",
"vulnStatus": "Received",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2984",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-27T16:15:10.713",
"lastModified": "2024-03-27T16:15:10.713",
"vulnStatus": "Received",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-2985",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-27T17:15:54.460",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has been declared as critical. This vulnerability affects the function formQuickIndex of the file /goform/QuickIndex. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258154 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formQuickIndex.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.258154",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.258154",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.301276",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-2986",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-27T17:15:54.693",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has been rated as critical. This issue affects the function formSetSpeedWan of the file /goform/SetSpeedWan. The manipulation of the argument speed_dir leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258155. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/SetSpeedWan.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.258155",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.258155",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.301284",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-2987",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-27T17:15:54.917",
"lastModified": "2024-03-27T17:48:21.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Tenda FH1202 1.2.0.14(408). Affected is the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument mac leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258156. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/GetParentControlInfo.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.258156",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.258156",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.301285",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-2988",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-27T18:15:10.757",
"lastModified": "2024-03-27T18:15:10.757",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in Tenda FH1203 2.0.1.6. Affected by this vulnerability is the function fromSetRouteStatic of the file /goform/fromRouteStatic. The manipulation of the argument entrys leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258157 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromSetRouteStatic.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.258157",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.258157",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.301363",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-2989",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-27T18:15:11.293",
"lastModified": "2024-03-27T18:15:11.293",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in Tenda FH1203 2.0.1.6. Affected by this issue is the function fromNatStaticSetting of the file /goform/NatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-258158 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromNatStaticSetting.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.258158",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.258158",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.301364",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-27T17:00:39.052121+00:00
2024-03-27T19:00:37.713009+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-27T16:15:10.713000+00:00
2024-03-27T18:15:11.293000+00:00
```
### Last Data Feed Release
@ -33,50 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
243015
243042
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `27`
- [CVE-2024-1540](CVE-2024/CVE-2024-15xx/CVE-2024-1540.json) (`2024-03-27T16:15:09.963`)
- [CVE-2024-2980](CVE-2024/CVE-2024-29xx/CVE-2024-2980.json) (`2024-03-27T15:15:48.420`)
- [CVE-2024-2981](CVE-2024/CVE-2024-29xx/CVE-2024-2981.json) (`2024-03-27T15:15:48.643`)
- [CVE-2024-2982](CVE-2024/CVE-2024-29xx/CVE-2024-2982.json) (`2024-03-27T16:15:10.210`)
- [CVE-2024-2983](CVE-2024/CVE-2024-29xx/CVE-2024-2983.json) (`2024-03-27T16:15:10.450`)
- [CVE-2024-2984](CVE-2024/CVE-2024-29xx/CVE-2024-2984.json) (`2024-03-27T16:15:10.713`)
- [CVE-2024-20265](CVE-2024/CVE-2024-202xx/CVE-2024-20265.json) (`2024-03-27T17:15:51.113`)
- [CVE-2024-20271](CVE-2024/CVE-2024-202xx/CVE-2024-20271.json) (`2024-03-27T17:15:51.320`)
- [CVE-2024-20276](CVE-2024/CVE-2024-202xx/CVE-2024-20276.json) (`2024-03-27T17:15:51.513`)
- [CVE-2024-20278](CVE-2024/CVE-2024-202xx/CVE-2024-20278.json) (`2024-03-27T17:15:51.703`)
- [CVE-2024-20303](CVE-2024/CVE-2024-203xx/CVE-2024-20303.json) (`2024-03-27T17:15:51.880`)
- [CVE-2024-20306](CVE-2024/CVE-2024-203xx/CVE-2024-20306.json) (`2024-03-27T17:15:52.067`)
- [CVE-2024-20307](CVE-2024/CVE-2024-203xx/CVE-2024-20307.json) (`2024-03-27T18:15:09.357`)
- [CVE-2024-20308](CVE-2024/CVE-2024-203xx/CVE-2024-20308.json) (`2024-03-27T18:15:09.853`)
- [CVE-2024-20309](CVE-2024/CVE-2024-203xx/CVE-2024-20309.json) (`2024-03-27T17:15:52.260`)
- [CVE-2024-20311](CVE-2024/CVE-2024-203xx/CVE-2024-20311.json) (`2024-03-27T17:15:52.463`)
- [CVE-2024-20312](CVE-2024/CVE-2024-203xx/CVE-2024-20312.json) (`2024-03-27T17:15:52.690`)
- [CVE-2024-20314](CVE-2024/CVE-2024-203xx/CVE-2024-20314.json) (`2024-03-27T17:15:52.920`)
- [CVE-2024-20316](CVE-2024/CVE-2024-203xx/CVE-2024-20316.json) (`2024-03-27T17:15:53.110`)
- [CVE-2024-20324](CVE-2024/CVE-2024-203xx/CVE-2024-20324.json) (`2024-03-27T17:15:53.293`)
- [CVE-2024-20333](CVE-2024/CVE-2024-203xx/CVE-2024-20333.json) (`2024-03-27T17:15:53.480`)
- [CVE-2024-20354](CVE-2024/CVE-2024-203xx/CVE-2024-20354.json) (`2024-03-27T17:15:53.660`)
- [CVE-2024-23450](CVE-2024/CVE-2024-234xx/CVE-2024-23450.json) (`2024-03-27T17:15:53.857`)
- [CVE-2024-23451](CVE-2024/CVE-2024-234xx/CVE-2024-23451.json) (`2024-03-27T18:15:10.330`)
- [CVE-2024-2985](CVE-2024/CVE-2024-29xx/CVE-2024-2985.json) (`2024-03-27T17:15:54.460`)
- [CVE-2024-2986](CVE-2024/CVE-2024-29xx/CVE-2024-2986.json) (`2024-03-27T17:15:54.693`)
- [CVE-2024-2987](CVE-2024/CVE-2024-29xx/CVE-2024-2987.json) (`2024-03-27T17:15:54.917`)
- [CVE-2024-2988](CVE-2024/CVE-2024-29xx/CVE-2024-2988.json) (`2024-03-27T18:15:10.757`)
- [CVE-2024-2989](CVE-2024/CVE-2024-29xx/CVE-2024-2989.json) (`2024-03-27T18:15:11.293`)
- [CVE-2024-29945](CVE-2024/CVE-2024-299xx/CVE-2024-29945.json) (`2024-03-27T17:15:54.087`)
- [CVE-2024-29946](CVE-2024/CVE-2024-299xx/CVE-2024-29946.json) (`2024-03-27T17:15:54.273`)
### CVEs modified in the last Commit
Recently modified CVEs: `106`
Recently modified CVEs: `6`
- [CVE-2024-29777](CVE-2024/CVE-2024-297xx/CVE-2024-29777.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-2978](CVE-2024/CVE-2024-29xx/CVE-2024-2978.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-29788](CVE-2024/CVE-2024-297xx/CVE-2024-29788.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-29789](CVE-2024/CVE-2024-297xx/CVE-2024-29789.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-2979](CVE-2024/CVE-2024-29xx/CVE-2024-2979.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-29790](CVE-2024/CVE-2024-297xx/CVE-2024-29790.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-29791](CVE-2024/CVE-2024-297xx/CVE-2024-29791.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-29792](CVE-2024/CVE-2024-297xx/CVE-2024-29792.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-29793](CVE-2024/CVE-2024-297xx/CVE-2024-29793.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-29794](CVE-2024/CVE-2024-297xx/CVE-2024-29794.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-29795](CVE-2024/CVE-2024-297xx/CVE-2024-29795.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-29796](CVE-2024/CVE-2024-297xx/CVE-2024-29796.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-29797](CVE-2024/CVE-2024-297xx/CVE-2024-29797.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-29798](CVE-2024/CVE-2024-297xx/CVE-2024-29798.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-29799](CVE-2024/CVE-2024-297xx/CVE-2024-29799.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-29801](CVE-2024/CVE-2024-298xx/CVE-2024-29801.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-29802](CVE-2024/CVE-2024-298xx/CVE-2024-29802.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-29803](CVE-2024/CVE-2024-298xx/CVE-2024-29803.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-29804](CVE-2024/CVE-2024-298xx/CVE-2024-29804.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-29805](CVE-2024/CVE-2024-298xx/CVE-2024-29805.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-29806](CVE-2024/CVE-2024-298xx/CVE-2024-29806.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-29807](CVE-2024/CVE-2024-298xx/CVE-2024-29807.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-29811](CVE-2024/CVE-2024-298xx/CVE-2024-29811.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-29812](CVE-2024/CVE-2024-298xx/CVE-2024-29812.json) (`2024-03-27T15:49:41.437`)
- [CVE-2024-30238](CVE-2024/CVE-2024-302xx/CVE-2024-30238.json) (`2024-03-27T15:49:41.437`)
- [CVE-2023-5189](CVE-2023/CVE-2023-51xx/CVE-2023-5189.json) (`2024-03-27T18:15:08.710`)
- [CVE-2024-1540](CVE-2024/CVE-2024-15xx/CVE-2024-1540.json) (`2024-03-27T17:48:21.140`)
- [CVE-2024-1580](CVE-2024/CVE-2024-15xx/CVE-2024-1580.json) (`2024-03-27T18:15:09.063`)
- [CVE-2024-2982](CVE-2024/CVE-2024-29xx/CVE-2024-2982.json) (`2024-03-27T17:48:21.140`)
- [CVE-2024-2983](CVE-2024/CVE-2024-29xx/CVE-2024-2983.json) (`2024-03-27T17:48:21.140`)
- [CVE-2024-2984](CVE-2024/CVE-2024-29xx/CVE-2024-2984.json) (`2024-03-27T17:48:21.140`)
## Download and Usage

View File

@ -137319,7 +137319,7 @@ CVE-2019-2045,0,0,1705229e4fec9bfd82aef2ac1bb1c2832b7fc423971d0092d9264e10cc6fd5
CVE-2019-20451,0,0,4d0762291a44e046795f84a4a06312ecbbc433e327a7f1e0d5459472a5e8f6f6,2021-09-09T17:41:35.163000
CVE-2019-20452,0,0,1f4817a23fd44e7988cfa9a7e5714919e1f832aa5a7fdf2840e96e68b57f31cb,2020-08-24T17:37:01.140000
CVE-2019-20453,0,0,f7bfb81c36b8409e27bcfd752ebe01abba843256421a0d4b2f525ac7e95541d5,2020-08-24T17:37:01.140000
CVE-2019-20454,0,1,c2543304793955f430a64b58f46bed16bf5f70f7299b4671d92d021d0fd8dc76,2024-03-27T16:05:17.853000
CVE-2019-20454,0,0,c2543304793955f430a64b58f46bed16bf5f70f7299b4671d92d021d0fd8dc76,2024-03-27T16:05:17.853000
CVE-2019-20455,0,0,020f23034a46cfcbb565c99a2d99878424784e7d74607830136b187ff274b046,2024-02-14T01:17:43.863000
CVE-2019-20456,0,0,f5478a7543aa47e5bb933cc310b3647eb2820951f2995f375bdbe4dff39f90a0,2020-02-26T15:10:12.293000
CVE-2019-2046,0,0,5a99507a8351f8e058070df1d46e5e4a8733b86f79bb1d0063ca3a86c67d1bff,2021-07-21T11:39:23.747000
@ -137722,7 +137722,7 @@ CVE-2019-20834,0,0,2f046198ffab2ceb1fc7e73446b82a9822085609cdbb82469e2699c1c960f
CVE-2019-20835,0,0,4e5523f899e61855d812ac2a1e43101d0993f92a1e0e689e05361cb59d2b2e6b,2020-06-05T16:28:06.647000
CVE-2019-20836,0,0,884b3ca5bb0fe09112ce82a99226cd4cee13d30147b25af155e4811fdc80bdb3,2020-06-05T16:15:58.883000
CVE-2019-20837,0,0,1327025412446e71b0bb00c2f3d6721de4beba338c3d8c9d7bf39b7f128a72d7,2020-06-05T16:29:52.857000
CVE-2019-20838,0,1,ae85425ffe9a90e620e01fbb5f6fb3ec72934f3c2a72308ebfe16b79353d78e2,2024-03-27T16:05:46.553000
CVE-2019-20838,0,0,ae85425ffe9a90e620e01fbb5f6fb3ec72934f3c2a72308ebfe16b79353d78e2,2024-03-27T16:05:46.553000
CVE-2019-20839,0,0,fff52c25682d0f6d7e1c0e14768f63c2c904e37343a8044d7831bcbfd024b515,2023-11-07T03:09:13.630000
CVE-2019-2084,0,0,5e601ed0ca8bcc9033586975ff4fc6e7b2f7b5d3ef91eec06b110cebd1d7ad51,2019-10-01T13:30:46.273000
CVE-2019-20840,0,0,aefbc83031592623633897c2f9cdcd0ba991e172c26249b04dbed70dd6ecd9ed,2023-11-07T03:09:13.720000
@ -148884,7 +148884,7 @@ CVE-2020-14151,0,0,9ffddf0999e3d6a8a75e114bd5964acf118fd9c17127d60bccf0e39641478
CVE-2020-14152,0,0,57e3f0cecf7bf86bfe5da88a7620e56351963f06700f63c35b8f5171187e3849,2023-02-27T18:17:27.037000
CVE-2020-14153,0,0,237e4355f1b9bc09eda761245741f1003a98ac0666084ce326343a58b8dbcc5e,2023-02-27T18:18:36.527000
CVE-2020-14154,0,0,03dc2a851685fd84058c57da71b4b3e059b96f8634c99ac94cc109d7b722276a,2023-03-01T16:01:38.367000
CVE-2020-14155,0,1,71383f8981e2e521d3a64705adf0ac7a332883e698a288bb87a7e3df9703cdba,2024-03-27T16:04:48.863000
CVE-2020-14155,0,0,71383f8981e2e521d3a64705adf0ac7a332883e698a288bb87a7e3df9703cdba,2024-03-27T16:04:48.863000
CVE-2020-14156,0,0,926f8b5c9a479e61c041a7ec2f5fb4b4fef427878be695f5f18dd7586db5dc89,2020-06-22T18:33:42.990000
CVE-2020-14157,0,0,ec6714662b4fd251e84456bfdef37480a0d5b708cceace12ae5070f687b701b6,2021-07-21T11:39:23.747000
CVE-2020-14158,0,0,257c62d2d59f801f636fda0a5316dad846b25cbce009f7e0efa72f1cac35ab1c,2020-08-05T14:37:36.397000
@ -162959,7 +162959,7 @@ CVE-2020-8165,0,0,b90f56eef4d394caafda41afeb1888db8d9e5be27c35ede9be39154ac6db31
CVE-2020-8166,0,0,47c3904ebbdd2a5d9a1995acdeafdcc0912b1b4a1c6f035b0f63ad505e021cdf,2020-11-20T17:47:47.463000
CVE-2020-8167,0,0,6d3767d0ff1146a65240741c1692557c5e3379cf0dd5883c168490dc71b44892,2021-10-21T14:35:21.047000
CVE-2020-8168,0,0,ccb8c7a6475759104f1711b3a83fc1942ad048ad01cf973341e84f4b01e9b3dd,2023-11-07T03:26:17.750000
CVE-2020-8169,0,1,5c99b47230440422d8b435273484301a874fd5e619e3cc621c9255024327f19b,2024-03-27T16:04:23.890000
CVE-2020-8169,0,0,5c99b47230440422d8b435273484301a874fd5e619e3cc621c9255024327f19b,2024-03-27T16:04:23.890000
CVE-2020-8170,0,0,c93bdaef62335dd3a34e497b1610bbed4f1531f0cdc62596c702d97cf7316ed2,2020-05-28T20:03:07.140000
CVE-2020-8171,0,0,645a1ab3b96b9928f218f2a9a5fca0f8e8167d5a980ea9eeeaf49fee58513164,2020-05-28T20:00:03.527000
CVE-2020-8172,0,0,aa60f1cb50e023b6bcefad51394fa465cda46ac1817e5b5ccf939eaf3ce619c5,2022-05-12T15:01:02.140000
@ -162967,7 +162967,7 @@ CVE-2020-8173,0,0,34ceedff128c979f4774d29c75bd8a1e6c39839074dee16b306c28f746c7ce
CVE-2020-8174,0,0,ac6b23e6b056d5a60f6974c777b55f9bb43d28eb7261a72f0325944e6fa3d8f6,2022-05-12T15:01:21.717000
CVE-2020-8175,0,0,7c8b3c608d62151b045b3bb4fdf28e38a67da6066b16b2a4582925c6150ce840,2020-07-27T17:54:05.343000
CVE-2020-8176,0,0,4a4c8126c4dcf74ee9d176934e967067a7bb58ed770baed0696fedbbcf0cd9a3,2020-07-10T19:30:40.273000
CVE-2020-8177,0,1,349339cb813587dce0e4231c21f8a34d831e8d889fe95ab7ae85eb5b183170d8,2024-03-27T16:04:20.437000
CVE-2020-8177,0,0,349339cb813587dce0e4231c21f8a34d831e8d889fe95ab7ae85eb5b183170d8,2024-03-27T16:04:20.437000
CVE-2020-8178,0,0,81183e0e8c36d4d786b7e3a77c245d153eb61d8171589dd60b01f990fe023e7b,2020-07-21T12:36:01.557000
CVE-2020-8179,0,0,935857d37fccce66d998380d30e28774b93fb272a89f5be8703042a361a65e66,2020-07-08T15:18:11.680000
CVE-2020-8180,0,0,8cb081c94bf954092880caba93d685420308ab45526f3938b72742d9685a0bb4,2020-06-11T18:10:23.393000
@ -163021,7 +163021,7 @@ CVE-2020-8227,0,0,3b78fe266dffb4032d2b4e32d9ef3476c07b68b63646b25b0f1292cb88f6cc
CVE-2020-8228,0,0,51f515d27850dd37c61ce5207f1b36b53947b36f17faa52faecdff4b8377a4a1,2020-10-20T18:56:06.573000
CVE-2020-8229,0,0,08777f070fbcde0d30b96edeece4f672522bb23e5cbc11f4f79f873314073641,2022-09-27T16:00:41.497000
CVE-2020-8230,0,0,2f0be1134ef3c6182aa36f6843e120f2dbc96fb6cf2b7c6eaaa30173af344e84,2022-09-27T15:55:38.753000
CVE-2020-8231,0,1,9446a1e9744263543f370599c1337460d7eb0d0cefd89d7b92a552fc6be71363,2024-03-27T16:04:17.597000
CVE-2020-8231,0,0,9446a1e9744263543f370599c1337460d7eb0d0cefd89d7b92a552fc6be71363,2024-03-27T16:04:17.597000
CVE-2020-8232,0,0,a9c7f9a40f8c8864a7e3d701a0e990044acd6299147e74baf1d5d5f48bba2b7a,2021-09-23T13:57:02.790000
CVE-2020-8233,0,0,a7c70cae7ff9ea797af45a8e6bf71362a6e567e5946f869c3d5abdb997855221,2022-05-24T17:03:55.223000
CVE-2020-8234,0,0,0ecda2f78c5958b8d082e21a2aedcafa2a5797fa89f53e9fcdbc3e7f5b196655,2023-11-07T03:26:18.827000
@ -163073,9 +163073,9 @@ CVE-2020-8280,0,0,8d5f0a3c05bd32b92e1a858a83594675a405cccfedeb61c86c6b0f4a117866
CVE-2020-8281,0,0,7b0fbce8746c448976b5242155b86de40c6c79f6aef5f735ac25b73023022b1a,2021-01-11T17:39:01.227000
CVE-2020-8282,0,0,8222c1643818edd8f6af8739cd00802cafdf09f4420f884c84232b750c7a9ce4,2020-12-16T15:41:49.850000
CVE-2020-8283,0,0,27005cdc68403e5c13995e8fdafcca44a2c6dc4c7d8c8e52cb9054d9aec06275,2020-12-17T18:45:00.930000
CVE-2020-8284,0,1,d48f38208932ba541cfea5b7fe90f4f148d2ce5c7905914cff47a907a00825af,2024-03-27T15:50:07.387000
CVE-2020-8285,0,1,c3522f16bed2fee4b17164c0cd5d5a93552cd535d4c4756a633db3011ffa406c,2024-03-27T15:47:57.647000
CVE-2020-8286,0,1,a02fcb8742fe23470beab7341e4d5bc8102e3b0e9656dfa9fa789b059c0b5ddf,2024-03-27T15:47:53.600000
CVE-2020-8284,0,0,d48f38208932ba541cfea5b7fe90f4f148d2ce5c7905914cff47a907a00825af,2024-03-27T15:50:07.387000
CVE-2020-8285,0,0,c3522f16bed2fee4b17164c0cd5d5a93552cd535d4c4756a633db3011ffa406c,2024-03-27T15:47:57.647000
CVE-2020-8286,0,0,a02fcb8742fe23470beab7341e4d5bc8102e3b0e9656dfa9fa789b059c0b5ddf,2024-03-27T15:47:53.600000
CVE-2020-8287,0,0,49a08588ed5b600c0a1dd7fd9f5faae9c0e4ddd142e8c3d1feda2c223f49818f,2023-11-07T03:26:19.870000
CVE-2020-8288,0,0,b0824b7a38b5f17525fb96fd83bb8be5d6d553292e795764d879457314ab7a3e,2021-02-01T15:31:43.600000
CVE-2020-8289,0,0,c14da3e86fd5ce60216301b1e5350cc462897aac50f7af592f55008c44fd2d61,2020-12-31T19:04:39.117000
@ -168944,7 +168944,7 @@ CVE-2021-22872,0,0,b5374c75cf52173069742df9932b16f3b48df418bcc8bce07737040217b3d
CVE-2021-22873,0,0,151b01066b491a5d4fdbb1cf5af054bb65ff50d7128e043ad61d55a2cb1dd4f5,2021-02-02T15:09:34.250000
CVE-2021-22874,0,0,1ce3a63dfe6ef7545b98b97473516dd45fa986322bfe405209f2cfb2fff0f431,2021-01-29T00:33:14.217000
CVE-2021-22875,0,0,5972e538cca49d2dab14de25fc021bd84962446b27e9e851f91860a6be14e55a,2021-01-29T00:34:11.237000
CVE-2021-22876,0,1,635332ad1f2e8c939d1336401f65b12220e00ac3b929f0fc7f45bbf076316cbe,2024-03-27T15:47:49.590000
CVE-2021-22876,0,0,635332ad1f2e8c939d1336401f65b12220e00ac3b929f0fc7f45bbf076316cbe,2024-03-27T15:47:49.590000
CVE-2021-22877,0,0,d00f745ea4e6955be0d21c2b3581cc251c5387efdc342004d5fd1b051a534600,2023-11-07T03:30:27.240000
CVE-2021-22878,0,0,a397005e6377fa8af698364fc7863f02965632978142467d10d498bfb5ec781b,2023-11-07T03:30:27.327000
CVE-2021-22879,0,0,20824c00df9bf493afe91eb2a7b2a5f67eedca0b2dbccbe3e6d4b48552ed7023,2023-11-07T03:30:27.393000
@ -168960,19 +168960,19 @@ CVE-2021-22887,0,0,b2fa7c63bdd19b54dc86ebdd10536c3f921ebb88d0726027644261e221041
CVE-2021-22888,0,0,ddf077ad7028415ff9feadf75a6d2804bf094969bc5cd0965f8f5541a1a59d72,2021-03-27T02:44:16.250000
CVE-2021-22889,0,0,86cd09cb795d6cf361c193c51bdba63af652cf09deac6863d564318021b9f94a,2021-03-27T02:46:12.017000
CVE-2021-2289,0,0,a94497e362293b07d63c1e24b9ab43d924b97fff21751187f0d37f432ecc4f17,2021-04-29T20:48:33.577000
CVE-2021-22890,0,1,6e90c8900d2275195296c2294321949788f61b3ba7e5b3a3553ee48037ff4897,2024-03-27T15:47:45.160000
CVE-2021-22890,0,0,6e90c8900d2275195296c2294321949788f61b3ba7e5b3a3553ee48037ff4897,2024-03-27T15:47:45.160000
CVE-2021-22891,0,0,62e457c672d7ef03c1a6c6a6be7d4775111c15248290645768bc2e5d4d8037bf,2021-08-12T20:50:40.970000
CVE-2021-22892,0,0,cc16542affc64667468e45e7977166f203b89e17820ccc51cb3935248d38e4cb,2022-08-30T19:10:08.513000
CVE-2021-22893,0,0,7ab02627a0e7b95efe96113aa2edf5623e1aa9b80d3d385fbff5c67735077340,2024-02-27T21:04:17.560000
CVE-2021-22894,0,0,c9c58e1159876c6444311b72946002e4e5756fa16778959f63470df8d4f32431,2024-02-27T21:04:17.560000
CVE-2021-22895,0,0,964c1af433e584d2cc6bc559959c01008e727d05833d888f72e1b680dca9164a,2021-12-02T21:19:58.540000
CVE-2021-22896,0,0,93eac2f06ca1a31d34040275095383a0dc24b2782b510f11050b1bce250d645e,2021-06-22T01:03:15.073000
CVE-2021-22897,0,1,8feb0e04bd9da8a3ba4a00d9981917dd470faaa8c0c8dea7518428c4a2a2ce49,2024-03-27T15:47:40.347000
CVE-2021-22898,0,1,cb7aed26a2f0c6d972f5db58a0bf991ac14a9ade5c2e96dd169dd9a05a486826,2024-03-27T15:47:36.380000
CVE-2021-22897,0,0,8feb0e04bd9da8a3ba4a00d9981917dd470faaa8c0c8dea7518428c4a2a2ce49,2024-03-27T15:47:40.347000
CVE-2021-22898,0,0,cb7aed26a2f0c6d972f5db58a0bf991ac14a9ade5c2e96dd169dd9a05a486826,2024-03-27T15:47:36.380000
CVE-2021-22899,0,0,7ccc1d6227bdfe11f58d4901d8af453098ec0e9ba60386fc44c5d290e6849d99,2024-02-27T21:04:17.560000
CVE-2021-2290,0,0,e161d5970dbe21534ca8a58bed4dd6c1987c83e10878bb74e78478ffbc0f0ee0,2021-04-29T20:47:58.447000
CVE-2021-22900,0,0,11a74ac18596a70d6c0516ae29fd70e796dabfbb34e2f92013099e700819c483,2024-02-27T21:04:17.560000
CVE-2021-22901,0,1,2a1a7208fc9121c18a2c89b2042f15bd19d95e85ecb19178162498c4e0a4deac,2024-03-27T15:12:59.917000
CVE-2021-22901,0,0,2a1a7208fc9121c18a2c89b2042f15bd19d95e85ecb19178162498c4e0a4deac,2024-03-27T15:12:59.917000
CVE-2021-22902,0,0,a4a2f38d3c797c9517b7f337fa2d0e3e5b8d86adecf091a3702d7a01df0e157e,2021-08-18T19:13:08.357000
CVE-2021-22903,0,0,d99c63747b80c7b228edad210ca49963f2a6a5d584bb06dc2d26f5bd0882cc38,2021-10-21T14:32:48.653000
CVE-2021-22904,0,0,c7c7adf8c040783b0936d1c950d3c44f5a571a588ff5dd5f6c9de0c39943e2a1,2021-09-20T13:51:48.960000
@ -168995,11 +168995,11 @@ CVE-2021-22919,0,0,5b87ea27363e05614e4a5485baeac7da5070817fc270c91e352c520206170
CVE-2021-2292,0,0,aae95cf3c4655101628b7554f035b288cc5af5918aa24130f926447a2ca1222e,2021-04-29T20:47:34.503000
CVE-2021-22920,0,0,60e418487b730f0bed1da720516f9512142293b89ddf82fee7fc1b233d082f08,2021-08-13T14:26:49.893000
CVE-2021-22921,0,0,feb4fb83ce2bf5e935c6de933544186d50f0116ae15db7d20909d87724c99312,2022-04-06T14:30:09.710000
CVE-2021-22922,0,1,2a6d6c53ceaa934818277b479285d90cbbc0a427dd59031c3bfba28a777b402b,2024-03-27T15:12:55.770000
CVE-2021-22923,0,1,a82050eb038ef4e5284a2e0a6f950b794e78571ece5049ff8d206611a1b4e322,2024-03-27T15:11:51.407000
CVE-2021-22924,0,1,72ff22a33290cc49cb2f521b2873a9b2f36f6b6688a5fea8c78dfcdea7bc8bfc,2024-03-27T15:11:45.923000
CVE-2021-22925,0,1,10ffe09200017c9648adf7fa5be8f1caacf63435ae34ee4b2a1f93c7622d0586,2024-03-27T15:11:42.063000
CVE-2021-22926,0,1,3efc635fa0235e65a9c189d16b56eea42ebb077237b16dedab9ddeabbf64bf9e,2024-03-27T15:11:38.047000
CVE-2021-22922,0,0,2a6d6c53ceaa934818277b479285d90cbbc0a427dd59031c3bfba28a777b402b,2024-03-27T15:12:55.770000
CVE-2021-22923,0,0,a82050eb038ef4e5284a2e0a6f950b794e78571ece5049ff8d206611a1b4e322,2024-03-27T15:11:51.407000
CVE-2021-22924,0,0,72ff22a33290cc49cb2f521b2873a9b2f36f6b6688a5fea8c78dfcdea7bc8bfc,2024-03-27T15:11:45.923000
CVE-2021-22925,0,0,10ffe09200017c9648adf7fa5be8f1caacf63435ae34ee4b2a1f93c7622d0586,2024-03-27T15:11:42.063000
CVE-2021-22926,0,0,3efc635fa0235e65a9c189d16b56eea42ebb077237b16dedab9ddeabbf64bf9e,2024-03-27T15:11:38.047000
CVE-2021-22927,0,0,1b8462bd45eb1b8bbb2dd622741a6b441c80899ff24289230174628fdcea5934,2021-08-16T20:14:39.867000
CVE-2021-22928,0,0,eb0dcc242a46f18d3ecc4eb85eb326e9e33689232040f26456b27ab9e35bd837,2022-07-12T17:42:04.277000
CVE-2021-22929,0,0,774cbc1647fc8fb32f6b2128bf970d90f5e640dadbb29ee069cbab5e2f5fb8bd,2021-09-10T14:11:28.307000
@ -169020,9 +169020,9 @@ CVE-2021-22941,0,0,790f39177cb178344fc54a0bbb6992e1c74aac7fe2479d9a5090505eb5132
CVE-2021-22942,0,0,1da3830a53259463f709f5ba4027ae9b3637d47628a0ea6018e6187c6cd82118,2024-02-02T14:15:53.073000
CVE-2021-22943,0,0,a779577368528cbca69c94f741434f52bbd682ef6911362b85b82b3036804a5a,2021-09-09T00:23:55.950000
CVE-2021-22944,0,0,eb9ced6a11b6750716f46ac3d98436723d8a1f88ede10032cc3bac0ddb1abd25,2022-07-12T17:42:04.277000
CVE-2021-22945,0,1,c8b9b5f36257cd0029eca06a8c67ddac907a5238990f8a30330780d98bf902f2,2024-03-27T15:04:30.460000
CVE-2021-22946,0,1,34c4886fd3ded8a81159779bf38e5eec423d3337f732456a04ae6127d219ee2b,2024-03-27T15:12:52.090000
CVE-2021-22947,0,1,1f0d215e655ba698cf8c5924566d829a44a9033863a6cf777d890396311f0a45,2024-03-27T15:03:30.377000
CVE-2021-22945,0,0,c8b9b5f36257cd0029eca06a8c67ddac907a5238990f8a30330780d98bf902f2,2024-03-27T15:04:30.460000
CVE-2021-22946,0,0,34c4886fd3ded8a81159779bf38e5eec423d3337f732456a04ae6127d219ee2b,2024-03-27T15:12:52.090000
CVE-2021-22947,0,0,1f0d215e655ba698cf8c5924566d829a44a9033863a6cf777d890396311f0a45,2024-03-27T15:03:30.377000
CVE-2021-22948,0,0,3ae29b064ef956ec50546dd688fd9027239438584162735a1f0be84abdde7a16,2023-06-30T17:50:34.397000
CVE-2021-22949,0,0,726df53d67307bd416ab1f5c561fc0aac2ca19398b535bd9686e823a2044b612,2021-10-19T16:47:45.690000
CVE-2021-2295,0,0,02b76f640c5b0c546264dd7fe3019280895cc3f4c3d3c1ab1754e973bcd9757d,2021-04-29T20:46:25.240000
@ -175457,7 +175457,7 @@ CVE-2021-31558,0,0,d6b7eca8b3661e1164cde3cafef1c266e2f8472859f6d02c98f0ee8c033dc
CVE-2021-31559,0,0,960ef105b3161c8de185bc6fc58d26fca8236596b08b91f433c81abecf743c41,2022-10-25T16:42:38.307000
CVE-2021-3156,0,0,f7e7c8ef1b0e324cf2ea0191a3cda9d24a63ed0693294ca151795598dc60b3ad,2024-02-04T09:15:08.010000
CVE-2021-31562,0,0,797d186a32fce9d0031f33fb21467dc046abc2641f41f3a4eb668dae3bcade3e,2022-01-28T15:55:53.923000
CVE-2021-31566,0,1,9f6729ca0b8caaeddd1206b928ad0457539959c073118fdcfd964b35f3aa80df,2024-03-27T16:04:30.260000
CVE-2021-31566,0,0,9f6729ca0b8caaeddd1206b928ad0457539959c073118fdcfd964b35f3aa80df,2024-03-27T16:04:30.260000
CVE-2021-31567,0,0,bca43f0db30fc722ddd2e9bd8fed1b110a7669196d896ae913f81e804a6662ff,2022-02-03T17:09:44.553000
CVE-2021-31571,0,0,ac310b71da451791809abe07817b13f801603fe521103d861c539df6dddb4324,2021-06-02T18:34:27.147000
CVE-2021-31572,0,0,4a0d1e85208db2b4aa6a27ae410c9ffbc5b5d32694228ebc0356df3d4f0ad164,2021-06-02T18:33:41.203000
@ -178183,7 +178183,7 @@ CVE-2021-35196,0,0,3c93f00a18e99aace340d6044644723c83a7fc554c345131bd8f0eac840a8
CVE-2021-35197,0,0,2ff79030327337ae3dee0c61c9baeb32fff891d83c78c592ce6d47974492f2a4,2023-11-07T03:36:30.150000
CVE-2021-35198,0,0,e96990d62672cf02fa4cbfbf2e31fc75388b38d1e046810266a814dca0823507,2021-10-04T17:33:36.207000
CVE-2021-35199,0,0,9f062618d9a6cdf8c10bd83760fab290dac75318dde871525dfe843905fa91aa,2021-10-04T17:34:23.810000
CVE-2021-3520,0,1,60daddfb9f0bfc98507b64ef9c2c09b3106e89016024f6e140545c37e7343e5b,2024-03-27T16:12:07.343000
CVE-2021-3520,0,0,60daddfb9f0bfc98507b64ef9c2c09b3106e89016024f6e140545c37e7343e5b,2024-03-27T16:12:07.343000
CVE-2021-35200,0,0,aac4a0c49e39317db7297384a39c931b1b31e44af9c47b1b42addc5f5a769c5a,2021-10-04T17:34:51.317000
CVE-2021-35201,0,0,c0e0431448d3ba12a3d72455869761436f021a172ba4e64a31d8fe9f90cdbb0e,2021-10-04T17:39:16.717000
CVE-2021-35202,0,0,db5717bdc407832303592e1688309f0a7efc338fdecfe7ebb2ba8778dd1dc3a5,2022-07-12T17:42:04.277000
@ -179322,7 +179322,7 @@ CVE-2021-36972,0,0,7f5d343ad41aad3817fa2bedd0395a3df6e9fecf214880f976d53a911b896
CVE-2021-36973,0,0,ac2dc242541a2ee5ba49d79bf57e002c1a9b668a1f03222716899ff14ef45ffe,2023-12-28T20:15:57.900000
CVE-2021-36974,0,0,c30cf6d5afa3e9f7a6e032f7b5f5299dda13609f19eee733b117b26d25d84367,2023-12-28T20:15:58.080000
CVE-2021-36975,0,0,ce220aa95f2c890a8d4ff736efe2d9dfc0ea623ac7903ab52c4780e62b63d8a4,2023-12-28T20:15:58.270000
CVE-2021-36976,0,1,11edc2c9d5ff54dd12fe221d4b1b2e9240999e37529e96d126a0df71db91805c,2024-03-27T16:04:33.757000
CVE-2021-36976,0,0,11edc2c9d5ff54dd12fe221d4b1b2e9240999e37529e96d126a0df71db91805c,2024-03-27T16:04:33.757000
CVE-2021-36977,0,0,7ecd05ff14517c69b8531d9df96b8b2d27de568c1702c608fa6bb1a478b2e3fb,2022-04-29T15:06:24.723000
CVE-2021-36978,0,0,c092dc339b5081975b530efaad454d5fce3a66a1b72c84e10cddb2024985c236,2024-01-15T14:15:24.063000
CVE-2021-36979,0,0,73adb542e1879400d086ac81162f560768e693d2fe0591e07a9d4d8e8ed4e8f9,2023-11-07T03:36:53.250000
@ -191242,7 +191242,7 @@ CVE-2022-2257,0,0,dad20c73a2c2f0d659cc80938da21afb7f70013cf16b8dcc2003499bc089cc
CVE-2022-22570,0,0,705979cc0a814572a0cd5c9e0662feac9cb14f55a7c65f73308c1223d21dd60a,2022-04-09T02:19:58.207000
CVE-2022-22571,0,0,8cf67737c2cf76f5e72d366fed0fdef4b956f75d8f90492ab3949699e0044275,2022-04-15T13:59:11.807000
CVE-2022-22572,0,0,6c69b74689b3da56cc5cd4ac07a6d48f8516d77a0d623ae20b558e21731dadf1,2022-04-18T16:48:20.967000
CVE-2022-22576,0,1,5c200c3d4493404e43d751132cb6faac3af6609098c75a1fdfc162eb0900192c,2024-03-27T15:02:35.557000
CVE-2022-22576,0,0,5c200c3d4493404e43d751132cb6faac3af6609098c75a1fdfc162eb0900192c,2024-03-27T15:02:35.557000
CVE-2022-22577,0,0,2c7e6e442f1a2def91b5d39b63b26dbccbdeed76757f7c584ef306f58ed0c62d,2023-03-14T08:15:12.540000
CVE-2022-22578,0,0,73b80115f4455669055d8343359cec891f19e3b0a3a3e4b5856a6807563a33ed,2022-03-28T16:44:22.473000
CVE-2022-22579,0,0,d5ee72c4fe4d45872a66d282d7714d780c37d05ff42ee4a479e5f47abbb3fe46,2022-03-28T15:44:07.387000
@ -195565,16 +195565,16 @@ CVE-2022-2776,0,0,91f9249f9762db987391c6f5fe8c27628dcd0a98ebf2a2f0d87620befd7093
CVE-2022-2777,0,0,0391d02bd79913feea13c05d4ceee16b4c5d33425d0fc7c99ff2b86956b2f6f8,2022-08-15T18:47:59.257000
CVE-2022-27772,0,0,19b630a50a6d4660f9e5f590ec103d80f3271aeaab0f1e28ab8117ec2c7a0a03,2024-03-21T02:42:31.680000
CVE-2022-27773,0,0,091201079ac7882e9e194f3c9d8d1a4a6a54d2b5882895d61e7c68603566a544,2022-12-07T17:36:07.027000
CVE-2022-27774,0,1,fb1147cbe33ccdcdad1fb4a673f329c1884c101fd45f17d9a031914a02dfdc32,2024-03-27T15:02:31.430000
CVE-2022-27775,0,1,c1eadfce756295b3b6b28dd1721c814b989b792c83033617f3aa9ef1deada2c6,2024-03-27T15:02:27.427000
CVE-2022-27776,0,1,f9d3880f8bd8996b45317c60d3f8b57e3dfa597ee089dd4449a011d1943a6eeb,2024-03-27T15:02:23.683000
CVE-2022-27774,0,0,fb1147cbe33ccdcdad1fb4a673f329c1884c101fd45f17d9a031914a02dfdc32,2024-03-27T15:02:31.430000
CVE-2022-27775,0,0,c1eadfce756295b3b6b28dd1721c814b989b792c83033617f3aa9ef1deada2c6,2024-03-27T15:02:27.427000
CVE-2022-27776,0,0,f9d3880f8bd8996b45317c60d3f8b57e3dfa597ee089dd4449a011d1943a6eeb,2024-03-27T15:02:23.683000
CVE-2022-27777,0,0,e53f0de9a226215bf6b68db8cc4fda72582d13893879270665b18291e9910ee7,2023-03-14T08:15:12.993000
CVE-2022-27778,0,1,e68aa53c00ebd71e950de2e2de15f4dc3314d61497fb345b9ac5f9ffc19ac244,2024-03-27T15:02:14.720000
CVE-2022-27779,0,1,624ab60dd56fc169eac4aa37ff3f5a59306663a86baea40df643b824b133432f,2024-03-27T15:02:07.080000
CVE-2022-27778,0,0,e68aa53c00ebd71e950de2e2de15f4dc3314d61497fb345b9ac5f9ffc19ac244,2024-03-27T15:02:14.720000
CVE-2022-27779,0,0,624ab60dd56fc169eac4aa37ff3f5a59306663a86baea40df643b824b133432f,2024-03-27T15:02:07.080000
CVE-2022-2778,0,0,06de8b398c09429f19f0c3e3fe7de194f9df7821d3cffcbef711cd3616feb4da,2022-10-04T18:20:12.593000
CVE-2022-27780,0,1,8a859689331e44c2f2d4915c7a406179db2ece5d9d9950ebd78fa4c7a131b090,2024-03-27T15:01:58.407000
CVE-2022-27781,0,1,c3f7e062814594e95161cf77a64c2c1cf1b81ab8d54714f16da8ef5d4332164b,2024-03-27T15:01:53.060000
CVE-2022-27782,0,1,8a58a7225be5f4a0725a4b892831f4fdea6cb48003542f266c6a715e2a18f87a,2024-03-27T15:01:49.180000
CVE-2022-27780,0,0,8a859689331e44c2f2d4915c7a406179db2ece5d9d9950ebd78fa4c7a131b090,2024-03-27T15:01:58.407000
CVE-2022-27781,0,0,c3f7e062814594e95161cf77a64c2c1cf1b81ab8d54714f16da8ef5d4332164b,2024-03-27T15:01:53.060000
CVE-2022-27782,0,0,8a58a7225be5f4a0725a4b892831f4fdea6cb48003542f266c6a715e2a18f87a,2024-03-27T15:01:49.180000
CVE-2022-27783,0,0,19dc1467106cf4d13c4cbca7b4d3d753aca29f021174cae3299962a01c8e40e4,2022-05-13T17:29:38.363000
CVE-2022-27784,0,0,b7f32c2a04336f6a7e6280db469db0b1c9e818e53867bee1bbb46d1260bc8172,2023-01-24T15:40:03.220000
CVE-2022-27785,0,0,815f6325247a3206bba95ff03c9af5bbe8be4931c2ab1a0696317b6c44469ad8,2023-11-07T03:45:23.953000
@ -197511,7 +197511,7 @@ CVE-2022-30110,0,0,e9dd44f77ad831587ec4e39383c77b19970dfa79ea2836269377ed5e66ff8
CVE-2022-30111,0,0,fd7ce5e1f36c9b6c8f614d5a82d13d60a0686a1b619f0786a8ee5c19809658f8,2022-05-26T16:24:35.227000
CVE-2022-30113,0,0,db69ed943e1ef593f870b319436186438ef07a7d5150cabaae529fed6b3aa1a5,2022-07-20T14:03:39.717000
CVE-2022-30114,0,0,42dd9ab35652e5702b947020cdff9115df4b404dbdaa5bb380da18fec15c5fe1,2023-09-21T22:15:09.740000
CVE-2022-30115,0,1,092abca7773c8fc2c2cd84485613813b066cf454c73fa0db7b767c462abb36b3,2024-03-27T15:01:44.073000
CVE-2022-30115,0,0,092abca7773c8fc2c2cd84485613813b066cf454c73fa0db7b767c462abb36b3,2024-03-27T15:01:44.073000
CVE-2022-30117,0,0,33574de4664a2d386ce6045e061b1c748627576714c0165735a81caafad848ba,2022-07-05T18:05:54.507000
CVE-2022-30118,0,0,213c2c2d84fe4379961dc11aa96d4e79201e7d1f9ec84b813d01a5493181bf54,2022-07-05T18:39:18.303000
CVE-2022-30119,0,0,985ddc925894e6d93e1f83c0fa1b896227b46d2592b676030321ee11299fd8f4,2022-07-05T19:40:24.917000
@ -199223,10 +199223,10 @@ CVE-2022-3220,0,0,631146846ce39a437d1ca5e831536fa4c835a6a44e107e799c6ab41eb6a3c0
CVE-2022-32200,0,0,6a1e2ddcf6e11f75fddf89de9541431f41a9d459d4394ba83c378609e2b29803,2022-06-10T16:16:20.087000
CVE-2022-32201,0,0,41e373400f3c5eb580922a9928f9240aff7ff160b5a59f6c054ca3d376e10daa,2022-06-10T16:18:35.690000
CVE-2022-32202,0,0,d2e75bbd3c8ec7203fccfd537614f1837041af7a919f7f66ebd547b99b110d7b,2022-06-10T16:14:28.477000
CVE-2022-32205,0,1,36d1f2c768ab18fa849fbb0196dcbd7ce761b5a6fbd2c79fe2418061b4439eaa,2024-03-27T15:01:05.383000
CVE-2022-32206,0,1,95a472387799ef8f8393056737e78a46cd10cd43c0b52fc2809d3f4b772ae161,2024-03-27T15:00:54.267000
CVE-2022-32207,0,1,76c3acd367c4b491ab1b8915dc9b7162aef765744ab96e118dcc2dd8860b637e,2024-03-27T15:00:46.637000
CVE-2022-32208,0,1,854a09574eede661d6fcd781930e4022272ea24f63f9749d49ae1fb23ef1b69c,2024-03-27T15:00:41.657000
CVE-2022-32205,0,0,36d1f2c768ab18fa849fbb0196dcbd7ce761b5a6fbd2c79fe2418061b4439eaa,2024-03-27T15:01:05.383000
CVE-2022-32206,0,0,95a472387799ef8f8393056737e78a46cd10cd43c0b52fc2809d3f4b772ae161,2024-03-27T15:00:54.267000
CVE-2022-32207,0,0,76c3acd367c4b491ab1b8915dc9b7162aef765744ab96e118dcc2dd8860b637e,2024-03-27T15:00:46.637000
CVE-2022-32208,0,0,854a09574eede661d6fcd781930e4022272ea24f63f9749d49ae1fb23ef1b69c,2024-03-27T15:00:41.657000
CVE-2022-32209,0,0,fad525a81bc1b9ee0d0345f2c1b1b664f3e12e7a15389ea71ebb61bdde77f886,2024-02-01T16:22:15.683000
CVE-2022-3221,0,0,275d674547ffc29400f67559d3c8664d4bccd2f7c7c5cc0914b161b5d13d38e0,2022-09-18T01:29:18.213000
CVE-2022-32210,0,0,9e0166b5a9c2173e071ae40a153be840b224b053a9221f7e9315a8d7bbb82718,2022-07-25T18:29:47.667000
@ -199240,7 +199240,7 @@ CVE-2022-32218,0,0,0fac3e82cd2a8928892ed0557823b129d2ed0d18d92f79b5ccb401e684104
CVE-2022-32219,0,0,ce0f6a2e7c8b2c1b75c33893a6089ec39040bca0900f6cfc8f7468907726a4ea,2022-09-27T14:06:46.800000
CVE-2022-3222,0,0,212ba91fe1f852e9243096a789e5d2a1894879240e2e011179953511ea237565,2023-05-27T04:15:22.017000
CVE-2022-32220,0,0,fd8431710aa17c0431d6dc891fe66b12ab5a39b6ac62c0ef31b0405c6cadc85a,2023-07-21T19:26:19.830000
CVE-2022-32221,0,1,e0b9b99050dd15f817721346f60019d6b3ed4fd3a3a72fb36e3efae0a0f3af70,2024-03-27T15:00:28.423000
CVE-2022-32221,0,0,e0b9b99050dd15f817721346f60019d6b3ed4fd3a3a72fb36e3efae0a0f3af70,2024-03-27T15:00:28.423000
CVE-2022-32222,0,0,f6863d565197651f10e273293713647cea3e9589a5b34582984bacb0a3cf6013,2023-07-24T13:16:33.287000
CVE-2022-32223,0,0,13371c7607369d44516921cc35bd568a13425936d43496b18a3ac8eaa07dc9b3,2022-10-28T18:29:55.297000
CVE-2022-32224,0,0,c7e760846594e69e5ff3ec467a23094bdb9b067f54b82e4a845627fa9168b70a,2022-12-08T13:20:13.287000
@ -201600,7 +201600,7 @@ CVE-2022-35249,0,0,4c6921f429d6bd1a292af5d1fd6f601f8709ef83cb0a62c1ab6499da12b96
CVE-2022-3525,0,0,75561123723350358039f471247ec09372fff2a78b9c6e04483a8d98e0d06f04,2022-11-21T12:48:31.207000
CVE-2022-35250,0,0,ec6109697f611365321a4135191e4ed4202eed0d67e5c4f88ed90ffaa0669a21,2022-09-27T14:01:56.857000
CVE-2022-35251,0,0,8392cf117d9d355d6a9a22038422f8a6df683652ea7eff129e05eaeeeb56ba05,2022-09-26T18:57:30.417000
CVE-2022-35252,0,1,a7acc1b310ed6164ff3b8361257c78a9d599d2a4812dc9bcba522c8334435bba,2024-03-27T15:00:36.607000
CVE-2022-35252,0,0,a7acc1b310ed6164ff3b8361257c78a9d599d2a4812dc9bcba522c8334435bba,2024-03-27T15:00:36.607000
CVE-2022-35253,0,0,e053b5a59154fa71549362ff1254aad5a17d795d5d576559056d101db6f096fc,2023-11-07T03:48:50.267000
CVE-2022-35254,0,0,398e3c9e1641afa6350efff5fbea64706007f5b21fbfbd16f261842e0115b8da,2024-02-27T21:04:17.560000
CVE-2022-35255,0,0,be61bc588357a04ca4532960eb00f68d2f25632d0ec56bd426356558ea4f8d18,2023-03-01T15:03:19.287000
@ -201609,7 +201609,7 @@ CVE-2022-35257,0,0,2a29302a18d6bb048d135c2ed4575264b665bbe6abafe303c171598d03d9b
CVE-2022-35258,0,0,db1b3249eaf132ed21cc153b92c2cd2eca5eb4b8c299e1af4a8e695fee0855ea,2024-02-27T21:04:17.560000
CVE-2022-35259,0,0,1aeb15137064e3f4d1c3900c7f24a5d8ef5a4046b9b810c15cbf5e6650f837e5,2022-12-07T04:29:38.620000
CVE-2022-3526,0,0,3ae96b98b67bb903279f9c95bb1f9d03c7340492162b12b023b5135599e06054,2023-11-07T03:51:22.083000
CVE-2022-35260,0,1,ff918b3aed204b27a237bc271679ce911a0dd0f3e7eca4a401fc793d0896dfc1,2024-03-27T15:00:15.383000
CVE-2022-35260,0,0,ff918b3aed204b27a237bc271679ce911a0dd0f3e7eca4a401fc793d0896dfc1,2024-03-27T15:00:15.383000
CVE-2022-35261,0,0,e0a49de2aec7a5126bc065964afe0c6bc397cb86d75f0bd1921899e3409eb5e5,2023-04-26T19:17:33.857000
CVE-2022-35262,0,0,67f31eae660ebbd628db1eead9eb4d1b767416d9a5115c5a9a1a5d8204ad06f6,2023-04-26T19:17:00.687000
CVE-2022-35263,0,0,e96ef86312f89649a1f690d12e1343c6e2cef7a4ed4da7c595838f66cd735a61,2023-04-26T19:16:39.727000
@ -201991,7 +201991,7 @@ CVE-2022-35730,0,0,d02cd3657a6ab2fdea42f1d139c507e9826c68abf50607d3ee6cd7f9529b9
CVE-2022-35733,0,0,be53f5556df3a76705715263635913f30607949039453cda94fa44233963b354,2022-08-26T13:17:34.277000
CVE-2022-35734,0,0,1023c438f5e4873a54369b93f7352270fb7fabdee2d21379bef4c8dc0ab450f7,2023-11-07T03:49:23.210000
CVE-2022-35735,0,0,d17a4faa9fef2a8ec7968a5529a09aaeff8a9967ff28ac502b61a21ddb15417e,2022-08-10T19:26:57.143000
CVE-2022-35737,0,1,5fb8e472436ae3d6667c73253b8c2e3ede3cff2a5d90ad9492a780730605885e,2024-03-27T16:05:26.360000
CVE-2022-35737,0,0,5fb8e472436ae3d6667c73253b8c2e3ede3cff2a5d90ad9492a780730605885e,2024-03-27T16:05:26.360000
CVE-2022-35739,0,0,688371722965873cfecda0dbf2e1d7ac964f4a29df90cab90a3cdd5199f55d74,2022-10-28T19:51:12.957000
CVE-2022-3574,0,0,57e7551b871b46986e50c49a9481f07f2809cd0dc446b380d9e58de2f73309ba,2022-11-16T19:11:47.043000
CVE-2022-35740,0,0,d1f07cec4539d195c6d930975815af939c2ace905dcba7b78b91706e8e72a92a,2022-11-15T20:35:35.397000
@ -202459,7 +202459,7 @@ CVE-2022-36223,0,0,af713d64429debb696a606282b4196e159af605ab60fe15071aea1c7fae2f
CVE-2022-36224,0,0,08d6bff510d0faac0e761e55f7111fca66e5d819a4007bb48d89793fa3523f3e,2022-08-22T16:26:22.077000
CVE-2022-36225,0,0,bf3e137c686147aedd0a2f5e33321fcdcae3edae04b22a0da940ed7849985afc,2022-08-22T19:54:34.733000
CVE-2022-36226,0,0,c15fa20a54d9581f15906ddda250ac3c5e168091f424408ef65541c2fc414c40,2022-08-31T16:27:39.307000
CVE-2022-36227,0,1,41b76a9f24783b77e5f4675ed89258c2e29bf45423afe65aad37115594bd00c4,2024-03-27T16:04:27.210000
CVE-2022-36227,0,0,41b76a9f24783b77e5f4675ed89258c2e29bf45423afe65aad37115594bd00c4,2024-03-27T16:04:27.210000
CVE-2022-36228,0,0,2a8c144fa323e882ce8512ba86c4d448ea3607b0656403e02263245fc2a00697,2023-10-12T18:37:26.680000
CVE-2022-3623,0,0,c3cca1c9d7e5c93f94099fe1f079e9625cabe3c9de9d85375d161d414b59c8fc,2023-08-18T18:55:40.750000
CVE-2022-36231,0,0,bd266977b014f49f864962d37e36d14dd80315d917f63a9aca2024dc7d7ffd9c,2023-03-03T19:28:14.753000
@ -209554,7 +209554,7 @@ CVE-2022-45842,0,0,9f25540ae216de5e80164f6a8f1c3e751daed0b834ae44796a3ade59d0323
CVE-2022-45843,0,0,5509ae3d19ef873f9b0c2e5074f3bcf43a244b9d1d9d19239688ff5032b78ca9,2023-11-07T03:54:53.320000
CVE-2022-45845,0,0,7c7b5704ec58a7e6b0b65bc99493616aff55a25ad9837751371510d52188a7b5,2024-01-25T22:19:41.890000
CVE-2022-45846,0,0,8180d177894fabd765bd35647192f753aa5e8efd68ae118429536372bad2940b,2023-05-16T19:17:03.097000
CVE-2022-45847,0,1,45dcccfedd863be101e19a66ccb58ff88331ff85555bb783dbc7441772d6b236,2024-03-27T15:49:41.437000
CVE-2022-45847,0,0,45dcccfedd863be101e19a66ccb58ff88331ff85555bb783dbc7441772d6b236,2024-03-27T15:49:41.437000
CVE-2022-45848,0,0,fad62e623651689ae95e2fc4f689ac1b8448d31b314d8c49c68285751fad7661,2023-11-07T03:54:53.547000
CVE-2022-45849,0,0,705787250de6f0b2626b38d25516ea3dba7bf004e02dd10b4c9840c8901ce7b4,2023-04-21T04:17:06.770000
CVE-2022-4585,0,0,dfc84e49b205895cb267e11431be1f335d9b1de0cfd68ee1a905558e4e7037c6,2023-11-07T03:58:14.437000
@ -212065,6 +212065,7 @@ CVE-2023-0578,0,0,c2cf10d09529bf342567ff561ff5fc5b2abe259e50445b77cdf258d0a115db
CVE-2023-0579,0,0,504b4338f864e933aa44e888a09084f9d604fd2edb1bc93c969428fcc9526d01,2023-11-07T04:00:52.513000
CVE-2023-0580,0,0,496b4aaf459be8082f40af9709a8d52cae4c41b641bd7ca2e1f477b04712ed00,2023-11-07T04:00:52.727000
CVE-2023-0581,0,0,80d4f5ae1b34ea0255629d958cda2cdcf146f8044343eecb0200e915f691c351,2023-11-07T04:00:52.963000
CVE-2023-0582,1,1,b3d8f7c84b265316b7e893995a48113564e6ef297a2eb81dadb43454ece92941,2024-03-27T18:15:08.237000
CVE-2023-0583,0,0,ce927582782be4db333475ecc49caef43ac381b8ee355357a8ae6188916854c1,2023-11-07T04:00:53.253000
CVE-2023-0584,0,0,661ecf0e0e258efd0247b994949d777aeb58bd9b6fb3f10f25ebfe1d0595391a,2023-11-07T04:00:53.487000
CVE-2023-0585,0,0,e90d02e3a14ec76a3f74d6f239a409836679ba4da0fdac7466ba614a8fa9d16d,2023-11-07T04:00:53.740000
@ -224362,7 +224363,7 @@ CVE-2023-34013,0,0,500f8f8006bcf5c0893b8111c3bad0218a0838aa8f762361a0079a993f68b
CVE-2023-34015,0,0,8d3ead4f06239d4e652b53ad320e486662a5f6043183f11384bd9be80285d7ee,2023-07-18T14:47:17.697000
CVE-2023-34017,0,0,c870dbb656b8499b3cf2883461d680862292835cec64c41b6df87e8549c650aa,2023-07-31T18:00:08.770000
CVE-2023-34018,0,0,8e3d0d9d918bf4729ce0fbb0a52f4bcea31d1b64524ed9bb7ad175834b2e3110,2023-12-06T00:34:10.727000
CVE-2023-34020,0,1,6303b7365b6a78484b12527e5cee1750cfe83ba4c60e2b0cd3cee68978d12260,2024-03-27T15:49:41.437000
CVE-2023-34020,0,0,6303b7365b6a78484b12527e5cee1750cfe83ba4c60e2b0cd3cee68978d12260,2024-03-27T15:49:41.437000
CVE-2023-34021,0,0,3a3e2358a671ec1c445afbf616a746a1f517d1449b1bf5492bd59da42a46cff4,2023-06-28T07:24:29.103000
CVE-2023-34022,0,0,17ce84d4577657f691cbf35839eb41895ae44b6198bae31ad30ea35e514fc1f2,2023-09-01T12:28:20.133000
CVE-2023-34023,0,0,dda712b30f36d5187a63c35f5fe5aee61d09f88bac602b14d0474a131788a98a,2023-09-01T12:29:56.897000
@ -227961,7 +227962,7 @@ CVE-2023-39303,0,0,d81a0865c899018b1bf357d592ab28d95ab5876f93fb600c5e62942433b06
CVE-2023-39306,0,0,6fdea6e755ad3c897f08918d9c1d51ddc69d961346f27f39c6f47d3188ca876e,2024-03-27T12:29:30.307000
CVE-2023-39307,0,0,7acef3cec93184c51474f9c31e2a1c837088af3bbc58f21a5e50dcf1d40254e9,2024-03-27T12:29:30.307000
CVE-2023-39308,0,0,0a6368135905c51e4bfc8658e86115693ae2beb292d59faa84b5dcfe3424348f,2023-10-02T19:36:52.837000
CVE-2023-39311,0,1,439e9e33a3292d2e437c686880384c336acf226575769e1b0c928b9e71ee51ff,2024-03-27T15:49:41.437000
CVE-2023-39311,0,0,439e9e33a3292d2e437c686880384c336acf226575769e1b0c928b9e71ee51ff,2024-03-27T15:49:41.437000
CVE-2023-39314,0,0,ea740e75552d6dc1c0cf1f6c4b3f96de5bf219ab1a6cac778aaf3dfb58fa2dc3,2023-08-15T00:14:54.643000
CVE-2023-39316,0,0,bd233c030a147eb3f789ee38efc103e8bf004636997da3293bc77e895bbfe866,2024-01-11T18:05:52.470000
CVE-2023-39317,0,0,326a3ff897e3724ba6821d5440b392c61a19aa276b4d83da4c1edff4078ddab6,2024-01-11T18:05:45.287000
@ -231466,7 +231467,7 @@ CVE-2023-44995,0,0,2e692294cf4d62dc41e425947f979ee8c21d0e539d91dc7695b1ee7c8fc16
CVE-2023-44996,0,0,8ad2f639c3253abbde238fd5a9cde75a13aa5bd5fd7ebe20480f9c9b35655ae0,2023-10-14T01:49:41.830000
CVE-2023-44997,0,0,81ee87730db4999076f9ba13b533f7ee822bfab430b5bd9758fdc4dc99b355f8,2023-10-16T19:04:19.087000
CVE-2023-44998,0,0,6cc3050d478119a51a717478faad92a6fd89b774c0150f63b5670fdc0d17544a,2023-10-17T18:19:41.770000
CVE-2023-44999,0,1,084ce61dccbe80f3a147cccc676be8764a18056ded4deb616c3d87e37d87862a,2024-03-27T15:49:41.437000
CVE-2023-44999,0,0,084ce61dccbe80f3a147cccc676be8764a18056ded4deb616c3d87e37d87862a,2024-03-27T15:49:41.437000
CVE-2023-4500,0,0,1706dc981901fc97569eb9643727c2c6db6e12a4486c14d5471830d688bfe4cc,2023-11-07T04:22:40.307000
CVE-2023-45001,0,0,7ae6d2a6a50d43f250007cb67a905b12b402783a75b5f34158cdfb57c3adcb31,2023-11-10T04:18:01.923000
CVE-2023-45003,0,0,e4a647054cefc57f163934c624babd072f49088fb353601c09d173ca854ba7b2,2023-10-20T18:08:51.807000
@ -235294,7 +235295,7 @@ CVE-2023-50951,0,0,ac9a2ba6b69cc6219b314f88f75f8d16d80977a7838c8861bc4cc4a5a90b3
CVE-2023-50955,0,0,2dac25424bb634048955c93e845cd595a5737c34f7a73119031e8a018fd0e20a,2024-02-22T19:07:27.197000
CVE-2023-50957,0,0,a38d290def706a6975d8b2902c3d1f58a6074172158e1685b40a6a512f9caf13,2024-02-15T04:37:53.297000
CVE-2023-5096,0,0,1b0896fcd5a16a2bfc5ce288684748ddee835572b804e4af539b42517b79d371,2023-11-27T22:10:14.173000
CVE-2023-50961,0,1,a9d9b75e02dfcfb3f65c9ff56b43527d188f145358242dce35d298fb3c8bb736,2024-03-27T15:49:51.300000
CVE-2023-50961,0,0,a9d9b75e02dfcfb3f65c9ff56b43527d188f145358242dce35d298fb3c8bb736,2024-03-27T15:49:51.300000
CVE-2023-50962,0,0,365daa63183eee3bc8e35da897e2163d0fc458ef66adb39b8eb249f4c8a968ff,2024-02-12T14:31:36.920000
CVE-2023-50963,0,0,f8ab53d3916fdeb747721dbad810b91a4d8cca1f3447b9dedd0b7a0a236caf08,2024-01-24T21:22:22.293000
CVE-2023-50965,0,0,7d1de52a11bce456c4c16ef773b97b5e53898c75617739b3525f486b2a63242b,2023-12-20T20:02:23.497000
@ -235763,7 +235764,7 @@ CVE-2023-51886,0,0,57376d86734d9125cdefeefb78630aac114d6de1902e63e7e68f3a3c286da
CVE-2023-51887,0,0,5ef2b724fc508a46d98e2525360ceec49832ad8963da68755a3ed1e998657e14,2024-02-05T17:29:49.697000
CVE-2023-51888,0,0,0c26c76fa0194a6bf43f7b0d37b92c45dfae056622dc0b83d9eb4f0ea5ca00ab,2024-02-05T14:11:51.323000
CVE-2023-51889,0,0,8818124c066a6fc089f0ca349b82501811306f8e10b0be4d7c4755f36976d478,2024-02-05T14:10:48.287000
CVE-2023-5189,0,0,c147a09eb43ab25371513a32cca88515adb22676507348ad033296b8f2641894,2023-12-13T10:15:10.110000
CVE-2023-5189,0,1,dd34534e185942a0e90badb41c5e213b21a944d47974c8c87a51609f819a599b,2024-03-27T18:15:08.710000
CVE-2023-51890,0,0,781340432dbcfdc8e5dd47cf218a3ee83bd6eb1e3c9d4e385b3f27a1d7a54d20,2024-02-05T13:57:15.610000
CVE-2023-51892,0,0,83e77db8e71e0f4c493aeecdca7dc8524049c5ad059bc3e1dc3f8c0291c22774,2024-01-26T17:12:58.500000
CVE-2023-5190,0,0,4e5acd0b306f781670b3a54b1d1143953c2740e2d360008f138cc2e5de5de17a,2024-02-20T19:50:53.960000
@ -237065,7 +237066,7 @@ CVE-2023-6149,0,0,43627cf55c1dbb5c825fba826743af0296f49d6a8c24065c1a631c49138b39
CVE-2023-6150,0,0,1ea907d678f48f22ce30b6bad5c8da7daf76b35ef23c59476e04071a5892fe2e,2023-12-05T07:15:10.570000
CVE-2023-6151,0,0,7559e2f33b50293cab689a38634ef34d917b527790c29a35f6155f6feef60ac3,2023-12-05T07:15:11.207000
CVE-2023-6152,0,0,650857fc8203f2c7b3ce096d7962f1ec279cbc9f5ea52dff75397db33e06f18d,2024-02-14T13:59:35.580000
CVE-2023-6153,0,1,5029d75c8c42e6df7abb880dd03acef9a43af5e3dd820aafdebb873d4b25b2d7,2024-03-27T15:49:51.300000
CVE-2023-6153,0,0,5029d75c8c42e6df7abb880dd03acef9a43af5e3dd820aafdebb873d4b25b2d7,2024-03-27T15:49:51.300000
CVE-2023-6155,0,0,3ade3aecef51d941d8061f8d0b14aa2df7731495ef3e1609ad30477044f4d6ff,2024-01-02T20:16:59.773000
CVE-2023-6156,0,0,d7561fff0656f62c31cf7fed3e16d348c47083d2199659e3634f7ff4096281e1,2023-11-30T21:08:21.483000
CVE-2023-6157,0,0,19feaf86781e5b84fd59f4c0155ffcd6eb44ba3b8740d1cd952fe7d4823f3848,2023-11-30T21:00:23.003000
@ -237253,7 +237254,7 @@ CVE-2023-6395,0,0,ac793203a9dc0a042800eca54ed9e135226e7af456816d583effac8dcec849
CVE-2023-6397,0,0,32328345f587e4af99f4aaa1bcc8b79a52413e2b10103761bed029c881877b7c,2024-02-20T19:50:53.960000
CVE-2023-6398,0,0,6df96db5309a9e573369d025141b91026dcf883d56f38d0728e8a69e9f438402,2024-02-21T10:15:42.770000
CVE-2023-6399,0,0,891fd568ed116fcad25bf9db62f014842821e1923047c86d46a6c2d8dab27f63,2024-02-21T10:15:42.900000
CVE-2023-6400,0,1,707a8d108ff29e3f5ec9ab008205c7906004d1fc50c2cf7855d902b59313f0e8,2024-03-27T15:49:51.300000
CVE-2023-6400,0,0,707a8d108ff29e3f5ec9ab008205c7906004d1fc50c2cf7855d902b59313f0e8,2024-03-27T15:49:51.300000
CVE-2023-6401,0,0,411546d88eebf199d44e9988166ea5b8e6f2b675b6fe8a537c285170b3230267,2024-03-21T02:50:36.180000
CVE-2023-6402,0,0,dd329c4dbc100bff910a0c70a7294dd06e33e9b2468f50cfcaf0604e5c4e1810,2024-03-21T02:50:36.267000
CVE-2023-6407,0,0,fd3b1ec8c2350f5672df571bd288bbd2e9afe054b223cdc538cdef15170f355f,2023-12-18T19:34:53.843000
@ -239048,7 +239049,7 @@ CVE-2024-1535,0,0,c2e452de4f130d0657f2ad52768b1d03d46cb2c5e636f4ca1b10840f9898bd
CVE-2024-1536,0,0,3680c54e462a2a7edc1fc99438ddf2bbe56f66c6c70a4febe86757b7c0d77832,2024-03-13T18:15:58.530000
CVE-2024-1537,0,0,90084d772bcb3ecc6e07d74ed60eae5fe9aea59c6e1713f7863063d24965b57f,2024-03-13T18:15:58.530000
CVE-2024-1538,0,0,7710e1b546e09312497f0b9c9df24bcccbffd2cbc2e6cf10ad6aac7ce2ffe5db,2024-03-21T12:58:51.093000
CVE-2024-1540,1,1,89cd06ed913bb19437dfd8dce4934b885739e3f5438ab021d31e6f934d45cd8e,2024-03-27T16:15:09.963000
CVE-2024-1540,0,1,76005015a825567349150f82c72870d086e465eb518fb8c7a03f9bc7bf9bede1,2024-03-27T17:48:21.140000
CVE-2024-1541,0,0,0b73186deefb215b3bbc0b2b970c4145b3ad229def4c224287b4e5a63ecff82c,2024-03-13T18:15:58.530000
CVE-2024-1546,0,0,d87548555f4c8992ddc193a435b01cbf450a34c4725a832074955ddd5326558a,2024-03-04T09:15:37.650000
CVE-2024-1547,0,0,fc3de1ace81ccfdd8fbde9e6a6951be522c10c940115407bd01fd7d037e7d770,2024-03-04T09:15:37.740000
@ -239069,7 +239070,7 @@ CVE-2024-1564,0,0,84875cf797fa64328b336ae33772e46886c72657e3c983b9d184a2a3d50ffd
CVE-2024-1566,0,0,fae18125d42af6480c1fb49e1e6428a52d2bf4f1074f21a5dfe482b2c8d87086,2024-02-28T14:06:45.783000
CVE-2024-1568,0,0,03adf0f94bdba0662cb278cdaa3b54a5cd3ae08b3ef89a1e89169605096fa6c9,2024-02-28T14:06:45.783000
CVE-2024-1570,0,0,fa96633d08cf4f7a9a083fffefdd325991610013e77e1890328cb3b85d75e300,2024-02-29T13:49:29.390000
CVE-2024-1580,0,0,8ab013089e97147c04c4a5ef6b3954117d4a37f719c6f181dbd352698d2066ba,2024-03-26T00:15:08.497000
CVE-2024-1580,0,1,4a10e63fa95d49470234e2661449f906487822e0aeb3a95c53a88e84627958f0,2024-03-27T18:15:09.063000
CVE-2024-1582,0,0,5801086f12a7b25e0a24481309300eacfe3989ff6a37128452730610efa279b1,2024-03-13T12:33:51.697000
CVE-2024-1585,0,0,e91f99f5d286c3afef1058be20d258b7aa9acfdf346cd5b86fd70de17ee7844a,2024-03-13T18:15:58.530000
CVE-2024-1586,0,0,0f7dcaaedeb3b15eee35c0b1fbce415960454d76b6eae4dff9a3ecfad1011e31,2024-02-29T13:49:29.390000
@ -239362,13 +239363,18 @@ CVE-2024-20252,0,0,b3e7ab7affd116881816a7adc1b9a82671c5b4da83512a13f8133ebc1b35c
CVE-2024-20253,0,0,d3a8e74c395d6dc3e7ac6947f74fcfd7abc559db9a2a5673b58b5d97e64fbd4a,2024-02-02T16:15:53.893000
CVE-2024-20254,0,0,483b1bcc903a1f3fe5774e73017e3920b0d7ed3bc82e804e2d29798a514160f0,2024-02-15T15:54:33.153000
CVE-2024-20255,0,0,4c8067b6b3b68c94894b4ecd8c182992b7e2d67f936be466104b1472a1d76a79,2024-02-15T15:54:19.960000
CVE-2024-20259,1,1,320a14ee14d62aa5d17681a1efe29c443b0cdc7bc00d2121817f310cc495e59d,2024-03-27T17:48:21.140000
CVE-2024-20262,0,0,a40254b410d0784e77864e44354a4b6d276cfd1ed801d8c8cea773abddaa6fdb,2024-03-13T18:15:58.530000
CVE-2024-20263,0,0,eee9d5be1e797577581d307b6debeb0e216dfa8c65e90aa4284e364da06d4b08,2024-02-06T19:23:20.600000
CVE-2024-20265,1,1,3489362a547286567b228fe9ed8fabd87d542e719de273953f70320b8c723a6a,2024-03-27T17:48:21.140000
CVE-2024-20266,0,0,7107175b332490e839d5721f467b6ded5bb175039dfd7bbdacb90e93b939405e,2024-03-13T18:15:58.530000
CVE-2024-20267,0,0,2716a642cdad532c3a4bd75fb20d5fecd6f79884b8ec8ad4d3b70c55b604b9c9,2024-03-04T22:45:43.893000
CVE-2024-20270,0,0,e782cd7ba9de695c0ad1c66716422322472732a1f5415c3e41652abc7d8c0edc,2024-02-02T16:15:54.227000
CVE-2024-20271,1,1,dfae8db584f1048f6a3c2c1977b24965cd6ce960b56141c77d166e3081815ee1,2024-03-27T17:48:21.140000
CVE-2024-20272,0,0,185f140724efe06396f39e49d9628053efc8d5b0f336793319946b145d008ecc,2024-02-02T16:15:54.683000
CVE-2024-20276,1,1,296a5bdd5467948ab48ce59d6adf71ce96a1b7c0465de9d78357fece032b5e4b,2024-03-27T17:48:21.140000
CVE-2024-20277,0,0,c44de8c225b0707871143fcb06737e334d929dd5a0acde877fcecec9290acbf6,2024-02-02T16:15:54.787000
CVE-2024-20278,1,1,3422bd62c0dbfc03ee503f488f9025cb4328d1a2c7b9cbaa4588ba28546b6550,2024-03-27T17:48:21.140000
CVE-2024-2028,0,0,5879943042d614ba399bf0758e5dda45ae5ecb9ad367a59e13a5814f1ed688df,2024-03-13T18:15:58.530000
CVE-2024-20287,0,0,73801d80b462793a88b2af436ab77ac49555a7cb9634b8a2ccc26dc598e491a1,2024-02-02T16:15:54.887000
CVE-2024-20290,0,0,057d5dfa7ca9ea45e2cb423f9faaf6e87f8f428206a3f34ecdd5587406e21147,2024-02-15T15:43:27.240000
@ -239377,17 +239383,28 @@ CVE-2024-20292,0,0,bd2670c9582b587cdf9a7328c2351789f5b8997cab8f7bfcaca92954507c5
CVE-2024-20294,0,0,1d3a9a3e9164827aaec419fc6a9a7d933913e3a790dc40da7ac082a33393bbf9,2024-02-29T13:49:29.390000
CVE-2024-2030,0,0,1279e34f262b0c0064508219ec7b722bb72cd0ff45a7c2dd1c4bd367a96f5a52,2024-03-13T18:15:58.530000
CVE-2024-20301,0,0,5731f674f5ae2bcf96420fc328e70e5146901802d1ab3db25461c019cd20961d,2024-03-07T13:52:27.110000
CVE-2024-20303,1,1,e5ac9d50052f4c4c8ef804ccaefc800a16509a09aa16e231d189818adcc2e3c2,2024-03-27T17:48:21.140000
CVE-2024-20305,0,0,ab61a4ab7882e267880cc2c0e6b3ec1ab9c8b4d0dadf3a4832bdf14ae2ae012d,2024-02-15T19:56:38.910000
CVE-2024-20306,1,1,7ce4ce882880d6a48a5bc5e41b86d2467b57bc87bd8f78243b3657e3eec48482,2024-03-27T17:48:21.140000
CVE-2024-20307,1,1,6e057a049f344ad501317a246d37c6a97da44c74d43554b7afa1d19dde729fe3,2024-03-27T18:15:09.357000
CVE-2024-20308,1,1,5982f15762a09863ecfc1c3105619d4c65dd988fdcec0e1b0f62fbfed1430f39,2024-03-27T18:15:09.853000
CVE-2024-20309,1,1,e1a5a828e0a9998a91a0f24ce922d605b9c5494ea6372c8e56a89d1b0cae6848,2024-03-27T17:48:21.140000
CVE-2024-2031,0,0,8c1bcd6bbcf916842768e08303dd42fc425614624a1e3216d105b6a1ddb5c8c0,2024-03-13T12:33:51.697000
CVE-2024-20311,1,1,c693e0e2ebd0ccff4af9c3de016bddd629d8a55f7bab90eb59f830d5f1210bde,2024-03-27T17:48:21.140000
CVE-2024-20312,1,1,c48be856a777b8fad526c083b489e4d8d6e24a6434163b12913e7e6d6bd387df,2024-03-27T17:48:21.140000
CVE-2024-20314,1,1,25da68acd340edea4119f8cd36c690ff3a322aebd5bc20462f4be9eaaddee7e2,2024-03-27T17:48:21.140000
CVE-2024-20315,0,0,831cd6ed54c2f6f2fd4097d9fc2e0953e1c74073f83cfb1960f6ad1247cec241,2024-03-13T18:15:58.530000
CVE-2024-20316,1,1,0facf79c751f7edbf8bf7eb947aeebd24e08d05d059114eedc01d842bfa7840d,2024-03-27T17:48:21.140000
CVE-2024-20318,0,0,31b265ae70125be15efc925115276ad5f47aba03d611ad31fd59e0405ac987ce,2024-03-13T18:15:58.530000
CVE-2024-20319,0,0,fce820c860756da39956bcf24654b4c258181605332ce4ef4670a251a36856dc,2024-03-13T18:15:58.530000
CVE-2024-20320,0,0,f414732037b8e5e2b31a0c4322e496ff34c28ecfb3a724091e51a412efa51350,2024-03-13T18:15:58.530000
CVE-2024-20321,0,0,6de34d7d404f536decd9f5a380e1c4f28760edee84d237a9b02d7c6e56d785b7,2024-03-04T22:45:23.647000
CVE-2024-20322,0,0,2b06b6a28ea98e3be45957586078049ced390e2bbb1013999023329f607687e9,2024-03-13T18:15:58.530000
CVE-2024-20324,1,1,4ceb90fa15b34b60a6093578287d94925925781fa75d2c106af71ed06f3f60fb,2024-03-27T17:48:21.140000
CVE-2024-20325,0,0,dfe1f947bf6fc9efa452f1881c4faae47bd9e909bfa416f69baa534db16c5289,2024-02-22T19:07:27.197000
CVE-2024-20327,0,0,99fc6b346e02158b3f4b7079ce29acef1779b3bc5057517cd2f663d4239946c0,2024-03-13T18:15:58.530000
CVE-2024-20328,0,0,f336e809226305b79cd50f26fae203aa1632211d86957dd92abacb2f83d51af6,2024-03-01T22:22:25.913000
CVE-2024-20333,1,1,0fc0d9f2bb75be1d1f2fb11cd6f9cf26712193c623a9dcfd720083347398fc6f,2024-03-27T17:48:21.140000
CVE-2024-20335,0,0,e7a578f13e250b46805a1e9177b3b5be279d06874d056b5f6fc5ebbcf99e61d7,2024-03-07T13:52:27.110000
CVE-2024-20336,0,0,79e0816d77620de3a577cfb98875db786f37b5ccab0f43d45d78748499d8cbc3,2024-03-07T13:52:27.110000
CVE-2024-20337,0,0,3b1a37d60fcaa85f947811f983b479d3e4900eee9d9299595cf069082e613c78,2024-03-07T13:52:27.110000
@ -239395,6 +239412,7 @@ CVE-2024-20338,0,0,5566f1b7285f199c07a2500bed0125d8d757cef5cccae1c32214ac0d6cd53
CVE-2024-20344,0,0,5701c086cd49552fb9b4e42b34522b298fb97269a26ec090e5fb132f538cd956,2024-02-29T13:49:29.390000
CVE-2024-20345,0,0,3d1a51edca02a2407f1ed6f3ffcbd5d09253c77ae2ce2b00247da9ce4f441eef,2024-03-07T13:52:27.110000
CVE-2024-20346,0,0,f967daadb6c5a5a55ae179293422d73f8c43ceb443c382f34755b3930e28b331,2024-03-06T21:42:54.697000
CVE-2024-20354,1,1,d77b2c2498bd40063174d789072339810259d4fa0e4bc5c8d41a694f11a95e02,2024-03-27T17:48:21.140000
CVE-2024-2042,0,0,f6d54c5204cd94c19a84e1963b44103dc197c946869366cb59a65e7a4114231d,2024-03-17T22:38:29.433000
CVE-2024-2044,0,0,3d73c6b2cc04bd01f48c15467e360d6d6689d47e2b89d6d93430f2c98bfeca1a,2024-03-23T03:15:12.063000
CVE-2024-2045,0,0,72838b74e2668b744754639ee1018477ba3696de5929605fbc709ccd12df2c15,2024-03-01T14:04:26.010000
@ -240636,6 +240654,8 @@ CVE-2024-23441,0,0,821a9fc4779da9403532f4be71c4c0616cc5f4f7bdd56ecb83e25ef4a979d
CVE-2024-23446,0,0,250d55c97e03f858281f4b571f5417bd7430f2eb75d812ec1a5460363cd232aa,2024-02-14T20:10:24.323000
CVE-2024-23447,0,0,d914699914a1032e2f26c2be4fcf7737ff60c4d99dbe7a58145b0312508d8818,2024-02-14T20:02:00.753000
CVE-2024-23448,0,0,9b1c1e9aca41646e9bc0b5aea887714df628a3eafb241e1a8858ac207b41bd27,2024-02-15T15:39:14.317000
CVE-2024-23450,1,1,6ff242ba8621158a6fc5bf1e14cebaff80a919a65abf5fe5c94bac3fd2cfef43,2024-03-27T17:48:21.140000
CVE-2024-23451,1,1,396a36e96f019a84ce41421d631ed0347d8e4d3267d4975e6f03c5a130a41249,2024-03-27T18:15:10.330000
CVE-2024-23452,0,0,aaa529ca6e03eefd16006bb57cfd95647fc8b44bb3a3176fd8a83e06021cb7e9,2024-02-29T01:44:08.877000
CVE-2024-23453,0,0,ab3a22284e10fea1933712f86026a2e7792304e1f83321557a4d02140679b266,2024-01-29T22:58:07.777000
CVE-2024-23476,0,0,e3d84cdb88c20fc5ad4183c7e154fd4eb94d6574a64f56328103056889f0fc9e,2024-02-20T20:39:10.033000
@ -240655,11 +240675,11 @@ CVE-2024-23506,0,0,1374ac637ee795ef76e472829586ea10162cf799e7f8facdf1ae775daa957
CVE-2024-23507,0,0,5e40ce7b11a8b26bc0a529a8393436247da9b21902b7ceeec2a950c934f8cd05,2024-02-05T20:42:09.590000
CVE-2024-23508,0,0,3a5d965b173789f90e04ab11d7235589e66f2e700d9aef01bbadb70d9def40c4,2024-02-05T20:27:29.570000
CVE-2024-2351,0,0,db54bad65395196f0c1789f4e2b7b2565491796aeba8bcf50c97119ee330dc9b,2024-03-21T02:52:33.103000
CVE-2024-23510,0,1,f7020632d5dbc868e99ae1897d50110782a9a2a4bc20759c8f8985d0284bfe7e,2024-03-27T15:49:41.437000
CVE-2024-23510,0,0,f7020632d5dbc868e99ae1897d50110782a9a2a4bc20759c8f8985d0284bfe7e,2024-03-27T15:49:41.437000
CVE-2024-23512,0,0,f774c1ac0cd010afc581062aca17eed5006d65805abf1bdf2daba7cd31140d9b,2024-02-12T14:19:54.330000
CVE-2024-23513,0,0,6b5819940e0cbb5eaed45cc3f1856dd03cfd514bc33059a14b7ee124f7e640d4,2024-02-12T14:19:54.330000
CVE-2024-23514,0,0,d7e3c284194c6ceaffde4175d0b48a010f01f7192801918385ee65be56400e43,2024-02-16T13:42:03.290000
CVE-2024-23515,0,1,53bf497ae935ccecb307d1bdcdbad5772717f87289795b507399eb475ef84725,2024-03-27T15:49:41.437000
CVE-2024-23515,0,0,53bf497ae935ccecb307d1bdcdbad5772717f87289795b507399eb475ef84725,2024-03-27T15:49:41.437000
CVE-2024-23516,0,0,f908beaf0aef3ecf8a8819fae23d2c4559de7dc9d2df85df41316958d107a5e0,2024-02-16T13:41:48.350000
CVE-2024-23517,0,0,e4bbedbc00468997609a0c9179822a4e7c082017c830cbf85558e35c31daa8f6,2024-02-16T13:41:33.563000
CVE-2024-23519,0,0,323d9800215ce0c9e36032433bafa6695128989b60bb35cada524fbfda63857e,2024-02-29T13:49:29.390000
@ -242114,8 +242134,8 @@ CVE-2024-26647,0,0,29bdc4340bafd301bcad34511ccc4699e791a96b6f9c94e00888fcdf9decc
CVE-2024-26648,0,0,28db65aa9bed6961e64f3164f5e2671ea79deb15b882dd8229f6c9a5965d8f38,2024-03-27T12:29:41.530000
CVE-2024-26649,0,0,86aeb2fae965a4a5332ed6f99e853d97c707f8eddf2b6cb0afb03f1458efaad0,2024-03-27T12:29:41.530000
CVE-2024-26650,0,0,a6462e36b1dd6f69ddd876eed038a048534eb12e06d7671796e4cb5890514076,2024-03-27T12:29:41.530000
CVE-2024-26651,0,1,a2e5e1171fae5cd37adc9c273beac8339c77df92cf6c9b2119d65e36bb3ce0f0,2024-03-27T15:49:41.437000
CVE-2024-26652,0,1,ccc590b218f45c6bb9fa7fed88041733bb926c9879d519c1ffc1f038a0a8e977,2024-03-27T15:49:41.437000
CVE-2024-26651,0,0,a2e5e1171fae5cd37adc9c273beac8339c77df92cf6c9b2119d65e36bb3ce0f0,2024-03-27T15:49:41.437000
CVE-2024-26652,0,0,ccc590b218f45c6bb9fa7fed88041733bb926c9879d519c1ffc1f038a0a8e977,2024-03-27T15:49:41.437000
CVE-2024-2668,0,0,d8e22e7bb795e8f8d48dc1ea67b8b3706e737c441fdb6e3cdf26dd6015682f9f,2024-03-21T02:52:41.070000
CVE-2024-2669,0,0,4f5a2d5969b59448109cf022193bd2b7c88dc7ffa7ca03caa723fb0f374642a3,2024-03-21T02:52:41.157000
CVE-2024-2670,0,0,51102bd696ec0a80433e00190a81242d0892d06afe5affb13dd51bd0c370ce65,2024-03-21T02:52:41.253000
@ -242153,7 +242173,7 @@ CVE-2024-27087,0,0,797d68e52883598465cd96feb0df00e139da26d73f23e4ac2cae928dbfb41
CVE-2024-27088,0,0,51e0e40780267d1754ef6fc0476358b31f9f3458dd54a6b66fef5c03c4a96208,2024-02-26T22:10:40.463000
CVE-2024-27089,0,0,80888df8a8beb579eb58ecd8e5017bb9d7c0dad21161e687af8e50a608c5d017,2024-02-26T20:19:06.073000
CVE-2024-2709,0,0,05c473f010934bdd2fa56f73920990168cacc8a107825196c2fa48c0e97716de,2024-03-21T12:58:51.093000
CVE-2024-27091,0,1,6c02da8a41fc8608262d0427db7fdd08eb03b81c66303da6889c1d90b51325a9,2024-03-27T15:49:51.300000
CVE-2024-27091,0,0,6c02da8a41fc8608262d0427db7fdd08eb03b81c66303da6889c1d90b51325a9,2024-03-27T15:49:51.300000
CVE-2024-27092,0,0,46c8a65175e30ca99bc1ca448e9739f5a9fd09a26b86761b076001350720e53c,2024-02-29T13:49:29.390000
CVE-2024-27093,0,0,2adc536c19af535e2a03a5b98ba4818457cc5a617ec41b1d012943c718349d43,2024-02-27T14:20:06.637000
CVE-2024-27094,0,0,5b44307768a1f51c7f559a6b28fd23c9fbc41c848843f808ad0625dfa254064d,2024-03-21T12:58:51.093000
@ -242235,7 +242255,7 @@ CVE-2024-2726,0,0,670b2be162ea05000bb5b040a32b1dee9c94eee7d1b48ed8e7d2e78e98ae50
CVE-2024-27265,0,0,caf2cbef481f9d0206d06f75a38ca052c5291ba0582e91875cea8f52e6d86a34,2024-03-19T16:52:02.767000
CVE-2024-27266,0,0,f3ab0f27c5fbbc81843b4329fa53134d5b91174cad9bacbbc5dbf01cfacc3864,2024-03-19T16:52:35.400000
CVE-2024-2727,0,0,89ce6b1f6bb0b4eb1c8d237648735f02e0931a62bd13bcc4638eefeb18037510,2024-03-22T15:34:43.663000
CVE-2024-27270,0,1,1dd30dbb0e3fca00e54defbdce0f737f2baf29b2c8e90e62b85e02800e0e4451,2024-03-27T15:49:51.300000
CVE-2024-27270,0,0,1dd30dbb0e3fca00e54defbdce0f737f2baf29b2c8e90e62b85e02800e0e4451,2024-03-27T15:49:51.300000
CVE-2024-27277,0,0,eb365bab444835328458e82045190ce3a564e0755801fc1f65f8b5d9bbf59bcb,2024-03-21T19:47:03.943000
CVE-2024-27278,0,0,2ef9546b6eb3a76ad70be700186038d995dd630654759ed72b9b3d10968f6d39,2024-03-06T15:18:08.093000
CVE-2024-27279,0,0,a0a465925dfcee0f633443a4d3db070f2bf023c10d4135b020d1a0fbe76c5a4b,2024-03-12T12:40:13.500000
@ -242678,7 +242698,7 @@ CVE-2024-28753,0,0,73ca850c1b6879daba607bc61d7d16457b56173a47004b8bff799b514a526
CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3b2c,2024-03-11T01:32:39.697000
CVE-2024-28756,0,0,25c89ab9b64cbd69060fc1b1f68e4f1c76ee574185097dbf9146fc8b2b315bf5,2024-03-22T12:45:36.130000
CVE-2024-28757,0,0,6f674e74da8b1d303f1997061736a8f7699c424c20f0aba68e441f140f441071,2024-03-23T03:15:11.920000
CVE-2024-28784,0,1,2bc1ea2e712d4e90db6a7b931c77b9f29985433c42fe688e3c826f016a685898,2024-03-27T15:49:51.300000
CVE-2024-28784,0,0,2bc1ea2e712d4e90db6a7b931c77b9f29985433c42fe688e3c826f016a685898,2024-03-27T15:49:51.300000
CVE-2024-28815,0,0,f9ba7e38674697b7d17d51e7b24c9c896d5b8cd72333d8b6833bda1b0cb49c74,2024-03-27T12:29:30.307000
CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000
CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000
@ -242692,8 +242712,8 @@ CVE-2024-28849,0,0,5e73d26630408070b9f2d0554aca63f533ce0044a2d97ed66eab06494ab2b
CVE-2024-2885,0,0,cf50d0de63046c25a9c06aae6750e831b06cf13de0fd69058b9ce32d2d050ac0,2024-03-27T12:29:30.307000
CVE-2024-28850,0,0,3f010e48b33d8f74ceb957fab8d6defaf56ad7dc42ab2eb1e3bf15c4cfbd82b3,2024-03-26T12:55:05.010000
CVE-2024-28851,0,0,f15187ac52243f1288d6dabed456ab5bd2287b2db60c97a538d0582f4f0ba12d,2024-03-17T22:38:29.433000
CVE-2024-28852,0,1,81477f31a68a79cf239e62d41f0c7941d39269da2e1c0040b745dee79d9f52fb,2024-03-27T15:49:41.437000
CVE-2024-28853,0,1,ea120d2b937113b211783fea6e205020383522b3385da9d8677cfced8a49293b,2024-03-27T15:49:41.437000
CVE-2024-28852,0,0,81477f31a68a79cf239e62d41f0c7941d39269da2e1c0040b745dee79d9f52fb,2024-03-27T15:49:41.437000
CVE-2024-28853,0,0,ea120d2b937113b211783fea6e205020383522b3385da9d8677cfced8a49293b,2024-03-27T15:49:41.437000
CVE-2024-28854,0,0,8cb03aded6b194ffbf5e93b6a999bfbf01ac8f736343c4fc752b0e38a8bc9f90,2024-03-17T22:38:29.433000
CVE-2024-28855,0,0,2384a3330fde47f752f152bfa13a6226cb6b236bb18ff2466f5e886c7d3e893c,2024-03-19T13:26:46
CVE-2024-28859,0,0,2d0407c7b83f2786a493b842ae3fe3ce3f906494adee8b0e0f61c75557fcb17c,2024-03-17T22:38:29.433000
@ -242867,56 +242887,56 @@ CVE-2024-29684,0,0,bf20e1eee3419c30e31b5c1e15077ebe4738914779e007adc0a6cf94ae841
CVE-2024-2971,0,0,898bc718d43d0c390c6d16657d6a8f74b1bed4195ca2be9f6e03b60807e37565,2024-03-27T12:29:30.307000
CVE-2024-29732,0,0,3aff958eec55f5cf06538251c792be6423021bd21573f6f2f920d098c9ad37bd,2024-03-21T12:58:51.093000
CVE-2024-29735,0,0,286fbba4f7cb1bbd32eae740efb468430068245735dc6c522579c415dcd44e18,2024-03-27T12:29:41.530000
CVE-2024-29758,0,1,850000367bf365fc67358722bd3f49f9e6efe1177fc04e28429703ce7619a3b6,2024-03-27T15:49:41.437000
CVE-2024-29759,0,1,604dde57e158ba268d6ad5edd22f6f9ee225a2c65d1a266897bc2dc328d431c0,2024-03-27T15:49:41.437000
CVE-2024-2976,0,1,0b50db41b4280994d8ba65b62c091178f13c54aa94ca8ab9ef2147cb1970d8ea,2024-03-27T15:49:41.437000
CVE-2024-29760,0,1,7eb818a3c28c1f97de13ad72a84131f01130ec37e7142cdb428d023e4ce66871,2024-03-27T15:49:41.437000
CVE-2024-29761,0,1,cc5c3ba7815c601086b652c857d276cd318c49aa89a3c9384e9951044880487b,2024-03-27T15:49:41.437000
CVE-2024-29762,0,1,aaddd686bc3db71dabf4f7e85f42e6c46b97df4732f38ffb96878045fdd29b25,2024-03-27T15:49:41.437000
CVE-2024-29763,0,1,30323441c62e60ca33f6dd2c29898360453843790bcc6e91d33af1ae4fa17148,2024-03-27T15:49:41.437000
CVE-2024-29764,0,1,a7e034992ed1c63536559262a04804a84bd56ff02c9edb940bd6a052423afb08,2024-03-27T15:49:41.437000
CVE-2024-29765,0,1,98e82fd5fded6cd499e69c0f014328d69598d01afd9585e3714d45b0fbd70415,2024-03-27T15:49:41.437000
CVE-2024-29766,0,1,45c1da4cd021b137fe62f544f1028abb2098662c1dbd6348f454f93491c946b7,2024-03-27T15:49:51.300000
CVE-2024-29767,0,1,3a1e80de1205c2b3c4e911ff057ffa52ee92306bf90fb66835329b42a0a4471c,2024-03-27T15:49:51.300000
CVE-2024-29768,0,1,d9762da294a1ca22ea7a67aa43fe98efb43232a0a476c14841d2c754ac4a606b,2024-03-27T15:49:51.300000
CVE-2024-29769,0,1,c9ab754c046c255443da858120ac7312f6c44f9137f47bb927c2d35cc00ea50c,2024-03-27T15:49:51.300000
CVE-2024-2977,0,1,265a8e0885b275ccb8c8a7fb5d6b545c4848fc25e3d153bde1d499f0e11c2444,2024-03-27T15:49:41.437000
CVE-2024-29770,0,1,a49737f958ade2e568c6a268defe7fd245f9865b992e740d9c5f4c1b1df7cb94,2024-03-27T15:49:51.300000
CVE-2024-29771,0,1,99eaaf300460484cb14da0ae3234fa8f436a97aa719f6da5c1afc3c68c088288,2024-03-27T15:49:51.300000
CVE-2024-29772,0,1,a0fde1848c9f64fbc382c578c7e01c4c0ab620bd0ead0e612d021fe39802b51b,2024-03-27T15:49:51.300000
CVE-2024-29773,0,1,acb085aed13af95bb8372ad0588f2261bd14f1251d46b2a953f7e9c206793454,2024-03-27T15:49:41.437000
CVE-2024-29774,0,1,ae6539860a62635b04f816c43ef0f8b274e7a885187931e27451e43c4732f9c1,2024-03-27T15:49:51.300000
CVE-2024-29775,0,1,c579fdc00d77d197afe0af16c71be06b98b4f8e7314c1a2e1eb78f6992cd8305,2024-03-27T15:49:41.437000
CVE-2024-29776,0,1,41c24a7d916a74c4603a3edaaed2be0a1d06a9fb7a65c8c9e2ca59dc51827147,2024-03-27T15:49:41.437000
CVE-2024-29777,0,1,6ca2f9794500ac914681af47788da89b9c80d56e1876cb1f64975d9a66ffb8a4,2024-03-27T15:49:41.437000
CVE-2024-2978,0,1,ccc57f57023ca7268aaa9e33e078721d1b8ed4cc2a9d5fba1402a5ae074e2103,2024-03-27T15:49:41.437000
CVE-2024-29788,0,1,2fb18370a76e5cb12562cdeaf4ac512430afc35aaba20836464a022117314d5a,2024-03-27T15:49:41.437000
CVE-2024-29789,0,1,527e862cf3490a2c7f0ebc13eb33a969d581e7c1ad36955ed4d6e199035cdaa6,2024-03-27T15:49:41.437000
CVE-2024-2979,0,1,b48fa5c9d2f47bc4e52ee839def41fa08bbb2e05a711ae00ed5d25891030ebd0,2024-03-27T15:49:41.437000
CVE-2024-29790,0,1,33f7dab8aab944a64462c58246cf3a4aa8b3acf33d35f16594fcf0e9e0e49eec,2024-03-27T15:49:41.437000
CVE-2024-29791,0,1,da3ce5323fe0059f87050dffbd1c548157467ea6614ee9f88f6fe2389b7969ef,2024-03-27T15:49:41.437000
CVE-2024-29792,0,1,1cc3a43409e151a80fd012c5bec518b61fa90dc58697900f281dd38c77b3dedf,2024-03-27T15:49:41.437000
CVE-2024-29793,0,1,38990b7403b37a4b172e4b95aaa1873a77115e041022e69af6fe1a71828c57f7,2024-03-27T15:49:41.437000
CVE-2024-29794,0,1,4e1539afb130e7d8b5b602b4774a03d21365dcd87ac0b2851375a396e3a96328,2024-03-27T15:49:41.437000
CVE-2024-29795,0,1,f1a7c8c32a0c2edb61fe45efb42ecf6718606c318c61e81cc9ede03fc04a89d4,2024-03-27T15:49:41.437000
CVE-2024-29796,0,1,aaa707079b712de4c1539fc5342496e10082d2b15da68bddf8004c4d4177bb76,2024-03-27T15:49:41.437000
CVE-2024-29797,0,1,f4d0695be063b4aa93c639c7e7ecc9649ecb1f66cb10856f41ecc87aef7cdf89,2024-03-27T15:49:41.437000
CVE-2024-29798,0,1,e4cde7751e85b2aa0407fc3f0780fe5af2f13da8d8f278ca7bbe875863a7dcbd,2024-03-27T15:49:41.437000
CVE-2024-29799,0,1,f1281c50846b69e40773fdd85d2ac4c83e1c7a0539df9e80293cfe5915e9fe72,2024-03-27T15:49:41.437000
CVE-2024-2980,1,1,f134107d0ff7e395a04515a053eb7eea89201a89938306b64df80e4ed25ab2ae,2024-03-27T15:49:41.437000
CVE-2024-29801,0,1,723ff24a22f5c35bfa87fba17edbd54dc3241a90618f7407842799030e337d3a,2024-03-27T15:49:41.437000
CVE-2024-29802,0,1,f0281d2f4c4f7b33e6995f73ab5f2da2dcad47bf02c650232bfa71db30f560d1,2024-03-27T15:49:41.437000
CVE-2024-29803,0,1,ec2d6e8b1de4f1b12189eb4f5f1b8889e432d71bec7878f196027a0271541134,2024-03-27T15:49:41.437000
CVE-2024-29804,0,1,e1a5eba48948258de92f35b86a197e4e3725bcb26472341e46a5d04fa4f155f9,2024-03-27T15:49:41.437000
CVE-2024-29805,0,1,bbcea86f7733f810b3280a0692ef470761110b7d55b9f4d7c96e636d1e3103b5,2024-03-27T15:49:41.437000
CVE-2024-29806,0,1,1fa0a4d7bcdf174f5850cd4be365ca5b2be71d8963cf745f412aed7bbc2ec06e,2024-03-27T15:49:41.437000
CVE-2024-29807,0,1,a70ed7c03cde5e433e6ebe101af7f7df5552bde53453625634bd6b408cd95fdb,2024-03-27T15:49:41.437000
CVE-2024-29758,0,0,850000367bf365fc67358722bd3f49f9e6efe1177fc04e28429703ce7619a3b6,2024-03-27T15:49:41.437000
CVE-2024-29759,0,0,604dde57e158ba268d6ad5edd22f6f9ee225a2c65d1a266897bc2dc328d431c0,2024-03-27T15:49:41.437000
CVE-2024-2976,0,0,0b50db41b4280994d8ba65b62c091178f13c54aa94ca8ab9ef2147cb1970d8ea,2024-03-27T15:49:41.437000
CVE-2024-29760,0,0,7eb818a3c28c1f97de13ad72a84131f01130ec37e7142cdb428d023e4ce66871,2024-03-27T15:49:41.437000
CVE-2024-29761,0,0,cc5c3ba7815c601086b652c857d276cd318c49aa89a3c9384e9951044880487b,2024-03-27T15:49:41.437000
CVE-2024-29762,0,0,aaddd686bc3db71dabf4f7e85f42e6c46b97df4732f38ffb96878045fdd29b25,2024-03-27T15:49:41.437000
CVE-2024-29763,0,0,30323441c62e60ca33f6dd2c29898360453843790bcc6e91d33af1ae4fa17148,2024-03-27T15:49:41.437000
CVE-2024-29764,0,0,a7e034992ed1c63536559262a04804a84bd56ff02c9edb940bd6a052423afb08,2024-03-27T15:49:41.437000
CVE-2024-29765,0,0,98e82fd5fded6cd499e69c0f014328d69598d01afd9585e3714d45b0fbd70415,2024-03-27T15:49:41.437000
CVE-2024-29766,0,0,45c1da4cd021b137fe62f544f1028abb2098662c1dbd6348f454f93491c946b7,2024-03-27T15:49:51.300000
CVE-2024-29767,0,0,3a1e80de1205c2b3c4e911ff057ffa52ee92306bf90fb66835329b42a0a4471c,2024-03-27T15:49:51.300000
CVE-2024-29768,0,0,d9762da294a1ca22ea7a67aa43fe98efb43232a0a476c14841d2c754ac4a606b,2024-03-27T15:49:51.300000
CVE-2024-29769,0,0,c9ab754c046c255443da858120ac7312f6c44f9137f47bb927c2d35cc00ea50c,2024-03-27T15:49:51.300000
CVE-2024-2977,0,0,265a8e0885b275ccb8c8a7fb5d6b545c4848fc25e3d153bde1d499f0e11c2444,2024-03-27T15:49:41.437000
CVE-2024-29770,0,0,a49737f958ade2e568c6a268defe7fd245f9865b992e740d9c5f4c1b1df7cb94,2024-03-27T15:49:51.300000
CVE-2024-29771,0,0,99eaaf300460484cb14da0ae3234fa8f436a97aa719f6da5c1afc3c68c088288,2024-03-27T15:49:51.300000
CVE-2024-29772,0,0,a0fde1848c9f64fbc382c578c7e01c4c0ab620bd0ead0e612d021fe39802b51b,2024-03-27T15:49:51.300000
CVE-2024-29773,0,0,acb085aed13af95bb8372ad0588f2261bd14f1251d46b2a953f7e9c206793454,2024-03-27T15:49:41.437000
CVE-2024-29774,0,0,ae6539860a62635b04f816c43ef0f8b274e7a885187931e27451e43c4732f9c1,2024-03-27T15:49:51.300000
CVE-2024-29775,0,0,c579fdc00d77d197afe0af16c71be06b98b4f8e7314c1a2e1eb78f6992cd8305,2024-03-27T15:49:41.437000
CVE-2024-29776,0,0,41c24a7d916a74c4603a3edaaed2be0a1d06a9fb7a65c8c9e2ca59dc51827147,2024-03-27T15:49:41.437000
CVE-2024-29777,0,0,6ca2f9794500ac914681af47788da89b9c80d56e1876cb1f64975d9a66ffb8a4,2024-03-27T15:49:41.437000
CVE-2024-2978,0,0,ccc57f57023ca7268aaa9e33e078721d1b8ed4cc2a9d5fba1402a5ae074e2103,2024-03-27T15:49:41.437000
CVE-2024-29788,0,0,2fb18370a76e5cb12562cdeaf4ac512430afc35aaba20836464a022117314d5a,2024-03-27T15:49:41.437000
CVE-2024-29789,0,0,527e862cf3490a2c7f0ebc13eb33a969d581e7c1ad36955ed4d6e199035cdaa6,2024-03-27T15:49:41.437000
CVE-2024-2979,0,0,b48fa5c9d2f47bc4e52ee839def41fa08bbb2e05a711ae00ed5d25891030ebd0,2024-03-27T15:49:41.437000
CVE-2024-29790,0,0,33f7dab8aab944a64462c58246cf3a4aa8b3acf33d35f16594fcf0e9e0e49eec,2024-03-27T15:49:41.437000
CVE-2024-29791,0,0,da3ce5323fe0059f87050dffbd1c548157467ea6614ee9f88f6fe2389b7969ef,2024-03-27T15:49:41.437000
CVE-2024-29792,0,0,1cc3a43409e151a80fd012c5bec518b61fa90dc58697900f281dd38c77b3dedf,2024-03-27T15:49:41.437000
CVE-2024-29793,0,0,38990b7403b37a4b172e4b95aaa1873a77115e041022e69af6fe1a71828c57f7,2024-03-27T15:49:41.437000
CVE-2024-29794,0,0,4e1539afb130e7d8b5b602b4774a03d21365dcd87ac0b2851375a396e3a96328,2024-03-27T15:49:41.437000
CVE-2024-29795,0,0,f1a7c8c32a0c2edb61fe45efb42ecf6718606c318c61e81cc9ede03fc04a89d4,2024-03-27T15:49:41.437000
CVE-2024-29796,0,0,aaa707079b712de4c1539fc5342496e10082d2b15da68bddf8004c4d4177bb76,2024-03-27T15:49:41.437000
CVE-2024-29797,0,0,f4d0695be063b4aa93c639c7e7ecc9649ecb1f66cb10856f41ecc87aef7cdf89,2024-03-27T15:49:41.437000
CVE-2024-29798,0,0,e4cde7751e85b2aa0407fc3f0780fe5af2f13da8d8f278ca7bbe875863a7dcbd,2024-03-27T15:49:41.437000
CVE-2024-29799,0,0,f1281c50846b69e40773fdd85d2ac4c83e1c7a0539df9e80293cfe5915e9fe72,2024-03-27T15:49:41.437000
CVE-2024-2980,0,0,f134107d0ff7e395a04515a053eb7eea89201a89938306b64df80e4ed25ab2ae,2024-03-27T15:49:41.437000
CVE-2024-29801,0,0,723ff24a22f5c35bfa87fba17edbd54dc3241a90618f7407842799030e337d3a,2024-03-27T15:49:41.437000
CVE-2024-29802,0,0,f0281d2f4c4f7b33e6995f73ab5f2da2dcad47bf02c650232bfa71db30f560d1,2024-03-27T15:49:41.437000
CVE-2024-29803,0,0,ec2d6e8b1de4f1b12189eb4f5f1b8889e432d71bec7878f196027a0271541134,2024-03-27T15:49:41.437000
CVE-2024-29804,0,0,e1a5eba48948258de92f35b86a197e4e3725bcb26472341e46a5d04fa4f155f9,2024-03-27T15:49:41.437000
CVE-2024-29805,0,0,bbcea86f7733f810b3280a0692ef470761110b7d55b9f4d7c96e636d1e3103b5,2024-03-27T15:49:41.437000
CVE-2024-29806,0,0,1fa0a4d7bcdf174f5850cd4be365ca5b2be71d8963cf745f412aed7bbc2ec06e,2024-03-27T15:49:41.437000
CVE-2024-29807,0,0,a70ed7c03cde5e433e6ebe101af7f7df5552bde53453625634bd6b408cd95fdb,2024-03-27T15:49:41.437000
CVE-2024-29808,0,0,1a083356e9d0f501470cdfed0d1c85987d8c8667e4684d7b2ae73ab2fb9e2d44,2024-03-26T17:09:53.043000
CVE-2024-29809,0,0,21a6514e4479b2af7c07059597ccbdef1cddc762bb223c6efd7d97d6a6cee8d3,2024-03-26T17:09:53.043000
CVE-2024-2981,1,1,63fba9d2c68cd2879c505cf8d50b9a3caeb150f5fed9881fb4066302e315473c,2024-03-27T15:49:41.437000
CVE-2024-2981,0,0,63fba9d2c68cd2879c505cf8d50b9a3caeb150f5fed9881fb4066302e315473c,2024-03-27T15:49:41.437000
CVE-2024-29810,0,0,eff91a2f0d80ceae6d9d4c914195c5a044b82fbe1cafb4a26b6b9c2e1aa693cf,2024-03-26T17:09:53.043000
CVE-2024-29811,0,1,484b9a978cf4458e6a6cd3e1d014b1a9b41a0d8478a1a8ee658320929485e4c5,2024-03-27T15:49:41.437000
CVE-2024-29812,0,1,eea488bae5a3bc74c00dca82c435160bacb5f5ae567985445e1e1039cfede973,2024-03-27T15:49:41.437000
CVE-2024-29811,0,0,484b9a978cf4458e6a6cd3e1d014b1a9b41a0d8478a1a8ee658320929485e4c5,2024-03-27T15:49:41.437000
CVE-2024-29812,0,0,eea488bae5a3bc74c00dca82c435160bacb5f5ae567985445e1e1039cfede973,2024-03-27T15:49:41.437000
CVE-2024-29813,0,0,b92c8b4b8dc44fdf902974ed6bdae2df7d58513146055d3aee69855a4f40f773,2024-03-27T12:29:30.307000
CVE-2024-29814,0,0,066a243dd0997d380d27eb89de10396940c1484c7e51310d2de950a5d930462b,2024-03-27T12:29:30.307000
CVE-2024-29815,0,0,e474045fee5a994704d14c9b91da0090703e8eef80577b15658e4496608af879,2024-03-27T12:29:30.307000
@ -242924,18 +242944,21 @@ CVE-2024-29816,0,0,26098ad42810abc782a6312323b3749848e728c068871f3a8e562ffd3827f
CVE-2024-29817,0,0,b9d7d90bcba101b5bf99517f691b068a1efc5e5e388d754e386eca951d336d45,2024-03-27T12:29:30.307000
CVE-2024-29818,0,0,44af120b55fc277e2559e8317cff590953d75564f18e5cdb1a3adef98c7f6fa2,2024-03-27T12:29:30.307000
CVE-2024-29819,0,0,489085f50dbde78feed33cc0a68fd671c989aac2e872d0b30a126d7fff3447e6,2024-03-27T12:29:30.307000
CVE-2024-2982,1,1,477f547330f0ab08e6d21faee4dc47be09f9639ddaea8955ea45d08f1c1fd24f,2024-03-27T16:15:10.210000
CVE-2024-2982,0,1,dda049ea5d2486c6f2bdb234a1dfc5a467a2381ac2f931408cf9328cd77cd76d,2024-03-27T17:48:21.140000
CVE-2024-29820,0,0,da81473ce6ac9b7a0c8169d0e94b81abe513c85a432f3965c234ec8d7d8b927f,2024-03-27T12:29:30.307000
CVE-2024-2983,1,1,3798275594497c10345a0244007437a821bd5cea22741ef9c039b13c5b602bb7,2024-03-27T16:15:10.450000
CVE-2024-2983,0,1,873ca2d79b54162cace8ca3da7294f22ebfacbb79289c971b5f392cd577e4689,2024-03-27T17:48:21.140000
CVE-2024-29832,0,0,e21971089d12a8b67bd5dc57f7dea93be0cc79e81378beb3ae2f03d4ff6e4c14,2024-03-26T17:09:53.043000
CVE-2024-29833,0,0,4c9a8c532b47162f5aea1ac06e294c5bbf9e597d7d17a1d16e86b5dc1293a53a,2024-03-26T17:09:53.043000
CVE-2024-2984,1,1,82a30415ede29bd42a5fc32bfdc177889cae7d7e274f41d7b410438a4a7a2ef8,2024-03-27T16:15:10.713000
CVE-2024-2984,0,1,2d375aee96f2c9f8a84e53391976f555aaa90b5661a5979b39e2ea2d3b374caf,2024-03-27T17:48:21.140000
CVE-2024-2985,1,1,d2c440a5fe0f8e92f2900a5671fbef483e2af166b02191dac0aceb0548aa2911,2024-03-27T17:48:21.140000
CVE-2024-29858,0,0,585719d860c91771e96e52d882eed744121f21e899f727afe6b381f4ffbb308d,2024-03-21T12:58:51.093000
CVE-2024-29859,0,0,6ebff5730a73f542ffebf0a56f74146bb69314ac3f95118519ec4b678666f245,2024-03-21T12:58:51.093000
CVE-2024-2986,1,1,c77fe7aa4ac5882d2496045c16279acb6d3f21728c12d35e86b894b6435b955d,2024-03-27T17:48:21.140000
CVE-2024-29862,0,0,78f62d6320f790cb50cb5767943bbca91d7f9763b83315a1495201af3fd41026,2024-03-21T12:58:51.093000
CVE-2024-29864,0,0,3c9560ffae0fa16acac4cf8327bf4ae3182996a8c684b25430908ed832b73c71,2024-03-21T12:58:51.093000
CVE-2024-29865,0,0,e24c5786380c2695525e4e2d9b0d8cb3d2e21b4351c584a8032e8ded5e6f9da9,2024-03-22T15:34:43.663000
CVE-2024-29866,0,0,d3474a4cb7339082dcfbd889d056a2a906f051d7c933d6576013f44ee70632b2,2024-03-21T15:24:35.093000
CVE-2024-2987,1,1,b4986bea0aba6f48be24f8f454c5e35bb2f698d582004b815160c33ab9e532b1,2024-03-27T17:48:21.140000
CVE-2024-29870,0,0,04eec461d26d3928388aa1ebeda7f3889d70d7fb805b862b11fc37cdb9c73805,2024-03-21T15:24:35.093000
CVE-2024-29871,0,0,e7b820291fe87f3c68126b9e66a3cb2071635a1781039b23d1340b3ec50d7104,2024-03-21T15:24:35.093000
CVE-2024-29872,0,0,2ed0e31c2aeb7a79b11a328bd37ec6ac592cb7ae8ad49b21b1fd6587d921da01,2024-03-21T15:24:35.093000
@ -242946,9 +242969,11 @@ CVE-2024-29876,0,0,81e9b92db68fe1869c86668a1e00f2a9ff624f59839df1fbe18d8e987774c
CVE-2024-29877,0,0,5b6a7271e346dceec62c9141f9ae12b0e5342a31cc26366c653fe20c26c8bc21,2024-03-21T15:24:35.093000
CVE-2024-29878,0,0,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dda8d,2024-03-21T15:24:35.093000
CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000
CVE-2024-2988,1,1,44a505017c98ed38c8d5dc5d8e011605d3c9f7895e5eca811eae32b18fc8f7bb,2024-03-27T18:15:10.757000
CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000
CVE-2024-29881,0,0,7eaff78a6eecd508372203508f2ecab97ebc62cfd94b7af6101b5d7b6ca209b2,2024-03-26T17:09:53.043000
CVE-2024-29883,0,0,2444d321a867d6f4cdf63bf8a1bc6af3b407752f2134c1f64a1d02545242c426,2024-03-26T17:09:53.043000
CVE-2024-2989,1,1,28b7dcd865137d9f2b8b08b53206e10e337ffacc5ed400750f6a854bac66dab1,2024-03-27T18:15:11.293000
CVE-2024-29906,0,0,5e6afa8dbe77b2ceaee29629c66d8bdf273caddf4f38f955d682aeefe9beab4c,2024-03-27T12:29:30.307000
CVE-2024-29907,0,0,95ebf1e66704307f93559559f18923b10f644f7f3c6486fedede31060b34f004,2024-03-27T12:29:30.307000
CVE-2024-29908,0,0,e8d16098eaf081188862f8dc959904187f56568ff6eac559fa0228e1e293cd7d,2024-03-27T12:29:30.307000
@ -242982,6 +243007,8 @@ CVE-2024-29935,0,0,be0415ab39e2424d7707b3e026043937bddf40f9f881b75f312fe4db29a75
CVE-2024-29936,0,0,a0aa951ea6a61ca1da8503010b43db132d71646708e0e57d95e11fe2a44ec10b,2024-03-27T12:29:30.307000
CVE-2024-29943,0,0,39d573a490fc5d2b219e8af270d3feeff9aa72e4341ddd52f10b0ddfa677f78e,2024-03-22T15:34:43.663000
CVE-2024-29944,0,0,4d21f9c7c1ab1ff30cce77b261f7b06b8e28526248b968d986726dab452f24fc,2024-03-25T17:15:51.670000
CVE-2024-29945,1,1,97b7c829f41e6375bb757d6df21152ea8c651e9cee7b85bf8ce197c3feb776e6,2024-03-27T17:48:21.140000
CVE-2024-29946,1,1,1dcd38a0ed008144b587f71b29e9f0373aec4787ad19668521370ecc593e8a2d,2024-03-27T17:48:21.140000
CVE-2024-30156,0,0,aff0cd27a6d4ebd55e03f44f61cc23ee9163e094843acbac5af736e684ab9391,2024-03-25T01:51:01.223000
CVE-2024-30161,0,0,f6d00094643508d05d1e5626fca4ef83c82ab69ba4696adb329c49eff6d0ab4a,2024-03-25T01:51:01.223000
CVE-2024-30177,0,0,ce7cec2fca67508ea4a8b86ac0339410ad9c9cb05c2afad1960db626913e7789,2024-03-27T12:29:30.307000
@ -243013,4 +243040,4 @@ CVE-2024-30232,0,0,f91ac1a16b6560e63a231b2b02f73b0e579de91231d5661b2fdb0493e2d31
CVE-2024-30233,0,0,4c2695d2f3b076c7408bd91fee17c2a607f64636c8c0001f359b0796de1d2054,2024-03-26T17:09:53.043000
CVE-2024-30234,0,0,a6be244378f8a1646e756d1cd111fc8fb568601f74deb65508c56b004a03b137,2024-03-26T17:09:53.043000
CVE-2024-30235,0,0,ef6f7f84deca979173abd2d122dde5dfb4f5568a80e848e8fa95eae1319c946f,2024-03-26T17:09:53.043000
CVE-2024-30238,0,1,33e85580fdd0a4e3fa2eff1ee3b65f63c015d9c54bc4af4192eb2ee2204281b7,2024-03-27T15:49:41.437000
CVE-2024-30238,0,0,33e85580fdd0a4e3fa2eff1ee3b65f63c015d9c54bc4af4192eb2ee2204281b7,2024-03-27T15:49:41.437000

Can't render this file because it is too large.