mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-09 03:57:14 +00:00
Auto-Update: 2024-03-19T07:00:38.833088+00:00
This commit is contained in:
parent
5d0b05a29a
commit
91dd70d371
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4459",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-08-21T19:15:09.373",
|
||||
"lastModified": "2024-03-13T15:15:49.370",
|
||||
"lastModified": "2024-03-19T05:15:08.030",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -127,6 +127,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1306",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1367",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-4459",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-7192",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-02T19:15:11.510",
|
||||
"lastModified": "2024-03-13T15:15:50.313",
|
||||
"lastModified": "2024-03-19T05:15:09.100",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -139,6 +139,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1306",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1367",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-7192",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0646",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-17T16:15:47.190",
|
||||
"lastModified": "2024-03-13T15:15:50.503",
|
||||
"lastModified": "2024-03-19T05:15:09.250",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -193,6 +193,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1306",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1367",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1368",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-0646",
|
||||
"source": "secalert@redhat.com",
|
||||
|
63
CVE-2024/CVE-2024-215xx/CVE-2024-21503.json
Normal file
63
CVE-2024/CVE-2024-215xx/CVE-2024-21503.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-21503",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2024-03-19T05:15:09.447",
|
||||
"lastModified": "2024-03-19T05:15:09.447",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service.\r\rExploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "report@snyk.io",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "report@snyk.io",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/psf/black/commit/f00093672628d212b8965a8993cee8bedf5fe9b8",
|
||||
"source": "report@snyk.io"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/psf/black/releases/tag/24.3.0",
|
||||
"source": "report@snyk.io"
|
||||
},
|
||||
{
|
||||
"url": "https://security.snyk.io/vuln/SNYK-PYTHON-BLACK-6256273",
|
||||
"source": "report@snyk.io"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2024/CVE-2024-215xx/CVE-2024-21504.json
Normal file
67
CVE-2024/CVE-2024-215xx/CVE-2024-21504.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2024-21504",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2024-03-19T05:15:09.813",
|
||||
"lastModified": "2024-03-19T05:15:09.813",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Versions of the package livewire/livewire from 3.3.5 and before 3.4.9 are vulnerable to Cross-site Scripting (XSS) when a page uses [Url] for a property. An attacker can inject HTML code in the context of the user's browser session by crafting a malicious link and convincing the user to click on it."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "report@snyk.io",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "report@snyk.io",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/livewire/livewire/commit/c65b3f0798ab2c9338213ede3588c3cdf4e6fcc0",
|
||||
"source": "report@snyk.io"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/livewire/livewire/pull/8117",
|
||||
"source": "report@snyk.io"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/livewire/livewire/releases/tag/v3.4.9",
|
||||
"source": "report@snyk.io"
|
||||
},
|
||||
{
|
||||
"url": "https://security.snyk.io/vuln/SNYK-PHP-LIVEWIRELIVEWIRE-6446222",
|
||||
"source": "report@snyk.io"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2024/CVE-2024-220xx/CVE-2024-22017.json
Normal file
43
CVE-2024/CVE-2024-220xx/CVE-2024-22017.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2024-22017",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-03-19T05:15:10.073",
|
||||
"lastModified": "2024-03-19T05:15:10.073",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "setuid() does not affect libuv's internal io_uring operations if initialized before the call to setuid().\nThis allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid().\nThis vulnerability affects all users using version greater or equal than Node.js 18.18.0, Node.js 20.4.0 and Node.js 21."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "support@hackerone.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.5,
|
||||
"impactScore": 5.3
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2170226",
|
||||
"source": "support@hackerone.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2024/CVE-2024-220xx/CVE-2024-22025.json
Normal file
43
CVE-2024/CVE-2024-220xx/CVE-2024-22025.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2024-22025",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-03-19T05:15:10.267",
|
||||
"lastModified": "2024-03-19T05:15:10.267",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in Node.js has been identified, allowing for a Denial of Service (DoS) attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL.\nThe vulnerability stems from the fact that the fetch() function in Node.js always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL.\nAn attacker controlling the URL passed into fetch() can exploit this vulnerability to exhaust memory, potentially leading to process termination, depending on the system configuration."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "support@hackerone.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2284065",
|
||||
"source": "support@hackerone.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-263xx/CVE-2024-26369.json
Normal file
24
CVE-2024/CVE-2024-263xx/CVE-2024-26369.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-26369",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-19T06:15:06.267",
|
||||
"lastModified": "2024-03-19T06:15:06.267",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the HistoryQosPolicy component of FastDDS v2.12.x, v2.11.x, v2.10.x, and v2.6.x leads to a SIGABRT (signal abort) upon receiving DataWriter's data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/eProsima/Fast-DDS/issues/4365",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/eProsima/Fast-DDS/pull/4375",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-284xx/CVE-2024-28446.json
Normal file
20
CVE-2024/CVE-2024-284xx/CVE-2024-28446.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-28446",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-19T06:15:07.547",
|
||||
"lastModified": "2024-03-19T06:15:07.547",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Shenzhen Libituo Technology Co., Ltd LBT-T300-mini1 v1.2.9 was discovered to contain a buffer overflow via lan_netmask parameter at /apply.cgi."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/AdamRitz/lbtvul/blob/main/t300mini.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-284xx/CVE-2024-28447.json
Normal file
20
CVE-2024/CVE-2024-284xx/CVE-2024-28447.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-28447",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-19T06:15:07.697",
|
||||
"lastModified": "2024-03-19T06:15:07.697",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Shenzhen Libituo Technology Co., Ltd LBT-T300-mini1 v1.2.9 was discovered to contain a buffer overflow via lan_ipaddr parameters at /apply.cgi."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/AdamRitz/lbtvul/blob/main/t300mini.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
README.md
24
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-19T05:00:37.694292+00:00
|
||||
2024-03-19T07:00:38.833088+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-19T04:15:07.710000+00:00
|
||||
2024-03-19T06:15:07.697000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,23 +29,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
241949
|
||||
241956
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `7`
|
||||
|
||||
* [CVE-2024-21503](CVE-2024/CVE-2024-215xx/CVE-2024-21503.json) (`2024-03-19T05:15:09.447`)
|
||||
* [CVE-2024-21504](CVE-2024/CVE-2024-215xx/CVE-2024-21504.json) (`2024-03-19T05:15:09.813`)
|
||||
* [CVE-2024-22017](CVE-2024/CVE-2024-220xx/CVE-2024-22017.json) (`2024-03-19T05:15:10.073`)
|
||||
* [CVE-2024-22025](CVE-2024/CVE-2024-220xx/CVE-2024-22025.json) (`2024-03-19T05:15:10.267`)
|
||||
* [CVE-2024-26369](CVE-2024/CVE-2024-263xx/CVE-2024-26369.json) (`2024-03-19T06:15:06.267`)
|
||||
* [CVE-2024-28446](CVE-2024/CVE-2024-284xx/CVE-2024-28446.json) (`2024-03-19T06:15:07.547`)
|
||||
* [CVE-2024-28447](CVE-2024/CVE-2024-284xx/CVE-2024-28447.json) (`2024-03-19T06:15:07.697`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `4`
|
||||
Recently modified CVEs: `3`
|
||||
|
||||
* [CVE-2023-47995](CVE-2023/CVE-2023-479xx/CVE-2023-47995.json) (`2024-03-19T03:15:06.180`)
|
||||
* [CVE-2023-47997](CVE-2023/CVE-2023-479xx/CVE-2023-47997.json) (`2024-03-19T03:15:06.623`)
|
||||
* [CVE-2024-2604](CVE-2024/CVE-2024-26xx/CVE-2024-2604.json) (`2024-03-19T04:15:07.710`)
|
||||
* [CVE-2024-28757](CVE-2024/CVE-2024-287xx/CVE-2024-28757.json) (`2024-03-19T03:15:06.893`)
|
||||
* [CVE-2023-4459](CVE-2023/CVE-2023-44xx/CVE-2023-4459.json) (`2024-03-19T05:15:08.030`)
|
||||
* [CVE-2023-7192](CVE-2023/CVE-2023-71xx/CVE-2023-7192.json) (`2024-03-19T05:15:09.100`)
|
||||
* [CVE-2024-0646](CVE-2024/CVE-2024-06xx/CVE-2024-0646.json) (`2024-03-19T05:15:09.250`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
21
_state.csv
21
_state.csv
@ -231237,7 +231237,7 @@ CVE-2023-4454,0,0,fe899221eb203df39954aedfaeaf87bdb09afc80eb2c22102da392016705c3
|
||||
CVE-2023-4455,0,0,9528a57f6832fe8e6664fdc368bd3e3314370da9062831e095663a0c221f98f6,2023-08-24T21:11:31.950000
|
||||
CVE-2023-4456,0,0,6d9cdb4689534916ddff63b61413f1e522c8383cf07c0239a48f4e3d5fbfcc73,2023-11-07T04:22:38.447000
|
||||
CVE-2023-4457,0,0,ac60e11809ded7eaccf037584c3d03207cafdbc7826e19cec4254350e1a52269,2023-10-20T15:17:32.870000
|
||||
CVE-2023-4459,0,0,38a43d126f90b707f80b21b71a35a2d4cde68e46fc836a8443cd37a94b9f4319,2024-03-13T15:15:49.370000
|
||||
CVE-2023-4459,0,1,b88832dd787cbeec9bae999e0095944a864720b0a9e2fecd7b0da4bba66a39fd,2024-03-19T05:15:08.030000
|
||||
CVE-2023-4460,0,0,f93ac0cc9ec04f47ebf64d59feccc55ae86604f5338e23e11a38cdb78ed4a09c,2023-12-07T20:31:47.693000
|
||||
CVE-2023-4462,0,0,e8652c1af7020b20d4e3bb76958b75c6ac3b649c3c41d7ee1dc182189606bfe8,2024-02-29T01:41:49.647000
|
||||
CVE-2023-4463,0,0,5778177a2ad3e8beb0474c5e239ee34824ff50d1b13cdbaaaee9b92ed30b0081,2024-02-29T01:41:49.787000
|
||||
@ -233300,9 +233300,9 @@ CVE-2023-47990,0,0,daed7201638b03d322d409f8c2e68b3b87ee903e3469e13218f8deeb9655f
|
||||
CVE-2023-47992,0,0,c229950c1ff8d016d58f7b8471f6f0dfd33354bd2787c70f9695ded528373f2c,2024-01-16T21:03:04.787000
|
||||
CVE-2023-47993,0,0,d509f0985b93dc14d45d553e0fda0ea1960e22399a9c3b5fb1b66e852e58de43,2024-01-16T21:02:52.130000
|
||||
CVE-2023-47994,0,0,7e5f5a9a95c1136c6515e5c730bc838f2a7b51ba862779c554b6a6e9833b52c8,2024-01-16T21:02:41.413000
|
||||
CVE-2023-47995,0,1,46ca2539868dcba0da257c1e061d739752e20607f6787d5c80af6ed21ff6f391,2024-03-19T03:15:06.180000
|
||||
CVE-2023-47995,0,0,46ca2539868dcba0da257c1e061d739752e20607f6787d5c80af6ed21ff6f391,2024-03-19T03:15:06.180000
|
||||
CVE-2023-47996,0,0,0973baa44d38a710911d854c36b21249c760e04d45180d9226f7f74b1ef71d90,2024-01-16T20:59:05.917000
|
||||
CVE-2023-47997,0,1,8cf19cd77ed5fae90472f567b0721dea844214c03c41f5d0b4f1983c2182a951,2024-03-19T03:15:06.623000
|
||||
CVE-2023-47997,0,0,8cf19cd77ed5fae90472f567b0721dea844214c03c41f5d0b4f1983c2182a951,2024-03-19T03:15:06.623000
|
||||
CVE-2023-4800,0,0,35afc9aedc31f156b4f38cf5decaddabcd0b1c2888a2021de3479af11f68d5d7,2023-11-07T04:22:59.303000
|
||||
CVE-2023-48003,0,0,25ca5ca575130af3374feb4b17fb73bbeebf39b4f544610fb4b5f484a1267a6c,2024-01-04T03:17:21.990000
|
||||
CVE-2023-4801,0,0,4b3301abd0ab2b328cca0ce1d3b798d3d94cc4519cede5c0ea69f577216928f7,2023-09-15T19:06:01.270000
|
||||
@ -237662,7 +237662,7 @@ CVE-2023-7188,0,0,852cd48c16fe0b4232c1cc1e9892899282c0d5a5fa43f1b8f320174637d432
|
||||
CVE-2023-7189,0,0,58a77aeec688a533f21ed0a4a9d71eb0705fbd19c0515c4ff17f03cfd1fda1ea,2024-02-29T01:42:59.443000
|
||||
CVE-2023-7190,0,0,525bdeccc55a9711a53be90441300e5c3c4140cb068f0b2822d05bced8bf600b,2024-02-29T01:42:59.540000
|
||||
CVE-2023-7191,0,0,e88be4c11ad575ba542d73410e05ca9713d2c182f91e9bea29393daea35a5564,2024-02-29T01:42:59.630000
|
||||
CVE-2023-7192,0,0,31cb4f2964d285c5642b818e442c491450b2d2f782a22b53435e6ee28d74a86f,2024-03-13T15:15:50.313000
|
||||
CVE-2023-7192,0,1,c8d2745a9bc4a273527e90949c72631c3b3b7af44c972ba7d9bafc29405b2df6,2024-03-19T05:15:09.100000
|
||||
CVE-2023-7193,0,0,a8537a9a993f65c4193859072543f394186e6722552129f1f6417c478374bc9d,2024-02-29T01:42:59.733000
|
||||
CVE-2023-7194,0,0,c12012004827cd0bc34ce11f51f4d80b4388d10ba3ae2687522e188646b70ac8,2024-01-25T02:02:01.610000
|
||||
CVE-2023-7198,0,0,5606627204fd1346b6fe26c836439a1783648ce0b7fc4e92446c427eb2e96f6a,2024-02-27T14:20:06.637000
|
||||
@ -238151,7 +238151,7 @@ CVE-2024-0641,0,0,a011c2128d997633c3943566b2966020fb742742c755347ad42b0febd95e30
|
||||
CVE-2024-0642,0,0,a90bcf6571ee802087327f525ede816b704f8421563c66e3216693601bbf1072,2024-01-24T19:29:41.893000
|
||||
CVE-2024-0643,0,0,aa848a8e1b8cfe92b510534ff6e1f903f998e7f6bc6404cff677acb1bb355f8f,2024-01-24T19:27:40.553000
|
||||
CVE-2024-0645,0,0,e3ff0667dc75a2979d99db4153cc7d61b0ceb0c517f4cea54262eeab768eb5f4,2024-01-24T19:24:06.717000
|
||||
CVE-2024-0646,0,0,a1ca47ab9f4761b7236f4a9b227507af07f7e13962ba5a859982b5128ea6fe7f,2024-03-13T15:15:50.503000
|
||||
CVE-2024-0646,0,1,7e4b9686d0d568c51a7f698a5519166ecc4cfc2fe106b6715ac6290b3f638b9d,2024-03-19T05:15:09.250000
|
||||
CVE-2024-0647,0,0,0332e6d59eefdc64eb05b07e4fa46b058d042ccaea99c8f45f753fe35b015cbb,2024-02-29T01:43:23.930000
|
||||
CVE-2024-0648,0,0,a4f5a25e8c9710190b25da008c97da5d141e1a6619a4b29f822c0647da977a03,2024-02-29T01:43:24.013000
|
||||
CVE-2024-0649,0,0,1ed5652bc1679829cc2258e6f05d507deca75bc30838839b4d286f0055698888,2024-02-29T01:43:24.097000
|
||||
@ -239518,6 +239518,8 @@ CVE-2024-2150,0,0,b83314ad56669588db95aa786ae7a17f777458826d382001055429649dadce
|
||||
CVE-2024-21500,0,0,c7cd747e0f0c4b38d8e4dbe19bee0ca66b1639098d16200b89805bcc371371ae,2024-02-20T19:50:53.960000
|
||||
CVE-2024-21501,0,0,130609650a6eb4f8bc8998fc23ffe06266af91576d81d0c32d1798485b0b5ef0,2024-03-06T14:15:48.343000
|
||||
CVE-2024-21502,0,0,253b7cd8cd65099448332976329a521bac2b28af5e046192a7c42ab6af135b17,2024-02-26T13:42:22.567000
|
||||
CVE-2024-21503,1,1,2a36a1a5fed9fa183ac791c22d331872eb5d5935cbb721aeb5dc38bd4860eedb,2024-03-19T05:15:09.447000
|
||||
CVE-2024-21504,1,1,98f52e8e564b1a295f7b7c821232de2d94a2633e837d34077a0bedb064ca31d7,2024-03-19T05:15:09.813000
|
||||
CVE-2024-2151,0,0,495640d86128d2bc0aeeff77d3b870070f1388478e718a7bad3a177fbcc68beb,2024-03-04T13:58:23.447000
|
||||
CVE-2024-2152,0,0,d677d760100442be712e5eec50e33d95d66b2aa83966714505912fafaea405bb,2024-03-04T13:58:23.447000
|
||||
CVE-2024-2153,0,0,fb8a655e3fba8ce0afef143bbe07f9318fe9ac9ad4a4312149ae082896b81088,2024-03-04T13:58:23.447000
|
||||
@ -239704,10 +239706,12 @@ CVE-2024-22010,0,0,c8be08522110436a9d4fa99d4021d5a2fb6c1481cb50733e6d40fe00f78ad
|
||||
CVE-2024-22011,0,0,0b600b1e31e74facb27c71d7c9b3f514c8b8b4c777fc0d39f1c7ce9fc8756817,2024-03-12T12:40:13.500000
|
||||
CVE-2024-22012,0,0,6083637305fc19ea62a8c209ebe6bfac1cd035e045c787ca530a090291dc1971,2024-03-12T21:15:57.953000
|
||||
CVE-2024-22016,0,0,72bb3341c866069974fe863b6c9e848e25809f5f0697d51cda8a3c348c9671f4,2024-02-07T17:33:12.727000
|
||||
CVE-2024-22017,1,1,14a3fcdf6f182b423fd9f5e9942b0441a65dbbd11c9c79f1c863b5211adc660b,2024-03-19T05:15:10.073000
|
||||
CVE-2024-22019,0,0,f2437e68c6ddb8f7177f54a0e9f52e5ca8426b13996c7a8a6cfcbbb0d671c60e,2024-03-15T11:15:08.807000
|
||||
CVE-2024-22021,0,0,ba38d4b86a2c5af951f989c7a28594b6207f0b19739ba3d580be6e4d49001bfb,2024-02-29T01:44:04.690000
|
||||
CVE-2024-22022,0,0,925c0d46bbd39b5d0f2644b5e26e0cd82488a20b7de7cccfa4639e9bb8f60d9e,2024-02-15T18:45:30.887000
|
||||
CVE-2024-22024,0,0,980d44adebdc63cfe4985efd7aa2ee2044d33423093fc7c9f165c43f20a43115,2024-02-13T15:15:32.193000
|
||||
CVE-2024-22025,1,1,86fafa4f33c0e6fa4f2207a6a7311c72b954a26bcbe7a62e0f3dc1d575de20c3,2024-03-19T05:15:10.267000
|
||||
CVE-2024-22027,0,0,0822e6ca4a0197c830c667319442a46ae27f8152642de8d7f05f1858eada021b,2024-01-18T20:02:46.993000
|
||||
CVE-2024-22028,0,0,8abd1038154eaf5ca23784f859ed6e719a17c93e427bf707fe61eab823cdcecc,2024-01-22T20:22:47.847000
|
||||
CVE-2024-22039,0,0,ef8c56b19d2a3b2c57a146991f2128767113626aa58dc9954ac8669d3630e403,2024-03-12T12:40:13.500000
|
||||
@ -241368,7 +241372,7 @@ CVE-2024-26033,0,0,a62f89ca33c1301b3a8553ce4a902ac0986ba96609d90d7ba8159a4334ce3
|
||||
CVE-2024-26034,0,0,35110260ffd27f8b9039a8623f4cdd752639fac9afb8175ed15ab5f3af291bf5,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26035,0,0,959e3b7742979ce4ac183e1633741df1f331595110945682f4bb44401d1b75ec,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26038,0,0,4be9be259e1e9c3fa3225cc05b36a049686fb0adace908f95fb41412cb6e0bcb,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2604,0,1,3098a184d89606ed318da8f184dbdea962bbb0424dd4fb48dd052f7924ba78c2,2024-03-19T04:15:07.710000
|
||||
CVE-2024-2604,0,0,3098a184d89606ed318da8f184dbdea962bbb0424dd4fb48dd052f7924ba78c2,2024-03-19T04:15:07.710000
|
||||
CVE-2024-26040,0,0,b0ae3a36c80524fb04d890d078dcb86cbdb5b2e4d0d6158071755615a9b80c36,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26041,0,0,0799c5eeb4cb0b95b90068c43bb829bcbdbd6098bbf70f9d3eaf8431ea269ecb,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26042,0,0,927f70a352d7c944271929f8711b34e89bf0c26c9040985cbf997f7bb85f142c,2024-03-18T19:40:00.173000
|
||||
@ -241503,6 +241507,7 @@ CVE-2024-26349,0,0,01186c28ef719dd0149527c4abd8d67b60279349307693d6719ba1d7ab32d
|
||||
CVE-2024-26350,0,0,1f62ec8cd425e84b1282a5e55493461489796820c50a425af585677fa2bae43e,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26351,0,0,61b98d66760f09ba8a0757ca890b9ad836349a62d566c880c0eb8336d14dbb04,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26352,0,0,ed876b320273da7c752d57a08640f2d98ce80b026324bdf46d0712ec0097ce54,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26369,1,1,bbf7f56a04a37dfe1f3ccce0f59653fe19675329bafc0dad09256de06ce153d2,2024-03-19T06:15:06.267000
|
||||
CVE-2024-26445,0,0,3735cabd04dab3a1baa3e135ef467df65425520025be25bd7cf66dc1b1b0bf61,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26450,0,0,e70e1c7044e1447bb73bfa4a556135e1953f1916a7225089ba5c38735bf8ee34,2024-03-09T08:15:06.120000
|
||||
CVE-2024-26454,0,0,bae0c35b4dfcdbee5c6f4167647fab36cadeab218796adaaf17826bd73693c56,2024-03-15T12:53:06.423000
|
||||
@ -241899,6 +241904,8 @@ CVE-2024-28429,0,0,caaa64487b84149266e9e941a72e13f93e6070c94b1fe7355fb56db4eb5b2
|
||||
CVE-2024-28430,0,0,bf34fb49e742ebf9176808c1e05b7467ed1662a29a5c18afe29f976454928e37,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28431,0,0,148c6be422e12f315897bdd57f5208c74e8137e452c7019eafe29f97f527c418,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28432,0,0,4bc8c3df18623e8712ef966fb24c80f6754436b2eb6a0c14d5d3c56f5a161090,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28446,1,1,8a9199274a5a035e1881ec7fd714011fa6cb19f218db9ccd8c619f1bace2e3d1,2024-03-19T06:15:07.547000
|
||||
CVE-2024-28447,1,1,0380c907287ee8a708bc6550562550ab516ab4c431a794e3e88a4816cc06fdcb,2024-03-19T06:15:07.697000
|
||||
CVE-2024-28535,0,0,05b59fc574e3ec1a67ffae1023c5999e94849ce19d6ee2f539dda71a994d8b6c,2024-03-12T16:02:33.900000
|
||||
CVE-2024-28537,0,0,ff6bf2a37289dca28bccb57e311acb6479e1a577841d298af6b3b484403dfc2c,2024-03-18T19:40:00.173000
|
||||
CVE-2024-28547,0,0,a2de8a258b087cbf7c5442c921d96afce5895db417e9c628fe7656334d2bb7cc,2024-03-18T19:40:00.173000
|
||||
@ -241932,7 +241939,7 @@ CVE-2024-28746,0,0,4e08f19b517756fb15fbaf966494c1aeec3b9803b4e2b615b4d5a557eb48c
|
||||
CVE-2024-28752,0,0,b6856abb589c0fed02798f341901c4f3025e287fced11706e9fa0c89b392cd6a,2024-03-15T12:53:06.423000
|
||||
CVE-2024-28753,0,0,73ca850c1b6879daba607bc61d7d16457b56173a47004b8bff799b514a526c36,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3b2c,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28757,0,1,83cb6aefc1d6f4ccc5441198cdfc19ec27b4e109d2bc2864c936baa137f8e197,2024-03-19T03:15:06.893000
|
||||
CVE-2024-28757,0,0,83cb6aefc1d6f4ccc5441198cdfc19ec27b4e109d2bc2864c936baa137f8e197,2024-03-19T03:15:06.893000
|
||||
CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000
|
||||
CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000
|
||||
CVE-2024-28847,0,0,77ca7298b6799783b77992e414cebfaaf69a1bd2c05124cbdf6b914d3e0bb310,2024-03-17T22:38:29.433000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user