mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-03-11T23:00:38.168327+00:00
This commit is contained in:
parent
e7336795bd
commit
aa4914bbbe
20
CVE-2022/CVE-2022-460xx/CVE-2022-46070.json
Normal file
20
CVE-2022/CVE-2022-460xx/CVE-2022-46070.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-46070",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-11T22:15:54.230",
|
||||
"lastModified": "2024-03-11T22:15:54.230",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GV-ASManager V6.0.1.0 contains a Local File Inclusion vulnerability in GeoWebServer via Path."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://s3.amazonaws.com/geovision_downloads/TechNotice/CyberSecurity/Security_Advistory_ASManager-ASM-2022-11.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44253",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-02-15T14:15:44.830",
|
||||
"lastModified": "2024-02-20T21:05:07.937",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-11T22:15:54.337",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -175,6 +175,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-25j8-69h7-83h2",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-14xx/CVE-2024-1400.json
Normal file
47
CVE-2024/CVE-2024-14xx/CVE-2024-1400.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-1400",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-11T22:15:54.490",
|
||||
"lastModified": "2024-03-11T22:15:54.490",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Mollie Forms plugin for WordPress is vulnerable to unauthorized post or page duplication due to a missing capability check on the duplicateForm function in all versions up to, and including, 2.6.3. This makes it possible for authenticated attackers, with subscriber access or higher, to duplicate arbitrary posts and pages."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3046896/mollie-forms/trunk/classes/Admin.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/43c4ca71-0bf0-4529-97d9-2349f96bbb9e?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
51
CVE-2024/CVE-2024-16xx/CVE-2024-1645.json
Normal file
51
CVE-2024/CVE-2024-16xx/CVE-2024-1645.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2024-1645",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-11T22:15:54.690",
|
||||
"lastModified": "2024-03-11T22:15:54.690",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Mollie Forms plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the exportRegistrations function in all versions up to, and including, 2.6.3. This makes it possible for authenticated attackers, with subscriber access or higher, to export payment data collected by this plugin."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/mollie-forms/trunk/classes/Admin.php#L904",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3046896/mollie-forms/trunk/classes/Admin.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/353c244f-6d5d-47d6-988e-33da722a02f9?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-251xx/CVE-2024-25114.json
Normal file
59
CVE-2024/CVE-2024-251xx/CVE-2024-25114.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-25114",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-11T22:15:54.870",
|
||||
"lastModified": "2024-03-11T22:15:54.870",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Collabora Online is a collaborative online office suite based on LibreOffice technology. Each document in Collabora Online is opened by a separate \"Kit\" instance in a different \"jail\" with a unique directory \"jailID\" name. For security reasons, this directory name is randomly generated and should not be given out to the client. In affected versions of Collabora Online it is possible to use the CELL() function, with the \"filename\" argument, in the spreadsheet component to get a path which includes this JailID. The impact of this vulnerability in its own is low because it requires to be chained with another vulnerability. Users should upgrade to Collabora Online 23.05.9; Collabora Online 22.05.22; Collabora Online 21.11.10 or higher. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.6,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/CollaboraOnline/online/security/advisories/GHSA-2fh2-ppjf-p3xv",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/LibreOffice/online/blob/master/wsd/README",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,31 @@
|
||||
"id": "CVE-2024-25202",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-28T20:15:41.810",
|
||||
"lastModified": "2024-02-29T13:49:47.277",
|
||||
"lastModified": "2024-03-11T22:15:55.080",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in Phpgurukul User Registration & Login and User Management System 1.0 allows attackers to run arbitrary code via the search bar."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de cross-site scripting en Phpgurukul User Registration & Login y User Management System 1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de la barra de b\u00fasqueda."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1oMNcChsXPMP9pu9lIE2C11n8mzkmLhcY/view",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Agampreet-Singh/CVE-2024-25202",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://medium.com/%40agampreetsingh_93704/cve-2024-25202-discover-by-agampreet-singh-cyber-security-expert-ff8e32f5cf52",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,18 +2,22 @@
|
||||
"id": "CVE-2024-25851",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-22T15:15:08.590",
|
||||
"lastModified": "2024-02-22T19:07:27.197",
|
||||
"lastModified": "2024-03-11T22:15:55.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Netis WF2780 v2.1.40144 was discovered to contain a command injection vulnerability via the config_sequence parameter in other_para of cgitest.cgi."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que Netis WF2780 v2.1.40144 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro config_sequence en other_para de cgitest.cgi."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/no1rr/Vulnerability/blob/master/netis/igd_wps_set_wps_ap_ssid5g.md",
|
||||
"url": "https://github.com/no1rr/Vulnerability/blob/master/netis/other_para_config_sequence.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
|
20
CVE-2024/CVE-2024-258xx/CVE-2024-25854.json
Normal file
20
CVE-2024/CVE-2024-258xx/CVE-2024-25854.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-25854",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-11T22:15:55.210",
|
||||
"lastModified": "2024-03-11T22:15:55.210",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting (XSS) vulnerability in Sourcecodester Insurance Management System 1.0 allows attackers to run arbitrary code via the Subject and Description fields when submitting a support ticket."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/hakkitoklu/hunt/blob/main/Insurance%20Management%20System%20PHP%20and%20MySQL%201.0/xss.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-272xx/CVE-2024-27297.json
Normal file
63
CVE-2024/CVE-2024-272xx/CVE-2024-27297.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-27297",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-11T22:15:55.277",
|
||||
"lastModified": "2024-03-11T22:15:55.277",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nix is a package manager for Linux and other Unix systems. A fixed-output derivations on Linux can send file descriptors to files in the Nix store to another program running on the host (or another fixed-output derivation) via Unix domain sockets in the abstract namespace. This allows to modify the output of the derivation, after Nix has registered the path as \"valid\" and immutable in the Nix database. In particular, this allows the output of fixed-output derivations to be modified from their expected content. This issue has been addressed in versions 2.3.18 2.18.2 2.19.4 and 2.20.5. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/NixOS/nix/commit/f8170ce9f119e5e6724eb81ff1b5a2d4c0024000",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/NixOS/nix/security/advisories/GHSA-2ffj-w4mj-pg37",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackmd.io/03UGerewRcy3db44JQoWvw",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2024/CVE-2024-279xx/CVE-2024-27938.json
Normal file
67
CVE-2024/CVE-2024-279xx/CVE-2024-27938.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2024-27938",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-11T22:15:55.490",
|
||||
"lastModified": "2024-03-11T22:15:55.490",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Postal is an open source SMTP server. Postal versions less than 3.0.0 are vulnerable to SMTP Smuggling attacks which may allow incoming e-mails to be spoofed. This, in conjunction with a cooperative outgoing SMTP service, would allow for an incoming e-mail to be received by Postal addressed from a server that a user has 'authorised' to send mail on their behalf but were not the genuine author of the e-mail. Postal is not affected for sending outgoing e-mails as email is re-encoded with `<CR><LF>` line endings when transmitted over SMTP. This issue has been addressed and users should upgrade to Postal v3.0.0 or higher. Once upgraded, Postal will only accept End of DATA sequences which are explicitly `<CR><LF>.<CR><LF>`. If a non-compliant sequence is detected it will be logged to the SMTP server log. There are no workarounds for this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-116"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/postalserver/postal/commit/0140dc4",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/postalserver/postal/security/advisories/GHSA-j42r-6c99-hqf2",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.postfix.org/smtp-smuggling.html",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-281xx/CVE-2024-28120.json
Normal file
63
CVE-2024/CVE-2024-281xx/CVE-2024-28120.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-28120",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-11T22:15:55.707",
|
||||
"lastModified": "2024-03-11T22:15:55.707",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "codeium-chrome is an open source code completion plugin for the chrome web browser. The service worker of the codeium-chrome extension doesn't check the sender when receiving an external message. This allows an attacker to host a website that will steal the user's Codeium api-key, and thus impersonate the user on the backend autocomplete server. This issue has not been addressed. Users are advised to monitor the usage of their API key."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Exafunction/codeium-chrome/security/advisories/GHSA-8c7j-2h97-q63p",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://securitylab.github.com/advisories/GHSL-2024-027_GHSL-2024-028_codeium-chrome",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
46
README.md
46
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-11T21:00:39.406916+00:00
|
||||
2024-03-11T23:00:38.168327+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-11T20:15:07.867000+00:00
|
||||
2024-03-11T22:15:55.707000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,44 +29,30 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
241057
|
||||
241065
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `49`
|
||||
Recently added CVEs: `8`
|
||||
|
||||
* [CVE-2024-27210](CVE-2024/CVE-2024-272xx/CVE-2024-27210.json) (`2024-03-11T19:15:48.200`)
|
||||
* [CVE-2024-27211](CVE-2024/CVE-2024-272xx/CVE-2024-27211.json) (`2024-03-11T19:15:48.247`)
|
||||
* [CVE-2024-27212](CVE-2024/CVE-2024-272xx/CVE-2024-27212.json) (`2024-03-11T19:15:48.290`)
|
||||
* [CVE-2024-27213](CVE-2024/CVE-2024-272xx/CVE-2024-27213.json) (`2024-03-11T19:15:48.333`)
|
||||
* [CVE-2024-27218](CVE-2024/CVE-2024-272xx/CVE-2024-27218.json) (`2024-03-11T19:15:48.380`)
|
||||
* [CVE-2024-27219](CVE-2024/CVE-2024-272xx/CVE-2024-27219.json) (`2024-03-11T19:15:48.423`)
|
||||
* [CVE-2024-27220](CVE-2024/CVE-2024-272xx/CVE-2024-27220.json) (`2024-03-11T19:15:48.470`)
|
||||
* [CVE-2024-27221](CVE-2024/CVE-2024-272xx/CVE-2024-27221.json) (`2024-03-11T19:15:48.513`)
|
||||
* [CVE-2024-27222](CVE-2024/CVE-2024-272xx/CVE-2024-27222.json) (`2024-03-11T19:15:48.560`)
|
||||
* [CVE-2024-27223](CVE-2024/CVE-2024-272xx/CVE-2024-27223.json) (`2024-03-11T19:15:48.603`)
|
||||
* [CVE-2024-27224](CVE-2024/CVE-2024-272xx/CVE-2024-27224.json) (`2024-03-11T19:15:48.647`)
|
||||
* [CVE-2024-27225](CVE-2024/CVE-2024-272xx/CVE-2024-27225.json) (`2024-03-11T19:15:48.693`)
|
||||
* [CVE-2024-27226](CVE-2024/CVE-2024-272xx/CVE-2024-27226.json) (`2024-03-11T19:15:48.737`)
|
||||
* [CVE-2024-27227](CVE-2024/CVE-2024-272xx/CVE-2024-27227.json) (`2024-03-11T19:15:48.783`)
|
||||
* [CVE-2024-27228](CVE-2024/CVE-2024-272xx/CVE-2024-27228.json) (`2024-03-11T19:15:48.827`)
|
||||
* [CVE-2024-27229](CVE-2024/CVE-2024-272xx/CVE-2024-27229.json) (`2024-03-11T19:15:48.873`)
|
||||
* [CVE-2024-27230](CVE-2024/CVE-2024-272xx/CVE-2024-27230.json) (`2024-03-11T19:15:48.920`)
|
||||
* [CVE-2024-27233](CVE-2024/CVE-2024-272xx/CVE-2024-27233.json) (`2024-03-11T19:15:48.963`)
|
||||
* [CVE-2024-27234](CVE-2024/CVE-2024-272xx/CVE-2024-27234.json) (`2024-03-11T19:15:49.010`)
|
||||
* [CVE-2024-27235](CVE-2024/CVE-2024-272xx/CVE-2024-27235.json) (`2024-03-11T19:15:49.057`)
|
||||
* [CVE-2024-27236](CVE-2024/CVE-2024-272xx/CVE-2024-27236.json) (`2024-03-11T19:15:49.100`)
|
||||
* [CVE-2024-27237](CVE-2024/CVE-2024-272xx/CVE-2024-27237.json) (`2024-03-11T19:15:49.143`)
|
||||
* [CVE-2024-28187](CVE-2024/CVE-2024-281xx/CVE-2024-28187.json) (`2024-03-11T20:15:07.180`)
|
||||
* [CVE-2024-28197](CVE-2024/CVE-2024-281xx/CVE-2024-28197.json) (`2024-03-11T20:15:07.420`)
|
||||
* [CVE-2024-28198](CVE-2024/CVE-2024-281xx/CVE-2024-28198.json) (`2024-03-11T20:15:07.643`)
|
||||
* [CVE-2022-46070](CVE-2022/CVE-2022-460xx/CVE-2022-46070.json) (`2024-03-11T22:15:54.230`)
|
||||
* [CVE-2024-1400](CVE-2024/CVE-2024-14xx/CVE-2024-1400.json) (`2024-03-11T22:15:54.490`)
|
||||
* [CVE-2024-1645](CVE-2024/CVE-2024-16xx/CVE-2024-1645.json) (`2024-03-11T22:15:54.690`)
|
||||
* [CVE-2024-25114](CVE-2024/CVE-2024-251xx/CVE-2024-25114.json) (`2024-03-11T22:15:54.870`)
|
||||
* [CVE-2024-25854](CVE-2024/CVE-2024-258xx/CVE-2024-25854.json) (`2024-03-11T22:15:55.210`)
|
||||
* [CVE-2024-27297](CVE-2024/CVE-2024-272xx/CVE-2024-27297.json) (`2024-03-11T22:15:55.277`)
|
||||
* [CVE-2024-27938](CVE-2024/CVE-2024-279xx/CVE-2024-27938.json) (`2024-03-11T22:15:55.490`)
|
||||
* [CVE-2024-28120](CVE-2024/CVE-2024-281xx/CVE-2024-28120.json) (`2024-03-11T22:15:55.707`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `3`
|
||||
|
||||
* [CVE-2023-44253](CVE-2023/CVE-2023-442xx/CVE-2023-44253.json) (`2024-03-11T22:15:54.337`)
|
||||
* [CVE-2024-25202](CVE-2024/CVE-2024-252xx/CVE-2024-25202.json) (`2024-03-11T22:15:55.080`)
|
||||
* [CVE-2024-25851](CVE-2024/CVE-2024-258xx/CVE-2024-25851.json) (`2024-03-11T22:15:55.150`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
112
_state.csv
112
_state.csv
@ -209571,6 +209571,7 @@ CVE-2022-4606,0,0,54f44bf17b152db6412582e0620f0d0d766b73e0cf752246d1889e46dfdb41
|
||||
CVE-2022-46061,0,0,e12f29d073851846befcb6ddc0a8aeebc5b88c385ffa9ef2e9900f7efee0a2dd,2022-12-16T04:58:35.193000
|
||||
CVE-2022-46062,0,0,9bef03e602aa56bdf2fbb6faa98b430909cedb29eb84d9140d248601473817cf,2022-12-15T20:45:59.180000
|
||||
CVE-2022-4607,0,0,ecc800de303bf082ccb38774687d9ca7ef840a9b0ddfb82701e237dea167c365,2024-02-29T01:36:43.570000
|
||||
CVE-2022-46070,1,1,fe4956b2d976f0935f803d875d7d796d906356c46a75b0ef2668f3ad7f823e8f,2024-03-11T22:15:54.230000
|
||||
CVE-2022-46071,0,0,7a67726ab997ec52a4e7bd2708959721f39adf6b34d769652d474b136f6d9adc,2023-01-30T17:55:05.703000
|
||||
CVE-2022-46072,0,0,621b370c453c641a16374181b8390cdb58c53a4903182ee4e591d98ef5ab393f,2023-01-30T17:51:29.990000
|
||||
CVE-2022-46073,0,0,227f1aeb0c53e4a98bac446a5a583c714a8f98436871914d7cd1143885446706,2023-01-30T17:53:04.420000
|
||||
@ -230969,7 +230970,7 @@ CVE-2023-44249,0,0,7387e716bd2e1cc406de3520c5be46766f483d26051fdb8ea949636183bf1
|
||||
CVE-2023-44250,0,0,3165960603a0db493dd4bba12c66801115a708bb74106ce71e755ac95d8cd94b,2024-01-18T13:54:40.410000
|
||||
CVE-2023-44251,0,0,bd1a17b69322ee4ca76a616eee193a48e03a05d52b59b86cb1a7bb5f086a4c4c,2023-12-18T17:34:13.253000
|
||||
CVE-2023-44252,0,0,94a064c8dde2a48c821d76ba5ff49355e75fb89e696b24797a592b76a5d10d6e,2023-12-18T17:34:39.763000
|
||||
CVE-2023-44253,0,0,9fe7ce6297cd2656be31705e4db281bdbf85cee9a64c4360ec4292041f27aa3b,2024-02-20T21:05:07.937000
|
||||
CVE-2023-44253,0,1,6b3e47842a89f29dc874e9e41cc3e909f905cdc7556b0f7df66da75a99e5e3b0,2024-03-11T22:15:54.337000
|
||||
CVE-2023-44256,0,0,aa0f77c63f0356ef60af907dc450171d7c84c072a82f6332b9d9a0abcfb1e015,2023-11-07T04:21:34.997000
|
||||
CVE-2023-44257,0,0,68d84256e04941b1d334fa33279d70dbdb1db2130ae861e3da7aa2620b1f7b2e,2023-10-12T01:48:28.493000
|
||||
CVE-2023-44259,0,0,771de690623dcac6253abdcdf5b192e27d10ab87f64c71e00fe342df44ce21fc,2023-10-12T00:41:15.513000
|
||||
@ -238453,6 +238454,7 @@ CVE-2024-1388,0,0,9f4f35daf92433c068c4ad0e3cff9f0fc31d7e6b5e8f690807686322bd29d2
|
||||
CVE-2024-1389,0,0,62d171117c191cb5fc110201c06be5328bba09160ed0dc883ad2c72ee32b12f1,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1390,0,0,760bcdaac2db269a3249aaa20e58e1659b2977bdb995748ef5e46a1ecb85447f,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1398,0,0,7a7783e481aa897afa83bd125da0d53c431d5a5a9d43f1ade8b1e715449f59a0,2024-03-04T13:58:23.447000
|
||||
CVE-2024-1400,1,1,f6299283a45b3cd05cee7296f8542b5ec537d16aa49e22e35d7c4cc0482a71b4,2024-03-11T22:15:54.490000
|
||||
CVE-2024-1402,0,0,f5ee948d1697d1774361c2691c46c88d302c6ae408ab90a865a59173f66ccaae,2024-02-15T18:42:03.397000
|
||||
CVE-2024-1403,0,0,52ae0be80e56bab12c9eb7614c5934d9c3f91ac3ecccfb883ba911d569f9ab9b,2024-02-28T14:07:00.563000
|
||||
CVE-2024-1404,0,0,1b49ab95872e7aebf44ce53f8bd207dc74e587353a926692e694bcd6ae3118fd,2024-02-29T01:43:49.687000
|
||||
@ -238549,6 +238551,7 @@ CVE-2024-1635,0,0,afdfc88a91b3e19c23e9baf0c4ef009675cb15f38c497a875cb9cabeec1970
|
||||
CVE-2024-1636,0,0,110561fc2d8220a09cd098605d5d9c82332c44e2266859d6f751e2ed66576fc3,2024-02-28T14:06:45.783000
|
||||
CVE-2024-1638,0,0,3d25792f560ad8670a55d542406f093195536acafd656ae4b3cd5fcca03c7380,2024-02-20T19:50:53.960000
|
||||
CVE-2024-1644,0,0,258e0c2c60e2ead118c6bf409e3c4e6182303d86b8fb67135f0b03753d76fde4,2024-02-20T19:50:53.960000
|
||||
CVE-2024-1645,1,1,cf378ce5b0cc895a170b1c209bc4990efed5c31916053fb34d2b368507468957,2024-03-11T22:15:54.690000
|
||||
CVE-2024-1647,0,0,54139a2a2a3a50db142faf8dcea4fe1dc96abdff85a01701062a380d090db1a3,2024-02-20T19:50:53.960000
|
||||
CVE-2024-1648,0,0,df8581548207f098c521d901093d9d52c33a9f0520924af81b2273765446e0d5,2024-02-20T19:50:53.960000
|
||||
CVE-2024-1649,0,0,cddd1d16a2fa649554e20977d58fb00396a226e17a846f01579d277dc429b938,2024-02-27T14:19:41.650000
|
||||
@ -239275,13 +239278,13 @@ CVE-2024-21983,0,0,ded146d4808fc5f83424e373b65cdad37794b676d9611f5162836ce6d86d8
|
||||
CVE-2024-21984,0,0,c4d05388605f2fb7e341aa0197be1de56d0ddb669904fcfa6f2ad451633ba0ba,2024-02-20T19:51:05.510000
|
||||
CVE-2024-21985,0,0,853a82d200092c0582c4290723b53256d943e3aa0955024d181a6e0dc05dbcae,2024-02-05T18:32:52.040000
|
||||
CVE-2024-21987,0,0,5cbacef8d973a258493b6f3339adef8cd944a54f5ab54894a910d3add02dbf7c,2024-02-16T21:39:50.223000
|
||||
CVE-2024-22005,1,1,95add7290cd294e301bc690167e22af844b132815193f8b19ec7df20a64ad2b4,2024-03-11T19:15:47.120000
|
||||
CVE-2024-22006,1,1,db8c52ddfa9cd6c36377e5746f14e75a549f66708318384ecb84175ad610c7f4,2024-03-11T20:15:07.030000
|
||||
CVE-2024-22007,1,1,7560e61eadbef70d8229c48edb96bf7aed5aa04526dfcfbe8b59f370e32932f9,2024-03-11T19:15:47.233000
|
||||
CVE-2024-22008,1,1,aba9989dae8d7582f3835bd6d5800be61625fd3f6ea4ac8e0b6c7af5a6a8b06e,2024-03-11T19:15:47.280000
|
||||
CVE-2024-22009,1,1,85dd34e55b7f63503c3b71919c0381d0afaaf40b4a7ab9bf72f431026dd5f718,2024-03-11T19:15:47.320000
|
||||
CVE-2024-22010,1,1,8f08ddd17f796bf3db7b24856f6667b3f30b19adf576177d23f5829c5e76b1fa,2024-03-11T19:15:47.367000
|
||||
CVE-2024-22011,1,1,c63ee0310c45308632bed00d4bd5ef5bebfb63f149c74e8509442e70486e4592,2024-03-11T19:15:47.413000
|
||||
CVE-2024-22005,0,0,95add7290cd294e301bc690167e22af844b132815193f8b19ec7df20a64ad2b4,2024-03-11T19:15:47.120000
|
||||
CVE-2024-22006,0,0,db8c52ddfa9cd6c36377e5746f14e75a549f66708318384ecb84175ad610c7f4,2024-03-11T20:15:07.030000
|
||||
CVE-2024-22007,0,0,7560e61eadbef70d8229c48edb96bf7aed5aa04526dfcfbe8b59f370e32932f9,2024-03-11T19:15:47.233000
|
||||
CVE-2024-22008,0,0,aba9989dae8d7582f3835bd6d5800be61625fd3f6ea4ac8e0b6c7af5a6a8b06e,2024-03-11T19:15:47.280000
|
||||
CVE-2024-22009,0,0,85dd34e55b7f63503c3b71919c0381d0afaaf40b4a7ab9bf72f431026dd5f718,2024-03-11T19:15:47.320000
|
||||
CVE-2024-22010,0,0,8f08ddd17f796bf3db7b24856f6667b3f30b19adf576177d23f5829c5e76b1fa,2024-03-11T19:15:47.367000
|
||||
CVE-2024-22011,0,0,c63ee0310c45308632bed00d4bd5ef5bebfb63f149c74e8509442e70486e4592,2024-03-11T19:15:47.413000
|
||||
CVE-2024-22012,0,0,3496e1376faff79bfb913c3511ac976ce741484efad2ac0961c5ff3c4bf8d282,2024-02-15T15:10:05.857000
|
||||
CVE-2024-22016,0,0,72bb3341c866069974fe863b6c9e848e25809f5f0697d51cda8a3c348c9671f4,2024-02-07T17:33:12.727000
|
||||
CVE-2024-22019,0,0,973223829547718a3f4f3bb4fa40a22f9bc1dc5683cd76da421f37d5d7095881,2024-02-20T19:50:53.960000
|
||||
@ -239858,7 +239861,7 @@ CVE-2024-2354,0,0,6474b9f1daec1a2dcc75cfc012fc15a1d60c7e19de88b7cedc44ae49b05d7a
|
||||
CVE-2024-2355,0,0,1ea896b23dde620508bb7022c8604ad2c803139cc978a2cbb0a4628b0582d758,2024-03-11T01:32:29.610000
|
||||
CVE-2024-23550,0,0,233aa541fdda788f0e4e95c8a9a0a8f5d7fa7689dcd559af0cf5e5843a531076,2024-02-13T00:57:33.613000
|
||||
CVE-2024-23553,0,0,51ea2d50cc1ff4dbab518de2a29e9ef6a91bd6b91073c23eb1a7f0cb7c8f1090,2024-02-10T00:59:00.423000
|
||||
CVE-2024-2357,1,1,f69d73d2e7168c49c56d452e4f16dd836760bc01104f34f037dddb40c85e8b5f,2024-03-11T20:15:07.867000
|
||||
CVE-2024-2357,0,0,f69d73d2e7168c49c56d452e4f16dd836760bc01104f34f037dddb40c85e8b5f,2024-03-11T20:15:07.867000
|
||||
CVE-2024-23591,0,0,f4c08614f6a162f49ecc99f020c088036b0b565e06b57796e1304b45ae78e59d,2024-02-20T22:15:08.353000
|
||||
CVE-2024-23603,0,0,fa877b171423c355baa3228ce2c605e41edbf822a3508567d7754cb447355052,2024-02-14T18:04:45.380000
|
||||
CVE-2024-23605,0,0,6357ef47a85c4e22049db0926cbddeb8bbc82cdf2a1a81b5a28ca15d9cbb7aa0,2024-02-26T18:15:07.673000
|
||||
@ -240432,6 +240435,7 @@ CVE-2024-25110,0,0,24d08fbde056008d1573de20c59de5968ddecd641d43f19a3146bb63dda83
|
||||
CVE-2024-25111,0,0,8d304b96b70aec61377c997bcf1349baefa2e910003e5b26a2a113712a3f02d6,2024-03-06T21:42:48.053000
|
||||
CVE-2024-25112,0,0,9f92b56982d5d0e159eb7030e033a87c46cac6fe6908722221c7e2c374361051,2024-02-13T14:01:40.577000
|
||||
CVE-2024-25113,0,0,e5d677582d1aad971970a68e649e33cfa2ee5186bf6cd06840ccc711efadc8c5,2024-02-17T22:15:46.660000
|
||||
CVE-2024-25114,1,1,ea667be1817401fae4fcbb24f0129b30a9d5ca8aa9ba946fe9467bf5b7a63a45,2024-03-11T22:15:54.870000
|
||||
CVE-2024-25117,0,0,cce25568087f33e003e408ef917e795ca999bd847bf0523692770a2f14b70a2f,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25118,0,0,557c105a7b5782a478cbc7b92a63142660ddc2cae3207683e4d3fac47f331dc4,2024-02-14T13:59:35.580000
|
||||
CVE-2024-25119,0,0,bbb39e4f066a0670237cfd7766ee329ec0be6e95761cf28e3f81545c0f84a41b,2024-02-14T13:59:35.580000
|
||||
@ -240472,7 +240476,7 @@ CVE-2024-25198,0,0,8b4024e60f871c76602fecb0152519496407fa53a46a195f21141146c8618
|
||||
CVE-2024-25199,0,0,633725c6a8fb3b98edd79b77d04beba3772199f893fd1dc52d18b3d5b4d30d5a,2024-02-20T19:50:53.960000
|
||||
CVE-2024-25200,0,0,1274a79d375d34fee92825da3e942b670613a4d255fa242e04ccd2d32c35b298,2024-02-15T15:22:25.980000
|
||||
CVE-2024-25201,0,0,bfe46b1bf114bcec0e6979818328c95472b0f2a68d7c4d63c6c58cdf16d9a244,2024-02-15T15:21:30.993000
|
||||
CVE-2024-25202,0,0,52ed934ca9bb6d9c0d0b789533f981a256976f8cd333e77471a3775567e4bda5,2024-02-29T13:49:47.277000
|
||||
CVE-2024-25202,0,1,c422e9401b4db774c0f691c7b5ea2ed61f0503ab63d1f7e46beff47ddd901d16,2024-03-11T22:15:55.080000
|
||||
CVE-2024-25207,0,0,522bd19ce7b2ddffc5be36f745ae847668b3400b09298028269262ddb75d3c09,2024-02-15T06:26:56.397000
|
||||
CVE-2024-25208,0,0,742eb42fda465b287aa7e8d41245379c8031d383095e8531f215f5845758ed8a,2024-02-15T06:27:02.687000
|
||||
CVE-2024-25209,0,0,44b8425e5bf16406937e1b3f814f6db05503cf2471da19fc8018aa7c48221faf,2024-02-14T16:13:16.563000
|
||||
@ -240664,7 +240668,8 @@ CVE-2024-25847,0,0,3ef11c19c61f974f609d7aad1c236864e0c5c70eed994d9ec6e1f8ca02f84
|
||||
CVE-2024-25848,0,0,5895359e1a5386228352b229e7b9653c0bf0c5830f471332dfc6294d51c68c9c,2024-03-08T14:02:57.420000
|
||||
CVE-2024-25849,0,0,fd6a8a3b861265723369727f5c31932283295a2905dc4ab7ca20ef4c116b9249,2024-03-08T14:02:57.420000
|
||||
CVE-2024-25850,0,0,692066b7b812d3f581962a79e3b9fc15f6aba377d7bab52c8307a8f270f93599,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25851,0,0,80e9be0d6a7053788297433ad38f07cfa16013d9c71aad70af25e756dbe8ac6c,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25851,0,1,bd0046433b2fafcbbbb1e5febcb4c1f8638f8ee71fb735a659aa488f84a496bf,2024-03-11T22:15:55.150000
|
||||
CVE-2024-25854,1,1,1611908d390b3ffb8a04b3e4456ae3e747529a9d4befb6eeb0983cf67cec5dd5,2024-03-11T22:15:55.210000
|
||||
CVE-2024-25858,0,0,e3703a6486af47542a5758b9a0dbed02e4c149644fb605d74af0ebc4b01ef273,2024-03-06T15:18:08.093000
|
||||
CVE-2024-25859,0,0,535afe19fadca146fcb852c884e13f1f96dd0ffd0b267def3f0a58c94171106c,2024-02-29T13:49:47.277000
|
||||
CVE-2024-25865,0,0,3c1600c9938d3c741a0c565875112497fc6aab8ca57710df7f556dbbd2f4c5d8,2024-03-04T13:58:23.447000
|
||||
@ -240710,16 +240715,16 @@ CVE-2024-25980,0,0,d14541c9bd05a1639b1a62b0f754591e13211a9cd13e14f154a9be2b3d087
|
||||
CVE-2024-25981,0,0,b1e3e7b3112b200a12d00f066add816f7584aa68dc501d60e52b5fde4e625430,2024-02-29T03:15:07.267000
|
||||
CVE-2024-25982,0,0,2ce9a54c1a7816fbeec4bd16145642068435e7c887fd25687a9f7d22cb5d12e6,2024-02-29T03:15:07.330000
|
||||
CVE-2024-25983,0,0,ff154fc00e6515081197744006f01532137b922b6260f549c6b1a3e405b64cb0,2024-02-29T03:15:07.400000
|
||||
CVE-2024-25984,1,1,fa24a1d0575f4812ea69c48ccbc1fdc974868c8b4ea283f5ea86c12beccaa42c,2024-03-11T19:15:47.460000
|
||||
CVE-2024-25985,1,1,0ca4e4f4f7e07b9f40fa84f446a57a6f354b2f08ca426baedaeeae74a0262d4a,2024-03-11T19:15:47.513000
|
||||
CVE-2024-25986,1,1,35f724ac07762317864cb75b0cd0baa278b9e3095115d740aa78f14b94b0573b,2024-03-11T19:15:47.560000
|
||||
CVE-2024-25987,1,1,70e6b65b2ce7e61688758c616ebab00fae03b777d6a61741b83e75cb2d57ae93,2024-03-11T19:15:47.603000
|
||||
CVE-2024-25988,1,1,ce6e450eda03cb1041dcfd931464388d8064f92f66e692b8deb51942ecaeb992,2024-03-11T19:15:47.650000
|
||||
CVE-2024-25989,1,1,d548f640aa9f027469526f81efcc62bbdbba552065578f2fe3fa45c3012c1ccc,2024-03-11T19:15:47.697000
|
||||
CVE-2024-25990,1,1,9e138ffaad52d85463615618b6a4a2763965b5fa1f6c44fe92235c258fe6d279,2024-03-11T19:15:47.743000
|
||||
CVE-2024-25991,1,1,5b51dd67d56acb1790c815f7985917f74848324981ed3e8498b2fb33c0f9651b,2024-03-11T19:15:47.793000
|
||||
CVE-2024-25992,1,1,a7c311d727b6e94f9cb331f80e0a2d766bacc29a3421ebd6697ff5a902acf399,2024-03-11T19:15:47.840000
|
||||
CVE-2024-25993,1,1,d150b8d2fc6c187cd1644f9278d5030c67801b6cd620e5c9c609ae1b72f0e2f3,2024-03-11T19:15:47.883000
|
||||
CVE-2024-25984,0,0,fa24a1d0575f4812ea69c48ccbc1fdc974868c8b4ea283f5ea86c12beccaa42c,2024-03-11T19:15:47.460000
|
||||
CVE-2024-25985,0,0,0ca4e4f4f7e07b9f40fa84f446a57a6f354b2f08ca426baedaeeae74a0262d4a,2024-03-11T19:15:47.513000
|
||||
CVE-2024-25986,0,0,35f724ac07762317864cb75b0cd0baa278b9e3095115d740aa78f14b94b0573b,2024-03-11T19:15:47.560000
|
||||
CVE-2024-25987,0,0,70e6b65b2ce7e61688758c616ebab00fae03b777d6a61741b83e75cb2d57ae93,2024-03-11T19:15:47.603000
|
||||
CVE-2024-25988,0,0,ce6e450eda03cb1041dcfd931464388d8064f92f66e692b8deb51942ecaeb992,2024-03-11T19:15:47.650000
|
||||
CVE-2024-25989,0,0,d548f640aa9f027469526f81efcc62bbdbba552065578f2fe3fa45c3012c1ccc,2024-03-11T19:15:47.697000
|
||||
CVE-2024-25990,0,0,9e138ffaad52d85463615618b6a4a2763965b5fa1f6c44fe92235c258fe6d279,2024-03-11T19:15:47.743000
|
||||
CVE-2024-25991,0,0,5b51dd67d56acb1790c815f7985917f74848324981ed3e8498b2fb33c0f9651b,2024-03-11T19:15:47.793000
|
||||
CVE-2024-25992,0,0,a7c311d727b6e94f9cb331f80e0a2d766bacc29a3421ebd6697ff5a902acf399,2024-03-11T19:15:47.840000
|
||||
CVE-2024-25993,0,0,d150b8d2fc6c187cd1644f9278d5030c67801b6cd620e5c9c609ae1b72f0e2f3,2024-03-11T19:15:47.883000
|
||||
CVE-2024-26016,0,0,225df2de732dbe1aa65450d758c74d9fd62d1571f14eb88fac267d40c0b495b0,2024-02-28T15:15:09.320000
|
||||
CVE-2024-26128,0,0,487fd4a47ca7d01d688a4160da954eb7676a1080733cdfedc265ac6cf53a8666,2024-02-23T02:42:54.547000
|
||||
CVE-2024-26129,0,0,968e60f64e57be6f8f2df784210f5788e81353ced4a4f4353953a10484d71d0a,2024-02-20T19:50:53.960000
|
||||
@ -240888,35 +240893,35 @@ CVE-2024-27139,0,0,66ddd9efc34252e5e972ac0e5a31e042faa3995b86c5ae6f0f108c10e1d7b
|
||||
CVE-2024-27140,0,0,34daddef6e0d13f2bea16bc1184887cdd01053137a36a3bc5699d2875c449127,2024-03-01T22:22:25.913000
|
||||
CVE-2024-27198,0,0,e4259fe3d4611134ab5dfb0d4f88f5b563c21b8238f30b4253811838ad004753,2024-03-11T15:15:47.483000
|
||||
CVE-2024-27199,0,0,3dd3bfb58b796a8c7735f0a6f342852f32998fc13795786d35eb3d4375df0417,2024-03-11T15:15:47.663000
|
||||
CVE-2024-27204,1,1,824209b6e9ba470551c63e3d3d81a08ab679d34202c3f3f5916084eff37ad745,2024-03-11T19:15:47.930000
|
||||
CVE-2024-27205,1,1,21b986f37fa2e8c4df712a0552119440cd4a6314ff7f4b19fc00174982caf0b1,2024-03-11T19:15:47.977000
|
||||
CVE-2024-27206,1,1,2103573414ee19bb9c7ebb35385d2ea9706e79e011c742fcc090d8a141ef03bf,2024-03-11T19:15:48.020000
|
||||
CVE-2024-27207,1,1,66bd21b251acb24164ef2e7ea08fbf76aae38b42f2e35a23032517537b813be8,2024-03-11T20:15:07.090000
|
||||
CVE-2024-27208,1,1,5c3466a9b81e5fff7160138c3417a94c41eb95f508f4229480f9baad77b094b4,2024-03-11T19:15:48.107000
|
||||
CVE-2024-27209,1,1,61f7901a575a445fbb10ff4a0ab07fc9b192a7c83a695674b0663d0cd049c420,2024-03-11T19:15:48.160000
|
||||
CVE-2024-27210,1,1,2bd436b550fbe76b4828b60f270f46944f2c7dda412c82bff13c64aa30e6430c,2024-03-11T19:15:48.200000
|
||||
CVE-2024-27211,1,1,c1191de0809b223fca72ae941a378c862efcf40de51620512bdd567502e5a9df,2024-03-11T19:15:48.247000
|
||||
CVE-2024-27212,1,1,c43ad32f935f60a51c45cc36e9a8b625c9a51c5add7e48b713d38ed5e86c7bb6,2024-03-11T19:15:48.290000
|
||||
CVE-2024-27213,1,1,03c341f084fce516200404f6cfa6d04f0c70c178b8fba117a9074592a21abf64,2024-03-11T19:15:48.333000
|
||||
CVE-2024-27204,0,0,824209b6e9ba470551c63e3d3d81a08ab679d34202c3f3f5916084eff37ad745,2024-03-11T19:15:47.930000
|
||||
CVE-2024-27205,0,0,21b986f37fa2e8c4df712a0552119440cd4a6314ff7f4b19fc00174982caf0b1,2024-03-11T19:15:47.977000
|
||||
CVE-2024-27206,0,0,2103573414ee19bb9c7ebb35385d2ea9706e79e011c742fcc090d8a141ef03bf,2024-03-11T19:15:48.020000
|
||||
CVE-2024-27207,0,0,66bd21b251acb24164ef2e7ea08fbf76aae38b42f2e35a23032517537b813be8,2024-03-11T20:15:07.090000
|
||||
CVE-2024-27208,0,0,5c3466a9b81e5fff7160138c3417a94c41eb95f508f4229480f9baad77b094b4,2024-03-11T19:15:48.107000
|
||||
CVE-2024-27209,0,0,61f7901a575a445fbb10ff4a0ab07fc9b192a7c83a695674b0663d0cd049c420,2024-03-11T19:15:48.160000
|
||||
CVE-2024-27210,0,0,2bd436b550fbe76b4828b60f270f46944f2c7dda412c82bff13c64aa30e6430c,2024-03-11T19:15:48.200000
|
||||
CVE-2024-27211,0,0,c1191de0809b223fca72ae941a378c862efcf40de51620512bdd567502e5a9df,2024-03-11T19:15:48.247000
|
||||
CVE-2024-27212,0,0,c43ad32f935f60a51c45cc36e9a8b625c9a51c5add7e48b713d38ed5e86c7bb6,2024-03-11T19:15:48.290000
|
||||
CVE-2024-27213,0,0,03c341f084fce516200404f6cfa6d04f0c70c178b8fba117a9074592a21abf64,2024-03-11T19:15:48.333000
|
||||
CVE-2024-27215,0,0,651ced2c4948681508a9ad090546fd018840608eea0c7482bdd7848315ac417f,2024-02-21T18:15:52.060000
|
||||
CVE-2024-27218,1,1,a236b632a2aa002560982ee2fcebf0b8d15ed0fbb62beec1352a77ee182b13bb,2024-03-11T19:15:48.380000
|
||||
CVE-2024-27219,1,1,e78ab0ea8943a03430f4e2554a61777cdcad07704c3e2eb6adaadb83aeaf49f4,2024-03-11T19:15:48.423000
|
||||
CVE-2024-27220,1,1,ae7914dca545aa12d673285dc2b4ea6cde6e964c6435268aed8d7e17c22effad,2024-03-11T19:15:48.470000
|
||||
CVE-2024-27221,1,1,4d8e7e5e726bb9fee100153fa0c5d5b7e3d89796416f05a4afe0fdb21afdbd7a,2024-03-11T19:15:48.513000
|
||||
CVE-2024-27222,1,1,ff7739836f61380f5264fd6a30a21e1e40dc2117936cf4eba96e6c91793fbbb9,2024-03-11T19:15:48.560000
|
||||
CVE-2024-27223,1,1,c9252fd292973e8286614474bf8d5b60c5c0c39a521b624a9063dcda9dc9053a,2024-03-11T19:15:48.603000
|
||||
CVE-2024-27224,1,1,f168c98e661174930a9ebf515ace3a4f984cdd3a3b42c1b7bc24d8fe1afa5e41,2024-03-11T19:15:48.647000
|
||||
CVE-2024-27225,1,1,d37995bba00c59b1bb5527ed615f498fcf485bce505677152e600ef89a11719d,2024-03-11T19:15:48.693000
|
||||
CVE-2024-27226,1,1,b5c55e32c69a54e7db76c6bca2b37f2633a42147b4c19e52d7f6ccdab12461af,2024-03-11T19:15:48.737000
|
||||
CVE-2024-27227,1,1,cf39bcc17992e1f390364b159848486f290b1dd25d345367db152dcee8bfe11f,2024-03-11T20:15:07.137000
|
||||
CVE-2024-27228,1,1,bc9ab05120f5c79221abc807afeb677d440a6a97c101129fcdf9ef5f9fc2672f,2024-03-11T19:15:48.827000
|
||||
CVE-2024-27229,1,1,67c4acb2995c43da4f01f93ae6334c8559cf21aa1551e9e1895d15dde882ad51,2024-03-11T19:15:48.873000
|
||||
CVE-2024-27230,1,1,4f1f2d2153776ed5ed98a9e562d54ced7dc27861a96ae74576e37e3fa343b6e4,2024-03-11T19:15:48.920000
|
||||
CVE-2024-27233,1,1,eafb788de644bbe48248352ce855f8d67f92c631325eae857ceafed04d674dc9,2024-03-11T19:15:48.963000
|
||||
CVE-2024-27234,1,1,827c9d6dace72ad075eba6081b9a38dd5b71d2b454a21df757ad3aac74322bb3,2024-03-11T19:15:49.010000
|
||||
CVE-2024-27235,1,1,dde9ac25e3dc28ca1eb542e7721afb29f428c971e5de3c7b52f8a95c0a5d34fe,2024-03-11T19:15:49.057000
|
||||
CVE-2024-27236,1,1,282b94bf5a7d0d2e513a4bf96e41fe02f99a50dc299b4c04b5b554698e6d9893,2024-03-11T19:15:49.100000
|
||||
CVE-2024-27237,1,1,6e6c1327fba165e84802328ddd95f3b756fd6dd1ae76c621cb6fa8e9149e0d13,2024-03-11T19:15:49.143000
|
||||
CVE-2024-27218,0,0,a236b632a2aa002560982ee2fcebf0b8d15ed0fbb62beec1352a77ee182b13bb,2024-03-11T19:15:48.380000
|
||||
CVE-2024-27219,0,0,e78ab0ea8943a03430f4e2554a61777cdcad07704c3e2eb6adaadb83aeaf49f4,2024-03-11T19:15:48.423000
|
||||
CVE-2024-27220,0,0,ae7914dca545aa12d673285dc2b4ea6cde6e964c6435268aed8d7e17c22effad,2024-03-11T19:15:48.470000
|
||||
CVE-2024-27221,0,0,4d8e7e5e726bb9fee100153fa0c5d5b7e3d89796416f05a4afe0fdb21afdbd7a,2024-03-11T19:15:48.513000
|
||||
CVE-2024-27222,0,0,ff7739836f61380f5264fd6a30a21e1e40dc2117936cf4eba96e6c91793fbbb9,2024-03-11T19:15:48.560000
|
||||
CVE-2024-27223,0,0,c9252fd292973e8286614474bf8d5b60c5c0c39a521b624a9063dcda9dc9053a,2024-03-11T19:15:48.603000
|
||||
CVE-2024-27224,0,0,f168c98e661174930a9ebf515ace3a4f984cdd3a3b42c1b7bc24d8fe1afa5e41,2024-03-11T19:15:48.647000
|
||||
CVE-2024-27225,0,0,d37995bba00c59b1bb5527ed615f498fcf485bce505677152e600ef89a11719d,2024-03-11T19:15:48.693000
|
||||
CVE-2024-27226,0,0,b5c55e32c69a54e7db76c6bca2b37f2633a42147b4c19e52d7f6ccdab12461af,2024-03-11T19:15:48.737000
|
||||
CVE-2024-27227,0,0,cf39bcc17992e1f390364b159848486f290b1dd25d345367db152dcee8bfe11f,2024-03-11T20:15:07.137000
|
||||
CVE-2024-27228,0,0,bc9ab05120f5c79221abc807afeb677d440a6a97c101129fcdf9ef5f9fc2672f,2024-03-11T19:15:48.827000
|
||||
CVE-2024-27229,0,0,67c4acb2995c43da4f01f93ae6334c8559cf21aa1551e9e1895d15dde882ad51,2024-03-11T19:15:48.873000
|
||||
CVE-2024-27230,0,0,4f1f2d2153776ed5ed98a9e562d54ced7dc27861a96ae74576e37e3fa343b6e4,2024-03-11T19:15:48.920000
|
||||
CVE-2024-27233,0,0,eafb788de644bbe48248352ce855f8d67f92c631325eae857ceafed04d674dc9,2024-03-11T19:15:48.963000
|
||||
CVE-2024-27234,0,0,827c9d6dace72ad075eba6081b9a38dd5b71d2b454a21df757ad3aac74322bb3,2024-03-11T19:15:49.010000
|
||||
CVE-2024-27235,0,0,dde9ac25e3dc28ca1eb542e7721afb29f428c971e5de3c7b52f8a95c0a5d34fe,2024-03-11T19:15:49.057000
|
||||
CVE-2024-27236,0,0,282b94bf5a7d0d2e513a4bf96e41fe02f99a50dc299b4c04b5b554698e6d9893,2024-03-11T19:15:49.100000
|
||||
CVE-2024-27237,0,0,6e6c1327fba165e84802328ddd95f3b756fd6dd1ae76c621cb6fa8e9149e0d13,2024-03-11T19:15:49.143000
|
||||
CVE-2024-27255,0,0,07d4523d50b3b6ceec1ed85c31e8859376bfd63a9732f2f4d2cf6e5b4c34b76b,2024-03-04T13:58:23.447000
|
||||
CVE-2024-27278,0,0,2ef9546b6eb3a76ad70be700186038d995dd630654759ed72b9b3d10968f6d39,2024-03-06T15:18:08.093000
|
||||
CVE-2024-27283,0,0,d0d6cc69e38ce7977029c4d3a011dff4f743808fa73bec6f0327124024522ffa,2024-02-22T19:07:27.197000
|
||||
@ -240928,6 +240933,7 @@ CVE-2024-27289,0,0,47af4bc7cdfd8b932586f8ab9b118be2b9049675bb63c3d42c32ea7c51cb1
|
||||
CVE-2024-27294,0,0,1e7e6995898095f1d685eff7bc88643d7927f9fb3d48787703721f8c8c06100b,2024-03-01T14:04:26.010000
|
||||
CVE-2024-27295,0,0,7b61bc68a0e7596ec39f45cf16eb56847e1e2291e2b9c36b655d40907b3609d3,2024-03-01T22:22:25.913000
|
||||
CVE-2024-27296,0,0,efeac0d0835ce5e895a91174ac6e0936bc76da32bc1ae41fcb14571a12d2985d,2024-03-01T22:22:25.913000
|
||||
CVE-2024-27297,1,1,12baf4f69a16e3a9085769a61c18918da91db5e71583d869fbef36b2fba203b8,2024-03-11T22:15:55.277000
|
||||
CVE-2024-27298,0,0,1aaf802a3586818726ce977e3c4d8b52b79c9b45f43876bfaeae085dddddd041,2024-03-01T22:22:25.913000
|
||||
CVE-2024-27302,0,0,f49f7cb8056f6127ae14fec0cfff2d0bf177dfba1318b206d31d7b548bf3e9f5,2024-03-06T21:42:48.053000
|
||||
CVE-2024-27303,0,0,5bf58561ed507a70ca73108a11218e0be9a2a377c18b42118ebe9af756d8ec79,2024-03-06T21:42:48.053000
|
||||
@ -241005,6 +241011,7 @@ CVE-2024-27915,0,0,e3ea2d621ba17649c82b1ac50772a17f6f4bcbc919f498c03dc3f90c544f5
|
||||
CVE-2024-27917,0,0,af242c2d21e7486c1314f58994d4b13c43efcfe28649da8aeb5e5a5a818348df,2024-03-06T21:42:48.053000
|
||||
CVE-2024-27929,0,0,39502b4a24aeb4ce49408f96b15d6d1bf553bf86f106f7b47d0609503cbda65d,2024-03-06T22:15:57.473000
|
||||
CVE-2024-27931,0,0,edca36e5744b6d31feb40b55ed56762c342a513bdb2558b00d26097669ed2360,2024-03-05T18:50:18.333000
|
||||
CVE-2024-27938,1,1,c8ca69ce2258bdddcda67deec477d574172f24f3b31129c18250836627bd67c3,2024-03-11T22:15:55.490000
|
||||
CVE-2024-27948,0,0,67e156b37ac5c6da6ca4063513792c829bdbe8e804f7b01b28e54c9fc1c182b2,2024-02-29T13:49:47.277000
|
||||
CVE-2024-27949,0,0,12ee9b935394b527d1677a59b517c94d0df067a0b32bfff31d7cb2be5b4b5d00,2024-03-01T14:04:26.010000
|
||||
CVE-2024-27950,0,0,56d632dad56c45d949d3327de16e5b70b08683cea8ce7876ca8c59cc37ee8062,2024-03-01T14:04:04.827000
|
||||
@ -241018,6 +241025,7 @@ CVE-2024-28097,0,0,ad0a3d7a6b96970687d28d32c41921c3200422c4265f25f269de512c4cb80
|
||||
CVE-2024-28110,0,0,0aa63c709bee34101fee09332c67840fa8b7d5aea01ed58b7f238cd7f26f2f87,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28111,0,0,ef109000cb681b8950a504435d888106cd334990070bd9ca1f33bba165c1974a,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28115,0,0,3e0e705412ec4ecfb9fabefcb95634cd838a6bf7c9c03087d677ba199986f693,2024-03-08T14:02:57.420000
|
||||
CVE-2024-28120,1,1,4613f1ac8a551507991d8653bc519be257b1eb177402e232f9525bbbf7446e2f,2024-03-11T22:15:55.707000
|
||||
CVE-2024-28122,0,0,3209f9a611aea4804720e8e5b4eeb3a02772982f302e787ac8040299af464092,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28149,0,0,bb1327eb2ceb44ae2cc8e952fde2f54b109f1740591e1ece1b912c644025402b,2024-03-06T21:42:54.697000
|
||||
CVE-2024-28150,0,0,bd9c785686979f74fc956d3a9d80b65ba208ec849a10e17a7f0c9226761980a2,2024-03-06T21:42:54.697000
|
||||
@ -241038,9 +241046,9 @@ CVE-2024-28174,0,0,fa1674b985861bddf4d0ff5ab075ec0e4328a9665c668bfe339f9f0de580d
|
||||
CVE-2024-28176,0,0,5bb6d329167995170bd276a45554624691bdda8cbb6c83c2d08f42eba9f617aa,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28180,0,0,1e73ce45496cde15ab7710e8895a9f7d4caf4d2dcdb0d6de4d94afa753e9a64b,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28184,0,0,043b0bc7533d0fc96bb6df4be7b21b8477ffe807b0ac6ed0c4b06cf7d8241c3c,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28187,1,1,6ad3874ba881443f641f39e3a3b8faab086575f93d3871aa198b7b52707f1e2f,2024-03-11T20:15:07.180000
|
||||
CVE-2024-28197,1,1,81a6695e3f35180411e9e1480d63884dec3c7546044011915077e5a9022c6f52,2024-03-11T20:15:07.420000
|
||||
CVE-2024-28198,1,1,b69b10822779767b360027621125c34db7967289e82c7e08b708ce0af64114c2,2024-03-11T20:15:07.643000
|
||||
CVE-2024-28187,0,0,6ad3874ba881443f641f39e3a3b8faab086575f93d3871aa198b7b52707f1e2f,2024-03-11T20:15:07.180000
|
||||
CVE-2024-28197,0,0,81a6695e3f35180411e9e1480d63884dec3c7546044011915077e5a9022c6f52,2024-03-11T20:15:07.420000
|
||||
CVE-2024-28198,0,0,b69b10822779767b360027621125c34db7967289e82c7e08b708ce0af64114c2,2024-03-11T20:15:07.643000
|
||||
CVE-2024-28211,0,0,c1ed1ddd829861cccd703be6254c437e62099ef974f2a29a31d06b3aa407dda5,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28212,0,0,5a2751cb50b15d5c440d2b8966e76c727b56c2f7e1085394c9464fe62a449a7f,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28213,0,0,123dce2bcd1dc69568d6c5cbaff040ae81dbab0468f48456713cfbf9a03f5945,2024-03-07T13:52:27.110000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user