Auto-Update: 2024-03-22T21:00:38.287872+00:00

This commit is contained in:
cad-safe-bot 2024-03-22 21:03:26 +00:00
parent e8fc776bd6
commit b5b665b3f6
37 changed files with 587 additions and 104 deletions

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-23085",
"sourceIdentifier": "secteam@freebsd.org",
"published": "2024-02-15T05:15:09.110",
"lastModified": "2024-02-15T06:23:39.303",
"lastModified": "2024-03-22T19:15:07.650",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A user-provided integer option was passed to nmreq_copyin() without checking if it would overflow. This insufficient bounds checking could lead to kernel memory corruption.\n\nOn systems configured to include netmap in their devfs_ruleset, a privileged process running in a jail can affect the host environment."
},
{
"lang": "es",
"value": "Se pas\u00f3 una opci\u00f3n de entero proporcionada por el usuario a nmreq_copyin() sin comprobar si se desbordar\u00eda. Esta comprobaci\u00f3n de los l\u00edmites insuficiente podr\u00eda provocar da\u00f1os en la memoria del kernel. En sistemas configurados para incluir netmap en su devfs_ruleset, un proceso privilegiado que se ejecuta en una c\u00e1rcel puede afectar el entorno del host."
}
],
"metrics": {},
@ -15,6 +19,10 @@
{
"url": "https://security.freebsd.org/advisories/FreeBSD-SA-22:04.netmap.asc",
"source": "secteam@freebsd.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240322-0004/",
"source": "secteam@freebsd.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-32751",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-22T16:15:07.747",
"lastModified": "2024-03-22T16:15:07.747",
"vulnStatus": "Received",
"lastModified": "2024-03-22T19:02:10.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-32753",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-22T16:15:07.977",
"lastModified": "2024-03-22T16:15:07.977",
"vulnStatus": "Received",
"lastModified": "2024-03-22T19:02:10.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-32754",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-22T16:15:08.267",
"lastModified": "2024-03-22T16:15:08.267",
"vulnStatus": "Received",
"lastModified": "2024-03-22T19:02:10.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-32756",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-22T16:15:08.733",
"lastModified": "2024-03-22T16:15:08.733",
"vulnStatus": "Received",
"lastModified": "2024-03-22T19:02:10.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23349",
"sourceIdentifier": "vulnerability@kaspersky.com",
"published": "2024-03-22T17:15:07.537",
"lastModified": "2024-03-22T17:15:07.537",
"vulnStatus": "Received",
"lastModified": "2024-03-22T19:02:10.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-29153",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-14T14:15:49.303",
"lastModified": "2024-02-14T15:01:55.963",
"lastModified": "2024-03-22T19:15:07.753",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Uncontrolled resource consumption for some Intel(R) SPS firmware before version SPS_E5_06.01.04.002.0 may allow a privileged user to potentially enable denial of service via network access."
},
{
"lang": "es",
"value": "El consumo incontrolado de recursos para algunos firmware Intel(R) SPS anteriores a la versi\u00f3n SPS_E5_06.01.04.002.0 puede permitir que un usuario privilegiado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red."
}
],
"metrics": {
@ -47,6 +51,10 @@
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240322-0005/",
"source": "secure@intel.com"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01003.html",
"source": "secure@intel.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4063",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2024-03-22T18:15:07.987",
"lastModified": "2024-03-22T18:15:07.987",
"vulnStatus": "Received",
"lastModified": "2024-03-22T19:02:10.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-43051",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-26T16:27:46.860",
"lastModified": "2024-02-26T16:32:25.577",
"lastModified": "2024-03-22T19:15:07.863",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM Cognos Analytics 11.1.7, 11.2.4, and 12.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 267451."
},
{
"lang": "es",
"value": "IBM Cognos Analytics 11.1.7, 11.2.4 y 12.0.0 es vulnerable a cross-site scripting. Esta vulnerabilidad permite a los usuarios incrustar c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista, lo que podr\u00eda conducir a la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n confiable. ID de IBM X-Force: 267451."
}
],
"metrics": {
@ -51,6 +55,10 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/267451",
"source": "psirt@us.ibm.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240322-0008/",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7123154",
"source": "psirt@us.ibm.com"

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-5685",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-03-22T19:15:07.983",
"lastModified": "2024-03-22T19:15:07.983",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in XNIO. The XNIO NotifierState that can cause a Stack Overflow Exception when the chain of notifier states becomes problematically large can lead to uncontrolled resource management and a possible denial of service (DoS)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-5685",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241822",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6660",
"sourceIdentifier": "secteam@freebsd.org",
"published": "2023-12-13T09:15:34.730",
"lastModified": "2023-12-20T18:32:04.497",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-22T19:15:08.220",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -139,6 +139,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240322-0002/",
"source": "secteam@freebsd.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1635",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-02-19T22:15:48.647",
"lastModified": "2024-02-20T19:50:53.960",
"lastModified": "2024-03-22T19:15:08.357",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -58,6 +58,10 @@
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264928",
"source": "secalert@redhat.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240322-0007/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21892",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-02-20T02:15:50.567",
"lastModified": "2024-02-20T19:50:53.960",
"lastModified": "2024-03-22T19:15:08.477",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -42,6 +42,10 @@
{
"url": "https://hackerone.com/reports/2237545",
"source": "support@hackerone.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240322-0003/",
"source": "support@hackerone.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2227",
"sourceIdentifier": "psirt@sailpoint.com",
"published": "2024-03-22T16:15:09.253",
"lastModified": "2024-03-22T16:15:09.253",
"vulnStatus": "Received",
"lastModified": "2024-03-22T19:02:10.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2228",
"sourceIdentifier": "psirt@sailpoint.com",
"published": "2024-03-22T16:15:09.757",
"lastModified": "2024-03-22T16:15:09.757",
"vulnStatus": "Received",
"lastModified": "2024-03-22T19:02:10.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-25617",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-14T21:15:08.197",
"lastModified": "2024-02-15T06:23:39.303",
"lastModified": "2024-03-22T19:15:08.553",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Collapse of Data into Unsafe Value bug ,Squid may be vulnerable to a Denial of Service attack against HTTP header parsing. This problem allows a remote client or a remote server to perform Denial of Service when sending oversized headers in HTTP messages. In versions of Squid prior to 6.5 this can be achieved if the request_header_max_size or reply_header_max_size settings are unchanged from the default. In Squid version 6.5 and later, the default setting of these parameters is safe. Squid will emit a critical warning in cache.log if the administrator is setting these parameters to unsafe values. Squid will not at this time prevent these settings from being changed to unsafe values. Users are advised to upgrade to version 6.5. There are no known workarounds for this vulnerability. This issue is also tracked as SQUID-2024:2 "
},
{
"lang": "es",
"value": "Squid es un proxy de almacenamiento en cach\u00e9 de c\u00f3digo abierto para la Web que admite HTTP, HTTPS, FTP y m\u00e1s. Debido a un error de colapso de datos en valor inseguro, Squid puede ser vulnerable a un ataque de denegaci\u00f3n de servicio contra el an\u00e1lisis de encabezados HTTP. Este problema permite que un cliente remoto o un servidor remoto realice una Denegaci\u00f3n de Servicio al enviar encabezados de gran tama\u00f1o en mensajes HTTP. En versiones de Squid anteriores a la 6.5, esto se puede lograr si las configuraciones request_header_max_size o Reply_header_max_size no se modifican con respecto a las predeterminadas. En la versi\u00f3n 6.5 y posteriores de Squid, la configuraci\u00f3n predeterminada de estos par\u00e1metros es segura. Squid emitir\u00e1 una advertencia cr\u00edtica en cache.log si el administrador configura estos par\u00e1metros en valores no seguros. Squid no impedir\u00e1 en este momento que estas configuraciones se cambien a valores inseguros. Se recomienda a los usuarios que actualicen a la versi\u00f3n 6.5. No se conocen workarounds para esta vulnerabilidad. Este problema tambi\u00e9n se rastrea como SQUID-2024:2"
}
],
"metrics": {
@ -58,6 +62,10 @@
{
"url": "https://github.com/squid-cache/squid/security/advisories/GHSA-h5x6-w8mv-xfpr",
"source": "security-advisories@github.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240322-0006/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28757",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-10T05:15:06.570",
"lastModified": "2024-03-19T03:15:06.893",
"lastModified": "2024-03-22T19:15:08.663",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -31,6 +31,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKJ7V5F6LJCEQJXDBWGT27J7NAP3E3N7/",
"source": "cve@mitre.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240322-0001/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28861",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-22T17:15:07.770",
"lastModified": "2024-03-22T17:15:07.770",
"vulnStatus": "Received",
"lastModified": "2024-03-22T19:02:10.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2820",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-22T16:15:10.193",
"lastModified": "2024-03-22T16:15:10.193",
"vulnStatus": "Received",
"lastModified": "2024-03-22T19:02:10.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2821",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-22T16:15:10.933",
"lastModified": "2024-03-22T16:15:10.933",
"vulnStatus": "Received",
"lastModified": "2024-03-22T19:02:10.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2822",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-22T17:15:09.093",
"lastModified": "2024-03-22T17:15:09.093",
"vulnStatus": "Received",
"lastModified": "2024-03-22T19:02:10.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2823",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-22T17:15:09.360",
"lastModified": "2024-03-22T17:15:09.360",
"vulnStatus": "Received",
"lastModified": "2024-03-22T19:02:10.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2824",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-22T18:15:08.063",
"lastModified": "2024-03-22T18:15:08.063",
"vulnStatus": "Received",
"lastModified": "2024-03-22T19:02:10.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2825",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-22T19:15:08.757",
"lastModified": "2024-03-22T19:15:08.757",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in lakernote EasyAdmin up to 20240315. This affects an unknown part of the file /ureport/designer/saveReportFile. The manipulation of the argument file leads to path traversal: '../filedir'. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257715."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-24"
}
]
}
],
"references": [
{
"url": "https://gitee.com/lakernote/easy-admin/issues/I98ZTA",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257715",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257715",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2826",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-22T19:15:08.997",
"lastModified": "2024-03-22T19:15:08.997",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in lakernote EasyAdmin up to 20240315. This vulnerability affects unknown code of the file /ureport/designer/saveReportFile. The manipulation leads to xml external entity reference. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257716."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"references": [
{
"url": "https://gitee.com/lakernote/easy-admin/issues/I98ZTA",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257716",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257716",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2827",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-22T19:15:09.227",
"lastModified": "2024-03-22T19:15:09.227",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in lakernote EasyAdmin up to 20240315. This issue affects some unknown processing of the file /ureport/designer/saveReportFile. The manipulation leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257717 was assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://gitee.com/lakernote/easy-admin/issues/I98ZTA",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257717",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257717",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-2828",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-22T20:15:07.440",
"lastModified": "2024-03-22T20:15:07.440",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in lakernote EasyAdmin up to 20240315. Affected is the function thumbnail of the file src/main/java/com/laker/admin/module/sys/controller/IndexController.java. The manipulation of the argument url leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 23165d8cb569048c531150f194fea39f8800b8d5. It is recommended to apply a patch to fix this issue. VDB-257718 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://gitee.com/lakernote/easy-admin/commit/23165d8cb569048c531150f194fea39f8800b8d5",
"source": "cna@vuldb.com"
},
{
"url": "https://gitee.com/lakernote/easy-admin/issues/I98YSR",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257718",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257718",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29042",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-22T17:15:07.990",
"lastModified": "2024-03-22T17:15:07.990",
"vulnStatus": "Received",
"lastModified": "2024-03-22T19:02:10.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29184",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-22T17:15:08.203",
"lastModified": "2024-03-22T17:15:08.203",
"vulnStatus": "Received",
"lastModified": "2024-03-22T19:02:10.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29185",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-22T17:15:08.440",
"lastModified": "2024-03-22T17:15:08.440",
"vulnStatus": "Received",
"lastModified": "2024-03-22T19:02:10.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29186",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-22T17:15:08.640",
"lastModified": "2024-03-22T17:15:08.640",
"vulnStatus": "Received",
"lastModified": "2024-03-22T19:02:10.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29338",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-22T17:15:08.833",
"lastModified": "2024-03-22T17:15:08.833",
"vulnStatus": "Received",
"lastModified": "2024-03-22T19:02:10.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29366",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-22T17:15:08.887",
"lastModified": "2024-03-22T17:15:08.887",
"vulnStatus": "Received",
"lastModified": "2024-03-22T19:02:10.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29385",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-22T17:15:08.943",
"lastModified": "2024-03-22T17:15:08.943",
"vulnStatus": "Received",
"lastModified": "2024-03-22T19:02:10.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29499",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-22T17:15:08.993",
"lastModified": "2024-03-22T17:15:08.993",
"vulnStatus": "Received",
"lastModified": "2024-03-22T19:02:10.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-22T19:00:38.344084+00:00
2024-03-22T21:00:38.287872+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-22T18:15:08.063000+00:00
2024-03-22T20:15:07.440000+00:00
```
### Last Data Feed Release
@ -29,34 +29,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
242468
242473
```
### CVEs added in the last Commit
Recently added CVEs: `14`
Recently added CVEs: `5`
* [CVE-2023-23349](CVE-2023/CVE-2023-233xx/CVE-2023-23349.json) (`2024-03-22T17:15:07.537`)
* [CVE-2023-4063](CVE-2023/CVE-2023-40xx/CVE-2023-4063.json) (`2024-03-22T18:15:07.987`)
* [CVE-2024-2822](CVE-2024/CVE-2024-28xx/CVE-2024-2822.json) (`2024-03-22T17:15:09.093`)
* [CVE-2024-2823](CVE-2024/CVE-2024-28xx/CVE-2024-2823.json) (`2024-03-22T17:15:09.360`)
* [CVE-2024-2824](CVE-2024/CVE-2024-28xx/CVE-2024-2824.json) (`2024-03-22T18:15:08.063`)
* [CVE-2024-28861](CVE-2024/CVE-2024-288xx/CVE-2024-28861.json) (`2024-03-22T17:15:07.770`)
* [CVE-2024-29042](CVE-2024/CVE-2024-290xx/CVE-2024-29042.json) (`2024-03-22T17:15:07.990`)
* [CVE-2024-29184](CVE-2024/CVE-2024-291xx/CVE-2024-29184.json) (`2024-03-22T17:15:08.203`)
* [CVE-2024-29185](CVE-2024/CVE-2024-291xx/CVE-2024-29185.json) (`2024-03-22T17:15:08.440`)
* [CVE-2024-29186](CVE-2024/CVE-2024-291xx/CVE-2024-29186.json) (`2024-03-22T17:15:08.640`)
* [CVE-2024-29338](CVE-2024/CVE-2024-293xx/CVE-2024-29338.json) (`2024-03-22T17:15:08.833`)
* [CVE-2024-29366](CVE-2024/CVE-2024-293xx/CVE-2024-29366.json) (`2024-03-22T17:15:08.887`)
* [CVE-2024-29385](CVE-2024/CVE-2024-293xx/CVE-2024-29385.json) (`2024-03-22T17:15:08.943`)
* [CVE-2024-29499](CVE-2024/CVE-2024-294xx/CVE-2024-29499.json) (`2024-03-22T17:15:08.993`)
* [CVE-2023-5685](CVE-2023/CVE-2023-56xx/CVE-2023-5685.json) (`2024-03-22T19:15:07.983`)
* [CVE-2024-2825](CVE-2024/CVE-2024-28xx/CVE-2024-2825.json) (`2024-03-22T19:15:08.757`)
* [CVE-2024-2826](CVE-2024/CVE-2024-28xx/CVE-2024-2826.json) (`2024-03-22T19:15:08.997`)
* [CVE-2024-2827](CVE-2024/CVE-2024-28xx/CVE-2024-2827.json) (`2024-03-22T19:15:09.227`)
* [CVE-2024-2828](CVE-2024/CVE-2024-28xx/CVE-2024-2828.json) (`2024-03-22T20:15:07.440`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `30`
* [CVE-2024-29944](CVE-2024/CVE-2024-299xx/CVE-2024-29944.json) (`2024-03-22T17:15:09.043`)
* [CVE-2023-23349](CVE-2023/CVE-2023-233xx/CVE-2023-23349.json) (`2024-03-22T19:02:10.300`)
* [CVE-2023-29153](CVE-2023/CVE-2023-291xx/CVE-2023-29153.json) (`2024-03-22T19:15:07.753`)
* [CVE-2023-4063](CVE-2023/CVE-2023-40xx/CVE-2023-4063.json) (`2024-03-22T19:02:10.300`)
* [CVE-2023-43051](CVE-2023/CVE-2023-430xx/CVE-2023-43051.json) (`2024-03-22T19:15:07.863`)
* [CVE-2023-6660](CVE-2023/CVE-2023-66xx/CVE-2023-6660.json) (`2024-03-22T19:15:08.220`)
* [CVE-2024-1635](CVE-2024/CVE-2024-16xx/CVE-2024-1635.json) (`2024-03-22T19:15:08.357`)
* [CVE-2024-21892](CVE-2024/CVE-2024-218xx/CVE-2024-21892.json) (`2024-03-22T19:15:08.477`)
* [CVE-2024-2227](CVE-2024/CVE-2024-22xx/CVE-2024-2227.json) (`2024-03-22T19:02:10.300`)
* [CVE-2024-2228](CVE-2024/CVE-2024-22xx/CVE-2024-2228.json) (`2024-03-22T19:02:10.300`)
* [CVE-2024-25617](CVE-2024/CVE-2024-256xx/CVE-2024-25617.json) (`2024-03-22T19:15:08.553`)
* [CVE-2024-2820](CVE-2024/CVE-2024-28xx/CVE-2024-2820.json) (`2024-03-22T19:02:10.300`)
* [CVE-2024-2821](CVE-2024/CVE-2024-28xx/CVE-2024-2821.json) (`2024-03-22T19:02:10.300`)
* [CVE-2024-2822](CVE-2024/CVE-2024-28xx/CVE-2024-2822.json) (`2024-03-22T19:02:10.300`)
* [CVE-2024-2823](CVE-2024/CVE-2024-28xx/CVE-2024-2823.json) (`2024-03-22T19:02:10.300`)
* [CVE-2024-2824](CVE-2024/CVE-2024-28xx/CVE-2024-2824.json) (`2024-03-22T19:02:10.300`)
* [CVE-2024-28757](CVE-2024/CVE-2024-287xx/CVE-2024-28757.json) (`2024-03-22T19:15:08.663`)
* [CVE-2024-28861](CVE-2024/CVE-2024-288xx/CVE-2024-28861.json) (`2024-03-22T19:02:10.300`)
* [CVE-2024-29042](CVE-2024/CVE-2024-290xx/CVE-2024-29042.json) (`2024-03-22T19:02:10.300`)
* [CVE-2024-29184](CVE-2024/CVE-2024-291xx/CVE-2024-29184.json) (`2024-03-22T19:02:10.300`)
* [CVE-2024-29185](CVE-2024/CVE-2024-291xx/CVE-2024-29185.json) (`2024-03-22T19:02:10.300`)
* [CVE-2024-29186](CVE-2024/CVE-2024-291xx/CVE-2024-29186.json) (`2024-03-22T19:02:10.300`)
* [CVE-2024-29338](CVE-2024/CVE-2024-293xx/CVE-2024-29338.json) (`2024-03-22T19:02:10.300`)
* [CVE-2024-29366](CVE-2024/CVE-2024-293xx/CVE-2024-29366.json) (`2024-03-22T19:02:10.300`)
* [CVE-2024-29385](CVE-2024/CVE-2024-293xx/CVE-2024-29385.json) (`2024-03-22T19:02:10.300`)
* [CVE-2024-29499](CVE-2024/CVE-2024-294xx/CVE-2024-29499.json) (`2024-03-22T19:02:10.300`)
## Download and Usage

View File

@ -191655,7 +191655,7 @@ CVE-2022-23081,0,0,92fc6d1d29c87f2952b022526cbb1a137f6435f167e1d332cef0947987e6a
CVE-2022-23082,0,0,7b77627dacee339d3f27d4fd3f74cb3b68d585f2bc0428af75e8d633f99eea15,2022-06-10T00:39:46.607000
CVE-2022-23083,0,0,ede0b39f0eae3f65726b2eb36f846795230e90bbaa11c7ece99ac56986dc0854,2022-01-26T14:23:02.100000
CVE-2022-23084,0,0,04160bbcfd9324186e4896949a5add3cb3e71ff1def48238d816adff2fa73b27,2024-02-15T06:23:39.303000
CVE-2022-23085,0,0,e13c4a1ccb9786ec979a88598c7fc379a33f5e16fe1bc423c53ebc156bda1b0c,2024-02-15T06:23:39.303000
CVE-2022-23085,0,1,4862360e2528a7f3b26d6f031a57984afa63276521f57b928bc1d8b3083ab198,2024-03-22T19:15:07.650000
CVE-2022-23086,0,0,098a33b517f22a38be576161b43ba9bd0fb5bc8ef8fd6d58311c4342470149d4,2024-02-15T06:23:39.303000
CVE-2022-23087,0,0,8878a6b7b122486861ea9f63b4b1a377bcf792fbf530755b9bb6a2a22c99234e,2024-02-15T06:23:39.303000
CVE-2022-23088,0,0,778009fce3711df883682d5e1b0c5fe56b6aca8b790181c3f7a122c5ea48a75a,2024-02-15T06:23:39.303000
@ -199675,12 +199675,12 @@ CVE-2022-32748,0,0,12d95fb046dde5fe70533c24d624c6e5ee50992627306782ac3b6e2d57e30
CVE-2022-32749,0,0,fa4b0578329dd6663c41aab6332fe3a009a6352d3048c67590a025fbfc80725b,2023-11-07T03:48:10.840000
CVE-2022-3275,0,0,2ada777ba4fe14741281c0fe6389aae639fea4dc7bc990624a0baa5c550d6dd0,2023-11-07T03:51:03.140000
CVE-2022-32750,0,0,be240222bc7b4e443b690a99516f8e3e5e0b021369f0a4682c51ec1495f48e73,2022-08-05T03:33:24.233000
CVE-2022-32751,0,0,8ecdec290e191e372d2736ab33ac8a9249796c273c478d84de8a9f719d3cf31f,2024-03-22T16:15:07.747000
CVE-2022-32751,0,1,cc91968de6ecbe2cf1c3132e078091bc179cbb69d34654835436a0c4ee3b4132,2024-03-22T19:02:10.300000
CVE-2022-32752,0,0,cfc109c912ad27a3b0d9db248d18f17c506d4bb154c24bc2ea384ccf063f716c,2023-06-21T01:22:07.243000
CVE-2022-32753,0,0,05ef46e92d6bbc2aa602861dfc26980b3e77a706908fa294a3d8c50a0e2da581,2024-03-22T16:15:07.977000
CVE-2022-32754,0,0,8f9cae46e8901608570e3c0deb1609b85c570c10011647d82f8129ffa40141cd,2024-03-22T16:15:08.267000
CVE-2022-32753,0,1,52002472ea9f5ca6d61ca62dbd9728c65bed3c939a04a14a37031d6662a81a41,2024-03-22T19:02:10.300000
CVE-2022-32754,0,1,d5acd4304c284e24d038e27e5ed8f9ba87f7e3638467928281b522a0c7436246,2024-03-22T19:02:10.300000
CVE-2022-32755,0,0,78db0cc46846679eba38a47b9504c478bbf49868c87be8c2f21bb60fe24ebe93,2023-10-18T20:13:07.170000
CVE-2022-32756,0,0,ce202dbec1b852328dbb2211f212b56b3569eccdc55c1a4e31021cbcdc7def52,2024-03-22T16:15:08.733000
CVE-2022-32756,0,1,2c25a4e3b49458636e235ed3fb6256acc4899a2629e40e6925901fb1d5f8d959,2024-03-22T19:02:10.300000
CVE-2022-32757,0,0,50af599d51e522df6229dfe99595a93d0417a8e1c1acb24f11835f10f47fcfa9,2023-06-21T01:22:29.450000
CVE-2022-3276,0,0,d295c8d189e59afc9ded96cfda4fccc2270469313c1318230eb2bde71df7bbe9,2023-06-29T14:57:08.057000
CVE-2022-32760,0,0,c8c19c99ac7a39571c5a813ffdcc61096bb32974aedcb231eec121a421e99717,2022-10-26T15:45:56.503000
@ -216086,7 +216086,7 @@ CVE-2023-23344,0,0,c3150eedbf7de0afcdfc087a5f189ee4dff2eb5b60e1721a34334921f67c9
CVE-2023-23346,0,0,ea86441ecf16e51df5e4c9c4693d1f65a0fe8b4f0f2b8f115f4f2770bd0bcc8c,2023-08-15T19:58:44.960000
CVE-2023-23347,0,0,13f3838481a68fd224df3be381a69410cab2301a4229ceef6f0f25b899857b93,2023-08-16T17:00:58.277000
CVE-2023-23348,0,0,fbea26df1da2123a83a8ed5bd4c0234093811af84a51851e16c9d85fb38d4daf,2023-07-19T15:48:28.893000
CVE-2023-23349,1,1,40dc3358f87433170c43076a4b6cfde5e6b9347950a867daf0b77530741ec962,2024-03-22T17:15:07.537000
CVE-2023-23349,0,1,3e8df101b57cd924917384d469b4a808cf3c5ae882f738adff4ad0701b0985ff,2024-03-22T19:02:10.300000
CVE-2023-2335,0,0,339a0dea1e8876f4ac4268f144f1ccbe4ba3397a41171c9af9dd38c76d84c5bd,2023-05-08T18:42:19.487000
CVE-2023-23355,0,0,926897abda4d6878042bd854c355d3043e3cb6601dc8c13e2b97a1772a8985a7,2023-09-01T17:10:05.397000
CVE-2023-2336,0,0,d0922cbf77ca909d65209da9e15efdb11ab911a91173f24072245c379f759d1c,2023-05-04T20:03:07.463000
@ -220770,7 +220770,7 @@ CVE-2023-2915,0,0,168882ef204f8a36ee8ef82a9432cd5343ca74f262d168e3d336fc98058e75
CVE-2023-29150,0,0,a9c42fdcce1808ac5e066d73829e288e0add70103ec7060ebd07b91b70cac2a4,2023-11-07T04:11:05.567000
CVE-2023-29151,0,0,8b282ad5e768447dcc83c4b9a86535a4eb8bb1914917efc97113c0f5b75507de,2023-11-07T04:11:05.710000
CVE-2023-29152,0,0,24a4cb55359be8fa7a941223141ca7629f3fb02645428a9e9407271e82af058d,2023-06-15T19:03:37.987000
CVE-2023-29153,0,0,56e36c8db5b1b8f113befd9dec6cf1d6fd48f6a938b6f58a05c63424c5039798,2024-02-14T15:01:55.963000
CVE-2023-29153,0,1,8530df7f1d0c1ff11ef3e8de00b2bbea86f4c9e41dd41dd66693149a4d3a0d7d,2024-03-22T19:15:07.753000
CVE-2023-29154,0,0,5090eaba4c84956bd8b3c3926425e7ee1b7bb276d7767f81c217b7504d754e38,2023-06-08T01:53:05.697000
CVE-2023-29155,0,0,d402a7f72ba44d6f1224cdae8d592d537f9ecead6425666522cc301ccc05e2d1,2023-11-29T20:52:57.780000
CVE-2023-29156,0,0,651012f8c4b9a83cb31f77aaac57b4963d44a60b69787d1283079b25cc3bc8dc,2023-07-20T02:11:22.203000
@ -228798,7 +228798,7 @@ CVE-2023-40626,0,0,14c5cf1bfbca2b23ebad2f11b78565813acb41151d0dca96bfa5a9ae9f54c
CVE-2023-40627,0,0,449481562920ae7df5ab85167f856423ef8035bf312ec23da04b2814bdb7b734,2023-12-18T20:00:04.487000
CVE-2023-40628,0,0,4549b08725f9cff403fb1be0ef8599c74c287dcd63b9c5fb0ea7cb672495668d,2023-12-18T20:00:24.987000
CVE-2023-40629,0,0,70d3147bc660158bec92ef1ec182bab92ccc373e32b0d642c7a7684dace823ac,2023-12-19T17:18:40.347000
CVE-2023-4063,1,1,fdc5e49d178593d9ca038ec55bfe38e83490acce478045eea89cbc4e1d50d1a1,2024-03-22T18:15:07.987000
CVE-2023-4063,0,1,2cd430d1d6528947257c1940b88621f45921ae815db354b3c459f55f283e219c,2024-03-22T19:02:10.300000
CVE-2023-40630,0,0,ae87b9feac8764d8fd0d161ce81c1df2d9831d6bb67107aaea9b4439e20dbdc3,2023-12-20T20:13:31.610000
CVE-2023-40631,0,0,7068bbe343dc3d760cd93ffbf8db22edb532565c92dfcb0e1ffb581e5df8f689,2023-10-11T17:30:22.077000
CVE-2023-40632,0,0,9e0300b2fe49d63c3bd32cf44b1fb57032bd97c2e1b1ef38e3026138ebf23486,2023-10-11T17:30:35.847000
@ -230314,7 +230314,7 @@ CVE-2023-43042,0,0,c288ece6660ac5a136d6bc934f9aaa48e9f389c0348766072b07b7d134b77
CVE-2023-43043,0,0,e470117b783987d989642fb789f0734a76eedb925978b0dd0c218afe87703d5c,2024-03-13T12:33:51.697000
CVE-2023-43044,0,0,9ac76b88b15848176985813ea4cc6c90d9d2cc43a599d7ecd67732370be5224c,2023-10-03T00:42:10.740000
CVE-2023-43045,0,0,615ff04eb4ccc37953d7722ecd16952879ca2876fbb52885620eca88a67e35af,2023-10-28T03:33:35.547000
CVE-2023-43051,0,0,77b07505e5cd9c7e1920cd645ed73206a1f96a85220915ef765381a6ccbd5cc9,2024-02-26T16:32:25.577000
CVE-2023-43051,0,1,c9fb94001c0c3c1949d0bb08ba95deb9ec936d5595f5c82ab882d549381ee8f7,2024-03-22T19:15:07.863000
CVE-2023-43054,0,0,e1371af426ac40d5cb51ee0d6f5e04703b11b9cec4e448cb252b2ed2e1b6d7df,2024-03-04T13:58:23.447000
CVE-2023-43057,0,0,69895e7900a4802591b2f4d070e89e5d69fc2e7f2801e5557138cbea9f7fc289,2023-11-16T23:28:14.137000
CVE-2023-43058,0,0,d08277bf58900ebae0c376ce0ed38a948ce8c64a98e1b21f7749eb6aab0abc76,2023-10-10T19:24:52.810000
@ -236496,6 +236496,7 @@ CVE-2023-5681,0,0,975b08955300793c6b3af24ebbe3602bbc1e9acabe5dd8fe4ba721d4d500ae
CVE-2023-5682,0,0,69dcd3bda57c9399dedc9edde6ce81cc0f68df9cd3669caa48f6a7dee0fa8e1e,2024-03-21T02:50:21.990000
CVE-2023-5683,0,0,b997b104a14d460e364dd91ac8fd6cff3e1abeca044398d07d6a32f089ba0929,2024-03-21T02:50:22.103000
CVE-2023-5684,0,0,56df29df1aefcc26e68c18fe74b0996dad5e1a66c32bb86282322df07f9ee884,2024-03-21T02:50:22.193000
CVE-2023-5685,1,1,e90a4a3dbaa43eb0a909d207218612e4406891826f60b0cae63af70fe451be1f,2024-03-22T19:15:07.983000
CVE-2023-5686,0,0,14e9a4f551dedb4d867ff16706440a6a3cb2d418db4a34eccb414d1c48955525,2024-01-21T03:20:51.297000
CVE-2023-5687,0,0,163c067ad4e8b872c5abffc6eb0e33e3ec476cd671e69e540f448f37eb4f9636,2023-10-27T18:51:42.730000
CVE-2023-5688,0,0,06a783b4a174a26699fc289ad2f278ef95fec4ff44eb7fd150fc30bbf083b5a6,2023-10-27T18:51:36
@ -237307,7 +237308,7 @@ CVE-2023-6656,0,0,a84b60f7c2270a2628222cb580bd15ade281033aa09a351cf0b7810efe6fb6
CVE-2023-6657,0,0,ed3efc02f6b6c3398f93fcd747143920cc2d0d30ba508dfa03ec8cbec570e89c,2024-03-21T02:50:42.750000
CVE-2023-6658,0,0,498ce24b1ae9fe66087063961354bf9d4827fb9f5157c89ac26c46414b534295,2024-03-21T02:50:42.847000
CVE-2023-6659,0,0,80f54b5eb04b59851aec31e0de9fdd698ab1532f8bf0db942d2ac06c78628823,2024-03-21T02:50:42.960000
CVE-2023-6660,0,0,d827737912f6d855529a793c6c97783a3fce4f82de440f7552c90e2c4a0d362b,2023-12-20T18:32:04.497000
CVE-2023-6660,0,1,38844144a722e4fa955ada2a09170c1fc4cefa830c90320e27d38ceec9d34d25,2024-03-22T19:15:08.220000
CVE-2023-6671,0,0,2dbda7d6c2af2fbe867d2d2b44c49ca99a3c1d3fbdcd4cb2169489d55aab0fad,2023-12-13T20:26:53.753000
CVE-2023-6672,0,0,599f5954315a5c24c8d476d1a07f9dc14e91fa334330b58cfece93c7950a9dfd,2024-02-06T17:03:45.610000
CVE-2023-6673,0,0,a7829d7ff2451577a9dbcb953671b7df30e70fa4d3f295b66d6fd6c03bcedb82,2024-02-06T17:03:31.730000
@ -238920,7 +238921,7 @@ CVE-2024-1624,0,0,67ec40e5c3fa09b35ea998f014823e4639ce179ca19a19b5112abed94e17b4
CVE-2024-1631,0,0,fc2893d5d84aff0551fae290d2fe3cfb3246f815cc3e85e7be8cb7a443e59ea9,2024-02-22T19:07:37.840000
CVE-2024-1632,0,0,6e1c47780d96ad6fcb59ec0ca790b51a445b7ba6bfe735fc687e801fa4e9fa24,2024-02-28T14:06:45.783000
CVE-2024-1633,0,0,38fdaaa081cb72684e8a3a7c24003a4981094738f4cb62580982692842e12368,2024-02-20T19:50:53.960000
CVE-2024-1635,0,0,afdfc88a91b3e19c23e9baf0c4ef009675cb15f38c497a875cb9cabeec1970db,2024-02-20T19:50:53.960000
CVE-2024-1635,0,1,7e65d8ca84ffb40c62a1bd7446f2ac1854a183f40c187e3af538856894a18d62,2024-03-22T19:15:08.357000
CVE-2024-1636,0,0,110561fc2d8220a09cd098605d5d9c82332c44e2266859d6f751e2ed66576fc3,2024-02-28T14:06:45.783000
CVE-2024-1638,0,0,3d25792f560ad8670a55d542406f093195536acafd656ae4b3cd5fcca03c7380,2024-02-20T19:50:53.960000
CVE-2024-1640,0,0,c57051a5e767fa9f88eac9664694cd4d79cbf1efeb3263545f91cbc92216bb9e,2024-03-13T18:15:58.530000
@ -239792,7 +239793,7 @@ CVE-2024-21887,0,0,27308d07d43795d3f4289d79a64af5933e89a71cf679d41be9d0c5a30a308
CVE-2024-21888,0,0,eafebd7f30818e8036790fc3c83d6cd7cc7a89b258668430c4b64c79614679d2,2024-01-31T19:53:06.303000
CVE-2024-21890,0,0,d0d6d1a152080740d6ba84ad392a919d70445665b25a7f6969e602652f189cf2,2024-03-15T11:15:08.687000
CVE-2024-21891,0,0,e424ef0f7a416dd53e40d650cdce75de43c958a1f5dba4ec358496f75617d5f2,2024-03-15T11:15:08.753000
CVE-2024-21892,0,0,e9e7cd547b9c865ef0f7d643a8d56e423d474c52d8079510bad9fcfef1233a4d,2024-02-20T19:50:53.960000
CVE-2024-21892,0,1,20e5acefe40d87bdcf0ddd06c773a67f885e875636f69c9336b01748da654b1a,2024-03-22T19:15:08.477000
CVE-2024-21893,0,0,2d188d3c7852b895bab2eb60f33b22f9fc7e1606c5595723c82f7fae54df9f67,2024-02-01T02:00:01.187000
CVE-2024-21896,0,0,f2e89bd11f46e09b5e1cac8d09f61e5326ff446268c7f7ea5ae718519ecd8d4a,2024-02-20T19:50:53.960000
CVE-2024-21899,0,0,bf4b237bf33a91c77058b40d96fade08e251396e11b195174268294eb6097b75,2024-03-13T14:25:02.043000
@ -239963,8 +239964,8 @@ CVE-2024-22256,0,0,7ccfa1d456f911dd1ae59428e390bb74a9bd8e0f03e6ec12672c279cdd5bf
CVE-2024-22257,0,0,34c85339ac70eb2c2af98809ab89dc5857beeaeafaeac062892b83f8d35a670b,2024-03-18T19:40:00.173000
CVE-2024-22258,0,0,a7d369f4d2ce0ff0a0995d78cb38129ddb8b0575c7ca9ef033ac671b447853b7,2024-03-20T13:00:16.367000
CVE-2024-22259,0,0,ec8de6495a91d5b1464de53566787e4629f0eb6394a50a8b81cbeb5396d883a1,2024-03-17T22:38:29.433000
CVE-2024-2227,0,0,beb2e2df2eec4b0fd73c28e50c8471584bde8fedf08df6735dd1388cb8d503a2,2024-03-22T16:15:09.253000
CVE-2024-2228,0,0,b19a833e375d4f1e1e999722379cdd40cd93f00fd37110ec65f1f33dd3652f34,2024-03-22T16:15:09.757000
CVE-2024-2227,0,1,60f91808680c270a353fdfaaf6b62de82bab2cdf2f7fb6f9e970ea2b03ddddf5,2024-03-22T19:02:10.300000
CVE-2024-2228,0,1,10224e4c12836a79d205c873017753b059c720214234ca290cb346e8deff20d0,2024-03-22T19:02:10.300000
CVE-2024-22282,0,0,53d62e993d25bddde67f64a9b7b05dfd45a21e7eb7c9bf0be8fb90ec2911d888,2024-02-06T16:55:19.983000
CVE-2024-22283,0,0,f9f0bb31955cdc5efe0fe68bd93a1968461b937d4826bd6ada9de29ff0f15691,2024-02-01T04:13:41.033000
CVE-2024-22284,0,0,6bdde6ee668a94e34697b63e60243d3bba5e1198be225d5e35c53bee953243fe,2024-01-30T17:43:02.180000
@ -241355,7 +241356,7 @@ CVE-2024-25613,0,0,7f1b3624c63428ec6d1d29574479c91c783edf25de1e80833547cabd596b8
CVE-2024-25614,0,0,40870767459011e297497de817aef42d74930f89baf5f764fcc19618de4a7138,2024-03-06T15:18:08.093000
CVE-2024-25615,0,0,acf89427f3010b7007b44229a1d165cabfd84113acd72ac65a4b2696544988f2,2024-03-06T15:18:08.093000
CVE-2024-25616,0,0,08e7e92a31b8175954afe7fe6329cd6c1ab805b72ac96ece1d0fb03d1064f703,2024-03-06T15:18:08.093000
CVE-2024-25617,0,0,d737d9ee2715258f911ebb3f89a3dffbc47a4a22baf4554c7d4e9230aee01721,2024-02-15T06:23:39.303000
CVE-2024-25617,0,1,36384aad6d973fedcf94366c2f0f2585d3f8f1aba5d1f978e32f17819e6101f1,2024-03-22T19:15:08.553000
CVE-2024-25618,0,0,6ed8249b3ca4bef56b61ecd19434b2c991b2098ab9bdaaf5d9d685277d557b66,2024-02-15T06:23:39.303000
CVE-2024-25619,0,0,39abdc988e4d73d7f7229c43ce3f985993a99ce60ee39e82390d8dd27310f40d,2024-02-15T06:23:39.303000
CVE-2024-2562,0,0,11294f14d49ee19273d212c58ab9bc95178d0df9277dc13ad69632015d58755c,2024-03-21T02:52:38.277000
@ -242211,35 +242212,39 @@ CVE-2024-28196,0,0,7046367e0acd02e985287d11a90605d3f19a7e35578ad5f9a01507573328c
CVE-2024-28197,0,0,e70c7d0bb2a78854377299eb50fe7994eaf82f7d86398ed826c936d249a753e2,2024-03-12T12:40:13.500000
CVE-2024-28198,0,0,8816bcf1852d0abd4f85184964ff047a5ee5921e29485ae07c6ebc27fd66ef45,2024-03-12T12:40:13.500000
CVE-2024-28199,0,0,5231113c7bbca70ece75822b236d9f7f6bc016001a14be8a22889155290ed75b,2024-03-12T12:40:13.500000
CVE-2024-2820,0,0,bbaa965f2e065d4e20806e17354a3442036c01802c0bc1f3ef2e293b136ee389,2024-03-22T16:15:10.193000
CVE-2024-2821,0,0,3dd4706a28b59626fd990b30315ee716dc175aad779cbcadb48700d7a8228ead,2024-03-22T16:15:10.933000
CVE-2024-2820,0,1,de513f554807c3e35e4a7a0513b4de8b750341c71fc7dffefd6c1b8e96bba7e8,2024-03-22T19:02:10.300000
CVE-2024-2821,0,1,96aa719bb7337e15cf8c777cc0c3944514907e652cfb7aa45000d0f781d919e9,2024-03-22T19:02:10.300000
CVE-2024-28211,0,0,c1ed1ddd829861cccd703be6254c437e62099ef974f2a29a31d06b3aa407dda5,2024-03-07T13:52:27.110000
CVE-2024-28212,0,0,5a2751cb50b15d5c440d2b8966e76c727b56c2f7e1085394c9464fe62a449a7f,2024-03-07T13:52:27.110000
CVE-2024-28213,0,0,123dce2bcd1dc69568d6c5cbaff040ae81dbab0468f48456713cfbf9a03f5945,2024-03-07T13:52:27.110000
CVE-2024-28214,0,0,76f80df1e3db719174c664a8c6faf2adc85abffc04e0a27143c2db72f7cc0ddc,2024-03-07T13:52:27.110000
CVE-2024-28215,0,0,b75c62903069d346adeb5d4d830666ec30aba706366e0a1ba743e223df9965c6,2024-03-07T13:52:27.110000
CVE-2024-28216,0,0,2a9c0d9bf26dcccba11f21ba5b773a9b1fa8ef0ca0bd0ec8330c8d19a1d9d1ca,2024-03-07T13:52:27.110000
CVE-2024-2822,1,1,0410b9c8075fda88f841b4813718dd786fd320b8ef54aaa976de00ef267e15b2,2024-03-22T17:15:09.093000
CVE-2024-2822,0,1,2610f5ce96e467cfdfbe88a0a281a09b1b1b71407e2f991a84e93422cf7c0761,2024-03-22T19:02:10.300000
CVE-2024-28222,0,0,fc2bb6625872999de46c3fec787964c81811fbafba85fd6aa0a9c0c190c12038,2024-03-07T13:52:27.110000
CVE-2024-28228,0,0,fafeac90b4103ecc037c0d15d4376f652ba43048a680a73a3c13807568e40859,2024-03-07T13:52:27.110000
CVE-2024-28229,0,0,7bfc3b59e790a5126732ec4d8d480f9938166a41475488b32e066c1e064ccb9f,2024-03-07T13:52:27.110000
CVE-2024-2823,1,1,abce7ac6549286066b4649c64a2cc1534f52ccdc048c37bdab4ab26e46520388,2024-03-22T17:15:09.360000
CVE-2024-2823,0,1,1867dc09c5e833da359a0c14ac91c9482d72bb78f2ce80c84c0309fdaa923bfc,2024-03-22T19:02:10.300000
CVE-2024-28230,0,0,3036aa70102b53b9cc695265dc4a11e5a4f5b8d26f6120835dbd1a9c3d93e7ec,2024-03-07T13:52:27.110000
CVE-2024-28231,0,0,f41f4c1605399e97b52547261c763ca0d059815d5c55e921912a149cd091acde,2024-03-21T12:58:51.093000
CVE-2024-28236,0,0,ea7d34bffb060eb0191757ceb4c446ee8bfa4166cb7d1e0d8e67e75c651ba966,2024-03-13T12:33:51.697000
CVE-2024-28237,0,0,e54564ebce9f53fbf47a1a617d4c2539d1d06a16522000543afac14f934cf25f,2024-03-19T13:26:46
CVE-2024-28238,0,0,38219e010007b7fe5426826144cd2eabd2e22d36d31c50aa8471901674b524b3,2024-03-13T12:33:51.697000
CVE-2024-28239,0,0,faccbe471f1ae24e1ff85c8426d7d0f8447bb8e496567a24af19b5962ca5e940,2024-03-13T12:33:51.697000
CVE-2024-2824,1,1,bfbf6fa851c3a8196d2489297e800149fe0953ef6e9a166a3e7400494c948e89,2024-03-22T18:15:08.063000
CVE-2024-2824,0,1,b51ff6d9b96df45cee8ace66bda2fe24718173170fbb213d719055238fa4da73,2024-03-22T19:02:10.300000
CVE-2024-28242,0,0,9b0e39431cf5407ac797c89bdeeecca7ea971387c91b8e8005c08f8a0179928d,2024-03-17T22:38:29.433000
CVE-2024-28248,0,0,b617812c524b85d27f2a46b3a739648463fa9ffb5a6e46ea47ba0c68bd3fa409,2024-03-19T13:26:46
CVE-2024-28249,0,0,7f01b3731d6ed3594265964b9061da88eb89dfe99b6d59bfec8413859c3ac454,2024-03-19T13:26:46
CVE-2024-2825,1,1,eacf4669a03c9f8556fa8d24bd5a24165ee236756d7a77e2c4803bbd556a957e,2024-03-22T19:15:08.757000
CVE-2024-28250,0,0,dacc68b6e843dc808e1d498d69054a425a6f10e258af235d9a1256f74372900d,2024-03-19T13:26:46
CVE-2024-28251,0,0,19fc23d56f5d00fa3c69d993b0deb280b2d4a1df9b73eb3d828c9ec8b6104ec4,2024-03-14T12:52:16.723000
CVE-2024-28252,0,0,ef5b49a93a934440796c2d3d79cb29d26eeed77accae4ad9797588db77e6bd30,2024-03-21T20:15:08.050000
CVE-2024-28253,0,0,b0d1b906324ecf48e7bcfd3c9d0c313a69a8c6ff9baa313b92164ce1f64f0b92,2024-03-17T22:38:29.433000
CVE-2024-28254,0,0,ba6384e5d24a90ea0036dcbe7f89cd48d629aea12c2d3808708fa9f619d07a5b,2024-03-21T02:52:24.507000
CVE-2024-28255,0,0,abc37b2c1df4d41f872020a3754e2ae86c707a3247848b9d32abc1bd5f67bb13,2024-03-17T22:38:29.433000
CVE-2024-2826,1,1,57e7c6395120c3946cdc5a0ac724f302c9d46177e2571796edeed49e9cff99a9,2024-03-22T19:15:08.997000
CVE-2024-2827,1,1,2fd1e21a0982cad0434c8ff0fc3a099a3b021f454e1c2e6517731f7dd1d8e6c4,2024-03-22T19:15:09.227000
CVE-2024-2828,1,1,7ce14b660581b796e183e6813d695dd163e8d699c95d95dc361c37bf6d65fc5a,2024-03-22T20:15:07.440000
CVE-2024-28283,0,0,39f85b2f17c0fe895d0bdb32702da6d7a9c62274d2c91228b15f8ef37a4f9826,2024-03-20T13:00:16.367000
CVE-2024-28286,0,0,0c649cd6694a1837fe5561b872f74550eafab1ff52e9c04655d5ad406a1d7e85,2024-03-21T12:58:51.093000
CVE-2024-28303,0,0,1e1fe6d5ea3f2a6f114bc62ec7183db4733d3d529e4e5786c421b928ce2f2bf1,2024-03-20T13:00:16.367000
@ -242341,7 +242346,7 @@ CVE-2024-28752,0,0,b6856abb589c0fed02798f341901c4f3025e287fced11706e9fa0c89b392c
CVE-2024-28753,0,0,73ca850c1b6879daba607bc61d7d16457b56173a47004b8bff799b514a526c36,2024-03-11T01:32:39.697000
CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3b2c,2024-03-11T01:32:39.697000
CVE-2024-28756,0,0,25c89ab9b64cbd69060fc1b1f68e4f1c76ee574185097dbf9146fc8b2b315bf5,2024-03-22T12:45:36.130000
CVE-2024-28757,0,0,83cb6aefc1d6f4ccc5441198cdfc19ec27b4e109d2bc2864c936baa137f8e197,2024-03-19T03:15:06.893000
CVE-2024-28757,0,1,f5247fa7af57f25ac08cc0e3ce6319bc095bb3d4a934905da56d7c6ce0e13784,2024-03-22T19:15:08.663000
CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000
CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000
CVE-2024-28824,0,0,29abf61aa992ee5bcede73dcd8363195f5ccb0f240073ed24aaff3a2acefaab4,2024-03-22T12:45:36.130000
@ -242354,7 +242359,7 @@ CVE-2024-28851,0,0,f15187ac52243f1288d6dabed456ab5bd2287b2db60c97a538d0582f4f0ba
CVE-2024-28854,0,0,8cb03aded6b194ffbf5e93b6a999bfbf01ac8f736343c4fc752b0e38a8bc9f90,2024-03-17T22:38:29.433000
CVE-2024-28855,0,0,2384a3330fde47f752f152bfa13a6226cb6b236bb18ff2466f5e886c7d3e893c,2024-03-19T13:26:46
CVE-2024-28859,0,0,2d0407c7b83f2786a493b842ae3fe3ce3f906494adee8b0e0f61c75557fcb17c,2024-03-17T22:38:29.433000
CVE-2024-28861,1,1,afae533643c5543fb19fcc8ca13c65a396ed91104ec1390e1ad8a42af3f14965,2024-03-22T17:15:07.770000
CVE-2024-28861,0,1,614b056391803730ffc563205182a9ac310eb6811e0e407400ba2dc4b494f050,2024-03-22T19:02:10.300000
CVE-2024-28862,0,0,b0dc40150b0e5f15633ecb26c2614b37fe6eefbb423911349887989b36d78640,2024-03-17T22:38:29.433000
CVE-2024-28863,0,0,ad7818a88579939a8a2c9b467548624411262308646c7865759640aa6d437826,2024-03-22T12:45:36.130000
CVE-2024-28864,0,0,6556868d08f3b43cf56ee8c0e31629a1275e8137bc2387bf2430488f9854bd36,2024-03-19T13:26:46
@ -242370,7 +242375,7 @@ CVE-2024-29032,0,0,fb02d2202c95545e773ec7caf494a1bc4414b85dfda56ba00a602bc4c558e
CVE-2024-29033,0,0,3da47380cd3a71a38fcec215b864d4658478d80ec3a2925a5a05224fec9ea170,2024-03-21T12:58:51.093000
CVE-2024-29036,0,0,9e006ee4d248b12879916fd5a38e3fbf7a89f45ed6265666710ccd15d4bd0aa4,2024-03-21T12:58:51.093000
CVE-2024-29037,0,0,522cff780a141ed0cb980da4de92689da8f883cb35906d0c7290ad955ce6a80b,2024-03-21T12:58:51.093000
CVE-2024-29042,1,1,00605be0f749248a7fd7b9895a0c967233a9b0e7a3c7f6d69403a5cdc9b94750,2024-03-22T17:15:07.990000
CVE-2024-29042,0,1,94be04c88512f8801f1a0b7e8a0fe44bc1e2661493f643835e5309c09e2ba389,2024-03-22T19:02:10.300000
CVE-2024-29089,0,0,e5fbae925c9da8d587d9573cbc1c34db123c4510c1c1616d472538493a08c59e,2024-03-20T13:00:16.367000
CVE-2024-29091,0,0,b1cb764a2082d02939e32c22f722543dd831cf608e6c39b51eb933f990788962,2024-03-20T13:00:16.367000
CVE-2024-29092,0,0,beafae19b6703c9fc1f01dec7ad304174a985adb5a44a4613a96bd5d1cef6a8d,2024-03-20T13:00:16.367000
@ -242425,19 +242430,19 @@ CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24
CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000
CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000
CVE-2024-29180,0,0,e32bebc90fbd05fe3a3edfae9506df906c8ca56e295fcb3cc3f3f384d12528c8,2024-03-21T19:47:03.943000
CVE-2024-29184,1,1,e6145bd232156c34417f53d913fba5fc5d295934cd8b2f4b5ea6027648470c6b,2024-03-22T17:15:08.203000
CVE-2024-29185,1,1,61573a8f48978457bae03c1dec91127eeeb03670be581edf50afbbb59deab805,2024-03-22T17:15:08.440000
CVE-2024-29186,1,1,c4b507a0ba78a750c36309e74afbe0eac839dec92a65b6d660d62079be814f42,2024-03-22T17:15:08.640000
CVE-2024-29184,0,1,f7b8833969ca9d0c0710d9e673438a664414c13b1764f6ae8189b2b9b95caa65,2024-03-22T19:02:10.300000
CVE-2024-29185,0,1,87ad89bc08b625b0d76de9def6a9a3830774fb10e68a03b7a7a4beff2b51d9e3,2024-03-22T19:02:10.300000
CVE-2024-29186,0,1,4d22f13bcc9a989b4457971fb422d0f63596eb5c598cc015a08c44b1e3975e55,2024-03-22T19:02:10.300000
CVE-2024-29243,0,0,80b3eab65af2d9fbeb7b6048e074697688a19de63e1138c377d0b826523dd7db,2024-03-21T15:24:35.093000
CVE-2024-29244,0,0,ab4dadc4ff7b45a2c285edb922de956bae0828f007627c62339f15145e95a7b7,2024-03-21T15:24:35.093000
CVE-2024-29271,0,0,86d82853285296d2653b2954b1f865b89755729787a00c9a08bf8b4da2a10347,2024-03-22T12:45:36.130000
CVE-2024-29272,0,0,bb3421cdf283ecf2f8722dd79d31aa3f3d26bad518191ad6f8ea2a70c28d47bf,2024-03-22T12:45:36.130000
CVE-2024-29273,0,0,5734858efc895a99d71a292d9b9fd87dc375f872fc9b4f17b1a24399e248cfbf,2024-03-22T12:45:36.130000
CVE-2024-29275,0,0,402f5150501d1ad43199a2c93810407cb4bc9ca968149bb7f55410637d08465b,2024-03-22T12:45:36.130000
CVE-2024-29338,1,1,127ac81d3476d511af2c7111de9e70bc9fb14470cc6089238225615bd4062017,2024-03-22T17:15:08.833000
CVE-2024-29366,1,1,6c913678ffaaef4987d265e998be2d97442828e9b675fb6a8e2fdf237dcf1d44,2024-03-22T17:15:08.887000
CVE-2024-29338,0,1,17a24f10f7d0496e7fcb2400fc6c6af48717728349b99b9f4dc4f19499bc4c6d,2024-03-22T19:02:10.300000
CVE-2024-29366,0,1,970a4db6ccd44fa8fff843a083b23c4276fdabe942805276e1033f4579523e8f,2024-03-22T19:02:10.300000
CVE-2024-29374,0,0,f8a146770d52182e0c10b15b21ebc5da7e22091690385e976078b28de6736be7,2024-03-21T19:47:03.943000
CVE-2024-29385,1,1,cc987fa29cc6745eb3ff125eabef04bbe71ab9e616c4e8dfb9dcb25c81078afc,2024-03-22T17:15:08.943000
CVE-2024-29385,0,1,77dce7c3f8675f81eb6a00c8f1d149f72619312873eb8bb6e829225e587309f5,2024-03-22T19:02:10.300000
CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000
CVE-2024-29469,0,0,acf93e04574e9669a29498319a75720c9b5a03ff4de2c06070b1f52ac9f365b7,2024-03-21T12:58:51.093000
CVE-2024-29470,0,0,ec8cc83a60b9ef7edaa49e0605acc097203825f31a2e1ca35494b606ac2473df,2024-03-21T12:58:51.093000
@ -242445,7 +242450,7 @@ CVE-2024-29471,0,0,82d45a5ffd79414ce139218b143945b76a967fb1502a8005b616153a32c45
CVE-2024-29472,0,0,8914457096a81cfec257e1932986907f8b2f25a966f10c0d7629905ec24b0f86,2024-03-21T12:58:51.093000
CVE-2024-29473,0,0,2dcbe7e94767e08f46a9353b62d8f30da500a221f5affb32fc9ef958cfff985b,2024-03-21T12:58:51.093000
CVE-2024-29474,0,0,cd74b93fedbacc13ab911c0f2a2b89e07d9e578953f3b262ce40503b72930e98,2024-03-21T12:58:51.093000
CVE-2024-29499,1,1,71e2f69d30d0fce08f6704795f703b61d27a06b4752f782f5d852f3a1a1e7742,2024-03-22T17:15:08.993000
CVE-2024-29499,0,1,bc8db29a97bf5517e5213278d0d5f5ecdec4b51f00adea3262848d25f6e735bc,2024-03-22T19:02:10.300000
CVE-2024-29732,0,0,3aff958eec55f5cf06538251c792be6423021bd21573f6f2f920d098c9ad37bd,2024-03-21T12:58:51.093000
CVE-2024-29858,0,0,585719d860c91771e96e52d882eed744121f21e899f727afe6b381f4ffbb308d,2024-03-21T12:58:51.093000
CVE-2024-29859,0,0,6ebff5730a73f542ffebf0a56f74146bb69314ac3f95118519ec4b678666f245,2024-03-21T12:58:51.093000
@ -242466,4 +242471,4 @@ CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e
CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000
CVE-2024-29916,0,0,dd300e18b662f862d3dd0881eace85d81be3f3aaeb79c908bcef100a80a89dd1,2024-03-21T19:47:03.943000
CVE-2024-29943,0,0,39d573a490fc5d2b219e8af270d3feeff9aa72e4341ddd52f10b0ddfa677f78e,2024-03-22T15:34:43.663000
CVE-2024-29944,0,1,ca73c86aa90858e489f00f7276bc4b89981cc800e753e2418a893b48aedeba4f,2024-03-22T17:15:09.043000
CVE-2024-29944,0,0,ca73c86aa90858e489f00f7276bc4b89981cc800e753e2418a893b48aedeba4f,2024-03-22T17:15:09.043000

Can't render this file because it is too large.