mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-03-21T17:01:03.199130+00:00
This commit is contained in:
parent
922ddbf9f9
commit
b4be1255c4
60
CVE-2023/CVE-2023-477xx/CVE-2023-47715.json
Normal file
60
CVE-2023/CVE-2023-477xx/CVE-2023-47715.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2023-47715",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-21T15:15:07.593",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Storage Protect Plus Server 10.1.0 through 10.1.16 could allow an authenticated user with read-only permissions to add or delete entries from an existing HyperVisor configuration. IBM X-Force ID: 271538."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-264"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/271538",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7144861",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-1394",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-03-21T13:00:08.037",
|
||||
"lastModified": "2024-03-21T13:00:08.037",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs\u200b. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey\u200b and ctx\u200b. That function uses named return parameters to free pkey\u200b and ctx\u200b if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the \"return nil, nil, fail(...)\" pattern, meaning that pkey\u200b and ctx\u200b will be nil inside the deferred function that should free them."
|
||||
"value": "A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs?. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey? and ctx?. That function uses named return parameters to free pkey? and ctx? if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the \"return nil, nil, fail(...)\" pattern, meaning that pkey? and ctx? will be nil inside the deferred function that should free them."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
41
CVE-2024/CVE-2024-24xx/CVE-2024-2463.json
Normal file
41
CVE-2024/CVE-2024-24xx/CVE-2024-2463.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2024-2463",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2024-03-21T15:16:54.417",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Weak password recovery mechanism in CDeX application allows to retrieve\u00a0password\u00a0reset token.This issue affects CDeX application versions through 5.7.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-640"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cdex.cloud/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://cert.pl/en/posts/2024/03/CVE-2024-2463/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://cert.pl/posts/2024/03/CVE-2024-2463/",
|
||||
"source": "cvd@cert.pl"
|
||||
}
|
||||
]
|
||||
}
|
41
CVE-2024/CVE-2024-24xx/CVE-2024-2464.json
Normal file
41
CVE-2024/CVE-2024-24xx/CVE-2024-2464.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2024-2464",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2024-03-21T15:16:54.490",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.This issue affects CDeX application versions through 5.7.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cdex.cloud/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://cert.pl/en/posts/2024/03/CVE-2024-2463/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://cert.pl/posts/2024/03/CVE-2024-2463/",
|
||||
"source": "cvd@cert.pl"
|
||||
}
|
||||
]
|
||||
}
|
41
CVE-2024/CVE-2024-24xx/CVE-2024-2465.json
Normal file
41
CVE-2024/CVE-2024-24xx/CVE-2024-2465.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2024-2465",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2024-03-21T15:16:54.553",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Open redirection vulnerability in CDeX application\u00a0allows to redirect users to arbitrary websites via a specially crafted URL.This issue affects CDeX application versions through 5.7.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cdex.cloud/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://cert.pl/en/posts/2024/03/CVE-2024-2463/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://cert.pl/posts/2024/03/CVE-2024-2463/",
|
||||
"source": "cvd@cert.pl"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2494",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-03-21T14:15:10.350",
|
||||
"lastModified": "2024-03-21T14:15:10.350",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
56
CVE-2024/CVE-2024-279xx/CVE-2024-27993.json
Normal file
56
CVE-2024/CVE-2024-279xx/CVE-2024-27993.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-27993",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-21T15:16:53.697",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Typps Calendarista Basic Edition.This issue affects Calendarista Basic Edition: from n/a through 3.0.2.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/calendarista-basic-edition/wordpress-calendarista-basic-edition-plugin-3-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-279xx/CVE-2024-27994.json
Normal file
56
CVE-2024/CVE-2024-279xx/CVE-2024-27994.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-27994",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-21T15:16:53.950",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in YITH YITH WooCommerce Product Add-Ons allows Reflected XSS.This issue affects YITH WooCommerce Product Add-Ons: from n/a through 4.5.0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/yith-woocommerce-product-add-ons/wordpress-yith-woocommerce-product-add-ons-plugin-4-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-279xx/CVE-2024-27995.json
Normal file
56
CVE-2024/CVE-2024-279xx/CVE-2024-27995.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-27995",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-21T15:16:54.133",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Repute Infosystems ARMember \u2013 Membership Plugin, Content Restriction, Member Levels, User Profile & User signup allows Stored XSS.This issue affects ARMember \u2013 Membership Plugin, Content Restriction, Member Levels, User Profile & User signup: from n/a through 4.0.23.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/armember-membership/wordpress-armember-plugin-4-0-23-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28834",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-03-21T14:15:07.547",
|
||||
"lastModified": "2024-03-21T14:15:07.547",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
21
CVE-2024/CVE-2024-292xx/CVE-2024-29243.json
Normal file
21
CVE-2024/CVE-2024-292xx/CVE-2024-29243.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-29243",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-21T15:16:54.320",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Shenzhen Libituo Technology Co., Ltd LBT-T300-mini v1.2.9 was discovered to contain a buffer overflow via the vpn_client_ip parameter at /apply.cgi."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/AdamRitz/lbtvul/blob/main/t300mini-2.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-292xx/CVE-2024-29244.json
Normal file
21
CVE-2024/CVE-2024-292xx/CVE-2024-29244.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-29244",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-21T15:16:54.377",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Shenzhen Libituo Technology Co., Ltd LBT-T300-mini v1.2.9 was discovered to contain a buffer overflow via the pin_code_3g parameter at /apply.cgi."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/AdamRitz/lbtvul/blob/main/t300mini-2.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29866",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-21T14:15:07.810",
|
||||
"lastModified": "2024-03-21T14:15:07.810",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29870",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-21T14:15:07.867",
|
||||
"lastModified": "2024-03-21T14:15:07.867",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29871",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-21T14:15:08.080",
|
||||
"lastModified": "2024-03-21T14:15:08.080",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29872",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-21T14:15:08.313",
|
||||
"lastModified": "2024-03-21T14:15:08.313",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29873",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-21T14:15:08.520",
|
||||
"lastModified": "2024-03-21T14:15:08.520",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29874",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-21T14:15:08.767",
|
||||
"lastModified": "2024-03-21T14:15:08.767",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29875",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-21T14:15:08.980",
|
||||
"lastModified": "2024-03-21T14:15:08.980",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29876",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-21T14:15:09.163",
|
||||
"lastModified": "2024-03-21T14:15:09.163",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29877",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-21T14:15:09.353",
|
||||
"lastModified": "2024-03-21T14:15:09.353",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29878",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-21T14:15:09.593",
|
||||
"lastModified": "2024-03-21T14:15:09.593",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29879",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-03-21T14:15:09.817",
|
||||
"lastModified": "2024-03-21T14:15:09.817",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29880",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-03-21T14:15:10.077",
|
||||
"lastModified": "2024-03-21T14:15:10.077",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
48
README.md
48
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-21T15:01:01.490580+00:00
|
||||
2024-03-21T17:01:03.199130+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-21T14:15:10.350000+00:00
|
||||
2024-03-21T15:24:35.093000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,33 +29,43 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
242338
|
||||
242347
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `14`
|
||||
Recently added CVEs: `9`
|
||||
|
||||
* [CVE-2024-2494](CVE-2024/CVE-2024-24xx/CVE-2024-2494.json) (`2024-03-21T14:15:10.350`)
|
||||
* [CVE-2024-28834](CVE-2024/CVE-2024-288xx/CVE-2024-28834.json) (`2024-03-21T14:15:07.547`)
|
||||
* [CVE-2024-29866](CVE-2024/CVE-2024-298xx/CVE-2024-29866.json) (`2024-03-21T14:15:07.810`)
|
||||
* [CVE-2024-29870](CVE-2024/CVE-2024-298xx/CVE-2024-29870.json) (`2024-03-21T14:15:07.867`)
|
||||
* [CVE-2024-29871](CVE-2024/CVE-2024-298xx/CVE-2024-29871.json) (`2024-03-21T14:15:08.080`)
|
||||
* [CVE-2024-29872](CVE-2024/CVE-2024-298xx/CVE-2024-29872.json) (`2024-03-21T14:15:08.313`)
|
||||
* [CVE-2024-29873](CVE-2024/CVE-2024-298xx/CVE-2024-29873.json) (`2024-03-21T14:15:08.520`)
|
||||
* [CVE-2024-29874](CVE-2024/CVE-2024-298xx/CVE-2024-29874.json) (`2024-03-21T14:15:08.767`)
|
||||
* [CVE-2024-29875](CVE-2024/CVE-2024-298xx/CVE-2024-29875.json) (`2024-03-21T14:15:08.980`)
|
||||
* [CVE-2024-29876](CVE-2024/CVE-2024-298xx/CVE-2024-29876.json) (`2024-03-21T14:15:09.163`)
|
||||
* [CVE-2024-29877](CVE-2024/CVE-2024-298xx/CVE-2024-29877.json) (`2024-03-21T14:15:09.353`)
|
||||
* [CVE-2024-29878](CVE-2024/CVE-2024-298xx/CVE-2024-29878.json) (`2024-03-21T14:15:09.593`)
|
||||
* [CVE-2024-29879](CVE-2024/CVE-2024-298xx/CVE-2024-29879.json) (`2024-03-21T14:15:09.817`)
|
||||
* [CVE-2024-29880](CVE-2024/CVE-2024-298xx/CVE-2024-29880.json) (`2024-03-21T14:15:10.077`)
|
||||
* [CVE-2023-47715](CVE-2023/CVE-2023-477xx/CVE-2023-47715.json) (`2024-03-21T15:15:07.593`)
|
||||
* [CVE-2024-2463](CVE-2024/CVE-2024-24xx/CVE-2024-2463.json) (`2024-03-21T15:16:54.417`)
|
||||
* [CVE-2024-2464](CVE-2024/CVE-2024-24xx/CVE-2024-2464.json) (`2024-03-21T15:16:54.490`)
|
||||
* [CVE-2024-2465](CVE-2024/CVE-2024-24xx/CVE-2024-2465.json) (`2024-03-21T15:16:54.553`)
|
||||
* [CVE-2024-27993](CVE-2024/CVE-2024-279xx/CVE-2024-27993.json) (`2024-03-21T15:16:53.697`)
|
||||
* [CVE-2024-27994](CVE-2024/CVE-2024-279xx/CVE-2024-27994.json) (`2024-03-21T15:16:53.950`)
|
||||
* [CVE-2024-27995](CVE-2024/CVE-2024-279xx/CVE-2024-27995.json) (`2024-03-21T15:16:54.133`)
|
||||
* [CVE-2024-29243](CVE-2024/CVE-2024-292xx/CVE-2024-29243.json) (`2024-03-21T15:16:54.320`)
|
||||
* [CVE-2024-29244](CVE-2024/CVE-2024-292xx/CVE-2024-29244.json) (`2024-03-21T15:16:54.377`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `15`
|
||||
|
||||
* [CVE-2024-1394](CVE-2024/CVE-2024-13xx/CVE-2024-1394.json) (`2024-03-21T15:24:35.093`)
|
||||
* [CVE-2024-2494](CVE-2024/CVE-2024-24xx/CVE-2024-2494.json) (`2024-03-21T15:24:35.093`)
|
||||
* [CVE-2024-28834](CVE-2024/CVE-2024-288xx/CVE-2024-28834.json) (`2024-03-21T15:24:35.093`)
|
||||
* [CVE-2024-29866](CVE-2024/CVE-2024-298xx/CVE-2024-29866.json) (`2024-03-21T15:24:35.093`)
|
||||
* [CVE-2024-29870](CVE-2024/CVE-2024-298xx/CVE-2024-29870.json) (`2024-03-21T15:24:35.093`)
|
||||
* [CVE-2024-29871](CVE-2024/CVE-2024-298xx/CVE-2024-29871.json) (`2024-03-21T15:24:35.093`)
|
||||
* [CVE-2024-29872](CVE-2024/CVE-2024-298xx/CVE-2024-29872.json) (`2024-03-21T15:24:35.093`)
|
||||
* [CVE-2024-29873](CVE-2024/CVE-2024-298xx/CVE-2024-29873.json) (`2024-03-21T15:24:35.093`)
|
||||
* [CVE-2024-29874](CVE-2024/CVE-2024-298xx/CVE-2024-29874.json) (`2024-03-21T15:24:35.093`)
|
||||
* [CVE-2024-29875](CVE-2024/CVE-2024-298xx/CVE-2024-29875.json) (`2024-03-21T15:24:35.093`)
|
||||
* [CVE-2024-29876](CVE-2024/CVE-2024-298xx/CVE-2024-29876.json) (`2024-03-21T15:24:35.093`)
|
||||
* [CVE-2024-29877](CVE-2024/CVE-2024-298xx/CVE-2024-29877.json) (`2024-03-21T15:24:35.093`)
|
||||
* [CVE-2024-29878](CVE-2024/CVE-2024-298xx/CVE-2024-29878.json) (`2024-03-21T15:24:35.093`)
|
||||
* [CVE-2024-29879](CVE-2024/CVE-2024-298xx/CVE-2024-29879.json) (`2024-03-21T15:24:35.093`)
|
||||
* [CVE-2024-29880](CVE-2024/CVE-2024-298xx/CVE-2024-29880.json) (`2024-03-21T15:24:35.093`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
39
_state.csv
39
_state.csv
@ -233215,6 +233215,7 @@ CVE-2023-47705,0,0,e3d4b068cec26511f3145778a695a8a2080173336ca900c2cb1d02fe4260e
|
||||
CVE-2023-47706,0,0,0cfaecc187d4236dd38d13dc0e25752f35e7adc63caac950330b0f64c0b0d36d,2023-12-22T10:11:40.633000
|
||||
CVE-2023-47707,0,0,c0b40bcf5eaa712d14fa41e4477281db7d00ecb46e35f8e08b13ff46eeb7db79,2023-12-22T10:00:51.667000
|
||||
CVE-2023-4771,0,0,d0a9b68633cdbf963bbdd2b3878793c4ef1f150510595f6b4aa4f9d063a414b2,2023-11-28T19:09:05.517000
|
||||
CVE-2023-47715,1,1,0c6694596606d941ea5afe5ea7b27770e5a0d9728d61ef06d70df0e6fcec99f2,2024-03-21T15:24:35.093000
|
||||
CVE-2023-47716,0,0,62bb7b17d2839b029f6ac267e0b09b92e0e697ce278d1faccc537c28ae26ec06,2024-03-01T14:04:26.010000
|
||||
CVE-2023-47718,0,0,c741441681738efc3979d67da4409868f353d29cc92314f5037f92d0809304bd,2024-01-24T21:23:15.540000
|
||||
CVE-2023-4772,0,0,cfd718e5f5f861c90ad1b1b61b69dbfa920c9351e02c2667625b5fa349288ce0,2023-11-07T04:22:57.827000
|
||||
@ -238774,7 +238775,7 @@ CVE-2024-1390,0,0,760bcdaac2db269a3249aaa20e58e1659b2977bdb995748ef5e46a1ecb8544
|
||||
CVE-2024-1391,0,0,d263861df201411e95604a0f8dea4a32aa5aa465f14e9d3ee26c7cf1dddcea30,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1392,0,0,854e6aa0a85eb7f6e01984f9f2b39f09c3e464c67a90f670cafc735773e56736,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1393,0,0,139d32a27df25f29abc2bcda3159db69b338e05c68d7680abed80afd815e8ff5,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1394,0,0,0a23089c4be2fb9578409d22ba1cb72a18b442f1853d1ebf0f27f82a8e874c2f,2024-03-21T13:00:08.037000
|
||||
CVE-2024-1394,0,1,294b053d2ffc51433a2d64e8d98c3ac8a415fb04eaae593428f7a34b72b8edc5,2024-03-21T15:24:35.093000
|
||||
CVE-2024-1397,0,0,e6d8c9c2beca75d3fdc5f918cb423cf21913a9c807f46126d5b49c29c7bd60f0,2024-03-13T12:33:51.697000
|
||||
CVE-2024-1398,0,0,7a7783e481aa897afa83bd125da0d53c431d5a5a9d43f1ade8b1e715449f59a0,2024-03-04T13:58:23.447000
|
||||
CVE-2024-1400,0,0,295a10f36c3e13d694d09cafc6872c0c48f9e2b4c87da0889327ecdac7abe4ac,2024-03-12T12:40:13.500000
|
||||
@ -240882,6 +240883,9 @@ CVE-2024-24593,0,0,155720893bd9aa302467d506c561d7f3174f3ae580a95d8dad9c1ee6fc9e6
|
||||
CVE-2024-24594,0,0,2d1d6ef3edb6eea27d760a77187cf0f21d8b0e3aa5e2b1e9eb45515b37617cb4,2024-02-15T16:47:17.213000
|
||||
CVE-2024-24595,0,0,53aa45116d4573f7c0b646b17e4787137c5ab03b6e722457f3ddd917489c99e4,2024-02-13T14:08:55.650000
|
||||
CVE-2024-2460,0,0,ae8df8f819284d0f0ea1a2589261357f393234fec195be42118065d37d02123d,2024-03-20T13:00:16.367000
|
||||
CVE-2024-2463,1,1,d32eed22bf8a5fcf19609631d56de6b5b6d90eae3a6bf9f710f87e5bdc1555f5,2024-03-21T15:24:35.093000
|
||||
CVE-2024-2464,1,1,56f44447e0d256990841443a68df981cd7582a3850793a83bd5ba95f65e47e1c,2024-03-21T15:24:35.093000
|
||||
CVE-2024-2465,1,1,2a77d33e3025e3f4f2328d9cfb33df2ea3c6a07d249ae9c526b18aebbde46668,2024-03-21T15:24:35.093000
|
||||
CVE-2024-24680,0,0,00c6b06cbd399fac9a1cb69a45fdeee991ea9572aae73c195704c3555b436eb7,2024-02-15T18:46:48.693000
|
||||
CVE-2024-24681,0,0,705110c1a0575ef95794934b23101ccc4a6f384f7c61c4db9f4dbf9a8c528dd4,2024-02-26T13:42:22.567000
|
||||
CVE-2024-24683,0,0,5dcfcb131b936f6ead6cae5418b28b2fe1bb1011c1c921fe73c5d9bd261bf34a,2024-03-19T13:26:46
|
||||
@ -241057,7 +241061,7 @@ CVE-2024-24936,0,0,b40cba45486310464826445db58797cda9708090ef629993d6b65c1322a94
|
||||
CVE-2024-24937,0,0,c158a1376665515fcdd077ebbbc61196266e17dfca3642cdd3f2b284922e7576,2024-02-09T01:05:30.783000
|
||||
CVE-2024-24938,0,0,919f0844348072e68674027ea0a3644c0c8fc392a786b352b8f3abde920f1f60,2024-02-09T01:05:13.527000
|
||||
CVE-2024-24939,0,0,b2b5d03f9e7db36f290b4e039454a0e87440b3b4044776d74739544bb234180a,2024-02-09T01:04:16.577000
|
||||
CVE-2024-2494,1,1,63f261f20581d4b36948213d752abea41e22762bf93a52da0bccbbbbb8d98c6b,2024-03-21T14:15:10.350000
|
||||
CVE-2024-2494,0,1,84ede45321bf48443a2c564f3d4c5fb0def59051719248e3d2f74255b0f14448,2024-03-21T15:24:35.093000
|
||||
CVE-2024-24940,0,0,3b807f9711835fcb1381b61d94808660dccf6fdaaa44b568b18928314f306783,2024-02-07T23:45:31.493000
|
||||
CVE-2024-24941,0,0,3ce7539cc2c00ca21eaf8843bb8dfa494f8daac6c677d25fe85a072b680aec63,2024-02-09T01:05:05.250000
|
||||
CVE-2024-24942,0,0,98967e5f253d2f0e2d6c9adde01d5feb324664bac3fce3b7b875de585c5550eb,2024-02-09T01:03:13.453000
|
||||
@ -242053,6 +242057,9 @@ CVE-2024-27961,0,0,3162bfbc67900a83a9b4114dba265e7189f0bad8c0ddf2d85f6724674d135
|
||||
CVE-2024-27974,0,0,c5d12161a6a294fb4d33a068888d07d2dec693f9073d8d47f06182bf4fe2779a,2024-03-18T12:38:25.490000
|
||||
CVE-2024-27986,0,0,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000
|
||||
CVE-2024-27987,0,0,ce6fd0b1730cd837f285c0aaaa1258cf6aa8505469e7f313401adb363ee7f395,2024-03-15T12:53:06.423000
|
||||
CVE-2024-27993,1,1,b4c5383b47399ec74c3480cf4f572eb4d9bdde4b0737cbc8bf7ed8cbe49e4ed8,2024-03-21T15:24:35.093000
|
||||
CVE-2024-27994,1,1,e85e7bc4f691478aca76ee076ff4f9f23d2d33165eac31a30e8922db5bb9bf99,2024-03-21T15:24:35.093000
|
||||
CVE-2024-27995,1,1,31db9c3046ef3b6826fd04aab15586376d26e0b529bdf84ce7eba17bac569f0a,2024-03-21T15:24:35.093000
|
||||
CVE-2024-27996,0,0,79cff30308b011c07df476cb18acc5ff1830e7bf17b14d1ca5a0d9446fa716b8,2024-03-20T13:00:16.367000
|
||||
CVE-2024-27997,0,0,b42c7cf4751e4a11a6e5eeb90c0df264fce89958ee556b8b06894cd2e68b11ce,2024-03-20T13:00:16.367000
|
||||
CVE-2024-27998,0,0,325b1a8419d02931fcb08c1286afe5c33e53c5bf8527e201a365155e360914cf,2024-03-20T13:00:16.367000
|
||||
@ -242239,7 +242246,7 @@ CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3
|
||||
CVE-2024-28757,0,0,83cb6aefc1d6f4ccc5441198cdfc19ec27b4e109d2bc2864c936baa137f8e197,2024-03-19T03:15:06.893000
|
||||
CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000
|
||||
CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000
|
||||
CVE-2024-28834,1,1,49dd8c5bce1ef5354057f5beed8f9118273750b7ba7af3f57c721b8c69f2dbe9,2024-03-21T14:15:07.547000
|
||||
CVE-2024-28834,0,1,841718fd8fddff124f231102263dad7d394e02b19e9697b20d411d85f567df2c,2024-03-21T15:24:35.093000
|
||||
CVE-2024-28835,0,0,807354fa6b4609be92d801df299988ca81259642594a0e94cba8cafe4de90346,2024-03-21T12:58:51.093000
|
||||
CVE-2024-28847,0,0,77ca7298b6799783b77992e414cebfaaf69a1bd2c05124cbdf6b914d3e0bb310,2024-03-17T22:38:29.433000
|
||||
CVE-2024-28848,0,0,f738fe56a5bc4cdb728fabdb4b9cb52618afbf9827db3dbc12ec3f1fb91169bf,2024-03-21T02:52:25.197000
|
||||
@ -242313,6 +242320,8 @@ CVE-2024-29143,0,0,a3f92e2c9ae6aaf4168f841be16c13a544cace199faa049656661980aa53e
|
||||
CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24c8f,2024-03-18T12:38:25.490000
|
||||
CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000
|
||||
CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000
|
||||
CVE-2024-29243,1,1,80b3eab65af2d9fbeb7b6048e074697688a19de63e1138c377d0b826523dd7db,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29244,1,1,ab4dadc4ff7b45a2c285edb922de956bae0828f007627c62339f15145e95a7b7,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000
|
||||
CVE-2024-29469,0,0,acf93e04574e9669a29498319a75720c9b5a03ff4de2c06070b1f52ac9f365b7,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29470,0,0,ec8cc83a60b9ef7edaa49e0605acc097203825f31a2e1ca35494b606ac2473df,2024-03-21T12:58:51.093000
|
||||
@ -242325,15 +242334,15 @@ CVE-2024-29858,0,0,585719d860c91771e96e52d882eed744121f21e899f727afe6b381f4ffbb3
|
||||
CVE-2024-29859,0,0,6ebff5730a73f542ffebf0a56f74146bb69314ac3f95118519ec4b678666f245,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29862,0,0,78f62d6320f790cb50cb5767943bbca91d7f9763b83315a1495201af3fd41026,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29864,0,0,3c9560ffae0fa16acac4cf8327bf4ae3182996a8c684b25430908ed832b73c71,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29866,1,1,b7aae42ff0f8d26ef8d271f21c3bcba0c2676fb462916aab4cad2c78bb4e36f6,2024-03-21T14:15:07.810000
|
||||
CVE-2024-29870,1,1,3505d6d3160d8f477a76dce538125c3d05fda98fea30d8cd2e776d2473790f7b,2024-03-21T14:15:07.867000
|
||||
CVE-2024-29871,1,1,51c0f159938b8d9421ca76e3f560a6524eebd96fc5429c06757e4fcf784a6a98,2024-03-21T14:15:08.080000
|
||||
CVE-2024-29872,1,1,51d8118ac7521ab72274e141dd426302a1a73491662744fcfdd12a6a22088085,2024-03-21T14:15:08.313000
|
||||
CVE-2024-29873,1,1,08125b51ba63d3bf83ff2f8bb90c7ac43bee6fac5baf9c26bb47fd37946337d5,2024-03-21T14:15:08.520000
|
||||
CVE-2024-29874,1,1,fcda0ac7dc303bbb7de5a3ffab12518861a224ac3ce1bd6053196d247e119c54,2024-03-21T14:15:08.767000
|
||||
CVE-2024-29875,1,1,2d19c9eba5f8ffdc8816cd88cf5875cf8467329b3b7a945d029634e127a6f65f,2024-03-21T14:15:08.980000
|
||||
CVE-2024-29876,1,1,2d4adfc531f81e22dcdb8d233db5ac43ff28b8756f3e2e97e2833a22df6dd30b,2024-03-21T14:15:09.163000
|
||||
CVE-2024-29877,1,1,ae3711f0c18f7d645ce821470e00e41ff5a2fe70c0c6c066e4af620364c05194,2024-03-21T14:15:09.353000
|
||||
CVE-2024-29878,1,1,d3448c7485a0c9c8d93283db8afe376c3d6d03a15eecf21f3d06cf15c244fd20,2024-03-21T14:15:09.593000
|
||||
CVE-2024-29879,1,1,e7f8f9b502882e6d22482da09d9455e94a91e17212b7ad15ca68fcc8faaf940e,2024-03-21T14:15:09.817000
|
||||
CVE-2024-29880,1,1,1bf20db2449227eb571e21d9b9932fbc8ffafb226464106d6cf267f6fb063df8,2024-03-21T14:15:10.077000
|
||||
CVE-2024-29866,0,1,d3474a4cb7339082dcfbd889d056a2a906f051d7c933d6576013f44ee70632b2,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29870,0,1,04eec461d26d3928388aa1ebeda7f3889d70d7fb805b862b11fc37cdb9c73805,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29871,0,1,e7b820291fe87f3c68126b9e66a3cb2071635a1781039b23d1340b3ec50d7104,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29872,0,1,2ed0e31c2aeb7a79b11a328bd37ec6ac592cb7ae8ad49b21b1fd6587d921da01,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29873,0,1,4c88c2b5d7ca113616f149d7c91b297271846cd8b9ee3b6472184ffa855db09d,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29874,0,1,5f5afb1bffc520634cc09fd8c228b7ee62224828af0f713d405da9c49edc2676,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29875,0,1,36d66cc7949cb01f56ec16bc1f171847efe7ceac006d82066a5f62664aaf8bbb,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29876,0,1,81e9b92db68fe1869c86668a1e00f2a9ff624f59839df1fbe18d8e987774c206,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29877,0,1,5b6a7271e346dceec62c9141f9ae12b0e5342a31cc26366c653fe20c26c8bc21,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29878,0,1,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dda8d,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29879,0,1,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29880,0,1,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user