Auto-Update: 2024-03-19T07:00:38.833088+00:00

This commit is contained in:
cad-safe-bot 2024-03-19 07:03:27 +00:00
parent 5d0b05a29a
commit 91dd70d371
12 changed files with 328 additions and 19 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4459",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-21T19:15:09.373",
"lastModified": "2024-03-13T15:15:49.370",
"lastModified": "2024-03-19T05:15:08.030",
"vulnStatus": "Modified",
"descriptions": [
{
@ -127,6 +127,10 @@
"url": "https://access.redhat.com/errata/RHSA-2024:1306",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1367",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-4459",
"source": "secalert@redhat.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-7192",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-02T19:15:11.510",
"lastModified": "2024-03-13T15:15:50.313",
"lastModified": "2024-03-19T05:15:09.100",
"vulnStatus": "Modified",
"descriptions": [
{
@ -139,6 +139,10 @@
"url": "https://access.redhat.com/errata/RHSA-2024:1306",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1367",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-7192",
"source": "secalert@redhat.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0646",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-17T16:15:47.190",
"lastModified": "2024-03-13T15:15:50.503",
"lastModified": "2024-03-19T05:15:09.250",
"vulnStatus": "Modified",
"descriptions": [
{
@ -193,6 +193,14 @@
"url": "https://access.redhat.com/errata/RHSA-2024:1306",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1367",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1368",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-0646",
"source": "secalert@redhat.com",

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-21503",
"sourceIdentifier": "report@snyk.io",
"published": "2024-03-19T05:15:09.447",
"lastModified": "2024-03-19T05:15:09.447",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service.\r\rExploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "report@snyk.io",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "report@snyk.io",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
]
}
],
"references": [
{
"url": "https://github.com/psf/black/commit/f00093672628d212b8965a8993cee8bedf5fe9b8",
"source": "report@snyk.io"
},
{
"url": "https://github.com/psf/black/releases/tag/24.3.0",
"source": "report@snyk.io"
},
{
"url": "https://security.snyk.io/vuln/SNYK-PYTHON-BLACK-6256273",
"source": "report@snyk.io"
}
]
}

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2024-21504",
"sourceIdentifier": "report@snyk.io",
"published": "2024-03-19T05:15:09.813",
"lastModified": "2024-03-19T05:15:09.813",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Versions of the package livewire/livewire from 3.3.5 and before 3.4.9 are vulnerable to Cross-site Scripting (XSS) when a page uses [Url] for a property. An attacker can inject HTML code in the context of the user's browser session by crafting a malicious link and convincing the user to click on it."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "report@snyk.io",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "report@snyk.io",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/livewire/livewire/commit/c65b3f0798ab2c9338213ede3588c3cdf4e6fcc0",
"source": "report@snyk.io"
},
{
"url": "https://github.com/livewire/livewire/pull/8117",
"source": "report@snyk.io"
},
{
"url": "https://github.com/livewire/livewire/releases/tag/v3.4.9",
"source": "report@snyk.io"
},
{
"url": "https://security.snyk.io/vuln/SNYK-PHP-LIVEWIRELIVEWIRE-6446222",
"source": "report@snyk.io"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-22017",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-03-19T05:15:10.073",
"lastModified": "2024-03-19T05:15:10.073",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "setuid() does not affect libuv's internal io_uring operations if initialized before the call to setuid().\nThis allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid().\nThis vulnerability affects all users using version greater or equal than Node.js 18.18.0, Node.js 20.4.0 and Node.js 21."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.5,
"impactScore": 5.3
}
]
},
"references": [
{
"url": "https://hackerone.com/reports/2170226",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-22025",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-03-19T05:15:10.267",
"lastModified": "2024-03-19T05:15:10.267",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Node.js has been identified, allowing for a Denial of Service (DoS) attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL.\nThe vulnerability stems from the fact that the fetch() function in Node.js always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL.\nAn attacker controlling the URL passed into fetch() can exploit this vulnerability to exhaust memory, potentially leading to process termination, depending on the system configuration."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://hackerone.com/reports/2284065",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-26369",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-19T06:15:06.267",
"lastModified": "2024-03-19T06:15:06.267",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue in the HistoryQosPolicy component of FastDDS v2.12.x, v2.11.x, v2.10.x, and v2.6.x leads to a SIGABRT (signal abort) upon receiving DataWriter's data."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/eProsima/Fast-DDS/issues/4365",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/eProsima/Fast-DDS/pull/4375",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-28446",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-19T06:15:07.547",
"lastModified": "2024-03-19T06:15:07.547",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Shenzhen Libituo Technology Co., Ltd LBT-T300-mini1 v1.2.9 was discovered to contain a buffer overflow via lan_netmask parameter at /apply.cgi."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/AdamRitz/lbtvul/blob/main/t300mini.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-28447",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-19T06:15:07.697",
"lastModified": "2024-03-19T06:15:07.697",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Shenzhen Libituo Technology Co., Ltd LBT-T300-mini1 v1.2.9 was discovered to contain a buffer overflow via lan_ipaddr parameters at /apply.cgi."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/AdamRitz/lbtvul/blob/main/t300mini.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-19T05:00:37.694292+00:00
2024-03-19T07:00:38.833088+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-19T04:15:07.710000+00:00
2024-03-19T06:15:07.697000+00:00
```
### Last Data Feed Release
@ -29,23 +29,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
241949
241956
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `7`
* [CVE-2024-21503](CVE-2024/CVE-2024-215xx/CVE-2024-21503.json) (`2024-03-19T05:15:09.447`)
* [CVE-2024-21504](CVE-2024/CVE-2024-215xx/CVE-2024-21504.json) (`2024-03-19T05:15:09.813`)
* [CVE-2024-22017](CVE-2024/CVE-2024-220xx/CVE-2024-22017.json) (`2024-03-19T05:15:10.073`)
* [CVE-2024-22025](CVE-2024/CVE-2024-220xx/CVE-2024-22025.json) (`2024-03-19T05:15:10.267`)
* [CVE-2024-26369](CVE-2024/CVE-2024-263xx/CVE-2024-26369.json) (`2024-03-19T06:15:06.267`)
* [CVE-2024-28446](CVE-2024/CVE-2024-284xx/CVE-2024-28446.json) (`2024-03-19T06:15:07.547`)
* [CVE-2024-28447](CVE-2024/CVE-2024-284xx/CVE-2024-28447.json) (`2024-03-19T06:15:07.697`)
### CVEs modified in the last Commit
Recently modified CVEs: `4`
Recently modified CVEs: `3`
* [CVE-2023-47995](CVE-2023/CVE-2023-479xx/CVE-2023-47995.json) (`2024-03-19T03:15:06.180`)
* [CVE-2023-47997](CVE-2023/CVE-2023-479xx/CVE-2023-47997.json) (`2024-03-19T03:15:06.623`)
* [CVE-2024-2604](CVE-2024/CVE-2024-26xx/CVE-2024-2604.json) (`2024-03-19T04:15:07.710`)
* [CVE-2024-28757](CVE-2024/CVE-2024-287xx/CVE-2024-28757.json) (`2024-03-19T03:15:06.893`)
* [CVE-2023-4459](CVE-2023/CVE-2023-44xx/CVE-2023-4459.json) (`2024-03-19T05:15:08.030`)
* [CVE-2023-7192](CVE-2023/CVE-2023-71xx/CVE-2023-7192.json) (`2024-03-19T05:15:09.100`)
* [CVE-2024-0646](CVE-2024/CVE-2024-06xx/CVE-2024-0646.json) (`2024-03-19T05:15:09.250`)
## Download and Usage

View File

@ -231237,7 +231237,7 @@ CVE-2023-4454,0,0,fe899221eb203df39954aedfaeaf87bdb09afc80eb2c22102da392016705c3
CVE-2023-4455,0,0,9528a57f6832fe8e6664fdc368bd3e3314370da9062831e095663a0c221f98f6,2023-08-24T21:11:31.950000
CVE-2023-4456,0,0,6d9cdb4689534916ddff63b61413f1e522c8383cf07c0239a48f4e3d5fbfcc73,2023-11-07T04:22:38.447000
CVE-2023-4457,0,0,ac60e11809ded7eaccf037584c3d03207cafdbc7826e19cec4254350e1a52269,2023-10-20T15:17:32.870000
CVE-2023-4459,0,0,38a43d126f90b707f80b21b71a35a2d4cde68e46fc836a8443cd37a94b9f4319,2024-03-13T15:15:49.370000
CVE-2023-4459,0,1,b88832dd787cbeec9bae999e0095944a864720b0a9e2fecd7b0da4bba66a39fd,2024-03-19T05:15:08.030000
CVE-2023-4460,0,0,f93ac0cc9ec04f47ebf64d59feccc55ae86604f5338e23e11a38cdb78ed4a09c,2023-12-07T20:31:47.693000
CVE-2023-4462,0,0,e8652c1af7020b20d4e3bb76958b75c6ac3b649c3c41d7ee1dc182189606bfe8,2024-02-29T01:41:49.647000
CVE-2023-4463,0,0,5778177a2ad3e8beb0474c5e239ee34824ff50d1b13cdbaaaee9b92ed30b0081,2024-02-29T01:41:49.787000
@ -233300,9 +233300,9 @@ CVE-2023-47990,0,0,daed7201638b03d322d409f8c2e68b3b87ee903e3469e13218f8deeb9655f
CVE-2023-47992,0,0,c229950c1ff8d016d58f7b8471f6f0dfd33354bd2787c70f9695ded528373f2c,2024-01-16T21:03:04.787000
CVE-2023-47993,0,0,d509f0985b93dc14d45d553e0fda0ea1960e22399a9c3b5fb1b66e852e58de43,2024-01-16T21:02:52.130000
CVE-2023-47994,0,0,7e5f5a9a95c1136c6515e5c730bc838f2a7b51ba862779c554b6a6e9833b52c8,2024-01-16T21:02:41.413000
CVE-2023-47995,0,1,46ca2539868dcba0da257c1e061d739752e20607f6787d5c80af6ed21ff6f391,2024-03-19T03:15:06.180000
CVE-2023-47995,0,0,46ca2539868dcba0da257c1e061d739752e20607f6787d5c80af6ed21ff6f391,2024-03-19T03:15:06.180000
CVE-2023-47996,0,0,0973baa44d38a710911d854c36b21249c760e04d45180d9226f7f74b1ef71d90,2024-01-16T20:59:05.917000
CVE-2023-47997,0,1,8cf19cd77ed5fae90472f567b0721dea844214c03c41f5d0b4f1983c2182a951,2024-03-19T03:15:06.623000
CVE-2023-47997,0,0,8cf19cd77ed5fae90472f567b0721dea844214c03c41f5d0b4f1983c2182a951,2024-03-19T03:15:06.623000
CVE-2023-4800,0,0,35afc9aedc31f156b4f38cf5decaddabcd0b1c2888a2021de3479af11f68d5d7,2023-11-07T04:22:59.303000
CVE-2023-48003,0,0,25ca5ca575130af3374feb4b17fb73bbeebf39b4f544610fb4b5f484a1267a6c,2024-01-04T03:17:21.990000
CVE-2023-4801,0,0,4b3301abd0ab2b328cca0ce1d3b798d3d94cc4519cede5c0ea69f577216928f7,2023-09-15T19:06:01.270000
@ -237662,7 +237662,7 @@ CVE-2023-7188,0,0,852cd48c16fe0b4232c1cc1e9892899282c0d5a5fa43f1b8f320174637d432
CVE-2023-7189,0,0,58a77aeec688a533f21ed0a4a9d71eb0705fbd19c0515c4ff17f03cfd1fda1ea,2024-02-29T01:42:59.443000
CVE-2023-7190,0,0,525bdeccc55a9711a53be90441300e5c3c4140cb068f0b2822d05bced8bf600b,2024-02-29T01:42:59.540000
CVE-2023-7191,0,0,e88be4c11ad575ba542d73410e05ca9713d2c182f91e9bea29393daea35a5564,2024-02-29T01:42:59.630000
CVE-2023-7192,0,0,31cb4f2964d285c5642b818e442c491450b2d2f782a22b53435e6ee28d74a86f,2024-03-13T15:15:50.313000
CVE-2023-7192,0,1,c8d2745a9bc4a273527e90949c72631c3b3b7af44c972ba7d9bafc29405b2df6,2024-03-19T05:15:09.100000
CVE-2023-7193,0,0,a8537a9a993f65c4193859072543f394186e6722552129f1f6417c478374bc9d,2024-02-29T01:42:59.733000
CVE-2023-7194,0,0,c12012004827cd0bc34ce11f51f4d80b4388d10ba3ae2687522e188646b70ac8,2024-01-25T02:02:01.610000
CVE-2023-7198,0,0,5606627204fd1346b6fe26c836439a1783648ce0b7fc4e92446c427eb2e96f6a,2024-02-27T14:20:06.637000
@ -238151,7 +238151,7 @@ CVE-2024-0641,0,0,a011c2128d997633c3943566b2966020fb742742c755347ad42b0febd95e30
CVE-2024-0642,0,0,a90bcf6571ee802087327f525ede816b704f8421563c66e3216693601bbf1072,2024-01-24T19:29:41.893000
CVE-2024-0643,0,0,aa848a8e1b8cfe92b510534ff6e1f903f998e7f6bc6404cff677acb1bb355f8f,2024-01-24T19:27:40.553000
CVE-2024-0645,0,0,e3ff0667dc75a2979d99db4153cc7d61b0ceb0c517f4cea54262eeab768eb5f4,2024-01-24T19:24:06.717000
CVE-2024-0646,0,0,a1ca47ab9f4761b7236f4a9b227507af07f7e13962ba5a859982b5128ea6fe7f,2024-03-13T15:15:50.503000
CVE-2024-0646,0,1,7e4b9686d0d568c51a7f698a5519166ecc4cfc2fe106b6715ac6290b3f638b9d,2024-03-19T05:15:09.250000
CVE-2024-0647,0,0,0332e6d59eefdc64eb05b07e4fa46b058d042ccaea99c8f45f753fe35b015cbb,2024-02-29T01:43:23.930000
CVE-2024-0648,0,0,a4f5a25e8c9710190b25da008c97da5d141e1a6619a4b29f822c0647da977a03,2024-02-29T01:43:24.013000
CVE-2024-0649,0,0,1ed5652bc1679829cc2258e6f05d507deca75bc30838839b4d286f0055698888,2024-02-29T01:43:24.097000
@ -239518,6 +239518,8 @@ CVE-2024-2150,0,0,b83314ad56669588db95aa786ae7a17f777458826d382001055429649dadce
CVE-2024-21500,0,0,c7cd747e0f0c4b38d8e4dbe19bee0ca66b1639098d16200b89805bcc371371ae,2024-02-20T19:50:53.960000
CVE-2024-21501,0,0,130609650a6eb4f8bc8998fc23ffe06266af91576d81d0c32d1798485b0b5ef0,2024-03-06T14:15:48.343000
CVE-2024-21502,0,0,253b7cd8cd65099448332976329a521bac2b28af5e046192a7c42ab6af135b17,2024-02-26T13:42:22.567000
CVE-2024-21503,1,1,2a36a1a5fed9fa183ac791c22d331872eb5d5935cbb721aeb5dc38bd4860eedb,2024-03-19T05:15:09.447000
CVE-2024-21504,1,1,98f52e8e564b1a295f7b7c821232de2d94a2633e837d34077a0bedb064ca31d7,2024-03-19T05:15:09.813000
CVE-2024-2151,0,0,495640d86128d2bc0aeeff77d3b870070f1388478e718a7bad3a177fbcc68beb,2024-03-04T13:58:23.447000
CVE-2024-2152,0,0,d677d760100442be712e5eec50e33d95d66b2aa83966714505912fafaea405bb,2024-03-04T13:58:23.447000
CVE-2024-2153,0,0,fb8a655e3fba8ce0afef143bbe07f9318fe9ac9ad4a4312149ae082896b81088,2024-03-04T13:58:23.447000
@ -239704,10 +239706,12 @@ CVE-2024-22010,0,0,c8be08522110436a9d4fa99d4021d5a2fb6c1481cb50733e6d40fe00f78ad
CVE-2024-22011,0,0,0b600b1e31e74facb27c71d7c9b3f514c8b8b4c777fc0d39f1c7ce9fc8756817,2024-03-12T12:40:13.500000
CVE-2024-22012,0,0,6083637305fc19ea62a8c209ebe6bfac1cd035e045c787ca530a090291dc1971,2024-03-12T21:15:57.953000
CVE-2024-22016,0,0,72bb3341c866069974fe863b6c9e848e25809f5f0697d51cda8a3c348c9671f4,2024-02-07T17:33:12.727000
CVE-2024-22017,1,1,14a3fcdf6f182b423fd9f5e9942b0441a65dbbd11c9c79f1c863b5211adc660b,2024-03-19T05:15:10.073000
CVE-2024-22019,0,0,f2437e68c6ddb8f7177f54a0e9f52e5ca8426b13996c7a8a6cfcbbb0d671c60e,2024-03-15T11:15:08.807000
CVE-2024-22021,0,0,ba38d4b86a2c5af951f989c7a28594b6207f0b19739ba3d580be6e4d49001bfb,2024-02-29T01:44:04.690000
CVE-2024-22022,0,0,925c0d46bbd39b5d0f2644b5e26e0cd82488a20b7de7cccfa4639e9bb8f60d9e,2024-02-15T18:45:30.887000
CVE-2024-22024,0,0,980d44adebdc63cfe4985efd7aa2ee2044d33423093fc7c9f165c43f20a43115,2024-02-13T15:15:32.193000
CVE-2024-22025,1,1,86fafa4f33c0e6fa4f2207a6a7311c72b954a26bcbe7a62e0f3dc1d575de20c3,2024-03-19T05:15:10.267000
CVE-2024-22027,0,0,0822e6ca4a0197c830c667319442a46ae27f8152642de8d7f05f1858eada021b,2024-01-18T20:02:46.993000
CVE-2024-22028,0,0,8abd1038154eaf5ca23784f859ed6e719a17c93e427bf707fe61eab823cdcecc,2024-01-22T20:22:47.847000
CVE-2024-22039,0,0,ef8c56b19d2a3b2c57a146991f2128767113626aa58dc9954ac8669d3630e403,2024-03-12T12:40:13.500000
@ -241368,7 +241372,7 @@ CVE-2024-26033,0,0,a62f89ca33c1301b3a8553ce4a902ac0986ba96609d90d7ba8159a4334ce3
CVE-2024-26034,0,0,35110260ffd27f8b9039a8623f4cdd752639fac9afb8175ed15ab5f3af291bf5,2024-03-18T19:40:00.173000
CVE-2024-26035,0,0,959e3b7742979ce4ac183e1633741df1f331595110945682f4bb44401d1b75ec,2024-03-18T19:40:00.173000
CVE-2024-26038,0,0,4be9be259e1e9c3fa3225cc05b36a049686fb0adace908f95fb41412cb6e0bcb,2024-03-18T19:40:00.173000
CVE-2024-2604,0,1,3098a184d89606ed318da8f184dbdea962bbb0424dd4fb48dd052f7924ba78c2,2024-03-19T04:15:07.710000
CVE-2024-2604,0,0,3098a184d89606ed318da8f184dbdea962bbb0424dd4fb48dd052f7924ba78c2,2024-03-19T04:15:07.710000
CVE-2024-26040,0,0,b0ae3a36c80524fb04d890d078dcb86cbdb5b2e4d0d6158071755615a9b80c36,2024-03-18T19:40:00.173000
CVE-2024-26041,0,0,0799c5eeb4cb0b95b90068c43bb829bcbdbd6098bbf70f9d3eaf8431ea269ecb,2024-03-18T19:40:00.173000
CVE-2024-26042,0,0,927f70a352d7c944271929f8711b34e89bf0c26c9040985cbf997f7bb85f142c,2024-03-18T19:40:00.173000
@ -241503,6 +241507,7 @@ CVE-2024-26349,0,0,01186c28ef719dd0149527c4abd8d67b60279349307693d6719ba1d7ab32d
CVE-2024-26350,0,0,1f62ec8cd425e84b1282a5e55493461489796820c50a425af585677fa2bae43e,2024-02-22T19:07:27.197000
CVE-2024-26351,0,0,61b98d66760f09ba8a0757ca890b9ad836349a62d566c880c0eb8336d14dbb04,2024-02-22T19:07:27.197000
CVE-2024-26352,0,0,ed876b320273da7c752d57a08640f2d98ce80b026324bdf46d0712ec0097ce54,2024-02-22T19:07:27.197000
CVE-2024-26369,1,1,bbf7f56a04a37dfe1f3ccce0f59653fe19675329bafc0dad09256de06ce153d2,2024-03-19T06:15:06.267000
CVE-2024-26445,0,0,3735cabd04dab3a1baa3e135ef467df65425520025be25bd7cf66dc1b1b0bf61,2024-02-22T19:07:27.197000
CVE-2024-26450,0,0,e70e1c7044e1447bb73bfa4a556135e1953f1916a7225089ba5c38735bf8ee34,2024-03-09T08:15:06.120000
CVE-2024-26454,0,0,bae0c35b4dfcdbee5c6f4167647fab36cadeab218796adaaf17826bd73693c56,2024-03-15T12:53:06.423000
@ -241899,6 +241904,8 @@ CVE-2024-28429,0,0,caaa64487b84149266e9e941a72e13f93e6070c94b1fe7355fb56db4eb5b2
CVE-2024-28430,0,0,bf34fb49e742ebf9176808c1e05b7467ed1662a29a5c18afe29f976454928e37,2024-03-13T14:28:45.217000
CVE-2024-28431,0,0,148c6be422e12f315897bdd57f5208c74e8137e452c7019eafe29f97f527c418,2024-03-13T14:28:45.217000
CVE-2024-28432,0,0,4bc8c3df18623e8712ef966fb24c80f6754436b2eb6a0c14d5d3c56f5a161090,2024-03-13T14:28:45.217000
CVE-2024-28446,1,1,8a9199274a5a035e1881ec7fd714011fa6cb19f218db9ccd8c619f1bace2e3d1,2024-03-19T06:15:07.547000
CVE-2024-28447,1,1,0380c907287ee8a708bc6550562550ab516ab4c431a794e3e88a4816cc06fdcb,2024-03-19T06:15:07.697000
CVE-2024-28535,0,0,05b59fc574e3ec1a67ffae1023c5999e94849ce19d6ee2f539dda71a994d8b6c,2024-03-12T16:02:33.900000
CVE-2024-28537,0,0,ff6bf2a37289dca28bccb57e311acb6479e1a577841d298af6b3b484403dfc2c,2024-03-18T19:40:00.173000
CVE-2024-28547,0,0,a2de8a258b087cbf7c5442c921d96afce5895db417e9c628fe7656334d2bb7cc,2024-03-18T19:40:00.173000
@ -241932,7 +241939,7 @@ CVE-2024-28746,0,0,4e08f19b517756fb15fbaf966494c1aeec3b9803b4e2b615b4d5a557eb48c
CVE-2024-28752,0,0,b6856abb589c0fed02798f341901c4f3025e287fced11706e9fa0c89b392cd6a,2024-03-15T12:53:06.423000
CVE-2024-28753,0,0,73ca850c1b6879daba607bc61d7d16457b56173a47004b8bff799b514a526c36,2024-03-11T01:32:39.697000
CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3b2c,2024-03-11T01:32:39.697000
CVE-2024-28757,0,1,83cb6aefc1d6f4ccc5441198cdfc19ec27b4e109d2bc2864c936baa137f8e197,2024-03-19T03:15:06.893000
CVE-2024-28757,0,0,83cb6aefc1d6f4ccc5441198cdfc19ec27b4e109d2bc2864c936baa137f8e197,2024-03-19T03:15:06.893000
CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000
CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000
CVE-2024-28847,0,0,77ca7298b6799783b77992e414cebfaaf69a1bd2c05124cbdf6b914d3e0bb310,2024-03-17T22:38:29.433000

Can't render this file because it is too large.