mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2024-03-19T07:00:38.833088+00:00
This commit is contained in:
parent
5d0b05a29a
commit
91dd70d371
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-4459",
|
"id": "CVE-2023-4459",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2023-08-21T19:15:09.373",
|
"published": "2023-08-21T19:15:09.373",
|
||||||
"lastModified": "2024-03-13T15:15:49.370",
|
"lastModified": "2024-03-19T05:15:08.030",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -127,6 +127,10 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2024:1306",
|
"url": "https://access.redhat.com/errata/RHSA-2024:1306",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:1367",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-4459",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-4459",
|
||||||
"source": "secalert@redhat.com",
|
"source": "secalert@redhat.com",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-7192",
|
"id": "CVE-2023-7192",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2024-01-02T19:15:11.510",
|
"published": "2024-01-02T19:15:11.510",
|
||||||
"lastModified": "2024-03-13T15:15:50.313",
|
"lastModified": "2024-03-19T05:15:09.100",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -139,6 +139,10 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2024:1306",
|
"url": "https://access.redhat.com/errata/RHSA-2024:1306",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:1367",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-7192",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-7192",
|
||||||
"source": "secalert@redhat.com",
|
"source": "secalert@redhat.com",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-0646",
|
"id": "CVE-2024-0646",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2024-01-17T16:15:47.190",
|
"published": "2024-01-17T16:15:47.190",
|
||||||
"lastModified": "2024-03-13T15:15:50.503",
|
"lastModified": "2024-03-19T05:15:09.250",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -193,6 +193,14 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2024:1306",
|
"url": "https://access.redhat.com/errata/RHSA-2024:1306",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:1367",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:1368",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2024-0646",
|
"url": "https://access.redhat.com/security/cve/CVE-2024-0646",
|
||||||
"source": "secalert@redhat.com",
|
"source": "secalert@redhat.com",
|
||||||
|
63
CVE-2024/CVE-2024-215xx/CVE-2024-21503.json
Normal file
63
CVE-2024/CVE-2024-215xx/CVE-2024-21503.json
Normal file
@ -0,0 +1,63 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-21503",
|
||||||
|
"sourceIdentifier": "report@snyk.io",
|
||||||
|
"published": "2024-03-19T05:15:09.447",
|
||||||
|
"lastModified": "2024-03-19T05:15:09.447",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service.\r\rExploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "report@snyk.io",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "report@snyk.io",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-1333"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/psf/black/commit/f00093672628d212b8965a8993cee8bedf5fe9b8",
|
||||||
|
"source": "report@snyk.io"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/psf/black/releases/tag/24.3.0",
|
||||||
|
"source": "report@snyk.io"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://security.snyk.io/vuln/SNYK-PYTHON-BLACK-6256273",
|
||||||
|
"source": "report@snyk.io"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
67
CVE-2024/CVE-2024-215xx/CVE-2024-21504.json
Normal file
67
CVE-2024/CVE-2024-215xx/CVE-2024-21504.json
Normal file
@ -0,0 +1,67 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-21504",
|
||||||
|
"sourceIdentifier": "report@snyk.io",
|
||||||
|
"published": "2024-03-19T05:15:09.813",
|
||||||
|
"lastModified": "2024-03-19T05:15:09.813",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Versions of the package livewire/livewire from 3.3.5 and before 3.4.9 are vulnerable to Cross-site Scripting (XSS) when a page uses [Url] for a property. An attacker can inject HTML code in the context of the user's browser session by crafting a malicious link and convincing the user to click on it."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "report@snyk.io",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "report@snyk.io",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/livewire/livewire/commit/c65b3f0798ab2c9338213ede3588c3cdf4e6fcc0",
|
||||||
|
"source": "report@snyk.io"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/livewire/livewire/pull/8117",
|
||||||
|
"source": "report@snyk.io"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/livewire/livewire/releases/tag/v3.4.9",
|
||||||
|
"source": "report@snyk.io"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://security.snyk.io/vuln/SNYK-PHP-LIVEWIRELIVEWIRE-6446222",
|
||||||
|
"source": "report@snyk.io"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
43
CVE-2024/CVE-2024-220xx/CVE-2024-22017.json
Normal file
43
CVE-2024/CVE-2024-220xx/CVE-2024-22017.json
Normal file
@ -0,0 +1,43 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-22017",
|
||||||
|
"sourceIdentifier": "support@hackerone.com",
|
||||||
|
"published": "2024-03-19T05:15:10.073",
|
||||||
|
"lastModified": "2024-03-19T05:15:10.073",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "setuid() does not affect libuv's internal io_uring operations if initialized before the call to setuid().\nThis allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid().\nThis vulnerability affects all users using version greater or equal than Node.js 18.18.0, Node.js 20.4.0 and Node.js 21."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "support@hackerone.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 7.3,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.5,
|
||||||
|
"impactScore": 5.3
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://hackerone.com/reports/2170226",
|
||||||
|
"source": "support@hackerone.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
43
CVE-2024/CVE-2024-220xx/CVE-2024-22025.json
Normal file
43
CVE-2024/CVE-2024-220xx/CVE-2024-22025.json
Normal file
@ -0,0 +1,43 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-22025",
|
||||||
|
"sourceIdentifier": "support@hackerone.com",
|
||||||
|
"published": "2024-03-19T05:15:10.267",
|
||||||
|
"lastModified": "2024-03-19T05:15:10.267",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability in Node.js has been identified, allowing for a Denial of Service (DoS) attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL.\nThe vulnerability stems from the fact that the fetch() function in Node.js always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL.\nAn attacker controlling the URL passed into fetch() can exploit this vulnerability to exhaust memory, potentially leading to process termination, depending on the system configuration."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "support@hackerone.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://hackerone.com/reports/2284065",
|
||||||
|
"source": "support@hackerone.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
24
CVE-2024/CVE-2024-263xx/CVE-2024-26369.json
Normal file
24
CVE-2024/CVE-2024-263xx/CVE-2024-26369.json
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-26369",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-03-19T06:15:06.267",
|
||||||
|
"lastModified": "2024-03-19T06:15:06.267",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An issue in the HistoryQosPolicy component of FastDDS v2.12.x, v2.11.x, v2.10.x, and v2.6.x leads to a SIGABRT (signal abort) upon receiving DataWriter's data."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/eProsima/Fast-DDS/issues/4365",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/eProsima/Fast-DDS/pull/4375",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
20
CVE-2024/CVE-2024-284xx/CVE-2024-28446.json
Normal file
20
CVE-2024/CVE-2024-284xx/CVE-2024-28446.json
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28446",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-03-19T06:15:07.547",
|
||||||
|
"lastModified": "2024-03-19T06:15:07.547",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Shenzhen Libituo Technology Co., Ltd LBT-T300-mini1 v1.2.9 was discovered to contain a buffer overflow via lan_netmask parameter at /apply.cgi."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/AdamRitz/lbtvul/blob/main/t300mini.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
20
CVE-2024/CVE-2024-284xx/CVE-2024-28447.json
Normal file
20
CVE-2024/CVE-2024-284xx/CVE-2024-28447.json
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28447",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-03-19T06:15:07.697",
|
||||||
|
"lastModified": "2024-03-19T06:15:07.697",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Shenzhen Libituo Technology Co., Ltd LBT-T300-mini1 v1.2.9 was discovered to contain a buffer overflow via lan_ipaddr parameters at /apply.cgi."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/AdamRitz/lbtvul/blob/main/t300mini.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
24
README.md
24
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-03-19T05:00:37.694292+00:00
|
2024-03-19T07:00:38.833088+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-03-19T04:15:07.710000+00:00
|
2024-03-19T06:15:07.697000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -29,23 +29,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
241949
|
241956
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `0`
|
Recently added CVEs: `7`
|
||||||
|
|
||||||
|
* [CVE-2024-21503](CVE-2024/CVE-2024-215xx/CVE-2024-21503.json) (`2024-03-19T05:15:09.447`)
|
||||||
|
* [CVE-2024-21504](CVE-2024/CVE-2024-215xx/CVE-2024-21504.json) (`2024-03-19T05:15:09.813`)
|
||||||
|
* [CVE-2024-22017](CVE-2024/CVE-2024-220xx/CVE-2024-22017.json) (`2024-03-19T05:15:10.073`)
|
||||||
|
* [CVE-2024-22025](CVE-2024/CVE-2024-220xx/CVE-2024-22025.json) (`2024-03-19T05:15:10.267`)
|
||||||
|
* [CVE-2024-26369](CVE-2024/CVE-2024-263xx/CVE-2024-26369.json) (`2024-03-19T06:15:06.267`)
|
||||||
|
* [CVE-2024-28446](CVE-2024/CVE-2024-284xx/CVE-2024-28446.json) (`2024-03-19T06:15:07.547`)
|
||||||
|
* [CVE-2024-28447](CVE-2024/CVE-2024-284xx/CVE-2024-28447.json) (`2024-03-19T06:15:07.697`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `4`
|
Recently modified CVEs: `3`
|
||||||
|
|
||||||
* [CVE-2023-47995](CVE-2023/CVE-2023-479xx/CVE-2023-47995.json) (`2024-03-19T03:15:06.180`)
|
* [CVE-2023-4459](CVE-2023/CVE-2023-44xx/CVE-2023-4459.json) (`2024-03-19T05:15:08.030`)
|
||||||
* [CVE-2023-47997](CVE-2023/CVE-2023-479xx/CVE-2023-47997.json) (`2024-03-19T03:15:06.623`)
|
* [CVE-2023-7192](CVE-2023/CVE-2023-71xx/CVE-2023-7192.json) (`2024-03-19T05:15:09.100`)
|
||||||
* [CVE-2024-2604](CVE-2024/CVE-2024-26xx/CVE-2024-2604.json) (`2024-03-19T04:15:07.710`)
|
* [CVE-2024-0646](CVE-2024/CVE-2024-06xx/CVE-2024-0646.json) (`2024-03-19T05:15:09.250`)
|
||||||
* [CVE-2024-28757](CVE-2024/CVE-2024-287xx/CVE-2024-28757.json) (`2024-03-19T03:15:06.893`)
|
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
21
_state.csv
21
_state.csv
@ -231237,7 +231237,7 @@ CVE-2023-4454,0,0,fe899221eb203df39954aedfaeaf87bdb09afc80eb2c22102da392016705c3
|
|||||||
CVE-2023-4455,0,0,9528a57f6832fe8e6664fdc368bd3e3314370da9062831e095663a0c221f98f6,2023-08-24T21:11:31.950000
|
CVE-2023-4455,0,0,9528a57f6832fe8e6664fdc368bd3e3314370da9062831e095663a0c221f98f6,2023-08-24T21:11:31.950000
|
||||||
CVE-2023-4456,0,0,6d9cdb4689534916ddff63b61413f1e522c8383cf07c0239a48f4e3d5fbfcc73,2023-11-07T04:22:38.447000
|
CVE-2023-4456,0,0,6d9cdb4689534916ddff63b61413f1e522c8383cf07c0239a48f4e3d5fbfcc73,2023-11-07T04:22:38.447000
|
||||||
CVE-2023-4457,0,0,ac60e11809ded7eaccf037584c3d03207cafdbc7826e19cec4254350e1a52269,2023-10-20T15:17:32.870000
|
CVE-2023-4457,0,0,ac60e11809ded7eaccf037584c3d03207cafdbc7826e19cec4254350e1a52269,2023-10-20T15:17:32.870000
|
||||||
CVE-2023-4459,0,0,38a43d126f90b707f80b21b71a35a2d4cde68e46fc836a8443cd37a94b9f4319,2024-03-13T15:15:49.370000
|
CVE-2023-4459,0,1,b88832dd787cbeec9bae999e0095944a864720b0a9e2fecd7b0da4bba66a39fd,2024-03-19T05:15:08.030000
|
||||||
CVE-2023-4460,0,0,f93ac0cc9ec04f47ebf64d59feccc55ae86604f5338e23e11a38cdb78ed4a09c,2023-12-07T20:31:47.693000
|
CVE-2023-4460,0,0,f93ac0cc9ec04f47ebf64d59feccc55ae86604f5338e23e11a38cdb78ed4a09c,2023-12-07T20:31:47.693000
|
||||||
CVE-2023-4462,0,0,e8652c1af7020b20d4e3bb76958b75c6ac3b649c3c41d7ee1dc182189606bfe8,2024-02-29T01:41:49.647000
|
CVE-2023-4462,0,0,e8652c1af7020b20d4e3bb76958b75c6ac3b649c3c41d7ee1dc182189606bfe8,2024-02-29T01:41:49.647000
|
||||||
CVE-2023-4463,0,0,5778177a2ad3e8beb0474c5e239ee34824ff50d1b13cdbaaaee9b92ed30b0081,2024-02-29T01:41:49.787000
|
CVE-2023-4463,0,0,5778177a2ad3e8beb0474c5e239ee34824ff50d1b13cdbaaaee9b92ed30b0081,2024-02-29T01:41:49.787000
|
||||||
@ -233300,9 +233300,9 @@ CVE-2023-47990,0,0,daed7201638b03d322d409f8c2e68b3b87ee903e3469e13218f8deeb9655f
|
|||||||
CVE-2023-47992,0,0,c229950c1ff8d016d58f7b8471f6f0dfd33354bd2787c70f9695ded528373f2c,2024-01-16T21:03:04.787000
|
CVE-2023-47992,0,0,c229950c1ff8d016d58f7b8471f6f0dfd33354bd2787c70f9695ded528373f2c,2024-01-16T21:03:04.787000
|
||||||
CVE-2023-47993,0,0,d509f0985b93dc14d45d553e0fda0ea1960e22399a9c3b5fb1b66e852e58de43,2024-01-16T21:02:52.130000
|
CVE-2023-47993,0,0,d509f0985b93dc14d45d553e0fda0ea1960e22399a9c3b5fb1b66e852e58de43,2024-01-16T21:02:52.130000
|
||||||
CVE-2023-47994,0,0,7e5f5a9a95c1136c6515e5c730bc838f2a7b51ba862779c554b6a6e9833b52c8,2024-01-16T21:02:41.413000
|
CVE-2023-47994,0,0,7e5f5a9a95c1136c6515e5c730bc838f2a7b51ba862779c554b6a6e9833b52c8,2024-01-16T21:02:41.413000
|
||||||
CVE-2023-47995,0,1,46ca2539868dcba0da257c1e061d739752e20607f6787d5c80af6ed21ff6f391,2024-03-19T03:15:06.180000
|
CVE-2023-47995,0,0,46ca2539868dcba0da257c1e061d739752e20607f6787d5c80af6ed21ff6f391,2024-03-19T03:15:06.180000
|
||||||
CVE-2023-47996,0,0,0973baa44d38a710911d854c36b21249c760e04d45180d9226f7f74b1ef71d90,2024-01-16T20:59:05.917000
|
CVE-2023-47996,0,0,0973baa44d38a710911d854c36b21249c760e04d45180d9226f7f74b1ef71d90,2024-01-16T20:59:05.917000
|
||||||
CVE-2023-47997,0,1,8cf19cd77ed5fae90472f567b0721dea844214c03c41f5d0b4f1983c2182a951,2024-03-19T03:15:06.623000
|
CVE-2023-47997,0,0,8cf19cd77ed5fae90472f567b0721dea844214c03c41f5d0b4f1983c2182a951,2024-03-19T03:15:06.623000
|
||||||
CVE-2023-4800,0,0,35afc9aedc31f156b4f38cf5decaddabcd0b1c2888a2021de3479af11f68d5d7,2023-11-07T04:22:59.303000
|
CVE-2023-4800,0,0,35afc9aedc31f156b4f38cf5decaddabcd0b1c2888a2021de3479af11f68d5d7,2023-11-07T04:22:59.303000
|
||||||
CVE-2023-48003,0,0,25ca5ca575130af3374feb4b17fb73bbeebf39b4f544610fb4b5f484a1267a6c,2024-01-04T03:17:21.990000
|
CVE-2023-48003,0,0,25ca5ca575130af3374feb4b17fb73bbeebf39b4f544610fb4b5f484a1267a6c,2024-01-04T03:17:21.990000
|
||||||
CVE-2023-4801,0,0,4b3301abd0ab2b328cca0ce1d3b798d3d94cc4519cede5c0ea69f577216928f7,2023-09-15T19:06:01.270000
|
CVE-2023-4801,0,0,4b3301abd0ab2b328cca0ce1d3b798d3d94cc4519cede5c0ea69f577216928f7,2023-09-15T19:06:01.270000
|
||||||
@ -237662,7 +237662,7 @@ CVE-2023-7188,0,0,852cd48c16fe0b4232c1cc1e9892899282c0d5a5fa43f1b8f320174637d432
|
|||||||
CVE-2023-7189,0,0,58a77aeec688a533f21ed0a4a9d71eb0705fbd19c0515c4ff17f03cfd1fda1ea,2024-02-29T01:42:59.443000
|
CVE-2023-7189,0,0,58a77aeec688a533f21ed0a4a9d71eb0705fbd19c0515c4ff17f03cfd1fda1ea,2024-02-29T01:42:59.443000
|
||||||
CVE-2023-7190,0,0,525bdeccc55a9711a53be90441300e5c3c4140cb068f0b2822d05bced8bf600b,2024-02-29T01:42:59.540000
|
CVE-2023-7190,0,0,525bdeccc55a9711a53be90441300e5c3c4140cb068f0b2822d05bced8bf600b,2024-02-29T01:42:59.540000
|
||||||
CVE-2023-7191,0,0,e88be4c11ad575ba542d73410e05ca9713d2c182f91e9bea29393daea35a5564,2024-02-29T01:42:59.630000
|
CVE-2023-7191,0,0,e88be4c11ad575ba542d73410e05ca9713d2c182f91e9bea29393daea35a5564,2024-02-29T01:42:59.630000
|
||||||
CVE-2023-7192,0,0,31cb4f2964d285c5642b818e442c491450b2d2f782a22b53435e6ee28d74a86f,2024-03-13T15:15:50.313000
|
CVE-2023-7192,0,1,c8d2745a9bc4a273527e90949c72631c3b3b7af44c972ba7d9bafc29405b2df6,2024-03-19T05:15:09.100000
|
||||||
CVE-2023-7193,0,0,a8537a9a993f65c4193859072543f394186e6722552129f1f6417c478374bc9d,2024-02-29T01:42:59.733000
|
CVE-2023-7193,0,0,a8537a9a993f65c4193859072543f394186e6722552129f1f6417c478374bc9d,2024-02-29T01:42:59.733000
|
||||||
CVE-2023-7194,0,0,c12012004827cd0bc34ce11f51f4d80b4388d10ba3ae2687522e188646b70ac8,2024-01-25T02:02:01.610000
|
CVE-2023-7194,0,0,c12012004827cd0bc34ce11f51f4d80b4388d10ba3ae2687522e188646b70ac8,2024-01-25T02:02:01.610000
|
||||||
CVE-2023-7198,0,0,5606627204fd1346b6fe26c836439a1783648ce0b7fc4e92446c427eb2e96f6a,2024-02-27T14:20:06.637000
|
CVE-2023-7198,0,0,5606627204fd1346b6fe26c836439a1783648ce0b7fc4e92446c427eb2e96f6a,2024-02-27T14:20:06.637000
|
||||||
@ -238151,7 +238151,7 @@ CVE-2024-0641,0,0,a011c2128d997633c3943566b2966020fb742742c755347ad42b0febd95e30
|
|||||||
CVE-2024-0642,0,0,a90bcf6571ee802087327f525ede816b704f8421563c66e3216693601bbf1072,2024-01-24T19:29:41.893000
|
CVE-2024-0642,0,0,a90bcf6571ee802087327f525ede816b704f8421563c66e3216693601bbf1072,2024-01-24T19:29:41.893000
|
||||||
CVE-2024-0643,0,0,aa848a8e1b8cfe92b510534ff6e1f903f998e7f6bc6404cff677acb1bb355f8f,2024-01-24T19:27:40.553000
|
CVE-2024-0643,0,0,aa848a8e1b8cfe92b510534ff6e1f903f998e7f6bc6404cff677acb1bb355f8f,2024-01-24T19:27:40.553000
|
||||||
CVE-2024-0645,0,0,e3ff0667dc75a2979d99db4153cc7d61b0ceb0c517f4cea54262eeab768eb5f4,2024-01-24T19:24:06.717000
|
CVE-2024-0645,0,0,e3ff0667dc75a2979d99db4153cc7d61b0ceb0c517f4cea54262eeab768eb5f4,2024-01-24T19:24:06.717000
|
||||||
CVE-2024-0646,0,0,a1ca47ab9f4761b7236f4a9b227507af07f7e13962ba5a859982b5128ea6fe7f,2024-03-13T15:15:50.503000
|
CVE-2024-0646,0,1,7e4b9686d0d568c51a7f698a5519166ecc4cfc2fe106b6715ac6290b3f638b9d,2024-03-19T05:15:09.250000
|
||||||
CVE-2024-0647,0,0,0332e6d59eefdc64eb05b07e4fa46b058d042ccaea99c8f45f753fe35b015cbb,2024-02-29T01:43:23.930000
|
CVE-2024-0647,0,0,0332e6d59eefdc64eb05b07e4fa46b058d042ccaea99c8f45f753fe35b015cbb,2024-02-29T01:43:23.930000
|
||||||
CVE-2024-0648,0,0,a4f5a25e8c9710190b25da008c97da5d141e1a6619a4b29f822c0647da977a03,2024-02-29T01:43:24.013000
|
CVE-2024-0648,0,0,a4f5a25e8c9710190b25da008c97da5d141e1a6619a4b29f822c0647da977a03,2024-02-29T01:43:24.013000
|
||||||
CVE-2024-0649,0,0,1ed5652bc1679829cc2258e6f05d507deca75bc30838839b4d286f0055698888,2024-02-29T01:43:24.097000
|
CVE-2024-0649,0,0,1ed5652bc1679829cc2258e6f05d507deca75bc30838839b4d286f0055698888,2024-02-29T01:43:24.097000
|
||||||
@ -239518,6 +239518,8 @@ CVE-2024-2150,0,0,b83314ad56669588db95aa786ae7a17f777458826d382001055429649dadce
|
|||||||
CVE-2024-21500,0,0,c7cd747e0f0c4b38d8e4dbe19bee0ca66b1639098d16200b89805bcc371371ae,2024-02-20T19:50:53.960000
|
CVE-2024-21500,0,0,c7cd747e0f0c4b38d8e4dbe19bee0ca66b1639098d16200b89805bcc371371ae,2024-02-20T19:50:53.960000
|
||||||
CVE-2024-21501,0,0,130609650a6eb4f8bc8998fc23ffe06266af91576d81d0c32d1798485b0b5ef0,2024-03-06T14:15:48.343000
|
CVE-2024-21501,0,0,130609650a6eb4f8bc8998fc23ffe06266af91576d81d0c32d1798485b0b5ef0,2024-03-06T14:15:48.343000
|
||||||
CVE-2024-21502,0,0,253b7cd8cd65099448332976329a521bac2b28af5e046192a7c42ab6af135b17,2024-02-26T13:42:22.567000
|
CVE-2024-21502,0,0,253b7cd8cd65099448332976329a521bac2b28af5e046192a7c42ab6af135b17,2024-02-26T13:42:22.567000
|
||||||
|
CVE-2024-21503,1,1,2a36a1a5fed9fa183ac791c22d331872eb5d5935cbb721aeb5dc38bd4860eedb,2024-03-19T05:15:09.447000
|
||||||
|
CVE-2024-21504,1,1,98f52e8e564b1a295f7b7c821232de2d94a2633e837d34077a0bedb064ca31d7,2024-03-19T05:15:09.813000
|
||||||
CVE-2024-2151,0,0,495640d86128d2bc0aeeff77d3b870070f1388478e718a7bad3a177fbcc68beb,2024-03-04T13:58:23.447000
|
CVE-2024-2151,0,0,495640d86128d2bc0aeeff77d3b870070f1388478e718a7bad3a177fbcc68beb,2024-03-04T13:58:23.447000
|
||||||
CVE-2024-2152,0,0,d677d760100442be712e5eec50e33d95d66b2aa83966714505912fafaea405bb,2024-03-04T13:58:23.447000
|
CVE-2024-2152,0,0,d677d760100442be712e5eec50e33d95d66b2aa83966714505912fafaea405bb,2024-03-04T13:58:23.447000
|
||||||
CVE-2024-2153,0,0,fb8a655e3fba8ce0afef143bbe07f9318fe9ac9ad4a4312149ae082896b81088,2024-03-04T13:58:23.447000
|
CVE-2024-2153,0,0,fb8a655e3fba8ce0afef143bbe07f9318fe9ac9ad4a4312149ae082896b81088,2024-03-04T13:58:23.447000
|
||||||
@ -239704,10 +239706,12 @@ CVE-2024-22010,0,0,c8be08522110436a9d4fa99d4021d5a2fb6c1481cb50733e6d40fe00f78ad
|
|||||||
CVE-2024-22011,0,0,0b600b1e31e74facb27c71d7c9b3f514c8b8b4c777fc0d39f1c7ce9fc8756817,2024-03-12T12:40:13.500000
|
CVE-2024-22011,0,0,0b600b1e31e74facb27c71d7c9b3f514c8b8b4c777fc0d39f1c7ce9fc8756817,2024-03-12T12:40:13.500000
|
||||||
CVE-2024-22012,0,0,6083637305fc19ea62a8c209ebe6bfac1cd035e045c787ca530a090291dc1971,2024-03-12T21:15:57.953000
|
CVE-2024-22012,0,0,6083637305fc19ea62a8c209ebe6bfac1cd035e045c787ca530a090291dc1971,2024-03-12T21:15:57.953000
|
||||||
CVE-2024-22016,0,0,72bb3341c866069974fe863b6c9e848e25809f5f0697d51cda8a3c348c9671f4,2024-02-07T17:33:12.727000
|
CVE-2024-22016,0,0,72bb3341c866069974fe863b6c9e848e25809f5f0697d51cda8a3c348c9671f4,2024-02-07T17:33:12.727000
|
||||||
|
CVE-2024-22017,1,1,14a3fcdf6f182b423fd9f5e9942b0441a65dbbd11c9c79f1c863b5211adc660b,2024-03-19T05:15:10.073000
|
||||||
CVE-2024-22019,0,0,f2437e68c6ddb8f7177f54a0e9f52e5ca8426b13996c7a8a6cfcbbb0d671c60e,2024-03-15T11:15:08.807000
|
CVE-2024-22019,0,0,f2437e68c6ddb8f7177f54a0e9f52e5ca8426b13996c7a8a6cfcbbb0d671c60e,2024-03-15T11:15:08.807000
|
||||||
CVE-2024-22021,0,0,ba38d4b86a2c5af951f989c7a28594b6207f0b19739ba3d580be6e4d49001bfb,2024-02-29T01:44:04.690000
|
CVE-2024-22021,0,0,ba38d4b86a2c5af951f989c7a28594b6207f0b19739ba3d580be6e4d49001bfb,2024-02-29T01:44:04.690000
|
||||||
CVE-2024-22022,0,0,925c0d46bbd39b5d0f2644b5e26e0cd82488a20b7de7cccfa4639e9bb8f60d9e,2024-02-15T18:45:30.887000
|
CVE-2024-22022,0,0,925c0d46bbd39b5d0f2644b5e26e0cd82488a20b7de7cccfa4639e9bb8f60d9e,2024-02-15T18:45:30.887000
|
||||||
CVE-2024-22024,0,0,980d44adebdc63cfe4985efd7aa2ee2044d33423093fc7c9f165c43f20a43115,2024-02-13T15:15:32.193000
|
CVE-2024-22024,0,0,980d44adebdc63cfe4985efd7aa2ee2044d33423093fc7c9f165c43f20a43115,2024-02-13T15:15:32.193000
|
||||||
|
CVE-2024-22025,1,1,86fafa4f33c0e6fa4f2207a6a7311c72b954a26bcbe7a62e0f3dc1d575de20c3,2024-03-19T05:15:10.267000
|
||||||
CVE-2024-22027,0,0,0822e6ca4a0197c830c667319442a46ae27f8152642de8d7f05f1858eada021b,2024-01-18T20:02:46.993000
|
CVE-2024-22027,0,0,0822e6ca4a0197c830c667319442a46ae27f8152642de8d7f05f1858eada021b,2024-01-18T20:02:46.993000
|
||||||
CVE-2024-22028,0,0,8abd1038154eaf5ca23784f859ed6e719a17c93e427bf707fe61eab823cdcecc,2024-01-22T20:22:47.847000
|
CVE-2024-22028,0,0,8abd1038154eaf5ca23784f859ed6e719a17c93e427bf707fe61eab823cdcecc,2024-01-22T20:22:47.847000
|
||||||
CVE-2024-22039,0,0,ef8c56b19d2a3b2c57a146991f2128767113626aa58dc9954ac8669d3630e403,2024-03-12T12:40:13.500000
|
CVE-2024-22039,0,0,ef8c56b19d2a3b2c57a146991f2128767113626aa58dc9954ac8669d3630e403,2024-03-12T12:40:13.500000
|
||||||
@ -241368,7 +241372,7 @@ CVE-2024-26033,0,0,a62f89ca33c1301b3a8553ce4a902ac0986ba96609d90d7ba8159a4334ce3
|
|||||||
CVE-2024-26034,0,0,35110260ffd27f8b9039a8623f4cdd752639fac9afb8175ed15ab5f3af291bf5,2024-03-18T19:40:00.173000
|
CVE-2024-26034,0,0,35110260ffd27f8b9039a8623f4cdd752639fac9afb8175ed15ab5f3af291bf5,2024-03-18T19:40:00.173000
|
||||||
CVE-2024-26035,0,0,959e3b7742979ce4ac183e1633741df1f331595110945682f4bb44401d1b75ec,2024-03-18T19:40:00.173000
|
CVE-2024-26035,0,0,959e3b7742979ce4ac183e1633741df1f331595110945682f4bb44401d1b75ec,2024-03-18T19:40:00.173000
|
||||||
CVE-2024-26038,0,0,4be9be259e1e9c3fa3225cc05b36a049686fb0adace908f95fb41412cb6e0bcb,2024-03-18T19:40:00.173000
|
CVE-2024-26038,0,0,4be9be259e1e9c3fa3225cc05b36a049686fb0adace908f95fb41412cb6e0bcb,2024-03-18T19:40:00.173000
|
||||||
CVE-2024-2604,0,1,3098a184d89606ed318da8f184dbdea962bbb0424dd4fb48dd052f7924ba78c2,2024-03-19T04:15:07.710000
|
CVE-2024-2604,0,0,3098a184d89606ed318da8f184dbdea962bbb0424dd4fb48dd052f7924ba78c2,2024-03-19T04:15:07.710000
|
||||||
CVE-2024-26040,0,0,b0ae3a36c80524fb04d890d078dcb86cbdb5b2e4d0d6158071755615a9b80c36,2024-03-18T19:40:00.173000
|
CVE-2024-26040,0,0,b0ae3a36c80524fb04d890d078dcb86cbdb5b2e4d0d6158071755615a9b80c36,2024-03-18T19:40:00.173000
|
||||||
CVE-2024-26041,0,0,0799c5eeb4cb0b95b90068c43bb829bcbdbd6098bbf70f9d3eaf8431ea269ecb,2024-03-18T19:40:00.173000
|
CVE-2024-26041,0,0,0799c5eeb4cb0b95b90068c43bb829bcbdbd6098bbf70f9d3eaf8431ea269ecb,2024-03-18T19:40:00.173000
|
||||||
CVE-2024-26042,0,0,927f70a352d7c944271929f8711b34e89bf0c26c9040985cbf997f7bb85f142c,2024-03-18T19:40:00.173000
|
CVE-2024-26042,0,0,927f70a352d7c944271929f8711b34e89bf0c26c9040985cbf997f7bb85f142c,2024-03-18T19:40:00.173000
|
||||||
@ -241503,6 +241507,7 @@ CVE-2024-26349,0,0,01186c28ef719dd0149527c4abd8d67b60279349307693d6719ba1d7ab32d
|
|||||||
CVE-2024-26350,0,0,1f62ec8cd425e84b1282a5e55493461489796820c50a425af585677fa2bae43e,2024-02-22T19:07:27.197000
|
CVE-2024-26350,0,0,1f62ec8cd425e84b1282a5e55493461489796820c50a425af585677fa2bae43e,2024-02-22T19:07:27.197000
|
||||||
CVE-2024-26351,0,0,61b98d66760f09ba8a0757ca890b9ad836349a62d566c880c0eb8336d14dbb04,2024-02-22T19:07:27.197000
|
CVE-2024-26351,0,0,61b98d66760f09ba8a0757ca890b9ad836349a62d566c880c0eb8336d14dbb04,2024-02-22T19:07:27.197000
|
||||||
CVE-2024-26352,0,0,ed876b320273da7c752d57a08640f2d98ce80b026324bdf46d0712ec0097ce54,2024-02-22T19:07:27.197000
|
CVE-2024-26352,0,0,ed876b320273da7c752d57a08640f2d98ce80b026324bdf46d0712ec0097ce54,2024-02-22T19:07:27.197000
|
||||||
|
CVE-2024-26369,1,1,bbf7f56a04a37dfe1f3ccce0f59653fe19675329bafc0dad09256de06ce153d2,2024-03-19T06:15:06.267000
|
||||||
CVE-2024-26445,0,0,3735cabd04dab3a1baa3e135ef467df65425520025be25bd7cf66dc1b1b0bf61,2024-02-22T19:07:27.197000
|
CVE-2024-26445,0,0,3735cabd04dab3a1baa3e135ef467df65425520025be25bd7cf66dc1b1b0bf61,2024-02-22T19:07:27.197000
|
||||||
CVE-2024-26450,0,0,e70e1c7044e1447bb73bfa4a556135e1953f1916a7225089ba5c38735bf8ee34,2024-03-09T08:15:06.120000
|
CVE-2024-26450,0,0,e70e1c7044e1447bb73bfa4a556135e1953f1916a7225089ba5c38735bf8ee34,2024-03-09T08:15:06.120000
|
||||||
CVE-2024-26454,0,0,bae0c35b4dfcdbee5c6f4167647fab36cadeab218796adaaf17826bd73693c56,2024-03-15T12:53:06.423000
|
CVE-2024-26454,0,0,bae0c35b4dfcdbee5c6f4167647fab36cadeab218796adaaf17826bd73693c56,2024-03-15T12:53:06.423000
|
||||||
@ -241899,6 +241904,8 @@ CVE-2024-28429,0,0,caaa64487b84149266e9e941a72e13f93e6070c94b1fe7355fb56db4eb5b2
|
|||||||
CVE-2024-28430,0,0,bf34fb49e742ebf9176808c1e05b7467ed1662a29a5c18afe29f976454928e37,2024-03-13T14:28:45.217000
|
CVE-2024-28430,0,0,bf34fb49e742ebf9176808c1e05b7467ed1662a29a5c18afe29f976454928e37,2024-03-13T14:28:45.217000
|
||||||
CVE-2024-28431,0,0,148c6be422e12f315897bdd57f5208c74e8137e452c7019eafe29f97f527c418,2024-03-13T14:28:45.217000
|
CVE-2024-28431,0,0,148c6be422e12f315897bdd57f5208c74e8137e452c7019eafe29f97f527c418,2024-03-13T14:28:45.217000
|
||||||
CVE-2024-28432,0,0,4bc8c3df18623e8712ef966fb24c80f6754436b2eb6a0c14d5d3c56f5a161090,2024-03-13T14:28:45.217000
|
CVE-2024-28432,0,0,4bc8c3df18623e8712ef966fb24c80f6754436b2eb6a0c14d5d3c56f5a161090,2024-03-13T14:28:45.217000
|
||||||
|
CVE-2024-28446,1,1,8a9199274a5a035e1881ec7fd714011fa6cb19f218db9ccd8c619f1bace2e3d1,2024-03-19T06:15:07.547000
|
||||||
|
CVE-2024-28447,1,1,0380c907287ee8a708bc6550562550ab516ab4c431a794e3e88a4816cc06fdcb,2024-03-19T06:15:07.697000
|
||||||
CVE-2024-28535,0,0,05b59fc574e3ec1a67ffae1023c5999e94849ce19d6ee2f539dda71a994d8b6c,2024-03-12T16:02:33.900000
|
CVE-2024-28535,0,0,05b59fc574e3ec1a67ffae1023c5999e94849ce19d6ee2f539dda71a994d8b6c,2024-03-12T16:02:33.900000
|
||||||
CVE-2024-28537,0,0,ff6bf2a37289dca28bccb57e311acb6479e1a577841d298af6b3b484403dfc2c,2024-03-18T19:40:00.173000
|
CVE-2024-28537,0,0,ff6bf2a37289dca28bccb57e311acb6479e1a577841d298af6b3b484403dfc2c,2024-03-18T19:40:00.173000
|
||||||
CVE-2024-28547,0,0,a2de8a258b087cbf7c5442c921d96afce5895db417e9c628fe7656334d2bb7cc,2024-03-18T19:40:00.173000
|
CVE-2024-28547,0,0,a2de8a258b087cbf7c5442c921d96afce5895db417e9c628fe7656334d2bb7cc,2024-03-18T19:40:00.173000
|
||||||
@ -241932,7 +241939,7 @@ CVE-2024-28746,0,0,4e08f19b517756fb15fbaf966494c1aeec3b9803b4e2b615b4d5a557eb48c
|
|||||||
CVE-2024-28752,0,0,b6856abb589c0fed02798f341901c4f3025e287fced11706e9fa0c89b392cd6a,2024-03-15T12:53:06.423000
|
CVE-2024-28752,0,0,b6856abb589c0fed02798f341901c4f3025e287fced11706e9fa0c89b392cd6a,2024-03-15T12:53:06.423000
|
||||||
CVE-2024-28753,0,0,73ca850c1b6879daba607bc61d7d16457b56173a47004b8bff799b514a526c36,2024-03-11T01:32:39.697000
|
CVE-2024-28753,0,0,73ca850c1b6879daba607bc61d7d16457b56173a47004b8bff799b514a526c36,2024-03-11T01:32:39.697000
|
||||||
CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3b2c,2024-03-11T01:32:39.697000
|
CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3b2c,2024-03-11T01:32:39.697000
|
||||||
CVE-2024-28757,0,1,83cb6aefc1d6f4ccc5441198cdfc19ec27b4e109d2bc2864c936baa137f8e197,2024-03-19T03:15:06.893000
|
CVE-2024-28757,0,0,83cb6aefc1d6f4ccc5441198cdfc19ec27b4e109d2bc2864c936baa137f8e197,2024-03-19T03:15:06.893000
|
||||||
CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000
|
CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000
|
||||||
CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000
|
CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000
|
||||||
CVE-2024-28847,0,0,77ca7298b6799783b77992e414cebfaaf69a1bd2c05124cbdf6b914d3e0bb310,2024-03-17T22:38:29.433000
|
CVE-2024-28847,0,0,77ca7298b6799783b77992e414cebfaaf69a1bd2c05124cbdf6b914d3e0bb310,2024-03-17T22:38:29.433000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user