Auto-Update: 2024-05-25T16:00:38.507125+00:00

This commit is contained in:
cad-safe-bot 2024-05-25 16:03:30 +00:00
parent 5f9260c5b4
commit b0f2d07fd3
24 changed files with 355 additions and 461 deletions

View File

@ -2,23 +2,14 @@
"id": "CVE-2021-47411",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T15:15:26.617",
"lastModified": "2024-05-21T16:54:26.047",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-25T14:15:50.770",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: allow conditional reschedule for intensive iterators\n\nIf we have a lot of threads and rings, the tctx list can get quite big.\nThis is especially true if we keep creating new threads and rings.\nLikewise for the provided buffers list. Be nice and insert a conditional\nreschedule point while iterating the nodes for deletion."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/648f59a06b0e1fec7a4158cdee9acd362e493ce1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8bab4c09f24ec8d4a7a78ab343620f89d3a24804",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
"references": []
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48655",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-28T13:15:07.623",
"lastModified": "2024-04-30T15:25:10.210",
"vulnStatus": "Analyzed",
"lastModified": "2024-05-25T15:15:08.133",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -83,6 +83,10 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7184491fc515f391afba23d0e9b690caaea72daf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8e65edf0d37698f7a6cb174608d3ec7976baf49e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
@ -96,6 +100,10 @@
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f2277d9e2a0d092c13bae7ee82d75432bb8b5108",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52434",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-20T18:15:50.790",
"lastModified": "2024-03-15T14:21:29.950",
"vulnStatus": "Analyzed",
"lastModified": "2024-05-25T15:15:08.477",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -111,6 +111,10 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6726429c18c62dbf5e96ebbd522f262e016553fb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/890bc4fac3c0973a49cac35f634579bebba7fe48",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52585",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-06T07:15:07.290",
"lastModified": "2024-03-06T15:18:08.093",
"lastModified": "2024-05-25T15:15:08.607",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -16,13 +16,33 @@
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0eb296233f86750102aa43b97879b8d8311f249a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/195a6289282e039024ad30ba66e6f94a4d0fbe49",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/467139546f3fb93913de064461b1a43a212d7626",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7e6d6f27522bcd037856234b720ff607b9c4a09b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/92cb363d16ac1e41c9764cdb513d0e89a6ff4915",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b8d55a90fd55b767c25687747e2b24abd1ef8680",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c364e7a34c85c2154fb2e47561965d5b5a0b69b1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26583",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-21T15:15:09.373",
"lastModified": "2024-03-15T13:05:03.220",
"vulnStatus": "Analyzed",
"lastModified": "2024-05-25T15:15:08.700",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -111,6 +111,10 @@
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f17d21ea73918ace8afb9c2d8e734dbf71c2c9d7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26584",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-21T15:15:09.420",
"lastModified": "2024-04-30T19:35:07.273",
"vulnStatus": "Analyzed",
"lastModified": "2024-05-25T15:15:08.847",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -91,6 +91,10 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3ade391adc584f17b5570fd205de3ad029090368",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26952",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:11.350",
"lastModified": "2024-05-23T19:14:05.133",
"vulnStatus": "Analyzed",
"lastModified": "2024-05-25T15:15:08.950",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -90,6 +90,10 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/39bdc4197acf2ed13269167ccf093ee28cfa2a4e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c6cd2e8d2d9aa7ee35b1fa6a668e32a22a9753da",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",

View File

@ -2,47 +2,14 @@
"id": "CVE-2024-27420",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-17T12:15:13.993",
"lastModified": "2024-05-17T18:35:35.070",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-25T14:15:51.757",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_link_fails_count\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/07bbccd1adb56b39eef982b8960d59e3c005c6a1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/0b8eb369c182814d817b9449bc9e86bfae4310f9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/97a4d8b9f67cc7efe9a0c137e12f6d9e40795bf1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/bc76645ebdd01be9b9994dac39685a3d0f6f7985",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c558e54f7712b086fbcb611723272a0a4b0d451c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cfe0f73fb38a01bce86fe15ef5f750f850f7d3fe",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cfedde3058bf976f2f292c0a236edd43afcdab57",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/db364859ce68fb3a52d42cd87a54da3dc42dc1c8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
"references": []
}

View File

@ -2,47 +2,14 @@
"id": "CVE-2024-27421",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-17T12:15:14.217",
"lastModified": "2024-05-17T18:35:35.070",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-25T14:15:51.860",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_routing_control\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/4c02b9ccbb11862ee39850b2b285664cd579b039",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/859175d4bc11af829e2fdd261a7effdaba9b5d8f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b5dffcb8f71bdd02a4e5799985b51b12f4eeaf76",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b7d33e083f9d5d39445c0a91e7ad4f3e2c47fcb5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c13fbb5902bce848759385986d4833f5b90782c1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c4309e5f8e80584715c814e1d012dbc3eee5a500",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d732b83251322ecd3b503e03442247745d6052ce",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f9c4d42464173b826190fae2283ed1a4bbae0c8b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
"references": []
}

View File

@ -2,47 +2,14 @@
"id": "CVE-2024-27422",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-17T12:15:14.437",
"lastModified": "2024-05-17T18:35:35.070",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-25T14:15:51.940",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_no_activity_timeout\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/01d4e3afe257768cd2a45f15a0e57bacf932b140",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/2309b369fae2d9cdc3c945cd3eaec84eb1958ca3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/498f1d6da11ed6d736d655a2db14ee2d9569eecb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/4eacb242e22e31385a50a393681d0fe4b55ed1e9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/6f254abae02abd4a0aca062c1b3812d7e2d8ea94",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/73426c32e259c767d40613b956d5b80d0c28a9a9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cbba77abb4a553c1f5afac1ba2a0861aa1f13549",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f99b494b40431f0ca416859f2345746199398e2b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
"references": []
}

View File

@ -2,47 +2,14 @@
"id": "CVE-2024-27423",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-17T12:15:14.670",
"lastModified": "2024-05-17T18:35:35.070",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-25T14:15:52.053",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_requested_window_size\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0d43a58900e5a2bfcc9de47e16c6c501c0bef853",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/46803b776d869b0c36041828a83c4f7da2dfa03b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/489e05c614dbeb1a1148959f02bdb788891819e6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/4f2efa17c3ec5e4be0567b47439b9713c0dc6550",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/652b0b35819610a42b8a90d21acb12f69943b397",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/89aa78a34340e9dbc3248095f44d81d0e1c23193",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a2e706841488f474c06e9b33f71afc947fb3bf56",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/db006d7edbf0b4800390ece3727a82f4ae764043",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
"references": []
}

View File

@ -2,47 +2,14 @@
"id": "CVE-2024-27424",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-17T12:15:14.910",
"lastModified": "2024-05-17T18:35:35.070",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-25T14:15:52.140",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_busy_delay\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0a30016e892bccabea30af218782c4b6ce0970af",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/1f60795dcafc97c45984240d442cdc151f825977",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/43547d8699439a67b78d6bb39015113f7aa360fd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/4ccad39009e7bd8a03d60a97c87b0327ae812880",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5ac337138272d26d6d3d4f71bc5b1a87adf8b24d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7782e5e7047cae6b9255ee727c99fc73d77cf773",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/85f34d352f4b79afd63dd13634b23dafe6b570f9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f3315a6edaec12b461031eab8c98c78111a41f95",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
"references": []
}

View File

@ -2,47 +2,14 @@
"id": "CVE-2024-27425",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-17T12:15:15.137",
"lastModified": "2024-05-17T18:35:35.070",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-25T14:15:52.253",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_acknowledge_delay\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/33081e0f34899d5325e7c45683dd8dc9cb18b583",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/34c84e0036a60e7e50ae50b42ed194d8daef8cc9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5deaef2bf56456c71b841e0dfde1bee2fd88c4eb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/6133a71c75dacea12fcc85838b4455c2055b0f14",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7d56ffc51ebd2777ded8dca50d631ee19d97db5c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/80578681ea274e0a6512bb7515718c206a7b74cf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/806f462ba9029d41aadf8ec93f2f99c5305deada",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a22f9194f61ad4f2b6405c7c86bee85eac1befa5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
"references": []
}

View File

@ -2,47 +2,14 @@
"id": "CVE-2024-27426",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-17T12:15:15.380",
"lastModified": "2024-05-17T18:35:35.070",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-25T14:15:52.420",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_maximum_tries\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/34a164d2448264b62af82bc0af3d2c83d12d38ac",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/42e71408e2c138be9ccce60920bd6cf094ba1e32",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/84b8486e9cedc93875f251ba31abcf73bd586a3a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d28fa5f0e6c1554e2829f73a6a276c9a49689d04",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e799299aafed417cc1f32adccb2a0e5268b3f6d5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f716a68234242f95305dffb5c9426caa64b316b0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f84f7709486d8a578ab4b7d2a556d1b1a59cfc97",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fa3f3ab5c399852d32a0c3cbb8c55882f7e2c61f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
"references": []
}

View File

@ -2,47 +2,14 @@
"id": "CVE-2024-27427",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-17T12:15:15.600",
"lastModified": "2024-05-17T18:35:35.070",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-25T14:15:52.570",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_timeout\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/291d36d772f5ea5c68a263ee440f2c9eade371c9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/500936692ccca8617a955652d1929f079b17a201",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5d5c14efc987900509cec465af26608e39ac607c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/60a7a152abd494ed4f69098cf0f322e6bb140612",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7d1e00fc2af3b7c30835d643a3655b7e9ff7cb20",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b8006cb0a34aaf85cdd8741f4148fd9c76b351d3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/eadec8da4451c2c0897199691184602e4ee497d1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fed835d415766a94fc0246dcebc3af4c03fe9941",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
"references": []
}

View File

@ -2,47 +2,14 @@
"id": "CVE-2024-27428",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-17T12:15:15.750",
"lastModified": "2024-05-17T18:35:35.070",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-25T14:15:52.687",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix data-races around sysctl_netrom_network_ttl_initialiser\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/119cae5ea3f9e35cdada8e572cc067f072fa825a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5731369af2de21695fe7c1c91fe134fabe5b33b8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/775ed3549819f814a6ecef5726d2b4c23f249b77",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a47d68d777b41862757b7e3051f2d46d6e25f87b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/acc653e8a3aaab1b7103f98645f2cce7be89e3d3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d1261bde59a3a087ab0c81181821e194278d9264",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/dca1d93fe42fb9c42b66f61714fbdc55c87eb002",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/eda02a0bed550f07a8283d3e1f25b90a38e151ed",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
"references": []
}

View File

@ -2,47 +2,14 @@
"id": "CVE-2024-27430",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-17T12:15:16.200",
"lastModified": "2024-05-17T18:35:35.070",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-25T14:15:52.803",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_default_path_quality\n\nWe need to protect the reader reading sysctl_netrom_default_path_quality\nbecause the value can be changed concurrently."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/392eb88416dcbc5f1d61b9a88d79d78dc8b27652",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7510b08c5f5ba15983da004b021fc6154eeb4047",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7644df766006d4878a556e427e3ecc78c2d5606b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7f615232556f3c6e3eeecef96ef2b00d0aa905bb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/958d6145a6d9ba9e075c921aead8753fb91c9101",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/bbc21f134b89535d1cf110c5f2b33ac54e5839c4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/dec82a8fc45c6ce494c2cb31f001a2aadb132b57",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e041df5dc9e68adffcba5499ca28e1252bed6f4b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
"references": []
}

View File

@ -2,27 +2,14 @@
"id": "CVE-2024-35820",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-17T14:15:17.137",
"lastModified": "2024-05-17T18:35:35.070",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-25T14:15:52.920",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: fix io_queue_proc modifying req->flags\n\nWith multiple poll entries __io_queue_proc() might be running in\nparallel with poll handlers and possibly task_work, we should not be\ncarelessly modifying req->flags there. io_poll_double_prepare() handles\na similar case with locking but it's much easier to move it into\n__io_arm_poll_handler()."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0ecb8919469e6d5c74eea24086b34ce1bda5aef7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/1a8ec63b2b6c91caec87d4e132b1f71b5df342be",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/51a490a7f63cae0754120e7c04f4f47920bd48db",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
"references": []
}

View File

@ -2,31 +2,14 @@
"id": "CVE-2024-35923",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-19T11:15:48.587",
"lastModified": "2024-05-20T13:00:04.957",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-25T14:15:53.013",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: clear opcode specific data for an early failure\n\nIf failure happens before the opcode prep handler is called, ensure that\nwe clear the opcode specific area of the request, which holds data\nspecific to that request type. This prevents errors where opcode\nhandlers either don't get to clear per-request private data since prep\nisn't even called."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/21162ad2de7446438cbd6224b3794a375bcb24df",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5245a6da27ef79f8dba98dad5542ebe56d311837",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cb1cd176e0b431644653a7fa8691a1aaf7be98da",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e21e1c45e1fe2e31732f40256b49c04e76a17cee",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
"references": []
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-36013",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-23T07:15:08.987",
"lastModified": "2024-05-24T01:15:30.977",
"lastModified": "2024-05-25T15:15:09.070",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect()\n\nExtend a critical section to prevent chan from early freeing.\nAlso make the l2cap_connect() return type void. Nothing is using the\nreturned value but it is ugly to return a potentially freed pointer.\nMaking it void will help with backports because earlier kernels did use\nthe return value. Now the compile will break for kernels where this\npatch is not a complete fix.\n\nCall stack summary:\n\n[use]\nl2cap_bredr_sig_cmd\n l2cap_connect\n ? mutex_lock(&conn->chan_lock);\n ? chan = pchan->ops->new_connection(pchan); <- alloc chan\n ? __l2cap_chan_add(conn, chan);\n ? l2cap_chan_hold(chan);\n ? list_add(&chan->list, &conn->chan_l); ... (1)\n ? mutex_unlock(&conn->chan_lock);\n chan->conf_state ... (4) <- use after free\n\n[free]\nl2cap_conn_del\n? mutex_lock(&conn->chan_lock);\n? foreach chan in conn->chan_l: ... (2)\n? l2cap_chan_put(chan);\n? l2cap_chan_destroy\n? kfree(chan) ... (3) <- chan freed\n? mutex_unlock(&conn->chan_lock);\n\n==================================================================\nBUG: KASAN: slab-use-after-free in instrument_atomic_read\ninclude/linux/instrumented.h:68 [inline]\nBUG: KASAN: slab-use-after-free in _test_bit\ninclude/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]\nBUG: KASAN: slab-use-after-free in l2cap_connect+0xa67/0x11a0\nnet/bluetooth/l2cap_core.c:4260\nRead of size 8 at addr ffff88810bf040a0 by task kworker/u3:1/311"
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect()\n\nExtend a critical section to prevent chan from early freeing.\nAlso make the l2cap_connect() return type void. Nothing is using the\nreturned value but it is ugly to return a potentially freed pointer.\nMaking it void will help with backports because earlier kernels did use\nthe return value. Now the compile will break for kernels where this\npatch is not a complete fix.\n\nCall stack summary:\n\n[use]\nl2cap_bredr_sig_cmd\n l2cap_connect\n \u250c mutex_lock(&conn->chan_lock);\n \u2502 chan = pchan->ops->new_connection(pchan); <- alloc chan\n \u2502 __l2cap_chan_add(conn, chan);\n \u2502 l2cap_chan_hold(chan);\n \u2502 list_add(&chan->list, &conn->chan_l); ... (1)\n \u2514 mutex_unlock(&conn->chan_lock);\n chan->conf_state ... (4) <- use after free\n\n[free]\nl2cap_conn_del\n\u250c mutex_lock(&conn->chan_lock);\n\u2502 foreach chan in conn->chan_l: ... (2)\n\u2502 l2cap_chan_put(chan);\n\u2502 l2cap_chan_destroy\n\u2502 kfree(chan) ... (3) <- chan freed\n\u2514 mutex_unlock(&conn->chan_lock);\n\n==================================================================\nBUG: KASAN: slab-use-after-free in instrument_atomic_read\ninclude/linux/instrumented.h:68 [inline]\nBUG: KASAN: slab-use-after-free in _test_bit\ninclude/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]\nBUG: KASAN: slab-use-after-free in l2cap_connect+0xa67/0x11a0\nnet/bluetooth/l2cap_core.c:4260\nRead of size 8 at addr ffff88810bf040a0 by task kworker/u3:1/311"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: L2CAP: corrige slab-use-after-free en l2cap_connect() Amplia una secci\u00f3n cr\u00edtica para evitar que chan se libere anticipadamente. Tambi\u00e9n anule el tipo de retorno l2cap_connect(). Nada utiliza el valor devuelto, pero es feo devolver un puntero potencialmente liberado. Anularlo ayudar\u00e1 con los backports porque los kernels anteriores usaban el valor de retorno. Ahora la compilaci\u00f3n se interrumpir\u00e1 en los n\u00facleos en los que este parche no sea una soluci\u00f3n completa. Resumen de la pila de llamadas: [usar] l2cap_bredr_sig_cmd l2cap_connect ? mutex_lock(&amp;conn-&gt;chan_lock); ? chan = pchan-&gt;ops-&gt;new_connection(pchan); &lt;-alloc chan? __l2cap_chan_add(conexi\u00f3n, chan); ? l2cap_chan_hold(chan); ? list_add(&amp;chan-&gt;lista, &amp;conn-&gt;chan_l); ... (1) ? mutex_unlock(&amp;conn-&gt;chan_lock); chan-&gt;conf_state... (4) &lt;- usar despu\u00e9s de gratis [gratis] l2cap_conn_del? mutex_lock(&amp;conn-&gt;chan_lock); ? foreach chan en conn-&gt;chan_l: ... (2)? l2cap_chan_put(chan); ? l2cap_chan_destroy? kfree(chan) ... (3) &lt;- chan liberado? mutex_unlock(&amp;conn-&gt;chan_lock); ==================================================== ================ ERROR: KASAN: slab-use-after-free en instrument_atomic_read include/linux/instrumented.h:68 [en l\u00ednea] ERROR: KASAN: slab-use-after -free en _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [en l\u00ednea] ERROR: KASAN: slab-use-after-free en l2cap_connect+0xa67/0x11a0 net/bluetooth/l2cap_core.c:4260 Lectura del tama\u00f1o 8 en addr ffff88810bf040a0 por tarea kworker/u3:1/311"
}
],
"metrics": {},
@ -15,6 +19,14 @@
{
"url": "https://git.kernel.org/stable/c/4d7b41c0e43995b0e992b9f8903109275744b658",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/826af9d2f69567c646ff46d10393d47e30ad23c6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cfe560c7050bfb37b0d2491bbe7cd8b59e77fdc5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-5336",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-25T15:15:09.150",
"lastModified": "2024-05-25T15:15:09.150",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Ruijie RG-UAC up to 20240516 and classified as critical. This vulnerability affects the function addVlan of the file /view/networkConfig/vlan/vlan_add_commit.php. The manipulation of the argument phyport leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-266242 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/z%7CYVDv%7CHKA)*%5CdK!/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-vlan%3Avlan_add_commit.php.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.266242",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.266242",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.336031",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-5337",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-25T15:15:09.943",
"lastModified": "2024-05-25T15:15:09.943",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Ruijie RG-UAC up to 20240516 and classified as critical. This issue affects some unknown processing of the file /view/systemConfig/sys_user/user_commit.php. The manipulation of the argument email2/user_name leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266243. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/z%7CYVDv%7CHKA)*%5CdK!/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-sys_user%3Auser_commit.php.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.266243",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.266243",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.336032",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-05-25T10:00:37.890498+00:00
2024-05-25T16:00:38.507125+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-05-25T08:15:08.223000+00:00
2024-05-25T15:15:09.943000+00:00
```
### Last Data Feed Release
@ -33,20 +33,41 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
251773
251775
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `2`
- [CVE-2024-5336](CVE-2024/CVE-2024-53xx/CVE-2024-5336.json) (`2024-05-25T15:15:09.150`)
- [CVE-2024-5337](CVE-2024/CVE-2024-53xx/CVE-2024-5337.json) (`2024-05-25T15:15:09.943`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `20`
- [CVE-2023-52656](CVE-2023/CVE-2023-526xx/CVE-2023-52656.json) (`2024-05-25T08:15:08.223`)
- [CVE-2021-47411](CVE-2021/CVE-2021-474xx/CVE-2021-47411.json) (`2024-05-25T14:15:50.770`)
- [CVE-2022-48655](CVE-2022/CVE-2022-486xx/CVE-2022-48655.json) (`2024-05-25T15:15:08.133`)
- [CVE-2023-52434](CVE-2023/CVE-2023-524xx/CVE-2023-52434.json) (`2024-05-25T15:15:08.477`)
- [CVE-2023-52585](CVE-2023/CVE-2023-525xx/CVE-2023-52585.json) (`2024-05-25T15:15:08.607`)
- [CVE-2024-26583](CVE-2024/CVE-2024-265xx/CVE-2024-26583.json) (`2024-05-25T15:15:08.700`)
- [CVE-2024-26584](CVE-2024/CVE-2024-265xx/CVE-2024-26584.json) (`2024-05-25T15:15:08.847`)
- [CVE-2024-26952](CVE-2024/CVE-2024-269xx/CVE-2024-26952.json) (`2024-05-25T15:15:08.950`)
- [CVE-2024-27420](CVE-2024/CVE-2024-274xx/CVE-2024-27420.json) (`2024-05-25T14:15:51.757`)
- [CVE-2024-27421](CVE-2024/CVE-2024-274xx/CVE-2024-27421.json) (`2024-05-25T14:15:51.860`)
- [CVE-2024-27422](CVE-2024/CVE-2024-274xx/CVE-2024-27422.json) (`2024-05-25T14:15:51.940`)
- [CVE-2024-27423](CVE-2024/CVE-2024-274xx/CVE-2024-27423.json) (`2024-05-25T14:15:52.053`)
- [CVE-2024-27424](CVE-2024/CVE-2024-274xx/CVE-2024-27424.json) (`2024-05-25T14:15:52.140`)
- [CVE-2024-27425](CVE-2024/CVE-2024-274xx/CVE-2024-27425.json) (`2024-05-25T14:15:52.253`)
- [CVE-2024-27426](CVE-2024/CVE-2024-274xx/CVE-2024-27426.json) (`2024-05-25T14:15:52.420`)
- [CVE-2024-27427](CVE-2024/CVE-2024-274xx/CVE-2024-27427.json) (`2024-05-25T14:15:52.570`)
- [CVE-2024-27428](CVE-2024/CVE-2024-274xx/CVE-2024-27428.json) (`2024-05-25T14:15:52.687`)
- [CVE-2024-27430](CVE-2024/CVE-2024-274xx/CVE-2024-27430.json) (`2024-05-25T14:15:52.803`)
- [CVE-2024-35820](CVE-2024/CVE-2024-358xx/CVE-2024-35820.json) (`2024-05-25T14:15:52.920`)
- [CVE-2024-35923](CVE-2024/CVE-2024-359xx/CVE-2024-35923.json) (`2024-05-25T14:15:53.013`)
- [CVE-2024-36013](CVE-2024/CVE-2024-360xx/CVE-2024-36013.json) (`2024-05-25T15:15:09.070`)
## Download and Usage

View File

@ -187199,7 +187199,7 @@ CVE-2021-47407,0,0,c09d6e551a5c12f305828cb7ab01a3431bf460f9ffebbfd4bdc0eabd4381f
CVE-2021-47408,0,0,f13fa1f625479c9ceb1eca31878d390a370bf6be16a53f94f69450d189bc685d,2024-05-21T16:54:26.047000
CVE-2021-47409,0,0,efc056664e9da8be4ad86787f1fbadbd6f0fa50ebc36e2ebb3e4e3b22a295845,2024-05-21T16:54:26.047000
CVE-2021-47410,0,0,2a7bb71c7da3bda4c4b7f36e272cc229b86175b5eda810e893c27240c8b6ddff,2024-05-21T16:54:26.047000
CVE-2021-47411,0,0,79cae18ed4c969130385781e0598fb004edae2e6b80fce716a83f7ced2a4072c,2024-05-21T16:54:26.047000
CVE-2021-47411,0,1,20acb81d77364aabbf2c6277c12e29e99715fd6eda8851bf2a58ddb2c536c1dc,2024-05-25T14:15:50.770000
CVE-2021-47412,0,0,83cd7bf818bdc7107aa51fbfdf7bb6b09994ad86f743fd40cf0d2887bf052858,2024-05-21T16:53:56.550000
CVE-2021-47413,0,0,32a888e17d8f971bb7018619ca999ce68b48e1c088b5c22b13cb3fe07cf96996,2024-05-21T16:53:56.550000
CVE-2021-47414,0,0,a9db430f77894869cc5dd7faf22551781bcbd5878bc21de7f87048f2998bbbdc,2024-05-21T16:53:56.550000
@ -211957,7 +211957,7 @@ CVE-2022-48651,0,0,be0472f45e5b93bc292c90b67bea0d9edc1843d7532460583b02ee998a6d3
CVE-2022-48652,0,0,60dcbfe168884e496e7026b25633c34ec1ae5964fa79b80d4189f6571d1744e8,2024-04-29T12:42:03.667000
CVE-2022-48653,0,0,af95f04ccaeac0af19b16f99e2946b1817f70437b5dfd9e67e9db7dc2eccefa4,2024-04-29T12:42:03.667000
CVE-2022-48654,0,0,6f2317418c44c3a7aee8fc030c5299b7dce52edbee9470a8ef6e774ee8f36634,2024-05-23T19:01:47.760000
CVE-2022-48655,0,0,a65ec4eff6e7afc837074b4f9b8c00743a2af576677e13905af003a1a4ac6cec,2024-04-30T15:25:10.210000
CVE-2022-48655,0,1,37cd795d730e6ea04dee936f7f3db8a497c73d0cdbcf55ad835a95ae413d10e9,2024-05-25T15:15:08.133000
CVE-2022-48656,0,0,421f7ed2ce5f328d5dde3dd7f4b4775d8fed8db494e073ab5ceefd90d9745ccb,2024-04-29T12:42:03.667000
CVE-2022-48657,0,0,53792d17e92b7b0bb22b3f0ca741148607168d1927a6cc7adf210f04916eea6b,2024-04-29T12:42:03.667000
CVE-2022-48658,0,0,fea65c2de99597dc1d2d5a29bcf40302a5535ba0b6839e73e33083e36b201790,2024-04-30T15:07:59.460000
@ -237914,7 +237914,7 @@ CVE-2023-52430,0,0,d42ac76eff7e870ccd425430baec924966d37450b40a663564ae4a320330f
CVE-2023-52431,0,0,c693cbe76127faa54716f414936fa58bc8929839973e4bd5352d442ea2d0fbba,2024-02-13T14:01:07.747000
CVE-2023-52432,0,0,d9e628cd1ba368f63ce7d4aa2f3fa1ad3ace9f6cbad32032b51f0e38a1c9e333,2024-03-05T13:41:01.900000
CVE-2023-52433,0,0,1ff15e0b84ada10d9fe85644e2eeee231a8e039de83865a18bc59793995bf899,2024-04-04T14:15:09.057000
CVE-2023-52434,0,0,5d52612c26fee7b14653aeb9fd0e234de51ea4d52e7c788aef26856ca04a039a,2024-03-15T14:21:29.950000
CVE-2023-52434,0,1,61043d97db51beaa03b996bb515a81849feb688380f3650e2c9c091ff1e57ad5,2024-05-25T15:15:08.477000
CVE-2023-52435,0,0,93ff57cc29918e833611e81b89e4ae0482ae349c7e83a8ab64e2ebbd978f4b55,2024-03-15T14:06:17.587000
CVE-2023-52436,0,0,6d56e388f92b7bd2842826d2d59561c86dc788acb9eb3d8b7e587b1b2a1d9fee,2024-04-19T17:36:10.083000
CVE-2023-52437,0,0,91d3cc3a51673e754e25f139cf45e627b67188a0988727604c925b81f4f0227e,2024-02-22T13:15:08.020000
@ -238077,7 +238077,7 @@ CVE-2023-52581,0,0,fdddc64857d5bf65ab9bfb96aee4514d9d51008719a9a6bda751a9c4e1ddd
CVE-2023-52582,0,0,af72e59c52b97139ded26cd2d75f3c2f4c5f30802b950ea3345cee3766393993,2024-03-04T13:58:23.447000
CVE-2023-52583,0,0,707bfceaab0b7f8849b42babcb612e0b81d64266f51c8cf81d5b3b70a8510929,2024-03-06T15:18:08.093000
CVE-2023-52584,0,0,294fd6cdb995cc1ce891fb09ba4fe5675061ff59f0b22f574ca6870ee520db80,2024-03-06T15:18:08.093000
CVE-2023-52585,0,0,e6ffd30561172f7d12f490d7f7a1b6b3372765a4b360eaf6b127506376fab205,2024-03-06T15:18:08.093000
CVE-2023-52585,0,1,e3c90b6844fbbec3158204b41d669e3e864244fecfce923284a114b6a90d14e4,2024-05-25T15:15:08.607000
CVE-2023-52586,0,0,8e65ea7716873e2221da12e8eb2b0f2ae0fd71da3242e0f481a3cde4357c6304,2024-03-06T15:18:08.093000
CVE-2023-52587,0,0,beecd55f2955d4e763d5b12dba7b2a4e02b864009bee51706357ab7fe0fbb9ae,2024-03-06T15:18:08.093000
CVE-2023-52588,0,0,e70c44839baafdcc20e51cbf2dfc77df48c28605a1eba7f685512a034ccad0e9,2024-03-06T15:18:08.093000
@ -238155,7 +238155,7 @@ CVE-2023-52652,0,0,ed03963bdef12b852fe6af3857f553344579f66b34ec0a7fe56b0c4bc4c55
CVE-2023-52653,0,0,7229f3f01c830ab44bfdb842a01e7ef5c67953cbcae8c7257136f273e959a27d,2024-05-01T19:50:25.633000
CVE-2023-52654,0,0,abb3623b53332c4c96cad8f4f887f39c06cad17656d62a949aae3c2a2fe665b5,2024-05-14T16:13:02.773000
CVE-2023-52655,0,0,9acbaabbe37bbd08db0f3ae545fb80311202c279b18a4a3e1513aaa1eeecff85,2024-05-14T16:13:02.773000
CVE-2023-52656,0,1,a2ba970fe2072825dc59aa666db6b1d8ed0a0ea894a620126ae9bd0a12591403,2024-05-25T08:15:08.223000
CVE-2023-52656,0,0,a2ba970fe2072825dc59aa666db6b1d8ed0a0ea894a620126ae9bd0a12591403,2024-05-25T08:15:08.223000
CVE-2023-52657,0,0,6871aa0fb754fcbbce38b0cff6cc198d2d0b546cfe2e7169aa642874b62e47d2,2024-05-17T18:35:35.070000
CVE-2023-52658,0,0,87615be2efefa2d7f9c0691bc4114693dd1c252c8d17f20c83498f63f31cb8b2,2024-05-17T18:35:35.070000
CVE-2023-52659,0,0,fa6fa9193666cfc6033a63c7c7e7dbe88d0e984a1034cd085ef674d3d981b566,2024-05-17T18:35:35.070000
@ -245536,8 +245536,8 @@ CVE-2024-26579,0,0,e7e26cc1ec25e8460fedd94204ae0712ef15a288f9146dfe2ddd8ae344f5e
CVE-2024-26580,0,0,e93e326bf874d6375913aabe9e4eb74306f223b50ee60aec567361b7229e49cb,2024-05-01T18:15:15.603000
CVE-2024-26581,0,0,6313645f513de26967acd9d6721419082a344ce45ec1a0cf923d928a6491861a,2024-04-19T17:41:29.470000
CVE-2024-26582,0,0,3ff5c496d753899c1fc1e8062e53c8f61453498de38167daf1346ce24125ba81,2024-03-15T13:56:41.843000
CVE-2024-26583,0,0,469df0658e18197ed0356dd7a5240250603137d767287de06ec0167d1ae18c2a,2024-03-15T13:05:03.220000
CVE-2024-26584,0,0,66b388a0a910522be9a0047ed118af49c4e847fe6cb3d187782320bcf2a1a2fe,2024-04-30T19:35:07.273000
CVE-2024-26583,0,1,726c656148cecec3b16f282d95f5aca539c8bc49aecec4a2f82789f7170513fd,2024-05-25T15:15:08.700000
CVE-2024-26584,0,1,e994a49c5784c2aa8e8a90a399cf2df45b03aad3977326b5cb0304543fe56747,2024-05-25T15:15:08.847000
CVE-2024-26585,0,0,f63f838d2bcdd8ae6d99da2fdbc37c9df617bc6a41e88fe22fa920d7915c1497,2024-04-03T14:15:15.853000
CVE-2024-26586,0,0,d050b6a287d721bbbe29b94ce0748dfe771bab6092597ff9abd41f70e3acfd0b,2024-04-26T16:10:22.843000
CVE-2024-26587,0,0,9404613a5d22d59f7b9830950f6da0789d954efb37d6d668289d4948436f8def,2024-03-18T18:09:54.027000
@ -245939,7 +245939,7 @@ CVE-2024-26948,0,0,504fd54b8014ad5c80880b8f7264990235361232cb4d396abc33d35f86643
CVE-2024-26949,0,0,98298e6aa8285a2887507ae75a22585976bb1c7094fc806d2d56455f999b3f8c,2024-05-23T19:13:56.890000
CVE-2024-26950,0,0,8a29b231f495865acff77b1b51be2dd640990aa84617667fdf843369759a9352,2024-05-01T13:02:20.750000
CVE-2024-26951,0,0,66c5bd7c9276a41301f8c77e377af720392726a767d5d35afa945139b0225875,2024-05-01T13:02:20.750000
CVE-2024-26952,0,0,32734f4565aee2dd8cb7fb62ec448945bd1b887fa26309c982717007450ca20c,2024-05-23T19:14:05.133000
CVE-2024-26952,0,1,0c7c82bf8d86d0ae89c3b2237d651698f1432d7566849359fbaaee4955185c25,2024-05-25T15:15:08.950000
CVE-2024-26953,0,0,b1854779e5eec614f10783eb3e8416f5d1c68fe6686910e1a9dd6e7c25f031a2,2024-05-01T13:02:20.750000
CVE-2024-26954,0,0,3a105c87f2e28741d42d75481e9c6df77e80795742a4248ce96271c79efd9110,2024-05-01T13:02:20.750000
CVE-2024-26955,0,0,193de4cb2f5cc3de46a39ac33254bf215f8ca416fe0c9caf2ed526032a4a7a8a,2024-05-01T13:02:20.750000
@ -246316,17 +246316,17 @@ CVE-2024-27417,0,0,b2766b3650ac8104bfdee8ebf6a912290217638a628c7afc8d2ea9a1ca14b
CVE-2024-27418,0,0,2c99bf5f2d1d6ce1c50cc04d895bfadd85422cd83a8ee05f8cab0ce0a1020c44,2024-05-17T18:35:35.070000
CVE-2024-27419,0,0,50761c737493cbe77b9d5e44c63f6bfa4c6dc88baaa2cc6b9d7962e16b7508ae,2024-05-17T18:35:35.070000
CVE-2024-2742,0,0,0e25f52f0731b3f58f04025755ec9a85b24de4601bb22e58141a1505898ffdb7,2024-04-11T12:47:44.137000
CVE-2024-27420,0,0,ede0ff3119ad05d5744d52c39431be10b6d2287e26160e031ede179dc0256110,2024-05-17T18:35:35.070000
CVE-2024-27421,0,0,b0c96ff437fc0f3af46f2b36453c3a24d64b760924801257997f1a85b83329b5,2024-05-17T18:35:35.070000
CVE-2024-27422,0,0,ffcb6a325681882edb1ad091bd806064bb4d6915e287b002bf3899d2e60ed4c2,2024-05-17T18:35:35.070000
CVE-2024-27423,0,0,2fbbd5c4e171342a636889250d4512512f00f1c6e479439a80076f28d04dd2ba,2024-05-17T18:35:35.070000
CVE-2024-27424,0,0,91631aca5a2342a6b06bc848d202b65e00bdefebba4821ef996cc80f27ca4e68,2024-05-17T18:35:35.070000
CVE-2024-27425,0,0,d0a4ffb6c3bf483877d807ce93a2bf457a3e48dcbd591aa9eb21daeaa8f4b191,2024-05-17T18:35:35.070000
CVE-2024-27426,0,0,57e38d7dceba5b71a29b640162436c1c309ee40709b10bbffab5c3e7969a0a54,2024-05-17T18:35:35.070000
CVE-2024-27427,0,0,bb326f8d2c317b1381ef1a208cce48e3f05fc1fe29abb10b3a72c8773d4e0e06,2024-05-17T18:35:35.070000
CVE-2024-27428,0,0,45ec47cd7e59c8b20509beb3278a988ffcb4ae77198fddb8f7f996e7f4c6589e,2024-05-17T18:35:35.070000
CVE-2024-27420,0,1,181bdc7540bc7698c88f0e235087c87857818089b7c468c56a4c1750b675fe97,2024-05-25T14:15:51.757000
CVE-2024-27421,0,1,3f5cb49ca23dfe67b37abe045ba080b6865eb0a621835198c7a6ca4ab5d107cd,2024-05-25T14:15:51.860000
CVE-2024-27422,0,1,e4ef21ddd4c210d4e953951ceb14b3707bc316929c46f6da97bbe6e4e063bbe8,2024-05-25T14:15:51.940000
CVE-2024-27423,0,1,9a7efd29f62b1b2e6088625d2d6a712ece7b528ef6cf4568f271b722595f613c,2024-05-25T14:15:52.053000
CVE-2024-27424,0,1,ee57faf4ad53312b6473da0ccfdb1a7543978ee7f6310d2031276b585004f4ff,2024-05-25T14:15:52.140000
CVE-2024-27425,0,1,e1f16a2fc6f9e6a8c1f01dafc74670e5d211cec431697a2743237ffe75cf508a,2024-05-25T14:15:52.253000
CVE-2024-27426,0,1,435e4404658d4100f2722648feb9cb89e6fd6eefdeb8fa41c2b707833275cbb6,2024-05-25T14:15:52.420000
CVE-2024-27427,0,1,a5e0bb1eb9dddbe621a76038e97dbb5a1e22ad2d3eee07e0a566bbc8af043e2e,2024-05-25T14:15:52.570000
CVE-2024-27428,0,1,ea78bb280f9a53a6b506787004b62c38d567896934657d8b3f5126f855f09118,2024-05-25T14:15:52.687000
CVE-2024-27429,0,0,ec3689eecc91e5ba4faa53ce00f63d5adc063318e2e0b4f5ade93be78bdbcd4a,2024-05-21T15:15:28.810000
CVE-2024-27430,0,0,026b94daf24f9db7ecf42d62273aa75e4704304effd4682559aae82145d407f6,2024-05-17T18:35:35.070000
CVE-2024-27430,0,1,e8f5f3c3f666b15261835cea03a1b31ed58b3552a000ce08076960981f5e6ac3,2024-05-25T14:15:52.803000
CVE-2024-27431,0,0,58046c19ffe8e1a8cb4e455715aebacc798178fa987f07fdf3bb32369a7106d3,2024-05-17T18:35:35.070000
CVE-2024-27432,0,0,303d8fec7893c92fbe0b58ad82f9d188208387d6d70b4e295af407f67151acae,2024-05-17T18:35:35.070000
CVE-2024-27433,0,0,ecc2b695acde4ece19084b28107224cc10655ef20eed95b85bbb2419ae723f0b,2024-05-17T18:35:35.070000
@ -250556,7 +250556,7 @@ CVE-2024-35817,0,0,3f6dfe54139432f03cd619e4e40e379e37a174ec1ba2b8d0f90ceac557498
CVE-2024-35818,0,0,1c8a7406c5c632a58ccdb4564dcecb6c857d2c152f060fa49f66293477dc4f8d,2024-05-17T18:35:35.070000
CVE-2024-35819,0,0,3295f9166021d2564b44ae9fadc77a3bc471ee9f121c3bceee79d30ae9d32a8e,2024-05-17T18:35:35.070000
CVE-2024-3582,0,0,ccff8970706a85d3ee495e91ff392c6a7172ea5fbc74c301c7707e7f9af29a61,2024-05-14T16:11:39.510000
CVE-2024-35820,0,0,e4717e17f1a1b57fff3f7e8f5254368184572ef97ca3bdda78844610885add1a,2024-05-17T18:35:35.070000
CVE-2024-35820,0,1,ef8937a48788ed835bd3f34798690b95d243eba50ca3caf796662dedc6c777fe,2024-05-25T14:15:52.920000
CVE-2024-35821,0,0,b0fb494ea3f10cdbafda65c46c16a49f4922e072628cf82db77622ec4dcdfa8a,2024-05-17T18:35:35.070000
CVE-2024-35822,0,0,f7f34e75e2491a508adbce5579397b331e438106a48cb1abc97468ad42cc7dfd,2024-05-17T18:35:35.070000
CVE-2024-35823,0,0,2299a87a9179587e4570a57ed30df64d45d7bd7081565fd383e88a9fa8d0ae70,2024-05-17T18:35:35.070000
@ -250663,7 +250663,7 @@ CVE-2024-35919,0,0,568854d104b254315bb97c71b3664db3efeb4fc7ff9d4725619ba1a490fe1
CVE-2024-35920,0,0,41ef2c7fa1f0ede5e558a1b35264c9b265e53851d1147a1d8d6cb10042a6885e,2024-05-20T13:00:04.957000
CVE-2024-35921,0,0,498fd64cc206eb6b9a3fa96962a2750766d89f1d9401b68c98535a528845d314,2024-05-20T13:00:04.957000
CVE-2024-35922,0,0,da39c851dac73a381a9181aa35a8add26cbe66ce1bcb8227343d24c9c33bc3dd,2024-05-20T13:00:04.957000
CVE-2024-35923,0,0,f59915d1fc888a07a38d0bd25f92d0d27d72abfd25ee65a7680f1624a532c98f,2024-05-20T13:00:04.957000
CVE-2024-35923,0,1,83568754b2120c0dff38d3f5c97b39d0649d1b51c262a9dde7a7dfb26eda9e24,2024-05-25T14:15:53.013000
CVE-2024-35924,0,0,01bf473a0ba0b0344e0fa3eed5e09649334fa4de4558bf979bfd7ddb6835fc8b,2024-05-20T13:00:04.957000
CVE-2024-35925,0,0,4d115cfa199be842c351f116d81b0768cb5d310e84edcb243459b43b7873c104,2024-05-20T13:00:04.957000
CVE-2024-35926,0,0,0353eb736a807d9c4877ede1824705474fe3b6e1931359c3f7d97f253e19c738,2024-05-20T13:00:04.957000
@ -250759,7 +250759,7 @@ CVE-2024-3601,0,0,fc79ccecd0a0bbb79cd9c210153588f7d4590d9827348da641a07d91a9dbdb
CVE-2024-36010,0,0,6f643d760193939acd403776f35d8094295a237f49299303e96b8a627d329d0e,2024-05-22T12:46:53.887000
CVE-2024-36011,0,0,8c075216dcc359a31d2e8fafeb4a14485ec06edc9e34318ac3163ece10feb507,2024-05-24T01:15:30.977000
CVE-2024-36012,0,0,e4a88f8c3148ef3f19ebbe7f0a3b85cbde15492e4b96066a314f6e02d213b9b2,2024-05-24T01:15:30.977000
CVE-2024-36013,0,0,3ed463efc3a9b6f1e3cbae47b6793c5b9c3b1edddebf581d08e570b29b9e1478,2024-05-24T01:15:30.977000
CVE-2024-36013,0,1,1251c8e9d1d9ec0619ca01193822062d3235b343811763ddc34f761263e594d9,2024-05-25T15:15:09.070000
CVE-2024-36039,0,0,7819448caea04349894603b655b7a026f4a20175e41e6c559f30343634b66d20,2024-05-21T16:53:56.550000
CVE-2024-36043,0,0,8d68423d5fd19f184b1028d7213d8202af063db8832c1e9d8a6916cceea3f12f,2024-05-20T13:00:04.957000
CVE-2024-36048,0,0,b5cb97f8eb2dd5aaf745035f8a3442137591158895420be0c263c765fd00e4a2,2024-05-20T13:00:04.957000
@ -251772,3 +251772,5 @@ CVE-2024-5312,0,0,082c9ac2393cf8e57fdd7df5653c9ea7402a5c66b3a64380a6e8455af1865a
CVE-2024-5314,0,0,a78e716fa392b8cb9869f7797ea197c1011e46ba4bc9c8c5da0073e7e12b93dd,2024-05-24T13:03:05.093000
CVE-2024-5315,0,0,17a737dcad42e55d9b51354513bcf6a79d52e58b0565b3a7bb2bcb2078a35d4b,2024-05-24T13:03:05.093000
CVE-2024-5318,0,0,23557c413419809da6545b8c1445586f3837718f3430ace9eed52e7e734c5a9b,2024-05-24T18:09:20.027000
CVE-2024-5336,1,1,d1380b18449dc8c8c34e22c1b2a107ea89ee46ba4b9dd6f93e49bbe4388f53ae,2024-05-25T15:15:09.150000
CVE-2024-5337,1,1,3d998f1cc9e000a28c5e2cf47948314577814d30a2ab7663340a4bad3cb9838f,2024-05-25T15:15:09.943000

Can't render this file because it is too large.