mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-03-26T19:00:30.705758+00:00
This commit is contained in:
parent
1943884302
commit
afa2f7c07b
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33855",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-26T14:15:07.903",
|
||||
"lastModified": "2024-03-26T14:15:07.903",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41969",
|
||||
"sourceIdentifier": "cve@zscaler.com",
|
||||
"published": "2024-03-26T15:15:48.203",
|
||||
"lastModified": "2024-03-26T15:15:48.203",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41972",
|
||||
"sourceIdentifier": "cve@zscaler.com",
|
||||
"published": "2024-03-26T15:15:48.407",
|
||||
"lastModified": "2024-03-26T15:15:48.407",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41973",
|
||||
"sourceIdentifier": "cve@zscaler.com",
|
||||
"published": "2024-03-26T15:15:48.613",
|
||||
"lastModified": "2024-03-26T15:15:48.613",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2023/CVE-2023-449xx/CVE-2023-44989.json
Normal file
55
CVE-2023/CVE-2023-449xx/CVE-2023-44989.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-44989",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T18:15:08.273",
|
||||
"lastModified": "2024-03-26T18:15:08.273",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insertion of Sensitive Information into Log File vulnerability in GSheetConnector CF7 Google Sheets Connector.This issue affects CF7 Google Sheets Connector: from n/a through 5.0.5.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-532"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/cf7-google-sheets-connector/wordpress-cf7-google-sheets-connector-plugin-5-0-5-sensitive-data-exposure-via-debug-log-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-47150",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-26T14:15:08.173",
|
||||
"lastModified": "2024-03-26T14:15:08.173",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50894",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-26T15:15:48.797",
|
||||
"lastModified": "2024-03-26T15:15:48.797",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50895",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-26T15:15:48.860",
|
||||
"lastModified": "2024-03-26T15:15:48.860",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52214",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T13:15:44.857",
|
||||
"lastModified": "2024-03-26T13:15:44.857",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
32
CVE-2023/CVE-2023-526xx/CVE-2023-52621.json
Normal file
32
CVE-2023/CVE-2023-526xx/CVE-2023-52621.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-52621",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-26T18:15:08.817",
|
||||
"lastModified": "2024-03-26T18:15:08.817",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check rcu_read_lock_trace_held() before calling bpf map helpers\n\nThese three bpf_map_{lookup,update,delete}_elem() helpers are also\navailable for sleepable bpf program, so add the corresponding lock\nassertion for sleepable bpf program, otherwise the following warning\nwill be reported when a sleepable bpf program manipulates bpf map under\ninterpreter mode (aka bpf_jit_enable=0):\n\n WARNING: CPU: 3 PID: 4985 at kernel/bpf/helpers.c:40 ......\n CPU: 3 PID: 4985 Comm: test_progs Not tainted 6.6.0+ #2\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) ......\n RIP: 0010:bpf_map_lookup_elem+0x54/0x60\n ......\n Call Trace:\n <TASK>\n ? __warn+0xa5/0x240\n ? bpf_map_lookup_elem+0x54/0x60\n ? report_bug+0x1ba/0x1f0\n ? handle_bug+0x40/0x80\n ? exc_invalid_op+0x18/0x50\n ? asm_exc_invalid_op+0x1b/0x20\n ? __pfx_bpf_map_lookup_elem+0x10/0x10\n ? rcu_lockdep_current_cpu_online+0x65/0xb0\n ? rcu_is_watching+0x23/0x50\n ? bpf_map_lookup_elem+0x54/0x60\n ? __pfx_bpf_map_lookup_elem+0x10/0x10\n ___bpf_prog_run+0x513/0x3b70\n __bpf_prog_run32+0x9d/0xd0\n ? __bpf_prog_enter_sleepable_recur+0xad/0x120\n ? __bpf_prog_enter_sleepable_recur+0x3e/0x120\n bpf_trampoline_6442580665+0x4d/0x1000\n __x64_sys_getpgid+0x5/0x30\n ? do_syscall_64+0x36/0xb0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n </TASK>"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/169410eba271afc9f0fb476d996795aa26770c6d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/483cb92334cd7f1d5387dccc0ab5d595d27a669d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c7f1b6146f4a46d727c0d046284c28b6882c6304",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d6d6fe4bb105595118f12abeed4a7bdd450853f3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2023/CVE-2023-526xx/CVE-2023-52622.json
Normal file
48
CVE-2023/CVE-2023-526xx/CVE-2023-52622.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2023-52622",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-26T18:15:08.873",
|
||||
"lastModified": "2024-03-26T18:15:08.873",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid online resizing failures due to oversized flex bg\n\nWhen we online resize an ext4 filesystem with a oversized flexbg_size,\n\n mkfs.ext4 -F -G 67108864 $dev -b 4096 100M\n mount $dev $dir\n resize2fs $dev 16G\n\nthe following WARN_ON is triggered:\n==================================================================\nWARNING: CPU: 0 PID: 427 at mm/page_alloc.c:4402 __alloc_pages+0x411/0x550\nModules linked in: sg(E)\nCPU: 0 PID: 427 Comm: resize2fs Tainted: G E 6.6.0-rc5+ #314\nRIP: 0010:__alloc_pages+0x411/0x550\nCall Trace:\n <TASK>\n __kmalloc_large_node+0xa2/0x200\n __kmalloc+0x16e/0x290\n ext4_resize_fs+0x481/0xd80\n __ext4_ioctl+0x1616/0x1d90\n ext4_ioctl+0x12/0x20\n __x64_sys_ioctl+0xf0/0x150\n do_syscall_64+0x3b/0x90\n==================================================================\n\nThis is because flexbg_size is too large and the size of the new_group_data\narray to be allocated exceeds MAX_ORDER. Currently, the minimum value of\nMAX_ORDER is 8, the minimum value of PAGE_SIZE is 4096, the corresponding\nmaximum number of groups that can be allocated is:\n\n (PAGE_SIZE << MAX_ORDER) / sizeof(struct ext4_new_group_data) \u2248 21845\n\nAnd the value that is down-aligned to the power of 2 is 16384. Therefore,\nthis value is defined as MAX_RESIZE_BG, and the number of groups added\neach time does not exceed this value during resizing, and is added multiple\ntimes to complete the online resizing. The difference is that the metadata\nin a flex_bg may be more dispersed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5d1935ac02ca5aee364a449a35e2977ea84509b0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6d2cbf517dcabc093159cf138ad5712c9c7fa954",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8b1413dbfe49646eda2c00c0f1144ee9d3368e0c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b183fe8702e78bba3dcef8e7193cab6898abee07",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cd1f93ca97a9136989f3bd2bf90696732a2ed644",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cfbbb3199e71b63fc26cee0ebff327c47128a1e8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d76c8d7ffe163c6bf2f1ef680b0539c2b3902b90",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dc3e0f55bec4410f3d74352c4a7c79f518088ee2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2023/CVE-2023-526xx/CVE-2023-52623.json
Normal file
48
CVE-2023/CVE-2023-526xx/CVE-2023-52623.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2023-52623",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-26T18:15:08.930",
|
||||
"lastModified": "2024-03-26T18:15:08.930",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix a suspicious RCU usage warning\n\nI received the following warning while running cthon against an ontap\nserver running pNFS:\n\n[ 57.202521] =============================\n[ 57.202522] WARNING: suspicious RCU usage\n[ 57.202523] 6.7.0-rc3-g2cc14f52aeb7 #41492 Not tainted\n[ 57.202525] -----------------------------\n[ 57.202525] net/sunrpc/xprtmultipath.c:349 RCU-list traversed in non-reader section!!\n[ 57.202527]\n other info that might help us debug this:\n\n[ 57.202528]\n rcu_scheduler_active = 2, debug_locks = 1\n[ 57.202529] no locks held by test5/3567.\n[ 57.202530]\n stack backtrace:\n[ 57.202532] CPU: 0 PID: 3567 Comm: test5 Not tainted 6.7.0-rc3-g2cc14f52aeb7 #41492 5b09971b4965c0aceba19f3eea324a4a806e227e\n[ 57.202534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS unknown 2/2/2022\n[ 57.202536] Call Trace:\n[ 57.202537] <TASK>\n[ 57.202540] dump_stack_lvl+0x77/0xb0\n[ 57.202551] lockdep_rcu_suspicious+0x154/0x1a0\n[ 57.202556] rpc_xprt_switch_has_addr+0x17c/0x190 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202596] rpc_clnt_setup_test_and_add_xprt+0x50/0x180 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202621] ? rpc_clnt_add_xprt+0x254/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202646] rpc_clnt_add_xprt+0x27a/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202671] ? __pfx_rpc_clnt_setup_test_and_add_xprt+0x10/0x10 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202696] nfs4_pnfs_ds_connect+0x345/0x760 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202728] ? __pfx_nfs4_test_session_trunk+0x10/0x10 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202754] nfs4_fl_prepare_ds+0x75/0xc0 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a]\n[ 57.202760] filelayout_write_pagelist+0x4a/0x200 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a]\n[ 57.202765] pnfs_generic_pg_writepages+0xbe/0x230 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202788] __nfs_pageio_add_request+0x3fd/0x520 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202813] nfs_pageio_add_request+0x18b/0x390 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202831] nfs_do_writepage+0x116/0x1e0 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202849] nfs_writepages_callback+0x13/0x30 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202866] write_cache_pages+0x265/0x450\n[ 57.202870] ? __pfx_nfs_writepages_callback+0x10/0x10 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202891] nfs_writepages+0x141/0x230 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202913] do_writepages+0xd2/0x230\n[ 57.202917] ? filemap_fdatawrite_wbc+0x5c/0x80\n[ 57.202921] filemap_fdatawrite_wbc+0x67/0x80\n[ 57.202924] filemap_write_and_wait_range+0xd9/0x170\n[ 57.202930] nfs_wb_all+0x49/0x180 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202947] nfs4_file_flush+0x72/0xb0 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202969] __se_sys_close+0x46/0xd0\n[ 57.202972] do_syscall_64+0x68/0x100\n[ 57.202975] ? do_syscall_64+0x77/0x100\n[ 57.202976] ? do_syscall_64+0x77/0x100\n[ 57.202979] entry_SYSCALL_64_after_hwframe+0x6e/0x76\n[ 57.202982] RIP: 0033:0x7fe2b12e4a94\n[ 57.202985] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 80 3d d5 18 0e 00 00 74 13 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 44 c3 0f 1f 00 48 83 ec 18 89 7c 24 0c e8 c3\n[ 57.202987] RSP: 002b:00007ffe857ddb38 EFLAGS: 00000202 ORIG_RAX: 0000000000000003\n[ 57.202989] RAX: ffffffffffffffda RBX: 00007ffe857dfd68 RCX: 00007fe2b12e4a94\n[ 57.202991] RDX: 0000000000002000 RSI: 00007ffe857ddc40 RDI: 0000000000000003\n[ 57.202992] RBP: 00007ffe857dfc50 R08: 7fffffffffffffff R09: 0000000065650f49\n[ 57.202993] R10: 00007f\n---truncated---"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/31b62908693c90d4d07db597e685d9f25a120073",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/69c7eeb4f622c2a28da965f970f982db171f3dc6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7a96d85bf196c170dcf1b47a82e9bb97cca69aa6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8f860c8407470baff2beb9982ad6b172c94f1d0a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c430e6bb43955c6bf573665fcebf31694925b9f7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e8ca3e73301e23e8c0ac0ce2e6bac4545cd776e0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f8cf4dabbdcb8bef85335b0ed7ad5b25fd82ff56",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fece80a2a6718ed58487ce397285bb1b83a3e54e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-526xx/CVE-2023-52624.json
Normal file
24
CVE-2023/CVE-2023-526xx/CVE-2023-52624.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-52624",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-26T18:15:08.990",
|
||||
"lastModified": "2024-03-26T18:15:08.990",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Wake DMCUB before executing GPINT commands\n\n[Why]\nDMCUB can be in idle when we attempt to interface with the HW through\nthe GPINT mailbox resulting in a system hang.\n\n[How]\nAdd dc_wake_and_execute_gpint() to wrap the wake, execute, sleep\nsequence.\n\nIf the GPINT executes successfully then DMCUB will be put back into\nsleep after the optional response is returned.\n\nIt functions similar to the inbox command interface."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2ef98c6d753a744e333b7e34b9cf687040fba57d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e5ffd1263dd5b44929c676171802e7b6af483f21",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-526xx/CVE-2023-52625.json
Normal file
24
CVE-2023/CVE-2023-526xx/CVE-2023-52625.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-52625",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-26T18:15:09.040",
|
||||
"lastModified": "2024-03-26T18:15:09.040",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Refactor DMCUB enter/exit idle interface\n\n[Why]\nWe can hang in place trying to send commands when the DMCUB isn't\npowered on.\n\n[How]\nWe need to exit out of the idle state prior to sending a command,\nbut the process that performs the exit also invokes a command itself.\n\nFixing this issue involves the following:\n\n1. Using a software state to track whether or not we need to start\n the process to exit idle or notify idle.\n\nIt's possible for the hardware to have exited an idle state without\ndriver knowledge, but entering one is always restricted to a driver\nallow - which makes the SW state vs HW state mismatch issue purely one\nof optimization, which should seldomly be hit, if at all.\n\n2. Refactor any instances of exit/notify idle to use a single wrapper\n that maintains this SW state.\n\nThis works simialr to dc_allow_idle_optimizations, but works at the\nDMCUB level and makes sure the state is marked prior to any notify/exit\nidle so we don't enter an infinite loop.\n\n3. Make sure we exit out of idle prior to sending any commands or\n waiting for DMCUB idle.\n\nThis patch takes care of 1/2. A future patch will take care of wrapping\nDMCUB command submission with calls to this new interface."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/820c3870c491946a78950cdf961bf40e28c1025f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8e57c06bf4b0f51a4d6958e15e1a99c9520d00fa",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-526xx/CVE-2023-52626.json
Normal file
28
CVE-2023/CVE-2023-526xx/CVE-2023-52626.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-52626",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-26T18:15:09.087",
|
||||
"lastModified": "2024-03-26T18:15:09.087",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix operation precedence bug in port timestamping napi_poll context\n\nIndirection (*) is of lower precedence than postfix increment (++). Logic\nin napi_poll context would cause an out-of-bound read by first increment\nthe pointer address by byte address space and then dereference the value.\nRather, the intended logic was to dereference first and then increment the\nunderlying value."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/33cdeae8c6fb58cc445f859b67c014dc9f60b4e0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3876638b2c7ebb2c9d181de1191db0de8cac143a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/40e0d0746390c5b0c31144f4f1688d72f3f8d790",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
40
CVE-2023/CVE-2023-526xx/CVE-2023-52627.json
Normal file
40
CVE-2023/CVE-2023-526xx/CVE-2023-52627.json
Normal file
@ -0,0 +1,40 @@
|
||||
{
|
||||
"id": "CVE-2023-52627",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-26T18:15:09.140",
|
||||
"lastModified": "2024-03-26T18:15:09.140",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: adc: ad7091r: Allow users to configure device events\n\nAD7091R-5 devices are supported by the ad7091r-5 driver together with\nthe ad7091r-base driver. Those drivers declared iio events for notifying\nuser space when ADC readings fall bellow the thresholds of low limit\nregisters or above the values set in high limit registers.\nHowever, to configure iio events and their thresholds, a set of callback\nfunctions must be implemented and those were not present until now.\nThe consequence of trying to configure ad7091r-5 events without the\nproper callback functions was a null pointer dereference in the kernel\nbecause the pointers to the callback functions were not set.\n\nImplement event configuration callbacks allowing users to read/write\nevent thresholds and enable/disable event generation.\n\nSince the event spec structs are generic to AD7091R devices, also move\nthose from the ad7091r-5 driver the base driver so they can be reused\nwhen support for ad7091r-2/-4/-8 be added."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/020e71c7ffc25dfe29ed9be6c2d39af7bd7f661f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/137568aa540a9f587c48ff7d4c51cdba08cfe9a4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1eba6f7ffa295a0eec098c107043074be7cc4ec5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/49f322ce1f265935f15e5512da69a399f27a5091",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/55aca2ce91a63740278502066beaddbd841af9c6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/89c4e63324e208a23098f7fb15c00487cecbfed2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1086",
|
||||
"sourceIdentifier": "cve-coordination@google.com",
|
||||
"published": "2024-01-31T13:15:10.827",
|
||||
"lastModified": "2024-02-06T02:15:08.303",
|
||||
"lastModified": "2024-03-26T18:15:09.193",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -127,6 +127,10 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Notselwyn/CVE-2024-1086",
|
||||
"source": "cve-coordination@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660",
|
||||
"source": "cve-coordination@google.com",
|
||||
@ -137,6 +141,14 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/",
|
||||
"source": "cve-coordination@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://news.ycombinator.com/item?id=39828424",
|
||||
"source": "cve-coordination@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://pwning.tech/nftables/",
|
||||
"source": "cve-coordination@google.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-13xx/CVE-2024-1313.json
Normal file
55
CVE-2024/CVE-2024-13xx/CVE-2024-1313.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-1313",
|
||||
"sourceIdentifier": "security@grafana.com",
|
||||
"published": "2024-03-26T18:15:09.350",
|
||||
"lastModified": "2024-03-26T18:15:09.350",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized.\n\nGrafana Labs would like to thank Ravid Mazon and Jay Chen of Palo \nAlto Research for discovering and disclosing this vulnerability.\n\nThis issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@grafana.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@grafana.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://grafana.com/security/security-advisories/cve-2024-1313/",
|
||||
"source": "security@grafana.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1455",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-03-26T14:15:08.450",
|
||||
"lastModified": "2024-03-26T14:15:08.450",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1933",
|
||||
"sourceIdentifier": "psirt@teamviewer.com",
|
||||
"published": "2024-03-26T13:15:45.077",
|
||||
"lastModified": "2024-03-26T13:15:45.077",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21912",
|
||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||
"published": "2024-03-26T16:15:10.440",
|
||||
"lastModified": "2024-03-26T16:15:10.440",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21913",
|
||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||
"published": "2024-03-26T16:15:10.670",
|
||||
"lastModified": "2024-03-26T16:15:10.670",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21918",
|
||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||
"published": "2024-03-26T16:15:10.877",
|
||||
"lastModified": "2024-03-26T16:15:10.877",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21919",
|
||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||
"published": "2024-03-26T16:15:11.073",
|
||||
"lastModified": "2024-03-26T16:15:11.073",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21920",
|
||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||
"published": "2024-03-26T16:15:11.277",
|
||||
"lastModified": "2024-03-26T16:15:11.277",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22156",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T13:15:45.277",
|
||||
"lastModified": "2024-03-26T13:15:45.277",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22356",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-26T15:15:48.920",
|
||||
"lastModified": "2024-03-26T15:15:48.920",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2212",
|
||||
"sourceIdentifier": "emo@eclipse.org",
|
||||
"published": "2024-03-26T16:15:13.233",
|
||||
"lastModified": "2024-03-26T16:15:13.233",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2214",
|
||||
"sourceIdentifier": "emo@eclipse.org",
|
||||
"published": "2024-03-26T16:15:13.430",
|
||||
"lastModified": "2024-03-26T16:15:13.430",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23482",
|
||||
"sourceIdentifier": "cve@zscaler.com",
|
||||
"published": "2024-03-26T15:15:49.130",
|
||||
"lastModified": "2024-03-26T15:15:49.130",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23722",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-26T15:15:49.317",
|
||||
"lastModified": "2024-03-26T15:15:49.317",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2452",
|
||||
"sourceIdentifier": "emo@eclipse.org",
|
||||
"published": "2024-03-26T16:15:13.623",
|
||||
"lastModified": "2024-03-26T16:15:13.623",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25956",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-03-26T16:15:11.520",
|
||||
"lastModified": "2024-03-26T16:15:11.520",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25957",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-03-26T16:15:11.727",
|
||||
"lastModified": "2024-03-26T16:15:11.727",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25958",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-03-26T16:15:11.917",
|
||||
"lastModified": "2024-03-26T16:15:11.917",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,9 +2,8 @@
|
||||
"id": "CVE-2024-2553",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-17T04:15:07.073",
|
||||
"lastModified": "2024-03-21T02:52:37.573",
|
||||
"lastModified": "2024-03-26T17:15:47.490",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -77,6 +76,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/CVE-2024-2553%20-%20Product%20Rating%20System%20-%20Cross-Site-Scripting.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/Product%20Rating%20System%20-%20Cross-Site-Scripting-1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
@ -88,6 +91,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257052",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.298886",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26644",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-26T16:15:12.137",
|
||||
"lastModified": "2024-03-26T16:15:12.137",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26645",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-26T16:15:12.207",
|
||||
"lastModified": "2024-03-26T16:15:12.207",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
32
CVE-2024/CVE-2024-266xx/CVE-2024-26646.json
Normal file
32
CVE-2024/CVE-2024-266xx/CVE-2024-26646.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2024-26646",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-26T18:15:09.910",
|
||||
"lastModified": "2024-03-26T18:15:09.910",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal: intel: hfi: Add syscore callbacks for system-wide PM\n\nThe kernel allocates a memory buffer and provides its location to the\nhardware, which uses it to update the HFI table. This allocation occurs\nduring boot and remains constant throughout runtime.\n\nWhen resuming from hibernation, the restore kernel allocates a second\nmemory buffer and reprograms the HFI hardware with the new location as\npart of a normal boot. The location of the second memory buffer may\ndiffer from the one allocated by the image kernel.\n\nWhen the restore kernel transfers control to the image kernel, its HFI\nbuffer becomes invalid, potentially leading to memory corruption if the\nhardware writes to it (the hardware continues to use the buffer from the\nrestore kernel).\n\nIt is also possible that the hardware \"forgets\" the address of the memory\nbuffer when resuming from \"deep\" suspend. Memory corruption may also occur\nin such a scenario.\n\nTo prevent the described memory corruption, disable HFI when preparing to\nsuspend or hibernate. Enable it when resuming.\n\nAdd syscore callbacks to handle the package of the boot CPU (packages of\nnon-boot CPUs are handled via CPU offline). Syscore ops always run on the\nboot CPU. Additionally, HFI only needs to be disabled during \"deep\" suspend\nand hibernation. Syscore ops only run in these cases.\n\n[ rjw: Comment adjustment, subject and changelog edits ]"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/019ccc66d56a696a4dfee3bfa2f04d0a7c3d89ee",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/28f010dc50df0f7987c04112114fcfa7e0803566",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/97566d09fd02d2ab329774bb89a2cdf2267e86d9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c9d6d63b6c03afaa6f185df249af693a7939577c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-266xx/CVE-2024-26647.json
Normal file
28
CVE-2024/CVE-2024-266xx/CVE-2024-26647.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-26647",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-26T18:15:10.063",
|
||||
"lastModified": "2024-03-26T18:15:10.063",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'\n\nIn link_set_dsc_pps_packet(), 'struct display_stream_compressor *dsc'\nwas dereferenced in a DC_LOGGER_INIT(dsc->ctx->logger); before the 'dsc'\nNULL pointer check.\n\nFixes the below:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/link/link_dpms.c:905 link_set_dsc_pps_packet() warn: variable dereferenced before check 'dsc' (see line 903)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3bb9b1f958c3d986ed90a3ff009f1e77e9553207",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6aa5ede6665122f4c8abce3c6eba06b49e54d25c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cf656fc7276e5b3709a81bc9d9639459be2b2647",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-266xx/CVE-2024-26648.json
Normal file
28
CVE-2024/CVE-2024-266xx/CVE-2024-26648.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-26648",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-26T18:15:10.220",
|
||||
"lastModified": "2024-03-26T18:15:10.220",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()\n\nIn edp_setup_replay(), 'struct dc *dc' & 'struct dmub_replay *replay'\nwas dereferenced before the pointer 'link' & 'replay' NULL check.\n\nFixes the below:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/link/protocols/link_edp_panel_control.c:947 edp_setup_replay() warn: variable dereferenced before check 'link' (see line 933)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/22ae604aea14756954e1c00ae653e34d2afd2935",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7073934f5d73f8b53308963cee36f0d389ea857c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c02d257c654191ecda1dc1af6875d527e85310e7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-266xx/CVE-2024-26649.json
Normal file
28
CVE-2024/CVE-2024-266xx/CVE-2024-26649.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-26649",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-26T18:15:10.370",
|
||||
"lastModified": "2024-03-26T18:15:10.370",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix the null pointer when load rlc firmware\n\nIf the RLC firmware is invalid because of wrong header size,\nthe pointer to the rlc firmware is released in function\namdgpu_ucode_request. There will be a null pointer error\nin subsequent use. So skip validation to fix it."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8b5bacce2d13dbe648f0bfd3f738ecce8db4978c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bc03c02cc1991a066b23e69bbcc0f66e8f1f7453",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d3887448486caeef9687fb5dfebd4ff91e0f25aa",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2024/CVE-2024-266xx/CVE-2024-26650.json
Normal file
32
CVE-2024/CVE-2024-266xx/CVE-2024-26650.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2024-26650",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-26T18:15:10.530",
|
||||
"lastModified": "2024-03-26T18:15:10.530",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe\n\np2sb_bar() unhides P2SB device to get resources from the device. It\nguards the operation by locking pci_rescan_remove_lock so that parallel\nrescans do not find the P2SB device. However, this lock causes deadlock\nwhen PCI bus rescan is triggered by /sys/bus/pci/rescan. The rescan\nlocks pci_rescan_remove_lock and probes PCI devices. When PCI devices\ncall p2sb_bar() during probe, it locks pci_rescan_remove_lock again.\nHence the deadlock.\n\nTo avoid the deadlock, do not lock pci_rescan_remove_lock in p2sb_bar().\nInstead, do the lock at fs_initcall. Introduce p2sb_cache_resources()\nfor fs_initcall which gets and caches the P2SB resources. At p2sb_bar(),\nrefer the cache and return to the caller.\n\nBefore operating the device at P2SB DEVFN for resource cache, check\nthat its device class is PCI_CLASS_MEMORY_OTHER 0x0580 that PCH\nspecifications define. This avoids unexpected operation to other devices\nat the same DEVFN.\n\nTested-by Klara Modin <klarasmodin@gmail.com>"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2841631a03652f32b595c563695d0461072e0de4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5913320eb0b3ec88158cfcb0fa5e996bf4ef681b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/847e1eb30e269a094da046c08273abe3f3361cf2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d281ac9a987c553d93211b90fd4fe97d8eca32cd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-27756",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-15T07:15:09.923",
|
||||
"lastModified": "2024-03-15T12:53:06.423",
|
||||
"lastModified": "2024-03-26T18:15:10.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in GLPI v.10.0.12 and before allows a remote attacker to execute arbitrary code, escalate privileges, and obtain sensitive information via a crafted script to the title field."
|
||||
"value": "GLPI through 10.0.12 allows CSV injection by an attacker who is able to create an asset with a crafted title."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en GLPI v.10.0.12 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de un script manipulado en el campo de t\u00edtulo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2891",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-26T14:15:09.530",
|
||||
"lastModified": "2024-03-26T14:15:09.530",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2892",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-26T16:15:13.853",
|
||||
"lastModified": "2024-03-26T16:15:13.853",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
92
CVE-2024/CVE-2024-28xx/CVE-2024-2893.json
Normal file
92
CVE-2024/CVE-2024-28xx/CVE-2024-2893.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-2893",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-26T17:15:47.810",
|
||||
"lastModified": "2024-03-26T17:15:47.810",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tenda AC7 15.03.06.44 and classified as critical. Affected by this issue is the function formSetDeviceName of the file /goform/SetOnlineDevName. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257936. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formSetDeviceName_devName.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257936",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257936",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.300356",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-28xx/CVE-2024-2894.json
Normal file
92
CVE-2024/CVE-2024-28xx/CVE-2024-2894.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-2894",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-26T17:15:48.080",
|
||||
"lastModified": "2024-03-26T17:15:48.080",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tenda AC7 15.03.06.44. It has been classified as critical. This affects the function formSetQosBand of the file /goform/SetNetControlList. The manipulation of the argument list leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257937 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formSetQosBand.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257937",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257937",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.300357",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-28xx/CVE-2024-2895.json
Normal file
92
CVE-2024/CVE-2024-28xx/CVE-2024-2895.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-2895",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-26T18:15:10.893",
|
||||
"lastModified": "2024-03-26T18:15:10.893",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tenda AC7 15.03.06.44. It has been declared as critical. This vulnerability affects the function formWifiWpsOOB of the file /goform/WifiWpsOOB. The manipulation of the argument index leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257938 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formWifiWpsOOB.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257938",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257938",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.300358",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-28xx/CVE-2024-2896.json
Normal file
92
CVE-2024/CVE-2024-28xx/CVE-2024-2896.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-2896",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-26T18:15:11.543",
|
||||
"lastModified": "2024-03-26T18:15:11.543",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tenda AC7 15.03.06.44. It has been rated as critical. This issue affects the function formWifiWpsStart of the file /goform/WifiWpsStart. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257939. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formWifiWpsStart.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257939",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257939",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.300359",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29197",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-26T15:15:49.390",
|
||||
"lastModified": "2024-03-26T15:15:49.390",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29203",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-26T14:15:08.747",
|
||||
"lastModified": "2024-03-26T14:15:08.747",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29401",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-26T15:15:49.620",
|
||||
"lastModified": "2024-03-26T15:15:49.620",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29684",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-26T14:15:09.003",
|
||||
"lastModified": "2024-03-26T14:15:09.003",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
36
CVE-2024/CVE-2024-297xx/CVE-2024-29735.json
Normal file
36
CVE-2024/CVE-2024-297xx/CVE-2024-29735.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-29735",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-03-26T17:15:47.380",
|
||||
"lastModified": "2024-03-26T17:15:47.380",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Preservation of Permissions vulnerability in Apache Airflow.This issue affects Apache Airflow from 2.8.2 through 2.8.3.\n\nAirflow's local file task handler in Airflow incorrectly set permissions for all parent folders of log folder, in default configuration adding write access to Unix group\u00a0of the folders. In the case Airflow is run with the root user (not recommended) it added group write permission to all folders up to the root of the filesystem.\n\nIf your log files are stored in the home directory, these permission changes might impact your ability to run SSH operations after your home directory becomes group-writeable.\n\nThis issue does not affect users who use or extend Airflow using Official Airflow Docker reference images ( https://hub.docker.com/r/apache/airflow/ ) - those images require to have group write permission set anyway.\n\nYou are affected only if you install Airflow using local installation / virtualenv or other Docker images, but the issue has no impact if docker containers are used as intended, i.e. where Airflow components do not share containers with other applications and users.\n\nAlso you should not be affected if your umask is 002 (group write enabled) - this is the default on many linux systems.\n\nRecommendation for users using Airflow outside of the containers:\n\n * if you are using root to run Airflow, change your Airflow user to use non-root\n * upgrade Apache Airflow to 2.8.4 or above\n * If you prefer not to upgrade, you can change the https://airflow.apache.org/docs/apache-airflow/stable/configurations-ref.html#file-task-handler-new-folder-permissions \u00a0to 0o755 (original value 0o775).\n * if you already ran Airflow tasks before and your default umask is 022 (group write disabled) you should stop Airflow components, check permissions of AIRFLOW_HOME/logs\u00a0in all your components and all parent directories of this directory and remove group write access for all the parent directories\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-281"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/apache/airflow/pull/37310",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/8khb1rtbznh100o325fb8xw5wjvtv536",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29808",
|
||||
"sourceIdentifier": "info@appcheck-ng.com",
|
||||
"published": "2024-03-26T16:15:12.323",
|
||||
"lastModified": "2024-03-26T16:15:12.323",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29809",
|
||||
"sourceIdentifier": "info@appcheck-ng.com",
|
||||
"published": "2024-03-26T16:15:12.520",
|
||||
"lastModified": "2024-03-26T16:15:12.520",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29810",
|
||||
"sourceIdentifier": "info@appcheck-ng.com",
|
||||
"published": "2024-03-26T16:15:12.707",
|
||||
"lastModified": "2024-03-26T16:15:12.707",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29832",
|
||||
"sourceIdentifier": "info@appcheck-ng.com",
|
||||
"published": "2024-03-26T16:15:12.890",
|
||||
"lastModified": "2024-03-26T16:15:12.890",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29833",
|
||||
"sourceIdentifier": "info@appcheck-ng.com",
|
||||
"published": "2024-03-26T16:15:13.063",
|
||||
"lastModified": "2024-03-26T16:15:13.063",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29881",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-26T14:15:09.070",
|
||||
"lastModified": "2024-03-26T14:15:09.070",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29883",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-26T14:15:09.280",
|
||||
"lastModified": "2024-03-26T14:15:09.280",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2906",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T13:15:45.497",
|
||||
"lastModified": "2024-03-26T13:15:45.497",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2915",
|
||||
"sourceIdentifier": "security@devolutions.net",
|
||||
"published": "2024-03-26T16:15:14.117",
|
||||
"lastModified": "2024-03-26T16:15:14.117",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2921",
|
||||
"sourceIdentifier": "security@devolutions.net",
|
||||
"published": "2024-03-26T16:15:14.173",
|
||||
"lastModified": "2024-03-26T16:15:14.173",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2929",
|
||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||
"published": "2024-03-26T16:15:14.230",
|
||||
"lastModified": "2024-03-26T16:15:14.230",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2024/CVE-2024-29xx/CVE-2024-2951.json
Normal file
55
CVE-2024/CVE-2024-29xx/CVE-2024-2951.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-2951",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T18:15:12.160",
|
||||
"lastModified": "2024-03-26T18:15:12.160",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Metagauss RegistrationMagic.This issue affects RegistrationMagic: from n/a through 5.3.0.0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/custom-registration-form-builder-with-submission-manager/wordpress-registrationmagic-plugin-5-3-0-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30233",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T13:15:45.710",
|
||||
"lastModified": "2024-03-26T13:15:45.710",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30234",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T13:15:45.927",
|
||||
"lastModified": "2024-03-26T13:15:45.927",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30235",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T13:15:46.153",
|
||||
"lastModified": "2024-03-26T13:15:46.153",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
91
README.md
91
README.md
@ -1,13 +1,9 @@
|
||||
# nvd-json-data-feeds
|
||||
|
||||
---
|
||||
|
||||
[](https://github.com/fkie-cad/nvd-json-data-feeds/actions/workflows/monitor_release.yml)
|
||||
[](https://github.com/fkie-cad/nvd-json-data-feeds/actions/workflows/monitor_sync.yml)
|
||||
[](https://github.com/fkie-cad/nvd-json-data-feeds/actions/workflows/validate_schema.yml)
|
||||
|
||||
---
|
||||
|
||||
Community reconstruction of the deprecated JSON NVD Data Feeds.
|
||||
[Releases](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) each day at 00:00 AM UTC.
|
||||
Repository synchronizes with the NVD every 2 hours.
|
||||
@ -17,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-26T17:01:08.948640+00:00
|
||||
2024-03-26T19:00:30.705758+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-26T16:15:14.230000+00:00
|
||||
2024-03-26T18:15:12.160000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -37,51 +33,64 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
242721
|
||||
242741
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `34`
|
||||
Recently added CVEs: `20`
|
||||
|
||||
\* [CVE-2024-21919](CVE-2024/CVE-2024-219xx/CVE-2024-21919.json) (`2024-03-26T16:15:11.073`)
|
||||
\* [CVE-2024-21920](CVE-2024/CVE-2024-219xx/CVE-2024-21920.json) (`2024-03-26T16:15:11.277`)
|
||||
\* [CVE-2024-2212](CVE-2024/CVE-2024-22xx/CVE-2024-2212.json) (`2024-03-26T16:15:13.233`)
|
||||
\* [CVE-2024-2214](CVE-2024/CVE-2024-22xx/CVE-2024-2214.json) (`2024-03-26T16:15:13.430`)
|
||||
\* [CVE-2024-22356](CVE-2024/CVE-2024-223xx/CVE-2024-22356.json) (`2024-03-26T15:15:48.920`)
|
||||
\* [CVE-2024-23482](CVE-2024/CVE-2024-234xx/CVE-2024-23482.json) (`2024-03-26T15:15:49.130`)
|
||||
\* [CVE-2024-23722](CVE-2024/CVE-2024-237xx/CVE-2024-23722.json) (`2024-03-26T15:15:49.317`)
|
||||
\* [CVE-2024-2452](CVE-2024/CVE-2024-24xx/CVE-2024-2452.json) (`2024-03-26T16:15:13.623`)
|
||||
\* [CVE-2024-25956](CVE-2024/CVE-2024-259xx/CVE-2024-25956.json) (`2024-03-26T16:15:11.520`)
|
||||
\* [CVE-2024-25957](CVE-2024/CVE-2024-259xx/CVE-2024-25957.json) (`2024-03-26T16:15:11.727`)
|
||||
\* [CVE-2024-25958](CVE-2024/CVE-2024-259xx/CVE-2024-25958.json) (`2024-03-26T16:15:11.917`)
|
||||
\* [CVE-2024-26644](CVE-2024/CVE-2024-266xx/CVE-2024-26644.json) (`2024-03-26T16:15:12.137`)
|
||||
\* [CVE-2024-26645](CVE-2024/CVE-2024-266xx/CVE-2024-26645.json) (`2024-03-26T16:15:12.207`)
|
||||
\* [CVE-2024-2802](CVE-2024/CVE-2024-28xx/CVE-2024-2802.json) (`2024-03-26T15:15:49.677`)
|
||||
\* [CVE-2024-2892](CVE-2024/CVE-2024-28xx/CVE-2024-2892.json) (`2024-03-26T16:15:13.853`)
|
||||
\* [CVE-2024-2915](CVE-2024/CVE-2024-29xx/CVE-2024-2915.json) (`2024-03-26T16:15:14.117`)
|
||||
\* [CVE-2024-29197](CVE-2024/CVE-2024-291xx/CVE-2024-29197.json) (`2024-03-26T15:15:49.390`)
|
||||
\* [CVE-2024-2921](CVE-2024/CVE-2024-29xx/CVE-2024-2921.json) (`2024-03-26T16:15:14.173`)
|
||||
\* [CVE-2024-2929](CVE-2024/CVE-2024-29xx/CVE-2024-2929.json) (`2024-03-26T16:15:14.230`)
|
||||
\* [CVE-2024-29401](CVE-2024/CVE-2024-294xx/CVE-2024-29401.json) (`2024-03-26T15:15:49.620`)
|
||||
\* [CVE-2024-29808](CVE-2024/CVE-2024-298xx/CVE-2024-29808.json) (`2024-03-26T16:15:12.323`)
|
||||
\* [CVE-2024-29809](CVE-2024/CVE-2024-298xx/CVE-2024-29809.json) (`2024-03-26T16:15:12.520`)
|
||||
\* [CVE-2024-29810](CVE-2024/CVE-2024-298xx/CVE-2024-29810.json) (`2024-03-26T16:15:12.707`)
|
||||
\* [CVE-2024-29832](CVE-2024/CVE-2024-298xx/CVE-2024-29832.json) (`2024-03-26T16:15:12.890`)
|
||||
\* [CVE-2024-29833](CVE-2024/CVE-2024-298xx/CVE-2024-29833.json) (`2024-03-26T16:15:13.063`)
|
||||
\* [CVE-2023-44989](CVE-2023/CVE-2023-449xx/CVE-2023-44989.json) (`2024-03-26T18:15:08.273`)
|
||||
\* [CVE-2023-52621](CVE-2023/CVE-2023-526xx/CVE-2023-52621.json) (`2024-03-26T18:15:08.817`)
|
||||
\* [CVE-2023-52622](CVE-2023/CVE-2023-526xx/CVE-2023-52622.json) (`2024-03-26T18:15:08.873`)
|
||||
\* [CVE-2023-52623](CVE-2023/CVE-2023-526xx/CVE-2023-52623.json) (`2024-03-26T18:15:08.930`)
|
||||
\* [CVE-2023-52624](CVE-2023/CVE-2023-526xx/CVE-2023-52624.json) (`2024-03-26T18:15:08.990`)
|
||||
\* [CVE-2023-52625](CVE-2023/CVE-2023-526xx/CVE-2023-52625.json) (`2024-03-26T18:15:09.040`)
|
||||
\* [CVE-2023-52626](CVE-2023/CVE-2023-526xx/CVE-2023-52626.json) (`2024-03-26T18:15:09.087`)
|
||||
\* [CVE-2023-52627](CVE-2023/CVE-2023-526xx/CVE-2023-52627.json) (`2024-03-26T18:15:09.140`)
|
||||
\* [CVE-2024-1313](CVE-2024/CVE-2024-13xx/CVE-2024-1313.json) (`2024-03-26T18:15:09.350`)
|
||||
\* [CVE-2024-26646](CVE-2024/CVE-2024-266xx/CVE-2024-26646.json) (`2024-03-26T18:15:09.910`)
|
||||
\* [CVE-2024-26647](CVE-2024/CVE-2024-266xx/CVE-2024-26647.json) (`2024-03-26T18:15:10.063`)
|
||||
\* [CVE-2024-26648](CVE-2024/CVE-2024-266xx/CVE-2024-26648.json) (`2024-03-26T18:15:10.220`)
|
||||
\* [CVE-2024-26649](CVE-2024/CVE-2024-266xx/CVE-2024-26649.json) (`2024-03-26T18:15:10.370`)
|
||||
\* [CVE-2024-26650](CVE-2024/CVE-2024-266xx/CVE-2024-26650.json) (`2024-03-26T18:15:10.530`)
|
||||
\* [CVE-2024-2893](CVE-2024/CVE-2024-28xx/CVE-2024-2893.json) (`2024-03-26T17:15:47.810`)
|
||||
\* [CVE-2024-2894](CVE-2024/CVE-2024-28xx/CVE-2024-2894.json) (`2024-03-26T17:15:48.080`)
|
||||
\* [CVE-2024-2895](CVE-2024/CVE-2024-28xx/CVE-2024-2895.json) (`2024-03-26T18:15:10.893`)
|
||||
\* [CVE-2024-2896](CVE-2024/CVE-2024-28xx/CVE-2024-2896.json) (`2024-03-26T18:15:11.543`)
|
||||
\* [CVE-2024-2951](CVE-2024/CVE-2024-29xx/CVE-2024-2951.json) (`2024-03-26T18:15:12.160`)
|
||||
\* [CVE-2024-29735](CVE-2024/CVE-2024-297xx/CVE-2024-29735.json) (`2024-03-26T17:15:47.380`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `7`
|
||||
Recently modified CVEs: `50`
|
||||
|
||||
\* [CVE-2023-40547](CVE-2023/CVE-2023-405xx/CVE-2023-40547.json) (`2024-03-26T16:15:08.220`)
|
||||
\* [CVE-2023-40548](CVE-2023/CVE-2023-405xx/CVE-2023-40548.json) (`2024-03-26T16:15:09.080`)
|
||||
\* [CVE-2023-4194](CVE-2023/CVE-2023-41xx/CVE-2023-4194.json) (`2024-03-26T16:15:09.253`)
|
||||
\* [CVE-2023-6240](CVE-2023/CVE-2023-62xx/CVE-2023-6240.json) (`2024-03-26T16:15:09.550`)
|
||||
\* [CVE-2023-6780](CVE-2023/CVE-2023-67xx/CVE-2023-6780.json) (`2024-03-26T16:15:10.083`)
|
||||
\* [CVE-2023-7216](CVE-2023/CVE-2023-72xx/CVE-2023-7216.json) (`2024-03-26T16:15:10.283`)
|
||||
\* [CVE-2024-27455](CVE-2024/CVE-2024-274xx/CVE-2024-27455.json) (`2024-03-26T16:15:12.263`)
|
||||
\* [CVE-2024-25957](CVE-2024/CVE-2024-259xx/CVE-2024-25957.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-25958](CVE-2024/CVE-2024-259xx/CVE-2024-25958.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-26644](CVE-2024/CVE-2024-266xx/CVE-2024-26644.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-26645](CVE-2024/CVE-2024-266xx/CVE-2024-26645.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-27756](CVE-2024/CVE-2024-277xx/CVE-2024-27756.json) (`2024-03-26T18:15:10.693`)
|
||||
\* [CVE-2024-2891](CVE-2024/CVE-2024-28xx/CVE-2024-2891.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-2892](CVE-2024/CVE-2024-28xx/CVE-2024-2892.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-2906](CVE-2024/CVE-2024-29xx/CVE-2024-2906.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-2915](CVE-2024/CVE-2024-29xx/CVE-2024-2915.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-29197](CVE-2024/CVE-2024-291xx/CVE-2024-29197.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-29203](CVE-2024/CVE-2024-292xx/CVE-2024-29203.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-2921](CVE-2024/CVE-2024-29xx/CVE-2024-2921.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-2929](CVE-2024/CVE-2024-29xx/CVE-2024-2929.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-29401](CVE-2024/CVE-2024-294xx/CVE-2024-29401.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-29684](CVE-2024/CVE-2024-296xx/CVE-2024-29684.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-29808](CVE-2024/CVE-2024-298xx/CVE-2024-29808.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-29809](CVE-2024/CVE-2024-298xx/CVE-2024-29809.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-29810](CVE-2024/CVE-2024-298xx/CVE-2024-29810.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-29832](CVE-2024/CVE-2024-298xx/CVE-2024-29832.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-29833](CVE-2024/CVE-2024-298xx/CVE-2024-29833.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-29881](CVE-2024/CVE-2024-298xx/CVE-2024-29881.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-29883](CVE-2024/CVE-2024-298xx/CVE-2024-29883.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-30233](CVE-2024/CVE-2024-302xx/CVE-2024-30233.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-30234](CVE-2024/CVE-2024-302xx/CVE-2024-30234.json) (`2024-03-26T17:09:53.043`)
|
||||
\* [CVE-2024-30235](CVE-2024/CVE-2024-302xx/CVE-2024-30235.json) (`2024-03-26T17:09:53.043`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
138
_state.csv
138
_state.csv
@ -179121,7 +179121,7 @@ CVE-2021-36754,0,0,80419907a3f286739ddc930ee2d8530009350f6d9979c531c56c6c6faea7a
|
||||
CVE-2021-36755,0,0,a4e3378ab825e7360a1c18e6a1cd7803e375ab234527cd5b55e8090d5292b3a4,2021-07-27T16:00:35.947000
|
||||
CVE-2021-36756,0,0,2363b9aecfcfe81de7ad485830d45e8b5f59565c0a9b16163803494427f1395f,2021-11-04T13:43:02.340000
|
||||
CVE-2021-36758,0,0,13b2b6fa03d15af5e887615108ed1cc8456a05dbb12263c90a7b95bf3da336cb,2021-08-05T14:39:50.063000
|
||||
CVE-2021-36759,1,1,aed8d69fa650fea93ec437055bcf527641793f7aa123b2978a0345e087ca5945,2024-03-26T15:15:48.070000
|
||||
CVE-2021-36759,0,0,aed8d69fa650fea93ec437055bcf527641793f7aa123b2978a0345e087ca5945,2024-03-26T15:15:48.070000
|
||||
CVE-2021-3676,0,0,af393c78dea1ab200867068746124507e8affcf4dd514726b0801e3d44068230,2023-11-07T03:38:12.220000
|
||||
CVE-2021-36760,0,0,82ec72b70405000ab49044eb25f47eb172c0420e56a6980a7d71eee09fa215a0,2021-12-09T17:50:00.903000
|
||||
CVE-2021-36761,0,0,d010536a24c201e27e6cd758d06fc508cecf2373c852e866c9353dd8d0173ca7,2022-06-28T19:09:51.247000
|
||||
@ -224194,7 +224194,7 @@ CVE-2023-3385,0,0,e241d0523cea3c6af9c190fdb70f25425341aeb1b1a2cdae19227875cb149f
|
||||
CVE-2023-33850,0,0,72b12baa890a1451753888aa71bc88912c5010ac8efb5d0093b5e4b0d1bf044b,2023-08-28T19:51:25.020000
|
||||
CVE-2023-33851,0,0,8db788edf6a5198f3e8e5896114b0940f7896f676a9d0dab45d0b9995fc2f580,2024-02-12T19:54:23.117000
|
||||
CVE-2023-33852,0,0,523da9d9b75e64b7c746506e149f7a515a45762485db47beb2ace64d6f3001ae,2023-08-29T04:43:06.033000
|
||||
CVE-2023-33855,0,0,0026344b4129e9b11f5c910267eb37fccd383dd96f127646b240d90d93e7608b,2024-03-26T14:15:07.903000
|
||||
CVE-2023-33855,0,1,443fd33951f00d06bb83303d8e13b972c9c28876bf8ac2ed146d87d772451327,2024-03-26T17:09:53.043000
|
||||
CVE-2023-33857,0,0,009b629a678d495b5ca76bd9ed766e57d21f04b1fd5cac55c82232f187a28b80,2023-07-26T20:04:15.373000
|
||||
CVE-2023-3386,0,0,ca1c2f8eabd2a8ccc5353bf76dd6b68e5e018805b86e6999cd336196f7670718,2023-08-11T16:11:22.257000
|
||||
CVE-2023-33863,0,0,bcc6ceec655946e02a491efce99a4793246bd9fa7abf6fe4628bce4c635fc35b,2023-11-25T11:15:17.060000
|
||||
@ -228789,8 +228789,8 @@ CVE-2023-40542,0,0,11b6cee368035492cc0902cbd689ed768c381493a72ea99cc6412d219fc6a
|
||||
CVE-2023-40544,0,0,8edafee03220c010d1be42f0f88433974482550243d48b064788fcb74f868b01,2024-02-12T16:43:42.320000
|
||||
CVE-2023-40545,0,0,9bca2c73be74af7f189b3862ba8d7799cfe8ca7403c861883fba27fbc72753b2,2024-02-13T21:08:23.400000
|
||||
CVE-2023-40546,0,0,30f48ea722b0fa0bead0d9f96a45a07ba815b2242da2c9750215b394c4c135dc,2024-02-05T20:06:26.127000
|
||||
CVE-2023-40547,0,1,567ac9a094835c6d044d61ce859b18d6482ce0c18361ebde96473bcbec4d48a9,2024-03-26T16:15:08.220000
|
||||
CVE-2023-40548,0,1,607f2edcdb6321352313e4bec2e87ab68ef460eae043be401a9b79d0bf0201ba,2024-03-26T16:15:09.080000
|
||||
CVE-2023-40547,0,0,567ac9a094835c6d044d61ce859b18d6482ce0c18361ebde96473bcbec4d48a9,2024-03-26T16:15:08.220000
|
||||
CVE-2023-40548,0,0,607f2edcdb6321352313e4bec2e87ab68ef460eae043be401a9b79d0bf0201ba,2024-03-26T16:15:09.080000
|
||||
CVE-2023-40549,0,0,f3e5db151ee531b27b6ccdd941e8af2105e35d0f53958595d6c0bc80cce5e542,2024-02-05T21:33:24.707000
|
||||
CVE-2023-4055,0,0,a7a42a94e357a6031ceb441913299385118b5b32f5de5204ec5e2fcae9f1b4cb,2023-08-09T21:15:11.820000
|
||||
CVE-2023-40550,0,0,9f289352f5b3ef8fe58f1e2bc083f0230602eb136dcc409311dd01025296c62a,2024-02-05T21:38:37.280000
|
||||
@ -229739,7 +229739,7 @@ CVE-2023-41936,0,0,59f50acce5e7a45be63a0a6bf8e4481807ef9e3c1ddb069f6cc7c3b24e2e3
|
||||
CVE-2023-41937,0,0,33832ab8bf296ca98e6bb85f049928f5f740d834dcd64a2a1075d34f5ca7f346,2023-09-11T17:53:01.077000
|
||||
CVE-2023-41938,0,0,e07951ef7ba255949f1ecfd1e3de3ced7ab420ccbf43a7cdb5c11613d0feb0b8,2023-09-11T17:52:09.947000
|
||||
CVE-2023-41939,0,0,119263536f1854faddb91daf15ab5f647a60b6bcb6a3731a0b90d8bf96abde59,2023-09-11T17:51:37.613000
|
||||
CVE-2023-4194,0,1,cc67123f8f400757b9c27c1196dfa9ee7269603aea6eade30be206f173340cd8,2024-03-26T16:15:09.253000
|
||||
CVE-2023-4194,0,0,cc67123f8f400757b9c27c1196dfa9ee7269603aea6eade30be206f173340cd8,2024-03-26T16:15:09.253000
|
||||
CVE-2023-41940,0,0,a6ca87f1be05eed4b95ab1494fc7f3793e7eec21c0fbd9bfd5d8852df51da68e,2023-09-11T17:49:38.180000
|
||||
CVE-2023-41941,0,0,bed11f0c355d7fb5c2f2e63b90ecf6902e68b64794799b701e5718e92e473e57,2023-09-11T18:44:44.843000
|
||||
CVE-2023-41942,0,0,8e9f4ade28dfbd8f08fd3ecdb838e218a08e91843bb151d88882c5e6dd422ffb,2023-09-11T18:43:21.273000
|
||||
@ -229761,10 +229761,10 @@ CVE-2023-41965,0,0,819d10b57b506bddb9951f918fc98fbd0b8a91d148804e4f285468fbd9d32
|
||||
CVE-2023-41966,0,0,fa827770b589d95b7355015bd98bf88afd7826564ca5f72e6f3c89942fecdd86,2023-11-07T18:33:13.163000
|
||||
CVE-2023-41967,0,0,8e02dbae31e5167552a8965141c33a2e264759fb6dbab0897ce89326a49ec280,2024-01-05T17:59:28.783000
|
||||
CVE-2023-41968,0,0,1248c9df7ecfb3920853d876ba26e870eae54e3bdcb4167f52b0214e6558ef25,2023-11-07T04:21:11.093000
|
||||
CVE-2023-41969,1,1,b536aa6e3d6c5b0e5810d85e97b95518c50344c7b0280473731cf2e708fadd2f,2024-03-26T15:15:48.203000
|
||||
CVE-2023-41969,0,1,29e94a4ba4cfe3727abfed65d25b13858512057feb987f4bf212f0615c9ad6b5,2024-03-26T17:09:53.043000
|
||||
CVE-2023-4197,0,0,f146d2ff6232fd5933bf8142dd157ce30d6c6646be201da9229ef783e3b9cbfb,2023-11-08T19:47:53.387000
|
||||
CVE-2023-41972,1,1,09c1a2289ff67014b3222b17ce4a9c751781c5fd2396992da2e7010daa56bf20,2024-03-26T15:15:48.407000
|
||||
CVE-2023-41973,1,1,ec42a29a4975f332ead83a124bea892f962b8800bf80005d808074765e10f9b6,2024-03-26T15:15:48.613000
|
||||
CVE-2023-41972,0,1,e6bd46328b86f6eb60a17a1d077353a063296843a0cd61509134ea6a235f1e9b,2024-03-26T17:09:53.043000
|
||||
CVE-2023-41973,0,1,24c8e08508313bc504a5e8115a035bae26e0aac9371d4155eb384dcf9a0b0548,2024-03-26T17:09:53.043000
|
||||
CVE-2023-41974,0,0,ec7dd2b6702f5a8bbc562cadb789ab42ea352cdfbc62d11784bae6116e1e8ab4,2024-01-17T21:17:26.303000
|
||||
CVE-2023-41975,0,0,307c3809d415b29d4366c7e0ea292a20dbce25ae704d534682230c6d89427017,2023-11-02T15:22:55.217000
|
||||
CVE-2023-41976,0,0,b44526aa36fb3f3d93fc90ad2e1fd48460d30f0e861bda5ba98a7a12c2a8aed3,2023-12-07T20:15:37.807000
|
||||
@ -231428,6 +231428,7 @@ CVE-2023-44984,0,0,0f4ed06f1b5ac0b548c3e2d9f0d9f3f0cbd98c53b4eee334baff070264749
|
||||
CVE-2023-44985,0,0,dfb696d5215b943e30a7373978ec95a4f1b73957eb031473531ba106a6046f85,2023-10-19T13:48:52.637000
|
||||
CVE-2023-44986,0,0,dde8c0b4f7af4dc5c9e767ceedcd42c76156fba6640bda1b12d18c0c1d529774,2023-10-19T13:49:39.247000
|
||||
CVE-2023-44987,0,0,1d0940c6c1116a8bd1e99725f710bdd942e9b5e0f435a1ad89ade226716b3915,2023-10-19T20:54:21.393000
|
||||
CVE-2023-44989,1,1,e7e20dc1d114e542c553e6ef6f19736758eb8e49d1dab2eca9751cbbc66e25cd,2024-03-26T18:15:08.273000
|
||||
CVE-2023-4499,0,0,2221e124504cf2ae1b924d444e1f8b4a1bda09ce3dcf640a68a8c7f8ffe55b09,2023-10-19T20:18:31.937000
|
||||
CVE-2023-44990,0,0,ab429a48d2179fdf171bbbe4e2b53f60ef9a3671555e07b6733f9ca5f6ef987c,2023-10-24T17:56:46.373000
|
||||
CVE-2023-44991,0,0,229523c1ca4b7df2290ad3404ea2bc7a11a7180706108c99bc4a3b631c9b7132,2023-12-28T19:55:16.063000
|
||||
@ -232941,7 +232942,7 @@ CVE-2023-47145,0,0,620ae7f5678047a8c4108d9fbdf5fa18578054841b939f4838b425b9745ba
|
||||
CVE-2023-47146,0,0,20e69829653fae8f4b2686a3902570d251dd86f6502cbd24bd7e7bddd7d52e98,2023-12-27T17:50:55.147000
|
||||
CVE-2023-47147,0,0,aa39e297601bc950529f92cdf2bd8439447f01312c2edd499306ed4ebc349c17,2024-03-19T17:31:22.997000
|
||||
CVE-2023-47148,0,0,b288941dfe3b1bf420ecb81fb3f06fe48a4281a820ff4a84a19d97a629ab7c25,2024-02-08T19:58:30.023000
|
||||
CVE-2023-47150,0,0,01c7964aba3fe9b8fd22ab1d6df63bf0ace69c2fdadada1725c8b665bf2ae18c,2024-03-26T14:15:08.173000
|
||||
CVE-2023-47150,0,1,fd78c089e6cfc2cc360595668fe16eb44dbc84f78e53c634e23776b310571458,2024-03-26T17:09:53.043000
|
||||
CVE-2023-47152,0,0,21eae157a0c14eb599c0d65626b59a59bd4bef9c2fca5d41f60c8cae56283468,2024-03-07T17:15:11.063000
|
||||
CVE-2023-47158,0,0,846f95a2725be32047541f14ae8c358ff876d7b2eaf417c4327cad289f3b21cd,2024-03-07T17:15:11.147000
|
||||
CVE-2023-4716,0,0,19a8e4bcfef050287a950063ecd9c6c3a76d47aa7d1ec3543611c805970cc149,2023-11-07T04:22:53.527000
|
||||
@ -235199,8 +235200,8 @@ CVE-2023-5089,0,0,cddae8cd7907847e037d2a072115a2d298d26ef8e69ec53058c1c3b486a685
|
||||
CVE-2023-50891,0,0,bb600fee959bc0c70bc3812b31f851a727133cb965ac9f397fefe731a21c9727,2024-01-05T18:37:38.957000
|
||||
CVE-2023-50892,0,0,b0a5df3a0991deeddc21aba073d59e844033efac16fe6402bc12f130e340ebd2,2024-01-05T19:43:06.133000
|
||||
CVE-2023-50893,0,0,9e2a79008bb70c571f7956df8d783d4f37d38fd17c2b6ce3c5ce4f3a295c4404,2024-01-05T18:33:07.640000
|
||||
CVE-2023-50894,1,1,282f0130e732e606b84d80b152ea21ecb1ca6dad6f66a24c8662987433cb3514,2024-03-26T15:15:48.797000
|
||||
CVE-2023-50895,1,1,e632596cb4ff42676938591c39f051db865636da96e38892505a62244e629e7a,2024-03-26T15:15:48.860000
|
||||
CVE-2023-50894,0,1,6eed329f67138d2f2e627602146cd43f0801dd418258af7b9bf418e3974e55dd,2024-03-26T17:09:53.043000
|
||||
CVE-2023-50895,0,1,1f927ab35258aecd3c8a00c2d421efb443c9113305b6571381658536cbf62a0b,2024-03-26T17:09:53.043000
|
||||
CVE-2023-50896,0,0,32a10544fdac61db8a171df746dccf1d232f13684a47de05af905306e155cf06,2024-01-05T17:32:59.937000
|
||||
CVE-2023-50898,0,0,8aff62c643d7aeddc95a67a99b868adeecf42b7f0720ae7af339a4744e3e221f,2024-03-15T16:26:49.320000
|
||||
CVE-2023-5090,0,0,ada81fac99e019d87a6cff7c251f38065497d67cafeddaf348ee3fa109b9d32b,2023-12-13T08:15:51.483000
|
||||
@ -235902,7 +235903,7 @@ CVE-2023-52207,0,0,8811a262457d47a928522c6d4c018a091faaddd37faf85fb909e774e66447
|
||||
CVE-2023-52208,0,0,9ed351f5d9cad0471fed88b06cec98b8cea6e1cb366c882b7648760856f996f0,2024-01-11T19:01:44.920000
|
||||
CVE-2023-5221,0,0,e94a56c9d66474b5a160e0651ef9dc4824c1649580fd0ea943a206b242eec447,2024-03-21T02:50:10.947000
|
||||
CVE-2023-52213,0,0,c567e205c61b5b287735b8f3f6708ba72962cb7ab86a1661d42ad149b5793151,2024-01-11T19:58:54.940000
|
||||
CVE-2023-52214,0,0,e83b7c5d7cd654e0d2656805bb2ed661c039e2202d50eab19bd0b7277ad5080d,2024-03-26T13:15:44.857000
|
||||
CVE-2023-52214,0,1,162d55d4b2fb0d9d44b6b2d1d34d863c999143afcae381fb31e139c85347084e,2024-03-26T17:09:53.043000
|
||||
CVE-2023-52215,0,0,09e0a9efe106868b4fd9c2063e3947d919ee70f494a812fa7c8f77418249d5e9,2024-02-02T15:20:39.863000
|
||||
CVE-2023-52216,0,0,0abddcd9cec3889c982561204259a4fbd6d1dbd4b2cc9d289f548ce07e0b2e7c,2024-01-11T19:59:02.337000
|
||||
CVE-2023-52218,0,0,7b665670ae49b9a55269793dbdbcff40e383cda41d548bb50d0820fbba3ce68a,2024-01-11T18:43:19.067000
|
||||
@ -236205,6 +236206,13 @@ CVE-2023-52618,0,0,140362ac707afd65a2d2b4e8d63e0c86c60c3017e34a4d1e40b3e8d76d459
|
||||
CVE-2023-52619,0,0,af9aacad25e5d44645425bb3e7286e581cb4e42ee1fef053b65f380d7170e82a,2024-03-18T12:38:25.490000
|
||||
CVE-2023-5262,0,0,1ed01c8e585c4d5b79de4709507eb451699baf1354e5ae8ae335221297d368d6,2024-03-21T02:50:11.880000
|
||||
CVE-2023-52620,0,0,f7b393e21bf3ad043d90e1d475675ddea17fbe9622a70ee0a12525f78fd3e3ac,2024-03-21T12:58:51.093000
|
||||
CVE-2023-52621,1,1,7e192a0f6ea9e2b2841aae08b6a79d53702740aeb515024045625bd4c7ef1dcc,2024-03-26T18:15:08.817000
|
||||
CVE-2023-52622,1,1,7ee9703fdc669762674088f1f751f9cf97ea86ef4dfd07b925733a3c156bac3e,2024-03-26T18:15:08.873000
|
||||
CVE-2023-52623,1,1,88aa9f694fb78f8430087fa7fc3db7f21f957543babe6cc6d366a5f07e7b79be,2024-03-26T18:15:08.930000
|
||||
CVE-2023-52624,1,1,7dd895582e4f1ca5c5328afe2c412ce0b321201d2bba2e1f44989db1c247662c,2024-03-26T18:15:08.990000
|
||||
CVE-2023-52625,1,1,62d27316ba3122bd775cdac8246f40faae862b9012e1dba86705ccc7999af1e5,2024-03-26T18:15:09.040000
|
||||
CVE-2023-52626,1,1,96301513fb4628223a0d9cf24e12092c9ef87789d201953062e2609f6e9dd7f7,2024-03-26T18:15:09.087000
|
||||
CVE-2023-52627,1,1,b114ffb83498e204ad4a858e973defb51aa9188fed7556a99daec636d52f6227,2024-03-26T18:15:09.140000
|
||||
CVE-2023-5263,0,0,e845c03e875c19af6b2a1acb5c3778ba87234ae866c1118fe5cb806e675403c4,2024-03-21T02:50:11.963000
|
||||
CVE-2023-5264,0,0,7347eec07eb374fa71498dcb5baa16d40eadd7796ae58c56cb5542f911c08d00,2024-03-21T02:50:12.043000
|
||||
CVE-2023-5265,0,0,a2593868cc8025edeae179a722294beacfae058f7c712cda49462fbdc5096bf5,2024-03-21T02:50:12.123000
|
||||
@ -237062,7 +237070,7 @@ CVE-2023-6234,0,0,c300a8904deed01fc5477fc97fa27627c8d1f6d71059c668e1fb941f32fdf7
|
||||
CVE-2023-6235,0,0,ab83c1d668f31c27ce5f0c473adf91ccac4c0e79d96a7a2d4e8b5eab63bfea2e,2023-11-29T16:59:51.970000
|
||||
CVE-2023-6238,0,0,7332193d1454e7405dd3270d745aa7f762b874d0f84c51906784a637ceb0212d,2024-02-07T00:15:55.240000
|
||||
CVE-2023-6239,0,0,6ce1b576ddd7c9169d0997e75fde3efd606153edbf61fba1116d733c98bbf90d,2023-12-04T19:06:20.213000
|
||||
CVE-2023-6240,0,1,12ab4bd584cb69f33bfd21cd68c3dcd33151a210965a0c843c22e8a6643ab9e0,2024-03-26T16:15:09.550000
|
||||
CVE-2023-6240,0,0,12ab4bd584cb69f33bfd21cd68c3dcd33151a210965a0c843c22e8a6643ab9e0,2024-03-26T16:15:09.550000
|
||||
CVE-2023-6241,0,0,492ae441bd7b430d2b324f1b69455dc6d8cff5a5926584dd79ada023bf8367a8,2024-03-04T13:58:23.447000
|
||||
CVE-2023-6242,0,0,6d69e67cbd815bd255adaa5950d4591e05a6bb1ed9a7b28e0dca7e7af1589ec7,2024-01-18T18:13:53.840000
|
||||
CVE-2023-6244,0,0,738eadbc72f60cd69becd30725fdeeb14cb3b5c05736eda414dcb1a46832ac22,2024-01-18T16:13:00.490000
|
||||
@ -237471,7 +237479,7 @@ CVE-2023-6775,0,0,785c7f49208ea20d700744a01e8a1429f324667f6807bd4a259ac6655dd27e
|
||||
CVE-2023-6776,0,0,2968271048fa8ca653df4209575bff057123f6c32739a4f0bc08a9ea121efe01,2024-01-18T16:24:38.070000
|
||||
CVE-2023-6778,0,0,4da0caccc37ccc1faf5007378583694bfb6f9351ba67d60d3ee84f433b4b0fe9,2024-02-08T10:15:12.243000
|
||||
CVE-2023-6779,0,0,84945b027810dcbe6c0b2bcc726a9d50fb0817df70a01f395a9528ce38146495,2024-02-27T17:26:48.247000
|
||||
CVE-2023-6780,0,1,5dfd988419cec384929ee5ea37cfe3044f42ae11bc2461e6beb6e09b0ef7d99f,2024-03-26T16:15:10.083000
|
||||
CVE-2023-6780,0,0,5dfd988419cec384929ee5ea37cfe3044f42ae11bc2461e6beb6e09b0ef7d99f,2024-03-26T16:15:10.083000
|
||||
CVE-2023-6781,0,0,606133b53d71d301d434687c95e9541c45256035c97457e3cef427e3e2fa86e7,2024-01-18T16:24:52.810000
|
||||
CVE-2023-6782,0,0,9d49a53aeef1daeb1b880b1c10125bd540373eabc0b6ef10f8f3d1b558ba4034,2024-01-18T16:11:09.587000
|
||||
CVE-2023-6784,0,0,8a2dc120c2f7c09cd65b30de205a120bba14591ed7954e6b475e7a765c9d6768,2023-12-28T20:16:01.087000
|
||||
@ -237818,7 +237826,7 @@ CVE-2023-7212,0,0,c82561de87d9b5a8e98ddddf12537a5231fd7af4a3892613aa65bcaf50d425
|
||||
CVE-2023-7213,0,0,53dbf1b5ed846da4be08eaa570707a79ba97a8f313d11619a36fdb9ec23e375b,2024-03-21T02:50:59.900000
|
||||
CVE-2023-7214,0,0,7a1c0710c5be4f5bd338487b4db0d98aaba3008bf0d51188e55d3ba8f2ca0ae1,2024-03-21T02:50:59.990000
|
||||
CVE-2023-7215,0,0,9199e6e3539c5b15d0411ec649b23a950c822a62969d413acaf5e4343a429a54,2024-03-21T02:51:00.070000
|
||||
CVE-2023-7216,0,1,ba84a1f2334fe94cc22085363da99b6ece39d93bfd66b42b6e91d7a0bc0e2b60,2024-03-26T16:15:10.283000
|
||||
CVE-2023-7216,0,0,ba84a1f2334fe94cc22085363da99b6ece39d93bfd66b42b6e91d7a0bc0e2b60,2024-03-26T16:15:10.283000
|
||||
CVE-2023-7218,0,0,e11b22d1e4f4bd1a318a9925942a5a95ed729fc0728f0384739354f97569f1ea,2024-03-21T02:51:00.170000
|
||||
CVE-2023-7219,0,0,569e2951e48af1d0df5db153d63187a5f69bdc3eec356763a3d703a7641682ae,2024-03-21T02:51:00.260000
|
||||
CVE-2023-7220,0,0,adb1a6fa99925cc0b04f8a6a991ea568a4098443e3fcb2536125cbabdc7e84f0,2024-03-21T02:51:00.343000
|
||||
@ -238648,7 +238656,7 @@ CVE-2024-1082,0,0,ae3ce9e9137f48bb8ed6e73705e5e3d60bc52b901f04050c52fd85d44a0026
|
||||
CVE-2024-1083,0,0,74c0722677f7c332b863607291b77a242fa9b468686591b078a5d2cf9d851301,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1084,0,0,51b7424ad38af0869b092fa36e3eaa18924349738a3af48c112cd79935a58280,2024-02-13T19:45:42.327000
|
||||
CVE-2024-1085,0,0,649a4a278db01305790c1d25d5fb8d26a8b328f3c410af99f7747f493230845c,2024-02-05T20:41:40.513000
|
||||
CVE-2024-1086,0,0,76364c1a0561e24ba662e70d690c606d4d289022065a8987b7a128b2d8eec769,2024-02-06T02:15:08.303000
|
||||
CVE-2024-1086,0,1,4219eb562264c7419d4a48158a3ea86843f6e837cf59fa776b23affde3923b44,2024-03-26T18:15:09.193000
|
||||
CVE-2024-1087,0,0,bfb73beeec450e6da5995b5f21712b59848b559e03cbbae3eab10a626379de00,2024-01-31T13:15:11.030000
|
||||
CVE-2024-1088,0,0,8282ed6326b4aa943e52bd688c1d72f7651b610e6d05d8f8f49cf63347f834ea,2024-03-05T13:41:01.900000
|
||||
CVE-2024-1089,0,0,32c5e60a3ddccafd89864debb2075c8e84bae9d4cf9e9019da73e9abcb27d415,2024-02-29T13:49:29.390000
|
||||
@ -238817,6 +238825,7 @@ CVE-2024-1304,0,0,23d5e2bb07c854af4ae93b68007adeaedc627b6e96a90278cd036489c69942
|
||||
CVE-2024-1309,0,0,37b1e0c9fe9df0fc7a03a06970b38a07b0edfe094c103b528d7941f417bdf8c0,2024-03-19T21:15:07.570000
|
||||
CVE-2024-1311,0,0,b6ff5a5c389b1970ebb3e727e75412706e999440266a856adc2134f819f2c52f,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1312,0,0,663659c34940a4e82708fc60c7161257042c7f9bd582badd425cca624f8b6adc,2024-02-15T05:03:16.077000
|
||||
CVE-2024-1313,1,1,fc2312805b89f80f01187b78a9b1055f41a1d07dff423a1c1d9453cd7d74aef4,2024-03-26T18:15:09.350000
|
||||
CVE-2024-1316,0,0,71137ee023059efde9ea6dfce3b572409e6580b9426330a66bdb1f551ebc3e20,2024-03-05T13:41:01.900000
|
||||
CVE-2024-1317,0,0,677d2e22c876d1f8a2362f14eec614350ca5518b287bd87de6939bf8afc48e88,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1318,0,0,422c230b919b2aed39d902af5834079d78461435b9de398b39e0ef988ed8aaa2,2024-02-29T13:49:29.390000
|
||||
@ -238922,7 +238931,7 @@ CVE-2024-1451,0,0,3f6435be1eda5f484a72686d969060594b556ef09b071072e8b2c55917874d
|
||||
CVE-2024-1452,0,0,f3f7356621b3de0beb4bcd77b5b0c290368d3f5194eed14a4a3d86741756591b,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1453,0,0,e11f7c6a5ca684a7ed72821317f7b1247eb4a0454b5116cf4686bee193c0189b,2024-03-01T22:22:25.913000
|
||||
CVE-2024-1454,0,0,cc63bfc078899c3bc2d22b3e00f458fc4bbbae1bbb587edc98f331b0cecc8681,2024-03-23T03:15:10.633000
|
||||
CVE-2024-1455,0,0,14952b77e57193c30794fb55b1d2b3ce9f659b1558f9e5caebc130d3b24f75a6,2024-03-26T14:15:08.450000
|
||||
CVE-2024-1455,0,1,5d5551bfd568878b597f20296517afbe3046f129fd87b0b33dac914b992d4d1a,2024-03-26T17:09:53.043000
|
||||
CVE-2024-1459,0,0,11d2cc6cb4f85209b5f6836b3ad08354090d0f8d1b51c2b33235c6338b29d8d2,2024-02-27T16:55:31.430000
|
||||
CVE-2024-1460,0,0,cff087352bb23bf663ab2e822f0f3fe258f454a6ba829a2496758fccaa0c2c9b,2024-03-07T13:52:27.110000
|
||||
CVE-2024-1462,0,0,2f9d4051c4c161902f27eca436b6d8219798c451263796f27a47d4849d7fecd7,2024-03-13T18:15:58.530000
|
||||
@ -239195,7 +239204,7 @@ CVE-2024-1927,0,0,b3c20609db9c70af07026707de6d8f4fc11b95fea553636b448fb3a99c9e68
|
||||
CVE-2024-1928,0,0,7c620b7f4b1ec6939393c022b1469f24a2d6fc0dcca332e7bbe9c97be0a7c0c1,2024-03-21T02:51:49.690000
|
||||
CVE-2024-1931,0,0,2c035e986439878fc41e4d57f10dd1dfaa67d4c99fcd2a57828e8789ee7b279b,2024-03-07T13:52:27.110000
|
||||
CVE-2024-1932,0,0,5d8d8b3bcbb6e1458b966532c64c8c15a68eb67ca9de3e9c3d113ec944ac23a6,2024-02-28T14:06:45.783000
|
||||
CVE-2024-1933,0,0,8efa2abd15a6c9dc497d5342929765adc1b9723ac087a73cccba17b9d6f2636a,2024-03-26T13:15:45.077000
|
||||
CVE-2024-1933,0,1,a87f7af555f25d5511c6c95f7980a7b12009c62b31ac68af7b5bb4b0c784ec57,2024-03-26T17:09:53.043000
|
||||
CVE-2024-1935,0,0,acd55fcede8b48a7898ea42523d7c01336ae5958dd58d0fd5fb3924b804c3e4b,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1936,0,0,7b3792457d5905a49db010db7b736af0c923e8894b5bdd1a854744f20603a17d,2024-03-23T12:15:08.453000
|
||||
CVE-2024-1938,0,0,24dc90499c61d902708c3560ef4b72bc4a3172c10dbf5b005bb9075fcee4ff4b,2024-03-07T23:15:07.177000
|
||||
@ -239907,15 +239916,15 @@ CVE-2024-21908,0,0,329abb805b48ea46c40d9625a0e5a18857ae42d6b89a82f5c3cf797095821
|
||||
CVE-2024-21909,0,0,1862a33cb8cb7c096543042cface003ed2658c185ec7603674a262510a57f13e,2024-02-08T02:15:40.883000
|
||||
CVE-2024-21910,0,0,43ca7fc1e52b2bce376dbad269237609f1115a9e3e85611002acd3d35f8eee88,2024-01-08T19:46:25.757000
|
||||
CVE-2024-21911,0,0,30b0952621022b198f37c9fc7c47e2aaa3233be56e7cd5684ca7f588e4860d48,2024-01-08T19:46:14.513000
|
||||
CVE-2024-21912,1,1,ca7a6e05e4287c6d7b9a908fefd2998753f0193e2173b677ca904e3540852315,2024-03-26T16:15:10.440000
|
||||
CVE-2024-21913,1,1,614ce8006a0da5beb9f517af487cd48f3109f82477c5b77ed27f6f37ab4430d6,2024-03-26T16:15:10.670000
|
||||
CVE-2024-21912,0,1,313191073cb481d296be147cee1b1c3c466102564b95957afb404eb1dff60483,2024-03-26T17:09:53.043000
|
||||
CVE-2024-21913,0,1,76e233c2fa7c0db7fe5e09ad44bdf3a4d23e6acfac5fbb342b58e4c08d6d66fd,2024-03-26T17:09:53.043000
|
||||
CVE-2024-21914,0,0,8362c524df4a22c5c99212051acce4ea80772b52bceeb8a39755408986c0153c,2024-03-26T12:55:05.010000
|
||||
CVE-2024-21915,0,0,37ba536bf668637545b4dc7be0d8e2b8dd5a196f32352bf8da3b31f0b239e591,2024-02-16T19:26:55.393000
|
||||
CVE-2024-21916,0,0,9f2b20d343ff64e569a6727c28d35277f9cb0ae2a13059d88274004570b48dd2,2024-02-08T01:34:49.067000
|
||||
CVE-2024-21917,0,0,f716c6e174b4d85e6dd9ac9a5c0d15320474c17d34b338ef8fe8fa8f22be68b7,2024-02-08T01:29:32.367000
|
||||
CVE-2024-21918,1,1,e9cf9d31f8a1115b923b53fd9dcad56c406ed91f0f974a3222045d1234c77bf9,2024-03-26T16:15:10.877000
|
||||
CVE-2024-21919,1,1,6bb600d0c6f883d9b463f3c687aecbe8359e94472314fe830c76b10811e4c948,2024-03-26T16:15:11.073000
|
||||
CVE-2024-21920,1,1,762814431e8decb8be1e0bf4ad4ad9808530bc37358d700dc5cdf30e37ee4365,2024-03-26T16:15:11.277000
|
||||
CVE-2024-21918,0,1,c4bb4ede38f9a16f499bf46a4bcaca94354f369eab31adef6a15454baea87f5d,2024-03-26T17:09:53.043000
|
||||
CVE-2024-21919,0,1,7384b6246d42d878ee1ee3f98ce4c9dd34e38080d524d07b908a686735c4af16,2024-03-26T17:09:53.043000
|
||||
CVE-2024-21920,0,1,ffdb9272381cfcb69d90b4c240807d8dc09161c70ea55d1400487f7b10cae5cd,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2193,0,0,34e7209142ece07ff319851094293418a65cb348ac85d6085a8bcc354475b1e0,2024-03-23T03:15:12.450000
|
||||
CVE-2024-2194,0,0,e66d1886576950c3cc2788bd7fbc7cf127b4cc7097217924653f49641c7f6c67,2024-03-13T18:15:58.530000
|
||||
CVE-2024-2197,0,0,c2754f239c7fee6e20f805eadb33174245eb70dd54a6a864c7dcc801422fac42,2024-03-20T13:00:16.367000
|
||||
@ -239980,7 +239989,7 @@ CVE-2024-22108,0,0,cdaf61a2506aec5c5c15705bb009e8054dc2f9e9fadf39ff642fb65becdf0
|
||||
CVE-2024-2211,0,0,5f96d32ca4af544c9f2c4c41d1cca4c75a0898cccdbc38ab9840e28c52771346,2024-03-06T15:18:08.093000
|
||||
CVE-2024-22113,0,0,73fc9153b57dfc99829524f1c872775af20e562fcc4a87613efb3eb112b8fe49,2024-01-29T14:23:46.600000
|
||||
CVE-2024-22119,0,0,d25acc4f5f2224943f2feaeb837e6d77f51fb63d8c6b5945b3415b9f2d10bb25,2024-02-15T19:35:45.447000
|
||||
CVE-2024-2212,1,1,d7e8ccfaa59e788e5e30c86e53a6b5411ff9d76fb9a391e68ceff3569dec3b4b,2024-03-26T16:15:13.233000
|
||||
CVE-2024-2212,0,1,1efd8738d0df499a6210a5cbcdbcb2236e5d3b323e83389672544412107c41b4,2024-03-26T17:09:53.043000
|
||||
CVE-2024-22124,0,0,35999c882bc6d44ddc45a9b1e3e882ba4227533058bc07c120048ab393e82eb5,2024-01-22T19:17:13.050000
|
||||
CVE-2024-22125,0,0,09efd17c32a694e6a723ff7a2a9eaeeb4bc062e9a25db0f7cad8d3d4b4874464,2024-01-12T19:42:36.637000
|
||||
CVE-2024-22126,0,0,21fbc349f898f1250de5f7f39ca68cc7afccec8ff42d81c72dbf786571fc9040,2024-02-13T14:01:40.577000
|
||||
@ -239995,7 +240004,7 @@ CVE-2024-22134,0,0,3be6b7702224117203e25cf98307e352d45c22327a969b8a5d10317e76a95
|
||||
CVE-2024-22135,0,0,7025eeb4417e68d70b1ebd56dbf2904b38773b2370d9f15dd4e72daa19dcfb0c,2024-01-30T17:34:58.917000
|
||||
CVE-2024-22136,0,0,ffae1822b85f323446ecd7154230713998c5b43341d8cf75c26e20b18cf0dd08,2024-02-05T22:08:24.077000
|
||||
CVE-2024-22137,0,0,2f754fd6309f47fb06b4590cc899dcf8d9510a064415a4a45699e620bffecf24,2024-01-19T20:02:08.340000
|
||||
CVE-2024-2214,1,1,bac821ea40fbd0a9bcaaf994e0d1e4c3bbde8688dd782b52c974bda55f7f576b,2024-03-26T16:15:13.430000
|
||||
CVE-2024-2214,0,1,67f09108a7f626515ff9607f3c75e511fcc384b5aee9ec997a4926f909682874,2024-03-26T17:09:53.043000
|
||||
CVE-2024-22140,0,0,7531d09a0f968b5d2b1e4e11b41757eb318c7a2cf822561fb39f6b355e958506,2024-02-03T00:18:43.417000
|
||||
CVE-2024-22141,0,0,82c169c1dd57a019cf6b1fa659a8204ad1d91b953c7a71671ed9e1905b8d4a0f,2024-01-30T20:18:38.460000
|
||||
CVE-2024-22142,0,0,8637a6c60024e32494bb4696b4c838486f6176e902ea0c9e3d4b4fb3a1805b63,2024-01-19T19:59:49.717000
|
||||
@ -240008,7 +240017,7 @@ CVE-2024-22150,0,0,73a6449bdd862cb4aceb7dfcabf00926f0730684d1b40796cd1922a1d8912
|
||||
CVE-2024-22152,0,0,77741f5ed7ba0cff2726117ba8b408bddeb0ad8028c0019d800ba91134fb10eb,2024-01-30T17:36:20.533000
|
||||
CVE-2024-22153,0,0,183cafa541cc9d6796e6f60d4f84cc3fefe9e93bd9495a8b813ab36c05739148,2024-02-06T15:43:49.957000
|
||||
CVE-2024-22154,0,0,c5d6f5ccc259910245679ed3525d0fea5ed728e2e4ec972b00aa2e1bbd5206eb,2024-01-31T20:20:56.647000
|
||||
CVE-2024-22156,0,0,70006e5e9cf3347e83d1f68b689e7baddb5cd2fea027bd66eac3dddd58c2d962,2024-03-26T13:15:45.277000
|
||||
CVE-2024-22156,0,1,0470690498e3075fd4f3771d852ea946c7ab23ccbac27ad083940b547295f710,2024-03-26T17:09:53.043000
|
||||
CVE-2024-22158,0,0,be5acba9413a4f0452950024099977323786ffce7bb9629de27484705b832f92,2024-02-06T15:25:24.303000
|
||||
CVE-2024-22159,0,0,af65d98e1fc14c93d259c6b50b292b96d1dcf8bdc170ccb9c7a80ba7229999dc,2024-02-06T15:37:01.700000
|
||||
CVE-2024-2216,0,0,7a28c5762b5cda60e66bc68be4edb6e0097feb56dd7f05add8be107a9a5cdc2a,2024-03-06T21:42:54.697000
|
||||
@ -240117,7 +240126,7 @@ CVE-2024-22337,0,0,9a674fac9bc4716d61a028d3be9473027552f3c1c11335efca4b4ddefd1e1
|
||||
CVE-2024-22346,0,0,638ee4e9687c7c28032b432c317662713c057110b08b4b27024e81eb8453bf9e,2024-03-19T16:50:10.570000
|
||||
CVE-2024-22352,0,0,52b9cf66a5f4972c051208c662d7f56e462da827c07f4b0e55a14efcee339e76,2024-03-21T12:58:51.093000
|
||||
CVE-2024-22355,0,0,90575169d286b28c7ce02c7d947a264d77a6f25776530138b50b2f2dbc394220,2024-03-04T13:58:23.447000
|
||||
CVE-2024-22356,1,1,2bb0cdc6baed0ccc72412c5f987d24652d3a41eec6d3ba82c0460c8b77e80352,2024-03-26T15:15:48.920000
|
||||
CVE-2024-22356,0,1,bcc46874c9752933a72230517b74ad7a7a0d54dc67e233e91127533dfceeba1c,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2236,0,0,17401211af38608097c003c3b08d6e3d90e3570b70699d89a2e396d5b72c602a,2024-03-07T13:52:27.110000
|
||||
CVE-2024-22361,0,0,2cb34447b61b8680c66e6f142987700b31f9f16d4e9b8d748c59e5b8ad5a9a29,2024-02-16T21:35:31.953000
|
||||
CVE-2024-22362,0,0,826381d745a7bfa89e56ba8a6fed4317ed24204ea30e248bcffb2a9894398594,2024-03-21T02:52:03.063000
|
||||
@ -240548,7 +240557,7 @@ CVE-2024-23476,0,0,e3d84cdb88c20fc5ad4183c7e154fd4eb94d6574a64f56328103056889f0f
|
||||
CVE-2024-23477,0,0,87ea55eb7f1d47398644b7f37685a8d0eb8352c36d1b14165a017d7f9ea764c8,2024-02-20T20:38:43.587000
|
||||
CVE-2024-23478,0,0,b3a2615dbe854f9cd6f6758ce3a7c085bf544d3fb8c18446bd16ed76b713d059,2024-02-20T20:39:52.377000
|
||||
CVE-2024-23479,0,0,347fa1fab90846375f3cbda9f21578cf079b96a3697a975655102d71cb94c108,2024-02-20T20:17:31.460000
|
||||
CVE-2024-23482,1,1,e66d5b2e112e90cb8a205d39f102bde7ba4b66b3998d82dba115ee48456bad5b,2024-03-26T15:15:49.130000
|
||||
CVE-2024-23482,0,1,a1a2b00555a591fe7110a566438c570a2dca6a03e77aa4e75cc2cbc4e9c0af62,2024-03-26T17:09:53.043000
|
||||
CVE-2024-23488,0,0,57450458303c48f58f7accf28de637666e8c4b38b2ec58f4dc15eb09b92be21a,2024-02-29T13:49:29.390000
|
||||
CVE-2024-23492,0,0,7ac211a2a1c5c083cd2cd2691020edf3a51548a70085e44c956a49351fc4de8b,2024-03-21T02:52:07.353000
|
||||
CVE-2024-23493,0,0,91cbf193a715aa0c526237151c4d36164df1ccaf1f366a7cf8bdf551267e12ba,2024-02-29T13:49:29.390000
|
||||
@ -240656,7 +240665,7 @@ CVE-2024-2370,0,0,b4d60e1047325278ac8b0d4698ddbabcf9cce9ef3d3d19d6f7eb18094f8266
|
||||
CVE-2024-2371,0,0,3cb4c1ed0c9b08d07eacc5252cd2248e3436e0fe77ed1216887d9a3f973c7f13,2024-03-12T12:40:13.500000
|
||||
CVE-2024-23717,0,0,6124f28576b39881108c8f8a6a5c6f0e66ec8c6ba51a289d578374ba7fe9cba6,2024-03-12T12:40:13.500000
|
||||
CVE-2024-23721,0,0,4dd09af0f810413f4d72b4868c20ebef4c48ec34bdb053307d4a26aae377efc3,2024-03-21T12:58:51.093000
|
||||
CVE-2024-23722,1,1,1e70cc67972542a9b1919897af8491698dfff7eacb271c19a092acfa5d912a05,2024-03-26T15:15:49.317000
|
||||
CVE-2024-23722,0,1,38e4afcdeed536b1189b96cd2e826d0a0039b5151073f4df55924a643f5fb03d,2024-03-26T17:09:53.043000
|
||||
CVE-2024-23724,0,0,47401decfa65f84dd047eaa15adb1a17aa44914fc15b5198b908ecf69c381f70,2024-03-21T02:52:08.230000
|
||||
CVE-2024-23725,0,0,e7109aa5ed154918326c3254d584acf7e8190c7c6acd985ea1145474ef362350,2024-01-29T15:25:48.110000
|
||||
CVE-2024-23726,0,0,1e6b5838c3bbe1bdea4cff85e0dab09275e17fdbeddbc74981e476f308132713,2024-01-29T15:25:36.090000
|
||||
@ -240992,7 +241001,7 @@ CVE-2024-24499,0,0,f3fa195f99d03c816961a79dfcc5225a65897f0a2c13286167d69ca586129
|
||||
CVE-2024-2450,0,0,00768fb37fabbe59aaa05a2b15e979f5b194f2b002bbfb5602d5ad6df849f0ce,2024-03-15T12:53:06.423000
|
||||
CVE-2024-24511,0,0,c2a15768e4699e22cbf5e8595792dbc9bf48071b723d524443a4f83d9a5c3ab8,2024-03-04T13:58:23.447000
|
||||
CVE-2024-24512,0,0,03c51f88444f0be6fcfaff8e371681e3a1a1d007832a9bf8fa7088f13cfe5d40,2024-03-04T13:58:23.447000
|
||||
CVE-2024-2452,1,1,95ae8d640d1e817d02c46a9f1bf4137b5b766690048615995c27024b71579fd1,2024-03-26T16:15:13.623000
|
||||
CVE-2024-2452,0,1,dc7f1023137a78f11f48bc3cf8f72ec03aa67efff74760d3d778cb44b3110a19,2024-03-26T17:09:53.043000
|
||||
CVE-2024-24520,0,0,1c17a865e2018472844eee3eeb32382c844b7628a24e3ba8ccf07a6f4355df2d,2024-03-21T12:58:51.093000
|
||||
CVE-2024-24524,0,0,40ecb02cd326bdc34833c61cf5eb3e9f45f526d45502f51591361c36d1938c63,2024-02-09T16:30:43.830000
|
||||
CVE-2024-24525,0,0,13b50b322b70c1ba78c523473a9882b44cc13b59455e3e47dd336806a91a1148,2024-02-29T13:49:29.390000
|
||||
@ -241456,7 +241465,7 @@ CVE-2024-25469,0,0,96be9bcc7fde8f9b63f103d576b0d22a9c84a3c5935374af13a2466b2f2f5
|
||||
CVE-2024-2547,0,0,029ea713e81efe24d9f23f45896ca40700b7682fd29e8eeae6ea82eb3ee0c23f,2024-03-21T02:52:37.487000
|
||||
CVE-2024-25501,0,0,bac5c3eafbac38d2c6b4da329ce2a075da938dd8ce1ff1c471fff3fb2b0c91ae,2024-03-11T01:32:29.610000
|
||||
CVE-2024-25502,0,0,50331b6b298e51ff1fb5155b43730c3887534f74eacaa5eabfebdbefa930be85,2024-02-16T13:38:00.047000
|
||||
CVE-2024-2553,0,0,60661f4e29c946f8f0bd9c141b816121a578e8afae7b951ab3d0603c830b9051,2024-03-21T02:52:37.573000
|
||||
CVE-2024-2553,0,1,51096ed0b78dd956151349bc7a00fa14b68c357d7181cd6178d0a156f537f6e1,2024-03-26T17:15:47.490000
|
||||
CVE-2024-2554,0,0,4ac6ec86a9eca45e0959ee11cb19788a3b6ae4ad6b565e671b8b1c5afcc85576,2024-03-21T02:52:37.647000
|
||||
CVE-2024-2555,0,0,f916e80b2ed7e85f0a04674a605eaa0368f77f318b267584d88e76e9119ef8a7,2024-03-21T02:52:37.723000
|
||||
CVE-2024-25551,0,0,08dea6730d2a3539d15dd516547ab3c25a1bf59710632ae63632a88cbff77b71,2024-03-04T13:58:23.447000
|
||||
@ -241659,9 +241668,9 @@ CVE-2024-25941,0,0,ca1cef65d30f17057b47421c2700ecf50e418e7bf4da35eb3fcc2989f17ef
|
||||
CVE-2024-25942,0,0,f61fbc9a4d226989af6c7dbccbce6eac1bf08e9ecba7753f027f3c66eedf16fc,2024-03-19T13:26:46
|
||||
CVE-2024-2595,0,0,2deb54d18ba7636df2c2b5e2f14f094eeefaa5b876ae68e9d3b6166f648310d6,2024-03-18T19:40:00.173000
|
||||
CVE-2024-25951,0,0,4cab9db546da1535e7f7aa83987aad28b8aa7aeb3328d636aa2cd78c27a2b2c1,2024-03-11T01:32:39.697000
|
||||
CVE-2024-25956,1,1,223aa93034d13ea5222d6dfe706bf405b5c1ec2f8ef6e2ecff3c2820e3c91784,2024-03-26T16:15:11.520000
|
||||
CVE-2024-25957,1,1,b661b77cecf6055cc88dd8ba37395c2962972d4b51b06df443041dd19d18013f,2024-03-26T16:15:11.727000
|
||||
CVE-2024-25958,1,1,b12ce2ae464f2791ebd74e2204fab9a12edbcb4cd9adf0a48724d0c2e79f0fd4,2024-03-26T16:15:11.917000
|
||||
CVE-2024-25956,0,1,dfd2802b1c736e1761ed07520e628719c89334b257da6b0a5713ad322e0dae27,2024-03-26T17:09:53.043000
|
||||
CVE-2024-25957,0,1,fbfd85de3920e2efe608621ddb5f2aee192a8ffd0e6708b05a61970ec8670fe3,2024-03-26T17:09:53.043000
|
||||
CVE-2024-25958,0,1,428a097e4eb3bbb89a8c80ee3860a38967cf51a7e50b2ade8df4bf3874041ad6,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2596,0,0,978865da9be9e1fb873a9c434a053f33d1f0c5219abdf12becebd1212242ea79,2024-03-18T19:40:00.173000
|
||||
CVE-2024-25964,0,0,b5ec0f6d98c78318f65547134d8b33b81ca3c6769a2c110d8679aa993806ef56,2024-03-25T13:47:14.087000
|
||||
CVE-2024-2597,0,0,822c3604000d58768ff79975222ee5716f9ff927beed042444c7c308ac1b28bf,2024-03-18T19:40:00.173000
|
||||
@ -241981,8 +241990,13 @@ CVE-2024-26640,0,0,5cc6b5e042a5b441f74784080591c7d359381cd13aba12bdf63d6c89fc714
|
||||
CVE-2024-26641,0,0,d0ed2cdfb0ff7417cb869a8d4b0f844e96cb33626fa12ef7a8d145f64e7e59f2,2024-03-18T12:38:25.490000
|
||||
CVE-2024-26642,0,0,2030c36d17cf3955028a3c8cf70b58662419898c5eb4245b6345fdb4fa4667cf,2024-03-21T12:58:51.093000
|
||||
CVE-2024-26643,0,0,76e88a10e1b7ae620b3b2f807c32687dfa488694b94b88072cd31ad829305fec,2024-03-21T12:58:51.093000
|
||||
CVE-2024-26644,1,1,114e597ced6989f39361de91b251416aefc3205e3a880df9bfb3355fa69ecc44,2024-03-26T16:15:12.137000
|
||||
CVE-2024-26645,1,1,07f5d2a40f75bf53494fd1bdd9955a499bbe895b17a65cc7d26da6c453638e5c,2024-03-26T16:15:12.207000
|
||||
CVE-2024-26644,0,1,e5196539d0d7d2426b70f5c3d7b2262aa5f8e671e6361172395eb0ace801b5d7,2024-03-26T17:09:53.043000
|
||||
CVE-2024-26645,0,1,fe3f1a6f358cce09c9a7d8315812702f5784843255df1b174247cd1e300a4c71,2024-03-26T17:09:53.043000
|
||||
CVE-2024-26646,1,1,6eac3a1f251037baca9015e731d75055b325c9652d7a6f256f509f462ef91c49,2024-03-26T18:15:09.910000
|
||||
CVE-2024-26647,1,1,c1685e9c5a3bbb47aa3ade7623a183c0a043377118f54afb727855828b03a371,2024-03-26T18:15:10.063000
|
||||
CVE-2024-26648,1,1,36d3fa2a15ff79ad7c0626e4e63083b151bd153667a960246460ad1dbb4b8422,2024-03-26T18:15:10.220000
|
||||
CVE-2024-26649,1,1,acca5e9b7f92cbd209bcc468a216ebd6864e5465e46b0a5729ad466b6f9e5db4,2024-03-26T18:15:10.370000
|
||||
CVE-2024-26650,1,1,614e20037042219ab8e7db2eca3f7d1f724e3785feb5dfac89364a948cb05366,2024-03-26T18:15:10.530000
|
||||
CVE-2024-2668,0,0,d8e22e7bb795e8f8d48dc1ea67b8b3706e737c441fdb6e3cdf26dd6015682f9f,2024-03-21T02:52:41.070000
|
||||
CVE-2024-2669,0,0,4f5a2d5969b59448109cf022193bd2b7c88dc7ffa7ca03caa723fb0f374642a3,2024-03-21T02:52:41.157000
|
||||
CVE-2024-2670,0,0,51102bd696ec0a80433e00190a81242d0892d06afe5affb13dd51bd0c370ce65,2024-03-21T02:52:41.253000
|
||||
@ -242146,7 +242160,7 @@ CVE-2024-27441,0,0,e840685b8600bbca2bd5265ffc2375dd0e1834727afca845fa72402578217
|
||||
CVE-2024-27444,0,0,a237f36c45a82911cb697384887c7b89bc1c2ea038ffd45f33470a0acaad42ea,2024-02-26T16:32:25.577000
|
||||
CVE-2024-27447,0,0,cb57e8d03df573cd861f28c33cc0f260471c72de24ec7e9c3037c0509931fb18,2024-02-26T16:32:25.577000
|
||||
CVE-2024-27454,0,0,420cb9ec3b08ac5a96e141e933952328f4cf525758241b7fd36981eea8d7ea27,2024-02-26T16:32:25.577000
|
||||
CVE-2024-27455,0,1,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000
|
||||
CVE-2024-27455,0,0,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000
|
||||
CVE-2024-27456,0,0,af8b9eeeffd0370c5237af64d481e919abc5d541ec3702413fff35287d9c8d37,2024-02-26T16:32:25.577000
|
||||
CVE-2024-2748,0,0,7e386cbf6383d9c670ab2da491db4c11338d46cd7667c12d0ea9f5d67eb35ea4,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27497,0,0,424da99af028e8bbc4e145cc3ed13014de56bcd76f9291f295253c8da6722a31,2024-03-01T15:23:36.177000
|
||||
@ -242210,7 +242224,7 @@ CVE-2024-27744,0,0,c100d4ba8f49a307e8f166c43dcf72396c641c27bc5c30f424e004f4b4c33
|
||||
CVE-2024-27746,0,0,6f3ddced2e2b26bef51987507b4e7466957a803a9da415c8c1c8b245cafe1423,2024-03-13T07:15:36.470000
|
||||
CVE-2024-27747,0,0,eff635f872515818dfe20352d610bb047327d7f6971e953c63bc92feb6bf3ebe,2024-03-13T07:15:36.523000
|
||||
CVE-2024-2775,0,0,324304d3daf3f8232d8549c8aac7991bd17ad8e74cddabbe779660d692eff015,2024-03-22T12:45:36.130000
|
||||
CVE-2024-27756,0,0,aebfc12c95eee1aa3d95acbf6fc8b0650b6e3d2e490fe1817d1c49f0782fe0c7,2024-03-15T12:53:06.423000
|
||||
CVE-2024-27756,0,1,a0b7876d1bcd508f42c19e34f906c00ccf4c6d4fd282b64eb52f33eb0c45850b,2024-03-26T18:15:10.693000
|
||||
CVE-2024-27757,0,0,758da8d428041fb55cda5e8ed49e42184e30c0310dfccc74e01819218179190e,2024-03-18T12:38:25.490000
|
||||
CVE-2024-27758,0,0,6abe87e0a8905ac150ade2fec85250ff5e7fbf580c101c16b193b98f7d58141f,2024-03-12T17:46:17.273000
|
||||
CVE-2024-2776,0,0,a2dca86eeda4163cb75b40ad2e671bae21e52f796052ecc38e114bfa3f2fcc33,2024-03-22T12:45:36.130000
|
||||
@ -242282,7 +242296,7 @@ CVE-2024-27995,0,0,31db9c3046ef3b6826fd04aab15586376d26e0b529bdf84ce7eba17bac569
|
||||
CVE-2024-27996,0,0,79cff30308b011c07df476cb18acc5ff1830e7bf17b14d1ca5a0d9446fa716b8,2024-03-20T13:00:16.367000
|
||||
CVE-2024-27997,0,0,b42c7cf4751e4a11a6e5eeb90c0df264fce89958ee556b8b06894cd2e68b11ce,2024-03-20T13:00:16.367000
|
||||
CVE-2024-27998,0,0,325b1a8419d02931fcb08c1286afe5c33e53c5bf8527e201a365155e360914cf,2024-03-20T13:00:16.367000
|
||||
CVE-2024-2802,1,1,3b7ed9aefbc68681b0633b6ab16c0b3db6db844ee4c655f6c7e6863ac6e1f543,2024-03-26T15:15:49.677000
|
||||
CVE-2024-2802,0,0,3b7ed9aefbc68681b0633b6ab16c0b3db6db844ee4c655f6c7e6863ac6e1f543,2024-03-26T15:15:49.677000
|
||||
CVE-2024-28029,0,0,9e465d515603ce2b4056e1d4099525822960990d4afbdcda109cb1a09fe772c2,2024-03-25T16:06:44.403000
|
||||
CVE-2024-28033,0,0,d380f707343e80ca8a48383d7130e8455ae81fc182e0d67c36374f1eb571652f,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28034,0,0,59f37b2f71aecfc048b35bdfeca5cf2bf5792e3fd57d1b0f3eaa95911ebef442,2024-03-26T12:55:05.010000
|
||||
@ -242558,9 +242572,13 @@ CVE-2024-28868,0,0,4e3489f3c96f97bc271ff7282115c7f5d25e2aa392efe0c1c5842c72ee998
|
||||
CVE-2024-2888,0,0,e48cc71bf8d96ab718c88bf59dd81f25047204b13c0446dd48014e6c60fc42d9,2024-03-26T12:55:05.010000
|
||||
CVE-2024-2889,0,0,047900621574a9797901d8767443e859750a2765d7b4c1f50c805ec45928b2d3,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28891,0,0,0aa614d18123b6bc2c76e9c8b5d356a2e7d71bba766bbf9db36fdc818df4c91d,2024-03-22T12:45:36.130000
|
||||
CVE-2024-2891,0,0,c4444761e2daaffd1f00735101a2ff9c47024a839111c07859ef3c428d9fc3e5,2024-03-26T14:15:09.530000
|
||||
CVE-2024-2891,0,1,94b70830417014ebd0a88424b38e7910314b41261ea6ef22ebae730d401e569a,2024-03-26T17:09:53.043000
|
||||
CVE-2024-28916,0,0,3588de3801d3f24953276fa6b57f2d684fb38fc8b3ed3ad7d8613e127e6022b7,2024-03-21T12:58:51.093000
|
||||
CVE-2024-2892,1,1,954a2f272af32cdc4636d904b5279d89c288f46d88158828a1076b340bc6cbac,2024-03-26T16:15:13.853000
|
||||
CVE-2024-2892,0,1,e53fd1216c4b22efebd0b743da5712b8a2bbb649ec50cef3f19c8170626057cb,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2893,1,1,03454b4172a384fcf754d0a79af98f544b770efe10848787fa0a66006ffb73c1,2024-03-26T17:15:47.810000
|
||||
CVE-2024-2894,1,1,e073a098f20ecf49044bd1b363f575a8cb2f6afd9229aa92873c84f5fd988e53,2024-03-26T17:15:48.080000
|
||||
CVE-2024-2895,1,1,3be1a99c99a4512208e842577cd86ecfd7359e00911a74bb22c4751a2f381f34,2024-03-26T18:15:10.893000
|
||||
CVE-2024-2896,1,1,cfbae6b125dd4e36298bfaaddfd49990d3493209156cf15c0e63037d046146fd,2024-03-26T18:15:11.543000
|
||||
CVE-2024-29009,0,0,e428945e790b35d2116d11f320908f919961bf6f75e41d300d21cf55f5bcc19c,2024-03-25T13:47:14.087000
|
||||
CVE-2024-29018,0,0,996b521b7d9365d8d41596984cc4ea0a166d70f0fc41d183b4857a8a3632cdd4,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29025,0,0,2135a02640a8fe43b6f6ca4c5bc68a475f73ee669a9a1a5af697f30fa738d887,2024-03-26T12:55:05.010000
|
||||
@ -242577,7 +242595,7 @@ CVE-2024-29041,0,0,062cd423858e5d93d3fcaca6dd38a28eee29d2cae2776de71c0c9845b66bb
|
||||
CVE-2024-29042,0,0,94be04c88512f8801f1a0b7e8a0fe44bc1e2661493f643835e5309c09e2ba389,2024-03-22T19:02:10.300000
|
||||
CVE-2024-29057,0,0,1a7d236424310c38bf79fff65250ee548fa2fb68d692d6ba086f9244a484a161,2024-03-26T03:18:48.760000
|
||||
CVE-2024-29059,0,0,18e37be1e0df9e20dcfce0ba40125ed6c1baf91c43e1478b2c45015a443784c5,2024-03-25T01:51:01.223000
|
||||
CVE-2024-2906,0,0,8f4815138846f7168880c963432fd8e826da79a508032bbe434ec04b77e0ce85,2024-03-26T13:15:45.497000
|
||||
CVE-2024-2906,0,1,d03107f75ca563c85caee3d034c6f17690ce56543ec4f09885b1b99f97ccb0d6,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29071,0,0,5ff903755374c23b025a98d3cc2b0f06ea188aa4151e3658c02fd385bc8b4fa8,2024-03-25T13:47:14.087000
|
||||
CVE-2024-29089,0,0,e5fbae925c9da8d587d9573cbc1c34db123c4510c1c1616d472538493a08c59e,2024-03-20T13:00:16.367000
|
||||
CVE-2024-29091,0,0,b1cb764a2082d02939e32c22f722543dd831cf608e6c39b51eb933f990788962,2024-03-20T13:00:16.367000
|
||||
@ -242629,7 +242647,7 @@ CVE-2024-29140,0,0,81b0188b02ec97eea25ba71e207c764caac64152b7cc837d2aa82b57919f9
|
||||
CVE-2024-29141,0,0,0c36d86235af1b05ffdd671977b0a9f1efad4a89eb52195bc0218075263f9454,2024-03-19T14:31:27.883000
|
||||
CVE-2024-29142,0,0,aa64581089439270488fd3ec7318d50f51fe018a933a4c7619fcc03f33e8f61b,2024-03-19T14:31:27.883000
|
||||
CVE-2024-29143,0,0,a3f92e2c9ae6aaf4168f841be16c13a544cace199faa049656661980aa53e607,2024-03-19T13:26:46
|
||||
CVE-2024-2915,1,1,2dcdeb9612ca6ec05e4afdc1cd314d20f66e9e7d993d06abca882e7513b03203,2024-03-26T16:15:14.117000
|
||||
CVE-2024-2915,0,1,ec24e1259461cfa4ad3d33658319541b7ef90e5a07f7652d9577315748dcb123,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24c8f,2024-03-18T12:38:25.490000
|
||||
CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000
|
||||
CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000
|
||||
@ -242645,10 +242663,10 @@ CVE-2024-29190,0,0,06fd81282a65c29bad2a807438b949724256368bd8f788b06f116f9ca54b1
|
||||
CVE-2024-29194,0,0,61bcf80dc8c33623e289063809985cd69cc66b52cb236ef7d952a2c24a0c4127,2024-03-25T01:51:01.223000
|
||||
CVE-2024-29195,0,0,12b6fcead703f320c2faaa3dbf933701901e834c51cbd479cd70a3447afc3114,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29196,0,0,e02aa4919ed0d6b8af5e1fbc5257465a64fdae2f23d9b9aaabfbc3da2c0d39fa,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29197,1,1,77c434a1953f89864417a27e46c04d47bc5336f2b84fe309d05db9fffed708ed,2024-03-26T15:15:49.390000
|
||||
CVE-2024-29197,0,1,48cfe2d0e00e1d6e9f018548b8b920adc8f1c35c8c8d2a08e4bc3b3e003f90af,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29199,0,0,78313b772930e0d3c119e70c910c05a3509fc574028745b1b9c80a0f992c34f5,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29203,0,0,72f2f625f254ebd01fb4513831430e4d16043719b3320e55604cd698eb4447d7,2024-03-26T14:15:08.747000
|
||||
CVE-2024-2921,1,1,38318644b25bc4ef97821372c1adce98ea356508d02acd841cc596a2709f31c7,2024-03-26T16:15:14.173000
|
||||
CVE-2024-29203,0,1,85853d1d6c0b7cff8ded9ca779662219e1e7d461c7c9aed96ad32295a032c6f6,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2921,0,1,a7048ceb487f73059844764517da213b04f370019c5cc0c6fe2153431d1dd6cb,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000
|
||||
CVE-2024-29243,0,0,80b3eab65af2d9fbeb7b6048e074697688a19de63e1138c377d0b826523dd7db,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29244,0,0,ab4dadc4ff7b45a2c285edb922de956bae0828f007627c62339f15145e95a7b7,2024-03-21T15:24:35.093000
|
||||
@ -242656,7 +242674,7 @@ CVE-2024-29271,0,0,86d82853285296d2653b2954b1f865b89755729787a00c9a08bf8b4da2a10
|
||||
CVE-2024-29272,0,0,bb3421cdf283ecf2f8722dd79d31aa3f3d26bad518191ad6f8ea2a70c28d47bf,2024-03-22T12:45:36.130000
|
||||
CVE-2024-29273,0,0,5734858efc895a99d71a292d9b9fd87dc375f872fc9b4f17b1a24399e248cfbf,2024-03-22T12:45:36.130000
|
||||
CVE-2024-29275,0,0,402f5150501d1ad43199a2c93810407cb4bc9ca968149bb7f55410637d08465b,2024-03-22T12:45:36.130000
|
||||
CVE-2024-2929,1,1,a7aa5058864976a1df2c9816d8af544dbdf588d539db1cea1b6c5ea697b6739f,2024-03-26T16:15:14.230000
|
||||
CVE-2024-2929,0,1,1e2a5388b53705944df52e04f4649418a900b7d3e866b67a8f41dcdb88a45e50,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29301,0,0,154c6ea8f36ae553114269a1e880d159b7e9b09b869cc177af921f11e043c79a,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29302,0,0,befca4baa09da55c6ccc652e95ace012df1b1e2aab7ec33ac183ae5971911acf,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29303,0,0,9fc5b63681179dd34090ab25180fdf1128a0a8fe7fe2b044acdbb780ed8094f7,2024-03-26T12:55:05.010000
|
||||
@ -242664,7 +242682,7 @@ CVE-2024-29338,0,0,17a24f10f7d0496e7fcb2400fc6c6af48717728349b99b9f4dc4f19499bc4
|
||||
CVE-2024-29366,0,0,970a4db6ccd44fa8fff843a083b23c4276fdabe942805276e1033f4579523e8f,2024-03-22T19:02:10.300000
|
||||
CVE-2024-29374,0,0,f8a146770d52182e0c10b15b21ebc5da7e22091690385e976078b28de6736be7,2024-03-21T19:47:03.943000
|
||||
CVE-2024-29385,0,0,77dce7c3f8675f81eb6a00c8f1d149f72619312873eb8bb6e829225e587309f5,2024-03-22T19:02:10.300000
|
||||
CVE-2024-29401,1,1,e44b613f061946753dc62d095302340b4d2aabcb2804892fb8978684fd5200f7,2024-03-26T15:15:49.620000
|
||||
CVE-2024-29401,0,1,89656cc9e9a7fef85aec3d184bc9af149e9114d584510da9b248a092c84a80e6,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000
|
||||
CVE-2024-29440,0,0,b41dbba691936eb263a6e48ee2f4c3b0c65bf928cbb922caedd1e0f5f03baacf,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29442,0,0,7905121fe561461f75c739d09685b7ffc46a6e6f08464603a503f7d567bf4eab,2024-03-26T12:55:05.010000
|
||||
@ -242675,17 +242693,19 @@ CVE-2024-29472,0,0,8914457096a81cfec257e1932986907f8b2f25a966f10c0d7629905ec24b0
|
||||
CVE-2024-29473,0,0,2dcbe7e94767e08f46a9353b62d8f30da500a221f5affb32fc9ef958cfff985b,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29474,0,0,cd74b93fedbacc13ab911c0f2a2b89e07d9e578953f3b262ce40503b72930e98,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29499,0,0,bc8db29a97bf5517e5213278d0d5f5ecdec4b51f00adea3262848d25f6e735bc,2024-03-22T19:02:10.300000
|
||||
CVE-2024-2951,1,1,196d384afa50e4915b3f7f1abd72164195ad83bb49221af960f012f0ea91cf3f,2024-03-26T18:15:12.160000
|
||||
CVE-2024-29515,0,0,79c9f65757e49bdb19c4dcff88d6ba2d524b1951e790ac90d5ffb4f302abcf45,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29644,0,0,386d9404cd9a66783fab4191d99526a9e5bea1176409bc071a51d532c36af3ad,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29650,0,0,3de71c7e130cece9a4956a25a7008efc5004a21e047c073aea3bd083423d5a0e,2024-03-25T16:43:06.137000
|
||||
CVE-2024-29666,0,0,a8926fce030310567330d9b7c126003f732556a2ce979a6a3fd232707f8bbd99,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29684,0,0,35adbae46d02598afd0a71dbdb28a4d3beabc7cfec6e5b8d12f945270a2d26af,2024-03-26T14:15:09.003000
|
||||
CVE-2024-29684,0,1,bf20e1eee3419c30e31b5c1e15077ebe4738914779e007adc0a6cf94ae84179f,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29732,0,0,3aff958eec55f5cf06538251c792be6423021bd21573f6f2f920d098c9ad37bd,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29808,1,1,dfdda526616dfcc103fd0c10987466fb6a625bec74146b0e5edf740cd33e2043,2024-03-26T16:15:12.323000
|
||||
CVE-2024-29809,1,1,a5b095cb4d2640108682d7dba5740e3ef6fecff1dac5a9f242c5dab5775df1fb,2024-03-26T16:15:12.520000
|
||||
CVE-2024-29810,1,1,f7f8d74064bd2b172081cac20782131f7ef02041eb829386d2e0db35cacca59b,2024-03-26T16:15:12.707000
|
||||
CVE-2024-29832,1,1,5e3fb0f1b1251798bc8fb0858a74c0899ba80d10d361b9ddae87aee2ab38426b,2024-03-26T16:15:12.890000
|
||||
CVE-2024-29833,1,1,fb99702e05f65e341974eb78051c31e7106de9e69f04328c281627b24dd08a80,2024-03-26T16:15:13.063000
|
||||
CVE-2024-29735,1,1,1640123dfaaf4d3d57b29169fabd73ad7d0d319282e875da918e047f8134410f,2024-03-26T17:15:47.380000
|
||||
CVE-2024-29808,0,1,1a083356e9d0f501470cdfed0d1c85987d8c8667e4684d7b2ae73ab2fb9e2d44,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29809,0,1,21a6514e4479b2af7c07059597ccbdef1cddc762bb223c6efd7d97d6a6cee8d3,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29810,0,1,eff91a2f0d80ceae6d9d4c914195c5a044b82fbe1cafb4a26b6b9c2e1aa693cf,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29832,0,1,e21971089d12a8b67bd5dc57f7dea93be0cc79e81378beb3ae2f03d4ff6e4c14,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29833,0,1,4c9a8c532b47162f5aea1ac06e294c5bbf9e597d7d17a1d16e86b5dc1293a53a,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29858,0,0,585719d860c91771e96e52d882eed744121f21e899f727afe6b381f4ffbb308d,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29859,0,0,6ebff5730a73f542ffebf0a56f74146bb69314ac3f95118519ec4b678666f245,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29862,0,0,78f62d6320f790cb50cb5767943bbca91d7f9763b83315a1495201af3fd41026,2024-03-21T12:58:51.093000
|
||||
@ -242703,8 +242723,8 @@ CVE-2024-29877,0,0,5b6a7271e346dceec62c9141f9ae12b0e5342a31cc26366c653fe20c26c8b
|
||||
CVE-2024-29878,0,0,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dda8d,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29881,0,0,0cbeaa6b4455ceb05464c9299bb18a36979748161fb0b3f905522ec7bdc3fda0,2024-03-26T14:15:09.070000
|
||||
CVE-2024-29883,0,0,a13d175dd79044f267ec769a7146c8c1184a19310013628d0092737af35ee3bb,2024-03-26T14:15:09.280000
|
||||
CVE-2024-29881,0,1,7eaff78a6eecd508372203508f2ecab97ebc62cfd94b7af6101b5d7b6ca209b2,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29883,0,1,2444d321a867d6f4cdf63bf8a1bc6af3b407752f2134c1f64a1d02545242c426,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29916,0,0,dd300e18b662f862d3dd0881eace85d81be3f3aaeb79c908bcef100a80a89dd1,2024-03-21T19:47:03.943000
|
||||
CVE-2024-29943,0,0,39d573a490fc5d2b219e8af270d3feeff9aa72e4341ddd52f10b0ddfa677f78e,2024-03-22T15:34:43.663000
|
||||
CVE-2024-29944,0,0,4d21f9c7c1ab1ff30cce77b261f7b06b8e28526248b968d986726dab452f24fc,2024-03-25T17:15:51.670000
|
||||
@ -242717,6 +242737,6 @@ CVE-2024-30204,0,0,bf1cbd8aaa2b36eb1f7808443cd1dc94c2d123df04230a458090af1180122
|
||||
CVE-2024-30205,0,0,d8d475f93d08b2037de38fb56b8f07beb7b6f1c5b446fee65bfc13f5246e2c4e,2024-03-25T16:43:06.137000
|
||||
CVE-2024-30231,0,0,00dcdf5dcba695175163cca9e56ccfae3d920c15ab7bb0fd4524c1a6b2477280,2024-03-26T12:55:05.010000
|
||||
CVE-2024-30232,0,0,f91ac1a16b6560e63a231b2b02f73b0e579de91231d5661b2fdb0493e2d31192,2024-03-26T12:55:05.010000
|
||||
CVE-2024-30233,0,0,e9c13e7bc116d4ff17fc52ce9a1f07909d0fd2f48f0fbc5cd03d9165e1a6e14d,2024-03-26T13:15:45.710000
|
||||
CVE-2024-30234,0,0,d453b03d3749bec9b51bf3d51cc8d936e9b7f8658d7100bfdc2940e7bd78eda4,2024-03-26T13:15:45.927000
|
||||
CVE-2024-30235,0,0,1751b9719711549b05b67350384a4df032baceba1f59a2611ab1f37069b1b0f2,2024-03-26T13:15:46.153000
|
||||
CVE-2024-30233,0,1,4c2695d2f3b076c7408bd91fee17c2a607f64636c8c0001f359b0796de1d2054,2024-03-26T17:09:53.043000
|
||||
CVE-2024-30234,0,1,a6be244378f8a1646e756d1cd111fc8fb568601f74deb65508c56b004a03b137,2024-03-26T17:09:53.043000
|
||||
CVE-2024-30235,0,1,ef6f7f84deca979173abd2d122dde5dfb4f5568a80e848e8fa95eae1319c946f,2024-03-26T17:09:53.043000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user