Auto-Update: 2024-03-26T19:00:30.705758+00:00

This commit is contained in:
cad-safe-bot 2024-03-26 19:03:22 +00:00
parent 1943884302
commit afa2f7c07b
72 changed files with 1212 additions and 199 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33855",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-26T14:15:07.903",
"lastModified": "2024-03-26T14:15:07.903",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41969",
"sourceIdentifier": "cve@zscaler.com",
"published": "2024-03-26T15:15:48.203",
"lastModified": "2024-03-26T15:15:48.203",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41972",
"sourceIdentifier": "cve@zscaler.com",
"published": "2024-03-26T15:15:48.407",
"lastModified": "2024-03-26T15:15:48.407",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41973",
"sourceIdentifier": "cve@zscaler.com",
"published": "2024-03-26T15:15:48.613",
"lastModified": "2024-03-26T15:15:48.613",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-44989",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-26T18:15:08.273",
"lastModified": "2024-03-26T18:15:08.273",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Insertion of Sensitive Information into Log File vulnerability in GSheetConnector CF7 Google Sheets Connector.This issue affects CF7 Google Sheets Connector: from n/a through 5.0.5.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/cf7-google-sheets-connector/wordpress-cf7-google-sheets-connector-plugin-5-0-5-sensitive-data-exposure-via-debug-log-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47150",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-26T14:15:08.173",
"lastModified": "2024-03-26T14:15:08.173",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50894",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-26T15:15:48.797",
"lastModified": "2024-03-26T15:15:48.797",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50895",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-26T15:15:48.860",
"lastModified": "2024-03-26T15:15:48.860",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52214",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-26T13:15:44.857",
"lastModified": "2024-03-26T13:15:44.857",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-52621",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-26T18:15:08.817",
"lastModified": "2024-03-26T18:15:08.817",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check rcu_read_lock_trace_held() before calling bpf map helpers\n\nThese three bpf_map_{lookup,update,delete}_elem() helpers are also\navailable for sleepable bpf program, so add the corresponding lock\nassertion for sleepable bpf program, otherwise the following warning\nwill be reported when a sleepable bpf program manipulates bpf map under\ninterpreter mode (aka bpf_jit_enable=0):\n\n WARNING: CPU: 3 PID: 4985 at kernel/bpf/helpers.c:40 ......\n CPU: 3 PID: 4985 Comm: test_progs Not tainted 6.6.0+ #2\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) ......\n RIP: 0010:bpf_map_lookup_elem+0x54/0x60\n ......\n Call Trace:\n <TASK>\n ? __warn+0xa5/0x240\n ? bpf_map_lookup_elem+0x54/0x60\n ? report_bug+0x1ba/0x1f0\n ? handle_bug+0x40/0x80\n ? exc_invalid_op+0x18/0x50\n ? asm_exc_invalid_op+0x1b/0x20\n ? __pfx_bpf_map_lookup_elem+0x10/0x10\n ? rcu_lockdep_current_cpu_online+0x65/0xb0\n ? rcu_is_watching+0x23/0x50\n ? bpf_map_lookup_elem+0x54/0x60\n ? __pfx_bpf_map_lookup_elem+0x10/0x10\n ___bpf_prog_run+0x513/0x3b70\n __bpf_prog_run32+0x9d/0xd0\n ? __bpf_prog_enter_sleepable_recur+0xad/0x120\n ? __bpf_prog_enter_sleepable_recur+0x3e/0x120\n bpf_trampoline_6442580665+0x4d/0x1000\n __x64_sys_getpgid+0x5/0x30\n ? do_syscall_64+0x36/0xb0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n </TASK>"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/169410eba271afc9f0fb476d996795aa26770c6d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/483cb92334cd7f1d5387dccc0ab5d595d27a669d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c7f1b6146f4a46d727c0d046284c28b6882c6304",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d6d6fe4bb105595118f12abeed4a7bdd450853f3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2023-52622",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-26T18:15:08.873",
"lastModified": "2024-03-26T18:15:08.873",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid online resizing failures due to oversized flex bg\n\nWhen we online resize an ext4 filesystem with a oversized flexbg_size,\n\n mkfs.ext4 -F -G 67108864 $dev -b 4096 100M\n mount $dev $dir\n resize2fs $dev 16G\n\nthe following WARN_ON is triggered:\n==================================================================\nWARNING: CPU: 0 PID: 427 at mm/page_alloc.c:4402 __alloc_pages+0x411/0x550\nModules linked in: sg(E)\nCPU: 0 PID: 427 Comm: resize2fs Tainted: G E 6.6.0-rc5+ #314\nRIP: 0010:__alloc_pages+0x411/0x550\nCall Trace:\n <TASK>\n __kmalloc_large_node+0xa2/0x200\n __kmalloc+0x16e/0x290\n ext4_resize_fs+0x481/0xd80\n __ext4_ioctl+0x1616/0x1d90\n ext4_ioctl+0x12/0x20\n __x64_sys_ioctl+0xf0/0x150\n do_syscall_64+0x3b/0x90\n==================================================================\n\nThis is because flexbg_size is too large and the size of the new_group_data\narray to be allocated exceeds MAX_ORDER. Currently, the minimum value of\nMAX_ORDER is 8, the minimum value of PAGE_SIZE is 4096, the corresponding\nmaximum number of groups that can be allocated is:\n\n (PAGE_SIZE << MAX_ORDER) / sizeof(struct ext4_new_group_data) \u2248 21845\n\nAnd the value that is down-aligned to the power of 2 is 16384. Therefore,\nthis value is defined as MAX_RESIZE_BG, and the number of groups added\neach time does not exceed this value during resizing, and is added multiple\ntimes to complete the online resizing. The difference is that the metadata\nin a flex_bg may be more dispersed."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/5d1935ac02ca5aee364a449a35e2977ea84509b0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/6d2cbf517dcabc093159cf138ad5712c9c7fa954",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8b1413dbfe49646eda2c00c0f1144ee9d3368e0c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b183fe8702e78bba3dcef8e7193cab6898abee07",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cd1f93ca97a9136989f3bd2bf90696732a2ed644",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cfbbb3199e71b63fc26cee0ebff327c47128a1e8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d76c8d7ffe163c6bf2f1ef680b0539c2b3902b90",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/dc3e0f55bec4410f3d74352c4a7c79f518088ee2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2023-52623",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-26T18:15:08.930",
"lastModified": "2024-03-26T18:15:08.930",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix a suspicious RCU usage warning\n\nI received the following warning while running cthon against an ontap\nserver running pNFS:\n\n[ 57.202521] =============================\n[ 57.202522] WARNING: suspicious RCU usage\n[ 57.202523] 6.7.0-rc3-g2cc14f52aeb7 #41492 Not tainted\n[ 57.202525] -----------------------------\n[ 57.202525] net/sunrpc/xprtmultipath.c:349 RCU-list traversed in non-reader section!!\n[ 57.202527]\n other info that might help us debug this:\n\n[ 57.202528]\n rcu_scheduler_active = 2, debug_locks = 1\n[ 57.202529] no locks held by test5/3567.\n[ 57.202530]\n stack backtrace:\n[ 57.202532] CPU: 0 PID: 3567 Comm: test5 Not tainted 6.7.0-rc3-g2cc14f52aeb7 #41492 5b09971b4965c0aceba19f3eea324a4a806e227e\n[ 57.202534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS unknown 2/2/2022\n[ 57.202536] Call Trace:\n[ 57.202537] <TASK>\n[ 57.202540] dump_stack_lvl+0x77/0xb0\n[ 57.202551] lockdep_rcu_suspicious+0x154/0x1a0\n[ 57.202556] rpc_xprt_switch_has_addr+0x17c/0x190 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202596] rpc_clnt_setup_test_and_add_xprt+0x50/0x180 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202621] ? rpc_clnt_add_xprt+0x254/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202646] rpc_clnt_add_xprt+0x27a/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202671] ? __pfx_rpc_clnt_setup_test_and_add_xprt+0x10/0x10 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202696] nfs4_pnfs_ds_connect+0x345/0x760 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202728] ? __pfx_nfs4_test_session_trunk+0x10/0x10 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202754] nfs4_fl_prepare_ds+0x75/0xc0 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a]\n[ 57.202760] filelayout_write_pagelist+0x4a/0x200 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a]\n[ 57.202765] pnfs_generic_pg_writepages+0xbe/0x230 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202788] __nfs_pageio_add_request+0x3fd/0x520 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202813] nfs_pageio_add_request+0x18b/0x390 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202831] nfs_do_writepage+0x116/0x1e0 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202849] nfs_writepages_callback+0x13/0x30 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202866] write_cache_pages+0x265/0x450\n[ 57.202870] ? __pfx_nfs_writepages_callback+0x10/0x10 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202891] nfs_writepages+0x141/0x230 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202913] do_writepages+0xd2/0x230\n[ 57.202917] ? filemap_fdatawrite_wbc+0x5c/0x80\n[ 57.202921] filemap_fdatawrite_wbc+0x67/0x80\n[ 57.202924] filemap_write_and_wait_range+0xd9/0x170\n[ 57.202930] nfs_wb_all+0x49/0x180 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202947] nfs4_file_flush+0x72/0xb0 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202969] __se_sys_close+0x46/0xd0\n[ 57.202972] do_syscall_64+0x68/0x100\n[ 57.202975] ? do_syscall_64+0x77/0x100\n[ 57.202976] ? do_syscall_64+0x77/0x100\n[ 57.202979] entry_SYSCALL_64_after_hwframe+0x6e/0x76\n[ 57.202982] RIP: 0033:0x7fe2b12e4a94\n[ 57.202985] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 80 3d d5 18 0e 00 00 74 13 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 44 c3 0f 1f 00 48 83 ec 18 89 7c 24 0c e8 c3\n[ 57.202987] RSP: 002b:00007ffe857ddb38 EFLAGS: 00000202 ORIG_RAX: 0000000000000003\n[ 57.202989] RAX: ffffffffffffffda RBX: 00007ffe857dfd68 RCX: 00007fe2b12e4a94\n[ 57.202991] RDX: 0000000000002000 RSI: 00007ffe857ddc40 RDI: 0000000000000003\n[ 57.202992] RBP: 00007ffe857dfc50 R08: 7fffffffffffffff R09: 0000000065650f49\n[ 57.202993] R10: 00007f\n---truncated---"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/31b62908693c90d4d07db597e685d9f25a120073",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/69c7eeb4f622c2a28da965f970f982db171f3dc6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7a96d85bf196c170dcf1b47a82e9bb97cca69aa6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8f860c8407470baff2beb9982ad6b172c94f1d0a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c430e6bb43955c6bf573665fcebf31694925b9f7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e8ca3e73301e23e8c0ac0ce2e6bac4545cd776e0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f8cf4dabbdcb8bef85335b0ed7ad5b25fd82ff56",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fece80a2a6718ed58487ce397285bb1b83a3e54e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-52624",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-26T18:15:08.990",
"lastModified": "2024-03-26T18:15:08.990",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Wake DMCUB before executing GPINT commands\n\n[Why]\nDMCUB can be in idle when we attempt to interface with the HW through\nthe GPINT mailbox resulting in a system hang.\n\n[How]\nAdd dc_wake_and_execute_gpint() to wrap the wake, execute, sleep\nsequence.\n\nIf the GPINT executes successfully then DMCUB will be put back into\nsleep after the optional response is returned.\n\nIt functions similar to the inbox command interface."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/2ef98c6d753a744e333b7e34b9cf687040fba57d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e5ffd1263dd5b44929c676171802e7b6af483f21",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-52625",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-26T18:15:09.040",
"lastModified": "2024-03-26T18:15:09.040",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Refactor DMCUB enter/exit idle interface\n\n[Why]\nWe can hang in place trying to send commands when the DMCUB isn't\npowered on.\n\n[How]\nWe need to exit out of the idle state prior to sending a command,\nbut the process that performs the exit also invokes a command itself.\n\nFixing this issue involves the following:\n\n1. Using a software state to track whether or not we need to start\n the process to exit idle or notify idle.\n\nIt's possible for the hardware to have exited an idle state without\ndriver knowledge, but entering one is always restricted to a driver\nallow - which makes the SW state vs HW state mismatch issue purely one\nof optimization, which should seldomly be hit, if at all.\n\n2. Refactor any instances of exit/notify idle to use a single wrapper\n that maintains this SW state.\n\nThis works simialr to dc_allow_idle_optimizations, but works at the\nDMCUB level and makes sure the state is marked prior to any notify/exit\nidle so we don't enter an infinite loop.\n\n3. Make sure we exit out of idle prior to sending any commands or\n waiting for DMCUB idle.\n\nThis patch takes care of 1/2. A future patch will take care of wrapping\nDMCUB command submission with calls to this new interface."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/820c3870c491946a78950cdf961bf40e28c1025f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8e57c06bf4b0f51a4d6958e15e1a99c9520d00fa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-52626",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-26T18:15:09.087",
"lastModified": "2024-03-26T18:15:09.087",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix operation precedence bug in port timestamping napi_poll context\n\nIndirection (*) is of lower precedence than postfix increment (++). Logic\nin napi_poll context would cause an out-of-bound read by first increment\nthe pointer address by byte address space and then dereference the value.\nRather, the intended logic was to dereference first and then increment the\nunderlying value."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/33cdeae8c6fb58cc445f859b67c014dc9f60b4e0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3876638b2c7ebb2c9d181de1191db0de8cac143a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/40e0d0746390c5b0c31144f4f1688d72f3f8d790",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2023-52627",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-26T18:15:09.140",
"lastModified": "2024-03-26T18:15:09.140",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: adc: ad7091r: Allow users to configure device events\n\nAD7091R-5 devices are supported by the ad7091r-5 driver together with\nthe ad7091r-base driver. Those drivers declared iio events for notifying\nuser space when ADC readings fall bellow the thresholds of low limit\nregisters or above the values set in high limit registers.\nHowever, to configure iio events and their thresholds, a set of callback\nfunctions must be implemented and those were not present until now.\nThe consequence of trying to configure ad7091r-5 events without the\nproper callback functions was a null pointer dereference in the kernel\nbecause the pointers to the callback functions were not set.\n\nImplement event configuration callbacks allowing users to read/write\nevent thresholds and enable/disable event generation.\n\nSince the event spec structs are generic to AD7091R devices, also move\nthose from the ad7091r-5 driver the base driver so they can be reused\nwhen support for ad7091r-2/-4/-8 be added."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/020e71c7ffc25dfe29ed9be6c2d39af7bd7f661f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/137568aa540a9f587c48ff7d4c51cdba08cfe9a4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/1eba6f7ffa295a0eec098c107043074be7cc4ec5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/49f322ce1f265935f15e5512da69a399f27a5091",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/55aca2ce91a63740278502066beaddbd841af9c6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/89c4e63324e208a23098f7fb15c00487cecbfed2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1086",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2024-01-31T13:15:10.827",
"lastModified": "2024-02-06T02:15:08.303",
"lastModified": "2024-03-26T18:15:09.193",
"vulnStatus": "Modified",
"descriptions": [
{
@ -127,6 +127,10 @@
"Patch"
]
},
{
"url": "https://github.com/Notselwyn/CVE-2024-1086",
"source": "cve-coordination@google.com"
},
{
"url": "https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660",
"source": "cve-coordination@google.com",
@ -137,6 +141,14 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/",
"source": "cve-coordination@google.com"
},
{
"url": "https://news.ycombinator.com/item?id=39828424",
"source": "cve-coordination@google.com"
},
{
"url": "https://pwning.tech/nftables/",
"source": "cve-coordination@google.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-1313",
"sourceIdentifier": "security@grafana.com",
"published": "2024-03-26T18:15:09.350",
"lastModified": "2024-03-26T18:15:09.350",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized.\n\nGrafana Labs would like to thank Ravid Mazon and Jay Chen of Palo \nAlto Research for discovering and disclosing this vulnerability.\n\nThis issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@grafana.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@grafana.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://grafana.com/security/security-advisories/cve-2024-1313/",
"source": "security@grafana.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1455",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-03-26T14:15:08.450",
"lastModified": "2024-03-26T14:15:08.450",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1933",
"sourceIdentifier": "psirt@teamviewer.com",
"published": "2024-03-26T13:15:45.077",
"lastModified": "2024-03-26T13:15:45.077",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21912",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-03-26T16:15:10.440",
"lastModified": "2024-03-26T16:15:10.440",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21913",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-03-26T16:15:10.670",
"lastModified": "2024-03-26T16:15:10.670",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21918",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-03-26T16:15:10.877",
"lastModified": "2024-03-26T16:15:10.877",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21919",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-03-26T16:15:11.073",
"lastModified": "2024-03-26T16:15:11.073",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21920",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-03-26T16:15:11.277",
"lastModified": "2024-03-26T16:15:11.277",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22156",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-26T13:15:45.277",
"lastModified": "2024-03-26T13:15:45.277",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22356",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-26T15:15:48.920",
"lastModified": "2024-03-26T15:15:48.920",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2212",
"sourceIdentifier": "emo@eclipse.org",
"published": "2024-03-26T16:15:13.233",
"lastModified": "2024-03-26T16:15:13.233",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2214",
"sourceIdentifier": "emo@eclipse.org",
"published": "2024-03-26T16:15:13.430",
"lastModified": "2024-03-26T16:15:13.430",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23482",
"sourceIdentifier": "cve@zscaler.com",
"published": "2024-03-26T15:15:49.130",
"lastModified": "2024-03-26T15:15:49.130",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23722",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-26T15:15:49.317",
"lastModified": "2024-03-26T15:15:49.317",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2452",
"sourceIdentifier": "emo@eclipse.org",
"published": "2024-03-26T16:15:13.623",
"lastModified": "2024-03-26T16:15:13.623",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25956",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-03-26T16:15:11.520",
"lastModified": "2024-03-26T16:15:11.520",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25957",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-03-26T16:15:11.727",
"lastModified": "2024-03-26T16:15:11.727",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25958",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-03-26T16:15:11.917",
"lastModified": "2024-03-26T16:15:11.917",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,9 +2,8 @@
"id": "CVE-2024-2553",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-17T04:15:07.073",
"lastModified": "2024-03-21T02:52:37.573",
"lastModified": "2024-03-26T17:15:47.490",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -77,6 +76,10 @@
}
],
"references": [
{
"url": "https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/CVE-2024-2553%20-%20Product%20Rating%20System%20-%20Cross-Site-Scripting.md",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/Product%20Rating%20System%20-%20Cross-Site-Scripting-1.md",
"source": "cna@vuldb.com"
@ -88,6 +91,10 @@
{
"url": "https://vuldb.com/?id.257052",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.298886",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26644",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-26T16:15:12.137",
"lastModified": "2024-03-26T16:15:12.137",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26645",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-26T16:15:12.207",
"lastModified": "2024-03-26T16:15:12.207",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-26646",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-26T18:15:09.910",
"lastModified": "2024-03-26T18:15:09.910",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal: intel: hfi: Add syscore callbacks for system-wide PM\n\nThe kernel allocates a memory buffer and provides its location to the\nhardware, which uses it to update the HFI table. This allocation occurs\nduring boot and remains constant throughout runtime.\n\nWhen resuming from hibernation, the restore kernel allocates a second\nmemory buffer and reprograms the HFI hardware with the new location as\npart of a normal boot. The location of the second memory buffer may\ndiffer from the one allocated by the image kernel.\n\nWhen the restore kernel transfers control to the image kernel, its HFI\nbuffer becomes invalid, potentially leading to memory corruption if the\nhardware writes to it (the hardware continues to use the buffer from the\nrestore kernel).\n\nIt is also possible that the hardware \"forgets\" the address of the memory\nbuffer when resuming from \"deep\" suspend. Memory corruption may also occur\nin such a scenario.\n\nTo prevent the described memory corruption, disable HFI when preparing to\nsuspend or hibernate. Enable it when resuming.\n\nAdd syscore callbacks to handle the package of the boot CPU (packages of\nnon-boot CPUs are handled via CPU offline). Syscore ops always run on the\nboot CPU. Additionally, HFI only needs to be disabled during \"deep\" suspend\nand hibernation. Syscore ops only run in these cases.\n\n[ rjw: Comment adjustment, subject and changelog edits ]"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/019ccc66d56a696a4dfee3bfa2f04d0a7c3d89ee",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/28f010dc50df0f7987c04112114fcfa7e0803566",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/97566d09fd02d2ab329774bb89a2cdf2267e86d9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c9d6d63b6c03afaa6f185df249af693a7939577c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-26647",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-26T18:15:10.063",
"lastModified": "2024-03-26T18:15:10.063",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'\n\nIn link_set_dsc_pps_packet(), 'struct display_stream_compressor *dsc'\nwas dereferenced in a DC_LOGGER_INIT(dsc->ctx->logger); before the 'dsc'\nNULL pointer check.\n\nFixes the below:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/link/link_dpms.c:905 link_set_dsc_pps_packet() warn: variable dereferenced before check 'dsc' (see line 903)"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/3bb9b1f958c3d986ed90a3ff009f1e77e9553207",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/6aa5ede6665122f4c8abce3c6eba06b49e54d25c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cf656fc7276e5b3709a81bc9d9639459be2b2647",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-26648",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-26T18:15:10.220",
"lastModified": "2024-03-26T18:15:10.220",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()\n\nIn edp_setup_replay(), 'struct dc *dc' & 'struct dmub_replay *replay'\nwas dereferenced before the pointer 'link' & 'replay' NULL check.\n\nFixes the below:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/link/protocols/link_edp_panel_control.c:947 edp_setup_replay() warn: variable dereferenced before check 'link' (see line 933)"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/22ae604aea14756954e1c00ae653e34d2afd2935",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7073934f5d73f8b53308963cee36f0d389ea857c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c02d257c654191ecda1dc1af6875d527e85310e7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-26649",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-26T18:15:10.370",
"lastModified": "2024-03-26T18:15:10.370",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix the null pointer when load rlc firmware\n\nIf the RLC firmware is invalid because of wrong header size,\nthe pointer to the rlc firmware is released in function\namdgpu_ucode_request. There will be a null pointer error\nin subsequent use. So skip validation to fix it."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/8b5bacce2d13dbe648f0bfd3f738ecce8db4978c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/bc03c02cc1991a066b23e69bbcc0f66e8f1f7453",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d3887448486caeef9687fb5dfebd4ff91e0f25aa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-26650",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-26T18:15:10.530",
"lastModified": "2024-03-26T18:15:10.530",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe\n\np2sb_bar() unhides P2SB device to get resources from the device. It\nguards the operation by locking pci_rescan_remove_lock so that parallel\nrescans do not find the P2SB device. However, this lock causes deadlock\nwhen PCI bus rescan is triggered by /sys/bus/pci/rescan. The rescan\nlocks pci_rescan_remove_lock and probes PCI devices. When PCI devices\ncall p2sb_bar() during probe, it locks pci_rescan_remove_lock again.\nHence the deadlock.\n\nTo avoid the deadlock, do not lock pci_rescan_remove_lock in p2sb_bar().\nInstead, do the lock at fs_initcall. Introduce p2sb_cache_resources()\nfor fs_initcall which gets and caches the P2SB resources. At p2sb_bar(),\nrefer the cache and return to the caller.\n\nBefore operating the device at P2SB DEVFN for resource cache, check\nthat its device class is PCI_CLASS_MEMORY_OTHER 0x0580 that PCH\nspecifications define. This avoids unexpected operation to other devices\nat the same DEVFN.\n\nTested-by Klara Modin <klarasmodin@gmail.com>"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/2841631a03652f32b595c563695d0461072e0de4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5913320eb0b3ec88158cfcb0fa5e996bf4ef681b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/847e1eb30e269a094da046c08273abe3f3361cf2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d281ac9a987c553d93211b90fd4fe97d8eca32cd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-27756",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-15T07:15:09.923",
"lastModified": "2024-03-15T12:53:06.423",
"lastModified": "2024-03-26T18:15:10.693",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue in GLPI v.10.0.12 and before allows a remote attacker to execute arbitrary code, escalate privileges, and obtain sensitive information via a crafted script to the title field."
"value": "GLPI through 10.0.12 allows CSV injection by an attacker who is able to create an asset with a crafted title."
},
{
"lang": "es",
"value": "Un problema en GLPI v.10.0.12 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de un script manipulado en el campo de t\u00edtulo."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2891",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-26T14:15:09.530",
"lastModified": "2024-03-26T14:15:09.530",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2892",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-26T16:15:13.853",
"lastModified": "2024-03-26T16:15:13.853",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-2893",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-26T17:15:47.810",
"lastModified": "2024-03-26T17:15:47.810",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Tenda AC7 15.03.06.44 and classified as critical. Affected by this issue is the function formSetDeviceName of the file /goform/SetOnlineDevName. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257936. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formSetDeviceName_devName.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257936",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257936",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.300356",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-2894",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-26T17:15:48.080",
"lastModified": "2024-03-26T17:15:48.080",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Tenda AC7 15.03.06.44. It has been classified as critical. This affects the function formSetQosBand of the file /goform/SetNetControlList. The manipulation of the argument list leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257937 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formSetQosBand.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257937",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257937",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.300357",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-2895",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-26T18:15:10.893",
"lastModified": "2024-03-26T18:15:10.893",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Tenda AC7 15.03.06.44. It has been declared as critical. This vulnerability affects the function formWifiWpsOOB of the file /goform/WifiWpsOOB. The manipulation of the argument index leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257938 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formWifiWpsOOB.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257938",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257938",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.300358",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-2896",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-26T18:15:11.543",
"lastModified": "2024-03-26T18:15:11.543",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Tenda AC7 15.03.06.44. It has been rated as critical. This issue affects the function formWifiWpsStart of the file /goform/WifiWpsStart. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257939. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formWifiWpsStart.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257939",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257939",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.300359",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29197",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-26T15:15:49.390",
"lastModified": "2024-03-26T15:15:49.390",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29203",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-26T14:15:08.747",
"lastModified": "2024-03-26T14:15:08.747",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29401",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-26T15:15:49.620",
"lastModified": "2024-03-26T15:15:49.620",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29684",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-26T14:15:09.003",
"lastModified": "2024-03-26T14:15:09.003",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2024-29735",
"sourceIdentifier": "security@apache.org",
"published": "2024-03-26T17:15:47.380",
"lastModified": "2024-03-26T17:15:47.380",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Preservation of Permissions vulnerability in Apache Airflow.This issue affects Apache Airflow from 2.8.2 through 2.8.3.\n\nAirflow's local file task handler in Airflow incorrectly set permissions for all parent folders of log folder, in default configuration adding write access to Unix group\u00a0of the folders. In the case Airflow is run with the root user (not recommended) it added group write permission to all folders up to the root of the filesystem.\n\nIf your log files are stored in the home directory, these permission changes might impact your ability to run SSH operations after your home directory becomes group-writeable.\n\nThis issue does not affect users who use or extend Airflow using Official Airflow Docker reference images ( https://hub.docker.com/r/apache/airflow/ ) - those images require to have group write permission set anyway.\n\nYou are affected only if you install Airflow using local installation / virtualenv or other Docker images, but the issue has no impact if docker containers are used as intended, i.e. where Airflow components do not share containers with other applications and users.\n\nAlso you should not be affected if your umask is 002 (group write enabled) - this is the default on many linux systems.\n\nRecommendation for users using Airflow outside of the containers:\n\n * if you are using root to run Airflow, change your Airflow user to use non-root\n * upgrade Apache Airflow to 2.8.4 or above\n * If you prefer not to upgrade, you can change the https://airflow.apache.org/docs/apache-airflow/stable/configurations-ref.html#file-task-handler-new-folder-permissions \u00a0to 0o755 (original value 0o775).\n * if you already ran Airflow tasks before and your default umask is 022 (group write disabled) you should stop Airflow components, check permissions of AIRFLOW_HOME/logs\u00a0in all your components and all parent directories of this directory and remove group write access for all the parent directories\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-281"
}
]
}
],
"references": [
{
"url": "https://github.com/apache/airflow/pull/37310",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/8khb1rtbznh100o325fb8xw5wjvtv536",
"source": "security@apache.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29808",
"sourceIdentifier": "info@appcheck-ng.com",
"published": "2024-03-26T16:15:12.323",
"lastModified": "2024-03-26T16:15:12.323",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29809",
"sourceIdentifier": "info@appcheck-ng.com",
"published": "2024-03-26T16:15:12.520",
"lastModified": "2024-03-26T16:15:12.520",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29810",
"sourceIdentifier": "info@appcheck-ng.com",
"published": "2024-03-26T16:15:12.707",
"lastModified": "2024-03-26T16:15:12.707",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29832",
"sourceIdentifier": "info@appcheck-ng.com",
"published": "2024-03-26T16:15:12.890",
"lastModified": "2024-03-26T16:15:12.890",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29833",
"sourceIdentifier": "info@appcheck-ng.com",
"published": "2024-03-26T16:15:13.063",
"lastModified": "2024-03-26T16:15:13.063",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29881",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-26T14:15:09.070",
"lastModified": "2024-03-26T14:15:09.070",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29883",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-26T14:15:09.280",
"lastModified": "2024-03-26T14:15:09.280",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2906",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-26T13:15:45.497",
"lastModified": "2024-03-26T13:15:45.497",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2915",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-03-26T16:15:14.117",
"lastModified": "2024-03-26T16:15:14.117",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2921",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-03-26T16:15:14.173",
"lastModified": "2024-03-26T16:15:14.173",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2929",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-03-26T16:15:14.230",
"lastModified": "2024-03-26T16:15:14.230",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2951",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-26T18:15:12.160",
"lastModified": "2024-03-26T18:15:12.160",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Metagauss RegistrationMagic.This issue affects RegistrationMagic: from n/a through 5.3.0.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/custom-registration-form-builder-with-submission-manager/wordpress-registrationmagic-plugin-5-3-0-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30233",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-26T13:15:45.710",
"lastModified": "2024-03-26T13:15:45.710",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30234",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-26T13:15:45.927",
"lastModified": "2024-03-26T13:15:45.927",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30235",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-26T13:15:46.153",
"lastModified": "2024-03-26T13:15:46.153",
"vulnStatus": "Received",
"lastModified": "2024-03-26T17:09:53.043",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -1,13 +1,9 @@
# nvd-json-data-feeds
---
[![monitor-release](https://github.com/fkie-cad/nvd-json-data-feeds/actions/workflows/monitor_release.yml/badge.svg)](https://github.com/fkie-cad/nvd-json-data-feeds/actions/workflows/monitor_release.yml)
[![monitor-sync](https://github.com/fkie-cad/nvd-json-data-feeds/actions/workflows/monitor_sync.yml/badge.svg)](https://github.com/fkie-cad/nvd-json-data-feeds/actions/workflows/monitor_sync.yml)
[![validate-schema](https://github.com/fkie-cad/nvd-json-data-feeds/actions/workflows/validate_schema.yml/badge.svg)](https://github.com/fkie-cad/nvd-json-data-feeds/actions/workflows/validate_schema.yml)
---
Community reconstruction of the deprecated JSON NVD Data Feeds.
[Releases](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) each day at 00:00 AM UTC.
Repository synchronizes with the NVD every 2 hours.
@ -17,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-26T17:01:08.948640+00:00
2024-03-26T19:00:30.705758+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-26T16:15:14.230000+00:00
2024-03-26T18:15:12.160000+00:00
```
### Last Data Feed Release
@ -37,51 +33,64 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
242721
242741
```
### CVEs added in the last Commit
Recently added CVEs: `34`
Recently added CVEs: `20`
\* [CVE-2024-21919](CVE-2024/CVE-2024-219xx/CVE-2024-21919.json) (`2024-03-26T16:15:11.073`)
\* [CVE-2024-21920](CVE-2024/CVE-2024-219xx/CVE-2024-21920.json) (`2024-03-26T16:15:11.277`)
\* [CVE-2024-2212](CVE-2024/CVE-2024-22xx/CVE-2024-2212.json) (`2024-03-26T16:15:13.233`)
\* [CVE-2024-2214](CVE-2024/CVE-2024-22xx/CVE-2024-2214.json) (`2024-03-26T16:15:13.430`)
\* [CVE-2024-22356](CVE-2024/CVE-2024-223xx/CVE-2024-22356.json) (`2024-03-26T15:15:48.920`)
\* [CVE-2024-23482](CVE-2024/CVE-2024-234xx/CVE-2024-23482.json) (`2024-03-26T15:15:49.130`)
\* [CVE-2024-23722](CVE-2024/CVE-2024-237xx/CVE-2024-23722.json) (`2024-03-26T15:15:49.317`)
\* [CVE-2024-2452](CVE-2024/CVE-2024-24xx/CVE-2024-2452.json) (`2024-03-26T16:15:13.623`)
\* [CVE-2024-25956](CVE-2024/CVE-2024-259xx/CVE-2024-25956.json) (`2024-03-26T16:15:11.520`)
\* [CVE-2024-25957](CVE-2024/CVE-2024-259xx/CVE-2024-25957.json) (`2024-03-26T16:15:11.727`)
\* [CVE-2024-25958](CVE-2024/CVE-2024-259xx/CVE-2024-25958.json) (`2024-03-26T16:15:11.917`)
\* [CVE-2024-26644](CVE-2024/CVE-2024-266xx/CVE-2024-26644.json) (`2024-03-26T16:15:12.137`)
\* [CVE-2024-26645](CVE-2024/CVE-2024-266xx/CVE-2024-26645.json) (`2024-03-26T16:15:12.207`)
\* [CVE-2024-2802](CVE-2024/CVE-2024-28xx/CVE-2024-2802.json) (`2024-03-26T15:15:49.677`)
\* [CVE-2024-2892](CVE-2024/CVE-2024-28xx/CVE-2024-2892.json) (`2024-03-26T16:15:13.853`)
\* [CVE-2024-2915](CVE-2024/CVE-2024-29xx/CVE-2024-2915.json) (`2024-03-26T16:15:14.117`)
\* [CVE-2024-29197](CVE-2024/CVE-2024-291xx/CVE-2024-29197.json) (`2024-03-26T15:15:49.390`)
\* [CVE-2024-2921](CVE-2024/CVE-2024-29xx/CVE-2024-2921.json) (`2024-03-26T16:15:14.173`)
\* [CVE-2024-2929](CVE-2024/CVE-2024-29xx/CVE-2024-2929.json) (`2024-03-26T16:15:14.230`)
\* [CVE-2024-29401](CVE-2024/CVE-2024-294xx/CVE-2024-29401.json) (`2024-03-26T15:15:49.620`)
\* [CVE-2024-29808](CVE-2024/CVE-2024-298xx/CVE-2024-29808.json) (`2024-03-26T16:15:12.323`)
\* [CVE-2024-29809](CVE-2024/CVE-2024-298xx/CVE-2024-29809.json) (`2024-03-26T16:15:12.520`)
\* [CVE-2024-29810](CVE-2024/CVE-2024-298xx/CVE-2024-29810.json) (`2024-03-26T16:15:12.707`)
\* [CVE-2024-29832](CVE-2024/CVE-2024-298xx/CVE-2024-29832.json) (`2024-03-26T16:15:12.890`)
\* [CVE-2024-29833](CVE-2024/CVE-2024-298xx/CVE-2024-29833.json) (`2024-03-26T16:15:13.063`)
\* [CVE-2023-44989](CVE-2023/CVE-2023-449xx/CVE-2023-44989.json) (`2024-03-26T18:15:08.273`)
\* [CVE-2023-52621](CVE-2023/CVE-2023-526xx/CVE-2023-52621.json) (`2024-03-26T18:15:08.817`)
\* [CVE-2023-52622](CVE-2023/CVE-2023-526xx/CVE-2023-52622.json) (`2024-03-26T18:15:08.873`)
\* [CVE-2023-52623](CVE-2023/CVE-2023-526xx/CVE-2023-52623.json) (`2024-03-26T18:15:08.930`)
\* [CVE-2023-52624](CVE-2023/CVE-2023-526xx/CVE-2023-52624.json) (`2024-03-26T18:15:08.990`)
\* [CVE-2023-52625](CVE-2023/CVE-2023-526xx/CVE-2023-52625.json) (`2024-03-26T18:15:09.040`)
\* [CVE-2023-52626](CVE-2023/CVE-2023-526xx/CVE-2023-52626.json) (`2024-03-26T18:15:09.087`)
\* [CVE-2023-52627](CVE-2023/CVE-2023-526xx/CVE-2023-52627.json) (`2024-03-26T18:15:09.140`)
\* [CVE-2024-1313](CVE-2024/CVE-2024-13xx/CVE-2024-1313.json) (`2024-03-26T18:15:09.350`)
\* [CVE-2024-26646](CVE-2024/CVE-2024-266xx/CVE-2024-26646.json) (`2024-03-26T18:15:09.910`)
\* [CVE-2024-26647](CVE-2024/CVE-2024-266xx/CVE-2024-26647.json) (`2024-03-26T18:15:10.063`)
\* [CVE-2024-26648](CVE-2024/CVE-2024-266xx/CVE-2024-26648.json) (`2024-03-26T18:15:10.220`)
\* [CVE-2024-26649](CVE-2024/CVE-2024-266xx/CVE-2024-26649.json) (`2024-03-26T18:15:10.370`)
\* [CVE-2024-26650](CVE-2024/CVE-2024-266xx/CVE-2024-26650.json) (`2024-03-26T18:15:10.530`)
\* [CVE-2024-2893](CVE-2024/CVE-2024-28xx/CVE-2024-2893.json) (`2024-03-26T17:15:47.810`)
\* [CVE-2024-2894](CVE-2024/CVE-2024-28xx/CVE-2024-2894.json) (`2024-03-26T17:15:48.080`)
\* [CVE-2024-2895](CVE-2024/CVE-2024-28xx/CVE-2024-2895.json) (`2024-03-26T18:15:10.893`)
\* [CVE-2024-2896](CVE-2024/CVE-2024-28xx/CVE-2024-2896.json) (`2024-03-26T18:15:11.543`)
\* [CVE-2024-2951](CVE-2024/CVE-2024-29xx/CVE-2024-2951.json) (`2024-03-26T18:15:12.160`)
\* [CVE-2024-29735](CVE-2024/CVE-2024-297xx/CVE-2024-29735.json) (`2024-03-26T17:15:47.380`)
### CVEs modified in the last Commit
Recently modified CVEs: `7`
Recently modified CVEs: `50`
\* [CVE-2023-40547](CVE-2023/CVE-2023-405xx/CVE-2023-40547.json) (`2024-03-26T16:15:08.220`)
\* [CVE-2023-40548](CVE-2023/CVE-2023-405xx/CVE-2023-40548.json) (`2024-03-26T16:15:09.080`)
\* [CVE-2023-4194](CVE-2023/CVE-2023-41xx/CVE-2023-4194.json) (`2024-03-26T16:15:09.253`)
\* [CVE-2023-6240](CVE-2023/CVE-2023-62xx/CVE-2023-6240.json) (`2024-03-26T16:15:09.550`)
\* [CVE-2023-6780](CVE-2023/CVE-2023-67xx/CVE-2023-6780.json) (`2024-03-26T16:15:10.083`)
\* [CVE-2023-7216](CVE-2023/CVE-2023-72xx/CVE-2023-7216.json) (`2024-03-26T16:15:10.283`)
\* [CVE-2024-27455](CVE-2024/CVE-2024-274xx/CVE-2024-27455.json) (`2024-03-26T16:15:12.263`)
\* [CVE-2024-25957](CVE-2024/CVE-2024-259xx/CVE-2024-25957.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-25958](CVE-2024/CVE-2024-259xx/CVE-2024-25958.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-26644](CVE-2024/CVE-2024-266xx/CVE-2024-26644.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-26645](CVE-2024/CVE-2024-266xx/CVE-2024-26645.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-27756](CVE-2024/CVE-2024-277xx/CVE-2024-27756.json) (`2024-03-26T18:15:10.693`)
\* [CVE-2024-2891](CVE-2024/CVE-2024-28xx/CVE-2024-2891.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-2892](CVE-2024/CVE-2024-28xx/CVE-2024-2892.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-2906](CVE-2024/CVE-2024-29xx/CVE-2024-2906.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-2915](CVE-2024/CVE-2024-29xx/CVE-2024-2915.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-29197](CVE-2024/CVE-2024-291xx/CVE-2024-29197.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-29203](CVE-2024/CVE-2024-292xx/CVE-2024-29203.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-2921](CVE-2024/CVE-2024-29xx/CVE-2024-2921.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-2929](CVE-2024/CVE-2024-29xx/CVE-2024-2929.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-29401](CVE-2024/CVE-2024-294xx/CVE-2024-29401.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-29684](CVE-2024/CVE-2024-296xx/CVE-2024-29684.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-29808](CVE-2024/CVE-2024-298xx/CVE-2024-29808.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-29809](CVE-2024/CVE-2024-298xx/CVE-2024-29809.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-29810](CVE-2024/CVE-2024-298xx/CVE-2024-29810.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-29832](CVE-2024/CVE-2024-298xx/CVE-2024-29832.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-29833](CVE-2024/CVE-2024-298xx/CVE-2024-29833.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-29881](CVE-2024/CVE-2024-298xx/CVE-2024-29881.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-29883](CVE-2024/CVE-2024-298xx/CVE-2024-29883.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-30233](CVE-2024/CVE-2024-302xx/CVE-2024-30233.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-30234](CVE-2024/CVE-2024-302xx/CVE-2024-30234.json) (`2024-03-26T17:09:53.043`)
\* [CVE-2024-30235](CVE-2024/CVE-2024-302xx/CVE-2024-30235.json) (`2024-03-26T17:09:53.043`)
## Download and Usage

View File

@ -179121,7 +179121,7 @@ CVE-2021-36754,0,0,80419907a3f286739ddc930ee2d8530009350f6d9979c531c56c6c6faea7a
CVE-2021-36755,0,0,a4e3378ab825e7360a1c18e6a1cd7803e375ab234527cd5b55e8090d5292b3a4,2021-07-27T16:00:35.947000
CVE-2021-36756,0,0,2363b9aecfcfe81de7ad485830d45e8b5f59565c0a9b16163803494427f1395f,2021-11-04T13:43:02.340000
CVE-2021-36758,0,0,13b2b6fa03d15af5e887615108ed1cc8456a05dbb12263c90a7b95bf3da336cb,2021-08-05T14:39:50.063000
CVE-2021-36759,1,1,aed8d69fa650fea93ec437055bcf527641793f7aa123b2978a0345e087ca5945,2024-03-26T15:15:48.070000
CVE-2021-36759,0,0,aed8d69fa650fea93ec437055bcf527641793f7aa123b2978a0345e087ca5945,2024-03-26T15:15:48.070000
CVE-2021-3676,0,0,af393c78dea1ab200867068746124507e8affcf4dd514726b0801e3d44068230,2023-11-07T03:38:12.220000
CVE-2021-36760,0,0,82ec72b70405000ab49044eb25f47eb172c0420e56a6980a7d71eee09fa215a0,2021-12-09T17:50:00.903000
CVE-2021-36761,0,0,d010536a24c201e27e6cd758d06fc508cecf2373c852e866c9353dd8d0173ca7,2022-06-28T19:09:51.247000
@ -224194,7 +224194,7 @@ CVE-2023-3385,0,0,e241d0523cea3c6af9c190fdb70f25425341aeb1b1a2cdae19227875cb149f
CVE-2023-33850,0,0,72b12baa890a1451753888aa71bc88912c5010ac8efb5d0093b5e4b0d1bf044b,2023-08-28T19:51:25.020000
CVE-2023-33851,0,0,8db788edf6a5198f3e8e5896114b0940f7896f676a9d0dab45d0b9995fc2f580,2024-02-12T19:54:23.117000
CVE-2023-33852,0,0,523da9d9b75e64b7c746506e149f7a515a45762485db47beb2ace64d6f3001ae,2023-08-29T04:43:06.033000
CVE-2023-33855,0,0,0026344b4129e9b11f5c910267eb37fccd383dd96f127646b240d90d93e7608b,2024-03-26T14:15:07.903000
CVE-2023-33855,0,1,443fd33951f00d06bb83303d8e13b972c9c28876bf8ac2ed146d87d772451327,2024-03-26T17:09:53.043000
CVE-2023-33857,0,0,009b629a678d495b5ca76bd9ed766e57d21f04b1fd5cac55c82232f187a28b80,2023-07-26T20:04:15.373000
CVE-2023-3386,0,0,ca1c2f8eabd2a8ccc5353bf76dd6b68e5e018805b86e6999cd336196f7670718,2023-08-11T16:11:22.257000
CVE-2023-33863,0,0,bcc6ceec655946e02a491efce99a4793246bd9fa7abf6fe4628bce4c635fc35b,2023-11-25T11:15:17.060000
@ -228789,8 +228789,8 @@ CVE-2023-40542,0,0,11b6cee368035492cc0902cbd689ed768c381493a72ea99cc6412d219fc6a
CVE-2023-40544,0,0,8edafee03220c010d1be42f0f88433974482550243d48b064788fcb74f868b01,2024-02-12T16:43:42.320000
CVE-2023-40545,0,0,9bca2c73be74af7f189b3862ba8d7799cfe8ca7403c861883fba27fbc72753b2,2024-02-13T21:08:23.400000
CVE-2023-40546,0,0,30f48ea722b0fa0bead0d9f96a45a07ba815b2242da2c9750215b394c4c135dc,2024-02-05T20:06:26.127000
CVE-2023-40547,0,1,567ac9a094835c6d044d61ce859b18d6482ce0c18361ebde96473bcbec4d48a9,2024-03-26T16:15:08.220000
CVE-2023-40548,0,1,607f2edcdb6321352313e4bec2e87ab68ef460eae043be401a9b79d0bf0201ba,2024-03-26T16:15:09.080000
CVE-2023-40547,0,0,567ac9a094835c6d044d61ce859b18d6482ce0c18361ebde96473bcbec4d48a9,2024-03-26T16:15:08.220000
CVE-2023-40548,0,0,607f2edcdb6321352313e4bec2e87ab68ef460eae043be401a9b79d0bf0201ba,2024-03-26T16:15:09.080000
CVE-2023-40549,0,0,f3e5db151ee531b27b6ccdd941e8af2105e35d0f53958595d6c0bc80cce5e542,2024-02-05T21:33:24.707000
CVE-2023-4055,0,0,a7a42a94e357a6031ceb441913299385118b5b32f5de5204ec5e2fcae9f1b4cb,2023-08-09T21:15:11.820000
CVE-2023-40550,0,0,9f289352f5b3ef8fe58f1e2bc083f0230602eb136dcc409311dd01025296c62a,2024-02-05T21:38:37.280000
@ -229739,7 +229739,7 @@ CVE-2023-41936,0,0,59f50acce5e7a45be63a0a6bf8e4481807ef9e3c1ddb069f6cc7c3b24e2e3
CVE-2023-41937,0,0,33832ab8bf296ca98e6bb85f049928f5f740d834dcd64a2a1075d34f5ca7f346,2023-09-11T17:53:01.077000
CVE-2023-41938,0,0,e07951ef7ba255949f1ecfd1e3de3ced7ab420ccbf43a7cdb5c11613d0feb0b8,2023-09-11T17:52:09.947000
CVE-2023-41939,0,0,119263536f1854faddb91daf15ab5f647a60b6bcb6a3731a0b90d8bf96abde59,2023-09-11T17:51:37.613000
CVE-2023-4194,0,1,cc67123f8f400757b9c27c1196dfa9ee7269603aea6eade30be206f173340cd8,2024-03-26T16:15:09.253000
CVE-2023-4194,0,0,cc67123f8f400757b9c27c1196dfa9ee7269603aea6eade30be206f173340cd8,2024-03-26T16:15:09.253000
CVE-2023-41940,0,0,a6ca87f1be05eed4b95ab1494fc7f3793e7eec21c0fbd9bfd5d8852df51da68e,2023-09-11T17:49:38.180000
CVE-2023-41941,0,0,bed11f0c355d7fb5c2f2e63b90ecf6902e68b64794799b701e5718e92e473e57,2023-09-11T18:44:44.843000
CVE-2023-41942,0,0,8e9f4ade28dfbd8f08fd3ecdb838e218a08e91843bb151d88882c5e6dd422ffb,2023-09-11T18:43:21.273000
@ -229761,10 +229761,10 @@ CVE-2023-41965,0,0,819d10b57b506bddb9951f918fc98fbd0b8a91d148804e4f285468fbd9d32
CVE-2023-41966,0,0,fa827770b589d95b7355015bd98bf88afd7826564ca5f72e6f3c89942fecdd86,2023-11-07T18:33:13.163000
CVE-2023-41967,0,0,8e02dbae31e5167552a8965141c33a2e264759fb6dbab0897ce89326a49ec280,2024-01-05T17:59:28.783000
CVE-2023-41968,0,0,1248c9df7ecfb3920853d876ba26e870eae54e3bdcb4167f52b0214e6558ef25,2023-11-07T04:21:11.093000
CVE-2023-41969,1,1,b536aa6e3d6c5b0e5810d85e97b95518c50344c7b0280473731cf2e708fadd2f,2024-03-26T15:15:48.203000
CVE-2023-41969,0,1,29e94a4ba4cfe3727abfed65d25b13858512057feb987f4bf212f0615c9ad6b5,2024-03-26T17:09:53.043000
CVE-2023-4197,0,0,f146d2ff6232fd5933bf8142dd157ce30d6c6646be201da9229ef783e3b9cbfb,2023-11-08T19:47:53.387000
CVE-2023-41972,1,1,09c1a2289ff67014b3222b17ce4a9c751781c5fd2396992da2e7010daa56bf20,2024-03-26T15:15:48.407000
CVE-2023-41973,1,1,ec42a29a4975f332ead83a124bea892f962b8800bf80005d808074765e10f9b6,2024-03-26T15:15:48.613000
CVE-2023-41972,0,1,e6bd46328b86f6eb60a17a1d077353a063296843a0cd61509134ea6a235f1e9b,2024-03-26T17:09:53.043000
CVE-2023-41973,0,1,24c8e08508313bc504a5e8115a035bae26e0aac9371d4155eb384dcf9a0b0548,2024-03-26T17:09:53.043000
CVE-2023-41974,0,0,ec7dd2b6702f5a8bbc562cadb789ab42ea352cdfbc62d11784bae6116e1e8ab4,2024-01-17T21:17:26.303000
CVE-2023-41975,0,0,307c3809d415b29d4366c7e0ea292a20dbce25ae704d534682230c6d89427017,2023-11-02T15:22:55.217000
CVE-2023-41976,0,0,b44526aa36fb3f3d93fc90ad2e1fd48460d30f0e861bda5ba98a7a12c2a8aed3,2023-12-07T20:15:37.807000
@ -231428,6 +231428,7 @@ CVE-2023-44984,0,0,0f4ed06f1b5ac0b548c3e2d9f0d9f3f0cbd98c53b4eee334baff070264749
CVE-2023-44985,0,0,dfb696d5215b943e30a7373978ec95a4f1b73957eb031473531ba106a6046f85,2023-10-19T13:48:52.637000
CVE-2023-44986,0,0,dde8c0b4f7af4dc5c9e767ceedcd42c76156fba6640bda1b12d18c0c1d529774,2023-10-19T13:49:39.247000
CVE-2023-44987,0,0,1d0940c6c1116a8bd1e99725f710bdd942e9b5e0f435a1ad89ade226716b3915,2023-10-19T20:54:21.393000
CVE-2023-44989,1,1,e7e20dc1d114e542c553e6ef6f19736758eb8e49d1dab2eca9751cbbc66e25cd,2024-03-26T18:15:08.273000
CVE-2023-4499,0,0,2221e124504cf2ae1b924d444e1f8b4a1bda09ce3dcf640a68a8c7f8ffe55b09,2023-10-19T20:18:31.937000
CVE-2023-44990,0,0,ab429a48d2179fdf171bbbe4e2b53f60ef9a3671555e07b6733f9ca5f6ef987c,2023-10-24T17:56:46.373000
CVE-2023-44991,0,0,229523c1ca4b7df2290ad3404ea2bc7a11a7180706108c99bc4a3b631c9b7132,2023-12-28T19:55:16.063000
@ -232941,7 +232942,7 @@ CVE-2023-47145,0,0,620ae7f5678047a8c4108d9fbdf5fa18578054841b939f4838b425b9745ba
CVE-2023-47146,0,0,20e69829653fae8f4b2686a3902570d251dd86f6502cbd24bd7e7bddd7d52e98,2023-12-27T17:50:55.147000
CVE-2023-47147,0,0,aa39e297601bc950529f92cdf2bd8439447f01312c2edd499306ed4ebc349c17,2024-03-19T17:31:22.997000
CVE-2023-47148,0,0,b288941dfe3b1bf420ecb81fb3f06fe48a4281a820ff4a84a19d97a629ab7c25,2024-02-08T19:58:30.023000
CVE-2023-47150,0,0,01c7964aba3fe9b8fd22ab1d6df63bf0ace69c2fdadada1725c8b665bf2ae18c,2024-03-26T14:15:08.173000
CVE-2023-47150,0,1,fd78c089e6cfc2cc360595668fe16eb44dbc84f78e53c634e23776b310571458,2024-03-26T17:09:53.043000
CVE-2023-47152,0,0,21eae157a0c14eb599c0d65626b59a59bd4bef9c2fca5d41f60c8cae56283468,2024-03-07T17:15:11.063000
CVE-2023-47158,0,0,846f95a2725be32047541f14ae8c358ff876d7b2eaf417c4327cad289f3b21cd,2024-03-07T17:15:11.147000
CVE-2023-4716,0,0,19a8e4bcfef050287a950063ecd9c6c3a76d47aa7d1ec3543611c805970cc149,2023-11-07T04:22:53.527000
@ -235199,8 +235200,8 @@ CVE-2023-5089,0,0,cddae8cd7907847e037d2a072115a2d298d26ef8e69ec53058c1c3b486a685
CVE-2023-50891,0,0,bb600fee959bc0c70bc3812b31f851a727133cb965ac9f397fefe731a21c9727,2024-01-05T18:37:38.957000
CVE-2023-50892,0,0,b0a5df3a0991deeddc21aba073d59e844033efac16fe6402bc12f130e340ebd2,2024-01-05T19:43:06.133000
CVE-2023-50893,0,0,9e2a79008bb70c571f7956df8d783d4f37d38fd17c2b6ce3c5ce4f3a295c4404,2024-01-05T18:33:07.640000
CVE-2023-50894,1,1,282f0130e732e606b84d80b152ea21ecb1ca6dad6f66a24c8662987433cb3514,2024-03-26T15:15:48.797000
CVE-2023-50895,1,1,e632596cb4ff42676938591c39f051db865636da96e38892505a62244e629e7a,2024-03-26T15:15:48.860000
CVE-2023-50894,0,1,6eed329f67138d2f2e627602146cd43f0801dd418258af7b9bf418e3974e55dd,2024-03-26T17:09:53.043000
CVE-2023-50895,0,1,1f927ab35258aecd3c8a00c2d421efb443c9113305b6571381658536cbf62a0b,2024-03-26T17:09:53.043000
CVE-2023-50896,0,0,32a10544fdac61db8a171df746dccf1d232f13684a47de05af905306e155cf06,2024-01-05T17:32:59.937000
CVE-2023-50898,0,0,8aff62c643d7aeddc95a67a99b868adeecf42b7f0720ae7af339a4744e3e221f,2024-03-15T16:26:49.320000
CVE-2023-5090,0,0,ada81fac99e019d87a6cff7c251f38065497d67cafeddaf348ee3fa109b9d32b,2023-12-13T08:15:51.483000
@ -235902,7 +235903,7 @@ CVE-2023-52207,0,0,8811a262457d47a928522c6d4c018a091faaddd37faf85fb909e774e66447
CVE-2023-52208,0,0,9ed351f5d9cad0471fed88b06cec98b8cea6e1cb366c882b7648760856f996f0,2024-01-11T19:01:44.920000
CVE-2023-5221,0,0,e94a56c9d66474b5a160e0651ef9dc4824c1649580fd0ea943a206b242eec447,2024-03-21T02:50:10.947000
CVE-2023-52213,0,0,c567e205c61b5b287735b8f3f6708ba72962cb7ab86a1661d42ad149b5793151,2024-01-11T19:58:54.940000
CVE-2023-52214,0,0,e83b7c5d7cd654e0d2656805bb2ed661c039e2202d50eab19bd0b7277ad5080d,2024-03-26T13:15:44.857000
CVE-2023-52214,0,1,162d55d4b2fb0d9d44b6b2d1d34d863c999143afcae381fb31e139c85347084e,2024-03-26T17:09:53.043000
CVE-2023-52215,0,0,09e0a9efe106868b4fd9c2063e3947d919ee70f494a812fa7c8f77418249d5e9,2024-02-02T15:20:39.863000
CVE-2023-52216,0,0,0abddcd9cec3889c982561204259a4fbd6d1dbd4b2cc9d289f548ce07e0b2e7c,2024-01-11T19:59:02.337000
CVE-2023-52218,0,0,7b665670ae49b9a55269793dbdbcff40e383cda41d548bb50d0820fbba3ce68a,2024-01-11T18:43:19.067000
@ -236205,6 +236206,13 @@ CVE-2023-52618,0,0,140362ac707afd65a2d2b4e8d63e0c86c60c3017e34a4d1e40b3e8d76d459
CVE-2023-52619,0,0,af9aacad25e5d44645425bb3e7286e581cb4e42ee1fef053b65f380d7170e82a,2024-03-18T12:38:25.490000
CVE-2023-5262,0,0,1ed01c8e585c4d5b79de4709507eb451699baf1354e5ae8ae335221297d368d6,2024-03-21T02:50:11.880000
CVE-2023-52620,0,0,f7b393e21bf3ad043d90e1d475675ddea17fbe9622a70ee0a12525f78fd3e3ac,2024-03-21T12:58:51.093000
CVE-2023-52621,1,1,7e192a0f6ea9e2b2841aae08b6a79d53702740aeb515024045625bd4c7ef1dcc,2024-03-26T18:15:08.817000
CVE-2023-52622,1,1,7ee9703fdc669762674088f1f751f9cf97ea86ef4dfd07b925733a3c156bac3e,2024-03-26T18:15:08.873000
CVE-2023-52623,1,1,88aa9f694fb78f8430087fa7fc3db7f21f957543babe6cc6d366a5f07e7b79be,2024-03-26T18:15:08.930000
CVE-2023-52624,1,1,7dd895582e4f1ca5c5328afe2c412ce0b321201d2bba2e1f44989db1c247662c,2024-03-26T18:15:08.990000
CVE-2023-52625,1,1,62d27316ba3122bd775cdac8246f40faae862b9012e1dba86705ccc7999af1e5,2024-03-26T18:15:09.040000
CVE-2023-52626,1,1,96301513fb4628223a0d9cf24e12092c9ef87789d201953062e2609f6e9dd7f7,2024-03-26T18:15:09.087000
CVE-2023-52627,1,1,b114ffb83498e204ad4a858e973defb51aa9188fed7556a99daec636d52f6227,2024-03-26T18:15:09.140000
CVE-2023-5263,0,0,e845c03e875c19af6b2a1acb5c3778ba87234ae866c1118fe5cb806e675403c4,2024-03-21T02:50:11.963000
CVE-2023-5264,0,0,7347eec07eb374fa71498dcb5baa16d40eadd7796ae58c56cb5542f911c08d00,2024-03-21T02:50:12.043000
CVE-2023-5265,0,0,a2593868cc8025edeae179a722294beacfae058f7c712cda49462fbdc5096bf5,2024-03-21T02:50:12.123000
@ -237062,7 +237070,7 @@ CVE-2023-6234,0,0,c300a8904deed01fc5477fc97fa27627c8d1f6d71059c668e1fb941f32fdf7
CVE-2023-6235,0,0,ab83c1d668f31c27ce5f0c473adf91ccac4c0e79d96a7a2d4e8b5eab63bfea2e,2023-11-29T16:59:51.970000
CVE-2023-6238,0,0,7332193d1454e7405dd3270d745aa7f762b874d0f84c51906784a637ceb0212d,2024-02-07T00:15:55.240000
CVE-2023-6239,0,0,6ce1b576ddd7c9169d0997e75fde3efd606153edbf61fba1116d733c98bbf90d,2023-12-04T19:06:20.213000
CVE-2023-6240,0,1,12ab4bd584cb69f33bfd21cd68c3dcd33151a210965a0c843c22e8a6643ab9e0,2024-03-26T16:15:09.550000
CVE-2023-6240,0,0,12ab4bd584cb69f33bfd21cd68c3dcd33151a210965a0c843c22e8a6643ab9e0,2024-03-26T16:15:09.550000
CVE-2023-6241,0,0,492ae441bd7b430d2b324f1b69455dc6d8cff5a5926584dd79ada023bf8367a8,2024-03-04T13:58:23.447000
CVE-2023-6242,0,0,6d69e67cbd815bd255adaa5950d4591e05a6bb1ed9a7b28e0dca7e7af1589ec7,2024-01-18T18:13:53.840000
CVE-2023-6244,0,0,738eadbc72f60cd69becd30725fdeeb14cb3b5c05736eda414dcb1a46832ac22,2024-01-18T16:13:00.490000
@ -237471,7 +237479,7 @@ CVE-2023-6775,0,0,785c7f49208ea20d700744a01e8a1429f324667f6807bd4a259ac6655dd27e
CVE-2023-6776,0,0,2968271048fa8ca653df4209575bff057123f6c32739a4f0bc08a9ea121efe01,2024-01-18T16:24:38.070000
CVE-2023-6778,0,0,4da0caccc37ccc1faf5007378583694bfb6f9351ba67d60d3ee84f433b4b0fe9,2024-02-08T10:15:12.243000
CVE-2023-6779,0,0,84945b027810dcbe6c0b2bcc726a9d50fb0817df70a01f395a9528ce38146495,2024-02-27T17:26:48.247000
CVE-2023-6780,0,1,5dfd988419cec384929ee5ea37cfe3044f42ae11bc2461e6beb6e09b0ef7d99f,2024-03-26T16:15:10.083000
CVE-2023-6780,0,0,5dfd988419cec384929ee5ea37cfe3044f42ae11bc2461e6beb6e09b0ef7d99f,2024-03-26T16:15:10.083000
CVE-2023-6781,0,0,606133b53d71d301d434687c95e9541c45256035c97457e3cef427e3e2fa86e7,2024-01-18T16:24:52.810000
CVE-2023-6782,0,0,9d49a53aeef1daeb1b880b1c10125bd540373eabc0b6ef10f8f3d1b558ba4034,2024-01-18T16:11:09.587000
CVE-2023-6784,0,0,8a2dc120c2f7c09cd65b30de205a120bba14591ed7954e6b475e7a765c9d6768,2023-12-28T20:16:01.087000
@ -237818,7 +237826,7 @@ CVE-2023-7212,0,0,c82561de87d9b5a8e98ddddf12537a5231fd7af4a3892613aa65bcaf50d425
CVE-2023-7213,0,0,53dbf1b5ed846da4be08eaa570707a79ba97a8f313d11619a36fdb9ec23e375b,2024-03-21T02:50:59.900000
CVE-2023-7214,0,0,7a1c0710c5be4f5bd338487b4db0d98aaba3008bf0d51188e55d3ba8f2ca0ae1,2024-03-21T02:50:59.990000
CVE-2023-7215,0,0,9199e6e3539c5b15d0411ec649b23a950c822a62969d413acaf5e4343a429a54,2024-03-21T02:51:00.070000
CVE-2023-7216,0,1,ba84a1f2334fe94cc22085363da99b6ece39d93bfd66b42b6e91d7a0bc0e2b60,2024-03-26T16:15:10.283000
CVE-2023-7216,0,0,ba84a1f2334fe94cc22085363da99b6ece39d93bfd66b42b6e91d7a0bc0e2b60,2024-03-26T16:15:10.283000
CVE-2023-7218,0,0,e11b22d1e4f4bd1a318a9925942a5a95ed729fc0728f0384739354f97569f1ea,2024-03-21T02:51:00.170000
CVE-2023-7219,0,0,569e2951e48af1d0df5db153d63187a5f69bdc3eec356763a3d703a7641682ae,2024-03-21T02:51:00.260000
CVE-2023-7220,0,0,adb1a6fa99925cc0b04f8a6a991ea568a4098443e3fcb2536125cbabdc7e84f0,2024-03-21T02:51:00.343000
@ -238648,7 +238656,7 @@ CVE-2024-1082,0,0,ae3ce9e9137f48bb8ed6e73705e5e3d60bc52b901f04050c52fd85d44a0026
CVE-2024-1083,0,0,74c0722677f7c332b863607291b77a242fa9b468686591b078a5d2cf9d851301,2024-03-13T18:16:18.563000
CVE-2024-1084,0,0,51b7424ad38af0869b092fa36e3eaa18924349738a3af48c112cd79935a58280,2024-02-13T19:45:42.327000
CVE-2024-1085,0,0,649a4a278db01305790c1d25d5fb8d26a8b328f3c410af99f7747f493230845c,2024-02-05T20:41:40.513000
CVE-2024-1086,0,0,76364c1a0561e24ba662e70d690c606d4d289022065a8987b7a128b2d8eec769,2024-02-06T02:15:08.303000
CVE-2024-1086,0,1,4219eb562264c7419d4a48158a3ea86843f6e837cf59fa776b23affde3923b44,2024-03-26T18:15:09.193000
CVE-2024-1087,0,0,bfb73beeec450e6da5995b5f21712b59848b559e03cbbae3eab10a626379de00,2024-01-31T13:15:11.030000
CVE-2024-1088,0,0,8282ed6326b4aa943e52bd688c1d72f7651b610e6d05d8f8f49cf63347f834ea,2024-03-05T13:41:01.900000
CVE-2024-1089,0,0,32c5e60a3ddccafd89864debb2075c8e84bae9d4cf9e9019da73e9abcb27d415,2024-02-29T13:49:29.390000
@ -238817,6 +238825,7 @@ CVE-2024-1304,0,0,23d5e2bb07c854af4ae93b68007adeaedc627b6e96a90278cd036489c69942
CVE-2024-1309,0,0,37b1e0c9fe9df0fc7a03a06970b38a07b0edfe094c103b528d7941f417bdf8c0,2024-03-19T21:15:07.570000
CVE-2024-1311,0,0,b6ff5a5c389b1970ebb3e727e75412706e999440266a856adc2134f819f2c52f,2024-03-13T18:16:18.563000
CVE-2024-1312,0,0,663659c34940a4e82708fc60c7161257042c7f9bd582badd425cca624f8b6adc,2024-02-15T05:03:16.077000
CVE-2024-1313,1,1,fc2312805b89f80f01187b78a9b1055f41a1d07dff423a1c1d9453cd7d74aef4,2024-03-26T18:15:09.350000
CVE-2024-1316,0,0,71137ee023059efde9ea6dfce3b572409e6580b9426330a66bdb1f551ebc3e20,2024-03-05T13:41:01.900000
CVE-2024-1317,0,0,677d2e22c876d1f8a2362f14eec614350ca5518b287bd87de6939bf8afc48e88,2024-02-29T13:49:29.390000
CVE-2024-1318,0,0,422c230b919b2aed39d902af5834079d78461435b9de398b39e0ef988ed8aaa2,2024-02-29T13:49:29.390000
@ -238922,7 +238931,7 @@ CVE-2024-1451,0,0,3f6435be1eda5f484a72686d969060594b556ef09b071072e8b2c55917874d
CVE-2024-1452,0,0,f3f7356621b3de0beb4bcd77b5b0c290368d3f5194eed14a4a3d86741756591b,2024-03-13T18:15:58.530000
CVE-2024-1453,0,0,e11f7c6a5ca684a7ed72821317f7b1247eb4a0454b5116cf4686bee193c0189b,2024-03-01T22:22:25.913000
CVE-2024-1454,0,0,cc63bfc078899c3bc2d22b3e00f458fc4bbbae1bbb587edc98f331b0cecc8681,2024-03-23T03:15:10.633000
CVE-2024-1455,0,0,14952b77e57193c30794fb55b1d2b3ce9f659b1558f9e5caebc130d3b24f75a6,2024-03-26T14:15:08.450000
CVE-2024-1455,0,1,5d5551bfd568878b597f20296517afbe3046f129fd87b0b33dac914b992d4d1a,2024-03-26T17:09:53.043000
CVE-2024-1459,0,0,11d2cc6cb4f85209b5f6836b3ad08354090d0f8d1b51c2b33235c6338b29d8d2,2024-02-27T16:55:31.430000
CVE-2024-1460,0,0,cff087352bb23bf663ab2e822f0f3fe258f454a6ba829a2496758fccaa0c2c9b,2024-03-07T13:52:27.110000
CVE-2024-1462,0,0,2f9d4051c4c161902f27eca436b6d8219798c451263796f27a47d4849d7fecd7,2024-03-13T18:15:58.530000
@ -239195,7 +239204,7 @@ CVE-2024-1927,0,0,b3c20609db9c70af07026707de6d8f4fc11b95fea553636b448fb3a99c9e68
CVE-2024-1928,0,0,7c620b7f4b1ec6939393c022b1469f24a2d6fc0dcca332e7bbe9c97be0a7c0c1,2024-03-21T02:51:49.690000
CVE-2024-1931,0,0,2c035e986439878fc41e4d57f10dd1dfaa67d4c99fcd2a57828e8789ee7b279b,2024-03-07T13:52:27.110000
CVE-2024-1932,0,0,5d8d8b3bcbb6e1458b966532c64c8c15a68eb67ca9de3e9c3d113ec944ac23a6,2024-02-28T14:06:45.783000
CVE-2024-1933,0,0,8efa2abd15a6c9dc497d5342929765adc1b9723ac087a73cccba17b9d6f2636a,2024-03-26T13:15:45.077000
CVE-2024-1933,0,1,a87f7af555f25d5511c6c95f7980a7b12009c62b31ac68af7b5bb4b0c784ec57,2024-03-26T17:09:53.043000
CVE-2024-1935,0,0,acd55fcede8b48a7898ea42523d7c01336ae5958dd58d0fd5fb3924b804c3e4b,2024-03-13T18:15:58.530000
CVE-2024-1936,0,0,7b3792457d5905a49db010db7b736af0c923e8894b5bdd1a854744f20603a17d,2024-03-23T12:15:08.453000
CVE-2024-1938,0,0,24dc90499c61d902708c3560ef4b72bc4a3172c10dbf5b005bb9075fcee4ff4b,2024-03-07T23:15:07.177000
@ -239907,15 +239916,15 @@ CVE-2024-21908,0,0,329abb805b48ea46c40d9625a0e5a18857ae42d6b89a82f5c3cf797095821
CVE-2024-21909,0,0,1862a33cb8cb7c096543042cface003ed2658c185ec7603674a262510a57f13e,2024-02-08T02:15:40.883000
CVE-2024-21910,0,0,43ca7fc1e52b2bce376dbad269237609f1115a9e3e85611002acd3d35f8eee88,2024-01-08T19:46:25.757000
CVE-2024-21911,0,0,30b0952621022b198f37c9fc7c47e2aaa3233be56e7cd5684ca7f588e4860d48,2024-01-08T19:46:14.513000
CVE-2024-21912,1,1,ca7a6e05e4287c6d7b9a908fefd2998753f0193e2173b677ca904e3540852315,2024-03-26T16:15:10.440000
CVE-2024-21913,1,1,614ce8006a0da5beb9f517af487cd48f3109f82477c5b77ed27f6f37ab4430d6,2024-03-26T16:15:10.670000
CVE-2024-21912,0,1,313191073cb481d296be147cee1b1c3c466102564b95957afb404eb1dff60483,2024-03-26T17:09:53.043000
CVE-2024-21913,0,1,76e233c2fa7c0db7fe5e09ad44bdf3a4d23e6acfac5fbb342b58e4c08d6d66fd,2024-03-26T17:09:53.043000
CVE-2024-21914,0,0,8362c524df4a22c5c99212051acce4ea80772b52bceeb8a39755408986c0153c,2024-03-26T12:55:05.010000
CVE-2024-21915,0,0,37ba536bf668637545b4dc7be0d8e2b8dd5a196f32352bf8da3b31f0b239e591,2024-02-16T19:26:55.393000
CVE-2024-21916,0,0,9f2b20d343ff64e569a6727c28d35277f9cb0ae2a13059d88274004570b48dd2,2024-02-08T01:34:49.067000
CVE-2024-21917,0,0,f716c6e174b4d85e6dd9ac9a5c0d15320474c17d34b338ef8fe8fa8f22be68b7,2024-02-08T01:29:32.367000
CVE-2024-21918,1,1,e9cf9d31f8a1115b923b53fd9dcad56c406ed91f0f974a3222045d1234c77bf9,2024-03-26T16:15:10.877000
CVE-2024-21919,1,1,6bb600d0c6f883d9b463f3c687aecbe8359e94472314fe830c76b10811e4c948,2024-03-26T16:15:11.073000
CVE-2024-21920,1,1,762814431e8decb8be1e0bf4ad4ad9808530bc37358d700dc5cdf30e37ee4365,2024-03-26T16:15:11.277000
CVE-2024-21918,0,1,c4bb4ede38f9a16f499bf46a4bcaca94354f369eab31adef6a15454baea87f5d,2024-03-26T17:09:53.043000
CVE-2024-21919,0,1,7384b6246d42d878ee1ee3f98ce4c9dd34e38080d524d07b908a686735c4af16,2024-03-26T17:09:53.043000
CVE-2024-21920,0,1,ffdb9272381cfcb69d90b4c240807d8dc09161c70ea55d1400487f7b10cae5cd,2024-03-26T17:09:53.043000
CVE-2024-2193,0,0,34e7209142ece07ff319851094293418a65cb348ac85d6085a8bcc354475b1e0,2024-03-23T03:15:12.450000
CVE-2024-2194,0,0,e66d1886576950c3cc2788bd7fbc7cf127b4cc7097217924653f49641c7f6c67,2024-03-13T18:15:58.530000
CVE-2024-2197,0,0,c2754f239c7fee6e20f805eadb33174245eb70dd54a6a864c7dcc801422fac42,2024-03-20T13:00:16.367000
@ -239980,7 +239989,7 @@ CVE-2024-22108,0,0,cdaf61a2506aec5c5c15705bb009e8054dc2f9e9fadf39ff642fb65becdf0
CVE-2024-2211,0,0,5f96d32ca4af544c9f2c4c41d1cca4c75a0898cccdbc38ab9840e28c52771346,2024-03-06T15:18:08.093000
CVE-2024-22113,0,0,73fc9153b57dfc99829524f1c872775af20e562fcc4a87613efb3eb112b8fe49,2024-01-29T14:23:46.600000
CVE-2024-22119,0,0,d25acc4f5f2224943f2feaeb837e6d77f51fb63d8c6b5945b3415b9f2d10bb25,2024-02-15T19:35:45.447000
CVE-2024-2212,1,1,d7e8ccfaa59e788e5e30c86e53a6b5411ff9d76fb9a391e68ceff3569dec3b4b,2024-03-26T16:15:13.233000
CVE-2024-2212,0,1,1efd8738d0df499a6210a5cbcdbcb2236e5d3b323e83389672544412107c41b4,2024-03-26T17:09:53.043000
CVE-2024-22124,0,0,35999c882bc6d44ddc45a9b1e3e882ba4227533058bc07c120048ab393e82eb5,2024-01-22T19:17:13.050000
CVE-2024-22125,0,0,09efd17c32a694e6a723ff7a2a9eaeeb4bc062e9a25db0f7cad8d3d4b4874464,2024-01-12T19:42:36.637000
CVE-2024-22126,0,0,21fbc349f898f1250de5f7f39ca68cc7afccec8ff42d81c72dbf786571fc9040,2024-02-13T14:01:40.577000
@ -239995,7 +240004,7 @@ CVE-2024-22134,0,0,3be6b7702224117203e25cf98307e352d45c22327a969b8a5d10317e76a95
CVE-2024-22135,0,0,7025eeb4417e68d70b1ebd56dbf2904b38773b2370d9f15dd4e72daa19dcfb0c,2024-01-30T17:34:58.917000
CVE-2024-22136,0,0,ffae1822b85f323446ecd7154230713998c5b43341d8cf75c26e20b18cf0dd08,2024-02-05T22:08:24.077000
CVE-2024-22137,0,0,2f754fd6309f47fb06b4590cc899dcf8d9510a064415a4a45699e620bffecf24,2024-01-19T20:02:08.340000
CVE-2024-2214,1,1,bac821ea40fbd0a9bcaaf994e0d1e4c3bbde8688dd782b52c974bda55f7f576b,2024-03-26T16:15:13.430000
CVE-2024-2214,0,1,67f09108a7f626515ff9607f3c75e511fcc384b5aee9ec997a4926f909682874,2024-03-26T17:09:53.043000
CVE-2024-22140,0,0,7531d09a0f968b5d2b1e4e11b41757eb318c7a2cf822561fb39f6b355e958506,2024-02-03T00:18:43.417000
CVE-2024-22141,0,0,82c169c1dd57a019cf6b1fa659a8204ad1d91b953c7a71671ed9e1905b8d4a0f,2024-01-30T20:18:38.460000
CVE-2024-22142,0,0,8637a6c60024e32494bb4696b4c838486f6176e902ea0c9e3d4b4fb3a1805b63,2024-01-19T19:59:49.717000
@ -240008,7 +240017,7 @@ CVE-2024-22150,0,0,73a6449bdd862cb4aceb7dfcabf00926f0730684d1b40796cd1922a1d8912
CVE-2024-22152,0,0,77741f5ed7ba0cff2726117ba8b408bddeb0ad8028c0019d800ba91134fb10eb,2024-01-30T17:36:20.533000
CVE-2024-22153,0,0,183cafa541cc9d6796e6f60d4f84cc3fefe9e93bd9495a8b813ab36c05739148,2024-02-06T15:43:49.957000
CVE-2024-22154,0,0,c5d6f5ccc259910245679ed3525d0fea5ed728e2e4ec972b00aa2e1bbd5206eb,2024-01-31T20:20:56.647000
CVE-2024-22156,0,0,70006e5e9cf3347e83d1f68b689e7baddb5cd2fea027bd66eac3dddd58c2d962,2024-03-26T13:15:45.277000
CVE-2024-22156,0,1,0470690498e3075fd4f3771d852ea946c7ab23ccbac27ad083940b547295f710,2024-03-26T17:09:53.043000
CVE-2024-22158,0,0,be5acba9413a4f0452950024099977323786ffce7bb9629de27484705b832f92,2024-02-06T15:25:24.303000
CVE-2024-22159,0,0,af65d98e1fc14c93d259c6b50b292b96d1dcf8bdc170ccb9c7a80ba7229999dc,2024-02-06T15:37:01.700000
CVE-2024-2216,0,0,7a28c5762b5cda60e66bc68be4edb6e0097feb56dd7f05add8be107a9a5cdc2a,2024-03-06T21:42:54.697000
@ -240117,7 +240126,7 @@ CVE-2024-22337,0,0,9a674fac9bc4716d61a028d3be9473027552f3c1c11335efca4b4ddefd1e1
CVE-2024-22346,0,0,638ee4e9687c7c28032b432c317662713c057110b08b4b27024e81eb8453bf9e,2024-03-19T16:50:10.570000
CVE-2024-22352,0,0,52b9cf66a5f4972c051208c662d7f56e462da827c07f4b0e55a14efcee339e76,2024-03-21T12:58:51.093000
CVE-2024-22355,0,0,90575169d286b28c7ce02c7d947a264d77a6f25776530138b50b2f2dbc394220,2024-03-04T13:58:23.447000
CVE-2024-22356,1,1,2bb0cdc6baed0ccc72412c5f987d24652d3a41eec6d3ba82c0460c8b77e80352,2024-03-26T15:15:48.920000
CVE-2024-22356,0,1,bcc46874c9752933a72230517b74ad7a7a0d54dc67e233e91127533dfceeba1c,2024-03-26T17:09:53.043000
CVE-2024-2236,0,0,17401211af38608097c003c3b08d6e3d90e3570b70699d89a2e396d5b72c602a,2024-03-07T13:52:27.110000
CVE-2024-22361,0,0,2cb34447b61b8680c66e6f142987700b31f9f16d4e9b8d748c59e5b8ad5a9a29,2024-02-16T21:35:31.953000
CVE-2024-22362,0,0,826381d745a7bfa89e56ba8a6fed4317ed24204ea30e248bcffb2a9894398594,2024-03-21T02:52:03.063000
@ -240548,7 +240557,7 @@ CVE-2024-23476,0,0,e3d84cdb88c20fc5ad4183c7e154fd4eb94d6574a64f56328103056889f0f
CVE-2024-23477,0,0,87ea55eb7f1d47398644b7f37685a8d0eb8352c36d1b14165a017d7f9ea764c8,2024-02-20T20:38:43.587000
CVE-2024-23478,0,0,b3a2615dbe854f9cd6f6758ce3a7c085bf544d3fb8c18446bd16ed76b713d059,2024-02-20T20:39:52.377000
CVE-2024-23479,0,0,347fa1fab90846375f3cbda9f21578cf079b96a3697a975655102d71cb94c108,2024-02-20T20:17:31.460000
CVE-2024-23482,1,1,e66d5b2e112e90cb8a205d39f102bde7ba4b66b3998d82dba115ee48456bad5b,2024-03-26T15:15:49.130000
CVE-2024-23482,0,1,a1a2b00555a591fe7110a566438c570a2dca6a03e77aa4e75cc2cbc4e9c0af62,2024-03-26T17:09:53.043000
CVE-2024-23488,0,0,57450458303c48f58f7accf28de637666e8c4b38b2ec58f4dc15eb09b92be21a,2024-02-29T13:49:29.390000
CVE-2024-23492,0,0,7ac211a2a1c5c083cd2cd2691020edf3a51548a70085e44c956a49351fc4de8b,2024-03-21T02:52:07.353000
CVE-2024-23493,0,0,91cbf193a715aa0c526237151c4d36164df1ccaf1f366a7cf8bdf551267e12ba,2024-02-29T13:49:29.390000
@ -240656,7 +240665,7 @@ CVE-2024-2370,0,0,b4d60e1047325278ac8b0d4698ddbabcf9cce9ef3d3d19d6f7eb18094f8266
CVE-2024-2371,0,0,3cb4c1ed0c9b08d07eacc5252cd2248e3436e0fe77ed1216887d9a3f973c7f13,2024-03-12T12:40:13.500000
CVE-2024-23717,0,0,6124f28576b39881108c8f8a6a5c6f0e66ec8c6ba51a289d578374ba7fe9cba6,2024-03-12T12:40:13.500000
CVE-2024-23721,0,0,4dd09af0f810413f4d72b4868c20ebef4c48ec34bdb053307d4a26aae377efc3,2024-03-21T12:58:51.093000
CVE-2024-23722,1,1,1e70cc67972542a9b1919897af8491698dfff7eacb271c19a092acfa5d912a05,2024-03-26T15:15:49.317000
CVE-2024-23722,0,1,38e4afcdeed536b1189b96cd2e826d0a0039b5151073f4df55924a643f5fb03d,2024-03-26T17:09:53.043000
CVE-2024-23724,0,0,47401decfa65f84dd047eaa15adb1a17aa44914fc15b5198b908ecf69c381f70,2024-03-21T02:52:08.230000
CVE-2024-23725,0,0,e7109aa5ed154918326c3254d584acf7e8190c7c6acd985ea1145474ef362350,2024-01-29T15:25:48.110000
CVE-2024-23726,0,0,1e6b5838c3bbe1bdea4cff85e0dab09275e17fdbeddbc74981e476f308132713,2024-01-29T15:25:36.090000
@ -240992,7 +241001,7 @@ CVE-2024-24499,0,0,f3fa195f99d03c816961a79dfcc5225a65897f0a2c13286167d69ca586129
CVE-2024-2450,0,0,00768fb37fabbe59aaa05a2b15e979f5b194f2b002bbfb5602d5ad6df849f0ce,2024-03-15T12:53:06.423000
CVE-2024-24511,0,0,c2a15768e4699e22cbf5e8595792dbc9bf48071b723d524443a4f83d9a5c3ab8,2024-03-04T13:58:23.447000
CVE-2024-24512,0,0,03c51f88444f0be6fcfaff8e371681e3a1a1d007832a9bf8fa7088f13cfe5d40,2024-03-04T13:58:23.447000
CVE-2024-2452,1,1,95ae8d640d1e817d02c46a9f1bf4137b5b766690048615995c27024b71579fd1,2024-03-26T16:15:13.623000
CVE-2024-2452,0,1,dc7f1023137a78f11f48bc3cf8f72ec03aa67efff74760d3d778cb44b3110a19,2024-03-26T17:09:53.043000
CVE-2024-24520,0,0,1c17a865e2018472844eee3eeb32382c844b7628a24e3ba8ccf07a6f4355df2d,2024-03-21T12:58:51.093000
CVE-2024-24524,0,0,40ecb02cd326bdc34833c61cf5eb3e9f45f526d45502f51591361c36d1938c63,2024-02-09T16:30:43.830000
CVE-2024-24525,0,0,13b50b322b70c1ba78c523473a9882b44cc13b59455e3e47dd336806a91a1148,2024-02-29T13:49:29.390000
@ -241456,7 +241465,7 @@ CVE-2024-25469,0,0,96be9bcc7fde8f9b63f103d576b0d22a9c84a3c5935374af13a2466b2f2f5
CVE-2024-2547,0,0,029ea713e81efe24d9f23f45896ca40700b7682fd29e8eeae6ea82eb3ee0c23f,2024-03-21T02:52:37.487000
CVE-2024-25501,0,0,bac5c3eafbac38d2c6b4da329ce2a075da938dd8ce1ff1c471fff3fb2b0c91ae,2024-03-11T01:32:29.610000
CVE-2024-25502,0,0,50331b6b298e51ff1fb5155b43730c3887534f74eacaa5eabfebdbefa930be85,2024-02-16T13:38:00.047000
CVE-2024-2553,0,0,60661f4e29c946f8f0bd9c141b816121a578e8afae7b951ab3d0603c830b9051,2024-03-21T02:52:37.573000
CVE-2024-2553,0,1,51096ed0b78dd956151349bc7a00fa14b68c357d7181cd6178d0a156f537f6e1,2024-03-26T17:15:47.490000
CVE-2024-2554,0,0,4ac6ec86a9eca45e0959ee11cb19788a3b6ae4ad6b565e671b8b1c5afcc85576,2024-03-21T02:52:37.647000
CVE-2024-2555,0,0,f916e80b2ed7e85f0a04674a605eaa0368f77f318b267584d88e76e9119ef8a7,2024-03-21T02:52:37.723000
CVE-2024-25551,0,0,08dea6730d2a3539d15dd516547ab3c25a1bf59710632ae63632a88cbff77b71,2024-03-04T13:58:23.447000
@ -241659,9 +241668,9 @@ CVE-2024-25941,0,0,ca1cef65d30f17057b47421c2700ecf50e418e7bf4da35eb3fcc2989f17ef
CVE-2024-25942,0,0,f61fbc9a4d226989af6c7dbccbce6eac1bf08e9ecba7753f027f3c66eedf16fc,2024-03-19T13:26:46
CVE-2024-2595,0,0,2deb54d18ba7636df2c2b5e2f14f094eeefaa5b876ae68e9d3b6166f648310d6,2024-03-18T19:40:00.173000
CVE-2024-25951,0,0,4cab9db546da1535e7f7aa83987aad28b8aa7aeb3328d636aa2cd78c27a2b2c1,2024-03-11T01:32:39.697000
CVE-2024-25956,1,1,223aa93034d13ea5222d6dfe706bf405b5c1ec2f8ef6e2ecff3c2820e3c91784,2024-03-26T16:15:11.520000
CVE-2024-25957,1,1,b661b77cecf6055cc88dd8ba37395c2962972d4b51b06df443041dd19d18013f,2024-03-26T16:15:11.727000
CVE-2024-25958,1,1,b12ce2ae464f2791ebd74e2204fab9a12edbcb4cd9adf0a48724d0c2e79f0fd4,2024-03-26T16:15:11.917000
CVE-2024-25956,0,1,dfd2802b1c736e1761ed07520e628719c89334b257da6b0a5713ad322e0dae27,2024-03-26T17:09:53.043000
CVE-2024-25957,0,1,fbfd85de3920e2efe608621ddb5f2aee192a8ffd0e6708b05a61970ec8670fe3,2024-03-26T17:09:53.043000
CVE-2024-25958,0,1,428a097e4eb3bbb89a8c80ee3860a38967cf51a7e50b2ade8df4bf3874041ad6,2024-03-26T17:09:53.043000
CVE-2024-2596,0,0,978865da9be9e1fb873a9c434a053f33d1f0c5219abdf12becebd1212242ea79,2024-03-18T19:40:00.173000
CVE-2024-25964,0,0,b5ec0f6d98c78318f65547134d8b33b81ca3c6769a2c110d8679aa993806ef56,2024-03-25T13:47:14.087000
CVE-2024-2597,0,0,822c3604000d58768ff79975222ee5716f9ff927beed042444c7c308ac1b28bf,2024-03-18T19:40:00.173000
@ -241981,8 +241990,13 @@ CVE-2024-26640,0,0,5cc6b5e042a5b441f74784080591c7d359381cd13aba12bdf63d6c89fc714
CVE-2024-26641,0,0,d0ed2cdfb0ff7417cb869a8d4b0f844e96cb33626fa12ef7a8d145f64e7e59f2,2024-03-18T12:38:25.490000
CVE-2024-26642,0,0,2030c36d17cf3955028a3c8cf70b58662419898c5eb4245b6345fdb4fa4667cf,2024-03-21T12:58:51.093000
CVE-2024-26643,0,0,76e88a10e1b7ae620b3b2f807c32687dfa488694b94b88072cd31ad829305fec,2024-03-21T12:58:51.093000
CVE-2024-26644,1,1,114e597ced6989f39361de91b251416aefc3205e3a880df9bfb3355fa69ecc44,2024-03-26T16:15:12.137000
CVE-2024-26645,1,1,07f5d2a40f75bf53494fd1bdd9955a499bbe895b17a65cc7d26da6c453638e5c,2024-03-26T16:15:12.207000
CVE-2024-26644,0,1,e5196539d0d7d2426b70f5c3d7b2262aa5f8e671e6361172395eb0ace801b5d7,2024-03-26T17:09:53.043000
CVE-2024-26645,0,1,fe3f1a6f358cce09c9a7d8315812702f5784843255df1b174247cd1e300a4c71,2024-03-26T17:09:53.043000
CVE-2024-26646,1,1,6eac3a1f251037baca9015e731d75055b325c9652d7a6f256f509f462ef91c49,2024-03-26T18:15:09.910000
CVE-2024-26647,1,1,c1685e9c5a3bbb47aa3ade7623a183c0a043377118f54afb727855828b03a371,2024-03-26T18:15:10.063000
CVE-2024-26648,1,1,36d3fa2a15ff79ad7c0626e4e63083b151bd153667a960246460ad1dbb4b8422,2024-03-26T18:15:10.220000
CVE-2024-26649,1,1,acca5e9b7f92cbd209bcc468a216ebd6864e5465e46b0a5729ad466b6f9e5db4,2024-03-26T18:15:10.370000
CVE-2024-26650,1,1,614e20037042219ab8e7db2eca3f7d1f724e3785feb5dfac89364a948cb05366,2024-03-26T18:15:10.530000
CVE-2024-2668,0,0,d8e22e7bb795e8f8d48dc1ea67b8b3706e737c441fdb6e3cdf26dd6015682f9f,2024-03-21T02:52:41.070000
CVE-2024-2669,0,0,4f5a2d5969b59448109cf022193bd2b7c88dc7ffa7ca03caa723fb0f374642a3,2024-03-21T02:52:41.157000
CVE-2024-2670,0,0,51102bd696ec0a80433e00190a81242d0892d06afe5affb13dd51bd0c370ce65,2024-03-21T02:52:41.253000
@ -242146,7 +242160,7 @@ CVE-2024-27441,0,0,e840685b8600bbca2bd5265ffc2375dd0e1834727afca845fa72402578217
CVE-2024-27444,0,0,a237f36c45a82911cb697384887c7b89bc1c2ea038ffd45f33470a0acaad42ea,2024-02-26T16:32:25.577000
CVE-2024-27447,0,0,cb57e8d03df573cd861f28c33cc0f260471c72de24ec7e9c3037c0509931fb18,2024-02-26T16:32:25.577000
CVE-2024-27454,0,0,420cb9ec3b08ac5a96e141e933952328f4cf525758241b7fd36981eea8d7ea27,2024-02-26T16:32:25.577000
CVE-2024-27455,0,1,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000
CVE-2024-27455,0,0,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000
CVE-2024-27456,0,0,af8b9eeeffd0370c5237af64d481e919abc5d541ec3702413fff35287d9c8d37,2024-02-26T16:32:25.577000
CVE-2024-2748,0,0,7e386cbf6383d9c670ab2da491db4c11338d46cd7667c12d0ea9f5d67eb35ea4,2024-03-21T12:58:51.093000
CVE-2024-27497,0,0,424da99af028e8bbc4e145cc3ed13014de56bcd76f9291f295253c8da6722a31,2024-03-01T15:23:36.177000
@ -242210,7 +242224,7 @@ CVE-2024-27744,0,0,c100d4ba8f49a307e8f166c43dcf72396c641c27bc5c30f424e004f4b4c33
CVE-2024-27746,0,0,6f3ddced2e2b26bef51987507b4e7466957a803a9da415c8c1c8b245cafe1423,2024-03-13T07:15:36.470000
CVE-2024-27747,0,0,eff635f872515818dfe20352d610bb047327d7f6971e953c63bc92feb6bf3ebe,2024-03-13T07:15:36.523000
CVE-2024-2775,0,0,324304d3daf3f8232d8549c8aac7991bd17ad8e74cddabbe779660d692eff015,2024-03-22T12:45:36.130000
CVE-2024-27756,0,0,aebfc12c95eee1aa3d95acbf6fc8b0650b6e3d2e490fe1817d1c49f0782fe0c7,2024-03-15T12:53:06.423000
CVE-2024-27756,0,1,a0b7876d1bcd508f42c19e34f906c00ccf4c6d4fd282b64eb52f33eb0c45850b,2024-03-26T18:15:10.693000
CVE-2024-27757,0,0,758da8d428041fb55cda5e8ed49e42184e30c0310dfccc74e01819218179190e,2024-03-18T12:38:25.490000
CVE-2024-27758,0,0,6abe87e0a8905ac150ade2fec85250ff5e7fbf580c101c16b193b98f7d58141f,2024-03-12T17:46:17.273000
CVE-2024-2776,0,0,a2dca86eeda4163cb75b40ad2e671bae21e52f796052ecc38e114bfa3f2fcc33,2024-03-22T12:45:36.130000
@ -242282,7 +242296,7 @@ CVE-2024-27995,0,0,31db9c3046ef3b6826fd04aab15586376d26e0b529bdf84ce7eba17bac569
CVE-2024-27996,0,0,79cff30308b011c07df476cb18acc5ff1830e7bf17b14d1ca5a0d9446fa716b8,2024-03-20T13:00:16.367000
CVE-2024-27997,0,0,b42c7cf4751e4a11a6e5eeb90c0df264fce89958ee556b8b06894cd2e68b11ce,2024-03-20T13:00:16.367000
CVE-2024-27998,0,0,325b1a8419d02931fcb08c1286afe5c33e53c5bf8527e201a365155e360914cf,2024-03-20T13:00:16.367000
CVE-2024-2802,1,1,3b7ed9aefbc68681b0633b6ab16c0b3db6db844ee4c655f6c7e6863ac6e1f543,2024-03-26T15:15:49.677000
CVE-2024-2802,0,0,3b7ed9aefbc68681b0633b6ab16c0b3db6db844ee4c655f6c7e6863ac6e1f543,2024-03-26T15:15:49.677000
CVE-2024-28029,0,0,9e465d515603ce2b4056e1d4099525822960990d4afbdcda109cb1a09fe772c2,2024-03-25T16:06:44.403000
CVE-2024-28033,0,0,d380f707343e80ca8a48383d7130e8455ae81fc182e0d67c36374f1eb571652f,2024-03-26T12:55:05.010000
CVE-2024-28034,0,0,59f37b2f71aecfc048b35bdfeca5cf2bf5792e3fd57d1b0f3eaa95911ebef442,2024-03-26T12:55:05.010000
@ -242558,9 +242572,13 @@ CVE-2024-28868,0,0,4e3489f3c96f97bc271ff7282115c7f5d25e2aa392efe0c1c5842c72ee998
CVE-2024-2888,0,0,e48cc71bf8d96ab718c88bf59dd81f25047204b13c0446dd48014e6c60fc42d9,2024-03-26T12:55:05.010000
CVE-2024-2889,0,0,047900621574a9797901d8767443e859750a2765d7b4c1f50c805ec45928b2d3,2024-03-26T12:55:05.010000
CVE-2024-28891,0,0,0aa614d18123b6bc2c76e9c8b5d356a2e7d71bba766bbf9db36fdc818df4c91d,2024-03-22T12:45:36.130000
CVE-2024-2891,0,0,c4444761e2daaffd1f00735101a2ff9c47024a839111c07859ef3c428d9fc3e5,2024-03-26T14:15:09.530000
CVE-2024-2891,0,1,94b70830417014ebd0a88424b38e7910314b41261ea6ef22ebae730d401e569a,2024-03-26T17:09:53.043000
CVE-2024-28916,0,0,3588de3801d3f24953276fa6b57f2d684fb38fc8b3ed3ad7d8613e127e6022b7,2024-03-21T12:58:51.093000
CVE-2024-2892,1,1,954a2f272af32cdc4636d904b5279d89c288f46d88158828a1076b340bc6cbac,2024-03-26T16:15:13.853000
CVE-2024-2892,0,1,e53fd1216c4b22efebd0b743da5712b8a2bbb649ec50cef3f19c8170626057cb,2024-03-26T17:09:53.043000
CVE-2024-2893,1,1,03454b4172a384fcf754d0a79af98f544b770efe10848787fa0a66006ffb73c1,2024-03-26T17:15:47.810000
CVE-2024-2894,1,1,e073a098f20ecf49044bd1b363f575a8cb2f6afd9229aa92873c84f5fd988e53,2024-03-26T17:15:48.080000
CVE-2024-2895,1,1,3be1a99c99a4512208e842577cd86ecfd7359e00911a74bb22c4751a2f381f34,2024-03-26T18:15:10.893000
CVE-2024-2896,1,1,cfbae6b125dd4e36298bfaaddfd49990d3493209156cf15c0e63037d046146fd,2024-03-26T18:15:11.543000
CVE-2024-29009,0,0,e428945e790b35d2116d11f320908f919961bf6f75e41d300d21cf55f5bcc19c,2024-03-25T13:47:14.087000
CVE-2024-29018,0,0,996b521b7d9365d8d41596984cc4ea0a166d70f0fc41d183b4857a8a3632cdd4,2024-03-21T12:58:51.093000
CVE-2024-29025,0,0,2135a02640a8fe43b6f6ca4c5bc68a475f73ee669a9a1a5af697f30fa738d887,2024-03-26T12:55:05.010000
@ -242577,7 +242595,7 @@ CVE-2024-29041,0,0,062cd423858e5d93d3fcaca6dd38a28eee29d2cae2776de71c0c9845b66bb
CVE-2024-29042,0,0,94be04c88512f8801f1a0b7e8a0fe44bc1e2661493f643835e5309c09e2ba389,2024-03-22T19:02:10.300000
CVE-2024-29057,0,0,1a7d236424310c38bf79fff65250ee548fa2fb68d692d6ba086f9244a484a161,2024-03-26T03:18:48.760000
CVE-2024-29059,0,0,18e37be1e0df9e20dcfce0ba40125ed6c1baf91c43e1478b2c45015a443784c5,2024-03-25T01:51:01.223000
CVE-2024-2906,0,0,8f4815138846f7168880c963432fd8e826da79a508032bbe434ec04b77e0ce85,2024-03-26T13:15:45.497000
CVE-2024-2906,0,1,d03107f75ca563c85caee3d034c6f17690ce56543ec4f09885b1b99f97ccb0d6,2024-03-26T17:09:53.043000
CVE-2024-29071,0,0,5ff903755374c23b025a98d3cc2b0f06ea188aa4151e3658c02fd385bc8b4fa8,2024-03-25T13:47:14.087000
CVE-2024-29089,0,0,e5fbae925c9da8d587d9573cbc1c34db123c4510c1c1616d472538493a08c59e,2024-03-20T13:00:16.367000
CVE-2024-29091,0,0,b1cb764a2082d02939e32c22f722543dd831cf608e6c39b51eb933f990788962,2024-03-20T13:00:16.367000
@ -242629,7 +242647,7 @@ CVE-2024-29140,0,0,81b0188b02ec97eea25ba71e207c764caac64152b7cc837d2aa82b57919f9
CVE-2024-29141,0,0,0c36d86235af1b05ffdd671977b0a9f1efad4a89eb52195bc0218075263f9454,2024-03-19T14:31:27.883000
CVE-2024-29142,0,0,aa64581089439270488fd3ec7318d50f51fe018a933a4c7619fcc03f33e8f61b,2024-03-19T14:31:27.883000
CVE-2024-29143,0,0,a3f92e2c9ae6aaf4168f841be16c13a544cace199faa049656661980aa53e607,2024-03-19T13:26:46
CVE-2024-2915,1,1,2dcdeb9612ca6ec05e4afdc1cd314d20f66e9e7d993d06abca882e7513b03203,2024-03-26T16:15:14.117000
CVE-2024-2915,0,1,ec24e1259461cfa4ad3d33658319541b7ef90e5a07f7652d9577315748dcb123,2024-03-26T17:09:53.043000
CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24c8f,2024-03-18T12:38:25.490000
CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000
CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000
@ -242645,10 +242663,10 @@ CVE-2024-29190,0,0,06fd81282a65c29bad2a807438b949724256368bd8f788b06f116f9ca54b1
CVE-2024-29194,0,0,61bcf80dc8c33623e289063809985cd69cc66b52cb236ef7d952a2c24a0c4127,2024-03-25T01:51:01.223000
CVE-2024-29195,0,0,12b6fcead703f320c2faaa3dbf933701901e834c51cbd479cd70a3447afc3114,2024-03-26T12:55:05.010000
CVE-2024-29196,0,0,e02aa4919ed0d6b8af5e1fbc5257465a64fdae2f23d9b9aaabfbc3da2c0d39fa,2024-03-26T12:55:05.010000
CVE-2024-29197,1,1,77c434a1953f89864417a27e46c04d47bc5336f2b84fe309d05db9fffed708ed,2024-03-26T15:15:49.390000
CVE-2024-29197,0,1,48cfe2d0e00e1d6e9f018548b8b920adc8f1c35c8c8d2a08e4bc3b3e003f90af,2024-03-26T17:09:53.043000
CVE-2024-29199,0,0,78313b772930e0d3c119e70c910c05a3509fc574028745b1b9c80a0f992c34f5,2024-03-26T12:55:05.010000
CVE-2024-29203,0,0,72f2f625f254ebd01fb4513831430e4d16043719b3320e55604cd698eb4447d7,2024-03-26T14:15:08.747000
CVE-2024-2921,1,1,38318644b25bc4ef97821372c1adce98ea356508d02acd841cc596a2709f31c7,2024-03-26T16:15:14.173000
CVE-2024-29203,0,1,85853d1d6c0b7cff8ded9ca779662219e1e7d461c7c9aed96ad32295a032c6f6,2024-03-26T17:09:53.043000
CVE-2024-2921,0,1,a7048ceb487f73059844764517da213b04f370019c5cc0c6fe2153431d1dd6cb,2024-03-26T17:09:53.043000
CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000
CVE-2024-29243,0,0,80b3eab65af2d9fbeb7b6048e074697688a19de63e1138c377d0b826523dd7db,2024-03-21T15:24:35.093000
CVE-2024-29244,0,0,ab4dadc4ff7b45a2c285edb922de956bae0828f007627c62339f15145e95a7b7,2024-03-21T15:24:35.093000
@ -242656,7 +242674,7 @@ CVE-2024-29271,0,0,86d82853285296d2653b2954b1f865b89755729787a00c9a08bf8b4da2a10
CVE-2024-29272,0,0,bb3421cdf283ecf2f8722dd79d31aa3f3d26bad518191ad6f8ea2a70c28d47bf,2024-03-22T12:45:36.130000
CVE-2024-29273,0,0,5734858efc895a99d71a292d9b9fd87dc375f872fc9b4f17b1a24399e248cfbf,2024-03-22T12:45:36.130000
CVE-2024-29275,0,0,402f5150501d1ad43199a2c93810407cb4bc9ca968149bb7f55410637d08465b,2024-03-22T12:45:36.130000
CVE-2024-2929,1,1,a7aa5058864976a1df2c9816d8af544dbdf588d539db1cea1b6c5ea697b6739f,2024-03-26T16:15:14.230000
CVE-2024-2929,0,1,1e2a5388b53705944df52e04f4649418a900b7d3e866b67a8f41dcdb88a45e50,2024-03-26T17:09:53.043000
CVE-2024-29301,0,0,154c6ea8f36ae553114269a1e880d159b7e9b09b869cc177af921f11e043c79a,2024-03-26T12:55:05.010000
CVE-2024-29302,0,0,befca4baa09da55c6ccc652e95ace012df1b1e2aab7ec33ac183ae5971911acf,2024-03-26T12:55:05.010000
CVE-2024-29303,0,0,9fc5b63681179dd34090ab25180fdf1128a0a8fe7fe2b044acdbb780ed8094f7,2024-03-26T12:55:05.010000
@ -242664,7 +242682,7 @@ CVE-2024-29338,0,0,17a24f10f7d0496e7fcb2400fc6c6af48717728349b99b9f4dc4f19499bc4
CVE-2024-29366,0,0,970a4db6ccd44fa8fff843a083b23c4276fdabe942805276e1033f4579523e8f,2024-03-22T19:02:10.300000
CVE-2024-29374,0,0,f8a146770d52182e0c10b15b21ebc5da7e22091690385e976078b28de6736be7,2024-03-21T19:47:03.943000
CVE-2024-29385,0,0,77dce7c3f8675f81eb6a00c8f1d149f72619312873eb8bb6e829225e587309f5,2024-03-22T19:02:10.300000
CVE-2024-29401,1,1,e44b613f061946753dc62d095302340b4d2aabcb2804892fb8978684fd5200f7,2024-03-26T15:15:49.620000
CVE-2024-29401,0,1,89656cc9e9a7fef85aec3d184bc9af149e9114d584510da9b248a092c84a80e6,2024-03-26T17:09:53.043000
CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000
CVE-2024-29440,0,0,b41dbba691936eb263a6e48ee2f4c3b0c65bf928cbb922caedd1e0f5f03baacf,2024-03-26T12:55:05.010000
CVE-2024-29442,0,0,7905121fe561461f75c739d09685b7ffc46a6e6f08464603a503f7d567bf4eab,2024-03-26T12:55:05.010000
@ -242675,17 +242693,19 @@ CVE-2024-29472,0,0,8914457096a81cfec257e1932986907f8b2f25a966f10c0d7629905ec24b0
CVE-2024-29473,0,0,2dcbe7e94767e08f46a9353b62d8f30da500a221f5affb32fc9ef958cfff985b,2024-03-21T12:58:51.093000
CVE-2024-29474,0,0,cd74b93fedbacc13ab911c0f2a2b89e07d9e578953f3b262ce40503b72930e98,2024-03-21T12:58:51.093000
CVE-2024-29499,0,0,bc8db29a97bf5517e5213278d0d5f5ecdec4b51f00adea3262848d25f6e735bc,2024-03-22T19:02:10.300000
CVE-2024-2951,1,1,196d384afa50e4915b3f7f1abd72164195ad83bb49221af960f012f0ea91cf3f,2024-03-26T18:15:12.160000
CVE-2024-29515,0,0,79c9f65757e49bdb19c4dcff88d6ba2d524b1951e790ac90d5ffb4f302abcf45,2024-03-26T12:55:05.010000
CVE-2024-29644,0,0,386d9404cd9a66783fab4191d99526a9e5bea1176409bc071a51d532c36af3ad,2024-03-26T12:55:05.010000
CVE-2024-29650,0,0,3de71c7e130cece9a4956a25a7008efc5004a21e047c073aea3bd083423d5a0e,2024-03-25T16:43:06.137000
CVE-2024-29666,0,0,a8926fce030310567330d9b7c126003f732556a2ce979a6a3fd232707f8bbd99,2024-03-26T12:55:05.010000
CVE-2024-29684,0,0,35adbae46d02598afd0a71dbdb28a4d3beabc7cfec6e5b8d12f945270a2d26af,2024-03-26T14:15:09.003000
CVE-2024-29684,0,1,bf20e1eee3419c30e31b5c1e15077ebe4738914779e007adc0a6cf94ae84179f,2024-03-26T17:09:53.043000
CVE-2024-29732,0,0,3aff958eec55f5cf06538251c792be6423021bd21573f6f2f920d098c9ad37bd,2024-03-21T12:58:51.093000
CVE-2024-29808,1,1,dfdda526616dfcc103fd0c10987466fb6a625bec74146b0e5edf740cd33e2043,2024-03-26T16:15:12.323000
CVE-2024-29809,1,1,a5b095cb4d2640108682d7dba5740e3ef6fecff1dac5a9f242c5dab5775df1fb,2024-03-26T16:15:12.520000
CVE-2024-29810,1,1,f7f8d74064bd2b172081cac20782131f7ef02041eb829386d2e0db35cacca59b,2024-03-26T16:15:12.707000
CVE-2024-29832,1,1,5e3fb0f1b1251798bc8fb0858a74c0899ba80d10d361b9ddae87aee2ab38426b,2024-03-26T16:15:12.890000
CVE-2024-29833,1,1,fb99702e05f65e341974eb78051c31e7106de9e69f04328c281627b24dd08a80,2024-03-26T16:15:13.063000
CVE-2024-29735,1,1,1640123dfaaf4d3d57b29169fabd73ad7d0d319282e875da918e047f8134410f,2024-03-26T17:15:47.380000
CVE-2024-29808,0,1,1a083356e9d0f501470cdfed0d1c85987d8c8667e4684d7b2ae73ab2fb9e2d44,2024-03-26T17:09:53.043000
CVE-2024-29809,0,1,21a6514e4479b2af7c07059597ccbdef1cddc762bb223c6efd7d97d6a6cee8d3,2024-03-26T17:09:53.043000
CVE-2024-29810,0,1,eff91a2f0d80ceae6d9d4c914195c5a044b82fbe1cafb4a26b6b9c2e1aa693cf,2024-03-26T17:09:53.043000
CVE-2024-29832,0,1,e21971089d12a8b67bd5dc57f7dea93be0cc79e81378beb3ae2f03d4ff6e4c14,2024-03-26T17:09:53.043000
CVE-2024-29833,0,1,4c9a8c532b47162f5aea1ac06e294c5bbf9e597d7d17a1d16e86b5dc1293a53a,2024-03-26T17:09:53.043000
CVE-2024-29858,0,0,585719d860c91771e96e52d882eed744121f21e899f727afe6b381f4ffbb308d,2024-03-21T12:58:51.093000
CVE-2024-29859,0,0,6ebff5730a73f542ffebf0a56f74146bb69314ac3f95118519ec4b678666f245,2024-03-21T12:58:51.093000
CVE-2024-29862,0,0,78f62d6320f790cb50cb5767943bbca91d7f9763b83315a1495201af3fd41026,2024-03-21T12:58:51.093000
@ -242703,8 +242723,8 @@ CVE-2024-29877,0,0,5b6a7271e346dceec62c9141f9ae12b0e5342a31cc26366c653fe20c26c8b
CVE-2024-29878,0,0,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dda8d,2024-03-21T15:24:35.093000
CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000
CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000
CVE-2024-29881,0,0,0cbeaa6b4455ceb05464c9299bb18a36979748161fb0b3f905522ec7bdc3fda0,2024-03-26T14:15:09.070000
CVE-2024-29883,0,0,a13d175dd79044f267ec769a7146c8c1184a19310013628d0092737af35ee3bb,2024-03-26T14:15:09.280000
CVE-2024-29881,0,1,7eaff78a6eecd508372203508f2ecab97ebc62cfd94b7af6101b5d7b6ca209b2,2024-03-26T17:09:53.043000
CVE-2024-29883,0,1,2444d321a867d6f4cdf63bf8a1bc6af3b407752f2134c1f64a1d02545242c426,2024-03-26T17:09:53.043000
CVE-2024-29916,0,0,dd300e18b662f862d3dd0881eace85d81be3f3aaeb79c908bcef100a80a89dd1,2024-03-21T19:47:03.943000
CVE-2024-29943,0,0,39d573a490fc5d2b219e8af270d3feeff9aa72e4341ddd52f10b0ddfa677f78e,2024-03-22T15:34:43.663000
CVE-2024-29944,0,0,4d21f9c7c1ab1ff30cce77b261f7b06b8e28526248b968d986726dab452f24fc,2024-03-25T17:15:51.670000
@ -242717,6 +242737,6 @@ CVE-2024-30204,0,0,bf1cbd8aaa2b36eb1f7808443cd1dc94c2d123df04230a458090af1180122
CVE-2024-30205,0,0,d8d475f93d08b2037de38fb56b8f07beb7b6f1c5b446fee65bfc13f5246e2c4e,2024-03-25T16:43:06.137000
CVE-2024-30231,0,0,00dcdf5dcba695175163cca9e56ccfae3d920c15ab7bb0fd4524c1a6b2477280,2024-03-26T12:55:05.010000
CVE-2024-30232,0,0,f91ac1a16b6560e63a231b2b02f73b0e579de91231d5661b2fdb0493e2d31192,2024-03-26T12:55:05.010000
CVE-2024-30233,0,0,e9c13e7bc116d4ff17fc52ce9a1f07909d0fd2f48f0fbc5cd03d9165e1a6e14d,2024-03-26T13:15:45.710000
CVE-2024-30234,0,0,d453b03d3749bec9b51bf3d51cc8d936e9b7f8658d7100bfdc2940e7bd78eda4,2024-03-26T13:15:45.927000
CVE-2024-30235,0,0,1751b9719711549b05b67350384a4df032baceba1f59a2611ab1f37069b1b0f2,2024-03-26T13:15:46.153000
CVE-2024-30233,0,1,4c2695d2f3b076c7408bd91fee17c2a607f64636c8c0001f359b0796de1d2054,2024-03-26T17:09:53.043000
CVE-2024-30234,0,1,a6be244378f8a1646e756d1cd111fc8fb568601f74deb65508c56b004a03b137,2024-03-26T17:09:53.043000
CVE-2024-30235,0,1,ef6f7f84deca979173abd2d122dde5dfb4f5568a80e848e8fa95eae1319c946f,2024-03-26T17:09:53.043000

Can't render this file because it is too large.