mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2024-03-23T13:00:38.549815+00:00
This commit is contained in:
parent
6f92cf3721
commit
afb2bf4d3c
63
CVE-2021/CVE-2021-336xx/CVE-2021-33633.json
Normal file
63
CVE-2021/CVE-2021-336xx/CVE-2021-33633.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2021-33633",
|
||||
"sourceIdentifier": "securities@openeuler.org",
|
||||
"published": "2024-03-23T12:15:07.993",
|
||||
"lastModified": "2024-03-23T12:15:07.993",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in openEuler aops-ceres on Linux allows Command Injection. This vulnerability is associated with program files ceres/function/util.Py.\n\nThis issue affects aops-ceres: from 1.3.0 through 1.4.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "securities@openeuler.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "securities@openeuler.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/src-openeuler/aops-ceres/pulls/158",
|
||||
"source": "securities@openeuler.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitee.com/src-openeuler/aops-ceres/pulls/159",
|
||||
"source": "securities@openeuler.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1159",
|
||||
"source": "securities@openeuler.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3618",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-12T15:15:09.060",
|
||||
"lastModified": "2023-11-07T04:19:09.933",
|
||||
"lastModified": "2024-03-23T11:15:43.670",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -33,7 +33,7 @@
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "53f830b8-0a3f-465b-8143-3b8a9948e749",
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -66,7 +66,7 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "53f830b8-0a3f-465b-8143-3b8a9948e749",
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
@ -146,6 +146,18 @@
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230824-0012/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214036",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214037",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214038",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-5388",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:07.537",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"lastModified": "2024-03-23T12:15:08.310",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "NSS era susceptible a un ataque de canal lateral de sincronizaci\u00f3n al realizar el descifrado RSA. Este ataque podr\u00eda permitir potencialmente que un atacante recupere los datos privados. Esta vulnerabilidad afecta a Firefox < 124, Firefox ESR < 115.9 y Thunderbird < 115.9."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
@ -16,6 +20,10 @@
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1780432",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
|
||||
"source": "security@mozilla.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0743",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-01-23T14:15:38.280",
|
||||
"lastModified": "2024-03-19T12:15:07.607",
|
||||
"lastModified": "2024-03-23T12:15:08.373",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00010.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-01/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-1936",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-04T22:15:46.733",
|
||||
"lastModified": "2024-03-05T13:41:01.900",
|
||||
"lastModified": "2024-03-23T12:15:08.453",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The encrypted subject of an email message could be incorrectly and permanently assigned to an arbitrary other email message in Thunderbird's local cache. Consequently, when replying to the contaminated email message, the user might accidentally leak the confidential subject to a third party. While this update fixes the bug and avoids future message contamination, it does not automatically repair existing contaminations. Users are advised to use the repair folder functionality, which is available from the context menu of email folders, which will erase incorrect subject assignments. This vulnerability affects Thunderbird < 115.8.1."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El asunto cifrado de un mensaje de correo electr\u00f3nico podr\u00eda asignarse de forma incorrecta y permanente a otro mensaje de correo electr\u00f3nico arbitrario en la cach\u00e9 local de Thunderbird. En consecuencia, al responder al mensaje de correo electr\u00f3nico contaminado, el usuario podr\u00eda filtrar accidentalmente el asunto confidencial a un tercero. Si bien esta actualizaci\u00f3n corrige el error y evita la contaminaci\u00f3n futura de mensajes, no repara autom\u00e1ticamente las contaminaciones existentes. Se recomienda a los usuarios que utilicen la funci\u00f3n de reparaci\u00f3n de carpetas, que est\u00e1 disponible en el men\u00fa contextual de las carpetas de correo electr\u00f3nico, que borrar\u00e1 las asignaciones de asuntos incorrectas. Esta vulnerabilidad afecta a Thunderbird < 115.8.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
@ -16,6 +20,10 @@
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1860977",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-11/",
|
||||
"source": "security@mozilla.org"
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2607",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:08.790",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"lastModified": "2024-03-23T12:15:08.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Return registers were overwritten which could have allowed an attacker to execute arbitrary code. *Note:* This issue only affected Armv7-A systems. Other operating systems are unaffected. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se sobrescribieron los registros de retorno, lo que podr\u00eda haber permitido a un atacante ejecutar c\u00f3digo arbitrario. *Nota:* Este problema solo afect\u00f3 a los sistemas Armv7-A. Otros sistemas operativos no se ven afectados. Esta vulnerabilidad afecta a Firefox < 124, Firefox ESR < 115.9 y Thunderbird < 115.9."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
@ -16,6 +20,10 @@
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1879939",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
|
||||
"source": "security@mozilla.org"
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2608",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:08.843",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"lastModified": "2024-03-23T12:15:08.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "`AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding()` and `AppendEncodedCharacters()` could have experienced integer overflows, causing underallocation of an output buffer leading to an out of bounds write. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "`AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding()` y `AppendEncodedCharacters()` podr\u00edan haber experimentado desbordamientos de enteros, lo que provoc\u00f3 una asignaci\u00f3n insuficiente de un b\u00fafer de salida, lo que provoc\u00f3 una escritura fuera de los l\u00edmites. Esta vulnerabilidad afecta a Firefox < 124, Firefox ESR < 115.9 y Thunderbird < 115.9."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
@ -16,6 +20,10 @@
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1880692",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
|
||||
"source": "security@mozilla.org"
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2610",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:08.957",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"lastModified": "2024-03-23T12:15:08.623",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Using a markup injection an attacker could have stolen nonce values. This could have been used to bypass strict content security policies. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Al utilizar una inyecci\u00f3n de marcado, un atacante podr\u00eda haber robado valores nonce. Esto podr\u00eda haberse utilizado para eludir las estrictas pol\u00edticas de seguridad de contenido. Esta vulnerabilidad afecta a Firefox < 124, Firefox ESR < 115.9 y Thunderbird < 115.9."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
@ -16,6 +20,10 @@
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871112",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
|
||||
"source": "security@mozilla.org"
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2611",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:09.007",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"lastModified": "2024-03-23T12:15:08.667",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A missing delay on when pointer lock was used could have allowed a malicious page to trick a user into granting permissions. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una demora faltante en el momento en que se us\u00f3 el bloqueo del puntero podr\u00eda haber permitido que una p\u00e1gina maliciosa enga\u00f1ara a un usuario para que otorgara permisos. Esta vulnerabilidad afecta a Firefox < 124, Firefox ESR < 115.9 y Thunderbird < 115.9."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
@ -16,6 +20,10 @@
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1876675",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
|
||||
"source": "security@mozilla.org"
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2612",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:09.063",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"lastModified": "2024-03-23T12:15:08.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "If an attacker could find a way to trigger a particular code path in `SafeRefPtr`, it could have triggered a crash or potentially be leveraged to achieve code execution. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Si un atacante pudiera encontrar una manera de activar una ruta de c\u00f3digo particular en `SafeRefPtr`, podr\u00eda haber provocado un bloqueo o potencialmente aprovecharse para lograr la ejecuci\u00f3n del c\u00f3digo. Esta vulnerabilidad afecta a Firefox < 124, Firefox ESR < 115.9 y Thunderbird < 115.9."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
@ -16,6 +20,10 @@
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1879444",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
|
||||
"source": "security@mozilla.org"
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2614",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:09.160",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"lastModified": "2024-03-23T12:15:08.757",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory safety bugs present in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Errores de seguridad de la memoria presentes en Firefox 123, Firefox ESR 115.8 y Thunderbird 115.8. Algunos de estos errores mostraron evidencia de corrupci\u00f3n de memoria y suponemos que con suficiente esfuerzo algunos de ellos podr\u00edan haberse aprovechado para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox < 124, Firefox ESR < 115.9 y Thunderbird < 115.9."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
@ -16,6 +20,10 @@
|
||||
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1685358%2C1861016%2C1880405%2C1881093",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
|
||||
"source": "security@mozilla.org"
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2616",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:09.260",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"lastModified": "2024-03-23T12:15:08.800",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "To harden ICU against exploitation, the behavior for out-of-memory conditions was changed to crash instead of attempt to continue. This vulnerability affects Firefox ESR < 115.9 and Thunderbird < 115.9."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Para proteger a la UCI contra la explotaci\u00f3n, el comportamiento de las condiciones de falta de memoria se cambi\u00f3 para que falle en lugar de intentar continuar. Esta vulnerabilidad afecta a Firefox ESR <115.9 y Thunderbird <115.9."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
@ -16,6 +20,10 @@
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846197",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
|
||||
"source": "security@mozilla.org"
|
||||
|
21
README.md
21
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-23T07:00:38.396958+00:00
|
||||
2024-03-23T13:00:38.549815+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-23T06:15:08.793000+00:00
|
||||
2024-03-23T12:15:08.800000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,20 +29,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
242486
|
||||
242487
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
|
||||
* [CVE-2024-2832](CVE-2024/CVE-2024-28xx/CVE-2024-2832.json) (`2024-03-23T06:15:08.793`)
|
||||
* [CVE-2021-33633](CVE-2021/CVE-2021-336xx/CVE-2021-33633.json) (`2024-03-23T12:15:07.993`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `11`
|
||||
|
||||
* [CVE-2023-3618](CVE-2023/CVE-2023-36xx/CVE-2023-3618.json) (`2024-03-23T11:15:43.670`)
|
||||
* [CVE-2023-5388](CVE-2023/CVE-2023-53xx/CVE-2023-5388.json) (`2024-03-23T12:15:08.310`)
|
||||
* [CVE-2024-0743](CVE-2024/CVE-2024-07xx/CVE-2024-0743.json) (`2024-03-23T12:15:08.373`)
|
||||
* [CVE-2024-1936](CVE-2024/CVE-2024-19xx/CVE-2024-1936.json) (`2024-03-23T12:15:08.453`)
|
||||
* [CVE-2024-2607](CVE-2024/CVE-2024-26xx/CVE-2024-2607.json) (`2024-03-23T12:15:08.510`)
|
||||
* [CVE-2024-2608](CVE-2024/CVE-2024-26xx/CVE-2024-2608.json) (`2024-03-23T12:15:08.567`)
|
||||
* [CVE-2024-2610](CVE-2024/CVE-2024-26xx/CVE-2024-2610.json) (`2024-03-23T12:15:08.623`)
|
||||
* [CVE-2024-2611](CVE-2024/CVE-2024-26xx/CVE-2024-2611.json) (`2024-03-23T12:15:08.667`)
|
||||
* [CVE-2024-2612](CVE-2024/CVE-2024-26xx/CVE-2024-2612.json) (`2024-03-23T12:15:08.710`)
|
||||
* [CVE-2024-2614](CVE-2024/CVE-2024-26xx/CVE-2024-2614.json) (`2024-03-23T12:15:08.757`)
|
||||
* [CVE-2024-2616](CVE-2024/CVE-2024-26xx/CVE-2024-2616.json) (`2024-03-23T12:15:08.800`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
25
_state.csv
25
_state.csv
@ -176981,6 +176981,7 @@ CVE-2021-33627,0,0,8bdeebf568d00cb54a04770023f485c4bfa89f2896b08d3fbb8719faf3b92
|
||||
CVE-2021-33629,0,0,e319aecfc02ad238ce49f5abe4d506bb741abff00a1e3b15c2a21c892a0d8967,2021-09-20T12:22:18.847000
|
||||
CVE-2021-33630,0,0,c843ad8cf406751a737c42a14131c43598f545deb9cf4265c9101e558c19f33e,2024-02-03T03:15:07.753000
|
||||
CVE-2021-33631,0,0,8ab6aa4210a1ecf2c08088a7e0801d08fcbf957a3be31ac7e5134e5c5a7f2898,2024-02-03T03:15:08.760000
|
||||
CVE-2021-33633,1,1,e71bea9c677e045338aea004d40bff42fd0fcceaaca2f5596d9528176fb00728,2024-03-23T12:15:07.993000
|
||||
CVE-2021-33634,0,0,84cdcfc3f34c5869334daa18c888e18964afaf74db604d2c0ed4b72dff3e52e4,2023-11-08T01:52:34.450000
|
||||
CVE-2021-33635,0,0,953b6e5ee4393d94db183a2807197bdb49ef24a6ab740d3f5e8c71defc8e062a,2023-11-08T15:04:19.710000
|
||||
CVE-2021-33636,0,0,48e5ff8809de77fb6d6cd2e313018925c8f45338169856d9d3fe13f39575077e,2023-11-08T14:36:12.577000
|
||||
@ -225590,7 +225591,7 @@ CVE-2023-36168,0,0,e3cab291d0ca3b70f631150f609988fc3e93b97befaec96432771b79d6647
|
||||
CVE-2023-36169,0,0,aef6db6ce571a01936d11774617f2dd798bac32e6c356805edc25a802829a8a8,2023-11-07T04:16:23.057000
|
||||
CVE-2023-3617,0,0,a21c9ed6e83196b171278b78155a65ce17084f3e2131c1ea597830e36c2a7b54,2024-03-21T02:48:38.157000
|
||||
CVE-2023-36177,0,0,4dd2fc8324746b4c1c7c6022ab61304d824722f91c0ba91f24bfa8891543bf56,2024-01-31T16:45:19.120000
|
||||
CVE-2023-3618,0,0,a29ae86f094bfe2a9ed74e85f1a863ffb18d1edb5f7ccc00416e140a5fa5ce96,2023-11-07T04:19:09.933000
|
||||
CVE-2023-3618,0,1,e7557b3aa6776036c916988dfea6b19b951164ba9cc0a5aa51513a0ed8498898,2024-03-23T11:15:43.670000
|
||||
CVE-2023-36183,0,0,0389b82774ba47c6cccd5ac623963913fd5f5cbdba4c3633c4d7ac905a17131a,2023-11-07T04:16:23.100000
|
||||
CVE-2023-36184,0,0,ef21e634a4d86d52c525017d4dd47e93175e823a700a3e18a5b6554e526b4c19,2023-11-07T04:16:24.190000
|
||||
CVE-2023-36187,0,0,3f7cf12777e4d7274172cca40f92275c64eab738bee075d72ef8b8f9e367cfe4,2023-09-07T17:05:35.237000
|
||||
@ -236244,7 +236245,7 @@ CVE-2023-5384,0,0,441f1b8a30756cc9b5f3117d86e72f400495bdf444d07abaff550854597f23
|
||||
CVE-2023-5385,0,0,9ae213cb30ffb83a1a2cc696047d7aba4caab30c852d1ef2dcb64596a9208adb,2023-11-27T20:13:07.160000
|
||||
CVE-2023-5386,0,0,bfe87044f02046ad817ff7d54d504256b17a835afbb668f0ba9ab1d54dcdd82f,2023-11-27T20:14:47.710000
|
||||
CVE-2023-5387,0,0,45867b8235da7c9a90990530159b5190e5bd4e4eb429c6ce43ac3327afc64eac,2023-11-27T20:15:21.673000
|
||||
CVE-2023-5388,0,0,26f8ca6712e59aac3dc5fff2076937ae68316fcbd5536f9f22742283255c64ca,2024-03-19T13:26:46
|
||||
CVE-2023-5388,0,1,67329ef11f3322fcd87e088be68d83f141a2facb9017797a3f0580eaa9d48fb8,2024-03-23T12:15:08.310000
|
||||
CVE-2023-5389,0,0,07d2db5823402611439109f7f34a4853364795f9958639185189e21209a9cfea,2024-02-08T15:20:04.057000
|
||||
CVE-2023-5390,0,0,7ebaee5947d3e1f1edd0aa63aeb1bb5e132bc79873105ca039e3fefbf61f0d4e,2024-02-08T17:18:46.787000
|
||||
CVE-2023-5391,0,0,e65a9210280128a68a8a49095d5446b17a62134416876921dbd7f459dcc8b6e5,2024-02-01T00:49:46.897000
|
||||
@ -238297,7 +238298,7 @@ CVE-2024-0738,0,0,ee10ed3c4f4e3e86327151617a4af196ee1f28a0a53bff1b5fb0cb6653f224
|
||||
CVE-2024-0739,0,0,10e21229d49a20dc89ab08d940d4f1089a7db28e12de2fcab4977d5ab051acb1,2024-03-21T02:51:23.707000
|
||||
CVE-2024-0741,0,0,a9fda7b42aa854b426665305c7828769c163150b209cbb19ab9d616db9041a98,2024-02-02T17:19:30.117000
|
||||
CVE-2024-0742,0,0,1ae741d10e1bed36bf34ad7f16caeaf1531efb403a5a51e45593c25df5bee474,2024-02-02T17:19:23.497000
|
||||
CVE-2024-0743,0,0,10e6de3ff74d2fe6d808f7772622f8bf9b8141c31ffaa09133123be56fedc9c1,2024-03-19T12:15:07.607000
|
||||
CVE-2024-0743,0,1,a42a5f5de5e773fa22d3e8c03fb37d9e38435e9cacfc924972494f33140f0cdb,2024-03-23T12:15:08.373000
|
||||
CVE-2024-0744,0,0,e96805dde96bfb723552d652089a0f0d2e0f936866d1fca2d8bc36dda88ad35c,2024-01-29T22:47:40.353000
|
||||
CVE-2024-0745,0,0,e95f46af45f166ba44148aad2d02421e51785e292696d491c32d77e99976a28a,2024-01-30T16:08:53.497000
|
||||
CVE-2024-0746,0,0,86e154f7304b77b0253dd3ebca2a1985a3fb1b8ae7973ed11288f18ffe31e532,2024-02-02T17:19:10.737000
|
||||
@ -239103,7 +239104,7 @@ CVE-2024-1928,0,0,7c620b7f4b1ec6939393c022b1469f24a2d6fc0dcca332e7bbe9c97be0a7c0
|
||||
CVE-2024-1931,0,0,2c035e986439878fc41e4d57f10dd1dfaa67d4c99fcd2a57828e8789ee7b279b,2024-03-07T13:52:27.110000
|
||||
CVE-2024-1932,0,0,5d8d8b3bcbb6e1458b966532c64c8c15a68eb67ca9de3e9c3d113ec944ac23a6,2024-02-28T14:06:45.783000
|
||||
CVE-2024-1935,0,0,acd55fcede8b48a7898ea42523d7c01336ae5958dd58d0fd5fb3924b804c3e4b,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1936,0,0,fbffbd1d1b86b486253248fd8ab07d78e3c2235ecdfaa76f1e2af31e9571599f,2024-03-05T13:41:01.900000
|
||||
CVE-2024-1936,0,1,7b3792457d5905a49db010db7b736af0c923e8894b5bdd1a854744f20603a17d,2024-03-23T12:15:08.453000
|
||||
CVE-2024-1938,0,0,24dc90499c61d902708c3560ef4b72bc4a3172c10dbf5b005bb9075fcee4ff4b,2024-03-07T23:15:07.177000
|
||||
CVE-2024-1939,0,0,862ed503c4cd6a96fea863f557f2290de2baf913d152cc1cb93720d0bf768f1c,2024-03-07T23:15:07.250000
|
||||
CVE-2024-1941,0,0,2deee38d49f655dc85a14e0f9cc0860e5fd72126cfed04ebe024762ac27ab897,2024-03-01T14:04:26.010000
|
||||
@ -241591,14 +241592,14 @@ CVE-2024-26064,0,0,ff144dd493cab1ed761f56b7eed61318aa93a620b7f1f749119957a2f49a9
|
||||
CVE-2024-26065,0,0,f05434d986097dd89c414a15c420cdddc61d6433e66c11de1a1a2441f62c78a5,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26067,0,0,771feae423c61b47115f901b11f3c3dcf0abf651e532228608443b53ddaf898b,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26069,0,0,816c3bf702e981a32d8f2cbc8f4ffc747fd5bb2fd9e85087b9348ecbb0d6a22b,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2607,0,0,8416e61ed4039c56f8f167bad12a64573666f50072c46c347d9371b1e5a61324,2024-03-19T13:26:46
|
||||
CVE-2024-2607,0,1,08ef90c01395431f75a59547faf64f99180d664831227674ec52bcdac4a38ee9,2024-03-23T12:15:08.510000
|
||||
CVE-2024-26073,0,0,6888cf6593fb4013d9ac96b5e0e04253a32891793ba0fc6b5d0f9bb6acf56fbf,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2608,0,0,385f2484bd620feb51a5fde0149022a647e386291085041e344a0e5965cec265,2024-03-19T13:26:46
|
||||
CVE-2024-2608,0,1,8b1e464007e3566a71d5ebf688db192505af2dffb7d870019db4a6bcb2b7b138,2024-03-23T12:15:08.567000
|
||||
CVE-2024-26080,0,0,4c7f5e68dedcd9fba242c25344b93a9a82fec0775eb26628d32eb9d1bc78f44c,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2609,0,0,cc8825c211fc81d11ba8d4a686cc4e666f184437fb79cc71e4c781293d9d0cab,2024-03-19T13:26:46
|
||||
CVE-2024-26094,0,0,85e3ce7a818102789382308d4aee284348d003fd2b7cf5cdd2a80c2099ce4bab,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26096,0,0,7149acbb034794a59086aa3fa6e989a4571021a73871d6ede0203941e15d68d8,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2610,0,0,eb1d4ad7e50c19c4645c8dd2c646141a257c505b926818bbd7845cd09110b883,2024-03-19T13:26:46
|
||||
CVE-2024-2610,0,1,7c0da515f9537407e032bb71ba2e739b6d7b00c0b91964cf8081fe0710e654a3,2024-03-23T12:15:08.623000
|
||||
CVE-2024-26101,0,0,a99024df1b18b54a773096b0beb63b24fd79a9e9974023773ae59f2a37feed95,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26102,0,0,238e693f3e2d466bc8d2c153335d74273ddf22aee27378fc2288011848995267,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26103,0,0,d8456b4083613d4d8db27a085dde20a49ef73abb0168ef69a30fce12bb31e1c6,2024-03-18T19:40:00.173000
|
||||
@ -241606,10 +241607,10 @@ CVE-2024-26104,0,0,26fa5e620c52b2c3f13956dc7ddff142e7a4604a5ec9b5dd0aa8139e69f91
|
||||
CVE-2024-26105,0,0,11537b15eb4cc2020a0de2c2950a0ccff35f84e7097158552d59dda934784eba,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26106,0,0,1bcf517c10e9d03e04f36309423fea2ee998c751ee4d56005c66807def8df1c2,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26107,0,0,08a7d4a713d69f5e9264f33bf201cb0a984991aa907bf9c03d1e9d80640879b3,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2611,0,0,39d597716843c2ea41256e1b23fa4cded226eefd5a110a1a42d84cda0c9d1815,2024-03-19T13:26:46
|
||||
CVE-2024-2611,0,1,220558833c275f5429902504bd674112d498cf8a6dda3479644471d7816fd83a,2024-03-23T12:15:08.667000
|
||||
CVE-2024-26118,0,0,7c64ac890dd2a49d6d942d5500b1240c8fe85648327d773fcda60ffa1a5badd7,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26119,0,0,d15b90520fefb7812fc1dd26c7161c951db5fa8c9a1a7a8a2878ce59a176d881,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2612,0,0,7a264412c55645db8b723f7d770eed1fd5f159750493435f0da8ec388eb0c063,2024-03-19T13:26:46
|
||||
CVE-2024-2612,0,1,821ff517a9dc7fd03289d67cfffa5a16d46907ea40834da4c532679131aa69bc,2024-03-23T12:15:08.710000
|
||||
CVE-2024-26120,0,0,1657b6d18890514d9af3eeebc8c2352500124f93d0e64bb8ac66ddfc251885ca,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26124,0,0,82c27b96a9dc28b3e1fb2de7ffef79a19fe8428577dd4db99bfdfe3e5dd7dcb3,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26125,0,0,b8e9f2510a0a2d65e00221b700c4ebf67290c396472beeb55853dce893354627,2024-03-18T19:40:00.173000
|
||||
@ -241624,7 +241625,7 @@ CVE-2024-26134,0,0,c48fec61bdbea71825089d60ba10afed6847a83574a5b8775f63985c4fd7b
|
||||
CVE-2024-26135,0,0,59fe0ab8843c555cfe91a706ee16a0503bc6707525e2af12cfc8995ef8319782,2024-02-20T21:52:55.187000
|
||||
CVE-2024-26136,0,0,bc3bbfc3e7ddd7f5422807ceb3e66f18b225baf2ed7e74657a084b480c15c1ff,2024-02-22T19:07:37.840000
|
||||
CVE-2024-26138,0,0,4d4da9f47e13e4c424c52e5eff6306f34e02033e2d2c801866f22decefe9c2c2,2024-02-22T19:07:27.197000
|
||||
CVE-2024-2614,0,0,17a4197d3ae25a1e7f6088740634e33e5e0c6071de890ec2796f08684856a0e4,2024-03-19T13:26:46
|
||||
CVE-2024-2614,0,1,e084e02c1a8813fc304e7bdd4fbcc34ad77ac8afac5c69339402cff027691953,2024-03-23T12:15:08.757000
|
||||
CVE-2024-26140,0,0,6de2d0c9ebf70d5d176c18f61310d4c12ab2f9c1ae885cf141ebe9307850ffc6,2024-02-22T19:07:37.840000
|
||||
CVE-2024-26141,0,0,9df246c55a4395e8557802daf50823ee55f3169dd101c749aaebaef21dae00c2,2024-02-29T13:49:47.277000
|
||||
CVE-2024-26142,0,0,edb6243c44774fbfc22b55927ba153d435243b85e5fd0fb08002baf86f2fdeda,2024-02-28T14:07:00.563000
|
||||
@ -241640,7 +241641,7 @@ CVE-2024-26150,0,0,8ea3c18b0fb78100fc3632066a5c3403e90a7daa780b43e6f9240c2ed9fee
|
||||
CVE-2024-26151,0,0,23d71c73b4a2821ea019a978d698b1910ca82d8c9eb2d93a0500cf52583cbf84,2024-02-23T02:42:54.547000
|
||||
CVE-2024-26152,0,0,7e68ad422883506103ec46c3174c4872da8a983d075ae50a3e01c580804f4253,2024-02-23T02:42:54.547000
|
||||
CVE-2024-26159,0,0,8db8f42d5662b161251586cebfdfad3ac7119bf59dcefc0ce4412d5330cc45ab,2024-03-12T17:46:17.273000
|
||||
CVE-2024-2616,0,0,f32289c10acf879cc140d4f8bf90ac1f01af6caffd8a046c694371fba7665709,2024-03-19T13:26:46
|
||||
CVE-2024-2616,0,1,cc9c210767f179431aa11926dd1b051451351a80de6ad5c6d6f764604ee3a351,2024-03-23T12:15:08.800000
|
||||
CVE-2024-26160,0,0,fa9ab77966a6520f6fd48a75b259529e6a68bdc5f72bc11ac282a7c57a6be71f,2024-03-12T17:46:17.273000
|
||||
CVE-2024-26161,0,0,179c500caa38708835a1de408543085e57586fd097d7453a1bf1888d48f494e3,2024-03-12T17:46:17.273000
|
||||
CVE-2024-26162,0,0,abe9736aa1712017432f5ac3cb4f9e06d55b8e6b2899e4fcc1a691ec906deb0c,2024-03-12T17:46:17.273000
|
||||
@ -242259,7 +242260,7 @@ CVE-2024-28286,0,0,0c649cd6694a1837fe5561b872f74550eafab1ff52e9c04655d5ad406a1d7
|
||||
CVE-2024-28303,0,0,1e1fe6d5ea3f2a6f114bc62ec7183db4733d3d529e4e5786c421b928ce2f2bf1,2024-03-20T13:00:16.367000
|
||||
CVE-2024-28318,0,0,4464c0d64b943a4f9205011ad1109527e8aa088cb5ff5456cd49e911c2d1f722,2024-03-15T16:26:49.320000
|
||||
CVE-2024-28319,0,0,e376890f5ff8761a0926623e9576a5238806c37f36258b3aec951592cbe60412,2024-03-15T16:26:49.320000
|
||||
CVE-2024-2832,1,1,0e9becb72ac141806aebae0c584b36593e0e952ab67d9b81cdb10ca942eb8902,2024-03-23T06:15:08.793000
|
||||
CVE-2024-2832,0,0,0e9becb72ac141806aebae0c584b36593e0e952ab67d9b81cdb10ca942eb8902,2024-03-23T06:15:08.793000
|
||||
CVE-2024-28323,0,0,50ef03c499763d9e671e8f7abe3ff1d91993b3f242ed25d0b2f15c0783d9b2e2,2024-03-14T14:21:20.217000
|
||||
CVE-2024-28338,0,0,9985a0b99abb928b9c829cb29ecce6039c07964aad6d9841c1477c6680f4f9b5,2024-03-12T17:46:17.273000
|
||||
CVE-2024-28339,0,0,06a7f15d55f22a965683bef17c82587bc073ddf9fa5edb33c38c4cd82d5f37f7,2024-03-12T17:46:17.273000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user