mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2024-03-15T03:00:29.596506+00:00
This commit is contained in:
parent
03d6c80f8f
commit
628d5dcdec
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2019-25210",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-03T21:15:49.867",
|
||||
"lastModified": "2024-03-04T13:58:23.447",
|
||||
"lastModified": "2024-03-15T01:15:56.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Cloud Native Computing Foundation (CNCF) Helm through 3.13.3. It displays values of secrets when the --dry-run flag is used. This is a security concern in some use cases, such as a --dry-run call by a CI/CD tool. NOTE: the vendor's position is that this behavior was introduced intentionally, and cannot be removed without breaking backwards compatibility (some users may be relying on these values)."
|
||||
"value": "An issue was discovered in Cloud Native Computing Foundation (CNCF) Helm through 3.13.3. It displays values of secrets when the --dry-run flag is used. This is a security concern in some use cases, such as a --dry-run call by a CI/CD tool. NOTE: the vendor's position is that this behavior was introduced intentionally, and cannot be removed without breaking backwards compatibility (some users may be relying on these values). Also, it is not the Helm Project's responsibility if a user decides to use --dry-run within a CI/CD environment whose output is visible to unauthorized persons."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en Helm de Cloud Native Computing Foundation (CNCF) hasta la versi\u00f3n 3.13.3. Muestra valores de secretos cuando se utiliza el indicador --dry-run. Esto es un problema de seguridad en algunos casos de uso, como una llamada de prueba realizada por una herramienta CI/CD. NOTA: la posici\u00f3n del proveedor es que este comportamiento se introdujo intencionalmente y no se puede eliminar sin romper la compatibilidad con versiones anteriores (algunos usuarios pueden confiar en estos valores)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
@ -16,6 +20,10 @@
|
||||
"url": "https://github.com/helm/helm/issues/7275",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://helm.sh/blog/response-cve-2019-25210/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cncf.io/projects/helm/",
|
||||
"source": "cve@mitre.org"
|
||||
|
63
CVE-2024/CVE-2024-08xx/CVE-2024-0802.json
Normal file
63
CVE-2024/CVE-2024-08xx/CVE-2024-0802.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-0802",
|
||||
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"published": "2024-03-15T01:15:57.703",
|
||||
"lastModified": "2024-03-15T01:15:57.703",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect Pointer Scaling vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to read arbitrary information from a target product or execute malicious code on a target product by sending a specially crafted packet."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-468"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/vu/JVNVU99690199/",
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-14",
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf",
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-08xx/CVE-2024-0803.json
Normal file
63
CVE-2024/CVE-2024-08xx/CVE-2024-0803.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-0803",
|
||||
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"published": "2024-03-15T01:15:57.997",
|
||||
"lastModified": "2024-03-15T01:15:57.997",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Integer Overflow or Wraparound vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/vu/JVNVU99690199/",
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-14",
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf",
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-1622",
|
||||
"sourceIdentifier": "sep@nlnetlabs.nl",
|
||||
"published": "2024-02-26T16:27:52.387",
|
||||
"lastModified": "2024-02-26T16:32:25.577",
|
||||
"lastModified": "2024-03-15T02:15:06.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Due to a mistake in error checking, Routinator will terminate when an incoming RTR connection is reset by the peer too quickly after opening."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Debido a un error en la verificaci\u00f3n de errores, Routinator finalizar\u00e1 cuando el interlocutor restablezca una conexi\u00f3n RTR entrante demasiado r\u00e1pido despu\u00e9s de abrirla."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,6 +51,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K52QRRYBHLP73RAS3CGOPBWYT7EZVP6O/",
|
||||
"source": "sep@nlnetlabs.nl"
|
||||
},
|
||||
{
|
||||
"url": "https://www.nlnetlabs.nl/downloads/routinator/CVE-2024-1622.txt",
|
||||
"source": "sep@nlnetlabs.nl"
|
||||
|
63
CVE-2024/CVE-2024-19xx/CVE-2024-1915.json
Normal file
63
CVE-2024/CVE-2024-19xx/CVE-2024-1915.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-1915",
|
||||
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"published": "2024-03-15T01:15:58.197",
|
||||
"lastModified": "2024-03-15T01:15:58.197",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect Pointer Scaling vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-468"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/vu/JVNVU99690199/",
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-14",
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf",
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-19xx/CVE-2024-1916.json
Normal file
63
CVE-2024/CVE-2024-19xx/CVE-2024-1916.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-1916",
|
||||
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"published": "2024-03-15T01:15:58.390",
|
||||
"lastModified": "2024-03-15T01:15:58.390",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Integer Overflow or Wraparound vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/vu/JVNVU99690199/",
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-14",
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf",
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-19xx/CVE-2024-1917.json
Normal file
63
CVE-2024/CVE-2024-19xx/CVE-2024-1917.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-1917",
|
||||
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"published": "2024-03-15T01:15:58.590",
|
||||
"lastModified": "2024-03-15T01:15:58.590",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Integer Overflow or Wraparound vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/vu/JVNVU99690199/",
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-14",
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf",
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-264xx/CVE-2024-26454.json
Normal file
24
CVE-2024/CVE-2024-264xx/CVE-2024-26454.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-26454",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-15T01:15:58.780",
|
||||
"lastModified": "2024-03-15T01:15:58.780",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Cross Site Scripting vulnerability in Healthcare-Chatbot through 9b7058a can occur via a crafted payload to the email1 or pwd1 parameter in login.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OmRajpurkar/Healthcare-Chatbot/issues/4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://medium.com/%400x0d0x0a/healthcare-chatbot-xss-cve-2024-26454-acf2607bf210",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-265xx/CVE-2024-26540.json
Normal file
20
CVE-2024/CVE-2024-265xx/CVE-2024-26540.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-26540",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-15T01:15:58.833",
|
||||
"lastModified": "2024-03-15T01:15:58.833",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A heap-based buffer overflow in Clmg before 3.3.3 can occur via a crafted file to cimg_library::CImg<unsigned char>::_load_analyze."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/GreycLab/CImg/issues/403",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
README.md
24
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-15T00:55:30.055870+00:00
|
||||
2024-03-15T03:00:29.596506+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-14T23:15:46.230000+00:00
|
||||
2024-03-15T02:15:06.523000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -23,28 +23,34 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2024-03-14T01:00:20.248550+00:00
|
||||
2024-03-15T01:00:20.249894+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
241537
|
||||
241544
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `7`
|
||||
|
||||
* [CVE-2024-1853](CVE-2024/CVE-2024-18xx/CVE-2024-1853.json) (`2024-03-14T23:15:45.057`)
|
||||
* [CVE-2024-26163](CVE-2024/CVE-2024-261xx/CVE-2024-26163.json) (`2024-03-14T23:15:45.813`)
|
||||
* [CVE-2024-26246](CVE-2024/CVE-2024-262xx/CVE-2024-26246.json) (`2024-03-14T23:15:46.230`)
|
||||
* [CVE-2024-0802](CVE-2024/CVE-2024-08xx/CVE-2024-0802.json) (`2024-03-15T01:15:57.703`)
|
||||
* [CVE-2024-0803](CVE-2024/CVE-2024-08xx/CVE-2024-0803.json) (`2024-03-15T01:15:57.997`)
|
||||
* [CVE-2024-1915](CVE-2024/CVE-2024-19xx/CVE-2024-1915.json) (`2024-03-15T01:15:58.197`)
|
||||
* [CVE-2024-1916](CVE-2024/CVE-2024-19xx/CVE-2024-1916.json) (`2024-03-15T01:15:58.390`)
|
||||
* [CVE-2024-1917](CVE-2024/CVE-2024-19xx/CVE-2024-1917.json) (`2024-03-15T01:15:58.590`)
|
||||
* [CVE-2024-26454](CVE-2024/CVE-2024-264xx/CVE-2024-26454.json) (`2024-03-15T01:15:58.780`)
|
||||
* [CVE-2024-26540](CVE-2024/CVE-2024-265xx/CVE-2024-26540.json) (`2024-03-15T01:15:58.833`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
* [CVE-2019-25210](CVE-2019/CVE-2019-252xx/CVE-2019-25210.json) (`2024-03-15T01:15:56.040`)
|
||||
* [CVE-2024-1622](CVE-2024/CVE-2024-16xx/CVE-2024-1622.json) (`2024-03-15T02:15:06.523`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
17
_state.csv
17
_state.csv
@ -138355,7 +138355,7 @@ CVE-2019-2518,0,0,9efef458b1303554e425998695dd03f68df8dae2feff042ca130dc9d08d180
|
||||
CVE-2019-2519,0,0,80cb8a26de2a58d99b181963daed12ecd759858d5d5f05a1d765a0af10d1fcb8,2020-08-24T17:37:01.140000
|
||||
CVE-2019-2520,0,0,ae5d364f342d6d6e11cbfa1103b72fc4c48c965eceb925e0681dc4c71b896617,2020-08-24T17:37:01.140000
|
||||
CVE-2019-2521,0,0,895d3d1e42e6880cb82a0d4fefb4c7b7e8f06c7c8e9ae8e0a5e83fb55980297e,2020-08-24T17:37:01.140000
|
||||
CVE-2019-25210,0,0,ec65011193a3e22e3e2c50dd8439f14bc491651fa04889ebf8a725a164a79dcf,2024-03-04T13:58:23.447000
|
||||
CVE-2019-25210,0,1,b5db022eb7f0833051e708fca9e348bbb145e7b825f3faae0d520e104bb6fcd8,2024-03-15T01:15:56.040000
|
||||
CVE-2019-2522,0,0,ae55dddc2cf216d0836c321fa3f09f9eb54cf6815873c5427c0842a495c7f153,2020-08-24T17:37:01.140000
|
||||
CVE-2019-2523,0,0,2420d5fa367bd9afc8efca036c098c95836d2845178df0523b9e6ef463059e04,2020-08-24T17:37:01.140000
|
||||
CVE-2019-2524,0,0,23ed838788d5538a8e4757f53d25252723d39ac2a7a29dd85ea00493a946f02f,2020-08-24T17:37:01.140000
|
||||
@ -238187,6 +238187,8 @@ CVE-2024-0798,0,0,2f1b0b827ba8873a7b25770613534b3f8d6a0f026296e59c448002f5144077
|
||||
CVE-2024-0799,0,0,565bc32cefccc7b54c8a2a9ae87b575853af295d8bcf02c26770d29b4f9124c3,2024-03-14T12:52:21.763000
|
||||
CVE-2024-0800,0,0,d01951efcbc246e656d94cfc618f67e25f655df800a6a24c24ab44bafa9ef9ed,2024-03-14T12:52:21.763000
|
||||
CVE-2024-0801,0,0,a89dd8886cf81b019461340c433bdec2c4bcb02d2b385117b1316445faec54f0,2024-03-14T12:52:21.763000
|
||||
CVE-2024-0802,1,1,e79832631d2489113a3aef3c721db9649babbb143a5a1bd0bc0d019ce790febe,2024-03-15T01:15:57.703000
|
||||
CVE-2024-0803,1,1,792eb6294b542c54bbb6e5ffc4fd5ada9f64baaa10f545fbcdfcfeb92827eacd,2024-03-15T01:15:57.997000
|
||||
CVE-2024-0804,0,0,70935988ae140dfc2a5adfcb943faf94a39f18e0935f58c282d47a399ed09108,2024-01-29T14:29:25.953000
|
||||
CVE-2024-0805,0,0,479c25c464f6a328d6731c12cfc75b50b35f0f2dec0194359c3aeae6dde0d30d,2024-01-29T14:24:19.087000
|
||||
CVE-2024-0806,0,0,9c93ca7b1341b35e16a22cdbbee1fe7fe1f2eaf26781f684014c115afdc39972,2024-01-29T14:24:48.090000
|
||||
@ -238716,7 +238718,7 @@ CVE-2024-1597,0,0,0788307c80ba77730580ebf7121ded97ea91ea8a6104800552d5fad5d2571f
|
||||
CVE-2024-1608,0,0,9c8b01b69ae5b4c70260d911aff7b2894c96a989ff451b383a0cacb2ffa6ce98,2024-02-20T19:50:53.960000
|
||||
CVE-2024-1618,0,0,d4ed9a7b03a6bc2af34446a7f8522f650b18bcab5c93148fbff943d48943d202,2024-03-12T16:02:33.900000
|
||||
CVE-2024-1619,0,0,3bd1c888593742e1605642ab3506d543678d2b012b17cc6ff867249b1db44054,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1622,0,0,1d222b911973fd9290c478c0e6d945ad0ee78ccc642760873944d3c008edc991,2024-02-26T16:32:25.577000
|
||||
CVE-2024-1622,0,1,3b47981f6d4ce81a3950b5cb0d924fb09a89503a4e8b3b21847c201e61726546,2024-03-15T02:15:06.523000
|
||||
CVE-2024-1623,0,0,74336518ba6901cae439374d392edb30e277a62b6b1e25aec45bf5853748bc8f,2024-03-14T14:21:20.217000
|
||||
CVE-2024-1624,0,0,67ec40e5c3fa09b35ea998f014823e4639ce179ca19a19b5112abed94e17b4a2,2024-03-01T22:22:25.913000
|
||||
CVE-2024-1631,0,0,fc2893d5d84aff0551fae290d2fe3cfb3246f815cc3e85e7be8cb7a443e59ea9,2024-02-22T19:07:37.840000
|
||||
@ -238829,7 +238831,7 @@ CVE-2024-1834,0,0,71484c054cc8716550405a2212257a1bb19512d3ccfc712afddd01b2d896ef
|
||||
CVE-2024-1843,0,0,979d0dff9637d9cab00bf6a14f591ee68b79b4ec3300ebdf02b15cf0e8a60188,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1847,0,0,152f4d845ce8c23980172297d934e8efa3d32af4a304d4db000f4175545dd48b,2024-02-29T13:49:47.277000
|
||||
CVE-2024-1851,0,0,ac07ab34f3e596527407cf2fcb93e785fa1a213045982c8aadd05f9e543a11a5,2024-03-08T14:02:57.420000
|
||||
CVE-2024-1853,1,1,91a30626bb38fc15bd03532e0bb3b2887a7258ef07a1ce45d55ec3d6197d7523,2024-03-14T23:15:45.057000
|
||||
CVE-2024-1853,0,0,91a30626bb38fc15bd03532e0bb3b2887a7258ef07a1ce45d55ec3d6197d7523,2024-03-14T23:15:45.057000
|
||||
CVE-2024-1854,0,0,67720ca675e573934fd73c30069aead563244277f4e5c6d2e86973e2c6bd9b5b,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1859,0,0,c19a8bbad570254357ebcf90235dc1b7204181d3a1a12c804d832963f66d9a08,2024-03-01T14:04:26.010000
|
||||
CVE-2024-1860,0,0,53b7775f88dbda3fc2d4abeb2e913e87a2f0c7e010f7824d10356d98445fd8c8,2024-02-28T14:06:45.783000
|
||||
@ -238865,6 +238867,9 @@ CVE-2024-1907,0,0,674a8f990612fbd789e8b29e4f4db555efa2966321d7535d44b4ff9d82432e
|
||||
CVE-2024-1909,0,0,12e32b499c59433d30e6ac050b3983e16567b85d72e6d218e26a62327a6048b6,2024-02-27T14:19:41.650000
|
||||
CVE-2024-1910,0,0,211f272c3ce02464501561e3549f84db9f1611eadb733262f278463e5a2128b8,2024-02-27T14:19:41.650000
|
||||
CVE-2024-1912,0,0,3c8c0a0238b829a76fd9478bd9956e4a11490ac17d1dddd78b43604a20598ec4,2024-02-27T14:19:41.650000
|
||||
CVE-2024-1915,1,1,d7083ca16f8de0945efb0966939cb8b1f07ba83c7018bdb885192a4e317f48f3,2024-03-15T01:15:58.197000
|
||||
CVE-2024-1916,1,1,1b6c6948a80d8bcabff93ca20b41b809d76dcf5acb93b4865ecb1112a074dfaa,2024-03-15T01:15:58.390000
|
||||
CVE-2024-1917,1,1,92520f8fdbd766a55badd9fc1fb6de18622b15f7a5e36569378ca8a713204b7e,2024-03-15T01:15:58.590000
|
||||
CVE-2024-1918,0,0,1bafa8f12a3e1e89cbdae2d567e58d0f2dd7fa8d62ec65a26fca54b119ab135d,2024-02-29T01:43:56.517000
|
||||
CVE-2024-1919,0,0,72d56d7edb3e5a5021c1ed22bcc46eb2a75ae4941d6cc2cec5dac07191166356,2024-02-29T01:43:56.607000
|
||||
CVE-2024-1920,0,0,609fbe0726b7e3b7b8c9d1e9070e8f3b7491975accc744191b84356320447097,2024-02-29T01:43:56.683000
|
||||
@ -241110,7 +241115,7 @@ CVE-2024-26159,0,0,8db8f42d5662b161251586cebfdfad3ac7119bf59dcefc0ce4412d5330cc4
|
||||
CVE-2024-26160,0,0,fa9ab77966a6520f6fd48a75b259529e6a68bdc5f72bc11ac282a7c57a6be71f,2024-03-12T17:46:17.273000
|
||||
CVE-2024-26161,0,0,179c500caa38708835a1de408543085e57586fd097d7453a1bf1888d48f494e3,2024-03-12T17:46:17.273000
|
||||
CVE-2024-26162,0,0,abe9736aa1712017432f5ac3cb4f9e06d55b8e6b2899e4fcc1a691ec906deb0c,2024-03-12T17:46:17.273000
|
||||
CVE-2024-26163,1,1,6939eef05c0e0bbf4833a6716f364069e87d00f2d004f9fcc842b3a5370a2eb3,2024-03-14T23:15:45.813000
|
||||
CVE-2024-26163,0,0,6939eef05c0e0bbf4833a6716f364069e87d00f2d004f9fcc842b3a5370a2eb3,2024-03-14T23:15:45.813000
|
||||
CVE-2024-26164,0,0,c529ef056d97ddfa055f4dab67a98e2c243b207609d3b8417d59eb6c8893d127,2024-03-12T17:46:17.273000
|
||||
CVE-2024-26165,0,0,63d3dcf1b589358d7ead4e45bd2c42171f291333fcff06cba556b682dcc81435,2024-03-12T17:46:17.273000
|
||||
CVE-2024-26166,0,0,978ab57484f1682cc950150e2b2e40d5b99e83a0da48cc1356ec7b38d0d948ec,2024-03-12T17:46:17.273000
|
||||
@ -241134,7 +241139,7 @@ CVE-2024-26199,0,0,c783249e58f7a34cdbc3a4a74bdf378194f69958b248f8c80379c0377a914
|
||||
CVE-2024-26201,0,0,117ccddc353ed4894703f364acf785dd6a24217537e061ef980d1ca56918f180,2024-03-12T17:46:17.273000
|
||||
CVE-2024-26203,0,0,6110281b9eda03c7d5a8219ec3a2aff67cf54ad90870a79c096fe875f28ea385,2024-03-12T17:46:17.273000
|
||||
CVE-2024-26204,0,0,413dd43bdbc47045478482b7d3349e3e66b0c3197ca627e0b5f71ae7053c6d3e,2024-03-12T17:46:17.273000
|
||||
CVE-2024-26246,1,1,4b4ed0cf0e2600e86bbce86e87526797b278887cddb7df8851ab25d517e80097,2024-03-14T23:15:46.230000
|
||||
CVE-2024-26246,0,0,4b4ed0cf0e2600e86bbce86e87526797b278887cddb7df8851ab25d517e80097,2024-03-14T23:15:46.230000
|
||||
CVE-2024-26260,0,0,e265a50d624e832bed578eaaf671225475ee52a0a641253d8d3fa4cc960d0968,2024-02-15T06:23:39.303000
|
||||
CVE-2024-26261,0,0,0e54368aae0104b528b2c2b10aa27bd070162dbc45df6e809e95785e5efd10d2,2024-02-15T06:23:39.303000
|
||||
CVE-2024-26262,0,0,6d57968ac2564b388ee7eb2f157289b2d34f808f6708bcc9236e1289de720f6f,2024-02-15T06:23:39.303000
|
||||
@ -241182,6 +241187,7 @@ CVE-2024-26351,0,0,61b98d66760f09ba8a0757ca890b9ad836349a62d566c880c0eb8336d14db
|
||||
CVE-2024-26352,0,0,ed876b320273da7c752d57a08640f2d98ce80b026324bdf46d0712ec0097ce54,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26445,0,0,3735cabd04dab3a1baa3e135ef467df65425520025be25bd7cf66dc1b1b0bf61,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26450,0,0,e70e1c7044e1447bb73bfa4a556135e1953f1916a7225089ba5c38735bf8ee34,2024-03-09T08:15:06.120000
|
||||
CVE-2024-26454,1,1,33e2e35e1b1d9bb1914c2dde003f183cd8296e7c928ff04a99d7adb7d73c8804,2024-03-15T01:15:58.780000
|
||||
CVE-2024-26455,0,0,b8d798122eed5fa7dc5e81852b3374f7f4b40339c21e80b998d09e1a756fc71d,2024-02-26T22:10:40.463000
|
||||
CVE-2024-26458,0,0,4b2bac12846011765db5a8d92c99fed71bd0c8fd706ee4d4f4c7e419547c7ad4,2024-02-29T13:49:29.390000
|
||||
CVE-2024-26461,0,0,904046a1bdb8d57e836285398ec79f3a5f035120c749bfa545aeddc73ebaca7d,2024-02-29T13:49:29.390000
|
||||
@ -241209,6 +241215,7 @@ CVE-2024-26492,0,0,223ddadc0c7efe7b0886f487630808be0927541c8864c0a1df96647191c41
|
||||
CVE-2024-26503,0,0,43e68039cc1e1816a5768c80e0b0a77933f2c9a1550bccb4962112c27d165eb1,2024-03-14T22:15:22.550000
|
||||
CVE-2024-26521,0,0,0e3dff2f526dd01b3807e889e548f69877c6fbe716f338bf9b68ff7b3cd2a892,2024-03-12T12:40:13.500000
|
||||
CVE-2024-26529,0,0,ceb7dffe95e5cd49d7bba0e418c1f06e328c8386f0796095312ed90a87d2d1b6,2024-03-13T12:33:51.697000
|
||||
CVE-2024-26540,1,1,e27ba931e3f9dad59642643380776efc64b66a14c2307881b3ffbc14b651063c,2024-03-15T01:15:58.833000
|
||||
CVE-2024-26542,0,0,84bcc676050237f7706e936cd8d9d490aa0a127cdccddbe7afe739c073267e25,2024-02-28T14:06:45.783000
|
||||
CVE-2024-26548,0,0,7b31129407d10e539a4174451b23a0f83a48cdb246d6dd13af61036fdc95df1c,2024-03-01T14:04:26.010000
|
||||
CVE-2024-26559,0,0,3b7b5127dd0e422a83fadfb79310bdd57e4fb71532d47a597a5aa1449637c0ce,2024-02-29T13:49:47.277000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user