Auto-Update: 2024-03-23T13:00:38.549815+00:00

This commit is contained in:
cad-safe-bot 2024-03-23 13:03:27 +00:00
parent 6f92cf3721
commit afb2bf4d3c
14 changed files with 193 additions and 30 deletions

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2021-33633",
"sourceIdentifier": "securities@openeuler.org",
"published": "2024-03-23T12:15:07.993",
"lastModified": "2024-03-23T12:15:07.993",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in openEuler aops-ceres on Linux allows Command Injection. This vulnerability is associated with program files ceres/function/util.Py.\n\nThis issue affects aops-ceres: from 1.3.0 through 1.4.1.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "securities@openeuler.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "securities@openeuler.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://gitee.com/src-openeuler/aops-ceres/pulls/158",
"source": "securities@openeuler.org"
},
{
"url": "https://gitee.com/src-openeuler/aops-ceres/pulls/159",
"source": "securities@openeuler.org"
},
{
"url": "https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1159",
"source": "securities@openeuler.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3618",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-12T15:15:09.060",
"lastModified": "2023-11-07T04:19:09.933",
"lastModified": "2024-03-23T11:15:43.670",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
"source": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -66,7 +66,7 @@
]
},
{
"source": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
@ -146,6 +146,18 @@
{
"url": "https://security.netapp.com/advisory/ntap-20230824-0012/",
"source": "secalert@redhat.com"
},
{
"url": "https://support.apple.com/kb/HT214036",
"source": "secalert@redhat.com"
},
{
"url": "https://support.apple.com/kb/HT214037",
"source": "secalert@redhat.com"
},
{
"url": "https://support.apple.com/kb/HT214038",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-5388",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:07.537",
"lastModified": "2024-03-19T13:26:46.000",
"lastModified": "2024-03-23T12:15:08.310",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
},
{
"lang": "es",
"value": "NSS era susceptible a un ataque de canal lateral de sincronizaci\u00f3n al realizar el descifrado RSA. Este ataque podr\u00eda permitir potencialmente que un atacante recupere los datos privados. Esta vulnerabilidad afecta a Firefox &lt; 124, Firefox ESR &lt; 115.9 y Thunderbird &lt; 115.9."
}
],
"metrics": {},
@ -16,6 +20,10 @@
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1780432",
"source": "security@mozilla.org"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
"source": "security@mozilla.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0743",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-01-23T14:15:38.280",
"lastModified": "2024-03-19T12:15:07.607",
"lastModified": "2024-03-23T12:15:08.373",
"vulnStatus": "Modified",
"descriptions": [
{
@ -80,6 +80,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00010.html",
"source": "security@mozilla.org"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-01/",
"source": "security@mozilla.org",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-1936",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-04T22:15:46.733",
"lastModified": "2024-03-05T13:41:01.900",
"lastModified": "2024-03-23T12:15:08.453",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The encrypted subject of an email message could be incorrectly and permanently assigned to an arbitrary other email message in Thunderbird's local cache. Consequently, when replying to the contaminated email message, the user might accidentally leak the confidential subject to a third party. While this update fixes the bug and avoids future message contamination, it does not automatically repair existing contaminations. Users are advised to use the repair folder functionality, which is available from the context menu of email folders, which will erase incorrect subject assignments. This vulnerability affects Thunderbird < 115.8.1."
},
{
"lang": "es",
"value": "El asunto cifrado de un mensaje de correo electr\u00f3nico podr\u00eda asignarse de forma incorrecta y permanente a otro mensaje de correo electr\u00f3nico arbitrario en la cach\u00e9 local de Thunderbird. En consecuencia, al responder al mensaje de correo electr\u00f3nico contaminado, el usuario podr\u00eda filtrar accidentalmente el asunto confidencial a un tercero. Si bien esta actualizaci\u00f3n corrige el error y evita la contaminaci\u00f3n futura de mensajes, no repara autom\u00e1ticamente las contaminaciones existentes. Se recomienda a los usuarios que utilicen la funci\u00f3n de reparaci\u00f3n de carpetas, que est\u00e1 disponible en el men\u00fa contextual de las carpetas de correo electr\u00f3nico, que borrar\u00e1 las asignaciones de asuntos incorrectas. Esta vulnerabilidad afecta a Thunderbird &lt; 115.8.1."
}
],
"metrics": {},
@ -16,6 +20,10 @@
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1860977",
"source": "security@mozilla.org"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-11/",
"source": "security@mozilla.org"

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-2607",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:08.790",
"lastModified": "2024-03-19T13:26:46.000",
"lastModified": "2024-03-23T12:15:08.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Return registers were overwritten which could have allowed an attacker to execute arbitrary code. *Note:* This issue only affected Armv7-A systems. Other operating systems are unaffected. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
},
{
"lang": "es",
"value": "Se sobrescribieron los registros de retorno, lo que podr\u00eda haber permitido a un atacante ejecutar c\u00f3digo arbitrario. *Nota:* Este problema solo afect\u00f3 a los sistemas Armv7-A. Otros sistemas operativos no se ven afectados. Esta vulnerabilidad afecta a Firefox &lt; 124, Firefox ESR &lt; 115.9 y Thunderbird &lt; 115.9."
}
],
"metrics": {},
@ -16,6 +20,10 @@
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1879939",
"source": "security@mozilla.org"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
"source": "security@mozilla.org"

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-2608",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:08.843",
"lastModified": "2024-03-19T13:26:46.000",
"lastModified": "2024-03-23T12:15:08.567",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "`AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding()` and `AppendEncodedCharacters()` could have experienced integer overflows, causing underallocation of an output buffer leading to an out of bounds write. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
},
{
"lang": "es",
"value": "`AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding()` y `AppendEncodedCharacters()` podr\u00edan haber experimentado desbordamientos de enteros, lo que provoc\u00f3 una asignaci\u00f3n insuficiente de un b\u00fafer de salida, lo que provoc\u00f3 una escritura fuera de los l\u00edmites. Esta vulnerabilidad afecta a Firefox &lt; 124, Firefox ESR &lt; 115.9 y Thunderbird &lt; 115.9."
}
],
"metrics": {},
@ -16,6 +20,10 @@
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1880692",
"source": "security@mozilla.org"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
"source": "security@mozilla.org"

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-2610",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:08.957",
"lastModified": "2024-03-19T13:26:46.000",
"lastModified": "2024-03-23T12:15:08.623",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Using a markup injection an attacker could have stolen nonce values. This could have been used to bypass strict content security policies. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
},
{
"lang": "es",
"value": "Al utilizar una inyecci\u00f3n de marcado, un atacante podr\u00eda haber robado valores nonce. Esto podr\u00eda haberse utilizado para eludir las estrictas pol\u00edticas de seguridad de contenido. Esta vulnerabilidad afecta a Firefox &lt; 124, Firefox ESR &lt; 115.9 y Thunderbird &lt; 115.9."
}
],
"metrics": {},
@ -16,6 +20,10 @@
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871112",
"source": "security@mozilla.org"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
"source": "security@mozilla.org"

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-2611",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:09.007",
"lastModified": "2024-03-19T13:26:46.000",
"lastModified": "2024-03-23T12:15:08.667",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A missing delay on when pointer lock was used could have allowed a malicious page to trick a user into granting permissions. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
},
{
"lang": "es",
"value": "Una demora faltante en el momento en que se us\u00f3 el bloqueo del puntero podr\u00eda haber permitido que una p\u00e1gina maliciosa enga\u00f1ara a un usuario para que otorgara permisos. Esta vulnerabilidad afecta a Firefox &lt; 124, Firefox ESR &lt; 115.9 y Thunderbird &lt; 115.9."
}
],
"metrics": {},
@ -16,6 +20,10 @@
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1876675",
"source": "security@mozilla.org"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
"source": "security@mozilla.org"

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-2612",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:09.063",
"lastModified": "2024-03-19T13:26:46.000",
"lastModified": "2024-03-23T12:15:08.710",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "If an attacker could find a way to trigger a particular code path in `SafeRefPtr`, it could have triggered a crash or potentially be leveraged to achieve code execution. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
},
{
"lang": "es",
"value": "Si un atacante pudiera encontrar una manera de activar una ruta de c\u00f3digo particular en `SafeRefPtr`, podr\u00eda haber provocado un bloqueo o potencialmente aprovecharse para lograr la ejecuci\u00f3n del c\u00f3digo. Esta vulnerabilidad afecta a Firefox &lt; 124, Firefox ESR &lt; 115.9 y Thunderbird &lt; 115.9."
}
],
"metrics": {},
@ -16,6 +20,10 @@
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1879444",
"source": "security@mozilla.org"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
"source": "security@mozilla.org"

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-2614",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:09.160",
"lastModified": "2024-03-19T13:26:46.000",
"lastModified": "2024-03-23T12:15:08.757",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Memory safety bugs present in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
},
{
"lang": "es",
"value": "Errores de seguridad de la memoria presentes en Firefox 123, Firefox ESR 115.8 y Thunderbird 115.8. Algunos de estos errores mostraron evidencia de corrupci\u00f3n de memoria y suponemos que con suficiente esfuerzo algunos de ellos podr\u00edan haberse aprovechado para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox &lt; 124, Firefox ESR &lt; 115.9 y Thunderbird &lt; 115.9."
}
],
"metrics": {},
@ -16,6 +20,10 @@
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1685358%2C1861016%2C1880405%2C1881093",
"source": "security@mozilla.org"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
"source": "security@mozilla.org"

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-2616",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:09.260",
"lastModified": "2024-03-19T13:26:46.000",
"lastModified": "2024-03-23T12:15:08.800",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "To harden ICU against exploitation, the behavior for out-of-memory conditions was changed to crash instead of attempt to continue. This vulnerability affects Firefox ESR < 115.9 and Thunderbird < 115.9."
},
{
"lang": "es",
"value": "Para proteger a la UCI contra la explotaci\u00f3n, el comportamiento de las condiciones de falta de memoria se cambi\u00f3 para que falle en lugar de intentar continuar. Esta vulnerabilidad afecta a Firefox ESR &lt;115.9 y Thunderbird &lt;115.9."
}
],
"metrics": {},
@ -16,6 +20,10 @@
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846197",
"source": "security@mozilla.org"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
"source": "security@mozilla.org"

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-23T07:00:38.396958+00:00
2024-03-23T13:00:38.549815+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-23T06:15:08.793000+00:00
2024-03-23T12:15:08.800000+00:00
```
### Last Data Feed Release
@ -29,20 +29,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
242486
242487
```
### CVEs added in the last Commit
Recently added CVEs: `1`
* [CVE-2024-2832](CVE-2024/CVE-2024-28xx/CVE-2024-2832.json) (`2024-03-23T06:15:08.793`)
* [CVE-2021-33633](CVE-2021/CVE-2021-336xx/CVE-2021-33633.json) (`2024-03-23T12:15:07.993`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `11`
* [CVE-2023-3618](CVE-2023/CVE-2023-36xx/CVE-2023-3618.json) (`2024-03-23T11:15:43.670`)
* [CVE-2023-5388](CVE-2023/CVE-2023-53xx/CVE-2023-5388.json) (`2024-03-23T12:15:08.310`)
* [CVE-2024-0743](CVE-2024/CVE-2024-07xx/CVE-2024-0743.json) (`2024-03-23T12:15:08.373`)
* [CVE-2024-1936](CVE-2024/CVE-2024-19xx/CVE-2024-1936.json) (`2024-03-23T12:15:08.453`)
* [CVE-2024-2607](CVE-2024/CVE-2024-26xx/CVE-2024-2607.json) (`2024-03-23T12:15:08.510`)
* [CVE-2024-2608](CVE-2024/CVE-2024-26xx/CVE-2024-2608.json) (`2024-03-23T12:15:08.567`)
* [CVE-2024-2610](CVE-2024/CVE-2024-26xx/CVE-2024-2610.json) (`2024-03-23T12:15:08.623`)
* [CVE-2024-2611](CVE-2024/CVE-2024-26xx/CVE-2024-2611.json) (`2024-03-23T12:15:08.667`)
* [CVE-2024-2612](CVE-2024/CVE-2024-26xx/CVE-2024-2612.json) (`2024-03-23T12:15:08.710`)
* [CVE-2024-2614](CVE-2024/CVE-2024-26xx/CVE-2024-2614.json) (`2024-03-23T12:15:08.757`)
* [CVE-2024-2616](CVE-2024/CVE-2024-26xx/CVE-2024-2616.json) (`2024-03-23T12:15:08.800`)
## Download and Usage

View File

@ -176981,6 +176981,7 @@ CVE-2021-33627,0,0,8bdeebf568d00cb54a04770023f485c4bfa89f2896b08d3fbb8719faf3b92
CVE-2021-33629,0,0,e319aecfc02ad238ce49f5abe4d506bb741abff00a1e3b15c2a21c892a0d8967,2021-09-20T12:22:18.847000
CVE-2021-33630,0,0,c843ad8cf406751a737c42a14131c43598f545deb9cf4265c9101e558c19f33e,2024-02-03T03:15:07.753000
CVE-2021-33631,0,0,8ab6aa4210a1ecf2c08088a7e0801d08fcbf957a3be31ac7e5134e5c5a7f2898,2024-02-03T03:15:08.760000
CVE-2021-33633,1,1,e71bea9c677e045338aea004d40bff42fd0fcceaaca2f5596d9528176fb00728,2024-03-23T12:15:07.993000
CVE-2021-33634,0,0,84cdcfc3f34c5869334daa18c888e18964afaf74db604d2c0ed4b72dff3e52e4,2023-11-08T01:52:34.450000
CVE-2021-33635,0,0,953b6e5ee4393d94db183a2807197bdb49ef24a6ab740d3f5e8c71defc8e062a,2023-11-08T15:04:19.710000
CVE-2021-33636,0,0,48e5ff8809de77fb6d6cd2e313018925c8f45338169856d9d3fe13f39575077e,2023-11-08T14:36:12.577000
@ -225590,7 +225591,7 @@ CVE-2023-36168,0,0,e3cab291d0ca3b70f631150f609988fc3e93b97befaec96432771b79d6647
CVE-2023-36169,0,0,aef6db6ce571a01936d11774617f2dd798bac32e6c356805edc25a802829a8a8,2023-11-07T04:16:23.057000
CVE-2023-3617,0,0,a21c9ed6e83196b171278b78155a65ce17084f3e2131c1ea597830e36c2a7b54,2024-03-21T02:48:38.157000
CVE-2023-36177,0,0,4dd2fc8324746b4c1c7c6022ab61304d824722f91c0ba91f24bfa8891543bf56,2024-01-31T16:45:19.120000
CVE-2023-3618,0,0,a29ae86f094bfe2a9ed74e85f1a863ffb18d1edb5f7ccc00416e140a5fa5ce96,2023-11-07T04:19:09.933000
CVE-2023-3618,0,1,e7557b3aa6776036c916988dfea6b19b951164ba9cc0a5aa51513a0ed8498898,2024-03-23T11:15:43.670000
CVE-2023-36183,0,0,0389b82774ba47c6cccd5ac623963913fd5f5cbdba4c3633c4d7ac905a17131a,2023-11-07T04:16:23.100000
CVE-2023-36184,0,0,ef21e634a4d86d52c525017d4dd47e93175e823a700a3e18a5b6554e526b4c19,2023-11-07T04:16:24.190000
CVE-2023-36187,0,0,3f7cf12777e4d7274172cca40f92275c64eab738bee075d72ef8b8f9e367cfe4,2023-09-07T17:05:35.237000
@ -236244,7 +236245,7 @@ CVE-2023-5384,0,0,441f1b8a30756cc9b5f3117d86e72f400495bdf444d07abaff550854597f23
CVE-2023-5385,0,0,9ae213cb30ffb83a1a2cc696047d7aba4caab30c852d1ef2dcb64596a9208adb,2023-11-27T20:13:07.160000
CVE-2023-5386,0,0,bfe87044f02046ad817ff7d54d504256b17a835afbb668f0ba9ab1d54dcdd82f,2023-11-27T20:14:47.710000
CVE-2023-5387,0,0,45867b8235da7c9a90990530159b5190e5bd4e4eb429c6ce43ac3327afc64eac,2023-11-27T20:15:21.673000
CVE-2023-5388,0,0,26f8ca6712e59aac3dc5fff2076937ae68316fcbd5536f9f22742283255c64ca,2024-03-19T13:26:46
CVE-2023-5388,0,1,67329ef11f3322fcd87e088be68d83f141a2facb9017797a3f0580eaa9d48fb8,2024-03-23T12:15:08.310000
CVE-2023-5389,0,0,07d2db5823402611439109f7f34a4853364795f9958639185189e21209a9cfea,2024-02-08T15:20:04.057000
CVE-2023-5390,0,0,7ebaee5947d3e1f1edd0aa63aeb1bb5e132bc79873105ca039e3fefbf61f0d4e,2024-02-08T17:18:46.787000
CVE-2023-5391,0,0,e65a9210280128a68a8a49095d5446b17a62134416876921dbd7f459dcc8b6e5,2024-02-01T00:49:46.897000
@ -238297,7 +238298,7 @@ CVE-2024-0738,0,0,ee10ed3c4f4e3e86327151617a4af196ee1f28a0a53bff1b5fb0cb6653f224
CVE-2024-0739,0,0,10e21229d49a20dc89ab08d940d4f1089a7db28e12de2fcab4977d5ab051acb1,2024-03-21T02:51:23.707000
CVE-2024-0741,0,0,a9fda7b42aa854b426665305c7828769c163150b209cbb19ab9d616db9041a98,2024-02-02T17:19:30.117000
CVE-2024-0742,0,0,1ae741d10e1bed36bf34ad7f16caeaf1531efb403a5a51e45593c25df5bee474,2024-02-02T17:19:23.497000
CVE-2024-0743,0,0,10e6de3ff74d2fe6d808f7772622f8bf9b8141c31ffaa09133123be56fedc9c1,2024-03-19T12:15:07.607000
CVE-2024-0743,0,1,a42a5f5de5e773fa22d3e8c03fb37d9e38435e9cacfc924972494f33140f0cdb,2024-03-23T12:15:08.373000
CVE-2024-0744,0,0,e96805dde96bfb723552d652089a0f0d2e0f936866d1fca2d8bc36dda88ad35c,2024-01-29T22:47:40.353000
CVE-2024-0745,0,0,e95f46af45f166ba44148aad2d02421e51785e292696d491c32d77e99976a28a,2024-01-30T16:08:53.497000
CVE-2024-0746,0,0,86e154f7304b77b0253dd3ebca2a1985a3fb1b8ae7973ed11288f18ffe31e532,2024-02-02T17:19:10.737000
@ -239103,7 +239104,7 @@ CVE-2024-1928,0,0,7c620b7f4b1ec6939393c022b1469f24a2d6fc0dcca332e7bbe9c97be0a7c0
CVE-2024-1931,0,0,2c035e986439878fc41e4d57f10dd1dfaa67d4c99fcd2a57828e8789ee7b279b,2024-03-07T13:52:27.110000
CVE-2024-1932,0,0,5d8d8b3bcbb6e1458b966532c64c8c15a68eb67ca9de3e9c3d113ec944ac23a6,2024-02-28T14:06:45.783000
CVE-2024-1935,0,0,acd55fcede8b48a7898ea42523d7c01336ae5958dd58d0fd5fb3924b804c3e4b,2024-03-13T18:15:58.530000
CVE-2024-1936,0,0,fbffbd1d1b86b486253248fd8ab07d78e3c2235ecdfaa76f1e2af31e9571599f,2024-03-05T13:41:01.900000
CVE-2024-1936,0,1,7b3792457d5905a49db010db7b736af0c923e8894b5bdd1a854744f20603a17d,2024-03-23T12:15:08.453000
CVE-2024-1938,0,0,24dc90499c61d902708c3560ef4b72bc4a3172c10dbf5b005bb9075fcee4ff4b,2024-03-07T23:15:07.177000
CVE-2024-1939,0,0,862ed503c4cd6a96fea863f557f2290de2baf913d152cc1cb93720d0bf768f1c,2024-03-07T23:15:07.250000
CVE-2024-1941,0,0,2deee38d49f655dc85a14e0f9cc0860e5fd72126cfed04ebe024762ac27ab897,2024-03-01T14:04:26.010000
@ -241591,14 +241592,14 @@ CVE-2024-26064,0,0,ff144dd493cab1ed761f56b7eed61318aa93a620b7f1f749119957a2f49a9
CVE-2024-26065,0,0,f05434d986097dd89c414a15c420cdddc61d6433e66c11de1a1a2441f62c78a5,2024-03-18T19:40:00.173000
CVE-2024-26067,0,0,771feae423c61b47115f901b11f3c3dcf0abf651e532228608443b53ddaf898b,2024-03-18T19:40:00.173000
CVE-2024-26069,0,0,816c3bf702e981a32d8f2cbc8f4ffc747fd5bb2fd9e85087b9348ecbb0d6a22b,2024-03-18T19:40:00.173000
CVE-2024-2607,0,0,8416e61ed4039c56f8f167bad12a64573666f50072c46c347d9371b1e5a61324,2024-03-19T13:26:46
CVE-2024-2607,0,1,08ef90c01395431f75a59547faf64f99180d664831227674ec52bcdac4a38ee9,2024-03-23T12:15:08.510000
CVE-2024-26073,0,0,6888cf6593fb4013d9ac96b5e0e04253a32891793ba0fc6b5d0f9bb6acf56fbf,2024-03-18T19:40:00.173000
CVE-2024-2608,0,0,385f2484bd620feb51a5fde0149022a647e386291085041e344a0e5965cec265,2024-03-19T13:26:46
CVE-2024-2608,0,1,8b1e464007e3566a71d5ebf688db192505af2dffb7d870019db4a6bcb2b7b138,2024-03-23T12:15:08.567000
CVE-2024-26080,0,0,4c7f5e68dedcd9fba242c25344b93a9a82fec0775eb26628d32eb9d1bc78f44c,2024-03-18T19:40:00.173000
CVE-2024-2609,0,0,cc8825c211fc81d11ba8d4a686cc4e666f184437fb79cc71e4c781293d9d0cab,2024-03-19T13:26:46
CVE-2024-26094,0,0,85e3ce7a818102789382308d4aee284348d003fd2b7cf5cdd2a80c2099ce4bab,2024-03-18T19:40:00.173000
CVE-2024-26096,0,0,7149acbb034794a59086aa3fa6e989a4571021a73871d6ede0203941e15d68d8,2024-03-18T19:40:00.173000
CVE-2024-2610,0,0,eb1d4ad7e50c19c4645c8dd2c646141a257c505b926818bbd7845cd09110b883,2024-03-19T13:26:46
CVE-2024-2610,0,1,7c0da515f9537407e032bb71ba2e739b6d7b00c0b91964cf8081fe0710e654a3,2024-03-23T12:15:08.623000
CVE-2024-26101,0,0,a99024df1b18b54a773096b0beb63b24fd79a9e9974023773ae59f2a37feed95,2024-03-18T19:40:00.173000
CVE-2024-26102,0,0,238e693f3e2d466bc8d2c153335d74273ddf22aee27378fc2288011848995267,2024-03-18T19:40:00.173000
CVE-2024-26103,0,0,d8456b4083613d4d8db27a085dde20a49ef73abb0168ef69a30fce12bb31e1c6,2024-03-18T19:40:00.173000
@ -241606,10 +241607,10 @@ CVE-2024-26104,0,0,26fa5e620c52b2c3f13956dc7ddff142e7a4604a5ec9b5dd0aa8139e69f91
CVE-2024-26105,0,0,11537b15eb4cc2020a0de2c2950a0ccff35f84e7097158552d59dda934784eba,2024-03-18T19:40:00.173000
CVE-2024-26106,0,0,1bcf517c10e9d03e04f36309423fea2ee998c751ee4d56005c66807def8df1c2,2024-03-18T19:40:00.173000
CVE-2024-26107,0,0,08a7d4a713d69f5e9264f33bf201cb0a984991aa907bf9c03d1e9d80640879b3,2024-03-18T19:40:00.173000
CVE-2024-2611,0,0,39d597716843c2ea41256e1b23fa4cded226eefd5a110a1a42d84cda0c9d1815,2024-03-19T13:26:46
CVE-2024-2611,0,1,220558833c275f5429902504bd674112d498cf8a6dda3479644471d7816fd83a,2024-03-23T12:15:08.667000
CVE-2024-26118,0,0,7c64ac890dd2a49d6d942d5500b1240c8fe85648327d773fcda60ffa1a5badd7,2024-03-18T19:40:00.173000
CVE-2024-26119,0,0,d15b90520fefb7812fc1dd26c7161c951db5fa8c9a1a7a8a2878ce59a176d881,2024-03-18T19:40:00.173000
CVE-2024-2612,0,0,7a264412c55645db8b723f7d770eed1fd5f159750493435f0da8ec388eb0c063,2024-03-19T13:26:46
CVE-2024-2612,0,1,821ff517a9dc7fd03289d67cfffa5a16d46907ea40834da4c532679131aa69bc,2024-03-23T12:15:08.710000
CVE-2024-26120,0,0,1657b6d18890514d9af3eeebc8c2352500124f93d0e64bb8ac66ddfc251885ca,2024-03-18T19:40:00.173000
CVE-2024-26124,0,0,82c27b96a9dc28b3e1fb2de7ffef79a19fe8428577dd4db99bfdfe3e5dd7dcb3,2024-03-18T19:40:00.173000
CVE-2024-26125,0,0,b8e9f2510a0a2d65e00221b700c4ebf67290c396472beeb55853dce893354627,2024-03-18T19:40:00.173000
@ -241624,7 +241625,7 @@ CVE-2024-26134,0,0,c48fec61bdbea71825089d60ba10afed6847a83574a5b8775f63985c4fd7b
CVE-2024-26135,0,0,59fe0ab8843c555cfe91a706ee16a0503bc6707525e2af12cfc8995ef8319782,2024-02-20T21:52:55.187000
CVE-2024-26136,0,0,bc3bbfc3e7ddd7f5422807ceb3e66f18b225baf2ed7e74657a084b480c15c1ff,2024-02-22T19:07:37.840000
CVE-2024-26138,0,0,4d4da9f47e13e4c424c52e5eff6306f34e02033e2d2c801866f22decefe9c2c2,2024-02-22T19:07:27.197000
CVE-2024-2614,0,0,17a4197d3ae25a1e7f6088740634e33e5e0c6071de890ec2796f08684856a0e4,2024-03-19T13:26:46
CVE-2024-2614,0,1,e084e02c1a8813fc304e7bdd4fbcc34ad77ac8afac5c69339402cff027691953,2024-03-23T12:15:08.757000
CVE-2024-26140,0,0,6de2d0c9ebf70d5d176c18f61310d4c12ab2f9c1ae885cf141ebe9307850ffc6,2024-02-22T19:07:37.840000
CVE-2024-26141,0,0,9df246c55a4395e8557802daf50823ee55f3169dd101c749aaebaef21dae00c2,2024-02-29T13:49:47.277000
CVE-2024-26142,0,0,edb6243c44774fbfc22b55927ba153d435243b85e5fd0fb08002baf86f2fdeda,2024-02-28T14:07:00.563000
@ -241640,7 +241641,7 @@ CVE-2024-26150,0,0,8ea3c18b0fb78100fc3632066a5c3403e90a7daa780b43e6f9240c2ed9fee
CVE-2024-26151,0,0,23d71c73b4a2821ea019a978d698b1910ca82d8c9eb2d93a0500cf52583cbf84,2024-02-23T02:42:54.547000
CVE-2024-26152,0,0,7e68ad422883506103ec46c3174c4872da8a983d075ae50a3e01c580804f4253,2024-02-23T02:42:54.547000
CVE-2024-26159,0,0,8db8f42d5662b161251586cebfdfad3ac7119bf59dcefc0ce4412d5330cc45ab,2024-03-12T17:46:17.273000
CVE-2024-2616,0,0,f32289c10acf879cc140d4f8bf90ac1f01af6caffd8a046c694371fba7665709,2024-03-19T13:26:46
CVE-2024-2616,0,1,cc9c210767f179431aa11926dd1b051451351a80de6ad5c6d6f764604ee3a351,2024-03-23T12:15:08.800000
CVE-2024-26160,0,0,fa9ab77966a6520f6fd48a75b259529e6a68bdc5f72bc11ac282a7c57a6be71f,2024-03-12T17:46:17.273000
CVE-2024-26161,0,0,179c500caa38708835a1de408543085e57586fd097d7453a1bf1888d48f494e3,2024-03-12T17:46:17.273000
CVE-2024-26162,0,0,abe9736aa1712017432f5ac3cb4f9e06d55b8e6b2899e4fcc1a691ec906deb0c,2024-03-12T17:46:17.273000
@ -242259,7 +242260,7 @@ CVE-2024-28286,0,0,0c649cd6694a1837fe5561b872f74550eafab1ff52e9c04655d5ad406a1d7
CVE-2024-28303,0,0,1e1fe6d5ea3f2a6f114bc62ec7183db4733d3d529e4e5786c421b928ce2f2bf1,2024-03-20T13:00:16.367000
CVE-2024-28318,0,0,4464c0d64b943a4f9205011ad1109527e8aa088cb5ff5456cd49e911c2d1f722,2024-03-15T16:26:49.320000
CVE-2024-28319,0,0,e376890f5ff8761a0926623e9576a5238806c37f36258b3aec951592cbe60412,2024-03-15T16:26:49.320000
CVE-2024-2832,1,1,0e9becb72ac141806aebae0c584b36593e0e952ab67d9b81cdb10ca942eb8902,2024-03-23T06:15:08.793000
CVE-2024-2832,0,0,0e9becb72ac141806aebae0c584b36593e0e952ab67d9b81cdb10ca942eb8902,2024-03-23T06:15:08.793000
CVE-2024-28323,0,0,50ef03c499763d9e671e8f7abe3ff1d91993b3f242ed25d0b2f15c0783d9b2e2,2024-03-14T14:21:20.217000
CVE-2024-28338,0,0,9985a0b99abb928b9c829cb29ecce6039c07964aad6d9841c1477c6680f4f9b5,2024-03-12T17:46:17.273000
CVE-2024-28339,0,0,06a7f15d55f22a965683bef17c82587bc073ddf9fa5edb33c38c4cd82d5f37f7,2024-03-12T17:46:17.273000

Can't render this file because it is too large.