Auto-Update: 2024-03-07T19:00:37.916459+00:00

This commit is contained in:
cad-safe-bot 2024-03-07 19:03:27 +00:00
parent 82c75b9a2d
commit 98efa655f2
53 changed files with 1243 additions and 191 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2017-18595",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-09-04T21:15:10.677",
"lastModified": "2023-02-23T23:07:23.393",
"lastModified": "2024-03-07T17:45:50.977",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -85,8 +85,44 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.10",
"versionEndExcluding": "3.16.55",
"matchCriteriaId": "49901FEE-9793-440B-990B-EFE1BF47A04B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.17",
"versionEndExcluding": "3.18.91",
"matchCriteriaId": "DF019A06-E384-45E0-9249-DF86D759E427"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.19",
"versionEndExcluding": "4.1.50",
"matchCriteriaId": "F71F6650-13B4-486F-80AC-20D871806D44"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2",
"versionEndExcluding": "4.4.109",
"matchCriteriaId": "E7BEC3D4-7038-49AD-B148-012F960F2B29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "4.9.74",
"matchCriteriaId": "5EED08F2-CAB9-4270-8714-16E9C8FAE7C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.11",
"matchCriteriaId": "A84E4D94-A9A4-424C-8262-0B7B89C8CB6D"
"matchCriteriaId": "C9DFD0E4-9A4A-40D5-9DC5-D8DD9F99AC93"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-4886",
"sourceIdentifier": "jordan@liggitt.net",
"published": "2023-10-25T20:15:09.790",
"lastModified": "2023-11-02T18:05:23.427",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:09.470",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -122,6 +122,10 @@
"Mailing List",
"Mitigation"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0013/",
"source": "jordan@liggitt.net"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1192",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-11-01T20:15:08.597",
"lastModified": "2023-11-09T15:24:11.003",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:09.620",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -134,12 +134,8 @@
]
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=98bea253aa28ad8be2ce565a9ca21beb4a9419e5",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Patch"
]
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686f",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27859",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-01-22T20:15:46.550",
"lastModified": "2024-01-25T02:03:31.223",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:09.753",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -149,6 +149,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0002/",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7105503",
"source": "psirt@us.ibm.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28525",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-01T02:15:06.860",
"lastModified": "2024-03-01T14:04:26.010",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-07T17:49:21.083",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -50,14 +70,43 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:9.7.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "CE06AC34-D09F-4BD8-B115-1691D8643419"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors_web_access:9.7.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "13ECE46A-0CFF-4199-A8B3-923077E07484"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/251052",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7124058",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28949",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-01T02:15:07.063",
"lastModified": "2024-03-01T14:04:26.010",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-07T17:50:02.250",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -50,14 +70,43 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:9.7.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "CE06AC34-D09F-4BD8-B115-1691D8643419"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors_web_access:9.7.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "13ECE46A-0CFF-4199-A8B3-923077E07484"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/251216",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7124058",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36328",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-01T16:15:08.177",
"lastModified": "2023-11-07T04:16:32.303",
"vulnStatus": "Modified",
"lastModified": "2024-03-07T17:46:02.277",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -60,8 +60,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libtom:libtommath:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023-05-09",
"matchCriteriaId": "0838AE42-FC51-47AA-8752-C22D933B108C"
"versionEndExcluding": "1.2.1",
"matchCriteriaId": "9BC47322-AA42-412B-9955-4D565114FA8A"
}
]
}
@ -73,10 +73,20 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
}
]
}
@ -94,15 +104,27 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3H2PFUTBKQUDSOJXQQS7LUSZQWT3JTW2/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46GORAXZ34MHQNUGJBKS7PJ5NSMIAJGC/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6ZUPWZGPFJ4JOI2NIP7YLRKZD5YXQTBK/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-38161",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:22.850",
"lastModified": "2023-09-14T18:33:24.090",
"lastModified": "2024-03-07T17:46:16.493",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Windows GDI Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de Elevaci\u00f3n de Privilegios de Windows GDI"
}
],
"metrics": {
@ -74,8 +78,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.3448",
"matchCriteriaId": "098480E4-3DF9-4AE1-AD98-5A24C7D135FC"
"versionEndExcluding": "10.0.19044.3448",
"matchCriteriaId": "139662E6-EF56-4398-AEE8-406B8D4F1BC4"
},
{
"vulnerable": true,

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45193",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-01-22T19:15:08.520",
"lastModified": "2024-01-25T02:04:23.543",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:09.880",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -134,6 +134,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0001/",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7105501",
"source": "psirt@us.ibm.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45229",
"sourceIdentifier": "infosec@edk2.groups.io",
"published": "2024-01-16T16:15:11.533",
"lastModified": "2024-01-23T19:39:38.607",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:10.000",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -121,6 +121,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
"source": "infosec@edk2.groups.io"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45230",
"sourceIdentifier": "infosec@edk2.groups.io",
"published": "2024-01-16T16:15:11.727",
"lastModified": "2024-01-23T19:39:22.663",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:10.133",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -120,6 +120,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
"source": "infosec@edk2.groups.io"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45231",
"sourceIdentifier": "infosec@edk2.groups.io",
"published": "2024-01-16T16:15:11.910",
"lastModified": "2024-01-23T15:59:40.570",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:10.247",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -120,6 +120,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
"source": "infosec@edk2.groups.io"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45232",
"sourceIdentifier": "infosec@edk2.groups.io",
"published": "2024-01-16T16:15:12.090",
"lastModified": "2024-01-23T19:39:11.070",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:10.340",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -120,6 +120,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
"source": "infosec@edk2.groups.io"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45233",
"sourceIdentifier": "infosec@edk2.groups.io",
"published": "2024-01-16T16:15:12.277",
"lastModified": "2024-01-23T19:40:59.837",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:10.427",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -120,6 +120,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
"source": "infosec@edk2.groups.io"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45234",
"sourceIdentifier": "infosec@edk2.groups.io",
"published": "2024-01-16T16:15:12.460",
"lastModified": "2024-01-23T15:58:34.470",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:10.510",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -120,6 +120,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
"source": "infosec@edk2.groups.io"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45235",
"sourceIdentifier": "infosec@edk2.groups.io",
"published": "2024-01-16T16:15:12.643",
"lastModified": "2024-01-23T15:58:27.183",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:10.590",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -120,6 +120,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
"source": "infosec@edk2.groups.io"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45236",
"sourceIdentifier": "infosec@edk2.groups.io",
"published": "2024-01-16T16:15:12.820",
"lastModified": "2024-01-23T16:00:56.453",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:10.670",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -112,6 +112,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
"source": "infosec@edk2.groups.io"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45237",
"sourceIdentifier": "infosec@edk2.groups.io",
"published": "2024-01-16T16:15:13.013",
"lastModified": "2024-01-23T16:07:09.993",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:10.760",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -112,6 +112,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
"source": "infosec@edk2.groups.io"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47141",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-01-22T21:15:09.367",
"lastModified": "2024-01-25T02:01:48.147",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:10.847",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -134,6 +134,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0001/",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7105497",
"source": "psirt@us.ibm.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47145",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-01-07T19:15:08.017",
"lastModified": "2024-01-11T16:01:42.240",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:10.943",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -124,6 +124,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0003/",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7105500",
"source": "psirt@us.ibm.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47152",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-01-22T20:15:46.890",
"lastModified": "2024-01-25T02:03:02.823",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:11.063",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -124,6 +124,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0001/",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7105605",
"source": "psirt@us.ibm.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-47158",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-01-22T20:15:47.077",
"lastModified": "2024-02-05T19:15:08.353",
"lastModified": "2024-03-07T17:15:11.147",
"vulnStatus": "Modified",
"descriptions": [
{
@ -159,6 +159,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0002/",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7105496",
"source": "psirt@us.ibm.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47746",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-01-22T19:15:08.730",
"lastModified": "2024-01-25T02:04:12.947",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:11.277",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -159,6 +159,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0003/",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7105505",
"source": "psirt@us.ibm.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47747",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-01-22T20:15:47.267",
"lastModified": "2024-01-25T02:02:36.850",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:11.373",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -159,6 +159,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0002/",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7105502",
"source": "psirt@us.ibm.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-48725",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-03-07T15:15:07.733",
"lastModified": "2024-03-07T16:15:45.123",
"lastModified": "2024-03-07T18:15:46.497",
"vulnStatus": "Received",
"descriptions": [
{
@ -54,10 +54,6 @@
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1887",
"source": "talos-cna@cisco.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1887",
"source": "talos-cna@cisco.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50305",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-01T02:15:07.590",
"lastModified": "2024-03-01T14:04:26.010",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-07T17:50:18.457",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.4,
"impactScore": 3.6
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -50,14 +70,43 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:9.7.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "CE06AC34-D09F-4BD8-B115-1691D8643419"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors_web_access:9.7.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "13ECE46A-0CFF-4199-A8B3-923077E07484"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/273336",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7124058",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50308",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-01-22T19:15:09.003",
"lastModified": "2024-01-25T02:03:49.987",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:11.473",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -134,6 +134,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0001/",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7105506",
"source": "psirt@us.ibm.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-50387",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-14T16:15:45.300",
"lastModified": "2024-03-04T03:15:06.217",
"lastModified": "2024-03-07T17:15:11.587",
"vulnStatus": "Modified",
"descriptions": [
{
@ -393,6 +393,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0007/",
"source": "cve@mitre.org"
},
{
"url": "https://www.athene-center.de/aktuelles/key-trap",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-50868",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-14T16:15:45.377",
"lastModified": "2024-03-04T03:15:06.500",
"lastModified": "2024-03-07T17:15:11.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -100,6 +100,10 @@
"url": "https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/",
"source": "cve@mitre.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0008/",
"source": "cve@mitre.org"
},
{
"url": "https://www.isc.org/blogs/2024-bind-security-release/",
"source": "cve@mitre.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5043",
"sourceIdentifier": "jordan@liggitt.net",
"published": "2023-10-25T20:15:18.037",
"lastModified": "2023-11-02T17:54:38.423",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:11.983",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -123,6 +123,10 @@
"Mailing List",
"Mitigation"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0012/",
"source": "jordan@liggitt.net"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5044",
"sourceIdentifier": "jordan@liggitt.net",
"published": "2023-10-25T20:15:18.187",
"lastModified": "2023-11-02T17:45:26.790",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:12.073",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -123,6 +123,10 @@
"Mailing List",
"Mitigation"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0012/",
"source": "jordan@liggitt.net"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5088",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-11-03T14:15:08.560",
"lastModified": "2023-12-08T19:15:08.203",
"vulnStatus": "Modified",
"lastModified": "2024-03-07T17:46:40.173",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -89,8 +89,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D9E0C78-9678-4CEE-9389-962CF618A51F"
"criteria": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.2.0",
"matchCriteriaId": "8298AC47-931D-466E-8EFF-6F9CD0F0E504"
}
]
}
@ -148,7 +149,10 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20231208-0005/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52426",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-04T20:15:46.120",
"lastModified": "2024-02-26T16:27:48.450",
"lastModified": "2024-03-07T17:15:11.893",
"vulnStatus": "Modified",
"descriptions": [
{
@ -98,6 +98,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/",
"source": "cve@mitre.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0005/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6816",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-18T05:15:08.607",
"lastModified": "2024-02-09T02:15:08.207",
"lastModified": "2024-03-07T17:15:12.180",
"vulnStatus": "Modified",
"descriptions": [
{
@ -253,6 +253,10 @@
{
"url": "https://security.gentoo.org/glsa/202401-30",
"source": "secalert@redhat.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0006/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-7242",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-03-01T21:15:07.213",
"lastModified": "2024-03-01T22:22:25.913",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-07T17:50:48.090",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\n\nIndustrial Control Systems Network Protocol Parsers (ICSNPP) - Ethercat \nZeek Plugin versions d78dda6 and prior are vulnerable to out-of-bounds \nread during the process of analyzing a specific Ethercat packet. This \ncould allow an attacker to crash the Zeek process and leak some \ninformation in memory.\n\n\n\n\n\n"
},
{
"lang": "es",
"value": "Industrial Control Systems Network Protocol Parsers (ICSNPP): las versiones d78dda6 y anteriores del complemento Ethercat Zeek son vulnerables a lecturas fuera de los l\u00edmites durante el proceso de an\u00e1lisis de un paquete Ethercat espec\u00edfico. Esto podr\u00eda permitir que un atacante bloquee el proceso Zeek y filtre informaci\u00f3n en la memoria."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -46,10 +80,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisa:icsnpp-ethercat:*:*:*:*:*:zeek:*:*",
"versionEndIncluding": "d78dda6",
"matchCriteriaId": "D713D8FB-83DA-4BA8-87B2-CEB65DB5BBFE"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-051-02",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource",
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-7243",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-03-01T21:15:07.417",
"lastModified": "2024-03-01T22:22:25.913",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-07T17:51:08.413",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nIndustrial Control Systems Network Protocol Parsers (ICSNPP) - Ethercat \nZeek Plugin versions d78dda6 and prior are vulnerable to out-of-bounds \nwrite while analyzing specific Ethercat datagrams. This could allow an \nattacker to cause arbitrary code execution.\n\n\n\n"
},
{
"lang": "es",
"value": "Industrial Control Systems Network Protocol Parsers (ICSNPP): las versiones d78dda6 y anteriores del complemento Ethercat Zeek son vulnerables a escritura fuera de los l\u00edmites al analizar datagramas Ethercat espec\u00edficos. Esto podr\u00eda permitir que un atacante provoque la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -46,10 +70,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisa:icsnpp-ethercat:*:*:*:*:*:zeek:*:*",
"versionEndIncluding": "d78dda6",
"matchCriteriaId": "D713D8FB-83DA-4BA8-87B2-CEB65DB5BBFE"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-051-02",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource",
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-7244",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-03-01T21:15:07.613",
"lastModified": "2024-03-01T22:22:25.913",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-07T17:51:19.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Industrial Control Systems Network Protocol Parsers (ICSNPP) - Ethercat \nZeek Plugin versions d78dda6 and prior are vulnerable to out-of-bounds \nwrite in their primary analyses function for Ethercat communication \npackets. This could allow an attacker to cause arbitrary code execution.\n\n"
},
{
"lang": "es",
"value": "Industrial Control Systems Network Protocol Parsers (ICSNPP): las versiones d78dda6 y anteriores del complemento Ethercat Zeek son vulnerables a escritura fuera de los l\u00edmites en su funci\u00f3n de an\u00e1lisis principal para paquetes de comunicaci\u00f3n Ethercat. Esto podr\u00eda permitir que un atacante provoque la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -46,10 +70,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisa:icsnpp-ethercat:*:*:*:*:*:zeek:*:*",
"versionEndIncluding": "d78dda6",
"matchCriteriaId": "D713D8FB-83DA-4BA8-87B2-CEB65DB5BBFE"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-051-02",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource",
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0408",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-18T16:15:08.380",
"lastModified": "2024-02-09T02:15:08.383",
"lastModified": "2024-03-07T17:15:12.400",
"vulnStatus": "Modified",
"descriptions": [
{
@ -233,6 +233,10 @@
{
"url": "https://security.gentoo.org/glsa/202401-30",
"source": "secalert@redhat.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0006/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0409",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-18T16:15:08.593",
"lastModified": "2024-02-09T02:15:08.533",
"lastModified": "2024-03-07T17:15:12.540",
"vulnStatus": "Modified",
"descriptions": [
{
@ -234,6 +234,10 @@
{
"url": "https://security.gentoo.org/glsa/202401-30",
"source": "secalert@redhat.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0006/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0853",
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
"published": "2024-02-03T14:15:50.850",
"lastModified": "2024-02-16T15:17:48.757",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:12.657",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -89,6 +89,10 @@
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0004/",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
}
]
}

View File

@ -0,0 +1,71 @@
{
"id": "CVE-2024-1351",
"sourceIdentifier": "cna@mongodb.com",
"published": "2024-03-07T17:15:12.740",
"lastModified": "2024-03-07T17:15:12.740",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Under certain configurations of --tlsCAFile and tls.CAFile, MongoDB Server may skip peer certificate validation which may result in untrusted connections to succeed. This may effectively reduce the security guarantees provided by TLS and open connections that should have been closed due to failing certificate validation. This issue affects MongoDB Server v7.0 versions prior to and including 7.0.5, MongoDB Server v6.0 versions prior to and including 6.0.13, MongoDB Server v5.0 versions prior to and including 5.0.24 and MongoDB Server v4.4 versions prior to and including 4.4.28.\n\nRequired Configuration : A server process will allow incoming connections to skip peer certificate validation if the server process was started with TLS enabled (net.tls.mode set to allowTLS, preferTLS, or requireTLS) and without a net.tls.CAFile configured.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@mongodb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cna@mongodb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
}
],
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-72839",
"source": "cna@mongodb.com"
},
{
"url": "https://www.mongodb.com/docs/manual/release-notes/4.4/#4.4.29---february-28--2024",
"source": "cna@mongodb.com"
},
{
"url": "https://www.mongodb.com/docs/manual/release-notes/7.0/#7.0.6---feb-28--2024",
"source": "cna@mongodb.com"
},
{
"url": "https://www.mongodb.com/docs/v5.0/release-notes/5.0/#5.0.25---february-28--2024",
"source": "cna@mongodb.com"
},
{
"url": "https://www.mongodb.com/docs/v6.0/release-notes/6.0/#6.0.14---feb-28--2024",
"source": "cna@mongodb.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-1442",
"sourceIdentifier": "security@grafana.com",
"published": "2024-03-07T18:15:46.590",
"lastModified": "2024-03-07T18:15:46.590",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": " A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.\nDoing this will grant the user access to read, query, edit and delete all data sources within the organization.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@grafana.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "security@grafana.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://grafana.com/security/security-advisories/cve-2024-1442/",
"source": "security@grafana.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21351",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-02-13T18:15:51.333",
"lastModified": "2024-02-15T02:00:01.653",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-07T17:48:52.180",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2024-02-13",
"cisaActionDue": "2024-03-05",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
@ -12,6 +12,10 @@
{
"lang": "en",
"value": "Windows SmartScreen Security Feature Bypass Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad SmartScreen de Windows"
}
],
"metrics": {
@ -38,10 +42,127 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20469",
"matchCriteriaId": "448534CE-1C07-4DF1-8EDD-C43C3492898B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.14393.6709",
"matchCriteriaId": "57927CA7-FE09-43AA-9F66-6E68EE3125D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.14393.6709",
"matchCriteriaId": "6D84C15B-58BF-4124-A1AF-BE62B4259D2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.17763.5458",
"matchCriteriaId": "97FA2666-D83E-4645-AB34-B17DD82A705B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.17763.5458",
"matchCriteriaId": "9EF5A993-EF3B-4BE1-8325-62354DD7A7E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.17763.5458",
"matchCriteriaId": "1957C71A-2CE0-4173-8BB6-0BE0E93E9BCC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.4046",
"matchCriteriaId": "C78776CC-3A9C-41A3-8BEB-D71D92F6579D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.4046",
"matchCriteriaId": "806CA6D2-42B2-4244-A5ED-D23E6DD56772"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.2777",
"matchCriteriaId": "3F7F8173-9E59-48E4-98C9-4BEB6AE79451"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.3155",
"matchCriteriaId": "84EDBE52-EFE0-4D6D-AA76-698B6F9687D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.3155",
"matchCriteriaId": "900D1DA2-6DA7-4681-966A-B9973B1329EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.5458",
"matchCriteriaId": "A9098F92-79E7-4762-A37C-99B4CFA8CDD1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2322",
"matchCriteriaId": "5C8F0436-3AFE-48BD-AE92-8F8392DD0A1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.709",
"matchCriteriaId": "B6FCF1A0-6B8E-457A-AB6A-2DE939B9D18B"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21351",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21412",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-02-13T18:15:59.903",
"lastModified": "2024-02-15T02:00:01.653",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-07T17:48:58.173",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2024-02-13",
"cisaActionDue": "2024-03-05",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
@ -12,6 +12,10 @@
{
"lang": "en",
"value": "Internet Shortcut Files Security Feature Bypass Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de archivos de acceso directo a Internet"
}
],
"metrics": {
@ -38,10 +42,122 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.17763.5458",
"matchCriteriaId": "97FA2666-D83E-4645-AB34-B17DD82A705B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.17763.5458",
"matchCriteriaId": "9EF5A993-EF3B-4BE1-8325-62354DD7A7E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.17763.5458",
"matchCriteriaId": "1957C71A-2CE0-4173-8BB6-0BE0E93E9BCC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.4046",
"matchCriteriaId": "C78776CC-3A9C-41A3-8BEB-D71D92F6579D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.19045.4046",
"matchCriteriaId": "9A6AFF70-FED0-4AF5-9D8F-5C90BF982941"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.19045.4046",
"matchCriteriaId": "A0B61E17-FC01-4FF3-BF96-37819033F412"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.22000.2777",
"matchCriteriaId": "481C9CDC-7383-4D08-9608-BDA2F9FADB36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.22000.2777",
"matchCriteriaId": "60E272E2-0D33-4342-92C3-5D66C89DE531"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.3155",
"matchCriteriaId": "84EDBE52-EFE0-4D6D-AA76-698B6F9687D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.22631.3155",
"matchCriteriaId": "E2FB8ADD-663B-445B-B0F2-6B5E168D9E2E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.22631.3155",
"matchCriteriaId": "679CCD68-F014-452C-8D3F-F9D17329779C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.5458",
"matchCriteriaId": "A9098F92-79E7-4762-A37C-99B4CFA8CDD1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2322",
"matchCriteriaId": "5C8F0436-3AFE-48BD-AE92-8F8392DD0A1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.709",
"matchCriteriaId": "B6FCF1A0-6B8E-457A-AB6A-2DE939B9D18B"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21412",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-22752",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-07T18:15:46.810",
"lastModified": "2024-03-07T18:15:46.810",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions issue in EaseUS MobiMover 6.0.5 Build 21620 allows attackers to gain escalated privileges via use of crafted executable launched from the application installation directory."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/hacker625/CVE-2024-22752",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23225",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-05T20:16:01.370",
"lastModified": "2024-03-07T02:00:02.283",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-03-07T17:51:50.353",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2024-03-06",
"cisaActionDue": "2024-03-27",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
@ -18,15 +18,94 @@
"value": "Se solucion\u00f3 un problema de corrupci\u00f3n de memoria con una validaci\u00f3n mejorada. Este problema se solucion\u00f3 en iOS 16.7.6 y iPadOS 16.7.6, iOS 17.4 y iPadOS 17.4. Un atacante con capacidad arbitraria de lectura y escritura del kernel puede eludir las protecciones de la memoria del kernel. Apple tiene conocimiento de un informe que indica que este problema puede haber sido aprovechado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7.6",
"matchCriteriaId": "E4D5AB12-A4B6-4456-A560-DD1FFE8E8CA8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.4",
"matchCriteriaId": "E9F4BB50-D14B-4807-8F38-69ADFCE433BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7.6",
"matchCriteriaId": "2AF8B925-3DE5-4CC8-A4C3-95D8F107D607"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.4",
"matchCriteriaId": "C2FE8515-300C-4B6F-92A0-7D1E6D93F907"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT214081",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214082",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23296",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-05T20:16:01.553",
"lastModified": "2024-03-07T02:00:02.283",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-03-07T17:52:12.170",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2024-03-06",
"cisaActionDue": "2024-03-27",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
@ -18,11 +18,73 @@
"value": "Se solucion\u00f3 un problema de corrupci\u00f3n de memoria con una validaci\u00f3n mejorada. Este problema se solucion\u00f3 en iOS 17.4 y iPadOS 17.4. Un atacante con capacidad arbitraria de lectura y escritura del kernel puede eludir las protecciones de la memoria del kernel. Apple tiene conocimiento de un informe que indica que este problema puede haber sido aprovechado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.4",
"matchCriteriaId": "CE5413B9-A1A8-499F-B047-163908202E69"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.4",
"matchCriteriaId": "BCB4911E-7824-4C34-916D-88110CB415EB"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT214081",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23897",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-01-24T18:15:09.370",
"lastModified": "2024-02-29T11:15:08.647",
"vulnStatus": "Modified",
"lastModified": "2024-03-07T17:47:35.020",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -21,20 +21,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
"impactScore": 5.9
}
]
},
@ -60,14 +60,14 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"versionEndIncluding": "2.426.2",
"matchCriteriaId": "6007B374-F6EF-48E5-B63B-B5DDDC41B706"
"versionEndExcluding": "2.426.3",
"matchCriteriaId": "669379F5-5F67-4002-AD76-F8C470C89D61"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*",
"versionEndIncluding": "2.441",
"matchCriteriaId": "F32E6FB9-B0D3-47A8-A060-D8F85ED38AB7"
"versionEndExcluding": "2.442",
"matchCriteriaId": "493B263C-C8C7-4741-B7F8-B672E86CC8B4"
}
]
}
@ -79,7 +79,8 @@
"url": "http://packetstormsecurity.com/files/176839/Jenkins-2.441-LTS-2.426.3-CVE-2024-23897-Scanner.html",
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Third Party Advisory"
"Third Party Advisory",
"VDB Entry"
]
},
{
@ -87,12 +88,16 @@
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Exploit",
"Third Party Advisory"
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/01/24/6",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25710",
"sourceIdentifier": "security@apache.org",
"published": "2024-02-19T09:15:37.943",
"lastModified": "2024-02-22T15:24:45.240",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:12.940",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -104,6 +104,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0010/",
"source": "security@apache.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26308",
"sourceIdentifier": "security@apache.org",
"published": "2024-02-19T09:15:38.277",
"lastModified": "2024-02-22T15:21:36.213",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-07T17:15:13.050",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -84,6 +84,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0009/",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-27733",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-07T17:15:13.120",
"lastModified": "2024-03-07T17:15:13.120",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "File Upload vulnerability in Byzro Network Smart s42 Management Platform v.S42 allows a local attacker to execute arbitrary code via the useratte/userattestation.php component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Sadw11v/cve/blob/main/upload.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-07T17:00:30.124741+00:00
2024-03-07T19:00:37.916459+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-07T16:15:45.123000+00:00
2024-03-07T18:15:46.810000+00:00
```
### Last Data Feed Release
@ -29,22 +29,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
240779
240783
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `4`
* [CVE-2023-48725](CVE-2023/CVE-2023-487xx/CVE-2023-48725.json) (`2024-03-07T15:15:07.733`)
* [CVE-2024-1351](CVE-2024/CVE-2024-13xx/CVE-2024-1351.json) (`2024-03-07T17:15:12.740`)
* [CVE-2024-1442](CVE-2024/CVE-2024-14xx/CVE-2024-1442.json) (`2024-03-07T18:15:46.590`)
* [CVE-2024-22752](CVE-2024/CVE-2024-227xx/CVE-2024-22752.json) (`2024-03-07T18:15:46.810`)
* [CVE-2024-27733](CVE-2024/CVE-2024-277xx/CVE-2024-27733.json) (`2024-03-07T17:15:13.120`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `47`
* [CVE-2024-0818](CVE-2024/CVE-2024-08xx/CVE-2024-0818.json) (`2024-03-07T15:15:08.147`)
* [CVE-2024-0917](CVE-2024/CVE-2024-09xx/CVE-2024-0917.json) (`2024-03-07T15:15:08.257`)
* [CVE-2023-47746](CVE-2023/CVE-2023-477xx/CVE-2023-47746.json) (`2024-03-07T17:15:11.277`)
* [CVE-2023-47747](CVE-2023/CVE-2023-477xx/CVE-2023-47747.json) (`2024-03-07T17:15:11.373`)
* [CVE-2023-48725](CVE-2023/CVE-2023-487xx/CVE-2023-48725.json) (`2024-03-07T18:15:46.497`)
* [CVE-2023-50305](CVE-2023/CVE-2023-503xx/CVE-2023-50305.json) (`2024-03-07T17:50:18.457`)
* [CVE-2023-50308](CVE-2023/CVE-2023-503xx/CVE-2023-50308.json) (`2024-03-07T17:15:11.473`)
* [CVE-2023-50387](CVE-2023/CVE-2023-503xx/CVE-2023-50387.json) (`2024-03-07T17:15:11.587`)
* [CVE-2023-5043](CVE-2023/CVE-2023-50xx/CVE-2023-5043.json) (`2024-03-07T17:15:11.983`)
* [CVE-2023-5044](CVE-2023/CVE-2023-50xx/CVE-2023-5044.json) (`2024-03-07T17:15:12.073`)
* [CVE-2023-50868](CVE-2023/CVE-2023-508xx/CVE-2023-50868.json) (`2024-03-07T17:15:11.817`)
* [CVE-2023-5088](CVE-2023/CVE-2023-50xx/CVE-2023-5088.json) (`2024-03-07T17:46:40.173`)
* [CVE-2023-52426](CVE-2023/CVE-2023-524xx/CVE-2023-52426.json) (`2024-03-07T17:15:11.893`)
* [CVE-2023-6816](CVE-2023/CVE-2023-68xx/CVE-2023-6816.json) (`2024-03-07T17:15:12.180`)
* [CVE-2023-7242](CVE-2023/CVE-2023-72xx/CVE-2023-7242.json) (`2024-03-07T17:50:48.090`)
* [CVE-2023-7243](CVE-2023/CVE-2023-72xx/CVE-2023-7243.json) (`2024-03-07T17:51:08.413`)
* [CVE-2023-7244](CVE-2023/CVE-2023-72xx/CVE-2023-7244.json) (`2024-03-07T17:51:19.000`)
* [CVE-2024-0408](CVE-2024/CVE-2024-04xx/CVE-2024-0408.json) (`2024-03-07T17:15:12.400`)
* [CVE-2024-0409](CVE-2024/CVE-2024-04xx/CVE-2024-0409.json) (`2024-03-07T17:15:12.540`)
* [CVE-2024-0853](CVE-2024/CVE-2024-08xx/CVE-2024-0853.json) (`2024-03-07T17:15:12.657`)
* [CVE-2024-21351](CVE-2024/CVE-2024-213xx/CVE-2024-21351.json) (`2024-03-07T17:48:52.180`)
* [CVE-2024-21412](CVE-2024/CVE-2024-214xx/CVE-2024-21412.json) (`2024-03-07T17:48:58.173`)
* [CVE-2024-23225](CVE-2024/CVE-2024-232xx/CVE-2024-23225.json) (`2024-03-07T17:51:50.353`)
* [CVE-2024-23296](CVE-2024/CVE-2024-232xx/CVE-2024-23296.json) (`2024-03-07T17:52:12.170`)
* [CVE-2024-23897](CVE-2024/CVE-2024-238xx/CVE-2024-23897.json) (`2024-03-07T17:47:35.020`)
* [CVE-2024-25710](CVE-2024/CVE-2024-257xx/CVE-2024-25710.json) (`2024-03-07T17:15:12.940`)
* [CVE-2024-26308](CVE-2024/CVE-2024-263xx/CVE-2024-26308.json) (`2024-03-07T17:15:13.050`)
## Download and Usage

View File

@ -101852,7 +101852,7 @@ CVE-2017-18591,0,0,3ccbac5e926ec40a7629e4f7fef9755b4ab09764d021ad8ee525e680cdf8b
CVE-2017-18592,0,0,c7eaa76231acd890525b0db3c3436d212df09188e584289ea2bb19fde7592c1d,2019-08-29T15:54:17.940000
CVE-2017-18593,0,0,c54163a2100d390258ac438af5b1226d4327bad71c6e00d607e4120c606d7baf,2019-08-30T20:12:44.350000
CVE-2017-18594,0,0,2a7680d1879dc6f96384171d5a2142a37493bfce8e80eff155966e1b5b49f149,2019-09-26T12:15:10.347000
CVE-2017-18595,0,0,8558c80e0b8fc9a1e74fef93066f692a406db0803e0502d6b6ec32c640368ac0,2023-02-23T23:07:23.393000
CVE-2017-18595,0,1,189189ded6d17c97bb926e72a02b05acf0865dfb654a26f83900d08cc8a56288,2024-03-07T17:45:50.977000
CVE-2017-18596,0,0,a680c0e03a2412453808a406b270b9ad95d46c1476c97d700869ed68a9b22fbd,2020-08-25T12:35:58.723000
CVE-2017-18597,0,0,c8e5f5a8729c5fa9d63aa4e35f77b41425620cc69fbfca075ca329550e7a7108,2019-09-10T20:43:12.960000
CVE-2017-18598,0,0,58fd927bb2d75dfdacec027ea1b4385af0d85bd1fbb2b8b42c0381e79bb495ca,2019-09-10T17:21:55.597000
@ -211323,7 +211323,7 @@ CVE-2022-4882,0,0,9dbb43dedac8d8de9064de26e4f2fce55f1a52d4bb1c0f26c0dc7d345f3036
CVE-2022-4883,0,0,9c652f454eb98f51746b7543d23cdfc2a1cc8d56ddc8392b10b53c00232483c6,2023-10-17T15:55:36.773000
CVE-2022-4884,0,0,798b78539b695dec5692fb25024ba248d78abd48f32a8f338fa903542bd07342,2023-01-12T21:23:17.837000
CVE-2022-4885,0,0,bff67f132b1382b565b0162be245b1900e23e7966004cd6a8fee33bda4eaac5f,2024-02-29T01:36:49.297000
CVE-2022-4886,0,0,f0118a465f292586d5895b5982b510c98abf6dad8e4e9b84d973ed5a281fea61,2023-11-02T18:05:23.427000
CVE-2022-4886,0,1,f02ba78f4af0afa851086018a3bea02fdbca24a6362ec8a068c9b4338bba6f6f,2024-03-07T17:15:09.470000
CVE-2022-4888,0,0,dafe103df0fcf10fe43033ef8822e9be6466c3bbfd0cc09003954252b8765280,2023-11-07T03:59:13.600000
CVE-2022-4889,0,0,f3ecfdbc03bb38e3af4e99289f7aa97aea023da910733a40db189ddf077246dc,2024-02-29T01:36:49.420000
CVE-2022-4890,0,0,c371bd2631f37e57be5ee879142ff90121dbebef07aefe82b7e3da223c384390,2024-02-29T01:36:49.533000
@ -212529,7 +212529,7 @@ CVE-2023-1188,0,0,9e846fcd955202ae8e9f250598b66bf1a4e6762c2856c97ca89a64f51e62dd
CVE-2023-1189,0,0,a449f623733f462d0fa3f359225a02a010e0a82bd005dabddb8d44d07d72a6c4,2024-02-29T01:37:15.830000
CVE-2023-1190,0,0,58fc817617f4de7e9634312b320d02d305e334f933890f0b23792bd880d8a678,2024-02-29T01:37:15.927000
CVE-2023-1191,0,0,a4d4a636fa5fe21042f36a7cfdae6ed79b29496496db3cc8f6119a2ad31b5dfb,2024-02-29T01:37:16.020000
CVE-2023-1192,0,0,572fd38ca16ea64534d08ee116c67e4f5a94ffcad3857d843b21e6e1f83790cc,2023-11-09T15:24:11.003000
CVE-2023-1192,0,1,43f75905a84d60b4fe0024fb3344daff56e7e8be72197ab70df11568482fceb6,2024-03-07T17:15:09.620000
CVE-2023-1193,0,0,dc2f9a132ac2ca8284383e9305af2b7b7914a5c70822a6ddea25e36d093d4e45,2023-11-09T15:13:51.737000
CVE-2023-1194,0,0,e3c489657d9258a7ebcceef6eb19af9ef1f568365ec0d64e22ad7c6e7c28144b,2023-12-21T22:15:08.460000
CVE-2023-1195,0,0,c1160a2f7242a2032a241487e2adf46ebd473e7f0b951b8890d61c8afc9c143e,2023-05-26T18:27:29.387000
@ -219519,7 +219519,7 @@ CVE-2023-27855,0,0,4b5d8cf13eb565c0f3b89c29aea12274e6f1a048eff52b322eb4d8a9927d1
CVE-2023-27856,0,0,57809d3b05a9a8822217e7eb76fccce3a6b30297f5027e1aaf725280c7298ef9,2023-11-07T04:10:19.790000
CVE-2023-27857,0,0,2c3920cfac4b731a001d27ee4d27583a3feb911fb3597ad4dbc64b2eae406e44,2024-01-09T02:31:27.647000
CVE-2023-27858,0,0,8b6dce34823fa5ed0de7ce94814b7ea16cd2940f9adb89436bfb88a8f0a3d916,2023-11-07T18:07:36.920000
CVE-2023-27859,0,0,1d2949ce7a3055d98f4d4e73c8c2698006c5118be13fd6d8b75dd566dfa2196a,2024-01-25T02:03:31.223000
CVE-2023-27859,0,1,2c8ef2daff0ff454fc969899b7c73b962d239db8f5fe739d12de46e73882d6ba,2024-03-07T17:15:09.753000
CVE-2023-2786,0,0,d8b95aaceeea9d299d494d5d1b67adea7cec45363882e1b8873e4e1f485f5077,2023-06-26T17:48:28.750000
CVE-2023-27860,0,0,0f3e27ed4a59a583860342541d3c1eb8233c9ce2ea08284904698844cddf772a,2023-05-04T20:44:00.350000
CVE-2023-27861,0,0,8788d89e03f154b568e2330be390285d9f761b5b948a076deb2ddb5f1534c740,2023-06-09T23:58:43.357000
@ -220160,7 +220160,7 @@ CVE-2023-2852,0,0,9e7ab75f67deb8e584c7f063682dc633c05ba1ccab104314cbdc92fe0a93db
CVE-2023-28520,0,0,6d3894db7ff47e1b21104537808095d722e6ede0f5633aed0fbf9feb507162d6,2023-05-19T17:13:10.227000
CVE-2023-28522,0,0,8bbf4232c7eaccf09e2c9b67036392ce612e474f12236686ad3e107906edd35d,2023-05-22T14:51:38.743000
CVE-2023-28523,0,0,b3f81f65f3fd5d59de0aa2d2d7713a5ab62c4d885fba8eaa24205c7ae4048d6b,2023-12-12T21:08:23.727000
CVE-2023-28525,0,0,171a90a4ed20d9d1f8e3410e030e82a86601140ff3219f322735a44436c864aa,2024-03-01T14:04:26.010000
CVE-2023-28525,0,1,81dbf82b3a2de0091cfbc4678f9de712fd8ab41d382437fc0430b3b8faf59c21,2024-03-07T17:49:21.083000
CVE-2023-28526,0,0,58ba57da9ce51abaeb6f8cb3241c04b0118e6da3ef91b0bd1de57766333c8ef1,2023-12-12T21:05:56.680000
CVE-2023-28527,0,0,3c0856c2c085c342f3eb8c88a01e0a859fac1d2cb11aa4b7cdd086742ed44b3c,2023-12-12T21:05:28.540000
CVE-2023-28528,0,0,c604f5a424d72ff383c0d7050e9805d9ced96cd3d5a877a0d4e801f67e21c7c5,2023-05-18T16:15:09.617000
@ -220530,7 +220530,7 @@ CVE-2023-28936,0,0,8fe54381164956262dcd17033984b4cbdeb9e60805f90a3970abde4acbd7c
CVE-2023-28937,0,0,6e2a8c539f6d09f5964f825bc8d8fd021c125848a7c6be67887a164fe9468016,2023-06-13T10:15:10.047000
CVE-2023-28938,0,0,018feb89ef0cceb57c342d9dc53ed05f9f8ff11ec5e877251c1e8007715e4407,2023-11-07T04:10:58.907000
CVE-2023-2894,0,0,ad879ae0ef6b122688bafc156258cc3381ab42068278e00bb5364783ef6a423b,2023-11-07T04:13:29.760000
CVE-2023-28949,0,0,17a4072fd8e36a61514aa1abfaa2dc64489480fff9f4e9e2ff5ba8b589685124,2024-03-01T14:04:26.010000
CVE-2023-28949,0,1,853baa16026593cfc157bb44a21331344c461dee8c775192dcfebdd4fcebdd26,2024-03-07T17:50:02.250000
CVE-2023-2895,0,0,50c6f9db7e70a092eee6257538bf888f9ec56cf83a28736b342d2da6788a4d02,2023-11-07T04:13:29.950000
CVE-2023-28950,0,0,db426378ac1397a8ecc4a9df6d4f111d2cb20674db30fe6d21f67753d47b3d3b,2023-05-26T14:15:16.233000
CVE-2023-28953,0,0,2bad42558e8ded6db3fed9e65e510d495f26ff6ca7de5036d9bab6440feadda1,2023-08-14T19:15:10.920000
@ -225597,7 +225597,7 @@ CVE-2023-3632,0,0,320299693720ef84d57d01f8449a73311eb256538d0800daeb747bb6a62157
CVE-2023-36321,0,0,cc2c8c53c922b3a2245fc58bf10cc52f422e1d5cbd458d0657415f02299068c4,2023-10-24T23:40:13.823000
CVE-2023-36326,0,0,d1df7c74bc35e9a4a028b2d1d5e49b1bb16c66ac96201e75b2edaa0dc8b2a142,2023-09-06T00:04:24.377000
CVE-2023-36327,0,0,ae22984d8293ccc36bc9518fead752d9ab8ab03f4342ab78e57b3f79bfb6a331,2023-09-06T00:05:15.863000
CVE-2023-36328,0,0,7d2ec1c7abc117d1ebc712441b8623ba7f8f9756b42db50fe7b7f77bfbd1783e,2023-11-07T04:16:32.303000
CVE-2023-36328,0,1,8fff2c668bd38b09513a7a452a81cd12d32fbbebecfa02609aed7b2cf6ac27a4,2024-03-07T17:46:02.277000
CVE-2023-3633,0,0,3c9f796d8545fe65edc49bfeb6ac0e5b4551cb0003e3d8ef24c186ff877eeb05,2023-07-27T03:56:59.660000
CVE-2023-36339,0,0,c0648ec7fac0a5b076652494c53d99ccb043c74046b01d7452b471c486d6b1b1,2023-07-28T21:57:14.937000
CVE-2023-36340,0,0,a9c65e0c2e5a644199adc44144e99acaa60e4bd2efbdefc3b1346d65858752d0,2023-10-19T11:10:01.763000
@ -226900,7 +226900,7 @@ CVE-2023-38157,0,0,0644654ec7595404d46e68f331c2a5a07662e3022994980569512eb9c14b1
CVE-2023-38158,0,0,620a4376a873018b524ed1fa41e8abb1a39d9109805a9c3062e8002716b87355,2023-08-24T21:39:33.910000
CVE-2023-38159,0,0,65eae44058aa66997a6807a530bcb298e74054d101b7516747d5769e55402b62,2023-10-12T22:19:27.903000
CVE-2023-38160,0,0,1fd813b6c7976c00c8cfd8be4f9cf067696d5ca7c96046f392b62df9a2891008,2023-09-14T18:46:43.170000
CVE-2023-38161,0,0,616bca3ccbee5c16ae6ee9cd8a4cc6df1093965be75db8e96d963fedcf0f4fbe,2023-09-14T18:33:24.090000
CVE-2023-38161,0,1,6bde35b5f4216c14e27cf6e34f2523c0c0aee0d5224aa6f9752c57dbdf5a1d53,2024-03-07T17:46:16.493000
CVE-2023-38162,0,0,32e879aaf5b2b8afa7dfdb6a368787062c1e7bc8ded71090759e02885eee5f2b,2023-09-14T18:29:23.190000
CVE-2023-38163,0,0,39cd643de261052851186bc7e948417913f891fa520d830cd3887623e2445a78,2023-09-14T02:34:29.220000
CVE-2023-38164,0,0,09a8729087fcb6e6112d5ad6eff2ec6b9b0b58e61d210f474e273081520c45dd,2023-09-14T02:30:40.417000
@ -231405,7 +231405,7 @@ CVE-2023-45187,0,0,50fe3917bef6f155de7c2ef7d4d38b62123ce4c23e74e434f5c6a36d50e03
CVE-2023-45189,0,0,df153b6d1053e0ec8ad7a75797868a0b23f8c9deecf4676d70e63dec9cc0990b,2023-11-09T20:27:56.003000
CVE-2023-45190,0,0,ee5cdff23ea1c9c51b85b56e05c245a9158fa23b5938ef53dd8353ecb5eef64c,2024-02-15T04:41:35.763000
CVE-2023-45191,0,0,0471d71b4e832eeadfce865b6a4a3f21dfa7a9078549997d149920fc7d734d05,2024-02-15T04:43:16.217000
CVE-2023-45193,0,0,c3de42c53dd6d455a774a37c4f8763a7c3d5f2a16761fcec4d525d582477be2c,2024-01-25T02:04:23.543000
CVE-2023-45193,0,1,0c497ac09778c9b72ec1e37b357578dd6880cf4125371a7f2cb787ecdbc947cf,2024-03-07T17:15:09.880000
CVE-2023-45194,0,0,d5c89e53cbf9029912da4482ada08495c9f99ebbbb14329dd33526185af3bf8f,2023-10-31T18:08:52.140000
CVE-2023-45198,0,0,e83575150f55c9693ecaa3d3d8ecc28b28389ef4c4551e169f843e36cfbc4ca1,2023-10-11T17:15:31.923000
CVE-2023-45199,0,0,ffec34f4347277cf1a81398e2045556919c611109a0a71706ab507c8e66ad4f5,2023-10-12T18:19:39.860000
@ -231431,16 +231431,16 @@ CVE-2023-45225,0,0,0fb7960f90e9546b4a2991c9cdf514b6593013dc8179a1d69842eae888e49
CVE-2023-45226,0,0,7b86b40ba7207cafdbb9c5ef30954750c59f6071a71a21a99d196d749e54c9c6,2023-10-18T01:27:45.367000
CVE-2023-45227,0,0,4ffb0311b26c436ba20e67f324124acf224981c7f480b51fbf58a45a4e0a7901,2024-02-12T16:45:47.247000
CVE-2023-45228,0,0,d3ce09fbc0053d966a1c84575fc054963cc930f15296e011428d43b06e7ca000,2023-11-07T19:55:08.333000
CVE-2023-45229,0,0,53945af80c3e7262e368e75381623a623170287914194728911e94f35a79ce31,2024-01-23T19:39:38.607000
CVE-2023-45229,0,1,ba7df8658c821bb3ec61211859d4f1196e179fdd3ba514897a74ae64ee8462c4,2024-03-07T17:15:10
CVE-2023-4523,0,0,7594ef971654e5b13b747bcbe0f6a98b28a2c227054ae0ac208549d4afc41901,2023-09-29T15:39:05.767000
CVE-2023-45230,0,0,621beada92e7b9428d00f06a50db1812bb188e02d79a08fbbb0e3d553ea9c9ba,2024-01-23T19:39:22.663000
CVE-2023-45231,0,0,3af80ff53ca4ce51073d39a4cf09df8eb1964c49bfd7f48b7b61e9f375e7b5b5,2024-01-23T15:59:40.570000
CVE-2023-45232,0,0,712f2d35c1bd7623967e122aab06f60c008e1d46653a7d8a40f65966c3333be0,2024-01-23T19:39:11.070000
CVE-2023-45233,0,0,df58ebf8f541d594c532f8f4526b6b0e738297dd85105d55bb1879473485428b,2024-01-23T19:40:59.837000
CVE-2023-45234,0,0,8bde5bcea93e40a389cb98a1289db8a61a86ba5138772e7b708a69d32a3a8e18,2024-01-23T15:58:34.470000
CVE-2023-45235,0,0,d63e37b709bac24585e02351f459e70d2586b7571bac5615dd9d630b7fb0ebb7,2024-01-23T15:58:27.183000
CVE-2023-45236,0,0,9ae688713f2832bc5f80bb7a19a4bbcb7be4fc38f44847322744c60b768c53b4,2024-01-23T16:00:56.453000
CVE-2023-45237,0,0,7601aaee6b804ca085092f6eb17d1e27d1052eff695bbc3bb46c659aa7e49c5e,2024-01-23T16:07:09.993000
CVE-2023-45230,0,1,d519bd35b3993a3fb458dd365bcc37c4eee106c3eca5668477a2fcc497327eb1,2024-03-07T17:15:10.133000
CVE-2023-45231,0,1,fbbeb2f22df3db01e4122b1157e36b4d7b87da56bc68a5632f68a25eae66323a,2024-03-07T17:15:10.247000
CVE-2023-45232,0,1,05a1f11780c48729e8d559758265e57c5f802167eb837ee96a29259517e4a12d,2024-03-07T17:15:10.340000
CVE-2023-45233,0,1,d6c63a70c57013bb00e0d0afb4aa82975835477d09cfbb9be6bd0718f2d7987b,2024-03-07T17:15:10.427000
CVE-2023-45234,0,1,188a4ad340934a8970ceb47bfbb4e2e4ce2cb81c7a2e2832ff0b7a273b3407dd,2024-03-07T17:15:10.510000
CVE-2023-45235,0,1,a56b315e0a90e532fb1b31e4bf7b5813e3bc8139eca7adc42725ce5cc5635c3d,2024-03-07T17:15:10.590000
CVE-2023-45236,0,1,525499e6b39416baf89ff249494efc66f2267491565e0b1d6266bb92beb48bd9,2024-03-07T17:15:10.670000
CVE-2023-45237,0,1,b86309e9c318e2bf34954205b33e4af0526735c885502c1b3ed0bb23eefefa82,2024-03-07T17:15:10.760000
CVE-2023-45239,0,0,ceec829d8bee367996c0f5c7e35bbe30b5631d6dfbec310aeef7b055c317044a,2023-11-07T04:21:43.770000
CVE-2023-4524,0,0,733bd7f0ea8780ce69aa3faa4947052b9e0dd28f7ad1c0423b24c8bb385e1bec,2023-11-07T04:22:41.293000
CVE-2023-45240,0,0,da4de80f5b4496f4e42cb7a39c3ffc190dc14dfb523360c59a5be08b6de1a43c,2023-10-10T14:55:56.860000
@ -232724,15 +232724,15 @@ CVE-2023-47131,0,0,74701737596a712fff285f89765331d35b4717764abb7070b3f923f7da2cd
CVE-2023-47132,0,0,2614ca3b200a86dae2d77ae2380e37b32dd95d58dda33f9f5a2d0c6f8f5f2070,2024-02-15T17:07:31.827000
CVE-2023-4714,0,0,ba38e44e3f285bfa19218321f0903a8663d31b0bcb9265b78cdbac0e6e8837e4,2024-02-29T01:41:53.897000
CVE-2023-47140,0,0,e4dcc27272763d822e970013add6c6fa8a1afdb1559fdb5d66bb469884c6b2e4,2024-01-11T16:58:30.733000
CVE-2023-47141,0,0,9eaa40e7e50a1710e2ee6671dc0dbb74a946eb836f431d6e8df63c03242d813b,2024-01-25T02:01:48.147000
CVE-2023-47141,0,1,23931b7854521ec8a950e63ec1d2ed13eef864de3c1c46f0e662114edc8d4963,2024-03-07T17:15:10.847000
CVE-2023-47142,0,0,86791e2ccc9b86a9c9dc9d6496e778e63a8fda979369686cb84d0db0c9427f86,2024-02-08T19:32:57.063000
CVE-2023-47143,0,0,7acc48a2d5a4570d6f29396faeecc738d3ff93f287fe7f2c4731eabceb6dde76,2024-02-08T20:00:13.007000
CVE-2023-47144,0,0,83eb749854fa495bd83421f08126c9a63b91a925c2652c722fd715a8f60c0017,2024-02-08T20:01:15.150000
CVE-2023-47145,0,0,6db5909579bdc8a82dcc060c8691610ec6bc28cc5e7f4f9b82d242ed9bff7a38,2024-01-11T16:01:42.240000
CVE-2023-47145,0,1,620ae7f5678047a8c4108d9fbdf5fa18578054841b939f4838b425b9745ba933,2024-03-07T17:15:10.943000
CVE-2023-47146,0,0,20e69829653fae8f4b2686a3902570d251dd86f6502cbd24bd7e7bddd7d52e98,2023-12-27T17:50:55.147000
CVE-2023-47148,0,0,b288941dfe3b1bf420ecb81fb3f06fe48a4281a820ff4a84a19d97a629ab7c25,2024-02-08T19:58:30.023000
CVE-2023-47152,0,0,1cb00cbfe8da05419f387cc02f2b2ac3c21da849d61ef2c5cb84f751cbd335ee,2024-01-25T02:03:02.823000
CVE-2023-47158,0,0,ba60a8c8f917d3f769be1f887c353f90f677a2df83b62672e4563404f8748c47,2024-02-05T19:15:08.353000
CVE-2023-47152,0,1,21eae157a0c14eb599c0d65626b59a59bd4bef9c2fca5d41f60c8cae56283468,2024-03-07T17:15:11.063000
CVE-2023-47158,0,1,846f95a2725be32047541f14ae8c358ff876d7b2eaf417c4327cad289f3b21cd,2024-03-07T17:15:11.147000
CVE-2023-4716,0,0,19a8e4bcfef050287a950063ecd9c6c3a76d47aa7d1ec3543611c805970cc149,2023-11-07T04:22:53.527000
CVE-2023-47161,0,0,aa545c6f0a0ec7887c0d704af140334d0b005fb716fcaee73533e212265aa4ed,2023-12-27T18:41:28.277000
CVE-2023-47163,0,0,d5ba5c5494cd6dba199f3b95a2f7529c892a015f889691b261aa6e93b0585aa8,2023-11-16T18:16:27.767000
@ -233089,8 +233089,8 @@ CVE-2023-4774,0,0,80337a6c3aa30e3ac07cf852f754f44f4c329153addec6fb4c0a980cfa59de
CVE-2023-47741,0,0,bc210f1d0d5dc855129de9cb9f7b0cec12b64c4591e6a3d888b1fc1b1b8d7ef9,2023-12-22T18:40:58.353000
CVE-2023-47742,0,0,cdc8f9b81df348ba8d67d4a3b415ef87b95e0515a21bf44971a47f7f0dadf816,2024-03-04T13:58:23.447000
CVE-2023-47745,0,0,e615409f5070bf5eeada0e705bb63cdf68988679c222577c10fd67ffd36caf12,2024-03-04T13:58:23.447000
CVE-2023-47746,0,0,a4db80f0bb0d7b9675639000452bc56e60583cbf1ba7e14aadf5b8a57928148e,2024-01-25T02:04:12.947000
CVE-2023-47747,0,0,4f8b7d30715704626db4437fad83336ca389392daa1c7e0784f83840435d69f2,2024-01-25T02:02:36.850000
CVE-2023-47746,0,1,93753620ff8573c61e7dc7c1fdefcdb958513fec90b20f73d795fff4314c983d,2024-03-07T17:15:11.277000
CVE-2023-47747,0,1,d613277358fc9e82ed2beb1501924858e58060b561a99c5ff0d63c458c5103a6,2024-03-07T17:15:11.373000
CVE-2023-4775,0,0,4e5ccce62c019ae90651a7d9690d12270ecb351214fedeca533657639c045ca8,2023-11-17T13:59:12.040000
CVE-2023-47754,0,0,b6cddd46805b5fb405530109355d87a68bc44fa1afbf0eb5db6bb65fde25cdf3,2023-12-22T19:33:56.743000
CVE-2023-47755,0,0,31896f99dcd5875e4354b962666fd913a560a4347a62f665f6a1fb1d935fba61,2023-12-02T00:25:09.250000
@ -233790,7 +233790,7 @@ CVE-2023-48720,0,0,71e46ed990f77e5e1ab7e573b7ce199df9e319357ad7189c0aedad622b34f
CVE-2023-48721,0,0,8c47109b9e61cc40969444ae2ead7963b8d4bdd6b8b65c475e745b38f8da5161,2024-01-02T16:15:12.337000
CVE-2023-48722,0,0,b21bc90cd9ce1ec7c1af64c0d1da78505a33d180402299b29d84366f786b9b7d,2023-12-29T15:30:32.720000
CVE-2023-48723,0,0,51de78ba4a0fea3bc725aa980029a19ae13dc47bb89690d15ea1655fe7f3baae,2024-01-02T16:15:12.377000
CVE-2023-48725,1,1,616e89ec1781422fd259faff18c3b18503a9266877dac52b46eab6ce7b3c85d7,2024-03-07T16:15:45.123000
CVE-2023-48725,0,1,75c085b4163799cb668cf7ca4bc0de9ef738d5db157f91ec810a73765f82b083,2024-03-07T18:15:46.497000
CVE-2023-48728,0,0,ed4fb3603eb3d1fb4a8089303ba944449bfea1856081f932800d0cc5bd7026e1,2024-01-17T15:19:11.497000
CVE-2023-48729,0,0,13f3c83cf7904baff3f0b31a9a04b64ff281e898cd527079412a7cd8a8ab623a,2024-02-14T18:15:46.243000
CVE-2023-4873,0,0,83d019ca780565da868ccd4d7d22c76909e8192d214e3ff6bf7c093762207a87,2024-02-29T01:41:57.527000
@ -234677,9 +234677,9 @@ CVE-2023-50297,0,0,a0ca77d6c29f649a29f82abde09a7845345036424a0fb896f71d914eca012
CVE-2023-50298,0,0,71b04767764ab2b65ac7070adde737edc7d5333faf7ecedfb92526bf3c676f59,2024-02-15T18:40:56.680000
CVE-2023-5030,0,0,401e4610c808baabd3e1b47776fdd2b7121fb0b8c0efbfc4c7959d4407fb8710,2024-02-29T01:42:10.283000
CVE-2023-50303,0,0,4971cf4aa87365d079c650f097262885c7d04f841e4ed4d262d2eea7668b80b6,2024-02-28T14:06:45.783000
CVE-2023-50305,0,0,a6a705ef028d8e4c572b0ec5d2dfc39846c6511a54360445c525b9336d6debdc,2024-03-01T14:04:26.010000
CVE-2023-50305,0,1,52af726547eaa95f1201f2c6f25887776aab26306ea8ffca4b6104efe8e4721e,2024-03-07T17:50:18.457000
CVE-2023-50306,0,0,b7ddc06b3066ca347c84251d1caa127c00e942b8fec6ff8cba9ebf76cc4bab75,2024-02-20T19:50:53.960000
CVE-2023-50308,0,0,0ce6cfef3bd8d2c5af543f846c63d7740b5ba151747835464f0ef8d81ef12ac1,2024-01-25T02:03:49.987000
CVE-2023-50308,0,1,4c428dc4aa8f2a5b0595b4c0d28f670c006a7eb1ab0b493ed318005adf3984fc,2024-03-07T17:15:11.473000
CVE-2023-5031,0,0,2ddfa688e91851fb9ee9c26fd0795cb423292b04fea2bd434ed03085a5f1525c,2024-02-29T01:42:10.360000
CVE-2023-50312,0,0,6148af5f69534aed77dae184fe2b672b68a4148611b3e761eddeb346c4e8ac63,2024-03-01T14:04:26.010000
CVE-2023-5032,0,0,e2d0fc8f37cc56ebb13f7b14337bd0fbcd61976e96205eef41ad2e2eaaf73db0,2024-02-29T01:42:10.440000
@ -234724,7 +234724,7 @@ CVE-2023-50378,0,0,fdbe7a34fdf8cd9d71ae9618ce3ef0ad0a4804eb88dccf3d4747fb05eb07f
CVE-2023-50379,0,0,2ba768024158d3957bf97073914ab21cf6e76e13687c6569b9647fa3455e4c0b,2024-02-27T14:20:06.637000
CVE-2023-50380,0,0,b5737d428cd7d3280b11a55da8c282450fdebb25171b34cbfbfc4de989e3a9f5,2024-02-28T14:06:45.783000
CVE-2023-50386,0,0,eb9175c624998374fffbb8bbdcfbc3fcd759c84a0c5cafd0e6294c2d31318a7f,2024-02-15T18:40:48.837000
CVE-2023-50387,0,0,a93f59759db18f04358a0350fa91f0038d1c48a320311cb4bf6f42f7eaa8909d,2024-03-04T03:15:06.217000
CVE-2023-50387,0,1,d6b6855a40848b9c54d9d59a3a311e1d6f69807c6c79ff2b8a01eb2163f073a2,2024-03-07T17:15:11.587000
CVE-2023-50395,0,0,1428a30e7f791887f351d6276b38dd6e66ef73f4c78586f3c8084af9d6bd298b,2024-02-13T20:35:06.703000
CVE-2023-5041,0,0,9eb23c87c3c86b8b889ef8868762c31909282e2886c58aff180fae5c65cd6817,2024-01-24T19:20:29.410000
CVE-2023-5042,0,0,76558d00ae1daa232624f7fa83b8c4ee909b7bd23da74f0b90b7096dbf524598,2023-09-25T13:25:16.230000
@ -234733,13 +234733,13 @@ CVE-2023-50423,0,0,76755ef4095537b87793fcbaa84c66e6144cfa55259e1485b20e226bfcb60
CVE-2023-50424,0,0,89f3a64bec1a6aedb95e63614a714963ac97866b07259e6b76e32f06e7e01c29,2023-12-15T16:53:04.417000
CVE-2023-50428,0,0,ee38f297101d048b525cc8e108719c5b4279d7c7b397e53b64582862962f0f42,2024-01-04T17:15:08.690000
CVE-2023-50429,0,0,226bcaaff69c07707f641dbe9ce77da1a81f20b3606931034b0e6b06dfac422c,2023-12-14T14:33:52.857000
CVE-2023-5043,0,0,7691728e8f6bdb5a6529b138417513c8d5cd2dc4696cd3aa1716fdb907e82f1c,2023-11-02T17:54:38.423000
CVE-2023-5043,0,1,99fbb32806f488364becee5b2452ddbbdbf099b8aadeaa8418f878c2aad9dff9,2024-03-07T17:15:11.983000
CVE-2023-50430,0,0,4e933b75fee4c7e24ec319e365c288375c6e0e3a67966a0cafa5ea42d6537a4b,2023-12-13T19:10:39.247000
CVE-2023-50431,0,0,a37473383fef96d33bf0f59c3fa43743d2170c71b5a2a216d64f02e9a46ff45e,2023-12-12T22:34:10.203000
CVE-2023-50436,0,0,5f4a54322e18e4e426c305cb80a0741bdac03f3cda3d7db0d7e91ff7759346ec,2024-02-29T13:49:47.277000
CVE-2023-50437,0,0,087bf2fe61780896ed884cdb606b733c49e0268aac7a96a7112659f33954f489,2024-02-29T13:49:47.277000
CVE-2023-50439,0,0,22917e6a90c296c3d7c909fa67289b75621f4c3b8cab040412485bb2d3d2206a,2023-12-20T18:29:44.920000
CVE-2023-5044,0,0,b4fc81b52bf69994a31c999ec5b938bd9a655e8756566ddf3c7dff1542f32464,2023-11-02T17:45:26.790000
CVE-2023-5044,0,1,c77cb84a9812b72a5b970981b7d5fef0c5fc4f0dd761df3af2b84138e07b646c,2024-03-07T17:15:12.073000
CVE-2023-50440,0,0,cbe5d539e208b6097ace139cbeeedb49e866c5d97b399c073c43b5f8f70264c2,2023-12-20T18:29:28.293000
CVE-2023-50441,0,0,9bd760298da517bd28996f023ce7334405dbe92c32aa3c503cc1491615459ae4,2023-12-20T18:31:44.053000
CVE-2023-50442,0,0,a057a5b7c26414fc7563d24cb642834802b777e3b23cc824df69ea34217acf4a,2023-12-20T18:29:15.687000
@ -234933,7 +234933,7 @@ CVE-2023-50864,0,0,dbb8d20e5f36a035c3156fb7a77589dedbf6adf8027e6048f396876e33958
CVE-2023-50865,0,0,48e50b801467797a5fb545180a82a848b29c010b0d9ff30f321b93c311614a5a,2024-01-10T01:12:29.470000
CVE-2023-50866,0,0,0d65d6a6346342d7f1632295af06fb66d902cdd24452e19d2e81b7338b5e01dd,2024-01-10T01:12:23.503000
CVE-2023-50867,0,0,813e7f594844fcee13255526631a248747714772b8a3c7fe20b8c1a531ee27c7,2024-01-10T01:12:15.103000
CVE-2023-50868,0,0,d0ee2f1c607c8014504eac36a75a16a8c412e39af8e04429af5af83985bd3779,2024-03-04T03:15:06.500000
CVE-2023-50868,0,1,1acef704c38344b53c0b7e369828b095b769c1fc01c9bcc30ab995406b56a6d7,2024-03-07T17:15:11.817000
CVE-2023-5087,0,0,cb83bb80de48780d6ddfd511869f6feaba7211f246baaaa49f1e770f0a9c1488,2023-11-07T04:23:26.693000
CVE-2023-50870,0,0,5b8837a6e60e4203ba051628b99db23d2e092916c152f0e1a5a22594cfa2f839,2023-12-19T18:48:01.647000
CVE-2023-50871,0,0,4ddf269f53c856e0f2588f2eb354c7028d0f2397d2615866b6215dfdb27c4698,2023-12-19T18:50:30.227000
@ -234942,7 +234942,7 @@ CVE-2023-50874,0,0,bcacd6fc18a6a7384f9e3410fc219a27fd51425023bb3ea76f15234acd5bd
CVE-2023-50875,0,0,1106938097fb18960ed1f89813982d05ff2f39c25d4530bc17f1d69fd9b36d68,2024-02-16T19:28:59.943000
CVE-2023-50878,0,0,09d9775c521beb2bdbe6a10e9cce75ea90abd897c23ddc9c0ed036fdb98e2785,2024-01-05T16:21:46.253000
CVE-2023-50879,0,0,e7f635ec835f8af6e68324c638f96c217e373f3a3af9c80d6a7d36cc1662f020,2024-01-05T17:35:04.347000
CVE-2023-5088,0,0,63218d0edf33fa7cd956d09f569a12a5f9e6a1dcd109cdbb04295ca6752b8231,2023-12-08T19:15:08.203000
CVE-2023-5088,0,1,568d51164c9264fd994fc3b9ec65036bce17134420ca04c5ab028845c9aa43d8,2024-03-07T17:46:40.173000
CVE-2023-50880,0,0,45dfc20edf873b6f54c033b90d8b745bc998db6f75a866db44cd1e8a384e14b7,2024-01-05T17:36:02.743000
CVE-2023-50881,0,0,21fc9e5f06f2216fa2395fe2689d924b63b36b0b4cdf8b0f9c5260d788c328af,2024-01-05T17:37:29.017000
CVE-2023-50889,0,0,c1ad7d35b6d5afc074175b11fcf31e66a1f88510cc63a735f12500e424605271,2024-01-05T17:39:22.253000
@ -235740,7 +235740,7 @@ CVE-2023-52399,0,0,37d927beb74e1ec97855b4601610f34d1a22a50030ec8f9612a6087d84ff0
CVE-2023-5240,0,0,7d5cd0fb5f88df14118e200bc681b22dfebb68caa308ed4d356fa96870c74385,2023-10-17T16:11:51.793000
CVE-2023-5241,0,0,35c07b59eeb8e5320751d006c11a71068c67265a473a9c681e74240ba9afa1bb,2023-12-22T19:02:58.717000
CVE-2023-52425,0,0,1145b8790151da9a533a17237f261953453044cf16039d08ab64a7c9289adaa5,2024-02-26T16:27:48.367000
CVE-2023-52426,0,0,049f0e5fc4b83a1a59d05230d25941463cb3bb9a42ebd193de4616703027f9ad,2024-02-26T16:27:48.450000
CVE-2023-52426,0,1,a83b975d267204be7bc0424d16dfb1a6cdd5c043e3c113cb1f287aa4ec1048f1,2024-03-07T17:15:11.893000
CVE-2023-52427,0,0,7b1268fe3c875e4de6b668786e2b70da182fd0ccf1ffa3ad115cfe60942d0759,2024-02-12T21:39:34.807000
CVE-2023-52428,0,0,2eeb582baad618917d7ab81e73c328480f805daca7410119b9e12d80dcec6fc7,2024-02-11T22:29:15.837000
CVE-2023-52429,0,0,cbf1a64bea07cad721a2d66b517d7675865722376214fa45ab2682c4a3ee0642,2024-02-26T21:15:57.833000
@ -237184,7 +237184,7 @@ CVE-2023-6806,0,0,68d5cc1d96ec25c7ab186323c9b5003516462d40f7f679e830f007d1bc0e49
CVE-2023-6807,0,0,8211ca38107dc4f9b4127c6352451c7045672cf7336c16fcb14315bbd9ab0669,2024-02-27T14:21:27.377000
CVE-2023-6808,0,0,453d7720ba5e9cbfc061121430ec5679037ea2f22b990571ad72c0ac48f6ec8b,2024-02-09T16:49:29.023000
CVE-2023-6815,0,0,d97387eb71cb43fe6e993223b0683dbb82353c2109d50f7b045bdf1d8b203f4e,2024-02-14T04:15:08.497000
CVE-2023-6816,0,0,32ab877fd6be57cefd857f2677ca6f2c4880d6c7ff598778c941b95eb6fea82c,2024-02-09T02:15:08.207000
CVE-2023-6816,0,1,e7839a0ba60fd8f45333ca3d0c1da185b693b7e81293656670d077cc9777a76a,2024-03-07T17:15:12.180000
CVE-2023-6817,0,0,15a873d76f1c7613f3959855e73f950459b6718d3731740781c6b052a6a56c9a,2024-02-08T16:15:47.270000
CVE-2023-6824,0,0,8c6e875229d872169eb2bfb9390a02ca75cb4bc4bc222093fdb4ebb6a0125835,2024-01-23T15:35:27.123000
CVE-2023-6826,0,0,8033a5c072d463793e3b1a3dcb626312fffc26b8ea88b724da5c112e96daece5,2023-12-21T04:49:03.117000
@ -237506,9 +237506,9 @@ CVE-2023-7234,0,0,23278876305e1d44b5315edea84989da2790a3c72b01a04cdbcb9933098a26
CVE-2023-7235,0,0,5a57373c824e0c960ebb1d7ed373397d379b4a945d30165f19c755e196b87393,2024-02-22T19:07:27.197000
CVE-2023-7237,0,0,34878d83edae1c68fbb7c6d0f9d3ee08547b03913d6b374f32337269fef1a0b4,2024-01-31T20:37:01.760000
CVE-2023-7238,0,0,7187ce9bc4d8ddad00e06886245b2e662c42772077283e0d271ebcd7974e5802,2024-01-30T14:20:10.613000
CVE-2023-7242,0,0,ac54fdf54979c293dd37520f2380c2b680d40908ab92b74f6e8493e5f0606480,2024-03-01T22:22:25.913000
CVE-2023-7243,0,0,8cc65c54f0098ba4a995839c6cccd1c17b6732fc5ad1174851a72e2070fae459,2024-03-01T22:22:25.913000
CVE-2023-7244,0,0,62790636aed6fb491e7a1d387a840a32a418795c4896888dac3c252594a59108,2024-03-01T22:22:25.913000
CVE-2023-7242,0,1,db2d6d5cc91868613ca46292b47ef3b5a3c4ae96f4def2aa8c9c1271db71c444,2024-03-07T17:50:48.090000
CVE-2023-7243,0,1,c43192a066d4b9535821b574845a0af87800cbe78fe61a46f4663ee5807e93c6,2024-03-07T17:51:08.413000
CVE-2023-7244,0,1,ba207e3262e0671e0b0b028bd6f1a9cad89868b7212853a50edc68e0c8b30845,2024-03-07T17:51:19
CVE-2023-7245,0,0,c2b129587df81b933ff7a681e47b41470d61b90df3071adf7be4cf4925974850,2024-02-20T19:50:53.960000
CVE-2024-0007,0,0,1173dcf63e36e77ef1ebddafdf32fafcec606695fbc0816f54b661f0aac88aac,2024-02-15T06:23:39.303000
CVE-2024-0008,0,0,9c41805289fe313f8323749103b11eb8b3211483db37513fd0baf5ed76da3178,2024-02-15T06:23:39.303000
@ -237726,8 +237726,8 @@ CVE-2024-0402,0,0,2fe1b596353be20e61cfde75d3fd6588203ea2d19b7c21e2ce1c5a9ecc57cc
CVE-2024-0403,0,0,ba0983060e2034b216b25cd26ed2bb024a7850bc1fcd95abc9a090d5040f7805,2024-03-01T14:04:26.010000
CVE-2024-0405,0,0,efdadcc35fc4ed87224ff4e930a96f9ee86e8b4ccb1a79f084616e91b90070e3,2024-01-24T17:23:09.773000
CVE-2024-0407,0,0,f3bc2895be8ea5b6951b82e45fc670b2af282e8da3ab8846004c7a5f8a8e92ad,2024-02-22T19:07:37.840000
CVE-2024-0408,0,0,43985c336a03f402aeedabf908a000c648c1c236d0fbc08b82265b346c5d65c4,2024-02-09T02:15:08.383000
CVE-2024-0409,0,0,05e7278f67c8a59552c587c9f2326e71048a786dc94c7b4128171258bb2dd76f,2024-02-09T02:15:08.533000
CVE-2024-0408,0,1,4e3e81f52cf3d5178a7182e7de9f0301b287ec329828c0391a69e3034670a699,2024-03-07T17:15:12.400000
CVE-2024-0409,0,1,34ebe0729ae458ad3578e4d18065a813c37b10bf9cf2255ae436410c7013521e,2024-03-07T17:15:12.540000
CVE-2024-0410,0,0,b7c9980392b1e84c96745fa2196deb8831d9dc73822058dbf4e5c03728818e2f,2024-03-04T20:25:41.347000
CVE-2024-0411,0,0,e9767f7a52a02ef643e56eda85bb59a185cc76378645ef12c7be1bf6ca802d4d,2024-02-29T01:43:10.490000
CVE-2024-0412,0,0,c54eefe6e0e0e016a8189e728b824cd56c9fce47b714f3340694ff726b377062,2024-02-29T01:43:10.580000
@ -238056,7 +238056,7 @@ CVE-2024-0813,0,0,ff30ac3dc79b0550523d06b2455ee17a966f55c90b0406d419b89863b89f1a
CVE-2024-0814,0,0,1d0403c9ecdba18257e6f96087bde1c50ad1c1389cfe686e29580d08cead7d2b,2024-01-29T14:27:48.647000
CVE-2024-0815,0,0,67504d7248aecf951936f1e6796ec6f3ce9a0c8a5636d40f121610e36b3c6614,2024-03-07T13:52:27.110000
CVE-2024-0817,0,0,4c9fa67064c61ab5b0da2ace15adecfc82aa106cf8469695bed0f2fd232ae5b4,2024-03-07T13:52:27.110000
CVE-2024-0818,0,1,aab2d221f37c23ee7f2ec3782b2d9ede535f7fce09aa18f8f5fd767e46148b65,2024-03-07T15:15:08.147000
CVE-2024-0818,0,0,aab2d221f37c23ee7f2ec3782b2d9ede535f7fce09aa18f8f5fd767e46148b65,2024-03-07T15:15:08.147000
CVE-2024-0819,0,0,84062588306c2d3f219b6045d8f0c99714b3fa9d659a191e940313afd7953da5,2024-02-27T14:19:41.650000
CVE-2024-0821,0,0,f9f03ada3b8baaa4211e4a983219e417254ecaad082f436ae6848b641d1ac399,2024-02-29T13:49:29.390000
CVE-2024-0822,0,0,f0d03b223c25850830b62db3595d4728a822efa091e187df2417c03c793bd8f4,2024-02-21T21:15:08.900000
@ -238074,7 +238074,7 @@ CVE-2024-0841,0,0,00c1a87332bcc448f20d823e8d7d15c699f2b88301134bf45ff680384c84d2
CVE-2024-0842,0,0,2d4febcc0a5bd3f6b5f6eeeb222e1bdadfd7499df5c95fd0f9cc7e2a10a87dbd,2024-02-15T19:11:14.253000
CVE-2024-0844,0,0,9b0ede7ee0379ed34aa516e6f2cba464e96d05ae45278d47c03f7b0b4baaf7d5,2024-02-08T16:15:39.903000
CVE-2024-0849,0,0,ab143b9a0b5d37d266faac9cd54f50fee666b57f962e8e1bec5db73357a455f9,2024-02-13T19:16:30.810000
CVE-2024-0853,0,0,1ec53e67ee9d5919be932b36d73918e7fb022ee23c3898bd3e3e19084b12a2f3,2024-02-16T15:17:48.757000
CVE-2024-0853,0,1,72eb57fa9d91eeed9b78ea6861ab48b720d6a39710ade722cce53b9624df3bc8,2024-03-07T17:15:12.657000
CVE-2024-0854,0,0,b2a19a635a88b4ff68549abb31f11c392c07f9e329d9704350bbb3ee75810c41,2024-01-30T17:01:37.127000
CVE-2024-0855,0,0,fee06b61accc977f963cdb2b2ef743d4f7ee62d05033c371692bc8e3d7ebf823,2024-02-27T14:20:06.637000
CVE-2024-0859,0,0,ebdbbfb62fdac702a888e13ac2f08cf009b152778d43282d960af2d2fbc4e23d,2024-02-13T19:45:29.770000
@ -238099,7 +238099,7 @@ CVE-2024-0907,0,0,701cea52331df058a887458bc81b02e5da4430df695e176c30a10532890709
CVE-2024-0909,0,0,7864e9d833556eb295eb67e87cebb39c8d9b11d41ed1f5327a80b30fe013438c,2024-02-08T20:07:51.410000
CVE-2024-0911,0,0,5f8186e1a077698fb2fa1e99d28cc6e32ac8b7b7afb205a3a02bc10c8ca698f0,2024-02-14T18:15:48.077000
CVE-2024-0914,0,0,e3ac9d00ae6383306423d8f717c5b50d1c543189340e8152c8f7c1506432b02e,2024-02-09T01:01:38.453000
CVE-2024-0917,0,1,9f6cbf5481e96ae26ba65bdd4d5f7d686cf34db01c53a885ec0177a4776d8cbc,2024-03-07T15:15:08.257000
CVE-2024-0917,0,0,9f6cbf5481e96ae26ba65bdd4d5f7d686cf34db01c53a885ec0177a4776d8cbc,2024-03-07T15:15:08.257000
CVE-2024-0918,0,0,7e821bad8b27a06490cf84c3eef2d84feef1a9067fdf8ec3e9a35926cc8cb97e,2024-02-29T01:43:31.073000
CVE-2024-0919,0,0,3b478c35c692e18b68fff4537fc7f547d639f4cb6c99e89e4f69456108d65167,2024-02-29T01:43:31.153000
CVE-2024-0920,0,0,1709552f07ed0300b748180c05eeff9fa877e00f39d37e36f650d0861249a53e,2024-02-29T01:43:31.233000
@ -238375,6 +238375,7 @@ CVE-2024-1344,0,0,6e9ea80e9b1906095e19ebbcfe72bb26c4abf1a00053a32e3b2ac9d853412e
CVE-2024-1345,0,0,edc14e21821ef700ebe0363d9d625110658b2ac84664f2109ac9f28db37f2b84,2024-02-20T19:50:53.960000
CVE-2024-1346,0,0,f9b1cf937db0cca6baf401ddf2b76ede34aff7f78d164647460f90ba78591111,2024-02-20T19:50:53.960000
CVE-2024-1349,0,0,67d4fc446dab701f6cac94b2ffa043e7391b89daca4d9149739a8dd94e1ed50d,2024-02-29T13:49:29.390000
CVE-2024-1351,1,1,0cef1ae511ad560c983cbcfe3814f67aff9cc3acbba10e61386ba08f2ba7ffc9,2024-03-07T17:15:12.740000
CVE-2024-1353,0,0,853663be0a3764d75bc90d77c3fa1fa06bab948d2070b8859d35c2dce2f75df6,2024-02-29T01:43:49.133000
CVE-2024-1354,0,0,7e9a958865e30c89765260c45d4ae133e4c586a23883dff6b33b804192a001d2,2024-03-05T20:22:24.573000
CVE-2024-1355,0,0,dd36a54ac939524c987827d5cb09797409e1063b770f9d9a2dc86b1a7287f5d9,2024-03-05T20:22:38.100000
@ -238417,6 +238418,7 @@ CVE-2024-1435,0,0,3d9157bea425ae0ccbf8fb80f8804820a71722fe736e6d6583f664e8ae632d
CVE-2024-1436,0,0,89cc5ea7a7e1178a29adf59c2f4cf429bb9957790ab8a0265c3119401c784ce0,2024-02-26T16:32:25.577000
CVE-2024-1437,0,0,95b845910a840a20b7fa4620989917eab09ec6f88cd90b7d076b0bb6f7afcc4a,2024-02-29T13:49:29.390000
CVE-2024-1439,0,0,0872453f826d79b5bb50df9535aa030a513837aff169f1535b08260848c8b609,2024-02-12T14:19:54.330000
CVE-2024-1442,1,1,128b5e04431df7e786adec72827e5f2f441ea50a6ce457805a0d546db7b10cae,2024-03-07T18:15:46.590000
CVE-2024-1443,0,0,715b4f1b1b036595e816d480c22f0394bab184a4b61631c3489044453d5f3bfb,2024-03-07T13:52:27.110000
CVE-2024-1444,0,0,56d4978632986301b509a1a8d65f888b9f13fd4ebe8f88db05c849bbae5ae999,2024-02-16T17:15:08.710000
CVE-2024-1445,0,0,74c7764f426ceaa1bf76f0a1b70674bbf7fb8a94e36e8d8e518e71fa4f86c32f,2024-02-29T13:49:29.390000
@ -238960,7 +238962,7 @@ CVE-2024-21348,0,0,2f0da17b5d81bcad4a469c8de7565dbe161b35559ab267b8db95afce05a8d
CVE-2024-21349,0,0,0bde696fc002ef8b21621e2874d326995f846f9433de704241e439d13339e84c,2024-02-13T18:22:58.333000
CVE-2024-2135,0,0,0e7ec41b09287f9e5eebd186f40b1f916e022c2d2f615c89b8bace6b4283e741,2024-03-04T13:58:23.447000
CVE-2024-21350,0,0,479d68a29fcf25b6a253ca04d86cad3a1ebed8b4cb1311171f1451c12c1d525d,2024-03-05T20:02:13.803000
CVE-2024-21351,0,0,accd4e6cdbf5759d93aaea5bae77a891847606061d162914a1bf70b096d5892e,2024-02-15T02:00:01.653000
CVE-2024-21351,0,1,7a48bfbc6a48523321bf61d371facac94a044f299f4405c4a4f7eed1aeeb604e,2024-03-07T17:48:52.180000
CVE-2024-21352,0,0,10bcf10d69b8d5f4c7cbc76bccdf708b902db66e46e1a6537556096436a2fffa,2024-03-05T18:54:26.843000
CVE-2024-21353,0,0,069ec1572ad8f80f7de702cc2ddaf6f315837c56bad7260abb2296947f3ace92,2024-02-27T19:45:28.470000
CVE-2024-21354,0,0,6be7f60c96e505d2d0d48d7cd874227816e97d1a763ccd038e009c4053923fa8,2024-02-13T18:22:58.333000
@ -239013,7 +239015,7 @@ CVE-2024-21404,0,0,8aba03ed666ffd23124b08c87a2acd614c58649f26fe48e08bdfdea134622
CVE-2024-21405,0,0,7b2bcd85f8b75e36055a51e8d6e50e620fbb5da00673d7a82956b2dcc3d7e6dd,2024-02-22T17:57:19.810000
CVE-2024-21406,0,0,4926f610f67020e143f717a8966dfc594abc79953c895df1691f78cfff880f19,2024-03-01T22:57:15.940000
CVE-2024-21410,0,0,bd862af63cde79d77d3d96c08b20eb8ee12ef6b46d7738e8f98c5d9c8af65aee,2024-02-26T21:10:38.713000
CVE-2024-21412,0,0,8a75d7e90f680d77013f86849427febcb5dbc45ab7c0755f94917e51501f4e93,2024-02-15T02:00:01.653000
CVE-2024-21412,0,1,6df500642ad441e157d67f1fe17b6dc5155211f5565d89e1eed7797770fe5407,2024-03-07T17:48:58.173000
CVE-2024-21413,0,0,e8b53a5cd4bd3cc4178f808efd349017a89b016f9da30aa2b26e33753aaea59b,2024-02-23T21:04:05.710000
CVE-2024-21420,0,0,4a89fb64b6e21ff3e8e62b1263c75efc47583308c96cfb26d691252d4777d2ed,2024-02-13T18:22:43.577000
CVE-2024-21423,0,0,bdd3e5505bf37095cf28502668c3363668037784f8adcb8492701fb6ce5eb572,2024-02-26T13:42:22.567000
@ -239477,6 +239479,7 @@ CVE-2024-22727,0,0,552f053e0e1c0024595d8b9c36096b73d98357dde818cb308f879c4f292f6
CVE-2024-22729,0,0,57c8e9cec7b5acfd3e659a660e85c84e7c6a8dee54d39c1d317d497e3590bfe9,2024-02-01T15:15:34.173000
CVE-2024-22749,0,0,28b47196f940e010ff68d16ae17a176c2008b3f3d80a9a233b85dddceddd9f34,2024-01-31T18:01:59.017000
CVE-2024-22751,0,0,ab17857cbf4a2c34d716834488e793a841a7a79f729d2c38db04d05bbf5a85f0,2024-01-30T21:18:23.127000
CVE-2024-22752,1,1,617b937ee27ee889b8085c46785fee31250d3f6dfd60def49f6e5ed3b25a8b11,2024-03-07T18:15:46.810000
CVE-2024-22768,0,0,ba9cf2204f3f97d0818292d26d832ffe54135ea1c816ff09eb4adc0d121dff97,2024-01-29T15:50:06.730000
CVE-2024-22769,0,0,5e5bc2110f51bc548c6bae4c09b681eaa2d83c749bf7b8fa551acdf866c69a4b,2024-01-29T15:54:12.760000
CVE-2024-22770,0,0,f2a2a69cf9ce7d556b6b228c10722f7f9528f890b579414a4469048f6692bbc1,2024-01-29T15:53:41.323000
@ -239603,10 +239606,10 @@ CVE-2024-23219,0,0,6138a00dd33e643c6da7ab985c8bb39139630ef127b2b12e557a72994a3a6
CVE-2024-23222,0,0,f33369aa9cec44a1ad31bb6d34cd20c739c85b243ce1438560b80098a06e2b7b,2024-02-29T08:15:46.907000
CVE-2024-23223,0,0,d780b4d6e2ed4fd16bbb8e5d6b950b4f66cdf843fe3ec44eff85a2bd755e98e1,2024-01-27T03:48:24.797000
CVE-2024-23224,0,0,8c8e9af636b106e202b7f940d165666567457368baa4cae37acc93fd6c8a64d2,2024-01-27T03:45:02.100000
CVE-2024-23225,0,0,402741bef0a3563916ff7c9bc8cbedf60a443448609374051334e1db212f612a,2024-03-07T02:00:02.283000
CVE-2024-23225,0,1,0940b4eb622a5ca08e9e82814e209e6830541c7304bbd3ac3e55186efb9661e9,2024-03-07T17:51:50.353000
CVE-2024-23243,0,0,c883edf88be24cb000066cd5d9f6fce63ff3cd1b907967baf9bcb4112a04838c,2024-03-06T15:18:08.093000
CVE-2024-23256,0,0,c655cd9ec538c6782627acb472c38f233867428eb6687fe294704e26cdb390af,2024-03-06T15:18:08.093000
CVE-2024-23296,0,0,7e7bf20f93796575e206d9d1e355afb3fcc4aee575fe2298561fc68cd199377e,2024-03-07T02:00:02.283000
CVE-2024-23296,0,1,c57d72763b186a63e442df0c81d825c3430bf4ffc66b86a75cb0d8a6f6cddae2,2024-03-07T17:52:12.170000
CVE-2024-23301,0,0,95f1c4c0d3c3f56beb5ca2f43c481bd416943d89ac106cdf8ea6bddea7fc220a,2024-02-21T03:15:08.950000
CVE-2024-23302,0,0,863344aa30e4660a85cb1dadb5cc739d77d5cca4411a54dffe0a3cc5e6d4c938,2024-02-29T13:49:29.390000
CVE-2024-23304,0,0,f4bc63f089c081f8de89565719320483c4f38e3af47af8e7dc8d4d30748891c3,2024-02-13T22:49:18.687000
@ -239866,7 +239869,7 @@ CVE-2024-23893,0,0,ecb9213a2cdfa52079aa821524dfb1bb775fe26da56c79eae32e25ce922c0
CVE-2024-23894,0,0,4a83274aa71c12777419979ff96e6b220f9b5868499b10e181bd1420b2a29144,2024-02-15T10:15:20.110000
CVE-2024-23895,0,0,d59597dc18583f4069a00336744145b3a95cc3985b05876996e2842d836aeded,2024-02-15T10:15:20.403000
CVE-2024-23896,0,0,05098f39a53ae86a6319e8b4133c1254bf82ffe2a6f0f1c3c0bb46552d5cc3a9,2024-02-15T10:15:20.657000
CVE-2024-23897,0,0,2f29b456fad948ef5aae408794f92ecbd663abb08ec87cd4fe153c14d23830f1,2024-02-29T11:15:08.647000
CVE-2024-23897,0,1,52e5d4a522b850a631c21f9f4455068e9ae869bfa4d176c7f6db84f611c56ead,2024-03-07T17:47:35.020000
CVE-2024-23898,0,0,27c5368dff9cda77d4579c68aa3c6e2c647b0b454e5e30199a0592eead600202,2024-02-29T11:15:08.843000
CVE-2024-23899,0,0,7221f9efcd89ca48f9c6571bde7a7f417c82020935a02dda82803137a099714c,2024-01-31T18:43:39.183000
CVE-2024-23900,0,0,ffcf73f765e34eaa4d21dbbb66f11c097bdbe82c6c23f515de989ab74fdb5e2d,2024-01-31T17:20:14.777000
@ -240418,7 +240421,7 @@ CVE-2024-25675,0,0,7eb120f8543ce89181641a0a8c791e82666c8e07d23577075c360f9dbf73d
CVE-2024-25677,0,0,1d7f4f51208daa48b27418602ba1484337c537523201080701287445cfed0006,2024-02-15T19:43:24.983000
CVE-2024-25678,0,0,9470e3115b8c3f5b60b6b175aa8ef46b05e07e3f194ab4ff036467dbe264bd9e,2024-02-15T18:45:09.663000
CVE-2024-25679,0,0,224a0956154aafe3a65144732719712897f981c578a083f4eecb3f79135bc5a3,2024-02-15T18:44:40.547000
CVE-2024-25710,0,0,98ade4ffa7aef75419a71990b81bf934b1fd86fbebd436fa569a732a370bfcf5,2024-02-22T15:24:45.240000
CVE-2024-25710,0,1,ab520189ef240d987a199d6e814c3161f9be705f75e79c9ab42865a168e0f18f,2024-03-07T17:15:12.940000
CVE-2024-25711,0,0,d3f8257017dbfc5bdd6c4e4b8e295b2d28e0327c4086b62797abd4226251f28d,2024-02-27T14:20:06.637000
CVE-2024-25712,0,0,51de0f8ba1579ed685b4e63152564f2da5ea830e3b6201a5b430e6e0f9d5912b,2024-02-29T13:49:29.390000
CVE-2024-25713,0,0,82886cecbf7fc1474a5475d864f3cf6580d0ba42b5cd7356d033fc3fe3f82895,2024-02-29T13:49:29.390000
@ -240558,7 +240561,7 @@ CVE-2024-26299,0,0,1afbf7f788ace8cba2c17888dbd26aca37a12f501fd6b7049b270edc1159b
CVE-2024-26300,0,0,957ff2fceea083c23710802994700a4cf17bc21a9f298857e1101271f2e4ee8e,2024-02-28T14:06:45.783000
CVE-2024-26301,0,0,ca5ba4fc82d74473f58bbb8ab53e52870805c492ae0704dcd3113ae9fe8a11a4,2024-02-28T14:06:45.783000
CVE-2024-26302,0,0,af4ef1bb4da1c0ac0e7b0a0b03804bb031d31d0e464ca3573002ab0828a12d88,2024-02-28T14:06:45.783000
CVE-2024-26308,0,0,1fb27c5235ff932b36ccef777a6cf311a453b9774c0b0ba421c55a05d725695f,2024-02-22T15:21:36.213000
CVE-2024-26308,0,1,82b0ecfd78ac1924ca4de8327395ad25f7b35e7d9f3c5c23f6744c8d052e1727,2024-03-07T17:15:13.050000
CVE-2024-26310,0,0,cdf3231f7a059b92520dd591ab7449fe300f81e89c81c63cb479e44416fa612e,2024-02-22T19:07:27.197000
CVE-2024-26311,0,0,c10525456294b75c6b4919ba396921719972a7cc08a82934dcff79f6c0deabee,2024-02-22T19:07:27.197000
CVE-2024-26318,0,0,5a8434e81e693bc0f90a66d9a6d8655df17a4e5f3f1f4a63075d970f5e64fed9,2024-02-20T19:50:53.960000
@ -240726,6 +240729,7 @@ CVE-2024-27689,0,0,f4ebc1e59160fdab518bfa3aa9af1f1ba832ce6045359e8a975bb23df8ccd
CVE-2024-27692,0,0,96cf609944e6476718d8d1c519869d6f251f131a1b19ff614e15f00c454cdd33,2024-03-01T17:15:07.617000
CVE-2024-27694,0,0,f3214413fbbba6e4989cb23c7682c51f2973a0b48d2e319f7c34a38e30c11001,2024-03-05T13:41:01.900000
CVE-2024-27718,0,0,1278a2a8cee5a68342beae95f220d454fcd35e5e3853b311cb50bcc440948ebc,2024-03-05T13:41:01.900000
CVE-2024-27733,1,1,f8f1c6d8c88b3e67a1f64356450ad60dd7a9b3cb717d1eb857d80e05f4c31c43,2024-03-07T17:15:13.120000
CVE-2024-27734,0,0,3c0f551c79bd519411a50f44170878bc190cec512cea2012a65cd2d3219a1ee2,2024-03-01T22:22:25.913000
CVE-2024-27743,0,0,6af784c89001e5e3304a051e2cbbb71e2daee0d197f297c681b1d37ee3f97874,2024-03-01T22:22:25.913000
CVE-2024-27744,0,0,678780b6b69944545a0d8cad148a51f5d84c2d7bab88f74324d94f2ee8805643,2024-03-01T22:22:25.913000

Can't render this file because it is too large.