mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-03-26T19:00:30.705758+00:00
This commit is contained in:
parent
1943884302
commit
afa2f7c07b
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-33855",
|
"id": "CVE-2023-33855",
|
||||||
"sourceIdentifier": "psirt@us.ibm.com",
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
"published": "2024-03-26T14:15:07.903",
|
"published": "2024-03-26T14:15:07.903",
|
||||||
"lastModified": "2024-03-26T14:15:07.903",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-41969",
|
"id": "CVE-2023-41969",
|
||||||
"sourceIdentifier": "cve@zscaler.com",
|
"sourceIdentifier": "cve@zscaler.com",
|
||||||
"published": "2024-03-26T15:15:48.203",
|
"published": "2024-03-26T15:15:48.203",
|
||||||
"lastModified": "2024-03-26T15:15:48.203",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-41972",
|
"id": "CVE-2023-41972",
|
||||||
"sourceIdentifier": "cve@zscaler.com",
|
"sourceIdentifier": "cve@zscaler.com",
|
||||||
"published": "2024-03-26T15:15:48.407",
|
"published": "2024-03-26T15:15:48.407",
|
||||||
"lastModified": "2024-03-26T15:15:48.407",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-41973",
|
"id": "CVE-2023-41973",
|
||||||
"sourceIdentifier": "cve@zscaler.com",
|
"sourceIdentifier": "cve@zscaler.com",
|
||||||
"published": "2024-03-26T15:15:48.613",
|
"published": "2024-03-26T15:15:48.613",
|
||||||
"lastModified": "2024-03-26T15:15:48.613",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
55
CVE-2023/CVE-2023-449xx/CVE-2023-44989.json
Normal file
55
CVE-2023/CVE-2023-449xx/CVE-2023-44989.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-44989",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-03-26T18:15:08.273",
|
||||||
|
"lastModified": "2024-03-26T18:15:08.273",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Insertion of Sensitive Information into Log File vulnerability in GSheetConnector CF7 Google Sheets Connector.This issue affects CF7 Google Sheets Connector: from n/a through 5.0.5.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-532"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/cf7-google-sheets-connector/wordpress-cf7-google-sheets-connector-plugin-5-0-5-sensitive-data-exposure-via-debug-log-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-47150",
|
"id": "CVE-2023-47150",
|
||||||
"sourceIdentifier": "psirt@us.ibm.com",
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
"published": "2024-03-26T14:15:08.173",
|
"published": "2024-03-26T14:15:08.173",
|
||||||
"lastModified": "2024-03-26T14:15:08.173",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-50894",
|
"id": "CVE-2023-50894",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-26T15:15:48.797",
|
"published": "2024-03-26T15:15:48.797",
|
||||||
"lastModified": "2024-03-26T15:15:48.797",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-50895",
|
"id": "CVE-2023-50895",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-26T15:15:48.860",
|
"published": "2024-03-26T15:15:48.860",
|
||||||
"lastModified": "2024-03-26T15:15:48.860",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-52214",
|
"id": "CVE-2023-52214",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-03-26T13:15:44.857",
|
"published": "2024-03-26T13:15:44.857",
|
||||||
"lastModified": "2024-03-26T13:15:44.857",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
32
CVE-2023/CVE-2023-526xx/CVE-2023-52621.json
Normal file
32
CVE-2023/CVE-2023-526xx/CVE-2023-52621.json
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-52621",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-03-26T18:15:08.817",
|
||||||
|
"lastModified": "2024-03-26T18:15:08.817",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check rcu_read_lock_trace_held() before calling bpf map helpers\n\nThese three bpf_map_{lookup,update,delete}_elem() helpers are also\navailable for sleepable bpf program, so add the corresponding lock\nassertion for sleepable bpf program, otherwise the following warning\nwill be reported when a sleepable bpf program manipulates bpf map under\ninterpreter mode (aka bpf_jit_enable=0):\n\n WARNING: CPU: 3 PID: 4985 at kernel/bpf/helpers.c:40 ......\n CPU: 3 PID: 4985 Comm: test_progs Not tainted 6.6.0+ #2\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) ......\n RIP: 0010:bpf_map_lookup_elem+0x54/0x60\n ......\n Call Trace:\n <TASK>\n ? __warn+0xa5/0x240\n ? bpf_map_lookup_elem+0x54/0x60\n ? report_bug+0x1ba/0x1f0\n ? handle_bug+0x40/0x80\n ? exc_invalid_op+0x18/0x50\n ? asm_exc_invalid_op+0x1b/0x20\n ? __pfx_bpf_map_lookup_elem+0x10/0x10\n ? rcu_lockdep_current_cpu_online+0x65/0xb0\n ? rcu_is_watching+0x23/0x50\n ? bpf_map_lookup_elem+0x54/0x60\n ? __pfx_bpf_map_lookup_elem+0x10/0x10\n ___bpf_prog_run+0x513/0x3b70\n __bpf_prog_run32+0x9d/0xd0\n ? __bpf_prog_enter_sleepable_recur+0xad/0x120\n ? __bpf_prog_enter_sleepable_recur+0x3e/0x120\n bpf_trampoline_6442580665+0x4d/0x1000\n __x64_sys_getpgid+0x5/0x30\n ? do_syscall_64+0x36/0xb0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n </TASK>"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/169410eba271afc9f0fb476d996795aa26770c6d",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/483cb92334cd7f1d5387dccc0ab5d595d27a669d",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/c7f1b6146f4a46d727c0d046284c28b6882c6304",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/d6d6fe4bb105595118f12abeed4a7bdd450853f3",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
48
CVE-2023/CVE-2023-526xx/CVE-2023-52622.json
Normal file
48
CVE-2023/CVE-2023-526xx/CVE-2023-52622.json
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-52622",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-03-26T18:15:08.873",
|
||||||
|
"lastModified": "2024-03-26T18:15:08.873",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid online resizing failures due to oversized flex bg\n\nWhen we online resize an ext4 filesystem with a oversized flexbg_size,\n\n mkfs.ext4 -F -G 67108864 $dev -b 4096 100M\n mount $dev $dir\n resize2fs $dev 16G\n\nthe following WARN_ON is triggered:\n==================================================================\nWARNING: CPU: 0 PID: 427 at mm/page_alloc.c:4402 __alloc_pages+0x411/0x550\nModules linked in: sg(E)\nCPU: 0 PID: 427 Comm: resize2fs Tainted: G E 6.6.0-rc5+ #314\nRIP: 0010:__alloc_pages+0x411/0x550\nCall Trace:\n <TASK>\n __kmalloc_large_node+0xa2/0x200\n __kmalloc+0x16e/0x290\n ext4_resize_fs+0x481/0xd80\n __ext4_ioctl+0x1616/0x1d90\n ext4_ioctl+0x12/0x20\n __x64_sys_ioctl+0xf0/0x150\n do_syscall_64+0x3b/0x90\n==================================================================\n\nThis is because flexbg_size is too large and the size of the new_group_data\narray to be allocated exceeds MAX_ORDER. Currently, the minimum value of\nMAX_ORDER is 8, the minimum value of PAGE_SIZE is 4096, the corresponding\nmaximum number of groups that can be allocated is:\n\n (PAGE_SIZE << MAX_ORDER) / sizeof(struct ext4_new_group_data) \u2248 21845\n\nAnd the value that is down-aligned to the power of 2 is 16384. Therefore,\nthis value is defined as MAX_RESIZE_BG, and the number of groups added\neach time does not exceed this value during resizing, and is added multiple\ntimes to complete the online resizing. The difference is that the metadata\nin a flex_bg may be more dispersed."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/5d1935ac02ca5aee364a449a35e2977ea84509b0",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/6d2cbf517dcabc093159cf138ad5712c9c7fa954",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/8b1413dbfe49646eda2c00c0f1144ee9d3368e0c",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/b183fe8702e78bba3dcef8e7193cab6898abee07",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/cd1f93ca97a9136989f3bd2bf90696732a2ed644",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/cfbbb3199e71b63fc26cee0ebff327c47128a1e8",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/d76c8d7ffe163c6bf2f1ef680b0539c2b3902b90",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/dc3e0f55bec4410f3d74352c4a7c79f518088ee2",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
48
CVE-2023/CVE-2023-526xx/CVE-2023-52623.json
Normal file
48
CVE-2023/CVE-2023-526xx/CVE-2023-52623.json
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-52623",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-03-26T18:15:08.930",
|
||||||
|
"lastModified": "2024-03-26T18:15:08.930",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix a suspicious RCU usage warning\n\nI received the following warning while running cthon against an ontap\nserver running pNFS:\n\n[ 57.202521] =============================\n[ 57.202522] WARNING: suspicious RCU usage\n[ 57.202523] 6.7.0-rc3-g2cc14f52aeb7 #41492 Not tainted\n[ 57.202525] -----------------------------\n[ 57.202525] net/sunrpc/xprtmultipath.c:349 RCU-list traversed in non-reader section!!\n[ 57.202527]\n other info that might help us debug this:\n\n[ 57.202528]\n rcu_scheduler_active = 2, debug_locks = 1\n[ 57.202529] no locks held by test5/3567.\n[ 57.202530]\n stack backtrace:\n[ 57.202532] CPU: 0 PID: 3567 Comm: test5 Not tainted 6.7.0-rc3-g2cc14f52aeb7 #41492 5b09971b4965c0aceba19f3eea324a4a806e227e\n[ 57.202534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS unknown 2/2/2022\n[ 57.202536] Call Trace:\n[ 57.202537] <TASK>\n[ 57.202540] dump_stack_lvl+0x77/0xb0\n[ 57.202551] lockdep_rcu_suspicious+0x154/0x1a0\n[ 57.202556] rpc_xprt_switch_has_addr+0x17c/0x190 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202596] rpc_clnt_setup_test_and_add_xprt+0x50/0x180 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202621] ? rpc_clnt_add_xprt+0x254/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202646] rpc_clnt_add_xprt+0x27a/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202671] ? __pfx_rpc_clnt_setup_test_and_add_xprt+0x10/0x10 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202696] nfs4_pnfs_ds_connect+0x345/0x760 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202728] ? __pfx_nfs4_test_session_trunk+0x10/0x10 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202754] nfs4_fl_prepare_ds+0x75/0xc0 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a]\n[ 57.202760] filelayout_write_pagelist+0x4a/0x200 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a]\n[ 57.202765] pnfs_generic_pg_writepages+0xbe/0x230 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202788] __nfs_pageio_add_request+0x3fd/0x520 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202813] nfs_pageio_add_request+0x18b/0x390 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202831] nfs_do_writepage+0x116/0x1e0 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202849] nfs_writepages_callback+0x13/0x30 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202866] write_cache_pages+0x265/0x450\n[ 57.202870] ? __pfx_nfs_writepages_callback+0x10/0x10 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202891] nfs_writepages+0x141/0x230 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202913] do_writepages+0xd2/0x230\n[ 57.202917] ? filemap_fdatawrite_wbc+0x5c/0x80\n[ 57.202921] filemap_fdatawrite_wbc+0x67/0x80\n[ 57.202924] filemap_write_and_wait_range+0xd9/0x170\n[ 57.202930] nfs_wb_all+0x49/0x180 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202947] nfs4_file_flush+0x72/0xb0 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202969] __se_sys_close+0x46/0xd0\n[ 57.202972] do_syscall_64+0x68/0x100\n[ 57.202975] ? do_syscall_64+0x77/0x100\n[ 57.202976] ? do_syscall_64+0x77/0x100\n[ 57.202979] entry_SYSCALL_64_after_hwframe+0x6e/0x76\n[ 57.202982] RIP: 0033:0x7fe2b12e4a94\n[ 57.202985] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 80 3d d5 18 0e 00 00 74 13 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 44 c3 0f 1f 00 48 83 ec 18 89 7c 24 0c e8 c3\n[ 57.202987] RSP: 002b:00007ffe857ddb38 EFLAGS: 00000202 ORIG_RAX: 0000000000000003\n[ 57.202989] RAX: ffffffffffffffda RBX: 00007ffe857dfd68 RCX: 00007fe2b12e4a94\n[ 57.202991] RDX: 0000000000002000 RSI: 00007ffe857ddc40 RDI: 0000000000000003\n[ 57.202992] RBP: 00007ffe857dfc50 R08: 7fffffffffffffff R09: 0000000065650f49\n[ 57.202993] R10: 00007f\n---truncated---"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/31b62908693c90d4d07db597e685d9f25a120073",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/69c7eeb4f622c2a28da965f970f982db171f3dc6",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/7a96d85bf196c170dcf1b47a82e9bb97cca69aa6",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/8f860c8407470baff2beb9982ad6b172c94f1d0a",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/c430e6bb43955c6bf573665fcebf31694925b9f7",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/e8ca3e73301e23e8c0ac0ce2e6bac4545cd776e0",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/f8cf4dabbdcb8bef85335b0ed7ad5b25fd82ff56",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/fece80a2a6718ed58487ce397285bb1b83a3e54e",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
24
CVE-2023/CVE-2023-526xx/CVE-2023-52624.json
Normal file
24
CVE-2023/CVE-2023-526xx/CVE-2023-52624.json
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-52624",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-03-26T18:15:08.990",
|
||||||
|
"lastModified": "2024-03-26T18:15:08.990",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Wake DMCUB before executing GPINT commands\n\n[Why]\nDMCUB can be in idle when we attempt to interface with the HW through\nthe GPINT mailbox resulting in a system hang.\n\n[How]\nAdd dc_wake_and_execute_gpint() to wrap the wake, execute, sleep\nsequence.\n\nIf the GPINT executes successfully then DMCUB will be put back into\nsleep after the optional response is returned.\n\nIt functions similar to the inbox command interface."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/2ef98c6d753a744e333b7e34b9cf687040fba57d",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/e5ffd1263dd5b44929c676171802e7b6af483f21",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
24
CVE-2023/CVE-2023-526xx/CVE-2023-52625.json
Normal file
24
CVE-2023/CVE-2023-526xx/CVE-2023-52625.json
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-52625",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-03-26T18:15:09.040",
|
||||||
|
"lastModified": "2024-03-26T18:15:09.040",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Refactor DMCUB enter/exit idle interface\n\n[Why]\nWe can hang in place trying to send commands when the DMCUB isn't\npowered on.\n\n[How]\nWe need to exit out of the idle state prior to sending a command,\nbut the process that performs the exit also invokes a command itself.\n\nFixing this issue involves the following:\n\n1. Using a software state to track whether or not we need to start\n the process to exit idle or notify idle.\n\nIt's possible for the hardware to have exited an idle state without\ndriver knowledge, but entering one is always restricted to a driver\nallow - which makes the SW state vs HW state mismatch issue purely one\nof optimization, which should seldomly be hit, if at all.\n\n2. Refactor any instances of exit/notify idle to use a single wrapper\n that maintains this SW state.\n\nThis works simialr to dc_allow_idle_optimizations, but works at the\nDMCUB level and makes sure the state is marked prior to any notify/exit\nidle so we don't enter an infinite loop.\n\n3. Make sure we exit out of idle prior to sending any commands or\n waiting for DMCUB idle.\n\nThis patch takes care of 1/2. A future patch will take care of wrapping\nDMCUB command submission with calls to this new interface."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/820c3870c491946a78950cdf961bf40e28c1025f",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/8e57c06bf4b0f51a4d6958e15e1a99c9520d00fa",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
28
CVE-2023/CVE-2023-526xx/CVE-2023-52626.json
Normal file
28
CVE-2023/CVE-2023-526xx/CVE-2023-52626.json
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-52626",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-03-26T18:15:09.087",
|
||||||
|
"lastModified": "2024-03-26T18:15:09.087",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix operation precedence bug in port timestamping napi_poll context\n\nIndirection (*) is of lower precedence than postfix increment (++). Logic\nin napi_poll context would cause an out-of-bound read by first increment\nthe pointer address by byte address space and then dereference the value.\nRather, the intended logic was to dereference first and then increment the\nunderlying value."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/33cdeae8c6fb58cc445f859b67c014dc9f60b4e0",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/3876638b2c7ebb2c9d181de1191db0de8cac143a",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/40e0d0746390c5b0c31144f4f1688d72f3f8d790",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
40
CVE-2023/CVE-2023-526xx/CVE-2023-52627.json
Normal file
40
CVE-2023/CVE-2023-526xx/CVE-2023-52627.json
Normal file
@ -0,0 +1,40 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-52627",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-03-26T18:15:09.140",
|
||||||
|
"lastModified": "2024-03-26T18:15:09.140",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: adc: ad7091r: Allow users to configure device events\n\nAD7091R-5 devices are supported by the ad7091r-5 driver together with\nthe ad7091r-base driver. Those drivers declared iio events for notifying\nuser space when ADC readings fall bellow the thresholds of low limit\nregisters or above the values set in high limit registers.\nHowever, to configure iio events and their thresholds, a set of callback\nfunctions must be implemented and those were not present until now.\nThe consequence of trying to configure ad7091r-5 events without the\nproper callback functions was a null pointer dereference in the kernel\nbecause the pointers to the callback functions were not set.\n\nImplement event configuration callbacks allowing users to read/write\nevent thresholds and enable/disable event generation.\n\nSince the event spec structs are generic to AD7091R devices, also move\nthose from the ad7091r-5 driver the base driver so they can be reused\nwhen support for ad7091r-2/-4/-8 be added."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/020e71c7ffc25dfe29ed9be6c2d39af7bd7f661f",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/137568aa540a9f587c48ff7d4c51cdba08cfe9a4",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/1eba6f7ffa295a0eec098c107043074be7cc4ec5",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/49f322ce1f265935f15e5512da69a399f27a5091",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/55aca2ce91a63740278502066beaddbd841af9c6",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/89c4e63324e208a23098f7fb15c00487cecbfed2",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-1086",
|
"id": "CVE-2024-1086",
|
||||||
"sourceIdentifier": "cve-coordination@google.com",
|
"sourceIdentifier": "cve-coordination@google.com",
|
||||||
"published": "2024-01-31T13:15:10.827",
|
"published": "2024-01-31T13:15:10.827",
|
||||||
"lastModified": "2024-02-06T02:15:08.303",
|
"lastModified": "2024-03-26T18:15:09.193",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -127,6 +127,10 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Notselwyn/CVE-2024-1086",
|
||||||
|
"source": "cve-coordination@google.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660",
|
"url": "https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660",
|
||||||
"source": "cve-coordination@google.com",
|
"source": "cve-coordination@google.com",
|
||||||
@ -137,6 +141,14 @@
|
|||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/",
|
||||||
"source": "cve-coordination@google.com"
|
"source": "cve-coordination@google.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://news.ycombinator.com/item?id=39828424",
|
||||||
|
"source": "cve-coordination@google.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://pwning.tech/nftables/",
|
||||||
|
"source": "cve-coordination@google.com"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
55
CVE-2024/CVE-2024-13xx/CVE-2024-1313.json
Normal file
55
CVE-2024/CVE-2024-13xx/CVE-2024-1313.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-1313",
|
||||||
|
"sourceIdentifier": "security@grafana.com",
|
||||||
|
"published": "2024-03-26T18:15:09.350",
|
||||||
|
"lastModified": "2024-03-26T18:15:09.350",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized.\n\nGrafana Labs would like to thank Ravid Mazon and Jay Chen of Palo \nAlto Research for discovering and disclosing this vulnerability.\n\nThis issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@grafana.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@grafana.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-639"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://grafana.com/security/security-advisories/cve-2024-1313/",
|
||||||
|
"source": "security@grafana.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-1455",
|
"id": "CVE-2024-1455",
|
||||||
"sourceIdentifier": "security@huntr.dev",
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
"published": "2024-03-26T14:15:08.450",
|
"published": "2024-03-26T14:15:08.450",
|
||||||
"lastModified": "2024-03-26T14:15:08.450",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-1933",
|
"id": "CVE-2024-1933",
|
||||||
"sourceIdentifier": "psirt@teamviewer.com",
|
"sourceIdentifier": "psirt@teamviewer.com",
|
||||||
"published": "2024-03-26T13:15:45.077",
|
"published": "2024-03-26T13:15:45.077",
|
||||||
"lastModified": "2024-03-26T13:15:45.077",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-21912",
|
"id": "CVE-2024-21912",
|
||||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||||
"published": "2024-03-26T16:15:10.440",
|
"published": "2024-03-26T16:15:10.440",
|
||||||
"lastModified": "2024-03-26T16:15:10.440",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-21913",
|
"id": "CVE-2024-21913",
|
||||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||||
"published": "2024-03-26T16:15:10.670",
|
"published": "2024-03-26T16:15:10.670",
|
||||||
"lastModified": "2024-03-26T16:15:10.670",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-21918",
|
"id": "CVE-2024-21918",
|
||||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||||
"published": "2024-03-26T16:15:10.877",
|
"published": "2024-03-26T16:15:10.877",
|
||||||
"lastModified": "2024-03-26T16:15:10.877",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-21919",
|
"id": "CVE-2024-21919",
|
||||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||||
"published": "2024-03-26T16:15:11.073",
|
"published": "2024-03-26T16:15:11.073",
|
||||||
"lastModified": "2024-03-26T16:15:11.073",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-21920",
|
"id": "CVE-2024-21920",
|
||||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||||
"published": "2024-03-26T16:15:11.277",
|
"published": "2024-03-26T16:15:11.277",
|
||||||
"lastModified": "2024-03-26T16:15:11.277",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-22156",
|
"id": "CVE-2024-22156",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-03-26T13:15:45.277",
|
"published": "2024-03-26T13:15:45.277",
|
||||||
"lastModified": "2024-03-26T13:15:45.277",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-22356",
|
"id": "CVE-2024-22356",
|
||||||
"sourceIdentifier": "psirt@us.ibm.com",
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
"published": "2024-03-26T15:15:48.920",
|
"published": "2024-03-26T15:15:48.920",
|
||||||
"lastModified": "2024-03-26T15:15:48.920",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2212",
|
"id": "CVE-2024-2212",
|
||||||
"sourceIdentifier": "emo@eclipse.org",
|
"sourceIdentifier": "emo@eclipse.org",
|
||||||
"published": "2024-03-26T16:15:13.233",
|
"published": "2024-03-26T16:15:13.233",
|
||||||
"lastModified": "2024-03-26T16:15:13.233",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2214",
|
"id": "CVE-2024-2214",
|
||||||
"sourceIdentifier": "emo@eclipse.org",
|
"sourceIdentifier": "emo@eclipse.org",
|
||||||
"published": "2024-03-26T16:15:13.430",
|
"published": "2024-03-26T16:15:13.430",
|
||||||
"lastModified": "2024-03-26T16:15:13.430",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-23482",
|
"id": "CVE-2024-23482",
|
||||||
"sourceIdentifier": "cve@zscaler.com",
|
"sourceIdentifier": "cve@zscaler.com",
|
||||||
"published": "2024-03-26T15:15:49.130",
|
"published": "2024-03-26T15:15:49.130",
|
||||||
"lastModified": "2024-03-26T15:15:49.130",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-23722",
|
"id": "CVE-2024-23722",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-26T15:15:49.317",
|
"published": "2024-03-26T15:15:49.317",
|
||||||
"lastModified": "2024-03-26T15:15:49.317",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2452",
|
"id": "CVE-2024-2452",
|
||||||
"sourceIdentifier": "emo@eclipse.org",
|
"sourceIdentifier": "emo@eclipse.org",
|
||||||
"published": "2024-03-26T16:15:13.623",
|
"published": "2024-03-26T16:15:13.623",
|
||||||
"lastModified": "2024-03-26T16:15:13.623",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-25956",
|
"id": "CVE-2024-25956",
|
||||||
"sourceIdentifier": "security_alert@emc.com",
|
"sourceIdentifier": "security_alert@emc.com",
|
||||||
"published": "2024-03-26T16:15:11.520",
|
"published": "2024-03-26T16:15:11.520",
|
||||||
"lastModified": "2024-03-26T16:15:11.520",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-25957",
|
"id": "CVE-2024-25957",
|
||||||
"sourceIdentifier": "security_alert@emc.com",
|
"sourceIdentifier": "security_alert@emc.com",
|
||||||
"published": "2024-03-26T16:15:11.727",
|
"published": "2024-03-26T16:15:11.727",
|
||||||
"lastModified": "2024-03-26T16:15:11.727",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-25958",
|
"id": "CVE-2024-25958",
|
||||||
"sourceIdentifier": "security_alert@emc.com",
|
"sourceIdentifier": "security_alert@emc.com",
|
||||||
"published": "2024-03-26T16:15:11.917",
|
"published": "2024-03-26T16:15:11.917",
|
||||||
"lastModified": "2024-03-26T16:15:11.917",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,9 +2,8 @@
|
|||||||
"id": "CVE-2024-2553",
|
"id": "CVE-2024-2553",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-17T04:15:07.073",
|
"published": "2024-03-17T04:15:07.073",
|
||||||
"lastModified": "2024-03-21T02:52:37.573",
|
"lastModified": "2024-03-26T17:15:47.490",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -77,6 +76,10 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/CVE-2024-2553%20-%20Product%20Rating%20System%20-%20Cross-Site-Scripting.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/Product%20Rating%20System%20-%20Cross-Site-Scripting-1.md",
|
"url": "https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/Product%20Rating%20System%20-%20Cross-Site-Scripting-1.md",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com"
|
||||||
@ -88,6 +91,10 @@
|
|||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.257052",
|
"url": "https://vuldb.com/?id.257052",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.298886",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-26644",
|
"id": "CVE-2024-26644",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-03-26T16:15:12.137",
|
"published": "2024-03-26T16:15:12.137",
|
||||||
"lastModified": "2024-03-26T16:15:12.137",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-26645",
|
"id": "CVE-2024-26645",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-03-26T16:15:12.207",
|
"published": "2024-03-26T16:15:12.207",
|
||||||
"lastModified": "2024-03-26T16:15:12.207",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
32
CVE-2024/CVE-2024-266xx/CVE-2024-26646.json
Normal file
32
CVE-2024/CVE-2024-266xx/CVE-2024-26646.json
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-26646",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-03-26T18:15:09.910",
|
||||||
|
"lastModified": "2024-03-26T18:15:09.910",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal: intel: hfi: Add syscore callbacks for system-wide PM\n\nThe kernel allocates a memory buffer and provides its location to the\nhardware, which uses it to update the HFI table. This allocation occurs\nduring boot and remains constant throughout runtime.\n\nWhen resuming from hibernation, the restore kernel allocates a second\nmemory buffer and reprograms the HFI hardware with the new location as\npart of a normal boot. The location of the second memory buffer may\ndiffer from the one allocated by the image kernel.\n\nWhen the restore kernel transfers control to the image kernel, its HFI\nbuffer becomes invalid, potentially leading to memory corruption if the\nhardware writes to it (the hardware continues to use the buffer from the\nrestore kernel).\n\nIt is also possible that the hardware \"forgets\" the address of the memory\nbuffer when resuming from \"deep\" suspend. Memory corruption may also occur\nin such a scenario.\n\nTo prevent the described memory corruption, disable HFI when preparing to\nsuspend or hibernate. Enable it when resuming.\n\nAdd syscore callbacks to handle the package of the boot CPU (packages of\nnon-boot CPUs are handled via CPU offline). Syscore ops always run on the\nboot CPU. Additionally, HFI only needs to be disabled during \"deep\" suspend\nand hibernation. Syscore ops only run in these cases.\n\n[ rjw: Comment adjustment, subject and changelog edits ]"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/019ccc66d56a696a4dfee3bfa2f04d0a7c3d89ee",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/28f010dc50df0f7987c04112114fcfa7e0803566",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/97566d09fd02d2ab329774bb89a2cdf2267e86d9",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/c9d6d63b6c03afaa6f185df249af693a7939577c",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
28
CVE-2024/CVE-2024-266xx/CVE-2024-26647.json
Normal file
28
CVE-2024/CVE-2024-266xx/CVE-2024-26647.json
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-26647",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-03-26T18:15:10.063",
|
||||||
|
"lastModified": "2024-03-26T18:15:10.063",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'\n\nIn link_set_dsc_pps_packet(), 'struct display_stream_compressor *dsc'\nwas dereferenced in a DC_LOGGER_INIT(dsc->ctx->logger); before the 'dsc'\nNULL pointer check.\n\nFixes the below:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/link/link_dpms.c:905 link_set_dsc_pps_packet() warn: variable dereferenced before check 'dsc' (see line 903)"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/3bb9b1f958c3d986ed90a3ff009f1e77e9553207",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/6aa5ede6665122f4c8abce3c6eba06b49e54d25c",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/cf656fc7276e5b3709a81bc9d9639459be2b2647",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
28
CVE-2024/CVE-2024-266xx/CVE-2024-26648.json
Normal file
28
CVE-2024/CVE-2024-266xx/CVE-2024-26648.json
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-26648",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-03-26T18:15:10.220",
|
||||||
|
"lastModified": "2024-03-26T18:15:10.220",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()\n\nIn edp_setup_replay(), 'struct dc *dc' & 'struct dmub_replay *replay'\nwas dereferenced before the pointer 'link' & 'replay' NULL check.\n\nFixes the below:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/link/protocols/link_edp_panel_control.c:947 edp_setup_replay() warn: variable dereferenced before check 'link' (see line 933)"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/22ae604aea14756954e1c00ae653e34d2afd2935",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/7073934f5d73f8b53308963cee36f0d389ea857c",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/c02d257c654191ecda1dc1af6875d527e85310e7",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
28
CVE-2024/CVE-2024-266xx/CVE-2024-26649.json
Normal file
28
CVE-2024/CVE-2024-266xx/CVE-2024-26649.json
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-26649",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-03-26T18:15:10.370",
|
||||||
|
"lastModified": "2024-03-26T18:15:10.370",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix the null pointer when load rlc firmware\n\nIf the RLC firmware is invalid because of wrong header size,\nthe pointer to the rlc firmware is released in function\namdgpu_ucode_request. There will be a null pointer error\nin subsequent use. So skip validation to fix it."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/8b5bacce2d13dbe648f0bfd3f738ecce8db4978c",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/bc03c02cc1991a066b23e69bbcc0f66e8f1f7453",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/d3887448486caeef9687fb5dfebd4ff91e0f25aa",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
32
CVE-2024/CVE-2024-266xx/CVE-2024-26650.json
Normal file
32
CVE-2024/CVE-2024-266xx/CVE-2024-26650.json
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-26650",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-03-26T18:15:10.530",
|
||||||
|
"lastModified": "2024-03-26T18:15:10.530",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe\n\np2sb_bar() unhides P2SB device to get resources from the device. It\nguards the operation by locking pci_rescan_remove_lock so that parallel\nrescans do not find the P2SB device. However, this lock causes deadlock\nwhen PCI bus rescan is triggered by /sys/bus/pci/rescan. The rescan\nlocks pci_rescan_remove_lock and probes PCI devices. When PCI devices\ncall p2sb_bar() during probe, it locks pci_rescan_remove_lock again.\nHence the deadlock.\n\nTo avoid the deadlock, do not lock pci_rescan_remove_lock in p2sb_bar().\nInstead, do the lock at fs_initcall. Introduce p2sb_cache_resources()\nfor fs_initcall which gets and caches the P2SB resources. At p2sb_bar(),\nrefer the cache and return to the caller.\n\nBefore operating the device at P2SB DEVFN for resource cache, check\nthat its device class is PCI_CLASS_MEMORY_OTHER 0x0580 that PCH\nspecifications define. This avoids unexpected operation to other devices\nat the same DEVFN.\n\nTested-by Klara Modin <klarasmodin@gmail.com>"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/2841631a03652f32b595c563695d0461072e0de4",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/5913320eb0b3ec88158cfcb0fa5e996bf4ef681b",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/847e1eb30e269a094da046c08273abe3f3361cf2",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/d281ac9a987c553d93211b90fd4fe97d8eca32cd",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,12 +2,16 @@
|
|||||||
"id": "CVE-2024-27756",
|
"id": "CVE-2024-27756",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-15T07:15:09.923",
|
"published": "2024-03-15T07:15:09.923",
|
||||||
"lastModified": "2024-03-15T12:53:06.423",
|
"lastModified": "2024-03-26T18:15:10.693",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An issue in GLPI v.10.0.12 and before allows a remote attacker to execute arbitrary code, escalate privileges, and obtain sensitive information via a crafted script to the title field."
|
"value": "GLPI through 10.0.12 allows CSV injection by an attacker who is able to create an asset with a crafted title."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Un problema en GLPI v.10.0.12 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de un script manipulado en el campo de t\u00edtulo."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2891",
|
"id": "CVE-2024-2891",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-26T14:15:09.530",
|
"published": "2024-03-26T14:15:09.530",
|
||||||
"lastModified": "2024-03-26T14:15:09.530",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2892",
|
"id": "CVE-2024-2892",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-26T16:15:13.853",
|
"published": "2024-03-26T16:15:13.853",
|
||||||
"lastModified": "2024-03-26T16:15:13.853",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
92
CVE-2024/CVE-2024-28xx/CVE-2024-2893.json
Normal file
92
CVE-2024/CVE-2024-28xx/CVE-2024-2893.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2893",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-03-26T17:15:47.810",
|
||||||
|
"lastModified": "2024-03-26T17:15:47.810",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in Tenda AC7 15.03.06.44 and classified as critical. Affected by this issue is the function formSetDeviceName of the file /goform/SetOnlineDevName. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257936. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "COMPLETE",
|
||||||
|
"integrityImpact": "COMPLETE",
|
||||||
|
"availabilityImpact": "COMPLETE",
|
||||||
|
"baseScore": 9.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 10.0,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-121"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formSetDeviceName_devName.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.257936",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.257936",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.300356",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-28xx/CVE-2024-2894.json
Normal file
92
CVE-2024/CVE-2024-28xx/CVE-2024-2894.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2894",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-03-26T17:15:48.080",
|
||||||
|
"lastModified": "2024-03-26T17:15:48.080",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in Tenda AC7 15.03.06.44. It has been classified as critical. This affects the function formSetQosBand of the file /goform/SetNetControlList. The manipulation of the argument list leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257937 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "COMPLETE",
|
||||||
|
"integrityImpact": "COMPLETE",
|
||||||
|
"availabilityImpact": "COMPLETE",
|
||||||
|
"baseScore": 9.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 10.0,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-121"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formSetQosBand.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.257937",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.257937",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.300357",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-28xx/CVE-2024-2895.json
Normal file
92
CVE-2024/CVE-2024-28xx/CVE-2024-2895.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2895",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-03-26T18:15:10.893",
|
||||||
|
"lastModified": "2024-03-26T18:15:10.893",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in Tenda AC7 15.03.06.44. It has been declared as critical. This vulnerability affects the function formWifiWpsOOB of the file /goform/WifiWpsOOB. The manipulation of the argument index leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257938 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "COMPLETE",
|
||||||
|
"integrityImpact": "COMPLETE",
|
||||||
|
"availabilityImpact": "COMPLETE",
|
||||||
|
"baseScore": 9.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 10.0,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-121"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formWifiWpsOOB.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.257938",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.257938",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.300358",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
92
CVE-2024/CVE-2024-28xx/CVE-2024-2896.json
Normal file
92
CVE-2024/CVE-2024-28xx/CVE-2024-2896.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2896",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-03-26T18:15:11.543",
|
||||||
|
"lastModified": "2024-03-26T18:15:11.543",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in Tenda AC7 15.03.06.44. It has been rated as critical. This issue affects the function formWifiWpsStart of the file /goform/WifiWpsStart. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257939. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "COMPLETE",
|
||||||
|
"integrityImpact": "COMPLETE",
|
||||||
|
"availabilityImpact": "COMPLETE",
|
||||||
|
"baseScore": 9.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 10.0,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-121"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formWifiWpsStart.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.257939",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.257939",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.300359",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-29197",
|
"id": "CVE-2024-29197",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-26T15:15:49.390",
|
"published": "2024-03-26T15:15:49.390",
|
||||||
"lastModified": "2024-03-26T15:15:49.390",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-29203",
|
"id": "CVE-2024-29203",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-26T14:15:08.747",
|
"published": "2024-03-26T14:15:08.747",
|
||||||
"lastModified": "2024-03-26T14:15:08.747",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-29401",
|
"id": "CVE-2024-29401",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-26T15:15:49.620",
|
"published": "2024-03-26T15:15:49.620",
|
||||||
"lastModified": "2024-03-26T15:15:49.620",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-29684",
|
"id": "CVE-2024-29684",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-26T14:15:09.003",
|
"published": "2024-03-26T14:15:09.003",
|
||||||
"lastModified": "2024-03-26T14:15:09.003",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
36
CVE-2024/CVE-2024-297xx/CVE-2024-29735.json
Normal file
36
CVE-2024/CVE-2024-297xx/CVE-2024-29735.json
Normal file
@ -0,0 +1,36 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-29735",
|
||||||
|
"sourceIdentifier": "security@apache.org",
|
||||||
|
"published": "2024-03-26T17:15:47.380",
|
||||||
|
"lastModified": "2024-03-26T17:15:47.380",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Improper Preservation of Permissions vulnerability in Apache Airflow.This issue affects Apache Airflow from 2.8.2 through 2.8.3.\n\nAirflow's local file task handler in Airflow incorrectly set permissions for all parent folders of log folder, in default configuration adding write access to Unix group\u00a0of the folders. In the case Airflow is run with the root user (not recommended) it added group write permission to all folders up to the root of the filesystem.\n\nIf your log files are stored in the home directory, these permission changes might impact your ability to run SSH operations after your home directory becomes group-writeable.\n\nThis issue does not affect users who use or extend Airflow using Official Airflow Docker reference images ( https://hub.docker.com/r/apache/airflow/ ) - those images require to have group write permission set anyway.\n\nYou are affected only if you install Airflow using local installation / virtualenv or other Docker images, but the issue has no impact if docker containers are used as intended, i.e. where Airflow components do not share containers with other applications and users.\n\nAlso you should not be affected if your umask is 002 (group write enabled) - this is the default on many linux systems.\n\nRecommendation for users using Airflow outside of the containers:\n\n * if you are using root to run Airflow, change your Airflow user to use non-root\n * upgrade Apache Airflow to 2.8.4 or above\n * If you prefer not to upgrade, you can change the https://airflow.apache.org/docs/apache-airflow/stable/configurations-ref.html#file-task-handler-new-folder-permissions \u00a0to 0o755 (original value 0o775).\n * if you already ran Airflow tasks before and your default umask is 022 (group write disabled) you should stop Airflow components, check permissions of AIRFLOW_HOME/logs\u00a0in all your components and all parent directories of this directory and remove group write access for all the parent directories\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@apache.org",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-281"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/apache/airflow/pull/37310",
|
||||||
|
"source": "security@apache.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://lists.apache.org/thread/8khb1rtbznh100o325fb8xw5wjvtv536",
|
||||||
|
"source": "security@apache.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-29808",
|
"id": "CVE-2024-29808",
|
||||||
"sourceIdentifier": "info@appcheck-ng.com",
|
"sourceIdentifier": "info@appcheck-ng.com",
|
||||||
"published": "2024-03-26T16:15:12.323",
|
"published": "2024-03-26T16:15:12.323",
|
||||||
"lastModified": "2024-03-26T16:15:12.323",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-29809",
|
"id": "CVE-2024-29809",
|
||||||
"sourceIdentifier": "info@appcheck-ng.com",
|
"sourceIdentifier": "info@appcheck-ng.com",
|
||||||
"published": "2024-03-26T16:15:12.520",
|
"published": "2024-03-26T16:15:12.520",
|
||||||
"lastModified": "2024-03-26T16:15:12.520",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-29810",
|
"id": "CVE-2024-29810",
|
||||||
"sourceIdentifier": "info@appcheck-ng.com",
|
"sourceIdentifier": "info@appcheck-ng.com",
|
||||||
"published": "2024-03-26T16:15:12.707",
|
"published": "2024-03-26T16:15:12.707",
|
||||||
"lastModified": "2024-03-26T16:15:12.707",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-29832",
|
"id": "CVE-2024-29832",
|
||||||
"sourceIdentifier": "info@appcheck-ng.com",
|
"sourceIdentifier": "info@appcheck-ng.com",
|
||||||
"published": "2024-03-26T16:15:12.890",
|
"published": "2024-03-26T16:15:12.890",
|
||||||
"lastModified": "2024-03-26T16:15:12.890",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-29833",
|
"id": "CVE-2024-29833",
|
||||||
"sourceIdentifier": "info@appcheck-ng.com",
|
"sourceIdentifier": "info@appcheck-ng.com",
|
||||||
"published": "2024-03-26T16:15:13.063",
|
"published": "2024-03-26T16:15:13.063",
|
||||||
"lastModified": "2024-03-26T16:15:13.063",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-29881",
|
"id": "CVE-2024-29881",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-26T14:15:09.070",
|
"published": "2024-03-26T14:15:09.070",
|
||||||
"lastModified": "2024-03-26T14:15:09.070",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-29883",
|
"id": "CVE-2024-29883",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-26T14:15:09.280",
|
"published": "2024-03-26T14:15:09.280",
|
||||||
"lastModified": "2024-03-26T14:15:09.280",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2906",
|
"id": "CVE-2024-2906",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-03-26T13:15:45.497",
|
"published": "2024-03-26T13:15:45.497",
|
||||||
"lastModified": "2024-03-26T13:15:45.497",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2915",
|
"id": "CVE-2024-2915",
|
||||||
"sourceIdentifier": "security@devolutions.net",
|
"sourceIdentifier": "security@devolutions.net",
|
||||||
"published": "2024-03-26T16:15:14.117",
|
"published": "2024-03-26T16:15:14.117",
|
||||||
"lastModified": "2024-03-26T16:15:14.117",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2921",
|
"id": "CVE-2024-2921",
|
||||||
"sourceIdentifier": "security@devolutions.net",
|
"sourceIdentifier": "security@devolutions.net",
|
||||||
"published": "2024-03-26T16:15:14.173",
|
"published": "2024-03-26T16:15:14.173",
|
||||||
"lastModified": "2024-03-26T16:15:14.173",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2929",
|
"id": "CVE-2024-2929",
|
||||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||||
"published": "2024-03-26T16:15:14.230",
|
"published": "2024-03-26T16:15:14.230",
|
||||||
"lastModified": "2024-03-26T16:15:14.230",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
55
CVE-2024/CVE-2024-29xx/CVE-2024-2951.json
Normal file
55
CVE-2024/CVE-2024-29xx/CVE-2024-2951.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2951",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2024-03-26T18:15:12.160",
|
||||||
|
"lastModified": "2024-03-26T18:15:12.160",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Metagauss RegistrationMagic.This issue affects RegistrationMagic: from n/a through 5.3.0.0.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-352"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/custom-registration-form-builder-with-submission-manager/wordpress-registrationmagic-plugin-5-3-0-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-30233",
|
"id": "CVE-2024-30233",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-03-26T13:15:45.710",
|
"published": "2024-03-26T13:15:45.710",
|
||||||
"lastModified": "2024-03-26T13:15:45.710",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-30234",
|
"id": "CVE-2024-30234",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-03-26T13:15:45.927",
|
"published": "2024-03-26T13:15:45.927",
|
||||||
"lastModified": "2024-03-26T13:15:45.927",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-30235",
|
"id": "CVE-2024-30235",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-03-26T13:15:46.153",
|
"published": "2024-03-26T13:15:46.153",
|
||||||
"lastModified": "2024-03-26T13:15:46.153",
|
"lastModified": "2024-03-26T17:09:53.043",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
91
README.md
91
README.md
@ -1,13 +1,9 @@
|
|||||||
# nvd-json-data-feeds
|
# nvd-json-data-feeds
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
[](https://github.com/fkie-cad/nvd-json-data-feeds/actions/workflows/monitor_release.yml)
|
[](https://github.com/fkie-cad/nvd-json-data-feeds/actions/workflows/monitor_release.yml)
|
||||||
[](https://github.com/fkie-cad/nvd-json-data-feeds/actions/workflows/monitor_sync.yml)
|
[](https://github.com/fkie-cad/nvd-json-data-feeds/actions/workflows/monitor_sync.yml)
|
||||||
[](https://github.com/fkie-cad/nvd-json-data-feeds/actions/workflows/validate_schema.yml)
|
[](https://github.com/fkie-cad/nvd-json-data-feeds/actions/workflows/validate_schema.yml)
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
Community reconstruction of the deprecated JSON NVD Data Feeds.
|
Community reconstruction of the deprecated JSON NVD Data Feeds.
|
||||||
[Releases](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) each day at 00:00 AM UTC.
|
[Releases](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) each day at 00:00 AM UTC.
|
||||||
Repository synchronizes with the NVD every 2 hours.
|
Repository synchronizes with the NVD every 2 hours.
|
||||||
@ -17,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-03-26T17:01:08.948640+00:00
|
2024-03-26T19:00:30.705758+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-03-26T16:15:14.230000+00:00
|
2024-03-26T18:15:12.160000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -37,51 +33,64 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
242721
|
242741
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `34`
|
Recently added CVEs: `20`
|
||||||
|
|
||||||
\* [CVE-2024-21919](CVE-2024/CVE-2024-219xx/CVE-2024-21919.json) (`2024-03-26T16:15:11.073`)
|
\* [CVE-2023-44989](CVE-2023/CVE-2023-449xx/CVE-2023-44989.json) (`2024-03-26T18:15:08.273`)
|
||||||
\* [CVE-2024-21920](CVE-2024/CVE-2024-219xx/CVE-2024-21920.json) (`2024-03-26T16:15:11.277`)
|
\* [CVE-2023-52621](CVE-2023/CVE-2023-526xx/CVE-2023-52621.json) (`2024-03-26T18:15:08.817`)
|
||||||
\* [CVE-2024-2212](CVE-2024/CVE-2024-22xx/CVE-2024-2212.json) (`2024-03-26T16:15:13.233`)
|
\* [CVE-2023-52622](CVE-2023/CVE-2023-526xx/CVE-2023-52622.json) (`2024-03-26T18:15:08.873`)
|
||||||
\* [CVE-2024-2214](CVE-2024/CVE-2024-22xx/CVE-2024-2214.json) (`2024-03-26T16:15:13.430`)
|
\* [CVE-2023-52623](CVE-2023/CVE-2023-526xx/CVE-2023-52623.json) (`2024-03-26T18:15:08.930`)
|
||||||
\* [CVE-2024-22356](CVE-2024/CVE-2024-223xx/CVE-2024-22356.json) (`2024-03-26T15:15:48.920`)
|
\* [CVE-2023-52624](CVE-2023/CVE-2023-526xx/CVE-2023-52624.json) (`2024-03-26T18:15:08.990`)
|
||||||
\* [CVE-2024-23482](CVE-2024/CVE-2024-234xx/CVE-2024-23482.json) (`2024-03-26T15:15:49.130`)
|
\* [CVE-2023-52625](CVE-2023/CVE-2023-526xx/CVE-2023-52625.json) (`2024-03-26T18:15:09.040`)
|
||||||
\* [CVE-2024-23722](CVE-2024/CVE-2024-237xx/CVE-2024-23722.json) (`2024-03-26T15:15:49.317`)
|
\* [CVE-2023-52626](CVE-2023/CVE-2023-526xx/CVE-2023-52626.json) (`2024-03-26T18:15:09.087`)
|
||||||
\* [CVE-2024-2452](CVE-2024/CVE-2024-24xx/CVE-2024-2452.json) (`2024-03-26T16:15:13.623`)
|
\* [CVE-2023-52627](CVE-2023/CVE-2023-526xx/CVE-2023-52627.json) (`2024-03-26T18:15:09.140`)
|
||||||
\* [CVE-2024-25956](CVE-2024/CVE-2024-259xx/CVE-2024-25956.json) (`2024-03-26T16:15:11.520`)
|
\* [CVE-2024-1313](CVE-2024/CVE-2024-13xx/CVE-2024-1313.json) (`2024-03-26T18:15:09.350`)
|
||||||
\* [CVE-2024-25957](CVE-2024/CVE-2024-259xx/CVE-2024-25957.json) (`2024-03-26T16:15:11.727`)
|
\* [CVE-2024-26646](CVE-2024/CVE-2024-266xx/CVE-2024-26646.json) (`2024-03-26T18:15:09.910`)
|
||||||
\* [CVE-2024-25958](CVE-2024/CVE-2024-259xx/CVE-2024-25958.json) (`2024-03-26T16:15:11.917`)
|
\* [CVE-2024-26647](CVE-2024/CVE-2024-266xx/CVE-2024-26647.json) (`2024-03-26T18:15:10.063`)
|
||||||
\* [CVE-2024-26644](CVE-2024/CVE-2024-266xx/CVE-2024-26644.json) (`2024-03-26T16:15:12.137`)
|
\* [CVE-2024-26648](CVE-2024/CVE-2024-266xx/CVE-2024-26648.json) (`2024-03-26T18:15:10.220`)
|
||||||
\* [CVE-2024-26645](CVE-2024/CVE-2024-266xx/CVE-2024-26645.json) (`2024-03-26T16:15:12.207`)
|
\* [CVE-2024-26649](CVE-2024/CVE-2024-266xx/CVE-2024-26649.json) (`2024-03-26T18:15:10.370`)
|
||||||
\* [CVE-2024-2802](CVE-2024/CVE-2024-28xx/CVE-2024-2802.json) (`2024-03-26T15:15:49.677`)
|
\* [CVE-2024-26650](CVE-2024/CVE-2024-266xx/CVE-2024-26650.json) (`2024-03-26T18:15:10.530`)
|
||||||
\* [CVE-2024-2892](CVE-2024/CVE-2024-28xx/CVE-2024-2892.json) (`2024-03-26T16:15:13.853`)
|
\* [CVE-2024-2893](CVE-2024/CVE-2024-28xx/CVE-2024-2893.json) (`2024-03-26T17:15:47.810`)
|
||||||
\* [CVE-2024-2915](CVE-2024/CVE-2024-29xx/CVE-2024-2915.json) (`2024-03-26T16:15:14.117`)
|
\* [CVE-2024-2894](CVE-2024/CVE-2024-28xx/CVE-2024-2894.json) (`2024-03-26T17:15:48.080`)
|
||||||
\* [CVE-2024-29197](CVE-2024/CVE-2024-291xx/CVE-2024-29197.json) (`2024-03-26T15:15:49.390`)
|
\* [CVE-2024-2895](CVE-2024/CVE-2024-28xx/CVE-2024-2895.json) (`2024-03-26T18:15:10.893`)
|
||||||
\* [CVE-2024-2921](CVE-2024/CVE-2024-29xx/CVE-2024-2921.json) (`2024-03-26T16:15:14.173`)
|
\* [CVE-2024-2896](CVE-2024/CVE-2024-28xx/CVE-2024-2896.json) (`2024-03-26T18:15:11.543`)
|
||||||
\* [CVE-2024-2929](CVE-2024/CVE-2024-29xx/CVE-2024-2929.json) (`2024-03-26T16:15:14.230`)
|
\* [CVE-2024-2951](CVE-2024/CVE-2024-29xx/CVE-2024-2951.json) (`2024-03-26T18:15:12.160`)
|
||||||
\* [CVE-2024-29401](CVE-2024/CVE-2024-294xx/CVE-2024-29401.json) (`2024-03-26T15:15:49.620`)
|
\* [CVE-2024-29735](CVE-2024/CVE-2024-297xx/CVE-2024-29735.json) (`2024-03-26T17:15:47.380`)
|
||||||
\* [CVE-2024-29808](CVE-2024/CVE-2024-298xx/CVE-2024-29808.json) (`2024-03-26T16:15:12.323`)
|
|
||||||
\* [CVE-2024-29809](CVE-2024/CVE-2024-298xx/CVE-2024-29809.json) (`2024-03-26T16:15:12.520`)
|
|
||||||
\* [CVE-2024-29810](CVE-2024/CVE-2024-298xx/CVE-2024-29810.json) (`2024-03-26T16:15:12.707`)
|
|
||||||
\* [CVE-2024-29832](CVE-2024/CVE-2024-298xx/CVE-2024-29832.json) (`2024-03-26T16:15:12.890`)
|
|
||||||
\* [CVE-2024-29833](CVE-2024/CVE-2024-298xx/CVE-2024-29833.json) (`2024-03-26T16:15:13.063`)
|
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `7`
|
Recently modified CVEs: `50`
|
||||||
|
|
||||||
\* [CVE-2023-40547](CVE-2023/CVE-2023-405xx/CVE-2023-40547.json) (`2024-03-26T16:15:08.220`)
|
\* [CVE-2024-25957](CVE-2024/CVE-2024-259xx/CVE-2024-25957.json) (`2024-03-26T17:09:53.043`)
|
||||||
\* [CVE-2023-40548](CVE-2023/CVE-2023-405xx/CVE-2023-40548.json) (`2024-03-26T16:15:09.080`)
|
\* [CVE-2024-25958](CVE-2024/CVE-2024-259xx/CVE-2024-25958.json) (`2024-03-26T17:09:53.043`)
|
||||||
\* [CVE-2023-4194](CVE-2023/CVE-2023-41xx/CVE-2023-4194.json) (`2024-03-26T16:15:09.253`)
|
\* [CVE-2024-26644](CVE-2024/CVE-2024-266xx/CVE-2024-26644.json) (`2024-03-26T17:09:53.043`)
|
||||||
\* [CVE-2023-6240](CVE-2023/CVE-2023-62xx/CVE-2023-6240.json) (`2024-03-26T16:15:09.550`)
|
\* [CVE-2024-26645](CVE-2024/CVE-2024-266xx/CVE-2024-26645.json) (`2024-03-26T17:09:53.043`)
|
||||||
\* [CVE-2023-6780](CVE-2023/CVE-2023-67xx/CVE-2023-6780.json) (`2024-03-26T16:15:10.083`)
|
\* [CVE-2024-27756](CVE-2024/CVE-2024-277xx/CVE-2024-27756.json) (`2024-03-26T18:15:10.693`)
|
||||||
\* [CVE-2023-7216](CVE-2023/CVE-2023-72xx/CVE-2023-7216.json) (`2024-03-26T16:15:10.283`)
|
\* [CVE-2024-2891](CVE-2024/CVE-2024-28xx/CVE-2024-2891.json) (`2024-03-26T17:09:53.043`)
|
||||||
\* [CVE-2024-27455](CVE-2024/CVE-2024-274xx/CVE-2024-27455.json) (`2024-03-26T16:15:12.263`)
|
\* [CVE-2024-2892](CVE-2024/CVE-2024-28xx/CVE-2024-2892.json) (`2024-03-26T17:09:53.043`)
|
||||||
|
\* [CVE-2024-2906](CVE-2024/CVE-2024-29xx/CVE-2024-2906.json) (`2024-03-26T17:09:53.043`)
|
||||||
|
\* [CVE-2024-2915](CVE-2024/CVE-2024-29xx/CVE-2024-2915.json) (`2024-03-26T17:09:53.043`)
|
||||||
|
\* [CVE-2024-29197](CVE-2024/CVE-2024-291xx/CVE-2024-29197.json) (`2024-03-26T17:09:53.043`)
|
||||||
|
\* [CVE-2024-29203](CVE-2024/CVE-2024-292xx/CVE-2024-29203.json) (`2024-03-26T17:09:53.043`)
|
||||||
|
\* [CVE-2024-2921](CVE-2024/CVE-2024-29xx/CVE-2024-2921.json) (`2024-03-26T17:09:53.043`)
|
||||||
|
\* [CVE-2024-2929](CVE-2024/CVE-2024-29xx/CVE-2024-2929.json) (`2024-03-26T17:09:53.043`)
|
||||||
|
\* [CVE-2024-29401](CVE-2024/CVE-2024-294xx/CVE-2024-29401.json) (`2024-03-26T17:09:53.043`)
|
||||||
|
\* [CVE-2024-29684](CVE-2024/CVE-2024-296xx/CVE-2024-29684.json) (`2024-03-26T17:09:53.043`)
|
||||||
|
\* [CVE-2024-29808](CVE-2024/CVE-2024-298xx/CVE-2024-29808.json) (`2024-03-26T17:09:53.043`)
|
||||||
|
\* [CVE-2024-29809](CVE-2024/CVE-2024-298xx/CVE-2024-29809.json) (`2024-03-26T17:09:53.043`)
|
||||||
|
\* [CVE-2024-29810](CVE-2024/CVE-2024-298xx/CVE-2024-29810.json) (`2024-03-26T17:09:53.043`)
|
||||||
|
\* [CVE-2024-29832](CVE-2024/CVE-2024-298xx/CVE-2024-29832.json) (`2024-03-26T17:09:53.043`)
|
||||||
|
\* [CVE-2024-29833](CVE-2024/CVE-2024-298xx/CVE-2024-29833.json) (`2024-03-26T17:09:53.043`)
|
||||||
|
\* [CVE-2024-29881](CVE-2024/CVE-2024-298xx/CVE-2024-29881.json) (`2024-03-26T17:09:53.043`)
|
||||||
|
\* [CVE-2024-29883](CVE-2024/CVE-2024-298xx/CVE-2024-29883.json) (`2024-03-26T17:09:53.043`)
|
||||||
|
\* [CVE-2024-30233](CVE-2024/CVE-2024-302xx/CVE-2024-30233.json) (`2024-03-26T17:09:53.043`)
|
||||||
|
\* [CVE-2024-30234](CVE-2024/CVE-2024-302xx/CVE-2024-30234.json) (`2024-03-26T17:09:53.043`)
|
||||||
|
\* [CVE-2024-30235](CVE-2024/CVE-2024-302xx/CVE-2024-30235.json) (`2024-03-26T17:09:53.043`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
138
_state.csv
138
_state.csv
@ -179121,7 +179121,7 @@ CVE-2021-36754,0,0,80419907a3f286739ddc930ee2d8530009350f6d9979c531c56c6c6faea7a
|
|||||||
CVE-2021-36755,0,0,a4e3378ab825e7360a1c18e6a1cd7803e375ab234527cd5b55e8090d5292b3a4,2021-07-27T16:00:35.947000
|
CVE-2021-36755,0,0,a4e3378ab825e7360a1c18e6a1cd7803e375ab234527cd5b55e8090d5292b3a4,2021-07-27T16:00:35.947000
|
||||||
CVE-2021-36756,0,0,2363b9aecfcfe81de7ad485830d45e8b5f59565c0a9b16163803494427f1395f,2021-11-04T13:43:02.340000
|
CVE-2021-36756,0,0,2363b9aecfcfe81de7ad485830d45e8b5f59565c0a9b16163803494427f1395f,2021-11-04T13:43:02.340000
|
||||||
CVE-2021-36758,0,0,13b2b6fa03d15af5e887615108ed1cc8456a05dbb12263c90a7b95bf3da336cb,2021-08-05T14:39:50.063000
|
CVE-2021-36758,0,0,13b2b6fa03d15af5e887615108ed1cc8456a05dbb12263c90a7b95bf3da336cb,2021-08-05T14:39:50.063000
|
||||||
CVE-2021-36759,1,1,aed8d69fa650fea93ec437055bcf527641793f7aa123b2978a0345e087ca5945,2024-03-26T15:15:48.070000
|
CVE-2021-36759,0,0,aed8d69fa650fea93ec437055bcf527641793f7aa123b2978a0345e087ca5945,2024-03-26T15:15:48.070000
|
||||||
CVE-2021-3676,0,0,af393c78dea1ab200867068746124507e8affcf4dd514726b0801e3d44068230,2023-11-07T03:38:12.220000
|
CVE-2021-3676,0,0,af393c78dea1ab200867068746124507e8affcf4dd514726b0801e3d44068230,2023-11-07T03:38:12.220000
|
||||||
CVE-2021-36760,0,0,82ec72b70405000ab49044eb25f47eb172c0420e56a6980a7d71eee09fa215a0,2021-12-09T17:50:00.903000
|
CVE-2021-36760,0,0,82ec72b70405000ab49044eb25f47eb172c0420e56a6980a7d71eee09fa215a0,2021-12-09T17:50:00.903000
|
||||||
CVE-2021-36761,0,0,d010536a24c201e27e6cd758d06fc508cecf2373c852e866c9353dd8d0173ca7,2022-06-28T19:09:51.247000
|
CVE-2021-36761,0,0,d010536a24c201e27e6cd758d06fc508cecf2373c852e866c9353dd8d0173ca7,2022-06-28T19:09:51.247000
|
||||||
@ -224194,7 +224194,7 @@ CVE-2023-3385,0,0,e241d0523cea3c6af9c190fdb70f25425341aeb1b1a2cdae19227875cb149f
|
|||||||
CVE-2023-33850,0,0,72b12baa890a1451753888aa71bc88912c5010ac8efb5d0093b5e4b0d1bf044b,2023-08-28T19:51:25.020000
|
CVE-2023-33850,0,0,72b12baa890a1451753888aa71bc88912c5010ac8efb5d0093b5e4b0d1bf044b,2023-08-28T19:51:25.020000
|
||||||
CVE-2023-33851,0,0,8db788edf6a5198f3e8e5896114b0940f7896f676a9d0dab45d0b9995fc2f580,2024-02-12T19:54:23.117000
|
CVE-2023-33851,0,0,8db788edf6a5198f3e8e5896114b0940f7896f676a9d0dab45d0b9995fc2f580,2024-02-12T19:54:23.117000
|
||||||
CVE-2023-33852,0,0,523da9d9b75e64b7c746506e149f7a515a45762485db47beb2ace64d6f3001ae,2023-08-29T04:43:06.033000
|
CVE-2023-33852,0,0,523da9d9b75e64b7c746506e149f7a515a45762485db47beb2ace64d6f3001ae,2023-08-29T04:43:06.033000
|
||||||
CVE-2023-33855,0,0,0026344b4129e9b11f5c910267eb37fccd383dd96f127646b240d90d93e7608b,2024-03-26T14:15:07.903000
|
CVE-2023-33855,0,1,443fd33951f00d06bb83303d8e13b972c9c28876bf8ac2ed146d87d772451327,2024-03-26T17:09:53.043000
|
||||||
CVE-2023-33857,0,0,009b629a678d495b5ca76bd9ed766e57d21f04b1fd5cac55c82232f187a28b80,2023-07-26T20:04:15.373000
|
CVE-2023-33857,0,0,009b629a678d495b5ca76bd9ed766e57d21f04b1fd5cac55c82232f187a28b80,2023-07-26T20:04:15.373000
|
||||||
CVE-2023-3386,0,0,ca1c2f8eabd2a8ccc5353bf76dd6b68e5e018805b86e6999cd336196f7670718,2023-08-11T16:11:22.257000
|
CVE-2023-3386,0,0,ca1c2f8eabd2a8ccc5353bf76dd6b68e5e018805b86e6999cd336196f7670718,2023-08-11T16:11:22.257000
|
||||||
CVE-2023-33863,0,0,bcc6ceec655946e02a491efce99a4793246bd9fa7abf6fe4628bce4c635fc35b,2023-11-25T11:15:17.060000
|
CVE-2023-33863,0,0,bcc6ceec655946e02a491efce99a4793246bd9fa7abf6fe4628bce4c635fc35b,2023-11-25T11:15:17.060000
|
||||||
@ -228789,8 +228789,8 @@ CVE-2023-40542,0,0,11b6cee368035492cc0902cbd689ed768c381493a72ea99cc6412d219fc6a
|
|||||||
CVE-2023-40544,0,0,8edafee03220c010d1be42f0f88433974482550243d48b064788fcb74f868b01,2024-02-12T16:43:42.320000
|
CVE-2023-40544,0,0,8edafee03220c010d1be42f0f88433974482550243d48b064788fcb74f868b01,2024-02-12T16:43:42.320000
|
||||||
CVE-2023-40545,0,0,9bca2c73be74af7f189b3862ba8d7799cfe8ca7403c861883fba27fbc72753b2,2024-02-13T21:08:23.400000
|
CVE-2023-40545,0,0,9bca2c73be74af7f189b3862ba8d7799cfe8ca7403c861883fba27fbc72753b2,2024-02-13T21:08:23.400000
|
||||||
CVE-2023-40546,0,0,30f48ea722b0fa0bead0d9f96a45a07ba815b2242da2c9750215b394c4c135dc,2024-02-05T20:06:26.127000
|
CVE-2023-40546,0,0,30f48ea722b0fa0bead0d9f96a45a07ba815b2242da2c9750215b394c4c135dc,2024-02-05T20:06:26.127000
|
||||||
CVE-2023-40547,0,1,567ac9a094835c6d044d61ce859b18d6482ce0c18361ebde96473bcbec4d48a9,2024-03-26T16:15:08.220000
|
CVE-2023-40547,0,0,567ac9a094835c6d044d61ce859b18d6482ce0c18361ebde96473bcbec4d48a9,2024-03-26T16:15:08.220000
|
||||||
CVE-2023-40548,0,1,607f2edcdb6321352313e4bec2e87ab68ef460eae043be401a9b79d0bf0201ba,2024-03-26T16:15:09.080000
|
CVE-2023-40548,0,0,607f2edcdb6321352313e4bec2e87ab68ef460eae043be401a9b79d0bf0201ba,2024-03-26T16:15:09.080000
|
||||||
CVE-2023-40549,0,0,f3e5db151ee531b27b6ccdd941e8af2105e35d0f53958595d6c0bc80cce5e542,2024-02-05T21:33:24.707000
|
CVE-2023-40549,0,0,f3e5db151ee531b27b6ccdd941e8af2105e35d0f53958595d6c0bc80cce5e542,2024-02-05T21:33:24.707000
|
||||||
CVE-2023-4055,0,0,a7a42a94e357a6031ceb441913299385118b5b32f5de5204ec5e2fcae9f1b4cb,2023-08-09T21:15:11.820000
|
CVE-2023-4055,0,0,a7a42a94e357a6031ceb441913299385118b5b32f5de5204ec5e2fcae9f1b4cb,2023-08-09T21:15:11.820000
|
||||||
CVE-2023-40550,0,0,9f289352f5b3ef8fe58f1e2bc083f0230602eb136dcc409311dd01025296c62a,2024-02-05T21:38:37.280000
|
CVE-2023-40550,0,0,9f289352f5b3ef8fe58f1e2bc083f0230602eb136dcc409311dd01025296c62a,2024-02-05T21:38:37.280000
|
||||||
@ -229739,7 +229739,7 @@ CVE-2023-41936,0,0,59f50acce5e7a45be63a0a6bf8e4481807ef9e3c1ddb069f6cc7c3b24e2e3
|
|||||||
CVE-2023-41937,0,0,33832ab8bf296ca98e6bb85f049928f5f740d834dcd64a2a1075d34f5ca7f346,2023-09-11T17:53:01.077000
|
CVE-2023-41937,0,0,33832ab8bf296ca98e6bb85f049928f5f740d834dcd64a2a1075d34f5ca7f346,2023-09-11T17:53:01.077000
|
||||||
CVE-2023-41938,0,0,e07951ef7ba255949f1ecfd1e3de3ced7ab420ccbf43a7cdb5c11613d0feb0b8,2023-09-11T17:52:09.947000
|
CVE-2023-41938,0,0,e07951ef7ba255949f1ecfd1e3de3ced7ab420ccbf43a7cdb5c11613d0feb0b8,2023-09-11T17:52:09.947000
|
||||||
CVE-2023-41939,0,0,119263536f1854faddb91daf15ab5f647a60b6bcb6a3731a0b90d8bf96abde59,2023-09-11T17:51:37.613000
|
CVE-2023-41939,0,0,119263536f1854faddb91daf15ab5f647a60b6bcb6a3731a0b90d8bf96abde59,2023-09-11T17:51:37.613000
|
||||||
CVE-2023-4194,0,1,cc67123f8f400757b9c27c1196dfa9ee7269603aea6eade30be206f173340cd8,2024-03-26T16:15:09.253000
|
CVE-2023-4194,0,0,cc67123f8f400757b9c27c1196dfa9ee7269603aea6eade30be206f173340cd8,2024-03-26T16:15:09.253000
|
||||||
CVE-2023-41940,0,0,a6ca87f1be05eed4b95ab1494fc7f3793e7eec21c0fbd9bfd5d8852df51da68e,2023-09-11T17:49:38.180000
|
CVE-2023-41940,0,0,a6ca87f1be05eed4b95ab1494fc7f3793e7eec21c0fbd9bfd5d8852df51da68e,2023-09-11T17:49:38.180000
|
||||||
CVE-2023-41941,0,0,bed11f0c355d7fb5c2f2e63b90ecf6902e68b64794799b701e5718e92e473e57,2023-09-11T18:44:44.843000
|
CVE-2023-41941,0,0,bed11f0c355d7fb5c2f2e63b90ecf6902e68b64794799b701e5718e92e473e57,2023-09-11T18:44:44.843000
|
||||||
CVE-2023-41942,0,0,8e9f4ade28dfbd8f08fd3ecdb838e218a08e91843bb151d88882c5e6dd422ffb,2023-09-11T18:43:21.273000
|
CVE-2023-41942,0,0,8e9f4ade28dfbd8f08fd3ecdb838e218a08e91843bb151d88882c5e6dd422ffb,2023-09-11T18:43:21.273000
|
||||||
@ -229761,10 +229761,10 @@ CVE-2023-41965,0,0,819d10b57b506bddb9951f918fc98fbd0b8a91d148804e4f285468fbd9d32
|
|||||||
CVE-2023-41966,0,0,fa827770b589d95b7355015bd98bf88afd7826564ca5f72e6f3c89942fecdd86,2023-11-07T18:33:13.163000
|
CVE-2023-41966,0,0,fa827770b589d95b7355015bd98bf88afd7826564ca5f72e6f3c89942fecdd86,2023-11-07T18:33:13.163000
|
||||||
CVE-2023-41967,0,0,8e02dbae31e5167552a8965141c33a2e264759fb6dbab0897ce89326a49ec280,2024-01-05T17:59:28.783000
|
CVE-2023-41967,0,0,8e02dbae31e5167552a8965141c33a2e264759fb6dbab0897ce89326a49ec280,2024-01-05T17:59:28.783000
|
||||||
CVE-2023-41968,0,0,1248c9df7ecfb3920853d876ba26e870eae54e3bdcb4167f52b0214e6558ef25,2023-11-07T04:21:11.093000
|
CVE-2023-41968,0,0,1248c9df7ecfb3920853d876ba26e870eae54e3bdcb4167f52b0214e6558ef25,2023-11-07T04:21:11.093000
|
||||||
CVE-2023-41969,1,1,b536aa6e3d6c5b0e5810d85e97b95518c50344c7b0280473731cf2e708fadd2f,2024-03-26T15:15:48.203000
|
CVE-2023-41969,0,1,29e94a4ba4cfe3727abfed65d25b13858512057feb987f4bf212f0615c9ad6b5,2024-03-26T17:09:53.043000
|
||||||
CVE-2023-4197,0,0,f146d2ff6232fd5933bf8142dd157ce30d6c6646be201da9229ef783e3b9cbfb,2023-11-08T19:47:53.387000
|
CVE-2023-4197,0,0,f146d2ff6232fd5933bf8142dd157ce30d6c6646be201da9229ef783e3b9cbfb,2023-11-08T19:47:53.387000
|
||||||
CVE-2023-41972,1,1,09c1a2289ff67014b3222b17ce4a9c751781c5fd2396992da2e7010daa56bf20,2024-03-26T15:15:48.407000
|
CVE-2023-41972,0,1,e6bd46328b86f6eb60a17a1d077353a063296843a0cd61509134ea6a235f1e9b,2024-03-26T17:09:53.043000
|
||||||
CVE-2023-41973,1,1,ec42a29a4975f332ead83a124bea892f962b8800bf80005d808074765e10f9b6,2024-03-26T15:15:48.613000
|
CVE-2023-41973,0,1,24c8e08508313bc504a5e8115a035bae26e0aac9371d4155eb384dcf9a0b0548,2024-03-26T17:09:53.043000
|
||||||
CVE-2023-41974,0,0,ec7dd2b6702f5a8bbc562cadb789ab42ea352cdfbc62d11784bae6116e1e8ab4,2024-01-17T21:17:26.303000
|
CVE-2023-41974,0,0,ec7dd2b6702f5a8bbc562cadb789ab42ea352cdfbc62d11784bae6116e1e8ab4,2024-01-17T21:17:26.303000
|
||||||
CVE-2023-41975,0,0,307c3809d415b29d4366c7e0ea292a20dbce25ae704d534682230c6d89427017,2023-11-02T15:22:55.217000
|
CVE-2023-41975,0,0,307c3809d415b29d4366c7e0ea292a20dbce25ae704d534682230c6d89427017,2023-11-02T15:22:55.217000
|
||||||
CVE-2023-41976,0,0,b44526aa36fb3f3d93fc90ad2e1fd48460d30f0e861bda5ba98a7a12c2a8aed3,2023-12-07T20:15:37.807000
|
CVE-2023-41976,0,0,b44526aa36fb3f3d93fc90ad2e1fd48460d30f0e861bda5ba98a7a12c2a8aed3,2023-12-07T20:15:37.807000
|
||||||
@ -231428,6 +231428,7 @@ CVE-2023-44984,0,0,0f4ed06f1b5ac0b548c3e2d9f0d9f3f0cbd98c53b4eee334baff070264749
|
|||||||
CVE-2023-44985,0,0,dfb696d5215b943e30a7373978ec95a4f1b73957eb031473531ba106a6046f85,2023-10-19T13:48:52.637000
|
CVE-2023-44985,0,0,dfb696d5215b943e30a7373978ec95a4f1b73957eb031473531ba106a6046f85,2023-10-19T13:48:52.637000
|
||||||
CVE-2023-44986,0,0,dde8c0b4f7af4dc5c9e767ceedcd42c76156fba6640bda1b12d18c0c1d529774,2023-10-19T13:49:39.247000
|
CVE-2023-44986,0,0,dde8c0b4f7af4dc5c9e767ceedcd42c76156fba6640bda1b12d18c0c1d529774,2023-10-19T13:49:39.247000
|
||||||
CVE-2023-44987,0,0,1d0940c6c1116a8bd1e99725f710bdd942e9b5e0f435a1ad89ade226716b3915,2023-10-19T20:54:21.393000
|
CVE-2023-44987,0,0,1d0940c6c1116a8bd1e99725f710bdd942e9b5e0f435a1ad89ade226716b3915,2023-10-19T20:54:21.393000
|
||||||
|
CVE-2023-44989,1,1,e7e20dc1d114e542c553e6ef6f19736758eb8e49d1dab2eca9751cbbc66e25cd,2024-03-26T18:15:08.273000
|
||||||
CVE-2023-4499,0,0,2221e124504cf2ae1b924d444e1f8b4a1bda09ce3dcf640a68a8c7f8ffe55b09,2023-10-19T20:18:31.937000
|
CVE-2023-4499,0,0,2221e124504cf2ae1b924d444e1f8b4a1bda09ce3dcf640a68a8c7f8ffe55b09,2023-10-19T20:18:31.937000
|
||||||
CVE-2023-44990,0,0,ab429a48d2179fdf171bbbe4e2b53f60ef9a3671555e07b6733f9ca5f6ef987c,2023-10-24T17:56:46.373000
|
CVE-2023-44990,0,0,ab429a48d2179fdf171bbbe4e2b53f60ef9a3671555e07b6733f9ca5f6ef987c,2023-10-24T17:56:46.373000
|
||||||
CVE-2023-44991,0,0,229523c1ca4b7df2290ad3404ea2bc7a11a7180706108c99bc4a3b631c9b7132,2023-12-28T19:55:16.063000
|
CVE-2023-44991,0,0,229523c1ca4b7df2290ad3404ea2bc7a11a7180706108c99bc4a3b631c9b7132,2023-12-28T19:55:16.063000
|
||||||
@ -232941,7 +232942,7 @@ CVE-2023-47145,0,0,620ae7f5678047a8c4108d9fbdf5fa18578054841b939f4838b425b9745ba
|
|||||||
CVE-2023-47146,0,0,20e69829653fae8f4b2686a3902570d251dd86f6502cbd24bd7e7bddd7d52e98,2023-12-27T17:50:55.147000
|
CVE-2023-47146,0,0,20e69829653fae8f4b2686a3902570d251dd86f6502cbd24bd7e7bddd7d52e98,2023-12-27T17:50:55.147000
|
||||||
CVE-2023-47147,0,0,aa39e297601bc950529f92cdf2bd8439447f01312c2edd499306ed4ebc349c17,2024-03-19T17:31:22.997000
|
CVE-2023-47147,0,0,aa39e297601bc950529f92cdf2bd8439447f01312c2edd499306ed4ebc349c17,2024-03-19T17:31:22.997000
|
||||||
CVE-2023-47148,0,0,b288941dfe3b1bf420ecb81fb3f06fe48a4281a820ff4a84a19d97a629ab7c25,2024-02-08T19:58:30.023000
|
CVE-2023-47148,0,0,b288941dfe3b1bf420ecb81fb3f06fe48a4281a820ff4a84a19d97a629ab7c25,2024-02-08T19:58:30.023000
|
||||||
CVE-2023-47150,0,0,01c7964aba3fe9b8fd22ab1d6df63bf0ace69c2fdadada1725c8b665bf2ae18c,2024-03-26T14:15:08.173000
|
CVE-2023-47150,0,1,fd78c089e6cfc2cc360595668fe16eb44dbc84f78e53c634e23776b310571458,2024-03-26T17:09:53.043000
|
||||||
CVE-2023-47152,0,0,21eae157a0c14eb599c0d65626b59a59bd4bef9c2fca5d41f60c8cae56283468,2024-03-07T17:15:11.063000
|
CVE-2023-47152,0,0,21eae157a0c14eb599c0d65626b59a59bd4bef9c2fca5d41f60c8cae56283468,2024-03-07T17:15:11.063000
|
||||||
CVE-2023-47158,0,0,846f95a2725be32047541f14ae8c358ff876d7b2eaf417c4327cad289f3b21cd,2024-03-07T17:15:11.147000
|
CVE-2023-47158,0,0,846f95a2725be32047541f14ae8c358ff876d7b2eaf417c4327cad289f3b21cd,2024-03-07T17:15:11.147000
|
||||||
CVE-2023-4716,0,0,19a8e4bcfef050287a950063ecd9c6c3a76d47aa7d1ec3543611c805970cc149,2023-11-07T04:22:53.527000
|
CVE-2023-4716,0,0,19a8e4bcfef050287a950063ecd9c6c3a76d47aa7d1ec3543611c805970cc149,2023-11-07T04:22:53.527000
|
||||||
@ -235199,8 +235200,8 @@ CVE-2023-5089,0,0,cddae8cd7907847e037d2a072115a2d298d26ef8e69ec53058c1c3b486a685
|
|||||||
CVE-2023-50891,0,0,bb600fee959bc0c70bc3812b31f851a727133cb965ac9f397fefe731a21c9727,2024-01-05T18:37:38.957000
|
CVE-2023-50891,0,0,bb600fee959bc0c70bc3812b31f851a727133cb965ac9f397fefe731a21c9727,2024-01-05T18:37:38.957000
|
||||||
CVE-2023-50892,0,0,b0a5df3a0991deeddc21aba073d59e844033efac16fe6402bc12f130e340ebd2,2024-01-05T19:43:06.133000
|
CVE-2023-50892,0,0,b0a5df3a0991deeddc21aba073d59e844033efac16fe6402bc12f130e340ebd2,2024-01-05T19:43:06.133000
|
||||||
CVE-2023-50893,0,0,9e2a79008bb70c571f7956df8d783d4f37d38fd17c2b6ce3c5ce4f3a295c4404,2024-01-05T18:33:07.640000
|
CVE-2023-50893,0,0,9e2a79008bb70c571f7956df8d783d4f37d38fd17c2b6ce3c5ce4f3a295c4404,2024-01-05T18:33:07.640000
|
||||||
CVE-2023-50894,1,1,282f0130e732e606b84d80b152ea21ecb1ca6dad6f66a24c8662987433cb3514,2024-03-26T15:15:48.797000
|
CVE-2023-50894,0,1,6eed329f67138d2f2e627602146cd43f0801dd418258af7b9bf418e3974e55dd,2024-03-26T17:09:53.043000
|
||||||
CVE-2023-50895,1,1,e632596cb4ff42676938591c39f051db865636da96e38892505a62244e629e7a,2024-03-26T15:15:48.860000
|
CVE-2023-50895,0,1,1f927ab35258aecd3c8a00c2d421efb443c9113305b6571381658536cbf62a0b,2024-03-26T17:09:53.043000
|
||||||
CVE-2023-50896,0,0,32a10544fdac61db8a171df746dccf1d232f13684a47de05af905306e155cf06,2024-01-05T17:32:59.937000
|
CVE-2023-50896,0,0,32a10544fdac61db8a171df746dccf1d232f13684a47de05af905306e155cf06,2024-01-05T17:32:59.937000
|
||||||
CVE-2023-50898,0,0,8aff62c643d7aeddc95a67a99b868adeecf42b7f0720ae7af339a4744e3e221f,2024-03-15T16:26:49.320000
|
CVE-2023-50898,0,0,8aff62c643d7aeddc95a67a99b868adeecf42b7f0720ae7af339a4744e3e221f,2024-03-15T16:26:49.320000
|
||||||
CVE-2023-5090,0,0,ada81fac99e019d87a6cff7c251f38065497d67cafeddaf348ee3fa109b9d32b,2023-12-13T08:15:51.483000
|
CVE-2023-5090,0,0,ada81fac99e019d87a6cff7c251f38065497d67cafeddaf348ee3fa109b9d32b,2023-12-13T08:15:51.483000
|
||||||
@ -235902,7 +235903,7 @@ CVE-2023-52207,0,0,8811a262457d47a928522c6d4c018a091faaddd37faf85fb909e774e66447
|
|||||||
CVE-2023-52208,0,0,9ed351f5d9cad0471fed88b06cec98b8cea6e1cb366c882b7648760856f996f0,2024-01-11T19:01:44.920000
|
CVE-2023-52208,0,0,9ed351f5d9cad0471fed88b06cec98b8cea6e1cb366c882b7648760856f996f0,2024-01-11T19:01:44.920000
|
||||||
CVE-2023-5221,0,0,e94a56c9d66474b5a160e0651ef9dc4824c1649580fd0ea943a206b242eec447,2024-03-21T02:50:10.947000
|
CVE-2023-5221,0,0,e94a56c9d66474b5a160e0651ef9dc4824c1649580fd0ea943a206b242eec447,2024-03-21T02:50:10.947000
|
||||||
CVE-2023-52213,0,0,c567e205c61b5b287735b8f3f6708ba72962cb7ab86a1661d42ad149b5793151,2024-01-11T19:58:54.940000
|
CVE-2023-52213,0,0,c567e205c61b5b287735b8f3f6708ba72962cb7ab86a1661d42ad149b5793151,2024-01-11T19:58:54.940000
|
||||||
CVE-2023-52214,0,0,e83b7c5d7cd654e0d2656805bb2ed661c039e2202d50eab19bd0b7277ad5080d,2024-03-26T13:15:44.857000
|
CVE-2023-52214,0,1,162d55d4b2fb0d9d44b6b2d1d34d863c999143afcae381fb31e139c85347084e,2024-03-26T17:09:53.043000
|
||||||
CVE-2023-52215,0,0,09e0a9efe106868b4fd9c2063e3947d919ee70f494a812fa7c8f77418249d5e9,2024-02-02T15:20:39.863000
|
CVE-2023-52215,0,0,09e0a9efe106868b4fd9c2063e3947d919ee70f494a812fa7c8f77418249d5e9,2024-02-02T15:20:39.863000
|
||||||
CVE-2023-52216,0,0,0abddcd9cec3889c982561204259a4fbd6d1dbd4b2cc9d289f548ce07e0b2e7c,2024-01-11T19:59:02.337000
|
CVE-2023-52216,0,0,0abddcd9cec3889c982561204259a4fbd6d1dbd4b2cc9d289f548ce07e0b2e7c,2024-01-11T19:59:02.337000
|
||||||
CVE-2023-52218,0,0,7b665670ae49b9a55269793dbdbcff40e383cda41d548bb50d0820fbba3ce68a,2024-01-11T18:43:19.067000
|
CVE-2023-52218,0,0,7b665670ae49b9a55269793dbdbcff40e383cda41d548bb50d0820fbba3ce68a,2024-01-11T18:43:19.067000
|
||||||
@ -236205,6 +236206,13 @@ CVE-2023-52618,0,0,140362ac707afd65a2d2b4e8d63e0c86c60c3017e34a4d1e40b3e8d76d459
|
|||||||
CVE-2023-52619,0,0,af9aacad25e5d44645425bb3e7286e581cb4e42ee1fef053b65f380d7170e82a,2024-03-18T12:38:25.490000
|
CVE-2023-52619,0,0,af9aacad25e5d44645425bb3e7286e581cb4e42ee1fef053b65f380d7170e82a,2024-03-18T12:38:25.490000
|
||||||
CVE-2023-5262,0,0,1ed01c8e585c4d5b79de4709507eb451699baf1354e5ae8ae335221297d368d6,2024-03-21T02:50:11.880000
|
CVE-2023-5262,0,0,1ed01c8e585c4d5b79de4709507eb451699baf1354e5ae8ae335221297d368d6,2024-03-21T02:50:11.880000
|
||||||
CVE-2023-52620,0,0,f7b393e21bf3ad043d90e1d475675ddea17fbe9622a70ee0a12525f78fd3e3ac,2024-03-21T12:58:51.093000
|
CVE-2023-52620,0,0,f7b393e21bf3ad043d90e1d475675ddea17fbe9622a70ee0a12525f78fd3e3ac,2024-03-21T12:58:51.093000
|
||||||
|
CVE-2023-52621,1,1,7e192a0f6ea9e2b2841aae08b6a79d53702740aeb515024045625bd4c7ef1dcc,2024-03-26T18:15:08.817000
|
||||||
|
CVE-2023-52622,1,1,7ee9703fdc669762674088f1f751f9cf97ea86ef4dfd07b925733a3c156bac3e,2024-03-26T18:15:08.873000
|
||||||
|
CVE-2023-52623,1,1,88aa9f694fb78f8430087fa7fc3db7f21f957543babe6cc6d366a5f07e7b79be,2024-03-26T18:15:08.930000
|
||||||
|
CVE-2023-52624,1,1,7dd895582e4f1ca5c5328afe2c412ce0b321201d2bba2e1f44989db1c247662c,2024-03-26T18:15:08.990000
|
||||||
|
CVE-2023-52625,1,1,62d27316ba3122bd775cdac8246f40faae862b9012e1dba86705ccc7999af1e5,2024-03-26T18:15:09.040000
|
||||||
|
CVE-2023-52626,1,1,96301513fb4628223a0d9cf24e12092c9ef87789d201953062e2609f6e9dd7f7,2024-03-26T18:15:09.087000
|
||||||
|
CVE-2023-52627,1,1,b114ffb83498e204ad4a858e973defb51aa9188fed7556a99daec636d52f6227,2024-03-26T18:15:09.140000
|
||||||
CVE-2023-5263,0,0,e845c03e875c19af6b2a1acb5c3778ba87234ae866c1118fe5cb806e675403c4,2024-03-21T02:50:11.963000
|
CVE-2023-5263,0,0,e845c03e875c19af6b2a1acb5c3778ba87234ae866c1118fe5cb806e675403c4,2024-03-21T02:50:11.963000
|
||||||
CVE-2023-5264,0,0,7347eec07eb374fa71498dcb5baa16d40eadd7796ae58c56cb5542f911c08d00,2024-03-21T02:50:12.043000
|
CVE-2023-5264,0,0,7347eec07eb374fa71498dcb5baa16d40eadd7796ae58c56cb5542f911c08d00,2024-03-21T02:50:12.043000
|
||||||
CVE-2023-5265,0,0,a2593868cc8025edeae179a722294beacfae058f7c712cda49462fbdc5096bf5,2024-03-21T02:50:12.123000
|
CVE-2023-5265,0,0,a2593868cc8025edeae179a722294beacfae058f7c712cda49462fbdc5096bf5,2024-03-21T02:50:12.123000
|
||||||
@ -237062,7 +237070,7 @@ CVE-2023-6234,0,0,c300a8904deed01fc5477fc97fa27627c8d1f6d71059c668e1fb941f32fdf7
|
|||||||
CVE-2023-6235,0,0,ab83c1d668f31c27ce5f0c473adf91ccac4c0e79d96a7a2d4e8b5eab63bfea2e,2023-11-29T16:59:51.970000
|
CVE-2023-6235,0,0,ab83c1d668f31c27ce5f0c473adf91ccac4c0e79d96a7a2d4e8b5eab63bfea2e,2023-11-29T16:59:51.970000
|
||||||
CVE-2023-6238,0,0,7332193d1454e7405dd3270d745aa7f762b874d0f84c51906784a637ceb0212d,2024-02-07T00:15:55.240000
|
CVE-2023-6238,0,0,7332193d1454e7405dd3270d745aa7f762b874d0f84c51906784a637ceb0212d,2024-02-07T00:15:55.240000
|
||||||
CVE-2023-6239,0,0,6ce1b576ddd7c9169d0997e75fde3efd606153edbf61fba1116d733c98bbf90d,2023-12-04T19:06:20.213000
|
CVE-2023-6239,0,0,6ce1b576ddd7c9169d0997e75fde3efd606153edbf61fba1116d733c98bbf90d,2023-12-04T19:06:20.213000
|
||||||
CVE-2023-6240,0,1,12ab4bd584cb69f33bfd21cd68c3dcd33151a210965a0c843c22e8a6643ab9e0,2024-03-26T16:15:09.550000
|
CVE-2023-6240,0,0,12ab4bd584cb69f33bfd21cd68c3dcd33151a210965a0c843c22e8a6643ab9e0,2024-03-26T16:15:09.550000
|
||||||
CVE-2023-6241,0,0,492ae441bd7b430d2b324f1b69455dc6d8cff5a5926584dd79ada023bf8367a8,2024-03-04T13:58:23.447000
|
CVE-2023-6241,0,0,492ae441bd7b430d2b324f1b69455dc6d8cff5a5926584dd79ada023bf8367a8,2024-03-04T13:58:23.447000
|
||||||
CVE-2023-6242,0,0,6d69e67cbd815bd255adaa5950d4591e05a6bb1ed9a7b28e0dca7e7af1589ec7,2024-01-18T18:13:53.840000
|
CVE-2023-6242,0,0,6d69e67cbd815bd255adaa5950d4591e05a6bb1ed9a7b28e0dca7e7af1589ec7,2024-01-18T18:13:53.840000
|
||||||
CVE-2023-6244,0,0,738eadbc72f60cd69becd30725fdeeb14cb3b5c05736eda414dcb1a46832ac22,2024-01-18T16:13:00.490000
|
CVE-2023-6244,0,0,738eadbc72f60cd69becd30725fdeeb14cb3b5c05736eda414dcb1a46832ac22,2024-01-18T16:13:00.490000
|
||||||
@ -237471,7 +237479,7 @@ CVE-2023-6775,0,0,785c7f49208ea20d700744a01e8a1429f324667f6807bd4a259ac6655dd27e
|
|||||||
CVE-2023-6776,0,0,2968271048fa8ca653df4209575bff057123f6c32739a4f0bc08a9ea121efe01,2024-01-18T16:24:38.070000
|
CVE-2023-6776,0,0,2968271048fa8ca653df4209575bff057123f6c32739a4f0bc08a9ea121efe01,2024-01-18T16:24:38.070000
|
||||||
CVE-2023-6778,0,0,4da0caccc37ccc1faf5007378583694bfb6f9351ba67d60d3ee84f433b4b0fe9,2024-02-08T10:15:12.243000
|
CVE-2023-6778,0,0,4da0caccc37ccc1faf5007378583694bfb6f9351ba67d60d3ee84f433b4b0fe9,2024-02-08T10:15:12.243000
|
||||||
CVE-2023-6779,0,0,84945b027810dcbe6c0b2bcc726a9d50fb0817df70a01f395a9528ce38146495,2024-02-27T17:26:48.247000
|
CVE-2023-6779,0,0,84945b027810dcbe6c0b2bcc726a9d50fb0817df70a01f395a9528ce38146495,2024-02-27T17:26:48.247000
|
||||||
CVE-2023-6780,0,1,5dfd988419cec384929ee5ea37cfe3044f42ae11bc2461e6beb6e09b0ef7d99f,2024-03-26T16:15:10.083000
|
CVE-2023-6780,0,0,5dfd988419cec384929ee5ea37cfe3044f42ae11bc2461e6beb6e09b0ef7d99f,2024-03-26T16:15:10.083000
|
||||||
CVE-2023-6781,0,0,606133b53d71d301d434687c95e9541c45256035c97457e3cef427e3e2fa86e7,2024-01-18T16:24:52.810000
|
CVE-2023-6781,0,0,606133b53d71d301d434687c95e9541c45256035c97457e3cef427e3e2fa86e7,2024-01-18T16:24:52.810000
|
||||||
CVE-2023-6782,0,0,9d49a53aeef1daeb1b880b1c10125bd540373eabc0b6ef10f8f3d1b558ba4034,2024-01-18T16:11:09.587000
|
CVE-2023-6782,0,0,9d49a53aeef1daeb1b880b1c10125bd540373eabc0b6ef10f8f3d1b558ba4034,2024-01-18T16:11:09.587000
|
||||||
CVE-2023-6784,0,0,8a2dc120c2f7c09cd65b30de205a120bba14591ed7954e6b475e7a765c9d6768,2023-12-28T20:16:01.087000
|
CVE-2023-6784,0,0,8a2dc120c2f7c09cd65b30de205a120bba14591ed7954e6b475e7a765c9d6768,2023-12-28T20:16:01.087000
|
||||||
@ -237818,7 +237826,7 @@ CVE-2023-7212,0,0,c82561de87d9b5a8e98ddddf12537a5231fd7af4a3892613aa65bcaf50d425
|
|||||||
CVE-2023-7213,0,0,53dbf1b5ed846da4be08eaa570707a79ba97a8f313d11619a36fdb9ec23e375b,2024-03-21T02:50:59.900000
|
CVE-2023-7213,0,0,53dbf1b5ed846da4be08eaa570707a79ba97a8f313d11619a36fdb9ec23e375b,2024-03-21T02:50:59.900000
|
||||||
CVE-2023-7214,0,0,7a1c0710c5be4f5bd338487b4db0d98aaba3008bf0d51188e55d3ba8f2ca0ae1,2024-03-21T02:50:59.990000
|
CVE-2023-7214,0,0,7a1c0710c5be4f5bd338487b4db0d98aaba3008bf0d51188e55d3ba8f2ca0ae1,2024-03-21T02:50:59.990000
|
||||||
CVE-2023-7215,0,0,9199e6e3539c5b15d0411ec649b23a950c822a62969d413acaf5e4343a429a54,2024-03-21T02:51:00.070000
|
CVE-2023-7215,0,0,9199e6e3539c5b15d0411ec649b23a950c822a62969d413acaf5e4343a429a54,2024-03-21T02:51:00.070000
|
||||||
CVE-2023-7216,0,1,ba84a1f2334fe94cc22085363da99b6ece39d93bfd66b42b6e91d7a0bc0e2b60,2024-03-26T16:15:10.283000
|
CVE-2023-7216,0,0,ba84a1f2334fe94cc22085363da99b6ece39d93bfd66b42b6e91d7a0bc0e2b60,2024-03-26T16:15:10.283000
|
||||||
CVE-2023-7218,0,0,e11b22d1e4f4bd1a318a9925942a5a95ed729fc0728f0384739354f97569f1ea,2024-03-21T02:51:00.170000
|
CVE-2023-7218,0,0,e11b22d1e4f4bd1a318a9925942a5a95ed729fc0728f0384739354f97569f1ea,2024-03-21T02:51:00.170000
|
||||||
CVE-2023-7219,0,0,569e2951e48af1d0df5db153d63187a5f69bdc3eec356763a3d703a7641682ae,2024-03-21T02:51:00.260000
|
CVE-2023-7219,0,0,569e2951e48af1d0df5db153d63187a5f69bdc3eec356763a3d703a7641682ae,2024-03-21T02:51:00.260000
|
||||||
CVE-2023-7220,0,0,adb1a6fa99925cc0b04f8a6a991ea568a4098443e3fcb2536125cbabdc7e84f0,2024-03-21T02:51:00.343000
|
CVE-2023-7220,0,0,adb1a6fa99925cc0b04f8a6a991ea568a4098443e3fcb2536125cbabdc7e84f0,2024-03-21T02:51:00.343000
|
||||||
@ -238648,7 +238656,7 @@ CVE-2024-1082,0,0,ae3ce9e9137f48bb8ed6e73705e5e3d60bc52b901f04050c52fd85d44a0026
|
|||||||
CVE-2024-1083,0,0,74c0722677f7c332b863607291b77a242fa9b468686591b078a5d2cf9d851301,2024-03-13T18:16:18.563000
|
CVE-2024-1083,0,0,74c0722677f7c332b863607291b77a242fa9b468686591b078a5d2cf9d851301,2024-03-13T18:16:18.563000
|
||||||
CVE-2024-1084,0,0,51b7424ad38af0869b092fa36e3eaa18924349738a3af48c112cd79935a58280,2024-02-13T19:45:42.327000
|
CVE-2024-1084,0,0,51b7424ad38af0869b092fa36e3eaa18924349738a3af48c112cd79935a58280,2024-02-13T19:45:42.327000
|
||||||
CVE-2024-1085,0,0,649a4a278db01305790c1d25d5fb8d26a8b328f3c410af99f7747f493230845c,2024-02-05T20:41:40.513000
|
CVE-2024-1085,0,0,649a4a278db01305790c1d25d5fb8d26a8b328f3c410af99f7747f493230845c,2024-02-05T20:41:40.513000
|
||||||
CVE-2024-1086,0,0,76364c1a0561e24ba662e70d690c606d4d289022065a8987b7a128b2d8eec769,2024-02-06T02:15:08.303000
|
CVE-2024-1086,0,1,4219eb562264c7419d4a48158a3ea86843f6e837cf59fa776b23affde3923b44,2024-03-26T18:15:09.193000
|
||||||
CVE-2024-1087,0,0,bfb73beeec450e6da5995b5f21712b59848b559e03cbbae3eab10a626379de00,2024-01-31T13:15:11.030000
|
CVE-2024-1087,0,0,bfb73beeec450e6da5995b5f21712b59848b559e03cbbae3eab10a626379de00,2024-01-31T13:15:11.030000
|
||||||
CVE-2024-1088,0,0,8282ed6326b4aa943e52bd688c1d72f7651b610e6d05d8f8f49cf63347f834ea,2024-03-05T13:41:01.900000
|
CVE-2024-1088,0,0,8282ed6326b4aa943e52bd688c1d72f7651b610e6d05d8f8f49cf63347f834ea,2024-03-05T13:41:01.900000
|
||||||
CVE-2024-1089,0,0,32c5e60a3ddccafd89864debb2075c8e84bae9d4cf9e9019da73e9abcb27d415,2024-02-29T13:49:29.390000
|
CVE-2024-1089,0,0,32c5e60a3ddccafd89864debb2075c8e84bae9d4cf9e9019da73e9abcb27d415,2024-02-29T13:49:29.390000
|
||||||
@ -238817,6 +238825,7 @@ CVE-2024-1304,0,0,23d5e2bb07c854af4ae93b68007adeaedc627b6e96a90278cd036489c69942
|
|||||||
CVE-2024-1309,0,0,37b1e0c9fe9df0fc7a03a06970b38a07b0edfe094c103b528d7941f417bdf8c0,2024-03-19T21:15:07.570000
|
CVE-2024-1309,0,0,37b1e0c9fe9df0fc7a03a06970b38a07b0edfe094c103b528d7941f417bdf8c0,2024-03-19T21:15:07.570000
|
||||||
CVE-2024-1311,0,0,b6ff5a5c389b1970ebb3e727e75412706e999440266a856adc2134f819f2c52f,2024-03-13T18:16:18.563000
|
CVE-2024-1311,0,0,b6ff5a5c389b1970ebb3e727e75412706e999440266a856adc2134f819f2c52f,2024-03-13T18:16:18.563000
|
||||||
CVE-2024-1312,0,0,663659c34940a4e82708fc60c7161257042c7f9bd582badd425cca624f8b6adc,2024-02-15T05:03:16.077000
|
CVE-2024-1312,0,0,663659c34940a4e82708fc60c7161257042c7f9bd582badd425cca624f8b6adc,2024-02-15T05:03:16.077000
|
||||||
|
CVE-2024-1313,1,1,fc2312805b89f80f01187b78a9b1055f41a1d07dff423a1c1d9453cd7d74aef4,2024-03-26T18:15:09.350000
|
||||||
CVE-2024-1316,0,0,71137ee023059efde9ea6dfce3b572409e6580b9426330a66bdb1f551ebc3e20,2024-03-05T13:41:01.900000
|
CVE-2024-1316,0,0,71137ee023059efde9ea6dfce3b572409e6580b9426330a66bdb1f551ebc3e20,2024-03-05T13:41:01.900000
|
||||||
CVE-2024-1317,0,0,677d2e22c876d1f8a2362f14eec614350ca5518b287bd87de6939bf8afc48e88,2024-02-29T13:49:29.390000
|
CVE-2024-1317,0,0,677d2e22c876d1f8a2362f14eec614350ca5518b287bd87de6939bf8afc48e88,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-1318,0,0,422c230b919b2aed39d902af5834079d78461435b9de398b39e0ef988ed8aaa2,2024-02-29T13:49:29.390000
|
CVE-2024-1318,0,0,422c230b919b2aed39d902af5834079d78461435b9de398b39e0ef988ed8aaa2,2024-02-29T13:49:29.390000
|
||||||
@ -238922,7 +238931,7 @@ CVE-2024-1451,0,0,3f6435be1eda5f484a72686d969060594b556ef09b071072e8b2c55917874d
|
|||||||
CVE-2024-1452,0,0,f3f7356621b3de0beb4bcd77b5b0c290368d3f5194eed14a4a3d86741756591b,2024-03-13T18:15:58.530000
|
CVE-2024-1452,0,0,f3f7356621b3de0beb4bcd77b5b0c290368d3f5194eed14a4a3d86741756591b,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-1453,0,0,e11f7c6a5ca684a7ed72821317f7b1247eb4a0454b5116cf4686bee193c0189b,2024-03-01T22:22:25.913000
|
CVE-2024-1453,0,0,e11f7c6a5ca684a7ed72821317f7b1247eb4a0454b5116cf4686bee193c0189b,2024-03-01T22:22:25.913000
|
||||||
CVE-2024-1454,0,0,cc63bfc078899c3bc2d22b3e00f458fc4bbbae1bbb587edc98f331b0cecc8681,2024-03-23T03:15:10.633000
|
CVE-2024-1454,0,0,cc63bfc078899c3bc2d22b3e00f458fc4bbbae1bbb587edc98f331b0cecc8681,2024-03-23T03:15:10.633000
|
||||||
CVE-2024-1455,0,0,14952b77e57193c30794fb55b1d2b3ce9f659b1558f9e5caebc130d3b24f75a6,2024-03-26T14:15:08.450000
|
CVE-2024-1455,0,1,5d5551bfd568878b597f20296517afbe3046f129fd87b0b33dac914b992d4d1a,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-1459,0,0,11d2cc6cb4f85209b5f6836b3ad08354090d0f8d1b51c2b33235c6338b29d8d2,2024-02-27T16:55:31.430000
|
CVE-2024-1459,0,0,11d2cc6cb4f85209b5f6836b3ad08354090d0f8d1b51c2b33235c6338b29d8d2,2024-02-27T16:55:31.430000
|
||||||
CVE-2024-1460,0,0,cff087352bb23bf663ab2e822f0f3fe258f454a6ba829a2496758fccaa0c2c9b,2024-03-07T13:52:27.110000
|
CVE-2024-1460,0,0,cff087352bb23bf663ab2e822f0f3fe258f454a6ba829a2496758fccaa0c2c9b,2024-03-07T13:52:27.110000
|
||||||
CVE-2024-1462,0,0,2f9d4051c4c161902f27eca436b6d8219798c451263796f27a47d4849d7fecd7,2024-03-13T18:15:58.530000
|
CVE-2024-1462,0,0,2f9d4051c4c161902f27eca436b6d8219798c451263796f27a47d4849d7fecd7,2024-03-13T18:15:58.530000
|
||||||
@ -239195,7 +239204,7 @@ CVE-2024-1927,0,0,b3c20609db9c70af07026707de6d8f4fc11b95fea553636b448fb3a99c9e68
|
|||||||
CVE-2024-1928,0,0,7c620b7f4b1ec6939393c022b1469f24a2d6fc0dcca332e7bbe9c97be0a7c0c1,2024-03-21T02:51:49.690000
|
CVE-2024-1928,0,0,7c620b7f4b1ec6939393c022b1469f24a2d6fc0dcca332e7bbe9c97be0a7c0c1,2024-03-21T02:51:49.690000
|
||||||
CVE-2024-1931,0,0,2c035e986439878fc41e4d57f10dd1dfaa67d4c99fcd2a57828e8789ee7b279b,2024-03-07T13:52:27.110000
|
CVE-2024-1931,0,0,2c035e986439878fc41e4d57f10dd1dfaa67d4c99fcd2a57828e8789ee7b279b,2024-03-07T13:52:27.110000
|
||||||
CVE-2024-1932,0,0,5d8d8b3bcbb6e1458b966532c64c8c15a68eb67ca9de3e9c3d113ec944ac23a6,2024-02-28T14:06:45.783000
|
CVE-2024-1932,0,0,5d8d8b3bcbb6e1458b966532c64c8c15a68eb67ca9de3e9c3d113ec944ac23a6,2024-02-28T14:06:45.783000
|
||||||
CVE-2024-1933,0,0,8efa2abd15a6c9dc497d5342929765adc1b9723ac087a73cccba17b9d6f2636a,2024-03-26T13:15:45.077000
|
CVE-2024-1933,0,1,a87f7af555f25d5511c6c95f7980a7b12009c62b31ac68af7b5bb4b0c784ec57,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-1935,0,0,acd55fcede8b48a7898ea42523d7c01336ae5958dd58d0fd5fb3924b804c3e4b,2024-03-13T18:15:58.530000
|
CVE-2024-1935,0,0,acd55fcede8b48a7898ea42523d7c01336ae5958dd58d0fd5fb3924b804c3e4b,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-1936,0,0,7b3792457d5905a49db010db7b736af0c923e8894b5bdd1a854744f20603a17d,2024-03-23T12:15:08.453000
|
CVE-2024-1936,0,0,7b3792457d5905a49db010db7b736af0c923e8894b5bdd1a854744f20603a17d,2024-03-23T12:15:08.453000
|
||||||
CVE-2024-1938,0,0,24dc90499c61d902708c3560ef4b72bc4a3172c10dbf5b005bb9075fcee4ff4b,2024-03-07T23:15:07.177000
|
CVE-2024-1938,0,0,24dc90499c61d902708c3560ef4b72bc4a3172c10dbf5b005bb9075fcee4ff4b,2024-03-07T23:15:07.177000
|
||||||
@ -239907,15 +239916,15 @@ CVE-2024-21908,0,0,329abb805b48ea46c40d9625a0e5a18857ae42d6b89a82f5c3cf797095821
|
|||||||
CVE-2024-21909,0,0,1862a33cb8cb7c096543042cface003ed2658c185ec7603674a262510a57f13e,2024-02-08T02:15:40.883000
|
CVE-2024-21909,0,0,1862a33cb8cb7c096543042cface003ed2658c185ec7603674a262510a57f13e,2024-02-08T02:15:40.883000
|
||||||
CVE-2024-21910,0,0,43ca7fc1e52b2bce376dbad269237609f1115a9e3e85611002acd3d35f8eee88,2024-01-08T19:46:25.757000
|
CVE-2024-21910,0,0,43ca7fc1e52b2bce376dbad269237609f1115a9e3e85611002acd3d35f8eee88,2024-01-08T19:46:25.757000
|
||||||
CVE-2024-21911,0,0,30b0952621022b198f37c9fc7c47e2aaa3233be56e7cd5684ca7f588e4860d48,2024-01-08T19:46:14.513000
|
CVE-2024-21911,0,0,30b0952621022b198f37c9fc7c47e2aaa3233be56e7cd5684ca7f588e4860d48,2024-01-08T19:46:14.513000
|
||||||
CVE-2024-21912,1,1,ca7a6e05e4287c6d7b9a908fefd2998753f0193e2173b677ca904e3540852315,2024-03-26T16:15:10.440000
|
CVE-2024-21912,0,1,313191073cb481d296be147cee1b1c3c466102564b95957afb404eb1dff60483,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-21913,1,1,614ce8006a0da5beb9f517af487cd48f3109f82477c5b77ed27f6f37ab4430d6,2024-03-26T16:15:10.670000
|
CVE-2024-21913,0,1,76e233c2fa7c0db7fe5e09ad44bdf3a4d23e6acfac5fbb342b58e4c08d6d66fd,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-21914,0,0,8362c524df4a22c5c99212051acce4ea80772b52bceeb8a39755408986c0153c,2024-03-26T12:55:05.010000
|
CVE-2024-21914,0,0,8362c524df4a22c5c99212051acce4ea80772b52bceeb8a39755408986c0153c,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-21915,0,0,37ba536bf668637545b4dc7be0d8e2b8dd5a196f32352bf8da3b31f0b239e591,2024-02-16T19:26:55.393000
|
CVE-2024-21915,0,0,37ba536bf668637545b4dc7be0d8e2b8dd5a196f32352bf8da3b31f0b239e591,2024-02-16T19:26:55.393000
|
||||||
CVE-2024-21916,0,0,9f2b20d343ff64e569a6727c28d35277f9cb0ae2a13059d88274004570b48dd2,2024-02-08T01:34:49.067000
|
CVE-2024-21916,0,0,9f2b20d343ff64e569a6727c28d35277f9cb0ae2a13059d88274004570b48dd2,2024-02-08T01:34:49.067000
|
||||||
CVE-2024-21917,0,0,f716c6e174b4d85e6dd9ac9a5c0d15320474c17d34b338ef8fe8fa8f22be68b7,2024-02-08T01:29:32.367000
|
CVE-2024-21917,0,0,f716c6e174b4d85e6dd9ac9a5c0d15320474c17d34b338ef8fe8fa8f22be68b7,2024-02-08T01:29:32.367000
|
||||||
CVE-2024-21918,1,1,e9cf9d31f8a1115b923b53fd9dcad56c406ed91f0f974a3222045d1234c77bf9,2024-03-26T16:15:10.877000
|
CVE-2024-21918,0,1,c4bb4ede38f9a16f499bf46a4bcaca94354f369eab31adef6a15454baea87f5d,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-21919,1,1,6bb600d0c6f883d9b463f3c687aecbe8359e94472314fe830c76b10811e4c948,2024-03-26T16:15:11.073000
|
CVE-2024-21919,0,1,7384b6246d42d878ee1ee3f98ce4c9dd34e38080d524d07b908a686735c4af16,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-21920,1,1,762814431e8decb8be1e0bf4ad4ad9808530bc37358d700dc5cdf30e37ee4365,2024-03-26T16:15:11.277000
|
CVE-2024-21920,0,1,ffdb9272381cfcb69d90b4c240807d8dc09161c70ea55d1400487f7b10cae5cd,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-2193,0,0,34e7209142ece07ff319851094293418a65cb348ac85d6085a8bcc354475b1e0,2024-03-23T03:15:12.450000
|
CVE-2024-2193,0,0,34e7209142ece07ff319851094293418a65cb348ac85d6085a8bcc354475b1e0,2024-03-23T03:15:12.450000
|
||||||
CVE-2024-2194,0,0,e66d1886576950c3cc2788bd7fbc7cf127b4cc7097217924653f49641c7f6c67,2024-03-13T18:15:58.530000
|
CVE-2024-2194,0,0,e66d1886576950c3cc2788bd7fbc7cf127b4cc7097217924653f49641c7f6c67,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-2197,0,0,c2754f239c7fee6e20f805eadb33174245eb70dd54a6a864c7dcc801422fac42,2024-03-20T13:00:16.367000
|
CVE-2024-2197,0,0,c2754f239c7fee6e20f805eadb33174245eb70dd54a6a864c7dcc801422fac42,2024-03-20T13:00:16.367000
|
||||||
@ -239980,7 +239989,7 @@ CVE-2024-22108,0,0,cdaf61a2506aec5c5c15705bb009e8054dc2f9e9fadf39ff642fb65becdf0
|
|||||||
CVE-2024-2211,0,0,5f96d32ca4af544c9f2c4c41d1cca4c75a0898cccdbc38ab9840e28c52771346,2024-03-06T15:18:08.093000
|
CVE-2024-2211,0,0,5f96d32ca4af544c9f2c4c41d1cca4c75a0898cccdbc38ab9840e28c52771346,2024-03-06T15:18:08.093000
|
||||||
CVE-2024-22113,0,0,73fc9153b57dfc99829524f1c872775af20e562fcc4a87613efb3eb112b8fe49,2024-01-29T14:23:46.600000
|
CVE-2024-22113,0,0,73fc9153b57dfc99829524f1c872775af20e562fcc4a87613efb3eb112b8fe49,2024-01-29T14:23:46.600000
|
||||||
CVE-2024-22119,0,0,d25acc4f5f2224943f2feaeb837e6d77f51fb63d8c6b5945b3415b9f2d10bb25,2024-02-15T19:35:45.447000
|
CVE-2024-22119,0,0,d25acc4f5f2224943f2feaeb837e6d77f51fb63d8c6b5945b3415b9f2d10bb25,2024-02-15T19:35:45.447000
|
||||||
CVE-2024-2212,1,1,d7e8ccfaa59e788e5e30c86e53a6b5411ff9d76fb9a391e68ceff3569dec3b4b,2024-03-26T16:15:13.233000
|
CVE-2024-2212,0,1,1efd8738d0df499a6210a5cbcdbcb2236e5d3b323e83389672544412107c41b4,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-22124,0,0,35999c882bc6d44ddc45a9b1e3e882ba4227533058bc07c120048ab393e82eb5,2024-01-22T19:17:13.050000
|
CVE-2024-22124,0,0,35999c882bc6d44ddc45a9b1e3e882ba4227533058bc07c120048ab393e82eb5,2024-01-22T19:17:13.050000
|
||||||
CVE-2024-22125,0,0,09efd17c32a694e6a723ff7a2a9eaeeb4bc062e9a25db0f7cad8d3d4b4874464,2024-01-12T19:42:36.637000
|
CVE-2024-22125,0,0,09efd17c32a694e6a723ff7a2a9eaeeb4bc062e9a25db0f7cad8d3d4b4874464,2024-01-12T19:42:36.637000
|
||||||
CVE-2024-22126,0,0,21fbc349f898f1250de5f7f39ca68cc7afccec8ff42d81c72dbf786571fc9040,2024-02-13T14:01:40.577000
|
CVE-2024-22126,0,0,21fbc349f898f1250de5f7f39ca68cc7afccec8ff42d81c72dbf786571fc9040,2024-02-13T14:01:40.577000
|
||||||
@ -239995,7 +240004,7 @@ CVE-2024-22134,0,0,3be6b7702224117203e25cf98307e352d45c22327a969b8a5d10317e76a95
|
|||||||
CVE-2024-22135,0,0,7025eeb4417e68d70b1ebd56dbf2904b38773b2370d9f15dd4e72daa19dcfb0c,2024-01-30T17:34:58.917000
|
CVE-2024-22135,0,0,7025eeb4417e68d70b1ebd56dbf2904b38773b2370d9f15dd4e72daa19dcfb0c,2024-01-30T17:34:58.917000
|
||||||
CVE-2024-22136,0,0,ffae1822b85f323446ecd7154230713998c5b43341d8cf75c26e20b18cf0dd08,2024-02-05T22:08:24.077000
|
CVE-2024-22136,0,0,ffae1822b85f323446ecd7154230713998c5b43341d8cf75c26e20b18cf0dd08,2024-02-05T22:08:24.077000
|
||||||
CVE-2024-22137,0,0,2f754fd6309f47fb06b4590cc899dcf8d9510a064415a4a45699e620bffecf24,2024-01-19T20:02:08.340000
|
CVE-2024-22137,0,0,2f754fd6309f47fb06b4590cc899dcf8d9510a064415a4a45699e620bffecf24,2024-01-19T20:02:08.340000
|
||||||
CVE-2024-2214,1,1,bac821ea40fbd0a9bcaaf994e0d1e4c3bbde8688dd782b52c974bda55f7f576b,2024-03-26T16:15:13.430000
|
CVE-2024-2214,0,1,67f09108a7f626515ff9607f3c75e511fcc384b5aee9ec997a4926f909682874,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-22140,0,0,7531d09a0f968b5d2b1e4e11b41757eb318c7a2cf822561fb39f6b355e958506,2024-02-03T00:18:43.417000
|
CVE-2024-22140,0,0,7531d09a0f968b5d2b1e4e11b41757eb318c7a2cf822561fb39f6b355e958506,2024-02-03T00:18:43.417000
|
||||||
CVE-2024-22141,0,0,82c169c1dd57a019cf6b1fa659a8204ad1d91b953c7a71671ed9e1905b8d4a0f,2024-01-30T20:18:38.460000
|
CVE-2024-22141,0,0,82c169c1dd57a019cf6b1fa659a8204ad1d91b953c7a71671ed9e1905b8d4a0f,2024-01-30T20:18:38.460000
|
||||||
CVE-2024-22142,0,0,8637a6c60024e32494bb4696b4c838486f6176e902ea0c9e3d4b4fb3a1805b63,2024-01-19T19:59:49.717000
|
CVE-2024-22142,0,0,8637a6c60024e32494bb4696b4c838486f6176e902ea0c9e3d4b4fb3a1805b63,2024-01-19T19:59:49.717000
|
||||||
@ -240008,7 +240017,7 @@ CVE-2024-22150,0,0,73a6449bdd862cb4aceb7dfcabf00926f0730684d1b40796cd1922a1d8912
|
|||||||
CVE-2024-22152,0,0,77741f5ed7ba0cff2726117ba8b408bddeb0ad8028c0019d800ba91134fb10eb,2024-01-30T17:36:20.533000
|
CVE-2024-22152,0,0,77741f5ed7ba0cff2726117ba8b408bddeb0ad8028c0019d800ba91134fb10eb,2024-01-30T17:36:20.533000
|
||||||
CVE-2024-22153,0,0,183cafa541cc9d6796e6f60d4f84cc3fefe9e93bd9495a8b813ab36c05739148,2024-02-06T15:43:49.957000
|
CVE-2024-22153,0,0,183cafa541cc9d6796e6f60d4f84cc3fefe9e93bd9495a8b813ab36c05739148,2024-02-06T15:43:49.957000
|
||||||
CVE-2024-22154,0,0,c5d6f5ccc259910245679ed3525d0fea5ed728e2e4ec972b00aa2e1bbd5206eb,2024-01-31T20:20:56.647000
|
CVE-2024-22154,0,0,c5d6f5ccc259910245679ed3525d0fea5ed728e2e4ec972b00aa2e1bbd5206eb,2024-01-31T20:20:56.647000
|
||||||
CVE-2024-22156,0,0,70006e5e9cf3347e83d1f68b689e7baddb5cd2fea027bd66eac3dddd58c2d962,2024-03-26T13:15:45.277000
|
CVE-2024-22156,0,1,0470690498e3075fd4f3771d852ea946c7ab23ccbac27ad083940b547295f710,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-22158,0,0,be5acba9413a4f0452950024099977323786ffce7bb9629de27484705b832f92,2024-02-06T15:25:24.303000
|
CVE-2024-22158,0,0,be5acba9413a4f0452950024099977323786ffce7bb9629de27484705b832f92,2024-02-06T15:25:24.303000
|
||||||
CVE-2024-22159,0,0,af65d98e1fc14c93d259c6b50b292b96d1dcf8bdc170ccb9c7a80ba7229999dc,2024-02-06T15:37:01.700000
|
CVE-2024-22159,0,0,af65d98e1fc14c93d259c6b50b292b96d1dcf8bdc170ccb9c7a80ba7229999dc,2024-02-06T15:37:01.700000
|
||||||
CVE-2024-2216,0,0,7a28c5762b5cda60e66bc68be4edb6e0097feb56dd7f05add8be107a9a5cdc2a,2024-03-06T21:42:54.697000
|
CVE-2024-2216,0,0,7a28c5762b5cda60e66bc68be4edb6e0097feb56dd7f05add8be107a9a5cdc2a,2024-03-06T21:42:54.697000
|
||||||
@ -240117,7 +240126,7 @@ CVE-2024-22337,0,0,9a674fac9bc4716d61a028d3be9473027552f3c1c11335efca4b4ddefd1e1
|
|||||||
CVE-2024-22346,0,0,638ee4e9687c7c28032b432c317662713c057110b08b4b27024e81eb8453bf9e,2024-03-19T16:50:10.570000
|
CVE-2024-22346,0,0,638ee4e9687c7c28032b432c317662713c057110b08b4b27024e81eb8453bf9e,2024-03-19T16:50:10.570000
|
||||||
CVE-2024-22352,0,0,52b9cf66a5f4972c051208c662d7f56e462da827c07f4b0e55a14efcee339e76,2024-03-21T12:58:51.093000
|
CVE-2024-22352,0,0,52b9cf66a5f4972c051208c662d7f56e462da827c07f4b0e55a14efcee339e76,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-22355,0,0,90575169d286b28c7ce02c7d947a264d77a6f25776530138b50b2f2dbc394220,2024-03-04T13:58:23.447000
|
CVE-2024-22355,0,0,90575169d286b28c7ce02c7d947a264d77a6f25776530138b50b2f2dbc394220,2024-03-04T13:58:23.447000
|
||||||
CVE-2024-22356,1,1,2bb0cdc6baed0ccc72412c5f987d24652d3a41eec6d3ba82c0460c8b77e80352,2024-03-26T15:15:48.920000
|
CVE-2024-22356,0,1,bcc46874c9752933a72230517b74ad7a7a0d54dc67e233e91127533dfceeba1c,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-2236,0,0,17401211af38608097c003c3b08d6e3d90e3570b70699d89a2e396d5b72c602a,2024-03-07T13:52:27.110000
|
CVE-2024-2236,0,0,17401211af38608097c003c3b08d6e3d90e3570b70699d89a2e396d5b72c602a,2024-03-07T13:52:27.110000
|
||||||
CVE-2024-22361,0,0,2cb34447b61b8680c66e6f142987700b31f9f16d4e9b8d748c59e5b8ad5a9a29,2024-02-16T21:35:31.953000
|
CVE-2024-22361,0,0,2cb34447b61b8680c66e6f142987700b31f9f16d4e9b8d748c59e5b8ad5a9a29,2024-02-16T21:35:31.953000
|
||||||
CVE-2024-22362,0,0,826381d745a7bfa89e56ba8a6fed4317ed24204ea30e248bcffb2a9894398594,2024-03-21T02:52:03.063000
|
CVE-2024-22362,0,0,826381d745a7bfa89e56ba8a6fed4317ed24204ea30e248bcffb2a9894398594,2024-03-21T02:52:03.063000
|
||||||
@ -240548,7 +240557,7 @@ CVE-2024-23476,0,0,e3d84cdb88c20fc5ad4183c7e154fd4eb94d6574a64f56328103056889f0f
|
|||||||
CVE-2024-23477,0,0,87ea55eb7f1d47398644b7f37685a8d0eb8352c36d1b14165a017d7f9ea764c8,2024-02-20T20:38:43.587000
|
CVE-2024-23477,0,0,87ea55eb7f1d47398644b7f37685a8d0eb8352c36d1b14165a017d7f9ea764c8,2024-02-20T20:38:43.587000
|
||||||
CVE-2024-23478,0,0,b3a2615dbe854f9cd6f6758ce3a7c085bf544d3fb8c18446bd16ed76b713d059,2024-02-20T20:39:52.377000
|
CVE-2024-23478,0,0,b3a2615dbe854f9cd6f6758ce3a7c085bf544d3fb8c18446bd16ed76b713d059,2024-02-20T20:39:52.377000
|
||||||
CVE-2024-23479,0,0,347fa1fab90846375f3cbda9f21578cf079b96a3697a975655102d71cb94c108,2024-02-20T20:17:31.460000
|
CVE-2024-23479,0,0,347fa1fab90846375f3cbda9f21578cf079b96a3697a975655102d71cb94c108,2024-02-20T20:17:31.460000
|
||||||
CVE-2024-23482,1,1,e66d5b2e112e90cb8a205d39f102bde7ba4b66b3998d82dba115ee48456bad5b,2024-03-26T15:15:49.130000
|
CVE-2024-23482,0,1,a1a2b00555a591fe7110a566438c570a2dca6a03e77aa4e75cc2cbc4e9c0af62,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-23488,0,0,57450458303c48f58f7accf28de637666e8c4b38b2ec58f4dc15eb09b92be21a,2024-02-29T13:49:29.390000
|
CVE-2024-23488,0,0,57450458303c48f58f7accf28de637666e8c4b38b2ec58f4dc15eb09b92be21a,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-23492,0,0,7ac211a2a1c5c083cd2cd2691020edf3a51548a70085e44c956a49351fc4de8b,2024-03-21T02:52:07.353000
|
CVE-2024-23492,0,0,7ac211a2a1c5c083cd2cd2691020edf3a51548a70085e44c956a49351fc4de8b,2024-03-21T02:52:07.353000
|
||||||
CVE-2024-23493,0,0,91cbf193a715aa0c526237151c4d36164df1ccaf1f366a7cf8bdf551267e12ba,2024-02-29T13:49:29.390000
|
CVE-2024-23493,0,0,91cbf193a715aa0c526237151c4d36164df1ccaf1f366a7cf8bdf551267e12ba,2024-02-29T13:49:29.390000
|
||||||
@ -240656,7 +240665,7 @@ CVE-2024-2370,0,0,b4d60e1047325278ac8b0d4698ddbabcf9cce9ef3d3d19d6f7eb18094f8266
|
|||||||
CVE-2024-2371,0,0,3cb4c1ed0c9b08d07eacc5252cd2248e3436e0fe77ed1216887d9a3f973c7f13,2024-03-12T12:40:13.500000
|
CVE-2024-2371,0,0,3cb4c1ed0c9b08d07eacc5252cd2248e3436e0fe77ed1216887d9a3f973c7f13,2024-03-12T12:40:13.500000
|
||||||
CVE-2024-23717,0,0,6124f28576b39881108c8f8a6a5c6f0e66ec8c6ba51a289d578374ba7fe9cba6,2024-03-12T12:40:13.500000
|
CVE-2024-23717,0,0,6124f28576b39881108c8f8a6a5c6f0e66ec8c6ba51a289d578374ba7fe9cba6,2024-03-12T12:40:13.500000
|
||||||
CVE-2024-23721,0,0,4dd09af0f810413f4d72b4868c20ebef4c48ec34bdb053307d4a26aae377efc3,2024-03-21T12:58:51.093000
|
CVE-2024-23721,0,0,4dd09af0f810413f4d72b4868c20ebef4c48ec34bdb053307d4a26aae377efc3,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-23722,1,1,1e70cc67972542a9b1919897af8491698dfff7eacb271c19a092acfa5d912a05,2024-03-26T15:15:49.317000
|
CVE-2024-23722,0,1,38e4afcdeed536b1189b96cd2e826d0a0039b5151073f4df55924a643f5fb03d,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-23724,0,0,47401decfa65f84dd047eaa15adb1a17aa44914fc15b5198b908ecf69c381f70,2024-03-21T02:52:08.230000
|
CVE-2024-23724,0,0,47401decfa65f84dd047eaa15adb1a17aa44914fc15b5198b908ecf69c381f70,2024-03-21T02:52:08.230000
|
||||||
CVE-2024-23725,0,0,e7109aa5ed154918326c3254d584acf7e8190c7c6acd985ea1145474ef362350,2024-01-29T15:25:48.110000
|
CVE-2024-23725,0,0,e7109aa5ed154918326c3254d584acf7e8190c7c6acd985ea1145474ef362350,2024-01-29T15:25:48.110000
|
||||||
CVE-2024-23726,0,0,1e6b5838c3bbe1bdea4cff85e0dab09275e17fdbeddbc74981e476f308132713,2024-01-29T15:25:36.090000
|
CVE-2024-23726,0,0,1e6b5838c3bbe1bdea4cff85e0dab09275e17fdbeddbc74981e476f308132713,2024-01-29T15:25:36.090000
|
||||||
@ -240992,7 +241001,7 @@ CVE-2024-24499,0,0,f3fa195f99d03c816961a79dfcc5225a65897f0a2c13286167d69ca586129
|
|||||||
CVE-2024-2450,0,0,00768fb37fabbe59aaa05a2b15e979f5b194f2b002bbfb5602d5ad6df849f0ce,2024-03-15T12:53:06.423000
|
CVE-2024-2450,0,0,00768fb37fabbe59aaa05a2b15e979f5b194f2b002bbfb5602d5ad6df849f0ce,2024-03-15T12:53:06.423000
|
||||||
CVE-2024-24511,0,0,c2a15768e4699e22cbf5e8595792dbc9bf48071b723d524443a4f83d9a5c3ab8,2024-03-04T13:58:23.447000
|
CVE-2024-24511,0,0,c2a15768e4699e22cbf5e8595792dbc9bf48071b723d524443a4f83d9a5c3ab8,2024-03-04T13:58:23.447000
|
||||||
CVE-2024-24512,0,0,03c51f88444f0be6fcfaff8e371681e3a1a1d007832a9bf8fa7088f13cfe5d40,2024-03-04T13:58:23.447000
|
CVE-2024-24512,0,0,03c51f88444f0be6fcfaff8e371681e3a1a1d007832a9bf8fa7088f13cfe5d40,2024-03-04T13:58:23.447000
|
||||||
CVE-2024-2452,1,1,95ae8d640d1e817d02c46a9f1bf4137b5b766690048615995c27024b71579fd1,2024-03-26T16:15:13.623000
|
CVE-2024-2452,0,1,dc7f1023137a78f11f48bc3cf8f72ec03aa67efff74760d3d778cb44b3110a19,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-24520,0,0,1c17a865e2018472844eee3eeb32382c844b7628a24e3ba8ccf07a6f4355df2d,2024-03-21T12:58:51.093000
|
CVE-2024-24520,0,0,1c17a865e2018472844eee3eeb32382c844b7628a24e3ba8ccf07a6f4355df2d,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-24524,0,0,40ecb02cd326bdc34833c61cf5eb3e9f45f526d45502f51591361c36d1938c63,2024-02-09T16:30:43.830000
|
CVE-2024-24524,0,0,40ecb02cd326bdc34833c61cf5eb3e9f45f526d45502f51591361c36d1938c63,2024-02-09T16:30:43.830000
|
||||||
CVE-2024-24525,0,0,13b50b322b70c1ba78c523473a9882b44cc13b59455e3e47dd336806a91a1148,2024-02-29T13:49:29.390000
|
CVE-2024-24525,0,0,13b50b322b70c1ba78c523473a9882b44cc13b59455e3e47dd336806a91a1148,2024-02-29T13:49:29.390000
|
||||||
@ -241456,7 +241465,7 @@ CVE-2024-25469,0,0,96be9bcc7fde8f9b63f103d576b0d22a9c84a3c5935374af13a2466b2f2f5
|
|||||||
CVE-2024-2547,0,0,029ea713e81efe24d9f23f45896ca40700b7682fd29e8eeae6ea82eb3ee0c23f,2024-03-21T02:52:37.487000
|
CVE-2024-2547,0,0,029ea713e81efe24d9f23f45896ca40700b7682fd29e8eeae6ea82eb3ee0c23f,2024-03-21T02:52:37.487000
|
||||||
CVE-2024-25501,0,0,bac5c3eafbac38d2c6b4da329ce2a075da938dd8ce1ff1c471fff3fb2b0c91ae,2024-03-11T01:32:29.610000
|
CVE-2024-25501,0,0,bac5c3eafbac38d2c6b4da329ce2a075da938dd8ce1ff1c471fff3fb2b0c91ae,2024-03-11T01:32:29.610000
|
||||||
CVE-2024-25502,0,0,50331b6b298e51ff1fb5155b43730c3887534f74eacaa5eabfebdbefa930be85,2024-02-16T13:38:00.047000
|
CVE-2024-25502,0,0,50331b6b298e51ff1fb5155b43730c3887534f74eacaa5eabfebdbefa930be85,2024-02-16T13:38:00.047000
|
||||||
CVE-2024-2553,0,0,60661f4e29c946f8f0bd9c141b816121a578e8afae7b951ab3d0603c830b9051,2024-03-21T02:52:37.573000
|
CVE-2024-2553,0,1,51096ed0b78dd956151349bc7a00fa14b68c357d7181cd6178d0a156f537f6e1,2024-03-26T17:15:47.490000
|
||||||
CVE-2024-2554,0,0,4ac6ec86a9eca45e0959ee11cb19788a3b6ae4ad6b565e671b8b1c5afcc85576,2024-03-21T02:52:37.647000
|
CVE-2024-2554,0,0,4ac6ec86a9eca45e0959ee11cb19788a3b6ae4ad6b565e671b8b1c5afcc85576,2024-03-21T02:52:37.647000
|
||||||
CVE-2024-2555,0,0,f916e80b2ed7e85f0a04674a605eaa0368f77f318b267584d88e76e9119ef8a7,2024-03-21T02:52:37.723000
|
CVE-2024-2555,0,0,f916e80b2ed7e85f0a04674a605eaa0368f77f318b267584d88e76e9119ef8a7,2024-03-21T02:52:37.723000
|
||||||
CVE-2024-25551,0,0,08dea6730d2a3539d15dd516547ab3c25a1bf59710632ae63632a88cbff77b71,2024-03-04T13:58:23.447000
|
CVE-2024-25551,0,0,08dea6730d2a3539d15dd516547ab3c25a1bf59710632ae63632a88cbff77b71,2024-03-04T13:58:23.447000
|
||||||
@ -241659,9 +241668,9 @@ CVE-2024-25941,0,0,ca1cef65d30f17057b47421c2700ecf50e418e7bf4da35eb3fcc2989f17ef
|
|||||||
CVE-2024-25942,0,0,f61fbc9a4d226989af6c7dbccbce6eac1bf08e9ecba7753f027f3c66eedf16fc,2024-03-19T13:26:46
|
CVE-2024-25942,0,0,f61fbc9a4d226989af6c7dbccbce6eac1bf08e9ecba7753f027f3c66eedf16fc,2024-03-19T13:26:46
|
||||||
CVE-2024-2595,0,0,2deb54d18ba7636df2c2b5e2f14f094eeefaa5b876ae68e9d3b6166f648310d6,2024-03-18T19:40:00.173000
|
CVE-2024-2595,0,0,2deb54d18ba7636df2c2b5e2f14f094eeefaa5b876ae68e9d3b6166f648310d6,2024-03-18T19:40:00.173000
|
||||||
CVE-2024-25951,0,0,4cab9db546da1535e7f7aa83987aad28b8aa7aeb3328d636aa2cd78c27a2b2c1,2024-03-11T01:32:39.697000
|
CVE-2024-25951,0,0,4cab9db546da1535e7f7aa83987aad28b8aa7aeb3328d636aa2cd78c27a2b2c1,2024-03-11T01:32:39.697000
|
||||||
CVE-2024-25956,1,1,223aa93034d13ea5222d6dfe706bf405b5c1ec2f8ef6e2ecff3c2820e3c91784,2024-03-26T16:15:11.520000
|
CVE-2024-25956,0,1,dfd2802b1c736e1761ed07520e628719c89334b257da6b0a5713ad322e0dae27,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-25957,1,1,b661b77cecf6055cc88dd8ba37395c2962972d4b51b06df443041dd19d18013f,2024-03-26T16:15:11.727000
|
CVE-2024-25957,0,1,fbfd85de3920e2efe608621ddb5f2aee192a8ffd0e6708b05a61970ec8670fe3,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-25958,1,1,b12ce2ae464f2791ebd74e2204fab9a12edbcb4cd9adf0a48724d0c2e79f0fd4,2024-03-26T16:15:11.917000
|
CVE-2024-25958,0,1,428a097e4eb3bbb89a8c80ee3860a38967cf51a7e50b2ade8df4bf3874041ad6,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-2596,0,0,978865da9be9e1fb873a9c434a053f33d1f0c5219abdf12becebd1212242ea79,2024-03-18T19:40:00.173000
|
CVE-2024-2596,0,0,978865da9be9e1fb873a9c434a053f33d1f0c5219abdf12becebd1212242ea79,2024-03-18T19:40:00.173000
|
||||||
CVE-2024-25964,0,0,b5ec0f6d98c78318f65547134d8b33b81ca3c6769a2c110d8679aa993806ef56,2024-03-25T13:47:14.087000
|
CVE-2024-25964,0,0,b5ec0f6d98c78318f65547134d8b33b81ca3c6769a2c110d8679aa993806ef56,2024-03-25T13:47:14.087000
|
||||||
CVE-2024-2597,0,0,822c3604000d58768ff79975222ee5716f9ff927beed042444c7c308ac1b28bf,2024-03-18T19:40:00.173000
|
CVE-2024-2597,0,0,822c3604000d58768ff79975222ee5716f9ff927beed042444c7c308ac1b28bf,2024-03-18T19:40:00.173000
|
||||||
@ -241981,8 +241990,13 @@ CVE-2024-26640,0,0,5cc6b5e042a5b441f74784080591c7d359381cd13aba12bdf63d6c89fc714
|
|||||||
CVE-2024-26641,0,0,d0ed2cdfb0ff7417cb869a8d4b0f844e96cb33626fa12ef7a8d145f64e7e59f2,2024-03-18T12:38:25.490000
|
CVE-2024-26641,0,0,d0ed2cdfb0ff7417cb869a8d4b0f844e96cb33626fa12ef7a8d145f64e7e59f2,2024-03-18T12:38:25.490000
|
||||||
CVE-2024-26642,0,0,2030c36d17cf3955028a3c8cf70b58662419898c5eb4245b6345fdb4fa4667cf,2024-03-21T12:58:51.093000
|
CVE-2024-26642,0,0,2030c36d17cf3955028a3c8cf70b58662419898c5eb4245b6345fdb4fa4667cf,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-26643,0,0,76e88a10e1b7ae620b3b2f807c32687dfa488694b94b88072cd31ad829305fec,2024-03-21T12:58:51.093000
|
CVE-2024-26643,0,0,76e88a10e1b7ae620b3b2f807c32687dfa488694b94b88072cd31ad829305fec,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-26644,1,1,114e597ced6989f39361de91b251416aefc3205e3a880df9bfb3355fa69ecc44,2024-03-26T16:15:12.137000
|
CVE-2024-26644,0,1,e5196539d0d7d2426b70f5c3d7b2262aa5f8e671e6361172395eb0ace801b5d7,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-26645,1,1,07f5d2a40f75bf53494fd1bdd9955a499bbe895b17a65cc7d26da6c453638e5c,2024-03-26T16:15:12.207000
|
CVE-2024-26645,0,1,fe3f1a6f358cce09c9a7d8315812702f5784843255df1b174247cd1e300a4c71,2024-03-26T17:09:53.043000
|
||||||
|
CVE-2024-26646,1,1,6eac3a1f251037baca9015e731d75055b325c9652d7a6f256f509f462ef91c49,2024-03-26T18:15:09.910000
|
||||||
|
CVE-2024-26647,1,1,c1685e9c5a3bbb47aa3ade7623a183c0a043377118f54afb727855828b03a371,2024-03-26T18:15:10.063000
|
||||||
|
CVE-2024-26648,1,1,36d3fa2a15ff79ad7c0626e4e63083b151bd153667a960246460ad1dbb4b8422,2024-03-26T18:15:10.220000
|
||||||
|
CVE-2024-26649,1,1,acca5e9b7f92cbd209bcc468a216ebd6864e5465e46b0a5729ad466b6f9e5db4,2024-03-26T18:15:10.370000
|
||||||
|
CVE-2024-26650,1,1,614e20037042219ab8e7db2eca3f7d1f724e3785feb5dfac89364a948cb05366,2024-03-26T18:15:10.530000
|
||||||
CVE-2024-2668,0,0,d8e22e7bb795e8f8d48dc1ea67b8b3706e737c441fdb6e3cdf26dd6015682f9f,2024-03-21T02:52:41.070000
|
CVE-2024-2668,0,0,d8e22e7bb795e8f8d48dc1ea67b8b3706e737c441fdb6e3cdf26dd6015682f9f,2024-03-21T02:52:41.070000
|
||||||
CVE-2024-2669,0,0,4f5a2d5969b59448109cf022193bd2b7c88dc7ffa7ca03caa723fb0f374642a3,2024-03-21T02:52:41.157000
|
CVE-2024-2669,0,0,4f5a2d5969b59448109cf022193bd2b7c88dc7ffa7ca03caa723fb0f374642a3,2024-03-21T02:52:41.157000
|
||||||
CVE-2024-2670,0,0,51102bd696ec0a80433e00190a81242d0892d06afe5affb13dd51bd0c370ce65,2024-03-21T02:52:41.253000
|
CVE-2024-2670,0,0,51102bd696ec0a80433e00190a81242d0892d06afe5affb13dd51bd0c370ce65,2024-03-21T02:52:41.253000
|
||||||
@ -242146,7 +242160,7 @@ CVE-2024-27441,0,0,e840685b8600bbca2bd5265ffc2375dd0e1834727afca845fa72402578217
|
|||||||
CVE-2024-27444,0,0,a237f36c45a82911cb697384887c7b89bc1c2ea038ffd45f33470a0acaad42ea,2024-02-26T16:32:25.577000
|
CVE-2024-27444,0,0,a237f36c45a82911cb697384887c7b89bc1c2ea038ffd45f33470a0acaad42ea,2024-02-26T16:32:25.577000
|
||||||
CVE-2024-27447,0,0,cb57e8d03df573cd861f28c33cc0f260471c72de24ec7e9c3037c0509931fb18,2024-02-26T16:32:25.577000
|
CVE-2024-27447,0,0,cb57e8d03df573cd861f28c33cc0f260471c72de24ec7e9c3037c0509931fb18,2024-02-26T16:32:25.577000
|
||||||
CVE-2024-27454,0,0,420cb9ec3b08ac5a96e141e933952328f4cf525758241b7fd36981eea8d7ea27,2024-02-26T16:32:25.577000
|
CVE-2024-27454,0,0,420cb9ec3b08ac5a96e141e933952328f4cf525758241b7fd36981eea8d7ea27,2024-02-26T16:32:25.577000
|
||||||
CVE-2024-27455,0,1,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000
|
CVE-2024-27455,0,0,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000
|
||||||
CVE-2024-27456,0,0,af8b9eeeffd0370c5237af64d481e919abc5d541ec3702413fff35287d9c8d37,2024-02-26T16:32:25.577000
|
CVE-2024-27456,0,0,af8b9eeeffd0370c5237af64d481e919abc5d541ec3702413fff35287d9c8d37,2024-02-26T16:32:25.577000
|
||||||
CVE-2024-2748,0,0,7e386cbf6383d9c670ab2da491db4c11338d46cd7667c12d0ea9f5d67eb35ea4,2024-03-21T12:58:51.093000
|
CVE-2024-2748,0,0,7e386cbf6383d9c670ab2da491db4c11338d46cd7667c12d0ea9f5d67eb35ea4,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-27497,0,0,424da99af028e8bbc4e145cc3ed13014de56bcd76f9291f295253c8da6722a31,2024-03-01T15:23:36.177000
|
CVE-2024-27497,0,0,424da99af028e8bbc4e145cc3ed13014de56bcd76f9291f295253c8da6722a31,2024-03-01T15:23:36.177000
|
||||||
@ -242210,7 +242224,7 @@ CVE-2024-27744,0,0,c100d4ba8f49a307e8f166c43dcf72396c641c27bc5c30f424e004f4b4c33
|
|||||||
CVE-2024-27746,0,0,6f3ddced2e2b26bef51987507b4e7466957a803a9da415c8c1c8b245cafe1423,2024-03-13T07:15:36.470000
|
CVE-2024-27746,0,0,6f3ddced2e2b26bef51987507b4e7466957a803a9da415c8c1c8b245cafe1423,2024-03-13T07:15:36.470000
|
||||||
CVE-2024-27747,0,0,eff635f872515818dfe20352d610bb047327d7f6971e953c63bc92feb6bf3ebe,2024-03-13T07:15:36.523000
|
CVE-2024-27747,0,0,eff635f872515818dfe20352d610bb047327d7f6971e953c63bc92feb6bf3ebe,2024-03-13T07:15:36.523000
|
||||||
CVE-2024-2775,0,0,324304d3daf3f8232d8549c8aac7991bd17ad8e74cddabbe779660d692eff015,2024-03-22T12:45:36.130000
|
CVE-2024-2775,0,0,324304d3daf3f8232d8549c8aac7991bd17ad8e74cddabbe779660d692eff015,2024-03-22T12:45:36.130000
|
||||||
CVE-2024-27756,0,0,aebfc12c95eee1aa3d95acbf6fc8b0650b6e3d2e490fe1817d1c49f0782fe0c7,2024-03-15T12:53:06.423000
|
CVE-2024-27756,0,1,a0b7876d1bcd508f42c19e34f906c00ccf4c6d4fd282b64eb52f33eb0c45850b,2024-03-26T18:15:10.693000
|
||||||
CVE-2024-27757,0,0,758da8d428041fb55cda5e8ed49e42184e30c0310dfccc74e01819218179190e,2024-03-18T12:38:25.490000
|
CVE-2024-27757,0,0,758da8d428041fb55cda5e8ed49e42184e30c0310dfccc74e01819218179190e,2024-03-18T12:38:25.490000
|
||||||
CVE-2024-27758,0,0,6abe87e0a8905ac150ade2fec85250ff5e7fbf580c101c16b193b98f7d58141f,2024-03-12T17:46:17.273000
|
CVE-2024-27758,0,0,6abe87e0a8905ac150ade2fec85250ff5e7fbf580c101c16b193b98f7d58141f,2024-03-12T17:46:17.273000
|
||||||
CVE-2024-2776,0,0,a2dca86eeda4163cb75b40ad2e671bae21e52f796052ecc38e114bfa3f2fcc33,2024-03-22T12:45:36.130000
|
CVE-2024-2776,0,0,a2dca86eeda4163cb75b40ad2e671bae21e52f796052ecc38e114bfa3f2fcc33,2024-03-22T12:45:36.130000
|
||||||
@ -242282,7 +242296,7 @@ CVE-2024-27995,0,0,31db9c3046ef3b6826fd04aab15586376d26e0b529bdf84ce7eba17bac569
|
|||||||
CVE-2024-27996,0,0,79cff30308b011c07df476cb18acc5ff1830e7bf17b14d1ca5a0d9446fa716b8,2024-03-20T13:00:16.367000
|
CVE-2024-27996,0,0,79cff30308b011c07df476cb18acc5ff1830e7bf17b14d1ca5a0d9446fa716b8,2024-03-20T13:00:16.367000
|
||||||
CVE-2024-27997,0,0,b42c7cf4751e4a11a6e5eeb90c0df264fce89958ee556b8b06894cd2e68b11ce,2024-03-20T13:00:16.367000
|
CVE-2024-27997,0,0,b42c7cf4751e4a11a6e5eeb90c0df264fce89958ee556b8b06894cd2e68b11ce,2024-03-20T13:00:16.367000
|
||||||
CVE-2024-27998,0,0,325b1a8419d02931fcb08c1286afe5c33e53c5bf8527e201a365155e360914cf,2024-03-20T13:00:16.367000
|
CVE-2024-27998,0,0,325b1a8419d02931fcb08c1286afe5c33e53c5bf8527e201a365155e360914cf,2024-03-20T13:00:16.367000
|
||||||
CVE-2024-2802,1,1,3b7ed9aefbc68681b0633b6ab16c0b3db6db844ee4c655f6c7e6863ac6e1f543,2024-03-26T15:15:49.677000
|
CVE-2024-2802,0,0,3b7ed9aefbc68681b0633b6ab16c0b3db6db844ee4c655f6c7e6863ac6e1f543,2024-03-26T15:15:49.677000
|
||||||
CVE-2024-28029,0,0,9e465d515603ce2b4056e1d4099525822960990d4afbdcda109cb1a09fe772c2,2024-03-25T16:06:44.403000
|
CVE-2024-28029,0,0,9e465d515603ce2b4056e1d4099525822960990d4afbdcda109cb1a09fe772c2,2024-03-25T16:06:44.403000
|
||||||
CVE-2024-28033,0,0,d380f707343e80ca8a48383d7130e8455ae81fc182e0d67c36374f1eb571652f,2024-03-26T12:55:05.010000
|
CVE-2024-28033,0,0,d380f707343e80ca8a48383d7130e8455ae81fc182e0d67c36374f1eb571652f,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-28034,0,0,59f37b2f71aecfc048b35bdfeca5cf2bf5792e3fd57d1b0f3eaa95911ebef442,2024-03-26T12:55:05.010000
|
CVE-2024-28034,0,0,59f37b2f71aecfc048b35bdfeca5cf2bf5792e3fd57d1b0f3eaa95911ebef442,2024-03-26T12:55:05.010000
|
||||||
@ -242558,9 +242572,13 @@ CVE-2024-28868,0,0,4e3489f3c96f97bc271ff7282115c7f5d25e2aa392efe0c1c5842c72ee998
|
|||||||
CVE-2024-2888,0,0,e48cc71bf8d96ab718c88bf59dd81f25047204b13c0446dd48014e6c60fc42d9,2024-03-26T12:55:05.010000
|
CVE-2024-2888,0,0,e48cc71bf8d96ab718c88bf59dd81f25047204b13c0446dd48014e6c60fc42d9,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-2889,0,0,047900621574a9797901d8767443e859750a2765d7b4c1f50c805ec45928b2d3,2024-03-26T12:55:05.010000
|
CVE-2024-2889,0,0,047900621574a9797901d8767443e859750a2765d7b4c1f50c805ec45928b2d3,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-28891,0,0,0aa614d18123b6bc2c76e9c8b5d356a2e7d71bba766bbf9db36fdc818df4c91d,2024-03-22T12:45:36.130000
|
CVE-2024-28891,0,0,0aa614d18123b6bc2c76e9c8b5d356a2e7d71bba766bbf9db36fdc818df4c91d,2024-03-22T12:45:36.130000
|
||||||
CVE-2024-2891,0,0,c4444761e2daaffd1f00735101a2ff9c47024a839111c07859ef3c428d9fc3e5,2024-03-26T14:15:09.530000
|
CVE-2024-2891,0,1,94b70830417014ebd0a88424b38e7910314b41261ea6ef22ebae730d401e569a,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-28916,0,0,3588de3801d3f24953276fa6b57f2d684fb38fc8b3ed3ad7d8613e127e6022b7,2024-03-21T12:58:51.093000
|
CVE-2024-28916,0,0,3588de3801d3f24953276fa6b57f2d684fb38fc8b3ed3ad7d8613e127e6022b7,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-2892,1,1,954a2f272af32cdc4636d904b5279d89c288f46d88158828a1076b340bc6cbac,2024-03-26T16:15:13.853000
|
CVE-2024-2892,0,1,e53fd1216c4b22efebd0b743da5712b8a2bbb649ec50cef3f19c8170626057cb,2024-03-26T17:09:53.043000
|
||||||
|
CVE-2024-2893,1,1,03454b4172a384fcf754d0a79af98f544b770efe10848787fa0a66006ffb73c1,2024-03-26T17:15:47.810000
|
||||||
|
CVE-2024-2894,1,1,e073a098f20ecf49044bd1b363f575a8cb2f6afd9229aa92873c84f5fd988e53,2024-03-26T17:15:48.080000
|
||||||
|
CVE-2024-2895,1,1,3be1a99c99a4512208e842577cd86ecfd7359e00911a74bb22c4751a2f381f34,2024-03-26T18:15:10.893000
|
||||||
|
CVE-2024-2896,1,1,cfbae6b125dd4e36298bfaaddfd49990d3493209156cf15c0e63037d046146fd,2024-03-26T18:15:11.543000
|
||||||
CVE-2024-29009,0,0,e428945e790b35d2116d11f320908f919961bf6f75e41d300d21cf55f5bcc19c,2024-03-25T13:47:14.087000
|
CVE-2024-29009,0,0,e428945e790b35d2116d11f320908f919961bf6f75e41d300d21cf55f5bcc19c,2024-03-25T13:47:14.087000
|
||||||
CVE-2024-29018,0,0,996b521b7d9365d8d41596984cc4ea0a166d70f0fc41d183b4857a8a3632cdd4,2024-03-21T12:58:51.093000
|
CVE-2024-29018,0,0,996b521b7d9365d8d41596984cc4ea0a166d70f0fc41d183b4857a8a3632cdd4,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-29025,0,0,2135a02640a8fe43b6f6ca4c5bc68a475f73ee669a9a1a5af697f30fa738d887,2024-03-26T12:55:05.010000
|
CVE-2024-29025,0,0,2135a02640a8fe43b6f6ca4c5bc68a475f73ee669a9a1a5af697f30fa738d887,2024-03-26T12:55:05.010000
|
||||||
@ -242577,7 +242595,7 @@ CVE-2024-29041,0,0,062cd423858e5d93d3fcaca6dd38a28eee29d2cae2776de71c0c9845b66bb
|
|||||||
CVE-2024-29042,0,0,94be04c88512f8801f1a0b7e8a0fe44bc1e2661493f643835e5309c09e2ba389,2024-03-22T19:02:10.300000
|
CVE-2024-29042,0,0,94be04c88512f8801f1a0b7e8a0fe44bc1e2661493f643835e5309c09e2ba389,2024-03-22T19:02:10.300000
|
||||||
CVE-2024-29057,0,0,1a7d236424310c38bf79fff65250ee548fa2fb68d692d6ba086f9244a484a161,2024-03-26T03:18:48.760000
|
CVE-2024-29057,0,0,1a7d236424310c38bf79fff65250ee548fa2fb68d692d6ba086f9244a484a161,2024-03-26T03:18:48.760000
|
||||||
CVE-2024-29059,0,0,18e37be1e0df9e20dcfce0ba40125ed6c1baf91c43e1478b2c45015a443784c5,2024-03-25T01:51:01.223000
|
CVE-2024-29059,0,0,18e37be1e0df9e20dcfce0ba40125ed6c1baf91c43e1478b2c45015a443784c5,2024-03-25T01:51:01.223000
|
||||||
CVE-2024-2906,0,0,8f4815138846f7168880c963432fd8e826da79a508032bbe434ec04b77e0ce85,2024-03-26T13:15:45.497000
|
CVE-2024-2906,0,1,d03107f75ca563c85caee3d034c6f17690ce56543ec4f09885b1b99f97ccb0d6,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29071,0,0,5ff903755374c23b025a98d3cc2b0f06ea188aa4151e3658c02fd385bc8b4fa8,2024-03-25T13:47:14.087000
|
CVE-2024-29071,0,0,5ff903755374c23b025a98d3cc2b0f06ea188aa4151e3658c02fd385bc8b4fa8,2024-03-25T13:47:14.087000
|
||||||
CVE-2024-29089,0,0,e5fbae925c9da8d587d9573cbc1c34db123c4510c1c1616d472538493a08c59e,2024-03-20T13:00:16.367000
|
CVE-2024-29089,0,0,e5fbae925c9da8d587d9573cbc1c34db123c4510c1c1616d472538493a08c59e,2024-03-20T13:00:16.367000
|
||||||
CVE-2024-29091,0,0,b1cb764a2082d02939e32c22f722543dd831cf608e6c39b51eb933f990788962,2024-03-20T13:00:16.367000
|
CVE-2024-29091,0,0,b1cb764a2082d02939e32c22f722543dd831cf608e6c39b51eb933f990788962,2024-03-20T13:00:16.367000
|
||||||
@ -242629,7 +242647,7 @@ CVE-2024-29140,0,0,81b0188b02ec97eea25ba71e207c764caac64152b7cc837d2aa82b57919f9
|
|||||||
CVE-2024-29141,0,0,0c36d86235af1b05ffdd671977b0a9f1efad4a89eb52195bc0218075263f9454,2024-03-19T14:31:27.883000
|
CVE-2024-29141,0,0,0c36d86235af1b05ffdd671977b0a9f1efad4a89eb52195bc0218075263f9454,2024-03-19T14:31:27.883000
|
||||||
CVE-2024-29142,0,0,aa64581089439270488fd3ec7318d50f51fe018a933a4c7619fcc03f33e8f61b,2024-03-19T14:31:27.883000
|
CVE-2024-29142,0,0,aa64581089439270488fd3ec7318d50f51fe018a933a4c7619fcc03f33e8f61b,2024-03-19T14:31:27.883000
|
||||||
CVE-2024-29143,0,0,a3f92e2c9ae6aaf4168f841be16c13a544cace199faa049656661980aa53e607,2024-03-19T13:26:46
|
CVE-2024-29143,0,0,a3f92e2c9ae6aaf4168f841be16c13a544cace199faa049656661980aa53e607,2024-03-19T13:26:46
|
||||||
CVE-2024-2915,1,1,2dcdeb9612ca6ec05e4afdc1cd314d20f66e9e7d993d06abca882e7513b03203,2024-03-26T16:15:14.117000
|
CVE-2024-2915,0,1,ec24e1259461cfa4ad3d33658319541b7ef90e5a07f7652d9577315748dcb123,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24c8f,2024-03-18T12:38:25.490000
|
CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24c8f,2024-03-18T12:38:25.490000
|
||||||
CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000
|
CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000
|
||||||
CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000
|
CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000
|
||||||
@ -242645,10 +242663,10 @@ CVE-2024-29190,0,0,06fd81282a65c29bad2a807438b949724256368bd8f788b06f116f9ca54b1
|
|||||||
CVE-2024-29194,0,0,61bcf80dc8c33623e289063809985cd69cc66b52cb236ef7d952a2c24a0c4127,2024-03-25T01:51:01.223000
|
CVE-2024-29194,0,0,61bcf80dc8c33623e289063809985cd69cc66b52cb236ef7d952a2c24a0c4127,2024-03-25T01:51:01.223000
|
||||||
CVE-2024-29195,0,0,12b6fcead703f320c2faaa3dbf933701901e834c51cbd479cd70a3447afc3114,2024-03-26T12:55:05.010000
|
CVE-2024-29195,0,0,12b6fcead703f320c2faaa3dbf933701901e834c51cbd479cd70a3447afc3114,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-29196,0,0,e02aa4919ed0d6b8af5e1fbc5257465a64fdae2f23d9b9aaabfbc3da2c0d39fa,2024-03-26T12:55:05.010000
|
CVE-2024-29196,0,0,e02aa4919ed0d6b8af5e1fbc5257465a64fdae2f23d9b9aaabfbc3da2c0d39fa,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-29197,1,1,77c434a1953f89864417a27e46c04d47bc5336f2b84fe309d05db9fffed708ed,2024-03-26T15:15:49.390000
|
CVE-2024-29197,0,1,48cfe2d0e00e1d6e9f018548b8b920adc8f1c35c8c8d2a08e4bc3b3e003f90af,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29199,0,0,78313b772930e0d3c119e70c910c05a3509fc574028745b1b9c80a0f992c34f5,2024-03-26T12:55:05.010000
|
CVE-2024-29199,0,0,78313b772930e0d3c119e70c910c05a3509fc574028745b1b9c80a0f992c34f5,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-29203,0,0,72f2f625f254ebd01fb4513831430e4d16043719b3320e55604cd698eb4447d7,2024-03-26T14:15:08.747000
|
CVE-2024-29203,0,1,85853d1d6c0b7cff8ded9ca779662219e1e7d461c7c9aed96ad32295a032c6f6,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-2921,1,1,38318644b25bc4ef97821372c1adce98ea356508d02acd841cc596a2709f31c7,2024-03-26T16:15:14.173000
|
CVE-2024-2921,0,1,a7048ceb487f73059844764517da213b04f370019c5cc0c6fe2153431d1dd6cb,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000
|
CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000
|
||||||
CVE-2024-29243,0,0,80b3eab65af2d9fbeb7b6048e074697688a19de63e1138c377d0b826523dd7db,2024-03-21T15:24:35.093000
|
CVE-2024-29243,0,0,80b3eab65af2d9fbeb7b6048e074697688a19de63e1138c377d0b826523dd7db,2024-03-21T15:24:35.093000
|
||||||
CVE-2024-29244,0,0,ab4dadc4ff7b45a2c285edb922de956bae0828f007627c62339f15145e95a7b7,2024-03-21T15:24:35.093000
|
CVE-2024-29244,0,0,ab4dadc4ff7b45a2c285edb922de956bae0828f007627c62339f15145e95a7b7,2024-03-21T15:24:35.093000
|
||||||
@ -242656,7 +242674,7 @@ CVE-2024-29271,0,0,86d82853285296d2653b2954b1f865b89755729787a00c9a08bf8b4da2a10
|
|||||||
CVE-2024-29272,0,0,bb3421cdf283ecf2f8722dd79d31aa3f3d26bad518191ad6f8ea2a70c28d47bf,2024-03-22T12:45:36.130000
|
CVE-2024-29272,0,0,bb3421cdf283ecf2f8722dd79d31aa3f3d26bad518191ad6f8ea2a70c28d47bf,2024-03-22T12:45:36.130000
|
||||||
CVE-2024-29273,0,0,5734858efc895a99d71a292d9b9fd87dc375f872fc9b4f17b1a24399e248cfbf,2024-03-22T12:45:36.130000
|
CVE-2024-29273,0,0,5734858efc895a99d71a292d9b9fd87dc375f872fc9b4f17b1a24399e248cfbf,2024-03-22T12:45:36.130000
|
||||||
CVE-2024-29275,0,0,402f5150501d1ad43199a2c93810407cb4bc9ca968149bb7f55410637d08465b,2024-03-22T12:45:36.130000
|
CVE-2024-29275,0,0,402f5150501d1ad43199a2c93810407cb4bc9ca968149bb7f55410637d08465b,2024-03-22T12:45:36.130000
|
||||||
CVE-2024-2929,1,1,a7aa5058864976a1df2c9816d8af544dbdf588d539db1cea1b6c5ea697b6739f,2024-03-26T16:15:14.230000
|
CVE-2024-2929,0,1,1e2a5388b53705944df52e04f4649418a900b7d3e866b67a8f41dcdb88a45e50,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29301,0,0,154c6ea8f36ae553114269a1e880d159b7e9b09b869cc177af921f11e043c79a,2024-03-26T12:55:05.010000
|
CVE-2024-29301,0,0,154c6ea8f36ae553114269a1e880d159b7e9b09b869cc177af921f11e043c79a,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-29302,0,0,befca4baa09da55c6ccc652e95ace012df1b1e2aab7ec33ac183ae5971911acf,2024-03-26T12:55:05.010000
|
CVE-2024-29302,0,0,befca4baa09da55c6ccc652e95ace012df1b1e2aab7ec33ac183ae5971911acf,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-29303,0,0,9fc5b63681179dd34090ab25180fdf1128a0a8fe7fe2b044acdbb780ed8094f7,2024-03-26T12:55:05.010000
|
CVE-2024-29303,0,0,9fc5b63681179dd34090ab25180fdf1128a0a8fe7fe2b044acdbb780ed8094f7,2024-03-26T12:55:05.010000
|
||||||
@ -242664,7 +242682,7 @@ CVE-2024-29338,0,0,17a24f10f7d0496e7fcb2400fc6c6af48717728349b99b9f4dc4f19499bc4
|
|||||||
CVE-2024-29366,0,0,970a4db6ccd44fa8fff843a083b23c4276fdabe942805276e1033f4579523e8f,2024-03-22T19:02:10.300000
|
CVE-2024-29366,0,0,970a4db6ccd44fa8fff843a083b23c4276fdabe942805276e1033f4579523e8f,2024-03-22T19:02:10.300000
|
||||||
CVE-2024-29374,0,0,f8a146770d52182e0c10b15b21ebc5da7e22091690385e976078b28de6736be7,2024-03-21T19:47:03.943000
|
CVE-2024-29374,0,0,f8a146770d52182e0c10b15b21ebc5da7e22091690385e976078b28de6736be7,2024-03-21T19:47:03.943000
|
||||||
CVE-2024-29385,0,0,77dce7c3f8675f81eb6a00c8f1d149f72619312873eb8bb6e829225e587309f5,2024-03-22T19:02:10.300000
|
CVE-2024-29385,0,0,77dce7c3f8675f81eb6a00c8f1d149f72619312873eb8bb6e829225e587309f5,2024-03-22T19:02:10.300000
|
||||||
CVE-2024-29401,1,1,e44b613f061946753dc62d095302340b4d2aabcb2804892fb8978684fd5200f7,2024-03-26T15:15:49.620000
|
CVE-2024-29401,0,1,89656cc9e9a7fef85aec3d184bc9af149e9114d584510da9b248a092c84a80e6,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000
|
CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000
|
||||||
CVE-2024-29440,0,0,b41dbba691936eb263a6e48ee2f4c3b0c65bf928cbb922caedd1e0f5f03baacf,2024-03-26T12:55:05.010000
|
CVE-2024-29440,0,0,b41dbba691936eb263a6e48ee2f4c3b0c65bf928cbb922caedd1e0f5f03baacf,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-29442,0,0,7905121fe561461f75c739d09685b7ffc46a6e6f08464603a503f7d567bf4eab,2024-03-26T12:55:05.010000
|
CVE-2024-29442,0,0,7905121fe561461f75c739d09685b7ffc46a6e6f08464603a503f7d567bf4eab,2024-03-26T12:55:05.010000
|
||||||
@ -242675,17 +242693,19 @@ CVE-2024-29472,0,0,8914457096a81cfec257e1932986907f8b2f25a966f10c0d7629905ec24b0
|
|||||||
CVE-2024-29473,0,0,2dcbe7e94767e08f46a9353b62d8f30da500a221f5affb32fc9ef958cfff985b,2024-03-21T12:58:51.093000
|
CVE-2024-29473,0,0,2dcbe7e94767e08f46a9353b62d8f30da500a221f5affb32fc9ef958cfff985b,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-29474,0,0,cd74b93fedbacc13ab911c0f2a2b89e07d9e578953f3b262ce40503b72930e98,2024-03-21T12:58:51.093000
|
CVE-2024-29474,0,0,cd74b93fedbacc13ab911c0f2a2b89e07d9e578953f3b262ce40503b72930e98,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-29499,0,0,bc8db29a97bf5517e5213278d0d5f5ecdec4b51f00adea3262848d25f6e735bc,2024-03-22T19:02:10.300000
|
CVE-2024-29499,0,0,bc8db29a97bf5517e5213278d0d5f5ecdec4b51f00adea3262848d25f6e735bc,2024-03-22T19:02:10.300000
|
||||||
|
CVE-2024-2951,1,1,196d384afa50e4915b3f7f1abd72164195ad83bb49221af960f012f0ea91cf3f,2024-03-26T18:15:12.160000
|
||||||
CVE-2024-29515,0,0,79c9f65757e49bdb19c4dcff88d6ba2d524b1951e790ac90d5ffb4f302abcf45,2024-03-26T12:55:05.010000
|
CVE-2024-29515,0,0,79c9f65757e49bdb19c4dcff88d6ba2d524b1951e790ac90d5ffb4f302abcf45,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-29644,0,0,386d9404cd9a66783fab4191d99526a9e5bea1176409bc071a51d532c36af3ad,2024-03-26T12:55:05.010000
|
CVE-2024-29644,0,0,386d9404cd9a66783fab4191d99526a9e5bea1176409bc071a51d532c36af3ad,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-29650,0,0,3de71c7e130cece9a4956a25a7008efc5004a21e047c073aea3bd083423d5a0e,2024-03-25T16:43:06.137000
|
CVE-2024-29650,0,0,3de71c7e130cece9a4956a25a7008efc5004a21e047c073aea3bd083423d5a0e,2024-03-25T16:43:06.137000
|
||||||
CVE-2024-29666,0,0,a8926fce030310567330d9b7c126003f732556a2ce979a6a3fd232707f8bbd99,2024-03-26T12:55:05.010000
|
CVE-2024-29666,0,0,a8926fce030310567330d9b7c126003f732556a2ce979a6a3fd232707f8bbd99,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-29684,0,0,35adbae46d02598afd0a71dbdb28a4d3beabc7cfec6e5b8d12f945270a2d26af,2024-03-26T14:15:09.003000
|
CVE-2024-29684,0,1,bf20e1eee3419c30e31b5c1e15077ebe4738914779e007adc0a6cf94ae84179f,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29732,0,0,3aff958eec55f5cf06538251c792be6423021bd21573f6f2f920d098c9ad37bd,2024-03-21T12:58:51.093000
|
CVE-2024-29732,0,0,3aff958eec55f5cf06538251c792be6423021bd21573f6f2f920d098c9ad37bd,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-29808,1,1,dfdda526616dfcc103fd0c10987466fb6a625bec74146b0e5edf740cd33e2043,2024-03-26T16:15:12.323000
|
CVE-2024-29735,1,1,1640123dfaaf4d3d57b29169fabd73ad7d0d319282e875da918e047f8134410f,2024-03-26T17:15:47.380000
|
||||||
CVE-2024-29809,1,1,a5b095cb4d2640108682d7dba5740e3ef6fecff1dac5a9f242c5dab5775df1fb,2024-03-26T16:15:12.520000
|
CVE-2024-29808,0,1,1a083356e9d0f501470cdfed0d1c85987d8c8667e4684d7b2ae73ab2fb9e2d44,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29810,1,1,f7f8d74064bd2b172081cac20782131f7ef02041eb829386d2e0db35cacca59b,2024-03-26T16:15:12.707000
|
CVE-2024-29809,0,1,21a6514e4479b2af7c07059597ccbdef1cddc762bb223c6efd7d97d6a6cee8d3,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29832,1,1,5e3fb0f1b1251798bc8fb0858a74c0899ba80d10d361b9ddae87aee2ab38426b,2024-03-26T16:15:12.890000
|
CVE-2024-29810,0,1,eff91a2f0d80ceae6d9d4c914195c5a044b82fbe1cafb4a26b6b9c2e1aa693cf,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29833,1,1,fb99702e05f65e341974eb78051c31e7106de9e69f04328c281627b24dd08a80,2024-03-26T16:15:13.063000
|
CVE-2024-29832,0,1,e21971089d12a8b67bd5dc57f7dea93be0cc79e81378beb3ae2f03d4ff6e4c14,2024-03-26T17:09:53.043000
|
||||||
|
CVE-2024-29833,0,1,4c9a8c532b47162f5aea1ac06e294c5bbf9e597d7d17a1d16e86b5dc1293a53a,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29858,0,0,585719d860c91771e96e52d882eed744121f21e899f727afe6b381f4ffbb308d,2024-03-21T12:58:51.093000
|
CVE-2024-29858,0,0,585719d860c91771e96e52d882eed744121f21e899f727afe6b381f4ffbb308d,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-29859,0,0,6ebff5730a73f542ffebf0a56f74146bb69314ac3f95118519ec4b678666f245,2024-03-21T12:58:51.093000
|
CVE-2024-29859,0,0,6ebff5730a73f542ffebf0a56f74146bb69314ac3f95118519ec4b678666f245,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-29862,0,0,78f62d6320f790cb50cb5767943bbca91d7f9763b83315a1495201af3fd41026,2024-03-21T12:58:51.093000
|
CVE-2024-29862,0,0,78f62d6320f790cb50cb5767943bbca91d7f9763b83315a1495201af3fd41026,2024-03-21T12:58:51.093000
|
||||||
@ -242703,8 +242723,8 @@ CVE-2024-29877,0,0,5b6a7271e346dceec62c9141f9ae12b0e5342a31cc26366c653fe20c26c8b
|
|||||||
CVE-2024-29878,0,0,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dda8d,2024-03-21T15:24:35.093000
|
CVE-2024-29878,0,0,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dda8d,2024-03-21T15:24:35.093000
|
||||||
CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000
|
CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000
|
||||||
CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000
|
CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000
|
||||||
CVE-2024-29881,0,0,0cbeaa6b4455ceb05464c9299bb18a36979748161fb0b3f905522ec7bdc3fda0,2024-03-26T14:15:09.070000
|
CVE-2024-29881,0,1,7eaff78a6eecd508372203508f2ecab97ebc62cfd94b7af6101b5d7b6ca209b2,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29883,0,0,a13d175dd79044f267ec769a7146c8c1184a19310013628d0092737af35ee3bb,2024-03-26T14:15:09.280000
|
CVE-2024-29883,0,1,2444d321a867d6f4cdf63bf8a1bc6af3b407752f2134c1f64a1d02545242c426,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29916,0,0,dd300e18b662f862d3dd0881eace85d81be3f3aaeb79c908bcef100a80a89dd1,2024-03-21T19:47:03.943000
|
CVE-2024-29916,0,0,dd300e18b662f862d3dd0881eace85d81be3f3aaeb79c908bcef100a80a89dd1,2024-03-21T19:47:03.943000
|
||||||
CVE-2024-29943,0,0,39d573a490fc5d2b219e8af270d3feeff9aa72e4341ddd52f10b0ddfa677f78e,2024-03-22T15:34:43.663000
|
CVE-2024-29943,0,0,39d573a490fc5d2b219e8af270d3feeff9aa72e4341ddd52f10b0ddfa677f78e,2024-03-22T15:34:43.663000
|
||||||
CVE-2024-29944,0,0,4d21f9c7c1ab1ff30cce77b261f7b06b8e28526248b968d986726dab452f24fc,2024-03-25T17:15:51.670000
|
CVE-2024-29944,0,0,4d21f9c7c1ab1ff30cce77b261f7b06b8e28526248b968d986726dab452f24fc,2024-03-25T17:15:51.670000
|
||||||
@ -242717,6 +242737,6 @@ CVE-2024-30204,0,0,bf1cbd8aaa2b36eb1f7808443cd1dc94c2d123df04230a458090af1180122
|
|||||||
CVE-2024-30205,0,0,d8d475f93d08b2037de38fb56b8f07beb7b6f1c5b446fee65bfc13f5246e2c4e,2024-03-25T16:43:06.137000
|
CVE-2024-30205,0,0,d8d475f93d08b2037de38fb56b8f07beb7b6f1c5b446fee65bfc13f5246e2c4e,2024-03-25T16:43:06.137000
|
||||||
CVE-2024-30231,0,0,00dcdf5dcba695175163cca9e56ccfae3d920c15ab7bb0fd4524c1a6b2477280,2024-03-26T12:55:05.010000
|
CVE-2024-30231,0,0,00dcdf5dcba695175163cca9e56ccfae3d920c15ab7bb0fd4524c1a6b2477280,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-30232,0,0,f91ac1a16b6560e63a231b2b02f73b0e579de91231d5661b2fdb0493e2d31192,2024-03-26T12:55:05.010000
|
CVE-2024-30232,0,0,f91ac1a16b6560e63a231b2b02f73b0e579de91231d5661b2fdb0493e2d31192,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-30233,0,0,e9c13e7bc116d4ff17fc52ce9a1f07909d0fd2f48f0fbc5cd03d9165e1a6e14d,2024-03-26T13:15:45.710000
|
CVE-2024-30233,0,1,4c2695d2f3b076c7408bd91fee17c2a607f64636c8c0001f359b0796de1d2054,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-30234,0,0,d453b03d3749bec9b51bf3d51cc8d936e9b7f8658d7100bfdc2940e7bd78eda4,2024-03-26T13:15:45.927000
|
CVE-2024-30234,0,1,a6be244378f8a1646e756d1cd111fc8fb568601f74deb65508c56b004a03b137,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-30235,0,0,1751b9719711549b05b67350384a4df032baceba1f59a2611ab1f37069b1b0f2,2024-03-26T13:15:46.153000
|
CVE-2024-30235,0,1,ef6f7f84deca979173abd2d122dde5dfb4f5568a80e848e8fa95eae1319c946f,2024-03-26T17:09:53.043000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user