mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-03-27T19:00:37.713009+00:00
This commit is contained in:
parent
9ca3e5e641
commit
625ac53827
59
CVE-2023/CVE-2023-05xx/CVE-2023-0582.json
Normal file
59
CVE-2023/CVE-2023-05xx/CVE-2023-0582.json
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-0582",
|
||||||
|
"sourceIdentifier": "psirt@forgerock.com",
|
||||||
|
"published": "2024-03-27T18:15:08.237",
|
||||||
|
"lastModified": "2024-03-27T18:15:08.237",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ForgeRock Access Management allows Authorization Bypass.\n\nThis issue affects access management: before 7.3.0, before 7.2.1, before 7.1.4, through 7.0.2.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@forgerock.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 8.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@forgerock.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-22"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://backstage.forgerock.com/downloads/browse/am/featured",
|
||||||
|
"source": "psirt@forgerock.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://backstage.forgerock.com/knowledge/kb/article/a64088600",
|
||||||
|
"source": "psirt@forgerock.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-5189",
|
"id": "CVE-2023-5189",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2023-11-14T23:15:12.290",
|
"published": "2023-11-14T23:15:12.290",
|
||||||
"lastModified": "2023-12-13T10:15:10.110",
|
"lastModified": "2024-03-27T18:15:08.710",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -97,6 +97,10 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2023:7773",
|
"url": "https://access.redhat.com/errata/RHSA-2023:7773",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:1536",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-5189",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-5189",
|
||||||
"source": "secalert@redhat.com",
|
"source": "secalert@redhat.com",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-1540",
|
"id": "CVE-2024-1540",
|
||||||
"sourceIdentifier": "security@huntr.dev",
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
"published": "2024-03-27T16:15:09.963",
|
"published": "2024-03-27T16:15:09.963",
|
||||||
"lastModified": "2024-03-27T16:15:09.963",
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-1580",
|
"id": "CVE-2024-1580",
|
||||||
"sourceIdentifier": "cve-coordination@google.com",
|
"sourceIdentifier": "cve-coordination@google.com",
|
||||||
"published": "2024-02-19T11:15:08.817",
|
"published": "2024-02-19T11:15:08.817",
|
||||||
"lastModified": "2024-03-26T00:15:08.497",
|
"lastModified": "2024-03-27T18:15:09.063",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,6 +51,30 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/36",
|
||||||
|
"source": "cve-coordination@google.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/37",
|
||||||
|
"source": "cve-coordination@google.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/38",
|
||||||
|
"source": "cve-coordination@google.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/39",
|
||||||
|
"source": "cve-coordination@google.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/40",
|
||||||
|
"source": "cve-coordination@google.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/41",
|
||||||
|
"source": "cve-coordination@google.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://code.videolan.org/videolan/dav1d/-/blob/master/NEWS",
|
"url": "https://code.videolan.org/videolan/dav1d/-/blob/master/NEWS",
|
||||||
"source": "cve-coordination@google.com"
|
"source": "cve-coordination@google.com"
|
||||||
|
55
CVE-2024/CVE-2024-202xx/CVE-2024-20259.json
Normal file
55
CVE-2024/CVE-2024-202xx/CVE-2024-20259.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-20259",
|
||||||
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||||||
|
"published": "2024-03-27T17:15:50.913",
|
||||||
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to a crafted IPv4 DHCP request packet being mishandled when endpoint analytics are enabled. An attacker could exploit this vulnerability by sending a crafted DHCP request through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.\r\n\r Note: The attack vector is listed as network because a DHCP relay anywhere on the network could allow exploits from networks other than the adjacent one."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.6,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 4.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-122"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dhcp-dos-T3CXPO9z",
|
||||||
|
"source": "ykramarz@cisco.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-202xx/CVE-2024-20265.json
Normal file
55
CVE-2024/CVE-2024-202xx/CVE-2024-20265.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-20265",
|
||||||
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||||||
|
"published": "2024-03-27T17:15:51.113",
|
||||||
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability in the boot process of Cisco Access Point (AP) Software could allow an unauthenticated, physical attacker to bypass the Cisco Secure Boot functionality and load a software image that has been tampered with on an affected device.\r\n\r This vulnerability exists because unnecessary commands are available during boot time at the physical console. An attacker could exploit this vulnerability by interrupting the boot process and executing specific commands to bypass the Cisco Secure Boot validation checks and load an image that has been tampered with. This image would have been previously downloaded onto the targeted device. A successful exploit could allow the attacker to load the image once. The Cisco Secure Boot functionality is not permanently compromised."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"attackVector": "PHYSICAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.7,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-501"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-secureboot-bypass-zT5vJkSD",
|
||||||
|
"source": "ykramarz@cisco.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-202xx/CVE-2024-20271.json
Normal file
55
CVE-2024/CVE-2024-202xx/CVE-2024-20271.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-20271",
|
||||||
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||||||
|
"published": "2024-03-27T17:15:51.320",
|
||||||
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability in the IP packet processing of Cisco Access Point (AP) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to insufficient input validation of certain IPv4 packets. An attacker could exploit this vulnerability by sending a crafted IPv4 packet either to or through an affected device. A successful exploit could allow the attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition. To successfully exploit this vulnerability, the attacker does not need to be associated with the affected AP. This vulnerability cannot be exploited by sending IPv6 packets."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.6,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 4.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-20"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-dos-h9TGGX6W",
|
||||||
|
"source": "ykramarz@cisco.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-202xx/CVE-2024-20276.json
Normal file
55
CVE-2024/CVE-2024-202xx/CVE-2024-20276.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-20276",
|
||||||
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||||||
|
"published": "2024-03-27T17:15:51.513",
|
||||||
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability in Cisco IOS Software for Cisco Catalyst 6000 Series Switches could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly.\r\n\r This vulnerability is due to improper handling of process-switched traffic. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||||
|
"attackVector": "ADJACENT_NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.4,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 4.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-248"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-dos-Hq4d3tZG",
|
||||||
|
"source": "ykramarz@cisco.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-202xx/CVE-2024-20278.json
Normal file
55
CVE-2024/CVE-2024-202xx/CVE-2024-20278.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-20278",
|
||||||
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||||||
|
"published": "2024-03-27T17:15:51.703",
|
||||||
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability in the NETCONF feature of Cisco IOS XE Software could allow an authenticated, remote attacker to elevate privileges to root on an affected device.\r\n\r This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input over NETCONF to an affected device. A successful exploit could allow the attacker to elevate privileges from Administrator to root."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-184"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-seAx6NLX",
|
||||||
|
"source": "ykramarz@cisco.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20303.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20303.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-20303",
|
||||||
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||||||
|
"published": "2024-03-27T17:15:51.880",
|
||||||
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability in the multicast DNS (mDNS) gateway feature of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper management of mDNS client entries. An attacker could exploit this vulnerability by connecting to the wireless network and sending a continuous stream of specific mDNS packets. A successful exploit could allow the attacker to cause the wireless controller to have high CPU utilization, which could lead to access points (APs) losing their connection to the controller and result in a DoS condition."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||||
|
"attackVector": "ADJACENT_NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.4,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 4.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-459"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-mdns-dos-4hv6pBGf",
|
||||||
|
"source": "ykramarz@cisco.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20306.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20306.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-20306",
|
||||||
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||||||
|
"published": "2024-03-27T17:15:52.067",
|
||||||
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability in the Unified Threat Defense (UTD) configuration CLI of Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying host operating system. To exploit this vulnerability, an attacker must have level 15 privileges on the affected device. \r\n\r This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by submitting a crafted CLI command to an affected device. A successful exploit could allow the attacker to execute arbitrary commands as root on the underlying operating system."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.0,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.8,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-233"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-utd-cmd-JbL8KvHT",
|
||||||
|
"source": "ykramarz@cisco.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20307.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20307.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-20307",
|
||||||
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||||||
|
"published": "2024-03-27T18:15:09.357",
|
||||||
|
"lastModified": "2024-03-27T18:15:09.357",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a heap overflow, resulting in an affected device reloading.\r\n\r This vulnerability exists because crafted, fragmented IKEv1 packets are not properly reassembled. An attacker could exploit this vulnerability by sending crafted UDP packets to an affected system. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.\r\n\r Note: Only traffic that is directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 6.8,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 4.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-121"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev1-NO2ccFWz",
|
||||||
|
"source": "ykramarz@cisco.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
43
CVE-2024/CVE-2024-203xx/CVE-2024-20308.json
Normal file
43
CVE-2024/CVE-2024-203xx/CVE-2024-20308.json
Normal file
@ -0,0 +1,43 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-20308",
|
||||||
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||||||
|
"published": "2024-03-27T18:15:09.853",
|
||||||
|
"lastModified": "2024-03-27T18:15:09.853",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a heap underflow, resulting in an affected device reloading.\r\n\r This vulnerability exists because crafted, fragmented IKEv1 packets are not properly reassembled. An attacker could exploit this vulnerability by sending crafted UDP packets to an affected system. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.\r\n\r Note: Only traffic that is directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic.."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.6,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 4.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev1-NO2ccFWz",
|
||||||
|
"source": "ykramarz@cisco.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20309.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20309.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-20309",
|
||||||
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||||||
|
"published": "2024-03-27T17:15:52.260",
|
||||||
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability in auxiliary asynchronous port (AUX) functions of Cisco IOS XE Software could allow an authenticated, local attacker to cause an affected device to reload or stop responding.\r\n\r This vulnerability is due to the incorrect handling of specific ingress traffic when flow control hardware is enabled on the AUX port. An attacker could exploit this vulnerability by reverse telnetting to the AUX port and sending specific data after connecting. A successful exploit could allow the attacker to cause the device to reset or stop responding, resulting in a denial of service (DoS) condition."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.6,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.1,
|
||||||
|
"impactScore": 4.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-828"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aux-333WBz8f",
|
||||||
|
"source": "ykramarz@cisco.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20311.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20311.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-20311",
|
||||||
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||||||
|
"published": "2024-03-27T17:15:52.463",
|
||||||
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability in the Locator ID Separation Protocol (LISP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload.\r\n\r This vulnerability is due to the incorrect handling of LISP packets. An attacker could exploit this vulnerability by sending a crafted LISP packet to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.\r\n\r Note: This vulnerability could be exploited over either IPv4 or IPv6 transport."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.6,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 4.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-674"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lisp-3gYXs3qP",
|
||||||
|
"source": "ykramarz@cisco.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20312.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20312.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-20312",
|
||||||
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||||||
|
"published": "2024-03-27T17:15:52.690",
|
||||||
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) protocol of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to insufficient input validation when parsing an ingress IS-IS packet. An attacker could exploit this vulnerability by sending a crafted IS-IS packet to an affected device after forming an adjacency. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.\r\n\r Note: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2-adjacent to the affected device and have formed an adjacency."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||||
|
"attackVector": "ADJACENT_NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.4,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 4.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-isis-sGjyOUHX",
|
||||||
|
"source": "ykramarz@cisco.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20314.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20314.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-20314",
|
||||||
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||||||
|
"published": "2024-03-27T17:15:52.920",
|
||||||
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability in the IPv4 Software-Defined Access (SD-Access) fabric edge node feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause high CPU utilization and stop all traffic processing, resulting in a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to improper handling of certain IPv4 packets. An attacker could exploit this vulnerability by sending certain IPv4 packets to an affected device. A successful exploit could allow the attacker to cause the device to exhaust CPU resources and stop processing traffic, resulting in a DoS condition."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.6,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 4.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-783"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-sda-edge-dos-qZWuWXWG",
|
||||||
|
"source": "ykramarz@cisco.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20316.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20316.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-20316",
|
||||||
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||||||
|
"published": "2024-03-27T17:15:53.110",
|
||||||
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability in the data model interface (DMI) services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to access resources that should have been protected by a configured IPv4 access control list (ACL).\r\n\r This vulnerability is due to improper handling of error conditions when a successfully authorized device administrator updates an IPv4 ACL using the NETCONF or RESTCONF protocol, and the update would reorder access control entries (ACEs) in the updated ACL. An attacker could exploit this vulnerability by accessing resources that should have been protected across an affected device."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.8,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-390"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dmi-acl-bypass-Xv8FO8Vz",
|
||||||
|
"source": "ykramarz@cisco.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20324.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20324.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-20324",
|
||||||
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||||||
|
"published": "2024-03-27T17:15:53.293",
|
||||||
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, low-privileged, local attacker to access WLAN configuration details including passwords.\r\n\r This vulnerability is due to improper privilege checks. An attacker could exploit this vulnerability by using the show and show tech wireless CLI commands to access configuration details, including passwords. A successful exploit could allow the attacker to access configuration details that they are not authorized to access."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-274"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-wlc-privesc-RjSMrmPK",
|
||||||
|
"source": "ykramarz@cisco.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20333.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20333.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-20333",
|
||||||
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||||||
|
"published": "2024-03-27T17:15:53.480",
|
||||||
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability in the web-based management interface of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an authenticated, remote attacker to change specific data within the interface on an affected device.\r\n\r This vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to change a specific field within the web-based management interface, even though they should not have access to change that field."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-285"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccc-authz-bypass-5EKchJRb",
|
||||||
|
"source": "ykramarz@cisco.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-203xx/CVE-2024-20354.json
Normal file
55
CVE-2024/CVE-2024-203xx/CVE-2024-20354.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-20354",
|
||||||
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||||||
|
"published": "2024-03-27T17:15:53.660",
|
||||||
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability in the handling of encrypted wireless frames of Cisco Aironet Access Point (AP) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device.\r\n\r This vulnerability is due to incomplete cleanup of resources when dropping certain malformed frames. An attacker could exploit this vulnerability by connecting as a wireless client to an affected AP and sending specific malformed frames over the wireless connection. A successful exploit could allow the attacker to cause degradation of service to other clients, which could potentially lead to a complete DoS condition."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
|
||||||
|
"attackVector": "ADJACENT_NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "ykramarz@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-460"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-ap-dos-PPPtcVW",
|
||||||
|
"source": "ykramarz@cisco.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
59
CVE-2024/CVE-2024-234xx/CVE-2024-23450.json
Normal file
59
CVE-2024/CVE-2024-234xx/CVE-2024-23450.json
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-23450",
|
||||||
|
"sourceIdentifier": "bressers@elastic.co",
|
||||||
|
"published": "2024-03-27T17:15:53.857",
|
||||||
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A flaw was discovered in Elasticsearch, where processing a document in a deeply nested pipeline on an ingest node could cause the Elasticsearch node to crash."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "bressers@elastic.co",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 4.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "bressers@elastic.co",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-400"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://discuss.elastic.co/t/elasticsearch-8-13-0-7-17-19-security-update-esa-2024-06/356314",
|
||||||
|
"source": "bressers@elastic.co"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.elastic.co/community/security",
|
||||||
|
"source": "bressers@elastic.co"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-234xx/CVE-2024-23451.json
Normal file
55
CVE-2024/CVE-2024-234xx/CVE-2024-23451.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-23451",
|
||||||
|
"sourceIdentifier": "bressers@elastic.co",
|
||||||
|
"published": "2024-03-27T18:15:10.330",
|
||||||
|
"lastModified": "2024-03-27T18:15:10.330",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Incorrect Authorization issue exists in the API key based security model for Remote Cluster Security, which is currently in Beta, in Elasticsearch 8.10.0 and before 8.13.0. This allows a\u00a0malicious user with a valid API key for a remote cluster configured to use the new Remote Cluster Security to read arbitrary documents from any index on the remote cluster, and only if they use the Elasticsearch custom transport protocol to issue requests with the target index ID, the shard ID and the document ID. None of Elasticsearch REST API endpoints are affected by this issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "bressers@elastic.co",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.7,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "bressers@elastic.co",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-863"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://discuss.elastic.co/t/elasticsearch-8-13-0-security-update-esa-2024-07/356315",
|
||||||
|
"source": "bressers@elastic.co"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-299xx/CVE-2024-29945.json
Normal file
55
CVE-2024/CVE-2024-299xx/CVE-2024-29945.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-29945",
|
||||||
|
"sourceIdentifier": "prodsec@splunk.com",
|
||||||
|
"published": "2024-03-27T17:15:54.087",
|
||||||
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
|
"vulnStatus": "Undergoing Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the software potentially exposes authentication tokens during the token validation process. This exposure happens when either Splunk Enterprise runs in debug mode or the JsonWebToken component has been configured to log its activity at the DEBUG logging level."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-532"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://advisory.splunk.com/advisories/SVD-2024-0301",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
59
CVE-2024/CVE-2024-299xx/CVE-2024-29946.json
Normal file
59
CVE-2024/CVE-2024-299xx/CVE-2024-29946.json
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-29946",
|
||||||
|
"sourceIdentifier": "prodsec@splunk.com",
|
||||||
|
"published": "2024-03-27T17:15:54.273",
|
||||||
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
|
"vulnStatus": "Undergoing Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the Dashboard Examples Hub in the Splunk Dashboard Studio app lacks protections for risky SPL commands. This could let attackers bypass SPL safeguards for risky commands in the Hub. The vulnerability would require the attacker to phish the victim by tricking them into initiating a request within their browser."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 8.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-20"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://advisory.splunk.com/advisories/SVD-2024-0302",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2982",
|
"id": "CVE-2024-2982",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T16:15:10.210",
|
"published": "2024-03-27T16:15:10.210",
|
||||||
"lastModified": "2024-03-27T16:15:10.210",
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2983",
|
"id": "CVE-2024-2983",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T16:15:10.450",
|
"published": "2024-03-27T16:15:10.450",
|
||||||
"lastModified": "2024-03-27T16:15:10.450",
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2984",
|
"id": "CVE-2024-2984",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-27T16:15:10.713",
|
"published": "2024-03-27T16:15:10.713",
|
||||||
"lastModified": "2024-03-27T16:15:10.713",
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
92
CVE-2024/CVE-2024-29xx/CVE-2024-2985.json
Normal file
92
CVE-2024/CVE-2024-29xx/CVE-2024-2985.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2985",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-03-27T17:15:54.460",
|
||||||
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has been declared as critical. This vulnerability affects the function formQuickIndex of the file /goform/QuickIndex. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258154 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "COMPLETE",
|
||||||
|
"integrityImpact": "COMPLETE",
|
||||||
|
"availabilityImpact": "COMPLETE",
|
||||||
|
"baseScore": 9.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 10.0,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-121"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formQuickIndex.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.258154",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.258154",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.301276",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-29xx/CVE-2024-2986.json
Normal file
92
CVE-2024/CVE-2024-29xx/CVE-2024-2986.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2986",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-03-27T17:15:54.693",
|
||||||
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has been rated as critical. This issue affects the function formSetSpeedWan of the file /goform/SetSpeedWan. The manipulation of the argument speed_dir leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258155. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "COMPLETE",
|
||||||
|
"integrityImpact": "COMPLETE",
|
||||||
|
"availabilityImpact": "COMPLETE",
|
||||||
|
"baseScore": 9.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 10.0,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-121"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/SetSpeedWan.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.258155",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.258155",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.301284",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-29xx/CVE-2024-2987.json
Normal file
92
CVE-2024/CVE-2024-29xx/CVE-2024-2987.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2987",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-03-27T17:15:54.917",
|
||||||
|
"lastModified": "2024-03-27T17:48:21.140",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability classified as critical has been found in Tenda FH1202 1.2.0.14(408). Affected is the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument mac leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258156. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "COMPLETE",
|
||||||
|
"integrityImpact": "COMPLETE",
|
||||||
|
"availabilityImpact": "COMPLETE",
|
||||||
|
"baseScore": 9.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 10.0,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-121"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/GetParentControlInfo.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.258156",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.258156",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.301285",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-29xx/CVE-2024-2988.json
Normal file
92
CVE-2024/CVE-2024-29xx/CVE-2024-2988.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2988",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-03-27T18:15:10.757",
|
||||||
|
"lastModified": "2024-03-27T18:15:10.757",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability classified as critical was found in Tenda FH1203 2.0.1.6. Affected by this vulnerability is the function fromSetRouteStatic of the file /goform/fromRouteStatic. The manipulation of the argument entrys leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258157 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "COMPLETE",
|
||||||
|
"integrityImpact": "COMPLETE",
|
||||||
|
"availabilityImpact": "COMPLETE",
|
||||||
|
"baseScore": 9.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 10.0,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-121"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromSetRouteStatic.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.258157",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.258157",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.301363",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-29xx/CVE-2024-2989.json
Normal file
92
CVE-2024/CVE-2024-29xx/CVE-2024-2989.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2989",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-03-27T18:15:11.293",
|
||||||
|
"lastModified": "2024-03-27T18:15:11.293",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability, which was classified as critical, has been found in Tenda FH1203 2.0.1.6. Affected by this issue is the function fromNatStaticSetting of the file /goform/NatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-258158 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "COMPLETE",
|
||||||
|
"integrityImpact": "COMPLETE",
|
||||||
|
"availabilityImpact": "COMPLETE",
|
||||||
|
"baseScore": 9.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 10.0,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-121"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromNatStaticSetting.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.258158",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.258158",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.301364",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
72
README.md
72
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-03-27T17:00:39.052121+00:00
|
2024-03-27T19:00:37.713009+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-03-27T16:15:10.713000+00:00
|
2024-03-27T18:15:11.293000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,50 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
243015
|
243042
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `6`
|
Recently added CVEs: `27`
|
||||||
|
|
||||||
- [CVE-2024-1540](CVE-2024/CVE-2024-15xx/CVE-2024-1540.json) (`2024-03-27T16:15:09.963`)
|
- [CVE-2024-20265](CVE-2024/CVE-2024-202xx/CVE-2024-20265.json) (`2024-03-27T17:15:51.113`)
|
||||||
- [CVE-2024-2980](CVE-2024/CVE-2024-29xx/CVE-2024-2980.json) (`2024-03-27T15:15:48.420`)
|
- [CVE-2024-20271](CVE-2024/CVE-2024-202xx/CVE-2024-20271.json) (`2024-03-27T17:15:51.320`)
|
||||||
- [CVE-2024-2981](CVE-2024/CVE-2024-29xx/CVE-2024-2981.json) (`2024-03-27T15:15:48.643`)
|
- [CVE-2024-20276](CVE-2024/CVE-2024-202xx/CVE-2024-20276.json) (`2024-03-27T17:15:51.513`)
|
||||||
- [CVE-2024-2982](CVE-2024/CVE-2024-29xx/CVE-2024-2982.json) (`2024-03-27T16:15:10.210`)
|
- [CVE-2024-20278](CVE-2024/CVE-2024-202xx/CVE-2024-20278.json) (`2024-03-27T17:15:51.703`)
|
||||||
- [CVE-2024-2983](CVE-2024/CVE-2024-29xx/CVE-2024-2983.json) (`2024-03-27T16:15:10.450`)
|
- [CVE-2024-20303](CVE-2024/CVE-2024-203xx/CVE-2024-20303.json) (`2024-03-27T17:15:51.880`)
|
||||||
- [CVE-2024-2984](CVE-2024/CVE-2024-29xx/CVE-2024-2984.json) (`2024-03-27T16:15:10.713`)
|
- [CVE-2024-20306](CVE-2024/CVE-2024-203xx/CVE-2024-20306.json) (`2024-03-27T17:15:52.067`)
|
||||||
|
- [CVE-2024-20307](CVE-2024/CVE-2024-203xx/CVE-2024-20307.json) (`2024-03-27T18:15:09.357`)
|
||||||
|
- [CVE-2024-20308](CVE-2024/CVE-2024-203xx/CVE-2024-20308.json) (`2024-03-27T18:15:09.853`)
|
||||||
|
- [CVE-2024-20309](CVE-2024/CVE-2024-203xx/CVE-2024-20309.json) (`2024-03-27T17:15:52.260`)
|
||||||
|
- [CVE-2024-20311](CVE-2024/CVE-2024-203xx/CVE-2024-20311.json) (`2024-03-27T17:15:52.463`)
|
||||||
|
- [CVE-2024-20312](CVE-2024/CVE-2024-203xx/CVE-2024-20312.json) (`2024-03-27T17:15:52.690`)
|
||||||
|
- [CVE-2024-20314](CVE-2024/CVE-2024-203xx/CVE-2024-20314.json) (`2024-03-27T17:15:52.920`)
|
||||||
|
- [CVE-2024-20316](CVE-2024/CVE-2024-203xx/CVE-2024-20316.json) (`2024-03-27T17:15:53.110`)
|
||||||
|
- [CVE-2024-20324](CVE-2024/CVE-2024-203xx/CVE-2024-20324.json) (`2024-03-27T17:15:53.293`)
|
||||||
|
- [CVE-2024-20333](CVE-2024/CVE-2024-203xx/CVE-2024-20333.json) (`2024-03-27T17:15:53.480`)
|
||||||
|
- [CVE-2024-20354](CVE-2024/CVE-2024-203xx/CVE-2024-20354.json) (`2024-03-27T17:15:53.660`)
|
||||||
|
- [CVE-2024-23450](CVE-2024/CVE-2024-234xx/CVE-2024-23450.json) (`2024-03-27T17:15:53.857`)
|
||||||
|
- [CVE-2024-23451](CVE-2024/CVE-2024-234xx/CVE-2024-23451.json) (`2024-03-27T18:15:10.330`)
|
||||||
|
- [CVE-2024-2985](CVE-2024/CVE-2024-29xx/CVE-2024-2985.json) (`2024-03-27T17:15:54.460`)
|
||||||
|
- [CVE-2024-2986](CVE-2024/CVE-2024-29xx/CVE-2024-2986.json) (`2024-03-27T17:15:54.693`)
|
||||||
|
- [CVE-2024-2987](CVE-2024/CVE-2024-29xx/CVE-2024-2987.json) (`2024-03-27T17:15:54.917`)
|
||||||
|
- [CVE-2024-2988](CVE-2024/CVE-2024-29xx/CVE-2024-2988.json) (`2024-03-27T18:15:10.757`)
|
||||||
|
- [CVE-2024-2989](CVE-2024/CVE-2024-29xx/CVE-2024-2989.json) (`2024-03-27T18:15:11.293`)
|
||||||
|
- [CVE-2024-29945](CVE-2024/CVE-2024-299xx/CVE-2024-29945.json) (`2024-03-27T17:15:54.087`)
|
||||||
|
- [CVE-2024-29946](CVE-2024/CVE-2024-299xx/CVE-2024-29946.json) (`2024-03-27T17:15:54.273`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `106`
|
Recently modified CVEs: `6`
|
||||||
|
|
||||||
- [CVE-2024-29777](CVE-2024/CVE-2024-297xx/CVE-2024-29777.json) (`2024-03-27T15:49:41.437`)
|
- [CVE-2023-5189](CVE-2023/CVE-2023-51xx/CVE-2023-5189.json) (`2024-03-27T18:15:08.710`)
|
||||||
- [CVE-2024-2978](CVE-2024/CVE-2024-29xx/CVE-2024-2978.json) (`2024-03-27T15:49:41.437`)
|
- [CVE-2024-1540](CVE-2024/CVE-2024-15xx/CVE-2024-1540.json) (`2024-03-27T17:48:21.140`)
|
||||||
- [CVE-2024-29788](CVE-2024/CVE-2024-297xx/CVE-2024-29788.json) (`2024-03-27T15:49:41.437`)
|
- [CVE-2024-1580](CVE-2024/CVE-2024-15xx/CVE-2024-1580.json) (`2024-03-27T18:15:09.063`)
|
||||||
- [CVE-2024-29789](CVE-2024/CVE-2024-297xx/CVE-2024-29789.json) (`2024-03-27T15:49:41.437`)
|
- [CVE-2024-2982](CVE-2024/CVE-2024-29xx/CVE-2024-2982.json) (`2024-03-27T17:48:21.140`)
|
||||||
- [CVE-2024-2979](CVE-2024/CVE-2024-29xx/CVE-2024-2979.json) (`2024-03-27T15:49:41.437`)
|
- [CVE-2024-2983](CVE-2024/CVE-2024-29xx/CVE-2024-2983.json) (`2024-03-27T17:48:21.140`)
|
||||||
- [CVE-2024-29790](CVE-2024/CVE-2024-297xx/CVE-2024-29790.json) (`2024-03-27T15:49:41.437`)
|
- [CVE-2024-2984](CVE-2024/CVE-2024-29xx/CVE-2024-2984.json) (`2024-03-27T17:48:21.140`)
|
||||||
- [CVE-2024-29791](CVE-2024/CVE-2024-297xx/CVE-2024-29791.json) (`2024-03-27T15:49:41.437`)
|
|
||||||
- [CVE-2024-29792](CVE-2024/CVE-2024-297xx/CVE-2024-29792.json) (`2024-03-27T15:49:41.437`)
|
|
||||||
- [CVE-2024-29793](CVE-2024/CVE-2024-297xx/CVE-2024-29793.json) (`2024-03-27T15:49:41.437`)
|
|
||||||
- [CVE-2024-29794](CVE-2024/CVE-2024-297xx/CVE-2024-29794.json) (`2024-03-27T15:49:41.437`)
|
|
||||||
- [CVE-2024-29795](CVE-2024/CVE-2024-297xx/CVE-2024-29795.json) (`2024-03-27T15:49:41.437`)
|
|
||||||
- [CVE-2024-29796](CVE-2024/CVE-2024-297xx/CVE-2024-29796.json) (`2024-03-27T15:49:41.437`)
|
|
||||||
- [CVE-2024-29797](CVE-2024/CVE-2024-297xx/CVE-2024-29797.json) (`2024-03-27T15:49:41.437`)
|
|
||||||
- [CVE-2024-29798](CVE-2024/CVE-2024-297xx/CVE-2024-29798.json) (`2024-03-27T15:49:41.437`)
|
|
||||||
- [CVE-2024-29799](CVE-2024/CVE-2024-297xx/CVE-2024-29799.json) (`2024-03-27T15:49:41.437`)
|
|
||||||
- [CVE-2024-29801](CVE-2024/CVE-2024-298xx/CVE-2024-29801.json) (`2024-03-27T15:49:41.437`)
|
|
||||||
- [CVE-2024-29802](CVE-2024/CVE-2024-298xx/CVE-2024-29802.json) (`2024-03-27T15:49:41.437`)
|
|
||||||
- [CVE-2024-29803](CVE-2024/CVE-2024-298xx/CVE-2024-29803.json) (`2024-03-27T15:49:41.437`)
|
|
||||||
- [CVE-2024-29804](CVE-2024/CVE-2024-298xx/CVE-2024-29804.json) (`2024-03-27T15:49:41.437`)
|
|
||||||
- [CVE-2024-29805](CVE-2024/CVE-2024-298xx/CVE-2024-29805.json) (`2024-03-27T15:49:41.437`)
|
|
||||||
- [CVE-2024-29806](CVE-2024/CVE-2024-298xx/CVE-2024-29806.json) (`2024-03-27T15:49:41.437`)
|
|
||||||
- [CVE-2024-29807](CVE-2024/CVE-2024-298xx/CVE-2024-29807.json) (`2024-03-27T15:49:41.437`)
|
|
||||||
- [CVE-2024-29811](CVE-2024/CVE-2024-298xx/CVE-2024-29811.json) (`2024-03-27T15:49:41.437`)
|
|
||||||
- [CVE-2024-29812](CVE-2024/CVE-2024-298xx/CVE-2024-29812.json) (`2024-03-27T15:49:41.437`)
|
|
||||||
- [CVE-2024-30238](CVE-2024/CVE-2024-302xx/CVE-2024-30238.json) (`2024-03-27T15:49:41.437`)
|
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
255
_state.csv
255
_state.csv
@ -137319,7 +137319,7 @@ CVE-2019-2045,0,0,1705229e4fec9bfd82aef2ac1bb1c2832b7fc423971d0092d9264e10cc6fd5
|
|||||||
CVE-2019-20451,0,0,4d0762291a44e046795f84a4a06312ecbbc433e327a7f1e0d5459472a5e8f6f6,2021-09-09T17:41:35.163000
|
CVE-2019-20451,0,0,4d0762291a44e046795f84a4a06312ecbbc433e327a7f1e0d5459472a5e8f6f6,2021-09-09T17:41:35.163000
|
||||||
CVE-2019-20452,0,0,1f4817a23fd44e7988cfa9a7e5714919e1f832aa5a7fdf2840e96e68b57f31cb,2020-08-24T17:37:01.140000
|
CVE-2019-20452,0,0,1f4817a23fd44e7988cfa9a7e5714919e1f832aa5a7fdf2840e96e68b57f31cb,2020-08-24T17:37:01.140000
|
||||||
CVE-2019-20453,0,0,f7bfb81c36b8409e27bcfd752ebe01abba843256421a0d4b2f525ac7e95541d5,2020-08-24T17:37:01.140000
|
CVE-2019-20453,0,0,f7bfb81c36b8409e27bcfd752ebe01abba843256421a0d4b2f525ac7e95541d5,2020-08-24T17:37:01.140000
|
||||||
CVE-2019-20454,0,1,c2543304793955f430a64b58f46bed16bf5f70f7299b4671d92d021d0fd8dc76,2024-03-27T16:05:17.853000
|
CVE-2019-20454,0,0,c2543304793955f430a64b58f46bed16bf5f70f7299b4671d92d021d0fd8dc76,2024-03-27T16:05:17.853000
|
||||||
CVE-2019-20455,0,0,020f23034a46cfcbb565c99a2d99878424784e7d74607830136b187ff274b046,2024-02-14T01:17:43.863000
|
CVE-2019-20455,0,0,020f23034a46cfcbb565c99a2d99878424784e7d74607830136b187ff274b046,2024-02-14T01:17:43.863000
|
||||||
CVE-2019-20456,0,0,f5478a7543aa47e5bb933cc310b3647eb2820951f2995f375bdbe4dff39f90a0,2020-02-26T15:10:12.293000
|
CVE-2019-20456,0,0,f5478a7543aa47e5bb933cc310b3647eb2820951f2995f375bdbe4dff39f90a0,2020-02-26T15:10:12.293000
|
||||||
CVE-2019-2046,0,0,5a99507a8351f8e058070df1d46e5e4a8733b86f79bb1d0063ca3a86c67d1bff,2021-07-21T11:39:23.747000
|
CVE-2019-2046,0,0,5a99507a8351f8e058070df1d46e5e4a8733b86f79bb1d0063ca3a86c67d1bff,2021-07-21T11:39:23.747000
|
||||||
@ -137722,7 +137722,7 @@ CVE-2019-20834,0,0,2f046198ffab2ceb1fc7e73446b82a9822085609cdbb82469e2699c1c960f
|
|||||||
CVE-2019-20835,0,0,4e5523f899e61855d812ac2a1e43101d0993f92a1e0e689e05361cb59d2b2e6b,2020-06-05T16:28:06.647000
|
CVE-2019-20835,0,0,4e5523f899e61855d812ac2a1e43101d0993f92a1e0e689e05361cb59d2b2e6b,2020-06-05T16:28:06.647000
|
||||||
CVE-2019-20836,0,0,884b3ca5bb0fe09112ce82a99226cd4cee13d30147b25af155e4811fdc80bdb3,2020-06-05T16:15:58.883000
|
CVE-2019-20836,0,0,884b3ca5bb0fe09112ce82a99226cd4cee13d30147b25af155e4811fdc80bdb3,2020-06-05T16:15:58.883000
|
||||||
CVE-2019-20837,0,0,1327025412446e71b0bb00c2f3d6721de4beba338c3d8c9d7bf39b7f128a72d7,2020-06-05T16:29:52.857000
|
CVE-2019-20837,0,0,1327025412446e71b0bb00c2f3d6721de4beba338c3d8c9d7bf39b7f128a72d7,2020-06-05T16:29:52.857000
|
||||||
CVE-2019-20838,0,1,ae85425ffe9a90e620e01fbb5f6fb3ec72934f3c2a72308ebfe16b79353d78e2,2024-03-27T16:05:46.553000
|
CVE-2019-20838,0,0,ae85425ffe9a90e620e01fbb5f6fb3ec72934f3c2a72308ebfe16b79353d78e2,2024-03-27T16:05:46.553000
|
||||||
CVE-2019-20839,0,0,fff52c25682d0f6d7e1c0e14768f63c2c904e37343a8044d7831bcbfd024b515,2023-11-07T03:09:13.630000
|
CVE-2019-20839,0,0,fff52c25682d0f6d7e1c0e14768f63c2c904e37343a8044d7831bcbfd024b515,2023-11-07T03:09:13.630000
|
||||||
CVE-2019-2084,0,0,5e601ed0ca8bcc9033586975ff4fc6e7b2f7b5d3ef91eec06b110cebd1d7ad51,2019-10-01T13:30:46.273000
|
CVE-2019-2084,0,0,5e601ed0ca8bcc9033586975ff4fc6e7b2f7b5d3ef91eec06b110cebd1d7ad51,2019-10-01T13:30:46.273000
|
||||||
CVE-2019-20840,0,0,aefbc83031592623633897c2f9cdcd0ba991e172c26249b04dbed70dd6ecd9ed,2023-11-07T03:09:13.720000
|
CVE-2019-20840,0,0,aefbc83031592623633897c2f9cdcd0ba991e172c26249b04dbed70dd6ecd9ed,2023-11-07T03:09:13.720000
|
||||||
@ -148884,7 +148884,7 @@ CVE-2020-14151,0,0,9ffddf0999e3d6a8a75e114bd5964acf118fd9c17127d60bccf0e39641478
|
|||||||
CVE-2020-14152,0,0,57e3f0cecf7bf86bfe5da88a7620e56351963f06700f63c35b8f5171187e3849,2023-02-27T18:17:27.037000
|
CVE-2020-14152,0,0,57e3f0cecf7bf86bfe5da88a7620e56351963f06700f63c35b8f5171187e3849,2023-02-27T18:17:27.037000
|
||||||
CVE-2020-14153,0,0,237e4355f1b9bc09eda761245741f1003a98ac0666084ce326343a58b8dbcc5e,2023-02-27T18:18:36.527000
|
CVE-2020-14153,0,0,237e4355f1b9bc09eda761245741f1003a98ac0666084ce326343a58b8dbcc5e,2023-02-27T18:18:36.527000
|
||||||
CVE-2020-14154,0,0,03dc2a851685fd84058c57da71b4b3e059b96f8634c99ac94cc109d7b722276a,2023-03-01T16:01:38.367000
|
CVE-2020-14154,0,0,03dc2a851685fd84058c57da71b4b3e059b96f8634c99ac94cc109d7b722276a,2023-03-01T16:01:38.367000
|
||||||
CVE-2020-14155,0,1,71383f8981e2e521d3a64705adf0ac7a332883e698a288bb87a7e3df9703cdba,2024-03-27T16:04:48.863000
|
CVE-2020-14155,0,0,71383f8981e2e521d3a64705adf0ac7a332883e698a288bb87a7e3df9703cdba,2024-03-27T16:04:48.863000
|
||||||
CVE-2020-14156,0,0,926f8b5c9a479e61c041a7ec2f5fb4b4fef427878be695f5f18dd7586db5dc89,2020-06-22T18:33:42.990000
|
CVE-2020-14156,0,0,926f8b5c9a479e61c041a7ec2f5fb4b4fef427878be695f5f18dd7586db5dc89,2020-06-22T18:33:42.990000
|
||||||
CVE-2020-14157,0,0,ec6714662b4fd251e84456bfdef37480a0d5b708cceace12ae5070f687b701b6,2021-07-21T11:39:23.747000
|
CVE-2020-14157,0,0,ec6714662b4fd251e84456bfdef37480a0d5b708cceace12ae5070f687b701b6,2021-07-21T11:39:23.747000
|
||||||
CVE-2020-14158,0,0,257c62d2d59f801f636fda0a5316dad846b25cbce009f7e0efa72f1cac35ab1c,2020-08-05T14:37:36.397000
|
CVE-2020-14158,0,0,257c62d2d59f801f636fda0a5316dad846b25cbce009f7e0efa72f1cac35ab1c,2020-08-05T14:37:36.397000
|
||||||
@ -162959,7 +162959,7 @@ CVE-2020-8165,0,0,b90f56eef4d394caafda41afeb1888db8d9e5be27c35ede9be39154ac6db31
|
|||||||
CVE-2020-8166,0,0,47c3904ebbdd2a5d9a1995acdeafdcc0912b1b4a1c6f035b0f63ad505e021cdf,2020-11-20T17:47:47.463000
|
CVE-2020-8166,0,0,47c3904ebbdd2a5d9a1995acdeafdcc0912b1b4a1c6f035b0f63ad505e021cdf,2020-11-20T17:47:47.463000
|
||||||
CVE-2020-8167,0,0,6d3767d0ff1146a65240741c1692557c5e3379cf0dd5883c168490dc71b44892,2021-10-21T14:35:21.047000
|
CVE-2020-8167,0,0,6d3767d0ff1146a65240741c1692557c5e3379cf0dd5883c168490dc71b44892,2021-10-21T14:35:21.047000
|
||||||
CVE-2020-8168,0,0,ccb8c7a6475759104f1711b3a83fc1942ad048ad01cf973341e84f4b01e9b3dd,2023-11-07T03:26:17.750000
|
CVE-2020-8168,0,0,ccb8c7a6475759104f1711b3a83fc1942ad048ad01cf973341e84f4b01e9b3dd,2023-11-07T03:26:17.750000
|
||||||
CVE-2020-8169,0,1,5c99b47230440422d8b435273484301a874fd5e619e3cc621c9255024327f19b,2024-03-27T16:04:23.890000
|
CVE-2020-8169,0,0,5c99b47230440422d8b435273484301a874fd5e619e3cc621c9255024327f19b,2024-03-27T16:04:23.890000
|
||||||
CVE-2020-8170,0,0,c93bdaef62335dd3a34e497b1610bbed4f1531f0cdc62596c702d97cf7316ed2,2020-05-28T20:03:07.140000
|
CVE-2020-8170,0,0,c93bdaef62335dd3a34e497b1610bbed4f1531f0cdc62596c702d97cf7316ed2,2020-05-28T20:03:07.140000
|
||||||
CVE-2020-8171,0,0,645a1ab3b96b9928f218f2a9a5fca0f8e8167d5a980ea9eeeaf49fee58513164,2020-05-28T20:00:03.527000
|
CVE-2020-8171,0,0,645a1ab3b96b9928f218f2a9a5fca0f8e8167d5a980ea9eeeaf49fee58513164,2020-05-28T20:00:03.527000
|
||||||
CVE-2020-8172,0,0,aa60f1cb50e023b6bcefad51394fa465cda46ac1817e5b5ccf939eaf3ce619c5,2022-05-12T15:01:02.140000
|
CVE-2020-8172,0,0,aa60f1cb50e023b6bcefad51394fa465cda46ac1817e5b5ccf939eaf3ce619c5,2022-05-12T15:01:02.140000
|
||||||
@ -162967,7 +162967,7 @@ CVE-2020-8173,0,0,34ceedff128c979f4774d29c75bd8a1e6c39839074dee16b306c28f746c7ce
|
|||||||
CVE-2020-8174,0,0,ac6b23e6b056d5a60f6974c777b55f9bb43d28eb7261a72f0325944e6fa3d8f6,2022-05-12T15:01:21.717000
|
CVE-2020-8174,0,0,ac6b23e6b056d5a60f6974c777b55f9bb43d28eb7261a72f0325944e6fa3d8f6,2022-05-12T15:01:21.717000
|
||||||
CVE-2020-8175,0,0,7c8b3c608d62151b045b3bb4fdf28e38a67da6066b16b2a4582925c6150ce840,2020-07-27T17:54:05.343000
|
CVE-2020-8175,0,0,7c8b3c608d62151b045b3bb4fdf28e38a67da6066b16b2a4582925c6150ce840,2020-07-27T17:54:05.343000
|
||||||
CVE-2020-8176,0,0,4a4c8126c4dcf74ee9d176934e967067a7bb58ed770baed0696fedbbcf0cd9a3,2020-07-10T19:30:40.273000
|
CVE-2020-8176,0,0,4a4c8126c4dcf74ee9d176934e967067a7bb58ed770baed0696fedbbcf0cd9a3,2020-07-10T19:30:40.273000
|
||||||
CVE-2020-8177,0,1,349339cb813587dce0e4231c21f8a34d831e8d889fe95ab7ae85eb5b183170d8,2024-03-27T16:04:20.437000
|
CVE-2020-8177,0,0,349339cb813587dce0e4231c21f8a34d831e8d889fe95ab7ae85eb5b183170d8,2024-03-27T16:04:20.437000
|
||||||
CVE-2020-8178,0,0,81183e0e8c36d4d786b7e3a77c245d153eb61d8171589dd60b01f990fe023e7b,2020-07-21T12:36:01.557000
|
CVE-2020-8178,0,0,81183e0e8c36d4d786b7e3a77c245d153eb61d8171589dd60b01f990fe023e7b,2020-07-21T12:36:01.557000
|
||||||
CVE-2020-8179,0,0,935857d37fccce66d998380d30e28774b93fb272a89f5be8703042a361a65e66,2020-07-08T15:18:11.680000
|
CVE-2020-8179,0,0,935857d37fccce66d998380d30e28774b93fb272a89f5be8703042a361a65e66,2020-07-08T15:18:11.680000
|
||||||
CVE-2020-8180,0,0,8cb081c94bf954092880caba93d685420308ab45526f3938b72742d9685a0bb4,2020-06-11T18:10:23.393000
|
CVE-2020-8180,0,0,8cb081c94bf954092880caba93d685420308ab45526f3938b72742d9685a0bb4,2020-06-11T18:10:23.393000
|
||||||
@ -163021,7 +163021,7 @@ CVE-2020-8227,0,0,3b78fe266dffb4032d2b4e32d9ef3476c07b68b63646b25b0f1292cb88f6cc
|
|||||||
CVE-2020-8228,0,0,51f515d27850dd37c61ce5207f1b36b53947b36f17faa52faecdff4b8377a4a1,2020-10-20T18:56:06.573000
|
CVE-2020-8228,0,0,51f515d27850dd37c61ce5207f1b36b53947b36f17faa52faecdff4b8377a4a1,2020-10-20T18:56:06.573000
|
||||||
CVE-2020-8229,0,0,08777f070fbcde0d30b96edeece4f672522bb23e5cbc11f4f79f873314073641,2022-09-27T16:00:41.497000
|
CVE-2020-8229,0,0,08777f070fbcde0d30b96edeece4f672522bb23e5cbc11f4f79f873314073641,2022-09-27T16:00:41.497000
|
||||||
CVE-2020-8230,0,0,2f0be1134ef3c6182aa36f6843e120f2dbc96fb6cf2b7c6eaaa30173af344e84,2022-09-27T15:55:38.753000
|
CVE-2020-8230,0,0,2f0be1134ef3c6182aa36f6843e120f2dbc96fb6cf2b7c6eaaa30173af344e84,2022-09-27T15:55:38.753000
|
||||||
CVE-2020-8231,0,1,9446a1e9744263543f370599c1337460d7eb0d0cefd89d7b92a552fc6be71363,2024-03-27T16:04:17.597000
|
CVE-2020-8231,0,0,9446a1e9744263543f370599c1337460d7eb0d0cefd89d7b92a552fc6be71363,2024-03-27T16:04:17.597000
|
||||||
CVE-2020-8232,0,0,a9c7f9a40f8c8864a7e3d701a0e990044acd6299147e74baf1d5d5f48bba2b7a,2021-09-23T13:57:02.790000
|
CVE-2020-8232,0,0,a9c7f9a40f8c8864a7e3d701a0e990044acd6299147e74baf1d5d5f48bba2b7a,2021-09-23T13:57:02.790000
|
||||||
CVE-2020-8233,0,0,a7c70cae7ff9ea797af45a8e6bf71362a6e567e5946f869c3d5abdb997855221,2022-05-24T17:03:55.223000
|
CVE-2020-8233,0,0,a7c70cae7ff9ea797af45a8e6bf71362a6e567e5946f869c3d5abdb997855221,2022-05-24T17:03:55.223000
|
||||||
CVE-2020-8234,0,0,0ecda2f78c5958b8d082e21a2aedcafa2a5797fa89f53e9fcdbc3e7f5b196655,2023-11-07T03:26:18.827000
|
CVE-2020-8234,0,0,0ecda2f78c5958b8d082e21a2aedcafa2a5797fa89f53e9fcdbc3e7f5b196655,2023-11-07T03:26:18.827000
|
||||||
@ -163073,9 +163073,9 @@ CVE-2020-8280,0,0,8d5f0a3c05bd32b92e1a858a83594675a405cccfedeb61c86c6b0f4a117866
|
|||||||
CVE-2020-8281,0,0,7b0fbce8746c448976b5242155b86de40c6c79f6aef5f735ac25b73023022b1a,2021-01-11T17:39:01.227000
|
CVE-2020-8281,0,0,7b0fbce8746c448976b5242155b86de40c6c79f6aef5f735ac25b73023022b1a,2021-01-11T17:39:01.227000
|
||||||
CVE-2020-8282,0,0,8222c1643818edd8f6af8739cd00802cafdf09f4420f884c84232b750c7a9ce4,2020-12-16T15:41:49.850000
|
CVE-2020-8282,0,0,8222c1643818edd8f6af8739cd00802cafdf09f4420f884c84232b750c7a9ce4,2020-12-16T15:41:49.850000
|
||||||
CVE-2020-8283,0,0,27005cdc68403e5c13995e8fdafcca44a2c6dc4c7d8c8e52cb9054d9aec06275,2020-12-17T18:45:00.930000
|
CVE-2020-8283,0,0,27005cdc68403e5c13995e8fdafcca44a2c6dc4c7d8c8e52cb9054d9aec06275,2020-12-17T18:45:00.930000
|
||||||
CVE-2020-8284,0,1,d48f38208932ba541cfea5b7fe90f4f148d2ce5c7905914cff47a907a00825af,2024-03-27T15:50:07.387000
|
CVE-2020-8284,0,0,d48f38208932ba541cfea5b7fe90f4f148d2ce5c7905914cff47a907a00825af,2024-03-27T15:50:07.387000
|
||||||
CVE-2020-8285,0,1,c3522f16bed2fee4b17164c0cd5d5a93552cd535d4c4756a633db3011ffa406c,2024-03-27T15:47:57.647000
|
CVE-2020-8285,0,0,c3522f16bed2fee4b17164c0cd5d5a93552cd535d4c4756a633db3011ffa406c,2024-03-27T15:47:57.647000
|
||||||
CVE-2020-8286,0,1,a02fcb8742fe23470beab7341e4d5bc8102e3b0e9656dfa9fa789b059c0b5ddf,2024-03-27T15:47:53.600000
|
CVE-2020-8286,0,0,a02fcb8742fe23470beab7341e4d5bc8102e3b0e9656dfa9fa789b059c0b5ddf,2024-03-27T15:47:53.600000
|
||||||
CVE-2020-8287,0,0,49a08588ed5b600c0a1dd7fd9f5faae9c0e4ddd142e8c3d1feda2c223f49818f,2023-11-07T03:26:19.870000
|
CVE-2020-8287,0,0,49a08588ed5b600c0a1dd7fd9f5faae9c0e4ddd142e8c3d1feda2c223f49818f,2023-11-07T03:26:19.870000
|
||||||
CVE-2020-8288,0,0,b0824b7a38b5f17525fb96fd83bb8be5d6d553292e795764d879457314ab7a3e,2021-02-01T15:31:43.600000
|
CVE-2020-8288,0,0,b0824b7a38b5f17525fb96fd83bb8be5d6d553292e795764d879457314ab7a3e,2021-02-01T15:31:43.600000
|
||||||
CVE-2020-8289,0,0,c14da3e86fd5ce60216301b1e5350cc462897aac50f7af592f55008c44fd2d61,2020-12-31T19:04:39.117000
|
CVE-2020-8289,0,0,c14da3e86fd5ce60216301b1e5350cc462897aac50f7af592f55008c44fd2d61,2020-12-31T19:04:39.117000
|
||||||
@ -168944,7 +168944,7 @@ CVE-2021-22872,0,0,b5374c75cf52173069742df9932b16f3b48df418bcc8bce07737040217b3d
|
|||||||
CVE-2021-22873,0,0,151b01066b491a5d4fdbb1cf5af054bb65ff50d7128e043ad61d55a2cb1dd4f5,2021-02-02T15:09:34.250000
|
CVE-2021-22873,0,0,151b01066b491a5d4fdbb1cf5af054bb65ff50d7128e043ad61d55a2cb1dd4f5,2021-02-02T15:09:34.250000
|
||||||
CVE-2021-22874,0,0,1ce3a63dfe6ef7545b98b97473516dd45fa986322bfe405209f2cfb2fff0f431,2021-01-29T00:33:14.217000
|
CVE-2021-22874,0,0,1ce3a63dfe6ef7545b98b97473516dd45fa986322bfe405209f2cfb2fff0f431,2021-01-29T00:33:14.217000
|
||||||
CVE-2021-22875,0,0,5972e538cca49d2dab14de25fc021bd84962446b27e9e851f91860a6be14e55a,2021-01-29T00:34:11.237000
|
CVE-2021-22875,0,0,5972e538cca49d2dab14de25fc021bd84962446b27e9e851f91860a6be14e55a,2021-01-29T00:34:11.237000
|
||||||
CVE-2021-22876,0,1,635332ad1f2e8c939d1336401f65b12220e00ac3b929f0fc7f45bbf076316cbe,2024-03-27T15:47:49.590000
|
CVE-2021-22876,0,0,635332ad1f2e8c939d1336401f65b12220e00ac3b929f0fc7f45bbf076316cbe,2024-03-27T15:47:49.590000
|
||||||
CVE-2021-22877,0,0,d00f745ea4e6955be0d21c2b3581cc251c5387efdc342004d5fd1b051a534600,2023-11-07T03:30:27.240000
|
CVE-2021-22877,0,0,d00f745ea4e6955be0d21c2b3581cc251c5387efdc342004d5fd1b051a534600,2023-11-07T03:30:27.240000
|
||||||
CVE-2021-22878,0,0,a397005e6377fa8af698364fc7863f02965632978142467d10d498bfb5ec781b,2023-11-07T03:30:27.327000
|
CVE-2021-22878,0,0,a397005e6377fa8af698364fc7863f02965632978142467d10d498bfb5ec781b,2023-11-07T03:30:27.327000
|
||||||
CVE-2021-22879,0,0,20824c00df9bf493afe91eb2a7b2a5f67eedca0b2dbccbe3e6d4b48552ed7023,2023-11-07T03:30:27.393000
|
CVE-2021-22879,0,0,20824c00df9bf493afe91eb2a7b2a5f67eedca0b2dbccbe3e6d4b48552ed7023,2023-11-07T03:30:27.393000
|
||||||
@ -168960,19 +168960,19 @@ CVE-2021-22887,0,0,b2fa7c63bdd19b54dc86ebdd10536c3f921ebb88d0726027644261e221041
|
|||||||
CVE-2021-22888,0,0,ddf077ad7028415ff9feadf75a6d2804bf094969bc5cd0965f8f5541a1a59d72,2021-03-27T02:44:16.250000
|
CVE-2021-22888,0,0,ddf077ad7028415ff9feadf75a6d2804bf094969bc5cd0965f8f5541a1a59d72,2021-03-27T02:44:16.250000
|
||||||
CVE-2021-22889,0,0,86cd09cb795d6cf361c193c51bdba63af652cf09deac6863d564318021b9f94a,2021-03-27T02:46:12.017000
|
CVE-2021-22889,0,0,86cd09cb795d6cf361c193c51bdba63af652cf09deac6863d564318021b9f94a,2021-03-27T02:46:12.017000
|
||||||
CVE-2021-2289,0,0,a94497e362293b07d63c1e24b9ab43d924b97fff21751187f0d37f432ecc4f17,2021-04-29T20:48:33.577000
|
CVE-2021-2289,0,0,a94497e362293b07d63c1e24b9ab43d924b97fff21751187f0d37f432ecc4f17,2021-04-29T20:48:33.577000
|
||||||
CVE-2021-22890,0,1,6e90c8900d2275195296c2294321949788f61b3ba7e5b3a3553ee48037ff4897,2024-03-27T15:47:45.160000
|
CVE-2021-22890,0,0,6e90c8900d2275195296c2294321949788f61b3ba7e5b3a3553ee48037ff4897,2024-03-27T15:47:45.160000
|
||||||
CVE-2021-22891,0,0,62e457c672d7ef03c1a6c6a6be7d4775111c15248290645768bc2e5d4d8037bf,2021-08-12T20:50:40.970000
|
CVE-2021-22891,0,0,62e457c672d7ef03c1a6c6a6be7d4775111c15248290645768bc2e5d4d8037bf,2021-08-12T20:50:40.970000
|
||||||
CVE-2021-22892,0,0,cc16542affc64667468e45e7977166f203b89e17820ccc51cb3935248d38e4cb,2022-08-30T19:10:08.513000
|
CVE-2021-22892,0,0,cc16542affc64667468e45e7977166f203b89e17820ccc51cb3935248d38e4cb,2022-08-30T19:10:08.513000
|
||||||
CVE-2021-22893,0,0,7ab02627a0e7b95efe96113aa2edf5623e1aa9b80d3d385fbff5c67735077340,2024-02-27T21:04:17.560000
|
CVE-2021-22893,0,0,7ab02627a0e7b95efe96113aa2edf5623e1aa9b80d3d385fbff5c67735077340,2024-02-27T21:04:17.560000
|
||||||
CVE-2021-22894,0,0,c9c58e1159876c6444311b72946002e4e5756fa16778959f63470df8d4f32431,2024-02-27T21:04:17.560000
|
CVE-2021-22894,0,0,c9c58e1159876c6444311b72946002e4e5756fa16778959f63470df8d4f32431,2024-02-27T21:04:17.560000
|
||||||
CVE-2021-22895,0,0,964c1af433e584d2cc6bc559959c01008e727d05833d888f72e1b680dca9164a,2021-12-02T21:19:58.540000
|
CVE-2021-22895,0,0,964c1af433e584d2cc6bc559959c01008e727d05833d888f72e1b680dca9164a,2021-12-02T21:19:58.540000
|
||||||
CVE-2021-22896,0,0,93eac2f06ca1a31d34040275095383a0dc24b2782b510f11050b1bce250d645e,2021-06-22T01:03:15.073000
|
CVE-2021-22896,0,0,93eac2f06ca1a31d34040275095383a0dc24b2782b510f11050b1bce250d645e,2021-06-22T01:03:15.073000
|
||||||
CVE-2021-22897,0,1,8feb0e04bd9da8a3ba4a00d9981917dd470faaa8c0c8dea7518428c4a2a2ce49,2024-03-27T15:47:40.347000
|
CVE-2021-22897,0,0,8feb0e04bd9da8a3ba4a00d9981917dd470faaa8c0c8dea7518428c4a2a2ce49,2024-03-27T15:47:40.347000
|
||||||
CVE-2021-22898,0,1,cb7aed26a2f0c6d972f5db58a0bf991ac14a9ade5c2e96dd169dd9a05a486826,2024-03-27T15:47:36.380000
|
CVE-2021-22898,0,0,cb7aed26a2f0c6d972f5db58a0bf991ac14a9ade5c2e96dd169dd9a05a486826,2024-03-27T15:47:36.380000
|
||||||
CVE-2021-22899,0,0,7ccc1d6227bdfe11f58d4901d8af453098ec0e9ba60386fc44c5d290e6849d99,2024-02-27T21:04:17.560000
|
CVE-2021-22899,0,0,7ccc1d6227bdfe11f58d4901d8af453098ec0e9ba60386fc44c5d290e6849d99,2024-02-27T21:04:17.560000
|
||||||
CVE-2021-2290,0,0,e161d5970dbe21534ca8a58bed4dd6c1987c83e10878bb74e78478ffbc0f0ee0,2021-04-29T20:47:58.447000
|
CVE-2021-2290,0,0,e161d5970dbe21534ca8a58bed4dd6c1987c83e10878bb74e78478ffbc0f0ee0,2021-04-29T20:47:58.447000
|
||||||
CVE-2021-22900,0,0,11a74ac18596a70d6c0516ae29fd70e796dabfbb34e2f92013099e700819c483,2024-02-27T21:04:17.560000
|
CVE-2021-22900,0,0,11a74ac18596a70d6c0516ae29fd70e796dabfbb34e2f92013099e700819c483,2024-02-27T21:04:17.560000
|
||||||
CVE-2021-22901,0,1,2a1a7208fc9121c18a2c89b2042f15bd19d95e85ecb19178162498c4e0a4deac,2024-03-27T15:12:59.917000
|
CVE-2021-22901,0,0,2a1a7208fc9121c18a2c89b2042f15bd19d95e85ecb19178162498c4e0a4deac,2024-03-27T15:12:59.917000
|
||||||
CVE-2021-22902,0,0,a4a2f38d3c797c9517b7f337fa2d0e3e5b8d86adecf091a3702d7a01df0e157e,2021-08-18T19:13:08.357000
|
CVE-2021-22902,0,0,a4a2f38d3c797c9517b7f337fa2d0e3e5b8d86adecf091a3702d7a01df0e157e,2021-08-18T19:13:08.357000
|
||||||
CVE-2021-22903,0,0,d99c63747b80c7b228edad210ca49963f2a6a5d584bb06dc2d26f5bd0882cc38,2021-10-21T14:32:48.653000
|
CVE-2021-22903,0,0,d99c63747b80c7b228edad210ca49963f2a6a5d584bb06dc2d26f5bd0882cc38,2021-10-21T14:32:48.653000
|
||||||
CVE-2021-22904,0,0,c7c7adf8c040783b0936d1c950d3c44f5a571a588ff5dd5f6c9de0c39943e2a1,2021-09-20T13:51:48.960000
|
CVE-2021-22904,0,0,c7c7adf8c040783b0936d1c950d3c44f5a571a588ff5dd5f6c9de0c39943e2a1,2021-09-20T13:51:48.960000
|
||||||
@ -168995,11 +168995,11 @@ CVE-2021-22919,0,0,5b87ea27363e05614e4a5485baeac7da5070817fc270c91e352c520206170
|
|||||||
CVE-2021-2292,0,0,aae95cf3c4655101628b7554f035b288cc5af5918aa24130f926447a2ca1222e,2021-04-29T20:47:34.503000
|
CVE-2021-2292,0,0,aae95cf3c4655101628b7554f035b288cc5af5918aa24130f926447a2ca1222e,2021-04-29T20:47:34.503000
|
||||||
CVE-2021-22920,0,0,60e418487b730f0bed1da720516f9512142293b89ddf82fee7fc1b233d082f08,2021-08-13T14:26:49.893000
|
CVE-2021-22920,0,0,60e418487b730f0bed1da720516f9512142293b89ddf82fee7fc1b233d082f08,2021-08-13T14:26:49.893000
|
||||||
CVE-2021-22921,0,0,feb4fb83ce2bf5e935c6de933544186d50f0116ae15db7d20909d87724c99312,2022-04-06T14:30:09.710000
|
CVE-2021-22921,0,0,feb4fb83ce2bf5e935c6de933544186d50f0116ae15db7d20909d87724c99312,2022-04-06T14:30:09.710000
|
||||||
CVE-2021-22922,0,1,2a6d6c53ceaa934818277b479285d90cbbc0a427dd59031c3bfba28a777b402b,2024-03-27T15:12:55.770000
|
CVE-2021-22922,0,0,2a6d6c53ceaa934818277b479285d90cbbc0a427dd59031c3bfba28a777b402b,2024-03-27T15:12:55.770000
|
||||||
CVE-2021-22923,0,1,a82050eb038ef4e5284a2e0a6f950b794e78571ece5049ff8d206611a1b4e322,2024-03-27T15:11:51.407000
|
CVE-2021-22923,0,0,a82050eb038ef4e5284a2e0a6f950b794e78571ece5049ff8d206611a1b4e322,2024-03-27T15:11:51.407000
|
||||||
CVE-2021-22924,0,1,72ff22a33290cc49cb2f521b2873a9b2f36f6b6688a5fea8c78dfcdea7bc8bfc,2024-03-27T15:11:45.923000
|
CVE-2021-22924,0,0,72ff22a33290cc49cb2f521b2873a9b2f36f6b6688a5fea8c78dfcdea7bc8bfc,2024-03-27T15:11:45.923000
|
||||||
CVE-2021-22925,0,1,10ffe09200017c9648adf7fa5be8f1caacf63435ae34ee4b2a1f93c7622d0586,2024-03-27T15:11:42.063000
|
CVE-2021-22925,0,0,10ffe09200017c9648adf7fa5be8f1caacf63435ae34ee4b2a1f93c7622d0586,2024-03-27T15:11:42.063000
|
||||||
CVE-2021-22926,0,1,3efc635fa0235e65a9c189d16b56eea42ebb077237b16dedab9ddeabbf64bf9e,2024-03-27T15:11:38.047000
|
CVE-2021-22926,0,0,3efc635fa0235e65a9c189d16b56eea42ebb077237b16dedab9ddeabbf64bf9e,2024-03-27T15:11:38.047000
|
||||||
CVE-2021-22927,0,0,1b8462bd45eb1b8bbb2dd622741a6b441c80899ff24289230174628fdcea5934,2021-08-16T20:14:39.867000
|
CVE-2021-22927,0,0,1b8462bd45eb1b8bbb2dd622741a6b441c80899ff24289230174628fdcea5934,2021-08-16T20:14:39.867000
|
||||||
CVE-2021-22928,0,0,eb0dcc242a46f18d3ecc4eb85eb326e9e33689232040f26456b27ab9e35bd837,2022-07-12T17:42:04.277000
|
CVE-2021-22928,0,0,eb0dcc242a46f18d3ecc4eb85eb326e9e33689232040f26456b27ab9e35bd837,2022-07-12T17:42:04.277000
|
||||||
CVE-2021-22929,0,0,774cbc1647fc8fb32f6b2128bf970d90f5e640dadbb29ee069cbab5e2f5fb8bd,2021-09-10T14:11:28.307000
|
CVE-2021-22929,0,0,774cbc1647fc8fb32f6b2128bf970d90f5e640dadbb29ee069cbab5e2f5fb8bd,2021-09-10T14:11:28.307000
|
||||||
@ -169020,9 +169020,9 @@ CVE-2021-22941,0,0,790f39177cb178344fc54a0bbb6992e1c74aac7fe2479d9a5090505eb5132
|
|||||||
CVE-2021-22942,0,0,1da3830a53259463f709f5ba4027ae9b3637d47628a0ea6018e6187c6cd82118,2024-02-02T14:15:53.073000
|
CVE-2021-22942,0,0,1da3830a53259463f709f5ba4027ae9b3637d47628a0ea6018e6187c6cd82118,2024-02-02T14:15:53.073000
|
||||||
CVE-2021-22943,0,0,a779577368528cbca69c94f741434f52bbd682ef6911362b85b82b3036804a5a,2021-09-09T00:23:55.950000
|
CVE-2021-22943,0,0,a779577368528cbca69c94f741434f52bbd682ef6911362b85b82b3036804a5a,2021-09-09T00:23:55.950000
|
||||||
CVE-2021-22944,0,0,eb9ced6a11b6750716f46ac3d98436723d8a1f88ede10032cc3bac0ddb1abd25,2022-07-12T17:42:04.277000
|
CVE-2021-22944,0,0,eb9ced6a11b6750716f46ac3d98436723d8a1f88ede10032cc3bac0ddb1abd25,2022-07-12T17:42:04.277000
|
||||||
CVE-2021-22945,0,1,c8b9b5f36257cd0029eca06a8c67ddac907a5238990f8a30330780d98bf902f2,2024-03-27T15:04:30.460000
|
CVE-2021-22945,0,0,c8b9b5f36257cd0029eca06a8c67ddac907a5238990f8a30330780d98bf902f2,2024-03-27T15:04:30.460000
|
||||||
CVE-2021-22946,0,1,34c4886fd3ded8a81159779bf38e5eec423d3337f732456a04ae6127d219ee2b,2024-03-27T15:12:52.090000
|
CVE-2021-22946,0,0,34c4886fd3ded8a81159779bf38e5eec423d3337f732456a04ae6127d219ee2b,2024-03-27T15:12:52.090000
|
||||||
CVE-2021-22947,0,1,1f0d215e655ba698cf8c5924566d829a44a9033863a6cf777d890396311f0a45,2024-03-27T15:03:30.377000
|
CVE-2021-22947,0,0,1f0d215e655ba698cf8c5924566d829a44a9033863a6cf777d890396311f0a45,2024-03-27T15:03:30.377000
|
||||||
CVE-2021-22948,0,0,3ae29b064ef956ec50546dd688fd9027239438584162735a1f0be84abdde7a16,2023-06-30T17:50:34.397000
|
CVE-2021-22948,0,0,3ae29b064ef956ec50546dd688fd9027239438584162735a1f0be84abdde7a16,2023-06-30T17:50:34.397000
|
||||||
CVE-2021-22949,0,0,726df53d67307bd416ab1f5c561fc0aac2ca19398b535bd9686e823a2044b612,2021-10-19T16:47:45.690000
|
CVE-2021-22949,0,0,726df53d67307bd416ab1f5c561fc0aac2ca19398b535bd9686e823a2044b612,2021-10-19T16:47:45.690000
|
||||||
CVE-2021-2295,0,0,02b76f640c5b0c546264dd7fe3019280895cc3f4c3d3c1ab1754e973bcd9757d,2021-04-29T20:46:25.240000
|
CVE-2021-2295,0,0,02b76f640c5b0c546264dd7fe3019280895cc3f4c3d3c1ab1754e973bcd9757d,2021-04-29T20:46:25.240000
|
||||||
@ -175457,7 +175457,7 @@ CVE-2021-31558,0,0,d6b7eca8b3661e1164cde3cafef1c266e2f8472859f6d02c98f0ee8c033dc
|
|||||||
CVE-2021-31559,0,0,960ef105b3161c8de185bc6fc58d26fca8236596b08b91f433c81abecf743c41,2022-10-25T16:42:38.307000
|
CVE-2021-31559,0,0,960ef105b3161c8de185bc6fc58d26fca8236596b08b91f433c81abecf743c41,2022-10-25T16:42:38.307000
|
||||||
CVE-2021-3156,0,0,f7e7c8ef1b0e324cf2ea0191a3cda9d24a63ed0693294ca151795598dc60b3ad,2024-02-04T09:15:08.010000
|
CVE-2021-3156,0,0,f7e7c8ef1b0e324cf2ea0191a3cda9d24a63ed0693294ca151795598dc60b3ad,2024-02-04T09:15:08.010000
|
||||||
CVE-2021-31562,0,0,797d186a32fce9d0031f33fb21467dc046abc2641f41f3a4eb668dae3bcade3e,2022-01-28T15:55:53.923000
|
CVE-2021-31562,0,0,797d186a32fce9d0031f33fb21467dc046abc2641f41f3a4eb668dae3bcade3e,2022-01-28T15:55:53.923000
|
||||||
CVE-2021-31566,0,1,9f6729ca0b8caaeddd1206b928ad0457539959c073118fdcfd964b35f3aa80df,2024-03-27T16:04:30.260000
|
CVE-2021-31566,0,0,9f6729ca0b8caaeddd1206b928ad0457539959c073118fdcfd964b35f3aa80df,2024-03-27T16:04:30.260000
|
||||||
CVE-2021-31567,0,0,bca43f0db30fc722ddd2e9bd8fed1b110a7669196d896ae913f81e804a6662ff,2022-02-03T17:09:44.553000
|
CVE-2021-31567,0,0,bca43f0db30fc722ddd2e9bd8fed1b110a7669196d896ae913f81e804a6662ff,2022-02-03T17:09:44.553000
|
||||||
CVE-2021-31571,0,0,ac310b71da451791809abe07817b13f801603fe521103d861c539df6dddb4324,2021-06-02T18:34:27.147000
|
CVE-2021-31571,0,0,ac310b71da451791809abe07817b13f801603fe521103d861c539df6dddb4324,2021-06-02T18:34:27.147000
|
||||||
CVE-2021-31572,0,0,4a0d1e85208db2b4aa6a27ae410c9ffbc5b5d32694228ebc0356df3d4f0ad164,2021-06-02T18:33:41.203000
|
CVE-2021-31572,0,0,4a0d1e85208db2b4aa6a27ae410c9ffbc5b5d32694228ebc0356df3d4f0ad164,2021-06-02T18:33:41.203000
|
||||||
@ -178183,7 +178183,7 @@ CVE-2021-35196,0,0,3c93f00a18e99aace340d6044644723c83a7fc554c345131bd8f0eac840a8
|
|||||||
CVE-2021-35197,0,0,2ff79030327337ae3dee0c61c9baeb32fff891d83c78c592ce6d47974492f2a4,2023-11-07T03:36:30.150000
|
CVE-2021-35197,0,0,2ff79030327337ae3dee0c61c9baeb32fff891d83c78c592ce6d47974492f2a4,2023-11-07T03:36:30.150000
|
||||||
CVE-2021-35198,0,0,e96990d62672cf02fa4cbfbf2e31fc75388b38d1e046810266a814dca0823507,2021-10-04T17:33:36.207000
|
CVE-2021-35198,0,0,e96990d62672cf02fa4cbfbf2e31fc75388b38d1e046810266a814dca0823507,2021-10-04T17:33:36.207000
|
||||||
CVE-2021-35199,0,0,9f062618d9a6cdf8c10bd83760fab290dac75318dde871525dfe843905fa91aa,2021-10-04T17:34:23.810000
|
CVE-2021-35199,0,0,9f062618d9a6cdf8c10bd83760fab290dac75318dde871525dfe843905fa91aa,2021-10-04T17:34:23.810000
|
||||||
CVE-2021-3520,0,1,60daddfb9f0bfc98507b64ef9c2c09b3106e89016024f6e140545c37e7343e5b,2024-03-27T16:12:07.343000
|
CVE-2021-3520,0,0,60daddfb9f0bfc98507b64ef9c2c09b3106e89016024f6e140545c37e7343e5b,2024-03-27T16:12:07.343000
|
||||||
CVE-2021-35200,0,0,aac4a0c49e39317db7297384a39c931b1b31e44af9c47b1b42addc5f5a769c5a,2021-10-04T17:34:51.317000
|
CVE-2021-35200,0,0,aac4a0c49e39317db7297384a39c931b1b31e44af9c47b1b42addc5f5a769c5a,2021-10-04T17:34:51.317000
|
||||||
CVE-2021-35201,0,0,c0e0431448d3ba12a3d72455869761436f021a172ba4e64a31d8fe9f90cdbb0e,2021-10-04T17:39:16.717000
|
CVE-2021-35201,0,0,c0e0431448d3ba12a3d72455869761436f021a172ba4e64a31d8fe9f90cdbb0e,2021-10-04T17:39:16.717000
|
||||||
CVE-2021-35202,0,0,db5717bdc407832303592e1688309f0a7efc338fdecfe7ebb2ba8778dd1dc3a5,2022-07-12T17:42:04.277000
|
CVE-2021-35202,0,0,db5717bdc407832303592e1688309f0a7efc338fdecfe7ebb2ba8778dd1dc3a5,2022-07-12T17:42:04.277000
|
||||||
@ -179322,7 +179322,7 @@ CVE-2021-36972,0,0,7f5d343ad41aad3817fa2bedd0395a3df6e9fecf214880f976d53a911b896
|
|||||||
CVE-2021-36973,0,0,ac2dc242541a2ee5ba49d79bf57e002c1a9b668a1f03222716899ff14ef45ffe,2023-12-28T20:15:57.900000
|
CVE-2021-36973,0,0,ac2dc242541a2ee5ba49d79bf57e002c1a9b668a1f03222716899ff14ef45ffe,2023-12-28T20:15:57.900000
|
||||||
CVE-2021-36974,0,0,c30cf6d5afa3e9f7a6e032f7b5f5299dda13609f19eee733b117b26d25d84367,2023-12-28T20:15:58.080000
|
CVE-2021-36974,0,0,c30cf6d5afa3e9f7a6e032f7b5f5299dda13609f19eee733b117b26d25d84367,2023-12-28T20:15:58.080000
|
||||||
CVE-2021-36975,0,0,ce220aa95f2c890a8d4ff736efe2d9dfc0ea623ac7903ab52c4780e62b63d8a4,2023-12-28T20:15:58.270000
|
CVE-2021-36975,0,0,ce220aa95f2c890a8d4ff736efe2d9dfc0ea623ac7903ab52c4780e62b63d8a4,2023-12-28T20:15:58.270000
|
||||||
CVE-2021-36976,0,1,11edc2c9d5ff54dd12fe221d4b1b2e9240999e37529e96d126a0df71db91805c,2024-03-27T16:04:33.757000
|
CVE-2021-36976,0,0,11edc2c9d5ff54dd12fe221d4b1b2e9240999e37529e96d126a0df71db91805c,2024-03-27T16:04:33.757000
|
||||||
CVE-2021-36977,0,0,7ecd05ff14517c69b8531d9df96b8b2d27de568c1702c608fa6bb1a478b2e3fb,2022-04-29T15:06:24.723000
|
CVE-2021-36977,0,0,7ecd05ff14517c69b8531d9df96b8b2d27de568c1702c608fa6bb1a478b2e3fb,2022-04-29T15:06:24.723000
|
||||||
CVE-2021-36978,0,0,c092dc339b5081975b530efaad454d5fce3a66a1b72c84e10cddb2024985c236,2024-01-15T14:15:24.063000
|
CVE-2021-36978,0,0,c092dc339b5081975b530efaad454d5fce3a66a1b72c84e10cddb2024985c236,2024-01-15T14:15:24.063000
|
||||||
CVE-2021-36979,0,0,73adb542e1879400d086ac81162f560768e693d2fe0591e07a9d4d8e8ed4e8f9,2023-11-07T03:36:53.250000
|
CVE-2021-36979,0,0,73adb542e1879400d086ac81162f560768e693d2fe0591e07a9d4d8e8ed4e8f9,2023-11-07T03:36:53.250000
|
||||||
@ -191242,7 +191242,7 @@ CVE-2022-2257,0,0,dad20c73a2c2f0d659cc80938da21afb7f70013cf16b8dcc2003499bc089cc
|
|||||||
CVE-2022-22570,0,0,705979cc0a814572a0cd5c9e0662feac9cb14f55a7c65f73308c1223d21dd60a,2022-04-09T02:19:58.207000
|
CVE-2022-22570,0,0,705979cc0a814572a0cd5c9e0662feac9cb14f55a7c65f73308c1223d21dd60a,2022-04-09T02:19:58.207000
|
||||||
CVE-2022-22571,0,0,8cf67737c2cf76f5e72d366fed0fdef4b956f75d8f90492ab3949699e0044275,2022-04-15T13:59:11.807000
|
CVE-2022-22571,0,0,8cf67737c2cf76f5e72d366fed0fdef4b956f75d8f90492ab3949699e0044275,2022-04-15T13:59:11.807000
|
||||||
CVE-2022-22572,0,0,6c69b74689b3da56cc5cd4ac07a6d48f8516d77a0d623ae20b558e21731dadf1,2022-04-18T16:48:20.967000
|
CVE-2022-22572,0,0,6c69b74689b3da56cc5cd4ac07a6d48f8516d77a0d623ae20b558e21731dadf1,2022-04-18T16:48:20.967000
|
||||||
CVE-2022-22576,0,1,5c200c3d4493404e43d751132cb6faac3af6609098c75a1fdfc162eb0900192c,2024-03-27T15:02:35.557000
|
CVE-2022-22576,0,0,5c200c3d4493404e43d751132cb6faac3af6609098c75a1fdfc162eb0900192c,2024-03-27T15:02:35.557000
|
||||||
CVE-2022-22577,0,0,2c7e6e442f1a2def91b5d39b63b26dbccbdeed76757f7c584ef306f58ed0c62d,2023-03-14T08:15:12.540000
|
CVE-2022-22577,0,0,2c7e6e442f1a2def91b5d39b63b26dbccbdeed76757f7c584ef306f58ed0c62d,2023-03-14T08:15:12.540000
|
||||||
CVE-2022-22578,0,0,73b80115f4455669055d8343359cec891f19e3b0a3a3e4b5856a6807563a33ed,2022-03-28T16:44:22.473000
|
CVE-2022-22578,0,0,73b80115f4455669055d8343359cec891f19e3b0a3a3e4b5856a6807563a33ed,2022-03-28T16:44:22.473000
|
||||||
CVE-2022-22579,0,0,d5ee72c4fe4d45872a66d282d7714d780c37d05ff42ee4a479e5f47abbb3fe46,2022-03-28T15:44:07.387000
|
CVE-2022-22579,0,0,d5ee72c4fe4d45872a66d282d7714d780c37d05ff42ee4a479e5f47abbb3fe46,2022-03-28T15:44:07.387000
|
||||||
@ -195565,16 +195565,16 @@ CVE-2022-2776,0,0,91f9249f9762db987391c6f5fe8c27628dcd0a98ebf2a2f0d87620befd7093
|
|||||||
CVE-2022-2777,0,0,0391d02bd79913feea13c05d4ceee16b4c5d33425d0fc7c99ff2b86956b2f6f8,2022-08-15T18:47:59.257000
|
CVE-2022-2777,0,0,0391d02bd79913feea13c05d4ceee16b4c5d33425d0fc7c99ff2b86956b2f6f8,2022-08-15T18:47:59.257000
|
||||||
CVE-2022-27772,0,0,19b630a50a6d4660f9e5f590ec103d80f3271aeaab0f1e28ab8117ec2c7a0a03,2024-03-21T02:42:31.680000
|
CVE-2022-27772,0,0,19b630a50a6d4660f9e5f590ec103d80f3271aeaab0f1e28ab8117ec2c7a0a03,2024-03-21T02:42:31.680000
|
||||||
CVE-2022-27773,0,0,091201079ac7882e9e194f3c9d8d1a4a6a54d2b5882895d61e7c68603566a544,2022-12-07T17:36:07.027000
|
CVE-2022-27773,0,0,091201079ac7882e9e194f3c9d8d1a4a6a54d2b5882895d61e7c68603566a544,2022-12-07T17:36:07.027000
|
||||||
CVE-2022-27774,0,1,fb1147cbe33ccdcdad1fb4a673f329c1884c101fd45f17d9a031914a02dfdc32,2024-03-27T15:02:31.430000
|
CVE-2022-27774,0,0,fb1147cbe33ccdcdad1fb4a673f329c1884c101fd45f17d9a031914a02dfdc32,2024-03-27T15:02:31.430000
|
||||||
CVE-2022-27775,0,1,c1eadfce756295b3b6b28dd1721c814b989b792c83033617f3aa9ef1deada2c6,2024-03-27T15:02:27.427000
|
CVE-2022-27775,0,0,c1eadfce756295b3b6b28dd1721c814b989b792c83033617f3aa9ef1deada2c6,2024-03-27T15:02:27.427000
|
||||||
CVE-2022-27776,0,1,f9d3880f8bd8996b45317c60d3f8b57e3dfa597ee089dd4449a011d1943a6eeb,2024-03-27T15:02:23.683000
|
CVE-2022-27776,0,0,f9d3880f8bd8996b45317c60d3f8b57e3dfa597ee089dd4449a011d1943a6eeb,2024-03-27T15:02:23.683000
|
||||||
CVE-2022-27777,0,0,e53f0de9a226215bf6b68db8cc4fda72582d13893879270665b18291e9910ee7,2023-03-14T08:15:12.993000
|
CVE-2022-27777,0,0,e53f0de9a226215bf6b68db8cc4fda72582d13893879270665b18291e9910ee7,2023-03-14T08:15:12.993000
|
||||||
CVE-2022-27778,0,1,e68aa53c00ebd71e950de2e2de15f4dc3314d61497fb345b9ac5f9ffc19ac244,2024-03-27T15:02:14.720000
|
CVE-2022-27778,0,0,e68aa53c00ebd71e950de2e2de15f4dc3314d61497fb345b9ac5f9ffc19ac244,2024-03-27T15:02:14.720000
|
||||||
CVE-2022-27779,0,1,624ab60dd56fc169eac4aa37ff3f5a59306663a86baea40df643b824b133432f,2024-03-27T15:02:07.080000
|
CVE-2022-27779,0,0,624ab60dd56fc169eac4aa37ff3f5a59306663a86baea40df643b824b133432f,2024-03-27T15:02:07.080000
|
||||||
CVE-2022-2778,0,0,06de8b398c09429f19f0c3e3fe7de194f9df7821d3cffcbef711cd3616feb4da,2022-10-04T18:20:12.593000
|
CVE-2022-2778,0,0,06de8b398c09429f19f0c3e3fe7de194f9df7821d3cffcbef711cd3616feb4da,2022-10-04T18:20:12.593000
|
||||||
CVE-2022-27780,0,1,8a859689331e44c2f2d4915c7a406179db2ece5d9d9950ebd78fa4c7a131b090,2024-03-27T15:01:58.407000
|
CVE-2022-27780,0,0,8a859689331e44c2f2d4915c7a406179db2ece5d9d9950ebd78fa4c7a131b090,2024-03-27T15:01:58.407000
|
||||||
CVE-2022-27781,0,1,c3f7e062814594e95161cf77a64c2c1cf1b81ab8d54714f16da8ef5d4332164b,2024-03-27T15:01:53.060000
|
CVE-2022-27781,0,0,c3f7e062814594e95161cf77a64c2c1cf1b81ab8d54714f16da8ef5d4332164b,2024-03-27T15:01:53.060000
|
||||||
CVE-2022-27782,0,1,8a58a7225be5f4a0725a4b892831f4fdea6cb48003542f266c6a715e2a18f87a,2024-03-27T15:01:49.180000
|
CVE-2022-27782,0,0,8a58a7225be5f4a0725a4b892831f4fdea6cb48003542f266c6a715e2a18f87a,2024-03-27T15:01:49.180000
|
||||||
CVE-2022-27783,0,0,19dc1467106cf4d13c4cbca7b4d3d753aca29f021174cae3299962a01c8e40e4,2022-05-13T17:29:38.363000
|
CVE-2022-27783,0,0,19dc1467106cf4d13c4cbca7b4d3d753aca29f021174cae3299962a01c8e40e4,2022-05-13T17:29:38.363000
|
||||||
CVE-2022-27784,0,0,b7f32c2a04336f6a7e6280db469db0b1c9e818e53867bee1bbb46d1260bc8172,2023-01-24T15:40:03.220000
|
CVE-2022-27784,0,0,b7f32c2a04336f6a7e6280db469db0b1c9e818e53867bee1bbb46d1260bc8172,2023-01-24T15:40:03.220000
|
||||||
CVE-2022-27785,0,0,815f6325247a3206bba95ff03c9af5bbe8be4931c2ab1a0696317b6c44469ad8,2023-11-07T03:45:23.953000
|
CVE-2022-27785,0,0,815f6325247a3206bba95ff03c9af5bbe8be4931c2ab1a0696317b6c44469ad8,2023-11-07T03:45:23.953000
|
||||||
@ -197511,7 +197511,7 @@ CVE-2022-30110,0,0,e9dd44f77ad831587ec4e39383c77b19970dfa79ea2836269377ed5e66ff8
|
|||||||
CVE-2022-30111,0,0,fd7ce5e1f36c9b6c8f614d5a82d13d60a0686a1b619f0786a8ee5c19809658f8,2022-05-26T16:24:35.227000
|
CVE-2022-30111,0,0,fd7ce5e1f36c9b6c8f614d5a82d13d60a0686a1b619f0786a8ee5c19809658f8,2022-05-26T16:24:35.227000
|
||||||
CVE-2022-30113,0,0,db69ed943e1ef593f870b319436186438ef07a7d5150cabaae529fed6b3aa1a5,2022-07-20T14:03:39.717000
|
CVE-2022-30113,0,0,db69ed943e1ef593f870b319436186438ef07a7d5150cabaae529fed6b3aa1a5,2022-07-20T14:03:39.717000
|
||||||
CVE-2022-30114,0,0,42dd9ab35652e5702b947020cdff9115df4b404dbdaa5bb380da18fec15c5fe1,2023-09-21T22:15:09.740000
|
CVE-2022-30114,0,0,42dd9ab35652e5702b947020cdff9115df4b404dbdaa5bb380da18fec15c5fe1,2023-09-21T22:15:09.740000
|
||||||
CVE-2022-30115,0,1,092abca7773c8fc2c2cd84485613813b066cf454c73fa0db7b767c462abb36b3,2024-03-27T15:01:44.073000
|
CVE-2022-30115,0,0,092abca7773c8fc2c2cd84485613813b066cf454c73fa0db7b767c462abb36b3,2024-03-27T15:01:44.073000
|
||||||
CVE-2022-30117,0,0,33574de4664a2d386ce6045e061b1c748627576714c0165735a81caafad848ba,2022-07-05T18:05:54.507000
|
CVE-2022-30117,0,0,33574de4664a2d386ce6045e061b1c748627576714c0165735a81caafad848ba,2022-07-05T18:05:54.507000
|
||||||
CVE-2022-30118,0,0,213c2c2d84fe4379961dc11aa96d4e79201e7d1f9ec84b813d01a5493181bf54,2022-07-05T18:39:18.303000
|
CVE-2022-30118,0,0,213c2c2d84fe4379961dc11aa96d4e79201e7d1f9ec84b813d01a5493181bf54,2022-07-05T18:39:18.303000
|
||||||
CVE-2022-30119,0,0,985ddc925894e6d93e1f83c0fa1b896227b46d2592b676030321ee11299fd8f4,2022-07-05T19:40:24.917000
|
CVE-2022-30119,0,0,985ddc925894e6d93e1f83c0fa1b896227b46d2592b676030321ee11299fd8f4,2022-07-05T19:40:24.917000
|
||||||
@ -199223,10 +199223,10 @@ CVE-2022-3220,0,0,631146846ce39a437d1ca5e831536fa4c835a6a44e107e799c6ab41eb6a3c0
|
|||||||
CVE-2022-32200,0,0,6a1e2ddcf6e11f75fddf89de9541431f41a9d459d4394ba83c378609e2b29803,2022-06-10T16:16:20.087000
|
CVE-2022-32200,0,0,6a1e2ddcf6e11f75fddf89de9541431f41a9d459d4394ba83c378609e2b29803,2022-06-10T16:16:20.087000
|
||||||
CVE-2022-32201,0,0,41e373400f3c5eb580922a9928f9240aff7ff160b5a59f6c054ca3d376e10daa,2022-06-10T16:18:35.690000
|
CVE-2022-32201,0,0,41e373400f3c5eb580922a9928f9240aff7ff160b5a59f6c054ca3d376e10daa,2022-06-10T16:18:35.690000
|
||||||
CVE-2022-32202,0,0,d2e75bbd3c8ec7203fccfd537614f1837041af7a919f7f66ebd547b99b110d7b,2022-06-10T16:14:28.477000
|
CVE-2022-32202,0,0,d2e75bbd3c8ec7203fccfd537614f1837041af7a919f7f66ebd547b99b110d7b,2022-06-10T16:14:28.477000
|
||||||
CVE-2022-32205,0,1,36d1f2c768ab18fa849fbb0196dcbd7ce761b5a6fbd2c79fe2418061b4439eaa,2024-03-27T15:01:05.383000
|
CVE-2022-32205,0,0,36d1f2c768ab18fa849fbb0196dcbd7ce761b5a6fbd2c79fe2418061b4439eaa,2024-03-27T15:01:05.383000
|
||||||
CVE-2022-32206,0,1,95a472387799ef8f8393056737e78a46cd10cd43c0b52fc2809d3f4b772ae161,2024-03-27T15:00:54.267000
|
CVE-2022-32206,0,0,95a472387799ef8f8393056737e78a46cd10cd43c0b52fc2809d3f4b772ae161,2024-03-27T15:00:54.267000
|
||||||
CVE-2022-32207,0,1,76c3acd367c4b491ab1b8915dc9b7162aef765744ab96e118dcc2dd8860b637e,2024-03-27T15:00:46.637000
|
CVE-2022-32207,0,0,76c3acd367c4b491ab1b8915dc9b7162aef765744ab96e118dcc2dd8860b637e,2024-03-27T15:00:46.637000
|
||||||
CVE-2022-32208,0,1,854a09574eede661d6fcd781930e4022272ea24f63f9749d49ae1fb23ef1b69c,2024-03-27T15:00:41.657000
|
CVE-2022-32208,0,0,854a09574eede661d6fcd781930e4022272ea24f63f9749d49ae1fb23ef1b69c,2024-03-27T15:00:41.657000
|
||||||
CVE-2022-32209,0,0,fad525a81bc1b9ee0d0345f2c1b1b664f3e12e7a15389ea71ebb61bdde77f886,2024-02-01T16:22:15.683000
|
CVE-2022-32209,0,0,fad525a81bc1b9ee0d0345f2c1b1b664f3e12e7a15389ea71ebb61bdde77f886,2024-02-01T16:22:15.683000
|
||||||
CVE-2022-3221,0,0,275d674547ffc29400f67559d3c8664d4bccd2f7c7c5cc0914b161b5d13d38e0,2022-09-18T01:29:18.213000
|
CVE-2022-3221,0,0,275d674547ffc29400f67559d3c8664d4bccd2f7c7c5cc0914b161b5d13d38e0,2022-09-18T01:29:18.213000
|
||||||
CVE-2022-32210,0,0,9e0166b5a9c2173e071ae40a153be840b224b053a9221f7e9315a8d7bbb82718,2022-07-25T18:29:47.667000
|
CVE-2022-32210,0,0,9e0166b5a9c2173e071ae40a153be840b224b053a9221f7e9315a8d7bbb82718,2022-07-25T18:29:47.667000
|
||||||
@ -199240,7 +199240,7 @@ CVE-2022-32218,0,0,0fac3e82cd2a8928892ed0557823b129d2ed0d18d92f79b5ccb401e684104
|
|||||||
CVE-2022-32219,0,0,ce0f6a2e7c8b2c1b75c33893a6089ec39040bca0900f6cfc8f7468907726a4ea,2022-09-27T14:06:46.800000
|
CVE-2022-32219,0,0,ce0f6a2e7c8b2c1b75c33893a6089ec39040bca0900f6cfc8f7468907726a4ea,2022-09-27T14:06:46.800000
|
||||||
CVE-2022-3222,0,0,212ba91fe1f852e9243096a789e5d2a1894879240e2e011179953511ea237565,2023-05-27T04:15:22.017000
|
CVE-2022-3222,0,0,212ba91fe1f852e9243096a789e5d2a1894879240e2e011179953511ea237565,2023-05-27T04:15:22.017000
|
||||||
CVE-2022-32220,0,0,fd8431710aa17c0431d6dc891fe66b12ab5a39b6ac62c0ef31b0405c6cadc85a,2023-07-21T19:26:19.830000
|
CVE-2022-32220,0,0,fd8431710aa17c0431d6dc891fe66b12ab5a39b6ac62c0ef31b0405c6cadc85a,2023-07-21T19:26:19.830000
|
||||||
CVE-2022-32221,0,1,e0b9b99050dd15f817721346f60019d6b3ed4fd3a3a72fb36e3efae0a0f3af70,2024-03-27T15:00:28.423000
|
CVE-2022-32221,0,0,e0b9b99050dd15f817721346f60019d6b3ed4fd3a3a72fb36e3efae0a0f3af70,2024-03-27T15:00:28.423000
|
||||||
CVE-2022-32222,0,0,f6863d565197651f10e273293713647cea3e9589a5b34582984bacb0a3cf6013,2023-07-24T13:16:33.287000
|
CVE-2022-32222,0,0,f6863d565197651f10e273293713647cea3e9589a5b34582984bacb0a3cf6013,2023-07-24T13:16:33.287000
|
||||||
CVE-2022-32223,0,0,13371c7607369d44516921cc35bd568a13425936d43496b18a3ac8eaa07dc9b3,2022-10-28T18:29:55.297000
|
CVE-2022-32223,0,0,13371c7607369d44516921cc35bd568a13425936d43496b18a3ac8eaa07dc9b3,2022-10-28T18:29:55.297000
|
||||||
CVE-2022-32224,0,0,c7e760846594e69e5ff3ec467a23094bdb9b067f54b82e4a845627fa9168b70a,2022-12-08T13:20:13.287000
|
CVE-2022-32224,0,0,c7e760846594e69e5ff3ec467a23094bdb9b067f54b82e4a845627fa9168b70a,2022-12-08T13:20:13.287000
|
||||||
@ -201600,7 +201600,7 @@ CVE-2022-35249,0,0,4c6921f429d6bd1a292af5d1fd6f601f8709ef83cb0a62c1ab6499da12b96
|
|||||||
CVE-2022-3525,0,0,75561123723350358039f471247ec09372fff2a78b9c6e04483a8d98e0d06f04,2022-11-21T12:48:31.207000
|
CVE-2022-3525,0,0,75561123723350358039f471247ec09372fff2a78b9c6e04483a8d98e0d06f04,2022-11-21T12:48:31.207000
|
||||||
CVE-2022-35250,0,0,ec6109697f611365321a4135191e4ed4202eed0d67e5c4f88ed90ffaa0669a21,2022-09-27T14:01:56.857000
|
CVE-2022-35250,0,0,ec6109697f611365321a4135191e4ed4202eed0d67e5c4f88ed90ffaa0669a21,2022-09-27T14:01:56.857000
|
||||||
CVE-2022-35251,0,0,8392cf117d9d355d6a9a22038422f8a6df683652ea7eff129e05eaeeeb56ba05,2022-09-26T18:57:30.417000
|
CVE-2022-35251,0,0,8392cf117d9d355d6a9a22038422f8a6df683652ea7eff129e05eaeeeb56ba05,2022-09-26T18:57:30.417000
|
||||||
CVE-2022-35252,0,1,a7acc1b310ed6164ff3b8361257c78a9d599d2a4812dc9bcba522c8334435bba,2024-03-27T15:00:36.607000
|
CVE-2022-35252,0,0,a7acc1b310ed6164ff3b8361257c78a9d599d2a4812dc9bcba522c8334435bba,2024-03-27T15:00:36.607000
|
||||||
CVE-2022-35253,0,0,e053b5a59154fa71549362ff1254aad5a17d795d5d576559056d101db6f096fc,2023-11-07T03:48:50.267000
|
CVE-2022-35253,0,0,e053b5a59154fa71549362ff1254aad5a17d795d5d576559056d101db6f096fc,2023-11-07T03:48:50.267000
|
||||||
CVE-2022-35254,0,0,398e3c9e1641afa6350efff5fbea64706007f5b21fbfbd16f261842e0115b8da,2024-02-27T21:04:17.560000
|
CVE-2022-35254,0,0,398e3c9e1641afa6350efff5fbea64706007f5b21fbfbd16f261842e0115b8da,2024-02-27T21:04:17.560000
|
||||||
CVE-2022-35255,0,0,be61bc588357a04ca4532960eb00f68d2f25632d0ec56bd426356558ea4f8d18,2023-03-01T15:03:19.287000
|
CVE-2022-35255,0,0,be61bc588357a04ca4532960eb00f68d2f25632d0ec56bd426356558ea4f8d18,2023-03-01T15:03:19.287000
|
||||||
@ -201609,7 +201609,7 @@ CVE-2022-35257,0,0,2a29302a18d6bb048d135c2ed4575264b665bbe6abafe303c171598d03d9b
|
|||||||
CVE-2022-35258,0,0,db1b3249eaf132ed21cc153b92c2cd2eca5eb4b8c299e1af4a8e695fee0855ea,2024-02-27T21:04:17.560000
|
CVE-2022-35258,0,0,db1b3249eaf132ed21cc153b92c2cd2eca5eb4b8c299e1af4a8e695fee0855ea,2024-02-27T21:04:17.560000
|
||||||
CVE-2022-35259,0,0,1aeb15137064e3f4d1c3900c7f24a5d8ef5a4046b9b810c15cbf5e6650f837e5,2022-12-07T04:29:38.620000
|
CVE-2022-35259,0,0,1aeb15137064e3f4d1c3900c7f24a5d8ef5a4046b9b810c15cbf5e6650f837e5,2022-12-07T04:29:38.620000
|
||||||
CVE-2022-3526,0,0,3ae96b98b67bb903279f9c95bb1f9d03c7340492162b12b023b5135599e06054,2023-11-07T03:51:22.083000
|
CVE-2022-3526,0,0,3ae96b98b67bb903279f9c95bb1f9d03c7340492162b12b023b5135599e06054,2023-11-07T03:51:22.083000
|
||||||
CVE-2022-35260,0,1,ff918b3aed204b27a237bc271679ce911a0dd0f3e7eca4a401fc793d0896dfc1,2024-03-27T15:00:15.383000
|
CVE-2022-35260,0,0,ff918b3aed204b27a237bc271679ce911a0dd0f3e7eca4a401fc793d0896dfc1,2024-03-27T15:00:15.383000
|
||||||
CVE-2022-35261,0,0,e0a49de2aec7a5126bc065964afe0c6bc397cb86d75f0bd1921899e3409eb5e5,2023-04-26T19:17:33.857000
|
CVE-2022-35261,0,0,e0a49de2aec7a5126bc065964afe0c6bc397cb86d75f0bd1921899e3409eb5e5,2023-04-26T19:17:33.857000
|
||||||
CVE-2022-35262,0,0,67f31eae660ebbd628db1eead9eb4d1b767416d9a5115c5a9a1a5d8204ad06f6,2023-04-26T19:17:00.687000
|
CVE-2022-35262,0,0,67f31eae660ebbd628db1eead9eb4d1b767416d9a5115c5a9a1a5d8204ad06f6,2023-04-26T19:17:00.687000
|
||||||
CVE-2022-35263,0,0,e96ef86312f89649a1f690d12e1343c6e2cef7a4ed4da7c595838f66cd735a61,2023-04-26T19:16:39.727000
|
CVE-2022-35263,0,0,e96ef86312f89649a1f690d12e1343c6e2cef7a4ed4da7c595838f66cd735a61,2023-04-26T19:16:39.727000
|
||||||
@ -201991,7 +201991,7 @@ CVE-2022-35730,0,0,d02cd3657a6ab2fdea42f1d139c507e9826c68abf50607d3ee6cd7f9529b9
|
|||||||
CVE-2022-35733,0,0,be53f5556df3a76705715263635913f30607949039453cda94fa44233963b354,2022-08-26T13:17:34.277000
|
CVE-2022-35733,0,0,be53f5556df3a76705715263635913f30607949039453cda94fa44233963b354,2022-08-26T13:17:34.277000
|
||||||
CVE-2022-35734,0,0,1023c438f5e4873a54369b93f7352270fb7fabdee2d21379bef4c8dc0ab450f7,2023-11-07T03:49:23.210000
|
CVE-2022-35734,0,0,1023c438f5e4873a54369b93f7352270fb7fabdee2d21379bef4c8dc0ab450f7,2023-11-07T03:49:23.210000
|
||||||
CVE-2022-35735,0,0,d17a4faa9fef2a8ec7968a5529a09aaeff8a9967ff28ac502b61a21ddb15417e,2022-08-10T19:26:57.143000
|
CVE-2022-35735,0,0,d17a4faa9fef2a8ec7968a5529a09aaeff8a9967ff28ac502b61a21ddb15417e,2022-08-10T19:26:57.143000
|
||||||
CVE-2022-35737,0,1,5fb8e472436ae3d6667c73253b8c2e3ede3cff2a5d90ad9492a780730605885e,2024-03-27T16:05:26.360000
|
CVE-2022-35737,0,0,5fb8e472436ae3d6667c73253b8c2e3ede3cff2a5d90ad9492a780730605885e,2024-03-27T16:05:26.360000
|
||||||
CVE-2022-35739,0,0,688371722965873cfecda0dbf2e1d7ac964f4a29df90cab90a3cdd5199f55d74,2022-10-28T19:51:12.957000
|
CVE-2022-35739,0,0,688371722965873cfecda0dbf2e1d7ac964f4a29df90cab90a3cdd5199f55d74,2022-10-28T19:51:12.957000
|
||||||
CVE-2022-3574,0,0,57e7551b871b46986e50c49a9481f07f2809cd0dc446b380d9e58de2f73309ba,2022-11-16T19:11:47.043000
|
CVE-2022-3574,0,0,57e7551b871b46986e50c49a9481f07f2809cd0dc446b380d9e58de2f73309ba,2022-11-16T19:11:47.043000
|
||||||
CVE-2022-35740,0,0,d1f07cec4539d195c6d930975815af939c2ace905dcba7b78b91706e8e72a92a,2022-11-15T20:35:35.397000
|
CVE-2022-35740,0,0,d1f07cec4539d195c6d930975815af939c2ace905dcba7b78b91706e8e72a92a,2022-11-15T20:35:35.397000
|
||||||
@ -202459,7 +202459,7 @@ CVE-2022-36223,0,0,af713d64429debb696a606282b4196e159af605ab60fe15071aea1c7fae2f
|
|||||||
CVE-2022-36224,0,0,08d6bff510d0faac0e761e55f7111fca66e5d819a4007bb48d89793fa3523f3e,2022-08-22T16:26:22.077000
|
CVE-2022-36224,0,0,08d6bff510d0faac0e761e55f7111fca66e5d819a4007bb48d89793fa3523f3e,2022-08-22T16:26:22.077000
|
||||||
CVE-2022-36225,0,0,bf3e137c686147aedd0a2f5e33321fcdcae3edae04b22a0da940ed7849985afc,2022-08-22T19:54:34.733000
|
CVE-2022-36225,0,0,bf3e137c686147aedd0a2f5e33321fcdcae3edae04b22a0da940ed7849985afc,2022-08-22T19:54:34.733000
|
||||||
CVE-2022-36226,0,0,c15fa20a54d9581f15906ddda250ac3c5e168091f424408ef65541c2fc414c40,2022-08-31T16:27:39.307000
|
CVE-2022-36226,0,0,c15fa20a54d9581f15906ddda250ac3c5e168091f424408ef65541c2fc414c40,2022-08-31T16:27:39.307000
|
||||||
CVE-2022-36227,0,1,41b76a9f24783b77e5f4675ed89258c2e29bf45423afe65aad37115594bd00c4,2024-03-27T16:04:27.210000
|
CVE-2022-36227,0,0,41b76a9f24783b77e5f4675ed89258c2e29bf45423afe65aad37115594bd00c4,2024-03-27T16:04:27.210000
|
||||||
CVE-2022-36228,0,0,2a8c144fa323e882ce8512ba86c4d448ea3607b0656403e02263245fc2a00697,2023-10-12T18:37:26.680000
|
CVE-2022-36228,0,0,2a8c144fa323e882ce8512ba86c4d448ea3607b0656403e02263245fc2a00697,2023-10-12T18:37:26.680000
|
||||||
CVE-2022-3623,0,0,c3cca1c9d7e5c93f94099fe1f079e9625cabe3c9de9d85375d161d414b59c8fc,2023-08-18T18:55:40.750000
|
CVE-2022-3623,0,0,c3cca1c9d7e5c93f94099fe1f079e9625cabe3c9de9d85375d161d414b59c8fc,2023-08-18T18:55:40.750000
|
||||||
CVE-2022-36231,0,0,bd266977b014f49f864962d37e36d14dd80315d917f63a9aca2024dc7d7ffd9c,2023-03-03T19:28:14.753000
|
CVE-2022-36231,0,0,bd266977b014f49f864962d37e36d14dd80315d917f63a9aca2024dc7d7ffd9c,2023-03-03T19:28:14.753000
|
||||||
@ -209554,7 +209554,7 @@ CVE-2022-45842,0,0,9f25540ae216de5e80164f6a8f1c3e751daed0b834ae44796a3ade59d0323
|
|||||||
CVE-2022-45843,0,0,5509ae3d19ef873f9b0c2e5074f3bcf43a244b9d1d9d19239688ff5032b78ca9,2023-11-07T03:54:53.320000
|
CVE-2022-45843,0,0,5509ae3d19ef873f9b0c2e5074f3bcf43a244b9d1d9d19239688ff5032b78ca9,2023-11-07T03:54:53.320000
|
||||||
CVE-2022-45845,0,0,7c7b5704ec58a7e6b0b65bc99493616aff55a25ad9837751371510d52188a7b5,2024-01-25T22:19:41.890000
|
CVE-2022-45845,0,0,7c7b5704ec58a7e6b0b65bc99493616aff55a25ad9837751371510d52188a7b5,2024-01-25T22:19:41.890000
|
||||||
CVE-2022-45846,0,0,8180d177894fabd765bd35647192f753aa5e8efd68ae118429536372bad2940b,2023-05-16T19:17:03.097000
|
CVE-2022-45846,0,0,8180d177894fabd765bd35647192f753aa5e8efd68ae118429536372bad2940b,2023-05-16T19:17:03.097000
|
||||||
CVE-2022-45847,0,1,45dcccfedd863be101e19a66ccb58ff88331ff85555bb783dbc7441772d6b236,2024-03-27T15:49:41.437000
|
CVE-2022-45847,0,0,45dcccfedd863be101e19a66ccb58ff88331ff85555bb783dbc7441772d6b236,2024-03-27T15:49:41.437000
|
||||||
CVE-2022-45848,0,0,fad62e623651689ae95e2fc4f689ac1b8448d31b314d8c49c68285751fad7661,2023-11-07T03:54:53.547000
|
CVE-2022-45848,0,0,fad62e623651689ae95e2fc4f689ac1b8448d31b314d8c49c68285751fad7661,2023-11-07T03:54:53.547000
|
||||||
CVE-2022-45849,0,0,705787250de6f0b2626b38d25516ea3dba7bf004e02dd10b4c9840c8901ce7b4,2023-04-21T04:17:06.770000
|
CVE-2022-45849,0,0,705787250de6f0b2626b38d25516ea3dba7bf004e02dd10b4c9840c8901ce7b4,2023-04-21T04:17:06.770000
|
||||||
CVE-2022-4585,0,0,dfc84e49b205895cb267e11431be1f335d9b1de0cfd68ee1a905558e4e7037c6,2023-11-07T03:58:14.437000
|
CVE-2022-4585,0,0,dfc84e49b205895cb267e11431be1f335d9b1de0cfd68ee1a905558e4e7037c6,2023-11-07T03:58:14.437000
|
||||||
@ -212065,6 +212065,7 @@ CVE-2023-0578,0,0,c2cf10d09529bf342567ff561ff5fc5b2abe259e50445b77cdf258d0a115db
|
|||||||
CVE-2023-0579,0,0,504b4338f864e933aa44e888a09084f9d604fd2edb1bc93c969428fcc9526d01,2023-11-07T04:00:52.513000
|
CVE-2023-0579,0,0,504b4338f864e933aa44e888a09084f9d604fd2edb1bc93c969428fcc9526d01,2023-11-07T04:00:52.513000
|
||||||
CVE-2023-0580,0,0,496b4aaf459be8082f40af9709a8d52cae4c41b641bd7ca2e1f477b04712ed00,2023-11-07T04:00:52.727000
|
CVE-2023-0580,0,0,496b4aaf459be8082f40af9709a8d52cae4c41b641bd7ca2e1f477b04712ed00,2023-11-07T04:00:52.727000
|
||||||
CVE-2023-0581,0,0,80d4f5ae1b34ea0255629d958cda2cdcf146f8044343eecb0200e915f691c351,2023-11-07T04:00:52.963000
|
CVE-2023-0581,0,0,80d4f5ae1b34ea0255629d958cda2cdcf146f8044343eecb0200e915f691c351,2023-11-07T04:00:52.963000
|
||||||
|
CVE-2023-0582,1,1,b3d8f7c84b265316b7e893995a48113564e6ef297a2eb81dadb43454ece92941,2024-03-27T18:15:08.237000
|
||||||
CVE-2023-0583,0,0,ce927582782be4db333475ecc49caef43ac381b8ee355357a8ae6188916854c1,2023-11-07T04:00:53.253000
|
CVE-2023-0583,0,0,ce927582782be4db333475ecc49caef43ac381b8ee355357a8ae6188916854c1,2023-11-07T04:00:53.253000
|
||||||
CVE-2023-0584,0,0,661ecf0e0e258efd0247b994949d777aeb58bd9b6fb3f10f25ebfe1d0595391a,2023-11-07T04:00:53.487000
|
CVE-2023-0584,0,0,661ecf0e0e258efd0247b994949d777aeb58bd9b6fb3f10f25ebfe1d0595391a,2023-11-07T04:00:53.487000
|
||||||
CVE-2023-0585,0,0,e90d02e3a14ec76a3f74d6f239a409836679ba4da0fdac7466ba614a8fa9d16d,2023-11-07T04:00:53.740000
|
CVE-2023-0585,0,0,e90d02e3a14ec76a3f74d6f239a409836679ba4da0fdac7466ba614a8fa9d16d,2023-11-07T04:00:53.740000
|
||||||
@ -224362,7 +224363,7 @@ CVE-2023-34013,0,0,500f8f8006bcf5c0893b8111c3bad0218a0838aa8f762361a0079a993f68b
|
|||||||
CVE-2023-34015,0,0,8d3ead4f06239d4e652b53ad320e486662a5f6043183f11384bd9be80285d7ee,2023-07-18T14:47:17.697000
|
CVE-2023-34015,0,0,8d3ead4f06239d4e652b53ad320e486662a5f6043183f11384bd9be80285d7ee,2023-07-18T14:47:17.697000
|
||||||
CVE-2023-34017,0,0,c870dbb656b8499b3cf2883461d680862292835cec64c41b6df87e8549c650aa,2023-07-31T18:00:08.770000
|
CVE-2023-34017,0,0,c870dbb656b8499b3cf2883461d680862292835cec64c41b6df87e8549c650aa,2023-07-31T18:00:08.770000
|
||||||
CVE-2023-34018,0,0,8e3d0d9d918bf4729ce0fbb0a52f4bcea31d1b64524ed9bb7ad175834b2e3110,2023-12-06T00:34:10.727000
|
CVE-2023-34018,0,0,8e3d0d9d918bf4729ce0fbb0a52f4bcea31d1b64524ed9bb7ad175834b2e3110,2023-12-06T00:34:10.727000
|
||||||
CVE-2023-34020,0,1,6303b7365b6a78484b12527e5cee1750cfe83ba4c60e2b0cd3cee68978d12260,2024-03-27T15:49:41.437000
|
CVE-2023-34020,0,0,6303b7365b6a78484b12527e5cee1750cfe83ba4c60e2b0cd3cee68978d12260,2024-03-27T15:49:41.437000
|
||||||
CVE-2023-34021,0,0,3a3e2358a671ec1c445afbf616a746a1f517d1449b1bf5492bd59da42a46cff4,2023-06-28T07:24:29.103000
|
CVE-2023-34021,0,0,3a3e2358a671ec1c445afbf616a746a1f517d1449b1bf5492bd59da42a46cff4,2023-06-28T07:24:29.103000
|
||||||
CVE-2023-34022,0,0,17ce84d4577657f691cbf35839eb41895ae44b6198bae31ad30ea35e514fc1f2,2023-09-01T12:28:20.133000
|
CVE-2023-34022,0,0,17ce84d4577657f691cbf35839eb41895ae44b6198bae31ad30ea35e514fc1f2,2023-09-01T12:28:20.133000
|
||||||
CVE-2023-34023,0,0,dda712b30f36d5187a63c35f5fe5aee61d09f88bac602b14d0474a131788a98a,2023-09-01T12:29:56.897000
|
CVE-2023-34023,0,0,dda712b30f36d5187a63c35f5fe5aee61d09f88bac602b14d0474a131788a98a,2023-09-01T12:29:56.897000
|
||||||
@ -227961,7 +227962,7 @@ CVE-2023-39303,0,0,d81a0865c899018b1bf357d592ab28d95ab5876f93fb600c5e62942433b06
|
|||||||
CVE-2023-39306,0,0,6fdea6e755ad3c897f08918d9c1d51ddc69d961346f27f39c6f47d3188ca876e,2024-03-27T12:29:30.307000
|
CVE-2023-39306,0,0,6fdea6e755ad3c897f08918d9c1d51ddc69d961346f27f39c6f47d3188ca876e,2024-03-27T12:29:30.307000
|
||||||
CVE-2023-39307,0,0,7acef3cec93184c51474f9c31e2a1c837088af3bbc58f21a5e50dcf1d40254e9,2024-03-27T12:29:30.307000
|
CVE-2023-39307,0,0,7acef3cec93184c51474f9c31e2a1c837088af3bbc58f21a5e50dcf1d40254e9,2024-03-27T12:29:30.307000
|
||||||
CVE-2023-39308,0,0,0a6368135905c51e4bfc8658e86115693ae2beb292d59faa84b5dcfe3424348f,2023-10-02T19:36:52.837000
|
CVE-2023-39308,0,0,0a6368135905c51e4bfc8658e86115693ae2beb292d59faa84b5dcfe3424348f,2023-10-02T19:36:52.837000
|
||||||
CVE-2023-39311,0,1,439e9e33a3292d2e437c686880384c336acf226575769e1b0c928b9e71ee51ff,2024-03-27T15:49:41.437000
|
CVE-2023-39311,0,0,439e9e33a3292d2e437c686880384c336acf226575769e1b0c928b9e71ee51ff,2024-03-27T15:49:41.437000
|
||||||
CVE-2023-39314,0,0,ea740e75552d6dc1c0cf1f6c4b3f96de5bf219ab1a6cac778aaf3dfb58fa2dc3,2023-08-15T00:14:54.643000
|
CVE-2023-39314,0,0,ea740e75552d6dc1c0cf1f6c4b3f96de5bf219ab1a6cac778aaf3dfb58fa2dc3,2023-08-15T00:14:54.643000
|
||||||
CVE-2023-39316,0,0,bd233c030a147eb3f789ee38efc103e8bf004636997da3293bc77e895bbfe866,2024-01-11T18:05:52.470000
|
CVE-2023-39316,0,0,bd233c030a147eb3f789ee38efc103e8bf004636997da3293bc77e895bbfe866,2024-01-11T18:05:52.470000
|
||||||
CVE-2023-39317,0,0,326a3ff897e3724ba6821d5440b392c61a19aa276b4d83da4c1edff4078ddab6,2024-01-11T18:05:45.287000
|
CVE-2023-39317,0,0,326a3ff897e3724ba6821d5440b392c61a19aa276b4d83da4c1edff4078ddab6,2024-01-11T18:05:45.287000
|
||||||
@ -231466,7 +231467,7 @@ CVE-2023-44995,0,0,2e692294cf4d62dc41e425947f979ee8c21d0e539d91dc7695b1ee7c8fc16
|
|||||||
CVE-2023-44996,0,0,8ad2f639c3253abbde238fd5a9cde75a13aa5bd5fd7ebe20480f9c9b35655ae0,2023-10-14T01:49:41.830000
|
CVE-2023-44996,0,0,8ad2f639c3253abbde238fd5a9cde75a13aa5bd5fd7ebe20480f9c9b35655ae0,2023-10-14T01:49:41.830000
|
||||||
CVE-2023-44997,0,0,81ee87730db4999076f9ba13b533f7ee822bfab430b5bd9758fdc4dc99b355f8,2023-10-16T19:04:19.087000
|
CVE-2023-44997,0,0,81ee87730db4999076f9ba13b533f7ee822bfab430b5bd9758fdc4dc99b355f8,2023-10-16T19:04:19.087000
|
||||||
CVE-2023-44998,0,0,6cc3050d478119a51a717478faad92a6fd89b774c0150f63b5670fdc0d17544a,2023-10-17T18:19:41.770000
|
CVE-2023-44998,0,0,6cc3050d478119a51a717478faad92a6fd89b774c0150f63b5670fdc0d17544a,2023-10-17T18:19:41.770000
|
||||||
CVE-2023-44999,0,1,084ce61dccbe80f3a147cccc676be8764a18056ded4deb616c3d87e37d87862a,2024-03-27T15:49:41.437000
|
CVE-2023-44999,0,0,084ce61dccbe80f3a147cccc676be8764a18056ded4deb616c3d87e37d87862a,2024-03-27T15:49:41.437000
|
||||||
CVE-2023-4500,0,0,1706dc981901fc97569eb9643727c2c6db6e12a4486c14d5471830d688bfe4cc,2023-11-07T04:22:40.307000
|
CVE-2023-4500,0,0,1706dc981901fc97569eb9643727c2c6db6e12a4486c14d5471830d688bfe4cc,2023-11-07T04:22:40.307000
|
||||||
CVE-2023-45001,0,0,7ae6d2a6a50d43f250007cb67a905b12b402783a75b5f34158cdfb57c3adcb31,2023-11-10T04:18:01.923000
|
CVE-2023-45001,0,0,7ae6d2a6a50d43f250007cb67a905b12b402783a75b5f34158cdfb57c3adcb31,2023-11-10T04:18:01.923000
|
||||||
CVE-2023-45003,0,0,e4a647054cefc57f163934c624babd072f49088fb353601c09d173ca854ba7b2,2023-10-20T18:08:51.807000
|
CVE-2023-45003,0,0,e4a647054cefc57f163934c624babd072f49088fb353601c09d173ca854ba7b2,2023-10-20T18:08:51.807000
|
||||||
@ -235294,7 +235295,7 @@ CVE-2023-50951,0,0,ac9a2ba6b69cc6219b314f88f75f8d16d80977a7838c8861bc4cc4a5a90b3
|
|||||||
CVE-2023-50955,0,0,2dac25424bb634048955c93e845cd595a5737c34f7a73119031e8a018fd0e20a,2024-02-22T19:07:27.197000
|
CVE-2023-50955,0,0,2dac25424bb634048955c93e845cd595a5737c34f7a73119031e8a018fd0e20a,2024-02-22T19:07:27.197000
|
||||||
CVE-2023-50957,0,0,a38d290def706a6975d8b2902c3d1f58a6074172158e1685b40a6a512f9caf13,2024-02-15T04:37:53.297000
|
CVE-2023-50957,0,0,a38d290def706a6975d8b2902c3d1f58a6074172158e1685b40a6a512f9caf13,2024-02-15T04:37:53.297000
|
||||||
CVE-2023-5096,0,0,1b0896fcd5a16a2bfc5ce288684748ddee835572b804e4af539b42517b79d371,2023-11-27T22:10:14.173000
|
CVE-2023-5096,0,0,1b0896fcd5a16a2bfc5ce288684748ddee835572b804e4af539b42517b79d371,2023-11-27T22:10:14.173000
|
||||||
CVE-2023-50961,0,1,a9d9b75e02dfcfb3f65c9ff56b43527d188f145358242dce35d298fb3c8bb736,2024-03-27T15:49:51.300000
|
CVE-2023-50961,0,0,a9d9b75e02dfcfb3f65c9ff56b43527d188f145358242dce35d298fb3c8bb736,2024-03-27T15:49:51.300000
|
||||||
CVE-2023-50962,0,0,365daa63183eee3bc8e35da897e2163d0fc458ef66adb39b8eb249f4c8a968ff,2024-02-12T14:31:36.920000
|
CVE-2023-50962,0,0,365daa63183eee3bc8e35da897e2163d0fc458ef66adb39b8eb249f4c8a968ff,2024-02-12T14:31:36.920000
|
||||||
CVE-2023-50963,0,0,f8ab53d3916fdeb747721dbad810b91a4d8cca1f3447b9dedd0b7a0a236caf08,2024-01-24T21:22:22.293000
|
CVE-2023-50963,0,0,f8ab53d3916fdeb747721dbad810b91a4d8cca1f3447b9dedd0b7a0a236caf08,2024-01-24T21:22:22.293000
|
||||||
CVE-2023-50965,0,0,7d1de52a11bce456c4c16ef773b97b5e53898c75617739b3525f486b2a63242b,2023-12-20T20:02:23.497000
|
CVE-2023-50965,0,0,7d1de52a11bce456c4c16ef773b97b5e53898c75617739b3525f486b2a63242b,2023-12-20T20:02:23.497000
|
||||||
@ -235763,7 +235764,7 @@ CVE-2023-51886,0,0,57376d86734d9125cdefeefb78630aac114d6de1902e63e7e68f3a3c286da
|
|||||||
CVE-2023-51887,0,0,5ef2b724fc508a46d98e2525360ceec49832ad8963da68755a3ed1e998657e14,2024-02-05T17:29:49.697000
|
CVE-2023-51887,0,0,5ef2b724fc508a46d98e2525360ceec49832ad8963da68755a3ed1e998657e14,2024-02-05T17:29:49.697000
|
||||||
CVE-2023-51888,0,0,0c26c76fa0194a6bf43f7b0d37b92c45dfae056622dc0b83d9eb4f0ea5ca00ab,2024-02-05T14:11:51.323000
|
CVE-2023-51888,0,0,0c26c76fa0194a6bf43f7b0d37b92c45dfae056622dc0b83d9eb4f0ea5ca00ab,2024-02-05T14:11:51.323000
|
||||||
CVE-2023-51889,0,0,8818124c066a6fc089f0ca349b82501811306f8e10b0be4d7c4755f36976d478,2024-02-05T14:10:48.287000
|
CVE-2023-51889,0,0,8818124c066a6fc089f0ca349b82501811306f8e10b0be4d7c4755f36976d478,2024-02-05T14:10:48.287000
|
||||||
CVE-2023-5189,0,0,c147a09eb43ab25371513a32cca88515adb22676507348ad033296b8f2641894,2023-12-13T10:15:10.110000
|
CVE-2023-5189,0,1,dd34534e185942a0e90badb41c5e213b21a944d47974c8c87a51609f819a599b,2024-03-27T18:15:08.710000
|
||||||
CVE-2023-51890,0,0,781340432dbcfdc8e5dd47cf218a3ee83bd6eb1e3c9d4e385b3f27a1d7a54d20,2024-02-05T13:57:15.610000
|
CVE-2023-51890,0,0,781340432dbcfdc8e5dd47cf218a3ee83bd6eb1e3c9d4e385b3f27a1d7a54d20,2024-02-05T13:57:15.610000
|
||||||
CVE-2023-51892,0,0,83e77db8e71e0f4c493aeecdca7dc8524049c5ad059bc3e1dc3f8c0291c22774,2024-01-26T17:12:58.500000
|
CVE-2023-51892,0,0,83e77db8e71e0f4c493aeecdca7dc8524049c5ad059bc3e1dc3f8c0291c22774,2024-01-26T17:12:58.500000
|
||||||
CVE-2023-5190,0,0,4e5acd0b306f781670b3a54b1d1143953c2740e2d360008f138cc2e5de5de17a,2024-02-20T19:50:53.960000
|
CVE-2023-5190,0,0,4e5acd0b306f781670b3a54b1d1143953c2740e2d360008f138cc2e5de5de17a,2024-02-20T19:50:53.960000
|
||||||
@ -237065,7 +237066,7 @@ CVE-2023-6149,0,0,43627cf55c1dbb5c825fba826743af0296f49d6a8c24065c1a631c49138b39
|
|||||||
CVE-2023-6150,0,0,1ea907d678f48f22ce30b6bad5c8da7daf76b35ef23c59476e04071a5892fe2e,2023-12-05T07:15:10.570000
|
CVE-2023-6150,0,0,1ea907d678f48f22ce30b6bad5c8da7daf76b35ef23c59476e04071a5892fe2e,2023-12-05T07:15:10.570000
|
||||||
CVE-2023-6151,0,0,7559e2f33b50293cab689a38634ef34d917b527790c29a35f6155f6feef60ac3,2023-12-05T07:15:11.207000
|
CVE-2023-6151,0,0,7559e2f33b50293cab689a38634ef34d917b527790c29a35f6155f6feef60ac3,2023-12-05T07:15:11.207000
|
||||||
CVE-2023-6152,0,0,650857fc8203f2c7b3ce096d7962f1ec279cbc9f5ea52dff75397db33e06f18d,2024-02-14T13:59:35.580000
|
CVE-2023-6152,0,0,650857fc8203f2c7b3ce096d7962f1ec279cbc9f5ea52dff75397db33e06f18d,2024-02-14T13:59:35.580000
|
||||||
CVE-2023-6153,0,1,5029d75c8c42e6df7abb880dd03acef9a43af5e3dd820aafdebb873d4b25b2d7,2024-03-27T15:49:51.300000
|
CVE-2023-6153,0,0,5029d75c8c42e6df7abb880dd03acef9a43af5e3dd820aafdebb873d4b25b2d7,2024-03-27T15:49:51.300000
|
||||||
CVE-2023-6155,0,0,3ade3aecef51d941d8061f8d0b14aa2df7731495ef3e1609ad30477044f4d6ff,2024-01-02T20:16:59.773000
|
CVE-2023-6155,0,0,3ade3aecef51d941d8061f8d0b14aa2df7731495ef3e1609ad30477044f4d6ff,2024-01-02T20:16:59.773000
|
||||||
CVE-2023-6156,0,0,d7561fff0656f62c31cf7fed3e16d348c47083d2199659e3634f7ff4096281e1,2023-11-30T21:08:21.483000
|
CVE-2023-6156,0,0,d7561fff0656f62c31cf7fed3e16d348c47083d2199659e3634f7ff4096281e1,2023-11-30T21:08:21.483000
|
||||||
CVE-2023-6157,0,0,19feaf86781e5b84fd59f4c0155ffcd6eb44ba3b8740d1cd952fe7d4823f3848,2023-11-30T21:00:23.003000
|
CVE-2023-6157,0,0,19feaf86781e5b84fd59f4c0155ffcd6eb44ba3b8740d1cd952fe7d4823f3848,2023-11-30T21:00:23.003000
|
||||||
@ -237253,7 +237254,7 @@ CVE-2023-6395,0,0,ac793203a9dc0a042800eca54ed9e135226e7af456816d583effac8dcec849
|
|||||||
CVE-2023-6397,0,0,32328345f587e4af99f4aaa1bcc8b79a52413e2b10103761bed029c881877b7c,2024-02-20T19:50:53.960000
|
CVE-2023-6397,0,0,32328345f587e4af99f4aaa1bcc8b79a52413e2b10103761bed029c881877b7c,2024-02-20T19:50:53.960000
|
||||||
CVE-2023-6398,0,0,6df96db5309a9e573369d025141b91026dcf883d56f38d0728e8a69e9f438402,2024-02-21T10:15:42.770000
|
CVE-2023-6398,0,0,6df96db5309a9e573369d025141b91026dcf883d56f38d0728e8a69e9f438402,2024-02-21T10:15:42.770000
|
||||||
CVE-2023-6399,0,0,891fd568ed116fcad25bf9db62f014842821e1923047c86d46a6c2d8dab27f63,2024-02-21T10:15:42.900000
|
CVE-2023-6399,0,0,891fd568ed116fcad25bf9db62f014842821e1923047c86d46a6c2d8dab27f63,2024-02-21T10:15:42.900000
|
||||||
CVE-2023-6400,0,1,707a8d108ff29e3f5ec9ab008205c7906004d1fc50c2cf7855d902b59313f0e8,2024-03-27T15:49:51.300000
|
CVE-2023-6400,0,0,707a8d108ff29e3f5ec9ab008205c7906004d1fc50c2cf7855d902b59313f0e8,2024-03-27T15:49:51.300000
|
||||||
CVE-2023-6401,0,0,411546d88eebf199d44e9988166ea5b8e6f2b675b6fe8a537c285170b3230267,2024-03-21T02:50:36.180000
|
CVE-2023-6401,0,0,411546d88eebf199d44e9988166ea5b8e6f2b675b6fe8a537c285170b3230267,2024-03-21T02:50:36.180000
|
||||||
CVE-2023-6402,0,0,dd329c4dbc100bff910a0c70a7294dd06e33e9b2468f50cfcaf0604e5c4e1810,2024-03-21T02:50:36.267000
|
CVE-2023-6402,0,0,dd329c4dbc100bff910a0c70a7294dd06e33e9b2468f50cfcaf0604e5c4e1810,2024-03-21T02:50:36.267000
|
||||||
CVE-2023-6407,0,0,fd3b1ec8c2350f5672df571bd288bbd2e9afe054b223cdc538cdef15170f355f,2023-12-18T19:34:53.843000
|
CVE-2023-6407,0,0,fd3b1ec8c2350f5672df571bd288bbd2e9afe054b223cdc538cdef15170f355f,2023-12-18T19:34:53.843000
|
||||||
@ -239048,7 +239049,7 @@ CVE-2024-1535,0,0,c2e452de4f130d0657f2ad52768b1d03d46cb2c5e636f4ca1b10840f9898bd
|
|||||||
CVE-2024-1536,0,0,3680c54e462a2a7edc1fc99438ddf2bbe56f66c6c70a4febe86757b7c0d77832,2024-03-13T18:15:58.530000
|
CVE-2024-1536,0,0,3680c54e462a2a7edc1fc99438ddf2bbe56f66c6c70a4febe86757b7c0d77832,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-1537,0,0,90084d772bcb3ecc6e07d74ed60eae5fe9aea59c6e1713f7863063d24965b57f,2024-03-13T18:15:58.530000
|
CVE-2024-1537,0,0,90084d772bcb3ecc6e07d74ed60eae5fe9aea59c6e1713f7863063d24965b57f,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-1538,0,0,7710e1b546e09312497f0b9c9df24bcccbffd2cbc2e6cf10ad6aac7ce2ffe5db,2024-03-21T12:58:51.093000
|
CVE-2024-1538,0,0,7710e1b546e09312497f0b9c9df24bcccbffd2cbc2e6cf10ad6aac7ce2ffe5db,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-1540,1,1,89cd06ed913bb19437dfd8dce4934b885739e3f5438ab021d31e6f934d45cd8e,2024-03-27T16:15:09.963000
|
CVE-2024-1540,0,1,76005015a825567349150f82c72870d086e465eb518fb8c7a03f9bc7bf9bede1,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-1541,0,0,0b73186deefb215b3bbc0b2b970c4145b3ad229def4c224287b4e5a63ecff82c,2024-03-13T18:15:58.530000
|
CVE-2024-1541,0,0,0b73186deefb215b3bbc0b2b970c4145b3ad229def4c224287b4e5a63ecff82c,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-1546,0,0,d87548555f4c8992ddc193a435b01cbf450a34c4725a832074955ddd5326558a,2024-03-04T09:15:37.650000
|
CVE-2024-1546,0,0,d87548555f4c8992ddc193a435b01cbf450a34c4725a832074955ddd5326558a,2024-03-04T09:15:37.650000
|
||||||
CVE-2024-1547,0,0,fc3de1ace81ccfdd8fbde9e6a6951be522c10c940115407bd01fd7d037e7d770,2024-03-04T09:15:37.740000
|
CVE-2024-1547,0,0,fc3de1ace81ccfdd8fbde9e6a6951be522c10c940115407bd01fd7d037e7d770,2024-03-04T09:15:37.740000
|
||||||
@ -239069,7 +239070,7 @@ CVE-2024-1564,0,0,84875cf797fa64328b336ae33772e46886c72657e3c983b9d184a2a3d50ffd
|
|||||||
CVE-2024-1566,0,0,fae18125d42af6480c1fb49e1e6428a52d2bf4f1074f21a5dfe482b2c8d87086,2024-02-28T14:06:45.783000
|
CVE-2024-1566,0,0,fae18125d42af6480c1fb49e1e6428a52d2bf4f1074f21a5dfe482b2c8d87086,2024-02-28T14:06:45.783000
|
||||||
CVE-2024-1568,0,0,03adf0f94bdba0662cb278cdaa3b54a5cd3ae08b3ef89a1e89169605096fa6c9,2024-02-28T14:06:45.783000
|
CVE-2024-1568,0,0,03adf0f94bdba0662cb278cdaa3b54a5cd3ae08b3ef89a1e89169605096fa6c9,2024-02-28T14:06:45.783000
|
||||||
CVE-2024-1570,0,0,fa96633d08cf4f7a9a083fffefdd325991610013e77e1890328cb3b85d75e300,2024-02-29T13:49:29.390000
|
CVE-2024-1570,0,0,fa96633d08cf4f7a9a083fffefdd325991610013e77e1890328cb3b85d75e300,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-1580,0,0,8ab013089e97147c04c4a5ef6b3954117d4a37f719c6f181dbd352698d2066ba,2024-03-26T00:15:08.497000
|
CVE-2024-1580,0,1,4a10e63fa95d49470234e2661449f906487822e0aeb3a95c53a88e84627958f0,2024-03-27T18:15:09.063000
|
||||||
CVE-2024-1582,0,0,5801086f12a7b25e0a24481309300eacfe3989ff6a37128452730610efa279b1,2024-03-13T12:33:51.697000
|
CVE-2024-1582,0,0,5801086f12a7b25e0a24481309300eacfe3989ff6a37128452730610efa279b1,2024-03-13T12:33:51.697000
|
||||||
CVE-2024-1585,0,0,e91f99f5d286c3afef1058be20d258b7aa9acfdf346cd5b86fd70de17ee7844a,2024-03-13T18:15:58.530000
|
CVE-2024-1585,0,0,e91f99f5d286c3afef1058be20d258b7aa9acfdf346cd5b86fd70de17ee7844a,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-1586,0,0,0f7dcaaedeb3b15eee35c0b1fbce415960454d76b6eae4dff9a3ecfad1011e31,2024-02-29T13:49:29.390000
|
CVE-2024-1586,0,0,0f7dcaaedeb3b15eee35c0b1fbce415960454d76b6eae4dff9a3ecfad1011e31,2024-02-29T13:49:29.390000
|
||||||
@ -239362,13 +239363,18 @@ CVE-2024-20252,0,0,b3e7ab7affd116881816a7adc1b9a82671c5b4da83512a13f8133ebc1b35c
|
|||||||
CVE-2024-20253,0,0,d3a8e74c395d6dc3e7ac6947f74fcfd7abc559db9a2a5673b58b5d97e64fbd4a,2024-02-02T16:15:53.893000
|
CVE-2024-20253,0,0,d3a8e74c395d6dc3e7ac6947f74fcfd7abc559db9a2a5673b58b5d97e64fbd4a,2024-02-02T16:15:53.893000
|
||||||
CVE-2024-20254,0,0,483b1bcc903a1f3fe5774e73017e3920b0d7ed3bc82e804e2d29798a514160f0,2024-02-15T15:54:33.153000
|
CVE-2024-20254,0,0,483b1bcc903a1f3fe5774e73017e3920b0d7ed3bc82e804e2d29798a514160f0,2024-02-15T15:54:33.153000
|
||||||
CVE-2024-20255,0,0,4c8067b6b3b68c94894b4ecd8c182992b7e2d67f936be466104b1472a1d76a79,2024-02-15T15:54:19.960000
|
CVE-2024-20255,0,0,4c8067b6b3b68c94894b4ecd8c182992b7e2d67f936be466104b1472a1d76a79,2024-02-15T15:54:19.960000
|
||||||
|
CVE-2024-20259,1,1,320a14ee14d62aa5d17681a1efe29c443b0cdc7bc00d2121817f310cc495e59d,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-20262,0,0,a40254b410d0784e77864e44354a4b6d276cfd1ed801d8c8cea773abddaa6fdb,2024-03-13T18:15:58.530000
|
CVE-2024-20262,0,0,a40254b410d0784e77864e44354a4b6d276cfd1ed801d8c8cea773abddaa6fdb,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-20263,0,0,eee9d5be1e797577581d307b6debeb0e216dfa8c65e90aa4284e364da06d4b08,2024-02-06T19:23:20.600000
|
CVE-2024-20263,0,0,eee9d5be1e797577581d307b6debeb0e216dfa8c65e90aa4284e364da06d4b08,2024-02-06T19:23:20.600000
|
||||||
|
CVE-2024-20265,1,1,3489362a547286567b228fe9ed8fabd87d542e719de273953f70320b8c723a6a,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-20266,0,0,7107175b332490e839d5721f467b6ded5bb175039dfd7bbdacb90e93b939405e,2024-03-13T18:15:58.530000
|
CVE-2024-20266,0,0,7107175b332490e839d5721f467b6ded5bb175039dfd7bbdacb90e93b939405e,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-20267,0,0,2716a642cdad532c3a4bd75fb20d5fecd6f79884b8ec8ad4d3b70c55b604b9c9,2024-03-04T22:45:43.893000
|
CVE-2024-20267,0,0,2716a642cdad532c3a4bd75fb20d5fecd6f79884b8ec8ad4d3b70c55b604b9c9,2024-03-04T22:45:43.893000
|
||||||
CVE-2024-20270,0,0,e782cd7ba9de695c0ad1c66716422322472732a1f5415c3e41652abc7d8c0edc,2024-02-02T16:15:54.227000
|
CVE-2024-20270,0,0,e782cd7ba9de695c0ad1c66716422322472732a1f5415c3e41652abc7d8c0edc,2024-02-02T16:15:54.227000
|
||||||
|
CVE-2024-20271,1,1,dfae8db584f1048f6a3c2c1977b24965cd6ce960b56141c77d166e3081815ee1,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-20272,0,0,185f140724efe06396f39e49d9628053efc8d5b0f336793319946b145d008ecc,2024-02-02T16:15:54.683000
|
CVE-2024-20272,0,0,185f140724efe06396f39e49d9628053efc8d5b0f336793319946b145d008ecc,2024-02-02T16:15:54.683000
|
||||||
|
CVE-2024-20276,1,1,296a5bdd5467948ab48ce59d6adf71ce96a1b7c0465de9d78357fece032b5e4b,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-20277,0,0,c44de8c225b0707871143fcb06737e334d929dd5a0acde877fcecec9290acbf6,2024-02-02T16:15:54.787000
|
CVE-2024-20277,0,0,c44de8c225b0707871143fcb06737e334d929dd5a0acde877fcecec9290acbf6,2024-02-02T16:15:54.787000
|
||||||
|
CVE-2024-20278,1,1,3422bd62c0dbfc03ee503f488f9025cb4328d1a2c7b9cbaa4588ba28546b6550,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-2028,0,0,5879943042d614ba399bf0758e5dda45ae5ecb9ad367a59e13a5814f1ed688df,2024-03-13T18:15:58.530000
|
CVE-2024-2028,0,0,5879943042d614ba399bf0758e5dda45ae5ecb9ad367a59e13a5814f1ed688df,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-20287,0,0,73801d80b462793a88b2af436ab77ac49555a7cb9634b8a2ccc26dc598e491a1,2024-02-02T16:15:54.887000
|
CVE-2024-20287,0,0,73801d80b462793a88b2af436ab77ac49555a7cb9634b8a2ccc26dc598e491a1,2024-02-02T16:15:54.887000
|
||||||
CVE-2024-20290,0,0,057d5dfa7ca9ea45e2cb423f9faaf6e87f8f428206a3f34ecdd5587406e21147,2024-02-15T15:43:27.240000
|
CVE-2024-20290,0,0,057d5dfa7ca9ea45e2cb423f9faaf6e87f8f428206a3f34ecdd5587406e21147,2024-02-15T15:43:27.240000
|
||||||
@ -239377,17 +239383,28 @@ CVE-2024-20292,0,0,bd2670c9582b587cdf9a7328c2351789f5b8997cab8f7bfcaca92954507c5
|
|||||||
CVE-2024-20294,0,0,1d3a9a3e9164827aaec419fc6a9a7d933913e3a790dc40da7ac082a33393bbf9,2024-02-29T13:49:29.390000
|
CVE-2024-20294,0,0,1d3a9a3e9164827aaec419fc6a9a7d933913e3a790dc40da7ac082a33393bbf9,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-2030,0,0,1279e34f262b0c0064508219ec7b722bb72cd0ff45a7c2dd1c4bd367a96f5a52,2024-03-13T18:15:58.530000
|
CVE-2024-2030,0,0,1279e34f262b0c0064508219ec7b722bb72cd0ff45a7c2dd1c4bd367a96f5a52,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-20301,0,0,5731f674f5ae2bcf96420fc328e70e5146901802d1ab3db25461c019cd20961d,2024-03-07T13:52:27.110000
|
CVE-2024-20301,0,0,5731f674f5ae2bcf96420fc328e70e5146901802d1ab3db25461c019cd20961d,2024-03-07T13:52:27.110000
|
||||||
|
CVE-2024-20303,1,1,e5ac9d50052f4c4c8ef804ccaefc800a16509a09aa16e231d189818adcc2e3c2,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-20305,0,0,ab61a4ab7882e267880cc2c0e6b3ec1ab9c8b4d0dadf3a4832bdf14ae2ae012d,2024-02-15T19:56:38.910000
|
CVE-2024-20305,0,0,ab61a4ab7882e267880cc2c0e6b3ec1ab9c8b4d0dadf3a4832bdf14ae2ae012d,2024-02-15T19:56:38.910000
|
||||||
|
CVE-2024-20306,1,1,7ce4ce882880d6a48a5bc5e41b86d2467b57bc87bd8f78243b3657e3eec48482,2024-03-27T17:48:21.140000
|
||||||
|
CVE-2024-20307,1,1,6e057a049f344ad501317a246d37c6a97da44c74d43554b7afa1d19dde729fe3,2024-03-27T18:15:09.357000
|
||||||
|
CVE-2024-20308,1,1,5982f15762a09863ecfc1c3105619d4c65dd988fdcec0e1b0f62fbfed1430f39,2024-03-27T18:15:09.853000
|
||||||
|
CVE-2024-20309,1,1,e1a5a828e0a9998a91a0f24ce922d605b9c5494ea6372c8e56a89d1b0cae6848,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-2031,0,0,8c1bcd6bbcf916842768e08303dd42fc425614624a1e3216d105b6a1ddb5c8c0,2024-03-13T12:33:51.697000
|
CVE-2024-2031,0,0,8c1bcd6bbcf916842768e08303dd42fc425614624a1e3216d105b6a1ddb5c8c0,2024-03-13T12:33:51.697000
|
||||||
|
CVE-2024-20311,1,1,c693e0e2ebd0ccff4af9c3de016bddd629d8a55f7bab90eb59f830d5f1210bde,2024-03-27T17:48:21.140000
|
||||||
|
CVE-2024-20312,1,1,c48be856a777b8fad526c083b489e4d8d6e24a6434163b12913e7e6d6bd387df,2024-03-27T17:48:21.140000
|
||||||
|
CVE-2024-20314,1,1,25da68acd340edea4119f8cd36c690ff3a322aebd5bc20462f4be9eaaddee7e2,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-20315,0,0,831cd6ed54c2f6f2fd4097d9fc2e0953e1c74073f83cfb1960f6ad1247cec241,2024-03-13T18:15:58.530000
|
CVE-2024-20315,0,0,831cd6ed54c2f6f2fd4097d9fc2e0953e1c74073f83cfb1960f6ad1247cec241,2024-03-13T18:15:58.530000
|
||||||
|
CVE-2024-20316,1,1,0facf79c751f7edbf8bf7eb947aeebd24e08d05d059114eedc01d842bfa7840d,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-20318,0,0,31b265ae70125be15efc925115276ad5f47aba03d611ad31fd59e0405ac987ce,2024-03-13T18:15:58.530000
|
CVE-2024-20318,0,0,31b265ae70125be15efc925115276ad5f47aba03d611ad31fd59e0405ac987ce,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-20319,0,0,fce820c860756da39956bcf24654b4c258181605332ce4ef4670a251a36856dc,2024-03-13T18:15:58.530000
|
CVE-2024-20319,0,0,fce820c860756da39956bcf24654b4c258181605332ce4ef4670a251a36856dc,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-20320,0,0,f414732037b8e5e2b31a0c4322e496ff34c28ecfb3a724091e51a412efa51350,2024-03-13T18:15:58.530000
|
CVE-2024-20320,0,0,f414732037b8e5e2b31a0c4322e496ff34c28ecfb3a724091e51a412efa51350,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-20321,0,0,6de34d7d404f536decd9f5a380e1c4f28760edee84d237a9b02d7c6e56d785b7,2024-03-04T22:45:23.647000
|
CVE-2024-20321,0,0,6de34d7d404f536decd9f5a380e1c4f28760edee84d237a9b02d7c6e56d785b7,2024-03-04T22:45:23.647000
|
||||||
CVE-2024-20322,0,0,2b06b6a28ea98e3be45957586078049ced390e2bbb1013999023329f607687e9,2024-03-13T18:15:58.530000
|
CVE-2024-20322,0,0,2b06b6a28ea98e3be45957586078049ced390e2bbb1013999023329f607687e9,2024-03-13T18:15:58.530000
|
||||||
|
CVE-2024-20324,1,1,4ceb90fa15b34b60a6093578287d94925925781fa75d2c106af71ed06f3f60fb,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-20325,0,0,dfe1f947bf6fc9efa452f1881c4faae47bd9e909bfa416f69baa534db16c5289,2024-02-22T19:07:27.197000
|
CVE-2024-20325,0,0,dfe1f947bf6fc9efa452f1881c4faae47bd9e909bfa416f69baa534db16c5289,2024-02-22T19:07:27.197000
|
||||||
CVE-2024-20327,0,0,99fc6b346e02158b3f4b7079ce29acef1779b3bc5057517cd2f663d4239946c0,2024-03-13T18:15:58.530000
|
CVE-2024-20327,0,0,99fc6b346e02158b3f4b7079ce29acef1779b3bc5057517cd2f663d4239946c0,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-20328,0,0,f336e809226305b79cd50f26fae203aa1632211d86957dd92abacb2f83d51af6,2024-03-01T22:22:25.913000
|
CVE-2024-20328,0,0,f336e809226305b79cd50f26fae203aa1632211d86957dd92abacb2f83d51af6,2024-03-01T22:22:25.913000
|
||||||
|
CVE-2024-20333,1,1,0fc0d9f2bb75be1d1f2fb11cd6f9cf26712193c623a9dcfd720083347398fc6f,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-20335,0,0,e7a578f13e250b46805a1e9177b3b5be279d06874d056b5f6fc5ebbcf99e61d7,2024-03-07T13:52:27.110000
|
CVE-2024-20335,0,0,e7a578f13e250b46805a1e9177b3b5be279d06874d056b5f6fc5ebbcf99e61d7,2024-03-07T13:52:27.110000
|
||||||
CVE-2024-20336,0,0,79e0816d77620de3a577cfb98875db786f37b5ccab0f43d45d78748499d8cbc3,2024-03-07T13:52:27.110000
|
CVE-2024-20336,0,0,79e0816d77620de3a577cfb98875db786f37b5ccab0f43d45d78748499d8cbc3,2024-03-07T13:52:27.110000
|
||||||
CVE-2024-20337,0,0,3b1a37d60fcaa85f947811f983b479d3e4900eee9d9299595cf069082e613c78,2024-03-07T13:52:27.110000
|
CVE-2024-20337,0,0,3b1a37d60fcaa85f947811f983b479d3e4900eee9d9299595cf069082e613c78,2024-03-07T13:52:27.110000
|
||||||
@ -239395,6 +239412,7 @@ CVE-2024-20338,0,0,5566f1b7285f199c07a2500bed0125d8d757cef5cccae1c32214ac0d6cd53
|
|||||||
CVE-2024-20344,0,0,5701c086cd49552fb9b4e42b34522b298fb97269a26ec090e5fb132f538cd956,2024-02-29T13:49:29.390000
|
CVE-2024-20344,0,0,5701c086cd49552fb9b4e42b34522b298fb97269a26ec090e5fb132f538cd956,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-20345,0,0,3d1a51edca02a2407f1ed6f3ffcbd5d09253c77ae2ce2b00247da9ce4f441eef,2024-03-07T13:52:27.110000
|
CVE-2024-20345,0,0,3d1a51edca02a2407f1ed6f3ffcbd5d09253c77ae2ce2b00247da9ce4f441eef,2024-03-07T13:52:27.110000
|
||||||
CVE-2024-20346,0,0,f967daadb6c5a5a55ae179293422d73f8c43ceb443c382f34755b3930e28b331,2024-03-06T21:42:54.697000
|
CVE-2024-20346,0,0,f967daadb6c5a5a55ae179293422d73f8c43ceb443c382f34755b3930e28b331,2024-03-06T21:42:54.697000
|
||||||
|
CVE-2024-20354,1,1,d77b2c2498bd40063174d789072339810259d4fa0e4bc5c8d41a694f11a95e02,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-2042,0,0,f6d54c5204cd94c19a84e1963b44103dc197c946869366cb59a65e7a4114231d,2024-03-17T22:38:29.433000
|
CVE-2024-2042,0,0,f6d54c5204cd94c19a84e1963b44103dc197c946869366cb59a65e7a4114231d,2024-03-17T22:38:29.433000
|
||||||
CVE-2024-2044,0,0,3d73c6b2cc04bd01f48c15467e360d6d6689d47e2b89d6d93430f2c98bfeca1a,2024-03-23T03:15:12.063000
|
CVE-2024-2044,0,0,3d73c6b2cc04bd01f48c15467e360d6d6689d47e2b89d6d93430f2c98bfeca1a,2024-03-23T03:15:12.063000
|
||||||
CVE-2024-2045,0,0,72838b74e2668b744754639ee1018477ba3696de5929605fbc709ccd12df2c15,2024-03-01T14:04:26.010000
|
CVE-2024-2045,0,0,72838b74e2668b744754639ee1018477ba3696de5929605fbc709ccd12df2c15,2024-03-01T14:04:26.010000
|
||||||
@ -240636,6 +240654,8 @@ CVE-2024-23441,0,0,821a9fc4779da9403532f4be71c4c0616cc5f4f7bdd56ecb83e25ef4a979d
|
|||||||
CVE-2024-23446,0,0,250d55c97e03f858281f4b571f5417bd7430f2eb75d812ec1a5460363cd232aa,2024-02-14T20:10:24.323000
|
CVE-2024-23446,0,0,250d55c97e03f858281f4b571f5417bd7430f2eb75d812ec1a5460363cd232aa,2024-02-14T20:10:24.323000
|
||||||
CVE-2024-23447,0,0,d914699914a1032e2f26c2be4fcf7737ff60c4d99dbe7a58145b0312508d8818,2024-02-14T20:02:00.753000
|
CVE-2024-23447,0,0,d914699914a1032e2f26c2be4fcf7737ff60c4d99dbe7a58145b0312508d8818,2024-02-14T20:02:00.753000
|
||||||
CVE-2024-23448,0,0,9b1c1e9aca41646e9bc0b5aea887714df628a3eafb241e1a8858ac207b41bd27,2024-02-15T15:39:14.317000
|
CVE-2024-23448,0,0,9b1c1e9aca41646e9bc0b5aea887714df628a3eafb241e1a8858ac207b41bd27,2024-02-15T15:39:14.317000
|
||||||
|
CVE-2024-23450,1,1,6ff242ba8621158a6fc5bf1e14cebaff80a919a65abf5fe5c94bac3fd2cfef43,2024-03-27T17:48:21.140000
|
||||||
|
CVE-2024-23451,1,1,396a36e96f019a84ce41421d631ed0347d8e4d3267d4975e6f03c5a130a41249,2024-03-27T18:15:10.330000
|
||||||
CVE-2024-23452,0,0,aaa529ca6e03eefd16006bb57cfd95647fc8b44bb3a3176fd8a83e06021cb7e9,2024-02-29T01:44:08.877000
|
CVE-2024-23452,0,0,aaa529ca6e03eefd16006bb57cfd95647fc8b44bb3a3176fd8a83e06021cb7e9,2024-02-29T01:44:08.877000
|
||||||
CVE-2024-23453,0,0,ab3a22284e10fea1933712f86026a2e7792304e1f83321557a4d02140679b266,2024-01-29T22:58:07.777000
|
CVE-2024-23453,0,0,ab3a22284e10fea1933712f86026a2e7792304e1f83321557a4d02140679b266,2024-01-29T22:58:07.777000
|
||||||
CVE-2024-23476,0,0,e3d84cdb88c20fc5ad4183c7e154fd4eb94d6574a64f56328103056889f0fc9e,2024-02-20T20:39:10.033000
|
CVE-2024-23476,0,0,e3d84cdb88c20fc5ad4183c7e154fd4eb94d6574a64f56328103056889f0fc9e,2024-02-20T20:39:10.033000
|
||||||
@ -240655,11 +240675,11 @@ CVE-2024-23506,0,0,1374ac637ee795ef76e472829586ea10162cf799e7f8facdf1ae775daa957
|
|||||||
CVE-2024-23507,0,0,5e40ce7b11a8b26bc0a529a8393436247da9b21902b7ceeec2a950c934f8cd05,2024-02-05T20:42:09.590000
|
CVE-2024-23507,0,0,5e40ce7b11a8b26bc0a529a8393436247da9b21902b7ceeec2a950c934f8cd05,2024-02-05T20:42:09.590000
|
||||||
CVE-2024-23508,0,0,3a5d965b173789f90e04ab11d7235589e66f2e700d9aef01bbadb70d9def40c4,2024-02-05T20:27:29.570000
|
CVE-2024-23508,0,0,3a5d965b173789f90e04ab11d7235589e66f2e700d9aef01bbadb70d9def40c4,2024-02-05T20:27:29.570000
|
||||||
CVE-2024-2351,0,0,db54bad65395196f0c1789f4e2b7b2565491796aeba8bcf50c97119ee330dc9b,2024-03-21T02:52:33.103000
|
CVE-2024-2351,0,0,db54bad65395196f0c1789f4e2b7b2565491796aeba8bcf50c97119ee330dc9b,2024-03-21T02:52:33.103000
|
||||||
CVE-2024-23510,0,1,f7020632d5dbc868e99ae1897d50110782a9a2a4bc20759c8f8985d0284bfe7e,2024-03-27T15:49:41.437000
|
CVE-2024-23510,0,0,f7020632d5dbc868e99ae1897d50110782a9a2a4bc20759c8f8985d0284bfe7e,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-23512,0,0,f774c1ac0cd010afc581062aca17eed5006d65805abf1bdf2daba7cd31140d9b,2024-02-12T14:19:54.330000
|
CVE-2024-23512,0,0,f774c1ac0cd010afc581062aca17eed5006d65805abf1bdf2daba7cd31140d9b,2024-02-12T14:19:54.330000
|
||||||
CVE-2024-23513,0,0,6b5819940e0cbb5eaed45cc3f1856dd03cfd514bc33059a14b7ee124f7e640d4,2024-02-12T14:19:54.330000
|
CVE-2024-23513,0,0,6b5819940e0cbb5eaed45cc3f1856dd03cfd514bc33059a14b7ee124f7e640d4,2024-02-12T14:19:54.330000
|
||||||
CVE-2024-23514,0,0,d7e3c284194c6ceaffde4175d0b48a010f01f7192801918385ee65be56400e43,2024-02-16T13:42:03.290000
|
CVE-2024-23514,0,0,d7e3c284194c6ceaffde4175d0b48a010f01f7192801918385ee65be56400e43,2024-02-16T13:42:03.290000
|
||||||
CVE-2024-23515,0,1,53bf497ae935ccecb307d1bdcdbad5772717f87289795b507399eb475ef84725,2024-03-27T15:49:41.437000
|
CVE-2024-23515,0,0,53bf497ae935ccecb307d1bdcdbad5772717f87289795b507399eb475ef84725,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-23516,0,0,f908beaf0aef3ecf8a8819fae23d2c4559de7dc9d2df85df41316958d107a5e0,2024-02-16T13:41:48.350000
|
CVE-2024-23516,0,0,f908beaf0aef3ecf8a8819fae23d2c4559de7dc9d2df85df41316958d107a5e0,2024-02-16T13:41:48.350000
|
||||||
CVE-2024-23517,0,0,e4bbedbc00468997609a0c9179822a4e7c082017c830cbf85558e35c31daa8f6,2024-02-16T13:41:33.563000
|
CVE-2024-23517,0,0,e4bbedbc00468997609a0c9179822a4e7c082017c830cbf85558e35c31daa8f6,2024-02-16T13:41:33.563000
|
||||||
CVE-2024-23519,0,0,323d9800215ce0c9e36032433bafa6695128989b60bb35cada524fbfda63857e,2024-02-29T13:49:29.390000
|
CVE-2024-23519,0,0,323d9800215ce0c9e36032433bafa6695128989b60bb35cada524fbfda63857e,2024-02-29T13:49:29.390000
|
||||||
@ -242114,8 +242134,8 @@ CVE-2024-26647,0,0,29bdc4340bafd301bcad34511ccc4699e791a96b6f9c94e00888fcdf9decc
|
|||||||
CVE-2024-26648,0,0,28db65aa9bed6961e64f3164f5e2671ea79deb15b882dd8229f6c9a5965d8f38,2024-03-27T12:29:41.530000
|
CVE-2024-26648,0,0,28db65aa9bed6961e64f3164f5e2671ea79deb15b882dd8229f6c9a5965d8f38,2024-03-27T12:29:41.530000
|
||||||
CVE-2024-26649,0,0,86aeb2fae965a4a5332ed6f99e853d97c707f8eddf2b6cb0afb03f1458efaad0,2024-03-27T12:29:41.530000
|
CVE-2024-26649,0,0,86aeb2fae965a4a5332ed6f99e853d97c707f8eddf2b6cb0afb03f1458efaad0,2024-03-27T12:29:41.530000
|
||||||
CVE-2024-26650,0,0,a6462e36b1dd6f69ddd876eed038a048534eb12e06d7671796e4cb5890514076,2024-03-27T12:29:41.530000
|
CVE-2024-26650,0,0,a6462e36b1dd6f69ddd876eed038a048534eb12e06d7671796e4cb5890514076,2024-03-27T12:29:41.530000
|
||||||
CVE-2024-26651,0,1,a2e5e1171fae5cd37adc9c273beac8339c77df92cf6c9b2119d65e36bb3ce0f0,2024-03-27T15:49:41.437000
|
CVE-2024-26651,0,0,a2e5e1171fae5cd37adc9c273beac8339c77df92cf6c9b2119d65e36bb3ce0f0,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-26652,0,1,ccc590b218f45c6bb9fa7fed88041733bb926c9879d519c1ffc1f038a0a8e977,2024-03-27T15:49:41.437000
|
CVE-2024-26652,0,0,ccc590b218f45c6bb9fa7fed88041733bb926c9879d519c1ffc1f038a0a8e977,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-2668,0,0,d8e22e7bb795e8f8d48dc1ea67b8b3706e737c441fdb6e3cdf26dd6015682f9f,2024-03-21T02:52:41.070000
|
CVE-2024-2668,0,0,d8e22e7bb795e8f8d48dc1ea67b8b3706e737c441fdb6e3cdf26dd6015682f9f,2024-03-21T02:52:41.070000
|
||||||
CVE-2024-2669,0,0,4f5a2d5969b59448109cf022193bd2b7c88dc7ffa7ca03caa723fb0f374642a3,2024-03-21T02:52:41.157000
|
CVE-2024-2669,0,0,4f5a2d5969b59448109cf022193bd2b7c88dc7ffa7ca03caa723fb0f374642a3,2024-03-21T02:52:41.157000
|
||||||
CVE-2024-2670,0,0,51102bd696ec0a80433e00190a81242d0892d06afe5affb13dd51bd0c370ce65,2024-03-21T02:52:41.253000
|
CVE-2024-2670,0,0,51102bd696ec0a80433e00190a81242d0892d06afe5affb13dd51bd0c370ce65,2024-03-21T02:52:41.253000
|
||||||
@ -242153,7 +242173,7 @@ CVE-2024-27087,0,0,797d68e52883598465cd96feb0df00e139da26d73f23e4ac2cae928dbfb41
|
|||||||
CVE-2024-27088,0,0,51e0e40780267d1754ef6fc0476358b31f9f3458dd54a6b66fef5c03c4a96208,2024-02-26T22:10:40.463000
|
CVE-2024-27088,0,0,51e0e40780267d1754ef6fc0476358b31f9f3458dd54a6b66fef5c03c4a96208,2024-02-26T22:10:40.463000
|
||||||
CVE-2024-27089,0,0,80888df8a8beb579eb58ecd8e5017bb9d7c0dad21161e687af8e50a608c5d017,2024-02-26T20:19:06.073000
|
CVE-2024-27089,0,0,80888df8a8beb579eb58ecd8e5017bb9d7c0dad21161e687af8e50a608c5d017,2024-02-26T20:19:06.073000
|
||||||
CVE-2024-2709,0,0,05c473f010934bdd2fa56f73920990168cacc8a107825196c2fa48c0e97716de,2024-03-21T12:58:51.093000
|
CVE-2024-2709,0,0,05c473f010934bdd2fa56f73920990168cacc8a107825196c2fa48c0e97716de,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-27091,0,1,6c02da8a41fc8608262d0427db7fdd08eb03b81c66303da6889c1d90b51325a9,2024-03-27T15:49:51.300000
|
CVE-2024-27091,0,0,6c02da8a41fc8608262d0427db7fdd08eb03b81c66303da6889c1d90b51325a9,2024-03-27T15:49:51.300000
|
||||||
CVE-2024-27092,0,0,46c8a65175e30ca99bc1ca448e9739f5a9fd09a26b86761b076001350720e53c,2024-02-29T13:49:29.390000
|
CVE-2024-27092,0,0,46c8a65175e30ca99bc1ca448e9739f5a9fd09a26b86761b076001350720e53c,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-27093,0,0,2adc536c19af535e2a03a5b98ba4818457cc5a617ec41b1d012943c718349d43,2024-02-27T14:20:06.637000
|
CVE-2024-27093,0,0,2adc536c19af535e2a03a5b98ba4818457cc5a617ec41b1d012943c718349d43,2024-02-27T14:20:06.637000
|
||||||
CVE-2024-27094,0,0,5b44307768a1f51c7f559a6b28fd23c9fbc41c848843f808ad0625dfa254064d,2024-03-21T12:58:51.093000
|
CVE-2024-27094,0,0,5b44307768a1f51c7f559a6b28fd23c9fbc41c848843f808ad0625dfa254064d,2024-03-21T12:58:51.093000
|
||||||
@ -242235,7 +242255,7 @@ CVE-2024-2726,0,0,670b2be162ea05000bb5b040a32b1dee9c94eee7d1b48ed8e7d2e78e98ae50
|
|||||||
CVE-2024-27265,0,0,caf2cbef481f9d0206d06f75a38ca052c5291ba0582e91875cea8f52e6d86a34,2024-03-19T16:52:02.767000
|
CVE-2024-27265,0,0,caf2cbef481f9d0206d06f75a38ca052c5291ba0582e91875cea8f52e6d86a34,2024-03-19T16:52:02.767000
|
||||||
CVE-2024-27266,0,0,f3ab0f27c5fbbc81843b4329fa53134d5b91174cad9bacbbc5dbf01cfacc3864,2024-03-19T16:52:35.400000
|
CVE-2024-27266,0,0,f3ab0f27c5fbbc81843b4329fa53134d5b91174cad9bacbbc5dbf01cfacc3864,2024-03-19T16:52:35.400000
|
||||||
CVE-2024-2727,0,0,89ce6b1f6bb0b4eb1c8d237648735f02e0931a62bd13bcc4638eefeb18037510,2024-03-22T15:34:43.663000
|
CVE-2024-2727,0,0,89ce6b1f6bb0b4eb1c8d237648735f02e0931a62bd13bcc4638eefeb18037510,2024-03-22T15:34:43.663000
|
||||||
CVE-2024-27270,0,1,1dd30dbb0e3fca00e54defbdce0f737f2baf29b2c8e90e62b85e02800e0e4451,2024-03-27T15:49:51.300000
|
CVE-2024-27270,0,0,1dd30dbb0e3fca00e54defbdce0f737f2baf29b2c8e90e62b85e02800e0e4451,2024-03-27T15:49:51.300000
|
||||||
CVE-2024-27277,0,0,eb365bab444835328458e82045190ce3a564e0755801fc1f65f8b5d9bbf59bcb,2024-03-21T19:47:03.943000
|
CVE-2024-27277,0,0,eb365bab444835328458e82045190ce3a564e0755801fc1f65f8b5d9bbf59bcb,2024-03-21T19:47:03.943000
|
||||||
CVE-2024-27278,0,0,2ef9546b6eb3a76ad70be700186038d995dd630654759ed72b9b3d10968f6d39,2024-03-06T15:18:08.093000
|
CVE-2024-27278,0,0,2ef9546b6eb3a76ad70be700186038d995dd630654759ed72b9b3d10968f6d39,2024-03-06T15:18:08.093000
|
||||||
CVE-2024-27279,0,0,a0a465925dfcee0f633443a4d3db070f2bf023c10d4135b020d1a0fbe76c5a4b,2024-03-12T12:40:13.500000
|
CVE-2024-27279,0,0,a0a465925dfcee0f633443a4d3db070f2bf023c10d4135b020d1a0fbe76c5a4b,2024-03-12T12:40:13.500000
|
||||||
@ -242678,7 +242698,7 @@ CVE-2024-28753,0,0,73ca850c1b6879daba607bc61d7d16457b56173a47004b8bff799b514a526
|
|||||||
CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3b2c,2024-03-11T01:32:39.697000
|
CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3b2c,2024-03-11T01:32:39.697000
|
||||||
CVE-2024-28756,0,0,25c89ab9b64cbd69060fc1b1f68e4f1c76ee574185097dbf9146fc8b2b315bf5,2024-03-22T12:45:36.130000
|
CVE-2024-28756,0,0,25c89ab9b64cbd69060fc1b1f68e4f1c76ee574185097dbf9146fc8b2b315bf5,2024-03-22T12:45:36.130000
|
||||||
CVE-2024-28757,0,0,6f674e74da8b1d303f1997061736a8f7699c424c20f0aba68e441f140f441071,2024-03-23T03:15:11.920000
|
CVE-2024-28757,0,0,6f674e74da8b1d303f1997061736a8f7699c424c20f0aba68e441f140f441071,2024-03-23T03:15:11.920000
|
||||||
CVE-2024-28784,0,1,2bc1ea2e712d4e90db6a7b931c77b9f29985433c42fe688e3c826f016a685898,2024-03-27T15:49:51.300000
|
CVE-2024-28784,0,0,2bc1ea2e712d4e90db6a7b931c77b9f29985433c42fe688e3c826f016a685898,2024-03-27T15:49:51.300000
|
||||||
CVE-2024-28815,0,0,f9ba7e38674697b7d17d51e7b24c9c896d5b8cd72333d8b6833bda1b0cb49c74,2024-03-27T12:29:30.307000
|
CVE-2024-28815,0,0,f9ba7e38674697b7d17d51e7b24c9c896d5b8cd72333d8b6833bda1b0cb49c74,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000
|
CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000
|
||||||
CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000
|
CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000
|
||||||
@ -242692,8 +242712,8 @@ CVE-2024-28849,0,0,5e73d26630408070b9f2d0554aca63f533ce0044a2d97ed66eab06494ab2b
|
|||||||
CVE-2024-2885,0,0,cf50d0de63046c25a9c06aae6750e831b06cf13de0fd69058b9ce32d2d050ac0,2024-03-27T12:29:30.307000
|
CVE-2024-2885,0,0,cf50d0de63046c25a9c06aae6750e831b06cf13de0fd69058b9ce32d2d050ac0,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-28850,0,0,3f010e48b33d8f74ceb957fab8d6defaf56ad7dc42ab2eb1e3bf15c4cfbd82b3,2024-03-26T12:55:05.010000
|
CVE-2024-28850,0,0,3f010e48b33d8f74ceb957fab8d6defaf56ad7dc42ab2eb1e3bf15c4cfbd82b3,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-28851,0,0,f15187ac52243f1288d6dabed456ab5bd2287b2db60c97a538d0582f4f0ba12d,2024-03-17T22:38:29.433000
|
CVE-2024-28851,0,0,f15187ac52243f1288d6dabed456ab5bd2287b2db60c97a538d0582f4f0ba12d,2024-03-17T22:38:29.433000
|
||||||
CVE-2024-28852,0,1,81477f31a68a79cf239e62d41f0c7941d39269da2e1c0040b745dee79d9f52fb,2024-03-27T15:49:41.437000
|
CVE-2024-28852,0,0,81477f31a68a79cf239e62d41f0c7941d39269da2e1c0040b745dee79d9f52fb,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-28853,0,1,ea120d2b937113b211783fea6e205020383522b3385da9d8677cfced8a49293b,2024-03-27T15:49:41.437000
|
CVE-2024-28853,0,0,ea120d2b937113b211783fea6e205020383522b3385da9d8677cfced8a49293b,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-28854,0,0,8cb03aded6b194ffbf5e93b6a999bfbf01ac8f736343c4fc752b0e38a8bc9f90,2024-03-17T22:38:29.433000
|
CVE-2024-28854,0,0,8cb03aded6b194ffbf5e93b6a999bfbf01ac8f736343c4fc752b0e38a8bc9f90,2024-03-17T22:38:29.433000
|
||||||
CVE-2024-28855,0,0,2384a3330fde47f752f152bfa13a6226cb6b236bb18ff2466f5e886c7d3e893c,2024-03-19T13:26:46
|
CVE-2024-28855,0,0,2384a3330fde47f752f152bfa13a6226cb6b236bb18ff2466f5e886c7d3e893c,2024-03-19T13:26:46
|
||||||
CVE-2024-28859,0,0,2d0407c7b83f2786a493b842ae3fe3ce3f906494adee8b0e0f61c75557fcb17c,2024-03-17T22:38:29.433000
|
CVE-2024-28859,0,0,2d0407c7b83f2786a493b842ae3fe3ce3f906494adee8b0e0f61c75557fcb17c,2024-03-17T22:38:29.433000
|
||||||
@ -242867,56 +242887,56 @@ CVE-2024-29684,0,0,bf20e1eee3419c30e31b5c1e15077ebe4738914779e007adc0a6cf94ae841
|
|||||||
CVE-2024-2971,0,0,898bc718d43d0c390c6d16657d6a8f74b1bed4195ca2be9f6e03b60807e37565,2024-03-27T12:29:30.307000
|
CVE-2024-2971,0,0,898bc718d43d0c390c6d16657d6a8f74b1bed4195ca2be9f6e03b60807e37565,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29732,0,0,3aff958eec55f5cf06538251c792be6423021bd21573f6f2f920d098c9ad37bd,2024-03-21T12:58:51.093000
|
CVE-2024-29732,0,0,3aff958eec55f5cf06538251c792be6423021bd21573f6f2f920d098c9ad37bd,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-29735,0,0,286fbba4f7cb1bbd32eae740efb468430068245735dc6c522579c415dcd44e18,2024-03-27T12:29:41.530000
|
CVE-2024-29735,0,0,286fbba4f7cb1bbd32eae740efb468430068245735dc6c522579c415dcd44e18,2024-03-27T12:29:41.530000
|
||||||
CVE-2024-29758,0,1,850000367bf365fc67358722bd3f49f9e6efe1177fc04e28429703ce7619a3b6,2024-03-27T15:49:41.437000
|
CVE-2024-29758,0,0,850000367bf365fc67358722bd3f49f9e6efe1177fc04e28429703ce7619a3b6,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29759,0,1,604dde57e158ba268d6ad5edd22f6f9ee225a2c65d1a266897bc2dc328d431c0,2024-03-27T15:49:41.437000
|
CVE-2024-29759,0,0,604dde57e158ba268d6ad5edd22f6f9ee225a2c65d1a266897bc2dc328d431c0,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-2976,0,1,0b50db41b4280994d8ba65b62c091178f13c54aa94ca8ab9ef2147cb1970d8ea,2024-03-27T15:49:41.437000
|
CVE-2024-2976,0,0,0b50db41b4280994d8ba65b62c091178f13c54aa94ca8ab9ef2147cb1970d8ea,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29760,0,1,7eb818a3c28c1f97de13ad72a84131f01130ec37e7142cdb428d023e4ce66871,2024-03-27T15:49:41.437000
|
CVE-2024-29760,0,0,7eb818a3c28c1f97de13ad72a84131f01130ec37e7142cdb428d023e4ce66871,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29761,0,1,cc5c3ba7815c601086b652c857d276cd318c49aa89a3c9384e9951044880487b,2024-03-27T15:49:41.437000
|
CVE-2024-29761,0,0,cc5c3ba7815c601086b652c857d276cd318c49aa89a3c9384e9951044880487b,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29762,0,1,aaddd686bc3db71dabf4f7e85f42e6c46b97df4732f38ffb96878045fdd29b25,2024-03-27T15:49:41.437000
|
CVE-2024-29762,0,0,aaddd686bc3db71dabf4f7e85f42e6c46b97df4732f38ffb96878045fdd29b25,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29763,0,1,30323441c62e60ca33f6dd2c29898360453843790bcc6e91d33af1ae4fa17148,2024-03-27T15:49:41.437000
|
CVE-2024-29763,0,0,30323441c62e60ca33f6dd2c29898360453843790bcc6e91d33af1ae4fa17148,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29764,0,1,a7e034992ed1c63536559262a04804a84bd56ff02c9edb940bd6a052423afb08,2024-03-27T15:49:41.437000
|
CVE-2024-29764,0,0,a7e034992ed1c63536559262a04804a84bd56ff02c9edb940bd6a052423afb08,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29765,0,1,98e82fd5fded6cd499e69c0f014328d69598d01afd9585e3714d45b0fbd70415,2024-03-27T15:49:41.437000
|
CVE-2024-29765,0,0,98e82fd5fded6cd499e69c0f014328d69598d01afd9585e3714d45b0fbd70415,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29766,0,1,45c1da4cd021b137fe62f544f1028abb2098662c1dbd6348f454f93491c946b7,2024-03-27T15:49:51.300000
|
CVE-2024-29766,0,0,45c1da4cd021b137fe62f544f1028abb2098662c1dbd6348f454f93491c946b7,2024-03-27T15:49:51.300000
|
||||||
CVE-2024-29767,0,1,3a1e80de1205c2b3c4e911ff057ffa52ee92306bf90fb66835329b42a0a4471c,2024-03-27T15:49:51.300000
|
CVE-2024-29767,0,0,3a1e80de1205c2b3c4e911ff057ffa52ee92306bf90fb66835329b42a0a4471c,2024-03-27T15:49:51.300000
|
||||||
CVE-2024-29768,0,1,d9762da294a1ca22ea7a67aa43fe98efb43232a0a476c14841d2c754ac4a606b,2024-03-27T15:49:51.300000
|
CVE-2024-29768,0,0,d9762da294a1ca22ea7a67aa43fe98efb43232a0a476c14841d2c754ac4a606b,2024-03-27T15:49:51.300000
|
||||||
CVE-2024-29769,0,1,c9ab754c046c255443da858120ac7312f6c44f9137f47bb927c2d35cc00ea50c,2024-03-27T15:49:51.300000
|
CVE-2024-29769,0,0,c9ab754c046c255443da858120ac7312f6c44f9137f47bb927c2d35cc00ea50c,2024-03-27T15:49:51.300000
|
||||||
CVE-2024-2977,0,1,265a8e0885b275ccb8c8a7fb5d6b545c4848fc25e3d153bde1d499f0e11c2444,2024-03-27T15:49:41.437000
|
CVE-2024-2977,0,0,265a8e0885b275ccb8c8a7fb5d6b545c4848fc25e3d153bde1d499f0e11c2444,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29770,0,1,a49737f958ade2e568c6a268defe7fd245f9865b992e740d9c5f4c1b1df7cb94,2024-03-27T15:49:51.300000
|
CVE-2024-29770,0,0,a49737f958ade2e568c6a268defe7fd245f9865b992e740d9c5f4c1b1df7cb94,2024-03-27T15:49:51.300000
|
||||||
CVE-2024-29771,0,1,99eaaf300460484cb14da0ae3234fa8f436a97aa719f6da5c1afc3c68c088288,2024-03-27T15:49:51.300000
|
CVE-2024-29771,0,0,99eaaf300460484cb14da0ae3234fa8f436a97aa719f6da5c1afc3c68c088288,2024-03-27T15:49:51.300000
|
||||||
CVE-2024-29772,0,1,a0fde1848c9f64fbc382c578c7e01c4c0ab620bd0ead0e612d021fe39802b51b,2024-03-27T15:49:51.300000
|
CVE-2024-29772,0,0,a0fde1848c9f64fbc382c578c7e01c4c0ab620bd0ead0e612d021fe39802b51b,2024-03-27T15:49:51.300000
|
||||||
CVE-2024-29773,0,1,acb085aed13af95bb8372ad0588f2261bd14f1251d46b2a953f7e9c206793454,2024-03-27T15:49:41.437000
|
CVE-2024-29773,0,0,acb085aed13af95bb8372ad0588f2261bd14f1251d46b2a953f7e9c206793454,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29774,0,1,ae6539860a62635b04f816c43ef0f8b274e7a885187931e27451e43c4732f9c1,2024-03-27T15:49:51.300000
|
CVE-2024-29774,0,0,ae6539860a62635b04f816c43ef0f8b274e7a885187931e27451e43c4732f9c1,2024-03-27T15:49:51.300000
|
||||||
CVE-2024-29775,0,1,c579fdc00d77d197afe0af16c71be06b98b4f8e7314c1a2e1eb78f6992cd8305,2024-03-27T15:49:41.437000
|
CVE-2024-29775,0,0,c579fdc00d77d197afe0af16c71be06b98b4f8e7314c1a2e1eb78f6992cd8305,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29776,0,1,41c24a7d916a74c4603a3edaaed2be0a1d06a9fb7a65c8c9e2ca59dc51827147,2024-03-27T15:49:41.437000
|
CVE-2024-29776,0,0,41c24a7d916a74c4603a3edaaed2be0a1d06a9fb7a65c8c9e2ca59dc51827147,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29777,0,1,6ca2f9794500ac914681af47788da89b9c80d56e1876cb1f64975d9a66ffb8a4,2024-03-27T15:49:41.437000
|
CVE-2024-29777,0,0,6ca2f9794500ac914681af47788da89b9c80d56e1876cb1f64975d9a66ffb8a4,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-2978,0,1,ccc57f57023ca7268aaa9e33e078721d1b8ed4cc2a9d5fba1402a5ae074e2103,2024-03-27T15:49:41.437000
|
CVE-2024-2978,0,0,ccc57f57023ca7268aaa9e33e078721d1b8ed4cc2a9d5fba1402a5ae074e2103,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29788,0,1,2fb18370a76e5cb12562cdeaf4ac512430afc35aaba20836464a022117314d5a,2024-03-27T15:49:41.437000
|
CVE-2024-29788,0,0,2fb18370a76e5cb12562cdeaf4ac512430afc35aaba20836464a022117314d5a,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29789,0,1,527e862cf3490a2c7f0ebc13eb33a969d581e7c1ad36955ed4d6e199035cdaa6,2024-03-27T15:49:41.437000
|
CVE-2024-29789,0,0,527e862cf3490a2c7f0ebc13eb33a969d581e7c1ad36955ed4d6e199035cdaa6,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-2979,0,1,b48fa5c9d2f47bc4e52ee839def41fa08bbb2e05a711ae00ed5d25891030ebd0,2024-03-27T15:49:41.437000
|
CVE-2024-2979,0,0,b48fa5c9d2f47bc4e52ee839def41fa08bbb2e05a711ae00ed5d25891030ebd0,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29790,0,1,33f7dab8aab944a64462c58246cf3a4aa8b3acf33d35f16594fcf0e9e0e49eec,2024-03-27T15:49:41.437000
|
CVE-2024-29790,0,0,33f7dab8aab944a64462c58246cf3a4aa8b3acf33d35f16594fcf0e9e0e49eec,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29791,0,1,da3ce5323fe0059f87050dffbd1c548157467ea6614ee9f88f6fe2389b7969ef,2024-03-27T15:49:41.437000
|
CVE-2024-29791,0,0,da3ce5323fe0059f87050dffbd1c548157467ea6614ee9f88f6fe2389b7969ef,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29792,0,1,1cc3a43409e151a80fd012c5bec518b61fa90dc58697900f281dd38c77b3dedf,2024-03-27T15:49:41.437000
|
CVE-2024-29792,0,0,1cc3a43409e151a80fd012c5bec518b61fa90dc58697900f281dd38c77b3dedf,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29793,0,1,38990b7403b37a4b172e4b95aaa1873a77115e041022e69af6fe1a71828c57f7,2024-03-27T15:49:41.437000
|
CVE-2024-29793,0,0,38990b7403b37a4b172e4b95aaa1873a77115e041022e69af6fe1a71828c57f7,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29794,0,1,4e1539afb130e7d8b5b602b4774a03d21365dcd87ac0b2851375a396e3a96328,2024-03-27T15:49:41.437000
|
CVE-2024-29794,0,0,4e1539afb130e7d8b5b602b4774a03d21365dcd87ac0b2851375a396e3a96328,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29795,0,1,f1a7c8c32a0c2edb61fe45efb42ecf6718606c318c61e81cc9ede03fc04a89d4,2024-03-27T15:49:41.437000
|
CVE-2024-29795,0,0,f1a7c8c32a0c2edb61fe45efb42ecf6718606c318c61e81cc9ede03fc04a89d4,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29796,0,1,aaa707079b712de4c1539fc5342496e10082d2b15da68bddf8004c4d4177bb76,2024-03-27T15:49:41.437000
|
CVE-2024-29796,0,0,aaa707079b712de4c1539fc5342496e10082d2b15da68bddf8004c4d4177bb76,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29797,0,1,f4d0695be063b4aa93c639c7e7ecc9649ecb1f66cb10856f41ecc87aef7cdf89,2024-03-27T15:49:41.437000
|
CVE-2024-29797,0,0,f4d0695be063b4aa93c639c7e7ecc9649ecb1f66cb10856f41ecc87aef7cdf89,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29798,0,1,e4cde7751e85b2aa0407fc3f0780fe5af2f13da8d8f278ca7bbe875863a7dcbd,2024-03-27T15:49:41.437000
|
CVE-2024-29798,0,0,e4cde7751e85b2aa0407fc3f0780fe5af2f13da8d8f278ca7bbe875863a7dcbd,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29799,0,1,f1281c50846b69e40773fdd85d2ac4c83e1c7a0539df9e80293cfe5915e9fe72,2024-03-27T15:49:41.437000
|
CVE-2024-29799,0,0,f1281c50846b69e40773fdd85d2ac4c83e1c7a0539df9e80293cfe5915e9fe72,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-2980,1,1,f134107d0ff7e395a04515a053eb7eea89201a89938306b64df80e4ed25ab2ae,2024-03-27T15:49:41.437000
|
CVE-2024-2980,0,0,f134107d0ff7e395a04515a053eb7eea89201a89938306b64df80e4ed25ab2ae,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29801,0,1,723ff24a22f5c35bfa87fba17edbd54dc3241a90618f7407842799030e337d3a,2024-03-27T15:49:41.437000
|
CVE-2024-29801,0,0,723ff24a22f5c35bfa87fba17edbd54dc3241a90618f7407842799030e337d3a,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29802,0,1,f0281d2f4c4f7b33e6995f73ab5f2da2dcad47bf02c650232bfa71db30f560d1,2024-03-27T15:49:41.437000
|
CVE-2024-29802,0,0,f0281d2f4c4f7b33e6995f73ab5f2da2dcad47bf02c650232bfa71db30f560d1,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29803,0,1,ec2d6e8b1de4f1b12189eb4f5f1b8889e432d71bec7878f196027a0271541134,2024-03-27T15:49:41.437000
|
CVE-2024-29803,0,0,ec2d6e8b1de4f1b12189eb4f5f1b8889e432d71bec7878f196027a0271541134,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29804,0,1,e1a5eba48948258de92f35b86a197e4e3725bcb26472341e46a5d04fa4f155f9,2024-03-27T15:49:41.437000
|
CVE-2024-29804,0,0,e1a5eba48948258de92f35b86a197e4e3725bcb26472341e46a5d04fa4f155f9,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29805,0,1,bbcea86f7733f810b3280a0692ef470761110b7d55b9f4d7c96e636d1e3103b5,2024-03-27T15:49:41.437000
|
CVE-2024-29805,0,0,bbcea86f7733f810b3280a0692ef470761110b7d55b9f4d7c96e636d1e3103b5,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29806,0,1,1fa0a4d7bcdf174f5850cd4be365ca5b2be71d8963cf745f412aed7bbc2ec06e,2024-03-27T15:49:41.437000
|
CVE-2024-29806,0,0,1fa0a4d7bcdf174f5850cd4be365ca5b2be71d8963cf745f412aed7bbc2ec06e,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29807,0,1,a70ed7c03cde5e433e6ebe101af7f7df5552bde53453625634bd6b408cd95fdb,2024-03-27T15:49:41.437000
|
CVE-2024-29807,0,0,a70ed7c03cde5e433e6ebe101af7f7df5552bde53453625634bd6b408cd95fdb,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29808,0,0,1a083356e9d0f501470cdfed0d1c85987d8c8667e4684d7b2ae73ab2fb9e2d44,2024-03-26T17:09:53.043000
|
CVE-2024-29808,0,0,1a083356e9d0f501470cdfed0d1c85987d8c8667e4684d7b2ae73ab2fb9e2d44,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29809,0,0,21a6514e4479b2af7c07059597ccbdef1cddc762bb223c6efd7d97d6a6cee8d3,2024-03-26T17:09:53.043000
|
CVE-2024-29809,0,0,21a6514e4479b2af7c07059597ccbdef1cddc762bb223c6efd7d97d6a6cee8d3,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-2981,1,1,63fba9d2c68cd2879c505cf8d50b9a3caeb150f5fed9881fb4066302e315473c,2024-03-27T15:49:41.437000
|
CVE-2024-2981,0,0,63fba9d2c68cd2879c505cf8d50b9a3caeb150f5fed9881fb4066302e315473c,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29810,0,0,eff91a2f0d80ceae6d9d4c914195c5a044b82fbe1cafb4a26b6b9c2e1aa693cf,2024-03-26T17:09:53.043000
|
CVE-2024-29810,0,0,eff91a2f0d80ceae6d9d4c914195c5a044b82fbe1cafb4a26b6b9c2e1aa693cf,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29811,0,1,484b9a978cf4458e6a6cd3e1d014b1a9b41a0d8478a1a8ee658320929485e4c5,2024-03-27T15:49:41.437000
|
CVE-2024-29811,0,0,484b9a978cf4458e6a6cd3e1d014b1a9b41a0d8478a1a8ee658320929485e4c5,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29812,0,1,eea488bae5a3bc74c00dca82c435160bacb5f5ae567985445e1e1039cfede973,2024-03-27T15:49:41.437000
|
CVE-2024-29812,0,0,eea488bae5a3bc74c00dca82c435160bacb5f5ae567985445e1e1039cfede973,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29813,0,0,b92c8b4b8dc44fdf902974ed6bdae2df7d58513146055d3aee69855a4f40f773,2024-03-27T12:29:30.307000
|
CVE-2024-29813,0,0,b92c8b4b8dc44fdf902974ed6bdae2df7d58513146055d3aee69855a4f40f773,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29814,0,0,066a243dd0997d380d27eb89de10396940c1484c7e51310d2de950a5d930462b,2024-03-27T12:29:30.307000
|
CVE-2024-29814,0,0,066a243dd0997d380d27eb89de10396940c1484c7e51310d2de950a5d930462b,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29815,0,0,e474045fee5a994704d14c9b91da0090703e8eef80577b15658e4496608af879,2024-03-27T12:29:30.307000
|
CVE-2024-29815,0,0,e474045fee5a994704d14c9b91da0090703e8eef80577b15658e4496608af879,2024-03-27T12:29:30.307000
|
||||||
@ -242924,18 +242944,21 @@ CVE-2024-29816,0,0,26098ad42810abc782a6312323b3749848e728c068871f3a8e562ffd3827f
|
|||||||
CVE-2024-29817,0,0,b9d7d90bcba101b5bf99517f691b068a1efc5e5e388d754e386eca951d336d45,2024-03-27T12:29:30.307000
|
CVE-2024-29817,0,0,b9d7d90bcba101b5bf99517f691b068a1efc5e5e388d754e386eca951d336d45,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29818,0,0,44af120b55fc277e2559e8317cff590953d75564f18e5cdb1a3adef98c7f6fa2,2024-03-27T12:29:30.307000
|
CVE-2024-29818,0,0,44af120b55fc277e2559e8317cff590953d75564f18e5cdb1a3adef98c7f6fa2,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29819,0,0,489085f50dbde78feed33cc0a68fd671c989aac2e872d0b30a126d7fff3447e6,2024-03-27T12:29:30.307000
|
CVE-2024-29819,0,0,489085f50dbde78feed33cc0a68fd671c989aac2e872d0b30a126d7fff3447e6,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-2982,1,1,477f547330f0ab08e6d21faee4dc47be09f9639ddaea8955ea45d08f1c1fd24f,2024-03-27T16:15:10.210000
|
CVE-2024-2982,0,1,dda049ea5d2486c6f2bdb234a1dfc5a467a2381ac2f931408cf9328cd77cd76d,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-29820,0,0,da81473ce6ac9b7a0c8169d0e94b81abe513c85a432f3965c234ec8d7d8b927f,2024-03-27T12:29:30.307000
|
CVE-2024-29820,0,0,da81473ce6ac9b7a0c8169d0e94b81abe513c85a432f3965c234ec8d7d8b927f,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-2983,1,1,3798275594497c10345a0244007437a821bd5cea22741ef9c039b13c5b602bb7,2024-03-27T16:15:10.450000
|
CVE-2024-2983,0,1,873ca2d79b54162cace8ca3da7294f22ebfacbb79289c971b5f392cd577e4689,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-29832,0,0,e21971089d12a8b67bd5dc57f7dea93be0cc79e81378beb3ae2f03d4ff6e4c14,2024-03-26T17:09:53.043000
|
CVE-2024-29832,0,0,e21971089d12a8b67bd5dc57f7dea93be0cc79e81378beb3ae2f03d4ff6e4c14,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29833,0,0,4c9a8c532b47162f5aea1ac06e294c5bbf9e597d7d17a1d16e86b5dc1293a53a,2024-03-26T17:09:53.043000
|
CVE-2024-29833,0,0,4c9a8c532b47162f5aea1ac06e294c5bbf9e597d7d17a1d16e86b5dc1293a53a,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-2984,1,1,82a30415ede29bd42a5fc32bfdc177889cae7d7e274f41d7b410438a4a7a2ef8,2024-03-27T16:15:10.713000
|
CVE-2024-2984,0,1,2d375aee96f2c9f8a84e53391976f555aaa90b5661a5979b39e2ea2d3b374caf,2024-03-27T17:48:21.140000
|
||||||
|
CVE-2024-2985,1,1,d2c440a5fe0f8e92f2900a5671fbef483e2af166b02191dac0aceb0548aa2911,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-29858,0,0,585719d860c91771e96e52d882eed744121f21e899f727afe6b381f4ffbb308d,2024-03-21T12:58:51.093000
|
CVE-2024-29858,0,0,585719d860c91771e96e52d882eed744121f21e899f727afe6b381f4ffbb308d,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-29859,0,0,6ebff5730a73f542ffebf0a56f74146bb69314ac3f95118519ec4b678666f245,2024-03-21T12:58:51.093000
|
CVE-2024-29859,0,0,6ebff5730a73f542ffebf0a56f74146bb69314ac3f95118519ec4b678666f245,2024-03-21T12:58:51.093000
|
||||||
|
CVE-2024-2986,1,1,c77fe7aa4ac5882d2496045c16279acb6d3f21728c12d35e86b894b6435b955d,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-29862,0,0,78f62d6320f790cb50cb5767943bbca91d7f9763b83315a1495201af3fd41026,2024-03-21T12:58:51.093000
|
CVE-2024-29862,0,0,78f62d6320f790cb50cb5767943bbca91d7f9763b83315a1495201af3fd41026,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-29864,0,0,3c9560ffae0fa16acac4cf8327bf4ae3182996a8c684b25430908ed832b73c71,2024-03-21T12:58:51.093000
|
CVE-2024-29864,0,0,3c9560ffae0fa16acac4cf8327bf4ae3182996a8c684b25430908ed832b73c71,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-29865,0,0,e24c5786380c2695525e4e2d9b0d8cb3d2e21b4351c584a8032e8ded5e6f9da9,2024-03-22T15:34:43.663000
|
CVE-2024-29865,0,0,e24c5786380c2695525e4e2d9b0d8cb3d2e21b4351c584a8032e8ded5e6f9da9,2024-03-22T15:34:43.663000
|
||||||
CVE-2024-29866,0,0,d3474a4cb7339082dcfbd889d056a2a906f051d7c933d6576013f44ee70632b2,2024-03-21T15:24:35.093000
|
CVE-2024-29866,0,0,d3474a4cb7339082dcfbd889d056a2a906f051d7c933d6576013f44ee70632b2,2024-03-21T15:24:35.093000
|
||||||
|
CVE-2024-2987,1,1,b4986bea0aba6f48be24f8f454c5e35bb2f698d582004b815160c33ab9e532b1,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-29870,0,0,04eec461d26d3928388aa1ebeda7f3889d70d7fb805b862b11fc37cdb9c73805,2024-03-21T15:24:35.093000
|
CVE-2024-29870,0,0,04eec461d26d3928388aa1ebeda7f3889d70d7fb805b862b11fc37cdb9c73805,2024-03-21T15:24:35.093000
|
||||||
CVE-2024-29871,0,0,e7b820291fe87f3c68126b9e66a3cb2071635a1781039b23d1340b3ec50d7104,2024-03-21T15:24:35.093000
|
CVE-2024-29871,0,0,e7b820291fe87f3c68126b9e66a3cb2071635a1781039b23d1340b3ec50d7104,2024-03-21T15:24:35.093000
|
||||||
CVE-2024-29872,0,0,2ed0e31c2aeb7a79b11a328bd37ec6ac592cb7ae8ad49b21b1fd6587d921da01,2024-03-21T15:24:35.093000
|
CVE-2024-29872,0,0,2ed0e31c2aeb7a79b11a328bd37ec6ac592cb7ae8ad49b21b1fd6587d921da01,2024-03-21T15:24:35.093000
|
||||||
@ -242946,9 +242969,11 @@ CVE-2024-29876,0,0,81e9b92db68fe1869c86668a1e00f2a9ff624f59839df1fbe18d8e987774c
|
|||||||
CVE-2024-29877,0,0,5b6a7271e346dceec62c9141f9ae12b0e5342a31cc26366c653fe20c26c8bc21,2024-03-21T15:24:35.093000
|
CVE-2024-29877,0,0,5b6a7271e346dceec62c9141f9ae12b0e5342a31cc26366c653fe20c26c8bc21,2024-03-21T15:24:35.093000
|
||||||
CVE-2024-29878,0,0,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dda8d,2024-03-21T15:24:35.093000
|
CVE-2024-29878,0,0,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dda8d,2024-03-21T15:24:35.093000
|
||||||
CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000
|
CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000
|
||||||
|
CVE-2024-2988,1,1,44a505017c98ed38c8d5dc5d8e011605d3c9f7895e5eca811eae32b18fc8f7bb,2024-03-27T18:15:10.757000
|
||||||
CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000
|
CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000
|
||||||
CVE-2024-29881,0,0,7eaff78a6eecd508372203508f2ecab97ebc62cfd94b7af6101b5d7b6ca209b2,2024-03-26T17:09:53.043000
|
CVE-2024-29881,0,0,7eaff78a6eecd508372203508f2ecab97ebc62cfd94b7af6101b5d7b6ca209b2,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29883,0,0,2444d321a867d6f4cdf63bf8a1bc6af3b407752f2134c1f64a1d02545242c426,2024-03-26T17:09:53.043000
|
CVE-2024-29883,0,0,2444d321a867d6f4cdf63bf8a1bc6af3b407752f2134c1f64a1d02545242c426,2024-03-26T17:09:53.043000
|
||||||
|
CVE-2024-2989,1,1,28b7dcd865137d9f2b8b08b53206e10e337ffacc5ed400750f6a854bac66dab1,2024-03-27T18:15:11.293000
|
||||||
CVE-2024-29906,0,0,5e6afa8dbe77b2ceaee29629c66d8bdf273caddf4f38f955d682aeefe9beab4c,2024-03-27T12:29:30.307000
|
CVE-2024-29906,0,0,5e6afa8dbe77b2ceaee29629c66d8bdf273caddf4f38f955d682aeefe9beab4c,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29907,0,0,95ebf1e66704307f93559559f18923b10f644f7f3c6486fedede31060b34f004,2024-03-27T12:29:30.307000
|
CVE-2024-29907,0,0,95ebf1e66704307f93559559f18923b10f644f7f3c6486fedede31060b34f004,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29908,0,0,e8d16098eaf081188862f8dc959904187f56568ff6eac559fa0228e1e293cd7d,2024-03-27T12:29:30.307000
|
CVE-2024-29908,0,0,e8d16098eaf081188862f8dc959904187f56568ff6eac559fa0228e1e293cd7d,2024-03-27T12:29:30.307000
|
||||||
@ -242982,6 +243007,8 @@ CVE-2024-29935,0,0,be0415ab39e2424d7707b3e026043937bddf40f9f881b75f312fe4db29a75
|
|||||||
CVE-2024-29936,0,0,a0aa951ea6a61ca1da8503010b43db132d71646708e0e57d95e11fe2a44ec10b,2024-03-27T12:29:30.307000
|
CVE-2024-29936,0,0,a0aa951ea6a61ca1da8503010b43db132d71646708e0e57d95e11fe2a44ec10b,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-29943,0,0,39d573a490fc5d2b219e8af270d3feeff9aa72e4341ddd52f10b0ddfa677f78e,2024-03-22T15:34:43.663000
|
CVE-2024-29943,0,0,39d573a490fc5d2b219e8af270d3feeff9aa72e4341ddd52f10b0ddfa677f78e,2024-03-22T15:34:43.663000
|
||||||
CVE-2024-29944,0,0,4d21f9c7c1ab1ff30cce77b261f7b06b8e28526248b968d986726dab452f24fc,2024-03-25T17:15:51.670000
|
CVE-2024-29944,0,0,4d21f9c7c1ab1ff30cce77b261f7b06b8e28526248b968d986726dab452f24fc,2024-03-25T17:15:51.670000
|
||||||
|
CVE-2024-29945,1,1,97b7c829f41e6375bb757d6df21152ea8c651e9cee7b85bf8ce197c3feb776e6,2024-03-27T17:48:21.140000
|
||||||
|
CVE-2024-29946,1,1,1dcd38a0ed008144b587f71b29e9f0373aec4787ad19668521370ecc593e8a2d,2024-03-27T17:48:21.140000
|
||||||
CVE-2024-30156,0,0,aff0cd27a6d4ebd55e03f44f61cc23ee9163e094843acbac5af736e684ab9391,2024-03-25T01:51:01.223000
|
CVE-2024-30156,0,0,aff0cd27a6d4ebd55e03f44f61cc23ee9163e094843acbac5af736e684ab9391,2024-03-25T01:51:01.223000
|
||||||
CVE-2024-30161,0,0,f6d00094643508d05d1e5626fca4ef83c82ab69ba4696adb329c49eff6d0ab4a,2024-03-25T01:51:01.223000
|
CVE-2024-30161,0,0,f6d00094643508d05d1e5626fca4ef83c82ab69ba4696adb329c49eff6d0ab4a,2024-03-25T01:51:01.223000
|
||||||
CVE-2024-30177,0,0,ce7cec2fca67508ea4a8b86ac0339410ad9c9cb05c2afad1960db626913e7789,2024-03-27T12:29:30.307000
|
CVE-2024-30177,0,0,ce7cec2fca67508ea4a8b86ac0339410ad9c9cb05c2afad1960db626913e7789,2024-03-27T12:29:30.307000
|
||||||
@ -243013,4 +243040,4 @@ CVE-2024-30232,0,0,f91ac1a16b6560e63a231b2b02f73b0e579de91231d5661b2fdb0493e2d31
|
|||||||
CVE-2024-30233,0,0,4c2695d2f3b076c7408bd91fee17c2a607f64636c8c0001f359b0796de1d2054,2024-03-26T17:09:53.043000
|
CVE-2024-30233,0,0,4c2695d2f3b076c7408bd91fee17c2a607f64636c8c0001f359b0796de1d2054,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-30234,0,0,a6be244378f8a1646e756d1cd111fc8fb568601f74deb65508c56b004a03b137,2024-03-26T17:09:53.043000
|
CVE-2024-30234,0,0,a6be244378f8a1646e756d1cd111fc8fb568601f74deb65508c56b004a03b137,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-30235,0,0,ef6f7f84deca979173abd2d122dde5dfb4f5568a80e848e8fa95eae1319c946f,2024-03-26T17:09:53.043000
|
CVE-2024-30235,0,0,ef6f7f84deca979173abd2d122dde5dfb4f5568a80e848e8fa95eae1319c946f,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-30238,0,1,33e85580fdd0a4e3fa2eff1ee3b65f63c015d9c54bc4af4192eb2ee2204281b7,2024-03-27T15:49:41.437000
|
CVE-2024-30238,0,0,33e85580fdd0a4e3fa2eff1ee3b65f63c015d9c54bc4af4192eb2ee2204281b7,2024-03-27T15:49:41.437000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user