Auto-Update: 2024-03-15T03:00:29.596506+00:00

This commit is contained in:
cad-safe-bot 2024-03-15 03:03:18 +00:00
parent 03d6c80f8f
commit 628d5dcdec
11 changed files with 405 additions and 17 deletions

View File

@ -2,12 +2,16 @@
"id": "CVE-2019-25210",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-03T21:15:49.867",
"lastModified": "2024-03-04T13:58:23.447",
"lastModified": "2024-03-15T01:15:56.040",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Cloud Native Computing Foundation (CNCF) Helm through 3.13.3. It displays values of secrets when the --dry-run flag is used. This is a security concern in some use cases, such as a --dry-run call by a CI/CD tool. NOTE: the vendor's position is that this behavior was introduced intentionally, and cannot be removed without breaking backwards compatibility (some users may be relying on these values)."
"value": "An issue was discovered in Cloud Native Computing Foundation (CNCF) Helm through 3.13.3. It displays values of secrets when the --dry-run flag is used. This is a security concern in some use cases, such as a --dry-run call by a CI/CD tool. NOTE: the vendor's position is that this behavior was introduced intentionally, and cannot be removed without breaking backwards compatibility (some users may be relying on these values). Also, it is not the Helm Project's responsibility if a user decides to use --dry-run within a CI/CD environment whose output is visible to unauthorized persons."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en Helm de Cloud Native Computing Foundation (CNCF) hasta la versi\u00f3n 3.13.3. Muestra valores de secretos cuando se utiliza el indicador --dry-run. Esto es un problema de seguridad en algunos casos de uso, como una llamada de prueba realizada por una herramienta CI/CD. NOTA: la posici\u00f3n del proveedor es que este comportamiento se introdujo intencionalmente y no se puede eliminar sin romper la compatibilidad con versiones anteriores (algunos usuarios pueden confiar en estos valores)."
}
],
"metrics": {},
@ -16,6 +20,10 @@
"url": "https://github.com/helm/helm/issues/7275",
"source": "cve@mitre.org"
},
{
"url": "https://helm.sh/blog/response-cve-2019-25210/",
"source": "cve@mitre.org"
},
{
"url": "https://www.cncf.io/projects/helm/",
"source": "cve@mitre.org"

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-0802",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2024-03-15T01:15:57.703",
"lastModified": "2024-03-15T01:15:57.703",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Incorrect Pointer Scaling vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to read arbitrary information from a target product or execute malicious code on a target product by sending a specially crafted packet."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-468"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/vu/JVNVU99690199/",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-14",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
},
{
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-0803",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2024-03-15T01:15:57.997",
"lastModified": "2024-03-15T01:15:57.997",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Integer Overflow or Wraparound vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/vu/JVNVU99690199/",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-14",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
},
{
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-1622",
"sourceIdentifier": "sep@nlnetlabs.nl",
"published": "2024-02-26T16:27:52.387",
"lastModified": "2024-02-26T16:32:25.577",
"lastModified": "2024-03-15T02:15:06.523",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Due to a mistake in error checking, Routinator will terminate when an incoming RTR connection is reset by the peer too quickly after opening."
},
{
"lang": "es",
"value": "Debido a un error en la verificaci\u00f3n de errores, Routinator finalizar\u00e1 cuando el interlocutor restablezca una conexi\u00f3n RTR entrante demasiado r\u00e1pido despu\u00e9s de abrirla."
}
],
"metrics": {
@ -47,6 +51,10 @@
}
],
"references": [
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K52QRRYBHLP73RAS3CGOPBWYT7EZVP6O/",
"source": "sep@nlnetlabs.nl"
},
{
"url": "https://www.nlnetlabs.nl/downloads/routinator/CVE-2024-1622.txt",
"source": "sep@nlnetlabs.nl"

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-1915",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2024-03-15T01:15:58.197",
"lastModified": "2024-03-15T01:15:58.197",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Incorrect Pointer Scaling vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-468"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/vu/JVNVU99690199/",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-14",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
},
{
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-1916",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2024-03-15T01:15:58.390",
"lastModified": "2024-03-15T01:15:58.390",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Integer Overflow or Wraparound vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/vu/JVNVU99690199/",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-14",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
},
{
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-1917",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2024-03-15T01:15:58.590",
"lastModified": "2024-03-15T01:15:58.590",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Integer Overflow or Wraparound vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/vu/JVNVU99690199/",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-14",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
},
{
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-26454",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-15T01:15:58.780",
"lastModified": "2024-03-15T01:15:58.780",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A Cross Site Scripting vulnerability in Healthcare-Chatbot through 9b7058a can occur via a crafted payload to the email1 or pwd1 parameter in login.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/OmRajpurkar/Healthcare-Chatbot/issues/4",
"source": "cve@mitre.org"
},
{
"url": "https://medium.com/%400x0d0x0a/healthcare-chatbot-xss-cve-2024-26454-acf2607bf210",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-26540",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-15T01:15:58.833",
"lastModified": "2024-03-15T01:15:58.833",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A heap-based buffer overflow in Clmg before 3.3.3 can occur via a crafted file to cimg_library::CImg<unsigned char>::_load_analyze."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/GreycLab/CImg/issues/403",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-15T00:55:30.055870+00:00
2024-03-15T03:00:29.596506+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-14T23:15:46.230000+00:00
2024-03-15T02:15:06.523000+00:00
```
### Last Data Feed Release
@ -23,28 +23,34 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2024-03-14T01:00:20.248550+00:00
2024-03-15T01:00:20.249894+00:00
```
### Total Number of included CVEs
```plain
241537
241544
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `7`
* [CVE-2024-1853](CVE-2024/CVE-2024-18xx/CVE-2024-1853.json) (`2024-03-14T23:15:45.057`)
* [CVE-2024-26163](CVE-2024/CVE-2024-261xx/CVE-2024-26163.json) (`2024-03-14T23:15:45.813`)
* [CVE-2024-26246](CVE-2024/CVE-2024-262xx/CVE-2024-26246.json) (`2024-03-14T23:15:46.230`)
* [CVE-2024-0802](CVE-2024/CVE-2024-08xx/CVE-2024-0802.json) (`2024-03-15T01:15:57.703`)
* [CVE-2024-0803](CVE-2024/CVE-2024-08xx/CVE-2024-0803.json) (`2024-03-15T01:15:57.997`)
* [CVE-2024-1915](CVE-2024/CVE-2024-19xx/CVE-2024-1915.json) (`2024-03-15T01:15:58.197`)
* [CVE-2024-1916](CVE-2024/CVE-2024-19xx/CVE-2024-1916.json) (`2024-03-15T01:15:58.390`)
* [CVE-2024-1917](CVE-2024/CVE-2024-19xx/CVE-2024-1917.json) (`2024-03-15T01:15:58.590`)
* [CVE-2024-26454](CVE-2024/CVE-2024-264xx/CVE-2024-26454.json) (`2024-03-15T01:15:58.780`)
* [CVE-2024-26540](CVE-2024/CVE-2024-265xx/CVE-2024-26540.json) (`2024-03-15T01:15:58.833`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `2`
* [CVE-2019-25210](CVE-2019/CVE-2019-252xx/CVE-2019-25210.json) (`2024-03-15T01:15:56.040`)
* [CVE-2024-1622](CVE-2024/CVE-2024-16xx/CVE-2024-1622.json) (`2024-03-15T02:15:06.523`)
## Download and Usage

View File

@ -138355,7 +138355,7 @@ CVE-2019-2518,0,0,9efef458b1303554e425998695dd03f68df8dae2feff042ca130dc9d08d180
CVE-2019-2519,0,0,80cb8a26de2a58d99b181963daed12ecd759858d5d5f05a1d765a0af10d1fcb8,2020-08-24T17:37:01.140000
CVE-2019-2520,0,0,ae5d364f342d6d6e11cbfa1103b72fc4c48c965eceb925e0681dc4c71b896617,2020-08-24T17:37:01.140000
CVE-2019-2521,0,0,895d3d1e42e6880cb82a0d4fefb4c7b7e8f06c7c8e9ae8e0a5e83fb55980297e,2020-08-24T17:37:01.140000
CVE-2019-25210,0,0,ec65011193a3e22e3e2c50dd8439f14bc491651fa04889ebf8a725a164a79dcf,2024-03-04T13:58:23.447000
CVE-2019-25210,0,1,b5db022eb7f0833051e708fca9e348bbb145e7b825f3faae0d520e104bb6fcd8,2024-03-15T01:15:56.040000
CVE-2019-2522,0,0,ae55dddc2cf216d0836c321fa3f09f9eb54cf6815873c5427c0842a495c7f153,2020-08-24T17:37:01.140000
CVE-2019-2523,0,0,2420d5fa367bd9afc8efca036c098c95836d2845178df0523b9e6ef463059e04,2020-08-24T17:37:01.140000
CVE-2019-2524,0,0,23ed838788d5538a8e4757f53d25252723d39ac2a7a29dd85ea00493a946f02f,2020-08-24T17:37:01.140000
@ -238187,6 +238187,8 @@ CVE-2024-0798,0,0,2f1b0b827ba8873a7b25770613534b3f8d6a0f026296e59c448002f5144077
CVE-2024-0799,0,0,565bc32cefccc7b54c8a2a9ae87b575853af295d8bcf02c26770d29b4f9124c3,2024-03-14T12:52:21.763000
CVE-2024-0800,0,0,d01951efcbc246e656d94cfc618f67e25f655df800a6a24c24ab44bafa9ef9ed,2024-03-14T12:52:21.763000
CVE-2024-0801,0,0,a89dd8886cf81b019461340c433bdec2c4bcb02d2b385117b1316445faec54f0,2024-03-14T12:52:21.763000
CVE-2024-0802,1,1,e79832631d2489113a3aef3c721db9649babbb143a5a1bd0bc0d019ce790febe,2024-03-15T01:15:57.703000
CVE-2024-0803,1,1,792eb6294b542c54bbb6e5ffc4fd5ada9f64baaa10f545fbcdfcfeb92827eacd,2024-03-15T01:15:57.997000
CVE-2024-0804,0,0,70935988ae140dfc2a5adfcb943faf94a39f18e0935f58c282d47a399ed09108,2024-01-29T14:29:25.953000
CVE-2024-0805,0,0,479c25c464f6a328d6731c12cfc75b50b35f0f2dec0194359c3aeae6dde0d30d,2024-01-29T14:24:19.087000
CVE-2024-0806,0,0,9c93ca7b1341b35e16a22cdbbee1fe7fe1f2eaf26781f684014c115afdc39972,2024-01-29T14:24:48.090000
@ -238716,7 +238718,7 @@ CVE-2024-1597,0,0,0788307c80ba77730580ebf7121ded97ea91ea8a6104800552d5fad5d2571f
CVE-2024-1608,0,0,9c8b01b69ae5b4c70260d911aff7b2894c96a989ff451b383a0cacb2ffa6ce98,2024-02-20T19:50:53.960000
CVE-2024-1618,0,0,d4ed9a7b03a6bc2af34446a7f8522f650b18bcab5c93148fbff943d48943d202,2024-03-12T16:02:33.900000
CVE-2024-1619,0,0,3bd1c888593742e1605642ab3506d543678d2b012b17cc6ff867249b1db44054,2024-02-29T13:49:29.390000
CVE-2024-1622,0,0,1d222b911973fd9290c478c0e6d945ad0ee78ccc642760873944d3c008edc991,2024-02-26T16:32:25.577000
CVE-2024-1622,0,1,3b47981f6d4ce81a3950b5cb0d924fb09a89503a4e8b3b21847c201e61726546,2024-03-15T02:15:06.523000
CVE-2024-1623,0,0,74336518ba6901cae439374d392edb30e277a62b6b1e25aec45bf5853748bc8f,2024-03-14T14:21:20.217000
CVE-2024-1624,0,0,67ec40e5c3fa09b35ea998f014823e4639ce179ca19a19b5112abed94e17b4a2,2024-03-01T22:22:25.913000
CVE-2024-1631,0,0,fc2893d5d84aff0551fae290d2fe3cfb3246f815cc3e85e7be8cb7a443e59ea9,2024-02-22T19:07:37.840000
@ -238829,7 +238831,7 @@ CVE-2024-1834,0,0,71484c054cc8716550405a2212257a1bb19512d3ccfc712afddd01b2d896ef
CVE-2024-1843,0,0,979d0dff9637d9cab00bf6a14f591ee68b79b4ec3300ebdf02b15cf0e8a60188,2024-03-13T18:15:58.530000
CVE-2024-1847,0,0,152f4d845ce8c23980172297d934e8efa3d32af4a304d4db000f4175545dd48b,2024-02-29T13:49:47.277000
CVE-2024-1851,0,0,ac07ab34f3e596527407cf2fcb93e785fa1a213045982c8aadd05f9e543a11a5,2024-03-08T14:02:57.420000
CVE-2024-1853,1,1,91a30626bb38fc15bd03532e0bb3b2887a7258ef07a1ce45d55ec3d6197d7523,2024-03-14T23:15:45.057000
CVE-2024-1853,0,0,91a30626bb38fc15bd03532e0bb3b2887a7258ef07a1ce45d55ec3d6197d7523,2024-03-14T23:15:45.057000
CVE-2024-1854,0,0,67720ca675e573934fd73c30069aead563244277f4e5c6d2e86973e2c6bd9b5b,2024-03-13T18:15:58.530000
CVE-2024-1859,0,0,c19a8bbad570254357ebcf90235dc1b7204181d3a1a12c804d832963f66d9a08,2024-03-01T14:04:26.010000
CVE-2024-1860,0,0,53b7775f88dbda3fc2d4abeb2e913e87a2f0c7e010f7824d10356d98445fd8c8,2024-02-28T14:06:45.783000
@ -238865,6 +238867,9 @@ CVE-2024-1907,0,0,674a8f990612fbd789e8b29e4f4db555efa2966321d7535d44b4ff9d82432e
CVE-2024-1909,0,0,12e32b499c59433d30e6ac050b3983e16567b85d72e6d218e26a62327a6048b6,2024-02-27T14:19:41.650000
CVE-2024-1910,0,0,211f272c3ce02464501561e3549f84db9f1611eadb733262f278463e5a2128b8,2024-02-27T14:19:41.650000
CVE-2024-1912,0,0,3c8c0a0238b829a76fd9478bd9956e4a11490ac17d1dddd78b43604a20598ec4,2024-02-27T14:19:41.650000
CVE-2024-1915,1,1,d7083ca16f8de0945efb0966939cb8b1f07ba83c7018bdb885192a4e317f48f3,2024-03-15T01:15:58.197000
CVE-2024-1916,1,1,1b6c6948a80d8bcabff93ca20b41b809d76dcf5acb93b4865ecb1112a074dfaa,2024-03-15T01:15:58.390000
CVE-2024-1917,1,1,92520f8fdbd766a55badd9fc1fb6de18622b15f7a5e36569378ca8a713204b7e,2024-03-15T01:15:58.590000
CVE-2024-1918,0,0,1bafa8f12a3e1e89cbdae2d567e58d0f2dd7fa8d62ec65a26fca54b119ab135d,2024-02-29T01:43:56.517000
CVE-2024-1919,0,0,72d56d7edb3e5a5021c1ed22bcc46eb2a75ae4941d6cc2cec5dac07191166356,2024-02-29T01:43:56.607000
CVE-2024-1920,0,0,609fbe0726b7e3b7b8c9d1e9070e8f3b7491975accc744191b84356320447097,2024-02-29T01:43:56.683000
@ -241110,7 +241115,7 @@ CVE-2024-26159,0,0,8db8f42d5662b161251586cebfdfad3ac7119bf59dcefc0ce4412d5330cc4
CVE-2024-26160,0,0,fa9ab77966a6520f6fd48a75b259529e6a68bdc5f72bc11ac282a7c57a6be71f,2024-03-12T17:46:17.273000
CVE-2024-26161,0,0,179c500caa38708835a1de408543085e57586fd097d7453a1bf1888d48f494e3,2024-03-12T17:46:17.273000
CVE-2024-26162,0,0,abe9736aa1712017432f5ac3cb4f9e06d55b8e6b2899e4fcc1a691ec906deb0c,2024-03-12T17:46:17.273000
CVE-2024-26163,1,1,6939eef05c0e0bbf4833a6716f364069e87d00f2d004f9fcc842b3a5370a2eb3,2024-03-14T23:15:45.813000
CVE-2024-26163,0,0,6939eef05c0e0bbf4833a6716f364069e87d00f2d004f9fcc842b3a5370a2eb3,2024-03-14T23:15:45.813000
CVE-2024-26164,0,0,c529ef056d97ddfa055f4dab67a98e2c243b207609d3b8417d59eb6c8893d127,2024-03-12T17:46:17.273000
CVE-2024-26165,0,0,63d3dcf1b589358d7ead4e45bd2c42171f291333fcff06cba556b682dcc81435,2024-03-12T17:46:17.273000
CVE-2024-26166,0,0,978ab57484f1682cc950150e2b2e40d5b99e83a0da48cc1356ec7b38d0d948ec,2024-03-12T17:46:17.273000
@ -241134,7 +241139,7 @@ CVE-2024-26199,0,0,c783249e58f7a34cdbc3a4a74bdf378194f69958b248f8c80379c0377a914
CVE-2024-26201,0,0,117ccddc353ed4894703f364acf785dd6a24217537e061ef980d1ca56918f180,2024-03-12T17:46:17.273000
CVE-2024-26203,0,0,6110281b9eda03c7d5a8219ec3a2aff67cf54ad90870a79c096fe875f28ea385,2024-03-12T17:46:17.273000
CVE-2024-26204,0,0,413dd43bdbc47045478482b7d3349e3e66b0c3197ca627e0b5f71ae7053c6d3e,2024-03-12T17:46:17.273000
CVE-2024-26246,1,1,4b4ed0cf0e2600e86bbce86e87526797b278887cddb7df8851ab25d517e80097,2024-03-14T23:15:46.230000
CVE-2024-26246,0,0,4b4ed0cf0e2600e86bbce86e87526797b278887cddb7df8851ab25d517e80097,2024-03-14T23:15:46.230000
CVE-2024-26260,0,0,e265a50d624e832bed578eaaf671225475ee52a0a641253d8d3fa4cc960d0968,2024-02-15T06:23:39.303000
CVE-2024-26261,0,0,0e54368aae0104b528b2c2b10aa27bd070162dbc45df6e809e95785e5efd10d2,2024-02-15T06:23:39.303000
CVE-2024-26262,0,0,6d57968ac2564b388ee7eb2f157289b2d34f808f6708bcc9236e1289de720f6f,2024-02-15T06:23:39.303000
@ -241182,6 +241187,7 @@ CVE-2024-26351,0,0,61b98d66760f09ba8a0757ca890b9ad836349a62d566c880c0eb8336d14db
CVE-2024-26352,0,0,ed876b320273da7c752d57a08640f2d98ce80b026324bdf46d0712ec0097ce54,2024-02-22T19:07:27.197000
CVE-2024-26445,0,0,3735cabd04dab3a1baa3e135ef467df65425520025be25bd7cf66dc1b1b0bf61,2024-02-22T19:07:27.197000
CVE-2024-26450,0,0,e70e1c7044e1447bb73bfa4a556135e1953f1916a7225089ba5c38735bf8ee34,2024-03-09T08:15:06.120000
CVE-2024-26454,1,1,33e2e35e1b1d9bb1914c2dde003f183cd8296e7c928ff04a99d7adb7d73c8804,2024-03-15T01:15:58.780000
CVE-2024-26455,0,0,b8d798122eed5fa7dc5e81852b3374f7f4b40339c21e80b998d09e1a756fc71d,2024-02-26T22:10:40.463000
CVE-2024-26458,0,0,4b2bac12846011765db5a8d92c99fed71bd0c8fd706ee4d4f4c7e419547c7ad4,2024-02-29T13:49:29.390000
CVE-2024-26461,0,0,904046a1bdb8d57e836285398ec79f3a5f035120c749bfa545aeddc73ebaca7d,2024-02-29T13:49:29.390000
@ -241209,6 +241215,7 @@ CVE-2024-26492,0,0,223ddadc0c7efe7b0886f487630808be0927541c8864c0a1df96647191c41
CVE-2024-26503,0,0,43e68039cc1e1816a5768c80e0b0a77933f2c9a1550bccb4962112c27d165eb1,2024-03-14T22:15:22.550000
CVE-2024-26521,0,0,0e3dff2f526dd01b3807e889e548f69877c6fbe716f338bf9b68ff7b3cd2a892,2024-03-12T12:40:13.500000
CVE-2024-26529,0,0,ceb7dffe95e5cd49d7bba0e418c1f06e328c8386f0796095312ed90a87d2d1b6,2024-03-13T12:33:51.697000
CVE-2024-26540,1,1,e27ba931e3f9dad59642643380776efc64b66a14c2307881b3ffbc14b651063c,2024-03-15T01:15:58.833000
CVE-2024-26542,0,0,84bcc676050237f7706e936cd8d9d490aa0a127cdccddbe7afe739c073267e25,2024-02-28T14:06:45.783000
CVE-2024-26548,0,0,7b31129407d10e539a4174451b23a0f83a48cdb246d6dd13af61036fdc95df1c,2024-03-01T14:04:26.010000
CVE-2024-26559,0,0,3b7b5127dd0e422a83fadfb79310bdd57e4fb71532d47a597a5aa1449637c0ce,2024-02-29T13:49:47.277000

Can't render this file because it is too large.