mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-03-06T23:00:24.910954+00:00
This commit is contained in:
parent
23ced37ffd
commit
c6d3700ef2
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-48703",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-06T20:15:47.343",
|
||||
"lastModified": "2024-03-06T20:15:47.343",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:48.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50167",
|
||||
"sourceIdentifier": "security@pega.com",
|
||||
"published": "2024-03-06T18:15:46.133",
|
||||
"lastModified": "2024-03-06T18:15:46.133",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:54.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50716",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-06T18:15:46.360",
|
||||
"lastModified": "2024-03-06T18:15:46.360",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:48.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20346",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-03-06T17:15:10.173",
|
||||
"lastModified": "2024-03-06T17:15:10.173",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:54.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2173",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-03-06T19:15:08.973",
|
||||
"lastModified": "2024-03-06T19:15:08.973",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:48.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2174",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-03-06T19:15:09.037",
|
||||
"lastModified": "2024-03-06T19:15:09.037",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:48.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2176",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-03-06T19:15:09.090",
|
||||
"lastModified": "2024-03-06T19:15:09.090",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:48.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2215",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-03-06T17:15:11.593",
|
||||
"lastModified": "2024-03-06T17:15:11.593",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:54.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2216",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-03-06T17:15:11.640",
|
||||
"lastModified": "2024-03-06T17:15:11.640",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:54.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
59
CVE-2024/CVE-2024-22xx/CVE-2024-2236.json
Normal file
59
CVE-2024/CVE-2024-22xx/CVE-2024-2236.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-2236",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-03-06T22:15:57.977",
|
||||
"lastModified": "2024-03-06T22:15:57.977",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-208"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-2236",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268268",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24761",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-06T18:15:46.620",
|
||||
"lastModified": "2024-03-06T18:15:46.620",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:48.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24765",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-06T18:15:46.807",
|
||||
"lastModified": "2024-03-06T18:15:46.807",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:48.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24766",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-06T19:15:07.290",
|
||||
"lastModified": "2024-03-06T19:15:07.290",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:48.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24767",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-06T18:15:46.983",
|
||||
"lastModified": "2024-03-06T18:15:46.983",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:48.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25111",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-06T19:15:07.510",
|
||||
"lastModified": "2024-03-06T19:15:07.510",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:48.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27287",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-06T19:15:07.723",
|
||||
"lastModified": "2024-03-06T19:15:07.723",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:48.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27288",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-06T19:15:07.933",
|
||||
"lastModified": "2024-03-06T19:15:07.933",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:48.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27289",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-06T19:15:08.140",
|
||||
"lastModified": "2024-03-06T19:15:08.140",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:48.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27302",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-06T19:15:08.330",
|
||||
"lastModified": "2024-03-06T19:15:08.330",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:48.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27303",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-06T19:15:08.553",
|
||||
"lastModified": "2024-03-06T19:15:08.553",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:48.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27304",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-06T19:15:08.767",
|
||||
"lastModified": "2024-03-06T19:15:08.767",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:48.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27307",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-06T20:15:47.537",
|
||||
"lastModified": "2024-03-06T20:15:47.537",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:48.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27308",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-06T20:15:47.730",
|
||||
"lastModified": "2024-03-06T20:15:47.730",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:48.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27915",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-06T20:15:47.930",
|
||||
"lastModified": "2024-03-06T20:15:47.930",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:48.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27917",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-06T20:15:48.120",
|
||||
"lastModified": "2024-03-06T20:15:48.120",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:48.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-27929",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-05T17:15:07.097",
|
||||
"lastModified": "2024-03-05T18:50:18.333",
|
||||
"lastModified": "2024-03-06T22:15:57.473",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ImageSharp is a managed, cross-platform, 2D graphics library. A heap-use-after-free flaw was found in ImageSharp's InitializeImage() function of PngDecoderCore.cs file. This vulnerability is triggered when an attacker passes a specially crafted PNG image file to ImageSharp for conversion, potentially leading to information disclosure. This issue has been patched in version 3.1.3."
|
||||
"value": "ImageSharp is a managed, cross-platform, 2D graphics library. A heap-use-after-free flaw was found in ImageSharp's InitializeImage() function of PngDecoderCore.cs file. This vulnerability is triggered when an attacker passes a specially crafted PNG image file to ImageSharp for conversion, potentially leading to information disclosure. This issue has been patched in versions 3.1.3 and 2.1.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
63
CVE-2024/CVE-2024-281xx/CVE-2024-28110.json
Normal file
63
CVE-2024/CVE-2024-281xx/CVE-2024-28110.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-28110",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-06T22:15:57.550",
|
||||
"lastModified": "2024-03-06T22:15:57.550",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Go SDK for CloudEvents is the official CloudEvents SDK to integrate applications with CloudEvents. Prior to version 2.15.2, using cloudevents.WithRoundTripper to create a cloudevents.Client with an authenticated http.RoundTripper causes the go-sdk to leak credentials to arbitrary endpoints. When the transport is populated with an authenticated transport, then http.DefaultClient is modified with the authenticated transport and will start to send Authorization tokens to any endpoint it is used to contact. Version 2.15.2 patches this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-522"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cloudevents/sdk-go/blob/67e389964131d55d65cd14b4eb32d57a47312695/v2/protocol/http/protocol.go#L104-L110",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cloudevents/sdk-go/commit/de2f28370b0d2a0f64f92c0c6139fa4b8a7c3851",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cloudevents/sdk-go/security/advisories/GHSA-5pf6-2qwx-pxm2",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-281xx/CVE-2024-28111.json
Normal file
59
CVE-2024/CVE-2024-281xx/CVE-2024-28111.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-28111",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-06T22:15:57.780",
|
||||
"lastModified": "2024-03-06T22:15:57.780",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Canarytokens helps track activity and actions on a network. Canarytokens.org supports exporting the history of a Canarytoken's incidents in CSV format. The generation of these CSV files is vulnerable to a CSV Injection vulnerability. This flaw can be used by an attacker who discovers an HTTP-based Canarytoken to target the Canarytoken's owner, if the owner exports the incident history to CSV and opens in a reader application such as Microsoft Excel. The impact is that this issue could lead to code execution on the machine on which the CSV file is opened. Version sha-c595a1f8 contains a fix for this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1236"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/thinkst/canarytokens/commit/c595a1f884b986da2ca05aa5bff9ae5f93c6a4aa",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/thinkst/canarytokens/security/advisories/GHSA-fqh6-v4qp-65fv",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28149",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-03-06T17:15:10.450",
|
||||
"lastModified": "2024-03-06T17:15:10.450",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:54.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28150",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-03-06T17:15:10.510",
|
||||
"lastModified": "2024-03-06T17:15:10.510",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:54.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28151",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-03-06T17:15:10.570",
|
||||
"lastModified": "2024-03-06T17:15:10.570",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:54.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28152",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-03-06T17:15:10.637",
|
||||
"lastModified": "2024-03-06T17:15:10.637",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:54.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28153",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-03-06T17:15:10.687",
|
||||
"lastModified": "2024-03-06T17:15:10.687",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:54.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28154",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-03-06T17:15:10.733",
|
||||
"lastModified": "2024-03-06T17:15:10.733",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:54.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28155",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-03-06T17:15:10.787",
|
||||
"lastModified": "2024-03-06T17:15:10.787",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:54.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28156",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-03-06T17:15:10.837",
|
||||
"lastModified": "2024-03-06T17:15:10.837",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:54.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28157",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-03-06T17:15:10.890",
|
||||
"lastModified": "2024-03-06T17:15:10.890",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:54.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28158",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-03-06T17:15:10.940",
|
||||
"lastModified": "2024-03-06T17:15:10.940",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:54.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28159",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-03-06T17:15:10.987",
|
||||
"lastModified": "2024-03-06T17:15:10.987",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:54.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28160",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-03-06T17:15:11.040",
|
||||
"lastModified": "2024-03-06T17:15:11.040",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:54.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28161",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-03-06T17:15:11.090",
|
||||
"lastModified": "2024-03-06T17:15:11.090",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:54.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28162",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-03-06T17:15:11.140",
|
||||
"lastModified": "2024-03-06T17:15:11.140",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:54.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28173",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-03-06T17:15:11.190",
|
||||
"lastModified": "2024-03-06T17:15:11.190",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:54.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28174",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-03-06T17:15:11.397",
|
||||
"lastModified": "2024-03-06T17:15:11.397",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-06T21:42:54.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
54
README.md
54
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-06T21:00:24.297999+00:00
|
||||
2024-03-06T23:00:24.910954+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-06T20:15:48.120000+00:00
|
||||
2024-03-06T22:15:57.977000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,35 +29,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
240712
|
||||
240715
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `16`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
* [CVE-2023-48703](CVE-2023/CVE-2023-487xx/CVE-2023-48703.json) (`2024-03-06T20:15:47.343`)
|
||||
* [CVE-2024-24766](CVE-2024/CVE-2024-247xx/CVE-2024-24766.json) (`2024-03-06T19:15:07.290`)
|
||||
* [CVE-2024-25111](CVE-2024/CVE-2024-251xx/CVE-2024-25111.json) (`2024-03-06T19:15:07.510`)
|
||||
* [CVE-2024-27287](CVE-2024/CVE-2024-272xx/CVE-2024-27287.json) (`2024-03-06T19:15:07.723`)
|
||||
* [CVE-2024-27288](CVE-2024/CVE-2024-272xx/CVE-2024-27288.json) (`2024-03-06T19:15:07.933`)
|
||||
* [CVE-2024-27289](CVE-2024/CVE-2024-272xx/CVE-2024-27289.json) (`2024-03-06T19:15:08.140`)
|
||||
* [CVE-2024-27302](CVE-2024/CVE-2024-273xx/CVE-2024-27302.json) (`2024-03-06T19:15:08.330`)
|
||||
* [CVE-2024-27303](CVE-2024/CVE-2024-273xx/CVE-2024-27303.json) (`2024-03-06T19:15:08.553`)
|
||||
* [CVE-2024-27304](CVE-2024/CVE-2024-273xx/CVE-2024-27304.json) (`2024-03-06T19:15:08.767`)
|
||||
* [CVE-2024-2173](CVE-2024/CVE-2024-21xx/CVE-2024-2173.json) (`2024-03-06T19:15:08.973`)
|
||||
* [CVE-2024-2174](CVE-2024/CVE-2024-21xx/CVE-2024-2174.json) (`2024-03-06T19:15:09.037`)
|
||||
* [CVE-2024-2176](CVE-2024/CVE-2024-21xx/CVE-2024-2176.json) (`2024-03-06T19:15:09.090`)
|
||||
* [CVE-2024-27307](CVE-2024/CVE-2024-273xx/CVE-2024-27307.json) (`2024-03-06T20:15:47.537`)
|
||||
* [CVE-2024-27308](CVE-2024/CVE-2024-273xx/CVE-2024-27308.json) (`2024-03-06T20:15:47.730`)
|
||||
* [CVE-2024-27915](CVE-2024/CVE-2024-279xx/CVE-2024-27915.json) (`2024-03-06T20:15:47.930`)
|
||||
* [CVE-2024-27917](CVE-2024/CVE-2024-279xx/CVE-2024-27917.json) (`2024-03-06T20:15:48.120`)
|
||||
* [CVE-2024-28110](CVE-2024/CVE-2024-281xx/CVE-2024-28110.json) (`2024-03-06T22:15:57.550`)
|
||||
* [CVE-2024-28111](CVE-2024/CVE-2024-281xx/CVE-2024-28111.json) (`2024-03-06T22:15:57.780`)
|
||||
* [CVE-2024-2236](CVE-2024/CVE-2024-22xx/CVE-2024-2236.json) (`2024-03-06T22:15:57.977`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `41`
|
||||
|
||||
* [CVE-2024-2176](CVE-2024/CVE-2024-21xx/CVE-2024-2176.json) (`2024-03-06T21:42:48.053`)
|
||||
* [CVE-2024-27307](CVE-2024/CVE-2024-273xx/CVE-2024-27307.json) (`2024-03-06T21:42:48.053`)
|
||||
* [CVE-2024-27308](CVE-2024/CVE-2024-273xx/CVE-2024-27308.json) (`2024-03-06T21:42:48.053`)
|
||||
* [CVE-2024-27915](CVE-2024/CVE-2024-279xx/CVE-2024-27915.json) (`2024-03-06T21:42:48.053`)
|
||||
* [CVE-2024-27917](CVE-2024/CVE-2024-279xx/CVE-2024-27917.json) (`2024-03-06T21:42:48.053`)
|
||||
* [CVE-2024-20346](CVE-2024/CVE-2024-203xx/CVE-2024-20346.json) (`2024-03-06T21:42:54.697`)
|
||||
* [CVE-2024-28149](CVE-2024/CVE-2024-281xx/CVE-2024-28149.json) (`2024-03-06T21:42:54.697`)
|
||||
* [CVE-2024-28150](CVE-2024/CVE-2024-281xx/CVE-2024-28150.json) (`2024-03-06T21:42:54.697`)
|
||||
* [CVE-2024-28151](CVE-2024/CVE-2024-281xx/CVE-2024-28151.json) (`2024-03-06T21:42:54.697`)
|
||||
* [CVE-2024-28152](CVE-2024/CVE-2024-281xx/CVE-2024-28152.json) (`2024-03-06T21:42:54.697`)
|
||||
* [CVE-2024-28153](CVE-2024/CVE-2024-281xx/CVE-2024-28153.json) (`2024-03-06T21:42:54.697`)
|
||||
* [CVE-2024-28154](CVE-2024/CVE-2024-281xx/CVE-2024-28154.json) (`2024-03-06T21:42:54.697`)
|
||||
* [CVE-2024-28155](CVE-2024/CVE-2024-281xx/CVE-2024-28155.json) (`2024-03-06T21:42:54.697`)
|
||||
* [CVE-2024-28156](CVE-2024/CVE-2024-281xx/CVE-2024-28156.json) (`2024-03-06T21:42:54.697`)
|
||||
* [CVE-2024-28157](CVE-2024/CVE-2024-281xx/CVE-2024-28157.json) (`2024-03-06T21:42:54.697`)
|
||||
* [CVE-2024-28158](CVE-2024/CVE-2024-281xx/CVE-2024-28158.json) (`2024-03-06T21:42:54.697`)
|
||||
* [CVE-2024-28159](CVE-2024/CVE-2024-281xx/CVE-2024-28159.json) (`2024-03-06T21:42:54.697`)
|
||||
* [CVE-2024-28160](CVE-2024/CVE-2024-281xx/CVE-2024-28160.json) (`2024-03-06T21:42:54.697`)
|
||||
* [CVE-2024-28161](CVE-2024/CVE-2024-281xx/CVE-2024-28161.json) (`2024-03-06T21:42:54.697`)
|
||||
* [CVE-2024-28162](CVE-2024/CVE-2024-281xx/CVE-2024-28162.json) (`2024-03-06T21:42:54.697`)
|
||||
* [CVE-2024-28173](CVE-2024/CVE-2024-281xx/CVE-2024-28173.json) (`2024-03-06T21:42:54.697`)
|
||||
* [CVE-2024-28174](CVE-2024/CVE-2024-281xx/CVE-2024-28174.json) (`2024-03-06T21:42:54.697`)
|
||||
* [CVE-2024-2215](CVE-2024/CVE-2024-22xx/CVE-2024-2215.json) (`2024-03-06T21:42:54.697`)
|
||||
* [CVE-2024-2216](CVE-2024/CVE-2024-22xx/CVE-2024-2216.json) (`2024-03-06T21:42:54.697`)
|
||||
* [CVE-2024-27929](CVE-2024/CVE-2024-279xx/CVE-2024-27929.json) (`2024-03-06T22:15:57.473`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user