mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-03-07T19:00:37.916459+00:00
This commit is contained in:
parent
82c75b9a2d
commit
98efa655f2
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2017-18595",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-09-04T21:15:10.677",
|
||||
"lastModified": "2023-02-23T23:07:23.393",
|
||||
"lastModified": "2024-03-07T17:45:50.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -85,8 +85,44 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.10",
|
||||
"versionEndExcluding": "3.16.55",
|
||||
"matchCriteriaId": "49901FEE-9793-440B-990B-EFE1BF47A04B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.17",
|
||||
"versionEndExcluding": "3.18.91",
|
||||
"matchCriteriaId": "DF019A06-E384-45E0-9249-DF86D759E427"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.19",
|
||||
"versionEndExcluding": "4.1.50",
|
||||
"matchCriteriaId": "F71F6650-13B4-486F-80AC-20D871806D44"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.2",
|
||||
"versionEndExcluding": "4.4.109",
|
||||
"matchCriteriaId": "E7BEC3D4-7038-49AD-B148-012F960F2B29"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5",
|
||||
"versionEndExcluding": "4.9.74",
|
||||
"matchCriteriaId": "5EED08F2-CAB9-4270-8714-16E9C8FAE7C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.14.11",
|
||||
"matchCriteriaId": "A84E4D94-A9A4-424C-8262-0B7B89C8CB6D"
|
||||
"matchCriteriaId": "C9DFD0E4-9A4A-40D5-9DC5-D8DD9F99AC93"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-4886",
|
||||
"sourceIdentifier": "jordan@liggitt.net",
|
||||
"published": "2023-10-25T20:15:09.790",
|
||||
"lastModified": "2023-11-02T18:05:23.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:09.470",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -122,6 +122,10 @@
|
||||
"Mailing List",
|
||||
"Mitigation"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0013/",
|
||||
"source": "jordan@liggitt.net"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1192",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-11-01T20:15:08.597",
|
||||
"lastModified": "2023-11-09T15:24:11.003",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:09.620",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -134,12 +134,8 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=98bea253aa28ad8be2ce565a9ca21beb4a9419e5",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686f",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27859",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-01-22T20:15:46.550",
|
||||
"lastModified": "2024-01-25T02:03:31.223",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:09.753",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -149,6 +149,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0002/",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7105503",
|
||||
"source": "psirt@us.ibm.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28525",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-01T02:15:06.860",
|
||||
"lastModified": "2024-03-01T14:04:26.010",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-07T17:49:21.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
@ -50,14 +70,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:9.7.2.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE06AC34-D09F-4BD8-B115-1691D8643419"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors_web_access:9.7.2.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "13ECE46A-0CFF-4199-A8B3-923077E07484"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/251052",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7124058",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28949",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-01T02:15:07.063",
|
||||
"lastModified": "2024-03-01T14:04:26.010",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-07T17:50:02.250",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
@ -50,14 +70,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:9.7.2.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE06AC34-D09F-4BD8-B115-1691D8643419"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors_web_access:9.7.2.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "13ECE46A-0CFF-4199-A8B3-923077E07484"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/251216",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7124058",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-36328",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-01T16:15:08.177",
|
||||
"lastModified": "2023-11-07T04:16:32.303",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-03-07T17:46:02.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -60,8 +60,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:libtom:libtommath:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2023-05-09",
|
||||
"matchCriteriaId": "0838AE42-FC51-47AA-8752-C22D933B108C"
|
||||
"versionEndExcluding": "1.2.1",
|
||||
"matchCriteriaId": "9BC47322-AA42-412B-9955-4D565114FA8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -73,10 +73,20 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -94,15 +104,27 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3H2PFUTBKQUDSOJXQQS7LUSZQWT3JTW2/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46GORAXZ34MHQNUGJBKS7PJ5NSMIAJGC/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6ZUPWZGPFJ4JOI2NIP7YLRKZD5YXQTBK/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-38161",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-09-12T17:15:22.850",
|
||||
"lastModified": "2023-09-14T18:33:24.090",
|
||||
"lastModified": "2024-03-07T17:46:16.493",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows GDI Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de Elevaci\u00f3n de Privilegios de Windows GDI"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -74,8 +78,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.3448",
|
||||
"matchCriteriaId": "098480E4-3DF9-4AE1-AD98-5A24C7D135FC"
|
||||
"versionEndExcluding": "10.0.19044.3448",
|
||||
"matchCriteriaId": "139662E6-EF56-4398-AEE8-406B8D4F1BC4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45193",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-01-22T19:15:08.520",
|
||||
"lastModified": "2024-01-25T02:04:23.543",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:09.880",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -134,6 +134,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0001/",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7105501",
|
||||
"source": "psirt@us.ibm.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45229",
|
||||
"sourceIdentifier": "infosec@edk2.groups.io",
|
||||
"published": "2024-01-16T16:15:11.533",
|
||||
"lastModified": "2024-01-23T19:39:38.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:10.000",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -121,6 +121,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45230",
|
||||
"sourceIdentifier": "infosec@edk2.groups.io",
|
||||
"published": "2024-01-16T16:15:11.727",
|
||||
"lastModified": "2024-01-23T19:39:22.663",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:10.133",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -120,6 +120,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45231",
|
||||
"sourceIdentifier": "infosec@edk2.groups.io",
|
||||
"published": "2024-01-16T16:15:11.910",
|
||||
"lastModified": "2024-01-23T15:59:40.570",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:10.247",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -120,6 +120,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45232",
|
||||
"sourceIdentifier": "infosec@edk2.groups.io",
|
||||
"published": "2024-01-16T16:15:12.090",
|
||||
"lastModified": "2024-01-23T19:39:11.070",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:10.340",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -120,6 +120,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45233",
|
||||
"sourceIdentifier": "infosec@edk2.groups.io",
|
||||
"published": "2024-01-16T16:15:12.277",
|
||||
"lastModified": "2024-01-23T19:40:59.837",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:10.427",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -120,6 +120,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45234",
|
||||
"sourceIdentifier": "infosec@edk2.groups.io",
|
||||
"published": "2024-01-16T16:15:12.460",
|
||||
"lastModified": "2024-01-23T15:58:34.470",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:10.510",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -120,6 +120,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45235",
|
||||
"sourceIdentifier": "infosec@edk2.groups.io",
|
||||
"published": "2024-01-16T16:15:12.643",
|
||||
"lastModified": "2024-01-23T15:58:27.183",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:10.590",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -120,6 +120,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45236",
|
||||
"sourceIdentifier": "infosec@edk2.groups.io",
|
||||
"published": "2024-01-16T16:15:12.820",
|
||||
"lastModified": "2024-01-23T16:00:56.453",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:10.670",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -112,6 +112,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45237",
|
||||
"sourceIdentifier": "infosec@edk2.groups.io",
|
||||
"published": "2024-01-16T16:15:13.013",
|
||||
"lastModified": "2024-01-23T16:07:09.993",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:10.760",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -112,6 +112,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
|
||||
"source": "infosec@edk2.groups.io"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-47141",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-01-22T21:15:09.367",
|
||||
"lastModified": "2024-01-25T02:01:48.147",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:10.847",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -134,6 +134,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0001/",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7105497",
|
||||
"source": "psirt@us.ibm.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-47145",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-01-07T19:15:08.017",
|
||||
"lastModified": "2024-01-11T16:01:42.240",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:10.943",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -124,6 +124,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0003/",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7105500",
|
||||
"source": "psirt@us.ibm.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-47152",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-01-22T20:15:46.890",
|
||||
"lastModified": "2024-01-25T02:03:02.823",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:11.063",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -124,6 +124,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0001/",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7105605",
|
||||
"source": "psirt@us.ibm.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-47158",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-01-22T20:15:47.077",
|
||||
"lastModified": "2024-02-05T19:15:08.353",
|
||||
"lastModified": "2024-03-07T17:15:11.147",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -159,6 +159,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0002/",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7105496",
|
||||
"source": "psirt@us.ibm.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-47746",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-01-22T19:15:08.730",
|
||||
"lastModified": "2024-01-25T02:04:12.947",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:11.277",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -159,6 +159,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0003/",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7105505",
|
||||
"source": "psirt@us.ibm.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-47747",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-01-22T20:15:47.267",
|
||||
"lastModified": "2024-01-25T02:02:36.850",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:11.373",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -159,6 +159,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0002/",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7105502",
|
||||
"source": "psirt@us.ibm.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-48725",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2024-03-07T15:15:07.733",
|
||||
"lastModified": "2024-03-07T16:15:45.123",
|
||||
"lastModified": "2024-03-07T18:15:46.497",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -54,10 +54,6 @@
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1887",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1887",
|
||||
"source": "talos-cna@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50305",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-01T02:15:07.590",
|
||||
"lastModified": "2024-03-01T14:04:26.010",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-07T17:50:18.457",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.4,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
@ -50,14 +70,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:9.7.2.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE06AC34-D09F-4BD8-B115-1691D8643419"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors_web_access:9.7.2.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "13ECE46A-0CFF-4199-A8B3-923077E07484"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/273336",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7124058",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50308",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-01-22T19:15:09.003",
|
||||
"lastModified": "2024-01-25T02:03:49.987",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:11.473",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -134,6 +134,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0001/",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7105506",
|
||||
"source": "psirt@us.ibm.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-50387",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-14T16:15:45.300",
|
||||
"lastModified": "2024-03-04T03:15:06.217",
|
||||
"lastModified": "2024-03-07T17:15:11.587",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -393,6 +393,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0007/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.athene-center.de/aktuelles/key-trap",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-50868",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-14T16:15:45.377",
|
||||
"lastModified": "2024-03-04T03:15:06.500",
|
||||
"lastModified": "2024-03-07T17:15:11.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -100,6 +100,10 @@
|
||||
"url": "https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0008/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.isc.org/blogs/2024-bind-security-release/",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5043",
|
||||
"sourceIdentifier": "jordan@liggitt.net",
|
||||
"published": "2023-10-25T20:15:18.037",
|
||||
"lastModified": "2023-11-02T17:54:38.423",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:11.983",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -123,6 +123,10 @@
|
||||
"Mailing List",
|
||||
"Mitigation"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0012/",
|
||||
"source": "jordan@liggitt.net"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5044",
|
||||
"sourceIdentifier": "jordan@liggitt.net",
|
||||
"published": "2023-10-25T20:15:18.187",
|
||||
"lastModified": "2023-11-02T17:45:26.790",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:12.073",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -123,6 +123,10 @@
|
||||
"Mailing List",
|
||||
"Mitigation"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0012/",
|
||||
"source": "jordan@liggitt.net"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5088",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-11-03T14:15:08.560",
|
||||
"lastModified": "2023-12-08T19:15:08.203",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-03-07T17:46:40.173",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -89,8 +89,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:qemu:qemu:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D9E0C78-9678-4CEE-9389-962CF618A51F"
|
||||
"criteria": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.2.0",
|
||||
"matchCriteriaId": "8298AC47-931D-466E-8EFF-6F9CD0F0E504"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -148,7 +149,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20231208-0005/",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52426",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-04T20:15:46.120",
|
||||
"lastModified": "2024-02-26T16:27:48.450",
|
||||
"lastModified": "2024-03-07T17:15:11.893",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -98,6 +98,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0005/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6816",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-18T05:15:08.607",
|
||||
"lastModified": "2024-02-09T02:15:08.207",
|
||||
"lastModified": "2024-03-07T17:15:12.180",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -253,6 +253,10 @@
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-30",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0006/",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-7242",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-03-01T21:15:07.213",
|
||||
"lastModified": "2024-03-01T22:22:25.913",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-07T17:50:48.090",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\n\nIndustrial Control Systems Network Protocol Parsers (ICSNPP) - Ethercat \nZeek Plugin versions d78dda6 and prior are vulnerable to out-of-bounds \nread during the process of analyzing a specific Ethercat packet. This \ncould allow an attacker to crash the Zeek process and leak some \ninformation in memory.\n\n\n\n\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Industrial Control Systems Network Protocol Parsers (ICSNPP): las versiones d78dda6 y anteriores del complemento Ethercat Zeek son vulnerables a lecturas fuera de los l\u00edmites durante el proceso de an\u00e1lisis de un paquete Ethercat espec\u00edfico. Esto podr\u00eda permitir que un atacante bloquee el proceso Zeek y filtre informaci\u00f3n en la memoria."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
},
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +59,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +80,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisa:icsnpp-ethercat:*:*:*:*:*:zeek:*:*",
|
||||
"versionEndIncluding": "d78dda6",
|
||||
"matchCriteriaId": "D713D8FB-83DA-4BA8-87B2-CEB65DB5BBFE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-051-02",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"US Government Resource",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-7243",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-03-01T21:15:07.417",
|
||||
"lastModified": "2024-03-01T22:22:25.913",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-07T17:51:08.413",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nIndustrial Control Systems Network Protocol Parsers (ICSNPP) - Ethercat \nZeek Plugin versions d78dda6 and prior are vulnerable to out-of-bounds \nwrite while analyzing specific Ethercat datagrams. This could allow an \nattacker to cause arbitrary code execution.\n\n\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Industrial Control Systems Network Protocol Parsers (ICSNPP): las versiones d78dda6 y anteriores del complemento Ethercat Zeek son vulnerables a escritura fuera de los l\u00edmites al analizar datagramas Ethercat espec\u00edficos. Esto podr\u00eda permitir que un atacante provoque la ejecuci\u00f3n de c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisa:icsnpp-ethercat:*:*:*:*:*:zeek:*:*",
|
||||
"versionEndIncluding": "d78dda6",
|
||||
"matchCriteriaId": "D713D8FB-83DA-4BA8-87B2-CEB65DB5BBFE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-051-02",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"US Government Resource",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-7244",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-03-01T21:15:07.613",
|
||||
"lastModified": "2024-03-01T22:22:25.913",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-07T17:51:19.000",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Industrial Control Systems Network Protocol Parsers (ICSNPP) - Ethercat \nZeek Plugin versions d78dda6 and prior are vulnerable to out-of-bounds \nwrite in their primary analyses function for Ethercat communication \npackets. This could allow an attacker to cause arbitrary code execution.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Industrial Control Systems Network Protocol Parsers (ICSNPP): las versiones d78dda6 y anteriores del complemento Ethercat Zeek son vulnerables a escritura fuera de los l\u00edmites en su funci\u00f3n de an\u00e1lisis principal para paquetes de comunicaci\u00f3n Ethercat. Esto podr\u00eda permitir que un atacante provoque la ejecuci\u00f3n de c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisa:icsnpp-ethercat:*:*:*:*:*:zeek:*:*",
|
||||
"versionEndIncluding": "d78dda6",
|
||||
"matchCriteriaId": "D713D8FB-83DA-4BA8-87B2-CEB65DB5BBFE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-051-02",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"US Government Resource",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0408",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-18T16:15:08.380",
|
||||
"lastModified": "2024-02-09T02:15:08.383",
|
||||
"lastModified": "2024-03-07T17:15:12.400",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -233,6 +233,10 @@
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-30",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0006/",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0409",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-18T16:15:08.593",
|
||||
"lastModified": "2024-02-09T02:15:08.533",
|
||||
"lastModified": "2024-03-07T17:15:12.540",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -234,6 +234,10 @@
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-30",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0006/",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0853",
|
||||
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
|
||||
"published": "2024-02-03T14:15:50.850",
|
||||
"lastModified": "2024-02-16T15:17:48.757",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:12.657",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -89,6 +89,10 @@
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0004/",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
}
|
||||
]
|
||||
}
|
71
CVE-2024/CVE-2024-13xx/CVE-2024-1351.json
Normal file
71
CVE-2024/CVE-2024-13xx/CVE-2024-1351.json
Normal file
@ -0,0 +1,71 @@
|
||||
{
|
||||
"id": "CVE-2024-1351",
|
||||
"sourceIdentifier": "cna@mongodb.com",
|
||||
"published": "2024-03-07T17:15:12.740",
|
||||
"lastModified": "2024-03-07T17:15:12.740",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Under certain configurations of --tlsCAFile and tls.CAFile, MongoDB Server may skip peer certificate validation which may result in untrusted connections to succeed. This may effectively reduce the security guarantees provided by TLS and open connections that should have been closed due to failing certificate validation. This issue affects MongoDB Server v7.0 versions prior to and including 7.0.5, MongoDB Server v6.0 versions prior to and including 6.0.13, MongoDB Server v5.0 versions prior to and including 5.0.24 and MongoDB Server v4.4 versions prior to and including 4.4.28.\n\nRequired Configuration : A server process will allow incoming connections to skip peer certificate validation if the server process was started with TLS enabled (net.tls.mode set to allowTLS, preferTLS, or requireTLS) and without a net.tls.CAFile configured.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@mongodb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@mongodb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jira.mongodb.org/browse/SERVER-72839",
|
||||
"source": "cna@mongodb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mongodb.com/docs/manual/release-notes/4.4/#4.4.29---february-28--2024",
|
||||
"source": "cna@mongodb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mongodb.com/docs/manual/release-notes/7.0/#7.0.6---feb-28--2024",
|
||||
"source": "cna@mongodb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mongodb.com/docs/v5.0/release-notes/5.0/#5.0.25---february-28--2024",
|
||||
"source": "cna@mongodb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mongodb.com/docs/v6.0/release-notes/6.0/#6.0.14---feb-28--2024",
|
||||
"source": "cna@mongodb.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-14xx/CVE-2024-1442.json
Normal file
55
CVE-2024/CVE-2024-14xx/CVE-2024-1442.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-1442",
|
||||
"sourceIdentifier": "security@grafana.com",
|
||||
"published": "2024-03-07T18:15:46.590",
|
||||
"lastModified": "2024-03-07T18:15:46.590",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": " A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.\nDoing this will grant the user access to read, query, edit and delete all data sources within the organization.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@grafana.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@grafana.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://grafana.com/security/security-advisories/cve-2024-1442/",
|
||||
"source": "security@grafana.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21351",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-02-13T18:15:51.333",
|
||||
"lastModified": "2024-02-15T02:00:01.653",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-07T17:48:52.180",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2024-02-13",
|
||||
"cisaActionDue": "2024-03-05",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
@ -12,6 +12,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows SmartScreen Security Feature Bypass Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad SmartScreen de Windows"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -38,10 +42,127 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.10240.20469",
|
||||
"matchCriteriaId": "448534CE-1C07-4DF1-8EDD-C43C3492898B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.14393.6709",
|
||||
"matchCriteriaId": "57927CA7-FE09-43AA-9F66-6E68EE3125D7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.14393.6709",
|
||||
"matchCriteriaId": "6D84C15B-58BF-4124-A1AF-BE62B4259D2D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.17763.5458",
|
||||
"matchCriteriaId": "97FA2666-D83E-4645-AB34-B17DD82A705B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.5458",
|
||||
"matchCriteriaId": "9EF5A993-EF3B-4BE1-8325-62354DD7A7E7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.5458",
|
||||
"matchCriteriaId": "1957C71A-2CE0-4173-8BB6-0BE0E93E9BCC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4046",
|
||||
"matchCriteriaId": "C78776CC-3A9C-41A3-8BEB-D71D92F6579D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4046",
|
||||
"matchCriteriaId": "806CA6D2-42B2-4244-A5ED-D23E6DD56772"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.2777",
|
||||
"matchCriteriaId": "3F7F8173-9E59-48E4-98C9-4BEB6AE79451"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.3155",
|
||||
"matchCriteriaId": "84EDBE52-EFE0-4D6D-AA76-698B6F9687D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.3155",
|
||||
"matchCriteriaId": "900D1DA2-6DA7-4681-966A-B9973B1329EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.5458",
|
||||
"matchCriteriaId": "A9098F92-79E7-4762-A37C-99B4CFA8CDD1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2322",
|
||||
"matchCriteriaId": "5C8F0436-3AFE-48BD-AE92-8F8392DD0A1D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.709",
|
||||
"matchCriteriaId": "B6FCF1A0-6B8E-457A-AB6A-2DE939B9D18B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21351",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21412",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-02-13T18:15:59.903",
|
||||
"lastModified": "2024-02-15T02:00:01.653",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-07T17:48:58.173",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2024-02-13",
|
||||
"cisaActionDue": "2024-03-05",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
@ -12,6 +12,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Internet Shortcut Files Security Feature Bypass Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de archivos de acceso directo a Internet"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -38,10 +42,122 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.17763.5458",
|
||||
"matchCriteriaId": "97FA2666-D83E-4645-AB34-B17DD82A705B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.5458",
|
||||
"matchCriteriaId": "9EF5A993-EF3B-4BE1-8325-62354DD7A7E7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.5458",
|
||||
"matchCriteriaId": "1957C71A-2CE0-4173-8BB6-0BE0E93E9BCC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4046",
|
||||
"matchCriteriaId": "C78776CC-3A9C-41A3-8BEB-D71D92F6579D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.19045.4046",
|
||||
"matchCriteriaId": "9A6AFF70-FED0-4AF5-9D8F-5C90BF982941"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.19045.4046",
|
||||
"matchCriteriaId": "A0B61E17-FC01-4FF3-BF96-37819033F412"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22000.2777",
|
||||
"matchCriteriaId": "481C9CDC-7383-4D08-9608-BDA2F9FADB36"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22000.2777",
|
||||
"matchCriteriaId": "60E272E2-0D33-4342-92C3-5D66C89DE531"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.3155",
|
||||
"matchCriteriaId": "84EDBE52-EFE0-4D6D-AA76-698B6F9687D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22631.3155",
|
||||
"matchCriteriaId": "E2FB8ADD-663B-445B-B0F2-6B5E168D9E2E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22631.3155",
|
||||
"matchCriteriaId": "679CCD68-F014-452C-8D3F-F9D17329779C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.5458",
|
||||
"matchCriteriaId": "A9098F92-79E7-4762-A37C-99B4CFA8CDD1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2322",
|
||||
"matchCriteriaId": "5C8F0436-3AFE-48BD-AE92-8F8392DD0A1D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.709",
|
||||
"matchCriteriaId": "B6FCF1A0-6B8E-457A-AB6A-2DE939B9D18B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21412",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-227xx/CVE-2024-22752.json
Normal file
20
CVE-2024/CVE-2024-227xx/CVE-2024-22752.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-22752",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-07T18:15:46.810",
|
||||
"lastModified": "2024-03-07T18:15:46.810",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure permissions issue in EaseUS MobiMover 6.0.5 Build 21620 allows attackers to gain escalated privileges via use of crafted executable launched from the application installation directory."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/hacker625/CVE-2024-22752",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23225",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-05T20:16:01.370",
|
||||
"lastModified": "2024-03-07T02:00:02.283",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-03-07T17:51:50.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2024-03-06",
|
||||
"cisaActionDue": "2024-03-27",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
@ -18,15 +18,94 @@
|
||||
"value": "Se solucion\u00f3 un problema de corrupci\u00f3n de memoria con una validaci\u00f3n mejorada. Este problema se solucion\u00f3 en iOS 16.7.6 y iPadOS 16.7.6, iOS 17.4 y iPadOS 17.4. Un atacante con capacidad arbitraria de lectura y escritura del kernel puede eludir las protecciones de la memoria del kernel. Apple tiene conocimiento de un informe que indica que este problema puede haber sido aprovechado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.7.6",
|
||||
"matchCriteriaId": "E4D5AB12-A4B6-4456-A560-DD1FFE8E8CA8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "E9F4BB50-D14B-4807-8F38-69ADFCE433BC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.7.6",
|
||||
"matchCriteriaId": "2AF8B925-3DE5-4CC8-A4C3-95D8F107D607"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "C2FE8515-300C-4B6F-92A0-7D1E6D93F907"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214081",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214082",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23296",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-05T20:16:01.553",
|
||||
"lastModified": "2024-03-07T02:00:02.283",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-03-07T17:52:12.170",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2024-03-06",
|
||||
"cisaActionDue": "2024-03-27",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
@ -18,11 +18,73 @@
|
||||
"value": "Se solucion\u00f3 un problema de corrupci\u00f3n de memoria con una validaci\u00f3n mejorada. Este problema se solucion\u00f3 en iOS 17.4 y iPadOS 17.4. Un atacante con capacidad arbitraria de lectura y escritura del kernel puede eludir las protecciones de la memoria del kernel. Apple tiene conocimiento de un informe que indica que este problema puede haber sido aprovechado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "CE5413B9-A1A8-499F-B047-163908202E69"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "BCB4911E-7824-4C34-916D-88110CB415EB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214081",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23897",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-01-24T18:15:09.370",
|
||||
"lastModified": "2024-02-29T11:15:08.647",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-03-07T17:47:35.020",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -21,20 +21,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,14 +60,14 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
|
||||
"versionEndIncluding": "2.426.2",
|
||||
"matchCriteriaId": "6007B374-F6EF-48E5-B63B-B5DDDC41B706"
|
||||
"versionEndExcluding": "2.426.3",
|
||||
"matchCriteriaId": "669379F5-5F67-4002-AD76-F8C470C89D61"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*",
|
||||
"versionEndIncluding": "2.441",
|
||||
"matchCriteriaId": "F32E6FB9-B0D3-47A8-A060-D8F85ED38AB7"
|
||||
"versionEndExcluding": "2.442",
|
||||
"matchCriteriaId": "493B263C-C8C7-4741-B7F8-B672E86CC8B4"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -79,7 +79,8 @@
|
||||
"url": "http://packetstormsecurity.com/files/176839/Jenkins-2.441-LTS-2.426.3-CVE-2024-23897-Scanner.html",
|
||||
"source": "jenkinsci-cert@googlegroups.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -87,12 +88,16 @@
|
||||
"source": "jenkinsci-cert@googlegroups.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/01/24/6",
|
||||
"source": "jenkinsci-cert@googlegroups.com"
|
||||
"source": "jenkinsci-cert@googlegroups.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25710",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-02-19T09:15:37.943",
|
||||
"lastModified": "2024-02-22T15:24:45.240",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:12.940",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -104,6 +104,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0010/",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26308",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-02-19T09:15:38.277",
|
||||
"lastModified": "2024-02-22T15:21:36.213",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-07T17:15:13.050",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -84,6 +84,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0009/",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-277xx/CVE-2024-27733.json
Normal file
20
CVE-2024/CVE-2024-277xx/CVE-2024-27733.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-27733",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-07T17:15:13.120",
|
||||
"lastModified": "2024-03-07T17:15:13.120",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "File Upload vulnerability in Byzro Network Smart s42 Management Platform v.S42 allows a local attacker to execute arbitrary code via the useratte/userattestation.php component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Sadw11v/cve/blob/main/upload.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
42
README.md
42
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-07T17:00:30.124741+00:00
|
||||
2024-03-07T19:00:37.916459+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-07T16:15:45.123000+00:00
|
||||
2024-03-07T18:15:46.810000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,22 +29,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
240779
|
||||
240783
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
* [CVE-2023-48725](CVE-2023/CVE-2023-487xx/CVE-2023-48725.json) (`2024-03-07T15:15:07.733`)
|
||||
* [CVE-2024-1351](CVE-2024/CVE-2024-13xx/CVE-2024-1351.json) (`2024-03-07T17:15:12.740`)
|
||||
* [CVE-2024-1442](CVE-2024/CVE-2024-14xx/CVE-2024-1442.json) (`2024-03-07T18:15:46.590`)
|
||||
* [CVE-2024-22752](CVE-2024/CVE-2024-227xx/CVE-2024-22752.json) (`2024-03-07T18:15:46.810`)
|
||||
* [CVE-2024-27733](CVE-2024/CVE-2024-277xx/CVE-2024-27733.json) (`2024-03-07T17:15:13.120`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `47`
|
||||
|
||||
* [CVE-2024-0818](CVE-2024/CVE-2024-08xx/CVE-2024-0818.json) (`2024-03-07T15:15:08.147`)
|
||||
* [CVE-2024-0917](CVE-2024/CVE-2024-09xx/CVE-2024-0917.json) (`2024-03-07T15:15:08.257`)
|
||||
* [CVE-2023-47746](CVE-2023/CVE-2023-477xx/CVE-2023-47746.json) (`2024-03-07T17:15:11.277`)
|
||||
* [CVE-2023-47747](CVE-2023/CVE-2023-477xx/CVE-2023-47747.json) (`2024-03-07T17:15:11.373`)
|
||||
* [CVE-2023-48725](CVE-2023/CVE-2023-487xx/CVE-2023-48725.json) (`2024-03-07T18:15:46.497`)
|
||||
* [CVE-2023-50305](CVE-2023/CVE-2023-503xx/CVE-2023-50305.json) (`2024-03-07T17:50:18.457`)
|
||||
* [CVE-2023-50308](CVE-2023/CVE-2023-503xx/CVE-2023-50308.json) (`2024-03-07T17:15:11.473`)
|
||||
* [CVE-2023-50387](CVE-2023/CVE-2023-503xx/CVE-2023-50387.json) (`2024-03-07T17:15:11.587`)
|
||||
* [CVE-2023-5043](CVE-2023/CVE-2023-50xx/CVE-2023-5043.json) (`2024-03-07T17:15:11.983`)
|
||||
* [CVE-2023-5044](CVE-2023/CVE-2023-50xx/CVE-2023-5044.json) (`2024-03-07T17:15:12.073`)
|
||||
* [CVE-2023-50868](CVE-2023/CVE-2023-508xx/CVE-2023-50868.json) (`2024-03-07T17:15:11.817`)
|
||||
* [CVE-2023-5088](CVE-2023/CVE-2023-50xx/CVE-2023-5088.json) (`2024-03-07T17:46:40.173`)
|
||||
* [CVE-2023-52426](CVE-2023/CVE-2023-524xx/CVE-2023-52426.json) (`2024-03-07T17:15:11.893`)
|
||||
* [CVE-2023-6816](CVE-2023/CVE-2023-68xx/CVE-2023-6816.json) (`2024-03-07T17:15:12.180`)
|
||||
* [CVE-2023-7242](CVE-2023/CVE-2023-72xx/CVE-2023-7242.json) (`2024-03-07T17:50:48.090`)
|
||||
* [CVE-2023-7243](CVE-2023/CVE-2023-72xx/CVE-2023-7243.json) (`2024-03-07T17:51:08.413`)
|
||||
* [CVE-2023-7244](CVE-2023/CVE-2023-72xx/CVE-2023-7244.json) (`2024-03-07T17:51:19.000`)
|
||||
* [CVE-2024-0408](CVE-2024/CVE-2024-04xx/CVE-2024-0408.json) (`2024-03-07T17:15:12.400`)
|
||||
* [CVE-2024-0409](CVE-2024/CVE-2024-04xx/CVE-2024-0409.json) (`2024-03-07T17:15:12.540`)
|
||||
* [CVE-2024-0853](CVE-2024/CVE-2024-08xx/CVE-2024-0853.json) (`2024-03-07T17:15:12.657`)
|
||||
* [CVE-2024-21351](CVE-2024/CVE-2024-213xx/CVE-2024-21351.json) (`2024-03-07T17:48:52.180`)
|
||||
* [CVE-2024-21412](CVE-2024/CVE-2024-214xx/CVE-2024-21412.json) (`2024-03-07T17:48:58.173`)
|
||||
* [CVE-2024-23225](CVE-2024/CVE-2024-232xx/CVE-2024-23225.json) (`2024-03-07T17:51:50.353`)
|
||||
* [CVE-2024-23296](CVE-2024/CVE-2024-232xx/CVE-2024-23296.json) (`2024-03-07T17:52:12.170`)
|
||||
* [CVE-2024-23897](CVE-2024/CVE-2024-238xx/CVE-2024-23897.json) (`2024-03-07T17:47:35.020`)
|
||||
* [CVE-2024-25710](CVE-2024/CVE-2024-257xx/CVE-2024-25710.json) (`2024-03-07T17:15:12.940`)
|
||||
* [CVE-2024-26308](CVE-2024/CVE-2024-263xx/CVE-2024-26308.json) (`2024-03-07T17:15:13.050`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
102
_state.csv
102
_state.csv
@ -101852,7 +101852,7 @@ CVE-2017-18591,0,0,3ccbac5e926ec40a7629e4f7fef9755b4ab09764d021ad8ee525e680cdf8b
|
||||
CVE-2017-18592,0,0,c7eaa76231acd890525b0db3c3436d212df09188e584289ea2bb19fde7592c1d,2019-08-29T15:54:17.940000
|
||||
CVE-2017-18593,0,0,c54163a2100d390258ac438af5b1226d4327bad71c6e00d607e4120c606d7baf,2019-08-30T20:12:44.350000
|
||||
CVE-2017-18594,0,0,2a7680d1879dc6f96384171d5a2142a37493bfce8e80eff155966e1b5b49f149,2019-09-26T12:15:10.347000
|
||||
CVE-2017-18595,0,0,8558c80e0b8fc9a1e74fef93066f692a406db0803e0502d6b6ec32c640368ac0,2023-02-23T23:07:23.393000
|
||||
CVE-2017-18595,0,1,189189ded6d17c97bb926e72a02b05acf0865dfb654a26f83900d08cc8a56288,2024-03-07T17:45:50.977000
|
||||
CVE-2017-18596,0,0,a680c0e03a2412453808a406b270b9ad95d46c1476c97d700869ed68a9b22fbd,2020-08-25T12:35:58.723000
|
||||
CVE-2017-18597,0,0,c8e5f5a8729c5fa9d63aa4e35f77b41425620cc69fbfca075ca329550e7a7108,2019-09-10T20:43:12.960000
|
||||
CVE-2017-18598,0,0,58fd927bb2d75dfdacec027ea1b4385af0d85bd1fbb2b8b42c0381e79bb495ca,2019-09-10T17:21:55.597000
|
||||
@ -211323,7 +211323,7 @@ CVE-2022-4882,0,0,9dbb43dedac8d8de9064de26e4f2fce55f1a52d4bb1c0f26c0dc7d345f3036
|
||||
CVE-2022-4883,0,0,9c652f454eb98f51746b7543d23cdfc2a1cc8d56ddc8392b10b53c00232483c6,2023-10-17T15:55:36.773000
|
||||
CVE-2022-4884,0,0,798b78539b695dec5692fb25024ba248d78abd48f32a8f338fa903542bd07342,2023-01-12T21:23:17.837000
|
||||
CVE-2022-4885,0,0,bff67f132b1382b565b0162be245b1900e23e7966004cd6a8fee33bda4eaac5f,2024-02-29T01:36:49.297000
|
||||
CVE-2022-4886,0,0,f0118a465f292586d5895b5982b510c98abf6dad8e4e9b84d973ed5a281fea61,2023-11-02T18:05:23.427000
|
||||
CVE-2022-4886,0,1,f02ba78f4af0afa851086018a3bea02fdbca24a6362ec8a068c9b4338bba6f6f,2024-03-07T17:15:09.470000
|
||||
CVE-2022-4888,0,0,dafe103df0fcf10fe43033ef8822e9be6466c3bbfd0cc09003954252b8765280,2023-11-07T03:59:13.600000
|
||||
CVE-2022-4889,0,0,f3ecfdbc03bb38e3af4e99289f7aa97aea023da910733a40db189ddf077246dc,2024-02-29T01:36:49.420000
|
||||
CVE-2022-4890,0,0,c371bd2631f37e57be5ee879142ff90121dbebef07aefe82b7e3da223c384390,2024-02-29T01:36:49.533000
|
||||
@ -212529,7 +212529,7 @@ CVE-2023-1188,0,0,9e846fcd955202ae8e9f250598b66bf1a4e6762c2856c97ca89a64f51e62dd
|
||||
CVE-2023-1189,0,0,a449f623733f462d0fa3f359225a02a010e0a82bd005dabddb8d44d07d72a6c4,2024-02-29T01:37:15.830000
|
||||
CVE-2023-1190,0,0,58fc817617f4de7e9634312b320d02d305e334f933890f0b23792bd880d8a678,2024-02-29T01:37:15.927000
|
||||
CVE-2023-1191,0,0,a4d4a636fa5fe21042f36a7cfdae6ed79b29496496db3cc8f6119a2ad31b5dfb,2024-02-29T01:37:16.020000
|
||||
CVE-2023-1192,0,0,572fd38ca16ea64534d08ee116c67e4f5a94ffcad3857d843b21e6e1f83790cc,2023-11-09T15:24:11.003000
|
||||
CVE-2023-1192,0,1,43f75905a84d60b4fe0024fb3344daff56e7e8be72197ab70df11568482fceb6,2024-03-07T17:15:09.620000
|
||||
CVE-2023-1193,0,0,dc2f9a132ac2ca8284383e9305af2b7b7914a5c70822a6ddea25e36d093d4e45,2023-11-09T15:13:51.737000
|
||||
CVE-2023-1194,0,0,e3c489657d9258a7ebcceef6eb19af9ef1f568365ec0d64e22ad7c6e7c28144b,2023-12-21T22:15:08.460000
|
||||
CVE-2023-1195,0,0,c1160a2f7242a2032a241487e2adf46ebd473e7f0b951b8890d61c8afc9c143e,2023-05-26T18:27:29.387000
|
||||
@ -219519,7 +219519,7 @@ CVE-2023-27855,0,0,4b5d8cf13eb565c0f3b89c29aea12274e6f1a048eff52b322eb4d8a9927d1
|
||||
CVE-2023-27856,0,0,57809d3b05a9a8822217e7eb76fccce3a6b30297f5027e1aaf725280c7298ef9,2023-11-07T04:10:19.790000
|
||||
CVE-2023-27857,0,0,2c3920cfac4b731a001d27ee4d27583a3feb911fb3597ad4dbc64b2eae406e44,2024-01-09T02:31:27.647000
|
||||
CVE-2023-27858,0,0,8b6dce34823fa5ed0de7ce94814b7ea16cd2940f9adb89436bfb88a8f0a3d916,2023-11-07T18:07:36.920000
|
||||
CVE-2023-27859,0,0,1d2949ce7a3055d98f4d4e73c8c2698006c5118be13fd6d8b75dd566dfa2196a,2024-01-25T02:03:31.223000
|
||||
CVE-2023-27859,0,1,2c8ef2daff0ff454fc969899b7c73b962d239db8f5fe739d12de46e73882d6ba,2024-03-07T17:15:09.753000
|
||||
CVE-2023-2786,0,0,d8b95aaceeea9d299d494d5d1b67adea7cec45363882e1b8873e4e1f485f5077,2023-06-26T17:48:28.750000
|
||||
CVE-2023-27860,0,0,0f3e27ed4a59a583860342541d3c1eb8233c9ce2ea08284904698844cddf772a,2023-05-04T20:44:00.350000
|
||||
CVE-2023-27861,0,0,8788d89e03f154b568e2330be390285d9f761b5b948a076deb2ddb5f1534c740,2023-06-09T23:58:43.357000
|
||||
@ -220160,7 +220160,7 @@ CVE-2023-2852,0,0,9e7ab75f67deb8e584c7f063682dc633c05ba1ccab104314cbdc92fe0a93db
|
||||
CVE-2023-28520,0,0,6d3894db7ff47e1b21104537808095d722e6ede0f5633aed0fbf9feb507162d6,2023-05-19T17:13:10.227000
|
||||
CVE-2023-28522,0,0,8bbf4232c7eaccf09e2c9b67036392ce612e474f12236686ad3e107906edd35d,2023-05-22T14:51:38.743000
|
||||
CVE-2023-28523,0,0,b3f81f65f3fd5d59de0aa2d2d7713a5ab62c4d885fba8eaa24205c7ae4048d6b,2023-12-12T21:08:23.727000
|
||||
CVE-2023-28525,0,0,171a90a4ed20d9d1f8e3410e030e82a86601140ff3219f322735a44436c864aa,2024-03-01T14:04:26.010000
|
||||
CVE-2023-28525,0,1,81dbf82b3a2de0091cfbc4678f9de712fd8ab41d382437fc0430b3b8faf59c21,2024-03-07T17:49:21.083000
|
||||
CVE-2023-28526,0,0,58ba57da9ce51abaeb6f8cb3241c04b0118e6da3ef91b0bd1de57766333c8ef1,2023-12-12T21:05:56.680000
|
||||
CVE-2023-28527,0,0,3c0856c2c085c342f3eb8c88a01e0a859fac1d2cb11aa4b7cdd086742ed44b3c,2023-12-12T21:05:28.540000
|
||||
CVE-2023-28528,0,0,c604f5a424d72ff383c0d7050e9805d9ced96cd3d5a877a0d4e801f67e21c7c5,2023-05-18T16:15:09.617000
|
||||
@ -220530,7 +220530,7 @@ CVE-2023-28936,0,0,8fe54381164956262dcd17033984b4cbdeb9e60805f90a3970abde4acbd7c
|
||||
CVE-2023-28937,0,0,6e2a8c539f6d09f5964f825bc8d8fd021c125848a7c6be67887a164fe9468016,2023-06-13T10:15:10.047000
|
||||
CVE-2023-28938,0,0,018feb89ef0cceb57c342d9dc53ed05f9f8ff11ec5e877251c1e8007715e4407,2023-11-07T04:10:58.907000
|
||||
CVE-2023-2894,0,0,ad879ae0ef6b122688bafc156258cc3381ab42068278e00bb5364783ef6a423b,2023-11-07T04:13:29.760000
|
||||
CVE-2023-28949,0,0,17a4072fd8e36a61514aa1abfaa2dc64489480fff9f4e9e2ff5ba8b589685124,2024-03-01T14:04:26.010000
|
||||
CVE-2023-28949,0,1,853baa16026593cfc157bb44a21331344c461dee8c775192dcfebdd4fcebdd26,2024-03-07T17:50:02.250000
|
||||
CVE-2023-2895,0,0,50c6f9db7e70a092eee6257538bf888f9ec56cf83a28736b342d2da6788a4d02,2023-11-07T04:13:29.950000
|
||||
CVE-2023-28950,0,0,db426378ac1397a8ecc4a9df6d4f111d2cb20674db30fe6d21f67753d47b3d3b,2023-05-26T14:15:16.233000
|
||||
CVE-2023-28953,0,0,2bad42558e8ded6db3fed9e65e510d495f26ff6ca7de5036d9bab6440feadda1,2023-08-14T19:15:10.920000
|
||||
@ -225597,7 +225597,7 @@ CVE-2023-3632,0,0,320299693720ef84d57d01f8449a73311eb256538d0800daeb747bb6a62157
|
||||
CVE-2023-36321,0,0,cc2c8c53c922b3a2245fc58bf10cc52f422e1d5cbd458d0657415f02299068c4,2023-10-24T23:40:13.823000
|
||||
CVE-2023-36326,0,0,d1df7c74bc35e9a4a028b2d1d5e49b1bb16c66ac96201e75b2edaa0dc8b2a142,2023-09-06T00:04:24.377000
|
||||
CVE-2023-36327,0,0,ae22984d8293ccc36bc9518fead752d9ab8ab03f4342ab78e57b3f79bfb6a331,2023-09-06T00:05:15.863000
|
||||
CVE-2023-36328,0,0,7d2ec1c7abc117d1ebc712441b8623ba7f8f9756b42db50fe7b7f77bfbd1783e,2023-11-07T04:16:32.303000
|
||||
CVE-2023-36328,0,1,8fff2c668bd38b09513a7a452a81cd12d32fbbebecfa02609aed7b2cf6ac27a4,2024-03-07T17:46:02.277000
|
||||
CVE-2023-3633,0,0,3c9f796d8545fe65edc49bfeb6ac0e5b4551cb0003e3d8ef24c186ff877eeb05,2023-07-27T03:56:59.660000
|
||||
CVE-2023-36339,0,0,c0648ec7fac0a5b076652494c53d99ccb043c74046b01d7452b471c486d6b1b1,2023-07-28T21:57:14.937000
|
||||
CVE-2023-36340,0,0,a9c65e0c2e5a644199adc44144e99acaa60e4bd2efbdefc3b1346d65858752d0,2023-10-19T11:10:01.763000
|
||||
@ -226900,7 +226900,7 @@ CVE-2023-38157,0,0,0644654ec7595404d46e68f331c2a5a07662e3022994980569512eb9c14b1
|
||||
CVE-2023-38158,0,0,620a4376a873018b524ed1fa41e8abb1a39d9109805a9c3062e8002716b87355,2023-08-24T21:39:33.910000
|
||||
CVE-2023-38159,0,0,65eae44058aa66997a6807a530bcb298e74054d101b7516747d5769e55402b62,2023-10-12T22:19:27.903000
|
||||
CVE-2023-38160,0,0,1fd813b6c7976c00c8cfd8be4f9cf067696d5ca7c96046f392b62df9a2891008,2023-09-14T18:46:43.170000
|
||||
CVE-2023-38161,0,0,616bca3ccbee5c16ae6ee9cd8a4cc6df1093965be75db8e96d963fedcf0f4fbe,2023-09-14T18:33:24.090000
|
||||
CVE-2023-38161,0,1,6bde35b5f4216c14e27cf6e34f2523c0c0aee0d5224aa6f9752c57dbdf5a1d53,2024-03-07T17:46:16.493000
|
||||
CVE-2023-38162,0,0,32e879aaf5b2b8afa7dfdb6a368787062c1e7bc8ded71090759e02885eee5f2b,2023-09-14T18:29:23.190000
|
||||
CVE-2023-38163,0,0,39cd643de261052851186bc7e948417913f891fa520d830cd3887623e2445a78,2023-09-14T02:34:29.220000
|
||||
CVE-2023-38164,0,0,09a8729087fcb6e6112d5ad6eff2ec6b9b0b58e61d210f474e273081520c45dd,2023-09-14T02:30:40.417000
|
||||
@ -231405,7 +231405,7 @@ CVE-2023-45187,0,0,50fe3917bef6f155de7c2ef7d4d38b62123ce4c23e74e434f5c6a36d50e03
|
||||
CVE-2023-45189,0,0,df153b6d1053e0ec8ad7a75797868a0b23f8c9deecf4676d70e63dec9cc0990b,2023-11-09T20:27:56.003000
|
||||
CVE-2023-45190,0,0,ee5cdff23ea1c9c51b85b56e05c245a9158fa23b5938ef53dd8353ecb5eef64c,2024-02-15T04:41:35.763000
|
||||
CVE-2023-45191,0,0,0471d71b4e832eeadfce865b6a4a3f21dfa7a9078549997d149920fc7d734d05,2024-02-15T04:43:16.217000
|
||||
CVE-2023-45193,0,0,c3de42c53dd6d455a774a37c4f8763a7c3d5f2a16761fcec4d525d582477be2c,2024-01-25T02:04:23.543000
|
||||
CVE-2023-45193,0,1,0c497ac09778c9b72ec1e37b357578dd6880cf4125371a7f2cb787ecdbc947cf,2024-03-07T17:15:09.880000
|
||||
CVE-2023-45194,0,0,d5c89e53cbf9029912da4482ada08495c9f99ebbbb14329dd33526185af3bf8f,2023-10-31T18:08:52.140000
|
||||
CVE-2023-45198,0,0,e83575150f55c9693ecaa3d3d8ecc28b28389ef4c4551e169f843e36cfbc4ca1,2023-10-11T17:15:31.923000
|
||||
CVE-2023-45199,0,0,ffec34f4347277cf1a81398e2045556919c611109a0a71706ab507c8e66ad4f5,2023-10-12T18:19:39.860000
|
||||
@ -231431,16 +231431,16 @@ CVE-2023-45225,0,0,0fb7960f90e9546b4a2991c9cdf514b6593013dc8179a1d69842eae888e49
|
||||
CVE-2023-45226,0,0,7b86b40ba7207cafdbb9c5ef30954750c59f6071a71a21a99d196d749e54c9c6,2023-10-18T01:27:45.367000
|
||||
CVE-2023-45227,0,0,4ffb0311b26c436ba20e67f324124acf224981c7f480b51fbf58a45a4e0a7901,2024-02-12T16:45:47.247000
|
||||
CVE-2023-45228,0,0,d3ce09fbc0053d966a1c84575fc054963cc930f15296e011428d43b06e7ca000,2023-11-07T19:55:08.333000
|
||||
CVE-2023-45229,0,0,53945af80c3e7262e368e75381623a623170287914194728911e94f35a79ce31,2024-01-23T19:39:38.607000
|
||||
CVE-2023-45229,0,1,ba7df8658c821bb3ec61211859d4f1196e179fdd3ba514897a74ae64ee8462c4,2024-03-07T17:15:10
|
||||
CVE-2023-4523,0,0,7594ef971654e5b13b747bcbe0f6a98b28a2c227054ae0ac208549d4afc41901,2023-09-29T15:39:05.767000
|
||||
CVE-2023-45230,0,0,621beada92e7b9428d00f06a50db1812bb188e02d79a08fbbb0e3d553ea9c9ba,2024-01-23T19:39:22.663000
|
||||
CVE-2023-45231,0,0,3af80ff53ca4ce51073d39a4cf09df8eb1964c49bfd7f48b7b61e9f375e7b5b5,2024-01-23T15:59:40.570000
|
||||
CVE-2023-45232,0,0,712f2d35c1bd7623967e122aab06f60c008e1d46653a7d8a40f65966c3333be0,2024-01-23T19:39:11.070000
|
||||
CVE-2023-45233,0,0,df58ebf8f541d594c532f8f4526b6b0e738297dd85105d55bb1879473485428b,2024-01-23T19:40:59.837000
|
||||
CVE-2023-45234,0,0,8bde5bcea93e40a389cb98a1289db8a61a86ba5138772e7b708a69d32a3a8e18,2024-01-23T15:58:34.470000
|
||||
CVE-2023-45235,0,0,d63e37b709bac24585e02351f459e70d2586b7571bac5615dd9d630b7fb0ebb7,2024-01-23T15:58:27.183000
|
||||
CVE-2023-45236,0,0,9ae688713f2832bc5f80bb7a19a4bbcb7be4fc38f44847322744c60b768c53b4,2024-01-23T16:00:56.453000
|
||||
CVE-2023-45237,0,0,7601aaee6b804ca085092f6eb17d1e27d1052eff695bbc3bb46c659aa7e49c5e,2024-01-23T16:07:09.993000
|
||||
CVE-2023-45230,0,1,d519bd35b3993a3fb458dd365bcc37c4eee106c3eca5668477a2fcc497327eb1,2024-03-07T17:15:10.133000
|
||||
CVE-2023-45231,0,1,fbbeb2f22df3db01e4122b1157e36b4d7b87da56bc68a5632f68a25eae66323a,2024-03-07T17:15:10.247000
|
||||
CVE-2023-45232,0,1,05a1f11780c48729e8d559758265e57c5f802167eb837ee96a29259517e4a12d,2024-03-07T17:15:10.340000
|
||||
CVE-2023-45233,0,1,d6c63a70c57013bb00e0d0afb4aa82975835477d09cfbb9be6bd0718f2d7987b,2024-03-07T17:15:10.427000
|
||||
CVE-2023-45234,0,1,188a4ad340934a8970ceb47bfbb4e2e4ce2cb81c7a2e2832ff0b7a273b3407dd,2024-03-07T17:15:10.510000
|
||||
CVE-2023-45235,0,1,a56b315e0a90e532fb1b31e4bf7b5813e3bc8139eca7adc42725ce5cc5635c3d,2024-03-07T17:15:10.590000
|
||||
CVE-2023-45236,0,1,525499e6b39416baf89ff249494efc66f2267491565e0b1d6266bb92beb48bd9,2024-03-07T17:15:10.670000
|
||||
CVE-2023-45237,0,1,b86309e9c318e2bf34954205b33e4af0526735c885502c1b3ed0bb23eefefa82,2024-03-07T17:15:10.760000
|
||||
CVE-2023-45239,0,0,ceec829d8bee367996c0f5c7e35bbe30b5631d6dfbec310aeef7b055c317044a,2023-11-07T04:21:43.770000
|
||||
CVE-2023-4524,0,0,733bd7f0ea8780ce69aa3faa4947052b9e0dd28f7ad1c0423b24c8bb385e1bec,2023-11-07T04:22:41.293000
|
||||
CVE-2023-45240,0,0,da4de80f5b4496f4e42cb7a39c3ffc190dc14dfb523360c59a5be08b6de1a43c,2023-10-10T14:55:56.860000
|
||||
@ -232724,15 +232724,15 @@ CVE-2023-47131,0,0,74701737596a712fff285f89765331d35b4717764abb7070b3f923f7da2cd
|
||||
CVE-2023-47132,0,0,2614ca3b200a86dae2d77ae2380e37b32dd95d58dda33f9f5a2d0c6f8f5f2070,2024-02-15T17:07:31.827000
|
||||
CVE-2023-4714,0,0,ba38e44e3f285bfa19218321f0903a8663d31b0bcb9265b78cdbac0e6e8837e4,2024-02-29T01:41:53.897000
|
||||
CVE-2023-47140,0,0,e4dcc27272763d822e970013add6c6fa8a1afdb1559fdb5d66bb469884c6b2e4,2024-01-11T16:58:30.733000
|
||||
CVE-2023-47141,0,0,9eaa40e7e50a1710e2ee6671dc0dbb74a946eb836f431d6e8df63c03242d813b,2024-01-25T02:01:48.147000
|
||||
CVE-2023-47141,0,1,23931b7854521ec8a950e63ec1d2ed13eef864de3c1c46f0e662114edc8d4963,2024-03-07T17:15:10.847000
|
||||
CVE-2023-47142,0,0,86791e2ccc9b86a9c9dc9d6496e778e63a8fda979369686cb84d0db0c9427f86,2024-02-08T19:32:57.063000
|
||||
CVE-2023-47143,0,0,7acc48a2d5a4570d6f29396faeecc738d3ff93f287fe7f2c4731eabceb6dde76,2024-02-08T20:00:13.007000
|
||||
CVE-2023-47144,0,0,83eb749854fa495bd83421f08126c9a63b91a925c2652c722fd715a8f60c0017,2024-02-08T20:01:15.150000
|
||||
CVE-2023-47145,0,0,6db5909579bdc8a82dcc060c8691610ec6bc28cc5e7f4f9b82d242ed9bff7a38,2024-01-11T16:01:42.240000
|
||||
CVE-2023-47145,0,1,620ae7f5678047a8c4108d9fbdf5fa18578054841b939f4838b425b9745ba933,2024-03-07T17:15:10.943000
|
||||
CVE-2023-47146,0,0,20e69829653fae8f4b2686a3902570d251dd86f6502cbd24bd7e7bddd7d52e98,2023-12-27T17:50:55.147000
|
||||
CVE-2023-47148,0,0,b288941dfe3b1bf420ecb81fb3f06fe48a4281a820ff4a84a19d97a629ab7c25,2024-02-08T19:58:30.023000
|
||||
CVE-2023-47152,0,0,1cb00cbfe8da05419f387cc02f2b2ac3c21da849d61ef2c5cb84f751cbd335ee,2024-01-25T02:03:02.823000
|
||||
CVE-2023-47158,0,0,ba60a8c8f917d3f769be1f887c353f90f677a2df83b62672e4563404f8748c47,2024-02-05T19:15:08.353000
|
||||
CVE-2023-47152,0,1,21eae157a0c14eb599c0d65626b59a59bd4bef9c2fca5d41f60c8cae56283468,2024-03-07T17:15:11.063000
|
||||
CVE-2023-47158,0,1,846f95a2725be32047541f14ae8c358ff876d7b2eaf417c4327cad289f3b21cd,2024-03-07T17:15:11.147000
|
||||
CVE-2023-4716,0,0,19a8e4bcfef050287a950063ecd9c6c3a76d47aa7d1ec3543611c805970cc149,2023-11-07T04:22:53.527000
|
||||
CVE-2023-47161,0,0,aa545c6f0a0ec7887c0d704af140334d0b005fb716fcaee73533e212265aa4ed,2023-12-27T18:41:28.277000
|
||||
CVE-2023-47163,0,0,d5ba5c5494cd6dba199f3b95a2f7529c892a015f889691b261aa6e93b0585aa8,2023-11-16T18:16:27.767000
|
||||
@ -233089,8 +233089,8 @@ CVE-2023-4774,0,0,80337a6c3aa30e3ac07cf852f754f44f4c329153addec6fb4c0a980cfa59de
|
||||
CVE-2023-47741,0,0,bc210f1d0d5dc855129de9cb9f7b0cec12b64c4591e6a3d888b1fc1b1b8d7ef9,2023-12-22T18:40:58.353000
|
||||
CVE-2023-47742,0,0,cdc8f9b81df348ba8d67d4a3b415ef87b95e0515a21bf44971a47f7f0dadf816,2024-03-04T13:58:23.447000
|
||||
CVE-2023-47745,0,0,e615409f5070bf5eeada0e705bb63cdf68988679c222577c10fd67ffd36caf12,2024-03-04T13:58:23.447000
|
||||
CVE-2023-47746,0,0,a4db80f0bb0d7b9675639000452bc56e60583cbf1ba7e14aadf5b8a57928148e,2024-01-25T02:04:12.947000
|
||||
CVE-2023-47747,0,0,4f8b7d30715704626db4437fad83336ca389392daa1c7e0784f83840435d69f2,2024-01-25T02:02:36.850000
|
||||
CVE-2023-47746,0,1,93753620ff8573c61e7dc7c1fdefcdb958513fec90b20f73d795fff4314c983d,2024-03-07T17:15:11.277000
|
||||
CVE-2023-47747,0,1,d613277358fc9e82ed2beb1501924858e58060b561a99c5ff0d63c458c5103a6,2024-03-07T17:15:11.373000
|
||||
CVE-2023-4775,0,0,4e5ccce62c019ae90651a7d9690d12270ecb351214fedeca533657639c045ca8,2023-11-17T13:59:12.040000
|
||||
CVE-2023-47754,0,0,b6cddd46805b5fb405530109355d87a68bc44fa1afbf0eb5db6bb65fde25cdf3,2023-12-22T19:33:56.743000
|
||||
CVE-2023-47755,0,0,31896f99dcd5875e4354b962666fd913a560a4347a62f665f6a1fb1d935fba61,2023-12-02T00:25:09.250000
|
||||
@ -233790,7 +233790,7 @@ CVE-2023-48720,0,0,71e46ed990f77e5e1ab7e573b7ce199df9e319357ad7189c0aedad622b34f
|
||||
CVE-2023-48721,0,0,8c47109b9e61cc40969444ae2ead7963b8d4bdd6b8b65c475e745b38f8da5161,2024-01-02T16:15:12.337000
|
||||
CVE-2023-48722,0,0,b21bc90cd9ce1ec7c1af64c0d1da78505a33d180402299b29d84366f786b9b7d,2023-12-29T15:30:32.720000
|
||||
CVE-2023-48723,0,0,51de78ba4a0fea3bc725aa980029a19ae13dc47bb89690d15ea1655fe7f3baae,2024-01-02T16:15:12.377000
|
||||
CVE-2023-48725,1,1,616e89ec1781422fd259faff18c3b18503a9266877dac52b46eab6ce7b3c85d7,2024-03-07T16:15:45.123000
|
||||
CVE-2023-48725,0,1,75c085b4163799cb668cf7ca4bc0de9ef738d5db157f91ec810a73765f82b083,2024-03-07T18:15:46.497000
|
||||
CVE-2023-48728,0,0,ed4fb3603eb3d1fb4a8089303ba944449bfea1856081f932800d0cc5bd7026e1,2024-01-17T15:19:11.497000
|
||||
CVE-2023-48729,0,0,13f3c83cf7904baff3f0b31a9a04b64ff281e898cd527079412a7cd8a8ab623a,2024-02-14T18:15:46.243000
|
||||
CVE-2023-4873,0,0,83d019ca780565da868ccd4d7d22c76909e8192d214e3ff6bf7c093762207a87,2024-02-29T01:41:57.527000
|
||||
@ -234677,9 +234677,9 @@ CVE-2023-50297,0,0,a0ca77d6c29f649a29f82abde09a7845345036424a0fb896f71d914eca012
|
||||
CVE-2023-50298,0,0,71b04767764ab2b65ac7070adde737edc7d5333faf7ecedfb92526bf3c676f59,2024-02-15T18:40:56.680000
|
||||
CVE-2023-5030,0,0,401e4610c808baabd3e1b47776fdd2b7121fb0b8c0efbfc4c7959d4407fb8710,2024-02-29T01:42:10.283000
|
||||
CVE-2023-50303,0,0,4971cf4aa87365d079c650f097262885c7d04f841e4ed4d262d2eea7668b80b6,2024-02-28T14:06:45.783000
|
||||
CVE-2023-50305,0,0,a6a705ef028d8e4c572b0ec5d2dfc39846c6511a54360445c525b9336d6debdc,2024-03-01T14:04:26.010000
|
||||
CVE-2023-50305,0,1,52af726547eaa95f1201f2c6f25887776aab26306ea8ffca4b6104efe8e4721e,2024-03-07T17:50:18.457000
|
||||
CVE-2023-50306,0,0,b7ddc06b3066ca347c84251d1caa127c00e942b8fec6ff8cba9ebf76cc4bab75,2024-02-20T19:50:53.960000
|
||||
CVE-2023-50308,0,0,0ce6cfef3bd8d2c5af543f846c63d7740b5ba151747835464f0ef8d81ef12ac1,2024-01-25T02:03:49.987000
|
||||
CVE-2023-50308,0,1,4c428dc4aa8f2a5b0595b4c0d28f670c006a7eb1ab0b493ed318005adf3984fc,2024-03-07T17:15:11.473000
|
||||
CVE-2023-5031,0,0,2ddfa688e91851fb9ee9c26fd0795cb423292b04fea2bd434ed03085a5f1525c,2024-02-29T01:42:10.360000
|
||||
CVE-2023-50312,0,0,6148af5f69534aed77dae184fe2b672b68a4148611b3e761eddeb346c4e8ac63,2024-03-01T14:04:26.010000
|
||||
CVE-2023-5032,0,0,e2d0fc8f37cc56ebb13f7b14337bd0fbcd61976e96205eef41ad2e2eaaf73db0,2024-02-29T01:42:10.440000
|
||||
@ -234724,7 +234724,7 @@ CVE-2023-50378,0,0,fdbe7a34fdf8cd9d71ae9618ce3ef0ad0a4804eb88dccf3d4747fb05eb07f
|
||||
CVE-2023-50379,0,0,2ba768024158d3957bf97073914ab21cf6e76e13687c6569b9647fa3455e4c0b,2024-02-27T14:20:06.637000
|
||||
CVE-2023-50380,0,0,b5737d428cd7d3280b11a55da8c282450fdebb25171b34cbfbfc4de989e3a9f5,2024-02-28T14:06:45.783000
|
||||
CVE-2023-50386,0,0,eb9175c624998374fffbb8bbdcfbc3fcd759c84a0c5cafd0e6294c2d31318a7f,2024-02-15T18:40:48.837000
|
||||
CVE-2023-50387,0,0,a93f59759db18f04358a0350fa91f0038d1c48a320311cb4bf6f42f7eaa8909d,2024-03-04T03:15:06.217000
|
||||
CVE-2023-50387,0,1,d6b6855a40848b9c54d9d59a3a311e1d6f69807c6c79ff2b8a01eb2163f073a2,2024-03-07T17:15:11.587000
|
||||
CVE-2023-50395,0,0,1428a30e7f791887f351d6276b38dd6e66ef73f4c78586f3c8084af9d6bd298b,2024-02-13T20:35:06.703000
|
||||
CVE-2023-5041,0,0,9eb23c87c3c86b8b889ef8868762c31909282e2886c58aff180fae5c65cd6817,2024-01-24T19:20:29.410000
|
||||
CVE-2023-5042,0,0,76558d00ae1daa232624f7fa83b8c4ee909b7bd23da74f0b90b7096dbf524598,2023-09-25T13:25:16.230000
|
||||
@ -234733,13 +234733,13 @@ CVE-2023-50423,0,0,76755ef4095537b87793fcbaa84c66e6144cfa55259e1485b20e226bfcb60
|
||||
CVE-2023-50424,0,0,89f3a64bec1a6aedb95e63614a714963ac97866b07259e6b76e32f06e7e01c29,2023-12-15T16:53:04.417000
|
||||
CVE-2023-50428,0,0,ee38f297101d048b525cc8e108719c5b4279d7c7b397e53b64582862962f0f42,2024-01-04T17:15:08.690000
|
||||
CVE-2023-50429,0,0,226bcaaff69c07707f641dbe9ce77da1a81f20b3606931034b0e6b06dfac422c,2023-12-14T14:33:52.857000
|
||||
CVE-2023-5043,0,0,7691728e8f6bdb5a6529b138417513c8d5cd2dc4696cd3aa1716fdb907e82f1c,2023-11-02T17:54:38.423000
|
||||
CVE-2023-5043,0,1,99fbb32806f488364becee5b2452ddbbdbf099b8aadeaa8418f878c2aad9dff9,2024-03-07T17:15:11.983000
|
||||
CVE-2023-50430,0,0,4e933b75fee4c7e24ec319e365c288375c6e0e3a67966a0cafa5ea42d6537a4b,2023-12-13T19:10:39.247000
|
||||
CVE-2023-50431,0,0,a37473383fef96d33bf0f59c3fa43743d2170c71b5a2a216d64f02e9a46ff45e,2023-12-12T22:34:10.203000
|
||||
CVE-2023-50436,0,0,5f4a54322e18e4e426c305cb80a0741bdac03f3cda3d7db0d7e91ff7759346ec,2024-02-29T13:49:47.277000
|
||||
CVE-2023-50437,0,0,087bf2fe61780896ed884cdb606b733c49e0268aac7a96a7112659f33954f489,2024-02-29T13:49:47.277000
|
||||
CVE-2023-50439,0,0,22917e6a90c296c3d7c909fa67289b75621f4c3b8cab040412485bb2d3d2206a,2023-12-20T18:29:44.920000
|
||||
CVE-2023-5044,0,0,b4fc81b52bf69994a31c999ec5b938bd9a655e8756566ddf3c7dff1542f32464,2023-11-02T17:45:26.790000
|
||||
CVE-2023-5044,0,1,c77cb84a9812b72a5b970981b7d5fef0c5fc4f0dd761df3af2b84138e07b646c,2024-03-07T17:15:12.073000
|
||||
CVE-2023-50440,0,0,cbe5d539e208b6097ace139cbeeedb49e866c5d97b399c073c43b5f8f70264c2,2023-12-20T18:29:28.293000
|
||||
CVE-2023-50441,0,0,9bd760298da517bd28996f023ce7334405dbe92c32aa3c503cc1491615459ae4,2023-12-20T18:31:44.053000
|
||||
CVE-2023-50442,0,0,a057a5b7c26414fc7563d24cb642834802b777e3b23cc824df69ea34217acf4a,2023-12-20T18:29:15.687000
|
||||
@ -234933,7 +234933,7 @@ CVE-2023-50864,0,0,dbb8d20e5f36a035c3156fb7a77589dedbf6adf8027e6048f396876e33958
|
||||
CVE-2023-50865,0,0,48e50b801467797a5fb545180a82a848b29c010b0d9ff30f321b93c311614a5a,2024-01-10T01:12:29.470000
|
||||
CVE-2023-50866,0,0,0d65d6a6346342d7f1632295af06fb66d902cdd24452e19d2e81b7338b5e01dd,2024-01-10T01:12:23.503000
|
||||
CVE-2023-50867,0,0,813e7f594844fcee13255526631a248747714772b8a3c7fe20b8c1a531ee27c7,2024-01-10T01:12:15.103000
|
||||
CVE-2023-50868,0,0,d0ee2f1c607c8014504eac36a75a16a8c412e39af8e04429af5af83985bd3779,2024-03-04T03:15:06.500000
|
||||
CVE-2023-50868,0,1,1acef704c38344b53c0b7e369828b095b769c1fc01c9bcc30ab995406b56a6d7,2024-03-07T17:15:11.817000
|
||||
CVE-2023-5087,0,0,cb83bb80de48780d6ddfd511869f6feaba7211f246baaaa49f1e770f0a9c1488,2023-11-07T04:23:26.693000
|
||||
CVE-2023-50870,0,0,5b8837a6e60e4203ba051628b99db23d2e092916c152f0e1a5a22594cfa2f839,2023-12-19T18:48:01.647000
|
||||
CVE-2023-50871,0,0,4ddf269f53c856e0f2588f2eb354c7028d0f2397d2615866b6215dfdb27c4698,2023-12-19T18:50:30.227000
|
||||
@ -234942,7 +234942,7 @@ CVE-2023-50874,0,0,bcacd6fc18a6a7384f9e3410fc219a27fd51425023bb3ea76f15234acd5bd
|
||||
CVE-2023-50875,0,0,1106938097fb18960ed1f89813982d05ff2f39c25d4530bc17f1d69fd9b36d68,2024-02-16T19:28:59.943000
|
||||
CVE-2023-50878,0,0,09d9775c521beb2bdbe6a10e9cce75ea90abd897c23ddc9c0ed036fdb98e2785,2024-01-05T16:21:46.253000
|
||||
CVE-2023-50879,0,0,e7f635ec835f8af6e68324c638f96c217e373f3a3af9c80d6a7d36cc1662f020,2024-01-05T17:35:04.347000
|
||||
CVE-2023-5088,0,0,63218d0edf33fa7cd956d09f569a12a5f9e6a1dcd109cdbb04295ca6752b8231,2023-12-08T19:15:08.203000
|
||||
CVE-2023-5088,0,1,568d51164c9264fd994fc3b9ec65036bce17134420ca04c5ab028845c9aa43d8,2024-03-07T17:46:40.173000
|
||||
CVE-2023-50880,0,0,45dfc20edf873b6f54c033b90d8b745bc998db6f75a866db44cd1e8a384e14b7,2024-01-05T17:36:02.743000
|
||||
CVE-2023-50881,0,0,21fc9e5f06f2216fa2395fe2689d924b63b36b0b4cdf8b0f9c5260d788c328af,2024-01-05T17:37:29.017000
|
||||
CVE-2023-50889,0,0,c1ad7d35b6d5afc074175b11fcf31e66a1f88510cc63a735f12500e424605271,2024-01-05T17:39:22.253000
|
||||
@ -235740,7 +235740,7 @@ CVE-2023-52399,0,0,37d927beb74e1ec97855b4601610f34d1a22a50030ec8f9612a6087d84ff0
|
||||
CVE-2023-5240,0,0,7d5cd0fb5f88df14118e200bc681b22dfebb68caa308ed4d356fa96870c74385,2023-10-17T16:11:51.793000
|
||||
CVE-2023-5241,0,0,35c07b59eeb8e5320751d006c11a71068c67265a473a9c681e74240ba9afa1bb,2023-12-22T19:02:58.717000
|
||||
CVE-2023-52425,0,0,1145b8790151da9a533a17237f261953453044cf16039d08ab64a7c9289adaa5,2024-02-26T16:27:48.367000
|
||||
CVE-2023-52426,0,0,049f0e5fc4b83a1a59d05230d25941463cb3bb9a42ebd193de4616703027f9ad,2024-02-26T16:27:48.450000
|
||||
CVE-2023-52426,0,1,a83b975d267204be7bc0424d16dfb1a6cdd5c043e3c113cb1f287aa4ec1048f1,2024-03-07T17:15:11.893000
|
||||
CVE-2023-52427,0,0,7b1268fe3c875e4de6b668786e2b70da182fd0ccf1ffa3ad115cfe60942d0759,2024-02-12T21:39:34.807000
|
||||
CVE-2023-52428,0,0,2eeb582baad618917d7ab81e73c328480f805daca7410119b9e12d80dcec6fc7,2024-02-11T22:29:15.837000
|
||||
CVE-2023-52429,0,0,cbf1a64bea07cad721a2d66b517d7675865722376214fa45ab2682c4a3ee0642,2024-02-26T21:15:57.833000
|
||||
@ -237184,7 +237184,7 @@ CVE-2023-6806,0,0,68d5cc1d96ec25c7ab186323c9b5003516462d40f7f679e830f007d1bc0e49
|
||||
CVE-2023-6807,0,0,8211ca38107dc4f9b4127c6352451c7045672cf7336c16fcb14315bbd9ab0669,2024-02-27T14:21:27.377000
|
||||
CVE-2023-6808,0,0,453d7720ba5e9cbfc061121430ec5679037ea2f22b990571ad72c0ac48f6ec8b,2024-02-09T16:49:29.023000
|
||||
CVE-2023-6815,0,0,d97387eb71cb43fe6e993223b0683dbb82353c2109d50f7b045bdf1d8b203f4e,2024-02-14T04:15:08.497000
|
||||
CVE-2023-6816,0,0,32ab877fd6be57cefd857f2677ca6f2c4880d6c7ff598778c941b95eb6fea82c,2024-02-09T02:15:08.207000
|
||||
CVE-2023-6816,0,1,e7839a0ba60fd8f45333ca3d0c1da185b693b7e81293656670d077cc9777a76a,2024-03-07T17:15:12.180000
|
||||
CVE-2023-6817,0,0,15a873d76f1c7613f3959855e73f950459b6718d3731740781c6b052a6a56c9a,2024-02-08T16:15:47.270000
|
||||
CVE-2023-6824,0,0,8c6e875229d872169eb2bfb9390a02ca75cb4bc4bc222093fdb4ebb6a0125835,2024-01-23T15:35:27.123000
|
||||
CVE-2023-6826,0,0,8033a5c072d463793e3b1a3dcb626312fffc26b8ea88b724da5c112e96daece5,2023-12-21T04:49:03.117000
|
||||
@ -237506,9 +237506,9 @@ CVE-2023-7234,0,0,23278876305e1d44b5315edea84989da2790a3c72b01a04cdbcb9933098a26
|
||||
CVE-2023-7235,0,0,5a57373c824e0c960ebb1d7ed373397d379b4a945d30165f19c755e196b87393,2024-02-22T19:07:27.197000
|
||||
CVE-2023-7237,0,0,34878d83edae1c68fbb7c6d0f9d3ee08547b03913d6b374f32337269fef1a0b4,2024-01-31T20:37:01.760000
|
||||
CVE-2023-7238,0,0,7187ce9bc4d8ddad00e06886245b2e662c42772077283e0d271ebcd7974e5802,2024-01-30T14:20:10.613000
|
||||
CVE-2023-7242,0,0,ac54fdf54979c293dd37520f2380c2b680d40908ab92b74f6e8493e5f0606480,2024-03-01T22:22:25.913000
|
||||
CVE-2023-7243,0,0,8cc65c54f0098ba4a995839c6cccd1c17b6732fc5ad1174851a72e2070fae459,2024-03-01T22:22:25.913000
|
||||
CVE-2023-7244,0,0,62790636aed6fb491e7a1d387a840a32a418795c4896888dac3c252594a59108,2024-03-01T22:22:25.913000
|
||||
CVE-2023-7242,0,1,db2d6d5cc91868613ca46292b47ef3b5a3c4ae96f4def2aa8c9c1271db71c444,2024-03-07T17:50:48.090000
|
||||
CVE-2023-7243,0,1,c43192a066d4b9535821b574845a0af87800cbe78fe61a46f4663ee5807e93c6,2024-03-07T17:51:08.413000
|
||||
CVE-2023-7244,0,1,ba207e3262e0671e0b0b028bd6f1a9cad89868b7212853a50edc68e0c8b30845,2024-03-07T17:51:19
|
||||
CVE-2023-7245,0,0,c2b129587df81b933ff7a681e47b41470d61b90df3071adf7be4cf4925974850,2024-02-20T19:50:53.960000
|
||||
CVE-2024-0007,0,0,1173dcf63e36e77ef1ebddafdf32fafcec606695fbc0816f54b661f0aac88aac,2024-02-15T06:23:39.303000
|
||||
CVE-2024-0008,0,0,9c41805289fe313f8323749103b11eb8b3211483db37513fd0baf5ed76da3178,2024-02-15T06:23:39.303000
|
||||
@ -237726,8 +237726,8 @@ CVE-2024-0402,0,0,2fe1b596353be20e61cfde75d3fd6588203ea2d19b7c21e2ce1c5a9ecc57cc
|
||||
CVE-2024-0403,0,0,ba0983060e2034b216b25cd26ed2bb024a7850bc1fcd95abc9a090d5040f7805,2024-03-01T14:04:26.010000
|
||||
CVE-2024-0405,0,0,efdadcc35fc4ed87224ff4e930a96f9ee86e8b4ccb1a79f084616e91b90070e3,2024-01-24T17:23:09.773000
|
||||
CVE-2024-0407,0,0,f3bc2895be8ea5b6951b82e45fc670b2af282e8da3ab8846004c7a5f8a8e92ad,2024-02-22T19:07:37.840000
|
||||
CVE-2024-0408,0,0,43985c336a03f402aeedabf908a000c648c1c236d0fbc08b82265b346c5d65c4,2024-02-09T02:15:08.383000
|
||||
CVE-2024-0409,0,0,05e7278f67c8a59552c587c9f2326e71048a786dc94c7b4128171258bb2dd76f,2024-02-09T02:15:08.533000
|
||||
CVE-2024-0408,0,1,4e3e81f52cf3d5178a7182e7de9f0301b287ec329828c0391a69e3034670a699,2024-03-07T17:15:12.400000
|
||||
CVE-2024-0409,0,1,34ebe0729ae458ad3578e4d18065a813c37b10bf9cf2255ae436410c7013521e,2024-03-07T17:15:12.540000
|
||||
CVE-2024-0410,0,0,b7c9980392b1e84c96745fa2196deb8831d9dc73822058dbf4e5c03728818e2f,2024-03-04T20:25:41.347000
|
||||
CVE-2024-0411,0,0,e9767f7a52a02ef643e56eda85bb59a185cc76378645ef12c7be1bf6ca802d4d,2024-02-29T01:43:10.490000
|
||||
CVE-2024-0412,0,0,c54eefe6e0e0e016a8189e728b824cd56c9fce47b714f3340694ff726b377062,2024-02-29T01:43:10.580000
|
||||
@ -238056,7 +238056,7 @@ CVE-2024-0813,0,0,ff30ac3dc79b0550523d06b2455ee17a966f55c90b0406d419b89863b89f1a
|
||||
CVE-2024-0814,0,0,1d0403c9ecdba18257e6f96087bde1c50ad1c1389cfe686e29580d08cead7d2b,2024-01-29T14:27:48.647000
|
||||
CVE-2024-0815,0,0,67504d7248aecf951936f1e6796ec6f3ce9a0c8a5636d40f121610e36b3c6614,2024-03-07T13:52:27.110000
|
||||
CVE-2024-0817,0,0,4c9fa67064c61ab5b0da2ace15adecfc82aa106cf8469695bed0f2fd232ae5b4,2024-03-07T13:52:27.110000
|
||||
CVE-2024-0818,0,1,aab2d221f37c23ee7f2ec3782b2d9ede535f7fce09aa18f8f5fd767e46148b65,2024-03-07T15:15:08.147000
|
||||
CVE-2024-0818,0,0,aab2d221f37c23ee7f2ec3782b2d9ede535f7fce09aa18f8f5fd767e46148b65,2024-03-07T15:15:08.147000
|
||||
CVE-2024-0819,0,0,84062588306c2d3f219b6045d8f0c99714b3fa9d659a191e940313afd7953da5,2024-02-27T14:19:41.650000
|
||||
CVE-2024-0821,0,0,f9f03ada3b8baaa4211e4a983219e417254ecaad082f436ae6848b641d1ac399,2024-02-29T13:49:29.390000
|
||||
CVE-2024-0822,0,0,f0d03b223c25850830b62db3595d4728a822efa091e187df2417c03c793bd8f4,2024-02-21T21:15:08.900000
|
||||
@ -238074,7 +238074,7 @@ CVE-2024-0841,0,0,00c1a87332bcc448f20d823e8d7d15c699f2b88301134bf45ff680384c84d2
|
||||
CVE-2024-0842,0,0,2d4febcc0a5bd3f6b5f6eeeb222e1bdadfd7499df5c95fd0f9cc7e2a10a87dbd,2024-02-15T19:11:14.253000
|
||||
CVE-2024-0844,0,0,9b0ede7ee0379ed34aa516e6f2cba464e96d05ae45278d47c03f7b0b4baaf7d5,2024-02-08T16:15:39.903000
|
||||
CVE-2024-0849,0,0,ab143b9a0b5d37d266faac9cd54f50fee666b57f962e8e1bec5db73357a455f9,2024-02-13T19:16:30.810000
|
||||
CVE-2024-0853,0,0,1ec53e67ee9d5919be932b36d73918e7fb022ee23c3898bd3e3e19084b12a2f3,2024-02-16T15:17:48.757000
|
||||
CVE-2024-0853,0,1,72eb57fa9d91eeed9b78ea6861ab48b720d6a39710ade722cce53b9624df3bc8,2024-03-07T17:15:12.657000
|
||||
CVE-2024-0854,0,0,b2a19a635a88b4ff68549abb31f11c392c07f9e329d9704350bbb3ee75810c41,2024-01-30T17:01:37.127000
|
||||
CVE-2024-0855,0,0,fee06b61accc977f963cdb2b2ef743d4f7ee62d05033c371692bc8e3d7ebf823,2024-02-27T14:20:06.637000
|
||||
CVE-2024-0859,0,0,ebdbbfb62fdac702a888e13ac2f08cf009b152778d43282d960af2d2fbc4e23d,2024-02-13T19:45:29.770000
|
||||
@ -238099,7 +238099,7 @@ CVE-2024-0907,0,0,701cea52331df058a887458bc81b02e5da4430df695e176c30a10532890709
|
||||
CVE-2024-0909,0,0,7864e9d833556eb295eb67e87cebb39c8d9b11d41ed1f5327a80b30fe013438c,2024-02-08T20:07:51.410000
|
||||
CVE-2024-0911,0,0,5f8186e1a077698fb2fa1e99d28cc6e32ac8b7b7afb205a3a02bc10c8ca698f0,2024-02-14T18:15:48.077000
|
||||
CVE-2024-0914,0,0,e3ac9d00ae6383306423d8f717c5b50d1c543189340e8152c8f7c1506432b02e,2024-02-09T01:01:38.453000
|
||||
CVE-2024-0917,0,1,9f6cbf5481e96ae26ba65bdd4d5f7d686cf34db01c53a885ec0177a4776d8cbc,2024-03-07T15:15:08.257000
|
||||
CVE-2024-0917,0,0,9f6cbf5481e96ae26ba65bdd4d5f7d686cf34db01c53a885ec0177a4776d8cbc,2024-03-07T15:15:08.257000
|
||||
CVE-2024-0918,0,0,7e821bad8b27a06490cf84c3eef2d84feef1a9067fdf8ec3e9a35926cc8cb97e,2024-02-29T01:43:31.073000
|
||||
CVE-2024-0919,0,0,3b478c35c692e18b68fff4537fc7f547d639f4cb6c99e89e4f69456108d65167,2024-02-29T01:43:31.153000
|
||||
CVE-2024-0920,0,0,1709552f07ed0300b748180c05eeff9fa877e00f39d37e36f650d0861249a53e,2024-02-29T01:43:31.233000
|
||||
@ -238375,6 +238375,7 @@ CVE-2024-1344,0,0,6e9ea80e9b1906095e19ebbcfe72bb26c4abf1a00053a32e3b2ac9d853412e
|
||||
CVE-2024-1345,0,0,edc14e21821ef700ebe0363d9d625110658b2ac84664f2109ac9f28db37f2b84,2024-02-20T19:50:53.960000
|
||||
CVE-2024-1346,0,0,f9b1cf937db0cca6baf401ddf2b76ede34aff7f78d164647460f90ba78591111,2024-02-20T19:50:53.960000
|
||||
CVE-2024-1349,0,0,67d4fc446dab701f6cac94b2ffa043e7391b89daca4d9149739a8dd94e1ed50d,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1351,1,1,0cef1ae511ad560c983cbcfe3814f67aff9cc3acbba10e61386ba08f2ba7ffc9,2024-03-07T17:15:12.740000
|
||||
CVE-2024-1353,0,0,853663be0a3764d75bc90d77c3fa1fa06bab948d2070b8859d35c2dce2f75df6,2024-02-29T01:43:49.133000
|
||||
CVE-2024-1354,0,0,7e9a958865e30c89765260c45d4ae133e4c586a23883dff6b33b804192a001d2,2024-03-05T20:22:24.573000
|
||||
CVE-2024-1355,0,0,dd36a54ac939524c987827d5cb09797409e1063b770f9d9a2dc86b1a7287f5d9,2024-03-05T20:22:38.100000
|
||||
@ -238417,6 +238418,7 @@ CVE-2024-1435,0,0,3d9157bea425ae0ccbf8fb80f8804820a71722fe736e6d6583f664e8ae632d
|
||||
CVE-2024-1436,0,0,89cc5ea7a7e1178a29adf59c2f4cf429bb9957790ab8a0265c3119401c784ce0,2024-02-26T16:32:25.577000
|
||||
CVE-2024-1437,0,0,95b845910a840a20b7fa4620989917eab09ec6f88cd90b7d076b0bb6f7afcc4a,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1439,0,0,0872453f826d79b5bb50df9535aa030a513837aff169f1535b08260848c8b609,2024-02-12T14:19:54.330000
|
||||
CVE-2024-1442,1,1,128b5e04431df7e786adec72827e5f2f441ea50a6ce457805a0d546db7b10cae,2024-03-07T18:15:46.590000
|
||||
CVE-2024-1443,0,0,715b4f1b1b036595e816d480c22f0394bab184a4b61631c3489044453d5f3bfb,2024-03-07T13:52:27.110000
|
||||
CVE-2024-1444,0,0,56d4978632986301b509a1a8d65f888b9f13fd4ebe8f88db05c849bbae5ae999,2024-02-16T17:15:08.710000
|
||||
CVE-2024-1445,0,0,74c7764f426ceaa1bf76f0a1b70674bbf7fb8a94e36e8d8e518e71fa4f86c32f,2024-02-29T13:49:29.390000
|
||||
@ -238960,7 +238962,7 @@ CVE-2024-21348,0,0,2f0da17b5d81bcad4a469c8de7565dbe161b35559ab267b8db95afce05a8d
|
||||
CVE-2024-21349,0,0,0bde696fc002ef8b21621e2874d326995f846f9433de704241e439d13339e84c,2024-02-13T18:22:58.333000
|
||||
CVE-2024-2135,0,0,0e7ec41b09287f9e5eebd186f40b1f916e022c2d2f615c89b8bace6b4283e741,2024-03-04T13:58:23.447000
|
||||
CVE-2024-21350,0,0,479d68a29fcf25b6a253ca04d86cad3a1ebed8b4cb1311171f1451c12c1d525d,2024-03-05T20:02:13.803000
|
||||
CVE-2024-21351,0,0,accd4e6cdbf5759d93aaea5bae77a891847606061d162914a1bf70b096d5892e,2024-02-15T02:00:01.653000
|
||||
CVE-2024-21351,0,1,7a48bfbc6a48523321bf61d371facac94a044f299f4405c4a4f7eed1aeeb604e,2024-03-07T17:48:52.180000
|
||||
CVE-2024-21352,0,0,10bcf10d69b8d5f4c7cbc76bccdf708b902db66e46e1a6537556096436a2fffa,2024-03-05T18:54:26.843000
|
||||
CVE-2024-21353,0,0,069ec1572ad8f80f7de702cc2ddaf6f315837c56bad7260abb2296947f3ace92,2024-02-27T19:45:28.470000
|
||||
CVE-2024-21354,0,0,6be7f60c96e505d2d0d48d7cd874227816e97d1a763ccd038e009c4053923fa8,2024-02-13T18:22:58.333000
|
||||
@ -239013,7 +239015,7 @@ CVE-2024-21404,0,0,8aba03ed666ffd23124b08c87a2acd614c58649f26fe48e08bdfdea134622
|
||||
CVE-2024-21405,0,0,7b2bcd85f8b75e36055a51e8d6e50e620fbb5da00673d7a82956b2dcc3d7e6dd,2024-02-22T17:57:19.810000
|
||||
CVE-2024-21406,0,0,4926f610f67020e143f717a8966dfc594abc79953c895df1691f78cfff880f19,2024-03-01T22:57:15.940000
|
||||
CVE-2024-21410,0,0,bd862af63cde79d77d3d96c08b20eb8ee12ef6b46d7738e8f98c5d9c8af65aee,2024-02-26T21:10:38.713000
|
||||
CVE-2024-21412,0,0,8a75d7e90f680d77013f86849427febcb5dbc45ab7c0755f94917e51501f4e93,2024-02-15T02:00:01.653000
|
||||
CVE-2024-21412,0,1,6df500642ad441e157d67f1fe17b6dc5155211f5565d89e1eed7797770fe5407,2024-03-07T17:48:58.173000
|
||||
CVE-2024-21413,0,0,e8b53a5cd4bd3cc4178f808efd349017a89b016f9da30aa2b26e33753aaea59b,2024-02-23T21:04:05.710000
|
||||
CVE-2024-21420,0,0,4a89fb64b6e21ff3e8e62b1263c75efc47583308c96cfb26d691252d4777d2ed,2024-02-13T18:22:43.577000
|
||||
CVE-2024-21423,0,0,bdd3e5505bf37095cf28502668c3363668037784f8adcb8492701fb6ce5eb572,2024-02-26T13:42:22.567000
|
||||
@ -239477,6 +239479,7 @@ CVE-2024-22727,0,0,552f053e0e1c0024595d8b9c36096b73d98357dde818cb308f879c4f292f6
|
||||
CVE-2024-22729,0,0,57c8e9cec7b5acfd3e659a660e85c84e7c6a8dee54d39c1d317d497e3590bfe9,2024-02-01T15:15:34.173000
|
||||
CVE-2024-22749,0,0,28b47196f940e010ff68d16ae17a176c2008b3f3d80a9a233b85dddceddd9f34,2024-01-31T18:01:59.017000
|
||||
CVE-2024-22751,0,0,ab17857cbf4a2c34d716834488e793a841a7a79f729d2c38db04d05bbf5a85f0,2024-01-30T21:18:23.127000
|
||||
CVE-2024-22752,1,1,617b937ee27ee889b8085c46785fee31250d3f6dfd60def49f6e5ed3b25a8b11,2024-03-07T18:15:46.810000
|
||||
CVE-2024-22768,0,0,ba9cf2204f3f97d0818292d26d832ffe54135ea1c816ff09eb4adc0d121dff97,2024-01-29T15:50:06.730000
|
||||
CVE-2024-22769,0,0,5e5bc2110f51bc548c6bae4c09b681eaa2d83c749bf7b8fa551acdf866c69a4b,2024-01-29T15:54:12.760000
|
||||
CVE-2024-22770,0,0,f2a2a69cf9ce7d556b6b228c10722f7f9528f890b579414a4469048f6692bbc1,2024-01-29T15:53:41.323000
|
||||
@ -239603,10 +239606,10 @@ CVE-2024-23219,0,0,6138a00dd33e643c6da7ab985c8bb39139630ef127b2b12e557a72994a3a6
|
||||
CVE-2024-23222,0,0,f33369aa9cec44a1ad31bb6d34cd20c739c85b243ce1438560b80098a06e2b7b,2024-02-29T08:15:46.907000
|
||||
CVE-2024-23223,0,0,d780b4d6e2ed4fd16bbb8e5d6b950b4f66cdf843fe3ec44eff85a2bd755e98e1,2024-01-27T03:48:24.797000
|
||||
CVE-2024-23224,0,0,8c8e9af636b106e202b7f940d165666567457368baa4cae37acc93fd6c8a64d2,2024-01-27T03:45:02.100000
|
||||
CVE-2024-23225,0,0,402741bef0a3563916ff7c9bc8cbedf60a443448609374051334e1db212f612a,2024-03-07T02:00:02.283000
|
||||
CVE-2024-23225,0,1,0940b4eb622a5ca08e9e82814e209e6830541c7304bbd3ac3e55186efb9661e9,2024-03-07T17:51:50.353000
|
||||
CVE-2024-23243,0,0,c883edf88be24cb000066cd5d9f6fce63ff3cd1b907967baf9bcb4112a04838c,2024-03-06T15:18:08.093000
|
||||
CVE-2024-23256,0,0,c655cd9ec538c6782627acb472c38f233867428eb6687fe294704e26cdb390af,2024-03-06T15:18:08.093000
|
||||
CVE-2024-23296,0,0,7e7bf20f93796575e206d9d1e355afb3fcc4aee575fe2298561fc68cd199377e,2024-03-07T02:00:02.283000
|
||||
CVE-2024-23296,0,1,c57d72763b186a63e442df0c81d825c3430bf4ffc66b86a75cb0d8a6f6cddae2,2024-03-07T17:52:12.170000
|
||||
CVE-2024-23301,0,0,95f1c4c0d3c3f56beb5ca2f43c481bd416943d89ac106cdf8ea6bddea7fc220a,2024-02-21T03:15:08.950000
|
||||
CVE-2024-23302,0,0,863344aa30e4660a85cb1dadb5cc739d77d5cca4411a54dffe0a3cc5e6d4c938,2024-02-29T13:49:29.390000
|
||||
CVE-2024-23304,0,0,f4bc63f089c081f8de89565719320483c4f38e3af47af8e7dc8d4d30748891c3,2024-02-13T22:49:18.687000
|
||||
@ -239866,7 +239869,7 @@ CVE-2024-23893,0,0,ecb9213a2cdfa52079aa821524dfb1bb775fe26da56c79eae32e25ce922c0
|
||||
CVE-2024-23894,0,0,4a83274aa71c12777419979ff96e6b220f9b5868499b10e181bd1420b2a29144,2024-02-15T10:15:20.110000
|
||||
CVE-2024-23895,0,0,d59597dc18583f4069a00336744145b3a95cc3985b05876996e2842d836aeded,2024-02-15T10:15:20.403000
|
||||
CVE-2024-23896,0,0,05098f39a53ae86a6319e8b4133c1254bf82ffe2a6f0f1c3c0bb46552d5cc3a9,2024-02-15T10:15:20.657000
|
||||
CVE-2024-23897,0,0,2f29b456fad948ef5aae408794f92ecbd663abb08ec87cd4fe153c14d23830f1,2024-02-29T11:15:08.647000
|
||||
CVE-2024-23897,0,1,52e5d4a522b850a631c21f9f4455068e9ae869bfa4d176c7f6db84f611c56ead,2024-03-07T17:47:35.020000
|
||||
CVE-2024-23898,0,0,27c5368dff9cda77d4579c68aa3c6e2c647b0b454e5e30199a0592eead600202,2024-02-29T11:15:08.843000
|
||||
CVE-2024-23899,0,0,7221f9efcd89ca48f9c6571bde7a7f417c82020935a02dda82803137a099714c,2024-01-31T18:43:39.183000
|
||||
CVE-2024-23900,0,0,ffcf73f765e34eaa4d21dbbb66f11c097bdbe82c6c23f515de989ab74fdb5e2d,2024-01-31T17:20:14.777000
|
||||
@ -240418,7 +240421,7 @@ CVE-2024-25675,0,0,7eb120f8543ce89181641a0a8c791e82666c8e07d23577075c360f9dbf73d
|
||||
CVE-2024-25677,0,0,1d7f4f51208daa48b27418602ba1484337c537523201080701287445cfed0006,2024-02-15T19:43:24.983000
|
||||
CVE-2024-25678,0,0,9470e3115b8c3f5b60b6b175aa8ef46b05e07e3f194ab4ff036467dbe264bd9e,2024-02-15T18:45:09.663000
|
||||
CVE-2024-25679,0,0,224a0956154aafe3a65144732719712897f981c578a083f4eecb3f79135bc5a3,2024-02-15T18:44:40.547000
|
||||
CVE-2024-25710,0,0,98ade4ffa7aef75419a71990b81bf934b1fd86fbebd436fa569a732a370bfcf5,2024-02-22T15:24:45.240000
|
||||
CVE-2024-25710,0,1,ab520189ef240d987a199d6e814c3161f9be705f75e79c9ab42865a168e0f18f,2024-03-07T17:15:12.940000
|
||||
CVE-2024-25711,0,0,d3f8257017dbfc5bdd6c4e4b8e295b2d28e0327c4086b62797abd4226251f28d,2024-02-27T14:20:06.637000
|
||||
CVE-2024-25712,0,0,51de0f8ba1579ed685b4e63152564f2da5ea830e3b6201a5b430e6e0f9d5912b,2024-02-29T13:49:29.390000
|
||||
CVE-2024-25713,0,0,82886cecbf7fc1474a5475d864f3cf6580d0ba42b5cd7356d033fc3fe3f82895,2024-02-29T13:49:29.390000
|
||||
@ -240558,7 +240561,7 @@ CVE-2024-26299,0,0,1afbf7f788ace8cba2c17888dbd26aca37a12f501fd6b7049b270edc1159b
|
||||
CVE-2024-26300,0,0,957ff2fceea083c23710802994700a4cf17bc21a9f298857e1101271f2e4ee8e,2024-02-28T14:06:45.783000
|
||||
CVE-2024-26301,0,0,ca5ba4fc82d74473f58bbb8ab53e52870805c492ae0704dcd3113ae9fe8a11a4,2024-02-28T14:06:45.783000
|
||||
CVE-2024-26302,0,0,af4ef1bb4da1c0ac0e7b0a0b03804bb031d31d0e464ca3573002ab0828a12d88,2024-02-28T14:06:45.783000
|
||||
CVE-2024-26308,0,0,1fb27c5235ff932b36ccef777a6cf311a453b9774c0b0ba421c55a05d725695f,2024-02-22T15:21:36.213000
|
||||
CVE-2024-26308,0,1,82b0ecfd78ac1924ca4de8327395ad25f7b35e7d9f3c5c23f6744c8d052e1727,2024-03-07T17:15:13.050000
|
||||
CVE-2024-26310,0,0,cdf3231f7a059b92520dd591ab7449fe300f81e89c81c63cb479e44416fa612e,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26311,0,0,c10525456294b75c6b4919ba396921719972a7cc08a82934dcff79f6c0deabee,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26318,0,0,5a8434e81e693bc0f90a66d9a6d8655df17a4e5f3f1f4a63075d970f5e64fed9,2024-02-20T19:50:53.960000
|
||||
@ -240726,6 +240729,7 @@ CVE-2024-27689,0,0,f4ebc1e59160fdab518bfa3aa9af1f1ba832ce6045359e8a975bb23df8ccd
|
||||
CVE-2024-27692,0,0,96cf609944e6476718d8d1c519869d6f251f131a1b19ff614e15f00c454cdd33,2024-03-01T17:15:07.617000
|
||||
CVE-2024-27694,0,0,f3214413fbbba6e4989cb23c7682c51f2973a0b48d2e319f7c34a38e30c11001,2024-03-05T13:41:01.900000
|
||||
CVE-2024-27718,0,0,1278a2a8cee5a68342beae95f220d454fcd35e5e3853b311cb50bcc440948ebc,2024-03-05T13:41:01.900000
|
||||
CVE-2024-27733,1,1,f8f1c6d8c88b3e67a1f64356450ad60dd7a9b3cb717d1eb857d80e05f4c31c43,2024-03-07T17:15:13.120000
|
||||
CVE-2024-27734,0,0,3c0f551c79bd519411a50f44170878bc190cec512cea2012a65cd2d3219a1ee2,2024-03-01T22:22:25.913000
|
||||
CVE-2024-27743,0,0,6af784c89001e5e3304a051e2cbbb71e2daee0d197f297c681b1d37ee3f97874,2024-03-01T22:22:25.913000
|
||||
CVE-2024-27744,0,0,678780b6b69944545a0d8cad148a51f5d84c2d7bab88f74324d94f2ee8805643,2024-03-01T22:22:25.913000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user