mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-03-14T11:00:43.303062+00:00
This commit is contained in:
parent
7e486fced0
commit
8402de0a4b
55
CVE-2024/CVE-2024-03xx/CVE-2024-0311.json
Normal file
55
CVE-2024/CVE-2024-03xx/CVE-2024-0311.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-0311",
|
||||
"sourceIdentifier": "trellixpsirt@trellix.com",
|
||||
"published": "2024-03-14T09:15:46.580",
|
||||
"lastModified": "2024-03-14T09:15:46.580",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A malicious insider can bypass the existing policy of Skyhigh Client Proxy without a valid release code."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "trellixpsirt@trellix.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "trellixpsirt@trellix.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-622"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://kcm.trellix.com/corporate/index?page=content&id=SB10418",
|
||||
"source": "trellixpsirt@trellix.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-03xx/CVE-2024-0312.json
Normal file
55
CVE-2024/CVE-2024-03xx/CVE-2024-0312.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-0312",
|
||||
"sourceIdentifier": "trellixpsirt@trellix.com",
|
||||
"published": "2024-03-14T09:15:46.943",
|
||||
"lastModified": "2024-03-14T09:15:46.943",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A malicious insider can uninstall Skyhigh Client Proxy without a valid uninstall password."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "trellixpsirt@trellix.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "trellixpsirt@trellix.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-622"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://kcm.trellix.com/corporate/index?page=content&id=SB10418",
|
||||
"source": "trellixpsirt@trellix.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-03xx/CVE-2024-0313.json
Normal file
55
CVE-2024/CVE-2024-03xx/CVE-2024-0313.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-0313",
|
||||
"sourceIdentifier": "trellixpsirt@trellix.com",
|
||||
"published": "2024-03-14T09:15:47.153",
|
||||
"lastModified": "2024-03-14T09:15:47.153",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A malicious insider exploiting this vulnerability can circumvent existing security controls put in place by the organization. On the contrary, if the victim is legitimately using the temporary bypass to reach out to the Internet for retrieving application and system updates, a remote device could target it and undo the bypass, thereby denying the victim access to the update service, causing it to fail. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "trellixpsirt@trellix.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "trellixpsirt@trellix.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-670"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://kcm.trellix.com/corporate/index?page=content&id=SB10418",
|
||||
"source": "trellixpsirt@trellix.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-2247",
|
||||
"sourceIdentifier": "reefs@jfrog.com",
|
||||
"published": "2024-03-13T14:15:07.870",
|
||||
"lastModified": "2024-03-13T14:28:45.217",
|
||||
"lastModified": "2024-03-14T10:15:07.027",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "JFrog Artifactory versions below 7.77.7, are vulnerable to DOM-based cross-site scripting due to improper handling of the import override mechanism."
|
||||
"value": "JFrog Artifactory versions below 7.77.7, 7.82.1, are vulnerable to DOM-based cross-site scripting due to improper handling of the import override mechanism."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
15
CVE-2024/CVE-2024-24xx/CVE-2024-2437.json
Normal file
15
CVE-2024/CVE-2024-24xx/CVE-2024-2437.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2024-2437",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-14T09:15:47.690",
|
||||
"lastModified": "2024-03-14T09:15:47.690",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-41728. Reason: This candidate is a reservation duplicate of CVE-2023-41728. Notes: All CVE users should reference CVE-2023-41728 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
15
CVE-2024/CVE-2024-24xx/CVE-2024-2438.json
Normal file
15
CVE-2024/CVE-2024-24xx/CVE-2024-2438.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2024-2438",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-14T09:15:47.820",
|
||||
"lastModified": "2024-03-14T09:15:47.820",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-47851. Reason: This candidate is a reservation duplicate of CVE-2023-47851. Notes: All CVE users should reference CVE-2023-47851 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
55
CVE-2024/CVE-2024-279xx/CVE-2024-27986.json
Normal file
55
CVE-2024/CVE-2024-279xx/CVE-2024-27986.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-27986",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-14T09:15:47.363",
|
||||
"lastModified": "2024-03-14T09:15:47.363",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Livemesh Elementor Addons by Livemesh allows Stored XSS.This issue affects Elementor Addons by Livemesh: from n/a through 8.3.5.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/addons-for-elementor/wordpress-elementor-addons-by-livemesh-plugin-8-3-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2024/CVE-2024-287xx/CVE-2024-28746.json
Normal file
36
CVE-2024/CVE-2024-287xx/CVE-2024-28746.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-28746",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-03-14T09:15:47.577",
|
||||
"lastModified": "2024-03-14T09:15:47.577",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Apache Airflow, versions 2.8.0 through 2.8.2, has a vulnerability that allows an authenticated user with limited permissions to access resources such as variables, connections, etc from the UI which they do not have permission to access.\u00a0\n\nUsers of Apache Airflow are recommended to upgrade to version 2.8.3 or newer to mitigate the risk associated with this vulnerability\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-281"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/apache/airflow/pull/37881",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/b4pffc7w7do6qgk4jjbyxvdz5odrvny7",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
34
README.md
34
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-14T05:00:37.756523+00:00
|
||||
2024-03-14T11:00:43.303062+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-14T04:15:09.697000+00:00
|
||||
2024-03-14T10:15:07.027000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,37 +29,27 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
241486
|
||||
241493
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `17`
|
||||
Recently added CVEs: `7`
|
||||
|
||||
* [CVE-2024-1221](CVE-2024/CVE-2024-12xx/CVE-2024-1221.json) (`2024-03-14T03:15:06.607`)
|
||||
* [CVE-2024-1222](CVE-2024/CVE-2024-12xx/CVE-2024-1222.json) (`2024-03-14T03:15:07.090`)
|
||||
* [CVE-2024-1223](CVE-2024/CVE-2024-12xx/CVE-2024-1223.json) (`2024-03-14T03:15:07.580`)
|
||||
* [CVE-2024-1654](CVE-2024/CVE-2024-16xx/CVE-2024-1654.json) (`2024-03-14T03:15:08.033`)
|
||||
* [CVE-2024-1882](CVE-2024/CVE-2024-18xx/CVE-2024-1882.json) (`2024-03-14T04:15:08.003`)
|
||||
* [CVE-2024-1883](CVE-2024/CVE-2024-18xx/CVE-2024-1883.json) (`2024-03-14T04:15:08.353`)
|
||||
* [CVE-2024-1884](CVE-2024/CVE-2024-18xx/CVE-2024-1884.json) (`2024-03-14T04:15:08.697`)
|
||||
* [CVE-2024-22396](CVE-2024/CVE-2024-223xx/CVE-2024-22396.json) (`2024-03-14T04:15:09.080`)
|
||||
* [CVE-2024-22397](CVE-2024/CVE-2024-223xx/CVE-2024-22397.json) (`2024-03-14T04:15:09.297`)
|
||||
* [CVE-2024-22398](CVE-2024/CVE-2024-223xx/CVE-2024-22398.json) (`2024-03-14T04:15:09.417`)
|
||||
* [CVE-2024-25649](CVE-2024/CVE-2024-256xx/CVE-2024-25649.json) (`2024-03-14T03:15:08.540`)
|
||||
* [CVE-2024-25651](CVE-2024/CVE-2024-256xx/CVE-2024-25651.json) (`2024-03-14T03:15:08.727`)
|
||||
* [CVE-2024-25652](CVE-2024/CVE-2024-256xx/CVE-2024-25652.json) (`2024-03-14T03:15:08.877`)
|
||||
* [CVE-2024-25653](CVE-2024/CVE-2024-256xx/CVE-2024-25653.json) (`2024-03-14T03:15:09.017`)
|
||||
* [CVE-2024-28388](CVE-2024/CVE-2024-283xx/CVE-2024-28388.json) (`2024-03-14T03:15:09.173`)
|
||||
* [CVE-2024-28390](CVE-2024/CVE-2024-283xx/CVE-2024-28390.json) (`2024-03-14T04:15:09.640`)
|
||||
* [CVE-2024-28391](CVE-2024/CVE-2024-283xx/CVE-2024-28391.json) (`2024-03-14T04:15:09.697`)
|
||||
* [CVE-2024-0311](CVE-2024/CVE-2024-03xx/CVE-2024-0311.json) (`2024-03-14T09:15:46.580`)
|
||||
* [CVE-2024-0312](CVE-2024/CVE-2024-03xx/CVE-2024-0312.json) (`2024-03-14T09:15:46.943`)
|
||||
* [CVE-2024-0313](CVE-2024/CVE-2024-03xx/CVE-2024-0313.json) (`2024-03-14T09:15:47.153`)
|
||||
* [CVE-2024-2437](CVE-2024/CVE-2024-24xx/CVE-2024-2437.json) (`2024-03-14T09:15:47.690`)
|
||||
* [CVE-2024-2438](CVE-2024/CVE-2024-24xx/CVE-2024-2438.json) (`2024-03-14T09:15:47.820`)
|
||||
* [CVE-2024-27986](CVE-2024/CVE-2024-279xx/CVE-2024-27986.json) (`2024-03-14T09:15:47.363`)
|
||||
* [CVE-2024-28746](CVE-2024/CVE-2024-287xx/CVE-2024-28746.json) (`2024-03-14T09:15:47.577`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
* [CVE-2024-2400](CVE-2024/CVE-2024-24xx/CVE-2024-2400.json) (`2024-03-14T03:15:09.323`)
|
||||
* [CVE-2024-2247](CVE-2024/CVE-2024-22xx/CVE-2024-2247.json) (`2024-03-14T10:15:07.027`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
45
_state.csv
45
_state.csv
@ -237769,6 +237769,9 @@ CVE-2024-0306,0,0,b16f92c4a57a78580a52f72a84126778ebdaa3c536bd7e40b62367d789d467
|
||||
CVE-2024-0307,0,0,966cba6a906cf8576b3e22074f9068ff5de1957049fe57d9d5cbc37ee44349fd,2024-02-29T01:43:07.687000
|
||||
CVE-2024-0308,0,0,9b374c4831c1d7e4a01993ec95f413541808b94d3287b12ae8901324a0a5069f,2024-02-29T01:43:07.777000
|
||||
CVE-2024-0310,0,0,0c2885511923199ef6e03dac11102e56161395771a2afd9522cbb1c995a0879b,2024-01-17T20:33:20.540000
|
||||
CVE-2024-0311,1,1,3d442843b5e7608c6bb2d77d9dcb114de76282fb17e1ce6c84f71c9f13b56353,2024-03-14T09:15:46.580000
|
||||
CVE-2024-0312,1,1,69d12d721f795cc0d22cd17188a5b39718b4865bc47a526252bc99e0123e85cd,2024-03-14T09:15:46.943000
|
||||
CVE-2024-0313,1,1,a469c3f2b32bec348f652dac84f522f30364e2e85c51d95d77fb481340e1f3de,2024-03-14T09:15:47.153000
|
||||
CVE-2024-0314,0,0,cb39f430188fa2205e666e0316f77a35baf49f032cd18aa7e33289fa487d3fcc,2024-01-19T18:49:31.097000
|
||||
CVE-2024-0315,0,0,a788da88ec4ebc0bdd26d80fefc9882fdad32f8f7dd4b621291efc32f023b296,2024-01-19T18:16:37.743000
|
||||
CVE-2024-0316,0,0,00ac14550b7d60d3281c01b35600da830ada0f25e388579ccb4be08b0f546755,2024-01-19T18:16:51.523000
|
||||
@ -238467,9 +238470,9 @@ CVE-2024-1216,0,0,cf8cbc681fab31a82a726030cd7e5b2697f90ed7fc6fe37a66dad5c3cedfca
|
||||
CVE-2024-1217,0,0,2f3a9888a6fbf53051bf3e1d713109419f2670877e27546924b2618e93987f41,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1218,0,0,f7a43c3097a98a76412fe9c1af1feb423b6a534d59f1a1be753dd55ce0e5155c,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1220,0,0,7fc61962f6d2075b07bb030435da96def1b153ddab02d3c5264f2409e74faa58,2024-03-06T15:18:08.093000
|
||||
CVE-2024-1221,1,1,72683792ce9c283255541d5ac660fa78f64a38a1637cf2ed82ea089144c05781,2024-03-14T03:15:06.607000
|
||||
CVE-2024-1222,1,1,5b097491b98908ff7e6db3da1f90d0bc5e62019a19484337138401f19c65b843,2024-03-14T03:15:07.090000
|
||||
CVE-2024-1223,1,1,bcce03f069a230840b65a318aed8fc83e8f3977b6a931636a215c3e057bb8175,2024-03-14T03:15:07.580000
|
||||
CVE-2024-1221,0,0,72683792ce9c283255541d5ac660fa78f64a38a1637cf2ed82ea089144c05781,2024-03-14T03:15:06.607000
|
||||
CVE-2024-1222,0,0,5b097491b98908ff7e6db3da1f90d0bc5e62019a19484337138401f19c65b843,2024-03-14T03:15:07.090000
|
||||
CVE-2024-1223,0,0,bcce03f069a230840b65a318aed8fc83e8f3977b6a931636a215c3e057bb8175,2024-03-14T03:15:07.580000
|
||||
CVE-2024-1224,0,0,f5377a59802b4c28898eed36128680d24ab17fb508c502610abb50cb4d44c2e5,2024-03-06T15:18:08.093000
|
||||
CVE-2024-1225,0,0,48e8aaacf87c1f1ce817a462226bd45c66b45e1434a262109b41e4c91072a987,2024-02-29T01:43:44.277000
|
||||
CVE-2024-1226,0,0,866d071ad8625704064a7fde58b7b8a2a90c5873a4eb7f372776142f1a28cf32,2024-03-12T16:02:33.900000
|
||||
@ -238716,7 +238719,7 @@ CVE-2024-1650,0,0,3020ece11ffdddeeec0030da948830348e1867089b2578f18d2a470b71bf8a
|
||||
CVE-2024-1651,0,0,b5a1bc561b4d7ae4d1ca2ccf7f79068fb2afa7b09c9ad49805a75edae57e0400,2024-02-20T19:50:53.960000
|
||||
CVE-2024-1652,0,0,713b08425ff0d91e3a1f6c5fcc742628e562c3c90970b08c1ec718d504f2db3c,2024-02-27T14:19:41.650000
|
||||
CVE-2024-1653,0,0,875a0ad46333e774de4f895ea6a9ead74cdbdb6ae6c4ddb02a960bfb85513ae4,2024-02-27T14:19:41.650000
|
||||
CVE-2024-1654,1,1,b67f7c776b64097c757a87a6d7d22a8df21e2be37384f31188a789970302a42e,2024-03-14T03:15:08.033000
|
||||
CVE-2024-1654,0,0,b67f7c776b64097c757a87a6d7d22a8df21e2be37384f31188a789970302a42e,2024-03-14T03:15:08.033000
|
||||
CVE-2024-1661,0,0,24db83c92b829dc6c3c4aa1496bd15ce44d311aaea85d91d099cbad064ada2b4,2024-02-29T01:43:53.173000
|
||||
CVE-2024-1668,0,0,9fe479fb08a9c3e6acaa42b32d642c1a77a4b3afa3c06ca8b35741f02d9dd1bf,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1669,0,0,3362eeabf5b6399fda046d3f728ab967509d79cc74a91c5ce260a94031135ec7,2024-02-26T16:27:52.577000
|
||||
@ -238823,9 +238826,9 @@ CVE-2024-1875,0,0,6b658f389b536cea98293568c7ee6644587a9b1bef069f774207e95c99ee51
|
||||
CVE-2024-1876,0,0,82560fab1f4fbe2b28673412a54026b5c1806e6e970cf396594ce5608059f917,2024-02-29T09:15:06.320000
|
||||
CVE-2024-1877,0,0,dc0df84bf200c26187720f27a43e69dca821743a88d60bdf70024e88eda285b4,2024-02-29T09:15:06.407000
|
||||
CVE-2024-1878,0,0,c55652da9052ae10c0f5815143b64799f9a5b82eb1a20210e8e29c385eb1c149,2024-02-29T09:15:06.490000
|
||||
CVE-2024-1882,1,1,10c6e74771347b67fa3c838c9d71cc234ab54d67925ce262fed28d8f9bb44513,2024-03-14T04:15:08.003000
|
||||
CVE-2024-1883,1,1,e5e91ae0abed696d1abc51c06539334ac29fcc9a9edcb560d2084b7e2dc68356,2024-03-14T04:15:08.353000
|
||||
CVE-2024-1884,1,1,0cbc4b22c13954feaf9f0861216bee59fd3068f748b376e760b0221e0a5f2091,2024-03-14T04:15:08.697000
|
||||
CVE-2024-1882,0,0,10c6e74771347b67fa3c838c9d71cc234ab54d67925ce262fed28d8f9bb44513,2024-03-14T04:15:08.003000
|
||||
CVE-2024-1883,0,0,e5e91ae0abed696d1abc51c06539334ac29fcc9a9edcb560d2084b7e2dc68356,2024-03-14T04:15:08.353000
|
||||
CVE-2024-1884,0,0,0cbc4b22c13954feaf9f0861216bee59fd3068f748b376e760b0221e0a5f2091,2024-03-14T04:15:08.697000
|
||||
CVE-2024-1885,0,0,502b33ef4dbb909774fc1ef1eb02e9b9fbffdbeee1e2971953e7a0c92a37628d,2024-02-29T07:15:06.293000
|
||||
CVE-2024-1886,0,0,092cf7a21972f581040984f11ef7d5c93e369371178904eaee065bef71ec984b,2024-02-29T07:15:06.520000
|
||||
CVE-2024-1887,0,0,c4ea1f30b4ee64401ec471c46007c0919b3d087c3cc77ec486ec75f252891a28,2024-02-29T13:49:29.390000
|
||||
@ -239715,9 +239718,9 @@ CVE-2024-2239,0,0,8a25d7fd7eaacb8ebf85fc00694a049e7ce7420bfb6cf416c5b42d50c5d1d4
|
||||
CVE-2024-22393,0,0,baae8029e1587725a02d8ccb1fb298e540bb69b478da7728d31a9731926e8718,2024-02-22T19:07:27.197000
|
||||
CVE-2024-22394,0,0,fdf2846817bf0321d479c4aa67f29d797db24255733cd4d946cc68e44bfccdc7,2024-02-14T21:46:40.537000
|
||||
CVE-2024-22395,0,0,b21f811c39a8757d126ad039f30ef550a4161900f4b964d1876a739d59a87644,2024-02-26T13:42:22.567000
|
||||
CVE-2024-22396,1,1,f31a8478611f246e75e3189d21bf9ef362e314a74863dafebff2c53a0d093433,2024-03-14T04:15:09.080000
|
||||
CVE-2024-22397,1,1,dd628a66d8f0ca8bd03cdfa506d1cfa64763356d779eb356796a3ef2aa6831cb,2024-03-14T04:15:09.297000
|
||||
CVE-2024-22398,1,1,c77e5448cb612df458a655c23f75acac1504b30f42bbfcca524271c814d3eb63,2024-03-14T04:15:09.417000
|
||||
CVE-2024-22396,0,0,f31a8478611f246e75e3189d21bf9ef362e314a74863dafebff2c53a0d093433,2024-03-14T04:15:09.080000
|
||||
CVE-2024-22397,0,0,dd628a66d8f0ca8bd03cdfa506d1cfa64763356d779eb356796a3ef2aa6831cb,2024-03-14T04:15:09.297000
|
||||
CVE-2024-22398,0,0,c77e5448cb612df458a655c23f75acac1504b30f42bbfcca524271c814d3eb63,2024-03-14T04:15:09.417000
|
||||
CVE-2024-22400,0,0,75e98c1f1edd6beccc5653abbccb406114df98ae36ae20c7db97671271c6d967,2024-01-26T20:55:37.543000
|
||||
CVE-2024-22401,0,0,66adbef511b1833a5b0f5721c3bf92cfe438dfd63a9ac9655aa7c9dea6d9ded0,2024-01-26T14:42:35.147000
|
||||
CVE-2024-22402,0,0,6c66fef7245df59e63379f6d488e03f20fc7beed00d8afe188d68ca1b49ff0b2,2024-01-26T14:11:30.677000
|
||||
@ -239758,7 +239761,7 @@ CVE-2024-22458,0,0,fab0847e92bbf727c5b27aa7c362cf6e8ac33445a67dace1537122f2ef005
|
||||
CVE-2024-22459,0,0,0f6e55dd5e86a1ba38a08c9c7a4fb2896872d396522db79869b212894fff2ef6,2024-02-28T14:06:45.783000
|
||||
CVE-2024-22463,0,0,5b884681f5c1cb31ebf38842df7c3075a8e9d98da101d1e4ec4faa1ef09b6ce2,2024-03-04T15:35:25.673000
|
||||
CVE-2024-22464,0,0,890f63b91e1207e51dc2d0fc686f763deb067d6410c523bfc64d52071d75be15,2024-02-15T05:03:27.617000
|
||||
CVE-2024-2247,0,0,9e85ed4f50cab3213620739fef323cb3a6fe1cce4088e46f1198fba9df000957,2024-03-13T14:28:45.217000
|
||||
CVE-2024-2247,0,1,b52dba6f68142dbeca56f2f1bf8b23a5401066ec4f0585445fe0cb42ba284eff,2024-03-14T10:15:07.027000
|
||||
CVE-2024-22473,0,0,ba695bcad0bbe2cba422f3053697429916506f0f0ce55f150fe9af4a818e1f6b,2024-02-22T19:07:27.197000
|
||||
CVE-2024-22490,0,0,36caaa8caefc70cd3fb65a62a9488b2446e68d14844d0a61d7baf757d2000caa,2024-01-29T22:48:35.493000
|
||||
CVE-2024-22491,0,0,99c25b0ff8de89fe3ebd04368e499e7fe9b3820707560bd21fed90048934c0ad,2024-01-23T14:28:45.890000
|
||||
@ -240359,7 +240362,7 @@ CVE-2024-23978,0,0,dce24325560fbd2c8a4b55826a990c779123e234941d6c9decad894b94e08
|
||||
CVE-2024-23979,0,0,5e1dc647eec92472a586c7319077fa782b48d632d4a171a926ee19c9f0ee9a24,2024-02-14T18:04:45.380000
|
||||
CVE-2024-23982,0,0,b14ba0205dd1f33ce2faf143ef8b9750d0c0a19e31571fc2532f719ca5f2eec3,2024-02-14T18:04:45.380000
|
||||
CVE-2024-23985,0,0,258f4468fe9f37b9a6c2732e57d96bdd80375c2f3603af19ad729cbcccfb8b72,2024-02-01T17:33:41.777000
|
||||
CVE-2024-2400,0,1,a3559f292416a7177d55cf2300155f3e2cebd6068dd39e4a19e49113027fe34d,2024-03-14T03:15:09.323000
|
||||
CVE-2024-2400,0,0,a3559f292416a7177d55cf2300155f3e2cebd6068dd39e4a19e49113027fe34d,2024-03-14T03:15:09.323000
|
||||
CVE-2024-24000,0,0,c0e25ee371e3e2954ce1c31994df30792949134b707de19bf25452c7e2c5373a,2024-02-13T20:30:10.053000
|
||||
CVE-2024-24001,0,0,ee1c723e23fc182642c00ee71c6c1dbca341b34ff9a2a69da4bee1c4da91e395,2024-02-09T02:10:25.807000
|
||||
CVE-2024-24002,0,0,9bdb915eced684ff7e6e2357761c75646971413f2fc2285fbb97b632594b2045,2024-02-09T02:10:13.973000
|
||||
@ -240475,8 +240478,10 @@ CVE-2024-24332,0,0,e8ff48d8d559b64b9ab6ad7cafcefb37d4d80401868f386c665115c6aeb40
|
||||
CVE-2024-24333,0,0,01fbda1675f098d1cc7c6d19f4f3e61befb0126ec79fb324ab3d3ab060b94378,2024-02-01T04:50:09.707000
|
||||
CVE-2024-24337,0,0,aea724cce42152cfbca31af56ebea4b4144a07dac6916cd215f4a89a5f259b76,2024-02-13T14:01:49.147000
|
||||
CVE-2024-24350,0,0,9134767962641c17d78d439bf5ad6b0040b309c747242ef118ff001480ea18e9,2024-02-14T21:53:21.057000
|
||||
CVE-2024-2437,1,1,e2a2bd9bd0dcdea0cc630f9078b3e3fd0d505d341534c09f27e2d7feb3fe79ac,2024-03-14T09:15:47.690000
|
||||
CVE-2024-24375,0,0,6d93bed7b91eebe0279780e7942da5d713b2770f2037688e2705f8e5250bec6b,2024-03-07T13:52:27.110000
|
||||
CVE-2024-24377,0,0,4fd82afd92a47ec9c215e71594b94e69e50289be89a362cbe08c09e263cd1ed7,2024-02-16T13:37:51.433000
|
||||
CVE-2024-2438,1,1,c00f0172cf7ab8467da2d5d83a23b794d6f6a7817b3440d3b686b7132bf26b21,2024-03-14T09:15:47.820000
|
||||
CVE-2024-24386,0,0,b3790fe661cff8a8634891f10d13cf244a8c2db222c1d3928967cefd661b68bf,2024-02-15T14:28:31.380000
|
||||
CVE-2024-24388,0,0,3f3d5731a0be4e881fd82d2a190d75a64cc3a7cfd8c995358dcecccf32a929bb,2024-02-08T20:04:04.027000
|
||||
CVE-2024-24389,0,0,2c9b678e90ca811a5e4fb1d9cfec1c17129f5ec175674cc0051b26f5da267c13,2024-03-07T13:52:27.110000
|
||||
@ -240923,11 +240928,11 @@ CVE-2024-25642,0,0,bf91eeb1502dedca60fe6c035b93d7dfc5a440bc6932322c6ae4d128b4c7c
|
||||
CVE-2024-25643,0,0,08f3e6c0d454841d4e4dc84aae81812246ffbd96bb71cc2e9e4566cd4077e910,2024-02-13T14:01:07.747000
|
||||
CVE-2024-25644,0,0,cad748db94c87605f745ac8efbb54ef36e9bf866e1bcdbdf96bff9a05dfcf738,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25645,0,0,611af6391fb4617a6b65e5d2ff91bac5a4003873b65f133d0cd2495d911bd094,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25649,1,1,218331cab7c62b05eb4d39dac1a79ad7ac8b83af2eb750388e434f7637a774f7,2024-03-14T03:15:08.540000
|
||||
CVE-2024-25649,0,0,218331cab7c62b05eb4d39dac1a79ad7ac8b83af2eb750388e434f7637a774f7,2024-03-14T03:15:08.540000
|
||||
CVE-2024-25650,0,0,642f2a97fcbb295131b088a5341f3b030499ec647a2ae701e0541ed64c8cf428,2024-03-14T02:15:50.690000
|
||||
CVE-2024-25651,1,1,2248b9010081da7da6b627ee680afeedcd3d4b945ee538337f832cfc007fb085,2024-03-14T03:15:08.727000
|
||||
CVE-2024-25652,1,1,295dd2978154c1bf9b2c6a87719cce6733bb755cf3cd8c6462372fddfcabd618,2024-03-14T03:15:08.877000
|
||||
CVE-2024-25653,1,1,288666ab37b8b1bd826f20b5520fe1bf046ca6dbd75973955552561e56a31a42,2024-03-14T03:15:09.017000
|
||||
CVE-2024-25651,0,0,2248b9010081da7da6b627ee680afeedcd3d4b945ee538337f832cfc007fb085,2024-03-14T03:15:08.727000
|
||||
CVE-2024-25652,0,0,295dd2978154c1bf9b2c6a87719cce6733bb755cf3cd8c6462372fddfcabd618,2024-03-14T03:15:08.877000
|
||||
CVE-2024-25653,0,0,288666ab37b8b1bd826f20b5520fe1bf046ca6dbd75973955552561e56a31a42,2024-03-14T03:15:09.017000
|
||||
CVE-2024-25674,0,0,880844ace2ad9fa6a214f1eff7f46e3beaded8f86ef202dfc09585e1e07ca21c,2024-02-12T14:30:40.343000
|
||||
CVE-2024-25675,0,0,7eb120f8543ce89181641a0a8c791e82666c8e07d23577075c360f9dbf73d233,2024-02-12T14:30:28.640000
|
||||
CVE-2024-25677,0,0,1d7f4f51208daa48b27418602ba1484337c537523201080701287445cfed0006,2024-02-15T19:43:24.983000
|
||||
@ -241385,6 +241390,7 @@ CVE-2024-27949,0,0,12ee9b935394b527d1677a59b517c94d0df067a0b32bfff31d7cb2be5b4b5
|
||||
CVE-2024-27950,0,0,56d632dad56c45d949d3327de16e5b70b08683cea8ce7876ca8c59cc37ee8062,2024-03-01T14:04:04.827000
|
||||
CVE-2024-27952,0,0,184c933cd3d4f7d9f291de87daadba6c6d2dcb57a0cab449b4798a27658d2d98,2024-03-13T18:15:58.530000
|
||||
CVE-2024-27953,0,0,9606a5ea342585cc8ea605f674c63e8d870327e37e1ba285dba38be6126632a2,2024-03-13T18:15:58.530000
|
||||
CVE-2024-27986,1,1,01528b706c9f06c52d7790b2237645f819afb573bee6a27e89a4eeb7a8b9eee6,2024-03-14T09:15:47.363000
|
||||
CVE-2024-28084,0,0,2ea238298cc724e9290d5587502d4eedb8db15dd1861547724435b977511956c,2024-03-04T13:58:23.447000
|
||||
CVE-2024-28088,0,0,d2f20b1069b24ba10d21e8bf3b61c2c6a1c6b345ff59786676752b80abbde7a4,2024-03-13T21:16:00.380000
|
||||
CVE-2024-28089,0,0,830991c1dd5898b6a817a3f8bb8784922af3636f20b8b62ba1c918d5d83f6f10,2024-03-11T01:32:29.610000
|
||||
@ -241450,9 +241456,9 @@ CVE-2024-28251,0,0,fb8bb85433bd3b41ad1d143c946985fc64b58ab7659a617713f0e321c9f0e
|
||||
CVE-2024-28338,0,0,9985a0b99abb928b9c829cb29ecce6039c07964aad6d9841c1477c6680f4f9b5,2024-03-12T17:46:17.273000
|
||||
CVE-2024-28339,0,0,06a7f15d55f22a965683bef17c82587bc073ddf9fa5edb33c38c4cd82d5f37f7,2024-03-12T17:46:17.273000
|
||||
CVE-2024-28340,0,0,89775fa07d73d115a7392603111ecb04f65799be74b8d41063e67ed0eb97d0cf,2024-03-12T17:46:17.273000
|
||||
CVE-2024-28388,1,1,f17eaaccd231d77546d7899d1df3085348280bec8337c1a366c3d44c86452404,2024-03-14T03:15:09.173000
|
||||
CVE-2024-28390,1,1,1da0808737c64cfb1966175097fd2c66620ce27fb357d642515e15877a4acd6d,2024-03-14T04:15:09.640000
|
||||
CVE-2024-28391,1,1,2cf4d2f98732c7b04ac1c5926873543ea38367c981d16dbe8f52fbe309920f7c,2024-03-14T04:15:09.697000
|
||||
CVE-2024-28388,0,0,f17eaaccd231d77546d7899d1df3085348280bec8337c1a366c3d44c86452404,2024-03-14T03:15:09.173000
|
||||
CVE-2024-28390,0,0,1da0808737c64cfb1966175097fd2c66620ce27fb357d642515e15877a4acd6d,2024-03-14T04:15:09.640000
|
||||
CVE-2024-28391,0,0,2cf4d2f98732c7b04ac1c5926873543ea38367c981d16dbe8f52fbe309920f7c,2024-03-14T04:15:09.697000
|
||||
CVE-2024-28429,0,0,caaa64487b84149266e9e941a72e13f93e6070c94b1fe7355fb56db4eb5b2161,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28430,0,0,bf34fb49e742ebf9176808c1e05b7467ed1662a29a5c18afe29f976454928e37,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28431,0,0,148c6be422e12f315897bdd57f5208c74e8137e452c7019eafe29f97f527c418,2024-03-13T14:28:45.217000
|
||||
@ -241480,6 +241486,7 @@ CVE-2024-28681,0,0,ed8a4fd064b6b3346412990e6226cbe04bee8a6bd2aaad4671fdcd0478ce5
|
||||
CVE-2024-28682,0,0,2c53ed716809a76ded005fd10ac6d93891dbf2dd9f02238c66f1445af60cb8e7,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28683,0,0,14fce1fb8fe5dd3fb68153125dd387047f48de59cd587ce41acfe8b0e8fa04c2,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28684,0,0,df89c702874c46527da5dc5bf33ec252c05a69f53466623f5ca04f0566a6cd25,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28746,1,1,68b127d8baa050906fc806d29eb629eac7d2be78c059e66496ad730631b35b73,2024-03-14T09:15:47.577000
|
||||
CVE-2024-28753,0,0,73ca850c1b6879daba607bc61d7d16457b56173a47004b8bff799b514a526c36,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3b2c,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28757,0,0,2ea8a9bd701b62a4c7d927e860f5361b09b4376e3bc3bbb014ff5d4ca725cec6,2024-03-11T01:32:29.610000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user